@aws-sdk/client-securityhub 3.391.0 → 3.398.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (42) hide show
  1. package/README.md +4 -2
  2. package/dist-cjs/SecurityHubClient.js +4 -2
  3. package/dist-cjs/endpoint/ruleset.js +1 -1
  4. package/dist-cjs/extensionConfiguration.js +2 -0
  5. package/dist-cjs/models/models_1.js +5 -8
  6. package/dist-cjs/models/models_2.js +8 -1
  7. package/dist-cjs/protocols/Aws_restJson1.js +8 -0
  8. package/dist-cjs/runtimeConfig.shared.js +1 -0
  9. package/dist-cjs/runtimeExtensions.js +16 -0
  10. package/dist-es/SecurityHubClient.js +4 -2
  11. package/dist-es/endpoint/ruleset.js +1 -1
  12. package/dist-es/extensionConfiguration.js +1 -0
  13. package/dist-es/models/models_1.js +4 -7
  14. package/dist-es/models/models_2.js +7 -0
  15. package/dist-es/protocols/Aws_restJson1.js +8 -0
  16. package/dist-es/runtimeConfig.shared.js +1 -0
  17. package/dist-es/runtimeExtensions.js +12 -0
  18. package/dist-types/SecurityHub.d.ts +4 -2
  19. package/dist-types/SecurityHubClient.d.ts +10 -3
  20. package/dist-types/commands/BatchImportFindingsCommand.d.ts +22 -3
  21. package/dist-types/commands/DeleteMembersCommand.d.ts +2 -2
  22. package/dist-types/commands/DisableSecurityHubCommand.d.ts +2 -3
  23. package/dist-types/commands/GetFindingsCommand.d.ts +22 -3
  24. package/dist-types/extensionConfiguration.d.ts +6 -0
  25. package/dist-types/index.d.ts +4 -2
  26. package/dist-types/models/models_1.d.ts +110 -189
  27. package/dist-types/models/models_2.d.ts +218 -2
  28. package/dist-types/runtimeConfig.browser.d.ts +1 -0
  29. package/dist-types/runtimeConfig.d.ts +1 -0
  30. package/dist-types/runtimeConfig.native.d.ts +1 -0
  31. package/dist-types/runtimeConfig.shared.d.ts +1 -0
  32. package/dist-types/runtimeExtensions.d.ts +17 -0
  33. package/dist-types/ts3.4/SecurityHubClient.d.ts +3 -0
  34. package/dist-types/ts3.4/extensionConfiguration.d.ts +3 -0
  35. package/dist-types/ts3.4/models/models_1.d.ts +22 -34
  36. package/dist-types/ts3.4/models/models_2.d.ts +44 -3
  37. package/dist-types/ts3.4/runtimeConfig.browser.d.ts +1 -0
  38. package/dist-types/ts3.4/runtimeConfig.d.ts +1 -0
  39. package/dist-types/ts3.4/runtimeConfig.native.d.ts +1 -0
  40. package/dist-types/ts3.4/runtimeConfig.shared.d.ts +1 -0
  41. package/dist-types/ts3.4/runtimeExtensions.d.ts +11 -0
  42. package/package.json +29 -29
@@ -1,4 +1,4 @@
1
- import { Adjustment, AssociatedStandard, AvailabilityZone, AwsAmazonMqBrokerDetails, AwsApiGatewayRestApiDetails, AwsApiGatewayStageDetails, AwsApiGatewayV2ApiDetails, AwsApiGatewayV2StageDetails, AwsAppSyncGraphQlApiDetails, AwsAthenaWorkGroupDetails, AwsAutoScalingAutoScalingGroupDetails, AwsAutoScalingLaunchConfigurationDetails, AwsBackupBackupPlanDetails, AwsBackupBackupVaultDetails, AwsBackupRecoveryPointDetails, AwsCertificateManagerCertificateDetails, AwsCloudFormationStackDetails, AwsCloudFrontDistributionDetails, AwsCloudTrailTrailDetails, AwsCloudWatchAlarmDetails, AwsCodeBuildProjectDetails, AwsDynamoDbTableDetails, AwsEc2EipDetails, AwsEc2InstanceDetails, AwsEc2LaunchTemplateDetails, AwsEc2NetworkAclDetails, AwsEc2NetworkInterfaceDetails, AwsEc2RouteTableDetails, AwsEc2SecurityGroupDetails, AwsEc2SubnetDetails, AwsEc2TransitGatewayDetails, AwsEc2VolumeDetails, AwsEc2VpcDetails, AwsEc2VpcEndpointServiceDetails, AwsEc2VpcPeeringConnectionDetails, AwsEc2VpnConnectionDetails, AwsEcrContainerImageDetails, AwsEcrRepositoryDetails, AwsEcsClusterDetails, AwsEcsContainerDetails, AwsEcsServiceDetails, AwsEcsTaskDefinitionDetails, AwsEcsTaskDetails, AwsEfsAccessPointPosixUserDetails, AwsEfsAccessPointRootDirectoryCreationInfoDetails, RelatedFinding, SeverityLabel, WorkflowStatus } from "./models_0";
1
+ import { Adjustment, AssociatedStandard, AvailabilityZone, AwsAmazonMqBrokerDetails, AwsApiGatewayRestApiDetails, AwsApiGatewayStageDetails, AwsApiGatewayV2ApiDetails, AwsApiGatewayV2StageDetails, AwsAppSyncGraphQlApiDetails, AwsAthenaWorkGroupDetails, AwsAutoScalingAutoScalingGroupDetails, AwsAutoScalingLaunchConfigurationDetails, AwsBackupBackupPlanDetails, AwsBackupBackupVaultDetails, AwsBackupRecoveryPointDetails, AwsCertificateManagerCertificateDetails, AwsCloudFormationStackDetails, AwsCloudFrontDistributionDetails, AwsCloudTrailTrailDetails, AwsCloudWatchAlarmDetails, AwsCodeBuildProjectDetails, AwsDynamoDbTableDetails, AwsEc2EipDetails, AwsEc2InstanceDetails, AwsEc2LaunchTemplateDetails, AwsEc2NetworkAclDetails, AwsEc2NetworkInterfaceDetails, AwsEc2RouteTableDetails, AwsEc2SecurityGroupDetails, AwsEc2SubnetDetails, AwsEc2TransitGatewayDetails, AwsEc2VolumeDetails, AwsEc2VpcDetails, AwsEc2VpcEndpointServiceDetails, AwsEc2VpcPeeringConnectionDetails, AwsEc2VpnConnectionDetails, AwsEcrContainerImageDetails, AwsEcrRepositoryDetails, AwsEcsClusterDetails, AwsEcsContainerDetails, AwsEcsServiceDetails, AwsEcsTaskDefinitionDetails, AwsEcsTaskDetails, AwsEfsAccessPointPosixUserDetails, AwsEfsAccessPointRootDirectoryCreationInfoDetails, RelatedFinding, SeverityLabel } from "./models_0";
2
2
  /**
3
3
  * @public
4
4
  * <p>Provides information about the directory on the Amazon EFS file system that the access point exposes
@@ -6888,6 +6888,38 @@ export interface FindingProviderFields {
6888
6888
  */
6889
6889
  Types?: string[];
6890
6890
  }
6891
+ /**
6892
+ * @public
6893
+ * <p>
6894
+ * Provides metadata for the Amazon CodeGuru detector associated with a finding. This field pertains to
6895
+ * findings that relate to Lambda functions. Amazon Inspector identifies policy violations and
6896
+ * vulnerabilities in Lambda function code based on internal detectors developed
6897
+ * in collaboration with Amazon CodeGuru. Security Hub receives those findings.
6898
+ * </p>
6899
+ */
6900
+ export interface GeneratorDetails {
6901
+ /**
6902
+ * @public
6903
+ * <p>
6904
+ * The name of the detector used to identify the code vulnerability.
6905
+ * </p>
6906
+ */
6907
+ Name?: string;
6908
+ /**
6909
+ * @public
6910
+ * <p>
6911
+ * The description of the detector used to identify the code vulnerability.
6912
+ * </p>
6913
+ */
6914
+ Description?: string;
6915
+ /**
6916
+ * @public
6917
+ * <p>
6918
+ * An array of tags used to identify the detector associated with the finding.
6919
+ * </p>
6920
+ */
6921
+ Labels?: string[];
6922
+ }
6891
6923
  /**
6892
6924
  * @public
6893
6925
  * @enum
@@ -10066,6 +10098,71 @@ export interface Threat {
10066
10098
  */
10067
10099
  FilePaths?: FilePaths[];
10068
10100
  }
10101
+ /**
10102
+ * @public
10103
+ * <p>
10104
+ * Provides details about where a code vulnerability is located in your Lambda function.
10105
+ * </p>
10106
+ */
10107
+ export interface CodeVulnerabilitiesFilePath {
10108
+ /**
10109
+ * @public
10110
+ * <p>
10111
+ * The line number of the last line of code in which the vulnerability is located.
10112
+ * </p>
10113
+ */
10114
+ EndLine?: number;
10115
+ /**
10116
+ * @public
10117
+ * <p>
10118
+ * The name of the file in which the code vulnerability is located.
10119
+ * </p>
10120
+ */
10121
+ FileName?: string;
10122
+ /**
10123
+ * @public
10124
+ * <p>
10125
+ * The file path to the code in which the vulnerability is located.
10126
+ * </p>
10127
+ */
10128
+ FilePath?: string;
10129
+ /**
10130
+ * @public
10131
+ * <p>
10132
+ * The line number of the first line of code in which the vulnerability is located.
10133
+ * </p>
10134
+ */
10135
+ StartLine?: number;
10136
+ }
10137
+ /**
10138
+ * @public
10139
+ * <p>Provides details about the vulnerabilities found in your Lambda function code. This field pertains to findings that
10140
+ * Security Hub receives from Amazon Inspector.
10141
+ * </p>
10142
+ */
10143
+ export interface VulnerabilityCodeVulnerabilities {
10144
+ /**
10145
+ * @public
10146
+ * <p>
10147
+ * The Common Weakness Enumeration (CWE) item associated with the detected code vulnerability.
10148
+ * </p>
10149
+ */
10150
+ Cwes?: string[];
10151
+ /**
10152
+ * @public
10153
+ * <p>
10154
+ * Provides details about where a code vulnerability is located in your Lambda function.
10155
+ * </p>
10156
+ */
10157
+ FilePath?: CodeVulnerabilitiesFilePath;
10158
+ /**
10159
+ * @public
10160
+ * <p>
10161
+ * The Amazon Resource Name (ARN) of the Lambda layer in which the code vulnerability is located.
10162
+ * </p>
10163
+ */
10164
+ SourceArn?: string;
10165
+ }
10069
10166
  /**
10070
10167
  * @public
10071
10168
  * <p>CVSS scores from the advisory related to the vulnerability.</p>
@@ -10097,6 +10194,18 @@ export interface Cvss {
10097
10194
  */
10098
10195
  Adjustments?: Adjustment[];
10099
10196
  }
10197
+ /**
10198
+ * @public
10199
+ * @enum
10200
+ */
10201
+ export declare const VulnerabilityExploitAvailable: {
10202
+ readonly NO: "NO";
10203
+ readonly YES: "YES";
10204
+ };
10205
+ /**
10206
+ * @public
10207
+ */
10208
+ export type VulnerabilityExploitAvailable = (typeof VulnerabilityExploitAvailable)[keyof typeof VulnerabilityExploitAvailable];
10100
10209
  /**
10101
10210
  * @public
10102
10211
  * @enum
@@ -10147,191 +10256,3 @@ export interface VulnerabilityVendor {
10147
10256
  */
10148
10257
  VendorUpdatedAt?: string;
10149
10258
  }
10150
- /**
10151
- * @public
10152
- * <p>Information about a software package.</p>
10153
- */
10154
- export interface SoftwarePackage {
10155
- /**
10156
- * @public
10157
- * <p>The name of the software package.</p>
10158
- */
10159
- Name?: string;
10160
- /**
10161
- * @public
10162
- * <p>The version of the software package.</p>
10163
- */
10164
- Version?: string;
10165
- /**
10166
- * @public
10167
- * <p>The epoch of the software package.</p>
10168
- */
10169
- Epoch?: string;
10170
- /**
10171
- * @public
10172
- * <p>The release of the software package.</p>
10173
- */
10174
- Release?: string;
10175
- /**
10176
- * @public
10177
- * <p>The architecture used for the software package.</p>
10178
- */
10179
- Architecture?: string;
10180
- /**
10181
- * @public
10182
- * <p>The source of the package.</p>
10183
- */
10184
- PackageManager?: string;
10185
- /**
10186
- * @public
10187
- * <p>The file system path to the package manager inventory file.</p>
10188
- */
10189
- FilePath?: string;
10190
- /**
10191
- * @public
10192
- * <p>The version of the software package in which the vulnerability has been resolved.
10193
- * </p>
10194
- */
10195
- FixedInVersion?: string;
10196
- /**
10197
- * @public
10198
- * <p>Describes the actions a customer can take to resolve the vulnerability in the software package.
10199
- * </p>
10200
- */
10201
- Remediation?: string;
10202
- /**
10203
- * @public
10204
- * <p>The source layer hash of the vulnerable package.
10205
- * </p>
10206
- */
10207
- SourceLayerHash?: string;
10208
- /**
10209
- * @public
10210
- * <p>The Amazon Resource Name (ARN) of the source layer.
10211
- * </p>
10212
- */
10213
- SourceLayerArn?: string;
10214
- }
10215
- /**
10216
- * @public
10217
- * <p>A vulnerability associated with a finding.</p>
10218
- */
10219
- export interface Vulnerability {
10220
- /**
10221
- * @public
10222
- * <p>The identifier of the vulnerability.</p>
10223
- */
10224
- Id: string | undefined;
10225
- /**
10226
- * @public
10227
- * <p>List of software packages that have the vulnerability.</p>
10228
- */
10229
- VulnerablePackages?: SoftwarePackage[];
10230
- /**
10231
- * @public
10232
- * <p>CVSS scores from the advisory related to the vulnerability.</p>
10233
- */
10234
- Cvss?: Cvss[];
10235
- /**
10236
- * @public
10237
- * <p>List of vulnerabilities that are related to this vulnerability.</p>
10238
- */
10239
- RelatedVulnerabilities?: string[];
10240
- /**
10241
- * @public
10242
- * <p>Information about the vendor that generates the vulnerability report.</p>
10243
- */
10244
- Vendor?: VulnerabilityVendor;
10245
- /**
10246
- * @public
10247
- * <p>A list of URLs that provide additional information about the vulnerability.</p>
10248
- */
10249
- ReferenceUrls?: string[];
10250
- /**
10251
- * @public
10252
- * <p>Specifies if all vulnerable packages in a finding have a value for <code>FixedInVersion</code>
10253
- * and <code>Remediation</code>.
10254
- * This field is evaluated for each vulnerability <code>Id</code> based on the number of vulnerable packages that have a value for both
10255
- * <code>FixedInVersion</code> and <code>Remediation</code>. Valid values are as follows:</p>
10256
- * <ul>
10257
- * <li>
10258
- * <p>
10259
- * <code>YES</code> if all vulnerable packages have a value for both <code>FixedInVersion</code> and <code>Remediation</code>
10260
- * </p>
10261
- * </li>
10262
- * <li>
10263
- * <p>
10264
- * <code>NO</code> if no vulnerable packages have a value for <code>FixedInVersion</code> and <code>Remediation</code>
10265
- * </p>
10266
- * </li>
10267
- * <li>
10268
- * <p>
10269
- * <code>PARTIAL</code> otherwise</p>
10270
- * </li>
10271
- * </ul>
10272
- */
10273
- FixAvailable?: VulnerabilityFixAvailable | string;
10274
- }
10275
- /**
10276
- * @public
10277
- * <p>Provides information about the status of the investigation into a finding.</p>
10278
- */
10279
- export interface Workflow {
10280
- /**
10281
- * @public
10282
- * <p>The status of the investigation into the finding. The workflow status is specific to an individual finding. It does not affect the generation of new findings. For example, setting the workflow status to <code>SUPPRESSED</code> or <code>RESOLVED</code> does not prevent a new finding for the same issue.</p>
10283
- * <p>The allowed values are the following.</p>
10284
- * <ul>
10285
- * <li>
10286
- * <p>
10287
- * <code>NEW</code> - The initial state of a finding, before it is reviewed.</p>
10288
- * <p>Security Hub also resets the workflow status from <code>NOTIFIED</code> or
10289
- * <code>RESOLVED</code> to <code>NEW</code> in the following cases:</p>
10290
- * <ul>
10291
- * <li>
10292
- * <p>
10293
- * <code>RecordState</code> changes from <code>ARCHIVED</code> to
10294
- * <code>ACTIVE</code>.</p>
10295
- * </li>
10296
- * <li>
10297
- * <p>
10298
- * <code>ComplianceStatus</code> changes from <code>PASSED</code> to either
10299
- * <code>WARNING</code>, <code>FAILED</code>, or
10300
- * <code>NOT_AVAILABLE</code>.</p>
10301
- * </li>
10302
- * </ul>
10303
- * </li>
10304
- * <li>
10305
- * <p>
10306
- * <code>NOTIFIED</code> - Indicates that you notified the resource owner about the
10307
- * security issue. Used when the initial reviewer is not the resource owner, and needs
10308
- * intervention from the resource owner.</p>
10309
- * </li>
10310
- * <li>
10311
- * <p>
10312
- * <code>SUPPRESSED</code> - Indicates that you reviewed the finding and do not believe that any action is needed. The finding is no longer updated.</p>
10313
- * </li>
10314
- * <li>
10315
- * <p>
10316
- * <code>RESOLVED</code> - The finding was reviewed and remediated and is now
10317
- * considered resolved. </p>
10318
- * </li>
10319
- * </ul>
10320
- */
10321
- Status?: WorkflowStatus | string;
10322
- }
10323
- /**
10324
- * @public
10325
- * @enum
10326
- */
10327
- export declare const WorkflowState: {
10328
- readonly ASSIGNED: "ASSIGNED";
10329
- readonly DEFERRED: "DEFERRED";
10330
- readonly IN_PROGRESS: "IN_PROGRESS";
10331
- readonly NEW: "NEW";
10332
- readonly RESOLVED: "RESOLVED";
10333
- };
10334
- /**
10335
- * @public
10336
- */
10337
- export type WorkflowState = (typeof WorkflowState)[keyof typeof WorkflowState];
@@ -1,7 +1,214 @@
1
1
  import { ExceptionOptionType as __ExceptionOptionType } from "@smithy/smithy-client";
2
- import { AccountDetails, Action, ActionTarget, AdminAccount, AssociationStatus, AutoEnableStandards, AutomationRulesAction, AutomationRulesConfig, AutomationRulesFindingFilters, AutomationRulesMetadata, DateFilter, MapFilter, NoteUpdate, NumberFilter, RelatedFinding, RuleStatus, SeverityUpdate, StringFilter, VerificationState, WorkflowUpdate } from "./models_0";
3
- import { Compliance, FindingProviderFields, Malware, Network, NetworkPathComponent, Note, PatchSummary, ProcessDetails, RecordState, Remediation, Resource, Severity, Threat, ThreatIntelIndicator, Vulnerability, Workflow, WorkflowState } from "./models_1";
2
+ import { AccountDetails, Action, ActionTarget, AdminAccount, AssociationStatus, AutoEnableStandards, AutomationRulesAction, AutomationRulesConfig, AutomationRulesFindingFilters, AutomationRulesMetadata, DateFilter, MapFilter, NoteUpdate, NumberFilter, RelatedFinding, RuleStatus, SeverityUpdate, StringFilter, VerificationState, WorkflowStatus, WorkflowUpdate } from "./models_0";
3
+ import { Compliance, Cvss, FindingProviderFields, GeneratorDetails, Malware, Network, NetworkPathComponent, Note, PatchSummary, ProcessDetails, RecordState, Remediation, Resource, Severity, Threat, ThreatIntelIndicator, VulnerabilityCodeVulnerabilities, VulnerabilityExploitAvailable, VulnerabilityFixAvailable, VulnerabilityVendor } from "./models_1";
4
4
  import { SecurityHubServiceException as __BaseException } from "./SecurityHubServiceException";
5
+ /**
6
+ * @public
7
+ * <p>Information about a software package.</p>
8
+ */
9
+ export interface SoftwarePackage {
10
+ /**
11
+ * @public
12
+ * <p>The name of the software package.</p>
13
+ */
14
+ Name?: string;
15
+ /**
16
+ * @public
17
+ * <p>The version of the software package.</p>
18
+ */
19
+ Version?: string;
20
+ /**
21
+ * @public
22
+ * <p>The epoch of the software package.</p>
23
+ */
24
+ Epoch?: string;
25
+ /**
26
+ * @public
27
+ * <p>The release of the software package.</p>
28
+ */
29
+ Release?: string;
30
+ /**
31
+ * @public
32
+ * <p>The architecture used for the software package.</p>
33
+ */
34
+ Architecture?: string;
35
+ /**
36
+ * @public
37
+ * <p>The source of the package.</p>
38
+ */
39
+ PackageManager?: string;
40
+ /**
41
+ * @public
42
+ * <p>The file system path to the package manager inventory file.</p>
43
+ */
44
+ FilePath?: string;
45
+ /**
46
+ * @public
47
+ * <p>The version of the software package in which the vulnerability has been resolved.
48
+ * </p>
49
+ */
50
+ FixedInVersion?: string;
51
+ /**
52
+ * @public
53
+ * <p>Describes the actions a customer can take to resolve the vulnerability in the software package.
54
+ * </p>
55
+ */
56
+ Remediation?: string;
57
+ /**
58
+ * @public
59
+ * <p>The source layer hash of the vulnerable package.
60
+ * </p>
61
+ */
62
+ SourceLayerHash?: string;
63
+ /**
64
+ * @public
65
+ * <p>The Amazon Resource Name (ARN) of the source layer.
66
+ * </p>
67
+ */
68
+ SourceLayerArn?: string;
69
+ }
70
+ /**
71
+ * @public
72
+ * <p>A vulnerability associated with a finding.</p>
73
+ */
74
+ export interface Vulnerability {
75
+ /**
76
+ * @public
77
+ * <p>The identifier of the vulnerability.</p>
78
+ */
79
+ Id: string | undefined;
80
+ /**
81
+ * @public
82
+ * <p>List of software packages that have the vulnerability.</p>
83
+ */
84
+ VulnerablePackages?: SoftwarePackage[];
85
+ /**
86
+ * @public
87
+ * <p>CVSS scores from the advisory related to the vulnerability.</p>
88
+ */
89
+ Cvss?: Cvss[];
90
+ /**
91
+ * @public
92
+ * <p>List of vulnerabilities that are related to this vulnerability.</p>
93
+ */
94
+ RelatedVulnerabilities?: string[];
95
+ /**
96
+ * @public
97
+ * <p>Information about the vendor that generates the vulnerability report.</p>
98
+ */
99
+ Vendor?: VulnerabilityVendor;
100
+ /**
101
+ * @public
102
+ * <p>A list of URLs that provide additional information about the vulnerability.</p>
103
+ */
104
+ ReferenceUrls?: string[];
105
+ /**
106
+ * @public
107
+ * <p>Specifies if all vulnerable packages in a finding have a value for <code>FixedInVersion</code>
108
+ * and <code>Remediation</code>.
109
+ * This field is evaluated for each vulnerability <code>Id</code> based on the number of vulnerable packages that have a value for both
110
+ * <code>FixedInVersion</code> and <code>Remediation</code>. Valid values are as follows:</p>
111
+ * <ul>
112
+ * <li>
113
+ * <p>
114
+ * <code>YES</code> if all vulnerable packages have a value for both <code>FixedInVersion</code> and <code>Remediation</code>
115
+ * </p>
116
+ * </li>
117
+ * <li>
118
+ * <p>
119
+ * <code>NO</code> if no vulnerable packages have a value for <code>FixedInVersion</code> and <code>Remediation</code>
120
+ * </p>
121
+ * </li>
122
+ * <li>
123
+ * <p>
124
+ * <code>PARTIAL</code> otherwise</p>
125
+ * </li>
126
+ * </ul>
127
+ */
128
+ FixAvailable?: VulnerabilityFixAvailable | string;
129
+ /**
130
+ * @public
131
+ * <p>The Exploit Prediction Scoring System (EPSS) score for a finding.
132
+ * </p>
133
+ */
134
+ EpssScore?: number;
135
+ /**
136
+ * @public
137
+ * <p>Whether an exploit is available for a finding.
138
+ * </p>
139
+ */
140
+ ExploitAvailable?: VulnerabilityExploitAvailable | string;
141
+ /**
142
+ * @public
143
+ * <p>The vulnerabilities found in your Lambda function code. This field pertains to findings that
144
+ * Security Hub receives from Amazon Inspector.
145
+ * </p>
146
+ */
147
+ CodeVulnerabilities?: VulnerabilityCodeVulnerabilities[];
148
+ }
149
+ /**
150
+ * @public
151
+ * <p>Provides details about the status of the investigation into a finding.</p>
152
+ */
153
+ export interface Workflow {
154
+ /**
155
+ * @public
156
+ * <p>The status of the investigation into the finding. The workflow status is specific to an individual finding. It does not affect the generation of new findings. For example, setting the workflow status to <code>SUPPRESSED</code> or <code>RESOLVED</code> does not prevent a new finding for the same issue.</p>
157
+ * <p>The allowed values are the following.</p>
158
+ * <ul>
159
+ * <li>
160
+ * <p>
161
+ * <code>NEW</code> - The initial state of a finding, before it is reviewed.</p>
162
+ * <p>Security Hub also resets the workflow status from <code>NOTIFIED</code> or
163
+ * <code>RESOLVED</code> to <code>NEW</code> in the following cases:</p>
164
+ * <ul>
165
+ * <li>
166
+ * <p>
167
+ * <code>RecordState</code> changes from <code>ARCHIVED</code> to
168
+ * <code>ACTIVE</code>.</p>
169
+ * </li>
170
+ * <li>
171
+ * <p>
172
+ * <code>ComplianceStatus</code> changes from <code>PASSED</code> to either
173
+ * <code>WARNING</code>, <code>FAILED</code>, or
174
+ * <code>NOT_AVAILABLE</code>.</p>
175
+ * </li>
176
+ * </ul>
177
+ * </li>
178
+ * <li>
179
+ * <p>
180
+ * <code>NOTIFIED</code> - Indicates that you notified the resource owner about the
181
+ * security issue. Used when the initial reviewer is not the resource owner, and needs
182
+ * intervention from the resource owner.</p>
183
+ * </li>
184
+ * <li>
185
+ * <p>
186
+ * <code>SUPPRESSED</code> - Indicates that you reviewed the finding and do not believe that any action is needed. The finding is no longer updated.</p>
187
+ * </li>
188
+ * <li>
189
+ * <p>
190
+ * <code>RESOLVED</code> - The finding was reviewed and remediated and is now
191
+ * considered resolved. </p>
192
+ * </li>
193
+ * </ul>
194
+ */
195
+ Status?: WorkflowStatus | string;
196
+ }
197
+ /**
198
+ * @public
199
+ * @enum
200
+ */
201
+ export declare const WorkflowState: {
202
+ readonly ASSIGNED: "ASSIGNED";
203
+ readonly DEFERRED: "DEFERRED";
204
+ readonly IN_PROGRESS: "IN_PROGRESS";
205
+ readonly NEW: "NEW";
206
+ readonly RESOLVED: "RESOLVED";
207
+ };
208
+ /**
209
+ * @public
210
+ */
211
+ export type WorkflowState = (typeof WorkflowState)[keyof typeof WorkflowState];
5
212
  /**
6
213
  * @public
7
214
  * <p>Provides a consistent format for Security Hub findings.
@@ -268,6 +475,15 @@ export interface AwsSecurityFinding {
268
475
  * <p>Indicates whether the finding is a sample finding.</p>
269
476
  */
270
477
  Sample?: boolean;
478
+ /**
479
+ * @public
480
+ * <p>Provides metadata for the Amazon CodeGuru detector associated with a finding. This field pertains to
481
+ * findings that relate to Lambda functions. Amazon Inspector identifies policy violations and
482
+ * vulnerabilities in Lambda function code based on internal detectors developed
483
+ * in collaboration with Amazon CodeGuru. Security Hub receives those findings.
484
+ * </p>
485
+ */
486
+ GeneratorDetails?: GeneratorDetails;
271
487
  }
272
488
  /**
273
489
  * @public
@@ -26,6 +26,7 @@ export declare const getRuntimeConfig: (config: SecurityHubClientConfig) => {
26
26
  disableHostPrefix: boolean;
27
27
  serviceId: string;
28
28
  logger: import("@smithy/types").Logger;
29
+ extensions: import("./runtimeExtensions").RuntimeExtension[];
29
30
  endpoint?: ((string | import("@smithy/types").Endpoint | import("@smithy/types").Provider<import("@smithy/types").Endpoint> | import("@smithy/types").EndpointV2 | import("@smithy/types").Provider<import("@smithy/types").EndpointV2>) & (string | import("@smithy/types").Provider<string> | import("@smithy/types").Endpoint | import("@smithy/types").Provider<import("@smithy/types").Endpoint> | import("@smithy/types").EndpointV2 | import("@smithy/types").Provider<import("@smithy/types").EndpointV2>)) | undefined;
30
31
  endpointProvider: (endpointParams: import("./endpoint/EndpointParameters").EndpointParameters, context?: {
31
32
  logger?: import("@smithy/types").Logger | undefined;
@@ -26,6 +26,7 @@ export declare const getRuntimeConfig: (config: SecurityHubClientConfig) => {
26
26
  disableHostPrefix: boolean;
27
27
  serviceId: string;
28
28
  logger: import("@smithy/types").Logger;
29
+ extensions: import("./runtimeExtensions").RuntimeExtension[];
29
30
  endpoint?: ((string | import("@smithy/types").Endpoint | import("@smithy/types").Provider<import("@smithy/types").Endpoint> | import("@smithy/types").EndpointV2 | import("@smithy/types").Provider<import("@smithy/types").EndpointV2>) & (string | import("@smithy/types").Provider<string> | import("@smithy/types").Endpoint | import("@smithy/types").Provider<import("@smithy/types").Endpoint> | import("@smithy/types").EndpointV2 | import("@smithy/types").Provider<import("@smithy/types").EndpointV2>)) | undefined;
30
31
  endpointProvider: (endpointParams: import("./endpoint/EndpointParameters").EndpointParameters, context?: {
31
32
  logger?: import("@smithy/types").Logger | undefined;
@@ -24,6 +24,7 @@ export declare const getRuntimeConfig: (config: SecurityHubClientConfig) => {
24
24
  maxAttempts: number | import("@smithy/types").Provider<number>;
25
25
  retryMode: string | import("@smithy/types").Provider<string>;
26
26
  logger: import("@smithy/types").Logger;
27
+ extensions: import("./runtimeExtensions").RuntimeExtension[];
27
28
  defaultsMode: import("@smithy/smithy-client").DefaultsMode | import("@smithy/types").Provider<import("@smithy/smithy-client").DefaultsMode>;
28
29
  endpoint?: string | import("@smithy/types").Endpoint | import("@smithy/types").Provider<import("@smithy/types").Endpoint> | import("@smithy/types").EndpointV2 | import("@smithy/types").Provider<import("@smithy/types").EndpointV2> | undefined;
29
30
  endpointProvider: (endpointParams: import("./endpoint/EndpointParameters").EndpointParameters, context?: {
@@ -10,6 +10,7 @@ export declare const getRuntimeConfig: (config: SecurityHubClientConfig) => {
10
10
  endpointProvider: (endpointParams: import("./endpoint/EndpointParameters").EndpointParameters, context?: {
11
11
  logger?: import("@smithy/types").Logger | undefined;
12
12
  }) => import("@smithy/types").EndpointV2;
13
+ extensions: import("./runtimeExtensions").RuntimeExtension[];
13
14
  logger: import("@smithy/types").Logger;
14
15
  serviceId: string;
15
16
  urlParser: import("@smithy/types").UrlParser;
@@ -0,0 +1,17 @@
1
+ import { SecurityHubExtensionConfiguration } from "./extensionConfiguration";
2
+ /**
3
+ * @public
4
+ */
5
+ export interface RuntimeExtension {
6
+ configure(clientConfiguration: SecurityHubExtensionConfiguration): void;
7
+ }
8
+ /**
9
+ * @public
10
+ */
11
+ export interface RuntimeExtensionsConfig {
12
+ extensions: RuntimeExtension[];
13
+ }
14
+ /**
15
+ * @internal
16
+ */
17
+ export declare const resolveRuntimeExtensions: (runtimeConfig: any, extensions: RuntimeExtension[]) => any;
@@ -318,6 +318,7 @@ import {
318
318
  ClientResolvedEndpointParameters,
319
319
  EndpointParameters,
320
320
  } from "./endpoint/EndpointParameters";
321
+ import { RuntimeExtension, RuntimeExtensionsConfig } from "./runtimeExtensions";
321
322
  export { __Client };
322
323
  export type ServiceInputTypes =
323
324
  | AcceptAdministratorInvitationCommandInput
@@ -477,6 +478,7 @@ export interface ClientDefaults
477
478
  maxAttempts?: number | __Provider<number>;
478
479
  retryMode?: string | __Provider<string>;
479
480
  logger?: __Logger;
481
+ extensions?: RuntimeExtension[];
480
482
  defaultsMode?: __DefaultsMode | __Provider<__DefaultsMode>;
481
483
  }
482
484
  export type SecurityHubClientConfigType = Partial<
@@ -494,6 +496,7 @@ export interface SecurityHubClientConfig extends SecurityHubClientConfigType {}
494
496
  export type SecurityHubClientResolvedConfigType =
495
497
  __SmithyResolvedConfiguration<__HttpHandlerOptions> &
496
498
  Required<ClientDefaults> &
499
+ RuntimeExtensionsConfig &
497
500
  RegionResolvedConfig &
498
501
  EndpointResolvedConfig<EndpointParameters> &
499
502
  RetryResolvedConfig &
@@ -0,0 +1,3 @@
1
+ import { DefaultExtensionConfiguration } from "@smithy/types";
2
+ export interface SecurityHubExtensionConfiguration
3
+ extends DefaultExtensionConfiguration {}