Skip to content

Commit 839af99

Browse files
Add CVSSV4 to Vulnerability Search API and update enable/disable account id list length to 5
1 parent 0d8e882 commit 839af99

File tree

11 files changed

+265
-52
lines changed

11 files changed

+265
-52
lines changed

generator/ServiceModels/inspector2/inspector2-2020-06-08.api.json

Lines changed: 18 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -3160,27 +3160,25 @@
31603160
"Cvss2":{
31613161
"type":"structure",
31623162
"members":{
3163-
"baseScore":{"shape":"Cvss2BaseScore"},
3164-
"scoringVector":{"shape":"Cvss2ScoringVector"}
3163+
"baseScore":{"shape":"CvssBaseScore"},
3164+
"scoringVector":{"shape":"CvssScoringVector"}
31653165
}
31663166
},
3167-
"Cvss2BaseScore":{"type":"double"},
3168-
"Cvss2ScoringVector":{
3169-
"type":"string",
3170-
"min":0
3171-
},
31723167
"Cvss3":{
31733168
"type":"structure",
31743169
"members":{
3175-
"baseScore":{"shape":"Cvss3BaseScore"},
3176-
"scoringVector":{"shape":"Cvss3ScoringVector"}
3170+
"baseScore":{"shape":"CvssBaseScore"},
3171+
"scoringVector":{"shape":"CvssScoringVector"}
31773172
}
31783173
},
3179-
"Cvss3BaseScore":{"type":"double"},
3180-
"Cvss3ScoringVector":{
3181-
"type":"string",
3182-
"min":0
3174+
"Cvss4":{
3175+
"type":"structure",
3176+
"members":{
3177+
"baseScore":{"shape":"CvssBaseScore"},
3178+
"scoringVector":{"shape":"CvssScoringVector"}
3179+
}
31833180
},
3181+
"CvssBaseScore":{"type":"double"},
31843182
"CvssScore":{
31853183
"type":"structure",
31863184
"required":[
@@ -3232,6 +3230,10 @@
32323230
"type":"list",
32333231
"member":{"shape":"CvssScore"}
32343232
},
3233+
"CvssScoringVector":{
3234+
"type":"string",
3235+
"min":0
3236+
},
32353237
"Cwe":{
32363238
"type":"string",
32373239
"min":0
@@ -3426,7 +3428,7 @@
34263428
"DisableResourceTypeList":{
34273429
"type":"list",
34283430
"member":{"shape":"ResourceScanType"},
3429-
"max":3,
3431+
"max":5,
34303432
"min":0
34313433
},
34323434
"DisableResponse":{
@@ -3683,7 +3685,7 @@
36833685
"EnableResourceTypeList":{
36843686
"type":"list",
36853687
"member":{"shape":"ResourceScanType"},
3686-
"max":3,
3688+
"max":5,
36873689
"min":1
36883690
},
36893691
"EnableResponse":{
@@ -6950,6 +6952,7 @@
69506952
"description":{"shape":"VulnerabilityDescription"},
69516953
"atigData":{"shape":"AtigData"},
69526954
"vendorSeverity":{"shape":"VendorSeverity"},
6955+
"cvss4":{"shape":"Cvss4"},
69536956
"cvss3":{"shape":"Cvss3"},
69546957
"relatedVulnerabilities":{"shape":"RelatedVulnerabilities"},
69556958
"cvss2":{"shape":"Cvss2"},

generator/ServiceModels/inspector2/inspector2-2020-06-08.docs.json

Lines changed: 16 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1561,34 +1561,24 @@
15611561
"Vulnerability$cvss2": "<p>An object that contains the Common Vulnerability Scoring System (CVSS) Version 2 details for the vulnerability.</p>"
15621562
}
15631563
},
1564-
"Cvss2BaseScore": {
1565-
"base": null,
1566-
"refs": {
1567-
"Cvss2$baseScore": "<p>The CVSS v2 base score for the vulnerability.</p>"
1568-
}
1569-
},
1570-
"Cvss2ScoringVector": {
1571-
"base": null,
1572-
"refs": {
1573-
"Cvss2$scoringVector": "<p>The scoring vector associated with the CVSS v2 score.</p>"
1574-
}
1575-
},
15761564
"Cvss3": {
15771565
"base": "<p>The Common Vulnerability Scoring System (CVSS) version 3 details for the vulnerability.</p>",
15781566
"refs": {
15791567
"Vulnerability$cvss3": "<p>An object that contains the Common Vulnerability Scoring System (CVSS) Version 3 details for the vulnerability.</p>"
15801568
}
15811569
},
1582-
"Cvss3BaseScore": {
1583-
"base": null,
1570+
"Cvss4": {
1571+
"base": "<p>The Common Vulnerability Scoring System (CVSS) version 4 details for the vulnerability.</p>",
15841572
"refs": {
1585-
"Cvss3$baseScore": "<p>The CVSS v3 base score for the vulnerability.</p>"
1573+
"Vulnerability$cvss4": "<p>An object that contains the Common Vulnerability Scoring System (CVSS) Version 4 details for the vulnerability.</p>"
15861574
}
15871575
},
1588-
"Cvss3ScoringVector": {
1576+
"CvssBaseScore": {
15891577
"base": null,
15901578
"refs": {
1591-
"Cvss3$scoringVector": "<p>The scoring vector associated with the CVSS v3 score.</p>"
1579+
"Cvss2$baseScore": "<p>The CVSS v2 base score for the vulnerability.</p>",
1580+
"Cvss3$baseScore": "<p>The CVSS v3 base score for the vulnerability.</p>",
1581+
"Cvss4$baseScore": "<p>The base CVSS v4 score for the vulnerability finding, which rates the severity of the vulnerability on a scale from 0 to 10.</p>"
15921582
}
15931583
},
15941584
"CvssScore": {
@@ -1621,6 +1611,14 @@
16211611
"PackageVulnerabilityDetails$cvss": "<p>An object that contains details about the CVSS score of a finding.</p>"
16221612
}
16231613
},
1614+
"CvssScoringVector": {
1615+
"base": null,
1616+
"refs": {
1617+
"Cvss2$scoringVector": "<p>The scoring vector associated with the CVSS v2 score.</p>",
1618+
"Cvss3$scoringVector": "<p>The scoring vector associated with the CVSS v3 score.</p>",
1619+
"Cvss4$scoringVector": "<p>The CVSS v4 scoring vector, which contains the metrics and measurements that were used to calculate the base score.</p>"
1620+
}
1621+
},
16241622
"Cwe": {
16251623
"base": null,
16261624
"refs": {
@@ -3837,7 +3835,7 @@
38373835
"ScanStatusReason": {
38383836
"base": null,
38393837
"refs": {
3840-
"ScanStatus$reason": "<p>The scan status. Possible return values and descriptions are: </p> <p> <code>ACCESS_DENIED</code> - Resource access policy restricting Amazon Inspector access. Please update the IAM policy.</p> <p> <code>ACCESS_DENIED_TO_ENCRYPTION_KEY</code> - The KMS key policy doesn't allow Amazon Inspector access. Update the key policy.</p> <p> <code>DEEP_INSPECTION_COLLECTION_TIME_LIMIT_EXCEEDED</code> - Amazon Inspector failed to extract the package inventory because the package collection time exceeding the maximum threshold of 15 minutes.</p> <p> <code>DEEP_INSPECTION_DAILY_SSM_INVENTORY_LIMIT_EXCEEDED</code> - The SSM agent couldn't send inventory to Amazon Inspector because the SSM quota for Inventory data collected per instance per day has already been reached for this instance.</p> <p> <code>DEEP_INSPECTION_NO_INVENTORY</code> - The Amazon Inspector plugin hasn't yet been able to collect an inventory of packages for this instance. This is usually the result of a pending scan, however, if this status persists after 6 hours, use SSM to ensure that the required Amazon Inspector associations exist and are running for the instance.</p> <p> <code>DEEP_INSPECTION_PACKAGE_COLLECTION_LIMIT_EXCEEDED</code> - The instance has exceeded the 5000 package limit for Amazon Inspector Deep inspection. To resume Deep inspection for this instance you can try to adjust the custom paths associated with the account.</p> <p> <code>EC2_INSTANCE_STOPPED</code> - This EC2 instance is in a stopped state, therefore, Amazon Inspector will pause scanning. The existing findings will continue to exist until the instance is terminated. Once the instance is re-started, Inspector will automatically start scanning the instance again. Please note that you will not be charged for this instance while it's in a stopped state.</p> <p> <code>EXCLUDED_BY_TAG</code> - This resource was not scanned because it has been excluded by a tag.</p> <p> <code>IMAGE_SIZE_EXCEEDED</code> - Reserved for future use.</p> <p> <code>INTEGRATION_CONNNECTION_LOST</code> - Amazon Inspector couldn't communicate with the source code management platform.</p> <p> <code>INTERNAL_ERROR</code> - Amazon Inspector has encountered an internal error for this resource. Amazon Inspector service will automatically resolve the issue and resume the scanning. No action required from the user.</p> <p> <code>NO INVENTORY</code> - Amazon Inspector couldn't find software application inventory to scan for vulnerabilities. This might be caused due to required Amazon Inspector associations being deleted or failing to run on your resource. Please verify the status of <code>InspectorInventoryCollection-do-not-delete</code> association in the SSM console for the resource. Additionally, you can verify the instance's inventory in the SSM Fleet Manager console.</p> <p> <code>NO_RESOURCES_FOUND</code> - Reserved for future use.</p> <p> <code>NO_SCAN_CONFIGURATION_ASSOCIATED</code> - The code repository resource doesn't have an associated scan configuration.</p> <p> <code>PENDING_DISABLE</code> - This resource is pending cleanup during disablement. The customer will not be billed while a resource is in the pending disable status.</p> <p> <code>PENDING_INITIAL_SCAN</code> - This resource has been identified for scanning, results will be available soon.</p> <p> <code>RESOURCE_TERMINATED</code> - This resource has been terminated. The findings and coverage associated with this resource are in the process of being cleaned up.</p> <p> <code>SCAN_ELIGIBILITY_EXPIRED</code> - The configured scan duration has lapsed for this image.</p> <p> <code>SCAN_FREQUENCY_MANUAL</code> - This image will not be covered by Amazon Inspector due to the repository scan frequency configuration.</p> <p> <code>SCAN_FREQUENCY_SCAN_ON_PUSH</code> - This image will be scanned one time and will not new findings because of the scan frequency configuration.</p> <p> <code>SCAN_IN_PROGRESS</code> - The resource is currently being scanned.</p> <p> <code>STALE_INVENTORY</code> - Amazon Inspector wasn't able to collect an updated software application inventory in the last 7 days. Please confirm the required Amazon Inspector associations still exist and you can still see an updated inventory in the SSM console.</p> <p> <code>SUCCESSFUL</code> - The scan was successful.</p> <p> <code>UNMANAGED_EC2_INSTANCE</code> - The EC2 instance is not managed by SSM, please use the following SSM automation to remediate the issue: <a href=\"https://docs.aws.amazon.com/systems-manager-automation-runbooks/latest/userguide/automation-awssupport-troubleshoot-managed-instance.html\">https://docs.aws.amazon.com/systems-manager-automation-runbooks/latest/userguide/automation-awssupport-troubleshoot-managed-instance.html</a>. Once the instance becomes managed by SSM, Inspector will automatically begin scanning this instance. </p> <p> <code>UNSUPPORTED_CONFIG_FILE</code> - Reserved for future use.</p> <p> <code>UNSUPPORTED_LANGUAGE</code> - The scan was unsuccessful because the repository contains files in an unsupported programming language.</p> <p> <code>UNSUPPORTED_MEDIA_TYPE </code>- The ECR image has an unsupported media type.</p> <p> <code>UNSUPPORTED_OS</code> - Amazon Inspector does not support this OS, architecture, or image manifest type at this time. To see a complete list of supported operating systems see: <a href=\" https://docs.aws.amazon.com/inspector/latest/user/supported.html\">https://docs.aws.amazon.com/inspector/latest/user/supported.html</a>.</p> <p> <code>UNSUPPORTED_RUNTIME</code> - The function was not scanned because it has an unsupported runtime. To see a complete list of supported runtimes see: <a href=\" https://docs.aws.amazon.com/inspector/latest/user/supported.html\">https://docs.aws.amazon.com/inspector/latest/user/supported.html</a>.</p>"
3838+
"ScanStatus$reason": "<p>The scan status. Possible return values and descriptions are: </p> <p> <code>ACCESS_DENIED</code> - Resource access policy restricting Amazon Inspector access. Please update the IAM policy.</p> <p> <code>ACCESS_DENIED_TO_ENCRYPTION_KEY</code> - The KMS key policy doesn't allow Amazon Inspector access. Update the key policy.</p> <p> <code>DEEP_INSPECTION_COLLECTION_TIME_LIMIT_EXCEEDED</code> - Amazon Inspector failed to extract the package inventory because the package collection time exceeding the maximum threshold of 15 minutes.</p> <p> <code>DEEP_INSPECTION_DAILY_SSM_INVENTORY_LIMIT_EXCEEDED</code> - The SSM agent couldn't send inventory to Amazon Inspector because the SSM quota for Inventory data collected per instance per day has already been reached for this instance.</p> <p> <code>DEEP_INSPECTION_NO_INVENTORY</code> - The Amazon Inspector plugin hasn't yet been able to collect an inventory of packages for this instance. This is usually the result of a pending scan, however, if this status persists after 6 hours, use SSM to ensure that the required Amazon Inspector associations exist and are running for the instance.</p> <p> <code>DEEP_INSPECTION_PACKAGE_COLLECTION_LIMIT_EXCEEDED</code> - The instance has exceeded the 5000 package limit for Amazon Inspector Deep inspection. To resume Deep inspection for this instance you can try to adjust the custom paths associated with the account.</p> <p> <code>EC2_INSTANCE_STOPPED</code> - This EC2 instance is in a stopped state, therefore, Amazon Inspector will pause scanning. The existing findings will continue to exist until the instance is terminated. Once the instance is re-started, Inspector will automatically start scanning the instance again. Please note that you will not be charged for this instance while it's in a stopped state.</p> <p> <code>EXCLUDED_BY_TAG</code> - This resource was not scanned because it has been excluded by a tag.</p> <p> <code>IMAGE_SIZE_EXCEEDED</code> - Reserved for future use.</p> <p> <code>INTEGRATION_CONNNECTION_LOST</code> - Amazon Inspector couldn't communicate with the source code management platform.</p> <p> <code>INTERNAL_ERROR</code> - Amazon Inspector has encountered an internal error for this resource. Amazon Inspector service will automatically resolve the issue and resume the scanning. No action required from the user.</p> <p> <code>NO_INVENTORY</code> - Amazon Inspector couldn't find software application inventory to scan for vulnerabilities. This might be caused due to required Amazon Inspector associations being deleted or failing to run on your resource. Please verify the status of <code>InspectorInventoryCollection-do-not-delete</code> association in the SSM console for the resource. Additionally, you can verify the instance's inventory in the SSM Fleet Manager console.</p> <p> <code>NO_RESOURCES_FOUND</code> - Reserved for future use.</p> <p> <code>NO_SCAN_CONFIGURATION_ASSOCIATED</code> - The code repository resource doesn't have an associated scan configuration.</p> <p> <code>PENDING_DISABLE</code> - This resource is pending cleanup during disablement. The customer will not be billed while a resource is in the pending disable status.</p> <p> <code>PENDING_INITIAL_SCAN</code> - This resource has been identified for scanning, results will be available soon.</p> <p> <code>RESOURCE_TERMINATED</code> - This resource has been terminated. The findings and coverage associated with this resource are in the process of being cleaned up.</p> <p> <code>SCAN_ELIGIBILITY_EXPIRED</code> - The configured scan duration has lapsed for this image.</p> <p> <code>SCAN_FREQUENCY_MANUAL</code> - This image will not be covered by Amazon Inspector due to the repository scan frequency configuration.</p> <p> <code>SCAN_FREQUENCY_SCAN_ON_PUSH</code> - This image will be scanned one time and will not new findings because of the scan frequency configuration.</p> <p> <code>SCAN_IN_PROGRESS</code> - The resource is currently being scanned.</p> <p> <code>STALE_INVENTORY</code> - Amazon Inspector wasn't able to collect an updated software application inventory in the last 7 days. Please confirm the required Amazon Inspector associations still exist and you can still see an updated inventory in the SSM console.</p> <p> <code>SUCCESSFUL</code> - The scan was successful.</p> <p> <code>UNMANAGED_EC2_INSTANCE</code> - The EC2 instance is not managed by SSM, please use the following SSM automation to remediate the issue: <a href=\"https://docs.aws.amazon.com/systems-manager-automation-runbooks/latest/userguide/automation-awssupport-troubleshoot-managed-instance.html\">https://docs.aws.amazon.com/systems-manager-automation-runbooks/latest/userguide/automation-awssupport-troubleshoot-managed-instance.html</a>. Once the instance becomes managed by SSM, Inspector will automatically begin scanning this instance. </p> <p> <code>UNSUPPORTED_CONFIG_FILE</code> - Reserved for future use.</p> <p> <code>UNSUPPORTED_LANGUAGE</code> - The scan was unsuccessful because the repository contains files in an unsupported programming language.</p> <p> <code>UNSUPPORTED_MEDIA_TYPE </code>- The ECR image has an unsupported media type.</p> <p> <code>UNSUPPORTED_OS</code> - Amazon Inspector does not support this OS, architecture, or image manifest type at this time. To see a complete list of supported operating systems see: <a href=\" https://docs.aws.amazon.com/inspector/latest/user/supported.html\">https://docs.aws.amazon.com/inspector/latest/user/supported.html</a>.</p> <p> <code>UNSUPPORTED_RUNTIME</code> - The function was not scanned because it has an unsupported runtime. To see a complete list of supported runtimes see: <a href=\" https://docs.aws.amazon.com/inspector/latest/user/supported.html\">https://docs.aws.amazon.com/inspector/latest/user/supported.html</a>.</p>"
38413839
}
38423840
},
38433841
"ScanType": {

0 commit comments

Comments
 (0)