@aws-sdk/client-securityhub 3.536.0 → 3.540.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +15 -39
- package/dist-cjs/endpoint/endpointResolver.js +4 -2
- package/dist-cjs/index.js +2 -3
- package/dist-es/endpoint/endpointResolver.js +3 -1
- package/dist-es/index.js +0 -1
- package/dist-es/protocols/Aws_restJson1.js +2 -0
- package/dist-types/SecurityHub.d.ts +15 -39
- package/dist-types/SecurityHubClient.d.ts +15 -39
- package/dist-types/commands/BatchGetAutomationRulesCommand.d.ts +2 -2
- package/dist-types/commands/BatchImportFindingsCommand.d.ts +1 -0
- package/dist-types/commands/BatchUpdateAutomationRulesCommand.d.ts +2 -2
- package/dist-types/commands/CreateAutomationRuleCommand.d.ts +2 -2
- package/dist-types/commands/CreateInsightCommand.d.ts +5 -5
- package/dist-types/commands/GetFindingsCommand.d.ts +6 -5
- package/dist-types/commands/GetInsightsCommand.d.ts +5 -5
- package/dist-types/commands/UpdateFindingsCommand.d.ts +5 -5
- package/dist-types/commands/UpdateInsightCommand.d.ts +5 -5
- package/dist-types/index.d.ts +15 -40
- package/dist-types/models/models_0.d.ts +6 -6
- package/dist-types/models/models_1.d.ts +6 -4
- package/dist-types/models/models_2.d.ts +7 -0
- package/dist-types/ts3.4/index.d.ts +0 -1
- package/dist-types/ts3.4/models/models_0.d.ts +1 -1
- package/dist-types/ts3.4/models/models_2.d.ts +1 -0
- package/package.json +5 -5
package/README.md
CHANGED
|
@@ -6,47 +6,23 @@
|
|
|
6
6
|
|
|
7
7
|
AWS SDK for JavaScript SecurityHub Client for Node.js, Browser and React Native.
|
|
8
8
|
|
|
9
|
-
<p>Security Hub provides you with a comprehensive view of
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
issues
|
|
14
|
-
<
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
several security controls, each of which represents a security best practice. Security Hub runs checks against
|
|
19
|
-
security controls and generates control findings to help you assess your compliance against security best practices.</p>
|
|
20
|
-
<p>In addition to generating control findings, Security Hub also receives findings from other Amazon Web Services,
|
|
21
|
-
such as Amazon GuardDuty and Amazon Inspector, and
|
|
22
|
-
supported third-party products. This gives you a single pane of glass into a variety of security-related issues. You
|
|
23
|
-
can also send Security Hub findings to other Amazon Web Services and supported third-party products.</p>
|
|
24
|
-
<p>Security Hub offers automation features that help you triage and remediate security issues. For example,
|
|
25
|
-
you can use automation rules to automatically update critical findings when a security check fails. You can also leverage the integration with
|
|
26
|
-
Amazon EventBridge to trigger automatic responses to specific findings.</p>
|
|
27
|
-
<p>This guide, the <i>Security Hub API Reference</i>, provides
|
|
28
|
-
information about the Security Hub API. This includes supported resources, HTTP methods, parameters,
|
|
29
|
-
and schemas. If you're new to Security Hub, you might find it helpful to also review the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
|
|
30
|
-
<i>Security Hub User Guide</i>
|
|
31
|
-
</a>. The
|
|
32
|
-
user guide explains key concepts and provides procedures
|
|
33
|
-
that demonstrate how to use Security Hub features. It also provides information about topics such as
|
|
34
|
-
integrating Security Hub with other Amazon Web Services.</p>
|
|
35
|
-
<p>In addition to interacting with Security Hub by making calls to the Security Hub API, you can
|
|
36
|
-
use a current version of an Amazon Web Services command line tool or SDK. Amazon Web Services provides tools
|
|
37
|
-
and SDKs that consist of libraries and sample code for various languages and platforms, such as PowerShell,
|
|
38
|
-
Java, Go, Python, C++, and .NET. These tools and SDKs provide convenient, programmatic access to
|
|
39
|
-
Security Hub and other Amazon Web Services . They also handle tasks such as signing requests,
|
|
40
|
-
managing errors, and retrying requests automatically. For information about installing and using the Amazon Web Services tools
|
|
41
|
-
and SDKs, see <a href="http://aws.amazon.com/developer/tools/">Tools to Build on Amazon Web Services</a>.</p>
|
|
42
|
-
<p>With the exception of operations that are related to central configuration, Security Hub API requests are executed only in
|
|
9
|
+
<p>Security Hub provides you with a comprehensive view of the security state of
|
|
10
|
+
your Amazon Web Services environment and resources. It also provides you with the readiness
|
|
11
|
+
status of your environment based on controls from supported security standards. Security Hub collects security data from Amazon Web Services accounts, services, and
|
|
12
|
+
integrated third-party products and helps you analyze security trends in your environment
|
|
13
|
+
to identify the highest priority security issues. For more information about Security Hub, see the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
|
|
14
|
+
<i>Security Hub User
|
|
15
|
+
Guide</i>
|
|
16
|
+
</a>.</p>
|
|
17
|
+
<p>When you use operations in the Security Hub API, the requests are executed only in
|
|
43
18
|
the Amazon Web Services Region that is currently active or in the specific Amazon Web Services Region that you specify in your request. Any configuration or settings change
|
|
44
19
|
that results from the operation is applied only to that Region. To make the same change in
|
|
45
|
-
other Regions,
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
20
|
+
other Regions, run the same command for each Region in which you want to apply the change.</p>
|
|
21
|
+
<p>For example, if your Region is set to <code>us-west-2</code>, when you use <code>CreateMembers</code> to add a member account to Security Hub, the association of
|
|
22
|
+
the member account with the administrator account is created only in the <code>us-west-2</code>
|
|
23
|
+
Region. Security Hub must be enabled for the member account in the same Region that the invitation
|
|
24
|
+
was sent from.</p>
|
|
25
|
+
<p>The following throttling limits apply to using Security Hub API operations.</p>
|
|
50
26
|
<ul>
|
|
51
27
|
<li>
|
|
52
28
|
<p>
|
|
@@ -1,12 +1,14 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
3
|
exports.defaultEndpointResolver = void 0;
|
|
4
|
-
const util_endpoints_1 = require("@
|
|
4
|
+
const util_endpoints_1 = require("@aws-sdk/util-endpoints");
|
|
5
|
+
const util_endpoints_2 = require("@smithy/util-endpoints");
|
|
5
6
|
const ruleset_1 = require("./ruleset");
|
|
6
7
|
const defaultEndpointResolver = (endpointParams, context = {}) => {
|
|
7
|
-
return (0,
|
|
8
|
+
return (0, util_endpoints_2.resolveEndpoint)(ruleset_1.ruleSet, {
|
|
8
9
|
endpointParams: endpointParams,
|
|
9
10
|
logger: context.logger,
|
|
10
11
|
});
|
|
11
12
|
};
|
|
12
13
|
exports.defaultEndpointResolver = defaultEndpointResolver;
|
|
14
|
+
util_endpoints_2.customEndpointFunctions.aws = util_endpoints_1.awsEndpointFunctions;
|
package/dist-cjs/index.js
CHANGED
|
@@ -3924,6 +3924,7 @@ var se_Vulnerability = /* @__PURE__ */ __name((input, context) => {
|
|
|
3924
3924
|
ExploitAvailable: [],
|
|
3925
3925
|
FixAvailable: [],
|
|
3926
3926
|
Id: [],
|
|
3927
|
+
LastKnownExploitAt: [],
|
|
3927
3928
|
ReferenceUrls: import_smithy_client._json,
|
|
3928
3929
|
RelatedVulnerabilities: import_smithy_client._json,
|
|
3929
3930
|
Vendor: import_smithy_client._json,
|
|
@@ -5052,6 +5053,7 @@ var de_Vulnerability = /* @__PURE__ */ __name((output, context) => {
|
|
|
5052
5053
|
ExploitAvailable: import_smithy_client.expectString,
|
|
5053
5054
|
FixAvailable: import_smithy_client.expectString,
|
|
5054
5055
|
Id: import_smithy_client.expectString,
|
|
5056
|
+
LastKnownExploitAt: import_smithy_client.expectString,
|
|
5055
5057
|
ReferenceUrls: import_smithy_client._json,
|
|
5056
5058
|
RelatedVulnerabilities: import_smithy_client._json,
|
|
5057
5059
|
Vendor: import_smithy_client._json,
|
|
@@ -6620,9 +6622,6 @@ var RecordState = {
|
|
|
6620
6622
|
ACTIVE: "ACTIVE",
|
|
6621
6623
|
ARCHIVED: "ARCHIVED"
|
|
6622
6624
|
};
|
|
6623
|
-
|
|
6624
|
-
// src/index.ts
|
|
6625
|
-
var import_util_endpoints = require("@aws-sdk/util-endpoints");
|
|
6626
6625
|
// Annotate the CommonJS export names for ESM import in node:
|
|
6627
6626
|
|
|
6628
6627
|
0 && (module.exports = {
|
|
@@ -1,4 +1,5 @@
|
|
|
1
|
-
import {
|
|
1
|
+
import { awsEndpointFunctions } from "@aws-sdk/util-endpoints";
|
|
2
|
+
import { customEndpointFunctions, resolveEndpoint } from "@smithy/util-endpoints";
|
|
2
3
|
import { ruleSet } from "./ruleset";
|
|
3
4
|
export const defaultEndpointResolver = (endpointParams, context = {}) => {
|
|
4
5
|
return resolveEndpoint(ruleSet, {
|
|
@@ -6,3 +7,4 @@ export const defaultEndpointResolver = (endpointParams, context = {}) => {
|
|
|
6
7
|
logger: context.logger,
|
|
7
8
|
});
|
|
8
9
|
};
|
|
10
|
+
customEndpointFunctions.aws = awsEndpointFunctions;
|
package/dist-es/index.js
CHANGED
|
@@ -3102,6 +3102,7 @@ const se_Vulnerability = (input, context) => {
|
|
|
3102
3102
|
ExploitAvailable: [],
|
|
3103
3103
|
FixAvailable: [],
|
|
3104
3104
|
Id: [],
|
|
3105
|
+
LastKnownExploitAt: [],
|
|
3105
3106
|
ReferenceUrls: _json,
|
|
3106
3107
|
RelatedVulnerabilities: _json,
|
|
3107
3108
|
Vendor: _json,
|
|
@@ -4276,6 +4277,7 @@ const de_Vulnerability = (output, context) => {
|
|
|
4276
4277
|
ExploitAvailable: __expectString,
|
|
4277
4278
|
FixAvailable: __expectString,
|
|
4278
4279
|
Id: __expectString,
|
|
4280
|
+
LastKnownExploitAt: __expectString,
|
|
4279
4281
|
ReferenceUrls: _json,
|
|
4280
4282
|
RelatedVulnerabilities: _json,
|
|
4281
4283
|
Vendor: _json,
|
|
@@ -581,47 +581,23 @@ export interface SecurityHub {
|
|
|
581
581
|
updateStandardsControl(args: UpdateStandardsControlCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: UpdateStandardsControlCommandOutput) => void): void;
|
|
582
582
|
}
|
|
583
583
|
/**
|
|
584
|
-
* <p>Security Hub provides you with a comprehensive view of
|
|
585
|
-
*
|
|
586
|
-
*
|
|
587
|
-
*
|
|
588
|
-
*
|
|
589
|
-
*
|
|
590
|
-
*
|
|
591
|
-
*
|
|
592
|
-
*
|
|
593
|
-
* several security controls, each of which represents a security best practice. Security Hub runs checks against
|
|
594
|
-
* security controls and generates control findings to help you assess your compliance against security best practices.</p>
|
|
595
|
-
* <p>In addition to generating control findings, Security Hub also receives findings from other Amazon Web Services,
|
|
596
|
-
* such as Amazon GuardDuty and Amazon Inspector, and
|
|
597
|
-
* supported third-party products. This gives you a single pane of glass into a variety of security-related issues. You
|
|
598
|
-
* can also send Security Hub findings to other Amazon Web Services and supported third-party products.</p>
|
|
599
|
-
* <p>Security Hub offers automation features that help you triage and remediate security issues. For example,
|
|
600
|
-
* you can use automation rules to automatically update critical findings when a security check fails. You can also leverage the integration with
|
|
601
|
-
* Amazon EventBridge to trigger automatic responses to specific findings.</p>
|
|
602
|
-
* <p>This guide, the <i>Security Hub API Reference</i>, provides
|
|
603
|
-
* information about the Security Hub API. This includes supported resources, HTTP methods, parameters,
|
|
604
|
-
* and schemas. If you're new to Security Hub, you might find it helpful to also review the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
|
|
605
|
-
* <i>Security Hub User Guide</i>
|
|
606
|
-
* </a>. The
|
|
607
|
-
* user guide explains key concepts and provides procedures
|
|
608
|
-
* that demonstrate how to use Security Hub features. It also provides information about topics such as
|
|
609
|
-
* integrating Security Hub with other Amazon Web Services.</p>
|
|
610
|
-
* <p>In addition to interacting with Security Hub by making calls to the Security Hub API, you can
|
|
611
|
-
* use a current version of an Amazon Web Services command line tool or SDK. Amazon Web Services provides tools
|
|
612
|
-
* and SDKs that consist of libraries and sample code for various languages and platforms, such as PowerShell,
|
|
613
|
-
* Java, Go, Python, C++, and .NET. These tools and SDKs provide convenient, programmatic access to
|
|
614
|
-
* Security Hub and other Amazon Web Services . They also handle tasks such as signing requests,
|
|
615
|
-
* managing errors, and retrying requests automatically. For information about installing and using the Amazon Web Services tools
|
|
616
|
-
* and SDKs, see <a href="http://aws.amazon.com/developer/tools/">Tools to Build on Amazon Web Services</a>.</p>
|
|
617
|
-
* <p>With the exception of operations that are related to central configuration, Security Hub API requests are executed only in
|
|
584
|
+
* <p>Security Hub provides you with a comprehensive view of the security state of
|
|
585
|
+
* your Amazon Web Services environment and resources. It also provides you with the readiness
|
|
586
|
+
* status of your environment based on controls from supported security standards. Security Hub collects security data from Amazon Web Services accounts, services, and
|
|
587
|
+
* integrated third-party products and helps you analyze security trends in your environment
|
|
588
|
+
* to identify the highest priority security issues. For more information about Security Hub, see the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
|
|
589
|
+
* <i>Security Hub User
|
|
590
|
+
* Guide</i>
|
|
591
|
+
* </a>.</p>
|
|
592
|
+
* <p>When you use operations in the Security Hub API, the requests are executed only in
|
|
618
593
|
* the Amazon Web Services Region that is currently active or in the specific Amazon Web Services Region that you specify in your request. Any configuration or settings change
|
|
619
594
|
* that results from the operation is applied only to that Region. To make the same change in
|
|
620
|
-
* other Regions,
|
|
621
|
-
*
|
|
622
|
-
*
|
|
623
|
-
*
|
|
624
|
-
*
|
|
595
|
+
* other Regions, run the same command for each Region in which you want to apply the change.</p>
|
|
596
|
+
* <p>For example, if your Region is set to <code>us-west-2</code>, when you use <code>CreateMembers</code> to add a member account to Security Hub, the association of
|
|
597
|
+
* the member account with the administrator account is created only in the <code>us-west-2</code>
|
|
598
|
+
* Region. Security Hub must be enabled for the member account in the same Region that the invitation
|
|
599
|
+
* was sent from.</p>
|
|
600
|
+
* <p>The following throttling limits apply to using Security Hub API operations.</p>
|
|
625
601
|
* <ul>
|
|
626
602
|
* <li>
|
|
627
603
|
* <p>
|
|
@@ -230,47 +230,23 @@ export type SecurityHubClientResolvedConfigType = __SmithyResolvedConfiguration<
|
|
|
230
230
|
export interface SecurityHubClientResolvedConfig extends SecurityHubClientResolvedConfigType {
|
|
231
231
|
}
|
|
232
232
|
/**
|
|
233
|
-
* <p>Security Hub provides you with a comprehensive view of
|
|
234
|
-
*
|
|
235
|
-
*
|
|
236
|
-
*
|
|
237
|
-
*
|
|
238
|
-
*
|
|
239
|
-
*
|
|
240
|
-
*
|
|
241
|
-
*
|
|
242
|
-
* several security controls, each of which represents a security best practice. Security Hub runs checks against
|
|
243
|
-
* security controls and generates control findings to help you assess your compliance against security best practices.</p>
|
|
244
|
-
* <p>In addition to generating control findings, Security Hub also receives findings from other Amazon Web Services,
|
|
245
|
-
* such as Amazon GuardDuty and Amazon Inspector, and
|
|
246
|
-
* supported third-party products. This gives you a single pane of glass into a variety of security-related issues. You
|
|
247
|
-
* can also send Security Hub findings to other Amazon Web Services and supported third-party products.</p>
|
|
248
|
-
* <p>Security Hub offers automation features that help you triage and remediate security issues. For example,
|
|
249
|
-
* you can use automation rules to automatically update critical findings when a security check fails. You can also leverage the integration with
|
|
250
|
-
* Amazon EventBridge to trigger automatic responses to specific findings.</p>
|
|
251
|
-
* <p>This guide, the <i>Security Hub API Reference</i>, provides
|
|
252
|
-
* information about the Security Hub API. This includes supported resources, HTTP methods, parameters,
|
|
253
|
-
* and schemas. If you're new to Security Hub, you might find it helpful to also review the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
|
|
254
|
-
* <i>Security Hub User Guide</i>
|
|
255
|
-
* </a>. The
|
|
256
|
-
* user guide explains key concepts and provides procedures
|
|
257
|
-
* that demonstrate how to use Security Hub features. It also provides information about topics such as
|
|
258
|
-
* integrating Security Hub with other Amazon Web Services.</p>
|
|
259
|
-
* <p>In addition to interacting with Security Hub by making calls to the Security Hub API, you can
|
|
260
|
-
* use a current version of an Amazon Web Services command line tool or SDK. Amazon Web Services provides tools
|
|
261
|
-
* and SDKs that consist of libraries and sample code for various languages and platforms, such as PowerShell,
|
|
262
|
-
* Java, Go, Python, C++, and .NET. These tools and SDKs provide convenient, programmatic access to
|
|
263
|
-
* Security Hub and other Amazon Web Services . They also handle tasks such as signing requests,
|
|
264
|
-
* managing errors, and retrying requests automatically. For information about installing and using the Amazon Web Services tools
|
|
265
|
-
* and SDKs, see <a href="http://aws.amazon.com/developer/tools/">Tools to Build on Amazon Web Services</a>.</p>
|
|
266
|
-
* <p>With the exception of operations that are related to central configuration, Security Hub API requests are executed only in
|
|
233
|
+
* <p>Security Hub provides you with a comprehensive view of the security state of
|
|
234
|
+
* your Amazon Web Services environment and resources. It also provides you with the readiness
|
|
235
|
+
* status of your environment based on controls from supported security standards. Security Hub collects security data from Amazon Web Services accounts, services, and
|
|
236
|
+
* integrated third-party products and helps you analyze security trends in your environment
|
|
237
|
+
* to identify the highest priority security issues. For more information about Security Hub, see the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
|
|
238
|
+
* <i>Security Hub User
|
|
239
|
+
* Guide</i>
|
|
240
|
+
* </a>.</p>
|
|
241
|
+
* <p>When you use operations in the Security Hub API, the requests are executed only in
|
|
267
242
|
* the Amazon Web Services Region that is currently active or in the specific Amazon Web Services Region that you specify in your request. Any configuration or settings change
|
|
268
243
|
* that results from the operation is applied only to that Region. To make the same change in
|
|
269
|
-
* other Regions,
|
|
270
|
-
*
|
|
271
|
-
*
|
|
272
|
-
*
|
|
273
|
-
*
|
|
244
|
+
* other Regions, run the same command for each Region in which you want to apply the change.</p>
|
|
245
|
+
* <p>For example, if your Region is set to <code>us-west-2</code>, when you use <code>CreateMembers</code> to add a member account to Security Hub, the association of
|
|
246
|
+
* the member account with the administrator account is created only in the <code>us-west-2</code>
|
|
247
|
+
* Region. Security Hub must be enabled for the member account in the same Region that the invitation
|
|
248
|
+
* was sent from.</p>
|
|
249
|
+
* <p>The following throttling limits apply to using Security Hub API operations.</p>
|
|
274
250
|
* <ul>
|
|
275
251
|
* <li>
|
|
276
252
|
* <p>
|
|
@@ -127,18 +127,18 @@ declare const BatchGetAutomationRulesCommand_base: {
|
|
|
127
127
|
* // { // NumberFilter
|
|
128
128
|
* // Gte: Number("double"),
|
|
129
129
|
* // Lte: Number("double"),
|
|
130
|
+
* // Eq: Number("double"),
|
|
130
131
|
* // Gt: Number("double"),
|
|
131
132
|
* // Lt: Number("double"),
|
|
132
|
-
* // Eq: Number("double"),
|
|
133
133
|
* // },
|
|
134
134
|
* // ],
|
|
135
135
|
* // Criticality: [
|
|
136
136
|
* // {
|
|
137
137
|
* // Gte: Number("double"),
|
|
138
138
|
* // Lte: Number("double"),
|
|
139
|
+
* // Eq: Number("double"),
|
|
139
140
|
* // Gt: Number("double"),
|
|
140
141
|
* // Lt: Number("double"),
|
|
141
|
-
* // Eq: Number("double"),
|
|
142
142
|
* // },
|
|
143
143
|
* // ],
|
|
144
144
|
* // Title: "<StringFilterList>",
|
|
@@ -4132,6 +4132,7 @@ declare const BatchImportFindingsCommand_base: {
|
|
|
4132
4132
|
* FixAvailable: "YES" || "NO" || "PARTIAL",
|
|
4133
4133
|
* EpssScore: Number("double"),
|
|
4134
4134
|
* ExploitAvailable: "YES" || "NO",
|
|
4135
|
+
* LastKnownExploitAt: "STRING_VALUE",
|
|
4135
4136
|
* CodeVulnerabilities: [ // VulnerabilityCodeVulnerabilitiesList
|
|
4136
4137
|
* { // VulnerabilityCodeVulnerabilities
|
|
4137
4138
|
* Cwes: "<TypeList>",
|
|
@@ -120,18 +120,18 @@ declare const BatchUpdateAutomationRulesCommand_base: {
|
|
|
120
120
|
* { // NumberFilter
|
|
121
121
|
* Gte: Number("double"),
|
|
122
122
|
* Lte: Number("double"),
|
|
123
|
+
* Eq: Number("double"),
|
|
123
124
|
* Gt: Number("double"),
|
|
124
125
|
* Lt: Number("double"),
|
|
125
|
-
* Eq: Number("double"),
|
|
126
126
|
* },
|
|
127
127
|
* ],
|
|
128
128
|
* Criticality: [
|
|
129
129
|
* {
|
|
130
130
|
* Gte: Number("double"),
|
|
131
131
|
* Lte: Number("double"),
|
|
132
|
+
* Eq: Number("double"),
|
|
132
133
|
* Gt: Number("double"),
|
|
133
134
|
* Lt: Number("double"),
|
|
134
|
-
* Eq: Number("double"),
|
|
135
135
|
* },
|
|
136
136
|
* ],
|
|
137
137
|
* Title: "<StringFilterList>",
|
|
@@ -119,18 +119,18 @@ declare const CreateAutomationRuleCommand_base: {
|
|
|
119
119
|
* { // NumberFilter
|
|
120
120
|
* Gte: Number("double"),
|
|
121
121
|
* Lte: Number("double"),
|
|
122
|
+
* Eq: Number("double"),
|
|
122
123
|
* Gt: Number("double"),
|
|
123
124
|
* Lt: Number("double"),
|
|
124
|
-
* Eq: Number("double"),
|
|
125
125
|
* },
|
|
126
126
|
* ],
|
|
127
127
|
* Criticality: [
|
|
128
128
|
* {
|
|
129
129
|
* Gte: Number("double"),
|
|
130
130
|
* Lte: Number("double"),
|
|
131
|
+
* Eq: Number("double"),
|
|
131
132
|
* Gt: Number("double"),
|
|
132
133
|
* Lt: Number("double"),
|
|
133
|
-
* Eq: Number("double"),
|
|
134
134
|
* },
|
|
135
135
|
* ],
|
|
136
136
|
* Title: "<StringFilterList>",
|
|
@@ -114,18 +114,18 @@ declare const CreateInsightCommand_base: {
|
|
|
114
114
|
* { // NumberFilter
|
|
115
115
|
* Gte: Number("double"),
|
|
116
116
|
* Lte: Number("double"),
|
|
117
|
+
* Eq: Number("double"),
|
|
117
118
|
* Gt: Number("double"),
|
|
118
119
|
* Lt: Number("double"),
|
|
119
|
-
* Eq: Number("double"),
|
|
120
120
|
* },
|
|
121
121
|
* ],
|
|
122
122
|
* SeverityNormalized: [
|
|
123
123
|
* {
|
|
124
124
|
* Gte: Number("double"),
|
|
125
125
|
* Lte: Number("double"),
|
|
126
|
+
* Eq: Number("double"),
|
|
126
127
|
* Gt: Number("double"),
|
|
127
128
|
* Lt: Number("double"),
|
|
128
|
-
* Eq: Number("double"),
|
|
129
129
|
* },
|
|
130
130
|
* ],
|
|
131
131
|
* SeverityLabel: "<StringFilterList>",
|
|
@@ -133,18 +133,18 @@ declare const CreateInsightCommand_base: {
|
|
|
133
133
|
* {
|
|
134
134
|
* Gte: Number("double"),
|
|
135
135
|
* Lte: Number("double"),
|
|
136
|
+
* Eq: Number("double"),
|
|
136
137
|
* Gt: Number("double"),
|
|
137
138
|
* Lt: Number("double"),
|
|
138
|
-
* Eq: Number("double"),
|
|
139
139
|
* },
|
|
140
140
|
* ],
|
|
141
141
|
* Criticality: [
|
|
142
142
|
* {
|
|
143
143
|
* Gte: Number("double"),
|
|
144
144
|
* Lte: Number("double"),
|
|
145
|
+
* Eq: Number("double"),
|
|
145
146
|
* Gt: Number("double"),
|
|
146
147
|
* Lt: Number("double"),
|
|
147
|
-
* Eq: Number("double"),
|
|
148
148
|
* },
|
|
149
149
|
* ],
|
|
150
150
|
* Title: "<StringFilterList>",
|
|
@@ -187,9 +187,9 @@ declare const CreateInsightCommand_base: {
|
|
|
187
187
|
* {
|
|
188
188
|
* Gte: Number("double"),
|
|
189
189
|
* Lte: Number("double"),
|
|
190
|
+
* Eq: Number("double"),
|
|
190
191
|
* Gt: Number("double"),
|
|
191
192
|
* Lt: Number("double"),
|
|
192
|
-
* Eq: Number("double"),
|
|
193
193
|
* },
|
|
194
194
|
* ],
|
|
195
195
|
* NetworkSourceDomain: "<StringFilterList>",
|
|
@@ -111,18 +111,18 @@ declare const GetFindingsCommand_base: {
|
|
|
111
111
|
* { // NumberFilter
|
|
112
112
|
* Gte: Number("double"),
|
|
113
113
|
* Lte: Number("double"),
|
|
114
|
+
* Eq: Number("double"),
|
|
114
115
|
* Gt: Number("double"),
|
|
115
116
|
* Lt: Number("double"),
|
|
116
|
-
* Eq: Number("double"),
|
|
117
117
|
* },
|
|
118
118
|
* ],
|
|
119
119
|
* SeverityNormalized: [
|
|
120
120
|
* {
|
|
121
121
|
* Gte: Number("double"),
|
|
122
122
|
* Lte: Number("double"),
|
|
123
|
+
* Eq: Number("double"),
|
|
123
124
|
* Gt: Number("double"),
|
|
124
125
|
* Lt: Number("double"),
|
|
125
|
-
* Eq: Number("double"),
|
|
126
126
|
* },
|
|
127
127
|
* ],
|
|
128
128
|
* SeverityLabel: "<StringFilterList>",
|
|
@@ -130,18 +130,18 @@ declare const GetFindingsCommand_base: {
|
|
|
130
130
|
* {
|
|
131
131
|
* Gte: Number("double"),
|
|
132
132
|
* Lte: Number("double"),
|
|
133
|
+
* Eq: Number("double"),
|
|
133
134
|
* Gt: Number("double"),
|
|
134
135
|
* Lt: Number("double"),
|
|
135
|
-
* Eq: Number("double"),
|
|
136
136
|
* },
|
|
137
137
|
* ],
|
|
138
138
|
* Criticality: [
|
|
139
139
|
* {
|
|
140
140
|
* Gte: Number("double"),
|
|
141
141
|
* Lte: Number("double"),
|
|
142
|
+
* Eq: Number("double"),
|
|
142
143
|
* Gt: Number("double"),
|
|
143
144
|
* Lt: Number("double"),
|
|
144
|
-
* Eq: Number("double"),
|
|
145
145
|
* },
|
|
146
146
|
* ],
|
|
147
147
|
* Title: "<StringFilterList>",
|
|
@@ -184,9 +184,9 @@ declare const GetFindingsCommand_base: {
|
|
|
184
184
|
* {
|
|
185
185
|
* Gte: Number("double"),
|
|
186
186
|
* Lte: Number("double"),
|
|
187
|
+
* Eq: Number("double"),
|
|
187
188
|
* Gt: Number("double"),
|
|
188
189
|
* Lt: Number("double"),
|
|
189
|
-
* Eq: Number("double"),
|
|
190
190
|
* },
|
|
191
191
|
* ],
|
|
192
192
|
* NetworkSourceDomain: "<StringFilterList>",
|
|
@@ -4339,6 +4339,7 @@ declare const GetFindingsCommand_base: {
|
|
|
4339
4339
|
* // FixAvailable: "YES" || "NO" || "PARTIAL",
|
|
4340
4340
|
* // EpssScore: Number("double"),
|
|
4341
4341
|
* // ExploitAvailable: "YES" || "NO",
|
|
4342
|
+
* // LastKnownExploitAt: "STRING_VALUE",
|
|
4342
4343
|
* // CodeVulnerabilities: [ // VulnerabilityCodeVulnerabilitiesList
|
|
4343
4344
|
* // { // VulnerabilityCodeVulnerabilities
|
|
4344
4345
|
* // Cwes: "<TypeList>",
|
|
@@ -123,18 +123,18 @@ declare const GetInsightsCommand_base: {
|
|
|
123
123
|
* // { // NumberFilter
|
|
124
124
|
* // Gte: Number("double"),
|
|
125
125
|
* // Lte: Number("double"),
|
|
126
|
+
* // Eq: Number("double"),
|
|
126
127
|
* // Gt: Number("double"),
|
|
127
128
|
* // Lt: Number("double"),
|
|
128
|
-
* // Eq: Number("double"),
|
|
129
129
|
* // },
|
|
130
130
|
* // ],
|
|
131
131
|
* // SeverityNormalized: [
|
|
132
132
|
* // {
|
|
133
133
|
* // Gte: Number("double"),
|
|
134
134
|
* // Lte: Number("double"),
|
|
135
|
+
* // Eq: Number("double"),
|
|
135
136
|
* // Gt: Number("double"),
|
|
136
137
|
* // Lt: Number("double"),
|
|
137
|
-
* // Eq: Number("double"),
|
|
138
138
|
* // },
|
|
139
139
|
* // ],
|
|
140
140
|
* // SeverityLabel: "<StringFilterList>",
|
|
@@ -142,18 +142,18 @@ declare const GetInsightsCommand_base: {
|
|
|
142
142
|
* // {
|
|
143
143
|
* // Gte: Number("double"),
|
|
144
144
|
* // Lte: Number("double"),
|
|
145
|
+
* // Eq: Number("double"),
|
|
145
146
|
* // Gt: Number("double"),
|
|
146
147
|
* // Lt: Number("double"),
|
|
147
|
-
* // Eq: Number("double"),
|
|
148
148
|
* // },
|
|
149
149
|
* // ],
|
|
150
150
|
* // Criticality: [
|
|
151
151
|
* // {
|
|
152
152
|
* // Gte: Number("double"),
|
|
153
153
|
* // Lte: Number("double"),
|
|
154
|
+
* // Eq: Number("double"),
|
|
154
155
|
* // Gt: Number("double"),
|
|
155
156
|
* // Lt: Number("double"),
|
|
156
|
-
* // Eq: Number("double"),
|
|
157
157
|
* // },
|
|
158
158
|
* // ],
|
|
159
159
|
* // Title: "<StringFilterList>",
|
|
@@ -196,9 +196,9 @@ declare const GetInsightsCommand_base: {
|
|
|
196
196
|
* // {
|
|
197
197
|
* // Gte: Number("double"),
|
|
198
198
|
* // Lte: Number("double"),
|
|
199
|
+
* // Eq: Number("double"),
|
|
199
200
|
* // Gt: Number("double"),
|
|
200
201
|
* // Lt: Number("double"),
|
|
201
|
-
* // Eq: Number("double"),
|
|
202
202
|
* // },
|
|
203
203
|
* // ],
|
|
204
204
|
* // NetworkSourceDomain: "<StringFilterList>",
|
|
@@ -115,18 +115,18 @@ declare const UpdateFindingsCommand_base: {
|
|
|
115
115
|
* { // NumberFilter
|
|
116
116
|
* Gte: Number("double"),
|
|
117
117
|
* Lte: Number("double"),
|
|
118
|
+
* Eq: Number("double"),
|
|
118
119
|
* Gt: Number("double"),
|
|
119
120
|
* Lt: Number("double"),
|
|
120
|
-
* Eq: Number("double"),
|
|
121
121
|
* },
|
|
122
122
|
* ],
|
|
123
123
|
* SeverityNormalized: [
|
|
124
124
|
* {
|
|
125
125
|
* Gte: Number("double"),
|
|
126
126
|
* Lte: Number("double"),
|
|
127
|
+
* Eq: Number("double"),
|
|
127
128
|
* Gt: Number("double"),
|
|
128
129
|
* Lt: Number("double"),
|
|
129
|
-
* Eq: Number("double"),
|
|
130
130
|
* },
|
|
131
131
|
* ],
|
|
132
132
|
* SeverityLabel: "<StringFilterList>",
|
|
@@ -134,18 +134,18 @@ declare const UpdateFindingsCommand_base: {
|
|
|
134
134
|
* {
|
|
135
135
|
* Gte: Number("double"),
|
|
136
136
|
* Lte: Number("double"),
|
|
137
|
+
* Eq: Number("double"),
|
|
137
138
|
* Gt: Number("double"),
|
|
138
139
|
* Lt: Number("double"),
|
|
139
|
-
* Eq: Number("double"),
|
|
140
140
|
* },
|
|
141
141
|
* ],
|
|
142
142
|
* Criticality: [
|
|
143
143
|
* {
|
|
144
144
|
* Gte: Number("double"),
|
|
145
145
|
* Lte: Number("double"),
|
|
146
|
+
* Eq: Number("double"),
|
|
146
147
|
* Gt: Number("double"),
|
|
147
148
|
* Lt: Number("double"),
|
|
148
|
-
* Eq: Number("double"),
|
|
149
149
|
* },
|
|
150
150
|
* ],
|
|
151
151
|
* Title: "<StringFilterList>",
|
|
@@ -188,9 +188,9 @@ declare const UpdateFindingsCommand_base: {
|
|
|
188
188
|
* {
|
|
189
189
|
* Gte: Number("double"),
|
|
190
190
|
* Lte: Number("double"),
|
|
191
|
+
* Eq: Number("double"),
|
|
191
192
|
* Gt: Number("double"),
|
|
192
193
|
* Lt: Number("double"),
|
|
193
|
-
* Eq: Number("double"),
|
|
194
194
|
* },
|
|
195
195
|
* ],
|
|
196
196
|
* NetworkSourceDomain: "<StringFilterList>",
|
|
@@ -112,18 +112,18 @@ declare const UpdateInsightCommand_base: {
|
|
|
112
112
|
* { // NumberFilter
|
|
113
113
|
* Gte: Number("double"),
|
|
114
114
|
* Lte: Number("double"),
|
|
115
|
+
* Eq: Number("double"),
|
|
115
116
|
* Gt: Number("double"),
|
|
116
117
|
* Lt: Number("double"),
|
|
117
|
-
* Eq: Number("double"),
|
|
118
118
|
* },
|
|
119
119
|
* ],
|
|
120
120
|
* SeverityNormalized: [
|
|
121
121
|
* {
|
|
122
122
|
* Gte: Number("double"),
|
|
123
123
|
* Lte: Number("double"),
|
|
124
|
+
* Eq: Number("double"),
|
|
124
125
|
* Gt: Number("double"),
|
|
125
126
|
* Lt: Number("double"),
|
|
126
|
-
* Eq: Number("double"),
|
|
127
127
|
* },
|
|
128
128
|
* ],
|
|
129
129
|
* SeverityLabel: "<StringFilterList>",
|
|
@@ -131,18 +131,18 @@ declare const UpdateInsightCommand_base: {
|
|
|
131
131
|
* {
|
|
132
132
|
* Gte: Number("double"),
|
|
133
133
|
* Lte: Number("double"),
|
|
134
|
+
* Eq: Number("double"),
|
|
134
135
|
* Gt: Number("double"),
|
|
135
136
|
* Lt: Number("double"),
|
|
136
|
-
* Eq: Number("double"),
|
|
137
137
|
* },
|
|
138
138
|
* ],
|
|
139
139
|
* Criticality: [
|
|
140
140
|
* {
|
|
141
141
|
* Gte: Number("double"),
|
|
142
142
|
* Lte: Number("double"),
|
|
143
|
+
* Eq: Number("double"),
|
|
143
144
|
* Gt: Number("double"),
|
|
144
145
|
* Lt: Number("double"),
|
|
145
|
-
* Eq: Number("double"),
|
|
146
146
|
* },
|
|
147
147
|
* ],
|
|
148
148
|
* Title: "<StringFilterList>",
|
|
@@ -185,9 +185,9 @@ declare const UpdateInsightCommand_base: {
|
|
|
185
185
|
* {
|
|
186
186
|
* Gte: Number("double"),
|
|
187
187
|
* Lte: Number("double"),
|
|
188
|
+
* Eq: Number("double"),
|
|
188
189
|
* Gt: Number("double"),
|
|
189
190
|
* Lt: Number("double"),
|
|
190
|
-
* Eq: Number("double"),
|
|
191
191
|
* },
|
|
192
192
|
* ],
|
|
193
193
|
* NetworkSourceDomain: "<StringFilterList>",
|
package/dist-types/index.d.ts
CHANGED
|
@@ -1,45 +1,21 @@
|
|
|
1
1
|
/**
|
|
2
|
-
* <p>Security Hub provides you with a comprehensive view of
|
|
3
|
-
*
|
|
4
|
-
*
|
|
5
|
-
*
|
|
6
|
-
*
|
|
7
|
-
*
|
|
8
|
-
*
|
|
9
|
-
*
|
|
10
|
-
*
|
|
11
|
-
* several security controls, each of which represents a security best practice. Security Hub runs checks against
|
|
12
|
-
* security controls and generates control findings to help you assess your compliance against security best practices.</p>
|
|
13
|
-
* <p>In addition to generating control findings, Security Hub also receives findings from other Amazon Web Services,
|
|
14
|
-
* such as Amazon GuardDuty and Amazon Inspector, and
|
|
15
|
-
* supported third-party products. This gives you a single pane of glass into a variety of security-related issues. You
|
|
16
|
-
* can also send Security Hub findings to other Amazon Web Services and supported third-party products.</p>
|
|
17
|
-
* <p>Security Hub offers automation features that help you triage and remediate security issues. For example,
|
|
18
|
-
* you can use automation rules to automatically update critical findings when a security check fails. You can also leverage the integration with
|
|
19
|
-
* Amazon EventBridge to trigger automatic responses to specific findings.</p>
|
|
20
|
-
* <p>This guide, the <i>Security Hub API Reference</i>, provides
|
|
21
|
-
* information about the Security Hub API. This includes supported resources, HTTP methods, parameters,
|
|
22
|
-
* and schemas. If you're new to Security Hub, you might find it helpful to also review the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
|
|
23
|
-
* <i>Security Hub User Guide</i>
|
|
24
|
-
* </a>. The
|
|
25
|
-
* user guide explains key concepts and provides procedures
|
|
26
|
-
* that demonstrate how to use Security Hub features. It also provides information about topics such as
|
|
27
|
-
* integrating Security Hub with other Amazon Web Services.</p>
|
|
28
|
-
* <p>In addition to interacting with Security Hub by making calls to the Security Hub API, you can
|
|
29
|
-
* use a current version of an Amazon Web Services command line tool or SDK. Amazon Web Services provides tools
|
|
30
|
-
* and SDKs that consist of libraries and sample code for various languages and platforms, such as PowerShell,
|
|
31
|
-
* Java, Go, Python, C++, and .NET. These tools and SDKs provide convenient, programmatic access to
|
|
32
|
-
* Security Hub and other Amazon Web Services . They also handle tasks such as signing requests,
|
|
33
|
-
* managing errors, and retrying requests automatically. For information about installing and using the Amazon Web Services tools
|
|
34
|
-
* and SDKs, see <a href="http://aws.amazon.com/developer/tools/">Tools to Build on Amazon Web Services</a>.</p>
|
|
35
|
-
* <p>With the exception of operations that are related to central configuration, Security Hub API requests are executed only in
|
|
2
|
+
* <p>Security Hub provides you with a comprehensive view of the security state of
|
|
3
|
+
* your Amazon Web Services environment and resources. It also provides you with the readiness
|
|
4
|
+
* status of your environment based on controls from supported security standards. Security Hub collects security data from Amazon Web Services accounts, services, and
|
|
5
|
+
* integrated third-party products and helps you analyze security trends in your environment
|
|
6
|
+
* to identify the highest priority security issues. For more information about Security Hub, see the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
|
|
7
|
+
* <i>Security Hub User
|
|
8
|
+
* Guide</i>
|
|
9
|
+
* </a>.</p>
|
|
10
|
+
* <p>When you use operations in the Security Hub API, the requests are executed only in
|
|
36
11
|
* the Amazon Web Services Region that is currently active or in the specific Amazon Web Services Region that you specify in your request. Any configuration or settings change
|
|
37
12
|
* that results from the operation is applied only to that Region. To make the same change in
|
|
38
|
-
* other Regions,
|
|
39
|
-
*
|
|
40
|
-
*
|
|
41
|
-
*
|
|
42
|
-
*
|
|
13
|
+
* other Regions, run the same command for each Region in which you want to apply the change.</p>
|
|
14
|
+
* <p>For example, if your Region is set to <code>us-west-2</code>, when you use <code>CreateMembers</code> to add a member account to Security Hub, the association of
|
|
15
|
+
* the member account with the administrator account is created only in the <code>us-west-2</code>
|
|
16
|
+
* Region. Security Hub must be enabled for the member account in the same Region that the invitation
|
|
17
|
+
* was sent from.</p>
|
|
18
|
+
* <p>The following throttling limits apply to using Security Hub API operations.</p>
|
|
43
19
|
* <ul>
|
|
44
20
|
* <li>
|
|
45
21
|
* <p>
|
|
@@ -82,5 +58,4 @@ export { SecurityHubExtensionConfiguration } from "./extensionConfiguration";
|
|
|
82
58
|
export * from "./commands";
|
|
83
59
|
export * from "./pagination";
|
|
84
60
|
export * from "./models";
|
|
85
|
-
import "@aws-sdk/util-endpoints";
|
|
86
61
|
export { SecurityHubServiceException } from "./models/SecurityHubServiceException";
|
|
@@ -1189,6 +1189,12 @@ export interface NumberFilter {
|
|
|
1189
1189
|
* @public
|
|
1190
1190
|
*/
|
|
1191
1191
|
Lte?: number;
|
|
1192
|
+
/**
|
|
1193
|
+
* <p>The equal-to condition to be applied to a single field when querying for
|
|
1194
|
+
* findings.</p>
|
|
1195
|
+
* @public
|
|
1196
|
+
*/
|
|
1197
|
+
Eq?: number;
|
|
1192
1198
|
/**
|
|
1193
1199
|
* <p>
|
|
1194
1200
|
* The greater-than condition to be applied to a single field when querying for findings.
|
|
@@ -1203,12 +1209,6 @@ export interface NumberFilter {
|
|
|
1203
1209
|
* @public
|
|
1204
1210
|
*/
|
|
1205
1211
|
Lt?: number;
|
|
1206
|
-
/**
|
|
1207
|
-
* <p>The equal-to condition to be applied to a single field when querying for
|
|
1208
|
-
* findings.</p>
|
|
1209
|
-
* @public
|
|
1210
|
-
*/
|
|
1211
|
-
Eq?: number;
|
|
1212
1212
|
}
|
|
1213
1213
|
/**
|
|
1214
1214
|
* @public
|
|
@@ -3429,10 +3429,12 @@ export interface AwsLambdaLayerVersionDetails {
|
|
|
3429
3429
|
*/
|
|
3430
3430
|
Version?: number;
|
|
3431
3431
|
/**
|
|
3432
|
-
* <p>The layer's compatible
|
|
3433
|
-
* <p>
|
|
3434
|
-
*
|
|
3435
|
-
*
|
|
3432
|
+
* <p>The layer's compatible runtimes. Maximum number of five items.</p>
|
|
3433
|
+
* <p>Valid values: <code>nodejs10.x</code> | <code>nodejs12.x</code> | <code>java8</code> |
|
|
3434
|
+
* <code>java11</code> | <code>python2.7</code> | <code>python3.6</code> |
|
|
3435
|
+
* <code>python3.7</code> | <code>python3.8</code> | <code>dotnetcore1.0</code> |
|
|
3436
|
+
* <code>dotnetcore2.1</code> | <code>go1.x</code> | <code>ruby2.5</code> |
|
|
3437
|
+
* <code>provided</code>
|
|
3436
3438
|
* </p>
|
|
3437
3439
|
* @public
|
|
3438
3440
|
*/
|
|
@@ -2092,6 +2092,13 @@ export interface Vulnerability {
|
|
|
2092
2092
|
* @public
|
|
2093
2093
|
*/
|
|
2094
2094
|
ExploitAvailable?: VulnerabilityExploitAvailable;
|
|
2095
|
+
/**
|
|
2096
|
+
* <p>
|
|
2097
|
+
* The date and time of the last exploit associated with a finding discovered in your environment.
|
|
2098
|
+
* </p>
|
|
2099
|
+
* @public
|
|
2100
|
+
*/
|
|
2101
|
+
LastKnownExploitAt?: string;
|
|
2095
2102
|
/**
|
|
2096
2103
|
* <p>The vulnerabilities found in your Lambda function code. This field pertains to findings that
|
|
2097
2104
|
* Security Hub receives from Amazon Inspector.
|
|
@@ -6,5 +6,4 @@ export { SecurityHubExtensionConfiguration } from "./extensionConfiguration";
|
|
|
6
6
|
export * from "./commands";
|
|
7
7
|
export * from "./pagination";
|
|
8
8
|
export * from "./models";
|
|
9
|
-
import "@aws-sdk/util-endpoints";
|
|
10
9
|
export { SecurityHubServiceException } from "./models/SecurityHubServiceException";
|
|
@@ -283,9 +283,9 @@ export interface StringFilter {
|
|
|
283
283
|
export interface NumberFilter {
|
|
284
284
|
Gte?: number;
|
|
285
285
|
Lte?: number;
|
|
286
|
+
Eq?: number;
|
|
286
287
|
Gt?: number;
|
|
287
288
|
Lt?: number;
|
|
288
|
-
Eq?: number;
|
|
289
289
|
}
|
|
290
290
|
export declare const DateRangeUnit: {
|
|
291
291
|
readonly DAYS: "DAYS";
|
|
@@ -520,6 +520,7 @@ export interface Vulnerability {
|
|
|
520
520
|
FixAvailable?: VulnerabilityFixAvailable;
|
|
521
521
|
EpssScore?: number;
|
|
522
522
|
ExploitAvailable?: VulnerabilityExploitAvailable;
|
|
523
|
+
LastKnownExploitAt?: string;
|
|
523
524
|
CodeVulnerabilities?: VulnerabilityCodeVulnerabilities[];
|
|
524
525
|
}
|
|
525
526
|
export interface Workflow {
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/client-securityhub",
|
|
3
3
|
"description": "AWS SDK for JavaScript Securityhub Client for Node.js, Browser and React Native",
|
|
4
|
-
"version": "3.
|
|
4
|
+
"version": "3.540.0",
|
|
5
5
|
"scripts": {
|
|
6
6
|
"build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
|
|
7
7
|
"build:cjs": "node ../../scripts/compilation/inline client-securityhub",
|
|
@@ -20,16 +20,16 @@
|
|
|
20
20
|
"dependencies": {
|
|
21
21
|
"@aws-crypto/sha256-browser": "3.0.0",
|
|
22
22
|
"@aws-crypto/sha256-js": "3.0.0",
|
|
23
|
-
"@aws-sdk/client-sts": "3.
|
|
23
|
+
"@aws-sdk/client-sts": "3.540.0",
|
|
24
24
|
"@aws-sdk/core": "3.535.0",
|
|
25
|
-
"@aws-sdk/credential-provider-node": "3.
|
|
25
|
+
"@aws-sdk/credential-provider-node": "3.540.0",
|
|
26
26
|
"@aws-sdk/middleware-host-header": "3.535.0",
|
|
27
27
|
"@aws-sdk/middleware-logger": "3.535.0",
|
|
28
28
|
"@aws-sdk/middleware-recursion-detection": "3.535.0",
|
|
29
|
-
"@aws-sdk/middleware-user-agent": "3.
|
|
29
|
+
"@aws-sdk/middleware-user-agent": "3.540.0",
|
|
30
30
|
"@aws-sdk/region-config-resolver": "3.535.0",
|
|
31
31
|
"@aws-sdk/types": "3.535.0",
|
|
32
|
-
"@aws-sdk/util-endpoints": "3.
|
|
32
|
+
"@aws-sdk/util-endpoints": "3.540.0",
|
|
33
33
|
"@aws-sdk/util-user-agent-browser": "3.535.0",
|
|
34
34
|
"@aws-sdk/util-user-agent-node": "3.535.0",
|
|
35
35
|
"@smithy/config-resolver": "^2.2.0",
|