pulumi-oci 1.19.0a1705693078__py3-none-any.whl → 1.20.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (111) hide show
  1. pulumi_oci/__init__.py +59 -0
  2. pulumi_oci/adm/_inputs.py +99 -18
  3. pulumi_oci/adm/get_remediation_run_application_dependency_recommendations.py +23 -3
  4. pulumi_oci/adm/get_vulnerability_audit.py +31 -5
  5. pulumi_oci/adm/get_vulnerability_audit_application_dependency_vulnerabilities.py +43 -6
  6. pulumi_oci/adm/get_vulnerability_audit_application_dependency_vulnerability.py +27 -1
  7. pulumi_oci/adm/get_vulnerability_audits.py +54 -3
  8. pulumi_oci/adm/outputs.py +296 -31
  9. pulumi_oci/adm/remediation_recipe.py +2 -0
  10. pulumi_oci/adm/vulnerability_audit.py +96 -37
  11. pulumi_oci/database/__init__.py +1 -0
  12. pulumi_oci/database/_inputs.py +40 -0
  13. pulumi_oci/database/cloud_vm_cluster.py +22 -1
  14. pulumi_oci/database/get_system_versions.py +173 -0
  15. pulumi_oci/database/outputs.py +88 -0
  16. pulumi_oci/database/vm_cluster.py +22 -1
  17. pulumi_oci/datasafe/__init__.py +22 -0
  18. pulumi_oci/datasafe/_inputs.py +1826 -161
  19. pulumi_oci/datasafe/audit_trail.py +140 -0
  20. pulumi_oci/datasafe/discovery_mod.py +7 -7
  21. pulumi_oci/datasafe/get_audit_trail.py +66 -1
  22. pulumi_oci/datasafe/get_discovery_job.py +1 -1
  23. pulumi_oci/datasafe/get_discovery_jobs_result.py +1 -1
  24. pulumi_oci/datasafe/get_discovery_jobs_results.py +1 -1
  25. pulumi_oci/datasafe/get_masking_policies_masking_column.py +1 -1
  26. pulumi_oci/datasafe/get_masking_policies_masking_columns.py +1 -1
  27. pulumi_oci/datasafe/get_masking_policy.py +1 -1
  28. pulumi_oci/datasafe/get_report.py +1 -1
  29. pulumi_oci/datasafe/get_security_assessment.py +3 -3
  30. pulumi_oci/datasafe/get_security_assessment_comparison.py +5 -5
  31. pulumi_oci/datasafe/get_security_assessment_finding.py +29 -3
  32. pulumi_oci/datasafe/get_security_assessment_finding_analytics.py +276 -0
  33. pulumi_oci/datasafe/get_security_assessment_findings.py +43 -7
  34. pulumi_oci/datasafe/get_security_assessment_findings_change_audit_logs.py +309 -0
  35. pulumi_oci/datasafe/get_security_assessment_security_feature_analytics.py +198 -0
  36. pulumi_oci/datasafe/get_security_assessment_security_features.py +377 -0
  37. pulumi_oci/datasafe/get_security_assessments.py +2 -2
  38. pulumi_oci/datasafe/get_security_policies.py +253 -0
  39. pulumi_oci/datasafe/get_security_policy.py +235 -0
  40. pulumi_oci/datasafe/get_security_policy_deployment.py +261 -0
  41. pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_state.py +165 -0
  42. pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_states.py +180 -0
  43. pulumi_oci/datasafe/get_security_policy_deployments.py +293 -0
  44. pulumi_oci/datasafe/get_security_policy_report.py +248 -0
  45. pulumi_oci/datasafe/get_security_policy_report_database_table_access_entries.py +158 -0
  46. pulumi_oci/datasafe/get_security_policy_report_database_table_access_entry.py +408 -0
  47. pulumi_oci/datasafe/get_security_policy_report_database_view_access_entries.py +178 -0
  48. pulumi_oci/datasafe/get_security_policy_report_database_view_access_entry.py +382 -0
  49. pulumi_oci/datasafe/get_security_policy_report_role_grant_paths.py +177 -0
  50. pulumi_oci/datasafe/get_security_policy_reports.py +273 -0
  51. pulumi_oci/datasafe/get_sensitive_data_model.py +1 -1
  52. pulumi_oci/datasafe/get_target_database.py +27 -4
  53. pulumi_oci/datasafe/get_target_database_peer_target_database.py +263 -0
  54. pulumi_oci/datasafe/get_target_database_peer_target_databases.py +133 -0
  55. pulumi_oci/datasafe/get_target_databases.py +1 -1
  56. pulumi_oci/datasafe/get_user_assessment.py +5 -5
  57. pulumi_oci/datasafe/get_user_assessment_comparison.py +2 -2
  58. pulumi_oci/datasafe/get_user_assessment_user_access_analytics.py +133 -0
  59. pulumi_oci/datasafe/get_user_assessment_user_analytics.py +2 -2
  60. pulumi_oci/datasafe/get_user_assessment_users.py +42 -2
  61. pulumi_oci/datasafe/get_user_assessments.py +2 -2
  62. pulumi_oci/datasafe/masking_policies_masking_column.py +7 -7
  63. pulumi_oci/datasafe/masking_policy.py +9 -9
  64. pulumi_oci/datasafe/outputs.py +16686 -9777
  65. pulumi_oci/datasafe/report.py +559 -0
  66. pulumi_oci/datasafe/security_assessment.py +12 -12
  67. pulumi_oci/datasafe/sensitive_data_model.py +7 -7
  68. pulumi_oci/datasafe/set_security_assessment_baseline.py +7 -7
  69. pulumi_oci/datasafe/set_user_assessment_baseline.py +7 -7
  70. pulumi_oci/datasafe/target_database.py +146 -25
  71. pulumi_oci/datasafe/target_database_peer_target_database.py +634 -0
  72. pulumi_oci/datasafe/user_assessment.py +20 -20
  73. pulumi_oci/generativeai/__init__.py +18 -0
  74. pulumi_oci/generativeai/_inputs.py +534 -0
  75. pulumi_oci/generativeai/dedicated_ai_cluster.py +808 -0
  76. pulumi_oci/generativeai/endpoint.py +717 -0
  77. pulumi_oci/generativeai/get_dedicated_ai_cluster.py +288 -0
  78. pulumi_oci/generativeai/get_dedicated_ai_clusters.py +183 -0
  79. pulumi_oci/generativeai/get_endpoint.py +275 -0
  80. pulumi_oci/generativeai/get_endpoints.py +183 -0
  81. pulumi_oci/generativeai/get_model.py +353 -0
  82. pulumi_oci/generativeai/get_models.py +220 -0
  83. pulumi_oci/generativeai/model.py +858 -0
  84. pulumi_oci/generativeai/outputs.py +1721 -0
  85. pulumi_oci/marketplace/get_publication.py +14 -1
  86. pulumi_oci/marketplace/outputs.py +11 -0
  87. pulumi_oci/marketplace/publication.py +28 -0
  88. pulumi_oci/monitoring/__init__.py +3 -0
  89. pulumi_oci/monitoring/_inputs.py +82 -4
  90. pulumi_oci/monitoring/alarm.py +15 -15
  91. pulumi_oci/monitoring/alarm_suppression.py +745 -0
  92. pulumi_oci/monitoring/get_alarm.py +5 -5
  93. pulumi_oci/monitoring/get_alarm_history_collection.py +4 -4
  94. pulumi_oci/monitoring/get_alarm_statuses.py +3 -1
  95. pulumi_oci/monitoring/get_alarm_suppression.py +276 -0
  96. pulumi_oci/monitoring/get_alarm_suppressions.py +192 -0
  97. pulumi_oci/monitoring/get_metric_data.py +12 -8
  98. pulumi_oci/monitoring/get_metrics.py +2 -2
  99. pulumi_oci/monitoring/outputs.py +355 -50
  100. pulumi_oci/networkfirewall/_inputs.py +25 -20
  101. pulumi_oci/networkfirewall/outputs.py +40 -30
  102. pulumi_oci/stackmonitoring/__init__.py +3 -0
  103. pulumi_oci/stackmonitoring/_inputs.py +143 -0
  104. pulumi_oci/stackmonitoring/get_process_set.py +236 -0
  105. pulumi_oci/stackmonitoring/get_process_sets.py +156 -0
  106. pulumi_oci/stackmonitoring/outputs.py +422 -0
  107. pulumi_oci/stackmonitoring/process_set.py +548 -0
  108. {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/METADATA +1 -1
  109. {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/RECORD +111 -70
  110. {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/WHEEL +0 -0
  111. {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/top_level.txt +0 -0
pulumi_oci/adm/outputs.py CHANGED
@@ -80,6 +80,8 @@ class RemediationRecipeDetectConfiguration(dict):
80
80
  suggest = "max_permissible_cvss_v2score"
81
81
  elif key == "maxPermissibleCvssV3score":
82
82
  suggest = "max_permissible_cvss_v3score"
83
+ elif key == "maxPermissibleSeverity":
84
+ suggest = "max_permissible_severity"
83
85
  elif key == "upgradePolicy":
84
86
  suggest = "upgrade_policy"
85
87
 
@@ -98,11 +100,13 @@ class RemediationRecipeDetectConfiguration(dict):
98
100
  exclusions: Optional[Sequence[str]] = None,
99
101
  max_permissible_cvss_v2score: Optional[float] = None,
100
102
  max_permissible_cvss_v3score: Optional[float] = None,
103
+ max_permissible_severity: Optional[str] = None,
101
104
  upgrade_policy: Optional[str] = None):
102
105
  """
103
106
  :param Sequence[str] exclusions: (Updatable) The list of dependencies to be ignored by the recommendation algorithm. The dependency pattern is matched against the 'group:artifact:version' or the purl of a dependency. An asterisk (*) at the end in the dependency pattern acts as a wildcard and matches zero or more characters.
104
107
  :param float max_permissible_cvss_v2score: (Updatable) The maximum Common Vulnerability Scoring System Version 2 (CVSS V2) score. An artifact with a CVSS V2 score below this value is not considered for patching.
105
108
  :param float max_permissible_cvss_v3score: (Updatable) The maximum Common Vulnerability Scoring System Version 3 (CVSS V3) score. An artifact with a CVSS V3 score below this value is not considered for patching.
109
+ :param str max_permissible_severity: (Updatable) The maximum ADM Severity. An artifact with an ADM Severity below this value is not considered for patching.
106
110
  :param str upgrade_policy: (Updatable) The upgrade policy for recommendations. The `Nearest` upgrade policy upgrades a dependency to the oldest version that meets both of the following criteria: it is newer than the current version and it is not affected by a vulnerability.
107
111
  """
108
112
  if exclusions is not None:
@@ -111,6 +115,8 @@ class RemediationRecipeDetectConfiguration(dict):
111
115
  pulumi.set(__self__, "max_permissible_cvss_v2score", max_permissible_cvss_v2score)
112
116
  if max_permissible_cvss_v3score is not None:
113
117
  pulumi.set(__self__, "max_permissible_cvss_v3score", max_permissible_cvss_v3score)
118
+ if max_permissible_severity is not None:
119
+ pulumi.set(__self__, "max_permissible_severity", max_permissible_severity)
114
120
  if upgrade_policy is not None:
115
121
  pulumi.set(__self__, "upgrade_policy", upgrade_policy)
116
122
 
@@ -138,6 +144,14 @@ class RemediationRecipeDetectConfiguration(dict):
138
144
  """
139
145
  return pulumi.get(self, "max_permissible_cvss_v3score")
140
146
 
147
+ @property
148
+ @pulumi.getter(name="maxPermissibleSeverity")
149
+ def max_permissible_severity(self) -> Optional[str]:
150
+ """
151
+ (Updatable) The maximum ADM Severity. An artifact with an ADM Severity below this value is not considered for patching.
152
+ """
153
+ return pulumi.get(self, "max_permissible_severity")
154
+
141
155
  @property
142
156
  @pulumi.getter(name="upgradePolicy")
143
157
  def upgrade_policy(self) -> Optional[str]:
@@ -606,26 +620,23 @@ class VulnerabilityAuditApplicationDependency(dict):
606
620
  return super().get(key, default)
607
621
 
608
622
  def __init__(__self__, *,
609
- gav: str,
610
623
  node_id: str,
611
- application_dependency_node_ids: Optional[Sequence[str]] = None):
624
+ application_dependency_node_ids: Optional[Sequence[str]] = None,
625
+ gav: Optional[str] = None,
626
+ purl: Optional[str] = None):
612
627
  """
613
- :param str gav: Group Artifact Version (GAV) identifier (Group:Artifact:Version), e.g. org.graalvm.nativeimage:svm:21.1.0.
614
628
  :param str node_id: Unique identifier of an application dependency, for example nodeId1. The nodeId can be generated by assigning a unique id to each application dependency in the tree of application dependencies. Every node, even those who share the same GAV, should have a different nodeId. The preferred way of constructing a nodeId is to assign incremental integers during a breadth first or depth first search. A nodeId can be reused only it refers to the same subtree of application dependencies. (This is not equivalent to referring to the same GAV, that is, a GAV can have multiple transitive dependencies.)
615
629
  :param Sequence[str] application_dependency_node_ids: List of application dependencies on which this application dependency depends, each identified by its nodeId.
630
+ :param str gav: Group Artifact Version (GAV) identifier (Group:Artifact:Version). Example: org.graalvm.nativeimage:svm:21.1.0. "N/A" for non-maven artifacts.
631
+ :param str purl: Package URL defined in https://github.com/package-url/purl-spec, e.g. pkg:maven/org.graalvm.nativeimage/svm@21.1.0
616
632
  """
617
- pulumi.set(__self__, "gav", gav)
618
633
  pulumi.set(__self__, "node_id", node_id)
619
634
  if application_dependency_node_ids is not None:
620
635
  pulumi.set(__self__, "application_dependency_node_ids", application_dependency_node_ids)
621
-
622
- @property
623
- @pulumi.getter
624
- def gav(self) -> str:
625
- """
626
- Group Artifact Version (GAV) identifier (Group:Artifact:Version), e.g. org.graalvm.nativeimage:svm:21.1.0.
627
- """
628
- return pulumi.get(self, "gav")
636
+ if gav is not None:
637
+ pulumi.set(__self__, "gav", gav)
638
+ if purl is not None:
639
+ pulumi.set(__self__, "purl", purl)
629
640
 
630
641
  @property
631
642
  @pulumi.getter(name="nodeId")
@@ -643,6 +654,22 @@ class VulnerabilityAuditApplicationDependency(dict):
643
654
  """
644
655
  return pulumi.get(self, "application_dependency_node_ids")
645
656
 
657
+ @property
658
+ @pulumi.getter
659
+ def gav(self) -> Optional[str]:
660
+ """
661
+ Group Artifact Version (GAV) identifier (Group:Artifact:Version). Example: org.graalvm.nativeimage:svm:21.1.0. "N/A" for non-maven artifacts.
662
+ """
663
+ return pulumi.get(self, "gav")
664
+
665
+ @property
666
+ @pulumi.getter
667
+ def purl(self) -> Optional[str]:
668
+ """
669
+ Package URL defined in https://github.com/package-url/purl-spec, e.g. pkg:maven/org.graalvm.nativeimage/svm@21.1.0
670
+ """
671
+ return pulumi.get(self, "purl")
672
+
646
673
 
647
674
  @pulumi.output_type
648
675
  class VulnerabilityAuditConfiguration(dict):
@@ -653,6 +680,8 @@ class VulnerabilityAuditConfiguration(dict):
653
680
  suggest = "max_permissible_cvss_v2score"
654
681
  elif key == "maxPermissibleCvssV3score":
655
682
  suggest = "max_permissible_cvss_v3score"
683
+ elif key == "maxPermissibleSeverity":
684
+ suggest = "max_permissible_severity"
656
685
 
657
686
  if suggest:
658
687
  pulumi.log.warn(f"Key '{key}' not found in VulnerabilityAuditConfiguration. Access the value via the '{suggest}' property getter instead.")
@@ -668,11 +697,13 @@ class VulnerabilityAuditConfiguration(dict):
668
697
  def __init__(__self__, *,
669
698
  exclusions: Optional[Sequence[str]] = None,
670
699
  max_permissible_cvss_v2score: Optional[float] = None,
671
- max_permissible_cvss_v3score: Optional[float] = None):
700
+ max_permissible_cvss_v3score: Optional[float] = None,
701
+ max_permissible_severity: Optional[str] = None):
672
702
  """
673
703
  :param Sequence[str] exclusions: A vulnerable application dependency is ignored if its name matches any of the items in `exclusions`. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters.
674
704
  :param float max_permissible_cvss_v2score: A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
675
705
  :param float max_permissible_cvss_v3score: A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
706
+ :param str max_permissible_severity: A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
676
707
  """
677
708
  if exclusions is not None:
678
709
  pulumi.set(__self__, "exclusions", exclusions)
@@ -680,6 +711,8 @@ class VulnerabilityAuditConfiguration(dict):
680
711
  pulumi.set(__self__, "max_permissible_cvss_v2score", max_permissible_cvss_v2score)
681
712
  if max_permissible_cvss_v3score is not None:
682
713
  pulumi.set(__self__, "max_permissible_cvss_v3score", max_permissible_cvss_v3score)
714
+ if max_permissible_severity is not None:
715
+ pulumi.set(__self__, "max_permissible_severity", max_permissible_severity)
683
716
 
684
717
  @property
685
718
  @pulumi.getter
@@ -705,6 +738,14 @@ class VulnerabilityAuditConfiguration(dict):
705
738
  """
706
739
  return pulumi.get(self, "max_permissible_cvss_v3score")
707
740
 
741
+ @property
742
+ @pulumi.getter(name="maxPermissibleSeverity")
743
+ def max_permissible_severity(self) -> Optional[str]:
744
+ """
745
+ A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
746
+ """
747
+ return pulumi.get(self, "max_permissible_severity")
748
+
708
749
 
709
750
  @pulumi.output_type
710
751
  class VulnerabilityAuditSource(dict):
@@ -871,13 +912,17 @@ class VulnerabilityAuditVulnerability(dict):
871
912
  cvss_v3score: Optional[float] = None,
872
913
  id: Optional[str] = None,
873
914
  is_false_positive: Optional[bool] = None,
874
- is_ignored: Optional[bool] = None):
915
+ is_ignored: Optional[bool] = None,
916
+ severity: Optional[str] = None,
917
+ source: Optional[str] = None):
875
918
  """
876
919
  :param float cvss_v2score: Common Vulnerability Scoring System (CVSS) Version 2.
877
920
  :param float cvss_v3score: Common Vulnerability Scoring System (CVSS) Version 3.
878
921
  :param str id: Unique vulnerability identifier, e.g. CVE-1999-0067.
879
922
  :param bool is_false_positive: Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is `null`.
880
923
  :param bool is_ignored: Indicates if the vulnerability was ignored according to the audit configuration.
924
+ :param str severity: ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
925
+ :param str source: vulnerability audit source.
881
926
  """
882
927
  if cvss_v2score is not None:
883
928
  pulumi.set(__self__, "cvss_v2score", cvss_v2score)
@@ -889,6 +934,10 @@ class VulnerabilityAuditVulnerability(dict):
889
934
  pulumi.set(__self__, "is_false_positive", is_false_positive)
890
935
  if is_ignored is not None:
891
936
  pulumi.set(__self__, "is_ignored", is_ignored)
937
+ if severity is not None:
938
+ pulumi.set(__self__, "severity", severity)
939
+ if source is not None:
940
+ pulumi.set(__self__, "source", source)
892
941
 
893
942
  @property
894
943
  @pulumi.getter(name="cvssV2score")
@@ -930,6 +979,22 @@ class VulnerabilityAuditVulnerability(dict):
930
979
  """
931
980
  return pulumi.get(self, "is_ignored")
932
981
 
982
+ @property
983
+ @pulumi.getter
984
+ def severity(self) -> Optional[str]:
985
+ """
986
+ ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
987
+ """
988
+ return pulumi.get(self, "severity")
989
+
990
+ @property
991
+ @pulumi.getter
992
+ def source(self) -> Optional[str]:
993
+ """
994
+ vulnerability audit source.
995
+ """
996
+ return pulumi.get(self, "source")
997
+
933
998
 
934
999
  @pulumi.output_type
935
1000
  class GetKnowledgebasesFilterResult(dict):
@@ -1082,16 +1147,19 @@ class GetRemediationRecipeDetectConfigurationResult(dict):
1082
1147
  exclusions: Sequence[str],
1083
1148
  max_permissible_cvss_v2score: float,
1084
1149
  max_permissible_cvss_v3score: float,
1150
+ max_permissible_severity: str,
1085
1151
  upgrade_policy: str):
1086
1152
  """
1087
1153
  :param Sequence[str] exclusions: The list of dependencies to be ignored by the recommendation algorithm. The dependency pattern is matched against the 'group:artifact:version' or the purl of a dependency. An asterisk (*) at the end in the dependency pattern acts as a wildcard and matches zero or more characters.
1088
1154
  :param float max_permissible_cvss_v2score: The maximum Common Vulnerability Scoring System Version 2 (CVSS V2) score. An artifact with a CVSS V2 score below this value is not considered for patching.
1089
1155
  :param float max_permissible_cvss_v3score: The maximum Common Vulnerability Scoring System Version 3 (CVSS V3) score. An artifact with a CVSS V3 score below this value is not considered for patching.
1156
+ :param str max_permissible_severity: The maximum ADM Severity. An artifact with an ADM Severity below this value is not considered for patching.
1090
1157
  :param str upgrade_policy: The upgrade policy for recommendations. The `Nearest` upgrade policy upgrades a dependency to the oldest version that meets both of the following criteria: it is newer than the current version and it is not affected by a vulnerability.
1091
1158
  """
1092
1159
  pulumi.set(__self__, "exclusions", exclusions)
1093
1160
  pulumi.set(__self__, "max_permissible_cvss_v2score", max_permissible_cvss_v2score)
1094
1161
  pulumi.set(__self__, "max_permissible_cvss_v3score", max_permissible_cvss_v3score)
1162
+ pulumi.set(__self__, "max_permissible_severity", max_permissible_severity)
1095
1163
  pulumi.set(__self__, "upgrade_policy", upgrade_policy)
1096
1164
 
1097
1165
  @property
@@ -1118,6 +1186,14 @@ class GetRemediationRecipeDetectConfigurationResult(dict):
1118
1186
  """
1119
1187
  return pulumi.get(self, "max_permissible_cvss_v3score")
1120
1188
 
1189
+ @property
1190
+ @pulumi.getter(name="maxPermissibleSeverity")
1191
+ def max_permissible_severity(self) -> str:
1192
+ """
1193
+ The maximum ADM Severity. An artifact with an ADM Severity below this value is not considered for patching.
1194
+ """
1195
+ return pulumi.get(self, "max_permissible_severity")
1196
+
1121
1197
  @property
1122
1198
  @pulumi.getter(name="upgradePolicy")
1123
1199
  def upgrade_policy(self) -> str:
@@ -1596,16 +1672,19 @@ class GetRemediationRecipesRemediationRecipeCollectionItemDetectConfigurationRes
1596
1672
  exclusions: Sequence[str],
1597
1673
  max_permissible_cvss_v2score: float,
1598
1674
  max_permissible_cvss_v3score: float,
1675
+ max_permissible_severity: str,
1599
1676
  upgrade_policy: str):
1600
1677
  """
1601
1678
  :param Sequence[str] exclusions: The list of dependencies to be ignored by the recommendation algorithm. The dependency pattern is matched against the 'group:artifact:version' or the purl of a dependency. An asterisk (*) at the end in the dependency pattern acts as a wildcard and matches zero or more characters.
1602
1679
  :param float max_permissible_cvss_v2score: The maximum Common Vulnerability Scoring System Version 2 (CVSS V2) score. An artifact with a CVSS V2 score below this value is not considered for patching.
1603
1680
  :param float max_permissible_cvss_v3score: The maximum Common Vulnerability Scoring System Version 3 (CVSS V3) score. An artifact with a CVSS V3 score below this value is not considered for patching.
1681
+ :param str max_permissible_severity: The maximum ADM Severity. An artifact with an ADM Severity below this value is not considered for patching.
1604
1682
  :param str upgrade_policy: The upgrade policy for recommendations. The `Nearest` upgrade policy upgrades a dependency to the oldest version that meets both of the following criteria: it is newer than the current version and it is not affected by a vulnerability.
1605
1683
  """
1606
1684
  pulumi.set(__self__, "exclusions", exclusions)
1607
1685
  pulumi.set(__self__, "max_permissible_cvss_v2score", max_permissible_cvss_v2score)
1608
1686
  pulumi.set(__self__, "max_permissible_cvss_v3score", max_permissible_cvss_v3score)
1687
+ pulumi.set(__self__, "max_permissible_severity", max_permissible_severity)
1609
1688
  pulumi.set(__self__, "upgrade_policy", upgrade_policy)
1610
1689
 
1611
1690
  @property
@@ -1632,6 +1711,14 @@ class GetRemediationRecipesRemediationRecipeCollectionItemDetectConfigurationRes
1632
1711
  """
1633
1712
  return pulumi.get(self, "max_permissible_cvss_v3score")
1634
1713
 
1714
+ @property
1715
+ @pulumi.getter(name="maxPermissibleSeverity")
1716
+ def max_permissible_severity(self) -> str:
1717
+ """
1718
+ The maximum ADM Severity. An artifact with an ADM Severity below this value is not considered for patching.
1719
+ """
1720
+ return pulumi.get(self, "max_permissible_severity")
1721
+
1635
1722
  @property
1636
1723
  @pulumi.getter(name="upgradePolicy")
1637
1724
  def upgrade_policy(self) -> str:
@@ -1917,17 +2004,23 @@ class GetRemediationRunApplicationDependencyRecommendationsApplicationDependency
1917
2004
  application_dependency_node_ids: Sequence[str],
1918
2005
  gav: str,
1919
2006
  node_id: str,
1920
- recommended_gav: str):
2007
+ purl: str,
2008
+ recommended_gav: str,
2009
+ recommended_purl: str):
1921
2010
  """
1922
2011
  :param Sequence[str] application_dependency_node_ids: List of (application dependencies) node identifiers from which this node depends.
1923
2012
  :param str gav: A filter to return only resources that match the entire GAV (Group Artifact Version) identifier given.
1924
2013
  :param str node_id: Unique node identifier of an application dependency with an associated Recommendation, e.g. nodeId1.
2014
+ :param str purl: A filter to return only resources that match the entire PURL given (https://github.com/package-url/purl-spec/).
1925
2015
  :param str recommended_gav: Recommended application dependency in "group:artifact:version" (GAV) format, e.g. org.graalvm.nativeimage:svm:21.2.0.
2016
+ :param str recommended_purl: Recommended application dependency in PURL format, e.g. pkg:maven/org.graalvm.nativeimage/svm@21.2.0
1926
2017
  """
1927
2018
  pulumi.set(__self__, "application_dependency_node_ids", application_dependency_node_ids)
1928
2019
  pulumi.set(__self__, "gav", gav)
1929
2020
  pulumi.set(__self__, "node_id", node_id)
2021
+ pulumi.set(__self__, "purl", purl)
1930
2022
  pulumi.set(__self__, "recommended_gav", recommended_gav)
2023
+ pulumi.set(__self__, "recommended_purl", recommended_purl)
1931
2024
 
1932
2025
  @property
1933
2026
  @pulumi.getter(name="applicationDependencyNodeIds")
@@ -1953,6 +2046,14 @@ class GetRemediationRunApplicationDependencyRecommendationsApplicationDependency
1953
2046
  """
1954
2047
  return pulumi.get(self, "node_id")
1955
2048
 
2049
+ @property
2050
+ @pulumi.getter
2051
+ def purl(self) -> str:
2052
+ """
2053
+ A filter to return only resources that match the entire PURL given (https://github.com/package-url/purl-spec/).
2054
+ """
2055
+ return pulumi.get(self, "purl")
2056
+
1956
2057
  @property
1957
2058
  @pulumi.getter(name="recommendedGav")
1958
2059
  def recommended_gav(self) -> str:
@@ -1961,6 +2062,14 @@ class GetRemediationRunApplicationDependencyRecommendationsApplicationDependency
1961
2062
  """
1962
2063
  return pulumi.get(self, "recommended_gav")
1963
2064
 
2065
+ @property
2066
+ @pulumi.getter(name="recommendedPurl")
2067
+ def recommended_purl(self) -> str:
2068
+ """
2069
+ Recommended application dependency in PURL format, e.g. pkg:maven/org.graalvm.nativeimage/svm@21.2.0
2070
+ """
2071
+ return pulumi.get(self, "recommended_purl")
2072
+
1964
2073
 
1965
2074
  @pulumi.output_type
1966
2075
  class GetRemediationRunApplicationDependencyRecommendationsFilterResult(dict):
@@ -2634,10 +2743,12 @@ class GetVulnerabilityAuditApplicationDependencyResult(dict):
2634
2743
  def __init__(__self__, *,
2635
2744
  application_dependency_node_ids: Sequence[str],
2636
2745
  gav: str,
2637
- node_id: str):
2746
+ node_id: str,
2747
+ purl: str):
2638
2748
  pulumi.set(__self__, "application_dependency_node_ids", application_dependency_node_ids)
2639
2749
  pulumi.set(__self__, "gav", gav)
2640
2750
  pulumi.set(__self__, "node_id", node_id)
2751
+ pulumi.set(__self__, "purl", purl)
2641
2752
 
2642
2753
  @property
2643
2754
  @pulumi.getter(name="applicationDependencyNodeIds")
@@ -2654,6 +2765,11 @@ class GetVulnerabilityAuditApplicationDependencyResult(dict):
2654
2765
  def node_id(self) -> str:
2655
2766
  return pulumi.get(self, "node_id")
2656
2767
 
2768
+ @property
2769
+ @pulumi.getter
2770
+ def purl(self) -> str:
2771
+ return pulumi.get(self, "purl")
2772
+
2657
2773
 
2658
2774
  @pulumi.output_type
2659
2775
  class GetVulnerabilityAuditApplicationDependencyVulnerabilitiesApplicationDependencyVulnerabilityCollectionResult(dict):
@@ -2680,18 +2796,21 @@ class GetVulnerabilityAuditApplicationDependencyVulnerabilitiesApplicationDepend
2680
2796
  gav: str,
2681
2797
  is_found_in_knowledge_base: bool,
2682
2798
  node_id: str,
2799
+ purl: str,
2683
2800
  vulnerabilities: Sequence['outputs.GetVulnerabilityAuditApplicationDependencyVulnerabilitiesApplicationDependencyVulnerabilityCollectionItemVulnerabilityResult']):
2684
2801
  """
2685
2802
  :param Sequence[str] application_dependency_node_ids: List of application dependencies on which this application dependency depends, each identified by its nodeId.
2686
2803
  :param str gav: A filter to return only resources that match the entire GAV (Group Artifact Version) identifier given.
2687
2804
  :param bool is_found_in_knowledge_base: Indicates if the artifact is found in the knowledge base.
2688
2805
  :param str node_id: Unique identifier of an application dependency, for example nodeId1.
2806
+ :param str purl: A filter to return only resources that match the entire PURL given (https://github.com/package-url/purl-spec/).
2689
2807
  :param Sequence['GetVulnerabilityAuditApplicationDependencyVulnerabilitiesApplicationDependencyVulnerabilityCollectionItemVulnerabilityArgs'] vulnerabilities: List of vulnerabilities for the application dependency.
2690
2808
  """
2691
2809
  pulumi.set(__self__, "application_dependency_node_ids", application_dependency_node_ids)
2692
2810
  pulumi.set(__self__, "gav", gav)
2693
2811
  pulumi.set(__self__, "is_found_in_knowledge_base", is_found_in_knowledge_base)
2694
2812
  pulumi.set(__self__, "node_id", node_id)
2813
+ pulumi.set(__self__, "purl", purl)
2695
2814
  pulumi.set(__self__, "vulnerabilities", vulnerabilities)
2696
2815
 
2697
2816
  @property
@@ -2726,6 +2845,14 @@ class GetVulnerabilityAuditApplicationDependencyVulnerabilitiesApplicationDepend
2726
2845
  """
2727
2846
  return pulumi.get(self, "node_id")
2728
2847
 
2848
+ @property
2849
+ @pulumi.getter
2850
+ def purl(self) -> str:
2851
+ """
2852
+ A filter to return only resources that match the entire PURL given (https://github.com/package-url/purl-spec/).
2853
+ """
2854
+ return pulumi.get(self, "purl")
2855
+
2729
2856
  @property
2730
2857
  @pulumi.getter
2731
2858
  def vulnerabilities(self) -> Sequence['outputs.GetVulnerabilityAuditApplicationDependencyVulnerabilitiesApplicationDependencyVulnerabilityCollectionItemVulnerabilityResult']:
@@ -2742,19 +2869,25 @@ class GetVulnerabilityAuditApplicationDependencyVulnerabilitiesApplicationDepend
2742
2869
  cvss_v3score: float,
2743
2870
  id: str,
2744
2871
  is_false_positive: bool,
2745
- is_ignored: bool):
2872
+ is_ignored: bool,
2873
+ severity: str,
2874
+ source: str):
2746
2875
  """
2747
2876
  :param float cvss_v2score: Common Vulnerability Scoring System (CVSS) Version 2.
2748
2877
  :param float cvss_v3score: Common Vulnerability Scoring System (CVSS) Version 3.
2749
2878
  :param str id: Unique vulnerability identifier, e.g. CVE-1999-0067.
2750
2879
  :param bool is_false_positive: Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is `null`.
2751
2880
  :param bool is_ignored: Indicates if the vulnerability was ignored according to the audit configuration.
2881
+ :param str severity: ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
2882
+ :param str source: Source that published the vulnerability
2752
2883
  """
2753
2884
  pulumi.set(__self__, "cvss_v2score", cvss_v2score)
2754
2885
  pulumi.set(__self__, "cvss_v3score", cvss_v3score)
2755
2886
  pulumi.set(__self__, "id", id)
2756
2887
  pulumi.set(__self__, "is_false_positive", is_false_positive)
2757
2888
  pulumi.set(__self__, "is_ignored", is_ignored)
2889
+ pulumi.set(__self__, "severity", severity)
2890
+ pulumi.set(__self__, "source", source)
2758
2891
 
2759
2892
  @property
2760
2893
  @pulumi.getter(name="cvssV2score")
@@ -2796,6 +2929,22 @@ class GetVulnerabilityAuditApplicationDependencyVulnerabilitiesApplicationDepend
2796
2929
  """
2797
2930
  return pulumi.get(self, "is_ignored")
2798
2931
 
2932
+ @property
2933
+ @pulumi.getter
2934
+ def severity(self) -> str:
2935
+ """
2936
+ ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
2937
+ """
2938
+ return pulumi.get(self, "severity")
2939
+
2940
+ @property
2941
+ @pulumi.getter
2942
+ def source(self) -> str:
2943
+ """
2944
+ Source that published the vulnerability
2945
+ """
2946
+ return pulumi.get(self, "source")
2947
+
2799
2948
 
2800
2949
  @pulumi.output_type
2801
2950
  class GetVulnerabilityAuditApplicationDependencyVulnerabilitiesFilterResult(dict):
@@ -2831,6 +2980,7 @@ class GetVulnerabilityAuditApplicationDependencyVulnerabilityItemResult(dict):
2831
2980
  gav: str,
2832
2981
  is_found_in_knowledge_base: bool,
2833
2982
  node_id: str,
2983
+ purl: str,
2834
2984
  vulnerabilities: Sequence['outputs.GetVulnerabilityAuditApplicationDependencyVulnerabilityItemVulnerabilityResult']):
2835
2985
  """
2836
2986
  :param Sequence[str] application_dependency_node_ids: List of Application Dependencies on which this Application Dependency depends, each identified by its nodeId.
@@ -2843,6 +2993,7 @@ class GetVulnerabilityAuditApplicationDependencyVulnerabilityItemResult(dict):
2843
2993
  pulumi.set(__self__, "gav", gav)
2844
2994
  pulumi.set(__self__, "is_found_in_knowledge_base", is_found_in_knowledge_base)
2845
2995
  pulumi.set(__self__, "node_id", node_id)
2996
+ pulumi.set(__self__, "purl", purl)
2846
2997
  pulumi.set(__self__, "vulnerabilities", vulnerabilities)
2847
2998
 
2848
2999
  @property
@@ -2877,6 +3028,11 @@ class GetVulnerabilityAuditApplicationDependencyVulnerabilityItemResult(dict):
2877
3028
  """
2878
3029
  return pulumi.get(self, "node_id")
2879
3030
 
3031
+ @property
3032
+ @pulumi.getter
3033
+ def purl(self) -> str:
3034
+ return pulumi.get(self, "purl")
3035
+
2880
3036
  @property
2881
3037
  @pulumi.getter
2882
3038
  def vulnerabilities(self) -> Sequence['outputs.GetVulnerabilityAuditApplicationDependencyVulnerabilityItemVulnerabilityResult']:
@@ -2893,7 +3049,9 @@ class GetVulnerabilityAuditApplicationDependencyVulnerabilityItemVulnerabilityRe
2893
3049
  cvss_v3score: float,
2894
3050
  id: str,
2895
3051
  is_false_positive: bool,
2896
- is_ignored: bool):
3052
+ is_ignored: bool,
3053
+ severity: str,
3054
+ source: str):
2897
3055
  """
2898
3056
  :param float cvss_v2score: Common Vulnerability Scoring System (CVSS) Version 2.
2899
3057
  :param float cvss_v3score: Common Vulnerability Scoring System (CVSS) Version 3.
@@ -2905,6 +3063,8 @@ class GetVulnerabilityAuditApplicationDependencyVulnerabilityItemVulnerabilityRe
2905
3063
  pulumi.set(__self__, "id", id)
2906
3064
  pulumi.set(__self__, "is_false_positive", is_false_positive)
2907
3065
  pulumi.set(__self__, "is_ignored", is_ignored)
3066
+ pulumi.set(__self__, "severity", severity)
3067
+ pulumi.set(__self__, "source", source)
2908
3068
 
2909
3069
  @property
2910
3070
  @pulumi.getter(name="cvssV2score")
@@ -2943,21 +3103,34 @@ class GetVulnerabilityAuditApplicationDependencyVulnerabilityItemVulnerabilityRe
2943
3103
  """
2944
3104
  return pulumi.get(self, "is_ignored")
2945
3105
 
3106
+ @property
3107
+ @pulumi.getter
3108
+ def severity(self) -> str:
3109
+ return pulumi.get(self, "severity")
3110
+
3111
+ @property
3112
+ @pulumi.getter
3113
+ def source(self) -> str:
3114
+ return pulumi.get(self, "source")
3115
+
2946
3116
 
2947
3117
  @pulumi.output_type
2948
3118
  class GetVulnerabilityAuditConfigurationResult(dict):
2949
3119
  def __init__(__self__, *,
2950
3120
  exclusions: Sequence[str],
2951
3121
  max_permissible_cvss_v2score: float,
2952
- max_permissible_cvss_v3score: float):
3122
+ max_permissible_cvss_v3score: float,
3123
+ max_permissible_severity: str):
2953
3124
  """
2954
3125
  :param Sequence[str] exclusions: A vulnerable application dependency is ignored if its name matches any of the items in `exclusions`. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters.
2955
3126
  :param float max_permissible_cvss_v2score: A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
2956
3127
  :param float max_permissible_cvss_v3score: A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
3128
+ :param str max_permissible_severity: A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
2957
3129
  """
2958
3130
  pulumi.set(__self__, "exclusions", exclusions)
2959
3131
  pulumi.set(__self__, "max_permissible_cvss_v2score", max_permissible_cvss_v2score)
2960
3132
  pulumi.set(__self__, "max_permissible_cvss_v3score", max_permissible_cvss_v3score)
3133
+ pulumi.set(__self__, "max_permissible_severity", max_permissible_severity)
2961
3134
 
2962
3135
  @property
2963
3136
  @pulumi.getter
@@ -2983,6 +3156,14 @@ class GetVulnerabilityAuditConfigurationResult(dict):
2983
3156
  """
2984
3157
  return pulumi.get(self, "max_permissible_cvss_v3score")
2985
3158
 
3159
+ @property
3160
+ @pulumi.getter(name="maxPermissibleSeverity")
3161
+ def max_permissible_severity(self) -> str:
3162
+ """
3163
+ A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
3164
+ """
3165
+ return pulumi.get(self, "max_permissible_severity")
3166
+
2986
3167
 
2987
3168
  @pulumi.output_type
2988
3169
  class GetVulnerabilityAuditSourceResult(dict):
@@ -3082,19 +3263,25 @@ class GetVulnerabilityAuditVulnerabilityResult(dict):
3082
3263
  cvss_v3score: float,
3083
3264
  id: str,
3084
3265
  is_false_positive: bool,
3085
- is_ignored: bool):
3266
+ is_ignored: bool,
3267
+ severity: str,
3268
+ source: str):
3086
3269
  """
3087
3270
  :param float cvss_v2score: Common Vulnerability Scoring System (CVSS) Version 2.
3088
3271
  :param float cvss_v3score: Common Vulnerability Scoring System (CVSS) Version 3.
3089
3272
  :param str id: Unique vulnerability identifier, e.g. CVE-1999-0067.
3090
3273
  :param bool is_false_positive: Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is `null`.
3091
3274
  :param bool is_ignored: Indicates if the vulnerability was ignored according to the audit configuration.
3275
+ :param str severity: ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
3276
+ :param str source: Source that published the vulnerability
3092
3277
  """
3093
3278
  pulumi.set(__self__, "cvss_v2score", cvss_v2score)
3094
3279
  pulumi.set(__self__, "cvss_v3score", cvss_v3score)
3095
3280
  pulumi.set(__self__, "id", id)
3096
3281
  pulumi.set(__self__, "is_false_positive", is_false_positive)
3097
3282
  pulumi.set(__self__, "is_ignored", is_ignored)
3283
+ pulumi.set(__self__, "severity", severity)
3284
+ pulumi.set(__self__, "source", source)
3098
3285
 
3099
3286
  @property
3100
3287
  @pulumi.getter(name="cvssV2score")
@@ -3136,6 +3323,22 @@ class GetVulnerabilityAuditVulnerabilityResult(dict):
3136
3323
  """
3137
3324
  return pulumi.get(self, "is_ignored")
3138
3325
 
3326
+ @property
3327
+ @pulumi.getter
3328
+ def severity(self) -> str:
3329
+ """
3330
+ ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
3331
+ """
3332
+ return pulumi.get(self, "severity")
3333
+
3334
+ @property
3335
+ @pulumi.getter
3336
+ def source(self) -> str:
3337
+ """
3338
+ Source that published the vulnerability
3339
+ """
3340
+ return pulumi.get(self, "source")
3341
+
3139
3342
 
3140
3343
  @pulumi.output_type
3141
3344
  class GetVulnerabilityAuditsFilterResult(dict):
@@ -3194,6 +3397,8 @@ class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemResult(dict):
3194
3397
  max_observed_cvss_v2score_with_ignored: float,
3195
3398
  max_observed_cvss_v3score: float,
3196
3399
  max_observed_cvss_v3score_with_ignored: float,
3400
+ max_observed_severity: str,
3401
+ max_observed_severity_with_ignored: str,
3197
3402
  sources: Sequence['outputs.GetVulnerabilityAuditsVulnerabilityAuditCollectionItemSourceResult'],
3198
3403
  state: str,
3199
3404
  system_tags: Mapping[str, Any],
@@ -3204,7 +3409,7 @@ class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemResult(dict):
3204
3409
  vulnerable_artifacts_count: int,
3205
3410
  vulnerable_artifacts_count_with_ignored: int):
3206
3411
  """
3207
- :param str build_type: The type of the build tool.
3412
+ :param str build_type: The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
3208
3413
  :param str compartment_id: A filter to return only resources that belong to the specified compartment identifier. Required only if the id query param is not specified.
3209
3414
  :param Sequence['GetVulnerabilityAuditsVulnerabilityAuditCollectionItemConfigurationArgs'] configurations: Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in `exclusions`, or all of the associated Vulnerabilies have a CVSS v2 score below `maxPermissibleCvssV2Score` and a CVSS v3 score below `maxPermissibleCvssV3Score`. type: object
3210
3415
  :param Mapping[str, Any] defined_tags: Defined tags for this resource. Each key is predefined and scoped to a namespace. Example: `{"foo-namespace.bar-key": "value"}`
@@ -3218,13 +3423,15 @@ class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemResult(dict):
3218
3423
  :param float max_observed_cvss_v2score_with_ignored: Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
3219
3424
  :param float max_observed_cvss_v3score: Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
3220
3425
  :param float max_observed_cvss_v3score_with_ignored: Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
3221
- :param Sequence['GetVulnerabilityAuditsVulnerabilityAuditCollectionItemSourceArgs'] sources: vulnerability audit source.
3426
+ :param str max_observed_severity: Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
3427
+ :param str max_observed_severity_with_ignored: Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
3428
+ :param Sequence['GetVulnerabilityAuditsVulnerabilityAuditCollectionItemSourceArgs'] sources: Source that published the vulnerability
3222
3429
  :param str state: A filter to return only Vulnerability Audits that match the specified lifecycleState.
3223
3430
  :param Mapping[str, Any] system_tags: Usage of system tag keys. These predefined keys are scoped to namespaces. Example: `{"orcl-cloud.free-tier-retained": "true"}`
3224
3431
  :param str time_created: The creation date and time of the vulnerability audit (formatted according to [RFC3339](https://datatracker.ietf.org/doc/html/rfc3339)).
3225
3432
  :param str time_updated: The update date and time of the vulnerability audit (formatted according to [RFC3339](https://datatracker.ietf.org/doc/html/rfc3339)).
3226
- :param Sequence['GetVulnerabilityAuditsVulnerabilityAuditCollectionItemUsageDataArgs'] usage_datas: The source details of the usage data on Object Storage. Set `sourceType` to `objectStorageTuple` and use [UsageDataViaObjectStorageTupleDetails](https://docs.cloud.oracle.com/iaas/api/#/en/adm/latest/requests/UsageDataViaObjectStorageTupleDetails) when specifying the namespace, bucket name, and object name.
3227
- :param Sequence['GetVulnerabilityAuditsVulnerabilityAuditCollectionItemVulnerabilityArgs'] vulnerabilities: List of vulnerabilities found in the vulnerability audit.
3433
+ :param Sequence['GetVulnerabilityAuditsVulnerabilityAuditCollectionItemUsageDataArgs'] usage_datas: The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set `sourceType` to `objectStorageTuple` and use [UsageDataViaObjectStorageTupleDetails](https://docs.cloud.oracle.com/iaas/api/#/en/adm/latest/requests/UsageDataViaObjectStorageTupleDetails) when specifying the namespace, bucket name, and object name.
3434
+ :param Sequence['GetVulnerabilityAuditsVulnerabilityAuditCollectionItemVulnerabilityArgs'] vulnerabilities: List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
3228
3435
  :param int vulnerable_artifacts_count: Count of non-ignored vulnerable application dependencies.
3229
3436
  :param int vulnerable_artifacts_count_with_ignored: Count of all vulnerable application dependencies.
3230
3437
  """
@@ -3243,6 +3450,8 @@ class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemResult(dict):
3243
3450
  pulumi.set(__self__, "max_observed_cvss_v2score_with_ignored", max_observed_cvss_v2score_with_ignored)
3244
3451
  pulumi.set(__self__, "max_observed_cvss_v3score", max_observed_cvss_v3score)
3245
3452
  pulumi.set(__self__, "max_observed_cvss_v3score_with_ignored", max_observed_cvss_v3score_with_ignored)
3453
+ pulumi.set(__self__, "max_observed_severity", max_observed_severity)
3454
+ pulumi.set(__self__, "max_observed_severity_with_ignored", max_observed_severity_with_ignored)
3246
3455
  pulumi.set(__self__, "sources", sources)
3247
3456
  pulumi.set(__self__, "state", state)
3248
3457
  pulumi.set(__self__, "system_tags", system_tags)
@@ -3262,7 +3471,7 @@ class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemResult(dict):
3262
3471
  @pulumi.getter(name="buildType")
3263
3472
  def build_type(self) -> str:
3264
3473
  """
3265
- The type of the build tool.
3474
+ The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
3266
3475
  """
3267
3476
  return pulumi.get(self, "build_type")
3268
3477
 
@@ -3370,11 +3579,27 @@ class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemResult(dict):
3370
3579
  """
3371
3580
  return pulumi.get(self, "max_observed_cvss_v3score_with_ignored")
3372
3581
 
3582
+ @property
3583
+ @pulumi.getter(name="maxObservedSeverity")
3584
+ def max_observed_severity(self) -> str:
3585
+ """
3586
+ Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
3587
+ """
3588
+ return pulumi.get(self, "max_observed_severity")
3589
+
3590
+ @property
3591
+ @pulumi.getter(name="maxObservedSeverityWithIgnored")
3592
+ def max_observed_severity_with_ignored(self) -> str:
3593
+ """
3594
+ Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
3595
+ """
3596
+ return pulumi.get(self, "max_observed_severity_with_ignored")
3597
+
3373
3598
  @property
3374
3599
  @pulumi.getter
3375
3600
  def sources(self) -> Sequence['outputs.GetVulnerabilityAuditsVulnerabilityAuditCollectionItemSourceResult']:
3376
3601
  """
3377
- vulnerability audit source.
3602
+ Source that published the vulnerability
3378
3603
  """
3379
3604
  return pulumi.get(self, "sources")
3380
3605
 
@@ -3414,7 +3639,7 @@ class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemResult(dict):
3414
3639
  @pulumi.getter(name="usageDatas")
3415
3640
  def usage_datas(self) -> Sequence['outputs.GetVulnerabilityAuditsVulnerabilityAuditCollectionItemUsageDataResult']:
3416
3641
  """
3417
- The source details of the usage data on Object Storage. Set `sourceType` to `objectStorageTuple` and use [UsageDataViaObjectStorageTupleDetails](https://docs.cloud.oracle.com/iaas/api/#/en/adm/latest/requests/UsageDataViaObjectStorageTupleDetails) when specifying the namespace, bucket name, and object name.
3642
+ The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set `sourceType` to `objectStorageTuple` and use [UsageDataViaObjectStorageTupleDetails](https://docs.cloud.oracle.com/iaas/api/#/en/adm/latest/requests/UsageDataViaObjectStorageTupleDetails) when specifying the namespace, bucket name, and object name.
3418
3643
  """
3419
3644
  return pulumi.get(self, "usage_datas")
3420
3645
 
@@ -3422,7 +3647,7 @@ class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemResult(dict):
3422
3647
  @pulumi.getter
3423
3648
  def vulnerabilities(self) -> Sequence['outputs.GetVulnerabilityAuditsVulnerabilityAuditCollectionItemVulnerabilityResult']:
3424
3649
  """
3425
- List of vulnerabilities found in the vulnerability audit.
3650
+ List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
3426
3651
  """
3427
3652
  return pulumi.get(self, "vulnerabilities")
3428
3653
 
@@ -3448,10 +3673,12 @@ class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemApplicationDependenc
3448
3673
  def __init__(__self__, *,
3449
3674
  application_dependency_node_ids: Sequence[str],
3450
3675
  gav: str,
3451
- node_id: str):
3676
+ node_id: str,
3677
+ purl: str):
3452
3678
  pulumi.set(__self__, "application_dependency_node_ids", application_dependency_node_ids)
3453
3679
  pulumi.set(__self__, "gav", gav)
3454
3680
  pulumi.set(__self__, "node_id", node_id)
3681
+ pulumi.set(__self__, "purl", purl)
3455
3682
 
3456
3683
  @property
3457
3684
  @pulumi.getter(name="applicationDependencyNodeIds")
@@ -3468,21 +3695,29 @@ class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemApplicationDependenc
3468
3695
  def node_id(self) -> str:
3469
3696
  return pulumi.get(self, "node_id")
3470
3697
 
3698
+ @property
3699
+ @pulumi.getter
3700
+ def purl(self) -> str:
3701
+ return pulumi.get(self, "purl")
3702
+
3471
3703
 
3472
3704
  @pulumi.output_type
3473
3705
  class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemConfigurationResult(dict):
3474
3706
  def __init__(__self__, *,
3475
3707
  exclusions: Sequence[str],
3476
3708
  max_permissible_cvss_v2score: float,
3477
- max_permissible_cvss_v3score: float):
3709
+ max_permissible_cvss_v3score: float,
3710
+ max_permissible_severity: str):
3478
3711
  """
3479
3712
  :param Sequence[str] exclusions: A vulnerable application dependency is ignored if its name matches any of the items in `exclusions`. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters.
3480
3713
  :param float max_permissible_cvss_v2score: A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
3481
3714
  :param float max_permissible_cvss_v3score: A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
3715
+ :param str max_permissible_severity: A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
3482
3716
  """
3483
3717
  pulumi.set(__self__, "exclusions", exclusions)
3484
3718
  pulumi.set(__self__, "max_permissible_cvss_v2score", max_permissible_cvss_v2score)
3485
3719
  pulumi.set(__self__, "max_permissible_cvss_v3score", max_permissible_cvss_v3score)
3720
+ pulumi.set(__self__, "max_permissible_severity", max_permissible_severity)
3486
3721
 
3487
3722
  @property
3488
3723
  @pulumi.getter
@@ -3508,6 +3743,14 @@ class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemConfigurationResult(
3508
3743
  """
3509
3744
  return pulumi.get(self, "max_permissible_cvss_v3score")
3510
3745
 
3746
+ @property
3747
+ @pulumi.getter(name="maxPermissibleSeverity")
3748
+ def max_permissible_severity(self) -> str:
3749
+ """
3750
+ A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
3751
+ """
3752
+ return pulumi.get(self, "max_permissible_severity")
3753
+
3511
3754
 
3512
3755
  @pulumi.output_type
3513
3756
  class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemSourceResult(dict):
@@ -3607,19 +3850,25 @@ class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemVulnerabilityResult(
3607
3850
  cvss_v3score: float,
3608
3851
  id: str,
3609
3852
  is_false_positive: bool,
3610
- is_ignored: bool):
3853
+ is_ignored: bool,
3854
+ severity: str,
3855
+ source: str):
3611
3856
  """
3612
3857
  :param float cvss_v2score: Common Vulnerability Scoring System (CVSS) Version 2.
3613
3858
  :param float cvss_v3score: Common Vulnerability Scoring System (CVSS) Version 3.
3614
3859
  :param str id: A filter to return only resources that match the specified identifier. Required only if the compartmentId query parameter is not specified.
3615
3860
  :param bool is_false_positive: Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is `null`.
3616
3861
  :param bool is_ignored: Indicates if the vulnerability was ignored according to the audit configuration.
3862
+ :param str severity: ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
3863
+ :param str source: Source that published the vulnerability
3617
3864
  """
3618
3865
  pulumi.set(__self__, "cvss_v2score", cvss_v2score)
3619
3866
  pulumi.set(__self__, "cvss_v3score", cvss_v3score)
3620
3867
  pulumi.set(__self__, "id", id)
3621
3868
  pulumi.set(__self__, "is_false_positive", is_false_positive)
3622
3869
  pulumi.set(__self__, "is_ignored", is_ignored)
3870
+ pulumi.set(__self__, "severity", severity)
3871
+ pulumi.set(__self__, "source", source)
3623
3872
 
3624
3873
  @property
3625
3874
  @pulumi.getter(name="cvssV2score")
@@ -3661,4 +3910,20 @@ class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemVulnerabilityResult(
3661
3910
  """
3662
3911
  return pulumi.get(self, "is_ignored")
3663
3912
 
3913
+ @property
3914
+ @pulumi.getter
3915
+ def severity(self) -> str:
3916
+ """
3917
+ ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
3918
+ """
3919
+ return pulumi.get(self, "severity")
3920
+
3921
+ @property
3922
+ @pulumi.getter
3923
+ def source(self) -> str:
3924
+ """
3925
+ Source that published the vulnerability
3926
+ """
3927
+ return pulumi.get(self, "source")
3928
+
3664
3929