aws-sdk 2.1499.0 → 2.1501.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (42) hide show
  1. package/CHANGELOG.md +14 -1
  2. package/README.md +1 -1
  3. package/apis/cloudfront-2020-05-31.examples.json +251 -0
  4. package/apis/cloudfront-2020-05-31.min.json +349 -106
  5. package/apis/cloudfront-2020-05-31.paginators.json +6 -0
  6. package/apis/cloudfront-keyvaluestore-2022-07-26.examples.json +5 -0
  7. package/apis/cloudfront-keyvaluestore-2022-07-26.min.json +359 -0
  8. package/apis/cloudfront-keyvaluestore-2022-07-26.paginators.json +10 -0
  9. package/apis/codestar-connections-2019-12-01.min.json +3 -590
  10. package/apis/codestar-connections-2019-12-01.paginators.json +0 -10
  11. package/apis/docdb-2014-10-31.min.json +14 -7
  12. package/apis/ec2-2016-11-15.min.json +1448 -1435
  13. package/apis/inspector-scan-2023-08-08.examples.json +174 -0
  14. package/apis/inspector-scan-2023-08-08.min.json +51 -0
  15. package/apis/inspector-scan-2023-08-08.paginators.json +4 -0
  16. package/apis/iotsitewise-2019-12-02.min.json +989 -176
  17. package/apis/iotsitewise-2019-12-02.paginators.json +24 -0
  18. package/apis/iottwinmaker-2021-11-29.min.json +729 -131
  19. package/apis/iottwinmaker-2021-11-29.paginators.json +15 -0
  20. package/apis/metadata.json +8 -0
  21. package/apis/s3-2006-03-01.examples.json +152 -152
  22. package/apis/s3-2006-03-01.min.json +109 -92
  23. package/clients/all.d.ts +2 -0
  24. package/clients/all.js +3 -1
  25. package/clients/cloudfront.d.ts +220 -2
  26. package/clients/cloudfrontkeyvaluestore.d.ts +294 -0
  27. package/clients/cloudfrontkeyvaluestore.js +18 -0
  28. package/clients/codestarconnections.d.ts +0 -727
  29. package/clients/docdb.d.ts +28 -0
  30. package/clients/ec2.d.ts +49 -20
  31. package/clients/inspectorscan.d.ts +59 -0
  32. package/clients/inspectorscan.js +18 -0
  33. package/clients/iotsitewise.d.ts +1080 -179
  34. package/clients/iottwinmaker.d.ts +666 -9
  35. package/clients/s3.d.ts +38 -15
  36. package/dist/aws-sdk-core-react-native.js +2 -2
  37. package/dist/aws-sdk-react-native.js +89 -15
  38. package/dist/aws-sdk.js +1956 -1638
  39. package/dist/aws-sdk.min.js +93 -92
  40. package/lib/config_service_placeholders.d.ts +4 -0
  41. package/lib/core.js +1 -1
  42. package/package.json +1 -1
@@ -0,0 +1,174 @@
1
+ {
2
+ "version": "1.0",
3
+ "examples": {
4
+ "ScanSbom": [
5
+ {
6
+ "input": {
7
+ "outputFormat": "CYCLONE_DX_1_5",
8
+ "sbom": {
9
+ "bomFormat": "CycloneDX",
10
+ "components": [
11
+ {
12
+ "name": "log4j-core",
13
+ "type": "library",
14
+ "purl": "pkg:maven/org.apache.logging.log4j/log4j-core@2.17.0"
15
+ }
16
+ ],
17
+ "specVersion": "1.5"
18
+ }
19
+ },
20
+ "output": {
21
+ "sbom": {
22
+ "metadata": {
23
+ "properties": [
24
+ {
25
+ "name": "amazon:inspector:sbom_scanner:critical_vulnerabilities",
26
+ "value": "0"
27
+ },
28
+ {
29
+ "name": "amazon:inspector:sbom_scanner:high_vulnerabilities",
30
+ "value": "0"
31
+ },
32
+ {
33
+ "name": "amazon:inspector:sbom_scanner:medium_vulnerabilities",
34
+ "value": "1"
35
+ },
36
+ {
37
+ "name": "amazon:inspector:sbom_scanner:low_vulnerabilities",
38
+ "value": "0"
39
+ }
40
+ ],
41
+ "timestamp": "2023-11-16T02:55:34.355Z",
42
+ "tools": [
43
+ {
44
+ "version": "9f8c30ff+20b2305b",
45
+ "name": "CycloneDX SBOM API",
46
+ "vendor": "Amazon Inspector"
47
+ }
48
+ ]
49
+ },
50
+ "bomFormat": "CycloneDX",
51
+ "components": [
52
+ {
53
+ "name": "log4j-core",
54
+ "type": "library",
55
+ "bom-ref": "comp-1",
56
+ "purl": "pkg:maven/org.apache.logging.log4j/log4j-core@2.17.0"
57
+ }
58
+ ],
59
+ "serialNumber": "urn:uuid:26de5e0a-deb4-4b38-a208-7d19c1832e8c",
60
+ "specVersion": "1.5",
61
+ "vulnerabilities": [
62
+ {
63
+ "advisories": [
64
+ {
65
+ "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
66
+ },
67
+ {
68
+ "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00036.html"
69
+ },
70
+ {
71
+ "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-784507.pdf"
72
+ },
73
+ {
74
+ "url": "https://lists.apache.org/thread/s1o5vlo78ypqxnzn6p8zf6t9shtq5143"
75
+ },
76
+ {
77
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVV25FXL4FU5X6X5BSL7RLQ7T6F65MRA/"
78
+ },
79
+ {
80
+ "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
81
+ },
82
+ {
83
+ "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
84
+ },
85
+ {
86
+ "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
87
+ },
88
+ {
89
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T57MPJUW3MA6QGWZRTMCHHMMPQNVKGFC/"
90
+ },
91
+ {
92
+ "url": "https://issues.apache.org/jira/browse/LOG4J2-3293"
93
+ }
94
+ ],
95
+ "affects": [
96
+ {
97
+ "ref": "comp-1"
98
+ }
99
+ ],
100
+ "bom-ref": "vuln-1",
101
+ "created": "2021-12-28T20:15:08Z",
102
+ "cwes": [
103
+ 20,
104
+ 74
105
+ ],
106
+ "description": "Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.",
107
+ "id": "CVE-2021-44832",
108
+ "properties": [
109
+ {
110
+ "name": "amazon:inspector:sbom_scanner:exploit_available",
111
+ "value": "true"
112
+ },
113
+ {
114
+ "name": "amazon:inspector:sbom_scanner:exploit_last_seen_in_public",
115
+ "value": "2023-01-02T00:00:00Z"
116
+ },
117
+ {
118
+ "name": "amazon:inspector:sbom_scanner:fixed_version:comp-1",
119
+ "value": "2.17.1"
120
+ }
121
+ ],
122
+ "ratings": [
123
+ {
124
+ "method": "CVSSv31",
125
+ "score": 6.5,
126
+ "severity": "medium",
127
+ "source": {
128
+ "name": "NVD",
129
+ "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44832"
130
+ },
131
+ "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
132
+ },
133
+ {
134
+ "method": "other",
135
+ "score": 0.02686,
136
+ "severity": "none",
137
+ "source": {
138
+ "name": "EPSS",
139
+ "url": "https://www.first.org/epss/"
140
+ },
141
+ "vector": "model:v2023.03.01,date:2023-11-15T00:00:00+0000"
142
+ }
143
+ ],
144
+ "references": [
145
+ {
146
+ "id": "GHSA-8489-44mv-ggj8",
147
+ "source": {
148
+ "name": "GITHUB_SEC",
149
+ "url": "https://github.com/advisories"
150
+ }
151
+ },
152
+ {
153
+ "id": "SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2327339",
154
+ "source": {
155
+ "name": "SNYK",
156
+ "url": "https://security.snyk.io/vuln"
157
+ }
158
+ }
159
+ ],
160
+ "source": {
161
+ "name": "NVD",
162
+ "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44832"
163
+ },
164
+ "updated": "2023-11-07T03:39:43Z"
165
+ }
166
+ ]
167
+ }
168
+ },
169
+ "id": "example-1",
170
+ "title": "Sample ScanSbom Call"
171
+ }
172
+ ]
173
+ }
174
+ }
@@ -0,0 +1,51 @@
1
+ {
2
+ "version": "2.0",
3
+ "metadata": {
4
+ "apiVersion": "2023-08-08",
5
+ "endpointPrefix": "inspector-scan",
6
+ "jsonVersion": "1.1",
7
+ "protocol": "rest-json",
8
+ "serviceAbbreviation": "inspector-scan",
9
+ "serviceFullName": "Inspector Scan",
10
+ "serviceId": "Inspector Scan",
11
+ "signatureVersion": "v4",
12
+ "signingName": "inspector-scan",
13
+ "uid": "inspector-scan-2023-08-08"
14
+ },
15
+ "operations": {
16
+ "ScanSbom": {
17
+ "http": {
18
+ "requestUri": "/scan/sbom",
19
+ "responseCode": 200
20
+ },
21
+ "input": {
22
+ "type": "structure",
23
+ "required": [
24
+ "sbom"
25
+ ],
26
+ "members": {
27
+ "sbom": {
28
+ "shape": "S2"
29
+ },
30
+ "outputFormat": {}
31
+ }
32
+ },
33
+ "output": {
34
+ "type": "structure",
35
+ "members": {
36
+ "sbom": {
37
+ "shape": "S2"
38
+ }
39
+ }
40
+ },
41
+ "idempotent": true
42
+ }
43
+ },
44
+ "shapes": {
45
+ "S2": {
46
+ "type": "structure",
47
+ "members": {},
48
+ "document": true
49
+ }
50
+ }
51
+ }
@@ -0,0 +1,4 @@
1
+ {
2
+ "pagination": {
3
+ }
4
+ }