Oracle Cloud Infrastructure v2.11.0 published on Thursday, Sep 19, 2024 by Pulumi
oci.Adm.getVulnerabilityAudit
Explore with Pulumi AI
This data source provides details about a specific Vulnerability Audit resource in Oracle Cloud Infrastructure ADM service.
Returns the details of the specified Vulnerability Audit.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as oci from "@pulumi/oci";
const testVulnerabilityAudit = oci.Adm.getVulnerabilityAudit({
vulnerabilityAuditId: testVulnerabilityAuditOciAdmVulnerabilityAudit.id,
});
import pulumi
import pulumi_oci as oci
test_vulnerability_audit = oci.Adm.get_vulnerability_audit(vulnerability_audit_id=test_vulnerability_audit_oci_adm_vulnerability_audit["id"])
package main
import (
"github.com/pulumi/pulumi-oci/sdk/v2/go/oci/Adm"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := Adm.GetVulnerabilityAudit(ctx, &adm.GetVulnerabilityAuditArgs{
VulnerabilityAuditId: testVulnerabilityAuditOciAdmVulnerabilityAudit.Id,
}, nil)
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Oci = Pulumi.Oci;
return await Deployment.RunAsync(() =>
{
var testVulnerabilityAudit = Oci.Adm.GetVulnerabilityAudit.Invoke(new()
{
VulnerabilityAuditId = testVulnerabilityAuditOciAdmVulnerabilityAudit.Id,
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.oci.Adm.AdmFunctions;
import com.pulumi.oci.Adm.inputs.GetVulnerabilityAuditArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var testVulnerabilityAudit = AdmFunctions.getVulnerabilityAudit(GetVulnerabilityAuditArgs.builder()
.vulnerabilityAuditId(testVulnerabilityAuditOciAdmVulnerabilityAudit.id())
.build());
}
}
variables:
testVulnerabilityAudit:
fn::invoke:
Function: oci:Adm:getVulnerabilityAudit
Arguments:
vulnerabilityAuditId: ${testVulnerabilityAuditOciAdmVulnerabilityAudit.id}
Using getVulnerabilityAudit
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getVulnerabilityAudit(args: GetVulnerabilityAuditArgs, opts?: InvokeOptions): Promise<GetVulnerabilityAuditResult>
function getVulnerabilityAuditOutput(args: GetVulnerabilityAuditOutputArgs, opts?: InvokeOptions): Output<GetVulnerabilityAuditResult>
def get_vulnerability_audit(vulnerability_audit_id: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetVulnerabilityAuditResult
def get_vulnerability_audit_output(vulnerability_audit_id: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetVulnerabilityAuditResult]
func GetVulnerabilityAudit(ctx *Context, args *GetVulnerabilityAuditArgs, opts ...InvokeOption) (*GetVulnerabilityAuditResult, error)
func GetVulnerabilityAuditOutput(ctx *Context, args *GetVulnerabilityAuditOutputArgs, opts ...InvokeOption) GetVulnerabilityAuditResultOutput
> Note: This function is named GetVulnerabilityAudit
in the Go SDK.
public static class GetVulnerabilityAudit
{
public static Task<GetVulnerabilityAuditResult> InvokeAsync(GetVulnerabilityAuditArgs args, InvokeOptions? opts = null)
public static Output<GetVulnerabilityAuditResult> Invoke(GetVulnerabilityAuditInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetVulnerabilityAuditResult> getVulnerabilityAudit(GetVulnerabilityAuditArgs args, InvokeOptions options)
// Output-based functions aren't available in Java yet
fn::invoke:
function: oci:Adm/getVulnerabilityAudit:getVulnerabilityAudit
arguments:
# arguments dictionary
The following arguments are supported:
- Vulnerability
Audit stringId - Unique Vulnerability Audit identifier path parameter.
- Vulnerability
Audit stringId - Unique Vulnerability Audit identifier path parameter.
- vulnerability
Audit StringId - Unique Vulnerability Audit identifier path parameter.
- vulnerability
Audit stringId - Unique Vulnerability Audit identifier path parameter.
- vulnerability_
audit_ strid - Unique Vulnerability Audit identifier path parameter.
- vulnerability
Audit StringId - Unique Vulnerability Audit identifier path parameter.
getVulnerabilityAudit Result
The following output properties are available:
- Application
Dependencies List<GetVulnerability Audit Application Dependency> - Build
Type string - The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
- Compartment
Id string - The compartment Oracle Cloud identifier (OCID) of the vulnerability audit.
- Configurations
List<Get
Vulnerability Audit Configuration> - Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object - Dictionary<string, string>
- Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- Display
Name string - The name of the vulnerability audit.
- Dictionary<string, string>
- Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- Id string
- Unique vulnerability identifier, e.g. CVE-1999-0067.
- Is
Success bool - Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state. - Knowledge
Base stringId - The Oracle Cloud identifier (OCID) of the knowledge base.
- Lifecycle
Details string - Details on the lifecycle state.
- Max
Observed doubleCvss V2score - Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
- Max
Observed doubleCvss V2score With Ignored - Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
- Max
Observed doubleCvss V3score - Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
- Max
Observed doubleCvss V3score With Ignored - Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
- Max
Observed stringSeverity - Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
- Max
Observed stringSeverity With Ignored - Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
- Sources
List<Get
Vulnerability Audit Source> - Source that published the vulnerability
- State string
- The current lifecycle state of the vulnerability audit.
- Dictionary<string, string>
- Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- Time
Created string - The creation date and time of the vulnerability audit (formatted according to RFC3339).
- Time
Updated string - The update date and time of the vulnerability audit (formatted according to RFC3339).
- Usage
Datas List<GetVulnerability Audit Usage Data> - The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set
sourceType
toobjectStorageTuple
and use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name. - Vulnerabilities
List<Get
Vulnerability Audit Vulnerability> - List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
- Vulnerability
Audit stringId - Vulnerable
Artifacts intCount - Count of non-ignored vulnerable application dependencies.
- Vulnerable
Artifacts intCount With Ignored - Count of all vulnerable application dependencies.
- Application
Dependencies []GetVulnerability Audit Application Dependency - Build
Type string - The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
- Compartment
Id string - The compartment Oracle Cloud identifier (OCID) of the vulnerability audit.
- Configurations
[]Get
Vulnerability Audit Configuration - Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object - map[string]string
- Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- Display
Name string - The name of the vulnerability audit.
- map[string]string
- Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- Id string
- Unique vulnerability identifier, e.g. CVE-1999-0067.
- Is
Success bool - Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state. - Knowledge
Base stringId - The Oracle Cloud identifier (OCID) of the knowledge base.
- Lifecycle
Details string - Details on the lifecycle state.
- Max
Observed float64Cvss V2score - Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
- Max
Observed float64Cvss V2score With Ignored - Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
- Max
Observed float64Cvss V3score - Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
- Max
Observed float64Cvss V3score With Ignored - Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
- Max
Observed stringSeverity - Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
- Max
Observed stringSeverity With Ignored - Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
- Sources
[]Get
Vulnerability Audit Source - Source that published the vulnerability
- State string
- The current lifecycle state of the vulnerability audit.
- map[string]string
- Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- Time
Created string - The creation date and time of the vulnerability audit (formatted according to RFC3339).
- Time
Updated string - The update date and time of the vulnerability audit (formatted according to RFC3339).
- Usage
Datas []GetVulnerability Audit Usage Data - The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set
sourceType
toobjectStorageTuple
and use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name. - Vulnerabilities
[]Get
Vulnerability Audit Vulnerability - List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
- Vulnerability
Audit stringId - Vulnerable
Artifacts intCount - Count of non-ignored vulnerable application dependencies.
- Vulnerable
Artifacts intCount With Ignored - Count of all vulnerable application dependencies.
- application
Dependencies List<GetVulnerability Audit Application Dependency> - build
Type String - The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
- compartment
Id String - The compartment Oracle Cloud identifier (OCID) of the vulnerability audit.
- configurations
List<Get
Vulnerability Audit Configuration> - Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object - Map<String,String>
- Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- display
Name String - The name of the vulnerability audit.
- Map<String,String>
- Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- id String
- Unique vulnerability identifier, e.g. CVE-1999-0067.
- is
Success Boolean - Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state. - knowledge
Base StringId - The Oracle Cloud identifier (OCID) of the knowledge base.
- lifecycle
Details String - Details on the lifecycle state.
- max
Observed DoubleCvss V2score - Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
- max
Observed DoubleCvss V2score With Ignored - Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
- max
Observed DoubleCvss V3score - Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
- max
Observed DoubleCvss V3score With Ignored - Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
- max
Observed StringSeverity - Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
- max
Observed StringSeverity With Ignored - Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
- sources
List<Get
Vulnerability Audit Source> - Source that published the vulnerability
- state String
- The current lifecycle state of the vulnerability audit.
- Map<String,String>
- Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- time
Created String - The creation date and time of the vulnerability audit (formatted according to RFC3339).
- time
Updated String - The update date and time of the vulnerability audit (formatted according to RFC3339).
- usage
Datas List<GetVulnerability Audit Usage Data> - The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set
sourceType
toobjectStorageTuple
and use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name. - vulnerabilities
List<Get
Vulnerability Audit Vulnerability> - List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
- vulnerability
Audit StringId - vulnerable
Artifacts IntegerCount - Count of non-ignored vulnerable application dependencies.
- vulnerable
Artifacts IntegerCount With Ignored - Count of all vulnerable application dependencies.
- application
Dependencies GetVulnerability Audit Application Dependency[] - build
Type string - The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
- compartment
Id string - The compartment Oracle Cloud identifier (OCID) of the vulnerability audit.
- configurations
Get
Vulnerability Audit Configuration[] - Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object - {[key: string]: string}
- Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- display
Name string - The name of the vulnerability audit.
- {[key: string]: string}
- Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- id string
- Unique vulnerability identifier, e.g. CVE-1999-0067.
- is
Success boolean - Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state. - knowledge
Base stringId - The Oracle Cloud identifier (OCID) of the knowledge base.
- lifecycle
Details string - Details on the lifecycle state.
- max
Observed numberCvss V2score - Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
- max
Observed numberCvss V2score With Ignored - Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
- max
Observed numberCvss V3score - Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
- max
Observed numberCvss V3score With Ignored - Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
- max
Observed stringSeverity - Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
- max
Observed stringSeverity With Ignored - Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
- sources
Get
Vulnerability Audit Source[] - Source that published the vulnerability
- state string
- The current lifecycle state of the vulnerability audit.
- {[key: string]: string}
- Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- time
Created string - The creation date and time of the vulnerability audit (formatted according to RFC3339).
- time
Updated string - The update date and time of the vulnerability audit (formatted according to RFC3339).
- usage
Datas GetVulnerability Audit Usage Data[] - The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set
sourceType
toobjectStorageTuple
and use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name. - vulnerabilities
Get
Vulnerability Audit Vulnerability[] - List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
- vulnerability
Audit stringId - vulnerable
Artifacts numberCount - Count of non-ignored vulnerable application dependencies.
- vulnerable
Artifacts numberCount With Ignored - Count of all vulnerable application dependencies.
- application_
dependencies Sequence[adm.Get Vulnerability Audit Application Dependency] - build_
type str - The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
- compartment_
id str - The compartment Oracle Cloud identifier (OCID) of the vulnerability audit.
- configurations
Sequence[adm.
Get Vulnerability Audit Configuration] - Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object - Mapping[str, str]
- Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- display_
name str - The name of the vulnerability audit.
- Mapping[str, str]
- Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- id str
- Unique vulnerability identifier, e.g. CVE-1999-0067.
- is_
success bool - Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state. - knowledge_
base_ strid - The Oracle Cloud identifier (OCID) of the knowledge base.
- lifecycle_
details str - Details on the lifecycle state.
- max_
observed_ floatcvss_ v2score - Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
- max_
observed_ floatcvss_ v2score_ with_ ignored - Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
- max_
observed_ floatcvss_ v3score - Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
- max_
observed_ floatcvss_ v3score_ with_ ignored - Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
- max_
observed_ strseverity - Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
- max_
observed_ strseverity_ with_ ignored - Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
- sources
Sequence[adm.
Get Vulnerability Audit Source] - Source that published the vulnerability
- state str
- The current lifecycle state of the vulnerability audit.
- Mapping[str, str]
- Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- time_
created str - The creation date and time of the vulnerability audit (formatted according to RFC3339).
- time_
updated str - The update date and time of the vulnerability audit (formatted according to RFC3339).
- usage_
datas Sequence[adm.Get Vulnerability Audit Usage Data] - The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set
sourceType
toobjectStorageTuple
and use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name. - vulnerabilities
Sequence[adm.
Get Vulnerability Audit Vulnerability] - List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
- vulnerability_
audit_ strid - vulnerable_
artifacts_ intcount - Count of non-ignored vulnerable application dependencies.
- vulnerable_
artifacts_ intcount_ with_ ignored - Count of all vulnerable application dependencies.
- application
Dependencies List<Property Map> - build
Type String - The type of the build tool is restricted to only two values MAVEN or UNSET. Use UNSET when the list of application dependencies is not Maven-related or is a mix of Maven and other ecosystems. This option is soon to be deprecated.
- compartment
Id String - The compartment Oracle Cloud identifier (OCID) of the vulnerability audit.
- configurations List<Property Map>
- Configuration for a vulnerability audit. A vulnerable application dependency is ignored if its name does match any of the items in
exclusions
, or all of the associated Vulnerabilies have a CVSS v2 score belowmaxPermissibleCvssV2Score
and a CVSS v3 score belowmaxPermissibleCvssV3Score
. type: object - Map<String>
- Defined tags for this resource. Each key is predefined and scoped to a namespace. Example:
{"foo-namespace.bar-key": "value"}
- display
Name String - The name of the vulnerability audit.
- Map<String>
- Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example:
{"bar-key": "value"}
- id String
- Unique vulnerability identifier, e.g. CVE-1999-0067.
- is
Success Boolean - Indicates if an audit succeeded according to the configuration. The value is
null
if the audit is in theCREATING
state. - knowledge
Base StringId - The Oracle Cloud identifier (OCID) of the knowledge base.
- lifecycle
Details String - Details on the lifecycle state.
- max
Observed NumberCvss V2score - Maximum Common Vulnerability Scoring System Version 2 score observed for non-ignored vulnerable application dependencies.
- max
Observed NumberCvss V2score With Ignored - Maximum Common Vulnerability Scoring System Version 2 score observed for vulnerable application dependencies including ignored ones.
- max
Observed NumberCvss V3score - Maximum Common Vulnerability Scoring System Version 3 score observed for non-ignored vulnerable application dependencies.
- max
Observed NumberCvss V3score With Ignored - Maximum Common Vulnerability Scoring System Version 3 score observed for vulnerable application dependencies including ignored ones.
- max
Observed StringSeverity - Maximum ADM Severity observed for non-ignored vulnerable application dependencies.
- max
Observed StringSeverity With Ignored - Maximum ADM Severity observed for vulnerable application dependencies including ignored ones.
- sources List<Property Map>
- Source that published the vulnerability
- state String
- The current lifecycle state of the vulnerability audit.
- Map<String>
- Usage of system tag keys. These predefined keys are scoped to namespaces. Example:
{"orcl-cloud.free-tier-retained": "true"}
- time
Created String - The creation date and time of the vulnerability audit (formatted according to RFC3339).
- time
Updated String - The update date and time of the vulnerability audit (formatted according to RFC3339).
- usage
Datas List<Property Map> - The source details of the usage data in object storage. The usage data file uploaded to object storage must be a gzip archive of the JSON usage data returned from the GraalVM native-image-inspect tool after a native-image build. Set
sourceType
toobjectStorageTuple
and use UsageDataViaObjectStorageTupleDetails when specifying the namespace, bucket name, and object name. - vulnerabilities List<Property Map>
- List of vulnerabilities found in the vulnerability audit. If a vulnerability affects multiple dependencies, the metadata returned here consists of audit-wide aggregates.
- vulnerability
Audit StringId - vulnerable
Artifacts NumberCount - Count of non-ignored vulnerable application dependencies.
- vulnerable
Artifacts NumberCount With Ignored - Count of all vulnerable application dependencies.
Supporting Types
GetVulnerabilityAuditApplicationDependency
- Application
Dependency List<string>Node Ids - Gav string
- Node
Id string - Purl string
- Application
Dependency []stringNode Ids - Gav string
- Node
Id string - Purl string
- application
Dependency List<String>Node Ids - gav String
- node
Id String - purl String
- application
Dependency string[]Node Ids - gav string
- node
Id string - purl string
- application_
dependency_ Sequence[str]node_ ids - gav str
- node_
id str - purl str
- application
Dependency List<String>Node Ids - gav String
- node
Id String - purl String
GetVulnerabilityAuditConfiguration
- Exclusions List<string>
- A vulnerable application dependency is ignored if its name matches any of the items in
exclusions
. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters. - Max
Permissible doubleCvss V2score - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- Max
Permissible doubleCvss V3score - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- Max
Permissible stringSeverity - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
- Exclusions []string
- A vulnerable application dependency is ignored if its name matches any of the items in
exclusions
. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters. - Max
Permissible float64Cvss V2score - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- Max
Permissible float64Cvss V3score - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- Max
Permissible stringSeverity - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
- exclusions List<String>
- A vulnerable application dependency is ignored if its name matches any of the items in
exclusions
. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters. - max
Permissible DoubleCvss V2score - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- max
Permissible DoubleCvss V3score - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- max
Permissible StringSeverity - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
- exclusions string[]
- A vulnerable application dependency is ignored if its name matches any of the items in
exclusions
. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters. - max
Permissible numberCvss V2score - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- max
Permissible numberCvss V3score - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- max
Permissible stringSeverity - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
- exclusions Sequence[str]
- A vulnerable application dependency is ignored if its name matches any of the items in
exclusions
. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters. - max_
permissible_ floatcvss_ v2score - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- max_
permissible_ floatcvss_ v3score - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- max_
permissible_ strseverity - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
- exclusions List<String>
- A vulnerable application dependency is ignored if its name matches any of the items in
exclusions
. An asterisk (*) in the dependency pattern acts as a wildcard and matches zero or more characters. - max
Permissible NumberCvss V2score - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- max
Permissible NumberCvss V3score - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleCvssV2Score and below maxPermissibleCvssV3Score.
- max
Permissible StringSeverity - A vulnerable application dependency is ignored if the score of its associated Vulnerability is below maxPermissibleSeverity.
GetVulnerabilityAuditSource
- Description string
- Description of the external resource source.
- Oci
Resource stringId - The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the vulnerability audit.
- Type string
- Source type of the vulnerability audit.
- Description string
- Description of the external resource source.
- Oci
Resource stringId - The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the vulnerability audit.
- Type string
- Source type of the vulnerability audit.
- description String
- Description of the external resource source.
- oci
Resource StringId - The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the vulnerability audit.
- type String
- Source type of the vulnerability audit.
- description string
- Description of the external resource source.
- oci
Resource stringId - The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the vulnerability audit.
- type string
- Source type of the vulnerability audit.
- description str
- Description of the external resource source.
- oci_
resource_ strid - The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the vulnerability audit.
- type str
- Source type of the vulnerability audit.
- description String
- Description of the external resource source.
- oci
Resource StringId - The Oracle Cloud identifier (OCID) of the Oracle Cloud Infrastructure resource that triggered the vulnerability audit.
- type String
- Source type of the vulnerability audit.
GetVulnerabilityAuditUsageData
- Bucket string
- The Object Storage bucket to read the usage data from.
- Namespace string
- The Object Storage namespace to read the usage data from.
- Object string
- The Object Storage object name to read the usage data from.
- Source
Type string - The destination type. Use
objectStorageTuple
when specifying the namespace, bucket name, and object name.
- Bucket string
- The Object Storage bucket to read the usage data from.
- Namespace string
- The Object Storage namespace to read the usage data from.
- Object string
- The Object Storage object name to read the usage data from.
- Source
Type string - The destination type. Use
objectStorageTuple
when specifying the namespace, bucket name, and object name.
- bucket String
- The Object Storage bucket to read the usage data from.
- namespace String
- The Object Storage namespace to read the usage data from.
- object String
- The Object Storage object name to read the usage data from.
- source
Type String - The destination type. Use
objectStorageTuple
when specifying the namespace, bucket name, and object name.
- bucket string
- The Object Storage bucket to read the usage data from.
- namespace string
- The Object Storage namespace to read the usage data from.
- object string
- The Object Storage object name to read the usage data from.
- source
Type string - The destination type. Use
objectStorageTuple
when specifying the namespace, bucket name, and object name.
- bucket str
- The Object Storage bucket to read the usage data from.
- namespace str
- The Object Storage namespace to read the usage data from.
- object str
- The Object Storage object name to read the usage data from.
- source_
type str - The destination type. Use
objectStorageTuple
when specifying the namespace, bucket name, and object name.
- bucket String
- The Object Storage bucket to read the usage data from.
- namespace String
- The Object Storage namespace to read the usage data from.
- object String
- The Object Storage object name to read the usage data from.
- source
Type String - The destination type. Use
objectStorageTuple
when specifying the namespace, bucket name, and object name.
GetVulnerabilityAuditVulnerability
- Cvss
V2score double - Common Vulnerability Scoring System (CVSS) Version 2.
- Cvss
V3score double - Common Vulnerability Scoring System (CVSS) Version 3.
- Id string
- Unique vulnerability identifier, e.g. CVE-1999-0067.
- Is
False boolPositive - Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is
null
. - Is
Ignored bool - Indicates if the vulnerability was ignored according to the audit configuration.
- Severity string
- ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
- Source string
- Source that published the vulnerability
- Cvss
V2score float64 - Common Vulnerability Scoring System (CVSS) Version 2.
- Cvss
V3score float64 - Common Vulnerability Scoring System (CVSS) Version 3.
- Id string
- Unique vulnerability identifier, e.g. CVE-1999-0067.
- Is
False boolPositive - Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is
null
. - Is
Ignored bool - Indicates if the vulnerability was ignored according to the audit configuration.
- Severity string
- ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
- Source string
- Source that published the vulnerability
- cvss
V2score Double - Common Vulnerability Scoring System (CVSS) Version 2.
- cvss
V3score Double - Common Vulnerability Scoring System (CVSS) Version 3.
- id String
- Unique vulnerability identifier, e.g. CVE-1999-0067.
- is
False BooleanPositive - Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is
null
. - is
Ignored Boolean - Indicates if the vulnerability was ignored according to the audit configuration.
- severity String
- ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
- source String
- Source that published the vulnerability
- cvss
V2score number - Common Vulnerability Scoring System (CVSS) Version 2.
- cvss
V3score number - Common Vulnerability Scoring System (CVSS) Version 3.
- id string
- Unique vulnerability identifier, e.g. CVE-1999-0067.
- is
False booleanPositive - Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is
null
. - is
Ignored boolean - Indicates if the vulnerability was ignored according to the audit configuration.
- severity string
- ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
- source string
- Source that published the vulnerability
- cvss_
v2score float - Common Vulnerability Scoring System (CVSS) Version 2.
- cvss_
v3score float - Common Vulnerability Scoring System (CVSS) Version 3.
- id str
- Unique vulnerability identifier, e.g. CVE-1999-0067.
- is_
false_ boolpositive - Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is
null
. - is_
ignored bool - Indicates if the vulnerability was ignored according to the audit configuration.
- severity str
- ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
- source str
- Source that published the vulnerability
- cvss
V2score Number - Common Vulnerability Scoring System (CVSS) Version 2.
- cvss
V3score Number - Common Vulnerability Scoring System (CVSS) Version 3.
- id String
- Unique vulnerability identifier, e.g. CVE-1999-0067.
- is
False BooleanPositive - Indicates if the vulnerability is a false positive according to the usage data. If no usage data was provided or the service cannot infer usage of the vulnerable code then this property is
null
. - is
Ignored Boolean - Indicates if the vulnerability was ignored according to the audit configuration.
- severity String
- ADM qualitative severity score. Can be either NONE, LOW, MEDIUM, HIGH or CRITICAL.
- source String
- Source that published the vulnerability
Package Details
- Repository
- oci pulumi/pulumi-oci
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
oci
Terraform Provider.