Skip to content

Commit

Permalink
feat(client-inspector2): Amazon Inspector now allows customers to sea…
Browse files Browse the repository at this point in the history
…rch its vulnerability intelligence database if any of the Inspector scanning types are activated.
  • Loading branch information
awstools committed May 5, 2023
1 parent bd16ace commit 71466f2
Show file tree
Hide file tree
Showing 10 changed files with 1,341 additions and 0 deletions.
8 changes: 8 additions & 0 deletions clients/client-inspector2/README.md
Expand Up @@ -446,6 +446,14 @@ ListUsageTotals

[Command API Reference](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/clients/client-inspector2/classes/listusagetotalscommand.html) / [Input](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/clients/client-inspector2/interfaces/listusagetotalscommandinput.html) / [Output](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/clients/client-inspector2/interfaces/listusagetotalscommandoutput.html)

</details>
<details>
<summary>
SearchVulnerabilities
</summary>

[Command API Reference](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/clients/client-inspector2/classes/searchvulnerabilitiescommand.html) / [Input](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/clients/client-inspector2/interfaces/searchvulnerabilitiescommandinput.html) / [Output](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/clients/client-inspector2/interfaces/searchvulnerabilitiescommandoutput.html)

</details>
<details>
<summary>
Expand Down
23 changes: 23 additions & 0 deletions clients/client-inspector2/src/Inspector2.ts
Expand Up @@ -132,6 +132,11 @@ import {
ListUsageTotalsCommandInput,
ListUsageTotalsCommandOutput,
} from "./commands/ListUsageTotalsCommand";
import {
SearchVulnerabilitiesCommand,
SearchVulnerabilitiesCommandInput,
SearchVulnerabilitiesCommandOutput,
} from "./commands/SearchVulnerabilitiesCommand";
import { TagResourceCommand, TagResourceCommandInput, TagResourceCommandOutput } from "./commands/TagResourceCommand";
import {
UntagResourceCommand,
Expand Down Expand Up @@ -196,6 +201,7 @@ const commands = {
ListMembersCommand,
ListTagsForResourceCommand,
ListUsageTotalsCommand,
SearchVulnerabilitiesCommand,
TagResourceCommand,
UntagResourceCommand,
UpdateConfigurationCommand,
Expand Down Expand Up @@ -656,6 +662,23 @@ export interface Inspector2 {
cb: (err: any, data?: ListUsageTotalsCommandOutput) => void
): void;

/**
* @see {@link SearchVulnerabilitiesCommand}
*/
searchVulnerabilities(
args: SearchVulnerabilitiesCommandInput,
options?: __HttpHandlerOptions
): Promise<SearchVulnerabilitiesCommandOutput>;
searchVulnerabilities(
args: SearchVulnerabilitiesCommandInput,
cb: (err: any, data?: SearchVulnerabilitiesCommandOutput) => void
): void;
searchVulnerabilities(
args: SearchVulnerabilitiesCommandInput,
options: __HttpHandlerOptions,
cb: (err: any, data?: SearchVulnerabilitiesCommandOutput) => void
): void;

/**
* @see {@link TagResourceCommand}
*/
Expand Down
6 changes: 6 additions & 0 deletions clients/client-inspector2/src/Inspector2Client.ts
Expand Up @@ -130,6 +130,10 @@ import {
ListTagsForResourceCommandOutput,
} from "./commands/ListTagsForResourceCommand";
import { ListUsageTotalsCommandInput, ListUsageTotalsCommandOutput } from "./commands/ListUsageTotalsCommand";
import {
SearchVulnerabilitiesCommandInput,
SearchVulnerabilitiesCommandOutput,
} from "./commands/SearchVulnerabilitiesCommand";
import { TagResourceCommandInput, TagResourceCommandOutput } from "./commands/TagResourceCommand";
import { UntagResourceCommandInput, UntagResourceCommandOutput } from "./commands/UntagResourceCommand";
import {
Expand Down Expand Up @@ -191,6 +195,7 @@ export type ServiceInputTypes =
| ListMembersCommandInput
| ListTagsForResourceCommandInput
| ListUsageTotalsCommandInput
| SearchVulnerabilitiesCommandInput
| TagResourceCommandInput
| UntagResourceCommandInput
| UpdateConfigurationCommandInput
Expand Down Expand Up @@ -233,6 +238,7 @@ export type ServiceOutputTypes =
| ListMembersCommandOutput
| ListTagsForResourceCommandOutput
| ListUsageTotalsCommandOutput
| SearchVulnerabilitiesCommandOutput
| TagResourceCommandOutput
| UntagResourceCommandOutput
| UpdateConfigurationCommandOutput
Expand Down
209 changes: 209 additions & 0 deletions clients/client-inspector2/src/commands/SearchVulnerabilitiesCommand.ts
@@ -0,0 +1,209 @@
// smithy-typescript generated code
import { EndpointParameterInstructions, getEndpointPlugin } from "@aws-sdk/middleware-endpoint";
import { getSerdePlugin } from "@aws-sdk/middleware-serde";
import { HttpRequest as __HttpRequest, HttpResponse as __HttpResponse } from "@aws-sdk/protocol-http";
import { Command as $Command } from "@aws-sdk/smithy-client";
import {
FinalizeHandlerArguments,
Handler,
HandlerExecutionContext,
HttpHandlerOptions as __HttpHandlerOptions,
MetadataBearer as __MetadataBearer,
MiddlewareStack,
SerdeContext as __SerdeContext,
} from "@aws-sdk/types";

import { Inspector2ClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../Inspector2Client";
import { SearchVulnerabilitiesRequest, SearchVulnerabilitiesResponse } from "../models/models_0";
import { de_SearchVulnerabilitiesCommand, se_SearchVulnerabilitiesCommand } from "../protocols/Aws_restJson1";

/**
* @public
*
* The input for {@link SearchVulnerabilitiesCommand}.
*/
export interface SearchVulnerabilitiesCommandInput extends SearchVulnerabilitiesRequest {}
/**
* @public
*
* The output of {@link SearchVulnerabilitiesCommand}.
*/
export interface SearchVulnerabilitiesCommandOutput extends SearchVulnerabilitiesResponse, __MetadataBearer {}

/**
* @public
* <p>Lists Amazon Inspector coverage details for a specific vulnerability.</p>
* @example
* Use a bare-bones client and the command you need to make an API call.
* ```javascript
* import { Inspector2Client, SearchVulnerabilitiesCommand } from "@aws-sdk/client-inspector2"; // ES Modules import
* // const { Inspector2Client, SearchVulnerabilitiesCommand } = require("@aws-sdk/client-inspector2"); // CommonJS import
* const client = new Inspector2Client(config);
* const input = { // SearchVulnerabilitiesRequest
* filterCriteria: { // SearchVulnerabilitiesFilterCriteria
* vulnerabilityIds: [ // VulnIdList // required
* "STRING_VALUE",
* ],
* },
* nextToken: "STRING_VALUE",
* };
* const command = new SearchVulnerabilitiesCommand(input);
* const response = await client.send(command);
* // { // SearchVulnerabilitiesResponse
* // vulnerabilities: [ // Vulnerabilities // required
* // { // Vulnerability
* // id: "STRING_VALUE", // required
* // cwes: [ // Cwes
* // "STRING_VALUE",
* // ],
* // cisaData: { // CisaData
* // dateAdded: new Date("TIMESTAMP"),
* // dateDue: new Date("TIMESTAMP"),
* // action: "STRING_VALUE",
* // },
* // source: "STRING_VALUE",
* // description: "STRING_VALUE",
* // atigData: { // AtigData
* // firstSeen: new Date("TIMESTAMP"),
* // lastSeen: new Date("TIMESTAMP"),
* // targets: [ // Targets
* // "STRING_VALUE",
* // ],
* // ttps: [ // Ttps
* // "STRING_VALUE",
* // ],
* // },
* // vendorSeverity: "STRING_VALUE",
* // cvss3: { // Cvss3
* // baseScore: Number("double"),
* // scoringVector: "STRING_VALUE",
* // },
* // relatedVulnerabilities: [ // RelatedVulnerabilities
* // "STRING_VALUE",
* // ],
* // cvss2: { // Cvss2
* // baseScore: Number("double"),
* // scoringVector: "STRING_VALUE",
* // },
* // vendorCreatedAt: new Date("TIMESTAMP"),
* // vendorUpdatedAt: new Date("TIMESTAMP"),
* // sourceUrl: "STRING_VALUE",
* // referenceUrls: [ // VulnerabilityReferenceUrls
* // "STRING_VALUE",
* // ],
* // exploitObserved: { // ExploitObserved
* // lastSeen: new Date("TIMESTAMP"),
* // firstSeen: new Date("TIMESTAMP"),
* // },
* // detectionPlatforms: [ // DetectionPlatforms
* // "STRING_VALUE",
* // ],
* // epss: { // Epss
* // score: Number("double"),
* // },
* // },
* // ],
* // nextToken: "STRING_VALUE",
* // };
*
* ```
*
* @param SearchVulnerabilitiesCommandInput - {@link SearchVulnerabilitiesCommandInput}
* @returns {@link SearchVulnerabilitiesCommandOutput}
* @see {@link SearchVulnerabilitiesCommandInput} for command's `input` shape.
* @see {@link SearchVulnerabilitiesCommandOutput} for command's `response` shape.
* @see {@link Inspector2ClientResolvedConfig | config} for Inspector2Client's `config` shape.
*
* @throws {@link AccessDeniedException} (client fault)
* <p>You do not have sufficient access to perform this action.</p>
*
* @throws {@link InternalServerException} (server fault)
* <p>The request has failed due to an internal failure of the Amazon Inspector service.</p>
*
* @throws {@link ThrottlingException} (client fault)
* <p>The limit on the number of requests per second was exceeded.</p>
*
* @throws {@link ValidationException} (client fault)
* <p>The request has failed validation due to missing required fields or having invalid
* inputs.</p>
*
* @throws {@link Inspector2ServiceException}
* <p>Base exception class for all service exceptions from Inspector2 service.</p>
*
*/
export class SearchVulnerabilitiesCommand extends $Command<
SearchVulnerabilitiesCommandInput,
SearchVulnerabilitiesCommandOutput,
Inspector2ClientResolvedConfig
> {
// Start section: command_properties
// End section: command_properties

public static getEndpointParameterInstructions(): EndpointParameterInstructions {
return {
UseFIPS: { type: "builtInParams", name: "useFipsEndpoint" },
Endpoint: { type: "builtInParams", name: "endpoint" },
Region: { type: "builtInParams", name: "region" },
UseDualStack: { type: "builtInParams", name: "useDualstackEndpoint" },
};
}

/**
* @public
*/
constructor(readonly input: SearchVulnerabilitiesCommandInput) {
// Start section: command_constructor
super();
// End section: command_constructor
}

/**
* @internal
*/
resolveMiddleware(
clientStack: MiddlewareStack<ServiceInputTypes, ServiceOutputTypes>,
configuration: Inspector2ClientResolvedConfig,
options?: __HttpHandlerOptions
): Handler<SearchVulnerabilitiesCommandInput, SearchVulnerabilitiesCommandOutput> {
this.middlewareStack.use(getSerdePlugin(configuration, this.serialize, this.deserialize));
this.middlewareStack.use(
getEndpointPlugin(configuration, SearchVulnerabilitiesCommand.getEndpointParameterInstructions())
);

const stack = clientStack.concat(this.middlewareStack);

const { logger } = configuration;
const clientName = "Inspector2Client";
const commandName = "SearchVulnerabilitiesCommand";
const handlerExecutionContext: HandlerExecutionContext = {
logger,
clientName,
commandName,
inputFilterSensitiveLog: (_: any) => _,
outputFilterSensitiveLog: (_: any) => _,
};
const { requestHandler } = configuration;
return stack.resolve(
(request: FinalizeHandlerArguments<any>) =>
requestHandler.handle(request.request as __HttpRequest, options || {}),
handlerExecutionContext
);
}

/**
* @internal
*/
private serialize(input: SearchVulnerabilitiesCommandInput, context: __SerdeContext): Promise<__HttpRequest> {
return se_SearchVulnerabilitiesCommand(input, context);
}

/**
* @internal
*/
private deserialize(output: __HttpResponse, context: __SerdeContext): Promise<SearchVulnerabilitiesCommandOutput> {
return de_SearchVulnerabilitiesCommand(output, context);
}

// Start section: command_body_extra
// End section: command_body_extra
}
1 change: 1 addition & 0 deletions clients/client-inspector2/src/commands/index.ts
Expand Up @@ -29,6 +29,7 @@ export * from "./ListFindingsCommand";
export * from "./ListMembersCommand";
export * from "./ListTagsForResourceCommand";
export * from "./ListUsageTotalsCommand";
export * from "./SearchVulnerabilitiesCommand";
export * from "./TagResourceCommand";
export * from "./UntagResourceCommand";
export * from "./UpdateConfigurationCommand";
Expand Down

0 comments on commit 71466f2

Please sign in to comment.