@redhat-cloud-services/vulnerabilities-client
Advanced tools
Comparing version 1.0.29 to 1.0.30
@@ -1,1 +0,1 @@ | ||
{"components":{"parameters":{"account_id":{"description":"Account ID of user.","example":"123456","in":"path","name":"account_id","required":true,"schema":{"type":"string"}},"cve_id":{"description":"CVE id.","example":"CVE-2016-0800","in":"path","name":"cve_id","required":true,"schema":{"type":"string"}},"cvss_from":{"description":"Filter based on cvss score, starting from the value.","example":4.6,"in":"query","name":"cvss_from","schema":{"type":"number"}},"cvss_to":{"description":"Filter based on cvss score, up to the value.","example":7.2,"in":"query","name":"cvss_to","schema":{"type":"number"}},"data_format":{"description":"Format of the output data, either JSON (default) or CSV.","in":"query","name":"data_format","schema":{"example":"json","type":"string"}},"filter":{"description":"Full text filter.","example":"INV-ID-1234","in":"query","name":"filter","schema":{"type":"string"}},"inventory_id":{"description":"Inventory ID.","example":"INV-ID-0000-1234","in":"path","name":"inventory_id","required":true,"schema":{"type":"string"}},"limit":{"description":"Maximum number of records per page. Limit/Offset pagination wins over page/page_size pagination.","example":25,"in":"query","name":"limit","schema":{"type":"integer"}},"offset":{"description":"Offset of first record of paginated response. Limit/Offset pagination wins over page/page_size pagination.","example":1,"in":"query","name":"offset","schema":{"type":"integer"}},"page":{"description":"Page number of paginated response. Limit/Offset pagination wins over page/page_size pagination.","example":1,"in":"query","name":"page","schema":{"type":"integer"}},"page_size":{"description":"Page size of paginated response. Limit/Offset pagination wins over page/page_size pagination.","example":25,"in":"query","name":"page_size","schema":{"type":"integer"}},"public_from":{"description":"Filter CVEs based on their published date, starting from the date.","example":"2017-09-18T00:00:00+00:00","in":"query","name":"public_from","schema":{"type":"string"}},"public_to":{"description":"Filter CVEs based on their published date, up to the date.","example":"2017-09-18T00:00:00+00:00","in":"query","name":"public_to","schema":{"type":"string"}},"severity":{"description":"Filter based on severity IDs.","example":"5,7","in":"query","name":"severity","schema":{"type":"string"}},"sort":{"description":"Sorting used for response.","example":"-inventory_id","in":"query","name":"sort","schema":{"type":"string"}},"status_id":{"description":"Filer based on CVE status ID.","in":"query","name":"status_id","schema":{"example":"1,4","type":"string"}}},"schemas":{"AffectedSystemsOut":{"properties":{"data":{"oneOf":[{"description":"CSV export of the JSON.","type":"string"},{"items":{"properties":{"attributes":{"properties":{"inventory_id":{"description":"Host ID.","example":"INV-ID00-0000-1234","type":"string"},"last_evaluation":{"description":"Date of last evaluation.","example":"2018-09-22T16:00:00+00:00","type":"string"},"status_id":{"description":"Internal ID of the vulnerability status.","example":4,"type":"integer"},"status_name":{"description":"Status of the vulnerability for the application's point of view.","example":"Resolved","type":"string"}},"required":["inventory_id","last_evaluation","status_id","status_name"],"type":"object"},"id":{"description":"Host id.","example":"INV-ID-0000-1234","type":"string"},"type":{"description":"Type of the record.","example":"system","type":"string"}},"required":["id","type","attributes"],"type":"object"},"type":"array"}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaAffectedSystems"}},"required":["data","links","meta"],"type":"object"},"CveDetailOut":{"properties":{"data":{"properties":{"attributes":{"properties":{"cvss2_metrics":{"description":"cvss2 metrics of the CVE.","example":"AV:N/AC:M/Au:N/C:P/I:P/A:N","type":"string"},"cvss2_score":{"description":"String representation of cvss2 score of the CVE.","example":"5.800","type":"string"},"cvss3_metrics":{"description":"cvss3 metrics of the CVE.","example":"AV:N/AC:M/Au:N/C:P/I:P/A:N","type":"string"},"cvss3_score":{"description":"String representation of cvss3 score of the CVE.","example":"4.400","type":"string"},"cwe_list":{"items":{"description":"CWE.","example":["CWE-400","CWE-401"],"type":"string"},"type":"array"},"description":{"description":"Description of the CVE.","example":"A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker could...","type":"string"},"errata_list":{"description":"List of Red Hat erratas fixing the CVE.","items":{"description":"Name of the erratum.","example":["RHSA-2016:0301","RHSA-2016:0372"],"type":"string"},"type":"array"},"impact":{"description":"Red Hat security impact of the CVE.","example":"Important","type":"string"},"modified_date":{"description":"String representation of ISO-8601 formatted date of last modification of the CVE.","example":"2019-03-07T08:15:36+00:00","type":"string"},"package_list":{"description":"List of packages where the fix for the CVE appeared.","items":{"description":"Name of the package containing fix for the CVE.","example":["openssl098e-0.9.8e-29.el7_2.3.i686","openssl-devel-1:1.0.1e-51.el7_2.4.x86_64","openssl-1:1.0.1e-51.el7_2.4.x86_64","openssl-libs-1:1.0.1e-51.el7_2.4.i686","openssl-devel-1:1.0.1e-51.el7_2.4.i686","openssl-libs-1:1.0.1e-51.el7_2.4.x86_64","openssl098e-0.9.8e-29.el7_2.3.x86_64"],"type":"string"},"type":"array"},"public_date":{"description":"String representation of ISO-8601 formatted date of first public disclosure of the CVE.","example":"2016-03-01T00:00:00+00:00","type":"string"},"redhat_url":{"description":"Additional resource about the CVE, provided by Red Hat.","example":"https://access.redhat.com/security/cve/cve-2016-0800","type":"string"},"secondary_url":{"description":"Additional resources about the CVE.","example":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800","type":"string"},"synopsis":{"description":"Synopsis of the CVE.","example":"CVE-2016-0800","type":"string"}},"required":["cvss2_metrics","cvss2_score","cvss3_metrics","cvss3_score","cwe_list","description","errata_list","impact","modified_date","package_list","public_date","redhat_url","secondary_url","synopsis"],"type":"object"},"id":{"description":"CVE id.","example":"CVE-2016-0800","type":"string"},"type":{"description":"Type of the record.","example":"cve","type":"string"}},"required":["id","type","attributes"],"type":"object"}},"type":"object"},"Errors":{"properties":{"errors":{"items":{"properties":{"detail":{"description":"Error detail.","example":"Record not found.","type":"string"},"status":{"description":"String representation of HTTP status code.","example":404,"type":"string"}},"required":["detail","status"],"type":"object"},"minItems":1,"type":"array"}},"required":["errors"],"type":"object"},"Links":{"properties":{"first":{"description":"Link to first page.","example":"/api?offset=0&limit=1","type":"string"},"last":{"description":"Link to last page.","example":"/api?offset=7&limit=1","type":"string"},"next":{"description":"Link to next page.","example":"/api?offset=5&limit=1","nullable":true,"type":"string"},"previous":{"description":"Link to next page.","example":"/api?offset=3&limit=1","nullable":true,"type":"string"}},"required":["first","last","next","previous"],"type":"object"},"Meta":{"properties":{"data_format":{"description":"Format of the output data, either JSON (default) or CSV.","example":"JSON","type":"string"},"filter":{"description":"Full text filter","example":"CVE-2016-0800","nullable":true,"type":"string"},"limit":{"description":"Maximum number of paginated results.","example":25,"type":"integer"},"offset":{"description":"First record of paginated response.","example":0,"type":"integer"},"page":{"description":"Page number of paginated response.","example":1,"type":"integer"},"page_size":{"description":"Number of records per page of paginated response.","example":25,"type":"integer"},"pages":{"description":"Total number of pages of paginated response.","example":1,"type":"integer"},"sort":{"description":"Sorting filter.","example":"-inventory_id","nullable":true,"type":"string"},"total_items":{"description":"Total number of records.","example":37,"type":"integer"}},"required":["filter","limit","offset","page","page_size","pages","sort","total_items","data_format"],"type":"object"},"MetaAffectedSystems":{"allOf":[{"$ref":"#/components/schemas/Meta"},{"properties":{"status_id":{"description":"Filer based on CVE status ID.","example":"1,4","nullable":true,"type":"string"}},"required":["status_id"],"type":"object"}]},"MetaCves":{"allOf":[{"$ref":"#/components/schemas/Meta"},{"properties":{"cvss_from":{"description":"Filter based on cvss score, starting from the value.","example":4.6,"nullable":true,"type":"number"},"cvss_to":{"description":"Filter based on cvss score, up to the value.","example":7.2,"nullable":true,"type":"number"},"public_from":{"description":"Filter CVEs based on their published date, starting from the date.","example":"2017-09-18T00:00:00+00:00","nullable":true,"type":"string"},"public_to":{"description":"Filter CVEs based on their published date, up to the date.","example":"2017-09-18T00:00:00+00:00","nullable":true,"type":"string"},"severity":{"description":"Filter based on severity IDs.","example":"5,7","nullable":true,"type":"string"},"status_id":{"description":"Filer based on CVE status ID.","example":"1,4","nullable":true,"type":"string"}},"required":["cvss_from","cvss_to","public_from","public_to","status_id"],"type":"object"}]},"MetaSystems":{"allOf":[{"$ref":"#/components/schemas/Meta"},{"properties":{"opt_out":{"description":"Whether the filter to show opted out systems is active or not. If not set, defaults to hiding opted out systems.","example":false,"nullable":true,"type":"boolean"}},"required":["opt_out"],"type":"object"}]},"MetaVulnerabilitiesOut":{"allOf":[{"$ref":"#/components/schemas/Meta"},{"properties":{"cvss_from":{"description":"Filter based on cvss score, starting from the value.","example":4.6,"nullable":true,"type":"number"},"cvss_to":{"description":"Filter based on cvss score, up to the value.","example":7.2,"nullable":true,"type":"number"},"public_from":{"description":"Filter CVEs based on their published date, starting from the date.","example":"2017-09-18T00:00:00+00:00","nullable":true,"type":"string"},"public_to":{"description":"Filter CVEs based on their published date, up to the date.","example":"2017-09-18T00:00:00+00:00","nullable":true,"type":"string"},"severity":{"description":"Filter based on severity IDs.","example":"5,7","nullable":true,"type":"string"},"show_all":{"description":"Show all known vulnerabilities, regardless of number of affected systems.","example":true,"nullable":true,"type":"boolean"}},"required":["cvss_from","cvss_to","show_all","public_from","public_to","severity"],"type":"object"}]},"StatusIn":{"properties":{"cve":{"description":"CVE name.","example":"CVE-2016-0800","type":"string"},"inventory_id":{"description":"Host ID.","example":"INV-ID00-0000-1234","type":"string"},"status_id":{"description":"Status ID to be set, obtained by GET method.","example":3,"type":"integer"}},"required":["inventory_id","cve","status_id"],"type":"object"},"StatusListOut":{"properties":{"data":{"description":"List of available status/status_id pairs.","items":{"properties":{"id":{"description":"Internal status_id.","example":3,"type":"integer"},"name":{"description":"Represenation of internal status_id.","example":"Scheduled for Patch","type":"string"}},"required":["id","name"],"type":"object"},"type":"array"},"meta":{"properties":{"total_items":{"description":"Total number of available status/status_id pairs.","example":1,"type":"integer"}},"required":["total_items"],"type":"object"}},"required":["data","meta"],"type":"object"},"SystemCvesOut":{"properties":{"data":{"oneOf":[{"description":"CSV export of the JSON.","type":"string"},{"items":{"properties":{"attributes":{"properties":{"cvss2_score":{"description":"String representation of cvss2 score of the CVE.","example":"5.800","type":"string"},"cvss3_score":{"description":"String representation of cvss3 score of the CVE.","example":"4.400","type":"string"},"description":{"description":"Description of the CVE.","example":"A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker could...","type":"string"},"impact":{"description":"Red Hat security impact of the CVE.","example":"Important","type":"string"},"public_date":{"description":"String representation of ISO-8601 formatted date of first public disclosure of the CVE.","example":"2016-03-01T00:00:00+00:00","type":"string"},"status":{"description":"Status of the vulnerability for the application's point of view.","example":"Resolved","type":"string"},"status_id":{"description":"Internal ID of the vulnerability status.","example":4,"type":"integer"},"synopsis":{"description":"Synopsis of the CVE.","example":"CVE-2016-0800","type":"string"}},"required":["cvss2_score","cvss3_score","description","impact","public_date","status","status_id","synopsis"],"type":"object"},"id":{"description":"CVE id.","example":"CVE-2016-0800","type":"string"},"type":{"description":"Type of the record.","example":"cve","type":"string"}},"required":["id","type","attributes"],"type":"object"},"type":"array"}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaCves"}},"required":["data","links","meta"],"type":"object"},"SystemDetailsOut":{"properties":{"data":{"properties":{"last_evaluation":{"description":"Date of last evaluation.","example":"2018-09-22T16:00:00+00:00","type":"string"},"opt_out":{"description":"System opt out status","example":true,"type":"boolean"}},"required":["last_evaluation","opt_out"],"type":"object"}},"required":["data"],"type":"object"},"SystemListOut":{"properties":{"data":{"oneOf":[{"description":"CSV export of the JSON.","type":"string"},{"items":{"properties":{"attributes":{"properties":{"cve_count":{"description":"Number of CVE exposures for the system.","example":7,"type":"integer"},"inventory_id":{"description":"Host ID.","example":"INV-ID00-0000-1234","type":"string"},"last_evaluation":{"description":"Date of last evaluation.","example":"2018-09-22T16:00:00+00:00","type":"string"},"opt_out":{"description":"Opt out status of the system.","example":false,"type":"boolean"}},"required":["cve_count","inventory_id","last_evaluation","opt_out"],"type":"object"},"id":{"description":"Host ID.","example":"INV-ID00-0000-1234","type":"string"},"type":{"description":"Type of the record.","example":"system","type":"string"}},"required":["id","type","attributes"],"type":"object"},"type":"array"}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaSystems"}},"required":["data","links","meta"],"type":"object"},"VersionOut":{"properties":{"application_version":{"description":"Version of application.","example":0.1,"oneOf":[{"type":"string"},{"type":"number"}]},"database_version":{"description":"Version of database schema.","example":1,"oneOf":[{"type":"string"},{"type":"number"}]}},"required":["application_version","database_version"],"type":"object"},"VulnerabilitiesOut":{"properties":{"data":{"oneOf":[{"description":"CSV export of the JSON.","type":"string"},{"items":{"properties":{"attributes":{"properties":{"cvss2_score":{"description":"String representation of cvss2 score of the CVE.","example":"5.800","type":"string"},"cvss3_score":{"description":"String representation of cvss3 score of the CVE.","example":"4.400","type":"string"},"description":{"description":"Description of the CVE.","example":"A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker could...","type":"string"},"impact":{"description":"Red Hat security impact of the CVE.","example":"Important","type":"string"},"public_date":{"description":"String representation of ISO-8601 formatted date of first public disclosure of the CVE.","example":"2016-03-01T00:00:00+00:00","type":"string"},"synopsis":{"description":"Synopsis of the CVE.","example":"CVE-2016-0800","type":"string"},"systems_affected":{"description":"Number of systems affected by the CVE.","example":7,"type":"integer"}},"required":["cvss2_score","cvss3_score","description","impact","public_date","synopsis","systems_affected"],"type":"object"},"id":{"description":"CVE id.","example":"CVE-2016-0800","type":"string"},"type":{"description":"Type of the record.","example":"cve","type":"string"}},"required":["id","type","attributes"],"type":"object"},"type":"array"}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaVulnerabilitiesOut"}},"required":["data","links","meta"],"type":"object"}},"securitySchemes":{"ApiKeyAuth":{"description":"Identity header provided by 3scale (for non-prod testing only).","in":"header","name":"x-rh-identity","type":"apiKey","x-apikeyInfoFunc":"manager.base.auth"},"ApiKeyAuthInternal":{"description":"Identity header provided by 3scale (for non-prod testing only).","in":"header","name":"x-rh-identity","type":"apiKey","x-apikeyInfoFunc":"manager.base.auth_internal"},"BasicAuth":{"description":"Username and password login.","scheme":"basic","type":"http","x-basicInfoFunc":"manager.base.basic_auth"}}},"info":{"title":"Vulnerability Engine Manager","version":"0.13"},"openapi":"3.0.0","paths":{"/v1/cves/{cve_id}":{"get":{"description":"Show all information about given CVE.","operationId":"getCveDetails","parameters":[{"$ref":"#/components/parameters/cve_id"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/CveDetailOut"}}},"description":"CVE details"},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Given CVE does not exist."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Details of a CVE.","x-methodName":"getCveDetails"}},"/v1/cves/{cve_id}/affected_systems":{"get":{"description":"Report of affected systems for a given CVE.","operationId":"getAffectedSystemsByCve","parameters":[{"$ref":"#/components/parameters/filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/sort"},{"$ref":"#/components/parameters/cve_id"},{"$ref":"#/components/parameters/status_id"},{"$ref":"#/components/parameters/data_format"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/AffectedSystemsOut"}}},"description":"Report of affected systems for a given CVE."},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Given CVE does not exist."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Affected systems for a given CVE.","x-methodName":"getAffectedSystemsByCve"}},"/v1/refresh/accounts/{account_id}":{"put":{"description":"Refresh cached counts for given account ID. Admin interface, available only to internal users.","operationId":"refreshAccount","parameters":[{"$ref":"#/components/parameters/account_id"}],"responses":{"200":{"description":"Cached counts for given account sucessfully updated."},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Account was not found."},"503":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Service is running in read-only mode."}},"security":[{"ApiKeyAuthInternal":[]},{"BasicAuth":[]}],"summary":"Refresh cached counts for given account ID.","tags":["internal"],"x-methodName":"refreshAccount"}},"/v1/refresh/accounts/{account_id}/cves/{cve_id}":{"put":{"description":"Refresh cached counts for given account ID and CVE. Admin interface, available only to internal users.","operationId":"refreshAccountCve","parameters":[{"$ref":"#/components/parameters/account_id"},{"$ref":"#/components/parameters/cve_id"}],"responses":{"200":{"description":"Cached counts for given account and CVE sucessfully updated."},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Account or CVE was not found."},"503":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Service is running in read-only mode."}},"security":[{"ApiKeyAuthInternal":[]},{"BasicAuth":[]}],"summary":"Refresh cached counts for given account ID and CVE.","tags":["internal"],"x-methodName":"refreshAccountCve"}},"/v1/refresh/cves/{cve_id}":{"put":{"description":"Refresh cached counts for given CVE. Admin interface, available only to internal users.","operationId":"refreshCve","parameters":[{"$ref":"#/components/parameters/cve_id"}],"responses":{"200":{"description":"Cached counts for given CVE sucessfully updated."},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"CVE was not found."},"503":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Service is running in read-only mode."}},"security":[{"ApiKeyAuthInternal":[]},{"BasicAuth":[]}],"summary":"Refresh cached counts for given CVE.","tags":["internal"],"x-methodName":"refreshCve"}},"/v1/refresh/systems/{inventory_id}":{"put":{"description":"Refresh cached counts for given inventory ID. Admin interface, available only to internal users.","operationId":"refreshSystem","parameters":[{"$ref":"#/components/parameters/inventory_id"}],"responses":{"200":{"description":"Cached counts for given system sucessfully updated."},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"System was not found."},"503":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Service is running in read-only mode."}},"security":[{"ApiKeyAuthInternal":[]},{"BasicAuth":[]}],"summary":"Refresh cached counts for given inventory ID.","tags":["internal"],"x-methodName":"refreshSystem"}},"/v1/status":{"get":{"description":"Returns available status and status_id pairs where status_id is internal ID of the status.","operationId":"getStatusList","responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/StatusListOut"}}},"description":"List of status/status_id pairs."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Available status/status_id pairs.","x-methodName":"getStatusList"},"patch":{"description":"Sets status for given host and CVE.","operationId":"setStatus","requestBody":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/StatusIn","x-body-name":"data"}}},"description":"Values to be set.","required":true},"responses":{"200":{"description":"Status sucessfully updated."},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Given host/CVE does not exist."},"503":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Service is running in read-only mode."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Set status for system vulnerability.","x-methodName":"setStatus"}},"/v1/systems":{"get":{"description":"List systems visible to logged in account with basic information related to vulnerabilities.","operationId":"getSystemsList","parameters":[{"$ref":"#/components/parameters/filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/sort"},{"$ref":"#/components/parameters/data_format"},{"description":"If set to true, shows systems which have been opted out from vulnerability application. If not set defaults to false.","example":true,"in":"query","name":"opt_out","schema":{"type":"boolean"}}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/SystemListOut"}}},"description":"System list"}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"List systems.","x-methodName":"getSystemsList"}},"/v1/systems/{inventory_id}":{"delete":{"description":"Deletes system from database.","operationId":"deleteSystem","parameters":[{"$ref":"#/components/parameters/inventory_id"}],"responses":{"200":{"description":"System has been deleted."},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"System has not been found in the database."},"503":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Service is running in read-only mode."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Delete system.","x-methodName":"deleteSystem"},"get":{"description":"Provides details of a system, e.g. it's opt out status.","operationId":"getSystemDetails","parameters":[{"$ref":"#/components/parameters/inventory_id"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/SystemDetailsOut"}}},"description":"System details"},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"System has not been found in the database."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"System details.","x-methodName":"getSystemDetails"}},"/v1/systems/{inventory_id}/cves":{"get":{"description":"Shows detailed infomation about all CVEs the system is exposed to.","operationId":"getCveListBySystem","parameters":[{"$ref":"#/components/parameters/inventory_id"},{"$ref":"#/components/parameters/filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/sort"},{"$ref":"#/components/parameters/cvss_from"},{"$ref":"#/components/parameters/cvss_to"},{"$ref":"#/components/parameters/public_from"},{"$ref":"#/components/parameters/public_to"},{"$ref":"#/components/parameters/severity"},{"$ref":"#/components/parameters/status_id"},{"$ref":"#/components/parameters/data_format"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/SystemCvesOut"}}},"description":"CVE report."},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"System has not been found in the database."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"CVE report for a system.","x-methodName":"getCveListBySystem"}},"/v1/systems/{inventory_id}/opt_out":{"patch":{"description":"Opts in/out a systems. Opted out system is not shown and manageable by the vulnerability application.","operationId":"setSystemOptOut","parameters":[{"$ref":"#/components/parameters/inventory_id"},{"description":"opt_out setting of the host.","in":"query","name":"value","required":true,"schema":{"example":true,"type":"boolean"}}],"responses":{"200":{"description":"System setting has been updated."},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"System has not been found in the database."},"503":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Service is running in read-only mode."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Opt in/out a system to/from vulnerability application.","x-methodName":"setSystemOptOut"}},"/v1/version":{"get":{"description":"Get application version.","operationId":"getVersion","responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/VersionOut"}}},"description":"Application version."}},"summary":"Application version","x-methodName":"getVersion"}},"/v1/vulnerabilities/cves":{"get":{"description":"Overview of vulnerabilities across whole host inventory.","operationId":"getCveList","parameters":[{"$ref":"#/components/parameters/filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/sort"},{"$ref":"#/components/parameters/cvss_from"},{"$ref":"#/components/parameters/cvss_to"},{"$ref":"#/components/parameters/public_from"},{"$ref":"#/components/parameters/public_to"},{"$ref":"#/components/parameters/severity"},{"$ref":"#/components/parameters/data_format"},{"description":"Show all known vulnerabilities, regardless of number of affected systems.","example":true,"in":"query","name":"show_all","schema":{"type":"boolean"}}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/VulnerabilitiesOut"}}},"description":"Vulnerabilities overview."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Vulnerabilities overview.","x-methodName":"getCveList"}}},"servers":[{"url":"/api/vulnerability"}]} | ||
{"openapi":"3.0.0","info":{"title":"Vulnerability Engine Manager"},"paths":{"/v1/version":{"get":{"summary":"Application version","description":"Get application version.","operationId":"getVersion","x-methodName":"getVersion","responses":{"200":{"description":"Application version.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/VersionOut"}}}}}}},"/v1/cves/{cve_id}":{"get":{"summary":"Details of a CVE.","description":"Show all information about given CVE.","operationId":"getCveDetails","x-methodName":"getCveDetails","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"CVE details","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/CveDetailOut"}}}},"404":{"description":"Given CVE does not exist.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/cve_id"}]}},"/v1/cves/{cve_id}/affected_systems":{"get":{"summary":"Affected systems for a given CVE.","description":"Report of affected systems for a given CVE.","operationId":"getAffectedSystemsByCve","x-methodName":"getAffectedSystemsByCve","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"Report of affected systems for a given CVE.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/AffectedSystemsOut"}}}},"404":{"description":"Given CVE does not exist.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/sort"},{"$ref":"#/components/parameters/cve_id"},{"$ref":"#/components/parameters/status_id"},{"$ref":"#/components/parameters/data_format"}]}},"/v1/status":{"get":{"summary":"Available status/status_id pairs.","description":"Returns available status and status_id pairs where status_id is internal ID of the status.","operationId":"getStatusList","x-methodName":"getStatusList","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"List of status/status_id pairs.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/StatusListOut"}}}}}},"patch":{"summary":"Set status for system vulnerability.","description":"Sets status for given host and CVE.","operationId":"setStatus","x-methodName":"setStatus","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"requestBody":{"description":"Values to be set.","required":true,"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/StatusIn","x-body-name":"data"}}}},"responses":{"200":{"description":"Status sucessfully updated."},"404":{"description":"Given host/CVE does not exist.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}},"503":{"description":"Service is running in read-only mode.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}}}},"/v1/systems":{"get":{"summary":"List systems.","description":"List systems visible to logged in account with basic information related to vulnerabilities.","operationId":"getSystemsList","x-methodName":"getSystemsList","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"System list","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/SystemListOut"}}}}},"parameters":[{"$ref":"#/components/parameters/filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/sort"},{"$ref":"#/components/parameters/data_format"},{"in":"query","name":"opt_out","description":"If set to true, shows systems which have been opted out from vulnerability application. If not set defaults to false.","schema":{"type":"boolean"},"example":true}]}},"/v1/systems/{inventory_id}":{"get":{"summary":"System details.","description":"Provides details of a system, e.g. it's opt out status.","operationId":"getSystemDetails","x-methodName":"getSystemDetails","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"System details","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/SystemDetailsOut"}}}},"404":{"description":"System has not been found in the database.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/inventory_id"}]},"delete":{"summary":"Delete system.","description":"Deletes system from database.","operationId":"deleteSystem","x-methodName":"deleteSystem","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"System has been deleted."},"404":{"description":"System has not been found in the database.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}},"503":{"description":"Service is running in read-only mode.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/inventory_id"}]}},"/v1/systems/{inventory_id}/cves":{"get":{"summary":"CVE report for a system.","description":"Shows detailed infomation about all CVEs the system is exposed to.","operationId":"getCveListBySystem","x-methodName":"getCveListBySystem","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"CVE report.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/SystemCvesOut"}}}},"404":{"description":"System has not been found in the database.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/inventory_id"},{"$ref":"#/components/parameters/filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/sort"},{"$ref":"#/components/parameters/cvss_from"},{"$ref":"#/components/parameters/cvss_to"},{"$ref":"#/components/parameters/public_from"},{"$ref":"#/components/parameters/public_to"},{"$ref":"#/components/parameters/impact"},{"$ref":"#/components/parameters/status_id"},{"$ref":"#/components/parameters/data_format"}]}},"/v1/systems/{inventory_id}/opt_out":{"patch":{"summary":"Opt in/out a system to/from vulnerability application.","description":"Opts in/out a systems. Opted out system is not shown and manageable by the vulnerability application.","operationId":"setSystemOptOut","x-methodName":"setSystemOptOut","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"System setting has been updated."},"404":{"description":"System has not been found in the database.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}},"503":{"description":"Service is running in read-only mode.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/inventory_id"},{"in":"query","name":"value","description":"opt_out setting of the host.","required":true,"schema":{"type":"boolean","example":true}}]}},"/v1/vulnerabilities/cves":{"get":{"summary":"Vulnerabilities overview.","description":"Overview of vulnerabilities across whole host inventory.","operationId":"getCveList","x-methodName":"getCveList","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"Vulnerabilities overview.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/VulnerabilitiesOut"}}}}},"parameters":[{"$ref":"#/components/parameters/filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/sort"},{"$ref":"#/components/parameters/cvss_from"},{"$ref":"#/components/parameters/cvss_to"},{"$ref":"#/components/parameters/public_from"},{"$ref":"#/components/parameters/public_to"},{"$ref":"#/components/parameters/impact"},{"$ref":"#/components/parameters/data_format"},{"in":"query","name":"show_all","description":"Show all known vulnerabilities, regardless of number of affected systems.","schema":{"type":"boolean"},"example":true}]}},"/v1/refresh/accounts/{account_id}":{"put":{"summary":"Refresh cached counts for given account ID.","description":"Refresh cached counts for given account ID. Admin interface, available only to internal users.","operationId":"refreshAccount","x-methodName":"refreshAccount","security":[{"ApiKeyAuthInternal":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"Cached counts for given account sucessfully updated."},"404":{"description":"Account was not found.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}},"503":{"description":"Service is running in read-only mode.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/account_id"}],"tags":["internal"]}},"/v1/refresh/accounts/{account_id}/cves/{cve_id}":{"put":{"summary":"Refresh cached counts for given account ID and CVE.","description":"Refresh cached counts for given account ID and CVE. Admin interface, available only to internal users.","operationId":"refreshAccountCve","x-methodName":"refreshAccountCve","security":[{"ApiKeyAuthInternal":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"Cached counts for given account and CVE sucessfully updated."},"404":{"description":"Account or CVE was not found.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}},"503":{"description":"Service is running in read-only mode.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/account_id"},{"$ref":"#/components/parameters/cve_id"}],"tags":["internal"]}},"/v1/refresh/cves/{cve_id}":{"put":{"summary":"Refresh cached counts for given CVE.","description":"Refresh cached counts for given CVE. Admin interface, available only to internal users.","operationId":"refreshCve","x-methodName":"refreshCve","security":[{"ApiKeyAuthInternal":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"Cached counts for given CVE sucessfully updated."},"404":{"description":"CVE was not found.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}},"503":{"description":"Service is running in read-only mode.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/cve_id"}],"tags":["internal"]}},"/v1/refresh/systems/{inventory_id}":{"put":{"summary":"Refresh cached counts for given inventory ID.","description":"Refresh cached counts for given inventory ID. Admin interface, available only to internal users.","operationId":"refreshSystem","x-methodName":"refreshSystem","security":[{"ApiKeyAuthInternal":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"Cached counts for given system sucessfully updated."},"404":{"description":"System was not found.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}},"503":{"description":"Service is running in read-only mode.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/inventory_id"}],"tags":["internal"]}}},"components":{"parameters":{"filter":{"in":"query","name":"filter","description":"Full text filter.","schema":{"type":"string"},"example":"INV-ID-1234"},"limit":{"in":"query","name":"limit","description":"Maximum number of records per page. Limit/Offset pagination wins over page/page_size pagination.","schema":{"type":"integer"},"example":25},"offset":{"in":"query","name":"offset","description":"Offset of first record of paginated response. Limit/Offset pagination wins over page/page_size pagination.","schema":{"type":"integer"},"example":1},"page":{"in":"query","name":"page","description":"Page number of paginated response. Limit/Offset pagination wins over page/page_size pagination.","schema":{"type":"integer"},"example":1},"page_size":{"in":"query","name":"page_size","description":"Page size of paginated response. Limit/Offset pagination wins over page/page_size pagination.","schema":{"type":"integer"},"example":25},"sort":{"in":"query","name":"sort","description":"Sorting used for response.","schema":{"type":"string"},"example":"-inventory_id"},"inventory_id":{"in":"path","name":"inventory_id","description":"Inventory ID.","required":true,"schema":{"type":"string"},"example":"INV-ID-0000-1234"},"cve_id":{"in":"path","name":"cve_id","description":"CVE id.","required":true,"schema":{"type":"string"},"example":"CVE-2016-0800"},"public_from":{"in":"query","name":"public_from","description":"Filter CVEs based on their published date, starting from the date.","schema":{"type":"string"},"example":"2017-09-18T00:00:00+00:00"},"public_to":{"in":"query","name":"public_to","description":"Filter CVEs based on their published date, up to the date.","schema":{"type":"string"},"example":"2017-09-18T00:00:00+00:00"},"cvss_from":{"in":"query","name":"cvss_from","description":"Filter based on cvss score, starting from the value.","schema":{"type":"number"},"example":4.6},"cvss_to":{"in":"query","name":"cvss_to","description":"Filter based on cvss score, up to the value.","schema":{"type":"number"},"example":7.2},"impact":{"in":"query","name":"impact","description":"Filter based on impact IDs.","schema":{"type":"string"},"example":"5,7"},"status_id":{"in":"query","name":"status_id","description":"Filer based on CVE status ID.","schema":{"type":"string","example":"1,4"}},"data_format":{"in":"query","name":"data_format","description":"Format of the output data, either JSON (default) or CSV.","schema":{"type":"string","example":"json"}},"account_id":{"in":"path","name":"account_id","description":"Account ID of user.","required":true,"schema":{"type":"string"},"example":"123456"}},"securitySchemes":{"BasicAuth":{"type":"http","scheme":"basic","description":"Username and password login.","x-basicInfoFunc":"manager.base.basic_auth"},"ApiKeyAuth":{"type":"apiKey","in":"header","name":"x-rh-identity","description":"Identity header provided by 3scale (for non-prod testing only).","x-apikeyInfoFunc":"manager.base.auth"},"ApiKeyAuthInternal":{"type":"apiKey","in":"header","name":"x-rh-identity","description":"Identity header provided by 3scale (for non-prod testing only).","x-apikeyInfoFunc":"manager.base.auth_internal"}},"schemas":{"Errors":{"type":"object","properties":{"errors":{"type":"array","items":{"type":"object","properties":{"detail":{"type":"string","description":"Error detail.","example":"Record not found."},"status":{"type":"string","description":"String representation of HTTP status code.","example":404}},"required":["detail","status"]},"minItems":1}},"required":["errors"]},"Links":{"type":"object","properties":{"first":{"type":"string","description":"Link to first page.","example":"/api?offset=0&limit=1"},"last":{"type":"string","description":"Link to last page.","example":"/api?offset=7&limit=1"},"next":{"type":"string","description":"Link to next page.","example":"/api?offset=5&limit=1","nullable":true},"previous":{"type":"string","description":"Link to next page.","example":"/api?offset=3&limit=1","nullable":true}},"required":["first","last","next","previous"]},"Meta":{"type":"object","properties":{"filter":{"type":"string","description":"Full text filter","example":"CVE-2016-0800","nullable":true},"limit":{"type":"integer","description":"Maximum number of paginated results.","example":25},"offset":{"type":"integer","description":"First record of paginated response.","example":0},"page":{"type":"integer","description":"Page number of paginated response.","example":1},"page_size":{"type":"integer","description":"Number of records per page of paginated response.","example":25},"pages":{"type":"integer","description":"Total number of pages of paginated response.","example":1},"sort":{"type":"string","description":"Sorting filter.","example":"-inventory_id","nullable":true},"total_items":{"type":"integer","description":"Total number of records.","example":37},"data_format":{"type":"string","description":"Format of the output data, either JSON (default) or CSV.","example":"JSON"}},"required":["filter","limit","offset","page","page_size","pages","sort","total_items","data_format"]},"MetaVulnerabilitiesOut":{"allOf":[{"$ref":"#/components/schemas/Meta"},{"type":"object","properties":{"cvss_from":{"type":"number","description":"Filter based on cvss score, starting from the value.","example":4.6,"nullable":true},"cvss_to":{"type":"number","description":"Filter based on cvss score, up to the value.","example":7.2,"nullable":true},"show_all":{"type":"boolean","description":"Show all known vulnerabilities, regardless of number of affected systems.","example":true,"nullable":true},"public_from":{"type":"string","description":"Filter CVEs based on their published date, starting from the date.","example":"2017-09-18T00:00:00+00:00","nullable":true},"public_to":{"type":"string","description":"Filter CVEs based on their published date, up to the date.","example":"2017-09-18T00:00:00+00:00","nullable":true},"impact":{"type":"string","description":"Filter based on impact IDs.","example":"5,7","nullable":true}},"required":["cvss_from","cvss_to","show_all","public_from","public_to","impact"]}]},"MetaAffectedSystems":{"allOf":[{"$ref":"#/components/schemas/Meta"},{"type":"object","properties":{"status_id":{"type":"string","description":"Filer based on CVE status ID.","example":"1,4","nullable":true}},"required":["status_id"]}]},"MetaSystems":{"allOf":[{"$ref":"#/components/schemas/Meta"},{"type":"object","properties":{"opt_out":{"type":"boolean","description":"Whether the filter to show opted out systems is active or not. If not set, defaults to hiding opted out systems.","example":false,"nullable":true}},"required":["opt_out"]}]},"MetaCves":{"allOf":[{"$ref":"#/components/schemas/Meta"},{"type":"object","properties":{"cvss_from":{"type":"number","description":"Filter based on cvss score, starting from the value.","example":4.6,"nullable":true},"cvss_to":{"type":"number","description":"Filter based on cvss score, up to the value.","example":7.2,"nullable":true},"public_from":{"type":"string","description":"Filter CVEs based on their published date, starting from the date.","example":"2017-09-18T00:00:00+00:00","nullable":true},"public_to":{"type":"string","description":"Filter CVEs based on their published date, up to the date.","example":"2017-09-18T00:00:00+00:00","nullable":true},"impact":{"type":"string","description":"Filter based on impact IDs.","example":"5,7","nullable":true},"status_id":{"type":"string","description":"Filer based on CVE status ID.","example":"1,4","nullable":true}},"required":["cvss_from","cvss_to","public_from","public_to","status_id"]}]},"MetaCvesSystems":{"allOf":[{"$ref":"#/components/schemas/MetaCves"},{"type":"object","properties":{"opt_out":{"type":"boolean","description":"If given system was opted out.","example":true}},"required":["opt_out"]}]},"AffectedSystemsOut":{"type":"object","properties":{"data":{"oneOf":[{"type":"string","description":"CSV export of the JSON."},{"type":"array","items":{"type":"object","properties":{"id":{"type":"string","description":"Host id.","example":"INV-ID-0000-1234"},"type":{"type":"string","description":"Type of the record.","example":"system"},"attributes":{"type":"object","properties":{"inventory_id":{"type":"string","description":"Host ID.","example":"INV-ID00-0000-1234"},"last_evaluation":{"type":"string","description":"Date of last evaluation.","example":"2018-09-22T16:00:00+00:00"},"status_id":{"type":"integer","description":"Internal ID of the vulnerability status.","example":4},"status_name":{"type":"string","description":"Status of the vulnerability for the application's point of view.","example":"Resolved"}},"required":["inventory_id","last_evaluation","status_id","status_name"]}},"required":["id","type","attributes"]}}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaAffectedSystems"}},"required":["data","links","meta"]},"CveDetailOut":{"type":"object","properties":{"data":{"type":"object","properties":{"id":{"type":"string","description":"CVE id.","example":"CVE-2016-0800"},"type":{"type":"string","description":"Type of the record.","example":"cve"},"attributes":{"type":"object","properties":{"cvss2_metrics":{"type":"string","description":"cvss2 metrics of the CVE.","example":"AV:N/AC:M/Au:N/C:P/I:P/A:N"},"cvss2_score":{"type":"string","description":"String representation of cvss2 score of the CVE.","example":"5.800"},"cvss3_metrics":{"type":"string","description":"cvss3 metrics of the CVE.","example":"AV:N/AC:M/Au:N/C:P/I:P/A:N"},"cvss3_score":{"type":"string","description":"String representation of cvss3 score of the CVE.","example":"4.400"},"cwe_list":{"type":"array","items":{"type":"string","description":"CWE.","example":["CWE-400","CWE-401"]}},"description":{"type":"string","description":"Description of the CVE.","example":"A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker could..."},"errata_list":{"type":"array","description":"List of Red Hat erratas fixing the CVE.","items":{"type":"string","description":"Name of the erratum.","example":["RHSA-2016:0301","RHSA-2016:0372"]}},"modified_date":{"type":"string","description":"String representation of ISO-8601 formatted date of last modification of the CVE.","example":"2019-03-07T08:15:36+00:00"},"impact":{"type":"string","description":"Red Hat security impact of the CVE.","example":"Important"},"package_list":{"type":"array","description":"List of packages where the fix for the CVE appeared.","items":{"type":"string","description":"Name of the package containing fix for the CVE.","example":["openssl098e-0.9.8e-29.el7_2.3.i686","openssl-devel-1:1.0.1e-51.el7_2.4.x86_64","openssl-1:1.0.1e-51.el7_2.4.x86_64","openssl-libs-1:1.0.1e-51.el7_2.4.i686","openssl-devel-1:1.0.1e-51.el7_2.4.i686","openssl-libs-1:1.0.1e-51.el7_2.4.x86_64","openssl098e-0.9.8e-29.el7_2.3.x86_64"]}},"public_date":{"type":"string","description":"String representation of ISO-8601 formatted date of first public disclosure of the CVE.","example":"2016-03-01T00:00:00+00:00"},"redhat_url":{"type":"string","description":"Additional resource about the CVE, provided by Red Hat.","example":"https://access.redhat.com/security/cve/cve-2016-0800"},"secondary_url":{"type":"string","description":"Additional resources about the CVE.","example":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800"},"synopsis":{"type":"string","description":"Synopsis of the CVE.","example":"CVE-2016-0800"}},"required":["cvss2_metrics","cvss2_score","cvss3_metrics","cvss3_score","cwe_list","description","errata_list","impact","modified_date","package_list","public_date","redhat_url","secondary_url","synopsis"]}},"required":["id","type","attributes"]}}},"StatusIn":{"type":"object","properties":{"inventory_id":{"type":"string","description":"Host ID.","example":"INV-ID00-0000-1234"},"cve":{"type":"string","description":"CVE name.","example":"CVE-2016-0800"},"status_id":{"type":"integer","description":"Status ID to be set, obtained by GET method.","example":3}},"required":["inventory_id","cve","status_id"]},"StatusListOut":{"type":"object","properties":{"data":{"type":"array","description":"List of available status/status_id pairs.","items":{"type":"object","properties":{"id":{"type":"integer","description":"Internal status_id.","example":3},"name":{"type":"string","description":"Represenation of internal status_id.","example":"Scheduled for Patch"}},"required":["id","name"]}},"meta":{"type":"object","properties":{"total_items":{"type":"integer","description":"Total number of available status/status_id pairs.","example":1}},"required":["total_items"]}},"required":["data","meta"]},"SystemCvesOut":{"type":"object","properties":{"data":{"oneOf":[{"type":"string","description":"CSV export of the JSON."},{"type":"array","items":{"type":"object","properties":{"id":{"type":"string","description":"CVE id.","example":"CVE-2016-0800"},"type":{"type":"string","description":"Type of the record.","example":"cve"},"attributes":{"type":"object","properties":{"cvss2_score":{"type":"string","description":"String representation of cvss2 score of the CVE.","example":"5.800"},"cvss3_score":{"type":"string","description":"String representation of cvss3 score of the CVE.","example":"4.400"},"description":{"type":"string","description":"Description of the CVE.","example":"A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker could..."},"impact":{"type":"string","description":"Red Hat security impact of the CVE.","example":"Important"},"public_date":{"type":"string","description":"String representation of ISO-8601 formatted date of first public disclosure of the CVE.","example":"2016-03-01T00:00:00+00:00"},"status":{"type":"string","description":"Status of the vulnerability for the application's point of view.","example":"Resolved"},"status_id":{"type":"integer","description":"Internal ID of the vulnerability status.","example":4},"synopsis":{"type":"string","description":"Synopsis of the CVE.","example":"CVE-2016-0800"}},"required":["cvss2_score","cvss3_score","description","impact","public_date","status","status_id","synopsis"]}},"required":["id","type","attributes"]}}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaCves"}},"required":["data","links","meta"]},"SystemDetailsOut":{"type":"object","properties":{"data":{"type":"object","properties":{"last_evaluation":{"type":"string","description":"Date of last evaluation.","example":"2018-09-22T16:00:00+00:00","nullable":true},"opt_out":{"type":"boolean","description":"System opt out status.","example":true},"last_upload":{"type":"string","description":"Date of the latest upload of archive.","example":"2018-09-22T16:00:00+00:00","nullable":true}},"required":["last_evaluation","opt_out","last_upload"]}},"required":["data"]},"SystemListOut":{"type":"object","properties":{"data":{"oneOf":[{"type":"string","description":"CSV export of the JSON."},{"type":"array","items":{"type":"object","properties":{"id":{"type":"string","description":"Host ID.","example":"INV-ID00-0000-1234"},"type":{"type":"string","description":"Type of the record.","example":"system"},"attributes":{"type":"object","properties":{"cve_count":{"type":"integer","description":"Number of CVE exposures for the system.","example":7,"nullable":true},"inventory_id":{"type":"string","description":"Host ID.","example":"INV-ID00-0000-1234"},"last_evaluation":{"type":"string","description":"Date of last evaluation.","example":"2018-09-22T16:00:00+00:00"},"opt_out":{"type":"boolean","description":"Opt out status of the system.","example":false},"last_upload":{"type":"string","description":"Date of the latest upload of archive.","example":"2018-09-22T16:00:00+00:00","nullable":true}},"required":["cve_count","inventory_id","last_evaluation","opt_out","last_upload"]}},"required":["id","type","attributes"]}}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaSystems"}},"required":["data","links","meta"]},"VulnerabilitiesOut":{"type":"object","properties":{"data":{"oneOf":[{"type":"string","description":"CSV export of the JSON."},{"type":"array","items":{"type":"object","properties":{"id":{"type":"string","description":"CVE id.","example":"CVE-2016-0800"},"type":{"type":"string","description":"Type of the record.","example":"cve"},"attributes":{"type":"object","properties":{"cvss2_score":{"type":"string","description":"String representation of cvss2 score of the CVE.","example":"5.800"},"cvss3_score":{"type":"string","description":"String representation of cvss3 score of the CVE.","example":"4.400"},"description":{"type":"string","description":"Description of the CVE.","example":"A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker could..."},"impact":{"type":"string","description":"Red Hat security impact of the CVE.","example":"Important"},"public_date":{"type":"string","description":"String representation of ISO-8601 formatted date of first public disclosure of the CVE.","example":"2016-03-01T00:00:00+00:00"},"synopsis":{"type":"string","description":"Synopsis of the CVE.","example":"CVE-2016-0800"},"systems_affected":{"type":"integer","description":"Number of systems affected by the CVE.","example":7}},"required":["cvss2_score","cvss3_score","description","impact","public_date","synopsis","systems_affected"]}},"required":["id","type","attributes"]}}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaVulnerabilitiesOut"}},"required":["data","links","meta"]},"VersionOut":{"type":"object","properties":{"application_version":{"oneOf":[{"type":"string"},{"type":"number"}],"description":"Version of application.","example":0.1},"database_version":{"oneOf":[{"type":"string"},{"type":"number"}],"description":"Version of database schema.","example":1}},"required":["application_version","database_version"]}}}} |
@@ -5,3 +5,3 @@ /** | ||
* | ||
* OpenAPI spec version: 0.13 | ||
* OpenAPI spec version: 1.0.0 | ||
* | ||
@@ -102,8 +102,2 @@ * | ||
/** | ||
* | ||
* @type {CveDetailOutDataAttributes} | ||
* @memberof CveDetailOutData | ||
*/ | ||
attributes: CveDetailOutDataAttributes; | ||
/** | ||
* CVE id. | ||
@@ -120,2 +114,8 @@ * @type {string} | ||
type: string; | ||
/** | ||
* | ||
* @type {CveDetailOutDataAttributes} | ||
* @memberof CveDetailOutData | ||
*/ | ||
attributes: CveDetailOutDataAttributes; | ||
} | ||
@@ -171,13 +171,13 @@ /** | ||
/** | ||
* Red Hat security impact of the CVE. | ||
* String representation of ISO-8601 formatted date of last modification of the CVE. | ||
* @type {string} | ||
* @memberof CveDetailOutDataAttributes | ||
*/ | ||
impact: string; | ||
modifiedDate: string; | ||
/** | ||
* String representation of ISO-8601 formatted date of last modification of the CVE. | ||
* Red Hat security impact of the CVE. | ||
* @type {string} | ||
* @memberof CveDetailOutDataAttributes | ||
*/ | ||
modifiedDate: string; | ||
impact: string; | ||
/** | ||
@@ -284,8 +284,2 @@ * List of packages where the fix for the CVE appeared. | ||
/** | ||
* Format of the output data, either JSON (default) or CSV. | ||
* @type {string} | ||
* @memberof Meta | ||
*/ | ||
dataFormat: string; | ||
/** | ||
* Full text filter | ||
@@ -338,2 +332,8 @@ * @type {string} | ||
totalItems: number; | ||
/** | ||
* Format of the output data, either JSON (default) or CSV. | ||
* @type {string} | ||
* @memberof Meta | ||
*/ | ||
dataFormat: string; | ||
} | ||
@@ -347,8 +347,2 @@ /** | ||
/** | ||
* Format of the output data, either JSON (default) or CSV. | ||
* @type {string} | ||
* @memberof MetaAffectedSystems | ||
*/ | ||
dataFormat: string; | ||
/** | ||
* Full text filter | ||
@@ -402,2 +396,8 @@ * @type {string} | ||
/** | ||
* Format of the output data, either JSON (default) or CSV. | ||
* @type {string} | ||
* @memberof MetaAffectedSystems | ||
*/ | ||
dataFormat: string; | ||
/** | ||
* Filer based on CVE status ID. | ||
@@ -416,8 +416,2 @@ * @type {string} | ||
/** | ||
* Format of the output data, either JSON (default) or CSV. | ||
* @type {string} | ||
* @memberof MetaCves | ||
*/ | ||
dataFormat: string; | ||
/** | ||
* Full text filter | ||
@@ -471,2 +465,8 @@ * @type {string} | ||
/** | ||
* Format of the output data, either JSON (default) or CSV. | ||
* @type {string} | ||
* @memberof MetaCves | ||
*/ | ||
dataFormat: string; | ||
/** | ||
* Filter based on cvss score, starting from the value. | ||
@@ -496,7 +496,7 @@ * @type {number} | ||
/** | ||
* Filter based on severity IDs. | ||
* Filter based on impact IDs. | ||
* @type {string} | ||
* @memberof MetaCves | ||
*/ | ||
severity?: string | null; | ||
impact?: string | null; | ||
/** | ||
@@ -512,12 +512,109 @@ * Filer based on CVE status ID. | ||
* @export | ||
* @interface MetaSystems | ||
* @interface MetaCvesSystems | ||
*/ | ||
export interface MetaSystems { | ||
export interface MetaCvesSystems { | ||
/** | ||
* Full text filter | ||
* @type {string} | ||
* @memberof MetaCvesSystems | ||
*/ | ||
filter: string | null; | ||
/** | ||
* Maximum number of paginated results. | ||
* @type {number} | ||
* @memberof MetaCvesSystems | ||
*/ | ||
limit: number; | ||
/** | ||
* First record of paginated response. | ||
* @type {number} | ||
* @memberof MetaCvesSystems | ||
*/ | ||
offset: number; | ||
/** | ||
* Page number of paginated response. | ||
* @type {number} | ||
* @memberof MetaCvesSystems | ||
*/ | ||
page: number; | ||
/** | ||
* Number of records per page of paginated response. | ||
* @type {number} | ||
* @memberof MetaCvesSystems | ||
*/ | ||
pageSize: number; | ||
/** | ||
* Total number of pages of paginated response. | ||
* @type {number} | ||
* @memberof MetaCvesSystems | ||
*/ | ||
pages: number; | ||
/** | ||
* Sorting filter. | ||
* @type {string} | ||
* @memberof MetaCvesSystems | ||
*/ | ||
sort: string | null; | ||
/** | ||
* Total number of records. | ||
* @type {number} | ||
* @memberof MetaCvesSystems | ||
*/ | ||
totalItems: number; | ||
/** | ||
* Format of the output data, either JSON (default) or CSV. | ||
* @type {string} | ||
* @memberof MetaSystems | ||
* @memberof MetaCvesSystems | ||
*/ | ||
dataFormat: string; | ||
/** | ||
* Filter based on cvss score, starting from the value. | ||
* @type {number} | ||
* @memberof MetaCvesSystems | ||
*/ | ||
cvssFrom: number | null; | ||
/** | ||
* Filter based on cvss score, up to the value. | ||
* @type {number} | ||
* @memberof MetaCvesSystems | ||
*/ | ||
cvssTo: number | null; | ||
/** | ||
* Filter CVEs based on their published date, starting from the date. | ||
* @type {string} | ||
* @memberof MetaCvesSystems | ||
*/ | ||
publicFrom: string | null; | ||
/** | ||
* Filter CVEs based on their published date, up to the date. | ||
* @type {string} | ||
* @memberof MetaCvesSystems | ||
*/ | ||
publicTo: string | null; | ||
/** | ||
* Filter based on impact IDs. | ||
* @type {string} | ||
* @memberof MetaCvesSystems | ||
*/ | ||
impact?: string | null; | ||
/** | ||
* Filer based on CVE status ID. | ||
* @type {string} | ||
* @memberof MetaCvesSystems | ||
*/ | ||
statusId: string | null; | ||
/** | ||
* If given system was opted out. | ||
* @type {boolean} | ||
* @memberof MetaCvesSystems | ||
*/ | ||
optOut: boolean; | ||
} | ||
/** | ||
* | ||
* @export | ||
* @interface MetaSystems | ||
*/ | ||
export interface MetaSystems { | ||
/** | ||
* Full text filter | ||
@@ -571,2 +668,8 @@ * @type {string} | ||
/** | ||
* Format of the output data, either JSON (default) or CSV. | ||
* @type {string} | ||
* @memberof MetaSystems | ||
*/ | ||
dataFormat: string; | ||
/** | ||
* Whether the filter to show opted out systems is active or not. If not set, defaults to hiding opted out systems. | ||
@@ -585,8 +688,2 @@ * @type {boolean} | ||
/** | ||
* Format of the output data, either JSON (default) or CSV. | ||
* @type {string} | ||
* @memberof MetaVulnerabilitiesOut | ||
*/ | ||
dataFormat: string; | ||
/** | ||
* Full text filter | ||
@@ -640,2 +737,8 @@ * @type {string} | ||
/** | ||
* Format of the output data, either JSON (default) or CSV. | ||
* @type {string} | ||
* @memberof MetaVulnerabilitiesOut | ||
*/ | ||
dataFormat: string; | ||
/** | ||
* Filter based on cvss score, starting from the value. | ||
@@ -653,2 +756,8 @@ * @type {number} | ||
/** | ||
* Show all known vulnerabilities, regardless of number of affected systems. | ||
* @type {boolean} | ||
* @memberof MetaVulnerabilitiesOut | ||
*/ | ||
showAll: boolean | null; | ||
/** | ||
* Filter CVEs based on their published date, starting from the date. | ||
@@ -666,13 +775,7 @@ * @type {string} | ||
/** | ||
* Filter based on severity IDs. | ||
* Filter based on impact IDs. | ||
* @type {string} | ||
* @memberof MetaVulnerabilitiesOut | ||
*/ | ||
severity: string | null; | ||
/** | ||
* Show all known vulnerabilities, regardless of number of affected systems. | ||
* @type {boolean} | ||
* @memberof MetaVulnerabilitiesOut | ||
*/ | ||
showAll: boolean | null; | ||
impact: string | null; | ||
} | ||
@@ -686,13 +789,13 @@ /** | ||
/** | ||
* CVE name. | ||
* Host ID. | ||
* @type {string} | ||
* @memberof StatusIn | ||
*/ | ||
cve: string; | ||
inventoryId: string; | ||
/** | ||
* Host ID. | ||
* CVE name. | ||
* @type {string} | ||
* @memberof StatusIn | ||
*/ | ||
inventoryId: string; | ||
cve: string; | ||
/** | ||
@@ -805,5 +908,5 @@ * Status ID to be set, obtained by GET method. | ||
*/ | ||
lastEvaluation: string; | ||
lastEvaluation: string | null; | ||
/** | ||
* System opt out status | ||
* System opt out status. | ||
* @type {boolean} | ||
@@ -813,2 +916,8 @@ * @memberof SystemDetailsOutData | ||
optOut: boolean; | ||
/** | ||
* Date of the latest upload of archive. | ||
* @type {string} | ||
* @memberof SystemDetailsOutData | ||
*/ | ||
lastUpload: string | null; | ||
} | ||
@@ -934,3 +1043,3 @@ /** | ||
* @param {string} [publicTo] Filter CVEs based on their published date, up to the date. | ||
* @param {string} [severity] Filter based on severity IDs. | ||
* @param {string} [impact] Filter based on impact IDs. | ||
* @param {string} [dataFormat] Format of the output data, either JSON (default) or CSV. | ||
@@ -941,3 +1050,3 @@ * @param {boolean} [showAll] Show all known vulnerabilities, regardless of number of affected systems. | ||
*/ | ||
getCveList(filter?: string, limit?: number, offset?: number, page?: number, pageSize?: number, sort?: string, cvssFrom?: number, cvssTo?: number, publicFrom?: string, publicTo?: string, severity?: string, dataFormat?: string, showAll?: boolean, options?: any): RequestArgs; | ||
getCveList(filter?: string, limit?: number, offset?: number, page?: number, pageSize?: number, sort?: string, cvssFrom?: number, cvssTo?: number, publicFrom?: string, publicTo?: string, impact?: string, dataFormat?: string, showAll?: boolean, options?: any): RequestArgs; | ||
/** | ||
@@ -957,3 +1066,3 @@ * Shows detailed infomation about all CVEs the system is exposed to. | ||
* @param {string} [publicTo] Filter CVEs based on their published date, up to the date. | ||
* @param {string} [severity] Filter based on severity IDs. | ||
* @param {string} [impact] Filter based on impact IDs. | ||
* @param {string} [statusId] Filer based on CVE status ID. | ||
@@ -964,3 +1073,3 @@ * @param {string} [dataFormat] Format of the output data, either JSON (default) or CSV. | ||
*/ | ||
getCveListBySystem(inventoryId: string, filter?: string, limit?: number, offset?: number, page?: number, pageSize?: number, sort?: string, cvssFrom?: number, cvssTo?: number, publicFrom?: string, publicTo?: string, severity?: string, statusId?: string, dataFormat?: string, options?: any): RequestArgs; | ||
getCveListBySystem(inventoryId: string, filter?: string, limit?: number, offset?: number, page?: number, pageSize?: number, sort?: string, cvssFrom?: number, cvssTo?: number, publicFrom?: string, publicTo?: string, impact?: string, statusId?: string, dataFormat?: string, options?: any): RequestArgs; | ||
/** | ||
@@ -1071,3 +1180,3 @@ * Returns available status and status_id pairs where status_id is internal ID of the status. | ||
* @param {string} [publicTo] Filter CVEs based on their published date, up to the date. | ||
* @param {string} [severity] Filter based on severity IDs. | ||
* @param {string} [impact] Filter based on impact IDs. | ||
* @param {string} [dataFormat] Format of the output data, either JSON (default) or CSV. | ||
@@ -1078,3 +1187,3 @@ * @param {boolean} [showAll] Show all known vulnerabilities, regardless of number of affected systems. | ||
*/ | ||
getCveList(filter?: string, limit?: number, offset?: number, page?: number, pageSize?: number, sort?: string, cvssFrom?: number, cvssTo?: number, publicFrom?: string, publicTo?: string, severity?: string, dataFormat?: string, showAll?: boolean, options?: any): (axios?: AxiosInstance, basePath?: string) => AxiosPromise<VulnerabilitiesOut>; | ||
getCveList(filter?: string, limit?: number, offset?: number, page?: number, pageSize?: number, sort?: string, cvssFrom?: number, cvssTo?: number, publicFrom?: string, publicTo?: string, impact?: string, dataFormat?: string, showAll?: boolean, options?: any): (axios?: AxiosInstance, basePath?: string) => AxiosPromise<VulnerabilitiesOut>; | ||
/** | ||
@@ -1094,3 +1203,3 @@ * Shows detailed infomation about all CVEs the system is exposed to. | ||
* @param {string} [publicTo] Filter CVEs based on their published date, up to the date. | ||
* @param {string} [severity] Filter based on severity IDs. | ||
* @param {string} [impact] Filter based on impact IDs. | ||
* @param {string} [statusId] Filer based on CVE status ID. | ||
@@ -1101,3 +1210,3 @@ * @param {string} [dataFormat] Format of the output data, either JSON (default) or CSV. | ||
*/ | ||
getCveListBySystem(inventoryId: string, filter?: string, limit?: number, offset?: number, page?: number, pageSize?: number, sort?: string, cvssFrom?: number, cvssTo?: number, publicFrom?: string, publicTo?: string, severity?: string, statusId?: string, dataFormat?: string, options?: any): (axios?: AxiosInstance, basePath?: string) => AxiosPromise<SystemCvesOut>; | ||
getCveListBySystem(inventoryId: string, filter?: string, limit?: number, offset?: number, page?: number, pageSize?: number, sort?: string, cvssFrom?: number, cvssTo?: number, publicFrom?: string, publicTo?: string, impact?: string, statusId?: string, dataFormat?: string, options?: any): (axios?: AxiosInstance, basePath?: string) => AxiosPromise<SystemCvesOut>; | ||
/** | ||
@@ -1208,3 +1317,3 @@ * Returns available status and status_id pairs where status_id is internal ID of the status. | ||
* @param {string} [publicTo] Filter CVEs based on their published date, up to the date. | ||
* @param {string} [severity] Filter based on severity IDs. | ||
* @param {string} [impact] Filter based on impact IDs. | ||
* @param {string} [dataFormat] Format of the output data, either JSON (default) or CSV. | ||
@@ -1215,3 +1324,3 @@ * @param {boolean} [showAll] Show all known vulnerabilities, regardless of number of affected systems. | ||
*/ | ||
getCveList(filter?: string, limit?: number, offset?: number, page?: number, pageSize?: number, sort?: string, cvssFrom?: number, cvssTo?: number, publicFrom?: string, publicTo?: string, severity?: string, dataFormat?: string, showAll?: boolean, options?: any): AxiosPromise<VulnerabilitiesOut>; | ||
getCveList(filter?: string, limit?: number, offset?: number, page?: number, pageSize?: number, sort?: string, cvssFrom?: number, cvssTo?: number, publicFrom?: string, publicTo?: string, impact?: string, dataFormat?: string, showAll?: boolean, options?: any): AxiosPromise<VulnerabilitiesOut>; | ||
/** | ||
@@ -1231,3 +1340,3 @@ * Shows detailed infomation about all CVEs the system is exposed to. | ||
* @param {string} [publicTo] Filter CVEs based on their published date, up to the date. | ||
* @param {string} [severity] Filter based on severity IDs. | ||
* @param {string} [impact] Filter based on impact IDs. | ||
* @param {string} [statusId] Filer based on CVE status ID. | ||
@@ -1238,3 +1347,3 @@ * @param {string} [dataFormat] Format of the output data, either JSON (default) or CSV. | ||
*/ | ||
getCveListBySystem(inventoryId: string, filter?: string, limit?: number, offset?: number, page?: number, pageSize?: number, sort?: string, cvssFrom?: number, cvssTo?: number, publicFrom?: string, publicTo?: string, severity?: string, statusId?: string, dataFormat?: string, options?: any): AxiosPromise<SystemCvesOut>; | ||
getCveListBySystem(inventoryId: string, filter?: string, limit?: number, offset?: number, page?: number, pageSize?: number, sort?: string, cvssFrom?: number, cvssTo?: number, publicFrom?: string, publicTo?: string, impact?: string, statusId?: string, dataFormat?: string, options?: any): AxiosPromise<SystemCvesOut>; | ||
/** | ||
@@ -1350,3 +1459,3 @@ * Returns available status and status_id pairs where status_id is internal ID of the status. | ||
* @param {string} [publicTo] Filter CVEs based on their published date, up to the date. | ||
* @param {string} [severity] Filter based on severity IDs. | ||
* @param {string} [impact] Filter based on impact IDs. | ||
* @param {string} [dataFormat] Format of the output data, either JSON (default) or CSV. | ||
@@ -1358,3 +1467,3 @@ * @param {boolean} [showAll] Show all known vulnerabilities, regardless of number of affected systems. | ||
*/ | ||
getCveList(filter?: string, limit?: number, offset?: number, page?: number, pageSize?: number, sort?: string, cvssFrom?: number, cvssTo?: number, publicFrom?: string, publicTo?: string, severity?: string, dataFormat?: string, showAll?: boolean, options?: any): AxiosPromise<VulnerabilitiesOut>; | ||
getCveList(filter?: string, limit?: number, offset?: number, page?: number, pageSize?: number, sort?: string, cvssFrom?: number, cvssTo?: number, publicFrom?: string, publicTo?: string, impact?: string, dataFormat?: string, showAll?: boolean, options?: any): AxiosPromise<VulnerabilitiesOut>; | ||
/** | ||
@@ -1374,3 +1483,3 @@ * Shows detailed infomation about all CVEs the system is exposed to. | ||
* @param {string} [publicTo] Filter CVEs based on their published date, up to the date. | ||
* @param {string} [severity] Filter based on severity IDs. | ||
* @param {string} [impact] Filter based on impact IDs. | ||
* @param {string} [statusId] Filer based on CVE status ID. | ||
@@ -1382,3 +1491,3 @@ * @param {string} [dataFormat] Format of the output data, either JSON (default) or CSV. | ||
*/ | ||
getCveListBySystem(inventoryId: string, filter?: string, limit?: number, offset?: number, page?: number, pageSize?: number, sort?: string, cvssFrom?: number, cvssTo?: number, publicFrom?: string, publicTo?: string, severity?: string, statusId?: string, dataFormat?: string, options?: any): AxiosPromise<SystemCvesOut>; | ||
getCveListBySystem(inventoryId: string, filter?: string, limit?: number, offset?: number, page?: number, pageSize?: number, sort?: string, cvssFrom?: number, cvssTo?: number, publicFrom?: string, publicTo?: string, impact?: string, statusId?: string, dataFormat?: string, options?: any): AxiosPromise<SystemCvesOut>; | ||
/** | ||
@@ -1385,0 +1494,0 @@ * Returns available status and status_id pairs where status_id is internal ID of the status. |
@@ -5,3 +5,3 @@ /** | ||
* | ||
* OpenAPI spec version: 0.13 | ||
* OpenAPI spec version: 1.0.0 | ||
* | ||
@@ -8,0 +8,0 @@ * |
@@ -7,3 +7,3 @@ "use strict"; | ||
* | ||
* OpenAPI spec version: 0.13 | ||
* OpenAPI spec version: 1.0.0 | ||
* | ||
@@ -10,0 +10,0 @@ * |
@@ -5,3 +5,3 @@ /** | ||
* | ||
* OpenAPI spec version: 0.13 | ||
* OpenAPI spec version: 1.0.0 | ||
* | ||
@@ -8,0 +8,0 @@ * |
@@ -7,3 +7,3 @@ "use strict"; | ||
* | ||
* OpenAPI spec version: 0.13 | ||
* OpenAPI spec version: 1.0.0 | ||
* | ||
@@ -10,0 +10,0 @@ * |
@@ -115,3 +115,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [DefaultApi](../classes/defaultapi.md) | ||
*Defined in [api.ts:1988](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1988)* | ||
*Defined in [api.ts:2098](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2098)* | ||
@@ -142,3 +142,3 @@ Deletes system from database. | ||
*Defined in [api.ts:2008](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2008)* | ||
*Defined in [api.ts:2118](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2118)* | ||
@@ -177,3 +177,3 @@ Report of affected systems for a given CVE. | ||
*Defined in [api.ts:2020](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2020)* | ||
*Defined in [api.ts:2130](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2130)* | ||
@@ -202,5 +202,5 @@ Show all information about given CVE. | ||
▸ **getCveList**(filter?: *`string`*, limit?: *`number`*, offset?: *`number`*, page?: *`number`*, pageSize?: *`number`*, sort?: *`string`*, cvssFrom?: *`number`*, cvssTo?: *`number`*, publicFrom?: *`string`*, publicTo?: *`string`*, severity?: *`string`*, dataFormat?: *`string`*, showAll?: *`boolean`*, options?: *`any`*): `AxiosPromise`<[VulnerabilitiesOut](../interfaces/vulnerabilitiesout.md)> | ||
▸ **getCveList**(filter?: *`string`*, limit?: *`number`*, offset?: *`number`*, page?: *`number`*, pageSize?: *`number`*, sort?: *`string`*, cvssFrom?: *`number`*, cvssTo?: *`number`*, publicFrom?: *`string`*, publicTo?: *`string`*, impact?: *`string`*, dataFormat?: *`string`*, showAll?: *`boolean`*, options?: *`any`*): `AxiosPromise`<[VulnerabilitiesOut](../interfaces/vulnerabilitiesout.md)> | ||
*Defined in [api.ts:2044](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2044)* | ||
*Defined in [api.ts:2154](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2154)* | ||
@@ -229,3 +229,3 @@ Overview of vulnerabilities across whole host inventory. | ||
| `Optional` publicTo | `string` | | ||
| `Optional` severity | `string` | | ||
| `Optional` impact | `string` | | ||
| `Optional` dataFormat | `string` | | ||
@@ -242,5 +242,5 @@ | `Optional` showAll | `boolean` | | ||
▸ **getCveListBySystem**(inventoryId: *`string`*, filter?: *`string`*, limit?: *`number`*, offset?: *`number`*, page?: *`number`*, pageSize?: *`number`*, sort?: *`string`*, cvssFrom?: *`number`*, cvssTo?: *`number`*, publicFrom?: *`string`*, publicTo?: *`string`*, severity?: *`string`*, statusId?: *`string`*, dataFormat?: *`string`*, options?: *`any`*): `AxiosPromise`<[SystemCvesOut](../interfaces/systemcvesout.md)> | ||
▸ **getCveListBySystem**(inventoryId: *`string`*, filter?: *`string`*, limit?: *`number`*, offset?: *`number`*, page?: *`number`*, pageSize?: *`number`*, sort?: *`string`*, cvssFrom?: *`number`*, cvssTo?: *`number`*, publicFrom?: *`string`*, publicTo?: *`string`*, impact?: *`string`*, statusId?: *`string`*, dataFormat?: *`string`*, options?: *`any`*): `AxiosPromise`<[SystemCvesOut](../interfaces/systemcvesout.md)> | ||
*Defined in [api.ts:2069](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2069)* | ||
*Defined in [api.ts:2179](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2179)* | ||
@@ -270,3 +270,3 @@ Shows detailed infomation about all CVEs the system is exposed to. | ||
| `Optional` publicTo | `string` | | ||
| `Optional` severity | `string` | | ||
| `Optional` impact | `string` | | ||
| `Optional` statusId | `string` | | ||
@@ -285,3 +285,3 @@ | `Optional` dataFormat | `string` | | ||
*Defined in [api.ts:2080](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2080)* | ||
*Defined in [api.ts:2190](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2190)* | ||
@@ -311,3 +311,3 @@ Returns available status and status\_id pairs where status\_id is internal ID of the status. | ||
*Defined in [api.ts:2092](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2092)* | ||
*Defined in [api.ts:2202](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2202)* | ||
@@ -338,3 +338,3 @@ Provides details of a system, e.g. it's opt out status. | ||
*Defined in [api.ts:2111](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2111)* | ||
*Defined in [api.ts:2221](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2221)* | ||
@@ -372,3 +372,3 @@ List systems visible to logged in account with basic information related to vulnerabilities. | ||
*Defined in [api.ts:2122](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2122)* | ||
*Defined in [api.ts:2232](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2232)* | ||
@@ -398,3 +398,3 @@ Get application version. | ||
*Defined in [api.ts:2134](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2134)* | ||
*Defined in [api.ts:2244](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2244)* | ||
@@ -425,3 +425,3 @@ Sets status for given host and CVE. | ||
*Defined in [api.ts:2147](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2147)* | ||
*Defined in [api.ts:2257](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2257)* | ||
@@ -428,0 +428,0 @@ Opts in/out a systems. Opted out system is not shown and manageable by the vulnerability application. |
@@ -108,3 +108,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [InternalApi](../classes/internalapi.md) | ||
*Defined in [api.ts:2487](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2487)* | ||
*Defined in [api.ts:2597](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2597)* | ||
@@ -135,3 +135,3 @@ Refresh cached counts for given account ID. Admin interface, available only to internal users. | ||
*Defined in [api.ts:2500](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2500)* | ||
*Defined in [api.ts:2610](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2610)* | ||
@@ -163,3 +163,3 @@ Refresh cached counts for given account ID and CVE. Admin interface, available only to internal users. | ||
*Defined in [api.ts:2512](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2512)* | ||
*Defined in [api.ts:2622](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2622)* | ||
@@ -190,3 +190,3 @@ Refresh cached counts for given CVE. Admin interface, available only to internal users. | ||
*Defined in [api.ts:2524](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2524)* | ||
*Defined in [api.ts:2634](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2634)* | ||
@@ -193,0 +193,0 @@ Refresh cached counts for given inventory ID. Admin interface, available only to internal users. |
@@ -7,3 +7,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [ConfigurationParameters](../interfaces/configurationparameters.md) | ||
OpenAPI spec version: 0.13 | ||
OpenAPI spec version: 1.0.0 | ||
@@ -10,0 +10,0 @@ NOTE: This class is auto generated by OpenAPI Generator ([https://openapi-generator.tech)](https://openapi-generator.tech)). [https://openapi-generator.tech](https://openapi-generator.tech) Do not edit the class manually. |
@@ -31,3 +31,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [CveDetailOutData](../interfaces/cvedetailoutdata.md) | ||
*Defined in [api.ts:123](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L123)* | ||
*Defined in [api.ts:135](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L135)* | ||
@@ -45,3 +45,3 @@ *__type__*: {CveDetailOutDataAttributes} | ||
*Defined in [api.ts:129](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L129)* | ||
*Defined in [api.ts:123](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L123)* | ||
@@ -61,3 +61,3 @@ CVE id. | ||
*Defined in [api.ts:135](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L135)* | ||
*Defined in [api.ts:129](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L129)* | ||
@@ -64,0 +64,0 @@ Type of the record. |
@@ -145,3 +145,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [CveDetailOutDataAttributes](../interfaces/cvedetailoutdataattributes.md) | ||
*Defined in [api.ts:191](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L191)* | ||
*Defined in [api.ts:197](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L197)* | ||
@@ -161,3 +161,3 @@ Red Hat security impact of the CVE. | ||
*Defined in [api.ts:197](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L197)* | ||
*Defined in [api.ts:191](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L191)* | ||
@@ -164,0 +164,0 @@ String representation of ISO-8601 formatted date of last modification of the CVE. |
@@ -37,3 +37,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [Meta](../interfaces/meta.md) | ||
*Defined in [api.ts:307](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L307)* | ||
*Defined in [api.ts:355](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L355)* | ||
@@ -53,3 +53,3 @@ Format of the output data, either JSON (default) or CSV. | ||
*Defined in [api.ts:313](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L313)* | ||
*Defined in [api.ts:307](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L307)* | ||
@@ -69,3 +69,3 @@ Full text filter | ||
*Defined in [api.ts:319](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L319)* | ||
*Defined in [api.ts:313](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L313)* | ||
@@ -85,3 +85,3 @@ Maximum number of paginated results. | ||
*Defined in [api.ts:325](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L325)* | ||
*Defined in [api.ts:319](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L319)* | ||
@@ -101,3 +101,3 @@ First record of paginated response. | ||
*Defined in [api.ts:331](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L331)* | ||
*Defined in [api.ts:325](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L325)* | ||
@@ -117,3 +117,3 @@ Page number of paginated response. | ||
*Defined in [api.ts:337](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L337)* | ||
*Defined in [api.ts:331](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L331)* | ||
@@ -133,3 +133,3 @@ Number of records per page of paginated response. | ||
*Defined in [api.ts:343](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L343)* | ||
*Defined in [api.ts:337](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L337)* | ||
@@ -149,3 +149,3 @@ Total number of pages of paginated response. | ||
*Defined in [api.ts:349](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L349)* | ||
*Defined in [api.ts:343](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L343)* | ||
@@ -165,3 +165,3 @@ Sorting filter. | ||
*Defined in [api.ts:355](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L355)* | ||
*Defined in [api.ts:349](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L349)* | ||
@@ -168,0 +168,0 @@ Total number of records. |
@@ -38,3 +38,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [MetaAffectedSystems](../interfaces/metaaffectedsystems.md) | ||
*Defined in [api.ts:369](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L369)* | ||
*Defined in [api.ts:417](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L417)* | ||
@@ -54,3 +54,3 @@ Format of the output data, either JSON (default) or CSV. | ||
*Defined in [api.ts:375](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L375)* | ||
*Defined in [api.ts:369](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L369)* | ||
@@ -70,3 +70,3 @@ Full text filter | ||
*Defined in [api.ts:381](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L381)* | ||
*Defined in [api.ts:375](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L375)* | ||
@@ -86,3 +86,3 @@ Maximum number of paginated results. | ||
*Defined in [api.ts:387](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L387)* | ||
*Defined in [api.ts:381](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L381)* | ||
@@ -102,3 +102,3 @@ First record of paginated response. | ||
*Defined in [api.ts:393](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L393)* | ||
*Defined in [api.ts:387](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L387)* | ||
@@ -118,3 +118,3 @@ Page number of paginated response. | ||
*Defined in [api.ts:399](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L399)* | ||
*Defined in [api.ts:393](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L393)* | ||
@@ -134,3 +134,3 @@ Number of records per page of paginated response. | ||
*Defined in [api.ts:405](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L405)* | ||
*Defined in [api.ts:399](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L399)* | ||
@@ -150,3 +150,3 @@ Total number of pages of paginated response. | ||
*Defined in [api.ts:411](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L411)* | ||
*Defined in [api.ts:405](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L405)* | ||
@@ -181,3 +181,3 @@ Sorting filter. | ||
*Defined in [api.ts:417](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L417)* | ||
*Defined in [api.ts:411](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L411)* | ||
@@ -184,0 +184,0 @@ Total number of records. |
@@ -21,2 +21,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [MetaCves](../interfaces/metacves.md) | ||
* [filter](metacves.md#filter) | ||
* [impact](metacves.md#impact) | ||
* [limit](metacves.md#limit) | ||
@@ -29,3 +30,2 @@ * [offset](metacves.md#offset) | ||
* [publicTo](metacves.md#publicto) | ||
* [severity](metacves.md#severity) | ||
* [sort](metacves.md#sort) | ||
@@ -75,3 +75,3 @@ * [statusId](metacves.md#statusid) | ||
*Defined in [api.ts:437](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L437)* | ||
*Defined in [api.ts:485](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L485)* | ||
@@ -91,3 +91,3 @@ Format of the output data, either JSON (default) or CSV. | ||
*Defined in [api.ts:443](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L443)* | ||
*Defined in [api.ts:437](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L437)* | ||
@@ -101,2 +101,17 @@ Full text filter | ||
___ | ||
<a id="impact"></a> | ||
### `<Optional>` impact | ||
**● impact**: *`string` \| `null`* | ||
*Defined in [api.ts:515](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L515)* | ||
Filter based on impact IDs. | ||
*__type__*: {string} | ||
*__memberof__*: MetaCves | ||
___ | ||
<a id="limit"></a> | ||
@@ -108,3 +123,3 @@ | ||
*Defined in [api.ts:449](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L449)* | ||
*Defined in [api.ts:443](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L443)* | ||
@@ -124,3 +139,3 @@ Maximum number of paginated results. | ||
*Defined in [api.ts:455](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L455)* | ||
*Defined in [api.ts:449](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L449)* | ||
@@ -140,3 +155,3 @@ First record of paginated response. | ||
*Defined in [api.ts:461](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L461)* | ||
*Defined in [api.ts:455](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L455)* | ||
@@ -156,3 +171,3 @@ Page number of paginated response. | ||
*Defined in [api.ts:467](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L467)* | ||
*Defined in [api.ts:461](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L461)* | ||
@@ -172,3 +187,3 @@ Number of records per page of paginated response. | ||
*Defined in [api.ts:473](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L473)* | ||
*Defined in [api.ts:467](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L467)* | ||
@@ -212,17 +227,2 @@ Total number of pages of paginated response. | ||
___ | ||
<a id="severity"></a> | ||
### `<Optional>` severity | ||
**● severity**: *`string` \| `null`* | ||
*Defined in [api.ts:515](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L515)* | ||
Filter based on severity IDs. | ||
*__type__*: {string} | ||
*__memberof__*: MetaCves | ||
___ | ||
<a id="sort"></a> | ||
@@ -234,3 +234,3 @@ | ||
*Defined in [api.ts:479](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L479)* | ||
*Defined in [api.ts:473](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L473)* | ||
@@ -265,3 +265,3 @@ Sorting filter. | ||
*Defined in [api.ts:485](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L485)* | ||
*Defined in [api.ts:479](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L479)* | ||
@@ -268,0 +268,0 @@ Total number of records. |
@@ -38,3 +38,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [MetaSystems](../interfaces/metasystems.md) | ||
*Defined in [api.ts:535](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L535)* | ||
*Defined in [api.ts:687](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L687)* | ||
@@ -54,3 +54,3 @@ Format of the output data, either JSON (default) or CSV. | ||
*Defined in [api.ts:541](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L541)* | ||
*Defined in [api.ts:639](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L639)* | ||
@@ -70,3 +70,3 @@ Full text filter | ||
*Defined in [api.ts:547](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L547)* | ||
*Defined in [api.ts:645](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L645)* | ||
@@ -86,3 +86,3 @@ Maximum number of paginated results. | ||
*Defined in [api.ts:553](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L553)* | ||
*Defined in [api.ts:651](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L651)* | ||
@@ -102,3 +102,3 @@ First record of paginated response. | ||
*Defined in [api.ts:589](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L589)* | ||
*Defined in [api.ts:693](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L693)* | ||
@@ -118,3 +118,3 @@ Whether the filter to show opted out systems is active or not. If not set, defaults to hiding opted out systems. | ||
*Defined in [api.ts:559](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L559)* | ||
*Defined in [api.ts:657](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L657)* | ||
@@ -134,3 +134,3 @@ Page number of paginated response. | ||
*Defined in [api.ts:565](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L565)* | ||
*Defined in [api.ts:663](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L663)* | ||
@@ -150,3 +150,3 @@ Number of records per page of paginated response. | ||
*Defined in [api.ts:571](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L571)* | ||
*Defined in [api.ts:669](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L669)* | ||
@@ -166,3 +166,3 @@ Total number of pages of paginated response. | ||
*Defined in [api.ts:577](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L577)* | ||
*Defined in [api.ts:675](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L675)* | ||
@@ -182,3 +182,3 @@ Sorting filter. | ||
*Defined in [api.ts:583](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L583)* | ||
*Defined in [api.ts:681](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L681)* | ||
@@ -185,0 +185,0 @@ Total number of records. |
@@ -21,2 +21,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [MetaVulnerabilitiesOut](../interfaces/metavulnerabilitiesout.md) | ||
* [filter](metavulnerabilitiesout.md#filter) | ||
* [impact](metavulnerabilitiesout.md#impact) | ||
* [limit](metavulnerabilitiesout.md#limit) | ||
@@ -29,3 +30,2 @@ * [offset](metavulnerabilitiesout.md#offset) | ||
* [publicTo](metavulnerabilitiesout.md#publicto) | ||
* [severity](metavulnerabilitiesout.md#severity) | ||
* [showAll](metavulnerabilitiesout.md#showall) | ||
@@ -45,3 +45,3 @@ * [sort](metavulnerabilitiesout.md#sort) | ||
*Defined in [api.ts:657](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L657)* | ||
*Defined in [api.ts:761](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L761)* | ||
@@ -61,3 +61,3 @@ Filter based on cvss score, starting from the value. | ||
*Defined in [api.ts:663](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L663)* | ||
*Defined in [api.ts:767](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L767)* | ||
@@ -77,3 +77,3 @@ Filter based on cvss score, up to the value. | ||
*Defined in [api.ts:603](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L603)* | ||
*Defined in [api.ts:755](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L755)* | ||
@@ -93,3 +93,3 @@ Format of the output data, either JSON (default) or CSV. | ||
*Defined in [api.ts:609](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L609)* | ||
*Defined in [api.ts:707](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L707)* | ||
@@ -103,2 +103,17 @@ Full text filter | ||
___ | ||
<a id="impact"></a> | ||
### impact | ||
**● impact**: *`string` \| `null`* | ||
*Defined in [api.ts:791](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L791)* | ||
Filter based on impact IDs. | ||
*__type__*: {string} | ||
*__memberof__*: MetaVulnerabilitiesOut | ||
___ | ||
<a id="limit"></a> | ||
@@ -110,3 +125,3 @@ | ||
*Defined in [api.ts:615](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L615)* | ||
*Defined in [api.ts:713](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L713)* | ||
@@ -126,3 +141,3 @@ Maximum number of paginated results. | ||
*Defined in [api.ts:621](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L621)* | ||
*Defined in [api.ts:719](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L719)* | ||
@@ -142,3 +157,3 @@ First record of paginated response. | ||
*Defined in [api.ts:627](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L627)* | ||
*Defined in [api.ts:725](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L725)* | ||
@@ -158,3 +173,3 @@ Page number of paginated response. | ||
*Defined in [api.ts:633](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L633)* | ||
*Defined in [api.ts:731](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L731)* | ||
@@ -174,3 +189,3 @@ Number of records per page of paginated response. | ||
*Defined in [api.ts:639](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L639)* | ||
*Defined in [api.ts:737](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L737)* | ||
@@ -190,3 +205,3 @@ Total number of pages of paginated response. | ||
*Defined in [api.ts:669](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L669)* | ||
*Defined in [api.ts:779](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L779)* | ||
@@ -206,3 +221,3 @@ Filter CVEs based on their published date, starting from the date. | ||
*Defined in [api.ts:675](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L675)* | ||
*Defined in [api.ts:785](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L785)* | ||
@@ -216,17 +231,2 @@ Filter CVEs based on their published date, up to the date. | ||
___ | ||
<a id="severity"></a> | ||
### severity | ||
**● severity**: *`string` \| `null`* | ||
*Defined in [api.ts:681](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L681)* | ||
Filter based on severity IDs. | ||
*__type__*: {string} | ||
*__memberof__*: MetaVulnerabilitiesOut | ||
___ | ||
<a id="showall"></a> | ||
@@ -238,3 +238,3 @@ | ||
*Defined in [api.ts:687](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L687)* | ||
*Defined in [api.ts:773](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L773)* | ||
@@ -254,3 +254,3 @@ Show all known vulnerabilities, regardless of number of affected systems. | ||
*Defined in [api.ts:645](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L645)* | ||
*Defined in [api.ts:743](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L743)* | ||
@@ -270,3 +270,3 @@ Sorting filter. | ||
*Defined in [api.ts:651](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L651)* | ||
*Defined in [api.ts:749](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L749)* | ||
@@ -273,0 +273,0 @@ Total number of records. |
@@ -31,3 +31,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [StatusIn](../interfaces/statusin.md) | ||
*Defined in [api.ts:701](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L701)* | ||
*Defined in [api.ts:811](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L811)* | ||
@@ -47,3 +47,3 @@ CVE name. | ||
*Defined in [api.ts:707](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L707)* | ||
*Defined in [api.ts:805](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L805)* | ||
@@ -63,3 +63,3 @@ Host ID. | ||
*Defined in [api.ts:713](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L713)* | ||
*Defined in [api.ts:817](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L817)* | ||
@@ -66,0 +66,0 @@ Status ID to be set, obtained by GET method. |
@@ -30,3 +30,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [StatusListOut](../interfaces/statuslistout.md) | ||
*Defined in [api.ts:727](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L727)* | ||
*Defined in [api.ts:831](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L831)* | ||
@@ -46,3 +46,3 @@ List of available status/status\_id pairs. | ||
*Defined in [api.ts:733](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L733)* | ||
*Defined in [api.ts:837](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L837)* | ||
@@ -49,0 +49,0 @@ *__type__*: {StatusListOutMeta} |
@@ -30,3 +30,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [StatusListOutData](../interfaces/statuslistoutdata.md) | ||
*Defined in [api.ts:747](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L747)* | ||
*Defined in [api.ts:851](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L851)* | ||
@@ -46,3 +46,3 @@ Internal status\_id. | ||
*Defined in [api.ts:753](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L753)* | ||
*Defined in [api.ts:857](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L857)* | ||
@@ -49,0 +49,0 @@ Represenation of internal status\_id. |
@@ -29,3 +29,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [StatusListOutMeta](../interfaces/statuslistoutmeta.md) | ||
*Defined in [api.ts:767](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L767)* | ||
*Defined in [api.ts:871](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L871)* | ||
@@ -32,0 +32,0 @@ Total number of available status/status\_id pairs. |
@@ -31,3 +31,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [SystemCvesOut](../interfaces/systemcvesout.md) | ||
*Defined in [api.ts:781](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L781)* | ||
*Defined in [api.ts:885](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L885)* | ||
@@ -45,3 +45,3 @@ *__type__*: {Object} | ||
*Defined in [api.ts:787](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L787)* | ||
*Defined in [api.ts:891](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L891)* | ||
@@ -59,3 +59,3 @@ *__type__*: {Links} | ||
*Defined in [api.ts:793](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L793)* | ||
*Defined in [api.ts:897](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L897)* | ||
@@ -62,0 +62,0 @@ *__type__*: {MetaCves} |
@@ -29,3 +29,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [SystemDetailsOut](../interfaces/systemdetailsout.md) | ||
*Defined in [api.ts:807](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L807)* | ||
*Defined in [api.ts:911](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L911)* | ||
@@ -32,0 +32,0 @@ *__type__*: {SystemDetailsOutData} |
@@ -18,2 +18,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [SystemDetailsOutData](../interfaces/systemdetailsoutdata.md) | ||
* [lastEvaluation](systemdetailsoutdata.md#lastevaluation) | ||
* [lastUpload](systemdetailsoutdata.md#lastupload) | ||
* [optOut](systemdetailsoutdata.md#optout) | ||
@@ -29,5 +30,5 @@ | ||
**● lastEvaluation**: *`string`* | ||
**● lastEvaluation**: *`string` \| `null`* | ||
*Defined in [api.ts:821](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L821)* | ||
*Defined in [api.ts:925](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L925)* | ||
@@ -41,2 +42,17 @@ Date of last evaluation. | ||
___ | ||
<a id="lastupload"></a> | ||
### lastUpload | ||
**● lastUpload**: *`string` \| `null`* | ||
*Defined in [api.ts:937](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L937)* | ||
Date of the latest upload of archive. | ||
*__type__*: {string} | ||
*__memberof__*: SystemDetailsOutData | ||
___ | ||
<a id="optout"></a> | ||
@@ -48,5 +64,5 @@ | ||
*Defined in [api.ts:827](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L827)* | ||
*Defined in [api.ts:931](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L931)* | ||
System opt out status | ||
System opt out status. | ||
@@ -53,0 +69,0 @@ *__type__*: {boolean} |
@@ -31,3 +31,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [SystemListOut](../interfaces/systemlistout.md) | ||
*Defined in [api.ts:841](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L841)* | ||
*Defined in [api.ts:951](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L951)* | ||
@@ -45,3 +45,3 @@ *__type__*: {Object} | ||
*Defined in [api.ts:847](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L847)* | ||
*Defined in [api.ts:957](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L957)* | ||
@@ -59,3 +59,3 @@ *__type__*: {Links} | ||
*Defined in [api.ts:853](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L853)* | ||
*Defined in [api.ts:963](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L963)* | ||
@@ -62,0 +62,0 @@ *__type__*: {MetaSystems} |
@@ -30,3 +30,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [VersionOut](../interfaces/versionout.md) | ||
*Defined in [api.ts:867](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L867)* | ||
*Defined in [api.ts:977](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L977)* | ||
@@ -46,3 +46,3 @@ Version of application. | ||
*Defined in [api.ts:873](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L873)* | ||
*Defined in [api.ts:983](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L983)* | ||
@@ -49,0 +49,0 @@ Version of database schema. |
@@ -31,3 +31,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [VulnerabilitiesOut](../interfaces/vulnerabilitiesout.md) | ||
*Defined in [api.ts:887](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L887)* | ||
*Defined in [api.ts:997](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L997)* | ||
@@ -45,3 +45,3 @@ *__type__*: {Object} | ||
*Defined in [api.ts:893](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L893)* | ||
*Defined in [api.ts:1003](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1003)* | ||
@@ -59,3 +59,3 @@ *__type__*: {Links} | ||
*Defined in [api.ts:899](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L899)* | ||
*Defined in [api.ts:1009](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1009)* | ||
@@ -62,0 +62,0 @@ *__type__*: {MetaVulnerabilitiesOut} |
@@ -95,2 +95,3 @@ | ||
* [MetaCves](interfaces/metacves.md) | ||
* [MetaCvesSystems](interfaces/metacvessystems.md) | ||
* [MetaSystems](interfaces/metasystems.md) | ||
@@ -135,3 +136,3 @@ * [MetaVulnerabilitiesOut](interfaces/metavulnerabilitiesout.md) | ||
**● BASE_PATH**: *`string`* = "http://localhost/api/vulnerability".replace(/\/+$/, "") | ||
**● BASE_PATH**: *`string`* = "http://localhost".replace(/\/+$/, "") | ||
@@ -150,3 +151,3 @@ *Defined in [api.ts:20](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L20)* | ||
*Defined in [api.ts:907](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L907)* | ||
*Defined in [api.ts:1017](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1017)* | ||
@@ -170,3 +171,3 @@ DefaultApi - axios parameter creator | ||
*Defined in [api.ts:1819](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1819)* | ||
*Defined in [api.ts:1929](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1929)* | ||
@@ -192,3 +193,3 @@ DefaultApi - factory interface | ||
*Defined in [api.ts:1617](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1617)* | ||
*Defined in [api.ts:1727](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1727)* | ||
@@ -212,3 +213,3 @@ DefaultApi - functional programming interface | ||
*Defined in [api.ts:2157](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2157)* | ||
*Defined in [api.ts:2267](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2267)* | ||
@@ -232,3 +233,3 @@ InternalApi - axios parameter creator | ||
*Defined in [api.ts:2426](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2426)* | ||
*Defined in [api.ts:2536](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2536)* | ||
@@ -254,3 +255,3 @@ InternalApi - factory interface | ||
*Defined in [api.ts:2360](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2360)* | ||
*Defined in [api.ts:2470](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2470)* | ||
@@ -257,0 +258,0 @@ InternalApi - functional programming interface |
{ | ||
"name": "@redhat-cloud-services/vulnerabilities-client", | ||
"version": "1.0.29", | ||
"version": "1.0.30", | ||
"description": "", | ||
@@ -26,3 +26,3 @@ "main": "dist/index.js", | ||
"generate": "TS_POST_PROCESS_FILE='../../postProcess.sh' openapi-generator generate -i $SPEC -g typescript-axios -o $OUTPUT --skip-validate-spec --enable-post-process-file", | ||
"generate:production": "OUTPUT=. SPEC=$(node preProcess.js 'https://cloud.redhat.com/api/vulnerability/v1/openapi.json') npm run generate", | ||
"generate:production": "OUTPUT=. SPEC=$(node preProcess.js 'https://raw.githubusercontent.com/RedHatInsights/vulnerability-engine/stable/manager.spec.yaml') npm run generate", | ||
"generate:git-api": "OUTPUT=git-api SPEC=$(node preProcess.js 'https://raw.githubusercontent.com/RedHatInsights/vulnerability-engine/master/manager.spec.yaml') npm run generate", | ||
@@ -29,0 +29,0 @@ "generate:prod": "npm run generate:git-api && npm run generate:production && ./postProcess.sh", |
Sorry, the diff of this file is too big to display
473082
80
5236