Skip to content

Commit c6f9938

Browse files
author
awstools
committed
feat(client-inspector2): Add CVSSV4 to Vulnerability Search API and update enable/disable account id list length to 5
1 parent 4fe5c4a commit c6f9938

File tree

5 files changed

+97
-44
lines changed

5 files changed

+97
-44
lines changed

clients/client-inspector2/src/commands/SearchVulnerabilitiesCommand.ts

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,10 @@ export interface SearchVulnerabilitiesCommandOutput extends SearchVulnerabilitie
7070
* // ],
7171
* // },
7272
* // vendorSeverity: "STRING_VALUE",
73+
* // cvss4: { // Cvss4
74+
* // baseScore: Number("double"),
75+
* // scoringVector: "STRING_VALUE",
76+
* // },
7377
* // cvss3: { // Cvss3
7478
* // baseScore: Number("double"),
7579
* // scoringVector: "STRING_VALUE",

clients/client-inspector2/src/models/models_0.ts

Lines changed: 19 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -5280,7 +5280,7 @@ export interface ScanStatus {
52805280
* Amazon Inspector service will automatically resolve the issue and resume the scanning. No action
52815281
* required from the user.</p>
52825282
* <p>
5283-
* <code>NO INVENTORY</code> - Amazon Inspector couldn't find software application inventory to scan
5283+
* <code>NO_INVENTORY</code> - Amazon Inspector couldn't find software application inventory to scan
52845284
* for vulnerabilities. This might be caused due to required Amazon Inspector associations being deleted
52855285
* or failing to run on your resource. Please verify the status of
52865286
* <code>InspectorInventoryCollection-do-not-delete</code> association in the SSM console
@@ -7402,6 +7402,24 @@ export interface Cvss3 {
74027402
scoringVector?: string | undefined;
74037403
}
74047404

7405+
/**
7406+
* <p>The Common Vulnerability Scoring System (CVSS) version 4 details for the vulnerability.</p>
7407+
* @public
7408+
*/
7409+
export interface Cvss4 {
7410+
/**
7411+
* <p>The base CVSS v4 score for the vulnerability finding, which rates the severity of the vulnerability on a scale from 0 to 10.</p>
7412+
* @public
7413+
*/
7414+
baseScore?: number | undefined;
7415+
7416+
/**
7417+
* <p>The CVSS v4 scoring vector, which contains the metrics and measurements that were used to calculate the base score.</p>
7418+
* @public
7419+
*/
7420+
scoringVector?: string | undefined;
7421+
}
7422+
74057423
/**
74067424
* <p>The CVSS score for a finding.</p>
74077425
* @public
@@ -8055,18 +8073,6 @@ export interface EnableDelegatedAdminAccountResponse {
80558073
delegatedAdminAccountId: string | undefined;
80568074
}
80578075

8058-
/**
8059-
* <p>Details about the Exploit Prediction Scoring System (EPSS) score.</p>
8060-
* @public
8061-
*/
8062-
export interface Epss {
8063-
/**
8064-
* <p>The Exploit Prediction Scoring System (EPSS) score.</p>
8065-
* @public
8066-
*/
8067-
score?: number | undefined;
8068-
}
8069-
80708076
/**
80718077
* @internal
80728078
*/

clients/client-inspector2/src/models/models_1.ts

Lines changed: 19 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,6 +50,7 @@ import {
5050
Currency,
5151
Cvss2,
5252
Cvss3,
53+
Cvss4,
5354
CvssScore,
5455
CvssScoreDetails,
5556
DelegatedAdmin,
@@ -60,7 +61,6 @@ import {
6061
Ec2DeepInspectionStatus,
6162
EcrConfiguration,
6263
EcrConfigurationState,
63-
Epss,
6464
ExploitObserved,
6565
FilterAction,
6666
FilterCriteria,
@@ -78,6 +78,18 @@ import {
7878
TagFilter,
7979
} from "./models_0";
8080

81+
/**
82+
* <p>Details about the Exploit Prediction Scoring System (EPSS) score.</p>
83+
* @public
84+
*/
85+
export interface Epss {
86+
/**
87+
* <p>The Exploit Prediction Scoring System (EPSS) score.</p>
88+
* @public
89+
*/
90+
score?: number | undefined;
91+
}
92+
8193
/**
8294
* <p>Details about the Exploit Prediction Scoring System (EPSS) score for a finding.</p>
8395
* @public
@@ -2719,6 +2731,12 @@ export interface Vulnerability {
27192731
*/
27202732
vendorSeverity?: string | undefined;
27212733

2734+
/**
2735+
* <p>An object that contains the Common Vulnerability Scoring System (CVSS) Version 4 details for the vulnerability.</p>
2736+
* @public
2737+
*/
2738+
cvss4?: Cvss4 | undefined;
2739+
27222740
/**
27232741
* <p>An object that contains the Common Vulnerability Scoring System (CVSS) Version 3 details
27242742
* for the vulnerability.</p>

clients/client-inspector2/src/protocols/Aws_restJson1.ts

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -315,6 +315,7 @@ import {
315315
CreateIntegrationDetail,
316316
Cvss2,
317317
Cvss3,
318+
Cvss4,
318319
CvssScore,
319320
CvssScoreDetails,
320321
DailySchedule,
@@ -328,7 +329,6 @@ import {
328329
EcrConfigurationState,
329330
EcrContainerImageMetadata,
330331
EcrRescanDurationState,
331-
Epss,
332332
ExploitObserved,
333333
FilterCriteria,
334334
FindingDetail,
@@ -369,6 +369,7 @@ import {
369369
WeeklySchedule,
370370
} from "../models/models_0";
371371
import {
372+
Epss,
372373
EpssDetails,
373374
ExploitabilityDetails,
374375
Filter,
@@ -4847,6 +4848,16 @@ const de_Cvss3 = (output: any, context: __SerdeContext): Cvss3 => {
48474848
}) as any;
48484849
};
48494850

4851+
/**
4852+
* deserializeAws_restJson1Cvss4
4853+
*/
4854+
const de_Cvss4 = (output: any, context: __SerdeContext): Cvss4 => {
4855+
return take(output, {
4856+
baseScore: __limitedParseDouble,
4857+
scoringVector: __expectString,
4858+
}) as any;
4859+
};
4860+
48504861
/**
48514862
* deserializeAws_restJson1CvssScore
48524863
*/
@@ -5632,6 +5643,7 @@ const de_Vulnerability = (output: any, context: __SerdeContext): Vulnerability =
56325643
cisaData: (_: any) => de_CisaData(_, context),
56335644
cvss2: (_: any) => de_Cvss2(_, context),
56345645
cvss3: (_: any) => de_Cvss3(_, context),
5646+
cvss4: (_: any) => de_Cvss4(_, context),
56355647
cwes: _json,
56365648
description: __expectString,
56375649
detectionPlatforms: _json,

0 commit comments

Comments
 (0)