oci.Adm.getVulnerabilityAudit
This data source provides details about a specific Vulnerability Audit resource in Oracle Cloud Infrastructure ADM service.
Returns the details of the specified Vulnerability Audit.
Example Usage
using System.Collections.Generic;
using Pulumi;
using Oci = Pulumi.Oci;
return await Deployment.RunAsync(() =>
{
var testVulnerabilityAudit = Oci.Adm.GetVulnerabilityAudit.Invoke(new()
{
VulnerabilityAuditId = oci_adm_vulnerability_audit.Test_vulnerability_audit.Id,
});
});
package main
import (
"github.com/pulumi/pulumi-oci/sdk/go/oci/Adm"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := Adm.GetVulnerabilityAudit(ctx, &adm.GetVulnerabilityAuditArgs{
VulnerabilityAuditId: oci_adm_vulnerability_audit.Test_vulnerability_audit.Id,
}, nil)
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.oci.Adm.AdmFunctions;
import com.pulumi.oci.Adm.inputs.GetVulnerabilityAuditArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var testVulnerabilityAudit = AdmFunctions.getVulnerabilityAudit(GetVulnerabilityAuditArgs.builder()
.vulnerabilityAuditId(oci_adm_vulnerability_audit.test_vulnerability_audit().id())
.build());
}
}
import pulumi
import pulumi_oci as oci
test_vulnerability_audit = oci.Adm.get_vulnerability_audit(vulnerability_audit_id=oci_adm_vulnerability_audit["test_vulnerability_audit"]["id"])
import * as pulumi from "@pulumi/pulumi";
import * as oci from "@pulumi/oci";
const testVulnerabilityAudit = oci.Adm.getVulnerabilityAudit({
vulnerabilityAuditId: oci_adm_vulnerability_audit.test_vulnerability_audit.id,
});
variables:
testVulnerabilityAudit:
fn::invoke:
Function: oci:Adm:getVulnerabilityAudit
Arguments:
vulnerabilityAuditId: ${oci_adm_vulnerability_audit.test_vulnerability_audit.id}
Using getVulnerabilityAudit
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getVulnerabilityAudit(args: GetVulnerabilityAuditArgs, opts?: InvokeOptions): Promise<GetVulnerabilityAuditResult>
function getVulnerabilityAuditOutput(args: GetVulnerabilityAuditOutputArgs, opts?: InvokeOptions): Output<GetVulnerabilityAuditResult>
def get_vulnerability_audit(vulnerability_audit_id: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetVulnerabilityAuditResult
def get_vulnerability_audit_output(vulnerability_audit_id: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetVulnerabilityAuditResult]
func GetVulnerabilityAudit(ctx *Context, args *GetVulnerabilityAuditArgs, opts ...InvokeOption) (*GetVulnerabilityAuditResult, error)
func GetVulnerabilityAuditOutput(ctx *Context, args *GetVulnerabilityAuditOutputArgs, opts ...InvokeOption) GetVulnerabilityAuditResultOutput
> Note: This function is named GetVulnerabilityAudit
in the Go SDK.
public static class GetVulnerabilityAudit
{
public static Task<GetVulnerabilityAuditResult> InvokeAsync(GetVulnerabilityAuditArgs args, InvokeOptions? opts = null)
public static Output<GetVulnerabilityAuditResult> Invoke(GetVulnerabilityAuditInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetVulnerabilityAuditResult> getVulnerabilityAudit(GetVulnerabilityAuditArgs args, InvokeOptions options)
// Output-based functions aren't available in Java yet
fn::invoke:
function: oci:Adm/getVulnerabilityAudit:getVulnerabilityAudit
arguments:
# arguments dictionary
The following arguments are supported:
- Vulnerability
Audit stringId Unique Vulnerability Audit identifier path parameter.
- Vulnerability
Audit stringId Unique Vulnerability Audit identifier path parameter.
- vulnerability
Audit StringId Unique Vulnerability Audit identifier path parameter.
- vulnerability
Audit stringId Unique Vulnerability Audit identifier path parameter.
- vulnerability_
audit_ strid Unique Vulnerability Audit identifier path parameter.
- vulnerability
Audit StringId Unique Vulnerability Audit identifier path parameter.
getVulnerabilityAudit Result
The following output properties are available:
- Application
Dependencies List<GetVulnerability Audit Application Dependency> - Build
Type string The type of the build tool.
- Compartment
Id string The Oracle Cloud identifier (OCID) of the compartment associated with the Vulnerability Audit.
- Configurations
List<Get
Vulnerability Audit Configuration> Configuration for a Vulnerability Audit. A vulnerable Application Dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object- Dictionary<string, object>
Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- Display
Name string The name of the Vulnerability Audit.
- Dictionary<string, object>
Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- Id string
Unique vulnerability identifier, e.g. CVE-1999-0067.
- Is
Success bool Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state.- Knowledge
Base stringId The Oracle Cloud identifier (OCID) of the Knowledge Base.
- Max
Observed doubleCvss V2score Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable Application Dependencies.
- Max
Observed doubleCvss V2score With Ignored Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable Application Dependencies including ignored ones.
- Max
Observed doubleCvss V3score Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable Application Dependencies.
- Max
Observed doubleCvss V3score With Ignored Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable Application Dependencies including ignored ones.
- Sources
List<Get
Vulnerability Audit Source> Vulnerability Audit source.
- State string
The current lifecycle state of the Vulnerability Audit.
- Dictionary<string, object>
Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- Time
Created string The creation date and time of the Vulnerability Audit (formatted according to RFC3339).
- Time
Updated string The update date and time of the Vulnerability Audit (formatted according to RFC3339).
- Vulnerabilities
List<Get
Vulnerability Audit Vulnerability> List of vulnerabilities found in the Vulnerability Audit.
- Vulnerability
Audit stringId - Vulnerable
Artifacts intCount Count of non-ignored vulnerable Application Dependencies.
- Vulnerable
Artifacts intCount With Ignored Count of all vulnerable Application Dependencies.
- Application
Dependencies []GetVulnerability Audit Application Dependency - Build
Type string The type of the build tool.
- Compartment
Id string The Oracle Cloud identifier (OCID) of the compartment associated with the Vulnerability Audit.
- Configurations
[]Get
Vulnerability Audit Configuration Configuration for a Vulnerability Audit. A vulnerable Application Dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object- map[string]interface{}
Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- Display
Name string The name of the Vulnerability Audit.
- map[string]interface{}
Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- Id string
Unique vulnerability identifier, e.g. CVE-1999-0067.
- Is
Success bool Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state.- Knowledge
Base stringId The Oracle Cloud identifier (OCID) of the Knowledge Base.
- Max
Observed float64Cvss V2score Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable Application Dependencies.
- Max
Observed float64Cvss V2score With Ignored Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable Application Dependencies including ignored ones.
- Max
Observed float64Cvss V3score Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable Application Dependencies.
- Max
Observed float64Cvss V3score With Ignored Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable Application Dependencies including ignored ones.
- Sources
[]Get
Vulnerability Audit Source Vulnerability Audit source.
- State string
The current lifecycle state of the Vulnerability Audit.
- map[string]interface{}
Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- Time
Created string The creation date and time of the Vulnerability Audit (formatted according to RFC3339).
- Time
Updated string The update date and time of the Vulnerability Audit (formatted according to RFC3339).
- Vulnerabilities
[]Get
Vulnerability Audit Vulnerability List of vulnerabilities found in the Vulnerability Audit.
- Vulnerability
Audit stringId - Vulnerable
Artifacts intCount Count of non-ignored vulnerable Application Dependencies.
- Vulnerable
Artifacts intCount With Ignored Count of all vulnerable Application Dependencies.
- application
Dependencies List<GetVulnerability Audit Application Dependency> - build
Type String The type of the build tool.
- compartment
Id String The Oracle Cloud identifier (OCID) of the compartment associated with the Vulnerability Audit.
- configurations
List<Get
Vulnerability Audit Configuration> Configuration for a Vulnerability Audit. A vulnerable Application Dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object- Map<String,Object>
Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- display
Name String The name of the Vulnerability Audit.
- Map<String,Object>
Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- id String
Unique vulnerability identifier, e.g. CVE-1999-0067.
- is
Success Boolean Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state.- knowledge
Base StringId The Oracle Cloud identifier (OCID) of the Knowledge Base.
- max
Observed DoubleCvss V2score Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable Application Dependencies.
- max
Observed DoubleCvss V2score With Ignored Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable Application Dependencies including ignored ones.
- max
Observed DoubleCvss V3score Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable Application Dependencies.
- max
Observed DoubleCvss V3score With Ignored Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable Application Dependencies including ignored ones.
- sources
List<Get
Vulnerability Audit Source> Vulnerability Audit source.
- state String
The current lifecycle state of the Vulnerability Audit.
- Map<String,Object>
Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- time
Created String The creation date and time of the Vulnerability Audit (formatted according to RFC3339).
- time
Updated String The update date and time of the Vulnerability Audit (formatted according to RFC3339).
- vulnerabilities
List<Get
Vulnerability Audit Vulnerability> List of vulnerabilities found in the Vulnerability Audit.
- vulnerability
Audit StringId - vulnerable
Artifacts IntegerCount Count of non-ignored vulnerable Application Dependencies.
- vulnerable
Artifacts IntegerCount With Ignored Count of all vulnerable Application Dependencies.
- application
Dependencies GetVulnerability Audit Application Dependency[] - build
Type string The type of the build tool.
- compartment
Id string The Oracle Cloud identifier (OCID) of the compartment associated with the Vulnerability Audit.
- configurations
Get
Vulnerability Audit Configuration[] Configuration for a Vulnerability Audit. A vulnerable Application Dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object- {[key: string]: any}
Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- display
Name string The name of the Vulnerability Audit.
- {[key: string]: any}
Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- id string
Unique vulnerability identifier, e.g. CVE-1999-0067.
- is
Success boolean Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state.- knowledge
Base stringId The Oracle Cloud identifier (OCID) of the Knowledge Base.
- max
Observed numberCvss V2score Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable Application Dependencies.
- max
Observed numberCvss V2score With Ignored Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable Application Dependencies including ignored ones.
- max
Observed numberCvss V3score Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable Application Dependencies.
- max
Observed numberCvss V3score With Ignored Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable Application Dependencies including ignored ones.
- sources
Get
Vulnerability Audit Source[] Vulnerability Audit source.
- state string
The current lifecycle state of the Vulnerability Audit.
- {[key: string]: any}
Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- time
Created string The creation date and time of the Vulnerability Audit (formatted according to RFC3339).
- time
Updated string The update date and time of the Vulnerability Audit (formatted according to RFC3339).
- vulnerabilities
Get
Vulnerability Audit Vulnerability[] List of vulnerabilities found in the Vulnerability Audit.
- vulnerability
Audit stringId - vulnerable
Artifacts numberCount Count of non-ignored vulnerable Application Dependencies.
- vulnerable
Artifacts numberCount With Ignored Count of all vulnerable Application Dependencies.
- application_
dependencies GetVulnerability Audit Application Dependency] - build_
type str The type of the build tool.
- compartment_
id str The Oracle Cloud identifier (OCID) of the compartment associated with the Vulnerability Audit.
- configurations
Get
Vulnerability Audit Configuration] Configuration for a Vulnerability Audit. A vulnerable Application Dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object- Mapping[str, Any]
Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- display_
name str The name of the Vulnerability Audit.
- Mapping[str, Any]
Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- id str
Unique vulnerability identifier, e.g. CVE-1999-0067.
- is_
success bool Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state.- knowledge_
base_ strid The Oracle Cloud identifier (OCID) of the Knowledge Base.
- max_
observed_ floatcvss_ v2score Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable Application Dependencies.
- max_
observed_ floatcvss_ v2score_ with_ ignored Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable Application Dependencies including ignored ones.
- max_
observed_ floatcvss_ v3score Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable Application Dependencies.
- max_
observed_ floatcvss_ v3score_ with_ ignored Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable Application Dependencies including ignored ones.
- sources
Get
Vulnerability Audit Source] Vulnerability Audit source.
- state str
The current lifecycle state of the Vulnerability Audit.
- Mapping[str, Any]
Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- time_
created str The creation date and time of the Vulnerability Audit (formatted according to RFC3339).
- time_
updated str The update date and time of the Vulnerability Audit (formatted according to RFC3339).
- vulnerabilities
Get
Vulnerability Audit Vulnerability] List of vulnerabilities found in the Vulnerability Audit.
- vulnerability_
audit_ strid - vulnerable_
artifacts_ intcount Count of non-ignored vulnerable Application Dependencies.
- vulnerable_
artifacts_ intcount_ with_ ignored Count of all vulnerable Application Dependencies.
- application
Dependencies List<Property Map> - build
Type String The type of the build tool.
- compartment
Id String The Oracle Cloud identifier (OCID) of the compartment associated with the Vulnerability Audit.
- configurations List<Property Map>
Configuration for a Vulnerability Audit. A vulnerable Application Dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object- Map<Any>
Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- display
Name String The name of the Vulnerability Audit.
- Map<Any>
Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- id String
Unique vulnerability identifier, e.g. CVE-1999-0067.
- is
Success Boolean Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state.- knowledge
Base StringId The Oracle Cloud identifier (OCID) of the Knowledge Base.
- max
Observed NumberCvss V2score Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable Application Dependencies.
- max
Observed NumberCvss V2score With Ignored Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable Application Dependencies including ignored ones.
- max
Observed NumberCvss V3score Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable Application Dependencies.
- max
Observed NumberCvss V3score With Ignored Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable Application Dependencies including ignored ones.
- sources List<Property Map>
Vulnerability Audit source.
- state String
The current lifecycle state of the Vulnerability Audit.
- Map<Any>
Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- time
Created String The creation date and time of the Vulnerability Audit (formatted according to RFC3339).
- time
Updated String The update date and time of the Vulnerability Audit (formatted according to RFC3339).
- vulnerabilities List<Property Map>
List of vulnerabilities found in the Vulnerability Audit.
- vulnerability
Audit StringId - vulnerable
Artifacts NumberCount Count of non-ignored vulnerable Application Dependencies.
- vulnerable
Artifacts NumberCount With Ignored Count of all vulnerable Application Dependencies.
Supporting Types
GetVulnerabilityAuditApplicationDependency
- Application
Dependency List<string>Node Ids - Gav string
- Node
Id string
- Application
Dependency []stringNode Ids - Gav string
- Node
Id string
- application
Dependency List<String>Node Ids - gav String
- node
Id String
- application
Dependency string[]Node Ids - gav string
- node
Id string
- application_
dependency_ Sequence[str]node_ ids - gav str
- node_
id str
- application
Dependency List<String>Node Ids - gav String
- node
Id String
GetVulnerabilityAuditConfiguration
- Exclusions List<string>
A vulnerable Application Dependency is ignored if its name matches any of the items in
exclusions
.- Max
Permissible doubleCvss V2score A vulnerable Application Dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- Max
Permissible doubleCvss V3score A vulnerable Application Dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- Exclusions []string
A vulnerable Application Dependency is ignored if its name matches any of the items in
exclusions
.- Max
Permissible float64Cvss V2score A vulnerable Application Dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- Max
Permissible float64Cvss V3score A vulnerable Application Dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- exclusions List<String>
A vulnerable Application Dependency is ignored if its name matches any of the items in
exclusions
.- max
Permissible DoubleCvss V2score A vulnerable Application Dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- max
Permissible DoubleCvss V3score A vulnerable Application Dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- exclusions string[]
A vulnerable Application Dependency is ignored if its name matches any of the items in
exclusions
.- max
Permissible numberCvss V2score A vulnerable Application Dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- max
Permissible numberCvss V3score A vulnerable Application Dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- exclusions Sequence[str]
A vulnerable Application Dependency is ignored if its name matches any of the items in
exclusions
.- max_
permissible_ floatcvss_ v2score A vulnerable Application Dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- max_
permissible_ floatcvss_ v3score A vulnerable Application Dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- exclusions List<String>
A vulnerable Application Dependency is ignored if its name matches any of the items in
exclusions
.- max
Permissible NumberCvss V2score A vulnerable Application Dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- max
Permissible NumberCvss V3score A vulnerable Application Dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
GetVulnerabilityAuditSource
- Description string
Description of the external resource source.
- Oci
Resource stringId The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the Vulnerability Audit.
- Type string
Source type of the Vulnerability Audit.
- Description string
Description of the external resource source.
- Oci
Resource stringId The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the Vulnerability Audit.
- Type string
Source type of the Vulnerability Audit.
- description String
Description of the external resource source.
- oci
Resource StringId The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the Vulnerability Audit.
- type String
Source type of the Vulnerability Audit.
- description string
Description of the external resource source.
- oci
Resource stringId The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the Vulnerability Audit.
- type string
Source type of the Vulnerability Audit.
- description str
Description of the external resource source.
- oci_
resource_ strid The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the Vulnerability Audit.
- type str
Source type of the Vulnerability Audit.
- description String
Description of the external resource source.
- oci
Resource StringId The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the Vulnerability Audit.
- type String
Source type of the Vulnerability Audit.
GetVulnerabilityAuditVulnerability
- Cvss
V2score double Common Vulnerability Scoring System (CVSS) Version 2.
- Cvss
V3score double Common Vulnerability Scoring System (CVSS) Version 3.
- Id string
Unique vulnerability identifier, e.g. CVE-1999-0067.
- Is
Ignored bool Indicates if the vulnerability was ignored according to the audit configuration.
- Cvss
V2score float64 Common Vulnerability Scoring System (CVSS) Version 2.
- Cvss
V3score float64 Common Vulnerability Scoring System (CVSS) Version 3.
- Id string
Unique vulnerability identifier, e.g. CVE-1999-0067.
- Is
Ignored bool Indicates if the vulnerability was ignored according to the audit configuration.
- cvss
V2score Double Common Vulnerability Scoring System (CVSS) Version 2.
- cvss
V3score Double Common Vulnerability Scoring System (CVSS) Version 3.
- id String
Unique vulnerability identifier, e.g. CVE-1999-0067.
- is
Ignored Boolean Indicates if the vulnerability was ignored according to the audit configuration.
- cvss
V2score number Common Vulnerability Scoring System (CVSS) Version 2.
- cvss
V3score number Common Vulnerability Scoring System (CVSS) Version 3.
- id string
Unique vulnerability identifier, e.g. CVE-1999-0067.
- is
Ignored boolean Indicates if the vulnerability was ignored according to the audit configuration.
- cvss_
v2score float Common Vulnerability Scoring System (CVSS) Version 2.
- cvss_
v3score float Common Vulnerability Scoring System (CVSS) Version 3.
- id str
Unique vulnerability identifier, e.g. CVE-1999-0067.
- is_
ignored bool Indicates if the vulnerability was ignored according to the audit configuration.
- cvss
V2score Number Common Vulnerability Scoring System (CVSS) Version 2.
- cvss
V3score Number Common Vulnerability Scoring System (CVSS) Version 3.
- id String
Unique vulnerability identifier, e.g. CVE-1999-0067.
- is
Ignored Boolean Indicates if the vulnerability was ignored according to the audit configuration.
Package Details
- Repository
- oci pulumi/pulumi-oci
- License
- Apache-2.0
- Notes
This Pulumi package is based on the
oci
Terraform Provider.