aws-sdk-inspector2 1.15.0 → 1.16.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-inspector2/client.rb +481 -12
- data/lib/aws-sdk-inspector2/client_api.rb +275 -0
- data/lib/aws-sdk-inspector2/endpoints.rb +98 -0
- data/lib/aws-sdk-inspector2/plugins/endpoints.rb +14 -0
- data/lib/aws-sdk-inspector2/types.rb +609 -4
- data/lib/aws-sdk-inspector2.rb +1 -1
- metadata +2 -2
@@ -443,6 +443,9 @@ module Aws::Inspector2
|
|
443
443
|
# resp.accounts[0].resource_state.lambda.error_code #=> String, one of "ALREADY_ENABLED", "ENABLE_IN_PROGRESS", "DISABLE_IN_PROGRESS", "SUSPEND_IN_PROGRESS", "RESOURCE_NOT_FOUND", "ACCESS_DENIED", "INTERNAL_ERROR", "SSM_UNAVAILABLE", "SSM_THROTTLED", "EVENTBRIDGE_UNAVAILABLE", "EVENTBRIDGE_THROTTLED", "RESOURCE_SCAN_NOT_DISABLED", "DISASSOCIATE_ALL_MEMBERS", "ACCOUNT_IS_ISOLATED"
|
444
444
|
# resp.accounts[0].resource_state.lambda.error_message #=> String
|
445
445
|
# resp.accounts[0].resource_state.lambda.status #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
446
|
+
# resp.accounts[0].resource_state.lambda_code.error_code #=> String, one of "ALREADY_ENABLED", "ENABLE_IN_PROGRESS", "DISABLE_IN_PROGRESS", "SUSPEND_IN_PROGRESS", "RESOURCE_NOT_FOUND", "ACCESS_DENIED", "INTERNAL_ERROR", "SSM_UNAVAILABLE", "SSM_THROTTLED", "EVENTBRIDGE_UNAVAILABLE", "EVENTBRIDGE_THROTTLED", "RESOURCE_SCAN_NOT_DISABLED", "DISASSOCIATE_ALL_MEMBERS", "ACCOUNT_IS_ISOLATED"
|
447
|
+
# resp.accounts[0].resource_state.lambda_code.error_message #=> String
|
448
|
+
# resp.accounts[0].resource_state.lambda_code.status #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
446
449
|
# resp.accounts[0].state.error_code #=> String, one of "ALREADY_ENABLED", "ENABLE_IN_PROGRESS", "DISABLE_IN_PROGRESS", "SUSPEND_IN_PROGRESS", "RESOURCE_NOT_FOUND", "ACCESS_DENIED", "INTERNAL_ERROR", "SSM_UNAVAILABLE", "SSM_THROTTLED", "EVENTBRIDGE_UNAVAILABLE", "EVENTBRIDGE_THROTTLED", "RESOURCE_SCAN_NOT_DISABLED", "DISASSOCIATE_ALL_MEMBERS", "ACCOUNT_IS_ISOLATED"
|
447
450
|
# resp.accounts[0].state.error_message #=> String
|
448
451
|
# resp.accounts[0].state.status #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
@@ -453,6 +456,7 @@ module Aws::Inspector2
|
|
453
456
|
# resp.failed_accounts[0].resource_status.ec2 #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
454
457
|
# resp.failed_accounts[0].resource_status.ecr #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
455
458
|
# resp.failed_accounts[0].resource_status.lambda #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
459
|
+
# resp.failed_accounts[0].resource_status.lambda_code #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
456
460
|
# resp.failed_accounts[0].status #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
457
461
|
#
|
458
462
|
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/BatchGetAccountStatus AWS API Documentation
|
@@ -464,6 +468,50 @@ module Aws::Inspector2
|
|
464
468
|
req.send_request(options)
|
465
469
|
end
|
466
470
|
|
471
|
+
# Retrieves code snippets from findings that Amazon Inspector detected
|
472
|
+
# code vulnerabilities in.
|
473
|
+
#
|
474
|
+
# @option params [required, Array<String>] :finding_arns
|
475
|
+
# An array of finding ARNs for the findings you want to retrieve code
|
476
|
+
# snippets from.
|
477
|
+
#
|
478
|
+
# @return [Types::BatchGetCodeSnippetResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
479
|
+
#
|
480
|
+
# * {Types::BatchGetCodeSnippetResponse#code_snippet_results #code_snippet_results} => Array<Types::CodeSnippetResult>
|
481
|
+
# * {Types::BatchGetCodeSnippetResponse#errors #errors} => Array<Types::CodeSnippetError>
|
482
|
+
#
|
483
|
+
# @example Request syntax with placeholder values
|
484
|
+
#
|
485
|
+
# resp = client.batch_get_code_snippet({
|
486
|
+
# finding_arns: ["FindingArn"], # required
|
487
|
+
# })
|
488
|
+
#
|
489
|
+
# @example Response structure
|
490
|
+
#
|
491
|
+
# resp.code_snippet_results #=> Array
|
492
|
+
# resp.code_snippet_results[0].code_snippet #=> Array
|
493
|
+
# resp.code_snippet_results[0].code_snippet[0].content #=> String
|
494
|
+
# resp.code_snippet_results[0].code_snippet[0].line_number #=> Integer
|
495
|
+
# resp.code_snippet_results[0].end_line #=> Integer
|
496
|
+
# resp.code_snippet_results[0].finding_arn #=> String
|
497
|
+
# resp.code_snippet_results[0].start_line #=> Integer
|
498
|
+
# resp.code_snippet_results[0].suggested_fixes #=> Array
|
499
|
+
# resp.code_snippet_results[0].suggested_fixes[0].code #=> String
|
500
|
+
# resp.code_snippet_results[0].suggested_fixes[0].description #=> String
|
501
|
+
# resp.errors #=> Array
|
502
|
+
# resp.errors[0].error_code #=> String, one of "INTERNAL_ERROR", "ACCESS_DENIED", "CODE_SNIPPET_NOT_FOUND", "INVALID_INPUT"
|
503
|
+
# resp.errors[0].error_message #=> String
|
504
|
+
# resp.errors[0].finding_arn #=> String
|
505
|
+
#
|
506
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/BatchGetCodeSnippet AWS API Documentation
|
507
|
+
#
|
508
|
+
# @overload batch_get_code_snippet(params = {})
|
509
|
+
# @param [Hash] params ({})
|
510
|
+
def batch_get_code_snippet(params = {}, options = {})
|
511
|
+
req = build_request(:batch_get_code_snippet, params)
|
512
|
+
req.send_request(options)
|
513
|
+
end
|
514
|
+
|
467
515
|
# Gets free trial status for multiple Amazon Web Services accounts.
|
468
516
|
#
|
469
517
|
# @option params [required, Array<String>] :account_ids
|
@@ -488,7 +536,7 @@ module Aws::Inspector2
|
|
488
536
|
# resp.accounts[0].free_trial_info[0].end #=> Time
|
489
537
|
# resp.accounts[0].free_trial_info[0].start #=> Time
|
490
538
|
# resp.accounts[0].free_trial_info[0].status #=> String, one of "ACTIVE", "INACTIVE"
|
491
|
-
# resp.accounts[0].free_trial_info[0].type #=> String, one of "EC2", "ECR", "LAMBDA"
|
539
|
+
# resp.accounts[0].free_trial_info[0].type #=> String, one of "EC2", "ECR", "LAMBDA", "LAMBDA_CODE"
|
492
540
|
# resp.failed_accounts #=> Array
|
493
541
|
# resp.failed_accounts[0].account_id #=> String
|
494
542
|
# resp.failed_accounts[0].code #=> String, one of "ACCESS_DENIED", "INTERNAL_ERROR"
|
@@ -617,6 +665,34 @@ module Aws::Inspector2
|
|
617
665
|
req.send_request(options)
|
618
666
|
end
|
619
667
|
|
668
|
+
# Cancels a software bill of materials (SBOM) report.
|
669
|
+
#
|
670
|
+
# @option params [required, String] :report_id
|
671
|
+
# The report ID of the SBOM export to cancel.
|
672
|
+
#
|
673
|
+
# @return [Types::CancelSbomExportResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
674
|
+
#
|
675
|
+
# * {Types::CancelSbomExportResponse#report_id #report_id} => String
|
676
|
+
#
|
677
|
+
# @example Request syntax with placeholder values
|
678
|
+
#
|
679
|
+
# resp = client.cancel_sbom_export({
|
680
|
+
# report_id: "ReportId", # required
|
681
|
+
# })
|
682
|
+
#
|
683
|
+
# @example Response structure
|
684
|
+
#
|
685
|
+
# resp.report_id #=> String
|
686
|
+
#
|
687
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/CancelSbomExport AWS API Documentation
|
688
|
+
#
|
689
|
+
# @overload cancel_sbom_export(params = {})
|
690
|
+
# @param [Hash] params ({})
|
691
|
+
def cancel_sbom_export(params = {}, options = {})
|
692
|
+
req = build_request(:cancel_sbom_export, params)
|
693
|
+
req.send_request(options)
|
694
|
+
end
|
695
|
+
|
620
696
|
# Creates a filter resource using specified filter criteria.
|
621
697
|
#
|
622
698
|
# @option params [required, String] :action
|
@@ -656,6 +732,24 @@ module Aws::Inspector2
|
|
656
732
|
# value: "StringInput", # required
|
657
733
|
# },
|
658
734
|
# ],
|
735
|
+
# code_vulnerability_detector_name: [
|
736
|
+
# {
|
737
|
+
# comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
|
738
|
+
# value: "StringInput", # required
|
739
|
+
# },
|
740
|
+
# ],
|
741
|
+
# code_vulnerability_detector_tags: [
|
742
|
+
# {
|
743
|
+
# comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
|
744
|
+
# value: "StringInput", # required
|
745
|
+
# },
|
746
|
+
# ],
|
747
|
+
# code_vulnerability_file_path: [
|
748
|
+
# {
|
749
|
+
# comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
|
750
|
+
# value: "StringInput", # required
|
751
|
+
# },
|
752
|
+
# ],
|
659
753
|
# component_id: [
|
660
754
|
# {
|
661
755
|
# comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
|
@@ -722,6 +816,12 @@ module Aws::Inspector2
|
|
722
816
|
# value: "StringInput", # required
|
723
817
|
# },
|
724
818
|
# ],
|
819
|
+
# epss_score: [
|
820
|
+
# {
|
821
|
+
# lower_inclusive: 1.0,
|
822
|
+
# upper_inclusive: 1.0,
|
823
|
+
# },
|
824
|
+
# ],
|
725
825
|
# exploit_available: [
|
726
826
|
# {
|
727
827
|
# comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
|
@@ -953,6 +1053,24 @@ module Aws::Inspector2
|
|
953
1053
|
# value: "StringInput", # required
|
954
1054
|
# },
|
955
1055
|
# ],
|
1056
|
+
# code_vulnerability_detector_name: [
|
1057
|
+
# {
|
1058
|
+
# comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
|
1059
|
+
# value: "StringInput", # required
|
1060
|
+
# },
|
1061
|
+
# ],
|
1062
|
+
# code_vulnerability_detector_tags: [
|
1063
|
+
# {
|
1064
|
+
# comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
|
1065
|
+
# value: "StringInput", # required
|
1066
|
+
# },
|
1067
|
+
# ],
|
1068
|
+
# code_vulnerability_file_path: [
|
1069
|
+
# {
|
1070
|
+
# comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
|
1071
|
+
# value: "StringInput", # required
|
1072
|
+
# },
|
1073
|
+
# ],
|
956
1074
|
# component_id: [
|
957
1075
|
# {
|
958
1076
|
# comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
|
@@ -1019,6 +1137,12 @@ module Aws::Inspector2
|
|
1019
1137
|
# value: "StringInput", # required
|
1020
1138
|
# },
|
1021
1139
|
# ],
|
1140
|
+
# epss_score: [
|
1141
|
+
# {
|
1142
|
+
# lower_inclusive: 1.0,
|
1143
|
+
# upper_inclusive: 1.0,
|
1144
|
+
# },
|
1145
|
+
# ],
|
1022
1146
|
# exploit_available: [
|
1023
1147
|
# {
|
1024
1148
|
# comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
|
@@ -1224,6 +1348,99 @@ module Aws::Inspector2
|
|
1224
1348
|
req.send_request(options)
|
1225
1349
|
end
|
1226
1350
|
|
1351
|
+
# Creates a software bill of materials (SBOM) report.
|
1352
|
+
#
|
1353
|
+
# @option params [required, String] :report_format
|
1354
|
+
# The output format for the software bill of materials (SBOM) report.
|
1355
|
+
#
|
1356
|
+
# @option params [Types::ResourceFilterCriteria] :resource_filter_criteria
|
1357
|
+
# The resource filter criteria for the software bill of materials (SBOM)
|
1358
|
+
# report.
|
1359
|
+
#
|
1360
|
+
# @option params [required, Types::Destination] :s3_destination
|
1361
|
+
# Contains details of the Amazon S3 bucket and KMS key used to export
|
1362
|
+
# findings.
|
1363
|
+
#
|
1364
|
+
# @return [Types::CreateSbomExportResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
1365
|
+
#
|
1366
|
+
# * {Types::CreateSbomExportResponse#report_id #report_id} => String
|
1367
|
+
#
|
1368
|
+
# @example Request syntax with placeholder values
|
1369
|
+
#
|
1370
|
+
# resp = client.create_sbom_export({
|
1371
|
+
# report_format: "CYCLONEDX_1_4", # required, accepts CYCLONEDX_1_4, SPDX_2_3
|
1372
|
+
# resource_filter_criteria: {
|
1373
|
+
# account_id: [
|
1374
|
+
# {
|
1375
|
+
# comparison: "EQUALS", # required, accepts EQUALS, NOT_EQUALS
|
1376
|
+
# value: "ResourceStringInput", # required
|
1377
|
+
# },
|
1378
|
+
# ],
|
1379
|
+
# ec2_instance_tags: [
|
1380
|
+
# {
|
1381
|
+
# comparison: "EQUALS", # required, accepts EQUALS
|
1382
|
+
# key: "NonEmptyString", # required
|
1383
|
+
# value: "NonEmptyString",
|
1384
|
+
# },
|
1385
|
+
# ],
|
1386
|
+
# ecr_image_tags: [
|
1387
|
+
# {
|
1388
|
+
# comparison: "EQUALS", # required, accepts EQUALS, NOT_EQUALS
|
1389
|
+
# value: "ResourceStringInput", # required
|
1390
|
+
# },
|
1391
|
+
# ],
|
1392
|
+
# ecr_repository_name: [
|
1393
|
+
# {
|
1394
|
+
# comparison: "EQUALS", # required, accepts EQUALS, NOT_EQUALS
|
1395
|
+
# value: "ResourceStringInput", # required
|
1396
|
+
# },
|
1397
|
+
# ],
|
1398
|
+
# lambda_function_name: [
|
1399
|
+
# {
|
1400
|
+
# comparison: "EQUALS", # required, accepts EQUALS, NOT_EQUALS
|
1401
|
+
# value: "ResourceStringInput", # required
|
1402
|
+
# },
|
1403
|
+
# ],
|
1404
|
+
# lambda_function_tags: [
|
1405
|
+
# {
|
1406
|
+
# comparison: "EQUALS", # required, accepts EQUALS
|
1407
|
+
# key: "NonEmptyString", # required
|
1408
|
+
# value: "NonEmptyString",
|
1409
|
+
# },
|
1410
|
+
# ],
|
1411
|
+
# resource_id: [
|
1412
|
+
# {
|
1413
|
+
# comparison: "EQUALS", # required, accepts EQUALS, NOT_EQUALS
|
1414
|
+
# value: "ResourceStringInput", # required
|
1415
|
+
# },
|
1416
|
+
# ],
|
1417
|
+
# resource_type: [
|
1418
|
+
# {
|
1419
|
+
# comparison: "EQUALS", # required, accepts EQUALS, NOT_EQUALS
|
1420
|
+
# value: "ResourceStringInput", # required
|
1421
|
+
# },
|
1422
|
+
# ],
|
1423
|
+
# },
|
1424
|
+
# s3_destination: { # required
|
1425
|
+
# bucket_name: "String", # required
|
1426
|
+
# key_prefix: "String",
|
1427
|
+
# kms_key_arn: "String", # required
|
1428
|
+
# },
|
1429
|
+
# })
|
1430
|
+
#
|
1431
|
+
# @example Response structure
|
1432
|
+
#
|
1433
|
+
# resp.report_id #=> String
|
1434
|
+
#
|
1435
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/CreateSbomExport AWS API Documentation
|
1436
|
+
#
|
1437
|
+
# @overload create_sbom_export(params = {})
|
1438
|
+
# @param [Hash] params ({})
|
1439
|
+
def create_sbom_export(params = {}, options = {})
|
1440
|
+
req = build_request(:create_sbom_export, params)
|
1441
|
+
req.send_request(options)
|
1442
|
+
end
|
1443
|
+
|
1227
1444
|
# Deletes a filter resource.
|
1228
1445
|
#
|
1229
1446
|
# @option params [required, String] :arn
|
@@ -1265,6 +1482,7 @@ module Aws::Inspector2
|
|
1265
1482
|
# resp.auto_enable.ec2 #=> Boolean
|
1266
1483
|
# resp.auto_enable.ecr #=> Boolean
|
1267
1484
|
# resp.auto_enable.lambda #=> Boolean
|
1485
|
+
# resp.auto_enable.lambda_code #=> Boolean
|
1268
1486
|
# resp.max_account_limit_reached #=> Boolean
|
1269
1487
|
#
|
1270
1488
|
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/DescribeOrganizationConfiguration AWS API Documentation
|
@@ -1296,7 +1514,7 @@ module Aws::Inspector2
|
|
1296
1514
|
#
|
1297
1515
|
# resp = client.disable({
|
1298
1516
|
# account_ids: ["AccountId"],
|
1299
|
-
# resource_types: ["EC2"], # accepts EC2, ECR, LAMBDA
|
1517
|
+
# resource_types: ["EC2"], # accepts EC2, ECR, LAMBDA, LAMBDA_CODE
|
1300
1518
|
# })
|
1301
1519
|
#
|
1302
1520
|
# @example Response structure
|
@@ -1306,6 +1524,7 @@ module Aws::Inspector2
|
|
1306
1524
|
# resp.accounts[0].resource_status.ec2 #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
1307
1525
|
# resp.accounts[0].resource_status.ecr #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
1308
1526
|
# resp.accounts[0].resource_status.lambda #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
1527
|
+
# resp.accounts[0].resource_status.lambda_code #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
1309
1528
|
# resp.accounts[0].status #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
1310
1529
|
# resp.failed_accounts #=> Array
|
1311
1530
|
# resp.failed_accounts[0].account_id #=> String
|
@@ -1314,6 +1533,7 @@ module Aws::Inspector2
|
|
1314
1533
|
# resp.failed_accounts[0].resource_status.ec2 #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
1315
1534
|
# resp.failed_accounts[0].resource_status.ecr #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
1316
1535
|
# resp.failed_accounts[0].resource_status.lambda #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
1536
|
+
# resp.failed_accounts[0].resource_status.lambda_code #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
1317
1537
|
# resp.failed_accounts[0].status #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
1318
1538
|
#
|
1319
1539
|
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/Disable AWS API Documentation
|
@@ -1410,7 +1630,7 @@ module Aws::Inspector2
|
|
1410
1630
|
# resp = client.enable({
|
1411
1631
|
# account_ids: ["AccountId"],
|
1412
1632
|
# client_token: "ClientToken",
|
1413
|
-
# resource_types: ["EC2"], # required, accepts EC2, ECR, LAMBDA
|
1633
|
+
# resource_types: ["EC2"], # required, accepts EC2, ECR, LAMBDA, LAMBDA_CODE
|
1414
1634
|
# })
|
1415
1635
|
#
|
1416
1636
|
# @example Response structure
|
@@ -1420,6 +1640,7 @@ module Aws::Inspector2
|
|
1420
1640
|
# resp.accounts[0].resource_status.ec2 #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
1421
1641
|
# resp.accounts[0].resource_status.ecr #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
1422
1642
|
# resp.accounts[0].resource_status.lambda #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
1643
|
+
# resp.accounts[0].resource_status.lambda_code #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
1423
1644
|
# resp.accounts[0].status #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
1424
1645
|
# resp.failed_accounts #=> Array
|
1425
1646
|
# resp.failed_accounts[0].account_id #=> String
|
@@ -1428,6 +1649,7 @@ module Aws::Inspector2
|
|
1428
1649
|
# resp.failed_accounts[0].resource_status.ec2 #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
1429
1650
|
# resp.failed_accounts[0].resource_status.ecr #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
1430
1651
|
# resp.failed_accounts[0].resource_status.lambda #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
1652
|
+
# resp.failed_accounts[0].resource_status.lambda_code #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
1431
1653
|
# resp.failed_accounts[0].status #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
1432
1654
|
#
|
1433
1655
|
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/Enable AWS API Documentation
|
@@ -1546,6 +1768,38 @@ module Aws::Inspector2
|
|
1546
1768
|
req.send_request(options)
|
1547
1769
|
end
|
1548
1770
|
|
1771
|
+
# Gets an encryption key.
|
1772
|
+
#
|
1773
|
+
# @option params [required, String] :resource_type
|
1774
|
+
# The resource type the key encrypts.
|
1775
|
+
#
|
1776
|
+
# @option params [required, String] :scan_type
|
1777
|
+
# The scan type the key encrypts.
|
1778
|
+
#
|
1779
|
+
# @return [Types::GetEncryptionKeyResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
1780
|
+
#
|
1781
|
+
# * {Types::GetEncryptionKeyResponse#kms_key_id #kms_key_id} => String
|
1782
|
+
#
|
1783
|
+
# @example Request syntax with placeholder values
|
1784
|
+
#
|
1785
|
+
# resp = client.get_encryption_key({
|
1786
|
+
# resource_type: "AWS_EC2_INSTANCE", # required, accepts AWS_EC2_INSTANCE, AWS_ECR_CONTAINER_IMAGE, AWS_ECR_REPOSITORY, AWS_LAMBDA_FUNCTION
|
1787
|
+
# scan_type: "NETWORK", # required, accepts NETWORK, PACKAGE, CODE
|
1788
|
+
# })
|
1789
|
+
#
|
1790
|
+
# @example Response structure
|
1791
|
+
#
|
1792
|
+
# resp.kms_key_id #=> String
|
1793
|
+
#
|
1794
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/GetEncryptionKey AWS API Documentation
|
1795
|
+
#
|
1796
|
+
# @overload get_encryption_key(params = {})
|
1797
|
+
# @param [Hash] params ({})
|
1798
|
+
def get_encryption_key(params = {}, options = {})
|
1799
|
+
req = build_request(:get_encryption_key, params)
|
1800
|
+
req.send_request(options)
|
1801
|
+
end
|
1802
|
+
|
1549
1803
|
# Gets the status of a findings report.
|
1550
1804
|
#
|
1551
1805
|
# @option params [String] :report_id
|
@@ -1576,6 +1830,15 @@ module Aws::Inspector2
|
|
1576
1830
|
# resp.filter_criteria.aws_account_id #=> Array
|
1577
1831
|
# resp.filter_criteria.aws_account_id[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
|
1578
1832
|
# resp.filter_criteria.aws_account_id[0].value #=> String
|
1833
|
+
# resp.filter_criteria.code_vulnerability_detector_name #=> Array
|
1834
|
+
# resp.filter_criteria.code_vulnerability_detector_name[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
|
1835
|
+
# resp.filter_criteria.code_vulnerability_detector_name[0].value #=> String
|
1836
|
+
# resp.filter_criteria.code_vulnerability_detector_tags #=> Array
|
1837
|
+
# resp.filter_criteria.code_vulnerability_detector_tags[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
|
1838
|
+
# resp.filter_criteria.code_vulnerability_detector_tags[0].value #=> String
|
1839
|
+
# resp.filter_criteria.code_vulnerability_file_path #=> Array
|
1840
|
+
# resp.filter_criteria.code_vulnerability_file_path[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
|
1841
|
+
# resp.filter_criteria.code_vulnerability_file_path[0].value #=> String
|
1579
1842
|
# resp.filter_criteria.component_id #=> Array
|
1580
1843
|
# resp.filter_criteria.component_id[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
|
1581
1844
|
# resp.filter_criteria.component_id[0].value #=> String
|
@@ -1609,6 +1872,9 @@ module Aws::Inspector2
|
|
1609
1872
|
# resp.filter_criteria.ecr_image_tags #=> Array
|
1610
1873
|
# resp.filter_criteria.ecr_image_tags[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
|
1611
1874
|
# resp.filter_criteria.ecr_image_tags[0].value #=> String
|
1875
|
+
# resp.filter_criteria.epss_score #=> Array
|
1876
|
+
# resp.filter_criteria.epss_score[0].lower_inclusive #=> Float
|
1877
|
+
# resp.filter_criteria.epss_score[0].upper_inclusive #=> Float
|
1612
1878
|
# resp.filter_criteria.exploit_available #=> Array
|
1613
1879
|
# resp.filter_criteria.exploit_available[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
|
1614
1880
|
# resp.filter_criteria.exploit_available[0].value #=> String
|
@@ -1744,6 +2010,73 @@ module Aws::Inspector2
|
|
1744
2010
|
req.send_request(options)
|
1745
2011
|
end
|
1746
2012
|
|
2013
|
+
# Gets details of a software bill of materials (SBOM) report.
|
2014
|
+
#
|
2015
|
+
# @option params [required, String] :report_id
|
2016
|
+
# The report ID of the SBOM export to get details for.
|
2017
|
+
#
|
2018
|
+
# @return [Types::GetSbomExportResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
2019
|
+
#
|
2020
|
+
# * {Types::GetSbomExportResponse#error_code #error_code} => String
|
2021
|
+
# * {Types::GetSbomExportResponse#error_message #error_message} => String
|
2022
|
+
# * {Types::GetSbomExportResponse#filter_criteria #filter_criteria} => Types::ResourceFilterCriteria
|
2023
|
+
# * {Types::GetSbomExportResponse#format #format} => String
|
2024
|
+
# * {Types::GetSbomExportResponse#report_id #report_id} => String
|
2025
|
+
# * {Types::GetSbomExportResponse#s3_destination #s3_destination} => Types::Destination
|
2026
|
+
# * {Types::GetSbomExportResponse#status #status} => String
|
2027
|
+
#
|
2028
|
+
# @example Request syntax with placeholder values
|
2029
|
+
#
|
2030
|
+
# resp = client.get_sbom_export({
|
2031
|
+
# report_id: "ReportId", # required
|
2032
|
+
# })
|
2033
|
+
#
|
2034
|
+
# @example Response structure
|
2035
|
+
#
|
2036
|
+
# resp.error_code #=> String, one of "INTERNAL_ERROR", "INVALID_PERMISSIONS", "NO_FINDINGS_FOUND", "BUCKET_NOT_FOUND", "INCOMPATIBLE_BUCKET_REGION", "MALFORMED_KMS_KEY"
|
2037
|
+
# resp.error_message #=> String
|
2038
|
+
# resp.filter_criteria.account_id #=> Array
|
2039
|
+
# resp.filter_criteria.account_id[0].comparison #=> String, one of "EQUALS", "NOT_EQUALS"
|
2040
|
+
# resp.filter_criteria.account_id[0].value #=> String
|
2041
|
+
# resp.filter_criteria.ec2_instance_tags #=> Array
|
2042
|
+
# resp.filter_criteria.ec2_instance_tags[0].comparison #=> String, one of "EQUALS"
|
2043
|
+
# resp.filter_criteria.ec2_instance_tags[0].key #=> String
|
2044
|
+
# resp.filter_criteria.ec2_instance_tags[0].value #=> String
|
2045
|
+
# resp.filter_criteria.ecr_image_tags #=> Array
|
2046
|
+
# resp.filter_criteria.ecr_image_tags[0].comparison #=> String, one of "EQUALS", "NOT_EQUALS"
|
2047
|
+
# resp.filter_criteria.ecr_image_tags[0].value #=> String
|
2048
|
+
# resp.filter_criteria.ecr_repository_name #=> Array
|
2049
|
+
# resp.filter_criteria.ecr_repository_name[0].comparison #=> String, one of "EQUALS", "NOT_EQUALS"
|
2050
|
+
# resp.filter_criteria.ecr_repository_name[0].value #=> String
|
2051
|
+
# resp.filter_criteria.lambda_function_name #=> Array
|
2052
|
+
# resp.filter_criteria.lambda_function_name[0].comparison #=> String, one of "EQUALS", "NOT_EQUALS"
|
2053
|
+
# resp.filter_criteria.lambda_function_name[0].value #=> String
|
2054
|
+
# resp.filter_criteria.lambda_function_tags #=> Array
|
2055
|
+
# resp.filter_criteria.lambda_function_tags[0].comparison #=> String, one of "EQUALS"
|
2056
|
+
# resp.filter_criteria.lambda_function_tags[0].key #=> String
|
2057
|
+
# resp.filter_criteria.lambda_function_tags[0].value #=> String
|
2058
|
+
# resp.filter_criteria.resource_id #=> Array
|
2059
|
+
# resp.filter_criteria.resource_id[0].comparison #=> String, one of "EQUALS", "NOT_EQUALS"
|
2060
|
+
# resp.filter_criteria.resource_id[0].value #=> String
|
2061
|
+
# resp.filter_criteria.resource_type #=> Array
|
2062
|
+
# resp.filter_criteria.resource_type[0].comparison #=> String, one of "EQUALS", "NOT_EQUALS"
|
2063
|
+
# resp.filter_criteria.resource_type[0].value #=> String
|
2064
|
+
# resp.format #=> String, one of "CYCLONEDX_1_4", "SPDX_2_3"
|
2065
|
+
# resp.report_id #=> String
|
2066
|
+
# resp.s3_destination.bucket_name #=> String
|
2067
|
+
# resp.s3_destination.key_prefix #=> String
|
2068
|
+
# resp.s3_destination.kms_key_arn #=> String
|
2069
|
+
# resp.status #=> String, one of "SUCCEEDED", "IN_PROGRESS", "CANCELLED", "FAILED"
|
2070
|
+
#
|
2071
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/GetSbomExport AWS API Documentation
|
2072
|
+
#
|
2073
|
+
# @overload get_sbom_export(params = {})
|
2074
|
+
# @param [Hash] params ({})
|
2075
|
+
def get_sbom_export(params = {}, options = {})
|
2076
|
+
req = build_request(:get_sbom_export, params)
|
2077
|
+
req.send_request(options)
|
2078
|
+
end
|
2079
|
+
|
1747
2080
|
# Lists the permissions an account has to configure Amazon Inspector.
|
1748
2081
|
#
|
1749
2082
|
# @option params [Integer] :max_results
|
@@ -1921,11 +2254,11 @@ module Aws::Inspector2
|
|
1921
2254
|
# resp.covered_resources[0].resource_metadata.lambda_function.function_tags["MapKey"] #=> String
|
1922
2255
|
# resp.covered_resources[0].resource_metadata.lambda_function.layers #=> Array
|
1923
2256
|
# resp.covered_resources[0].resource_metadata.lambda_function.layers[0] #=> String
|
1924
|
-
# resp.covered_resources[0].resource_metadata.lambda_function.runtime #=> String, one of "NODEJS", "NODEJS_12_X", "NODEJS_14_X", "NODEJS_16_X", "JAVA_8", "JAVA_8_AL2", "JAVA_11", "PYTHON_3_7", "PYTHON_3_8", "PYTHON_3_9", "UNSUPPORTED", "NODEJS_18_X", "GO_1_X"
|
2257
|
+
# resp.covered_resources[0].resource_metadata.lambda_function.runtime #=> String, one of "NODEJS", "NODEJS_12_X", "NODEJS_14_X", "NODEJS_16_X", "JAVA_8", "JAVA_8_AL2", "JAVA_11", "PYTHON_3_7", "PYTHON_3_8", "PYTHON_3_9", "UNSUPPORTED", "NODEJS_18_X", "GO_1_X", "JAVA_17", "PYTHON_3_10"
|
1925
2258
|
# resp.covered_resources[0].resource_type #=> String, one of "AWS_EC2_INSTANCE", "AWS_ECR_CONTAINER_IMAGE", "AWS_ECR_REPOSITORY", "AWS_LAMBDA_FUNCTION"
|
1926
2259
|
# resp.covered_resources[0].scan_status.reason #=> String, one of "PENDING_INITIAL_SCAN", "ACCESS_DENIED", "INTERNAL_ERROR", "UNMANAGED_EC2_INSTANCE", "UNSUPPORTED_OS", "SCAN_ELIGIBILITY_EXPIRED", "RESOURCE_TERMINATED", "SUCCESSFUL", "NO_RESOURCES_FOUND", "IMAGE_SIZE_EXCEEDED", "SCAN_FREQUENCY_MANUAL", "SCAN_FREQUENCY_SCAN_ON_PUSH", "EC2_INSTANCE_STOPPED", "PENDING_DISABLE", "NO_INVENTORY", "STALE_INVENTORY", "EXCLUDED_BY_TAG", "UNSUPPORTED_RUNTIME", "UNSUPPORTED_MEDIA_TYPE", "UNSUPPORTED_CONFIG_FILE", "DEEP_INSPECTION_PACKAGE_COLLECTION_LIMIT_EXCEEDED", "DEEP_INSPECTION_DAILY_SSM_INVENTORY_LIMIT_EXCEEDED", "DEEP_INSPECTION_COLLECTION_TIME_LIMIT_EXCEEDED", "DEEP_INSPECTION_NO_INVENTORY"
|
1927
2260
|
# resp.covered_resources[0].scan_status.status_code #=> String, one of "ACTIVE", "INACTIVE"
|
1928
|
-
# resp.covered_resources[0].scan_type #=> String, one of "NETWORK", "PACKAGE"
|
2261
|
+
# resp.covered_resources[0].scan_type #=> String, one of "NETWORK", "PACKAGE", "CODE"
|
1929
2262
|
# resp.next_token #=> String
|
1930
2263
|
#
|
1931
2264
|
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/ListCoverage AWS API Documentation
|
@@ -2153,6 +2486,15 @@ module Aws::Inspector2
|
|
2153
2486
|
# resp.filters[0].criteria.aws_account_id #=> Array
|
2154
2487
|
# resp.filters[0].criteria.aws_account_id[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
|
2155
2488
|
# resp.filters[0].criteria.aws_account_id[0].value #=> String
|
2489
|
+
# resp.filters[0].criteria.code_vulnerability_detector_name #=> Array
|
2490
|
+
# resp.filters[0].criteria.code_vulnerability_detector_name[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
|
2491
|
+
# resp.filters[0].criteria.code_vulnerability_detector_name[0].value #=> String
|
2492
|
+
# resp.filters[0].criteria.code_vulnerability_detector_tags #=> Array
|
2493
|
+
# resp.filters[0].criteria.code_vulnerability_detector_tags[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
|
2494
|
+
# resp.filters[0].criteria.code_vulnerability_detector_tags[0].value #=> String
|
2495
|
+
# resp.filters[0].criteria.code_vulnerability_file_path #=> Array
|
2496
|
+
# resp.filters[0].criteria.code_vulnerability_file_path[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
|
2497
|
+
# resp.filters[0].criteria.code_vulnerability_file_path[0].value #=> String
|
2156
2498
|
# resp.filters[0].criteria.component_id #=> Array
|
2157
2499
|
# resp.filters[0].criteria.component_id[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
|
2158
2500
|
# resp.filters[0].criteria.component_id[0].value #=> String
|
@@ -2186,6 +2528,9 @@ module Aws::Inspector2
|
|
2186
2528
|
# resp.filters[0].criteria.ecr_image_tags #=> Array
|
2187
2529
|
# resp.filters[0].criteria.ecr_image_tags[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
|
2188
2530
|
# resp.filters[0].criteria.ecr_image_tags[0].value #=> String
|
2531
|
+
# resp.filters[0].criteria.epss_score #=> Array
|
2532
|
+
# resp.filters[0].criteria.epss_score[0].lower_inclusive #=> Float
|
2533
|
+
# resp.filters[0].criteria.epss_score[0].upper_inclusive #=> Float
|
2189
2534
|
# resp.filters[0].criteria.exploit_available #=> Array
|
2190
2535
|
# resp.filters[0].criteria.exploit_available[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
|
2191
2536
|
# resp.filters[0].criteria.exploit_available[0].value #=> String
|
@@ -2338,7 +2683,7 @@ module Aws::Inspector2
|
|
2338
2683
|
# ],
|
2339
2684
|
# aggregation_request: {
|
2340
2685
|
# account_aggregation: {
|
2341
|
-
# finding_type: "NETWORK_REACHABILITY", # accepts NETWORK_REACHABILITY, PACKAGE_VULNERABILITY
|
2686
|
+
# finding_type: "NETWORK_REACHABILITY", # accepts NETWORK_REACHABILITY, PACKAGE_VULNERABILITY, CODE_VULNERABILITY
|
2342
2687
|
# resource_type: "AWS_EC2_INSTANCE", # accepts AWS_EC2_INSTANCE, AWS_ECR_CONTAINER_IMAGE, AWS_LAMBDA_FUNCTION
|
2343
2688
|
# sort_by: "CRITICAL", # accepts CRITICAL, HIGH, ALL
|
2344
2689
|
# sort_order: "ASC", # accepts ASC, DESC
|
@@ -2417,7 +2762,7 @@ module Aws::Inspector2
|
|
2417
2762
|
# sort_order: "ASC", # accepts ASC, DESC
|
2418
2763
|
# },
|
2419
2764
|
# finding_type_aggregation: {
|
2420
|
-
# finding_type: "NETWORK_REACHABILITY", # accepts NETWORK_REACHABILITY, PACKAGE_VULNERABILITY
|
2765
|
+
# finding_type: "NETWORK_REACHABILITY", # accepts NETWORK_REACHABILITY, PACKAGE_VULNERABILITY, CODE_VULNERABILITY
|
2421
2766
|
# resource_type: "AWS_EC2_INSTANCE", # accepts AWS_EC2_INSTANCE, AWS_ECR_CONTAINER_IMAGE, AWS_LAMBDA_FUNCTION
|
2422
2767
|
# sort_by: "CRITICAL", # accepts CRITICAL, HIGH, ALL
|
2423
2768
|
# sort_order: "ASC", # accepts ASC, DESC
|
@@ -2516,6 +2861,7 @@ module Aws::Inspector2
|
|
2516
2861
|
# sort_order: "ASC", # accepts ASC, DESC
|
2517
2862
|
# },
|
2518
2863
|
# title_aggregation: {
|
2864
|
+
# finding_type: "NETWORK_REACHABILITY", # accepts NETWORK_REACHABILITY, PACKAGE_VULNERABILITY, CODE_VULNERABILITY
|
2519
2865
|
# resource_type: "AWS_EC2_INSTANCE", # accepts AWS_EC2_INSTANCE, AWS_ECR_CONTAINER_IMAGE, AWS_LAMBDA_FUNCTION
|
2520
2866
|
# sort_by: "CRITICAL", # accepts CRITICAL, HIGH, ALL
|
2521
2867
|
# sort_order: "ASC", # accepts ASC, DESC
|
@@ -2674,6 +3020,24 @@ module Aws::Inspector2
|
|
2674
3020
|
# value: "StringInput", # required
|
2675
3021
|
# },
|
2676
3022
|
# ],
|
3023
|
+
# code_vulnerability_detector_name: [
|
3024
|
+
# {
|
3025
|
+
# comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
|
3026
|
+
# value: "StringInput", # required
|
3027
|
+
# },
|
3028
|
+
# ],
|
3029
|
+
# code_vulnerability_detector_tags: [
|
3030
|
+
# {
|
3031
|
+
# comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
|
3032
|
+
# value: "StringInput", # required
|
3033
|
+
# },
|
3034
|
+
# ],
|
3035
|
+
# code_vulnerability_file_path: [
|
3036
|
+
# {
|
3037
|
+
# comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
|
3038
|
+
# value: "StringInput", # required
|
3039
|
+
# },
|
3040
|
+
# ],
|
2677
3041
|
# component_id: [
|
2678
3042
|
# {
|
2679
3043
|
# comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
|
@@ -2740,6 +3104,12 @@ module Aws::Inspector2
|
|
2740
3104
|
# value: "StringInput", # required
|
2741
3105
|
# },
|
2742
3106
|
# ],
|
3107
|
+
# epss_score: [
|
3108
|
+
# {
|
3109
|
+
# lower_inclusive: 1.0,
|
3110
|
+
# upper_inclusive: 1.0,
|
3111
|
+
# },
|
3112
|
+
# ],
|
2743
3113
|
# exploit_available: [
|
2744
3114
|
# {
|
2745
3115
|
# comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
|
@@ -2927,7 +3297,7 @@ module Aws::Inspector2
|
|
2927
3297
|
# max_results: 1,
|
2928
3298
|
# next_token: "NextToken",
|
2929
3299
|
# sort_criteria: {
|
2930
|
-
# field: "AWS_ACCOUNT_ID", # required, accepts AWS_ACCOUNT_ID, FINDING_TYPE, SEVERITY, FIRST_OBSERVED_AT, LAST_OBSERVED_AT, FINDING_STATUS, RESOURCE_TYPE, ECR_IMAGE_PUSHED_AT, ECR_IMAGE_REPOSITORY_NAME, ECR_IMAGE_REGISTRY, NETWORK_PROTOCOL, COMPONENT_TYPE, VULNERABILITY_ID, VULNERABILITY_SOURCE, INSPECTOR_SCORE, VENDOR_SEVERITY
|
3300
|
+
# field: "AWS_ACCOUNT_ID", # required, accepts AWS_ACCOUNT_ID, FINDING_TYPE, SEVERITY, FIRST_OBSERVED_AT, LAST_OBSERVED_AT, FINDING_STATUS, RESOURCE_TYPE, ECR_IMAGE_PUSHED_AT, ECR_IMAGE_REPOSITORY_NAME, ECR_IMAGE_REGISTRY, NETWORK_PROTOCOL, COMPONENT_TYPE, VULNERABILITY_ID, VULNERABILITY_SOURCE, INSPECTOR_SCORE, VENDOR_SEVERITY, EPSS_SCORE
|
2931
3301
|
# sort_order: "ASC", # required, accepts ASC, DESC
|
2932
3302
|
# },
|
2933
3303
|
# })
|
@@ -2936,7 +3306,22 @@ module Aws::Inspector2
|
|
2936
3306
|
#
|
2937
3307
|
# resp.findings #=> Array
|
2938
3308
|
# resp.findings[0].aws_account_id #=> String
|
3309
|
+
# resp.findings[0].code_vulnerability_details.cwes #=> Array
|
3310
|
+
# resp.findings[0].code_vulnerability_details.cwes[0] #=> String
|
3311
|
+
# resp.findings[0].code_vulnerability_details.detector_id #=> String
|
3312
|
+
# resp.findings[0].code_vulnerability_details.detector_name #=> String
|
3313
|
+
# resp.findings[0].code_vulnerability_details.detector_tags #=> Array
|
3314
|
+
# resp.findings[0].code_vulnerability_details.detector_tags[0] #=> String
|
3315
|
+
# resp.findings[0].code_vulnerability_details.file_path.end_line #=> Integer
|
3316
|
+
# resp.findings[0].code_vulnerability_details.file_path.file_name #=> String
|
3317
|
+
# resp.findings[0].code_vulnerability_details.file_path.file_path #=> String
|
3318
|
+
# resp.findings[0].code_vulnerability_details.file_path.start_line #=> Integer
|
3319
|
+
# resp.findings[0].code_vulnerability_details.reference_urls #=> Array
|
3320
|
+
# resp.findings[0].code_vulnerability_details.reference_urls[0] #=> String
|
3321
|
+
# resp.findings[0].code_vulnerability_details.rule_id #=> String
|
3322
|
+
# resp.findings[0].code_vulnerability_details.source_lambda_layer_arn #=> String
|
2939
3323
|
# resp.findings[0].description #=> String
|
3324
|
+
# resp.findings[0].epss.score #=> Float
|
2940
3325
|
# resp.findings[0].exploit_available #=> String, one of "YES", "NO"
|
2941
3326
|
# resp.findings[0].exploitability_details.last_known_exploit_at #=> Time
|
2942
3327
|
# resp.findings[0].finding_arn #=> String
|
@@ -3018,7 +3403,7 @@ module Aws::Inspector2
|
|
3018
3403
|
# resp.findings[0].resources[0].details.aws_lambda_function.layers #=> Array
|
3019
3404
|
# resp.findings[0].resources[0].details.aws_lambda_function.layers[0] #=> String
|
3020
3405
|
# resp.findings[0].resources[0].details.aws_lambda_function.package_type #=> String, one of "IMAGE", "ZIP"
|
3021
|
-
# resp.findings[0].resources[0].details.aws_lambda_function.runtime #=> String, one of "NODEJS", "NODEJS_12_X", "NODEJS_14_X", "NODEJS_16_X", "JAVA_8", "JAVA_8_AL2", "JAVA_11", "PYTHON_3_7", "PYTHON_3_8", "PYTHON_3_9", "UNSUPPORTED", "NODEJS_18_X", "GO_1_X"
|
3406
|
+
# resp.findings[0].resources[0].details.aws_lambda_function.runtime #=> String, one of "NODEJS", "NODEJS_12_X", "NODEJS_14_X", "NODEJS_16_X", "JAVA_8", "JAVA_8_AL2", "JAVA_11", "PYTHON_3_7", "PYTHON_3_8", "PYTHON_3_9", "UNSUPPORTED", "NODEJS_18_X", "GO_1_X", "JAVA_17", "PYTHON_3_10"
|
3022
3407
|
# resp.findings[0].resources[0].details.aws_lambda_function.version #=> String
|
3023
3408
|
# resp.findings[0].resources[0].details.aws_lambda_function.vpc_config.security_group_ids #=> Array
|
3024
3409
|
# resp.findings[0].resources[0].details.aws_lambda_function.vpc_config.security_group_ids[0] #=> String
|
@@ -3034,7 +3419,7 @@ module Aws::Inspector2
|
|
3034
3419
|
# resp.findings[0].severity #=> String, one of "INFORMATIONAL", "LOW", "MEDIUM", "HIGH", "CRITICAL", "UNTRIAGED"
|
3035
3420
|
# resp.findings[0].status #=> String, one of "ACTIVE", "SUPPRESSED", "CLOSED"
|
3036
3421
|
# resp.findings[0].title #=> String
|
3037
|
-
# resp.findings[0].type #=> String, one of "NETWORK_REACHABILITY", "PACKAGE_VULNERABILITY"
|
3422
|
+
# resp.findings[0].type #=> String, one of "NETWORK_REACHABILITY", "PACKAGE_VULNERABILITY", "CODE_VULNERABILITY"
|
3038
3423
|
# resp.findings[0].updated_at #=> Time
|
3039
3424
|
# resp.next_token #=> String
|
3040
3425
|
#
|
@@ -3165,7 +3550,7 @@ module Aws::Inspector2
|
|
3165
3550
|
# resp.totals[0].usage[0].currency #=> String, one of "USD"
|
3166
3551
|
# resp.totals[0].usage[0].estimated_monthly_cost #=> Float
|
3167
3552
|
# resp.totals[0].usage[0].total #=> Float
|
3168
|
-
# resp.totals[0].usage[0].type #=> String, one of "EC2_INSTANCE_HOURS", "ECR_INITIAL_SCAN", "ECR_RESCAN", "LAMBDA_FUNCTION_HOURS"
|
3553
|
+
# resp.totals[0].usage[0].type #=> String, one of "EC2_INSTANCE_HOURS", "ECR_INITIAL_SCAN", "ECR_RESCAN", "LAMBDA_FUNCTION_HOURS", "LAMBDA_FUNCTION_CODE_HOURS"
|
3169
3554
|
#
|
3170
3555
|
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/ListUsageTotals AWS API Documentation
|
3171
3556
|
#
|
@@ -3176,6 +3561,33 @@ module Aws::Inspector2
|
|
3176
3561
|
req.send_request(options)
|
3177
3562
|
end
|
3178
3563
|
|
3564
|
+
# Resets an encryption key. After the key is reset your resources will
|
3565
|
+
# be encrypted by an Amazon Web Services owned key.
|
3566
|
+
#
|
3567
|
+
# @option params [required, String] :resource_type
|
3568
|
+
# The resource type the key encrypts.
|
3569
|
+
#
|
3570
|
+
# @option params [required, String] :scan_type
|
3571
|
+
# The scan type the key encrypts.
|
3572
|
+
#
|
3573
|
+
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
3574
|
+
#
|
3575
|
+
# @example Request syntax with placeholder values
|
3576
|
+
#
|
3577
|
+
# resp = client.reset_encryption_key({
|
3578
|
+
# resource_type: "AWS_EC2_INSTANCE", # required, accepts AWS_EC2_INSTANCE, AWS_ECR_CONTAINER_IMAGE, AWS_ECR_REPOSITORY, AWS_LAMBDA_FUNCTION
|
3579
|
+
# scan_type: "NETWORK", # required, accepts NETWORK, PACKAGE, CODE
|
3580
|
+
# })
|
3581
|
+
#
|
3582
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/ResetEncryptionKey AWS API Documentation
|
3583
|
+
#
|
3584
|
+
# @overload reset_encryption_key(params = {})
|
3585
|
+
# @param [Hash] params ({})
|
3586
|
+
def reset_encryption_key(params = {}, options = {})
|
3587
|
+
req = build_request(:reset_encryption_key, params)
|
3588
|
+
req.send_request(options)
|
3589
|
+
end
|
3590
|
+
|
3179
3591
|
# Lists Amazon Inspector coverage details for a specific vulnerability.
|
3180
3592
|
#
|
3181
3593
|
# @option params [required, Types::SearchVulnerabilitiesFilterCriteria] :filter_criteria
|
@@ -3381,6 +3793,37 @@ module Aws::Inspector2
|
|
3381
3793
|
req.send_request(options)
|
3382
3794
|
end
|
3383
3795
|
|
3796
|
+
# Updates an encryption key. A `ResourceNotFoundException` means that an
|
3797
|
+
# AWS owned key is being used for encryption.
|
3798
|
+
#
|
3799
|
+
# @option params [required, String] :kms_key_id
|
3800
|
+
# A KMS key ID for the encryption key.
|
3801
|
+
#
|
3802
|
+
# @option params [required, String] :resource_type
|
3803
|
+
# The resource type for the encryption key.
|
3804
|
+
#
|
3805
|
+
# @option params [required, String] :scan_type
|
3806
|
+
# The scan type for the encryption key.
|
3807
|
+
#
|
3808
|
+
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
3809
|
+
#
|
3810
|
+
# @example Request syntax with placeholder values
|
3811
|
+
#
|
3812
|
+
# resp = client.update_encryption_key({
|
3813
|
+
# kms_key_id: "KmsKeyArn", # required
|
3814
|
+
# resource_type: "AWS_EC2_INSTANCE", # required, accepts AWS_EC2_INSTANCE, AWS_ECR_CONTAINER_IMAGE, AWS_ECR_REPOSITORY, AWS_LAMBDA_FUNCTION
|
3815
|
+
# scan_type: "NETWORK", # required, accepts NETWORK, PACKAGE, CODE
|
3816
|
+
# })
|
3817
|
+
#
|
3818
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/UpdateEncryptionKey AWS API Documentation
|
3819
|
+
#
|
3820
|
+
# @overload update_encryption_key(params = {})
|
3821
|
+
# @param [Hash] params ({})
|
3822
|
+
def update_encryption_key(params = {}, options = {})
|
3823
|
+
req = build_request(:update_encryption_key, params)
|
3824
|
+
req.send_request(options)
|
3825
|
+
end
|
3826
|
+
|
3384
3827
|
# Specifies the action that is to be applied to the findings that match
|
3385
3828
|
# the filter.
|
3386
3829
|
#
|
@@ -3420,6 +3863,24 @@ module Aws::Inspector2
|
|
3420
3863
|
# value: "StringInput", # required
|
3421
3864
|
# },
|
3422
3865
|
# ],
|
3866
|
+
# code_vulnerability_detector_name: [
|
3867
|
+
# {
|
3868
|
+
# comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
|
3869
|
+
# value: "StringInput", # required
|
3870
|
+
# },
|
3871
|
+
# ],
|
3872
|
+
# code_vulnerability_detector_tags: [
|
3873
|
+
# {
|
3874
|
+
# comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
|
3875
|
+
# value: "StringInput", # required
|
3876
|
+
# },
|
3877
|
+
# ],
|
3878
|
+
# code_vulnerability_file_path: [
|
3879
|
+
# {
|
3880
|
+
# comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
|
3881
|
+
# value: "StringInput", # required
|
3882
|
+
# },
|
3883
|
+
# ],
|
3423
3884
|
# component_id: [
|
3424
3885
|
# {
|
3425
3886
|
# comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
|
@@ -3486,6 +3947,12 @@ module Aws::Inspector2
|
|
3486
3947
|
# value: "StringInput", # required
|
3487
3948
|
# },
|
3488
3949
|
# ],
|
3950
|
+
# epss_score: [
|
3951
|
+
# {
|
3952
|
+
# lower_inclusive: 1.0,
|
3953
|
+
# upper_inclusive: 1.0,
|
3954
|
+
# },
|
3955
|
+
# ],
|
3489
3956
|
# exploit_available: [
|
3490
3957
|
# {
|
3491
3958
|
# comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
|
@@ -3729,6 +4196,7 @@ module Aws::Inspector2
|
|
3729
4196
|
# ec2: false, # required
|
3730
4197
|
# ecr: false, # required
|
3731
4198
|
# lambda: false,
|
4199
|
+
# lambda_code: false,
|
3732
4200
|
# },
|
3733
4201
|
# })
|
3734
4202
|
#
|
@@ -3737,6 +4205,7 @@ module Aws::Inspector2
|
|
3737
4205
|
# resp.auto_enable.ec2 #=> Boolean
|
3738
4206
|
# resp.auto_enable.ecr #=> Boolean
|
3739
4207
|
# resp.auto_enable.lambda #=> Boolean
|
4208
|
+
# resp.auto_enable.lambda_code #=> Boolean
|
3740
4209
|
#
|
3741
4210
|
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/UpdateOrganizationConfiguration AWS API Documentation
|
3742
4211
|
#
|
@@ -3760,7 +4229,7 @@ module Aws::Inspector2
|
|
3760
4229
|
params: params,
|
3761
4230
|
config: config)
|
3762
4231
|
context[:gem_name] = 'aws-sdk-inspector2'
|
3763
|
-
context[:gem_version] = '1.
|
4232
|
+
context[:gem_version] = '1.16.0'
|
3764
4233
|
Seahorse::Client::Request.new(handlers, context)
|
3765
4234
|
end
|
3766
4235
|
|