cdk-lambda-subminute 2.0.304 → 2.0.306
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +3 -3
- package/lib/cdk-lambda-subminute.js +3 -3
- package/node_modules/aws-sdk/CHANGELOG.md +14 -1
- package/node_modules/aws-sdk/README.md +1 -1
- package/node_modules/aws-sdk/apis/cloudfront-2020-05-31.examples.json +251 -0
- package/node_modules/aws-sdk/apis/cloudfront-2020-05-31.min.json +349 -106
- package/node_modules/aws-sdk/apis/cloudfront-2020-05-31.paginators.json +6 -0
- package/node_modules/aws-sdk/apis/cloudfront-keyvaluestore-2022-07-26.examples.json +5 -0
- package/node_modules/aws-sdk/apis/cloudfront-keyvaluestore-2022-07-26.min.json +359 -0
- package/node_modules/aws-sdk/apis/cloudfront-keyvaluestore-2022-07-26.paginators.json +10 -0
- package/node_modules/aws-sdk/apis/codestar-connections-2019-12-01.min.json +3 -590
- package/node_modules/aws-sdk/apis/codestar-connections-2019-12-01.paginators.json +0 -10
- package/node_modules/aws-sdk/apis/docdb-2014-10-31.min.json +14 -7
- package/node_modules/aws-sdk/apis/ec2-2016-11-15.min.json +1448 -1435
- package/node_modules/aws-sdk/apis/inspector-scan-2023-08-08.examples.json +174 -0
- package/node_modules/aws-sdk/apis/inspector-scan-2023-08-08.min.json +51 -0
- package/node_modules/aws-sdk/apis/inspector-scan-2023-08-08.paginators.json +4 -0
- package/node_modules/aws-sdk/apis/iotsitewise-2019-12-02.min.json +989 -176
- package/node_modules/aws-sdk/apis/iotsitewise-2019-12-02.paginators.json +24 -0
- package/node_modules/aws-sdk/apis/iottwinmaker-2021-11-29.min.json +729 -131
- package/node_modules/aws-sdk/apis/iottwinmaker-2021-11-29.paginators.json +15 -0
- package/node_modules/aws-sdk/apis/metadata.json +8 -0
- package/node_modules/aws-sdk/apis/s3-2006-03-01.examples.json +152 -152
- package/node_modules/aws-sdk/apis/s3-2006-03-01.min.json +109 -92
- package/node_modules/aws-sdk/clients/all.d.ts +2 -0
- package/node_modules/aws-sdk/clients/all.js +3 -1
- package/node_modules/aws-sdk/clients/cloudfront.d.ts +220 -2
- package/node_modules/aws-sdk/clients/cloudfrontkeyvaluestore.d.ts +294 -0
- package/node_modules/aws-sdk/clients/cloudfrontkeyvaluestore.js +18 -0
- package/node_modules/aws-sdk/clients/codestarconnections.d.ts +0 -727
- package/node_modules/aws-sdk/clients/docdb.d.ts +28 -0
- package/node_modules/aws-sdk/clients/ec2.d.ts +49 -20
- package/node_modules/aws-sdk/clients/inspectorscan.d.ts +59 -0
- package/node_modules/aws-sdk/clients/inspectorscan.js +18 -0
- package/node_modules/aws-sdk/clients/iotsitewise.d.ts +1080 -179
- package/node_modules/aws-sdk/clients/iottwinmaker.d.ts +666 -9
- package/node_modules/aws-sdk/clients/s3.d.ts +38 -15
- package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +2 -2
- package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +89 -15
- package/node_modules/aws-sdk/dist/aws-sdk.js +1956 -1638
- package/node_modules/aws-sdk/dist/aws-sdk.min.js +93 -92
- package/node_modules/aws-sdk/lib/config_service_placeholders.d.ts +4 -0
- package/node_modules/aws-sdk/lib/core.js +1 -1
- package/node_modules/aws-sdk/package.json +1 -1
- package/package.json +3 -3
@@ -0,0 +1,174 @@
|
|
1
|
+
{
|
2
|
+
"version": "1.0",
|
3
|
+
"examples": {
|
4
|
+
"ScanSbom": [
|
5
|
+
{
|
6
|
+
"input": {
|
7
|
+
"outputFormat": "CYCLONE_DX_1_5",
|
8
|
+
"sbom": {
|
9
|
+
"bomFormat": "CycloneDX",
|
10
|
+
"components": [
|
11
|
+
{
|
12
|
+
"name": "log4j-core",
|
13
|
+
"type": "library",
|
14
|
+
"purl": "pkg:maven/org.apache.logging.log4j/log4j-core@2.17.0"
|
15
|
+
}
|
16
|
+
],
|
17
|
+
"specVersion": "1.5"
|
18
|
+
}
|
19
|
+
},
|
20
|
+
"output": {
|
21
|
+
"sbom": {
|
22
|
+
"metadata": {
|
23
|
+
"properties": [
|
24
|
+
{
|
25
|
+
"name": "amazon:inspector:sbom_scanner:critical_vulnerabilities",
|
26
|
+
"value": "0"
|
27
|
+
},
|
28
|
+
{
|
29
|
+
"name": "amazon:inspector:sbom_scanner:high_vulnerabilities",
|
30
|
+
"value": "0"
|
31
|
+
},
|
32
|
+
{
|
33
|
+
"name": "amazon:inspector:sbom_scanner:medium_vulnerabilities",
|
34
|
+
"value": "1"
|
35
|
+
},
|
36
|
+
{
|
37
|
+
"name": "amazon:inspector:sbom_scanner:low_vulnerabilities",
|
38
|
+
"value": "0"
|
39
|
+
}
|
40
|
+
],
|
41
|
+
"timestamp": "2023-11-16T02:55:34.355Z",
|
42
|
+
"tools": [
|
43
|
+
{
|
44
|
+
"version": "9f8c30ff+20b2305b",
|
45
|
+
"name": "CycloneDX SBOM API",
|
46
|
+
"vendor": "Amazon Inspector"
|
47
|
+
}
|
48
|
+
]
|
49
|
+
},
|
50
|
+
"bomFormat": "CycloneDX",
|
51
|
+
"components": [
|
52
|
+
{
|
53
|
+
"name": "log4j-core",
|
54
|
+
"type": "library",
|
55
|
+
"bom-ref": "comp-1",
|
56
|
+
"purl": "pkg:maven/org.apache.logging.log4j/log4j-core@2.17.0"
|
57
|
+
}
|
58
|
+
],
|
59
|
+
"serialNumber": "urn:uuid:26de5e0a-deb4-4b38-a208-7d19c1832e8c",
|
60
|
+
"specVersion": "1.5",
|
61
|
+
"vulnerabilities": [
|
62
|
+
{
|
63
|
+
"advisories": [
|
64
|
+
{
|
65
|
+
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
66
|
+
},
|
67
|
+
{
|
68
|
+
"url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00036.html"
|
69
|
+
},
|
70
|
+
{
|
71
|
+
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-784507.pdf"
|
72
|
+
},
|
73
|
+
{
|
74
|
+
"url": "https://lists.apache.org/thread/s1o5vlo78ypqxnzn6p8zf6t9shtq5143"
|
75
|
+
},
|
76
|
+
{
|
77
|
+
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVV25FXL4FU5X6X5BSL7RLQ7T6F65MRA/"
|
78
|
+
},
|
79
|
+
{
|
80
|
+
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
81
|
+
},
|
82
|
+
{
|
83
|
+
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
|
84
|
+
},
|
85
|
+
{
|
86
|
+
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
|
87
|
+
},
|
88
|
+
{
|
89
|
+
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T57MPJUW3MA6QGWZRTMCHHMMPQNVKGFC/"
|
90
|
+
},
|
91
|
+
{
|
92
|
+
"url": "https://issues.apache.org/jira/browse/LOG4J2-3293"
|
93
|
+
}
|
94
|
+
],
|
95
|
+
"affects": [
|
96
|
+
{
|
97
|
+
"ref": "comp-1"
|
98
|
+
}
|
99
|
+
],
|
100
|
+
"bom-ref": "vuln-1",
|
101
|
+
"created": "2021-12-28T20:15:08Z",
|
102
|
+
"cwes": [
|
103
|
+
20,
|
104
|
+
74
|
105
|
+
],
|
106
|
+
"description": "Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.",
|
107
|
+
"id": "CVE-2021-44832",
|
108
|
+
"properties": [
|
109
|
+
{
|
110
|
+
"name": "amazon:inspector:sbom_scanner:exploit_available",
|
111
|
+
"value": "true"
|
112
|
+
},
|
113
|
+
{
|
114
|
+
"name": "amazon:inspector:sbom_scanner:exploit_last_seen_in_public",
|
115
|
+
"value": "2023-01-02T00:00:00Z"
|
116
|
+
},
|
117
|
+
{
|
118
|
+
"name": "amazon:inspector:sbom_scanner:fixed_version:comp-1",
|
119
|
+
"value": "2.17.1"
|
120
|
+
}
|
121
|
+
],
|
122
|
+
"ratings": [
|
123
|
+
{
|
124
|
+
"method": "CVSSv31",
|
125
|
+
"score": 6.5,
|
126
|
+
"severity": "medium",
|
127
|
+
"source": {
|
128
|
+
"name": "NVD",
|
129
|
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44832"
|
130
|
+
},
|
131
|
+
"vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
|
132
|
+
},
|
133
|
+
{
|
134
|
+
"method": "other",
|
135
|
+
"score": 0.02686,
|
136
|
+
"severity": "none",
|
137
|
+
"source": {
|
138
|
+
"name": "EPSS",
|
139
|
+
"url": "https://www.first.org/epss/"
|
140
|
+
},
|
141
|
+
"vector": "model:v2023.03.01,date:2023-11-15T00:00:00+0000"
|
142
|
+
}
|
143
|
+
],
|
144
|
+
"references": [
|
145
|
+
{
|
146
|
+
"id": "GHSA-8489-44mv-ggj8",
|
147
|
+
"source": {
|
148
|
+
"name": "GITHUB_SEC",
|
149
|
+
"url": "https://github.com/advisories"
|
150
|
+
}
|
151
|
+
},
|
152
|
+
{
|
153
|
+
"id": "SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2327339",
|
154
|
+
"source": {
|
155
|
+
"name": "SNYK",
|
156
|
+
"url": "https://security.snyk.io/vuln"
|
157
|
+
}
|
158
|
+
}
|
159
|
+
],
|
160
|
+
"source": {
|
161
|
+
"name": "NVD",
|
162
|
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44832"
|
163
|
+
},
|
164
|
+
"updated": "2023-11-07T03:39:43Z"
|
165
|
+
}
|
166
|
+
]
|
167
|
+
}
|
168
|
+
},
|
169
|
+
"id": "example-1",
|
170
|
+
"title": "Sample ScanSbom Call"
|
171
|
+
}
|
172
|
+
]
|
173
|
+
}
|
174
|
+
}
|
@@ -0,0 +1,51 @@
|
|
1
|
+
{
|
2
|
+
"version": "2.0",
|
3
|
+
"metadata": {
|
4
|
+
"apiVersion": "2023-08-08",
|
5
|
+
"endpointPrefix": "inspector-scan",
|
6
|
+
"jsonVersion": "1.1",
|
7
|
+
"protocol": "rest-json",
|
8
|
+
"serviceAbbreviation": "inspector-scan",
|
9
|
+
"serviceFullName": "Inspector Scan",
|
10
|
+
"serviceId": "Inspector Scan",
|
11
|
+
"signatureVersion": "v4",
|
12
|
+
"signingName": "inspector-scan",
|
13
|
+
"uid": "inspector-scan-2023-08-08"
|
14
|
+
},
|
15
|
+
"operations": {
|
16
|
+
"ScanSbom": {
|
17
|
+
"http": {
|
18
|
+
"requestUri": "/scan/sbom",
|
19
|
+
"responseCode": 200
|
20
|
+
},
|
21
|
+
"input": {
|
22
|
+
"type": "structure",
|
23
|
+
"required": [
|
24
|
+
"sbom"
|
25
|
+
],
|
26
|
+
"members": {
|
27
|
+
"sbom": {
|
28
|
+
"shape": "S2"
|
29
|
+
},
|
30
|
+
"outputFormat": {}
|
31
|
+
}
|
32
|
+
},
|
33
|
+
"output": {
|
34
|
+
"type": "structure",
|
35
|
+
"members": {
|
36
|
+
"sbom": {
|
37
|
+
"shape": "S2"
|
38
|
+
}
|
39
|
+
}
|
40
|
+
},
|
41
|
+
"idempotent": true
|
42
|
+
}
|
43
|
+
},
|
44
|
+
"shapes": {
|
45
|
+
"S2": {
|
46
|
+
"type": "structure",
|
47
|
+
"members": {},
|
48
|
+
"document": true
|
49
|
+
}
|
50
|
+
}
|
51
|
+
}
|