aws-sdk-inspector2 1.11.0 → 1.12.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-inspector2/client.rb +74 -1
- data/lib/aws-sdk-inspector2/client_api.rb +129 -0
- data/lib/aws-sdk-inspector2/endpoints.rb +14 -0
- data/lib/aws-sdk-inspector2/plugins/endpoints.rb +2 -0
- data/lib/aws-sdk-inspector2/types.rb +290 -0
- data/lib/aws-sdk-inspector2.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 37045386cef6441373fa42145f3ecf648fef0f4322fad6515b80719539a77473
|
4
|
+
data.tar.gz: b815de9f7ae4804241a5aabc60fede44880a5ba087b92d4000e179b7c7fee2ca
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 1b1f03de0aaef59011515095e6fbd52e881a1ff9a49c798d7048af053da8d2db939b786a32f263332ebcd01e988d0df84b096f02af018f5c460055216687ab32
|
7
|
+
data.tar.gz: a20ac868d3f766413ca6cc2a70ed86276d9fcbeef6db46c9e2d609727c3ac2b2b903b109959141cca536e6d4ee92963af94fd7912f0785a05b110ddbdf26de70
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,11 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.12.0 (2023-05-05)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Amazon Inspector now allows customers to search its vulnerability intelligence database if any of the Inspector scanning types are activated.
|
8
|
+
|
4
9
|
1.11.0 (2023-05-03)
|
5
10
|
------------------
|
6
11
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.12.0
|
@@ -3158,6 +3158,79 @@ module Aws::Inspector2
|
|
3158
3158
|
req.send_request(options)
|
3159
3159
|
end
|
3160
3160
|
|
3161
|
+
# Lists Amazon Inspector coverage details for a specific vulnerability.
|
3162
|
+
#
|
3163
|
+
# @option params [required, Types::SearchVulnerabilitiesFilterCriteria] :filter_criteria
|
3164
|
+
# The criteria used to filter the results of a vulnerability search.
|
3165
|
+
#
|
3166
|
+
# @option params [String] :next_token
|
3167
|
+
# A token to use for paginating results that are returned in the
|
3168
|
+
# response. Set the value of this parameter to null for the first
|
3169
|
+
# request to a list action. For subsequent calls, use the `NextToken`
|
3170
|
+
# value returned from the previous request to continue listing results
|
3171
|
+
# after the first page.
|
3172
|
+
#
|
3173
|
+
# @return [Types::SearchVulnerabilitiesResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
3174
|
+
#
|
3175
|
+
# * {Types::SearchVulnerabilitiesResponse#next_token #next_token} => String
|
3176
|
+
# * {Types::SearchVulnerabilitiesResponse#vulnerabilities #vulnerabilities} => Array<Types::Vulnerability>
|
3177
|
+
#
|
3178
|
+
# The returned {Seahorse::Client::Response response} is a pageable response and is Enumerable. For details on usage see {Aws::PageableResponse PageableResponse}.
|
3179
|
+
#
|
3180
|
+
# @example Request syntax with placeholder values
|
3181
|
+
#
|
3182
|
+
# resp = client.search_vulnerabilities({
|
3183
|
+
# filter_criteria: { # required
|
3184
|
+
# vulnerability_ids: ["VulnId"], # required
|
3185
|
+
# },
|
3186
|
+
# next_token: "NextToken",
|
3187
|
+
# })
|
3188
|
+
#
|
3189
|
+
# @example Response structure
|
3190
|
+
#
|
3191
|
+
# resp.next_token #=> String
|
3192
|
+
# resp.vulnerabilities #=> Array
|
3193
|
+
# resp.vulnerabilities[0].atig_data.first_seen #=> Time
|
3194
|
+
# resp.vulnerabilities[0].atig_data.last_seen #=> Time
|
3195
|
+
# resp.vulnerabilities[0].atig_data.targets #=> Array
|
3196
|
+
# resp.vulnerabilities[0].atig_data.targets[0] #=> String
|
3197
|
+
# resp.vulnerabilities[0].atig_data.ttps #=> Array
|
3198
|
+
# resp.vulnerabilities[0].atig_data.ttps[0] #=> String
|
3199
|
+
# resp.vulnerabilities[0].cisa_data.action #=> String
|
3200
|
+
# resp.vulnerabilities[0].cisa_data.date_added #=> Time
|
3201
|
+
# resp.vulnerabilities[0].cisa_data.date_due #=> Time
|
3202
|
+
# resp.vulnerabilities[0].cvss2.base_score #=> Float
|
3203
|
+
# resp.vulnerabilities[0].cvss2.scoring_vector #=> String
|
3204
|
+
# resp.vulnerabilities[0].cvss3.base_score #=> Float
|
3205
|
+
# resp.vulnerabilities[0].cvss3.scoring_vector #=> String
|
3206
|
+
# resp.vulnerabilities[0].cwes #=> Array
|
3207
|
+
# resp.vulnerabilities[0].cwes[0] #=> String
|
3208
|
+
# resp.vulnerabilities[0].description #=> String
|
3209
|
+
# resp.vulnerabilities[0].detection_platforms #=> Array
|
3210
|
+
# resp.vulnerabilities[0].detection_platforms[0] #=> String
|
3211
|
+
# resp.vulnerabilities[0].epss.score #=> Float
|
3212
|
+
# resp.vulnerabilities[0].exploit_observed.first_seen #=> Time
|
3213
|
+
# resp.vulnerabilities[0].exploit_observed.last_seen #=> Time
|
3214
|
+
# resp.vulnerabilities[0].id #=> String
|
3215
|
+
# resp.vulnerabilities[0].reference_urls #=> Array
|
3216
|
+
# resp.vulnerabilities[0].reference_urls[0] #=> String
|
3217
|
+
# resp.vulnerabilities[0].related_vulnerabilities #=> Array
|
3218
|
+
# resp.vulnerabilities[0].related_vulnerabilities[0] #=> String
|
3219
|
+
# resp.vulnerabilities[0].source #=> String, one of "NVD"
|
3220
|
+
# resp.vulnerabilities[0].source_url #=> String
|
3221
|
+
# resp.vulnerabilities[0].vendor_created_at #=> Time
|
3222
|
+
# resp.vulnerabilities[0].vendor_severity #=> String
|
3223
|
+
# resp.vulnerabilities[0].vendor_updated_at #=> Time
|
3224
|
+
#
|
3225
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/SearchVulnerabilities AWS API Documentation
|
3226
|
+
#
|
3227
|
+
# @overload search_vulnerabilities(params = {})
|
3228
|
+
# @param [Hash] params ({})
|
3229
|
+
def search_vulnerabilities(params = {}, options = {})
|
3230
|
+
req = build_request(:search_vulnerabilities, params)
|
3231
|
+
req.send_request(options)
|
3232
|
+
end
|
3233
|
+
|
3161
3234
|
# Adds tags to a resource.
|
3162
3235
|
#
|
3163
3236
|
# @option params [required, String] :resource_arn
|
@@ -3669,7 +3742,7 @@ module Aws::Inspector2
|
|
3669
3742
|
params: params,
|
3670
3743
|
config: config)
|
3671
3744
|
context[:gem_name] = 'aws-sdk-inspector2'
|
3672
|
-
context[:gem_version] = '1.
|
3745
|
+
context[:gem_version] = '1.12.0'
|
3673
3746
|
Seahorse::Client::Request.new(handlers, context)
|
3674
3747
|
end
|
3675
3748
|
|
@@ -39,6 +39,7 @@ module Aws::Inspector2
|
|
39
39
|
Arn = Shapes::StringShape.new(name: 'Arn')
|
40
40
|
AssociateMemberRequest = Shapes::StructureShape.new(name: 'AssociateMemberRequest')
|
41
41
|
AssociateMemberResponse = Shapes::StructureShape.new(name: 'AssociateMemberResponse')
|
42
|
+
AtigData = Shapes::StructureShape.new(name: 'AtigData')
|
42
43
|
AutoEnable = Shapes::StructureShape.new(name: 'AutoEnable')
|
43
44
|
AwsEc2InstanceDetails = Shapes::StructureShape.new(name: 'AwsEc2InstanceDetails')
|
44
45
|
AwsEcrContainerAggregation = Shapes::StructureShape.new(name: 'AwsEcrContainerAggregation')
|
@@ -59,6 +60,10 @@ module Aws::Inspector2
|
|
59
60
|
Boolean = Shapes::BooleanShape.new(name: 'Boolean')
|
60
61
|
CancelFindingsReportRequest = Shapes::StructureShape.new(name: 'CancelFindingsReportRequest')
|
61
62
|
CancelFindingsReportResponse = Shapes::StructureShape.new(name: 'CancelFindingsReportResponse')
|
63
|
+
CisaAction = Shapes::StringShape.new(name: 'CisaAction')
|
64
|
+
CisaData = Shapes::StructureShape.new(name: 'CisaData')
|
65
|
+
CisaDateAdded = Shapes::TimestampShape.new(name: 'CisaDateAdded')
|
66
|
+
CisaDateDue = Shapes::TimestampShape.new(name: 'CisaDateDue')
|
62
67
|
ClientToken = Shapes::StringShape.new(name: 'ClientToken')
|
63
68
|
Component = Shapes::StringShape.new(name: 'Component')
|
64
69
|
ComponentType = Shapes::StringShape.new(name: 'ComponentType')
|
@@ -81,11 +86,19 @@ module Aws::Inspector2
|
|
81
86
|
CreateFindingsReportRequest = Shapes::StructureShape.new(name: 'CreateFindingsReportRequest')
|
82
87
|
CreateFindingsReportResponse = Shapes::StructureShape.new(name: 'CreateFindingsReportResponse')
|
83
88
|
Currency = Shapes::StringShape.new(name: 'Currency')
|
89
|
+
Cvss2 = Shapes::StructureShape.new(name: 'Cvss2')
|
90
|
+
Cvss2BaseScore = Shapes::FloatShape.new(name: 'Cvss2BaseScore')
|
91
|
+
Cvss2ScoringVector = Shapes::StringShape.new(name: 'Cvss2ScoringVector')
|
92
|
+
Cvss3 = Shapes::StructureShape.new(name: 'Cvss3')
|
93
|
+
Cvss3BaseScore = Shapes::FloatShape.new(name: 'Cvss3BaseScore')
|
94
|
+
Cvss3ScoringVector = Shapes::StringShape.new(name: 'Cvss3ScoringVector')
|
84
95
|
CvssScore = Shapes::StructureShape.new(name: 'CvssScore')
|
85
96
|
CvssScoreAdjustment = Shapes::StructureShape.new(name: 'CvssScoreAdjustment')
|
86
97
|
CvssScoreAdjustmentList = Shapes::ListShape.new(name: 'CvssScoreAdjustmentList')
|
87
98
|
CvssScoreDetails = Shapes::StructureShape.new(name: 'CvssScoreDetails')
|
88
99
|
CvssScoreList = Shapes::ListShape.new(name: 'CvssScoreList')
|
100
|
+
Cwe = Shapes::StringShape.new(name: 'Cwe')
|
101
|
+
Cwes = Shapes::ListShape.new(name: 'Cwes')
|
89
102
|
DateFilter = Shapes::StructureShape.new(name: 'DateFilter')
|
90
103
|
DateFilterList = Shapes::ListShape.new(name: 'DateFilterList')
|
91
104
|
DateTimeTimestamp = Shapes::TimestampShape.new(name: 'DateTimeTimestamp')
|
@@ -98,6 +111,7 @@ module Aws::Inspector2
|
|
98
111
|
DescribeOrganizationConfigurationRequest = Shapes::StructureShape.new(name: 'DescribeOrganizationConfigurationRequest')
|
99
112
|
DescribeOrganizationConfigurationResponse = Shapes::StructureShape.new(name: 'DescribeOrganizationConfigurationResponse')
|
100
113
|
Destination = Shapes::StructureShape.new(name: 'Destination')
|
114
|
+
DetectionPlatforms = Shapes::ListShape.new(name: 'DetectionPlatforms')
|
101
115
|
DisableDelegatedAdminAccountRequest = Shapes::StructureShape.new(name: 'DisableDelegatedAdminAccountRequest')
|
102
116
|
DisableDelegatedAdminAccountResponse = Shapes::StructureShape.new(name: 'DisableDelegatedAdminAccountResponse')
|
103
117
|
DisableRequest = Shapes::StructureShape.new(name: 'DisableRequest')
|
@@ -125,10 +139,13 @@ module Aws::Inspector2
|
|
125
139
|
EnableRequest = Shapes::StructureShape.new(name: 'EnableRequest')
|
126
140
|
EnableResourceTypeList = Shapes::ListShape.new(name: 'EnableResourceTypeList')
|
127
141
|
EnableResponse = Shapes::StructureShape.new(name: 'EnableResponse')
|
142
|
+
Epss = Shapes::StructureShape.new(name: 'Epss')
|
143
|
+
EpssScore = Shapes::FloatShape.new(name: 'EpssScore')
|
128
144
|
ErrorCode = Shapes::StringShape.new(name: 'ErrorCode')
|
129
145
|
ErrorMessage = Shapes::StringShape.new(name: 'ErrorMessage')
|
130
146
|
ExecutionRoleArn = Shapes::StringShape.new(name: 'ExecutionRoleArn')
|
131
147
|
ExploitAvailable = Shapes::StringShape.new(name: 'ExploitAvailable')
|
148
|
+
ExploitObserved = Shapes::StructureShape.new(name: 'ExploitObserved')
|
132
149
|
ExploitabilityDetails = Shapes::StructureShape.new(name: 'ExploitabilityDetails')
|
133
150
|
ExternalReportStatus = Shapes::StringShape.new(name: 'ExternalReportStatus')
|
134
151
|
FailedAccount = Shapes::StructureShape.new(name: 'FailedAccount')
|
@@ -155,6 +172,7 @@ module Aws::Inspector2
|
|
155
172
|
FindingTypeAggregation = Shapes::StructureShape.new(name: 'FindingTypeAggregation')
|
156
173
|
FindingTypeAggregationResponse = Shapes::StructureShape.new(name: 'FindingTypeAggregationResponse')
|
157
174
|
FindingTypeSortBy = Shapes::StringShape.new(name: 'FindingTypeSortBy')
|
175
|
+
FirstSeen = Shapes::TimestampShape.new(name: 'FirstSeen')
|
158
176
|
FixAvailable = Shapes::StringShape.new(name: 'FixAvailable')
|
159
177
|
FreeTrialAccountInfo = Shapes::StructureShape.new(name: 'FreeTrialAccountInfo')
|
160
178
|
FreeTrialAccountInfoList = Shapes::ListShape.new(name: 'FreeTrialAccountInfoList')
|
@@ -199,6 +217,7 @@ module Aws::Inspector2
|
|
199
217
|
LambdaLayerList = Shapes::ListShape.new(name: 'LambdaLayerList')
|
200
218
|
LambdaLayerSortBy = Shapes::StringShape.new(name: 'LambdaLayerSortBy')
|
201
219
|
LambdaVpcConfig = Shapes::StructureShape.new(name: 'LambdaVpcConfig')
|
220
|
+
LastSeen = Shapes::TimestampShape.new(name: 'LastSeen')
|
202
221
|
LayerList = Shapes::ListShape.new(name: 'LayerList')
|
203
222
|
ListAccountPermissionsMaxResults = Shapes::IntegerShape.new(name: 'ListAccountPermissionsMaxResults')
|
204
223
|
ListAccountPermissionsRequest = Shapes::StructureShape.new(name: 'ListAccountPermissionsRequest')
|
@@ -276,6 +295,8 @@ module Aws::Inspector2
|
|
276
295
|
PortRangeFilter = Shapes::StructureShape.new(name: 'PortRangeFilter')
|
277
296
|
PortRangeFilterList = Shapes::ListShape.new(name: 'PortRangeFilterList')
|
278
297
|
Recommendation = Shapes::StructureShape.new(name: 'Recommendation')
|
298
|
+
RelatedVulnerabilities = Shapes::ListShape.new(name: 'RelatedVulnerabilities')
|
299
|
+
RelatedVulnerability = Shapes::StringShape.new(name: 'RelatedVulnerability')
|
279
300
|
RelationshipStatus = Shapes::StringShape.new(name: 'RelationshipStatus')
|
280
301
|
Remediation = Shapes::StructureShape.new(name: 'Remediation')
|
281
302
|
ReportFormat = Shapes::StringShape.new(name: 'ReportFormat')
|
@@ -299,6 +320,9 @@ module Aws::Inspector2
|
|
299
320
|
ScanStatusCode = Shapes::StringShape.new(name: 'ScanStatusCode')
|
300
321
|
ScanStatusReason = Shapes::StringShape.new(name: 'ScanStatusReason')
|
301
322
|
ScanType = Shapes::StringShape.new(name: 'ScanType')
|
323
|
+
SearchVulnerabilitiesFilterCriteria = Shapes::StructureShape.new(name: 'SearchVulnerabilitiesFilterCriteria')
|
324
|
+
SearchVulnerabilitiesRequest = Shapes::StructureShape.new(name: 'SearchVulnerabilitiesRequest')
|
325
|
+
SearchVulnerabilitiesResponse = Shapes::StructureShape.new(name: 'SearchVulnerabilitiesResponse')
|
302
326
|
SecurityGroupId = Shapes::StringShape.new(name: 'SecurityGroupId')
|
303
327
|
SecurityGroupIdList = Shapes::ListShape.new(name: 'SecurityGroupIdList')
|
304
328
|
Service = Shapes::StringShape.new(name: 'Service')
|
@@ -327,11 +351,15 @@ module Aws::Inspector2
|
|
327
351
|
TagMap = Shapes::MapShape.new(name: 'TagMap')
|
328
352
|
TagResourceRequest = Shapes::StructureShape.new(name: 'TagResourceRequest')
|
329
353
|
TagResourceResponse = Shapes::StructureShape.new(name: 'TagResourceResponse')
|
354
|
+
Target = Shapes::StringShape.new(name: 'Target')
|
355
|
+
Targets = Shapes::ListShape.new(name: 'Targets')
|
330
356
|
ThrottlingException = Shapes::StructureShape.new(name: 'ThrottlingException')
|
331
357
|
Timestamp = Shapes::TimestampShape.new(name: 'Timestamp')
|
332
358
|
TitleAggregation = Shapes::StructureShape.new(name: 'TitleAggregation')
|
333
359
|
TitleAggregationResponse = Shapes::StructureShape.new(name: 'TitleAggregationResponse')
|
334
360
|
TitleSortBy = Shapes::StringShape.new(name: 'TitleSortBy')
|
361
|
+
Ttp = Shapes::StringShape.new(name: 'Ttp')
|
362
|
+
Ttps = Shapes::ListShape.new(name: 'Ttps')
|
335
363
|
UntagResourceRequest = Shapes::StructureShape.new(name: 'UntagResourceRequest')
|
336
364
|
UntagResourceResponse = Shapes::StructureShape.new(name: 'UntagResourceResponse')
|
337
365
|
UpdateConfigurationRequest = Shapes::StructureShape.new(name: 'UpdateConfigurationRequest')
|
@@ -356,10 +384,22 @@ module Aws::Inspector2
|
|
356
384
|
ValidationExceptionField = Shapes::StructureShape.new(name: 'ValidationExceptionField')
|
357
385
|
ValidationExceptionFields = Shapes::ListShape.new(name: 'ValidationExceptionFields')
|
358
386
|
ValidationExceptionReason = Shapes::StringShape.new(name: 'ValidationExceptionReason')
|
387
|
+
VendorCreatedAt = Shapes::TimestampShape.new(name: 'VendorCreatedAt')
|
388
|
+
VendorSeverity = Shapes::StringShape.new(name: 'VendorSeverity')
|
389
|
+
VendorUpdatedAt = Shapes::TimestampShape.new(name: 'VendorUpdatedAt')
|
359
390
|
Version = Shapes::StringShape.new(name: 'Version')
|
360
391
|
VpcId = Shapes::StringShape.new(name: 'VpcId')
|
392
|
+
VulnId = Shapes::StringShape.new(name: 'VulnId')
|
393
|
+
VulnIdList = Shapes::ListShape.new(name: 'VulnIdList')
|
394
|
+
Vulnerabilities = Shapes::ListShape.new(name: 'Vulnerabilities')
|
395
|
+
Vulnerability = Shapes::StructureShape.new(name: 'Vulnerability')
|
396
|
+
VulnerabilityDescription = Shapes::StringShape.new(name: 'VulnerabilityDescription')
|
361
397
|
VulnerabilityId = Shapes::StringShape.new(name: 'VulnerabilityId')
|
362
398
|
VulnerabilityIdList = Shapes::ListShape.new(name: 'VulnerabilityIdList')
|
399
|
+
VulnerabilityReferenceUrl = Shapes::StringShape.new(name: 'VulnerabilityReferenceUrl')
|
400
|
+
VulnerabilityReferenceUrls = Shapes::ListShape.new(name: 'VulnerabilityReferenceUrls')
|
401
|
+
VulnerabilitySource = Shapes::StringShape.new(name: 'VulnerabilitySource')
|
402
|
+
VulnerabilitySourceUrl = Shapes::StringShape.new(name: 'VulnerabilitySourceUrl')
|
363
403
|
VulnerablePackage = Shapes::StructureShape.new(name: 'VulnerablePackage')
|
364
404
|
VulnerablePackageList = Shapes::ListShape.new(name: 'VulnerablePackageList')
|
365
405
|
VulnerablePackageRemediation = Shapes::StringShape.new(name: 'VulnerablePackageRemediation')
|
@@ -466,6 +506,12 @@ module Aws::Inspector2
|
|
466
506
|
AssociateMemberResponse.add_member(:account_id, Shapes::ShapeRef.new(shape: AccountId, required: true, location_name: "accountId"))
|
467
507
|
AssociateMemberResponse.struct_class = Types::AssociateMemberResponse
|
468
508
|
|
509
|
+
AtigData.add_member(:first_seen, Shapes::ShapeRef.new(shape: FirstSeen, location_name: "firstSeen"))
|
510
|
+
AtigData.add_member(:last_seen, Shapes::ShapeRef.new(shape: LastSeen, location_name: "lastSeen"))
|
511
|
+
AtigData.add_member(:targets, Shapes::ShapeRef.new(shape: Targets, location_name: "targets"))
|
512
|
+
AtigData.add_member(:ttps, Shapes::ShapeRef.new(shape: Ttps, location_name: "ttps"))
|
513
|
+
AtigData.struct_class = Types::AtigData
|
514
|
+
|
469
515
|
AutoEnable.add_member(:ec2, Shapes::ShapeRef.new(shape: Boolean, required: true, location_name: "ec2"))
|
470
516
|
AutoEnable.add_member(:ecr, Shapes::ShapeRef.new(shape: Boolean, required: true, location_name: "ecr"))
|
471
517
|
AutoEnable.add_member(:lambda, Shapes::ShapeRef.new(shape: Boolean, location_name: "lambda"))
|
@@ -562,6 +608,11 @@ module Aws::Inspector2
|
|
562
608
|
CancelFindingsReportResponse.add_member(:report_id, Shapes::ShapeRef.new(shape: ReportId, required: true, location_name: "reportId"))
|
563
609
|
CancelFindingsReportResponse.struct_class = Types::CancelFindingsReportResponse
|
564
610
|
|
611
|
+
CisaData.add_member(:action, Shapes::ShapeRef.new(shape: CisaAction, location_name: "action"))
|
612
|
+
CisaData.add_member(:date_added, Shapes::ShapeRef.new(shape: CisaDateAdded, location_name: "dateAdded"))
|
613
|
+
CisaData.add_member(:date_due, Shapes::ShapeRef.new(shape: CisaDateDue, location_name: "dateDue"))
|
614
|
+
CisaData.struct_class = Types::CisaData
|
615
|
+
|
565
616
|
ConflictException.add_member(:message, Shapes::ShapeRef.new(shape: String, required: true, location_name: "message"))
|
566
617
|
ConflictException.add_member(:resource_id, Shapes::ShapeRef.new(shape: String, required: true, location_name: "resourceId"))
|
567
618
|
ConflictException.add_member(:resource_type, Shapes::ShapeRef.new(shape: String, required: true, location_name: "resourceType"))
|
@@ -629,6 +680,14 @@ module Aws::Inspector2
|
|
629
680
|
CreateFindingsReportResponse.add_member(:report_id, Shapes::ShapeRef.new(shape: ReportId, location_name: "reportId"))
|
630
681
|
CreateFindingsReportResponse.struct_class = Types::CreateFindingsReportResponse
|
631
682
|
|
683
|
+
Cvss2.add_member(:base_score, Shapes::ShapeRef.new(shape: Cvss2BaseScore, location_name: "baseScore"))
|
684
|
+
Cvss2.add_member(:scoring_vector, Shapes::ShapeRef.new(shape: Cvss2ScoringVector, location_name: "scoringVector"))
|
685
|
+
Cvss2.struct_class = Types::Cvss2
|
686
|
+
|
687
|
+
Cvss3.add_member(:base_score, Shapes::ShapeRef.new(shape: Cvss3BaseScore, location_name: "baseScore"))
|
688
|
+
Cvss3.add_member(:scoring_vector, Shapes::ShapeRef.new(shape: Cvss3ScoringVector, location_name: "scoringVector"))
|
689
|
+
Cvss3.struct_class = Types::Cvss3
|
690
|
+
|
632
691
|
CvssScore.add_member(:base_score, Shapes::ShapeRef.new(shape: Double, required: true, location_name: "baseScore"))
|
633
692
|
CvssScore.add_member(:scoring_vector, Shapes::ShapeRef.new(shape: NonEmptyString, required: true, location_name: "scoringVector"))
|
634
693
|
CvssScore.add_member(:source, Shapes::ShapeRef.new(shape: NonEmptyString, required: true, location_name: "source"))
|
@@ -651,6 +710,8 @@ module Aws::Inspector2
|
|
651
710
|
|
652
711
|
CvssScoreList.member = Shapes::ShapeRef.new(shape: CvssScore)
|
653
712
|
|
713
|
+
Cwes.member = Shapes::ShapeRef.new(shape: Cwe)
|
714
|
+
|
654
715
|
DateFilter.add_member(:end_inclusive, Shapes::ShapeRef.new(shape: Timestamp, location_name: "endInclusive"))
|
655
716
|
DateFilter.add_member(:start_inclusive, Shapes::ShapeRef.new(shape: Timestamp, location_name: "startInclusive"))
|
656
717
|
DateFilter.struct_class = Types::DateFilter
|
@@ -684,6 +745,8 @@ module Aws::Inspector2
|
|
684
745
|
Destination.add_member(:kms_key_arn, Shapes::ShapeRef.new(shape: String, required: true, location_name: "kmsKeyArn"))
|
685
746
|
Destination.struct_class = Types::Destination
|
686
747
|
|
748
|
+
DetectionPlatforms.member = Shapes::ShapeRef.new(shape: NonEmptyString)
|
749
|
+
|
687
750
|
DisableDelegatedAdminAccountRequest.add_member(:delegated_admin_account_id, Shapes::ShapeRef.new(shape: AccountId, required: true, location_name: "delegatedAdminAccountId"))
|
688
751
|
DisableDelegatedAdminAccountRequest.struct_class = Types::DisableDelegatedAdminAccountRequest
|
689
752
|
|
@@ -764,6 +827,13 @@ module Aws::Inspector2
|
|
764
827
|
EnableResponse.add_member(:failed_accounts, Shapes::ShapeRef.new(shape: FailedAccountList, location_name: "failedAccounts"))
|
765
828
|
EnableResponse.struct_class = Types::EnableResponse
|
766
829
|
|
830
|
+
Epss.add_member(:score, Shapes::ShapeRef.new(shape: EpssScore, location_name: "score"))
|
831
|
+
Epss.struct_class = Types::Epss
|
832
|
+
|
833
|
+
ExploitObserved.add_member(:first_seen, Shapes::ShapeRef.new(shape: FirstSeen, location_name: "firstSeen"))
|
834
|
+
ExploitObserved.add_member(:last_seen, Shapes::ShapeRef.new(shape: LastSeen, location_name: "lastSeen"))
|
835
|
+
ExploitObserved.struct_class = Types::ExploitObserved
|
836
|
+
|
767
837
|
ExploitabilityDetails.add_member(:last_known_exploit_at, Shapes::ShapeRef.new(shape: DateTimeTimestamp, location_name: "lastKnownExploitAt"))
|
768
838
|
ExploitabilityDetails.struct_class = Types::ExploitabilityDetails
|
769
839
|
|
@@ -1192,6 +1262,8 @@ module Aws::Inspector2
|
|
1192
1262
|
Recommendation.add_member(:text, Shapes::ShapeRef.new(shape: NonEmptyString, location_name: "text"))
|
1193
1263
|
Recommendation.struct_class = Types::Recommendation
|
1194
1264
|
|
1265
|
+
RelatedVulnerabilities.member = Shapes::ShapeRef.new(shape: RelatedVulnerability)
|
1266
|
+
|
1195
1267
|
Remediation.add_member(:recommendation, Shapes::ShapeRef.new(shape: Recommendation, location_name: "recommendation"))
|
1196
1268
|
Remediation.struct_class = Types::Remediation
|
1197
1269
|
|
@@ -1244,6 +1316,17 @@ module Aws::Inspector2
|
|
1244
1316
|
ScanStatus.add_member(:status_code, Shapes::ShapeRef.new(shape: ScanStatusCode, required: true, location_name: "statusCode"))
|
1245
1317
|
ScanStatus.struct_class = Types::ScanStatus
|
1246
1318
|
|
1319
|
+
SearchVulnerabilitiesFilterCriteria.add_member(:vulnerability_ids, Shapes::ShapeRef.new(shape: VulnIdList, required: true, location_name: "vulnerabilityIds"))
|
1320
|
+
SearchVulnerabilitiesFilterCriteria.struct_class = Types::SearchVulnerabilitiesFilterCriteria
|
1321
|
+
|
1322
|
+
SearchVulnerabilitiesRequest.add_member(:filter_criteria, Shapes::ShapeRef.new(shape: SearchVulnerabilitiesFilterCriteria, required: true, location_name: "filterCriteria"))
|
1323
|
+
SearchVulnerabilitiesRequest.add_member(:next_token, Shapes::ShapeRef.new(shape: NextToken, location_name: "nextToken"))
|
1324
|
+
SearchVulnerabilitiesRequest.struct_class = Types::SearchVulnerabilitiesRequest
|
1325
|
+
|
1326
|
+
SearchVulnerabilitiesResponse.add_member(:next_token, Shapes::ShapeRef.new(shape: NextToken, location_name: "nextToken"))
|
1327
|
+
SearchVulnerabilitiesResponse.add_member(:vulnerabilities, Shapes::ShapeRef.new(shape: Vulnerabilities, required: true, location_name: "vulnerabilities"))
|
1328
|
+
SearchVulnerabilitiesResponse.struct_class = Types::SearchVulnerabilitiesResponse
|
1329
|
+
|
1247
1330
|
SecurityGroupIdList.member = Shapes::ShapeRef.new(shape: SecurityGroupId)
|
1248
1331
|
|
1249
1332
|
ServiceQuotaExceededException.add_member(:message, Shapes::ShapeRef.new(shape: String, required: true, location_name: "message"))
|
@@ -1294,6 +1377,8 @@ module Aws::Inspector2
|
|
1294
1377
|
|
1295
1378
|
TagResourceResponse.struct_class = Types::TagResourceResponse
|
1296
1379
|
|
1380
|
+
Targets.member = Shapes::ShapeRef.new(shape: Target)
|
1381
|
+
|
1297
1382
|
ThrottlingException.add_member(:message, Shapes::ShapeRef.new(shape: String, required: true, location_name: "message"))
|
1298
1383
|
ThrottlingException.add_member(:retry_after_seconds, Shapes::ShapeRef.new(shape: Integer, location: "header", location_name: "Retry-After"))
|
1299
1384
|
ThrottlingException.struct_class = Types::ThrottlingException
|
@@ -1311,6 +1396,8 @@ module Aws::Inspector2
|
|
1311
1396
|
TitleAggregationResponse.add_member(:vulnerability_id, Shapes::ShapeRef.new(shape: String, location_name: "vulnerabilityId"))
|
1312
1397
|
TitleAggregationResponse.struct_class = Types::TitleAggregationResponse
|
1313
1398
|
|
1399
|
+
Ttps.member = Shapes::ShapeRef.new(shape: Ttp)
|
1400
|
+
|
1314
1401
|
UntagResourceRequest.add_member(:resource_arn, Shapes::ShapeRef.new(shape: Arn, required: true, location: "uri", location_name: "resourceArn"))
|
1315
1402
|
UntagResourceRequest.add_member(:tag_keys, Shapes::ShapeRef.new(shape: TagKeyList, required: true, location: "querystring", location_name: "tagKeys"))
|
1316
1403
|
UntagResourceRequest.struct_class = Types::UntagResourceRequest
|
@@ -1381,8 +1468,33 @@ module Aws::Inspector2
|
|
1381
1468
|
|
1382
1469
|
ValidationExceptionFields.member = Shapes::ShapeRef.new(shape: ValidationExceptionField)
|
1383
1470
|
|
1471
|
+
VulnIdList.member = Shapes::ShapeRef.new(shape: VulnId)
|
1472
|
+
|
1473
|
+
Vulnerabilities.member = Shapes::ShapeRef.new(shape: Vulnerability)
|
1474
|
+
|
1475
|
+
Vulnerability.add_member(:atig_data, Shapes::ShapeRef.new(shape: AtigData, location_name: "atigData"))
|
1476
|
+
Vulnerability.add_member(:cisa_data, Shapes::ShapeRef.new(shape: CisaData, location_name: "cisaData"))
|
1477
|
+
Vulnerability.add_member(:cvss2, Shapes::ShapeRef.new(shape: Cvss2, location_name: "cvss2"))
|
1478
|
+
Vulnerability.add_member(:cvss3, Shapes::ShapeRef.new(shape: Cvss3, location_name: "cvss3"))
|
1479
|
+
Vulnerability.add_member(:cwes, Shapes::ShapeRef.new(shape: Cwes, location_name: "cwes"))
|
1480
|
+
Vulnerability.add_member(:description, Shapes::ShapeRef.new(shape: VulnerabilityDescription, location_name: "description"))
|
1481
|
+
Vulnerability.add_member(:detection_platforms, Shapes::ShapeRef.new(shape: DetectionPlatforms, location_name: "detectionPlatforms"))
|
1482
|
+
Vulnerability.add_member(:epss, Shapes::ShapeRef.new(shape: Epss, location_name: "epss"))
|
1483
|
+
Vulnerability.add_member(:exploit_observed, Shapes::ShapeRef.new(shape: ExploitObserved, location_name: "exploitObserved"))
|
1484
|
+
Vulnerability.add_member(:id, Shapes::ShapeRef.new(shape: NonEmptyString, required: true, location_name: "id"))
|
1485
|
+
Vulnerability.add_member(:reference_urls, Shapes::ShapeRef.new(shape: VulnerabilityReferenceUrls, location_name: "referenceUrls"))
|
1486
|
+
Vulnerability.add_member(:related_vulnerabilities, Shapes::ShapeRef.new(shape: RelatedVulnerabilities, location_name: "relatedVulnerabilities"))
|
1487
|
+
Vulnerability.add_member(:source, Shapes::ShapeRef.new(shape: VulnerabilitySource, location_name: "source"))
|
1488
|
+
Vulnerability.add_member(:source_url, Shapes::ShapeRef.new(shape: VulnerabilitySourceUrl, location_name: "sourceUrl"))
|
1489
|
+
Vulnerability.add_member(:vendor_created_at, Shapes::ShapeRef.new(shape: VendorCreatedAt, location_name: "vendorCreatedAt"))
|
1490
|
+
Vulnerability.add_member(:vendor_severity, Shapes::ShapeRef.new(shape: VendorSeverity, location_name: "vendorSeverity"))
|
1491
|
+
Vulnerability.add_member(:vendor_updated_at, Shapes::ShapeRef.new(shape: VendorUpdatedAt, location_name: "vendorUpdatedAt"))
|
1492
|
+
Vulnerability.struct_class = Types::Vulnerability
|
1493
|
+
|
1384
1494
|
VulnerabilityIdList.member = Shapes::ShapeRef.new(shape: VulnerabilityId)
|
1385
1495
|
|
1496
|
+
VulnerabilityReferenceUrls.member = Shapes::ShapeRef.new(shape: VulnerabilityReferenceUrl)
|
1497
|
+
|
1386
1498
|
VulnerablePackage.add_member(:arch, Shapes::ShapeRef.new(shape: PackageArchitecture, location_name: "arch"))
|
1387
1499
|
VulnerablePackage.add_member(:epoch, Shapes::ShapeRef.new(shape: PackageEpoch, location_name: "epoch"))
|
1388
1500
|
VulnerablePackage.add_member(:file_path, Shapes::ShapeRef.new(shape: FilePath, location_name: "filePath"))
|
@@ -1840,6 +1952,23 @@ module Aws::Inspector2
|
|
1840
1952
|
)
|
1841
1953
|
end)
|
1842
1954
|
|
1955
|
+
api.add_operation(:search_vulnerabilities, Seahorse::Model::Operation.new.tap do |o|
|
1956
|
+
o.name = "SearchVulnerabilities"
|
1957
|
+
o.http_method = "POST"
|
1958
|
+
o.http_request_uri = "/vulnerabilities/search"
|
1959
|
+
o.input = Shapes::ShapeRef.new(shape: SearchVulnerabilitiesRequest)
|
1960
|
+
o.output = Shapes::ShapeRef.new(shape: SearchVulnerabilitiesResponse)
|
1961
|
+
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1962
|
+
o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
|
1963
|
+
o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
|
1964
|
+
o.errors << Shapes::ShapeRef.new(shape: InternalServerException)
|
1965
|
+
o[:pager] = Aws::Pager.new(
|
1966
|
+
tokens: {
|
1967
|
+
"next_token" => "next_token"
|
1968
|
+
}
|
1969
|
+
)
|
1970
|
+
end)
|
1971
|
+
|
1843
1972
|
api.add_operation(:tag_resource, Seahorse::Model::Operation.new.tap do |o|
|
1844
1973
|
o.name = "TagResource"
|
1845
1974
|
o.http_method = "POST"
|
@@ -431,6 +431,20 @@ module Aws::Inspector2
|
|
431
431
|
end
|
432
432
|
end
|
433
433
|
|
434
|
+
class SearchVulnerabilities
|
435
|
+
def self.build(context)
|
436
|
+
unless context.config.regional_endpoint
|
437
|
+
endpoint = context.config.endpoint.to_s
|
438
|
+
end
|
439
|
+
Aws::Inspector2::EndpointParameters.new(
|
440
|
+
region: context.config.region,
|
441
|
+
use_dual_stack: context.config.use_dualstack_endpoint,
|
442
|
+
use_fips: context.config.use_fips_endpoint,
|
443
|
+
endpoint: endpoint,
|
444
|
+
)
|
445
|
+
end
|
446
|
+
end
|
447
|
+
|
434
448
|
class TagResource
|
435
449
|
def self.build(context)
|
436
450
|
unless context.config.regional_endpoint
|
@@ -116,6 +116,8 @@ module Aws::Inspector2
|
|
116
116
|
Aws::Inspector2::Endpoints::ListTagsForResource.build(context)
|
117
117
|
when :list_usage_totals
|
118
118
|
Aws::Inspector2::Endpoints::ListUsageTotals.build(context)
|
119
|
+
when :search_vulnerabilities
|
120
|
+
Aws::Inspector2::Endpoints::SearchVulnerabilities.build(context)
|
119
121
|
when :tag_resource
|
120
122
|
Aws::Inspector2::Endpoints::TagResource.build(context)
|
121
123
|
when :untag_resource
|
@@ -384,6 +384,41 @@ module Aws::Inspector2
|
|
384
384
|
include Aws::Structure
|
385
385
|
end
|
386
386
|
|
387
|
+
# The Amazon Web Services Threat Intel Group (ATIG) details for a
|
388
|
+
# specific vulnerability.
|
389
|
+
#
|
390
|
+
# @!attribute [rw] first_seen
|
391
|
+
# The date and time this vulnerability was first observed.
|
392
|
+
# @return [Time]
|
393
|
+
#
|
394
|
+
# @!attribute [rw] last_seen
|
395
|
+
# The date and time this vulnerability was last observed.
|
396
|
+
# @return [Time]
|
397
|
+
#
|
398
|
+
# @!attribute [rw] targets
|
399
|
+
# The commercial sectors this vulnerability targets.
|
400
|
+
# @return [Array<String>]
|
401
|
+
#
|
402
|
+
# @!attribute [rw] ttps
|
403
|
+
# The [MITRE ATT&CK][1] tactics, techniques, and procedures (TTPs)
|
404
|
+
# associated with vulnerability.
|
405
|
+
#
|
406
|
+
#
|
407
|
+
#
|
408
|
+
# [1]: https://attack.mitre.org/
|
409
|
+
# @return [Array<String>]
|
410
|
+
#
|
411
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/AtigData AWS API Documentation
|
412
|
+
#
|
413
|
+
class AtigData < Struct.new(
|
414
|
+
:first_seen,
|
415
|
+
:last_seen,
|
416
|
+
:targets,
|
417
|
+
:ttps)
|
418
|
+
SENSITIVE = []
|
419
|
+
include Aws::Structure
|
420
|
+
end
|
421
|
+
|
387
422
|
# Represents which scan types are automatically enabled for new members
|
388
423
|
# of your Amazon Inspector organization.
|
389
424
|
#
|
@@ -850,6 +885,32 @@ module Aws::Inspector2
|
|
850
885
|
include Aws::Structure
|
851
886
|
end
|
852
887
|
|
888
|
+
# The Cybersecurity and Infrastructure Security Agency (CISA) details
|
889
|
+
# for a specific vulnerability.
|
890
|
+
#
|
891
|
+
# @!attribute [rw] action
|
892
|
+
# The remediation action recommended by CISA for this vulnerability.
|
893
|
+
# @return [String]
|
894
|
+
#
|
895
|
+
# @!attribute [rw] date_added
|
896
|
+
# The date and time CISA added this vulnerability to their catalogue.
|
897
|
+
# @return [Time]
|
898
|
+
#
|
899
|
+
# @!attribute [rw] date_due
|
900
|
+
# The date and time CISA expects a fix to have been provided
|
901
|
+
# vulnerability.
|
902
|
+
# @return [Time]
|
903
|
+
#
|
904
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/CisaData AWS API Documentation
|
905
|
+
#
|
906
|
+
class CisaData < Struct.new(
|
907
|
+
:action,
|
908
|
+
:date_added,
|
909
|
+
:date_due)
|
910
|
+
SENSITIVE = []
|
911
|
+
include Aws::Structure
|
912
|
+
end
|
913
|
+
|
853
914
|
# A conflict occurred.
|
854
915
|
#
|
855
916
|
# @!attribute [rw] message
|
@@ -1140,6 +1201,46 @@ module Aws::Inspector2
|
|
1140
1201
|
include Aws::Structure
|
1141
1202
|
end
|
1142
1203
|
|
1204
|
+
# The Common Vulnerability Scoring System (CVSS) version 2 details for
|
1205
|
+
# the vulnerability.
|
1206
|
+
#
|
1207
|
+
# @!attribute [rw] base_score
|
1208
|
+
# The CVSS v2 base score for the vulnerability.
|
1209
|
+
# @return [Float]
|
1210
|
+
#
|
1211
|
+
# @!attribute [rw] scoring_vector
|
1212
|
+
# The scoring vector associated with the CVSS v2 score.
|
1213
|
+
# @return [String]
|
1214
|
+
#
|
1215
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/Cvss2 AWS API Documentation
|
1216
|
+
#
|
1217
|
+
class Cvss2 < Struct.new(
|
1218
|
+
:base_score,
|
1219
|
+
:scoring_vector)
|
1220
|
+
SENSITIVE = []
|
1221
|
+
include Aws::Structure
|
1222
|
+
end
|
1223
|
+
|
1224
|
+
# The Common Vulnerability Scoring System (CVSS) version 3 details for
|
1225
|
+
# the vulnerability.
|
1226
|
+
#
|
1227
|
+
# @!attribute [rw] base_score
|
1228
|
+
# The CVSS v3 base score for the vulnerability.
|
1229
|
+
# @return [Float]
|
1230
|
+
#
|
1231
|
+
# @!attribute [rw] scoring_vector
|
1232
|
+
# The scoring vector associated with the CVSS v3 score.
|
1233
|
+
# @return [String]
|
1234
|
+
#
|
1235
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/Cvss3 AWS API Documentation
|
1236
|
+
#
|
1237
|
+
class Cvss3 < Struct.new(
|
1238
|
+
:base_score,
|
1239
|
+
:scoring_vector)
|
1240
|
+
SENSITIVE = []
|
1241
|
+
include Aws::Structure
|
1242
|
+
end
|
1243
|
+
|
1143
1244
|
# The CVSS score for a finding.
|
1144
1245
|
#
|
1145
1246
|
# @!attribute [rw] base_score
|
@@ -1743,6 +1844,39 @@ module Aws::Inspector2
|
|
1743
1844
|
include Aws::Structure
|
1744
1845
|
end
|
1745
1846
|
|
1847
|
+
# Details about the Exploit Prediction Scoring System (EPSS) score.
|
1848
|
+
#
|
1849
|
+
# @!attribute [rw] score
|
1850
|
+
# The Exploit Prediction Scoring System (EPSS) score.
|
1851
|
+
# @return [Float]
|
1852
|
+
#
|
1853
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/Epss AWS API Documentation
|
1854
|
+
#
|
1855
|
+
class Epss < Struct.new(
|
1856
|
+
:score)
|
1857
|
+
SENSITIVE = []
|
1858
|
+
include Aws::Structure
|
1859
|
+
end
|
1860
|
+
|
1861
|
+
# Contains information on when this exploit was observed.
|
1862
|
+
#
|
1863
|
+
# @!attribute [rw] first_seen
|
1864
|
+
# The date an time when the exploit was first seen.
|
1865
|
+
# @return [Time]
|
1866
|
+
#
|
1867
|
+
# @!attribute [rw] last_seen
|
1868
|
+
# The date an time when the exploit was last seen.
|
1869
|
+
# @return [Time]
|
1870
|
+
#
|
1871
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/ExploitObserved AWS API Documentation
|
1872
|
+
#
|
1873
|
+
class ExploitObserved < Struct.new(
|
1874
|
+
:first_seen,
|
1875
|
+
:last_seen)
|
1876
|
+
SENSITIVE = []
|
1877
|
+
include Aws::Structure
|
1878
|
+
end
|
1879
|
+
|
1746
1880
|
# The details of an exploit available for a finding discovered in your
|
1747
1881
|
# environment.
|
1748
1882
|
#
|
@@ -3960,6 +4094,60 @@ module Aws::Inspector2
|
|
3960
4094
|
include Aws::Structure
|
3961
4095
|
end
|
3962
4096
|
|
4097
|
+
# Details on the criteria used to define the filter for a vulnerability
|
4098
|
+
# search.
|
4099
|
+
#
|
4100
|
+
# @!attribute [rw] vulnerability_ids
|
4101
|
+
# The IDs for specific vulnerabilities.
|
4102
|
+
# @return [Array<String>]
|
4103
|
+
#
|
4104
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/SearchVulnerabilitiesFilterCriteria AWS API Documentation
|
4105
|
+
#
|
4106
|
+
class SearchVulnerabilitiesFilterCriteria < Struct.new(
|
4107
|
+
:vulnerability_ids)
|
4108
|
+
SENSITIVE = []
|
4109
|
+
include Aws::Structure
|
4110
|
+
end
|
4111
|
+
|
4112
|
+
# @!attribute [rw] filter_criteria
|
4113
|
+
# The criteria used to filter the results of a vulnerability search.
|
4114
|
+
# @return [Types::SearchVulnerabilitiesFilterCriteria]
|
4115
|
+
#
|
4116
|
+
# @!attribute [rw] next_token
|
4117
|
+
# A token to use for paginating results that are returned in the
|
4118
|
+
# response. Set the value of this parameter to null for the first
|
4119
|
+
# request to a list action. For subsequent calls, use the `NextToken`
|
4120
|
+
# value returned from the previous request to continue listing results
|
4121
|
+
# after the first page.
|
4122
|
+
# @return [String]
|
4123
|
+
#
|
4124
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/SearchVulnerabilitiesRequest AWS API Documentation
|
4125
|
+
#
|
4126
|
+
class SearchVulnerabilitiesRequest < Struct.new(
|
4127
|
+
:filter_criteria,
|
4128
|
+
:next_token)
|
4129
|
+
SENSITIVE = []
|
4130
|
+
include Aws::Structure
|
4131
|
+
end
|
4132
|
+
|
4133
|
+
# @!attribute [rw] next_token
|
4134
|
+
# The pagination parameter to be used on the next list operation to
|
4135
|
+
# retrieve more items.
|
4136
|
+
# @return [String]
|
4137
|
+
#
|
4138
|
+
# @!attribute [rw] vulnerabilities
|
4139
|
+
# Details about the listed vulnerability.
|
4140
|
+
# @return [Array<Types::Vulnerability>]
|
4141
|
+
#
|
4142
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/SearchVulnerabilitiesResponse AWS API Documentation
|
4143
|
+
#
|
4144
|
+
class SearchVulnerabilitiesResponse < Struct.new(
|
4145
|
+
:next_token,
|
4146
|
+
:vulnerabilities)
|
4147
|
+
SENSITIVE = []
|
4148
|
+
include Aws::Structure
|
4149
|
+
end
|
4150
|
+
|
3963
4151
|
# You have exceeded your service quota. To perform the requested action,
|
3964
4152
|
# remove some of the relevant resources, or use Service Quotas to
|
3965
4153
|
# request a service quota increase.
|
@@ -4476,6 +4664,108 @@ module Aws::Inspector2
|
|
4476
4664
|
include Aws::Structure
|
4477
4665
|
end
|
4478
4666
|
|
4667
|
+
# Contains details about a specific vulnerability Amazon Inspector can
|
4668
|
+
# detect.
|
4669
|
+
#
|
4670
|
+
# @!attribute [rw] atig_data
|
4671
|
+
# An object that contains information about the Amazon Web Services
|
4672
|
+
# Threat Intel Group (ATIG) details for the vulnerability.
|
4673
|
+
# @return [Types::AtigData]
|
4674
|
+
#
|
4675
|
+
# @!attribute [rw] cisa_data
|
4676
|
+
# An object that contains the Cybersecurity and Infrastructure
|
4677
|
+
# Security Agency (CISA) details for the vulnerability.
|
4678
|
+
# @return [Types::CisaData]
|
4679
|
+
#
|
4680
|
+
# @!attribute [rw] cvss2
|
4681
|
+
# An object that contains the Common Vulnerability Scoring System
|
4682
|
+
# (CVSS) Version 2 details for the vulnerability.
|
4683
|
+
# @return [Types::Cvss2]
|
4684
|
+
#
|
4685
|
+
# @!attribute [rw] cvss3
|
4686
|
+
# An object that contains the Common Vulnerability Scoring System
|
4687
|
+
# (CVSS) Version 3 details for the vulnerability.
|
4688
|
+
# @return [Types::Cvss3]
|
4689
|
+
#
|
4690
|
+
# @!attribute [rw] cwes
|
4691
|
+
# The Common Weakness Enumeration (CWE) associated with the
|
4692
|
+
# vulnerability.
|
4693
|
+
# @return [Array<String>]
|
4694
|
+
#
|
4695
|
+
# @!attribute [rw] description
|
4696
|
+
# A description of the vulnerability.
|
4697
|
+
# @return [String]
|
4698
|
+
#
|
4699
|
+
# @!attribute [rw] detection_platforms
|
4700
|
+
# Platforms that the vulnerability can be detected on.
|
4701
|
+
# @return [Array<String>]
|
4702
|
+
#
|
4703
|
+
# @!attribute [rw] epss
|
4704
|
+
# An object that contains the Exploit Prediction Scoring System (EPSS)
|
4705
|
+
# score.
|
4706
|
+
# @return [Types::Epss]
|
4707
|
+
#
|
4708
|
+
# @!attribute [rw] exploit_observed
|
4709
|
+
# An object that contains details on when the exploit was observed.
|
4710
|
+
# @return [Types::ExploitObserved]
|
4711
|
+
#
|
4712
|
+
# @!attribute [rw] id
|
4713
|
+
# The ID for the specific vulnerability.
|
4714
|
+
# @return [String]
|
4715
|
+
#
|
4716
|
+
# @!attribute [rw] reference_urls
|
4717
|
+
# Links to various resources with more information on this
|
4718
|
+
# vulnerability.
|
4719
|
+
# @return [Array<String>]
|
4720
|
+
#
|
4721
|
+
# @!attribute [rw] related_vulnerabilities
|
4722
|
+
# A list of related vulnerabilities.
|
4723
|
+
# @return [Array<String>]
|
4724
|
+
#
|
4725
|
+
# @!attribute [rw] source
|
4726
|
+
# The source of the vulnerability information.
|
4727
|
+
# @return [String]
|
4728
|
+
#
|
4729
|
+
# @!attribute [rw] source_url
|
4730
|
+
# A link to the official source material for this vulnerability.
|
4731
|
+
# @return [String]
|
4732
|
+
#
|
4733
|
+
# @!attribute [rw] vendor_created_at
|
4734
|
+
# The date and time when the vendor created this vulnerability.
|
4735
|
+
# @return [Time]
|
4736
|
+
#
|
4737
|
+
# @!attribute [rw] vendor_severity
|
4738
|
+
# The severity assigned by the vendor.
|
4739
|
+
# @return [String]
|
4740
|
+
#
|
4741
|
+
# @!attribute [rw] vendor_updated_at
|
4742
|
+
# The date and time when the vendor last updated this vulnerability.
|
4743
|
+
# @return [Time]
|
4744
|
+
#
|
4745
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/Vulnerability AWS API Documentation
|
4746
|
+
#
|
4747
|
+
class Vulnerability < Struct.new(
|
4748
|
+
:atig_data,
|
4749
|
+
:cisa_data,
|
4750
|
+
:cvss2,
|
4751
|
+
:cvss3,
|
4752
|
+
:cwes,
|
4753
|
+
:description,
|
4754
|
+
:detection_platforms,
|
4755
|
+
:epss,
|
4756
|
+
:exploit_observed,
|
4757
|
+
:id,
|
4758
|
+
:reference_urls,
|
4759
|
+
:related_vulnerabilities,
|
4760
|
+
:source,
|
4761
|
+
:source_url,
|
4762
|
+
:vendor_created_at,
|
4763
|
+
:vendor_severity,
|
4764
|
+
:vendor_updated_at)
|
4765
|
+
SENSITIVE = []
|
4766
|
+
include Aws::Structure
|
4767
|
+
end
|
4768
|
+
|
4479
4769
|
# Information on the vulnerable package identified by a finding.
|
4480
4770
|
#
|
4481
4771
|
# @!attribute [rw] arch
|
data/lib/aws-sdk-inspector2.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-inspector2
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.12.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2023-05-
|
11
|
+
date: 2023-05-05 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|