aws-sdk-inspector2 1.11.0 → 1.12.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-inspector2/client.rb +74 -1
- data/lib/aws-sdk-inspector2/client_api.rb +129 -0
- data/lib/aws-sdk-inspector2/endpoints.rb +14 -0
- data/lib/aws-sdk-inspector2/plugins/endpoints.rb +2 -0
- data/lib/aws-sdk-inspector2/types.rb +290 -0
- data/lib/aws-sdk-inspector2.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 37045386cef6441373fa42145f3ecf648fef0f4322fad6515b80719539a77473
|
4
|
+
data.tar.gz: b815de9f7ae4804241a5aabc60fede44880a5ba087b92d4000e179b7c7fee2ca
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 1b1f03de0aaef59011515095e6fbd52e881a1ff9a49c798d7048af053da8d2db939b786a32f263332ebcd01e988d0df84b096f02af018f5c460055216687ab32
|
7
|
+
data.tar.gz: a20ac868d3f766413ca6cc2a70ed86276d9fcbeef6db46c9e2d609727c3ac2b2b903b109959141cca536e6d4ee92963af94fd7912f0785a05b110ddbdf26de70
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,11 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.12.0 (2023-05-05)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Amazon Inspector now allows customers to search its vulnerability intelligence database if any of the Inspector scanning types are activated.
|
8
|
+
|
4
9
|
1.11.0 (2023-05-03)
|
5
10
|
------------------
|
6
11
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.12.0
|
@@ -3158,6 +3158,79 @@ module Aws::Inspector2
|
|
3158
3158
|
req.send_request(options)
|
3159
3159
|
end
|
3160
3160
|
|
3161
|
+
# Lists Amazon Inspector coverage details for a specific vulnerability.
|
3162
|
+
#
|
3163
|
+
# @option params [required, Types::SearchVulnerabilitiesFilterCriteria] :filter_criteria
|
3164
|
+
# The criteria used to filter the results of a vulnerability search.
|
3165
|
+
#
|
3166
|
+
# @option params [String] :next_token
|
3167
|
+
# A token to use for paginating results that are returned in the
|
3168
|
+
# response. Set the value of this parameter to null for the first
|
3169
|
+
# request to a list action. For subsequent calls, use the `NextToken`
|
3170
|
+
# value returned from the previous request to continue listing results
|
3171
|
+
# after the first page.
|
3172
|
+
#
|
3173
|
+
# @return [Types::SearchVulnerabilitiesResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
3174
|
+
#
|
3175
|
+
# * {Types::SearchVulnerabilitiesResponse#next_token #next_token} => String
|
3176
|
+
# * {Types::SearchVulnerabilitiesResponse#vulnerabilities #vulnerabilities} => Array<Types::Vulnerability>
|
3177
|
+
#
|
3178
|
+
# The returned {Seahorse::Client::Response response} is a pageable response and is Enumerable. For details on usage see {Aws::PageableResponse PageableResponse}.
|
3179
|
+
#
|
3180
|
+
# @example Request syntax with placeholder values
|
3181
|
+
#
|
3182
|
+
# resp = client.search_vulnerabilities({
|
3183
|
+
# filter_criteria: { # required
|
3184
|
+
# vulnerability_ids: ["VulnId"], # required
|
3185
|
+
# },
|
3186
|
+
# next_token: "NextToken",
|
3187
|
+
# })
|
3188
|
+
#
|
3189
|
+
# @example Response structure
|
3190
|
+
#
|
3191
|
+
# resp.next_token #=> String
|
3192
|
+
# resp.vulnerabilities #=> Array
|
3193
|
+
# resp.vulnerabilities[0].atig_data.first_seen #=> Time
|
3194
|
+
# resp.vulnerabilities[0].atig_data.last_seen #=> Time
|
3195
|
+
# resp.vulnerabilities[0].atig_data.targets #=> Array
|
3196
|
+
# resp.vulnerabilities[0].atig_data.targets[0] #=> String
|
3197
|
+
# resp.vulnerabilities[0].atig_data.ttps #=> Array
|
3198
|
+
# resp.vulnerabilities[0].atig_data.ttps[0] #=> String
|
3199
|
+
# resp.vulnerabilities[0].cisa_data.action #=> String
|
3200
|
+
# resp.vulnerabilities[0].cisa_data.date_added #=> Time
|
3201
|
+
# resp.vulnerabilities[0].cisa_data.date_due #=> Time
|
3202
|
+
# resp.vulnerabilities[0].cvss2.base_score #=> Float
|
3203
|
+
# resp.vulnerabilities[0].cvss2.scoring_vector #=> String
|
3204
|
+
# resp.vulnerabilities[0].cvss3.base_score #=> Float
|
3205
|
+
# resp.vulnerabilities[0].cvss3.scoring_vector #=> String
|
3206
|
+
# resp.vulnerabilities[0].cwes #=> Array
|
3207
|
+
# resp.vulnerabilities[0].cwes[0] #=> String
|
3208
|
+
# resp.vulnerabilities[0].description #=> String
|
3209
|
+
# resp.vulnerabilities[0].detection_platforms #=> Array
|
3210
|
+
# resp.vulnerabilities[0].detection_platforms[0] #=> String
|
3211
|
+
# resp.vulnerabilities[0].epss.score #=> Float
|
3212
|
+
# resp.vulnerabilities[0].exploit_observed.first_seen #=> Time
|
3213
|
+
# resp.vulnerabilities[0].exploit_observed.last_seen #=> Time
|
3214
|
+
# resp.vulnerabilities[0].id #=> String
|
3215
|
+
# resp.vulnerabilities[0].reference_urls #=> Array
|
3216
|
+
# resp.vulnerabilities[0].reference_urls[0] #=> String
|
3217
|
+
# resp.vulnerabilities[0].related_vulnerabilities #=> Array
|
3218
|
+
# resp.vulnerabilities[0].related_vulnerabilities[0] #=> String
|
3219
|
+
# resp.vulnerabilities[0].source #=> String, one of "NVD"
|
3220
|
+
# resp.vulnerabilities[0].source_url #=> String
|
3221
|
+
# resp.vulnerabilities[0].vendor_created_at #=> Time
|
3222
|
+
# resp.vulnerabilities[0].vendor_severity #=> String
|
3223
|
+
# resp.vulnerabilities[0].vendor_updated_at #=> Time
|
3224
|
+
#
|
3225
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/SearchVulnerabilities AWS API Documentation
|
3226
|
+
#
|
3227
|
+
# @overload search_vulnerabilities(params = {})
|
3228
|
+
# @param [Hash] params ({})
|
3229
|
+
def search_vulnerabilities(params = {}, options = {})
|
3230
|
+
req = build_request(:search_vulnerabilities, params)
|
3231
|
+
req.send_request(options)
|
3232
|
+
end
|
3233
|
+
|
3161
3234
|
# Adds tags to a resource.
|
3162
3235
|
#
|
3163
3236
|
# @option params [required, String] :resource_arn
|
@@ -3669,7 +3742,7 @@ module Aws::Inspector2
|
|
3669
3742
|
params: params,
|
3670
3743
|
config: config)
|
3671
3744
|
context[:gem_name] = 'aws-sdk-inspector2'
|
3672
|
-
context[:gem_version] = '1.
|
3745
|
+
context[:gem_version] = '1.12.0'
|
3673
3746
|
Seahorse::Client::Request.new(handlers, context)
|
3674
3747
|
end
|
3675
3748
|
|
@@ -39,6 +39,7 @@ module Aws::Inspector2
|
|
39
39
|
Arn = Shapes::StringShape.new(name: 'Arn')
|
40
40
|
AssociateMemberRequest = Shapes::StructureShape.new(name: 'AssociateMemberRequest')
|
41
41
|
AssociateMemberResponse = Shapes::StructureShape.new(name: 'AssociateMemberResponse')
|
42
|
+
AtigData = Shapes::StructureShape.new(name: 'AtigData')
|
42
43
|
AutoEnable = Shapes::StructureShape.new(name: 'AutoEnable')
|
43
44
|
AwsEc2InstanceDetails = Shapes::StructureShape.new(name: 'AwsEc2InstanceDetails')
|
44
45
|
AwsEcrContainerAggregation = Shapes::StructureShape.new(name: 'AwsEcrContainerAggregation')
|
@@ -59,6 +60,10 @@ module Aws::Inspector2
|
|
59
60
|
Boolean = Shapes::BooleanShape.new(name: 'Boolean')
|
60
61
|
CancelFindingsReportRequest = Shapes::StructureShape.new(name: 'CancelFindingsReportRequest')
|
61
62
|
CancelFindingsReportResponse = Shapes::StructureShape.new(name: 'CancelFindingsReportResponse')
|
63
|
+
CisaAction = Shapes::StringShape.new(name: 'CisaAction')
|
64
|
+
CisaData = Shapes::StructureShape.new(name: 'CisaData')
|
65
|
+
CisaDateAdded = Shapes::TimestampShape.new(name: 'CisaDateAdded')
|
66
|
+
CisaDateDue = Shapes::TimestampShape.new(name: 'CisaDateDue')
|
62
67
|
ClientToken = Shapes::StringShape.new(name: 'ClientToken')
|
63
68
|
Component = Shapes::StringShape.new(name: 'Component')
|
64
69
|
ComponentType = Shapes::StringShape.new(name: 'ComponentType')
|
@@ -81,11 +86,19 @@ module Aws::Inspector2
|
|
81
86
|
CreateFindingsReportRequest = Shapes::StructureShape.new(name: 'CreateFindingsReportRequest')
|
82
87
|
CreateFindingsReportResponse = Shapes::StructureShape.new(name: 'CreateFindingsReportResponse')
|
83
88
|
Currency = Shapes::StringShape.new(name: 'Currency')
|
89
|
+
Cvss2 = Shapes::StructureShape.new(name: 'Cvss2')
|
90
|
+
Cvss2BaseScore = Shapes::FloatShape.new(name: 'Cvss2BaseScore')
|
91
|
+
Cvss2ScoringVector = Shapes::StringShape.new(name: 'Cvss2ScoringVector')
|
92
|
+
Cvss3 = Shapes::StructureShape.new(name: 'Cvss3')
|
93
|
+
Cvss3BaseScore = Shapes::FloatShape.new(name: 'Cvss3BaseScore')
|
94
|
+
Cvss3ScoringVector = Shapes::StringShape.new(name: 'Cvss3ScoringVector')
|
84
95
|
CvssScore = Shapes::StructureShape.new(name: 'CvssScore')
|
85
96
|
CvssScoreAdjustment = Shapes::StructureShape.new(name: 'CvssScoreAdjustment')
|
86
97
|
CvssScoreAdjustmentList = Shapes::ListShape.new(name: 'CvssScoreAdjustmentList')
|
87
98
|
CvssScoreDetails = Shapes::StructureShape.new(name: 'CvssScoreDetails')
|
88
99
|
CvssScoreList = Shapes::ListShape.new(name: 'CvssScoreList')
|
100
|
+
Cwe = Shapes::StringShape.new(name: 'Cwe')
|
101
|
+
Cwes = Shapes::ListShape.new(name: 'Cwes')
|
89
102
|
DateFilter = Shapes::StructureShape.new(name: 'DateFilter')
|
90
103
|
DateFilterList = Shapes::ListShape.new(name: 'DateFilterList')
|
91
104
|
DateTimeTimestamp = Shapes::TimestampShape.new(name: 'DateTimeTimestamp')
|
@@ -98,6 +111,7 @@ module Aws::Inspector2
|
|
98
111
|
DescribeOrganizationConfigurationRequest = Shapes::StructureShape.new(name: 'DescribeOrganizationConfigurationRequest')
|
99
112
|
DescribeOrganizationConfigurationResponse = Shapes::StructureShape.new(name: 'DescribeOrganizationConfigurationResponse')
|
100
113
|
Destination = Shapes::StructureShape.new(name: 'Destination')
|
114
|
+
DetectionPlatforms = Shapes::ListShape.new(name: 'DetectionPlatforms')
|
101
115
|
DisableDelegatedAdminAccountRequest = Shapes::StructureShape.new(name: 'DisableDelegatedAdminAccountRequest')
|
102
116
|
DisableDelegatedAdminAccountResponse = Shapes::StructureShape.new(name: 'DisableDelegatedAdminAccountResponse')
|
103
117
|
DisableRequest = Shapes::StructureShape.new(name: 'DisableRequest')
|
@@ -125,10 +139,13 @@ module Aws::Inspector2
|
|
125
139
|
EnableRequest = Shapes::StructureShape.new(name: 'EnableRequest')
|
126
140
|
EnableResourceTypeList = Shapes::ListShape.new(name: 'EnableResourceTypeList')
|
127
141
|
EnableResponse = Shapes::StructureShape.new(name: 'EnableResponse')
|
142
|
+
Epss = Shapes::StructureShape.new(name: 'Epss')
|
143
|
+
EpssScore = Shapes::FloatShape.new(name: 'EpssScore')
|
128
144
|
ErrorCode = Shapes::StringShape.new(name: 'ErrorCode')
|
129
145
|
ErrorMessage = Shapes::StringShape.new(name: 'ErrorMessage')
|
130
146
|
ExecutionRoleArn = Shapes::StringShape.new(name: 'ExecutionRoleArn')
|
131
147
|
ExploitAvailable = Shapes::StringShape.new(name: 'ExploitAvailable')
|
148
|
+
ExploitObserved = Shapes::StructureShape.new(name: 'ExploitObserved')
|
132
149
|
ExploitabilityDetails = Shapes::StructureShape.new(name: 'ExploitabilityDetails')
|
133
150
|
ExternalReportStatus = Shapes::StringShape.new(name: 'ExternalReportStatus')
|
134
151
|
FailedAccount = Shapes::StructureShape.new(name: 'FailedAccount')
|
@@ -155,6 +172,7 @@ module Aws::Inspector2
|
|
155
172
|
FindingTypeAggregation = Shapes::StructureShape.new(name: 'FindingTypeAggregation')
|
156
173
|
FindingTypeAggregationResponse = Shapes::StructureShape.new(name: 'FindingTypeAggregationResponse')
|
157
174
|
FindingTypeSortBy = Shapes::StringShape.new(name: 'FindingTypeSortBy')
|
175
|
+
FirstSeen = Shapes::TimestampShape.new(name: 'FirstSeen')
|
158
176
|
FixAvailable = Shapes::StringShape.new(name: 'FixAvailable')
|
159
177
|
FreeTrialAccountInfo = Shapes::StructureShape.new(name: 'FreeTrialAccountInfo')
|
160
178
|
FreeTrialAccountInfoList = Shapes::ListShape.new(name: 'FreeTrialAccountInfoList')
|
@@ -199,6 +217,7 @@ module Aws::Inspector2
|
|
199
217
|
LambdaLayerList = Shapes::ListShape.new(name: 'LambdaLayerList')
|
200
218
|
LambdaLayerSortBy = Shapes::StringShape.new(name: 'LambdaLayerSortBy')
|
201
219
|
LambdaVpcConfig = Shapes::StructureShape.new(name: 'LambdaVpcConfig')
|
220
|
+
LastSeen = Shapes::TimestampShape.new(name: 'LastSeen')
|
202
221
|
LayerList = Shapes::ListShape.new(name: 'LayerList')
|
203
222
|
ListAccountPermissionsMaxResults = Shapes::IntegerShape.new(name: 'ListAccountPermissionsMaxResults')
|
204
223
|
ListAccountPermissionsRequest = Shapes::StructureShape.new(name: 'ListAccountPermissionsRequest')
|
@@ -276,6 +295,8 @@ module Aws::Inspector2
|
|
276
295
|
PortRangeFilter = Shapes::StructureShape.new(name: 'PortRangeFilter')
|
277
296
|
PortRangeFilterList = Shapes::ListShape.new(name: 'PortRangeFilterList')
|
278
297
|
Recommendation = Shapes::StructureShape.new(name: 'Recommendation')
|
298
|
+
RelatedVulnerabilities = Shapes::ListShape.new(name: 'RelatedVulnerabilities')
|
299
|
+
RelatedVulnerability = Shapes::StringShape.new(name: 'RelatedVulnerability')
|
279
300
|
RelationshipStatus = Shapes::StringShape.new(name: 'RelationshipStatus')
|
280
301
|
Remediation = Shapes::StructureShape.new(name: 'Remediation')
|
281
302
|
ReportFormat = Shapes::StringShape.new(name: 'ReportFormat')
|
@@ -299,6 +320,9 @@ module Aws::Inspector2
|
|
299
320
|
ScanStatusCode = Shapes::StringShape.new(name: 'ScanStatusCode')
|
300
321
|
ScanStatusReason = Shapes::StringShape.new(name: 'ScanStatusReason')
|
301
322
|
ScanType = Shapes::StringShape.new(name: 'ScanType')
|
323
|
+
SearchVulnerabilitiesFilterCriteria = Shapes::StructureShape.new(name: 'SearchVulnerabilitiesFilterCriteria')
|
324
|
+
SearchVulnerabilitiesRequest = Shapes::StructureShape.new(name: 'SearchVulnerabilitiesRequest')
|
325
|
+
SearchVulnerabilitiesResponse = Shapes::StructureShape.new(name: 'SearchVulnerabilitiesResponse')
|
302
326
|
SecurityGroupId = Shapes::StringShape.new(name: 'SecurityGroupId')
|
303
327
|
SecurityGroupIdList = Shapes::ListShape.new(name: 'SecurityGroupIdList')
|
304
328
|
Service = Shapes::StringShape.new(name: 'Service')
|
@@ -327,11 +351,15 @@ module Aws::Inspector2
|
|
327
351
|
TagMap = Shapes::MapShape.new(name: 'TagMap')
|
328
352
|
TagResourceRequest = Shapes::StructureShape.new(name: 'TagResourceRequest')
|
329
353
|
TagResourceResponse = Shapes::StructureShape.new(name: 'TagResourceResponse')
|
354
|
+
Target = Shapes::StringShape.new(name: 'Target')
|
355
|
+
Targets = Shapes::ListShape.new(name: 'Targets')
|
330
356
|
ThrottlingException = Shapes::StructureShape.new(name: 'ThrottlingException')
|
331
357
|
Timestamp = Shapes::TimestampShape.new(name: 'Timestamp')
|
332
358
|
TitleAggregation = Shapes::StructureShape.new(name: 'TitleAggregation')
|
333
359
|
TitleAggregationResponse = Shapes::StructureShape.new(name: 'TitleAggregationResponse')
|
334
360
|
TitleSortBy = Shapes::StringShape.new(name: 'TitleSortBy')
|
361
|
+
Ttp = Shapes::StringShape.new(name: 'Ttp')
|
362
|
+
Ttps = Shapes::ListShape.new(name: 'Ttps')
|
335
363
|
UntagResourceRequest = Shapes::StructureShape.new(name: 'UntagResourceRequest')
|
336
364
|
UntagResourceResponse = Shapes::StructureShape.new(name: 'UntagResourceResponse')
|
337
365
|
UpdateConfigurationRequest = Shapes::StructureShape.new(name: 'UpdateConfigurationRequest')
|
@@ -356,10 +384,22 @@ module Aws::Inspector2
|
|
356
384
|
ValidationExceptionField = Shapes::StructureShape.new(name: 'ValidationExceptionField')
|
357
385
|
ValidationExceptionFields = Shapes::ListShape.new(name: 'ValidationExceptionFields')
|
358
386
|
ValidationExceptionReason = Shapes::StringShape.new(name: 'ValidationExceptionReason')
|
387
|
+
VendorCreatedAt = Shapes::TimestampShape.new(name: 'VendorCreatedAt')
|
388
|
+
VendorSeverity = Shapes::StringShape.new(name: 'VendorSeverity')
|
389
|
+
VendorUpdatedAt = Shapes::TimestampShape.new(name: 'VendorUpdatedAt')
|
359
390
|
Version = Shapes::StringShape.new(name: 'Version')
|
360
391
|
VpcId = Shapes::StringShape.new(name: 'VpcId')
|
392
|
+
VulnId = Shapes::StringShape.new(name: 'VulnId')
|
393
|
+
VulnIdList = Shapes::ListShape.new(name: 'VulnIdList')
|
394
|
+
Vulnerabilities = Shapes::ListShape.new(name: 'Vulnerabilities')
|
395
|
+
Vulnerability = Shapes::StructureShape.new(name: 'Vulnerability')
|
396
|
+
VulnerabilityDescription = Shapes::StringShape.new(name: 'VulnerabilityDescription')
|
361
397
|
VulnerabilityId = Shapes::StringShape.new(name: 'VulnerabilityId')
|
362
398
|
VulnerabilityIdList = Shapes::ListShape.new(name: 'VulnerabilityIdList')
|
399
|
+
VulnerabilityReferenceUrl = Shapes::StringShape.new(name: 'VulnerabilityReferenceUrl')
|
400
|
+
VulnerabilityReferenceUrls = Shapes::ListShape.new(name: 'VulnerabilityReferenceUrls')
|
401
|
+
VulnerabilitySource = Shapes::StringShape.new(name: 'VulnerabilitySource')
|
402
|
+
VulnerabilitySourceUrl = Shapes::StringShape.new(name: 'VulnerabilitySourceUrl')
|
363
403
|
VulnerablePackage = Shapes::StructureShape.new(name: 'VulnerablePackage')
|
364
404
|
VulnerablePackageList = Shapes::ListShape.new(name: 'VulnerablePackageList')
|
365
405
|
VulnerablePackageRemediation = Shapes::StringShape.new(name: 'VulnerablePackageRemediation')
|
@@ -466,6 +506,12 @@ module Aws::Inspector2
|
|
466
506
|
AssociateMemberResponse.add_member(:account_id, Shapes::ShapeRef.new(shape: AccountId, required: true, location_name: "accountId"))
|
467
507
|
AssociateMemberResponse.struct_class = Types::AssociateMemberResponse
|
468
508
|
|
509
|
+
AtigData.add_member(:first_seen, Shapes::ShapeRef.new(shape: FirstSeen, location_name: "firstSeen"))
|
510
|
+
AtigData.add_member(:last_seen, Shapes::ShapeRef.new(shape: LastSeen, location_name: "lastSeen"))
|
511
|
+
AtigData.add_member(:targets, Shapes::ShapeRef.new(shape: Targets, location_name: "targets"))
|
512
|
+
AtigData.add_member(:ttps, Shapes::ShapeRef.new(shape: Ttps, location_name: "ttps"))
|
513
|
+
AtigData.struct_class = Types::AtigData
|
514
|
+
|
469
515
|
AutoEnable.add_member(:ec2, Shapes::ShapeRef.new(shape: Boolean, required: true, location_name: "ec2"))
|
470
516
|
AutoEnable.add_member(:ecr, Shapes::ShapeRef.new(shape: Boolean, required: true, location_name: "ecr"))
|
471
517
|
AutoEnable.add_member(:lambda, Shapes::ShapeRef.new(shape: Boolean, location_name: "lambda"))
|
@@ -562,6 +608,11 @@ module Aws::Inspector2
|
|
562
608
|
CancelFindingsReportResponse.add_member(:report_id, Shapes::ShapeRef.new(shape: ReportId, required: true, location_name: "reportId"))
|
563
609
|
CancelFindingsReportResponse.struct_class = Types::CancelFindingsReportResponse
|
564
610
|
|
611
|
+
CisaData.add_member(:action, Shapes::ShapeRef.new(shape: CisaAction, location_name: "action"))
|
612
|
+
CisaData.add_member(:date_added, Shapes::ShapeRef.new(shape: CisaDateAdded, location_name: "dateAdded"))
|
613
|
+
CisaData.add_member(:date_due, Shapes::ShapeRef.new(shape: CisaDateDue, location_name: "dateDue"))
|
614
|
+
CisaData.struct_class = Types::CisaData
|
615
|
+
|
565
616
|
ConflictException.add_member(:message, Shapes::ShapeRef.new(shape: String, required: true, location_name: "message"))
|
566
617
|
ConflictException.add_member(:resource_id, Shapes::ShapeRef.new(shape: String, required: true, location_name: "resourceId"))
|
567
618
|
ConflictException.add_member(:resource_type, Shapes::ShapeRef.new(shape: String, required: true, location_name: "resourceType"))
|
@@ -629,6 +680,14 @@ module Aws::Inspector2
|
|
629
680
|
CreateFindingsReportResponse.add_member(:report_id, Shapes::ShapeRef.new(shape: ReportId, location_name: "reportId"))
|
630
681
|
CreateFindingsReportResponse.struct_class = Types::CreateFindingsReportResponse
|
631
682
|
|
683
|
+
Cvss2.add_member(:base_score, Shapes::ShapeRef.new(shape: Cvss2BaseScore, location_name: "baseScore"))
|
684
|
+
Cvss2.add_member(:scoring_vector, Shapes::ShapeRef.new(shape: Cvss2ScoringVector, location_name: "scoringVector"))
|
685
|
+
Cvss2.struct_class = Types::Cvss2
|
686
|
+
|
687
|
+
Cvss3.add_member(:base_score, Shapes::ShapeRef.new(shape: Cvss3BaseScore, location_name: "baseScore"))
|
688
|
+
Cvss3.add_member(:scoring_vector, Shapes::ShapeRef.new(shape: Cvss3ScoringVector, location_name: "scoringVector"))
|
689
|
+
Cvss3.struct_class = Types::Cvss3
|
690
|
+
|
632
691
|
CvssScore.add_member(:base_score, Shapes::ShapeRef.new(shape: Double, required: true, location_name: "baseScore"))
|
633
692
|
CvssScore.add_member(:scoring_vector, Shapes::ShapeRef.new(shape: NonEmptyString, required: true, location_name: "scoringVector"))
|
634
693
|
CvssScore.add_member(:source, Shapes::ShapeRef.new(shape: NonEmptyString, required: true, location_name: "source"))
|
@@ -651,6 +710,8 @@ module Aws::Inspector2
|
|
651
710
|
|
652
711
|
CvssScoreList.member = Shapes::ShapeRef.new(shape: CvssScore)
|
653
712
|
|
713
|
+
Cwes.member = Shapes::ShapeRef.new(shape: Cwe)
|
714
|
+
|
654
715
|
DateFilter.add_member(:end_inclusive, Shapes::ShapeRef.new(shape: Timestamp, location_name: "endInclusive"))
|
655
716
|
DateFilter.add_member(:start_inclusive, Shapes::ShapeRef.new(shape: Timestamp, location_name: "startInclusive"))
|
656
717
|
DateFilter.struct_class = Types::DateFilter
|
@@ -684,6 +745,8 @@ module Aws::Inspector2
|
|
684
745
|
Destination.add_member(:kms_key_arn, Shapes::ShapeRef.new(shape: String, required: true, location_name: "kmsKeyArn"))
|
685
746
|
Destination.struct_class = Types::Destination
|
686
747
|
|
748
|
+
DetectionPlatforms.member = Shapes::ShapeRef.new(shape: NonEmptyString)
|
749
|
+
|
687
750
|
DisableDelegatedAdminAccountRequest.add_member(:delegated_admin_account_id, Shapes::ShapeRef.new(shape: AccountId, required: true, location_name: "delegatedAdminAccountId"))
|
688
751
|
DisableDelegatedAdminAccountRequest.struct_class = Types::DisableDelegatedAdminAccountRequest
|
689
752
|
|
@@ -764,6 +827,13 @@ module Aws::Inspector2
|
|
764
827
|
EnableResponse.add_member(:failed_accounts, Shapes::ShapeRef.new(shape: FailedAccountList, location_name: "failedAccounts"))
|
765
828
|
EnableResponse.struct_class = Types::EnableResponse
|
766
829
|
|
830
|
+
Epss.add_member(:score, Shapes::ShapeRef.new(shape: EpssScore, location_name: "score"))
|
831
|
+
Epss.struct_class = Types::Epss
|
832
|
+
|
833
|
+
ExploitObserved.add_member(:first_seen, Shapes::ShapeRef.new(shape: FirstSeen, location_name: "firstSeen"))
|
834
|
+
ExploitObserved.add_member(:last_seen, Shapes::ShapeRef.new(shape: LastSeen, location_name: "lastSeen"))
|
835
|
+
ExploitObserved.struct_class = Types::ExploitObserved
|
836
|
+
|
767
837
|
ExploitabilityDetails.add_member(:last_known_exploit_at, Shapes::ShapeRef.new(shape: DateTimeTimestamp, location_name: "lastKnownExploitAt"))
|
768
838
|
ExploitabilityDetails.struct_class = Types::ExploitabilityDetails
|
769
839
|
|
@@ -1192,6 +1262,8 @@ module Aws::Inspector2
|
|
1192
1262
|
Recommendation.add_member(:text, Shapes::ShapeRef.new(shape: NonEmptyString, location_name: "text"))
|
1193
1263
|
Recommendation.struct_class = Types::Recommendation
|
1194
1264
|
|
1265
|
+
RelatedVulnerabilities.member = Shapes::ShapeRef.new(shape: RelatedVulnerability)
|
1266
|
+
|
1195
1267
|
Remediation.add_member(:recommendation, Shapes::ShapeRef.new(shape: Recommendation, location_name: "recommendation"))
|
1196
1268
|
Remediation.struct_class = Types::Remediation
|
1197
1269
|
|
@@ -1244,6 +1316,17 @@ module Aws::Inspector2
|
|
1244
1316
|
ScanStatus.add_member(:status_code, Shapes::ShapeRef.new(shape: ScanStatusCode, required: true, location_name: "statusCode"))
|
1245
1317
|
ScanStatus.struct_class = Types::ScanStatus
|
1246
1318
|
|
1319
|
+
SearchVulnerabilitiesFilterCriteria.add_member(:vulnerability_ids, Shapes::ShapeRef.new(shape: VulnIdList, required: true, location_name: "vulnerabilityIds"))
|
1320
|
+
SearchVulnerabilitiesFilterCriteria.struct_class = Types::SearchVulnerabilitiesFilterCriteria
|
1321
|
+
|
1322
|
+
SearchVulnerabilitiesRequest.add_member(:filter_criteria, Shapes::ShapeRef.new(shape: SearchVulnerabilitiesFilterCriteria, required: true, location_name: "filterCriteria"))
|
1323
|
+
SearchVulnerabilitiesRequest.add_member(:next_token, Shapes::ShapeRef.new(shape: NextToken, location_name: "nextToken"))
|
1324
|
+
SearchVulnerabilitiesRequest.struct_class = Types::SearchVulnerabilitiesRequest
|
1325
|
+
|
1326
|
+
SearchVulnerabilitiesResponse.add_member(:next_token, Shapes::ShapeRef.new(shape: NextToken, location_name: "nextToken"))
|
1327
|
+
SearchVulnerabilitiesResponse.add_member(:vulnerabilities, Shapes::ShapeRef.new(shape: Vulnerabilities, required: true, location_name: "vulnerabilities"))
|
1328
|
+
SearchVulnerabilitiesResponse.struct_class = Types::SearchVulnerabilitiesResponse
|
1329
|
+
|
1247
1330
|
SecurityGroupIdList.member = Shapes::ShapeRef.new(shape: SecurityGroupId)
|
1248
1331
|
|
1249
1332
|
ServiceQuotaExceededException.add_member(:message, Shapes::ShapeRef.new(shape: String, required: true, location_name: "message"))
|
@@ -1294,6 +1377,8 @@ module Aws::Inspector2
|
|
1294
1377
|
|
1295
1378
|
TagResourceResponse.struct_class = Types::TagResourceResponse
|
1296
1379
|
|
1380
|
+
Targets.member = Shapes::ShapeRef.new(shape: Target)
|
1381
|
+
|
1297
1382
|
ThrottlingException.add_member(:message, Shapes::ShapeRef.new(shape: String, required: true, location_name: "message"))
|
1298
1383
|
ThrottlingException.add_member(:retry_after_seconds, Shapes::ShapeRef.new(shape: Integer, location: "header", location_name: "Retry-After"))
|
1299
1384
|
ThrottlingException.struct_class = Types::ThrottlingException
|
@@ -1311,6 +1396,8 @@ module Aws::Inspector2
|
|
1311
1396
|
TitleAggregationResponse.add_member(:vulnerability_id, Shapes::ShapeRef.new(shape: String, location_name: "vulnerabilityId"))
|
1312
1397
|
TitleAggregationResponse.struct_class = Types::TitleAggregationResponse
|
1313
1398
|
|
1399
|
+
Ttps.member = Shapes::ShapeRef.new(shape: Ttp)
|
1400
|
+
|
1314
1401
|
UntagResourceRequest.add_member(:resource_arn, Shapes::ShapeRef.new(shape: Arn, required: true, location: "uri", location_name: "resourceArn"))
|
1315
1402
|
UntagResourceRequest.add_member(:tag_keys, Shapes::ShapeRef.new(shape: TagKeyList, required: true, location: "querystring", location_name: "tagKeys"))
|
1316
1403
|
UntagResourceRequest.struct_class = Types::UntagResourceRequest
|
@@ -1381,8 +1468,33 @@ module Aws::Inspector2
|
|
1381
1468
|
|
1382
1469
|
ValidationExceptionFields.member = Shapes::ShapeRef.new(shape: ValidationExceptionField)
|
1383
1470
|
|
1471
|
+
VulnIdList.member = Shapes::ShapeRef.new(shape: VulnId)
|
1472
|
+
|
1473
|
+
Vulnerabilities.member = Shapes::ShapeRef.new(shape: Vulnerability)
|
1474
|
+
|
1475
|
+
Vulnerability.add_member(:atig_data, Shapes::ShapeRef.new(shape: AtigData, location_name: "atigData"))
|
1476
|
+
Vulnerability.add_member(:cisa_data, Shapes::ShapeRef.new(shape: CisaData, location_name: "cisaData"))
|
1477
|
+
Vulnerability.add_member(:cvss2, Shapes::ShapeRef.new(shape: Cvss2, location_name: "cvss2"))
|
1478
|
+
Vulnerability.add_member(:cvss3, Shapes::ShapeRef.new(shape: Cvss3, location_name: "cvss3"))
|
1479
|
+
Vulnerability.add_member(:cwes, Shapes::ShapeRef.new(shape: Cwes, location_name: "cwes"))
|
1480
|
+
Vulnerability.add_member(:description, Shapes::ShapeRef.new(shape: VulnerabilityDescription, location_name: "description"))
|
1481
|
+
Vulnerability.add_member(:detection_platforms, Shapes::ShapeRef.new(shape: DetectionPlatforms, location_name: "detectionPlatforms"))
|
1482
|
+
Vulnerability.add_member(:epss, Shapes::ShapeRef.new(shape: Epss, location_name: "epss"))
|
1483
|
+
Vulnerability.add_member(:exploit_observed, Shapes::ShapeRef.new(shape: ExploitObserved, location_name: "exploitObserved"))
|
1484
|
+
Vulnerability.add_member(:id, Shapes::ShapeRef.new(shape: NonEmptyString, required: true, location_name: "id"))
|
1485
|
+
Vulnerability.add_member(:reference_urls, Shapes::ShapeRef.new(shape: VulnerabilityReferenceUrls, location_name: "referenceUrls"))
|
1486
|
+
Vulnerability.add_member(:related_vulnerabilities, Shapes::ShapeRef.new(shape: RelatedVulnerabilities, location_name: "relatedVulnerabilities"))
|
1487
|
+
Vulnerability.add_member(:source, Shapes::ShapeRef.new(shape: VulnerabilitySource, location_name: "source"))
|
1488
|
+
Vulnerability.add_member(:source_url, Shapes::ShapeRef.new(shape: VulnerabilitySourceUrl, location_name: "sourceUrl"))
|
1489
|
+
Vulnerability.add_member(:vendor_created_at, Shapes::ShapeRef.new(shape: VendorCreatedAt, location_name: "vendorCreatedAt"))
|
1490
|
+
Vulnerability.add_member(:vendor_severity, Shapes::ShapeRef.new(shape: VendorSeverity, location_name: "vendorSeverity"))
|
1491
|
+
Vulnerability.add_member(:vendor_updated_at, Shapes::ShapeRef.new(shape: VendorUpdatedAt, location_name: "vendorUpdatedAt"))
|
1492
|
+
Vulnerability.struct_class = Types::Vulnerability
|
1493
|
+
|
1384
1494
|
VulnerabilityIdList.member = Shapes::ShapeRef.new(shape: VulnerabilityId)
|
1385
1495
|
|
1496
|
+
VulnerabilityReferenceUrls.member = Shapes::ShapeRef.new(shape: VulnerabilityReferenceUrl)
|
1497
|
+
|
1386
1498
|
VulnerablePackage.add_member(:arch, Shapes::ShapeRef.new(shape: PackageArchitecture, location_name: "arch"))
|
1387
1499
|
VulnerablePackage.add_member(:epoch, Shapes::ShapeRef.new(shape: PackageEpoch, location_name: "epoch"))
|
1388
1500
|
VulnerablePackage.add_member(:file_path, Shapes::ShapeRef.new(shape: FilePath, location_name: "filePath"))
|
@@ -1840,6 +1952,23 @@ module Aws::Inspector2
|
|
1840
1952
|
)
|
1841
1953
|
end)
|
1842
1954
|
|
1955
|
+
api.add_operation(:search_vulnerabilities, Seahorse::Model::Operation.new.tap do |o|
|
1956
|
+
o.name = "SearchVulnerabilities"
|
1957
|
+
o.http_method = "POST"
|
1958
|
+
o.http_request_uri = "/vulnerabilities/search"
|
1959
|
+
o.input = Shapes::ShapeRef.new(shape: SearchVulnerabilitiesRequest)
|
1960
|
+
o.output = Shapes::ShapeRef.new(shape: SearchVulnerabilitiesResponse)
|
1961
|
+
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1962
|
+
o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
|
1963
|
+
o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
|
1964
|
+
o.errors << Shapes::ShapeRef.new(shape: InternalServerException)
|
1965
|
+
o[:pager] = Aws::Pager.new(
|
1966
|
+
tokens: {
|
1967
|
+
"next_token" => "next_token"
|
1968
|
+
}
|
1969
|
+
)
|
1970
|
+
end)
|
1971
|
+
|
1843
1972
|
api.add_operation(:tag_resource, Seahorse::Model::Operation.new.tap do |o|
|
1844
1973
|
o.name = "TagResource"
|
1845
1974
|
o.http_method = "POST"
|
@@ -431,6 +431,20 @@ module Aws::Inspector2
|
|
431
431
|
end
|
432
432
|
end
|
433
433
|
|
434
|
+
class SearchVulnerabilities
|
435
|
+
def self.build(context)
|
436
|
+
unless context.config.regional_endpoint
|
437
|
+
endpoint = context.config.endpoint.to_s
|
438
|
+
end
|
439
|
+
Aws::Inspector2::EndpointParameters.new(
|
440
|
+
region: context.config.region,
|
441
|
+
use_dual_stack: context.config.use_dualstack_endpoint,
|
442
|
+
use_fips: context.config.use_fips_endpoint,
|
443
|
+
endpoint: endpoint,
|
444
|
+
)
|
445
|
+
end
|
446
|
+
end
|
447
|
+
|
434
448
|
class TagResource
|
435
449
|
def self.build(context)
|
436
450
|
unless context.config.regional_endpoint
|
@@ -116,6 +116,8 @@ module Aws::Inspector2
|
|
116
116
|
Aws::Inspector2::Endpoints::ListTagsForResource.build(context)
|
117
117
|
when :list_usage_totals
|
118
118
|
Aws::Inspector2::Endpoints::ListUsageTotals.build(context)
|
119
|
+
when :search_vulnerabilities
|
120
|
+
Aws::Inspector2::Endpoints::SearchVulnerabilities.build(context)
|
119
121
|
when :tag_resource
|
120
122
|
Aws::Inspector2::Endpoints::TagResource.build(context)
|
121
123
|
when :untag_resource
|
@@ -384,6 +384,41 @@ module Aws::Inspector2
|
|
384
384
|
include Aws::Structure
|
385
385
|
end
|
386
386
|
|
387
|
+
# The Amazon Web Services Threat Intel Group (ATIG) details for a
|
388
|
+
# specific vulnerability.
|
389
|
+
#
|
390
|
+
# @!attribute [rw] first_seen
|
391
|
+
# The date and time this vulnerability was first observed.
|
392
|
+
# @return [Time]
|
393
|
+
#
|
394
|
+
# @!attribute [rw] last_seen
|
395
|
+
# The date and time this vulnerability was last observed.
|
396
|
+
# @return [Time]
|
397
|
+
#
|
398
|
+
# @!attribute [rw] targets
|
399
|
+
# The commercial sectors this vulnerability targets.
|
400
|
+
# @return [Array<String>]
|
401
|
+
#
|
402
|
+
# @!attribute [rw] ttps
|
403
|
+
# The [MITRE ATT&CK][1] tactics, techniques, and procedures (TTPs)
|
404
|
+
# associated with vulnerability.
|
405
|
+
#
|
406
|
+
#
|
407
|
+
#
|
408
|
+
# [1]: https://attack.mitre.org/
|
409
|
+
# @return [Array<String>]
|
410
|
+
#
|
411
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/AtigData AWS API Documentation
|
412
|
+
#
|
413
|
+
class AtigData < Struct.new(
|
414
|
+
:first_seen,
|
415
|
+
:last_seen,
|
416
|
+
:targets,
|
417
|
+
:ttps)
|
418
|
+
SENSITIVE = []
|
419
|
+
include Aws::Structure
|
420
|
+
end
|
421
|
+
|
387
422
|
# Represents which scan types are automatically enabled for new members
|
388
423
|
# of your Amazon Inspector organization.
|
389
424
|
#
|
@@ -850,6 +885,32 @@ module Aws::Inspector2
|
|
850
885
|
include Aws::Structure
|
851
886
|
end
|
852
887
|
|
888
|
+
# The Cybersecurity and Infrastructure Security Agency (CISA) details
|
889
|
+
# for a specific vulnerability.
|
890
|
+
#
|
891
|
+
# @!attribute [rw] action
|
892
|
+
# The remediation action recommended by CISA for this vulnerability.
|
893
|
+
# @return [String]
|
894
|
+
#
|
895
|
+
# @!attribute [rw] date_added
|
896
|
+
# The date and time CISA added this vulnerability to their catalogue.
|
897
|
+
# @return [Time]
|
898
|
+
#
|
899
|
+
# @!attribute [rw] date_due
|
900
|
+
# The date and time CISA expects a fix to have been provided
|
901
|
+
# vulnerability.
|
902
|
+
# @return [Time]
|
903
|
+
#
|
904
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/CisaData AWS API Documentation
|
905
|
+
#
|
906
|
+
class CisaData < Struct.new(
|
907
|
+
:action,
|
908
|
+
:date_added,
|
909
|
+
:date_due)
|
910
|
+
SENSITIVE = []
|
911
|
+
include Aws::Structure
|
912
|
+
end
|
913
|
+
|
853
914
|
# A conflict occurred.
|
854
915
|
#
|
855
916
|
# @!attribute [rw] message
|
@@ -1140,6 +1201,46 @@ module Aws::Inspector2
|
|
1140
1201
|
include Aws::Structure
|
1141
1202
|
end
|
1142
1203
|
|
1204
|
+
# The Common Vulnerability Scoring System (CVSS) version 2 details for
|
1205
|
+
# the vulnerability.
|
1206
|
+
#
|
1207
|
+
# @!attribute [rw] base_score
|
1208
|
+
# The CVSS v2 base score for the vulnerability.
|
1209
|
+
# @return [Float]
|
1210
|
+
#
|
1211
|
+
# @!attribute [rw] scoring_vector
|
1212
|
+
# The scoring vector associated with the CVSS v2 score.
|
1213
|
+
# @return [String]
|
1214
|
+
#
|
1215
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/Cvss2 AWS API Documentation
|
1216
|
+
#
|
1217
|
+
class Cvss2 < Struct.new(
|
1218
|
+
:base_score,
|
1219
|
+
:scoring_vector)
|
1220
|
+
SENSITIVE = []
|
1221
|
+
include Aws::Structure
|
1222
|
+
end
|
1223
|
+
|
1224
|
+
# The Common Vulnerability Scoring System (CVSS) version 3 details for
|
1225
|
+
# the vulnerability.
|
1226
|
+
#
|
1227
|
+
# @!attribute [rw] base_score
|
1228
|
+
# The CVSS v3 base score for the vulnerability.
|
1229
|
+
# @return [Float]
|
1230
|
+
#
|
1231
|
+
# @!attribute [rw] scoring_vector
|
1232
|
+
# The scoring vector associated with the CVSS v3 score.
|
1233
|
+
# @return [String]
|
1234
|
+
#
|
1235
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/Cvss3 AWS API Documentation
|
1236
|
+
#
|
1237
|
+
class Cvss3 < Struct.new(
|
1238
|
+
:base_score,
|
1239
|
+
:scoring_vector)
|
1240
|
+
SENSITIVE = []
|
1241
|
+
include Aws::Structure
|
1242
|
+
end
|
1243
|
+
|
1143
1244
|
# The CVSS score for a finding.
|
1144
1245
|
#
|
1145
1246
|
# @!attribute [rw] base_score
|
@@ -1743,6 +1844,39 @@ module Aws::Inspector2
|
|
1743
1844
|
include Aws::Structure
|
1744
1845
|
end
|
1745
1846
|
|
1847
|
+
# Details about the Exploit Prediction Scoring System (EPSS) score.
|
1848
|
+
#
|
1849
|
+
# @!attribute [rw] score
|
1850
|
+
# The Exploit Prediction Scoring System (EPSS) score.
|
1851
|
+
# @return [Float]
|
1852
|
+
#
|
1853
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/Epss AWS API Documentation
|
1854
|
+
#
|
1855
|
+
class Epss < Struct.new(
|
1856
|
+
:score)
|
1857
|
+
SENSITIVE = []
|
1858
|
+
include Aws::Structure
|
1859
|
+
end
|
1860
|
+
|
1861
|
+
# Contains information on when this exploit was observed.
|
1862
|
+
#
|
1863
|
+
# @!attribute [rw] first_seen
|
1864
|
+
# The date an time when the exploit was first seen.
|
1865
|
+
# @return [Time]
|
1866
|
+
#
|
1867
|
+
# @!attribute [rw] last_seen
|
1868
|
+
# The date an time when the exploit was last seen.
|
1869
|
+
# @return [Time]
|
1870
|
+
#
|
1871
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/ExploitObserved AWS API Documentation
|
1872
|
+
#
|
1873
|
+
class ExploitObserved < Struct.new(
|
1874
|
+
:first_seen,
|
1875
|
+
:last_seen)
|
1876
|
+
SENSITIVE = []
|
1877
|
+
include Aws::Structure
|
1878
|
+
end
|
1879
|
+
|
1746
1880
|
# The details of an exploit available for a finding discovered in your
|
1747
1881
|
# environment.
|
1748
1882
|
#
|
@@ -3960,6 +4094,60 @@ module Aws::Inspector2
|
|
3960
4094
|
include Aws::Structure
|
3961
4095
|
end
|
3962
4096
|
|
4097
|
+
# Details on the criteria used to define the filter for a vulnerability
|
4098
|
+
# search.
|
4099
|
+
#
|
4100
|
+
# @!attribute [rw] vulnerability_ids
|
4101
|
+
# The IDs for specific vulnerabilities.
|
4102
|
+
# @return [Array<String>]
|
4103
|
+
#
|
4104
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/SearchVulnerabilitiesFilterCriteria AWS API Documentation
|
4105
|
+
#
|
4106
|
+
class SearchVulnerabilitiesFilterCriteria < Struct.new(
|
4107
|
+
:vulnerability_ids)
|
4108
|
+
SENSITIVE = []
|
4109
|
+
include Aws::Structure
|
4110
|
+
end
|
4111
|
+
|
4112
|
+
# @!attribute [rw] filter_criteria
|
4113
|
+
# The criteria used to filter the results of a vulnerability search.
|
4114
|
+
# @return [Types::SearchVulnerabilitiesFilterCriteria]
|
4115
|
+
#
|
4116
|
+
# @!attribute [rw] next_token
|
4117
|
+
# A token to use for paginating results that are returned in the
|
4118
|
+
# response. Set the value of this parameter to null for the first
|
4119
|
+
# request to a list action. For subsequent calls, use the `NextToken`
|
4120
|
+
# value returned from the previous request to continue listing results
|
4121
|
+
# after the first page.
|
4122
|
+
# @return [String]
|
4123
|
+
#
|
4124
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/SearchVulnerabilitiesRequest AWS API Documentation
|
4125
|
+
#
|
4126
|
+
class SearchVulnerabilitiesRequest < Struct.new(
|
4127
|
+
:filter_criteria,
|
4128
|
+
:next_token)
|
4129
|
+
SENSITIVE = []
|
4130
|
+
include Aws::Structure
|
4131
|
+
end
|
4132
|
+
|
4133
|
+
# @!attribute [rw] next_token
|
4134
|
+
# The pagination parameter to be used on the next list operation to
|
4135
|
+
# retrieve more items.
|
4136
|
+
# @return [String]
|
4137
|
+
#
|
4138
|
+
# @!attribute [rw] vulnerabilities
|
4139
|
+
# Details about the listed vulnerability.
|
4140
|
+
# @return [Array<Types::Vulnerability>]
|
4141
|
+
#
|
4142
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/SearchVulnerabilitiesResponse AWS API Documentation
|
4143
|
+
#
|
4144
|
+
class SearchVulnerabilitiesResponse < Struct.new(
|
4145
|
+
:next_token,
|
4146
|
+
:vulnerabilities)
|
4147
|
+
SENSITIVE = []
|
4148
|
+
include Aws::Structure
|
4149
|
+
end
|
4150
|
+
|
3963
4151
|
# You have exceeded your service quota. To perform the requested action,
|
3964
4152
|
# remove some of the relevant resources, or use Service Quotas to
|
3965
4153
|
# request a service quota increase.
|
@@ -4476,6 +4664,108 @@ module Aws::Inspector2
|
|
4476
4664
|
include Aws::Structure
|
4477
4665
|
end
|
4478
4666
|
|
4667
|
+
# Contains details about a specific vulnerability Amazon Inspector can
|
4668
|
+
# detect.
|
4669
|
+
#
|
4670
|
+
# @!attribute [rw] atig_data
|
4671
|
+
# An object that contains information about the Amazon Web Services
|
4672
|
+
# Threat Intel Group (ATIG) details for the vulnerability.
|
4673
|
+
# @return [Types::AtigData]
|
4674
|
+
#
|
4675
|
+
# @!attribute [rw] cisa_data
|
4676
|
+
# An object that contains the Cybersecurity and Infrastructure
|
4677
|
+
# Security Agency (CISA) details for the vulnerability.
|
4678
|
+
# @return [Types::CisaData]
|
4679
|
+
#
|
4680
|
+
# @!attribute [rw] cvss2
|
4681
|
+
# An object that contains the Common Vulnerability Scoring System
|
4682
|
+
# (CVSS) Version 2 details for the vulnerability.
|
4683
|
+
# @return [Types::Cvss2]
|
4684
|
+
#
|
4685
|
+
# @!attribute [rw] cvss3
|
4686
|
+
# An object that contains the Common Vulnerability Scoring System
|
4687
|
+
# (CVSS) Version 3 details for the vulnerability.
|
4688
|
+
# @return [Types::Cvss3]
|
4689
|
+
#
|
4690
|
+
# @!attribute [rw] cwes
|
4691
|
+
# The Common Weakness Enumeration (CWE) associated with the
|
4692
|
+
# vulnerability.
|
4693
|
+
# @return [Array<String>]
|
4694
|
+
#
|
4695
|
+
# @!attribute [rw] description
|
4696
|
+
# A description of the vulnerability.
|
4697
|
+
# @return [String]
|
4698
|
+
#
|
4699
|
+
# @!attribute [rw] detection_platforms
|
4700
|
+
# Platforms that the vulnerability can be detected on.
|
4701
|
+
# @return [Array<String>]
|
4702
|
+
#
|
4703
|
+
# @!attribute [rw] epss
|
4704
|
+
# An object that contains the Exploit Prediction Scoring System (EPSS)
|
4705
|
+
# score.
|
4706
|
+
# @return [Types::Epss]
|
4707
|
+
#
|
4708
|
+
# @!attribute [rw] exploit_observed
|
4709
|
+
# An object that contains details on when the exploit was observed.
|
4710
|
+
# @return [Types::ExploitObserved]
|
4711
|
+
#
|
4712
|
+
# @!attribute [rw] id
|
4713
|
+
# The ID for the specific vulnerability.
|
4714
|
+
# @return [String]
|
4715
|
+
#
|
4716
|
+
# @!attribute [rw] reference_urls
|
4717
|
+
# Links to various resources with more information on this
|
4718
|
+
# vulnerability.
|
4719
|
+
# @return [Array<String>]
|
4720
|
+
#
|
4721
|
+
# @!attribute [rw] related_vulnerabilities
|
4722
|
+
# A list of related vulnerabilities.
|
4723
|
+
# @return [Array<String>]
|
4724
|
+
#
|
4725
|
+
# @!attribute [rw] source
|
4726
|
+
# The source of the vulnerability information.
|
4727
|
+
# @return [String]
|
4728
|
+
#
|
4729
|
+
# @!attribute [rw] source_url
|
4730
|
+
# A link to the official source material for this vulnerability.
|
4731
|
+
# @return [String]
|
4732
|
+
#
|
4733
|
+
# @!attribute [rw] vendor_created_at
|
4734
|
+
# The date and time when the vendor created this vulnerability.
|
4735
|
+
# @return [Time]
|
4736
|
+
#
|
4737
|
+
# @!attribute [rw] vendor_severity
|
4738
|
+
# The severity assigned by the vendor.
|
4739
|
+
# @return [String]
|
4740
|
+
#
|
4741
|
+
# @!attribute [rw] vendor_updated_at
|
4742
|
+
# The date and time when the vendor last updated this vulnerability.
|
4743
|
+
# @return [Time]
|
4744
|
+
#
|
4745
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/Vulnerability AWS API Documentation
|
4746
|
+
#
|
4747
|
+
class Vulnerability < Struct.new(
|
4748
|
+
:atig_data,
|
4749
|
+
:cisa_data,
|
4750
|
+
:cvss2,
|
4751
|
+
:cvss3,
|
4752
|
+
:cwes,
|
4753
|
+
:description,
|
4754
|
+
:detection_platforms,
|
4755
|
+
:epss,
|
4756
|
+
:exploit_observed,
|
4757
|
+
:id,
|
4758
|
+
:reference_urls,
|
4759
|
+
:related_vulnerabilities,
|
4760
|
+
:source,
|
4761
|
+
:source_url,
|
4762
|
+
:vendor_created_at,
|
4763
|
+
:vendor_severity,
|
4764
|
+
:vendor_updated_at)
|
4765
|
+
SENSITIVE = []
|
4766
|
+
include Aws::Structure
|
4767
|
+
end
|
4768
|
+
|
4479
4769
|
# Information on the vulnerable package identified by a finding.
|
4480
4770
|
#
|
4481
4771
|
# @!attribute [rw] arch
|
data/lib/aws-sdk-inspector2.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-inspector2
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.12.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2023-05-
|
11
|
+
date: 2023-05-05 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|