oci.Adm.VulnerabilityAudit
This resource provides the Vulnerability Audit resource in Oracle Cloud Infrastructure Adm service.
Creates a new Vulnerability Audit by providing a tree of Application Dependencies.
Example Usage
using System.Collections.Generic;
using Pulumi;
using Oci = Pulumi.Oci;
return await Deployment.RunAsync(() =>
{
var testVulnerabilityAudit = new Oci.Adm.VulnerabilityAudit("testVulnerabilityAudit", new()
{
BuildType = @var.Vulnerability_audit_build_type,
KnowledgeBaseId = oci_adm_knowledge_base.Test_knowledge_base.Id,
ApplicationDependencies = new[]
{
new Oci.Adm.Inputs.VulnerabilityAuditApplicationDependencyArgs
{
Gav = @var.Vulnerability_audit_application_dependencies_gav,
NodeId = oci_adm_node.Test_node.Id,
ApplicationDependencyNodeIds = @var.Vulnerability_audit_application_dependencies_application_dependency_node_ids,
},
},
CompartmentId = @var.Compartment_id,
Configuration = new Oci.Adm.Inputs.VulnerabilityAuditConfigurationArgs
{
Exclusions = @var.Vulnerability_audit_configuration_exclusions,
MaxPermissibleCvssV2score = @var.Vulnerability_audit_configuration_max_permissible_cvss_v2score,
MaxPermissibleCvssV3score = @var.Vulnerability_audit_configuration_max_permissible_cvss_v3score,
},
DefinedTags =
{
{ "foo-namespace.bar-key", "value" },
},
DisplayName = @var.Vulnerability_audit_display_name,
FreeformTags =
{
{ "bar-key", "value" },
},
Source = new Oci.Adm.Inputs.VulnerabilityAuditSourceArgs
{
Type = @var.Vulnerability_audit_source_type,
Description = @var.Vulnerability_audit_source_description,
OciResourceId = oci_adm_oci_resource.Test_oci_resource.Id,
},
});
});
package main
import (
"github.com/pulumi/pulumi-oci/sdk/go/oci/Adm"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := Adm.NewVulnerabilityAudit(ctx, "testVulnerabilityAudit", &Adm.VulnerabilityAuditArgs{
BuildType: pulumi.Any(_var.Vulnerability_audit_build_type),
KnowledgeBaseId: pulumi.Any(oci_adm_knowledge_base.Test_knowledge_base.Id),
ApplicationDependencies: adm.VulnerabilityAuditApplicationDependencyArray{
&adm.VulnerabilityAuditApplicationDependencyArgs{
Gav: pulumi.Any(_var.Vulnerability_audit_application_dependencies_gav),
NodeId: pulumi.Any(oci_adm_node.Test_node.Id),
ApplicationDependencyNodeIds: pulumi.Any(_var.Vulnerability_audit_application_dependencies_application_dependency_node_ids),
},
},
CompartmentId: pulumi.Any(_var.Compartment_id),
Configuration: &adm.VulnerabilityAuditConfigurationArgs{
Exclusions: pulumi.Any(_var.Vulnerability_audit_configuration_exclusions),
MaxPermissibleCvssV2score: pulumi.Any(_var.Vulnerability_audit_configuration_max_permissible_cvss_v2score),
MaxPermissibleCvssV3score: pulumi.Any(_var.Vulnerability_audit_configuration_max_permissible_cvss_v3score),
},
DefinedTags: pulumi.AnyMap{
"foo-namespace.bar-key": pulumi.Any("value"),
},
DisplayName: pulumi.Any(_var.Vulnerability_audit_display_name),
FreeformTags: pulumi.AnyMap{
"bar-key": pulumi.Any("value"),
},
Source: &adm.VulnerabilityAuditSourceArgs{
Type: pulumi.Any(_var.Vulnerability_audit_source_type),
Description: pulumi.Any(_var.Vulnerability_audit_source_description),
OciResourceId: pulumi.Any(oci_adm_oci_resource.Test_oci_resource.Id),
},
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.oci.Adm.VulnerabilityAudit;
import com.pulumi.oci.Adm.VulnerabilityAuditArgs;
import com.pulumi.oci.Adm.inputs.VulnerabilityAuditApplicationDependencyArgs;
import com.pulumi.oci.Adm.inputs.VulnerabilityAuditConfigurationArgs;
import com.pulumi.oci.Adm.inputs.VulnerabilityAuditSourceArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var testVulnerabilityAudit = new VulnerabilityAudit("testVulnerabilityAudit", VulnerabilityAuditArgs.builder()
.buildType(var_.vulnerability_audit_build_type())
.knowledgeBaseId(oci_adm_knowledge_base.test_knowledge_base().id())
.applicationDependencies(VulnerabilityAuditApplicationDependencyArgs.builder()
.gav(var_.vulnerability_audit_application_dependencies_gav())
.nodeId(oci_adm_node.test_node().id())
.applicationDependencyNodeIds(var_.vulnerability_audit_application_dependencies_application_dependency_node_ids())
.build())
.compartmentId(var_.compartment_id())
.configuration(VulnerabilityAuditConfigurationArgs.builder()
.exclusions(var_.vulnerability_audit_configuration_exclusions())
.maxPermissibleCvssV2score(var_.vulnerability_audit_configuration_max_permissible_cvss_v2score())
.maxPermissibleCvssV3score(var_.vulnerability_audit_configuration_max_permissible_cvss_v3score())
.build())
.definedTags(Map.of("foo-namespace.bar-key", "value"))
.displayName(var_.vulnerability_audit_display_name())
.freeformTags(Map.of("bar-key", "value"))
.source(VulnerabilityAuditSourceArgs.builder()
.type(var_.vulnerability_audit_source_type())
.description(var_.vulnerability_audit_source_description())
.ociResourceId(oci_adm_oci_resource.test_oci_resource().id())
.build())
.build());
}
}
import pulumi
import pulumi_oci as oci
test_vulnerability_audit = oci.adm.VulnerabilityAudit("testVulnerabilityAudit",
build_type=var["vulnerability_audit_build_type"],
knowledge_base_id=oci_adm_knowledge_base["test_knowledge_base"]["id"],
application_dependencies=[oci.adm.VulnerabilityAuditApplicationDependencyArgs(
gav=var["vulnerability_audit_application_dependencies_gav"],
node_id=oci_adm_node["test_node"]["id"],
application_dependency_node_ids=var["vulnerability_audit_application_dependencies_application_dependency_node_ids"],
)],
compartment_id=var["compartment_id"],
configuration=oci.adm.VulnerabilityAuditConfigurationArgs(
exclusions=var["vulnerability_audit_configuration_exclusions"],
max_permissible_cvss_v2score=var["vulnerability_audit_configuration_max_permissible_cvss_v2score"],
max_permissible_cvss_v3score=var["vulnerability_audit_configuration_max_permissible_cvss_v3score"],
),
defined_tags={
"foo-namespace.bar-key": "value",
},
display_name=var["vulnerability_audit_display_name"],
freeform_tags={
"bar-key": "value",
},
source=oci.adm.VulnerabilityAuditSourceArgs(
type=var["vulnerability_audit_source_type"],
description=var["vulnerability_audit_source_description"],
oci_resource_id=oci_adm_oci_resource["test_oci_resource"]["id"],
))
import * as pulumi from "@pulumi/pulumi";
import * as oci from "@pulumi/oci";
const testVulnerabilityAudit = new oci.adm.VulnerabilityAudit("testVulnerabilityAudit", {
buildType: _var.vulnerability_audit_build_type,
knowledgeBaseId: oci_adm_knowledge_base.test_knowledge_base.id,
applicationDependencies: [{
gav: _var.vulnerability_audit_application_dependencies_gav,
nodeId: oci_adm_node.test_node.id,
applicationDependencyNodeIds: _var.vulnerability_audit_application_dependencies_application_dependency_node_ids,
}],
compartmentId: _var.compartment_id,
configuration: {
exclusions: _var.vulnerability_audit_configuration_exclusions,
maxPermissibleCvssV2score: _var.vulnerability_audit_configuration_max_permissible_cvss_v2score,
maxPermissibleCvssV3score: _var.vulnerability_audit_configuration_max_permissible_cvss_v3score,
},
definedTags: {
"foo-namespace.bar-key": "value",
},
displayName: _var.vulnerability_audit_display_name,
freeformTags: {
"bar-key": "value",
},
source: {
type: _var.vulnerability_audit_source_type,
description: _var.vulnerability_audit_source_description,
ociResourceId: oci_adm_oci_resource.test_oci_resource.id,
},
});
resources:
testVulnerabilityAudit:
type: oci:Adm:VulnerabilityAudit
properties:
#Required
buildType: ${var.vulnerability_audit_build_type}
knowledgeBaseId: ${oci_adm_knowledge_base.test_knowledge_base.id}
#Optional
applicationDependencies:
- gav: ${var.vulnerability_audit_application_dependencies_gav}
nodeId: ${oci_adm_node.test_node.id}
applicationDependencyNodeIds: ${var.vulnerability_audit_application_dependencies_application_dependency_node_ids}
compartmentId: ${var.compartment_id}
configuration:
exclusions: ${var.vulnerability_audit_configuration_exclusions}
maxPermissibleCvssV2score: ${var.vulnerability_audit_configuration_max_permissible_cvss_v2score}
maxPermissibleCvssV3score: ${var.vulnerability_audit_configuration_max_permissible_cvss_v3score}
definedTags:
foo-namespace.bar-key: value
displayName: ${var.vulnerability_audit_display_name}
freeformTags:
bar-key: value
source:
type: ${var.vulnerability_audit_source_type}
description: ${var.vulnerability_audit_source_description}
ociResourceId: ${oci_adm_oci_resource.test_oci_resource.id}
Create VulnerabilityAudit Resource
new VulnerabilityAudit(name: string, args: VulnerabilityAuditArgs, opts?: CustomResourceOptions);
@overload
def VulnerabilityAudit(resource_name: str,
opts: Optional[ResourceOptions] = None,
application_dependencies: Optional[Sequence[_adm.VulnerabilityAuditApplicationDependencyArgs]] = None,
build_type: Optional[str] = None,
compartment_id: Optional[str] = None,
configuration: Optional[_adm.VulnerabilityAuditConfigurationArgs] = None,
defined_tags: Optional[Mapping[str, Any]] = None,
display_name: Optional[str] = None,
freeform_tags: Optional[Mapping[str, Any]] = None,
knowledge_base_id: Optional[str] = None,
source: Optional[_adm.VulnerabilityAuditSourceArgs] = None)
@overload
def VulnerabilityAudit(resource_name: str,
args: VulnerabilityAuditArgs,
opts: Optional[ResourceOptions] = None)
func NewVulnerabilityAudit(ctx *Context, name string, args VulnerabilityAuditArgs, opts ...ResourceOption) (*VulnerabilityAudit, error)
public VulnerabilityAudit(string name, VulnerabilityAuditArgs args, CustomResourceOptions? opts = null)
public VulnerabilityAudit(String name, VulnerabilityAuditArgs args)
public VulnerabilityAudit(String name, VulnerabilityAuditArgs args, CustomResourceOptions options)
type: oci:Adm:VulnerabilityAudit
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args VulnerabilityAuditArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args VulnerabilityAuditArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args VulnerabilityAuditArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args VulnerabilityAuditArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args VulnerabilityAuditArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
VulnerabilityAudit Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The VulnerabilityAudit resource accepts the following input properties:
- Build
Type string The type of the build tool.
- Knowledge
Base stringId The Oracle Cloud identifier (OCID) of the Knowledge Base.
- Application
Dependencies List<VulnerabilityAudit Application Dependency Args> List of Application Dependencies (without vulnerabilities).
- Compartment
Id string (Updatable) The Oracle Cloud identifier (OCID) of the compartment associated with the Vulnerability Audit. If compartment identifier is not provided the compartment of the associated Knowledge Base will be used instead.
- Configuration
Vulnerability
Audit Configuration Args Configuration for a Vulnerability Audit. A vulnerable Application Dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object- Dictionary<string, object>
(Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- Display
Name string (Updatable) The name of the Vulnerability Audit.
- Dictionary<string, object>
(Updatable) Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- Source
Vulnerability
Audit Source Args Vulnerability Audit source.
- Build
Type string The type of the build tool.
- Knowledge
Base stringId The Oracle Cloud identifier (OCID) of the Knowledge Base.
- Application
Dependencies []VulnerabilityAudit Application Dependency Args List of Application Dependencies (without vulnerabilities).
- Compartment
Id string (Updatable) The Oracle Cloud identifier (OCID) of the compartment associated with the Vulnerability Audit. If compartment identifier is not provided the compartment of the associated Knowledge Base will be used instead.
- Configuration
Vulnerability
Audit Configuration Args Configuration for a Vulnerability Audit. A vulnerable Application Dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object- map[string]interface{}
(Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- Display
Name string (Updatable) The name of the Vulnerability Audit.
- map[string]interface{}
(Updatable) Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- Source
Vulnerability
Audit Source Args Vulnerability Audit source.
- build
Type String The type of the build tool.
- knowledge
Base StringId The Oracle Cloud identifier (OCID) of the Knowledge Base.
- application
Dependencies List<VulnerabilityAudit Application Dependency Args> List of Application Dependencies (without vulnerabilities).
- compartment
Id String (Updatable) The Oracle Cloud identifier (OCID) of the compartment associated with the Vulnerability Audit. If compartment identifier is not provided the compartment of the associated Knowledge Base will be used instead.
- configuration
Vulnerability
Audit Configuration Args Configuration for a Vulnerability Audit. A vulnerable Application Dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object- Map<String,Object>
(Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- display
Name String (Updatable) The name of the Vulnerability Audit.
- Map<String,Object>
(Updatable) Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- source
Vulnerability
Audit Source Args Vulnerability Audit source.
- build
Type string The type of the build tool.
- knowledge
Base stringId The Oracle Cloud identifier (OCID) of the Knowledge Base.
- application
Dependencies VulnerabilityAudit Application Dependency Args[] List of Application Dependencies (without vulnerabilities).
- compartment
Id string (Updatable) The Oracle Cloud identifier (OCID) of the compartment associated with the Vulnerability Audit. If compartment identifier is not provided the compartment of the associated Knowledge Base will be used instead.
- configuration
Vulnerability
Audit Configuration Args Configuration for a Vulnerability Audit. A vulnerable Application Dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object- {[key: string]: any}
(Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- display
Name string (Updatable) The name of the Vulnerability Audit.
- {[key: string]: any}
(Updatable) Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- source
Vulnerability
Audit Source Args Vulnerability Audit source.
- build_
type str The type of the build tool.
- knowledge_
base_ strid The Oracle Cloud identifier (OCID) of the Knowledge Base.
- application_
dependencies VulnerabilityAudit Application Dependency Args] List of Application Dependencies (without vulnerabilities).
- compartment_
id str (Updatable) The Oracle Cloud identifier (OCID) of the compartment associated with the Vulnerability Audit. If compartment identifier is not provided the compartment of the associated Knowledge Base will be used instead.
- configuration
Vulnerability
Audit Configuration Args Configuration for a Vulnerability Audit. A vulnerable Application Dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object- Mapping[str, Any]
(Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- display_
name str (Updatable) The name of the Vulnerability Audit.
- Mapping[str, Any]
(Updatable) Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- source
Vulnerability
Audit Source Args Vulnerability Audit source.
- build
Type String The type of the build tool.
- knowledge
Base StringId The Oracle Cloud identifier (OCID) of the Knowledge Base.
- application
Dependencies List<Property Map> List of Application Dependencies (without vulnerabilities).
- compartment
Id String (Updatable) The Oracle Cloud identifier (OCID) of the compartment associated with the Vulnerability Audit. If compartment identifier is not provided the compartment of the associated Knowledge Base will be used instead.
- configuration Property Map
Configuration for a Vulnerability Audit. A vulnerable Application Dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object- Map<Any>
(Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- display
Name String (Updatable) The name of the Vulnerability Audit.
- Map<Any>
(Updatable) Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- source Property Map
Vulnerability Audit source.
Outputs
All input properties are implicitly available as output properties. Additionally, the VulnerabilityAudit resource produces the following output properties:
- Id string
The provider-assigned unique ID for this managed resource.
- Is
Success bool Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state.- Max
Observed doubleCvss V2score Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable Application Dependencies.
- Max
Observed doubleCvss V2score With Ignored Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable Application Dependencies including ignored ones.
- Max
Observed doubleCvss V3score Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable Application Dependencies.
- Max
Observed doubleCvss V3score With Ignored Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable Application Dependencies including ignored ones.
- State string
The current lifecycle state of the Vulnerability Audit.
- Dictionary<string, object>
Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- Time
Created string The creation date and time of the Vulnerability Audit (formatted according to RFC3339).
- Time
Updated string The update date and time of the Vulnerability Audit (formatted according to RFC3339).
- Vulnerabilities
List<Vulnerability
Audit Vulnerability> List of vulnerabilities found in the Vulnerability Audit.
- Vulnerable
Artifacts intCount Count of non-ignored vulnerable Application Dependencies.
- Vulnerable
Artifacts intCount With Ignored Count of all vulnerable Application Dependencies.
- Id string
The provider-assigned unique ID for this managed resource.
- Is
Success bool Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state.- Max
Observed float64Cvss V2score Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable Application Dependencies.
- Max
Observed float64Cvss V2score With Ignored Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable Application Dependencies including ignored ones.
- Max
Observed float64Cvss V3score Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable Application Dependencies.
- Max
Observed float64Cvss V3score With Ignored Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable Application Dependencies including ignored ones.
- State string
The current lifecycle state of the Vulnerability Audit.
- map[string]interface{}
Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- Time
Created string The creation date and time of the Vulnerability Audit (formatted according to RFC3339).
- Time
Updated string The update date and time of the Vulnerability Audit (formatted according to RFC3339).
- Vulnerabilities
[]Vulnerability
Audit Vulnerability List of vulnerabilities found in the Vulnerability Audit.
- Vulnerable
Artifacts intCount Count of non-ignored vulnerable Application Dependencies.
- Vulnerable
Artifacts intCount With Ignored Count of all vulnerable Application Dependencies.
- id String
The provider-assigned unique ID for this managed resource.
- is
Success Boolean Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state.- max
Observed DoubleCvss V2score Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable Application Dependencies.
- max
Observed DoubleCvss V2score With Ignored Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable Application Dependencies including ignored ones.
- max
Observed DoubleCvss V3score Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable Application Dependencies.
- max
Observed DoubleCvss V3score With Ignored Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable Application Dependencies including ignored ones.
- state String
The current lifecycle state of the Vulnerability Audit.
- Map<String,Object>
Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- time
Created String The creation date and time of the Vulnerability Audit (formatted according to RFC3339).
- time
Updated String The update date and time of the Vulnerability Audit (formatted according to RFC3339).
- vulnerabilities
List<Vulnerability
Audit Vulnerability> List of vulnerabilities found in the Vulnerability Audit.
- vulnerable
Artifacts IntegerCount Count of non-ignored vulnerable Application Dependencies.
- vulnerable
Artifacts IntegerCount With Ignored Count of all vulnerable Application Dependencies.
- id string
The provider-assigned unique ID for this managed resource.
- is
Success boolean Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state.- max
Observed numberCvss V2score Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable Application Dependencies.
- max
Observed numberCvss V2score With Ignored Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable Application Dependencies including ignored ones.
- max
Observed numberCvss V3score Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable Application Dependencies.
- max
Observed numberCvss V3score With Ignored Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable Application Dependencies including ignored ones.
- state string
The current lifecycle state of the Vulnerability Audit.
- {[key: string]: any}
Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- time
Created string The creation date and time of the Vulnerability Audit (formatted according to RFC3339).
- time
Updated string The update date and time of the Vulnerability Audit (formatted according to RFC3339).
- vulnerabilities
Vulnerability
Audit Vulnerability[] List of vulnerabilities found in the Vulnerability Audit.
- vulnerable
Artifacts numberCount Count of non-ignored vulnerable Application Dependencies.
- vulnerable
Artifacts numberCount With Ignored Count of all vulnerable Application Dependencies.
- id str
The provider-assigned unique ID for this managed resource.
- is_
success bool Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state.- max_
observed_ floatcvss_ v2score Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable Application Dependencies.
- max_
observed_ floatcvss_ v2score_ with_ ignored Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable Application Dependencies including ignored ones.
- max_
observed_ floatcvss_ v3score Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable Application Dependencies.
- max_
observed_ floatcvss_ v3score_ with_ ignored Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable Application Dependencies including ignored ones.
- state str
The current lifecycle state of the Vulnerability Audit.
- Mapping[str, Any]
Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- time_
created str The creation date and time of the Vulnerability Audit (formatted according to RFC3339).
- time_
updated str The update date and time of the Vulnerability Audit (formatted according to RFC3339).
- vulnerabilities
Vulnerability
Audit Vulnerability] List of vulnerabilities found in the Vulnerability Audit.
- vulnerable_
artifacts_ intcount Count of non-ignored vulnerable Application Dependencies.
- vulnerable_
artifacts_ intcount_ with_ ignored Count of all vulnerable Application Dependencies.
- id String
The provider-assigned unique ID for this managed resource.
- is
Success Boolean Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state.- max
Observed NumberCvss V2score Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable Application Dependencies.
- max
Observed NumberCvss V2score With Ignored Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable Application Dependencies including ignored ones.
- max
Observed NumberCvss V3score Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable Application Dependencies.
- max
Observed NumberCvss V3score With Ignored Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable Application Dependencies including ignored ones.
- state String
The current lifecycle state of the Vulnerability Audit.
- Map<Any>
Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- time
Created String The creation date and time of the Vulnerability Audit (formatted according to RFC3339).
- time
Updated String The update date and time of the Vulnerability Audit (formatted according to RFC3339).
- vulnerabilities List<Property Map>
List of vulnerabilities found in the Vulnerability Audit.
- vulnerable
Artifacts NumberCount Count of non-ignored vulnerable Application Dependencies.
- vulnerable
Artifacts NumberCount With Ignored Count of all vulnerable Application Dependencies.
Look up Existing VulnerabilityAudit Resource
Get an existing VulnerabilityAudit resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: VulnerabilityAuditState, opts?: CustomResourceOptions): VulnerabilityAudit
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
application_dependencies: Optional[Sequence[_adm.VulnerabilityAuditApplicationDependencyArgs]] = None,
build_type: Optional[str] = None,
compartment_id: Optional[str] = None,
configuration: Optional[_adm.VulnerabilityAuditConfigurationArgs] = None,
defined_tags: Optional[Mapping[str, Any]] = None,
display_name: Optional[str] = None,
freeform_tags: Optional[Mapping[str, Any]] = None,
is_success: Optional[bool] = None,
knowledge_base_id: Optional[str] = None,
max_observed_cvss_v2score: Optional[float] = None,
max_observed_cvss_v2score_with_ignored: Optional[float] = None,
max_observed_cvss_v3score: Optional[float] = None,
max_observed_cvss_v3score_with_ignored: Optional[float] = None,
source: Optional[_adm.VulnerabilityAuditSourceArgs] = None,
state: Optional[str] = None,
system_tags: Optional[Mapping[str, Any]] = None,
time_created: Optional[str] = None,
time_updated: Optional[str] = None,
vulnerabilities: Optional[Sequence[_adm.VulnerabilityAuditVulnerabilityArgs]] = None,
vulnerable_artifacts_count: Optional[int] = None,
vulnerable_artifacts_count_with_ignored: Optional[int] = None) -> VulnerabilityAudit
func GetVulnerabilityAudit(ctx *Context, name string, id IDInput, state *VulnerabilityAuditState, opts ...ResourceOption) (*VulnerabilityAudit, error)
public static VulnerabilityAudit Get(string name, Input<string> id, VulnerabilityAuditState? state, CustomResourceOptions? opts = null)
public static VulnerabilityAudit get(String name, Output<String> id, VulnerabilityAuditState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Application
Dependencies List<VulnerabilityAudit Application Dependency Args> List of Application Dependencies (without vulnerabilities).
- Build
Type string The type of the build tool.
- Compartment
Id string (Updatable) The Oracle Cloud identifier (OCID) of the compartment associated with the Vulnerability Audit. If compartment identifier is not provided the compartment of the associated Knowledge Base will be used instead.
- Configuration
Vulnerability
Audit Configuration Args Configuration for a Vulnerability Audit. A vulnerable Application Dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object- Dictionary<string, object>
(Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- Display
Name string (Updatable) The name of the Vulnerability Audit.
- Dictionary<string, object>
(Updatable) Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- Is
Success bool Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state.- Knowledge
Base stringId The Oracle Cloud identifier (OCID) of the Knowledge Base.
- Max
Observed doubleCvss V2score Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable Application Dependencies.
- Max
Observed doubleCvss V2score With Ignored Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable Application Dependencies including ignored ones.
- Max
Observed doubleCvss V3score Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable Application Dependencies.
- Max
Observed doubleCvss V3score With Ignored Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable Application Dependencies including ignored ones.
- Source
Vulnerability
Audit Source Args Vulnerability Audit source.
- State string
The current lifecycle state of the Vulnerability Audit.
- Dictionary<string, object>
Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- Time
Created string The creation date and time of the Vulnerability Audit (formatted according to RFC3339).
- Time
Updated string The update date and time of the Vulnerability Audit (formatted according to RFC3339).
- Vulnerabilities
List<Vulnerability
Audit Vulnerability Args> List of vulnerabilities found in the Vulnerability Audit.
- Vulnerable
Artifacts intCount Count of non-ignored vulnerable Application Dependencies.
- Vulnerable
Artifacts intCount With Ignored Count of all vulnerable Application Dependencies.
- Application
Dependencies []VulnerabilityAudit Application Dependency Args List of Application Dependencies (without vulnerabilities).
- Build
Type string The type of the build tool.
- Compartment
Id string (Updatable) The Oracle Cloud identifier (OCID) of the compartment associated with the Vulnerability Audit. If compartment identifier is not provided the compartment of the associated Knowledge Base will be used instead.
- Configuration
Vulnerability
Audit Configuration Args Configuration for a Vulnerability Audit. A vulnerable Application Dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object- map[string]interface{}
(Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- Display
Name string (Updatable) The name of the Vulnerability Audit.
- map[string]interface{}
(Updatable) Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- Is
Success bool Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state.- Knowledge
Base stringId The Oracle Cloud identifier (OCID) of the Knowledge Base.
- Max
Observed float64Cvss V2score Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable Application Dependencies.
- Max
Observed float64Cvss V2score With Ignored Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable Application Dependencies including ignored ones.
- Max
Observed float64Cvss V3score Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable Application Dependencies.
- Max
Observed float64Cvss V3score With Ignored Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable Application Dependencies including ignored ones.
- Source
Vulnerability
Audit Source Args Vulnerability Audit source.
- State string
The current lifecycle state of the Vulnerability Audit.
- map[string]interface{}
Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- Time
Created string The creation date and time of the Vulnerability Audit (formatted according to RFC3339).
- Time
Updated string The update date and time of the Vulnerability Audit (formatted according to RFC3339).
- Vulnerabilities
[]Vulnerability
Audit Vulnerability Args List of vulnerabilities found in the Vulnerability Audit.
- Vulnerable
Artifacts intCount Count of non-ignored vulnerable Application Dependencies.
- Vulnerable
Artifacts intCount With Ignored Count of all vulnerable Application Dependencies.
- application
Dependencies List<VulnerabilityAudit Application Dependency Args> List of Application Dependencies (without vulnerabilities).
- build
Type String The type of the build tool.
- compartment
Id String (Updatable) The Oracle Cloud identifier (OCID) of the compartment associated with the Vulnerability Audit. If compartment identifier is not provided the compartment of the associated Knowledge Base will be used instead.
- configuration
Vulnerability
Audit Configuration Args Configuration for a Vulnerability Audit. A vulnerable Application Dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object- Map<String,Object>
(Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- display
Name String (Updatable) The name of the Vulnerability Audit.
- Map<String,Object>
(Updatable) Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- is
Success Boolean Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state.- knowledge
Base StringId The Oracle Cloud identifier (OCID) of the Knowledge Base.
- max
Observed DoubleCvss V2score Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable Application Dependencies.
- max
Observed DoubleCvss V2score With Ignored Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable Application Dependencies including ignored ones.
- max
Observed DoubleCvss V3score Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable Application Dependencies.
- max
Observed DoubleCvss V3score With Ignored Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable Application Dependencies including ignored ones.
- source
Vulnerability
Audit Source Args Vulnerability Audit source.
- state String
The current lifecycle state of the Vulnerability Audit.
- Map<String,Object>
Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- time
Created String The creation date and time of the Vulnerability Audit (formatted according to RFC3339).
- time
Updated String The update date and time of the Vulnerability Audit (formatted according to RFC3339).
- vulnerabilities
List<Vulnerability
Audit Vulnerability Args> List of vulnerabilities found in the Vulnerability Audit.
- vulnerable
Artifacts IntegerCount Count of non-ignored vulnerable Application Dependencies.
- vulnerable
Artifacts IntegerCount With Ignored Count of all vulnerable Application Dependencies.
- application
Dependencies VulnerabilityAudit Application Dependency Args[] List of Application Dependencies (without vulnerabilities).
- build
Type string The type of the build tool.
- compartment
Id string (Updatable) The Oracle Cloud identifier (OCID) of the compartment associated with the Vulnerability Audit. If compartment identifier is not provided the compartment of the associated Knowledge Base will be used instead.
- configuration
Vulnerability
Audit Configuration Args Configuration for a Vulnerability Audit. A vulnerable Application Dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object- {[key: string]: any}
(Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- display
Name string (Updatable) The name of the Vulnerability Audit.
- {[key: string]: any}
(Updatable) Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- is
Success boolean Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state.- knowledge
Base stringId The Oracle Cloud identifier (OCID) of the Knowledge Base.
- max
Observed numberCvss V2score Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable Application Dependencies.
- max
Observed numberCvss V2score With Ignored Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable Application Dependencies including ignored ones.
- max
Observed numberCvss V3score Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable Application Dependencies.
- max
Observed numberCvss V3score With Ignored Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable Application Dependencies including ignored ones.
- source
Vulnerability
Audit Source Args Vulnerability Audit source.
- state string
The current lifecycle state of the Vulnerability Audit.
- {[key: string]: any}
Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- time
Created string The creation date and time of the Vulnerability Audit (formatted according to RFC3339).
- time
Updated string The update date and time of the Vulnerability Audit (formatted according to RFC3339).
- vulnerabilities
Vulnerability
Audit Vulnerability Args[] List of vulnerabilities found in the Vulnerability Audit.
- vulnerable
Artifacts numberCount Count of non-ignored vulnerable Application Dependencies.
- vulnerable
Artifacts numberCount With Ignored Count of all vulnerable Application Dependencies.
- application_
dependencies VulnerabilityAudit Application Dependency Args] List of Application Dependencies (without vulnerabilities).
- build_
type str The type of the build tool.
- compartment_
id str (Updatable) The Oracle Cloud identifier (OCID) of the compartment associated with the Vulnerability Audit. If compartment identifier is not provided the compartment of the associated Knowledge Base will be used instead.
- configuration
Vulnerability
Audit Configuration Args Configuration for a Vulnerability Audit. A vulnerable Application Dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object- Mapping[str, Any]
(Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- display_
name str (Updatable) The name of the Vulnerability Audit.
- Mapping[str, Any]
(Updatable) Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- is_
success bool Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state.- knowledge_
base_ strid The Oracle Cloud identifier (OCID) of the Knowledge Base.
- max_
observed_ floatcvss_ v2score Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable Application Dependencies.
- max_
observed_ floatcvss_ v2score_ with_ ignored Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable Application Dependencies including ignored ones.
- max_
observed_ floatcvss_ v3score Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable Application Dependencies.
- max_
observed_ floatcvss_ v3score_ with_ ignored Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable Application Dependencies including ignored ones.
- source
Vulnerability
Audit Source Args Vulnerability Audit source.
- state str
The current lifecycle state of the Vulnerability Audit.
- Mapping[str, Any]
Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- time_
created str The creation date and time of the Vulnerability Audit (formatted according to RFC3339).
- time_
updated str The update date and time of the Vulnerability Audit (formatted according to RFC3339).
- vulnerabilities
Vulnerability
Audit Vulnerability Args] List of vulnerabilities found in the Vulnerability Audit.
- vulnerable_
artifacts_ intcount Count of non-ignored vulnerable Application Dependencies.
- vulnerable_
artifacts_ intcount_ with_ ignored Count of all vulnerable Application Dependencies.
- application
Dependencies List<Property Map> List of Application Dependencies (without vulnerabilities).
- build
Type String The type of the build tool.
- compartment
Id String (Updatable) The Oracle Cloud identifier (OCID) of the compartment associated with the Vulnerability Audit. If compartment identifier is not provided the compartment of the associated Knowledge Base will be used instead.
- configuration Property Map
Configuration for a Vulnerability Audit. A vulnerable Application Dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object- Map<Any>
(Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- display
Name String (Updatable) The name of the Vulnerability Audit.
- Map<Any>
(Updatable) Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- is
Success Boolean Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state.- knowledge
Base StringId The Oracle Cloud identifier (OCID) of the Knowledge Base.
- max
Observed NumberCvss V2score Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable Application Dependencies.
- max
Observed NumberCvss V2score With Ignored Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable Application Dependencies including ignored ones.
- max
Observed NumberCvss V3score Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable Application Dependencies.
- max
Observed NumberCvss V3score With Ignored Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable Application Dependencies including ignored ones.
- source Property Map
Vulnerability Audit source.
- state String
The current lifecycle state of the Vulnerability Audit.
- Map<Any>
Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- time
Created String The creation date and time of the Vulnerability Audit (formatted according to RFC3339).
- time
Updated String The update date and time of the Vulnerability Audit (formatted according to RFC3339).
- vulnerabilities List<Property Map>
List of vulnerabilities found in the Vulnerability Audit.
- vulnerable
Artifacts NumberCount Count of non-ignored vulnerable Application Dependencies.
- vulnerable
Artifacts NumberCount With Ignored Count of all vulnerable Application Dependencies.
Supporting Types
VulnerabilityAuditApplicationDependency
- Gav string
Group Artifact Version (GAV) identifier (Group:Artifact:Version), e.g. org.graalvm.nativeimage:svm:21.1.0.
- Node
Id string Unique identifier of an Application Dependency, for example nodeId1. The nodeId can be generated by assigning a unique id to each application dependency in the tree of application dependencies. Every node, even those who share the same GAV, should have a different nodeId. The preferred way of constructing a nodeId is to assign incremental integers during a breadth first or depth first search. A nodeId can be reused only it refers to the same subtree of application dependencies. (This is not equivalent to referring to the same GAV, that is, a GAV can have multiple transitive dependencies.)
- Application
Dependency List<string>Node Ids List of Application Dependencies on which this Application Dependency depends, each identified by its nodeId.
- Gav string
Group Artifact Version (GAV) identifier (Group:Artifact:Version), e.g. org.graalvm.nativeimage:svm:21.1.0.
- Node
Id string Unique identifier of an Application Dependency, for example nodeId1. The nodeId can be generated by assigning a unique id to each application dependency in the tree of application dependencies. Every node, even those who share the same GAV, should have a different nodeId. The preferred way of constructing a nodeId is to assign incremental integers during a breadth first or depth first search. A nodeId can be reused only it refers to the same subtree of application dependencies. (This is not equivalent to referring to the same GAV, that is, a GAV can have multiple transitive dependencies.)
- Application
Dependency []stringNode Ids List of Application Dependencies on which this Application Dependency depends, each identified by its nodeId.
- gav String
Group Artifact Version (GAV) identifier (Group:Artifact:Version), e.g. org.graalvm.nativeimage:svm:21.1.0.
- node
Id String Unique identifier of an Application Dependency, for example nodeId1. The nodeId can be generated by assigning a unique id to each application dependency in the tree of application dependencies. Every node, even those who share the same GAV, should have a different nodeId. The preferred way of constructing a nodeId is to assign incremental integers during a breadth first or depth first search. A nodeId can be reused only it refers to the same subtree of application dependencies. (This is not equivalent to referring to the same GAV, that is, a GAV can have multiple transitive dependencies.)
- application
Dependency List<String>Node Ids List of Application Dependencies on which this Application Dependency depends, each identified by its nodeId.
- gav string
Group Artifact Version (GAV) identifier (Group:Artifact:Version), e.g. org.graalvm.nativeimage:svm:21.1.0.
- node
Id string Unique identifier of an Application Dependency, for example nodeId1. The nodeId can be generated by assigning a unique id to each application dependency in the tree of application dependencies. Every node, even those who share the same GAV, should have a different nodeId. The preferred way of constructing a nodeId is to assign incremental integers during a breadth first or depth first search. A nodeId can be reused only it refers to the same subtree of application dependencies. (This is not equivalent to referring to the same GAV, that is, a GAV can have multiple transitive dependencies.)
- application
Dependency string[]Node Ids List of Application Dependencies on which this Application Dependency depends, each identified by its nodeId.
- gav str
Group Artifact Version (GAV) identifier (Group:Artifact:Version), e.g. org.graalvm.nativeimage:svm:21.1.0.
- node_
id str Unique identifier of an Application Dependency, for example nodeId1. The nodeId can be generated by assigning a unique id to each application dependency in the tree of application dependencies. Every node, even those who share the same GAV, should have a different nodeId. The preferred way of constructing a nodeId is to assign incremental integers during a breadth first or depth first search. A nodeId can be reused only it refers to the same subtree of application dependencies. (This is not equivalent to referring to the same GAV, that is, a GAV can have multiple transitive dependencies.)
- application_
dependency_ Sequence[str]node_ ids List of Application Dependencies on which this Application Dependency depends, each identified by its nodeId.
- gav String
Group Artifact Version (GAV) identifier (Group:Artifact:Version), e.g. org.graalvm.nativeimage:svm:21.1.0.
- node
Id String Unique identifier of an Application Dependency, for example nodeId1. The nodeId can be generated by assigning a unique id to each application dependency in the tree of application dependencies. Every node, even those who share the same GAV, should have a different nodeId. The preferred way of constructing a nodeId is to assign incremental integers during a breadth first or depth first search. A nodeId can be reused only it refers to the same subtree of application dependencies. (This is not equivalent to referring to the same GAV, that is, a GAV can have multiple transitive dependencies.)
- application
Dependency List<String>Node Ids List of Application Dependencies on which this Application Dependency depends, each identified by its nodeId.
VulnerabilityAuditConfiguration
- Exclusions List<string>
A vulnerable Application Dependency is ignored if its name matches any of the items in
exclusions
.- Max
Permissible doubleCvss V2score A vulnerable Application Dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- Max
Permissible doubleCvss V3score A vulnerable Application Dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- Exclusions []string
A vulnerable Application Dependency is ignored if its name matches any of the items in
exclusions
.- Max
Permissible float64Cvss V2score A vulnerable Application Dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- Max
Permissible float64Cvss V3score A vulnerable Application Dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- exclusions List<String>
A vulnerable Application Dependency is ignored if its name matches any of the items in
exclusions
.- max
Permissible DoubleCvss V2score A vulnerable Application Dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- max
Permissible DoubleCvss V3score A vulnerable Application Dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- exclusions string[]
A vulnerable Application Dependency is ignored if its name matches any of the items in
exclusions
.- max
Permissible numberCvss V2score A vulnerable Application Dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- max
Permissible numberCvss V3score A vulnerable Application Dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- exclusions Sequence[str]
A vulnerable Application Dependency is ignored if its name matches any of the items in
exclusions
.- max_
permissible_ floatcvss_ v2score A vulnerable Application Dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- max_
permissible_ floatcvss_ v3score A vulnerable Application Dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- exclusions List<String>
A vulnerable Application Dependency is ignored if its name matches any of the items in
exclusions
.- max
Permissible NumberCvss V2score A vulnerable Application Dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- max
Permissible NumberCvss V3score A vulnerable Application Dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
VulnerabilityAuditSource
- Type string
Source type of the Vulnerability Audit.
- Description string
Description of the external resource source.
- Oci
Resource stringId The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the Vulnerability Audit.
- Type string
Source type of the Vulnerability Audit.
- Description string
Description of the external resource source.
- Oci
Resource stringId The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the Vulnerability Audit.
- type String
Source type of the Vulnerability Audit.
- description String
Description of the external resource source.
- oci
Resource StringId The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the Vulnerability Audit.
- type string
Source type of the Vulnerability Audit.
- description string
Description of the external resource source.
- oci
Resource stringId The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the Vulnerability Audit.
- type str
Source type of the Vulnerability Audit.
- description str
Description of the external resource source.
- oci_
resource_ strid The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the Vulnerability Audit.
- type String
Source type of the Vulnerability Audit.
- description String
Description of the external resource source.
- oci
Resource StringId The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the Vulnerability Audit.
VulnerabilityAuditVulnerability
- Cvss
V2score double Common Vulnerability Scoring System (CVSS) Version 2.
- Cvss
V3score double Common Vulnerability Scoring System (CVSS) Version 3.
- Id string
Unique vulnerability identifier, e.g. CVE-1999-0067.
- Is
Ignored bool Indicates if the vulnerability was ignored according to the audit configuration.
- Cvss
V2score float64 Common Vulnerability Scoring System (CVSS) Version 2.
- Cvss
V3score float64 Common Vulnerability Scoring System (CVSS) Version 3.
- Id string
Unique vulnerability identifier, e.g. CVE-1999-0067.
- Is
Ignored bool Indicates if the vulnerability was ignored according to the audit configuration.
- cvss
V2score Double Common Vulnerability Scoring System (CVSS) Version 2.
- cvss
V3score Double Common Vulnerability Scoring System (CVSS) Version 3.
- id String
Unique vulnerability identifier, e.g. CVE-1999-0067.
- is
Ignored Boolean Indicates if the vulnerability was ignored according to the audit configuration.
- cvss
V2score number Common Vulnerability Scoring System (CVSS) Version 2.
- cvss
V3score number Common Vulnerability Scoring System (CVSS) Version 3.
- id string
Unique vulnerability identifier, e.g. CVE-1999-0067.
- is
Ignored boolean Indicates if the vulnerability was ignored according to the audit configuration.
- cvss_
v2score float Common Vulnerability Scoring System (CVSS) Version 2.
- cvss_
v3score float Common Vulnerability Scoring System (CVSS) Version 3.
- id str
Unique vulnerability identifier, e.g. CVE-1999-0067.
- is_
ignored bool Indicates if the vulnerability was ignored according to the audit configuration.
- cvss
V2score Number Common Vulnerability Scoring System (CVSS) Version 2.
- cvss
V3score Number Common Vulnerability Scoring System (CVSS) Version 3.
- id String
Unique vulnerability identifier, e.g. CVE-1999-0067.
- is
Ignored Boolean Indicates if the vulnerability was ignored according to the audit configuration.
Import
VulnerabilityAudits can be imported using the id
, e.g.
$ pulumi import oci:Adm/vulnerabilityAudit:VulnerabilityAudit test_vulnerability_audit "id"
Package Details
- Repository
- oci pulumi/pulumi-oci
- License
- Apache-2.0
- Notes
This Pulumi package is based on the
oci
Terraform Provider.