aws-sdk-inspector2 1.15.0 → 1.16.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -443,6 +443,9 @@ module Aws::Inspector2
443
443
  # resp.accounts[0].resource_state.lambda.error_code #=> String, one of "ALREADY_ENABLED", "ENABLE_IN_PROGRESS", "DISABLE_IN_PROGRESS", "SUSPEND_IN_PROGRESS", "RESOURCE_NOT_FOUND", "ACCESS_DENIED", "INTERNAL_ERROR", "SSM_UNAVAILABLE", "SSM_THROTTLED", "EVENTBRIDGE_UNAVAILABLE", "EVENTBRIDGE_THROTTLED", "RESOURCE_SCAN_NOT_DISABLED", "DISASSOCIATE_ALL_MEMBERS", "ACCOUNT_IS_ISOLATED"
444
444
  # resp.accounts[0].resource_state.lambda.error_message #=> String
445
445
  # resp.accounts[0].resource_state.lambda.status #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
446
+ # resp.accounts[0].resource_state.lambda_code.error_code #=> String, one of "ALREADY_ENABLED", "ENABLE_IN_PROGRESS", "DISABLE_IN_PROGRESS", "SUSPEND_IN_PROGRESS", "RESOURCE_NOT_FOUND", "ACCESS_DENIED", "INTERNAL_ERROR", "SSM_UNAVAILABLE", "SSM_THROTTLED", "EVENTBRIDGE_UNAVAILABLE", "EVENTBRIDGE_THROTTLED", "RESOURCE_SCAN_NOT_DISABLED", "DISASSOCIATE_ALL_MEMBERS", "ACCOUNT_IS_ISOLATED"
447
+ # resp.accounts[0].resource_state.lambda_code.error_message #=> String
448
+ # resp.accounts[0].resource_state.lambda_code.status #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
446
449
  # resp.accounts[0].state.error_code #=> String, one of "ALREADY_ENABLED", "ENABLE_IN_PROGRESS", "DISABLE_IN_PROGRESS", "SUSPEND_IN_PROGRESS", "RESOURCE_NOT_FOUND", "ACCESS_DENIED", "INTERNAL_ERROR", "SSM_UNAVAILABLE", "SSM_THROTTLED", "EVENTBRIDGE_UNAVAILABLE", "EVENTBRIDGE_THROTTLED", "RESOURCE_SCAN_NOT_DISABLED", "DISASSOCIATE_ALL_MEMBERS", "ACCOUNT_IS_ISOLATED"
447
450
  # resp.accounts[0].state.error_message #=> String
448
451
  # resp.accounts[0].state.status #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
@@ -453,6 +456,7 @@ module Aws::Inspector2
453
456
  # resp.failed_accounts[0].resource_status.ec2 #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
454
457
  # resp.failed_accounts[0].resource_status.ecr #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
455
458
  # resp.failed_accounts[0].resource_status.lambda #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
459
+ # resp.failed_accounts[0].resource_status.lambda_code #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
456
460
  # resp.failed_accounts[0].status #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
457
461
  #
458
462
  # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/BatchGetAccountStatus AWS API Documentation
@@ -464,6 +468,50 @@ module Aws::Inspector2
464
468
  req.send_request(options)
465
469
  end
466
470
 
471
+ # Retrieves code snippets from findings that Amazon Inspector detected
472
+ # code vulnerabilities in.
473
+ #
474
+ # @option params [required, Array<String>] :finding_arns
475
+ # An array of finding ARNs for the findings you want to retrieve code
476
+ # snippets from.
477
+ #
478
+ # @return [Types::BatchGetCodeSnippetResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
479
+ #
480
+ # * {Types::BatchGetCodeSnippetResponse#code_snippet_results #code_snippet_results} => Array&lt;Types::CodeSnippetResult&gt;
481
+ # * {Types::BatchGetCodeSnippetResponse#errors #errors} => Array&lt;Types::CodeSnippetError&gt;
482
+ #
483
+ # @example Request syntax with placeholder values
484
+ #
485
+ # resp = client.batch_get_code_snippet({
486
+ # finding_arns: ["FindingArn"], # required
487
+ # })
488
+ #
489
+ # @example Response structure
490
+ #
491
+ # resp.code_snippet_results #=> Array
492
+ # resp.code_snippet_results[0].code_snippet #=> Array
493
+ # resp.code_snippet_results[0].code_snippet[0].content #=> String
494
+ # resp.code_snippet_results[0].code_snippet[0].line_number #=> Integer
495
+ # resp.code_snippet_results[0].end_line #=> Integer
496
+ # resp.code_snippet_results[0].finding_arn #=> String
497
+ # resp.code_snippet_results[0].start_line #=> Integer
498
+ # resp.code_snippet_results[0].suggested_fixes #=> Array
499
+ # resp.code_snippet_results[0].suggested_fixes[0].code #=> String
500
+ # resp.code_snippet_results[0].suggested_fixes[0].description #=> String
501
+ # resp.errors #=> Array
502
+ # resp.errors[0].error_code #=> String, one of "INTERNAL_ERROR", "ACCESS_DENIED", "CODE_SNIPPET_NOT_FOUND", "INVALID_INPUT"
503
+ # resp.errors[0].error_message #=> String
504
+ # resp.errors[0].finding_arn #=> String
505
+ #
506
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/BatchGetCodeSnippet AWS API Documentation
507
+ #
508
+ # @overload batch_get_code_snippet(params = {})
509
+ # @param [Hash] params ({})
510
+ def batch_get_code_snippet(params = {}, options = {})
511
+ req = build_request(:batch_get_code_snippet, params)
512
+ req.send_request(options)
513
+ end
514
+
467
515
  # Gets free trial status for multiple Amazon Web Services accounts.
468
516
  #
469
517
  # @option params [required, Array<String>] :account_ids
@@ -488,7 +536,7 @@ module Aws::Inspector2
488
536
  # resp.accounts[0].free_trial_info[0].end #=> Time
489
537
  # resp.accounts[0].free_trial_info[0].start #=> Time
490
538
  # resp.accounts[0].free_trial_info[0].status #=> String, one of "ACTIVE", "INACTIVE"
491
- # resp.accounts[0].free_trial_info[0].type #=> String, one of "EC2", "ECR", "LAMBDA"
539
+ # resp.accounts[0].free_trial_info[0].type #=> String, one of "EC2", "ECR", "LAMBDA", "LAMBDA_CODE"
492
540
  # resp.failed_accounts #=> Array
493
541
  # resp.failed_accounts[0].account_id #=> String
494
542
  # resp.failed_accounts[0].code #=> String, one of "ACCESS_DENIED", "INTERNAL_ERROR"
@@ -617,6 +665,34 @@ module Aws::Inspector2
617
665
  req.send_request(options)
618
666
  end
619
667
 
668
+ # Cancels a software bill of materials (SBOM) report.
669
+ #
670
+ # @option params [required, String] :report_id
671
+ # The report ID of the SBOM export to cancel.
672
+ #
673
+ # @return [Types::CancelSbomExportResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
674
+ #
675
+ # * {Types::CancelSbomExportResponse#report_id #report_id} => String
676
+ #
677
+ # @example Request syntax with placeholder values
678
+ #
679
+ # resp = client.cancel_sbom_export({
680
+ # report_id: "ReportId", # required
681
+ # })
682
+ #
683
+ # @example Response structure
684
+ #
685
+ # resp.report_id #=> String
686
+ #
687
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/CancelSbomExport AWS API Documentation
688
+ #
689
+ # @overload cancel_sbom_export(params = {})
690
+ # @param [Hash] params ({})
691
+ def cancel_sbom_export(params = {}, options = {})
692
+ req = build_request(:cancel_sbom_export, params)
693
+ req.send_request(options)
694
+ end
695
+
620
696
  # Creates a filter resource using specified filter criteria.
621
697
  #
622
698
  # @option params [required, String] :action
@@ -656,6 +732,24 @@ module Aws::Inspector2
656
732
  # value: "StringInput", # required
657
733
  # },
658
734
  # ],
735
+ # code_vulnerability_detector_name: [
736
+ # {
737
+ # comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
738
+ # value: "StringInput", # required
739
+ # },
740
+ # ],
741
+ # code_vulnerability_detector_tags: [
742
+ # {
743
+ # comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
744
+ # value: "StringInput", # required
745
+ # },
746
+ # ],
747
+ # code_vulnerability_file_path: [
748
+ # {
749
+ # comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
750
+ # value: "StringInput", # required
751
+ # },
752
+ # ],
659
753
  # component_id: [
660
754
  # {
661
755
  # comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
@@ -722,6 +816,12 @@ module Aws::Inspector2
722
816
  # value: "StringInput", # required
723
817
  # },
724
818
  # ],
819
+ # epss_score: [
820
+ # {
821
+ # lower_inclusive: 1.0,
822
+ # upper_inclusive: 1.0,
823
+ # },
824
+ # ],
725
825
  # exploit_available: [
726
826
  # {
727
827
  # comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
@@ -953,6 +1053,24 @@ module Aws::Inspector2
953
1053
  # value: "StringInput", # required
954
1054
  # },
955
1055
  # ],
1056
+ # code_vulnerability_detector_name: [
1057
+ # {
1058
+ # comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
1059
+ # value: "StringInput", # required
1060
+ # },
1061
+ # ],
1062
+ # code_vulnerability_detector_tags: [
1063
+ # {
1064
+ # comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
1065
+ # value: "StringInput", # required
1066
+ # },
1067
+ # ],
1068
+ # code_vulnerability_file_path: [
1069
+ # {
1070
+ # comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
1071
+ # value: "StringInput", # required
1072
+ # },
1073
+ # ],
956
1074
  # component_id: [
957
1075
  # {
958
1076
  # comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
@@ -1019,6 +1137,12 @@ module Aws::Inspector2
1019
1137
  # value: "StringInput", # required
1020
1138
  # },
1021
1139
  # ],
1140
+ # epss_score: [
1141
+ # {
1142
+ # lower_inclusive: 1.0,
1143
+ # upper_inclusive: 1.0,
1144
+ # },
1145
+ # ],
1022
1146
  # exploit_available: [
1023
1147
  # {
1024
1148
  # comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
@@ -1224,6 +1348,99 @@ module Aws::Inspector2
1224
1348
  req.send_request(options)
1225
1349
  end
1226
1350
 
1351
+ # Creates a software bill of materials (SBOM) report.
1352
+ #
1353
+ # @option params [required, String] :report_format
1354
+ # The output format for the software bill of materials (SBOM) report.
1355
+ #
1356
+ # @option params [Types::ResourceFilterCriteria] :resource_filter_criteria
1357
+ # The resource filter criteria for the software bill of materials (SBOM)
1358
+ # report.
1359
+ #
1360
+ # @option params [required, Types::Destination] :s3_destination
1361
+ # Contains details of the Amazon S3 bucket and KMS key used to export
1362
+ # findings.
1363
+ #
1364
+ # @return [Types::CreateSbomExportResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1365
+ #
1366
+ # * {Types::CreateSbomExportResponse#report_id #report_id} => String
1367
+ #
1368
+ # @example Request syntax with placeholder values
1369
+ #
1370
+ # resp = client.create_sbom_export({
1371
+ # report_format: "CYCLONEDX_1_4", # required, accepts CYCLONEDX_1_4, SPDX_2_3
1372
+ # resource_filter_criteria: {
1373
+ # account_id: [
1374
+ # {
1375
+ # comparison: "EQUALS", # required, accepts EQUALS, NOT_EQUALS
1376
+ # value: "ResourceStringInput", # required
1377
+ # },
1378
+ # ],
1379
+ # ec2_instance_tags: [
1380
+ # {
1381
+ # comparison: "EQUALS", # required, accepts EQUALS
1382
+ # key: "NonEmptyString", # required
1383
+ # value: "NonEmptyString",
1384
+ # },
1385
+ # ],
1386
+ # ecr_image_tags: [
1387
+ # {
1388
+ # comparison: "EQUALS", # required, accepts EQUALS, NOT_EQUALS
1389
+ # value: "ResourceStringInput", # required
1390
+ # },
1391
+ # ],
1392
+ # ecr_repository_name: [
1393
+ # {
1394
+ # comparison: "EQUALS", # required, accepts EQUALS, NOT_EQUALS
1395
+ # value: "ResourceStringInput", # required
1396
+ # },
1397
+ # ],
1398
+ # lambda_function_name: [
1399
+ # {
1400
+ # comparison: "EQUALS", # required, accepts EQUALS, NOT_EQUALS
1401
+ # value: "ResourceStringInput", # required
1402
+ # },
1403
+ # ],
1404
+ # lambda_function_tags: [
1405
+ # {
1406
+ # comparison: "EQUALS", # required, accepts EQUALS
1407
+ # key: "NonEmptyString", # required
1408
+ # value: "NonEmptyString",
1409
+ # },
1410
+ # ],
1411
+ # resource_id: [
1412
+ # {
1413
+ # comparison: "EQUALS", # required, accepts EQUALS, NOT_EQUALS
1414
+ # value: "ResourceStringInput", # required
1415
+ # },
1416
+ # ],
1417
+ # resource_type: [
1418
+ # {
1419
+ # comparison: "EQUALS", # required, accepts EQUALS, NOT_EQUALS
1420
+ # value: "ResourceStringInput", # required
1421
+ # },
1422
+ # ],
1423
+ # },
1424
+ # s3_destination: { # required
1425
+ # bucket_name: "String", # required
1426
+ # key_prefix: "String",
1427
+ # kms_key_arn: "String", # required
1428
+ # },
1429
+ # })
1430
+ #
1431
+ # @example Response structure
1432
+ #
1433
+ # resp.report_id #=> String
1434
+ #
1435
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/CreateSbomExport AWS API Documentation
1436
+ #
1437
+ # @overload create_sbom_export(params = {})
1438
+ # @param [Hash] params ({})
1439
+ def create_sbom_export(params = {}, options = {})
1440
+ req = build_request(:create_sbom_export, params)
1441
+ req.send_request(options)
1442
+ end
1443
+
1227
1444
  # Deletes a filter resource.
1228
1445
  #
1229
1446
  # @option params [required, String] :arn
@@ -1265,6 +1482,7 @@ module Aws::Inspector2
1265
1482
  # resp.auto_enable.ec2 #=> Boolean
1266
1483
  # resp.auto_enable.ecr #=> Boolean
1267
1484
  # resp.auto_enable.lambda #=> Boolean
1485
+ # resp.auto_enable.lambda_code #=> Boolean
1268
1486
  # resp.max_account_limit_reached #=> Boolean
1269
1487
  #
1270
1488
  # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/DescribeOrganizationConfiguration AWS API Documentation
@@ -1296,7 +1514,7 @@ module Aws::Inspector2
1296
1514
  #
1297
1515
  # resp = client.disable({
1298
1516
  # account_ids: ["AccountId"],
1299
- # resource_types: ["EC2"], # accepts EC2, ECR, LAMBDA
1517
+ # resource_types: ["EC2"], # accepts EC2, ECR, LAMBDA, LAMBDA_CODE
1300
1518
  # })
1301
1519
  #
1302
1520
  # @example Response structure
@@ -1306,6 +1524,7 @@ module Aws::Inspector2
1306
1524
  # resp.accounts[0].resource_status.ec2 #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
1307
1525
  # resp.accounts[0].resource_status.ecr #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
1308
1526
  # resp.accounts[0].resource_status.lambda #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
1527
+ # resp.accounts[0].resource_status.lambda_code #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
1309
1528
  # resp.accounts[0].status #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
1310
1529
  # resp.failed_accounts #=> Array
1311
1530
  # resp.failed_accounts[0].account_id #=> String
@@ -1314,6 +1533,7 @@ module Aws::Inspector2
1314
1533
  # resp.failed_accounts[0].resource_status.ec2 #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
1315
1534
  # resp.failed_accounts[0].resource_status.ecr #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
1316
1535
  # resp.failed_accounts[0].resource_status.lambda #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
1536
+ # resp.failed_accounts[0].resource_status.lambda_code #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
1317
1537
  # resp.failed_accounts[0].status #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
1318
1538
  #
1319
1539
  # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/Disable AWS API Documentation
@@ -1410,7 +1630,7 @@ module Aws::Inspector2
1410
1630
  # resp = client.enable({
1411
1631
  # account_ids: ["AccountId"],
1412
1632
  # client_token: "ClientToken",
1413
- # resource_types: ["EC2"], # required, accepts EC2, ECR, LAMBDA
1633
+ # resource_types: ["EC2"], # required, accepts EC2, ECR, LAMBDA, LAMBDA_CODE
1414
1634
  # })
1415
1635
  #
1416
1636
  # @example Response structure
@@ -1420,6 +1640,7 @@ module Aws::Inspector2
1420
1640
  # resp.accounts[0].resource_status.ec2 #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
1421
1641
  # resp.accounts[0].resource_status.ecr #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
1422
1642
  # resp.accounts[0].resource_status.lambda #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
1643
+ # resp.accounts[0].resource_status.lambda_code #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
1423
1644
  # resp.accounts[0].status #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
1424
1645
  # resp.failed_accounts #=> Array
1425
1646
  # resp.failed_accounts[0].account_id #=> String
@@ -1428,6 +1649,7 @@ module Aws::Inspector2
1428
1649
  # resp.failed_accounts[0].resource_status.ec2 #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
1429
1650
  # resp.failed_accounts[0].resource_status.ecr #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
1430
1651
  # resp.failed_accounts[0].resource_status.lambda #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
1652
+ # resp.failed_accounts[0].resource_status.lambda_code #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
1431
1653
  # resp.failed_accounts[0].status #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
1432
1654
  #
1433
1655
  # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/Enable AWS API Documentation
@@ -1546,6 +1768,38 @@ module Aws::Inspector2
1546
1768
  req.send_request(options)
1547
1769
  end
1548
1770
 
1771
+ # Gets an encryption key.
1772
+ #
1773
+ # @option params [required, String] :resource_type
1774
+ # The resource type the key encrypts.
1775
+ #
1776
+ # @option params [required, String] :scan_type
1777
+ # The scan type the key encrypts.
1778
+ #
1779
+ # @return [Types::GetEncryptionKeyResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1780
+ #
1781
+ # * {Types::GetEncryptionKeyResponse#kms_key_id #kms_key_id} => String
1782
+ #
1783
+ # @example Request syntax with placeholder values
1784
+ #
1785
+ # resp = client.get_encryption_key({
1786
+ # resource_type: "AWS_EC2_INSTANCE", # required, accepts AWS_EC2_INSTANCE, AWS_ECR_CONTAINER_IMAGE, AWS_ECR_REPOSITORY, AWS_LAMBDA_FUNCTION
1787
+ # scan_type: "NETWORK", # required, accepts NETWORK, PACKAGE, CODE
1788
+ # })
1789
+ #
1790
+ # @example Response structure
1791
+ #
1792
+ # resp.kms_key_id #=> String
1793
+ #
1794
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/GetEncryptionKey AWS API Documentation
1795
+ #
1796
+ # @overload get_encryption_key(params = {})
1797
+ # @param [Hash] params ({})
1798
+ def get_encryption_key(params = {}, options = {})
1799
+ req = build_request(:get_encryption_key, params)
1800
+ req.send_request(options)
1801
+ end
1802
+
1549
1803
  # Gets the status of a findings report.
1550
1804
  #
1551
1805
  # @option params [String] :report_id
@@ -1576,6 +1830,15 @@ module Aws::Inspector2
1576
1830
  # resp.filter_criteria.aws_account_id #=> Array
1577
1831
  # resp.filter_criteria.aws_account_id[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
1578
1832
  # resp.filter_criteria.aws_account_id[0].value #=> String
1833
+ # resp.filter_criteria.code_vulnerability_detector_name #=> Array
1834
+ # resp.filter_criteria.code_vulnerability_detector_name[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
1835
+ # resp.filter_criteria.code_vulnerability_detector_name[0].value #=> String
1836
+ # resp.filter_criteria.code_vulnerability_detector_tags #=> Array
1837
+ # resp.filter_criteria.code_vulnerability_detector_tags[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
1838
+ # resp.filter_criteria.code_vulnerability_detector_tags[0].value #=> String
1839
+ # resp.filter_criteria.code_vulnerability_file_path #=> Array
1840
+ # resp.filter_criteria.code_vulnerability_file_path[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
1841
+ # resp.filter_criteria.code_vulnerability_file_path[0].value #=> String
1579
1842
  # resp.filter_criteria.component_id #=> Array
1580
1843
  # resp.filter_criteria.component_id[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
1581
1844
  # resp.filter_criteria.component_id[0].value #=> String
@@ -1609,6 +1872,9 @@ module Aws::Inspector2
1609
1872
  # resp.filter_criteria.ecr_image_tags #=> Array
1610
1873
  # resp.filter_criteria.ecr_image_tags[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
1611
1874
  # resp.filter_criteria.ecr_image_tags[0].value #=> String
1875
+ # resp.filter_criteria.epss_score #=> Array
1876
+ # resp.filter_criteria.epss_score[0].lower_inclusive #=> Float
1877
+ # resp.filter_criteria.epss_score[0].upper_inclusive #=> Float
1612
1878
  # resp.filter_criteria.exploit_available #=> Array
1613
1879
  # resp.filter_criteria.exploit_available[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
1614
1880
  # resp.filter_criteria.exploit_available[0].value #=> String
@@ -1744,6 +2010,73 @@ module Aws::Inspector2
1744
2010
  req.send_request(options)
1745
2011
  end
1746
2012
 
2013
+ # Gets details of a software bill of materials (SBOM) report.
2014
+ #
2015
+ # @option params [required, String] :report_id
2016
+ # The report ID of the SBOM export to get details for.
2017
+ #
2018
+ # @return [Types::GetSbomExportResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
2019
+ #
2020
+ # * {Types::GetSbomExportResponse#error_code #error_code} => String
2021
+ # * {Types::GetSbomExportResponse#error_message #error_message} => String
2022
+ # * {Types::GetSbomExportResponse#filter_criteria #filter_criteria} => Types::ResourceFilterCriteria
2023
+ # * {Types::GetSbomExportResponse#format #format} => String
2024
+ # * {Types::GetSbomExportResponse#report_id #report_id} => String
2025
+ # * {Types::GetSbomExportResponse#s3_destination #s3_destination} => Types::Destination
2026
+ # * {Types::GetSbomExportResponse#status #status} => String
2027
+ #
2028
+ # @example Request syntax with placeholder values
2029
+ #
2030
+ # resp = client.get_sbom_export({
2031
+ # report_id: "ReportId", # required
2032
+ # })
2033
+ #
2034
+ # @example Response structure
2035
+ #
2036
+ # resp.error_code #=> String, one of "INTERNAL_ERROR", "INVALID_PERMISSIONS", "NO_FINDINGS_FOUND", "BUCKET_NOT_FOUND", "INCOMPATIBLE_BUCKET_REGION", "MALFORMED_KMS_KEY"
2037
+ # resp.error_message #=> String
2038
+ # resp.filter_criteria.account_id #=> Array
2039
+ # resp.filter_criteria.account_id[0].comparison #=> String, one of "EQUALS", "NOT_EQUALS"
2040
+ # resp.filter_criteria.account_id[0].value #=> String
2041
+ # resp.filter_criteria.ec2_instance_tags #=> Array
2042
+ # resp.filter_criteria.ec2_instance_tags[0].comparison #=> String, one of "EQUALS"
2043
+ # resp.filter_criteria.ec2_instance_tags[0].key #=> String
2044
+ # resp.filter_criteria.ec2_instance_tags[0].value #=> String
2045
+ # resp.filter_criteria.ecr_image_tags #=> Array
2046
+ # resp.filter_criteria.ecr_image_tags[0].comparison #=> String, one of "EQUALS", "NOT_EQUALS"
2047
+ # resp.filter_criteria.ecr_image_tags[0].value #=> String
2048
+ # resp.filter_criteria.ecr_repository_name #=> Array
2049
+ # resp.filter_criteria.ecr_repository_name[0].comparison #=> String, one of "EQUALS", "NOT_EQUALS"
2050
+ # resp.filter_criteria.ecr_repository_name[0].value #=> String
2051
+ # resp.filter_criteria.lambda_function_name #=> Array
2052
+ # resp.filter_criteria.lambda_function_name[0].comparison #=> String, one of "EQUALS", "NOT_EQUALS"
2053
+ # resp.filter_criteria.lambda_function_name[0].value #=> String
2054
+ # resp.filter_criteria.lambda_function_tags #=> Array
2055
+ # resp.filter_criteria.lambda_function_tags[0].comparison #=> String, one of "EQUALS"
2056
+ # resp.filter_criteria.lambda_function_tags[0].key #=> String
2057
+ # resp.filter_criteria.lambda_function_tags[0].value #=> String
2058
+ # resp.filter_criteria.resource_id #=> Array
2059
+ # resp.filter_criteria.resource_id[0].comparison #=> String, one of "EQUALS", "NOT_EQUALS"
2060
+ # resp.filter_criteria.resource_id[0].value #=> String
2061
+ # resp.filter_criteria.resource_type #=> Array
2062
+ # resp.filter_criteria.resource_type[0].comparison #=> String, one of "EQUALS", "NOT_EQUALS"
2063
+ # resp.filter_criteria.resource_type[0].value #=> String
2064
+ # resp.format #=> String, one of "CYCLONEDX_1_4", "SPDX_2_3"
2065
+ # resp.report_id #=> String
2066
+ # resp.s3_destination.bucket_name #=> String
2067
+ # resp.s3_destination.key_prefix #=> String
2068
+ # resp.s3_destination.kms_key_arn #=> String
2069
+ # resp.status #=> String, one of "SUCCEEDED", "IN_PROGRESS", "CANCELLED", "FAILED"
2070
+ #
2071
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/GetSbomExport AWS API Documentation
2072
+ #
2073
+ # @overload get_sbom_export(params = {})
2074
+ # @param [Hash] params ({})
2075
+ def get_sbom_export(params = {}, options = {})
2076
+ req = build_request(:get_sbom_export, params)
2077
+ req.send_request(options)
2078
+ end
2079
+
1747
2080
  # Lists the permissions an account has to configure Amazon Inspector.
1748
2081
  #
1749
2082
  # @option params [Integer] :max_results
@@ -1921,11 +2254,11 @@ module Aws::Inspector2
1921
2254
  # resp.covered_resources[0].resource_metadata.lambda_function.function_tags["MapKey"] #=> String
1922
2255
  # resp.covered_resources[0].resource_metadata.lambda_function.layers #=> Array
1923
2256
  # resp.covered_resources[0].resource_metadata.lambda_function.layers[0] #=> String
1924
- # resp.covered_resources[0].resource_metadata.lambda_function.runtime #=> String, one of "NODEJS", "NODEJS_12_X", "NODEJS_14_X", "NODEJS_16_X", "JAVA_8", "JAVA_8_AL2", "JAVA_11", "PYTHON_3_7", "PYTHON_3_8", "PYTHON_3_9", "UNSUPPORTED", "NODEJS_18_X", "GO_1_X"
2257
+ # resp.covered_resources[0].resource_metadata.lambda_function.runtime #=> String, one of "NODEJS", "NODEJS_12_X", "NODEJS_14_X", "NODEJS_16_X", "JAVA_8", "JAVA_8_AL2", "JAVA_11", "PYTHON_3_7", "PYTHON_3_8", "PYTHON_3_9", "UNSUPPORTED", "NODEJS_18_X", "GO_1_X", "JAVA_17", "PYTHON_3_10"
1925
2258
  # resp.covered_resources[0].resource_type #=> String, one of "AWS_EC2_INSTANCE", "AWS_ECR_CONTAINER_IMAGE", "AWS_ECR_REPOSITORY", "AWS_LAMBDA_FUNCTION"
1926
2259
  # resp.covered_resources[0].scan_status.reason #=> String, one of "PENDING_INITIAL_SCAN", "ACCESS_DENIED", "INTERNAL_ERROR", "UNMANAGED_EC2_INSTANCE", "UNSUPPORTED_OS", "SCAN_ELIGIBILITY_EXPIRED", "RESOURCE_TERMINATED", "SUCCESSFUL", "NO_RESOURCES_FOUND", "IMAGE_SIZE_EXCEEDED", "SCAN_FREQUENCY_MANUAL", "SCAN_FREQUENCY_SCAN_ON_PUSH", "EC2_INSTANCE_STOPPED", "PENDING_DISABLE", "NO_INVENTORY", "STALE_INVENTORY", "EXCLUDED_BY_TAG", "UNSUPPORTED_RUNTIME", "UNSUPPORTED_MEDIA_TYPE", "UNSUPPORTED_CONFIG_FILE", "DEEP_INSPECTION_PACKAGE_COLLECTION_LIMIT_EXCEEDED", "DEEP_INSPECTION_DAILY_SSM_INVENTORY_LIMIT_EXCEEDED", "DEEP_INSPECTION_COLLECTION_TIME_LIMIT_EXCEEDED", "DEEP_INSPECTION_NO_INVENTORY"
1927
2260
  # resp.covered_resources[0].scan_status.status_code #=> String, one of "ACTIVE", "INACTIVE"
1928
- # resp.covered_resources[0].scan_type #=> String, one of "NETWORK", "PACKAGE"
2261
+ # resp.covered_resources[0].scan_type #=> String, one of "NETWORK", "PACKAGE", "CODE"
1929
2262
  # resp.next_token #=> String
1930
2263
  #
1931
2264
  # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/ListCoverage AWS API Documentation
@@ -2153,6 +2486,15 @@ module Aws::Inspector2
2153
2486
  # resp.filters[0].criteria.aws_account_id #=> Array
2154
2487
  # resp.filters[0].criteria.aws_account_id[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
2155
2488
  # resp.filters[0].criteria.aws_account_id[0].value #=> String
2489
+ # resp.filters[0].criteria.code_vulnerability_detector_name #=> Array
2490
+ # resp.filters[0].criteria.code_vulnerability_detector_name[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
2491
+ # resp.filters[0].criteria.code_vulnerability_detector_name[0].value #=> String
2492
+ # resp.filters[0].criteria.code_vulnerability_detector_tags #=> Array
2493
+ # resp.filters[0].criteria.code_vulnerability_detector_tags[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
2494
+ # resp.filters[0].criteria.code_vulnerability_detector_tags[0].value #=> String
2495
+ # resp.filters[0].criteria.code_vulnerability_file_path #=> Array
2496
+ # resp.filters[0].criteria.code_vulnerability_file_path[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
2497
+ # resp.filters[0].criteria.code_vulnerability_file_path[0].value #=> String
2156
2498
  # resp.filters[0].criteria.component_id #=> Array
2157
2499
  # resp.filters[0].criteria.component_id[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
2158
2500
  # resp.filters[0].criteria.component_id[0].value #=> String
@@ -2186,6 +2528,9 @@ module Aws::Inspector2
2186
2528
  # resp.filters[0].criteria.ecr_image_tags #=> Array
2187
2529
  # resp.filters[0].criteria.ecr_image_tags[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
2188
2530
  # resp.filters[0].criteria.ecr_image_tags[0].value #=> String
2531
+ # resp.filters[0].criteria.epss_score #=> Array
2532
+ # resp.filters[0].criteria.epss_score[0].lower_inclusive #=> Float
2533
+ # resp.filters[0].criteria.epss_score[0].upper_inclusive #=> Float
2189
2534
  # resp.filters[0].criteria.exploit_available #=> Array
2190
2535
  # resp.filters[0].criteria.exploit_available[0].comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS"
2191
2536
  # resp.filters[0].criteria.exploit_available[0].value #=> String
@@ -2338,7 +2683,7 @@ module Aws::Inspector2
2338
2683
  # ],
2339
2684
  # aggregation_request: {
2340
2685
  # account_aggregation: {
2341
- # finding_type: "NETWORK_REACHABILITY", # accepts NETWORK_REACHABILITY, PACKAGE_VULNERABILITY
2686
+ # finding_type: "NETWORK_REACHABILITY", # accepts NETWORK_REACHABILITY, PACKAGE_VULNERABILITY, CODE_VULNERABILITY
2342
2687
  # resource_type: "AWS_EC2_INSTANCE", # accepts AWS_EC2_INSTANCE, AWS_ECR_CONTAINER_IMAGE, AWS_LAMBDA_FUNCTION
2343
2688
  # sort_by: "CRITICAL", # accepts CRITICAL, HIGH, ALL
2344
2689
  # sort_order: "ASC", # accepts ASC, DESC
@@ -2417,7 +2762,7 @@ module Aws::Inspector2
2417
2762
  # sort_order: "ASC", # accepts ASC, DESC
2418
2763
  # },
2419
2764
  # finding_type_aggregation: {
2420
- # finding_type: "NETWORK_REACHABILITY", # accepts NETWORK_REACHABILITY, PACKAGE_VULNERABILITY
2765
+ # finding_type: "NETWORK_REACHABILITY", # accepts NETWORK_REACHABILITY, PACKAGE_VULNERABILITY, CODE_VULNERABILITY
2421
2766
  # resource_type: "AWS_EC2_INSTANCE", # accepts AWS_EC2_INSTANCE, AWS_ECR_CONTAINER_IMAGE, AWS_LAMBDA_FUNCTION
2422
2767
  # sort_by: "CRITICAL", # accepts CRITICAL, HIGH, ALL
2423
2768
  # sort_order: "ASC", # accepts ASC, DESC
@@ -2516,6 +2861,7 @@ module Aws::Inspector2
2516
2861
  # sort_order: "ASC", # accepts ASC, DESC
2517
2862
  # },
2518
2863
  # title_aggregation: {
2864
+ # finding_type: "NETWORK_REACHABILITY", # accepts NETWORK_REACHABILITY, PACKAGE_VULNERABILITY, CODE_VULNERABILITY
2519
2865
  # resource_type: "AWS_EC2_INSTANCE", # accepts AWS_EC2_INSTANCE, AWS_ECR_CONTAINER_IMAGE, AWS_LAMBDA_FUNCTION
2520
2866
  # sort_by: "CRITICAL", # accepts CRITICAL, HIGH, ALL
2521
2867
  # sort_order: "ASC", # accepts ASC, DESC
@@ -2674,6 +3020,24 @@ module Aws::Inspector2
2674
3020
  # value: "StringInput", # required
2675
3021
  # },
2676
3022
  # ],
3023
+ # code_vulnerability_detector_name: [
3024
+ # {
3025
+ # comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
3026
+ # value: "StringInput", # required
3027
+ # },
3028
+ # ],
3029
+ # code_vulnerability_detector_tags: [
3030
+ # {
3031
+ # comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
3032
+ # value: "StringInput", # required
3033
+ # },
3034
+ # ],
3035
+ # code_vulnerability_file_path: [
3036
+ # {
3037
+ # comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
3038
+ # value: "StringInput", # required
3039
+ # },
3040
+ # ],
2677
3041
  # component_id: [
2678
3042
  # {
2679
3043
  # comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
@@ -2740,6 +3104,12 @@ module Aws::Inspector2
2740
3104
  # value: "StringInput", # required
2741
3105
  # },
2742
3106
  # ],
3107
+ # epss_score: [
3108
+ # {
3109
+ # lower_inclusive: 1.0,
3110
+ # upper_inclusive: 1.0,
3111
+ # },
3112
+ # ],
2743
3113
  # exploit_available: [
2744
3114
  # {
2745
3115
  # comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
@@ -2927,7 +3297,7 @@ module Aws::Inspector2
2927
3297
  # max_results: 1,
2928
3298
  # next_token: "NextToken",
2929
3299
  # sort_criteria: {
2930
- # field: "AWS_ACCOUNT_ID", # required, accepts AWS_ACCOUNT_ID, FINDING_TYPE, SEVERITY, FIRST_OBSERVED_AT, LAST_OBSERVED_AT, FINDING_STATUS, RESOURCE_TYPE, ECR_IMAGE_PUSHED_AT, ECR_IMAGE_REPOSITORY_NAME, ECR_IMAGE_REGISTRY, NETWORK_PROTOCOL, COMPONENT_TYPE, VULNERABILITY_ID, VULNERABILITY_SOURCE, INSPECTOR_SCORE, VENDOR_SEVERITY
3300
+ # field: "AWS_ACCOUNT_ID", # required, accepts AWS_ACCOUNT_ID, FINDING_TYPE, SEVERITY, FIRST_OBSERVED_AT, LAST_OBSERVED_AT, FINDING_STATUS, RESOURCE_TYPE, ECR_IMAGE_PUSHED_AT, ECR_IMAGE_REPOSITORY_NAME, ECR_IMAGE_REGISTRY, NETWORK_PROTOCOL, COMPONENT_TYPE, VULNERABILITY_ID, VULNERABILITY_SOURCE, INSPECTOR_SCORE, VENDOR_SEVERITY, EPSS_SCORE
2931
3301
  # sort_order: "ASC", # required, accepts ASC, DESC
2932
3302
  # },
2933
3303
  # })
@@ -2936,7 +3306,22 @@ module Aws::Inspector2
2936
3306
  #
2937
3307
  # resp.findings #=> Array
2938
3308
  # resp.findings[0].aws_account_id #=> String
3309
+ # resp.findings[0].code_vulnerability_details.cwes #=> Array
3310
+ # resp.findings[0].code_vulnerability_details.cwes[0] #=> String
3311
+ # resp.findings[0].code_vulnerability_details.detector_id #=> String
3312
+ # resp.findings[0].code_vulnerability_details.detector_name #=> String
3313
+ # resp.findings[0].code_vulnerability_details.detector_tags #=> Array
3314
+ # resp.findings[0].code_vulnerability_details.detector_tags[0] #=> String
3315
+ # resp.findings[0].code_vulnerability_details.file_path.end_line #=> Integer
3316
+ # resp.findings[0].code_vulnerability_details.file_path.file_name #=> String
3317
+ # resp.findings[0].code_vulnerability_details.file_path.file_path #=> String
3318
+ # resp.findings[0].code_vulnerability_details.file_path.start_line #=> Integer
3319
+ # resp.findings[0].code_vulnerability_details.reference_urls #=> Array
3320
+ # resp.findings[0].code_vulnerability_details.reference_urls[0] #=> String
3321
+ # resp.findings[0].code_vulnerability_details.rule_id #=> String
3322
+ # resp.findings[0].code_vulnerability_details.source_lambda_layer_arn #=> String
2939
3323
  # resp.findings[0].description #=> String
3324
+ # resp.findings[0].epss.score #=> Float
2940
3325
  # resp.findings[0].exploit_available #=> String, one of "YES", "NO"
2941
3326
  # resp.findings[0].exploitability_details.last_known_exploit_at #=> Time
2942
3327
  # resp.findings[0].finding_arn #=> String
@@ -3018,7 +3403,7 @@ module Aws::Inspector2
3018
3403
  # resp.findings[0].resources[0].details.aws_lambda_function.layers #=> Array
3019
3404
  # resp.findings[0].resources[0].details.aws_lambda_function.layers[0] #=> String
3020
3405
  # resp.findings[0].resources[0].details.aws_lambda_function.package_type #=> String, one of "IMAGE", "ZIP"
3021
- # resp.findings[0].resources[0].details.aws_lambda_function.runtime #=> String, one of "NODEJS", "NODEJS_12_X", "NODEJS_14_X", "NODEJS_16_X", "JAVA_8", "JAVA_8_AL2", "JAVA_11", "PYTHON_3_7", "PYTHON_3_8", "PYTHON_3_9", "UNSUPPORTED", "NODEJS_18_X", "GO_1_X"
3406
+ # resp.findings[0].resources[0].details.aws_lambda_function.runtime #=> String, one of "NODEJS", "NODEJS_12_X", "NODEJS_14_X", "NODEJS_16_X", "JAVA_8", "JAVA_8_AL2", "JAVA_11", "PYTHON_3_7", "PYTHON_3_8", "PYTHON_3_9", "UNSUPPORTED", "NODEJS_18_X", "GO_1_X", "JAVA_17", "PYTHON_3_10"
3022
3407
  # resp.findings[0].resources[0].details.aws_lambda_function.version #=> String
3023
3408
  # resp.findings[0].resources[0].details.aws_lambda_function.vpc_config.security_group_ids #=> Array
3024
3409
  # resp.findings[0].resources[0].details.aws_lambda_function.vpc_config.security_group_ids[0] #=> String
@@ -3034,7 +3419,7 @@ module Aws::Inspector2
3034
3419
  # resp.findings[0].severity #=> String, one of "INFORMATIONAL", "LOW", "MEDIUM", "HIGH", "CRITICAL", "UNTRIAGED"
3035
3420
  # resp.findings[0].status #=> String, one of "ACTIVE", "SUPPRESSED", "CLOSED"
3036
3421
  # resp.findings[0].title #=> String
3037
- # resp.findings[0].type #=> String, one of "NETWORK_REACHABILITY", "PACKAGE_VULNERABILITY"
3422
+ # resp.findings[0].type #=> String, one of "NETWORK_REACHABILITY", "PACKAGE_VULNERABILITY", "CODE_VULNERABILITY"
3038
3423
  # resp.findings[0].updated_at #=> Time
3039
3424
  # resp.next_token #=> String
3040
3425
  #
@@ -3165,7 +3550,7 @@ module Aws::Inspector2
3165
3550
  # resp.totals[0].usage[0].currency #=> String, one of "USD"
3166
3551
  # resp.totals[0].usage[0].estimated_monthly_cost #=> Float
3167
3552
  # resp.totals[0].usage[0].total #=> Float
3168
- # resp.totals[0].usage[0].type #=> String, one of "EC2_INSTANCE_HOURS", "ECR_INITIAL_SCAN", "ECR_RESCAN", "LAMBDA_FUNCTION_HOURS"
3553
+ # resp.totals[0].usage[0].type #=> String, one of "EC2_INSTANCE_HOURS", "ECR_INITIAL_SCAN", "ECR_RESCAN", "LAMBDA_FUNCTION_HOURS", "LAMBDA_FUNCTION_CODE_HOURS"
3169
3554
  #
3170
3555
  # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/ListUsageTotals AWS API Documentation
3171
3556
  #
@@ -3176,6 +3561,33 @@ module Aws::Inspector2
3176
3561
  req.send_request(options)
3177
3562
  end
3178
3563
 
3564
+ # Resets an encryption key. After the key is reset your resources will
3565
+ # be encrypted by an Amazon Web Services owned key.
3566
+ #
3567
+ # @option params [required, String] :resource_type
3568
+ # The resource type the key encrypts.
3569
+ #
3570
+ # @option params [required, String] :scan_type
3571
+ # The scan type the key encrypts.
3572
+ #
3573
+ # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
3574
+ #
3575
+ # @example Request syntax with placeholder values
3576
+ #
3577
+ # resp = client.reset_encryption_key({
3578
+ # resource_type: "AWS_EC2_INSTANCE", # required, accepts AWS_EC2_INSTANCE, AWS_ECR_CONTAINER_IMAGE, AWS_ECR_REPOSITORY, AWS_LAMBDA_FUNCTION
3579
+ # scan_type: "NETWORK", # required, accepts NETWORK, PACKAGE, CODE
3580
+ # })
3581
+ #
3582
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/ResetEncryptionKey AWS API Documentation
3583
+ #
3584
+ # @overload reset_encryption_key(params = {})
3585
+ # @param [Hash] params ({})
3586
+ def reset_encryption_key(params = {}, options = {})
3587
+ req = build_request(:reset_encryption_key, params)
3588
+ req.send_request(options)
3589
+ end
3590
+
3179
3591
  # Lists Amazon Inspector coverage details for a specific vulnerability.
3180
3592
  #
3181
3593
  # @option params [required, Types::SearchVulnerabilitiesFilterCriteria] :filter_criteria
@@ -3381,6 +3793,37 @@ module Aws::Inspector2
3381
3793
  req.send_request(options)
3382
3794
  end
3383
3795
 
3796
+ # Updates an encryption key. A `ResourceNotFoundException` means that an
3797
+ # AWS owned key is being used for encryption.
3798
+ #
3799
+ # @option params [required, String] :kms_key_id
3800
+ # A KMS key ID for the encryption key.
3801
+ #
3802
+ # @option params [required, String] :resource_type
3803
+ # The resource type for the encryption key.
3804
+ #
3805
+ # @option params [required, String] :scan_type
3806
+ # The scan type for the encryption key.
3807
+ #
3808
+ # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
3809
+ #
3810
+ # @example Request syntax with placeholder values
3811
+ #
3812
+ # resp = client.update_encryption_key({
3813
+ # kms_key_id: "KmsKeyArn", # required
3814
+ # resource_type: "AWS_EC2_INSTANCE", # required, accepts AWS_EC2_INSTANCE, AWS_ECR_CONTAINER_IMAGE, AWS_ECR_REPOSITORY, AWS_LAMBDA_FUNCTION
3815
+ # scan_type: "NETWORK", # required, accepts NETWORK, PACKAGE, CODE
3816
+ # })
3817
+ #
3818
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/UpdateEncryptionKey AWS API Documentation
3819
+ #
3820
+ # @overload update_encryption_key(params = {})
3821
+ # @param [Hash] params ({})
3822
+ def update_encryption_key(params = {}, options = {})
3823
+ req = build_request(:update_encryption_key, params)
3824
+ req.send_request(options)
3825
+ end
3826
+
3384
3827
  # Specifies the action that is to be applied to the findings that match
3385
3828
  # the filter.
3386
3829
  #
@@ -3420,6 +3863,24 @@ module Aws::Inspector2
3420
3863
  # value: "StringInput", # required
3421
3864
  # },
3422
3865
  # ],
3866
+ # code_vulnerability_detector_name: [
3867
+ # {
3868
+ # comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
3869
+ # value: "StringInput", # required
3870
+ # },
3871
+ # ],
3872
+ # code_vulnerability_detector_tags: [
3873
+ # {
3874
+ # comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
3875
+ # value: "StringInput", # required
3876
+ # },
3877
+ # ],
3878
+ # code_vulnerability_file_path: [
3879
+ # {
3880
+ # comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
3881
+ # value: "StringInput", # required
3882
+ # },
3883
+ # ],
3423
3884
  # component_id: [
3424
3885
  # {
3425
3886
  # comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
@@ -3486,6 +3947,12 @@ module Aws::Inspector2
3486
3947
  # value: "StringInput", # required
3487
3948
  # },
3488
3949
  # ],
3950
+ # epss_score: [
3951
+ # {
3952
+ # lower_inclusive: 1.0,
3953
+ # upper_inclusive: 1.0,
3954
+ # },
3955
+ # ],
3489
3956
  # exploit_available: [
3490
3957
  # {
3491
3958
  # comparison: "EQUALS", # required, accepts EQUALS, PREFIX, NOT_EQUALS
@@ -3729,6 +4196,7 @@ module Aws::Inspector2
3729
4196
  # ec2: false, # required
3730
4197
  # ecr: false, # required
3731
4198
  # lambda: false,
4199
+ # lambda_code: false,
3732
4200
  # },
3733
4201
  # })
3734
4202
  #
@@ -3737,6 +4205,7 @@ module Aws::Inspector2
3737
4205
  # resp.auto_enable.ec2 #=> Boolean
3738
4206
  # resp.auto_enable.ecr #=> Boolean
3739
4207
  # resp.auto_enable.lambda #=> Boolean
4208
+ # resp.auto_enable.lambda_code #=> Boolean
3740
4209
  #
3741
4210
  # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/UpdateOrganizationConfiguration AWS API Documentation
3742
4211
  #
@@ -3760,7 +4229,7 @@ module Aws::Inspector2
3760
4229
  params: params,
3761
4230
  config: config)
3762
4231
  context[:gem_name] = 'aws-sdk-inspector2'
3763
- context[:gem_version] = '1.15.0'
4232
+ context[:gem_version] = '1.16.0'
3764
4233
  Seahorse::Client::Request.new(handlers, context)
3765
4234
  end
3766
4235