1. Packages
  2. Oracle Cloud Infrastructure
  3. API Docs
  4. Adm
  5. VulnerabilityAudit
Oracle Cloud Infrastructure v1.29.0 published on Thursday, Mar 28, 2024 by Pulumi

oci.Adm.VulnerabilityAudit

Explore with Pulumi AI

oci logo
Oracle Cloud Infrastructure v1.29.0 published on Thursday, Mar 28, 2024 by Pulumi

    This resource provides the Vulnerability Audit resource in Oracle Cloud Infrastructure Adm service.

    Creates a new Vulnerability Audit by providing a tree of Application Dependencies.

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as oci from "@pulumi/oci";
    
    const testVulnerabilityAudit = new oci.adm.VulnerabilityAudit("testVulnerabilityAudit", {
        knowledgeBaseId: oci_adm_knowledge_base.test_knowledge_base.id,
        applicationDependencies: [{
            nodeId: oci_adm_node.test_node.id,
            applicationDependencyNodeIds: _var.vulnerability_audit_application_dependencies_application_dependency_node_ids,
            gav: _var.vulnerability_audit_application_dependencies_gav,
            purl: _var.vulnerability_audit_application_dependencies_purl,
        }],
        buildType: _var.vulnerability_audit_build_type,
        compartmentId: _var.compartment_id,
        configuration: {
            exclusions: _var.vulnerability_audit_configuration_exclusions,
            maxPermissibleCvssV2score: _var.vulnerability_audit_configuration_max_permissible_cvss_v2score,
            maxPermissibleCvssV3score: _var.vulnerability_audit_configuration_max_permissible_cvss_v3score,
            maxPermissibleSeverity: _var.vulnerability_audit_configuration_max_permissible_severity,
        },
        definedTags: {
            "foo-namespace.bar-key": "value",
        },
        displayName: _var.vulnerability_audit_display_name,
        freeformTags: {
            "bar-key": "value",
        },
        source: {
            type: _var.vulnerability_audit_source_type,
            description: _var.vulnerability_audit_source_description,
            ociResourceId: oci_adm_oci_resource.test_oci_resource.id,
        },
        usageData: {
            bucket: _var.vulnerability_audit_usage_data_bucket,
            namespace: _var.vulnerability_audit_usage_data_namespace,
            object: _var.vulnerability_audit_usage_data_object,
            sourceType: _var.vulnerability_audit_usage_data_source_type,
        },
    });
    
    import pulumi
    import pulumi_oci as oci
    
    test_vulnerability_audit = oci.adm.VulnerabilityAudit("testVulnerabilityAudit",
        knowledge_base_id=oci_adm_knowledge_base["test_knowledge_base"]["id"],
        application_dependencies=[oci.adm.VulnerabilityAuditApplicationDependencyArgs(
            node_id=oci_adm_node["test_node"]["id"],
            application_dependency_node_ids=var["vulnerability_audit_application_dependencies_application_dependency_node_ids"],
            gav=var["vulnerability_audit_application_dependencies_gav"],
            purl=var["vulnerability_audit_application_dependencies_purl"],
        )],
        build_type=var["vulnerability_audit_build_type"],
        compartment_id=var["compartment_id"],
        configuration=oci.adm.VulnerabilityAuditConfigurationArgs(
            exclusions=var["vulnerability_audit_configuration_exclusions"],
            max_permissible_cvss_v2score=var["vulnerability_audit_configuration_max_permissible_cvss_v2score"],
            max_permissible_cvss_v3score=var["vulnerability_audit_configuration_max_permissible_cvss_v3score"],
            max_permissible_severity=var["vulnerability_audit_configuration_max_permissible_severity"],
        ),
        defined_tags={
            "foo-namespace.bar-key": "value",
        },
        display_name=var["vulnerability_audit_display_name"],
        freeform_tags={
            "bar-key": "value",
        },
        source=oci.adm.VulnerabilityAuditSourceArgs(
            type=var["vulnerability_audit_source_type"],
            description=var["vulnerability_audit_source_description"],
            oci_resource_id=oci_adm_oci_resource["test_oci_resource"]["id"],
        ),
        usage_data=oci.adm.VulnerabilityAuditUsageDataArgs(
            bucket=var["vulnerability_audit_usage_data_bucket"],
            namespace=var["vulnerability_audit_usage_data_namespace"],
            object=var["vulnerability_audit_usage_data_object"],
            source_type=var["vulnerability_audit_usage_data_source_type"],
        ))
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-oci/sdk/go/oci/Adm"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := Adm.NewVulnerabilityAudit(ctx, "testVulnerabilityAudit", &Adm.VulnerabilityAuditArgs{
    			KnowledgeBaseId: pulumi.Any(oci_adm_knowledge_base.Test_knowledge_base.Id),
    			ApplicationDependencies: adm.VulnerabilityAuditApplicationDependencyArray{
    				&adm.VulnerabilityAuditApplicationDependencyArgs{
    					NodeId:                       pulumi.Any(oci_adm_node.Test_node.Id),
    					ApplicationDependencyNodeIds: pulumi.Any(_var.Vulnerability_audit_application_dependencies_application_dependency_node_ids),
    					Gav:                          pulumi.Any(_var.Vulnerability_audit_application_dependencies_gav),
    					Purl:                         pulumi.Any(_var.Vulnerability_audit_application_dependencies_purl),
    				},
    			},
    			BuildType:     pulumi.Any(_var.Vulnerability_audit_build_type),
    			CompartmentId: pulumi.Any(_var.Compartment_id),
    			Configuration: &adm.VulnerabilityAuditConfigurationArgs{
    				Exclusions:                pulumi.Any(_var.Vulnerability_audit_configuration_exclusions),
    				MaxPermissibleCvssV2score: pulumi.Any(_var.Vulnerability_audit_configuration_max_permissible_cvss_v2score),
    				MaxPermissibleCvssV3score: pulumi.Any(_var.Vulnerability_audit_configuration_max_permissible_cvss_v3score),
    				MaxPermissibleSeverity:    pulumi.Any(_var.Vulnerability_audit_configuration_max_permissible_severity),
    			},
    			DefinedTags: pulumi.Map{
    				"foo-namespace.bar-key": pulumi.Any("value"),
    			},
    			DisplayName: pulumi.Any(_var.Vulnerability_audit_display_name),
    			FreeformTags: pulumi.Map{
    				"bar-key": pulumi.Any("value"),
    			},
    			Source: &adm.VulnerabilityAuditSourceArgs{
    				Type:          pulumi.Any(_var.Vulnerability_audit_source_type),
    				Description:   pulumi.Any(_var.Vulnerability_audit_source_description),
    				OciResourceId: pulumi.Any(oci_adm_oci_resource.Test_oci_resource.Id),
    			},
    			UsageData: &adm.VulnerabilityAuditUsageDataArgs{
    				Bucket:     pulumi.Any(_var.Vulnerability_audit_usage_data_bucket),
    				Namespace:  pulumi.Any(_var.Vulnerability_audit_usage_data_namespace),
    				Object:     pulumi.Any(_var.Vulnerability_audit_usage_data_object),
    				SourceType: pulumi.Any(_var.Vulnerability_audit_usage_data_source_type),
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Oci = Pulumi.Oci;
    
    return await Deployment.RunAsync(() => 
    {
        var testVulnerabilityAudit = new Oci.Adm.VulnerabilityAudit("testVulnerabilityAudit", new()
        {
            KnowledgeBaseId = oci_adm_knowledge_base.Test_knowledge_base.Id,
            ApplicationDependencies = new[]
            {
                new Oci.Adm.Inputs.VulnerabilityAuditApplicationDependencyArgs
                {
                    NodeId = oci_adm_node.Test_node.Id,
                    ApplicationDependencyNodeIds = @var.Vulnerability_audit_application_dependencies_application_dependency_node_ids,
                    Gav = @var.Vulnerability_audit_application_dependencies_gav,
                    Purl = @var.Vulnerability_audit_application_dependencies_purl,
                },
            },
            BuildType = @var.Vulnerability_audit_build_type,
            CompartmentId = @var.Compartment_id,
            Configuration = new Oci.Adm.Inputs.VulnerabilityAuditConfigurationArgs
            {
                Exclusions = @var.Vulnerability_audit_configuration_exclusions,
                MaxPermissibleCvssV2score = @var.Vulnerability_audit_configuration_max_permissible_cvss_v2score,
                MaxPermissibleCvssV3score = @var.Vulnerability_audit_configuration_max_permissible_cvss_v3score,
                MaxPermissibleSeverity = @var.Vulnerability_audit_configuration_max_permissible_severity,
            },
            DefinedTags = 
            {
                { "foo-namespace.bar-key", "value" },
            },
            DisplayName = @var.Vulnerability_audit_display_name,
            FreeformTags = 
            {
                { "bar-key", "value" },
            },
            Source = new Oci.Adm.Inputs.VulnerabilityAuditSourceArgs
            {
                Type = @var.Vulnerability_audit_source_type,
                Description = @var.Vulnerability_audit_source_description,
                OciResourceId = oci_adm_oci_resource.Test_oci_resource.Id,
            },
            UsageData = new Oci.Adm.Inputs.VulnerabilityAuditUsageDataArgs
            {
                Bucket = @var.Vulnerability_audit_usage_data_bucket,
                Namespace = @var.Vulnerability_audit_usage_data_namespace,
                Object = @var.Vulnerability_audit_usage_data_object,
                SourceType = @var.Vulnerability_audit_usage_data_source_type,
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.oci.Adm.VulnerabilityAudit;
    import com.pulumi.oci.Adm.VulnerabilityAuditArgs;
    import com.pulumi.oci.Adm.inputs.VulnerabilityAuditApplicationDependencyArgs;
    import com.pulumi.oci.Adm.inputs.VulnerabilityAuditConfigurationArgs;
    import com.pulumi.oci.Adm.inputs.VulnerabilityAuditSourceArgs;
    import com.pulumi.oci.Adm.inputs.VulnerabilityAuditUsageDataArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var testVulnerabilityAudit = new VulnerabilityAudit("testVulnerabilityAudit", VulnerabilityAuditArgs.builder()        
                .knowledgeBaseId(oci_adm_knowledge_base.test_knowledge_base().id())
                .applicationDependencies(VulnerabilityAuditApplicationDependencyArgs.builder()
                    .nodeId(oci_adm_node.test_node().id())
                    .applicationDependencyNodeIds(var_.vulnerability_audit_application_dependencies_application_dependency_node_ids())
                    .gav(var_.vulnerability_audit_application_dependencies_gav())
                    .purl(var_.vulnerability_audit_application_dependencies_purl())
                    .build())
                .buildType(var_.vulnerability_audit_build_type())
                .compartmentId(var_.compartment_id())
                .configuration(VulnerabilityAuditConfigurationArgs.builder()
                    .exclusions(var_.vulnerability_audit_configuration_exclusions())
                    .maxPermissibleCvssV2score(var_.vulnerability_audit_configuration_max_permissible_cvss_v2score())
                    .maxPermissibleCvssV3score(var_.vulnerability_audit_configuration_max_permissible_cvss_v3score())
                    .maxPermissibleSeverity(var_.vulnerability_audit_configuration_max_permissible_severity())
                    .build())
                .definedTags(Map.of("foo-namespace.bar-key", "value"))
                .displayName(var_.vulnerability_audit_display_name())
                .freeformTags(Map.of("bar-key", "value"))
                .source(VulnerabilityAuditSourceArgs.builder()
                    .type(var_.vulnerability_audit_source_type())
                    .description(var_.vulnerability_audit_source_description())
                    .ociResourceId(oci_adm_oci_resource.test_oci_resource().id())
                    .build())
                .usageData(VulnerabilityAuditUsageDataArgs.builder()
                    .bucket(var_.vulnerability_audit_usage_data_bucket())
                    .namespace(var_.vulnerability_audit_usage_data_namespace())
                    .object(var_.vulnerability_audit_usage_data_object())
                    .sourceType(var_.vulnerability_audit_usage_data_source_type())
                    .build())
                .build());
    
        }
    }
    
    resources:
      testVulnerabilityAudit:
        type: oci:Adm:VulnerabilityAudit
        properties:
          #Required
          knowledgeBaseId: ${oci_adm_knowledge_base.test_knowledge_base.id}
          #Optional
          applicationDependencies:
            - nodeId: ${oci_adm_node.test_node.id}
              applicationDependencyNodeIds: ${var.vulnerability_audit_application_dependencies_application_dependency_node_ids}
              gav: ${var.vulnerability_audit_application_dependencies_gav}
              purl: ${var.vulnerability_audit_application_dependencies_purl}
          buildType: ${var.vulnerability_audit_build_type}
          compartmentId: ${var.compartment_id}
          configuration:
            exclusions: ${var.vulnerability_audit_configuration_exclusions}
            maxPermissibleCvssV2score: ${var.vulnerability_audit_configuration_max_permissible_cvss_v2score}
            maxPermissibleCvssV3score: ${var.vulnerability_audit_configuration_max_permissible_cvss_v3score}
            maxPermissibleSeverity: ${var.vulnerability_audit_configuration_max_permissible_severity}
          definedTags:
            foo-namespace.bar-key: value
          displayName: ${var.vulnerability_audit_display_name}
          freeformTags:
            bar-key: value
          source:
            type: ${var.vulnerability_audit_source_type}
            description: ${var.vulnerability_audit_source_description}
            ociResourceId: ${oci_adm_oci_resource.test_oci_resource.id}
          usageData:
            bucket: ${var.vulnerability_audit_usage_data_bucket}
            namespace: ${var.vulnerability_audit_usage_data_namespace}
            object: ${var.vulnerability_audit_usage_data_object}
            sourceType: ${var.vulnerability_audit_usage_data_source_type}
    

    Create VulnerabilityAudit Resource

    new VulnerabilityAudit(name: string, args: VulnerabilityAuditArgs, opts?: CustomResourceOptions);
    @overload
    def VulnerabilityAudit(resource_name: str,
                           opts: Optional[ResourceOptions] = None,
                           application_dependencies: Optional[Sequence[_adm.VulnerabilityAuditApplicationDependencyArgs]] = None,
                           build_type: Optional[str] = None,
                           compartment_id: Optional[str] = None,
                           configuration: Optional[_adm.VulnerabilityAuditConfigurationArgs] = None,
                           defined_tags: Optional[Mapping[str, Any]] = None,
                           display_name: Optional[str] = None,
                           freeform_tags: Optional[Mapping[str, Any]] = None,
                           knowledge_base_id: Optional[str] = None,
                           source: Optional[_adm.VulnerabilityAuditSourceArgs] = None,
                           usage_data: Optional[_adm.VulnerabilityAuditUsageDataArgs] = None)
    @overload
    def VulnerabilityAudit(resource_name: str,
                           args: VulnerabilityAuditArgs,
                           opts: Optional[ResourceOptions] = None)
    func NewVulnerabilityAudit(ctx *Context, name string, args VulnerabilityAuditArgs, opts ...ResourceOption) (*VulnerabilityAudit, error)
    public VulnerabilityAudit(string name, VulnerabilityAuditArgs args, CustomResourceOptions? opts = null)
    public VulnerabilityAudit(String name, VulnerabilityAuditArgs args)
    public VulnerabilityAudit(String name, VulnerabilityAuditArgs args, CustomResourceOptions options)
    
    type: oci:Adm:VulnerabilityAudit
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    
    name string
    The unique name of the resource.
    args VulnerabilityAuditArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args VulnerabilityAuditArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args VulnerabilityAuditArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args VulnerabilityAuditArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args VulnerabilityAuditArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    VulnerabilityAudit Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    The VulnerabilityAudit resource accepts the following input properties:

    KnowledgeBaseId string
    The Oracle Cloud identifier (OCID) of the knowledge base.
    ApplicationDependencies List<VulnerabilityAuditApplicationDependency>
    List of application dependencies (without vulnerabilities).
    BuildType string
    The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
    CompartmentId string
    (Updatable) The compartment Oracle Cloud identifier (OCID) of the vulnerability audit. If compartment identifier is not provided the compartment of the associated knowledge base will be used instead.
    Configuration VulnerabilityAuditConfiguration
    Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in exclusions, or all of the associated Vulnerabilies have a CVSS v2 score below maxPermissibleCvssV2Score and a CVSS v3 score below maxPermissibleCvssV3Score. type: object
    DefinedTags Dictionary<string, object>
    (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. Example: {"foo-namespace.bar-key": "value"}
    DisplayName string
    (Updatable) The name of the vulnerability audit.
    FreeformTags Dictionary<string, object>
    (Updatable) Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example: {"bar-key": "value"}
    Source VulnerabilityAuditSource
    vulnerability audit source.
    UsageData VulnerabilityAuditUsageData
    The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set sourceType to objectStorageTuple and use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name.
    KnowledgeBaseId string
    The Oracle Cloud identifier (OCID) of the knowledge base.
    ApplicationDependencies []VulnerabilityAuditApplicationDependencyArgs
    List of application dependencies (without vulnerabilities).
    BuildType string
    The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
    CompartmentId string
    (Updatable) The compartment Oracle Cloud identifier (OCID) of the vulnerability audit. If compartment identifier is not provided the compartment of the associated knowledge base will be used instead.
    Configuration VulnerabilityAuditConfigurationArgs
    Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in exclusions, or all of the associated Vulnerabilies have a CVSS v2 score below maxPermissibleCvssV2Score and a CVSS v3 score below maxPermissibleCvssV3Score. type: object
    DefinedTags map[string]interface{}
    (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. Example: {"foo-namespace.bar-key": "value"}
    DisplayName string
    (Updatable) The name of the vulnerability audit.
    FreeformTags map[string]interface{}
    (Updatable) Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example: {"bar-key": "value"}
    Source VulnerabilityAuditSourceArgs
    vulnerability audit source.
    UsageData VulnerabilityAuditUsageDataArgs
    The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set sourceType to objectStorageTuple and use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name.
    knowledgeBaseId String
    The Oracle Cloud identifier (OCID) of the knowledge base.
    applicationDependencies List<VulnerabilityAuditApplicationDependency>
    List of application dependencies (without vulnerabilities).
    buildType String
    The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
    compartmentId String
    (Updatable) The compartment Oracle Cloud identifier (OCID) of the vulnerability audit. If compartment identifier is not provided the compartment of the associated knowledge base will be used instead.
    configuration VulnerabilityAuditConfiguration
    Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in exclusions, or all of the associated Vulnerabilies have a CVSS v2 score below maxPermissibleCvssV2Score and a CVSS v3 score below maxPermissibleCvssV3Score. type: object
    definedTags Map<String,Object>
    (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. Example: {"foo-namespace.bar-key": "value"}
    displayName String
    (Updatable) The name of the vulnerability audit.
    freeformTags Map<String,Object>
    (Updatable) Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example: {"bar-key": "value"}
    source VulnerabilityAuditSource
    vulnerability audit source.
    usageData VulnerabilityAuditUsageData
    The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set sourceType to objectStorageTuple and use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name.
    knowledgeBaseId string
    The Oracle Cloud identifier (OCID) of the knowledge base.
    applicationDependencies VulnerabilityAuditApplicationDependency[]
    List of application dependencies (without vulnerabilities).
    buildType string
    The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
    compartmentId string
    (Updatable) The compartment Oracle Cloud identifier (OCID) of the vulnerability audit. If compartment identifier is not provided the compartment of the associated knowledge base will be used instead.
    configuration VulnerabilityAuditConfiguration
    Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in exclusions, or all of the associated Vulnerabilies have a CVSS v2 score below maxPermissibleCvssV2Score and a CVSS v3 score below maxPermissibleCvssV3Score. type: object
    definedTags {[key: string]: any}
    (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. Example: {"foo-namespace.bar-key": "value"}
    displayName string
    (Updatable) The name of the vulnerability audit.
    freeformTags {[key: string]: any}
    (Updatable) Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example: {"bar-key": "value"}
    source VulnerabilityAuditSource
    vulnerability audit source.
    usageData VulnerabilityAuditUsageData
    The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set sourceType to objectStorageTuple and use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name.
    knowledge_base_id str
    The Oracle Cloud identifier (OCID) of the knowledge base.
    application_dependencies VulnerabilityAuditApplicationDependencyArgs]
    List of application dependencies (without vulnerabilities).
    build_type str
    The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
    compartment_id str
    (Updatable) The compartment Oracle Cloud identifier (OCID) of the vulnerability audit. If compartment identifier is not provided the compartment of the associated knowledge base will be used instead.
    configuration VulnerabilityAuditConfigurationArgs
    Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in exclusions, or all of the associated Vulnerabilies have a CVSS v2 score below maxPermissibleCvssV2Score and a CVSS v3 score below maxPermissibleCvssV3Score. type: object
    defined_tags Mapping[str, Any]
    (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. Example: {"foo-namespace.bar-key": "value"}
    display_name str
    (Updatable) The name of the vulnerability audit.
    freeform_tags Mapping[str, Any]
    (Updatable) Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example: {"bar-key": "value"}
    source VulnerabilityAuditSourceArgs
    vulnerability audit source.
    usage_data VulnerabilityAuditUsageDataArgs
    The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set sourceType to objectStorageTuple and use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name.
    knowledgeBaseId String
    The Oracle Cloud identifier (OCID) of the knowledge base.
    applicationDependencies List<Property Map>
    List of application dependencies (without vulnerabilities).
    buildType String
    The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
    compartmentId String
    (Updatable) The compartment Oracle Cloud identifier (OCID) of the vulnerability audit. If compartment identifier is not provided the compartment of the associated knowledge base will be used instead.
    configuration Property Map
    Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in exclusions, or all of the associated Vulnerabilies have a CVSS v2 score below maxPermissibleCvssV2Score and a CVSS v3 score below maxPermissibleCvssV3Score. type: object
    definedTags Map<Any>
    (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. Example: {"foo-namespace.bar-key": "value"}
    displayName String
    (Updatable) The name of the vulnerability audit.
    freeformTags Map<Any>
    (Updatable) Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example: {"bar-key": "value"}
    source Property Map
    vulnerability audit source.
    usageData Property Map
    The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set sourceType to objectStorageTuple and use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the VulnerabilityAudit resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    IsSuccess bool
    Indicates if an audit succeeded according to the configuration. The value is null if the audit is in the CREATING state.
    LifecycleDetails string
    Details on the lifecycle state.
    MaxObservedCvssV2score double
    Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
    MaxObservedCvssV2scoreWithIgnored double
    Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
    MaxObservedCvssV3score double
    Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
    MaxObservedCvssV3scoreWithIgnored double
    Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
    MaxObservedSeverity string
    Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
    MaxObservedSeverityWithIgnored string
    Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
    State string
    The current lifecycle state of the vulnerability audit.
    SystemTags Dictionary<string, object>
    Usage of system tag keys. These predefined keys are scoped to namespaces. Example: {"orcl-cloud.free-tier-retained": "true"}
    TimeCreated string
    The creation date and time of the vulnerability audit (formatted according to RFC3339).
    TimeUpdated string
    The update date and time of the vulnerability audit (formatted according to RFC3339).
    Vulnerabilities List<VulnerabilityAuditVulnerability>
    List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
    VulnerableArtifactsCount int
    Count of non-ignored vulnerable application dependencies.
    VulnerableArtifactsCountWithIgnored int
    Count of all vulnerable application dependencies.
    Id string
    The provider-assigned unique ID for this managed resource.
    IsSuccess bool
    Indicates if an audit succeeded according to the configuration. The value is null if the audit is in the CREATING state.
    LifecycleDetails string
    Details on the lifecycle state.
    MaxObservedCvssV2score float64
    Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
    MaxObservedCvssV2scoreWithIgnored float64
    Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
    MaxObservedCvssV3score float64
    Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
    MaxObservedCvssV3scoreWithIgnored float64
    Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
    MaxObservedSeverity string
    Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
    MaxObservedSeverityWithIgnored string
    Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
    State string
    The current lifecycle state of the vulnerability audit.
    SystemTags map[string]interface{}
    Usage of system tag keys. These predefined keys are scoped to namespaces. Example: {"orcl-cloud.free-tier-retained": "true"}
    TimeCreated string
    The creation date and time of the vulnerability audit (formatted according to RFC3339).
    TimeUpdated string
    The update date and time of the vulnerability audit (formatted according to RFC3339).
    Vulnerabilities []VulnerabilityAuditVulnerability
    List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
    VulnerableArtifactsCount int
    Count of non-ignored vulnerable application dependencies.
    VulnerableArtifactsCountWithIgnored int
    Count of all vulnerable application dependencies.
    id String
    The provider-assigned unique ID for this managed resource.
    isSuccess Boolean
    Indicates if an audit succeeded according to the configuration. The value is null if the audit is in the CREATING state.
    lifecycleDetails String
    Details on the lifecycle state.
    maxObservedCvssV2score Double
    Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
    maxObservedCvssV2scoreWithIgnored Double
    Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
    maxObservedCvssV3score Double
    Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
    maxObservedCvssV3scoreWithIgnored Double
    Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
    maxObservedSeverity String
    Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
    maxObservedSeverityWithIgnored String
    Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
    state String
    The current lifecycle state of the vulnerability audit.
    systemTags Map<String,Object>
    Usage of system tag keys. These predefined keys are scoped to namespaces. Example: {"orcl-cloud.free-tier-retained": "true"}
    timeCreated String
    The creation date and time of the vulnerability audit (formatted according to RFC3339).
    timeUpdated String
    The update date and time of the vulnerability audit (formatted according to RFC3339).
    vulnerabilities List<VulnerabilityAuditVulnerability>
    List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
    vulnerableArtifactsCount Integer
    Count of non-ignored vulnerable application dependencies.
    vulnerableArtifactsCountWithIgnored Integer
    Count of all vulnerable application dependencies.
    id string
    The provider-assigned unique ID for this managed resource.
    isSuccess boolean
    Indicates if an audit succeeded according to the configuration. The value is null if the audit is in the CREATING state.
    lifecycleDetails string
    Details on the lifecycle state.
    maxObservedCvssV2score number
    Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
    maxObservedCvssV2scoreWithIgnored number
    Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
    maxObservedCvssV3score number
    Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
    maxObservedCvssV3scoreWithIgnored number
    Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
    maxObservedSeverity string
    Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
    maxObservedSeverityWithIgnored string
    Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
    state string
    The current lifecycle state of the vulnerability audit.
    systemTags {[key: string]: any}
    Usage of system tag keys. These predefined keys are scoped to namespaces. Example: {"orcl-cloud.free-tier-retained": "true"}
    timeCreated string
    The creation date and time of the vulnerability audit (formatted according to RFC3339).
    timeUpdated string
    The update date and time of the vulnerability audit (formatted according to RFC3339).
    vulnerabilities VulnerabilityAuditVulnerability[]
    List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
    vulnerableArtifactsCount number
    Count of non-ignored vulnerable application dependencies.
    vulnerableArtifactsCountWithIgnored number
    Count of all vulnerable application dependencies.
    id str
    The provider-assigned unique ID for this managed resource.
    is_success bool
    Indicates if an audit succeeded according to the configuration. The value is null if the audit is in the CREATING state.
    lifecycle_details str
    Details on the lifecycle state.
    max_observed_cvss_v2score float
    Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
    max_observed_cvss_v2score_with_ignored float
    Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
    max_observed_cvss_v3score float
    Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
    max_observed_cvss_v3score_with_ignored float
    Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
    max_observed_severity str
    Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
    max_observed_severity_with_ignored str
    Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
    state str
    The current lifecycle state of the vulnerability audit.
    system_tags Mapping[str, Any]
    Usage of system tag keys. These predefined keys are scoped to namespaces. Example: {"orcl-cloud.free-tier-retained": "true"}
    time_created str
    The creation date and time of the vulnerability audit (formatted according to RFC3339).
    time_updated str
    The update date and time of the vulnerability audit (formatted according to RFC3339).
    vulnerabilities VulnerabilityAuditVulnerability]
    List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
    vulnerable_artifacts_count int
    Count of non-ignored vulnerable application dependencies.
    vulnerable_artifacts_count_with_ignored int
    Count of all vulnerable application dependencies.
    id String
    The provider-assigned unique ID for this managed resource.
    isSuccess Boolean
    Indicates if an audit succeeded according to the configuration. The value is null if the audit is in the CREATING state.
    lifecycleDetails String
    Details on the lifecycle state.
    maxObservedCvssV2score Number
    Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
    maxObservedCvssV2scoreWithIgnored Number
    Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
    maxObservedCvssV3score Number
    Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
    maxObservedCvssV3scoreWithIgnored Number
    Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
    maxObservedSeverity String
    Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
    maxObservedSeverityWithIgnored String
    Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
    state String
    The current lifecycle state of the vulnerability audit.
    systemTags Map<Any>
    Usage of system tag keys. These predefined keys are scoped to namespaces. Example: {"orcl-cloud.free-tier-retained": "true"}
    timeCreated String
    The creation date and time of the vulnerability audit (formatted according to RFC3339).
    timeUpdated String
    The update date and time of the vulnerability audit (formatted according to RFC3339).
    vulnerabilities List<Property Map>
    List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
    vulnerableArtifactsCount Number
    Count of non-ignored vulnerable application dependencies.
    vulnerableArtifactsCountWithIgnored Number
    Count of all vulnerable application dependencies.

    Look up Existing VulnerabilityAudit Resource

    Get an existing VulnerabilityAudit resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: VulnerabilityAuditState, opts?: CustomResourceOptions): VulnerabilityAudit
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            application_dependencies: Optional[Sequence[_adm.VulnerabilityAuditApplicationDependencyArgs]] = None,
            build_type: Optional[str] = None,
            compartment_id: Optional[str] = None,
            configuration: Optional[_adm.VulnerabilityAuditConfigurationArgs] = None,
            defined_tags: Optional[Mapping[str, Any]] = None,
            display_name: Optional[str] = None,
            freeform_tags: Optional[Mapping[str, Any]] = None,
            is_success: Optional[bool] = None,
            knowledge_base_id: Optional[str] = None,
            lifecycle_details: Optional[str] = None,
            max_observed_cvss_v2score: Optional[float] = None,
            max_observed_cvss_v2score_with_ignored: Optional[float] = None,
            max_observed_cvss_v3score: Optional[float] = None,
            max_observed_cvss_v3score_with_ignored: Optional[float] = None,
            max_observed_severity: Optional[str] = None,
            max_observed_severity_with_ignored: Optional[str] = None,
            source: Optional[_adm.VulnerabilityAuditSourceArgs] = None,
            state: Optional[str] = None,
            system_tags: Optional[Mapping[str, Any]] = None,
            time_created: Optional[str] = None,
            time_updated: Optional[str] = None,
            usage_data: Optional[_adm.VulnerabilityAuditUsageDataArgs] = None,
            vulnerabilities: Optional[Sequence[_adm.VulnerabilityAuditVulnerabilityArgs]] = None,
            vulnerable_artifacts_count: Optional[int] = None,
            vulnerable_artifacts_count_with_ignored: Optional[int] = None) -> VulnerabilityAudit
    func GetVulnerabilityAudit(ctx *Context, name string, id IDInput, state *VulnerabilityAuditState, opts ...ResourceOption) (*VulnerabilityAudit, error)
    public static VulnerabilityAudit Get(string name, Input<string> id, VulnerabilityAuditState? state, CustomResourceOptions? opts = null)
    public static VulnerabilityAudit get(String name, Output<String> id, VulnerabilityAuditState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    ApplicationDependencies List<VulnerabilityAuditApplicationDependency>
    List of application dependencies (without vulnerabilities).
    BuildType string
    The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
    CompartmentId string
    (Updatable) The compartment Oracle Cloud identifier (OCID) of the vulnerability audit. If compartment identifier is not provided the compartment of the associated knowledge base will be used instead.
    Configuration VulnerabilityAuditConfiguration
    Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in exclusions, or all of the associated Vulnerabilies have a CVSS v2 score below maxPermissibleCvssV2Score and a CVSS v3 score below maxPermissibleCvssV3Score. type: object
    DefinedTags Dictionary<string, object>
    (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. Example: {"foo-namespace.bar-key": "value"}
    DisplayName string
    (Updatable) The name of the vulnerability audit.
    FreeformTags Dictionary<string, object>
    (Updatable) Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example: {"bar-key": "value"}
    IsSuccess bool
    Indicates if an audit succeeded according to the configuration. The value is null if the audit is in the CREATING state.
    KnowledgeBaseId string
    The Oracle Cloud identifier (OCID) of the knowledge base.
    LifecycleDetails string
    Details on the lifecycle state.
    MaxObservedCvssV2score double
    Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
    MaxObservedCvssV2scoreWithIgnored double
    Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
    MaxObservedCvssV3score double
    Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
    MaxObservedCvssV3scoreWithIgnored double
    Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
    MaxObservedSeverity string
    Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
    MaxObservedSeverityWithIgnored string
    Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
    Source VulnerabilityAuditSource
    vulnerability audit source.
    State string
    The current lifecycle state of the vulnerability audit.
    SystemTags Dictionary<string, object>
    Usage of system tag keys. These predefined keys are scoped to namespaces. Example: {"orcl-cloud.free-tier-retained": "true"}
    TimeCreated string
    The creation date and time of the vulnerability audit (formatted according to RFC3339).
    TimeUpdated string
    The update date and time of the vulnerability audit (formatted according to RFC3339).
    UsageData VulnerabilityAuditUsageData
    The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set sourceType to objectStorageTuple and use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name.
    Vulnerabilities List<VulnerabilityAuditVulnerability>
    List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
    VulnerableArtifactsCount int
    Count of non-ignored vulnerable application dependencies.
    VulnerableArtifactsCountWithIgnored int
    Count of all vulnerable application dependencies.
    ApplicationDependencies []VulnerabilityAuditApplicationDependencyArgs
    List of application dependencies (without vulnerabilities).
    BuildType string
    The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
    CompartmentId string
    (Updatable) The compartment Oracle Cloud identifier (OCID) of the vulnerability audit. If compartment identifier is not provided the compartment of the associated knowledge base will be used instead.
    Configuration VulnerabilityAuditConfigurationArgs
    Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in exclusions, or all of the associated Vulnerabilies have a CVSS v2 score below maxPermissibleCvssV2Score and a CVSS v3 score below maxPermissibleCvssV3Score. type: object
    DefinedTags map[string]interface{}
    (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. Example: {"foo-namespace.bar-key": "value"}
    DisplayName string
    (Updatable) The name of the vulnerability audit.
    FreeformTags map[string]interface{}
    (Updatable) Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example: {"bar-key": "value"}
    IsSuccess bool
    Indicates if an audit succeeded according to the configuration. The value is null if the audit is in the CREATING state.
    KnowledgeBaseId string
    The Oracle Cloud identifier (OCID) of the knowledge base.
    LifecycleDetails string
    Details on the lifecycle state.
    MaxObservedCvssV2score float64
    Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
    MaxObservedCvssV2scoreWithIgnored float64
    Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
    MaxObservedCvssV3score float64
    Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
    MaxObservedCvssV3scoreWithIgnored float64
    Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
    MaxObservedSeverity string
    Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
    MaxObservedSeverityWithIgnored string
    Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
    Source VulnerabilityAuditSourceArgs
    vulnerability audit source.
    State string
    The current lifecycle state of the vulnerability audit.
    SystemTags map[string]interface{}
    Usage of system tag keys. These predefined keys are scoped to namespaces. Example: {"orcl-cloud.free-tier-retained": "true"}
    TimeCreated string
    The creation date and time of the vulnerability audit (formatted according to RFC3339).
    TimeUpdated string
    The update date and time of the vulnerability audit (formatted according to RFC3339).
    UsageData VulnerabilityAuditUsageDataArgs
    The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set sourceType to objectStorageTuple and use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name.
    Vulnerabilities []VulnerabilityAuditVulnerabilityArgs
    List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
    VulnerableArtifactsCount int
    Count of non-ignored vulnerable application dependencies.
    VulnerableArtifactsCountWithIgnored int
    Count of all vulnerable application dependencies.
    applicationDependencies List<VulnerabilityAuditApplicationDependency>
    List of application dependencies (without vulnerabilities).
    buildType String
    The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
    compartmentId String
    (Updatable) The compartment Oracle Cloud identifier (OCID) of the vulnerability audit. If compartment identifier is not provided the compartment of the associated knowledge base will be used instead.
    configuration VulnerabilityAuditConfiguration
    Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in exclusions, or all of the associated Vulnerabilies have a CVSS v2 score below maxPermissibleCvssV2Score and a CVSS v3 score below maxPermissibleCvssV3Score. type: object
    definedTags Map<String,Object>
    (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. Example: {"foo-namespace.bar-key": "value"}
    displayName String
    (Updatable) The name of the vulnerability audit.
    freeformTags Map<String,Object>
    (Updatable) Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example: {"bar-key": "value"}
    isSuccess Boolean
    Indicates if an audit succeeded according to the configuration. The value is null if the audit is in the CREATING state.
    knowledgeBaseId String
    The Oracle Cloud identifier (OCID) of the knowledge base.
    lifecycleDetails String
    Details on the lifecycle state.
    maxObservedCvssV2score Double
    Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
    maxObservedCvssV2scoreWithIgnored Double
    Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
    maxObservedCvssV3score Double
    Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
    maxObservedCvssV3scoreWithIgnored Double
    Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
    maxObservedSeverity String
    Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
    maxObservedSeverityWithIgnored String
    Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
    source VulnerabilityAuditSource
    vulnerability audit source.
    state String
    The current lifecycle state of the vulnerability audit.
    systemTags Map<String,Object>
    Usage of system tag keys. These predefined keys are scoped to namespaces. Example: {"orcl-cloud.free-tier-retained": "true"}
    timeCreated String
    The creation date and time of the vulnerability audit (formatted according to RFC3339).
    timeUpdated String
    The update date and time of the vulnerability audit (formatted according to RFC3339).
    usageData VulnerabilityAuditUsageData
    The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set sourceType to objectStorageTuple and use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name.
    vulnerabilities List<VulnerabilityAuditVulnerability>
    List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
    vulnerableArtifactsCount Integer
    Count of non-ignored vulnerable application dependencies.
    vulnerableArtifactsCountWithIgnored Integer
    Count of all vulnerable application dependencies.
    applicationDependencies VulnerabilityAuditApplicationDependency[]
    List of application dependencies (without vulnerabilities).
    buildType string
    The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
    compartmentId string
    (Updatable) The compartment Oracle Cloud identifier (OCID) of the vulnerability audit. If compartment identifier is not provided the compartment of the associated knowledge base will be used instead.
    configuration VulnerabilityAuditConfiguration
    Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in exclusions, or all of the associated Vulnerabilies have a CVSS v2 score below maxPermissibleCvssV2Score and a CVSS v3 score below maxPermissibleCvssV3Score. type: object
    definedTags {[key: string]: any}
    (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. Example: {"foo-namespace.bar-key": "value"}
    displayName string
    (Updatable) The name of the vulnerability audit.
    freeformTags {[key: string]: any}
    (Updatable) Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example: {"bar-key": "value"}
    isSuccess boolean
    Indicates if an audit succeeded according to the configuration. The value is null if the audit is in the CREATING state.
    knowledgeBaseId string
    The Oracle Cloud identifier (OCID) of the knowledge base.
    lifecycleDetails string
    Details on the lifecycle state.
    maxObservedCvssV2score number
    Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
    maxObservedCvssV2scoreWithIgnored number
    Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
    maxObservedCvssV3score number
    Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
    maxObservedCvssV3scoreWithIgnored number
    Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
    maxObservedSeverity string
    Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
    maxObservedSeverityWithIgnored string
    Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
    source VulnerabilityAuditSource
    vulnerability audit source.
    state string
    The current lifecycle state of the vulnerability audit.
    systemTags {[key: string]: any}
    Usage of system tag keys. These predefined keys are scoped to namespaces. Example: {"orcl-cloud.free-tier-retained": "true"}
    timeCreated string
    The creation date and time of the vulnerability audit (formatted according to RFC3339).
    timeUpdated string
    The update date and time of the vulnerability audit (formatted according to RFC3339).
    usageData VulnerabilityAuditUsageData
    The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set sourceType to objectStorageTuple and use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name.
    vulnerabilities VulnerabilityAuditVulnerability[]
    List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
    vulnerableArtifactsCount number
    Count of non-ignored vulnerable application dependencies.
    vulnerableArtifactsCountWithIgnored number
    Count of all vulnerable application dependencies.
    application_dependencies VulnerabilityAuditApplicationDependencyArgs]
    List of application dependencies (without vulnerabilities).
    build_type str
    The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
    compartment_id str
    (Updatable) The compartment Oracle Cloud identifier (OCID) of the vulnerability audit. If compartment identifier is not provided the compartment of the associated knowledge base will be used instead.
    configuration VulnerabilityAuditConfigurationArgs
    Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in exclusions, or all of the associated Vulnerabilies have a CVSS v2 score below maxPermissibleCvssV2Score and a CVSS v3 score below maxPermissibleCvssV3Score. type: object
    defined_tags Mapping[str, Any]
    (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. Example: {"foo-namespace.bar-key": "value"}
    display_name str
    (Updatable) The name of the vulnerability audit.
    freeform_tags Mapping[str, Any]
    (Updatable) Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example: {"bar-key": "value"}
    is_success bool
    Indicates if an audit succeeded according to the configuration. The value is null if the audit is in the CREATING state.
    knowledge_base_id str
    The Oracle Cloud identifier (OCID) of the knowledge base.
    lifecycle_details str
    Details on the lifecycle state.
    max_observed_cvss_v2score float
    Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
    max_observed_cvss_v2score_with_ignored float
    Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
    max_observed_cvss_v3score float
    Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
    max_observed_cvss_v3score_with_ignored float
    Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
    max_observed_severity str
    Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
    max_observed_severity_with_ignored str
    Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
    source VulnerabilityAuditSourceArgs
    vulnerability audit source.
    state str
    The current lifecycle state of the vulnerability audit.
    system_tags Mapping[str, Any]
    Usage of system tag keys. These predefined keys are scoped to namespaces. Example: {"orcl-cloud.free-tier-retained": "true"}
    time_created str
    The creation date and time of the vulnerability audit (formatted according to RFC3339).
    time_updated str
    The update date and time of the vulnerability audit (formatted according to RFC3339).
    usage_data VulnerabilityAuditUsageDataArgs
    The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set sourceType to objectStorageTuple and use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name.
    vulnerabilities VulnerabilityAuditVulnerabilityArgs]
    List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
    vulnerable_artifacts_count int
    Count of non-ignored vulnerable application dependencies.
    vulnerable_artifacts_count_with_ignored int
    Count of all vulnerable application dependencies.
    applicationDependencies List<Property Map>
    List of application dependencies (without vulnerabilities).
    buildType String
    The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
    compartmentId String
    (Updatable) The compartment Oracle Cloud identifier (OCID) of the vulnerability audit. If compartment identifier is not provided the compartment of the associated knowledge base will be used instead.
    configuration Property Map
    Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in exclusions, or all of the associated Vulnerabilies have a CVSS v2 score below maxPermissibleCvssV2Score and a CVSS v3 score below maxPermissibleCvssV3Score. type: object
    definedTags Map<Any>
    (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. Example: {"foo-namespace.bar-key": "value"}
    displayName String
    (Updatable) The name of the vulnerability audit.
    freeformTags Map<Any>
    (Updatable) Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example: {"bar-key": "value"}
    isSuccess Boolean
    Indicates if an audit succeeded according to the configuration. The value is null if the audit is in the CREATING state.
    knowledgeBaseId String
    The Oracle Cloud identifier (OCID) of the knowledge base.
    lifecycleDetails String
    Details on the lifecycle state.
    maxObservedCvssV2score Number
    Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
    maxObservedCvssV2scoreWithIgnored Number
    Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
    maxObservedCvssV3score Number
    Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
    maxObservedCvssV3scoreWithIgnored Number
    Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
    maxObservedSeverity String
    Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
    maxObservedSeverityWithIgnored String
    Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
    source Property Map
    vulnerability audit source.
    state String
    The current lifecycle state of the vulnerability audit.
    systemTags Map<Any>
    Usage of system tag keys. These predefined keys are scoped to namespaces. Example: {"orcl-cloud.free-tier-retained": "true"}
    timeCreated String
    The creation date and time of the vulnerability audit (formatted according to RFC3339).
    timeUpdated String
    The update date and time of the vulnerability audit (formatted according to RFC3339).
    usageData Property Map
    The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set sourceType to objectStorageTuple and use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name.
    vulnerabilities List<Property Map>
    List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
    vulnerableArtifactsCount Number
    Count of non-ignored vulnerable application dependencies.
    vulnerableArtifactsCountWithIgnored Number
    Count of all vulnerable application dependencies.

    Supporting Types

    VulnerabilityAuditApplicationDependency, VulnerabilityAuditApplicationDependencyArgs

    NodeId string
    Unique identifier of an application dependency, for example nodeId1. The nodeId can be generated by assigning a unique id to each application dependency in the tree of application dependencies. Every node, even those who share the same GAV, should have a different nodeId. The preferred way of constructing a nodeId is to assign incremental integers during a breadth first or depth first search. A nodeId can be reused only it refers to the same subtree of application dependencies. (This is not equivalent to referring to the same GAV, that is, a GAV can have multiple transitive dependencies.)
    ApplicationDependencyNodeIds List<string>
    List of application dependencies on which this application dependency depends, each identified by its nodeId.
    Gav string
    Group Artifact Version (GAV) identifier (Group:Artifact:Version). Example: org.graalvm.nativeimage:svm:21.1.0. "N/A" for non-maven artifacts.
    Purl string
    Package URL defined in https://github.com/package-url/purl-spec, e.g. pkg:maven/org.graalvm.nativeimage/svm@21.1.0
    NodeId string
    Unique identifier of an application dependency, for example nodeId1. The nodeId can be generated by assigning a unique id to each application dependency in the tree of application dependencies. Every node, even those who share the same GAV, should have a different nodeId. The preferred way of constructing a nodeId is to assign incremental integers during a breadth first or depth first search. A nodeId can be reused only it refers to the same subtree of application dependencies. (This is not equivalent to referring to the same GAV, that is, a GAV can have multiple transitive dependencies.)
    ApplicationDependencyNodeIds []string
    List of application dependencies on which this application dependency depends, each identified by its nodeId.
    Gav string
    Group Artifact Version (GAV) identifier (Group:Artifact:Version). Example: org.graalvm.nativeimage:svm:21.1.0. "N/A" for non-maven artifacts.
    Purl string
    Package URL defined in https://github.com/package-url/purl-spec, e.g. pkg:maven/org.graalvm.nativeimage/svm@21.1.0
    nodeId String
    Unique identifier of an application dependency, for example nodeId1. The nodeId can be generated by assigning a unique id to each application dependency in the tree of application dependencies. Every node, even those who share the same GAV, should have a different nodeId. The preferred way of constructing a nodeId is to assign incremental integers during a breadth first or depth first search. A nodeId can be reused only it refers to the same subtree of application dependencies. (This is not equivalent to referring to the same GAV, that is, a GAV can have multiple transitive dependencies.)
    applicationDependencyNodeIds List<String>
    List of application dependencies on which this application dependency depends, each identified by its nodeId.
    gav String
    Group Artifact Version (GAV) identifier (Group:Artifact:Version). Example: org.graalvm.nativeimage:svm:21.1.0. "N/A" for non-maven artifacts.
    purl String
    Package URL defined in https://github.com/package-url/purl-spec, e.g. pkg:maven/org.graalvm.nativeimage/svm@21.1.0
    nodeId string
    Unique identifier of an application dependency, for example nodeId1. The nodeId can be generated by assigning a unique id to each application dependency in the tree of application dependencies. Every node, even those who share the same GAV, should have a different nodeId. The preferred way of constructing a nodeId is to assign incremental integers during a breadth first or depth first search. A nodeId can be reused only it refers to the same subtree of application dependencies. (This is not equivalent to referring to the same GAV, that is, a GAV can have multiple transitive dependencies.)
    applicationDependencyNodeIds string[]
    List of application dependencies on which this application dependency depends, each identified by its nodeId.
    gav string
    Group Artifact Version (GAV) identifier (Group:Artifact:Version). Example: org.graalvm.nativeimage:svm:21.1.0. "N/A" for non-maven artifacts.
    purl string
    Package URL defined in https://github.com/package-url/purl-spec, e.g. pkg:maven/org.graalvm.nativeimage/svm@21.1.0
    node_id str
    Unique identifier of an application dependency, for example nodeId1. The nodeId can be generated by assigning a unique id to each application dependency in the tree of application dependencies. Every node, even those who share the same GAV, should have a different nodeId. The preferred way of constructing a nodeId is to assign incremental integers during a breadth first or depth first search. A nodeId can be reused only it refers to the same subtree of application dependencies. (This is not equivalent to referring to the same GAV, that is, a GAV can have multiple transitive dependencies.)
    application_dependency_node_ids Sequence[str]
    List of application dependencies on which this application dependency depends, each identified by its nodeId.
    gav str
    Group Artifact Version (GAV) identifier (Group:Artifact:Version). Example: org.graalvm.nativeimage:svm:21.1.0. "N/A" for non-maven artifacts.
    purl str
    Package URL defined in https://github.com/package-url/purl-spec, e.g. pkg:maven/org.graalvm.nativeimage/svm@21.1.0
    nodeId String
    Unique identifier of an application dependency, for example nodeId1. The nodeId can be generated by assigning a unique id to each application dependency in the tree of application dependencies. Every node, even those who share the same GAV, should have a different nodeId. The preferred way of constructing a nodeId is to assign incremental integers during a breadth first or depth first search. A nodeId can be reused only it refers to the same subtree of application dependencies. (This is not equivalent to referring to the same GAV, that is, a GAV can have multiple transitive dependencies.)
    applicationDependencyNodeIds List<String>
    List of application dependencies on which this application dependency depends, each identified by its nodeId.
    gav String
    Group Artifact Version (GAV) identifier (Group:Artifact:Version). Example: org.graalvm.nativeimage:svm:21.1.0. "N/A" for non-maven artifacts.
    purl String
    Package URL defined in https://github.com/package-url/purl-spec, e.g. pkg:maven/org.graalvm.nativeimage/svm@21.1.0

    VulnerabilityAuditConfiguration, VulnerabilityAuditConfigurationArgs

    Exclusions List<string>
    A vulnerable application dependency is ignored if its name matches any of the items in exclusions. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters.
    MaxPermissibleCvssV2score double
    A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
    MaxPermissibleCvssV3score double
    A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
    MaxPermissibleSeverity string
    A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
    Exclusions []string
    A vulnerable application dependency is ignored if its name matches any of the items in exclusions. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters.
    MaxPermissibleCvssV2score float64
    A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
    MaxPermissibleCvssV3score float64
    A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
    MaxPermissibleSeverity string
    A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
    exclusions List<String>
    A vulnerable application dependency is ignored if its name matches any of the items in exclusions. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters.
    maxPermissibleCvssV2score Double
    A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
    maxPermissibleCvssV3score Double
    A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
    maxPermissibleSeverity String
    A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
    exclusions string[]
    A vulnerable application dependency is ignored if its name matches any of the items in exclusions. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters.
    maxPermissibleCvssV2score number
    A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
    maxPermissibleCvssV3score number
    A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
    maxPermissibleSeverity string
    A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
    exclusions Sequence[str]
    A vulnerable application dependency is ignored if its name matches any of the items in exclusions. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters.
    max_permissible_cvss_v2score float
    A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
    max_permissible_cvss_v3score float
    A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
    max_permissible_severity str
    A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
    exclusions List<String>
    A vulnerable application dependency is ignored if its name matches any of the items in exclusions. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters.
    maxPermissibleCvssV2score Number
    A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
    maxPermissibleCvssV3score Number
    A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
    maxPermissibleSeverity String
    A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.

    VulnerabilityAuditSource, VulnerabilityAuditSourceArgs

    Type string
    Source type of the vulnerability audit.
    Description string
    Description of the external resource source.
    OciResourceId string
    The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the vulnerability audit.
    Type string
    Source type of the vulnerability audit.
    Description string
    Description of the external resource source.
    OciResourceId string
    The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the vulnerability audit.
    type String
    Source type of the vulnerability audit.
    description String
    Description of the external resource source.
    ociResourceId String
    The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the vulnerability audit.
    type string
    Source type of the vulnerability audit.
    description string
    Description of the external resource source.
    ociResourceId string
    The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the vulnerability audit.
    type str
    Source type of the vulnerability audit.
    description str
    Description of the external resource source.
    oci_resource_id str
    The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the vulnerability audit.
    type String
    Source type of the vulnerability audit.
    description String
    Description of the external resource source.
    ociResourceId String
    The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the vulnerability audit.

    VulnerabilityAuditUsageData, VulnerabilityAuditUsageDataArgs

    Bucket string
    The Object Storage bucket to read the usage data from.
    Namespace string
    The Object Storage namespace to read the usage data from.
    Object string
    The Object Storage object name to read the usage data from.
    SourceType string

    The destination type. Use objectStorageTuple when specifying the namespace, bucket name, and object name.

    ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values

    Bucket string
    The Object Storage bucket to read the usage data from.
    Namespace string
    The Object Storage namespace to read the usage data from.
    Object string
    The Object Storage object name to read the usage data from.
    SourceType string

    The destination type. Use objectStorageTuple when specifying the namespace, bucket name, and object name.

    ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values

    bucket String
    The Object Storage bucket to read the usage data from.
    namespace String
    The Object Storage namespace to read the usage data from.
    object String
    The Object Storage object name to read the usage data from.
    sourceType String

    The destination type. Use objectStorageTuple when specifying the namespace, bucket name, and object name.

    ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values

    bucket string
    The Object Storage bucket to read the usage data from.
    namespace string
    The Object Storage namespace to read the usage data from.
    object string
    The Object Storage object name to read the usage data from.
    sourceType string

    The destination type. Use objectStorageTuple when specifying the namespace, bucket name, and object name.

    ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values

    bucket str
    The Object Storage bucket to read the usage data from.
    namespace str
    The Object Storage namespace to read the usage data from.
    object str
    The Object Storage object name to read the usage data from.
    source_type str

    The destination type. Use objectStorageTuple when specifying the namespace, bucket name, and object name.

    ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values

    bucket String
    The Object Storage bucket to read the usage data from.
    namespace String
    The Object Storage namespace to read the usage data from.
    object String
    The Object Storage object name to read the usage data from.
    sourceType String

    The destination type. Use objectStorageTuple when specifying the namespace, bucket name, and object name.

    ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values

    VulnerabilityAuditVulnerability, VulnerabilityAuditVulnerabilityArgs

    CvssV2score double
    Common Vulnerability Scoring System (CVSS) Version 2.
    CvssV3score double
    Common Vulnerability Scoring System (CVSS) Version 3.
    Id string
    Unique vulnerability identifier, e.g. CVE-1999-0067.
    IsFalsePositive bool
    Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is null.
    IsIgnored bool
    Indicates if the vulnerability was ignored according to the audit configuration.
    Severity string
    ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
    Source string
    vulnerability audit source.
    CvssV2score float64
    Common Vulnerability Scoring System (CVSS) Version 2.
    CvssV3score float64
    Common Vulnerability Scoring System (CVSS) Version 3.
    Id string
    Unique vulnerability identifier, e.g. CVE-1999-0067.
    IsFalsePositive bool
    Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is null.
    IsIgnored bool
    Indicates if the vulnerability was ignored according to the audit configuration.
    Severity string
    ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
    Source string
    vulnerability audit source.
    cvssV2score Double
    Common Vulnerability Scoring System (CVSS) Version 2.
    cvssV3score Double
    Common Vulnerability Scoring System (CVSS) Version 3.
    id String
    Unique vulnerability identifier, e.g. CVE-1999-0067.
    isFalsePositive Boolean
    Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is null.
    isIgnored Boolean
    Indicates if the vulnerability was ignored according to the audit configuration.
    severity String
    ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
    source String
    vulnerability audit source.
    cvssV2score number
    Common Vulnerability Scoring System (CVSS) Version 2.
    cvssV3score number
    Common Vulnerability Scoring System (CVSS) Version 3.
    id string
    Unique vulnerability identifier, e.g. CVE-1999-0067.
    isFalsePositive boolean
    Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is null.
    isIgnored boolean
    Indicates if the vulnerability was ignored according to the audit configuration.
    severity string
    ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
    source string
    vulnerability audit source.
    cvss_v2score float
    Common Vulnerability Scoring System (CVSS) Version 2.
    cvss_v3score float
    Common Vulnerability Scoring System (CVSS) Version 3.
    id str
    Unique vulnerability identifier, e.g. CVE-1999-0067.
    is_false_positive bool
    Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is null.
    is_ignored bool
    Indicates if the vulnerability was ignored according to the audit configuration.
    severity str
    ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
    source str
    vulnerability audit source.
    cvssV2score Number
    Common Vulnerability Scoring System (CVSS) Version 2.
    cvssV3score Number
    Common Vulnerability Scoring System (CVSS) Version 3.
    id String
    Unique vulnerability identifier, e.g. CVE-1999-0067.
    isFalsePositive Boolean
    Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is null.
    isIgnored Boolean
    Indicates if the vulnerability was ignored according to the audit configuration.
    severity String
    ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
    source String
    vulnerability audit source.

    Import

    VulnerabilityAudits can be imported using the id, e.g.

    $ pulumi import oci:Adm/vulnerabilityAudit:VulnerabilityAudit test_vulnerability_audit "id"
    

    Package Details

    Repository
    oci pulumi/pulumi-oci
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the oci Terraform Provider.
    oci logo
    Oracle Cloud Infrastructure v1.29.0 published on Thursday, Mar 28, 2024 by Pulumi