Oracle Cloud Infrastructure v1.41.0 published on Wednesday, Jun 19, 2024 by Pulumi
oci.Adm.getVulnerabilityAudit
Explore with Pulumi AI
Oracle Cloud Infrastructure v1.41.0 published on Wednesday, Jun 19, 2024 by Pulumi
This data source provides details about a specific Vulnerability Audit resource in Oracle Cloud Infrastructure ADM service.
Returns the details of the specified Vulnerability Audit.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as oci from "@pulumi/oci";
const testVulnerabilityAudit = oci.Adm.getVulnerabilityAudit({
vulnerabilityAuditId: testVulnerabilityAuditOciAdmVulnerabilityAudit.id,
});
import pulumi
import pulumi_oci as oci
test_vulnerability_audit = oci.Adm.get_vulnerability_audit(vulnerability_audit_id=test_vulnerability_audit_oci_adm_vulnerability_audit["id"])
package main
import (
"github.com/pulumi/pulumi-oci/sdk/go/oci/Adm"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := Adm.GetVulnerabilityAudit(ctx, &adm.GetVulnerabilityAuditArgs{
VulnerabilityAuditId: testVulnerabilityAuditOciAdmVulnerabilityAudit.Id,
}, nil)
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Oci = Pulumi.Oci;
return await Deployment.RunAsync(() =>
{
var testVulnerabilityAudit = Oci.Adm.GetVulnerabilityAudit.Invoke(new()
{
VulnerabilityAuditId = testVulnerabilityAuditOciAdmVulnerabilityAudit.Id,
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.oci.Adm.AdmFunctions;
import com.pulumi.oci.Adm.inputs.GetVulnerabilityAuditArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var testVulnerabilityAudit = AdmFunctions.getVulnerabilityAudit(GetVulnerabilityAuditArgs.builder()
.vulnerabilityAuditId(testVulnerabilityAuditOciAdmVulnerabilityAudit.id())
.build());
}
}
variables:
testVulnerabilityAudit:
fn::invoke:
Function: oci:Adm:getVulnerabilityAudit
Arguments:
vulnerabilityAuditId: ${testVulnerabilityAuditOciAdmVulnerabilityAudit.id}
Using getVulnerabilityAudit
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getVulnerabilityAudit(args: GetVulnerabilityAuditArgs, opts?: InvokeOptions): Promise<GetVulnerabilityAuditResult>
function getVulnerabilityAuditOutput(args: GetVulnerabilityAuditOutputArgs, opts?: InvokeOptions): Output<GetVulnerabilityAuditResult>
def get_vulnerability_audit(vulnerability_audit_id: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetVulnerabilityAuditResult
def get_vulnerability_audit_output(vulnerability_audit_id: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetVulnerabilityAuditResult]
func GetVulnerabilityAudit(ctx *Context, args *GetVulnerabilityAuditArgs, opts ...InvokeOption) (*GetVulnerabilityAuditResult, error)
func GetVulnerabilityAuditOutput(ctx *Context, args *GetVulnerabilityAuditOutputArgs, opts ...InvokeOption) GetVulnerabilityAuditResultOutput
> Note: This function is named GetVulnerabilityAudit
in the Go SDK.
public static class GetVulnerabilityAudit
{
public static Task<GetVulnerabilityAuditResult> InvokeAsync(GetVulnerabilityAuditArgs args, InvokeOptions? opts = null)
public static Output<GetVulnerabilityAuditResult> Invoke(GetVulnerabilityAuditInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetVulnerabilityAuditResult> getVulnerabilityAudit(GetVulnerabilityAuditArgs args, InvokeOptions options)
// Output-based functions aren't available in Java yet
fn::invoke:
function: oci:Adm/getVulnerabilityAudit:getVulnerabilityAudit
arguments:
# arguments dictionary
The following arguments are supported:
- Vulnerability
Audit stringId - Unique Vulnerability Audit identifier path parameter.
- Vulnerability
Audit stringId - Unique Vulnerability Audit identifier path parameter.
- vulnerability
Audit StringId - Unique Vulnerability Audit identifier path parameter.
- vulnerability
Audit stringId - Unique Vulnerability Audit identifier path parameter.
- vulnerability_
audit_ strid - Unique Vulnerability Audit identifier path parameter.
- vulnerability
Audit StringId - Unique Vulnerability Audit identifier path parameter.
getVulnerabilityAudit Result
The following output properties are available:
- Application
Dependencies List<GetVulnerability Audit Application Dependency> - Build
Type string - The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
- Compartment
Id string - The compartment Oracle Cloud identifier (OCID) of the vulnerability audit.
- Configurations
List<Get
Vulnerability Audit Configuration> - Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object - Dictionary<string, object>
- Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- Display
Name string - The name of the vulnerability audit.
- Dictionary<string, object>
- Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- Id string
- Unique vulnerability identifier, e.g. CVE-1999-0067.
- Is
Success bool - Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state. - Knowledge
Base stringId - The Oracle Cloud identifier (OCID) of the knowledge base.
- Lifecycle
Details string - Details on the lifecycle state.
- Max
Observed doubleCvss V2score - Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
- Max
Observed doubleCvss V2score With Ignored - Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
- Max
Observed doubleCvss V3score - Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
- Max
Observed doubleCvss V3score With Ignored - Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
- Max
Observed stringSeverity - Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
- Max
Observed stringSeverity With Ignored - Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
- Sources
List<Get
Vulnerability Audit Source> - Source that published the vulnerability
- State string
- The current lifecycle state of the vulnerability audit.
- Dictionary<string, object>
- Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- Time
Created string - The creation date and time of the vulnerability audit (formatted according to RFC3339).
- Time
Updated string - The update date and time of the vulnerability audit (formatted according to RFC3339).
- Usage
Datas List<GetVulnerability Audit Usage Data> - The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set
sourceType
toobjectStorageTuple
and use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name. - Vulnerabilities
List<Get
Vulnerability Audit Vulnerability> - List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
- Vulnerability
Audit stringId - Vulnerable
Artifacts intCount - Count of non-ignored vulnerable application dependencies.
- Vulnerable
Artifacts intCount With Ignored - Count of all vulnerable application dependencies.
- Application
Dependencies []GetVulnerability Audit Application Dependency - Build
Type string - The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
- Compartment
Id string - The compartment Oracle Cloud identifier (OCID) of the vulnerability audit.
- Configurations
[]Get
Vulnerability Audit Configuration - Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object - map[string]interface{}
- Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- Display
Name string - The name of the vulnerability audit.
- map[string]interface{}
- Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- Id string
- Unique vulnerability identifier, e.g. CVE-1999-0067.
- Is
Success bool - Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state. - Knowledge
Base stringId - The Oracle Cloud identifier (OCID) of the knowledge base.
- Lifecycle
Details string - Details on the lifecycle state.
- Max
Observed float64Cvss V2score - Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
- Max
Observed float64Cvss V2score With Ignored - Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
- Max
Observed float64Cvss V3score - Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
- Max
Observed float64Cvss V3score With Ignored - Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
- Max
Observed stringSeverity - Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
- Max
Observed stringSeverity With Ignored - Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
- Sources
[]Get
Vulnerability Audit Source - Source that published the vulnerability
- State string
- The current lifecycle state of the vulnerability audit.
- map[string]interface{}
- Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- Time
Created string - The creation date and time of the vulnerability audit (formatted according to RFC3339).
- Time
Updated string - The update date and time of the vulnerability audit (formatted according to RFC3339).
- Usage
Datas []GetVulnerability Audit Usage Data - The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set
sourceType
toobjectStorageTuple
and use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name. - Vulnerabilities
[]Get
Vulnerability Audit Vulnerability - List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
- Vulnerability
Audit stringId - Vulnerable
Artifacts intCount - Count of non-ignored vulnerable application dependencies.
- Vulnerable
Artifacts intCount With Ignored - Count of all vulnerable application dependencies.
- application
Dependencies List<GetVulnerability Audit Application Dependency> - build
Type String - The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
- compartment
Id String - The compartment Oracle Cloud identifier (OCID) of the vulnerability audit.
- configurations
List<Get
Vulnerability Audit Configuration> - Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object - Map<String,Object>
- Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- display
Name String - The name of the vulnerability audit.
- Map<String,Object>
- Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- id String
- Unique vulnerability identifier, e.g. CVE-1999-0067.
- is
Success Boolean - Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state. - knowledge
Base StringId - The Oracle Cloud identifier (OCID) of the knowledge base.
- lifecycle
Details String - Details on the lifecycle state.
- max
Observed DoubleCvss V2score - Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
- max
Observed DoubleCvss V2score With Ignored - Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
- max
Observed DoubleCvss V3score - Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
- max
Observed DoubleCvss V3score With Ignored - Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
- max
Observed StringSeverity - Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
- max
Observed StringSeverity With Ignored - Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
- sources
List<Get
Vulnerability Audit Source> - Source that published the vulnerability
- state String
- The current lifecycle state of the vulnerability audit.
- Map<String,Object>
- Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- time
Created String - The creation date and time of the vulnerability audit (formatted according to RFC3339).
- time
Updated String - The update date and time of the vulnerability audit (formatted according to RFC3339).
- usage
Datas List<GetVulnerability Audit Usage Data> - The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set
sourceType
toobjectStorageTuple
and use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name. - vulnerabilities
List<Get
Vulnerability Audit Vulnerability> - List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
- vulnerability
Audit StringId - vulnerable
Artifacts IntegerCount - Count of non-ignored vulnerable application dependencies.
- vulnerable
Artifacts IntegerCount With Ignored - Count of all vulnerable application dependencies.
- application
Dependencies GetVulnerability Audit Application Dependency[] - build
Type string - The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
- compartment
Id string - The compartment Oracle Cloud identifier (OCID) of the vulnerability audit.
- configurations
Get
Vulnerability Audit Configuration[] - Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object - {[key: string]: any}
- Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- display
Name string - The name of the vulnerability audit.
- {[key: string]: any}
- Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- id string
- Unique vulnerability identifier, e.g. CVE-1999-0067.
- is
Success boolean - Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state. - knowledge
Base stringId - The Oracle Cloud identifier (OCID) of the knowledge base.
- lifecycle
Details string - Details on the lifecycle state.
- max
Observed numberCvss V2score - Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
- max
Observed numberCvss V2score With Ignored - Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
- max
Observed numberCvss V3score - Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
- max
Observed numberCvss V3score With Ignored - Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
- max
Observed stringSeverity - Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
- max
Observed stringSeverity With Ignored - Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
- sources
Get
Vulnerability Audit Source[] - Source that published the vulnerability
- state string
- The current lifecycle state of the vulnerability audit.
- {[key: string]: any}
- Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- time
Created string - The creation date and time of the vulnerability audit (formatted according to RFC3339).
- time
Updated string - The update date and time of the vulnerability audit (formatted according to RFC3339).
- usage
Datas GetVulnerability Audit Usage Data[] - The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set
sourceType
toobjectStorageTuple
and use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name. - vulnerabilities
Get
Vulnerability Audit Vulnerability[] - List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
- vulnerability
Audit stringId - vulnerable
Artifacts numberCount - Count of non-ignored vulnerable application dependencies.
- vulnerable
Artifacts numberCount With Ignored - Count of all vulnerable application dependencies.
- application_
dependencies Sequence[adm.Get Vulnerability Audit Application Dependency] - build_
type str - The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
- compartment_
id str - The compartment Oracle Cloud identifier (OCID) of the vulnerability audit.
- configurations
Sequence[adm.
Get Vulnerability Audit Configuration] - Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object - Mapping[str, Any]
- Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- display_
name str - The name of the vulnerability audit.
- Mapping[str, Any]
- Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- id str
- Unique vulnerability identifier, e.g. CVE-1999-0067.
- is_
success bool - Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state. - knowledge_
base_ strid - The Oracle Cloud identifier (OCID) of the knowledge base.
- lifecycle_
details str - Details on the lifecycle state.
- max_
observed_ floatcvss_ v2score - Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
- max_
observed_ floatcvss_ v2score_ with_ ignored - Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
- max_
observed_ floatcvss_ v3score - Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
- max_
observed_ floatcvss_ v3score_ with_ ignored - Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
- max_
observed_ strseverity - Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
- max_
observed_ strseverity_ with_ ignored - Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
- sources
Sequence[adm.
Get Vulnerability Audit Source] - Source that published the vulnerability
- state str
- The current lifecycle state of the vulnerability audit.
- Mapping[str, Any]
- Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- time_
created str - The creation date and time of the vulnerability audit (formatted according to RFC3339).
- time_
updated str - The update date and time of the vulnerability audit (formatted according to RFC3339).
- usage_
datas Sequence[adm.Get Vulnerability Audit Usage Data] - The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set
sourceType
toobjectStorageTuple
and use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name. - vulnerabilities
Sequence[adm.
Get Vulnerability Audit Vulnerability] - List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
- vulnerability_
audit_ strid - vulnerable_
artifacts_ intcount - Count of non-ignored vulnerable application dependencies.
- vulnerable_
artifacts_ intcount_ with_ ignored - Count of all vulnerable application dependencies.
- application
Dependencies List<Property Map> - build
Type String - The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
- compartment
Id String - The compartment Oracle Cloud identifier (OCID) of the vulnerability audit.
- configurations List<Property Map>
- Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object - Map<Any>
- Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- display
Name String - The name of the vulnerability audit.
- Map<Any>
- Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- id String
- Unique vulnerability identifier, e.g. CVE-1999-0067.
- is
Success Boolean - Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state. - knowledge
Base StringId - The Oracle Cloud identifier (OCID) of the knowledge base.
- lifecycle
Details String - Details on the lifecycle state.
- max
Observed NumberCvss V2score - Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
- max
Observed NumberCvss V2score With Ignored - Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
- max
Observed NumberCvss V3score - Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
- max
Observed NumberCvss V3score With Ignored - Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
- max
Observed StringSeverity - Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
- max
Observed StringSeverity With Ignored - Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
- sources List<Property Map>
- Source that published the vulnerability
- state String
- The current lifecycle state of the vulnerability audit.
- Map<Any>
- Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- time
Created String - The creation date and time of the vulnerability audit (formatted according to RFC3339).
- time
Updated String - The update date and time of the vulnerability audit (formatted according to RFC3339).
- usage
Datas List<Property Map> - The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set
sourceType
toobjectStorageTuple
and use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name. - vulnerabilities List<Property Map>
- List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
- vulnerability
Audit StringId - vulnerable
Artifacts NumberCount - Count of non-ignored vulnerable application dependencies.
- vulnerable
Artifacts NumberCount With Ignored - Count of all vulnerable application dependencies.
Supporting Types
GetVulnerabilityAuditApplicationDependency
- Application
Dependency List<string>Node Ids - Gav string
- Node
Id string - Purl string
- Application
Dependency []stringNode Ids - Gav string
- Node
Id string - Purl string
- application
Dependency List<String>Node Ids - gav String
- node
Id String - purl String
- application
Dependency string[]Node Ids - gav string
- node
Id string - purl string
- application_
dependency_ Sequence[str]node_ ids - gav str
- node_
id str - purl str
- application
Dependency List<String>Node Ids - gav String
- node
Id String - purl String
GetVulnerabilityAuditConfiguration
- Exclusions List<string>
- A vulnerable application dependency is ignored if its name matches any of the items in
exclusions
. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters. - Max
Permissible doubleCvss V2score - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- Max
Permissible doubleCvss V3score - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- Max
Permissible stringSeverity - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
- Exclusions []string
- A vulnerable application dependency is ignored if its name matches any of the items in
exclusions
. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters. - Max
Permissible float64Cvss V2score - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- Max
Permissible float64Cvss V3score - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- Max
Permissible stringSeverity - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
- exclusions List<String>
- A vulnerable application dependency is ignored if its name matches any of the items in
exclusions
. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters. - max
Permissible DoubleCvss V2score - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- max
Permissible DoubleCvss V3score - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- max
Permissible StringSeverity - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
- exclusions string[]
- A vulnerable application dependency is ignored if its name matches any of the items in
exclusions
. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters. - max
Permissible numberCvss V2score - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- max
Permissible numberCvss V3score - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- max
Permissible stringSeverity - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
- exclusions Sequence[str]
- A vulnerable application dependency is ignored if its name matches any of the items in
exclusions
. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters. - max_
permissible_ floatcvss_ v2score - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- max_
permissible_ floatcvss_ v3score - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- max_
permissible_ strseverity - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
- exclusions List<String>
- A vulnerable application dependency is ignored if its name matches any of the items in
exclusions
. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters. - max
Permissible NumberCvss V2score - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- max
Permissible NumberCvss V3score - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- max
Permissible StringSeverity - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
GetVulnerabilityAuditSource
- Description string
- Description of the external resource source.
- Oci
Resource stringId - The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the vulnerability audit.
- Type string
- Source type of the vulnerability audit.
- Description string
- Description of the external resource source.
- Oci
Resource stringId - The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the vulnerability audit.
- Type string
- Source type of the vulnerability audit.
- description String
- Description of the external resource source.
- oci
Resource StringId - The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the vulnerability audit.
- type String
- Source type of the vulnerability audit.
- description string
- Description of the external resource source.
- oci
Resource stringId - The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the vulnerability audit.
- type string
- Source type of the vulnerability audit.
- description str
- Description of the external resource source.
- oci_
resource_ strid - The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the vulnerability audit.
- type str
- Source type of the vulnerability audit.
- description String
- Description of the external resource source.
- oci
Resource StringId - The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the vulnerability audit.
- type String
- Source type of the vulnerability audit.
GetVulnerabilityAuditUsageData
- Bucket string
- The Object Storage bucket to read the usage data from.
- Namespace string
- The Object Storage namespace to read the usage data from.
- Object string
- The Object Storage object name to read the usage data from.
- Source
Type string - The destination type. Use
objectStorageTuple
when specifying the namespace, bucket name, and object name.
- Bucket string
- The Object Storage bucket to read the usage data from.
- Namespace string
- The Object Storage namespace to read the usage data from.
- Object string
- The Object Storage object name to read the usage data from.
- Source
Type string - The destination type. Use
objectStorageTuple
when specifying the namespace, bucket name, and object name.
- bucket String
- The Object Storage bucket to read the usage data from.
- namespace String
- The Object Storage namespace to read the usage data from.
- object String
- The Object Storage object name to read the usage data from.
- source
Type String - The destination type. Use
objectStorageTuple
when specifying the namespace, bucket name, and object name.
- bucket string
- The Object Storage bucket to read the usage data from.
- namespace string
- The Object Storage namespace to read the usage data from.
- object string
- The Object Storage object name to read the usage data from.
- source
Type string - The destination type. Use
objectStorageTuple
when specifying the namespace, bucket name, and object name.
- bucket str
- The Object Storage bucket to read the usage data from.
- namespace str
- The Object Storage namespace to read the usage data from.
- object str
- The Object Storage object name to read the usage data from.
- source_
type str - The destination type. Use
objectStorageTuple
when specifying the namespace, bucket name, and object name.
- bucket String
- The Object Storage bucket to read the usage data from.
- namespace String
- The Object Storage namespace to read the usage data from.
- object String
- The Object Storage object name to read the usage data from.
- source
Type String - The destination type. Use
objectStorageTuple
when specifying the namespace, bucket name, and object name.
GetVulnerabilityAuditVulnerability
- Cvss
V2score double - Common Vulnerability Scoring System (CVSS) Version 2.
- Cvss
V3score double - Common Vulnerability Scoring System (CVSS) Version 3.
- Id string
- Unique vulnerability identifier, e.g. CVE-1999-0067.
- Is
False boolPositive - Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is
null
. - Is
Ignored bool - Indicates if the vulnerability was ignored according to the audit configuration.
- Severity string
- ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
- Source string
- Source that published the vulnerability
- Cvss
V2score float64 - Common Vulnerability Scoring System (CVSS) Version 2.
- Cvss
V3score float64 - Common Vulnerability Scoring System (CVSS) Version 3.
- Id string
- Unique vulnerability identifier, e.g. CVE-1999-0067.
- Is
False boolPositive - Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is
null
. - Is
Ignored bool - Indicates if the vulnerability was ignored according to the audit configuration.
- Severity string
- ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
- Source string
- Source that published the vulnerability
- cvss
V2score Double - Common Vulnerability Scoring System (CVSS) Version 2.
- cvss
V3score Double - Common Vulnerability Scoring System (CVSS) Version 3.
- id String
- Unique vulnerability identifier, e.g. CVE-1999-0067.
- is
False BooleanPositive - Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is
null
. - is
Ignored Boolean - Indicates if the vulnerability was ignored according to the audit configuration.
- severity String
- ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
- source String
- Source that published the vulnerability
- cvss
V2score number - Common Vulnerability Scoring System (CVSS) Version 2.
- cvss
V3score number - Common Vulnerability Scoring System (CVSS) Version 3.
- id string
- Unique vulnerability identifier, e.g. CVE-1999-0067.
- is
False booleanPositive - Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is
null
. - is
Ignored boolean - Indicates if the vulnerability was ignored according to the audit configuration.
- severity string
- ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
- source string
- Source that published the vulnerability
- cvss_
v2score float - Common Vulnerability Scoring System (CVSS) Version 2.
- cvss_
v3score float - Common Vulnerability Scoring System (CVSS) Version 3.
- id str
- Unique vulnerability identifier, e.g. CVE-1999-0067.
- is_
false_ boolpositive - Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is
null
. - is_
ignored bool - Indicates if the vulnerability was ignored according to the audit configuration.
- severity str
- ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
- source str
- Source that published the vulnerability
- cvss
V2score Number - Common Vulnerability Scoring System (CVSS) Version 2.
- cvss
V3score Number - Common Vulnerability Scoring System (CVSS) Version 3.
- id String
- Unique vulnerability identifier, e.g. CVE-1999-0067.
- is
False BooleanPositive - Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is
null
. - is
Ignored Boolean - Indicates if the vulnerability was ignored according to the audit configuration.
- severity String
- ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
- source String
- Source that published the vulnerability
Package Details
- Repository
- oci pulumi/pulumi-oci
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
oci
Terraform Provider.
Oracle Cloud Infrastructure v1.41.0 published on Wednesday, Jun 19, 2024 by Pulumi