pulumi-oci 1.19.0a1705693078__py3-none-any.whl → 1.20.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_oci/__init__.py +59 -0
- pulumi_oci/adm/_inputs.py +99 -18
- pulumi_oci/adm/get_remediation_run_application_dependency_recommendations.py +23 -3
- pulumi_oci/adm/get_vulnerability_audit.py +31 -5
- pulumi_oci/adm/get_vulnerability_audit_application_dependency_vulnerabilities.py +43 -6
- pulumi_oci/adm/get_vulnerability_audit_application_dependency_vulnerability.py +27 -1
- pulumi_oci/adm/get_vulnerability_audits.py +54 -3
- pulumi_oci/adm/outputs.py +296 -31
- pulumi_oci/adm/remediation_recipe.py +2 -0
- pulumi_oci/adm/vulnerability_audit.py +96 -37
- pulumi_oci/database/__init__.py +1 -0
- pulumi_oci/database/_inputs.py +40 -0
- pulumi_oci/database/cloud_vm_cluster.py +22 -1
- pulumi_oci/database/get_system_versions.py +173 -0
- pulumi_oci/database/outputs.py +88 -0
- pulumi_oci/database/vm_cluster.py +22 -1
- pulumi_oci/datasafe/__init__.py +22 -0
- pulumi_oci/datasafe/_inputs.py +1826 -161
- pulumi_oci/datasafe/audit_trail.py +140 -0
- pulumi_oci/datasafe/discovery_mod.py +7 -7
- pulumi_oci/datasafe/get_audit_trail.py +66 -1
- pulumi_oci/datasafe/get_discovery_job.py +1 -1
- pulumi_oci/datasafe/get_discovery_jobs_result.py +1 -1
- pulumi_oci/datasafe/get_discovery_jobs_results.py +1 -1
- pulumi_oci/datasafe/get_masking_policies_masking_column.py +1 -1
- pulumi_oci/datasafe/get_masking_policies_masking_columns.py +1 -1
- pulumi_oci/datasafe/get_masking_policy.py +1 -1
- pulumi_oci/datasafe/get_report.py +1 -1
- pulumi_oci/datasafe/get_security_assessment.py +3 -3
- pulumi_oci/datasafe/get_security_assessment_comparison.py +5 -5
- pulumi_oci/datasafe/get_security_assessment_finding.py +29 -3
- pulumi_oci/datasafe/get_security_assessment_finding_analytics.py +276 -0
- pulumi_oci/datasafe/get_security_assessment_findings.py +43 -7
- pulumi_oci/datasafe/get_security_assessment_findings_change_audit_logs.py +309 -0
- pulumi_oci/datasafe/get_security_assessment_security_feature_analytics.py +198 -0
- pulumi_oci/datasafe/get_security_assessment_security_features.py +377 -0
- pulumi_oci/datasafe/get_security_assessments.py +2 -2
- pulumi_oci/datasafe/get_security_policies.py +253 -0
- pulumi_oci/datasafe/get_security_policy.py +235 -0
- pulumi_oci/datasafe/get_security_policy_deployment.py +261 -0
- pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_state.py +165 -0
- pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_states.py +180 -0
- pulumi_oci/datasafe/get_security_policy_deployments.py +293 -0
- pulumi_oci/datasafe/get_security_policy_report.py +248 -0
- pulumi_oci/datasafe/get_security_policy_report_database_table_access_entries.py +158 -0
- pulumi_oci/datasafe/get_security_policy_report_database_table_access_entry.py +408 -0
- pulumi_oci/datasafe/get_security_policy_report_database_view_access_entries.py +178 -0
- pulumi_oci/datasafe/get_security_policy_report_database_view_access_entry.py +382 -0
- pulumi_oci/datasafe/get_security_policy_report_role_grant_paths.py +177 -0
- pulumi_oci/datasafe/get_security_policy_reports.py +273 -0
- pulumi_oci/datasafe/get_sensitive_data_model.py +1 -1
- pulumi_oci/datasafe/get_target_database.py +27 -4
- pulumi_oci/datasafe/get_target_database_peer_target_database.py +263 -0
- pulumi_oci/datasafe/get_target_database_peer_target_databases.py +133 -0
- pulumi_oci/datasafe/get_target_databases.py +1 -1
- pulumi_oci/datasafe/get_user_assessment.py +5 -5
- pulumi_oci/datasafe/get_user_assessment_comparison.py +2 -2
- pulumi_oci/datasafe/get_user_assessment_user_access_analytics.py +133 -0
- pulumi_oci/datasafe/get_user_assessment_user_analytics.py +2 -2
- pulumi_oci/datasafe/get_user_assessment_users.py +42 -2
- pulumi_oci/datasafe/get_user_assessments.py +2 -2
- pulumi_oci/datasafe/masking_policies_masking_column.py +7 -7
- pulumi_oci/datasafe/masking_policy.py +9 -9
- pulumi_oci/datasafe/outputs.py +16686 -9777
- pulumi_oci/datasafe/report.py +559 -0
- pulumi_oci/datasafe/security_assessment.py +12 -12
- pulumi_oci/datasafe/sensitive_data_model.py +7 -7
- pulumi_oci/datasafe/set_security_assessment_baseline.py +7 -7
- pulumi_oci/datasafe/set_user_assessment_baseline.py +7 -7
- pulumi_oci/datasafe/target_database.py +146 -25
- pulumi_oci/datasafe/target_database_peer_target_database.py +634 -0
- pulumi_oci/datasafe/user_assessment.py +20 -20
- pulumi_oci/generativeai/__init__.py +18 -0
- pulumi_oci/generativeai/_inputs.py +534 -0
- pulumi_oci/generativeai/dedicated_ai_cluster.py +808 -0
- pulumi_oci/generativeai/endpoint.py +717 -0
- pulumi_oci/generativeai/get_dedicated_ai_cluster.py +288 -0
- pulumi_oci/generativeai/get_dedicated_ai_clusters.py +183 -0
- pulumi_oci/generativeai/get_endpoint.py +275 -0
- pulumi_oci/generativeai/get_endpoints.py +183 -0
- pulumi_oci/generativeai/get_model.py +353 -0
- pulumi_oci/generativeai/get_models.py +220 -0
- pulumi_oci/generativeai/model.py +858 -0
- pulumi_oci/generativeai/outputs.py +1721 -0
- pulumi_oci/marketplace/get_publication.py +14 -1
- pulumi_oci/marketplace/outputs.py +11 -0
- pulumi_oci/marketplace/publication.py +28 -0
- pulumi_oci/monitoring/__init__.py +3 -0
- pulumi_oci/monitoring/_inputs.py +82 -4
- pulumi_oci/monitoring/alarm.py +15 -15
- pulumi_oci/monitoring/alarm_suppression.py +745 -0
- pulumi_oci/monitoring/get_alarm.py +5 -5
- pulumi_oci/monitoring/get_alarm_history_collection.py +4 -4
- pulumi_oci/monitoring/get_alarm_statuses.py +3 -1
- pulumi_oci/monitoring/get_alarm_suppression.py +276 -0
- pulumi_oci/monitoring/get_alarm_suppressions.py +192 -0
- pulumi_oci/monitoring/get_metric_data.py +12 -8
- pulumi_oci/monitoring/get_metrics.py +2 -2
- pulumi_oci/monitoring/outputs.py +355 -50
- pulumi_oci/networkfirewall/_inputs.py +25 -20
- pulumi_oci/networkfirewall/outputs.py +40 -30
- pulumi_oci/stackmonitoring/__init__.py +3 -0
- pulumi_oci/stackmonitoring/_inputs.py +143 -0
- pulumi_oci/stackmonitoring/get_process_set.py +236 -0
- pulumi_oci/stackmonitoring/get_process_sets.py +156 -0
- pulumi_oci/stackmonitoring/outputs.py +422 -0
- pulumi_oci/stackmonitoring/process_set.py +548 -0
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/METADATA +1 -1
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/RECORD +111 -70
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/WHEEL +0 -0
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/top_level.txt +0 -0
pulumi_oci/adm/outputs.py
CHANGED
@@ -80,6 +80,8 @@ class RemediationRecipeDetectConfiguration(dict):
|
|
80
80
|
suggest = "max_permissible_cvss_v2score"
|
81
81
|
elif key == "maxPermissibleCvssV3score":
|
82
82
|
suggest = "max_permissible_cvss_v3score"
|
83
|
+
elif key == "maxPermissibleSeverity":
|
84
|
+
suggest = "max_permissible_severity"
|
83
85
|
elif key == "upgradePolicy":
|
84
86
|
suggest = "upgrade_policy"
|
85
87
|
|
@@ -98,11 +100,13 @@ class RemediationRecipeDetectConfiguration(dict):
|
|
98
100
|
exclusions: Optional[Sequence[str]] = None,
|
99
101
|
max_permissible_cvss_v2score: Optional[float] = None,
|
100
102
|
max_permissible_cvss_v3score: Optional[float] = None,
|
103
|
+
max_permissible_severity: Optional[str] = None,
|
101
104
|
upgrade_policy: Optional[str] = None):
|
102
105
|
"""
|
103
106
|
:param Sequence[str] exclusions: (Updatable) The list of dependencies to be ignored by the recommendation algorithm. The dependency pattern is matched against the 'group:artifact:version' or the purl of a dependency. An asterisk (*) at the end in the dependency pattern acts as a wildcard and matches zero or more characters.
|
104
107
|
:param float max_permissible_cvss_v2score: (Updatable) The maximum Common Vulnerability Scoring System Version 2 (CVSS V2) score. An artifact with a CVSS V2 score below this value is not considered for patching.
|
105
108
|
:param float max_permissible_cvss_v3score: (Updatable) The maximum Common Vulnerability Scoring System Version 3 (CVSS V3) score. An artifact with a CVSS V3 score below this value is not considered for patching.
|
109
|
+
:param str max_permissible_severity: (Updatable) The maximum ADM Severity. An artifact with an ADM Severity below this value is not considered for patching.
|
106
110
|
:param str upgrade_policy: (Updatable) The upgrade policy for recommendations. The `Nearest` upgrade policy upgrades a dependency to the oldest version that meets both of the following criteria: it is newer than the current version and it is not affected by a vulnerability.
|
107
111
|
"""
|
108
112
|
if exclusions is not None:
|
@@ -111,6 +115,8 @@ class RemediationRecipeDetectConfiguration(dict):
|
|
111
115
|
pulumi.set(__self__, "max_permissible_cvss_v2score", max_permissible_cvss_v2score)
|
112
116
|
if max_permissible_cvss_v3score is not None:
|
113
117
|
pulumi.set(__self__, "max_permissible_cvss_v3score", max_permissible_cvss_v3score)
|
118
|
+
if max_permissible_severity is not None:
|
119
|
+
pulumi.set(__self__, "max_permissible_severity", max_permissible_severity)
|
114
120
|
if upgrade_policy is not None:
|
115
121
|
pulumi.set(__self__, "upgrade_policy", upgrade_policy)
|
116
122
|
|
@@ -138,6 +144,14 @@ class RemediationRecipeDetectConfiguration(dict):
|
|
138
144
|
"""
|
139
145
|
return pulumi.get(self, "max_permissible_cvss_v3score")
|
140
146
|
|
147
|
+
@property
|
148
|
+
@pulumi.getter(name="maxPermissibleSeverity")
|
149
|
+
def max_permissible_severity(self) -> Optional[str]:
|
150
|
+
"""
|
151
|
+
(Updatable) The maximum ADM Severity. An artifact with an ADM Severity below this value is not considered for patching.
|
152
|
+
"""
|
153
|
+
return pulumi.get(self, "max_permissible_severity")
|
154
|
+
|
141
155
|
@property
|
142
156
|
@pulumi.getter(name="upgradePolicy")
|
143
157
|
def upgrade_policy(self) -> Optional[str]:
|
@@ -606,26 +620,23 @@ class VulnerabilityAuditApplicationDependency(dict):
|
|
606
620
|
return super().get(key, default)
|
607
621
|
|
608
622
|
def __init__(__self__, *,
|
609
|
-
gav: str,
|
610
623
|
node_id: str,
|
611
|
-
application_dependency_node_ids: Optional[Sequence[str]] = None
|
624
|
+
application_dependency_node_ids: Optional[Sequence[str]] = None,
|
625
|
+
gav: Optional[str] = None,
|
626
|
+
purl: Optional[str] = None):
|
612
627
|
"""
|
613
|
-
:param str gav: Group Artifact Version (GAV) identifier (Group:Artifact:Version), e.g. org.graalvm.nativeimage:svm:21.1.0.
|
614
628
|
:param str node_id: Unique identifier of an application dependency, for example nodeId1. The nodeId can be generated by assigning a unique id to each application dependency in the tree of application dependencies. Every node, even those who share the same GAV, should have a different nodeId. The preferred way of constructing a nodeId is to assign incremental integers during a breadth first or depth first search. A nodeId can be reused only it refers to the same subtree of application dependencies. (This is not equivalent to referring to the same GAV, that is, a GAV can have multiple transitive dependencies.)
|
615
629
|
:param Sequence[str] application_dependency_node_ids: List of application dependencies on which this application dependency depends, each identified by its nodeId.
|
630
|
+
:param str gav: Group Artifact Version (GAV) identifier (Group:Artifact:Version). Example: org.graalvm.nativeimage:svm:21.1.0. "N/A" for non-maven artifacts.
|
631
|
+
:param str purl: Package URL defined in https://github.com/package-url/purl-spec, e.g. pkg:maven/org.graalvm.nativeimage/svm@21.1.0
|
616
632
|
"""
|
617
|
-
pulumi.set(__self__, "gav", gav)
|
618
633
|
pulumi.set(__self__, "node_id", node_id)
|
619
634
|
if application_dependency_node_ids is not None:
|
620
635
|
pulumi.set(__self__, "application_dependency_node_ids", application_dependency_node_ids)
|
621
|
-
|
622
|
-
|
623
|
-
|
624
|
-
|
625
|
-
"""
|
626
|
-
Group Artifact Version (GAV) identifier (Group:Artifact:Version), e.g. org.graalvm.nativeimage:svm:21.1.0.
|
627
|
-
"""
|
628
|
-
return pulumi.get(self, "gav")
|
636
|
+
if gav is not None:
|
637
|
+
pulumi.set(__self__, "gav", gav)
|
638
|
+
if purl is not None:
|
639
|
+
pulumi.set(__self__, "purl", purl)
|
629
640
|
|
630
641
|
@property
|
631
642
|
@pulumi.getter(name="nodeId")
|
@@ -643,6 +654,22 @@ class VulnerabilityAuditApplicationDependency(dict):
|
|
643
654
|
"""
|
644
655
|
return pulumi.get(self, "application_dependency_node_ids")
|
645
656
|
|
657
|
+
@property
|
658
|
+
@pulumi.getter
|
659
|
+
def gav(self) -> Optional[str]:
|
660
|
+
"""
|
661
|
+
Group Artifact Version (GAV) identifier (Group:Artifact:Version). Example: org.graalvm.nativeimage:svm:21.1.0. "N/A" for non-maven artifacts.
|
662
|
+
"""
|
663
|
+
return pulumi.get(self, "gav")
|
664
|
+
|
665
|
+
@property
|
666
|
+
@pulumi.getter
|
667
|
+
def purl(self) -> Optional[str]:
|
668
|
+
"""
|
669
|
+
Package URL defined in https://github.com/package-url/purl-spec, e.g. pkg:maven/org.graalvm.nativeimage/svm@21.1.0
|
670
|
+
"""
|
671
|
+
return pulumi.get(self, "purl")
|
672
|
+
|
646
673
|
|
647
674
|
@pulumi.output_type
|
648
675
|
class VulnerabilityAuditConfiguration(dict):
|
@@ -653,6 +680,8 @@ class VulnerabilityAuditConfiguration(dict):
|
|
653
680
|
suggest = "max_permissible_cvss_v2score"
|
654
681
|
elif key == "maxPermissibleCvssV3score":
|
655
682
|
suggest = "max_permissible_cvss_v3score"
|
683
|
+
elif key == "maxPermissibleSeverity":
|
684
|
+
suggest = "max_permissible_severity"
|
656
685
|
|
657
686
|
if suggest:
|
658
687
|
pulumi.log.warn(f"Key '{key}' not found in VulnerabilityAuditConfiguration. Access the value via the '{suggest}' property getter instead.")
|
@@ -668,11 +697,13 @@ class VulnerabilityAuditConfiguration(dict):
|
|
668
697
|
def __init__(__self__, *,
|
669
698
|
exclusions: Optional[Sequence[str]] = None,
|
670
699
|
max_permissible_cvss_v2score: Optional[float] = None,
|
671
|
-
max_permissible_cvss_v3score: Optional[float] = None
|
700
|
+
max_permissible_cvss_v3score: Optional[float] = None,
|
701
|
+
max_permissible_severity: Optional[str] = None):
|
672
702
|
"""
|
673
703
|
:param Sequence[str] exclusions: A vulnerable application dependency is ignored if its name matches any of the items in `exclusions`. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters.
|
674
704
|
:param float max_permissible_cvss_v2score: A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
|
675
705
|
:param float max_permissible_cvss_v3score: A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
|
706
|
+
:param str max_permissible_severity: A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
|
676
707
|
"""
|
677
708
|
if exclusions is not None:
|
678
709
|
pulumi.set(__self__, "exclusions", exclusions)
|
@@ -680,6 +711,8 @@ class VulnerabilityAuditConfiguration(dict):
|
|
680
711
|
pulumi.set(__self__, "max_permissible_cvss_v2score", max_permissible_cvss_v2score)
|
681
712
|
if max_permissible_cvss_v3score is not None:
|
682
713
|
pulumi.set(__self__, "max_permissible_cvss_v3score", max_permissible_cvss_v3score)
|
714
|
+
if max_permissible_severity is not None:
|
715
|
+
pulumi.set(__self__, "max_permissible_severity", max_permissible_severity)
|
683
716
|
|
684
717
|
@property
|
685
718
|
@pulumi.getter
|
@@ -705,6 +738,14 @@ class VulnerabilityAuditConfiguration(dict):
|
|
705
738
|
"""
|
706
739
|
return pulumi.get(self, "max_permissible_cvss_v3score")
|
707
740
|
|
741
|
+
@property
|
742
|
+
@pulumi.getter(name="maxPermissibleSeverity")
|
743
|
+
def max_permissible_severity(self) -> Optional[str]:
|
744
|
+
"""
|
745
|
+
A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
|
746
|
+
"""
|
747
|
+
return pulumi.get(self, "max_permissible_severity")
|
748
|
+
|
708
749
|
|
709
750
|
@pulumi.output_type
|
710
751
|
class VulnerabilityAuditSource(dict):
|
@@ -871,13 +912,17 @@ class VulnerabilityAuditVulnerability(dict):
|
|
871
912
|
cvss_v3score: Optional[float] = None,
|
872
913
|
id: Optional[str] = None,
|
873
914
|
is_false_positive: Optional[bool] = None,
|
874
|
-
is_ignored: Optional[bool] = None
|
915
|
+
is_ignored: Optional[bool] = None,
|
916
|
+
severity: Optional[str] = None,
|
917
|
+
source: Optional[str] = None):
|
875
918
|
"""
|
876
919
|
:param float cvss_v2score: Common Vulnerability Scoring System (CVSS) Version 2.
|
877
920
|
:param float cvss_v3score: Common Vulnerability Scoring System (CVSS) Version 3.
|
878
921
|
:param str id: Unique vulnerability identifier, e.g. CVE-1999-0067.
|
879
922
|
:param bool is_false_positive: Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is `null`.
|
880
923
|
:param bool is_ignored: Indicates if the vulnerability was ignored according to the audit configuration.
|
924
|
+
:param str severity: ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
|
925
|
+
:param str source: vulnerability audit source.
|
881
926
|
"""
|
882
927
|
if cvss_v2score is not None:
|
883
928
|
pulumi.set(__self__, "cvss_v2score", cvss_v2score)
|
@@ -889,6 +934,10 @@ class VulnerabilityAuditVulnerability(dict):
|
|
889
934
|
pulumi.set(__self__, "is_false_positive", is_false_positive)
|
890
935
|
if is_ignored is not None:
|
891
936
|
pulumi.set(__self__, "is_ignored", is_ignored)
|
937
|
+
if severity is not None:
|
938
|
+
pulumi.set(__self__, "severity", severity)
|
939
|
+
if source is not None:
|
940
|
+
pulumi.set(__self__, "source", source)
|
892
941
|
|
893
942
|
@property
|
894
943
|
@pulumi.getter(name="cvssV2score")
|
@@ -930,6 +979,22 @@ class VulnerabilityAuditVulnerability(dict):
|
|
930
979
|
"""
|
931
980
|
return pulumi.get(self, "is_ignored")
|
932
981
|
|
982
|
+
@property
|
983
|
+
@pulumi.getter
|
984
|
+
def severity(self) -> Optional[str]:
|
985
|
+
"""
|
986
|
+
ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
|
987
|
+
"""
|
988
|
+
return pulumi.get(self, "severity")
|
989
|
+
|
990
|
+
@property
|
991
|
+
@pulumi.getter
|
992
|
+
def source(self) -> Optional[str]:
|
993
|
+
"""
|
994
|
+
vulnerability audit source.
|
995
|
+
"""
|
996
|
+
return pulumi.get(self, "source")
|
997
|
+
|
933
998
|
|
934
999
|
@pulumi.output_type
|
935
1000
|
class GetKnowledgebasesFilterResult(dict):
|
@@ -1082,16 +1147,19 @@ class GetRemediationRecipeDetectConfigurationResult(dict):
|
|
1082
1147
|
exclusions: Sequence[str],
|
1083
1148
|
max_permissible_cvss_v2score: float,
|
1084
1149
|
max_permissible_cvss_v3score: float,
|
1150
|
+
max_permissible_severity: str,
|
1085
1151
|
upgrade_policy: str):
|
1086
1152
|
"""
|
1087
1153
|
:param Sequence[str] exclusions: The list of dependencies to be ignored by the recommendation algorithm. The dependency pattern is matched against the 'group:artifact:version' or the purl of a dependency. An asterisk (*) at the end in the dependency pattern acts as a wildcard and matches zero or more characters.
|
1088
1154
|
:param float max_permissible_cvss_v2score: The maximum Common Vulnerability Scoring System Version 2 (CVSS V2) score. An artifact with a CVSS V2 score below this value is not considered for patching.
|
1089
1155
|
:param float max_permissible_cvss_v3score: The maximum Common Vulnerability Scoring System Version 3 (CVSS V3) score. An artifact with a CVSS V3 score below this value is not considered for patching.
|
1156
|
+
:param str max_permissible_severity: The maximum ADM Severity. An artifact with an ADM Severity below this value is not considered for patching.
|
1090
1157
|
:param str upgrade_policy: The upgrade policy for recommendations. The `Nearest` upgrade policy upgrades a dependency to the oldest version that meets both of the following criteria: it is newer than the current version and it is not affected by a vulnerability.
|
1091
1158
|
"""
|
1092
1159
|
pulumi.set(__self__, "exclusions", exclusions)
|
1093
1160
|
pulumi.set(__self__, "max_permissible_cvss_v2score", max_permissible_cvss_v2score)
|
1094
1161
|
pulumi.set(__self__, "max_permissible_cvss_v3score", max_permissible_cvss_v3score)
|
1162
|
+
pulumi.set(__self__, "max_permissible_severity", max_permissible_severity)
|
1095
1163
|
pulumi.set(__self__, "upgrade_policy", upgrade_policy)
|
1096
1164
|
|
1097
1165
|
@property
|
@@ -1118,6 +1186,14 @@ class GetRemediationRecipeDetectConfigurationResult(dict):
|
|
1118
1186
|
"""
|
1119
1187
|
return pulumi.get(self, "max_permissible_cvss_v3score")
|
1120
1188
|
|
1189
|
+
@property
|
1190
|
+
@pulumi.getter(name="maxPermissibleSeverity")
|
1191
|
+
def max_permissible_severity(self) -> str:
|
1192
|
+
"""
|
1193
|
+
The maximum ADM Severity. An artifact with an ADM Severity below this value is not considered for patching.
|
1194
|
+
"""
|
1195
|
+
return pulumi.get(self, "max_permissible_severity")
|
1196
|
+
|
1121
1197
|
@property
|
1122
1198
|
@pulumi.getter(name="upgradePolicy")
|
1123
1199
|
def upgrade_policy(self) -> str:
|
@@ -1596,16 +1672,19 @@ class GetRemediationRecipesRemediationRecipeCollectionItemDetectConfigurationRes
|
|
1596
1672
|
exclusions: Sequence[str],
|
1597
1673
|
max_permissible_cvss_v2score: float,
|
1598
1674
|
max_permissible_cvss_v3score: float,
|
1675
|
+
max_permissible_severity: str,
|
1599
1676
|
upgrade_policy: str):
|
1600
1677
|
"""
|
1601
1678
|
:param Sequence[str] exclusions: The list of dependencies to be ignored by the recommendation algorithm. The dependency pattern is matched against the 'group:artifact:version' or the purl of a dependency. An asterisk (*) at the end in the dependency pattern acts as a wildcard and matches zero or more characters.
|
1602
1679
|
:param float max_permissible_cvss_v2score: The maximum Common Vulnerability Scoring System Version 2 (CVSS V2) score. An artifact with a CVSS V2 score below this value is not considered for patching.
|
1603
1680
|
:param float max_permissible_cvss_v3score: The maximum Common Vulnerability Scoring System Version 3 (CVSS V3) score. An artifact with a CVSS V3 score below this value is not considered for patching.
|
1681
|
+
:param str max_permissible_severity: The maximum ADM Severity. An artifact with an ADM Severity below this value is not considered for patching.
|
1604
1682
|
:param str upgrade_policy: The upgrade policy for recommendations. The `Nearest` upgrade policy upgrades a dependency to the oldest version that meets both of the following criteria: it is newer than the current version and it is not affected by a vulnerability.
|
1605
1683
|
"""
|
1606
1684
|
pulumi.set(__self__, "exclusions", exclusions)
|
1607
1685
|
pulumi.set(__self__, "max_permissible_cvss_v2score", max_permissible_cvss_v2score)
|
1608
1686
|
pulumi.set(__self__, "max_permissible_cvss_v3score", max_permissible_cvss_v3score)
|
1687
|
+
pulumi.set(__self__, "max_permissible_severity", max_permissible_severity)
|
1609
1688
|
pulumi.set(__self__, "upgrade_policy", upgrade_policy)
|
1610
1689
|
|
1611
1690
|
@property
|
@@ -1632,6 +1711,14 @@ class GetRemediationRecipesRemediationRecipeCollectionItemDetectConfigurationRes
|
|
1632
1711
|
"""
|
1633
1712
|
return pulumi.get(self, "max_permissible_cvss_v3score")
|
1634
1713
|
|
1714
|
+
@property
|
1715
|
+
@pulumi.getter(name="maxPermissibleSeverity")
|
1716
|
+
def max_permissible_severity(self) -> str:
|
1717
|
+
"""
|
1718
|
+
The maximum ADM Severity. An artifact with an ADM Severity below this value is not considered for patching.
|
1719
|
+
"""
|
1720
|
+
return pulumi.get(self, "max_permissible_severity")
|
1721
|
+
|
1635
1722
|
@property
|
1636
1723
|
@pulumi.getter(name="upgradePolicy")
|
1637
1724
|
def upgrade_policy(self) -> str:
|
@@ -1917,17 +2004,23 @@ class GetRemediationRunApplicationDependencyRecommendationsApplicationDependency
|
|
1917
2004
|
application_dependency_node_ids: Sequence[str],
|
1918
2005
|
gav: str,
|
1919
2006
|
node_id: str,
|
1920
|
-
|
2007
|
+
purl: str,
|
2008
|
+
recommended_gav: str,
|
2009
|
+
recommended_purl: str):
|
1921
2010
|
"""
|
1922
2011
|
:param Sequence[str] application_dependency_node_ids: List of (application dependencies) node identifiers from which this node depends.
|
1923
2012
|
:param str gav: A filter to return only resources that match the entire GAV (Group Artifact Version) identifier given.
|
1924
2013
|
:param str node_id: Unique node identifier of an application dependency with an associated Recommendation, e.g. nodeId1.
|
2014
|
+
:param str purl: A filter to return only resources that match the entire PURL given (https://github.com/package-url/purl-spec/).
|
1925
2015
|
:param str recommended_gav: Recommended application dependency in "group:artifact:version" (GAV) format, e.g. org.graalvm.nativeimage:svm:21.2.0.
|
2016
|
+
:param str recommended_purl: Recommended application dependency in PURL format, e.g. pkg:maven/org.graalvm.nativeimage/svm@21.2.0
|
1926
2017
|
"""
|
1927
2018
|
pulumi.set(__self__, "application_dependency_node_ids", application_dependency_node_ids)
|
1928
2019
|
pulumi.set(__self__, "gav", gav)
|
1929
2020
|
pulumi.set(__self__, "node_id", node_id)
|
2021
|
+
pulumi.set(__self__, "purl", purl)
|
1930
2022
|
pulumi.set(__self__, "recommended_gav", recommended_gav)
|
2023
|
+
pulumi.set(__self__, "recommended_purl", recommended_purl)
|
1931
2024
|
|
1932
2025
|
@property
|
1933
2026
|
@pulumi.getter(name="applicationDependencyNodeIds")
|
@@ -1953,6 +2046,14 @@ class GetRemediationRunApplicationDependencyRecommendationsApplicationDependency
|
|
1953
2046
|
"""
|
1954
2047
|
return pulumi.get(self, "node_id")
|
1955
2048
|
|
2049
|
+
@property
|
2050
|
+
@pulumi.getter
|
2051
|
+
def purl(self) -> str:
|
2052
|
+
"""
|
2053
|
+
A filter to return only resources that match the entire PURL given (https://github.com/package-url/purl-spec/).
|
2054
|
+
"""
|
2055
|
+
return pulumi.get(self, "purl")
|
2056
|
+
|
1956
2057
|
@property
|
1957
2058
|
@pulumi.getter(name="recommendedGav")
|
1958
2059
|
def recommended_gav(self) -> str:
|
@@ -1961,6 +2062,14 @@ class GetRemediationRunApplicationDependencyRecommendationsApplicationDependency
|
|
1961
2062
|
"""
|
1962
2063
|
return pulumi.get(self, "recommended_gav")
|
1963
2064
|
|
2065
|
+
@property
|
2066
|
+
@pulumi.getter(name="recommendedPurl")
|
2067
|
+
def recommended_purl(self) -> str:
|
2068
|
+
"""
|
2069
|
+
Recommended application dependency in PURL format, e.g. pkg:maven/org.graalvm.nativeimage/svm@21.2.0
|
2070
|
+
"""
|
2071
|
+
return pulumi.get(self, "recommended_purl")
|
2072
|
+
|
1964
2073
|
|
1965
2074
|
@pulumi.output_type
|
1966
2075
|
class GetRemediationRunApplicationDependencyRecommendationsFilterResult(dict):
|
@@ -2634,10 +2743,12 @@ class GetVulnerabilityAuditApplicationDependencyResult(dict):
|
|
2634
2743
|
def __init__(__self__, *,
|
2635
2744
|
application_dependency_node_ids: Sequence[str],
|
2636
2745
|
gav: str,
|
2637
|
-
node_id: str
|
2746
|
+
node_id: str,
|
2747
|
+
purl: str):
|
2638
2748
|
pulumi.set(__self__, "application_dependency_node_ids", application_dependency_node_ids)
|
2639
2749
|
pulumi.set(__self__, "gav", gav)
|
2640
2750
|
pulumi.set(__self__, "node_id", node_id)
|
2751
|
+
pulumi.set(__self__, "purl", purl)
|
2641
2752
|
|
2642
2753
|
@property
|
2643
2754
|
@pulumi.getter(name="applicationDependencyNodeIds")
|
@@ -2654,6 +2765,11 @@ class GetVulnerabilityAuditApplicationDependencyResult(dict):
|
|
2654
2765
|
def node_id(self) -> str:
|
2655
2766
|
return pulumi.get(self, "node_id")
|
2656
2767
|
|
2768
|
+
@property
|
2769
|
+
@pulumi.getter
|
2770
|
+
def purl(self) -> str:
|
2771
|
+
return pulumi.get(self, "purl")
|
2772
|
+
|
2657
2773
|
|
2658
2774
|
@pulumi.output_type
|
2659
2775
|
class GetVulnerabilityAuditApplicationDependencyVulnerabilitiesApplicationDependencyVulnerabilityCollectionResult(dict):
|
@@ -2680,18 +2796,21 @@ class GetVulnerabilityAuditApplicationDependencyVulnerabilitiesApplicationDepend
|
|
2680
2796
|
gav: str,
|
2681
2797
|
is_found_in_knowledge_base: bool,
|
2682
2798
|
node_id: str,
|
2799
|
+
purl: str,
|
2683
2800
|
vulnerabilities: Sequence['outputs.GetVulnerabilityAuditApplicationDependencyVulnerabilitiesApplicationDependencyVulnerabilityCollectionItemVulnerabilityResult']):
|
2684
2801
|
"""
|
2685
2802
|
:param Sequence[str] application_dependency_node_ids: List of application dependencies on which this application dependency depends, each identified by its nodeId.
|
2686
2803
|
:param str gav: A filter to return only resources that match the entire GAV (Group Artifact Version) identifier given.
|
2687
2804
|
:param bool is_found_in_knowledge_base: Indicates if the artifact is found in the knowledge base.
|
2688
2805
|
:param str node_id: Unique identifier of an application dependency, for example nodeId1.
|
2806
|
+
:param str purl: A filter to return only resources that match the entire PURL given (https://github.com/package-url/purl-spec/).
|
2689
2807
|
:param Sequence['GetVulnerabilityAuditApplicationDependencyVulnerabilitiesApplicationDependencyVulnerabilityCollectionItemVulnerabilityArgs'] vulnerabilities: List of vulnerabilities for the application dependency.
|
2690
2808
|
"""
|
2691
2809
|
pulumi.set(__self__, "application_dependency_node_ids", application_dependency_node_ids)
|
2692
2810
|
pulumi.set(__self__, "gav", gav)
|
2693
2811
|
pulumi.set(__self__, "is_found_in_knowledge_base", is_found_in_knowledge_base)
|
2694
2812
|
pulumi.set(__self__, "node_id", node_id)
|
2813
|
+
pulumi.set(__self__, "purl", purl)
|
2695
2814
|
pulumi.set(__self__, "vulnerabilities", vulnerabilities)
|
2696
2815
|
|
2697
2816
|
@property
|
@@ -2726,6 +2845,14 @@ class GetVulnerabilityAuditApplicationDependencyVulnerabilitiesApplicationDepend
|
|
2726
2845
|
"""
|
2727
2846
|
return pulumi.get(self, "node_id")
|
2728
2847
|
|
2848
|
+
@property
|
2849
|
+
@pulumi.getter
|
2850
|
+
def purl(self) -> str:
|
2851
|
+
"""
|
2852
|
+
A filter to return only resources that match the entire PURL given (https://github.com/package-url/purl-spec/).
|
2853
|
+
"""
|
2854
|
+
return pulumi.get(self, "purl")
|
2855
|
+
|
2729
2856
|
@property
|
2730
2857
|
@pulumi.getter
|
2731
2858
|
def vulnerabilities(self) -> Sequence['outputs.GetVulnerabilityAuditApplicationDependencyVulnerabilitiesApplicationDependencyVulnerabilityCollectionItemVulnerabilityResult']:
|
@@ -2742,19 +2869,25 @@ class GetVulnerabilityAuditApplicationDependencyVulnerabilitiesApplicationDepend
|
|
2742
2869
|
cvss_v3score: float,
|
2743
2870
|
id: str,
|
2744
2871
|
is_false_positive: bool,
|
2745
|
-
is_ignored: bool
|
2872
|
+
is_ignored: bool,
|
2873
|
+
severity: str,
|
2874
|
+
source: str):
|
2746
2875
|
"""
|
2747
2876
|
:param float cvss_v2score: Common Vulnerability Scoring System (CVSS) Version 2.
|
2748
2877
|
:param float cvss_v3score: Common Vulnerability Scoring System (CVSS) Version 3.
|
2749
2878
|
:param str id: Unique vulnerability identifier, e.g. CVE-1999-0067.
|
2750
2879
|
:param bool is_false_positive: Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is `null`.
|
2751
2880
|
:param bool is_ignored: Indicates if the vulnerability was ignored according to the audit configuration.
|
2881
|
+
:param str severity: ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
|
2882
|
+
:param str source: Source that published the vulnerability
|
2752
2883
|
"""
|
2753
2884
|
pulumi.set(__self__, "cvss_v2score", cvss_v2score)
|
2754
2885
|
pulumi.set(__self__, "cvss_v3score", cvss_v3score)
|
2755
2886
|
pulumi.set(__self__, "id", id)
|
2756
2887
|
pulumi.set(__self__, "is_false_positive", is_false_positive)
|
2757
2888
|
pulumi.set(__self__, "is_ignored", is_ignored)
|
2889
|
+
pulumi.set(__self__, "severity", severity)
|
2890
|
+
pulumi.set(__self__, "source", source)
|
2758
2891
|
|
2759
2892
|
@property
|
2760
2893
|
@pulumi.getter(name="cvssV2score")
|
@@ -2796,6 +2929,22 @@ class GetVulnerabilityAuditApplicationDependencyVulnerabilitiesApplicationDepend
|
|
2796
2929
|
"""
|
2797
2930
|
return pulumi.get(self, "is_ignored")
|
2798
2931
|
|
2932
|
+
@property
|
2933
|
+
@pulumi.getter
|
2934
|
+
def severity(self) -> str:
|
2935
|
+
"""
|
2936
|
+
ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
|
2937
|
+
"""
|
2938
|
+
return pulumi.get(self, "severity")
|
2939
|
+
|
2940
|
+
@property
|
2941
|
+
@pulumi.getter
|
2942
|
+
def source(self) -> str:
|
2943
|
+
"""
|
2944
|
+
Source that published the vulnerability
|
2945
|
+
"""
|
2946
|
+
return pulumi.get(self, "source")
|
2947
|
+
|
2799
2948
|
|
2800
2949
|
@pulumi.output_type
|
2801
2950
|
class GetVulnerabilityAuditApplicationDependencyVulnerabilitiesFilterResult(dict):
|
@@ -2831,6 +2980,7 @@ class GetVulnerabilityAuditApplicationDependencyVulnerabilityItemResult(dict):
|
|
2831
2980
|
gav: str,
|
2832
2981
|
is_found_in_knowledge_base: bool,
|
2833
2982
|
node_id: str,
|
2983
|
+
purl: str,
|
2834
2984
|
vulnerabilities: Sequence['outputs.GetVulnerabilityAuditApplicationDependencyVulnerabilityItemVulnerabilityResult']):
|
2835
2985
|
"""
|
2836
2986
|
:param Sequence[str] application_dependency_node_ids: List of Application Dependencies on which this Application Dependency depends, each identified by its nodeId.
|
@@ -2843,6 +2993,7 @@ class GetVulnerabilityAuditApplicationDependencyVulnerabilityItemResult(dict):
|
|
2843
2993
|
pulumi.set(__self__, "gav", gav)
|
2844
2994
|
pulumi.set(__self__, "is_found_in_knowledge_base", is_found_in_knowledge_base)
|
2845
2995
|
pulumi.set(__self__, "node_id", node_id)
|
2996
|
+
pulumi.set(__self__, "purl", purl)
|
2846
2997
|
pulumi.set(__self__, "vulnerabilities", vulnerabilities)
|
2847
2998
|
|
2848
2999
|
@property
|
@@ -2877,6 +3028,11 @@ class GetVulnerabilityAuditApplicationDependencyVulnerabilityItemResult(dict):
|
|
2877
3028
|
"""
|
2878
3029
|
return pulumi.get(self, "node_id")
|
2879
3030
|
|
3031
|
+
@property
|
3032
|
+
@pulumi.getter
|
3033
|
+
def purl(self) -> str:
|
3034
|
+
return pulumi.get(self, "purl")
|
3035
|
+
|
2880
3036
|
@property
|
2881
3037
|
@pulumi.getter
|
2882
3038
|
def vulnerabilities(self) -> Sequence['outputs.GetVulnerabilityAuditApplicationDependencyVulnerabilityItemVulnerabilityResult']:
|
@@ -2893,7 +3049,9 @@ class GetVulnerabilityAuditApplicationDependencyVulnerabilityItemVulnerabilityRe
|
|
2893
3049
|
cvss_v3score: float,
|
2894
3050
|
id: str,
|
2895
3051
|
is_false_positive: bool,
|
2896
|
-
is_ignored: bool
|
3052
|
+
is_ignored: bool,
|
3053
|
+
severity: str,
|
3054
|
+
source: str):
|
2897
3055
|
"""
|
2898
3056
|
:param float cvss_v2score: Common Vulnerability Scoring System (CVSS) Version 2.
|
2899
3057
|
:param float cvss_v3score: Common Vulnerability Scoring System (CVSS) Version 3.
|
@@ -2905,6 +3063,8 @@ class GetVulnerabilityAuditApplicationDependencyVulnerabilityItemVulnerabilityRe
|
|
2905
3063
|
pulumi.set(__self__, "id", id)
|
2906
3064
|
pulumi.set(__self__, "is_false_positive", is_false_positive)
|
2907
3065
|
pulumi.set(__self__, "is_ignored", is_ignored)
|
3066
|
+
pulumi.set(__self__, "severity", severity)
|
3067
|
+
pulumi.set(__self__, "source", source)
|
2908
3068
|
|
2909
3069
|
@property
|
2910
3070
|
@pulumi.getter(name="cvssV2score")
|
@@ -2943,21 +3103,34 @@ class GetVulnerabilityAuditApplicationDependencyVulnerabilityItemVulnerabilityRe
|
|
2943
3103
|
"""
|
2944
3104
|
return pulumi.get(self, "is_ignored")
|
2945
3105
|
|
3106
|
+
@property
|
3107
|
+
@pulumi.getter
|
3108
|
+
def severity(self) -> str:
|
3109
|
+
return pulumi.get(self, "severity")
|
3110
|
+
|
3111
|
+
@property
|
3112
|
+
@pulumi.getter
|
3113
|
+
def source(self) -> str:
|
3114
|
+
return pulumi.get(self, "source")
|
3115
|
+
|
2946
3116
|
|
2947
3117
|
@pulumi.output_type
|
2948
3118
|
class GetVulnerabilityAuditConfigurationResult(dict):
|
2949
3119
|
def __init__(__self__, *,
|
2950
3120
|
exclusions: Sequence[str],
|
2951
3121
|
max_permissible_cvss_v2score: float,
|
2952
|
-
max_permissible_cvss_v3score: float
|
3122
|
+
max_permissible_cvss_v3score: float,
|
3123
|
+
max_permissible_severity: str):
|
2953
3124
|
"""
|
2954
3125
|
:param Sequence[str] exclusions: A vulnerable application dependency is ignored if its name matches any of the items in `exclusions`. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters.
|
2955
3126
|
:param float max_permissible_cvss_v2score: A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
|
2956
3127
|
:param float max_permissible_cvss_v3score: A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
|
3128
|
+
:param str max_permissible_severity: A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
|
2957
3129
|
"""
|
2958
3130
|
pulumi.set(__self__, "exclusions", exclusions)
|
2959
3131
|
pulumi.set(__self__, "max_permissible_cvss_v2score", max_permissible_cvss_v2score)
|
2960
3132
|
pulumi.set(__self__, "max_permissible_cvss_v3score", max_permissible_cvss_v3score)
|
3133
|
+
pulumi.set(__self__, "max_permissible_severity", max_permissible_severity)
|
2961
3134
|
|
2962
3135
|
@property
|
2963
3136
|
@pulumi.getter
|
@@ -2983,6 +3156,14 @@ class GetVulnerabilityAuditConfigurationResult(dict):
|
|
2983
3156
|
"""
|
2984
3157
|
return pulumi.get(self, "max_permissible_cvss_v3score")
|
2985
3158
|
|
3159
|
+
@property
|
3160
|
+
@pulumi.getter(name="maxPermissibleSeverity")
|
3161
|
+
def max_permissible_severity(self) -> str:
|
3162
|
+
"""
|
3163
|
+
A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
|
3164
|
+
"""
|
3165
|
+
return pulumi.get(self, "max_permissible_severity")
|
3166
|
+
|
2986
3167
|
|
2987
3168
|
@pulumi.output_type
|
2988
3169
|
class GetVulnerabilityAuditSourceResult(dict):
|
@@ -3082,19 +3263,25 @@ class GetVulnerabilityAuditVulnerabilityResult(dict):
|
|
3082
3263
|
cvss_v3score: float,
|
3083
3264
|
id: str,
|
3084
3265
|
is_false_positive: bool,
|
3085
|
-
is_ignored: bool
|
3266
|
+
is_ignored: bool,
|
3267
|
+
severity: str,
|
3268
|
+
source: str):
|
3086
3269
|
"""
|
3087
3270
|
:param float cvss_v2score: Common Vulnerability Scoring System (CVSS) Version 2.
|
3088
3271
|
:param float cvss_v3score: Common Vulnerability Scoring System (CVSS) Version 3.
|
3089
3272
|
:param str id: Unique vulnerability identifier, e.g. CVE-1999-0067.
|
3090
3273
|
:param bool is_false_positive: Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is `null`.
|
3091
3274
|
:param bool is_ignored: Indicates if the vulnerability was ignored according to the audit configuration.
|
3275
|
+
:param str severity: ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
|
3276
|
+
:param str source: Source that published the vulnerability
|
3092
3277
|
"""
|
3093
3278
|
pulumi.set(__self__, "cvss_v2score", cvss_v2score)
|
3094
3279
|
pulumi.set(__self__, "cvss_v3score", cvss_v3score)
|
3095
3280
|
pulumi.set(__self__, "id", id)
|
3096
3281
|
pulumi.set(__self__, "is_false_positive", is_false_positive)
|
3097
3282
|
pulumi.set(__self__, "is_ignored", is_ignored)
|
3283
|
+
pulumi.set(__self__, "severity", severity)
|
3284
|
+
pulumi.set(__self__, "source", source)
|
3098
3285
|
|
3099
3286
|
@property
|
3100
3287
|
@pulumi.getter(name="cvssV2score")
|
@@ -3136,6 +3323,22 @@ class GetVulnerabilityAuditVulnerabilityResult(dict):
|
|
3136
3323
|
"""
|
3137
3324
|
return pulumi.get(self, "is_ignored")
|
3138
3325
|
|
3326
|
+
@property
|
3327
|
+
@pulumi.getter
|
3328
|
+
def severity(self) -> str:
|
3329
|
+
"""
|
3330
|
+
ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
|
3331
|
+
"""
|
3332
|
+
return pulumi.get(self, "severity")
|
3333
|
+
|
3334
|
+
@property
|
3335
|
+
@pulumi.getter
|
3336
|
+
def source(self) -> str:
|
3337
|
+
"""
|
3338
|
+
Source that published the vulnerability
|
3339
|
+
"""
|
3340
|
+
return pulumi.get(self, "source")
|
3341
|
+
|
3139
3342
|
|
3140
3343
|
@pulumi.output_type
|
3141
3344
|
class GetVulnerabilityAuditsFilterResult(dict):
|
@@ -3194,6 +3397,8 @@ class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemResult(dict):
|
|
3194
3397
|
max_observed_cvss_v2score_with_ignored: float,
|
3195
3398
|
max_observed_cvss_v3score: float,
|
3196
3399
|
max_observed_cvss_v3score_with_ignored: float,
|
3400
|
+
max_observed_severity: str,
|
3401
|
+
max_observed_severity_with_ignored: str,
|
3197
3402
|
sources: Sequence['outputs.GetVulnerabilityAuditsVulnerabilityAuditCollectionItemSourceResult'],
|
3198
3403
|
state: str,
|
3199
3404
|
system_tags: Mapping[str, Any],
|
@@ -3204,7 +3409,7 @@ class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemResult(dict):
|
|
3204
3409
|
vulnerable_artifacts_count: int,
|
3205
3410
|
vulnerable_artifacts_count_with_ignored: int):
|
3206
3411
|
"""
|
3207
|
-
:param str build_type: The type of the build tool.
|
3412
|
+
:param str build_type: The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
|
3208
3413
|
:param str compartment_id: A filter to return only resources that belong to the specified compartment identifier. Required only if the id query param is not specified.
|
3209
3414
|
:param Sequence['GetVulnerabilityAuditsVulnerabilityAuditCollectionItemConfigurationArgs'] configurations: Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in `exclusions`, or all of the associated Vulnerabilies have a CVSS v2 score below `maxPermissibleCvssV2Score` and a CVSS v3 score below `maxPermissibleCvssV3Score`. type: object
|
3210
3415
|
:param Mapping[str, Any] defined_tags: Defined tags for this resource. Each key is predefined and scoped to a namespace. Example: `{"foo-namespace.bar-key": "value"}`
|
@@ -3218,13 +3423,15 @@ class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemResult(dict):
|
|
3218
3423
|
:param float max_observed_cvss_v2score_with_ignored: Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
|
3219
3424
|
:param float max_observed_cvss_v3score: Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
|
3220
3425
|
:param float max_observed_cvss_v3score_with_ignored: Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
|
3221
|
-
:param
|
3426
|
+
:param str max_observed_severity: Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
|
3427
|
+
:param str max_observed_severity_with_ignored: Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
|
3428
|
+
:param Sequence['GetVulnerabilityAuditsVulnerabilityAuditCollectionItemSourceArgs'] sources: Source that published the vulnerability
|
3222
3429
|
:param str state: A filter to return only Vulnerability Audits that match the specified lifecycleState.
|
3223
3430
|
:param Mapping[str, Any] system_tags: Usage of system tag keys. These predefined keys are scoped to namespaces. Example: `{"orcl-cloud.free-tier-retained": "true"}`
|
3224
3431
|
:param str time_created: The creation date and time of the vulnerability audit (formatted according to [RFC3339](https://datatracker.ietf.org/doc/html/rfc3339)).
|
3225
3432
|
:param str time_updated: The update date and time of the vulnerability audit (formatted according to [RFC3339](https://datatracker.ietf.org/doc/html/rfc3339)).
|
3226
|
-
:param Sequence['GetVulnerabilityAuditsVulnerabilityAuditCollectionItemUsageDataArgs'] usage_datas: The source details of the usage data
|
3227
|
-
:param Sequence['GetVulnerabilityAuditsVulnerabilityAuditCollectionItemVulnerabilityArgs'] vulnerabilities: List of vulnerabilities found in the vulnerability audit.
|
3433
|
+
:param Sequence['GetVulnerabilityAuditsVulnerabilityAuditCollectionItemUsageDataArgs'] usage_datas: The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set `sourceType` to `objectStorageTuple` and use [UsageDataViaObjectStorageTupleDetails](https://docs.cloud.oracle.com/iaas/api/#/en/adm/latest/requests/UsageDataViaObjectStorageTupleDetails) when specifying the namespace, bucket name, and object name.
|
3434
|
+
:param Sequence['GetVulnerabilityAuditsVulnerabilityAuditCollectionItemVulnerabilityArgs'] vulnerabilities: List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
|
3228
3435
|
:param int vulnerable_artifacts_count: Count of non-ignored vulnerable application dependencies.
|
3229
3436
|
:param int vulnerable_artifacts_count_with_ignored: Count of all vulnerable application dependencies.
|
3230
3437
|
"""
|
@@ -3243,6 +3450,8 @@ class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemResult(dict):
|
|
3243
3450
|
pulumi.set(__self__, "max_observed_cvss_v2score_with_ignored", max_observed_cvss_v2score_with_ignored)
|
3244
3451
|
pulumi.set(__self__, "max_observed_cvss_v3score", max_observed_cvss_v3score)
|
3245
3452
|
pulumi.set(__self__, "max_observed_cvss_v3score_with_ignored", max_observed_cvss_v3score_with_ignored)
|
3453
|
+
pulumi.set(__self__, "max_observed_severity", max_observed_severity)
|
3454
|
+
pulumi.set(__self__, "max_observed_severity_with_ignored", max_observed_severity_with_ignored)
|
3246
3455
|
pulumi.set(__self__, "sources", sources)
|
3247
3456
|
pulumi.set(__self__, "state", state)
|
3248
3457
|
pulumi.set(__self__, "system_tags", system_tags)
|
@@ -3262,7 +3471,7 @@ class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemResult(dict):
|
|
3262
3471
|
@pulumi.getter(name="buildType")
|
3263
3472
|
def build_type(self) -> str:
|
3264
3473
|
"""
|
3265
|
-
The type of the build tool.
|
3474
|
+
The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
|
3266
3475
|
"""
|
3267
3476
|
return pulumi.get(self, "build_type")
|
3268
3477
|
|
@@ -3370,11 +3579,27 @@ class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemResult(dict):
|
|
3370
3579
|
"""
|
3371
3580
|
return pulumi.get(self, "max_observed_cvss_v3score_with_ignored")
|
3372
3581
|
|
3582
|
+
@property
|
3583
|
+
@pulumi.getter(name="maxObservedSeverity")
|
3584
|
+
def max_observed_severity(self) -> str:
|
3585
|
+
"""
|
3586
|
+
Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
|
3587
|
+
"""
|
3588
|
+
return pulumi.get(self, "max_observed_severity")
|
3589
|
+
|
3590
|
+
@property
|
3591
|
+
@pulumi.getter(name="maxObservedSeverityWithIgnored")
|
3592
|
+
def max_observed_severity_with_ignored(self) -> str:
|
3593
|
+
"""
|
3594
|
+
Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
|
3595
|
+
"""
|
3596
|
+
return pulumi.get(self, "max_observed_severity_with_ignored")
|
3597
|
+
|
3373
3598
|
@property
|
3374
3599
|
@pulumi.getter
|
3375
3600
|
def sources(self) -> Sequence['outputs.GetVulnerabilityAuditsVulnerabilityAuditCollectionItemSourceResult']:
|
3376
3601
|
"""
|
3377
|
-
|
3602
|
+
Source that published the vulnerability
|
3378
3603
|
"""
|
3379
3604
|
return pulumi.get(self, "sources")
|
3380
3605
|
|
@@ -3414,7 +3639,7 @@ class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemResult(dict):
|
|
3414
3639
|
@pulumi.getter(name="usageDatas")
|
3415
3640
|
def usage_datas(self) -> Sequence['outputs.GetVulnerabilityAuditsVulnerabilityAuditCollectionItemUsageDataResult']:
|
3416
3641
|
"""
|
3417
|
-
The source details of the usage data
|
3642
|
+
The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set `sourceType` to `objectStorageTuple` and use [UsageDataViaObjectStorageTupleDetails](https://docs.cloud.oracle.com/iaas/api/#/en/adm/latest/requests/UsageDataViaObjectStorageTupleDetails) when specifying the namespace, bucket name, and object name.
|
3418
3643
|
"""
|
3419
3644
|
return pulumi.get(self, "usage_datas")
|
3420
3645
|
|
@@ -3422,7 +3647,7 @@ class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemResult(dict):
|
|
3422
3647
|
@pulumi.getter
|
3423
3648
|
def vulnerabilities(self) -> Sequence['outputs.GetVulnerabilityAuditsVulnerabilityAuditCollectionItemVulnerabilityResult']:
|
3424
3649
|
"""
|
3425
|
-
List of vulnerabilities found in the vulnerability audit.
|
3650
|
+
List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
|
3426
3651
|
"""
|
3427
3652
|
return pulumi.get(self, "vulnerabilities")
|
3428
3653
|
|
@@ -3448,10 +3673,12 @@ class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemApplicationDependenc
|
|
3448
3673
|
def __init__(__self__, *,
|
3449
3674
|
application_dependency_node_ids: Sequence[str],
|
3450
3675
|
gav: str,
|
3451
|
-
node_id: str
|
3676
|
+
node_id: str,
|
3677
|
+
purl: str):
|
3452
3678
|
pulumi.set(__self__, "application_dependency_node_ids", application_dependency_node_ids)
|
3453
3679
|
pulumi.set(__self__, "gav", gav)
|
3454
3680
|
pulumi.set(__self__, "node_id", node_id)
|
3681
|
+
pulumi.set(__self__, "purl", purl)
|
3455
3682
|
|
3456
3683
|
@property
|
3457
3684
|
@pulumi.getter(name="applicationDependencyNodeIds")
|
@@ -3468,21 +3695,29 @@ class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemApplicationDependenc
|
|
3468
3695
|
def node_id(self) -> str:
|
3469
3696
|
return pulumi.get(self, "node_id")
|
3470
3697
|
|
3698
|
+
@property
|
3699
|
+
@pulumi.getter
|
3700
|
+
def purl(self) -> str:
|
3701
|
+
return pulumi.get(self, "purl")
|
3702
|
+
|
3471
3703
|
|
3472
3704
|
@pulumi.output_type
|
3473
3705
|
class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemConfigurationResult(dict):
|
3474
3706
|
def __init__(__self__, *,
|
3475
3707
|
exclusions: Sequence[str],
|
3476
3708
|
max_permissible_cvss_v2score: float,
|
3477
|
-
max_permissible_cvss_v3score: float
|
3709
|
+
max_permissible_cvss_v3score: float,
|
3710
|
+
max_permissible_severity: str):
|
3478
3711
|
"""
|
3479
3712
|
:param Sequence[str] exclusions: A vulnerable application dependency is ignored if its name matches any of the items in `exclusions`. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters.
|
3480
3713
|
:param float max_permissible_cvss_v2score: A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
|
3481
3714
|
:param float max_permissible_cvss_v3score: A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
|
3715
|
+
:param str max_permissible_severity: A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
|
3482
3716
|
"""
|
3483
3717
|
pulumi.set(__self__, "exclusions", exclusions)
|
3484
3718
|
pulumi.set(__self__, "max_permissible_cvss_v2score", max_permissible_cvss_v2score)
|
3485
3719
|
pulumi.set(__self__, "max_permissible_cvss_v3score", max_permissible_cvss_v3score)
|
3720
|
+
pulumi.set(__self__, "max_permissible_severity", max_permissible_severity)
|
3486
3721
|
|
3487
3722
|
@property
|
3488
3723
|
@pulumi.getter
|
@@ -3508,6 +3743,14 @@ class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemConfigurationResult(
|
|
3508
3743
|
"""
|
3509
3744
|
return pulumi.get(self, "max_permissible_cvss_v3score")
|
3510
3745
|
|
3746
|
+
@property
|
3747
|
+
@pulumi.getter(name="maxPermissibleSeverity")
|
3748
|
+
def max_permissible_severity(self) -> str:
|
3749
|
+
"""
|
3750
|
+
A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
|
3751
|
+
"""
|
3752
|
+
return pulumi.get(self, "max_permissible_severity")
|
3753
|
+
|
3511
3754
|
|
3512
3755
|
@pulumi.output_type
|
3513
3756
|
class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemSourceResult(dict):
|
@@ -3607,19 +3850,25 @@ class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemVulnerabilityResult(
|
|
3607
3850
|
cvss_v3score: float,
|
3608
3851
|
id: str,
|
3609
3852
|
is_false_positive: bool,
|
3610
|
-
is_ignored: bool
|
3853
|
+
is_ignored: bool,
|
3854
|
+
severity: str,
|
3855
|
+
source: str):
|
3611
3856
|
"""
|
3612
3857
|
:param float cvss_v2score: Common Vulnerability Scoring System (CVSS) Version 2.
|
3613
3858
|
:param float cvss_v3score: Common Vulnerability Scoring System (CVSS) Version 3.
|
3614
3859
|
:param str id: A filter to return only resources that match the specified identifier. Required only if the compartmentId query parameter is not specified.
|
3615
3860
|
:param bool is_false_positive: Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is `null`.
|
3616
3861
|
:param bool is_ignored: Indicates if the vulnerability was ignored according to the audit configuration.
|
3862
|
+
:param str severity: ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
|
3863
|
+
:param str source: Source that published the vulnerability
|
3617
3864
|
"""
|
3618
3865
|
pulumi.set(__self__, "cvss_v2score", cvss_v2score)
|
3619
3866
|
pulumi.set(__self__, "cvss_v3score", cvss_v3score)
|
3620
3867
|
pulumi.set(__self__, "id", id)
|
3621
3868
|
pulumi.set(__self__, "is_false_positive", is_false_positive)
|
3622
3869
|
pulumi.set(__self__, "is_ignored", is_ignored)
|
3870
|
+
pulumi.set(__self__, "severity", severity)
|
3871
|
+
pulumi.set(__self__, "source", source)
|
3623
3872
|
|
3624
3873
|
@property
|
3625
3874
|
@pulumi.getter(name="cvssV2score")
|
@@ -3661,4 +3910,20 @@ class GetVulnerabilityAuditsVulnerabilityAuditCollectionItemVulnerabilityResult(
|
|
3661
3910
|
"""
|
3662
3911
|
return pulumi.get(self, "is_ignored")
|
3663
3912
|
|
3913
|
+
@property
|
3914
|
+
@pulumi.getter
|
3915
|
+
def severity(self) -> str:
|
3916
|
+
"""
|
3917
|
+
ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
|
3918
|
+
"""
|
3919
|
+
return pulumi.get(self, "severity")
|
3920
|
+
|
3921
|
+
@property
|
3922
|
+
@pulumi.getter
|
3923
|
+
def source(self) -> str:
|
3924
|
+
"""
|
3925
|
+
Source that published the vulnerability
|
3926
|
+
"""
|
3927
|
+
return pulumi.get(self, "source")
|
3928
|
+
|
3664
3929
|
|