Skip to content

Commit f25fe9a

Browse files
author
AWS
committed
Inspector2 Update: Adds support for filePath filter.
1 parent 877968d commit f25fe9a

File tree

2 files changed

+59
-15
lines changed

2 files changed

+59
-15
lines changed
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
{
2+
"type": "feature",
3+
"category": "Inspector2",
4+
"contributor": "",
5+
"description": "Adds support for filePath filter."
6+
}

services/inspector2/src/main/resources/codegen-resources/service-2.json

Lines changed: 53 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -647,7 +647,7 @@
647647
{"shape":"ThrottlingException"},
648648
{"shape":"InternalServerException"}
649649
],
650-
"documentation":"<p>Lists coverage details for you environment.</p>"
650+
"documentation":"<p>Lists coverage details for your environment.</p>"
651651
},
652652
"ListCoverageStatistics":{
653653
"name":"ListCoverageStatistics",
@@ -891,7 +891,7 @@
891891
{"shape":"ThrottlingException"},
892892
{"shape":"InternalServerException"}
893893
],
894-
"documentation":"<p> Stops a CIS session. This API is used by the Amazon Inspector SSM plugin to communicate with the Amazon Inspector service. The Amazon Inspector SSM plugin calls this API to start a CIS scan session for the scan ID supplied by the service. </p>",
894+
"documentation":"<p> Stops a CIS session. This API is used by the Amazon Inspector SSM plugin to communicate with the Amazon Inspector service. The Amazon Inspector SSM plugin calls this API to stop a CIS scan session for the scan ID supplied by the service. </p>",
895895
"idempotent":true
896896
},
897897
"TagResource":{
@@ -1061,7 +1061,7 @@
10611061
"members":{
10621062
"message":{"shape":"String"}
10631063
},
1064-
"documentation":"<p>You do not have sufficient access to perform this action.</p> <p> For <code>Enable</code>, you receive this error if you attempt to use a feature in an unsupported Amazon Web Services Region. </p>",
1064+
"documentation":"<p>You do not have sufficient access to perform this action.</p>",
10651065
"error":{
10661066
"httpStatusCode":403,
10671067
"senderFault":true
@@ -3049,7 +3049,7 @@
30493049
},
30503050
"scanMode":{
30513051
"shape":"CoverageStringFilterList",
3052-
"documentation":"<p>The filter to search for Amazon EC2 instance coverage by scan mode. Valid values are <code>EC2_SSM_AGENT_BASED</code> and <code>EC2_HYBRID</code>.</p>"
3052+
"documentation":"<p>The filter to search for Amazon EC2 instance coverage by scan mode. Valid values are <code>EC2_SSM_AGENT_BASED</code> and <code>EC2_AGENTLESS</code>.</p>"
30533053
},
30543054
"scanStatusCode":{
30553055
"shape":"CoverageStringFilterList",
@@ -3338,7 +3338,10 @@
33383338
"shape":"ResourceFilterCriteria",
33393339
"documentation":"<p>The resource filter criteria for the software bill of materials (SBOM) report.</p>"
33403340
},
3341-
"s3Destination":{"shape":"Destination"}
3341+
"s3Destination":{
3342+
"shape":"Destination",
3343+
"documentation":"<p>Contains details of the Amazon S3 bucket and KMS key used to export findings.</p>"
3344+
}
33423345
}
33433346
},
33443347
"CreateSbomExportResponse":{
@@ -4671,7 +4674,10 @@
46714674
"FindingDetail":{
46724675
"type":"structure",
46734676
"members":{
4674-
"cisaData":{"shape":"CisaData"},
4677+
"cisaData":{
4678+
"shape":"CisaData",
4679+
"documentation":"<p>The Cybersecurity and Infrastructure Security Agency (CISA) details for a specific vulnerability.</p>"
4680+
},
46754681
"cwes":{
46764682
"shape":"Cwes",
46774683
"documentation":"<p>The Common Weakness Enumerations (CWEs) associated with the vulnerability.</p>"
@@ -4684,7 +4690,10 @@
46844690
"shape":"EvidenceList",
46854691
"documentation":"<p>Information on the evidence of the vulnerability.</p>"
46864692
},
4687-
"exploitObserved":{"shape":"ExploitObserved"},
4693+
"exploitObserved":{
4694+
"shape":"ExploitObserved",
4695+
"documentation":"<p>Contains information on when this exploit was observed.</p>"
4696+
},
46884697
"findingArn":{
46894698
"shape":"FindingArn",
46904699
"documentation":"<p>The finding ARN that the vulnerability details are associated with.</p>"
@@ -5216,7 +5225,10 @@
52165225
"shape":"ReportId",
52175226
"documentation":"<p>The report ID of the software bill of materials (SBOM) report.</p>"
52185227
},
5219-
"s3Destination":{"shape":"Destination"},
5228+
"s3Destination":{
5229+
"shape":"Destination",
5230+
"documentation":"<p>Contains details of the Amazon S3 bucket and KMS key used to export findings</p>"
5231+
},
52205232
"status":{
52215233
"shape":"ExternalReportStatus",
52225234
"documentation":"<p>The status of the software bill of materials (SBOM) report.</p>"
@@ -5422,7 +5434,10 @@
54225434
"shape":"String",
54235435
"documentation":"<p>The runtimes included in the aggregation results.</p>"
54245436
},
5425-
"severityCounts":{"shape":"SeverityCounts"}
5437+
"severityCounts":{
5438+
"shape":"SeverityCounts",
5439+
"documentation":"<p>An object that contains the counts of aggregated finding per severity.</p>"
5440+
}
54265441
},
54275442
"documentation":"<p>A response that contains the results of an Amazon Web Services Lambda function finding aggregation.</p>"
54285443
},
@@ -5507,7 +5522,10 @@
55075522
"shape":"NonEmptyString",
55085523
"documentation":"<p>The Resource ID of the Amazon Web Services Lambda function layer.</p>"
55095524
},
5510-
"severityCounts":{"shape":"SeverityCounts"}
5525+
"severityCounts":{
5526+
"shape":"SeverityCounts",
5527+
"documentation":"<p>An object that contains the counts of aggregated finding per severity.</p>"
5528+
}
55115529
},
55125530
"documentation":"<p>A response that contains the results of an Amazon Web Services Lambda function layer finding aggregation.</p>"
55135531
},
@@ -6483,6 +6501,10 @@
64836501
"shape":"NumberFilter",
64846502
"documentation":"<p>An object that contains details on the package epoch to filter on.</p>"
64856503
},
6504+
"filePath":{
6505+
"shape":"StringFilter",
6506+
"documentation":"<p>An object that contains details on the package file path to filter on.</p>"
6507+
},
64866508
"name":{
64876509
"shape":"StringFilter",
64886510
"documentation":"<p>An object that contains details on the name of the package to filter on.</p>"
@@ -6491,7 +6513,10 @@
64916513
"shape":"StringFilter",
64926514
"documentation":"<p>An object that contains details on the package release to filter on.</p>"
64936515
},
6494-
"sourceLambdaLayerArn":{"shape":"StringFilter"},
6516+
"sourceLambdaLayerArn":{
6517+
"shape":"StringFilter",
6518+
"documentation":"<p>An object that describes the details of a string filter.</p>"
6519+
},
64956520
"sourceLayerHash":{
64966521
"shape":"StringFilter",
64976522
"documentation":"<p>An object that contains details on the source layer hash to filter on.</p>"
@@ -6528,7 +6553,8 @@
65286553
"PYTHONPKG",
65296554
"NODEPKG",
65306555
"POM",
6531-
"GEMSPEC"
6556+
"GEMSPEC",
6557+
"DOTNET_CORE"
65326558
]
65336559
},
65346560
"PackageName":{
@@ -7073,8 +7099,14 @@
70737099
"shape":"State",
70747100
"documentation":"<p>An object detailing the state of Amazon Inspector scanning for Amazon ECR resources.</p>"
70757101
},
7076-
"lambda":{"shape":"State"},
7077-
"lambdaCode":{"shape":"State"}
7102+
"lambda":{
7103+
"shape":"State",
7104+
"documentation":"<p>An object that described the state of Amazon Inspector scans for an account.</p>"
7105+
},
7106+
"lambdaCode":{
7107+
"shape":"State",
7108+
"documentation":"<p>An object that described the state of Amazon Inspector scans for an account.</p>"
7109+
}
70787110
},
70797111
"documentation":"<p>Details the state of Amazon Inspector for each resource type Amazon Inspector scans.</p>"
70807112
},
@@ -7181,7 +7213,13 @@
71817213
"NODEJS_18_X",
71827214
"GO_1_X",
71837215
"JAVA_17",
7184-
"PYTHON_3_10"
7216+
"PYTHON_3_10",
7217+
"PYTHON_3_11",
7218+
"DOTNETCORE_3_1",
7219+
"DOTNET_6",
7220+
"DOTNET_7",
7221+
"RUBY_2_7",
7222+
"RUBY_3_2"
71857223
]
71867224
},
71877225
"SbomReportFormat":{

0 commit comments

Comments
 (0)