@redhat-cloud-services/vulnerabilities-client
Advanced tools
Comparing version 1.0.34 to 1.0.35
@@ -1,1 +0,1 @@ | ||
{"openapi":"3.0.0","info":{"title":"Vulnerability Engine Manager"},"paths":{"/v1/version":{"get":{"summary":"Application version","description":"Get application version.","operationId":"getVersion","x-methodName":"getVersion","responses":{"200":{"description":"Application version.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/VersionOut"}}}}}}},"/v1/cves/{cve_id}":{"get":{"summary":"Details of a CVE.","description":"Show all information about given CVE.","operationId":"getCveDetails","x-methodName":"getCveDetails","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"CVE details","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/CveDetailOut"}}}},"404":{"description":"Given CVE does not exist.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/cve_id"}]}},"/v1/cves/{cve_id}/affected_systems":{"get":{"summary":"Affected systems for a given CVE.","description":"Report of affected systems for a given CVE.","operationId":"getAffectedSystemsByCve","x-methodName":"getAffectedSystemsByCve","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"Report of affected systems for a given CVE.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/AffectedSystemsOut"}}}},"404":{"description":"Given CVE does not exist.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/sort"},{"$ref":"#/components/parameters/cve_id"},{"$ref":"#/components/parameters/status_id"},{"$ref":"#/components/parameters/data_format"}]}},"/v1/status":{"get":{"summary":"Available status/status_id pairs.","description":"Returns available status and status_id pairs where status_id is internal ID of the status.","operationId":"getStatusList","x-methodName":"getStatusList","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"List of status/status_id pairs.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/StatusListOut"}}}}}},"patch":{"summary":"Set status for system vulnerability.","description":"Sets status for given host and CVE.","operationId":"setStatus","x-methodName":"setStatus","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"requestBody":{"description":"Values to be set.","required":true,"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/StatusIn","x-body-name":"data"}}}},"responses":{"200":{"description":"Status sucessfully updated."},"404":{"description":"Given host/CVE does not exist.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}},"503":{"description":"Service is running in read-only mode.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}}}},"/v1/systems":{"get":{"summary":"List systems.","description":"List systems visible to logged in account with basic information related to vulnerabilities.","operationId":"getSystemsList","x-methodName":"getSystemsList","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"System list","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/SystemListOut"}}}}},"parameters":[{"$ref":"#/components/parameters/filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/sort"},{"$ref":"#/components/parameters/data_format"},{"in":"query","name":"opt_out","description":"If set to true, shows systems which have been opted out from vulnerability application. If not set defaults to false.","schema":{"type":"boolean"},"example":true}]}},"/v1/systems/{inventory_id}":{"get":{"summary":"System details.","description":"Provides details of a system, e.g. it's opt out status.","operationId":"getSystemDetails","x-methodName":"getSystemDetails","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"System details","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/SystemDetailsOut"}}}},"404":{"description":"System has not been found in the database.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/inventory_id"}]},"delete":{"summary":"Delete system.","description":"Deletes system from database.","operationId":"deleteSystem","x-methodName":"deleteSystem","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"System has been deleted."},"404":{"description":"System has not been found in the database.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}},"503":{"description":"Service is running in read-only mode.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/inventory_id"}]}},"/v1/systems/{inventory_id}/cves":{"get":{"summary":"CVE report for a system.","description":"Shows detailed infomation about all CVEs the system is exposed to.","operationId":"getCveListBySystem","x-methodName":"getCveListBySystem","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"CVE report.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/SystemCvesOut"}}}},"404":{"description":"System has not been found in the database.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/inventory_id"},{"$ref":"#/components/parameters/filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/sort"},{"$ref":"#/components/parameters/cvss_from"},{"$ref":"#/components/parameters/cvss_to"},{"$ref":"#/components/parameters/public_from"},{"$ref":"#/components/parameters/public_to"},{"$ref":"#/components/parameters/impact"},{"$ref":"#/components/parameters/status_id"},{"$ref":"#/components/parameters/data_format"}]}},"/v1/systems/{inventory_id}/opt_out":{"patch":{"summary":"Opt in/out a system to/from vulnerability application.","description":"Opts in/out a systems. Opted out system is not shown and manageable by the vulnerability application.","operationId":"setSystemOptOut","x-methodName":"setSystemOptOut","deprecated":true,"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"System setting has been updated."},"404":{"description":"System has not been found in the database.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}},"503":{"description":"Service is running in read-only mode.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/inventory_id"},{"in":"query","name":"value","description":"opt_out setting of the host.","required":true,"schema":{"type":"boolean","example":true}}]}},"/v1/systems/opt_out":{"patch":{"summary":"Opt in/out a system to/from vulnerability application.","description":"Opts in/out a systems. Opted out system is not shown and manageable by the vulnerability application.","operationId":"setSystemsOptOut","x-methodName":"setSystemsOptOut","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"requestBody":{"description":"Values to be set.","required":true,"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/OptOutIn","x-body-name":"data"}}}},"responses":{"200":{"description":"System(s) setting has been updated.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/BulkChangeOut"}}}},"503":{"description":"Service is running in read-only mode.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}}}},"/v1/vulnerabilities/cves":{"get":{"summary":"Vulnerabilities overview.","description":"Overview of vulnerabilities across whole host inventory.","operationId":"getCveList","x-methodName":"getCveList","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"Vulnerabilities overview.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/VulnerabilitiesOut"}}}}},"parameters":[{"$ref":"#/components/parameters/filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/sort"},{"$ref":"#/components/parameters/cvss_from"},{"$ref":"#/components/parameters/cvss_to"},{"$ref":"#/components/parameters/public_from"},{"$ref":"#/components/parameters/public_to"},{"$ref":"#/components/parameters/impact"},{"$ref":"#/components/parameters/data_format"},{"in":"query","name":"show_all","description":"Show all known vulnerabilities, regardless of number of affected systems.","schema":{"type":"boolean"},"example":true}]}},"/v1/refresh/accounts/{account_id}":{"put":{"summary":"Refresh cached counts for given account ID.","description":"Refresh cached counts for given account ID. Admin interface, available only to internal users.","operationId":"refreshAccount","x-methodName":"refreshAccount","security":[{"ApiKeyAuthInternal":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"Cached counts for given account sucessfully updated."},"404":{"description":"Account was not found.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}},"503":{"description":"Service is running in read-only mode.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/account_id"}],"tags":["internal"]}},"/v1/refresh/accounts/{account_id}/cves/{cve_id}":{"put":{"summary":"Refresh cached counts for given account ID and CVE.","description":"Refresh cached counts for given account ID and CVE. Admin interface, available only to internal users.","operationId":"refreshAccountCve","x-methodName":"refreshAccountCve","security":[{"ApiKeyAuthInternal":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"Cached counts for given account and CVE sucessfully updated."},"404":{"description":"Account or CVE was not found.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}},"503":{"description":"Service is running in read-only mode.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/account_id"},{"$ref":"#/components/parameters/cve_id"}],"tags":["internal"]}},"/v1/refresh/cves/{cve_id}":{"put":{"summary":"Refresh cached counts for given CVE.","description":"Refresh cached counts for given CVE. Admin interface, available only to internal users.","operationId":"refreshCve","x-methodName":"refreshCve","security":[{"ApiKeyAuthInternal":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"Cached counts for given CVE sucessfully updated."},"404":{"description":"CVE was not found.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}},"503":{"description":"Service is running in read-only mode.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/cve_id"}],"tags":["internal"]}},"/v1/refresh/systems/{inventory_id}":{"put":{"summary":"Refresh cached counts for given inventory ID.","description":"Refresh cached counts for given inventory ID. Admin interface, available only to internal users.","operationId":"refreshSystem","x-methodName":"refreshSystem","security":[{"ApiKeyAuthInternal":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"Cached counts for given system sucessfully updated."},"404":{"description":"System was not found.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}},"503":{"description":"Service is running in read-only mode.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/inventory_id"}],"tags":["internal"]}}},"components":{"parameters":{"filter":{"in":"query","name":"filter","description":"Full text filter.","schema":{"type":"string"},"example":"INV-ID-1234"},"limit":{"in":"query","name":"limit","description":"Maximum number of records per page. Limit/Offset pagination wins over page/page_size pagination.","schema":{"type":"integer"},"example":25},"offset":{"in":"query","name":"offset","description":"Offset of first record of paginated response. Limit/Offset pagination wins over page/page_size pagination.","schema":{"type":"integer"},"example":1},"page":{"in":"query","name":"page","description":"Page number of paginated response. Limit/Offset pagination wins over page/page_size pagination.","schema":{"type":"integer"},"example":1},"page_size":{"in":"query","name":"page_size","description":"Page size of paginated response. Limit/Offset pagination wins over page/page_size pagination.","schema":{"type":"integer"},"example":25},"sort":{"in":"query","name":"sort","description":"Sorting used for response.","schema":{"type":"string"},"example":"-inventory_id"},"inventory_id":{"in":"path","name":"inventory_id","description":"Inventory ID.","required":true,"schema":{"type":"string"},"example":"INV-ID-0000-1234"},"cve_id":{"in":"path","name":"cve_id","description":"CVE id.","required":true,"schema":{"type":"string"},"example":"CVE-2016-0800"},"public_from":{"in":"query","name":"public_from","description":"Filter CVEs based on their published date, starting from the date.","schema":{"type":"string"},"example":"2017-09-18T00:00:00+00:00"},"public_to":{"in":"query","name":"public_to","description":"Filter CVEs based on their published date, up to the date.","schema":{"type":"string"},"example":"2017-09-18T00:00:00+00:00"},"cvss_from":{"in":"query","name":"cvss_from","description":"Filter based on cvss score, starting from the value.","schema":{"type":"number"},"example":4.6},"cvss_to":{"in":"query","name":"cvss_to","description":"Filter based on cvss score, up to the value.","schema":{"type":"number"},"example":7.2},"impact":{"in":"query","name":"impact","description":"Filter based on impact IDs.","schema":{"type":"string"},"example":"5,7"},"status_id":{"in":"query","name":"status_id","description":"Filer based on CVE status ID.","schema":{"type":"string","example":"1,4"}},"data_format":{"in":"query","name":"data_format","description":"Format of the output data, either JSON (default) or CSV.","schema":{"type":"string","example":"json"}},"account_id":{"in":"path","name":"account_id","description":"Account ID of user.","required":true,"schema":{"type":"string"},"example":"123456"}},"securitySchemes":{"BasicAuth":{"type":"http","scheme":"basic","description":"Username and password login.","x-basicInfoFunc":"manager.base.basic_auth"},"ApiKeyAuth":{"type":"apiKey","in":"header","name":"x-rh-identity","description":"Identity header provided by 3scale (for non-prod testing only).","x-apikeyInfoFunc":"manager.base.auth"},"ApiKeyAuthInternal":{"type":"apiKey","in":"header","name":"x-rh-identity","description":"Identity header provided by 3scale (for non-prod testing only).","x-apikeyInfoFunc":"manager.base.auth_internal"}},"schemas":{"Errors":{"type":"object","properties":{"errors":{"type":"array","items":{"type":"object","properties":{"detail":{"type":"string","description":"Error detail.","example":"Record not found."},"status":{"type":"string","description":"String representation of HTTP status code.","example":404}},"required":["detail","status"]},"minItems":1}},"required":["errors"]},"Links":{"type":"object","properties":{"first":{"type":"string","description":"Link to first page.","example":"/api?offset=0&limit=1"},"last":{"type":"string","description":"Link to last page.","example":"/api?offset=7&limit=1"},"next":{"type":"string","description":"Link to next page.","example":"/api?offset=5&limit=1","nullable":true},"previous":{"type":"string","description":"Link to next page.","example":"/api?offset=3&limit=1","nullable":true}},"required":["first","last","next","previous"]},"Meta":{"type":"object","properties":{"filter":{"type":"string","description":"Full text filter","example":"CVE-2016-0800","nullable":true},"limit":{"type":"integer","description":"Maximum number of paginated results.","example":25},"offset":{"type":"integer","description":"First record of paginated response.","example":0},"page":{"type":"integer","description":"Page number of paginated response.","example":1},"page_size":{"type":"integer","description":"Number of records per page of paginated response.","example":25},"pages":{"type":"integer","description":"Total number of pages of paginated response.","example":1},"sort":{"type":"string","description":"Sorting filter.","example":"-inventory_id","nullable":true},"total_items":{"type":"integer","description":"Total number of records.","example":37},"data_format":{"type":"string","description":"Format of the output data, either JSON (default) or CSV.","example":"JSON"}},"required":["filter","limit","offset","page","page_size","pages","sort","total_items","data_format"]},"MetaVulnerabilitiesOut":{"allOf":[{"$ref":"#/components/schemas/Meta"},{"type":"object","properties":{"cvss_from":{"type":"number","description":"Filter based on cvss score, starting from the value.","example":4.6,"nullable":true},"cvss_to":{"type":"number","description":"Filter based on cvss score, up to the value.","example":7.2,"nullable":true},"show_all":{"type":"boolean","description":"Show all known vulnerabilities, regardless of number of affected systems.","example":true,"nullable":true},"public_from":{"type":"string","description":"Filter CVEs based on their published date, starting from the date.","example":"2017-09-18T00:00:00+00:00","nullable":true},"public_to":{"type":"string","description":"Filter CVEs based on their published date, up to the date.","example":"2017-09-18T00:00:00+00:00","nullable":true},"impact":{"type":"string","description":"Filter based on impact IDs.","example":"5,7","nullable":true}},"required":["cvss_from","cvss_to","show_all","public_from","public_to","impact"]}]},"MetaAffectedSystems":{"allOf":[{"$ref":"#/components/schemas/Meta"},{"type":"object","properties":{"status_id":{"type":"string","description":"Filer based on CVE status ID.","example":"1,4","nullable":true}},"required":["status_id"]}]},"MetaSystems":{"allOf":[{"$ref":"#/components/schemas/Meta"},{"type":"object","properties":{"opt_out":{"type":"boolean","description":"Whether the filter to show opted out systems is active or not. If not set, defaults to hiding opted out systems.","example":false,"nullable":true}},"required":["opt_out"]}]},"MetaCves":{"allOf":[{"$ref":"#/components/schemas/Meta"},{"type":"object","properties":{"cvss_from":{"type":"number","description":"Filter based on cvss score, starting from the value.","example":4.6,"nullable":true},"cvss_to":{"type":"number","description":"Filter based on cvss score, up to the value.","example":7.2,"nullable":true},"public_from":{"type":"string","description":"Filter CVEs based on their published date, starting from the date.","example":"2017-09-18T00:00:00+00:00","nullable":true},"public_to":{"type":"string","description":"Filter CVEs based on their published date, up to the date.","example":"2017-09-18T00:00:00+00:00","nullable":true},"impact":{"type":"string","description":"Filter based on impact IDs.","example":"5,7","nullable":true},"status_id":{"type":"string","description":"Filer based on CVE status ID.","example":"1,4","nullable":true}},"required":["cvss_from","cvss_to","public_from","public_to","status_id"]}]},"MetaCvesSystems":{"allOf":[{"$ref":"#/components/schemas/MetaCves"},{"type":"object","properties":{"opt_out":{"type":"boolean","description":"If given system was opted out.","example":true}},"required":["opt_out"]}]},"AffectedSystemsOut":{"type":"object","properties":{"data":{"oneOf":[{"type":"string","description":"CSV export of the JSON."},{"type":"array","items":{"type":"object","properties":{"id":{"type":"string","description":"Host id.","example":"INV-ID-0000-1234"},"type":{"type":"string","description":"Type of the record.","example":"system"},"attributes":{"type":"object","properties":{"inventory_id":{"type":"string","description":"Host ID.","example":"INV-ID00-0000-1234"},"last_evaluation":{"type":"string","description":"Date of last evaluation.","example":"2018-09-22T16:00:00+00:00"},"status_id":{"type":"integer","description":"Internal ID of the vulnerability status.","example":4},"status_name":{"type":"string","description":"Status of the vulnerability for the application's point of view.","example":"Resolved"}},"required":["inventory_id","last_evaluation","status_id","status_name"]}},"required":["id","type","attributes"]}}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaAffectedSystems"}},"required":["data","links","meta"]},"CveDetailOut":{"type":"object","properties":{"data":{"type":"object","properties":{"id":{"type":"string","description":"CVE id.","example":"CVE-2016-0800"},"type":{"type":"string","description":"Type of the record.","example":"cve"},"attributes":{"type":"object","properties":{"cvss2_metrics":{"type":"string","description":"cvss2 metrics of the CVE.","example":"AV:N/AC:M/Au:N/C:P/I:P/A:N"},"cvss2_score":{"type":"string","description":"String representation of cvss2 score of the CVE.","example":"5.800"},"cvss3_metrics":{"type":"string","description":"cvss3 metrics of the CVE.","example":"AV:N/AC:M/Au:N/C:P/I:P/A:N"},"cvss3_score":{"type":"string","description":"String representation of cvss3 score of the CVE.","example":"4.400"},"cwe_list":{"type":"array","items":{"type":"string","description":"CWE.","example":["CWE-400","CWE-401"]}},"description":{"type":"string","description":"Description of the CVE.","example":"A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker could..."},"errata_list":{"type":"array","description":"List of Red Hat erratas fixing the CVE.","items":{"type":"string","description":"Name of the erratum.","example":["RHSA-2016:0301","RHSA-2016:0372"]}},"modified_date":{"type":"string","description":"String representation of ISO-8601 formatted date of last modification of the CVE.","example":"2019-03-07T08:15:36+00:00"},"impact":{"type":"string","description":"Red Hat security impact of the CVE.","example":"Important"},"package_list":{"type":"array","description":"List of packages where the fix for the CVE appeared.","items":{"type":"string","description":"Name of the package containing fix for the CVE.","example":["openssl098e-0.9.8e-29.el7_2.3.i686","openssl-devel-1:1.0.1e-51.el7_2.4.x86_64","openssl-1:1.0.1e-51.el7_2.4.x86_64","openssl-libs-1:1.0.1e-51.el7_2.4.i686","openssl-devel-1:1.0.1e-51.el7_2.4.i686","openssl-libs-1:1.0.1e-51.el7_2.4.x86_64","openssl098e-0.9.8e-29.el7_2.3.x86_64"]}},"public_date":{"type":"string","description":"String representation of ISO-8601 formatted date of first public disclosure of the CVE.","example":"2016-03-01T00:00:00+00:00"},"redhat_url":{"type":"string","description":"Additional resource about the CVE, provided by Red Hat.","example":"https://access.redhat.com/security/cve/cve-2016-0800"},"secondary_url":{"type":"string","description":"Additional resources about the CVE.","example":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800"},"synopsis":{"type":"string","description":"Synopsis of the CVE.","example":"CVE-2016-0800"}},"required":["cvss2_metrics","cvss2_score","cvss3_metrics","cvss3_score","cwe_list","description","errata_list","impact","modified_date","package_list","public_date","redhat_url","secondary_url","synopsis"]}},"required":["id","type","attributes"]}}},"InventoryIdOrList":{"oneOf":[{"type":"string","description":"Inventory ID.","example":"f35b1e1d-d231-43f2-8e4f-8f9cb01e3aa2"},{"type":"array","items":{"type":"string","example":"f35b1e1d-d231-43f2-8e4f-8f9cb01e3aa2"},"description":"List of inventory IDs for a bulk change."}],"example":"f35b1e1d-d231-43f2-8e4f-8f9cb01e3aa2"},"OptOutIn":{"type":"object","properties":{"inventory_id":{"$ref":"#/components/schemas/InventoryIdOrList"},"opt_out":{"type":"boolean","description":"Opt out setting to be set.","example":true}},"required":["inventory_id","opt_out"]},"BulkChangeOut":{"type":"object","properties":{"updated":{"type":"array","items":{"type":"string","example":"f35b1e1d-d231-43f2-8e4f-8f9cb01e3aa2"},"description":"List of updated inventory IDs."}},"required":["updated"]},"StatusIn":{"type":"object","properties":{"inventory_id":{"type":"string","description":"Host ID.","example":"INV-ID00-0000-1234"},"cve":{"type":"string","description":"CVE name.","example":"CVE-2016-0800"},"status_id":{"type":"integer","description":"Status ID to be set, obtained by GET method.","example":3}},"required":["inventory_id","cve","status_id"]},"StatusListOut":{"type":"object","properties":{"data":{"type":"array","description":"List of available status/status_id pairs.","items":{"type":"object","properties":{"id":{"type":"integer","description":"Internal status_id.","example":3},"name":{"type":"string","description":"Represenation of internal status_id.","example":"Scheduled for Patch"}},"required":["id","name"]}},"meta":{"type":"object","properties":{"total_items":{"type":"integer","description":"Total number of available status/status_id pairs.","example":1}},"required":["total_items"]}},"required":["data","meta"]},"SystemCvesOut":{"type":"object","properties":{"data":{"oneOf":[{"type":"string","description":"CSV export of the JSON."},{"type":"array","items":{"type":"object","properties":{"id":{"type":"string","description":"CVE id.","example":"CVE-2016-0800"},"type":{"type":"string","description":"Type of the record.","example":"cve"},"attributes":{"type":"object","properties":{"cvss2_score":{"type":"string","description":"String representation of cvss2 score of the CVE.","example":"5.800"},"cvss3_score":{"type":"string","description":"String representation of cvss3 score of the CVE.","example":"4.400"},"description":{"type":"string","description":"Description of the CVE.","example":"A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker could..."},"impact":{"type":"string","description":"Red Hat security impact of the CVE.","example":"Important"},"public_date":{"type":"string","description":"String representation of ISO-8601 formatted date of first public disclosure of the CVE.","example":"2016-03-01T00:00:00+00:00"},"status":{"type":"string","description":"Status of the vulnerability for the application's point of view.","example":"Resolved"},"status_id":{"type":"integer","description":"Internal ID of the vulnerability status.","example":4},"synopsis":{"type":"string","description":"Synopsis of the CVE.","example":"CVE-2016-0800"}},"required":["cvss2_score","cvss3_score","description","impact","public_date","status","status_id","synopsis"]}},"required":["id","type","attributes"]}}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaCves"}},"required":["data","links","meta"]},"SystemDetailsOut":{"type":"object","properties":{"data":{"type":"object","properties":{"last_evaluation":{"type":"string","description":"Date of last evaluation.","example":"2018-09-22T16:00:00+00:00","nullable":true},"opt_out":{"type":"boolean","description":"System opt out status.","example":true},"last_upload":{"type":"string","description":"Date of the latest upload of archive.","example":"2018-09-22T16:00:00+00:00","nullable":true}},"required":["last_evaluation","opt_out","last_upload"]}},"required":["data"]},"SystemListOut":{"type":"object","properties":{"data":{"oneOf":[{"type":"string","description":"CSV export of the JSON."},{"type":"array","items":{"type":"object","properties":{"id":{"type":"string","description":"Host ID.","example":"INV-ID00-0000-1234"},"type":{"type":"string","description":"Type of the record.","example":"system"},"attributes":{"type":"object","properties":{"cve_count":{"type":"integer","description":"Number of CVE exposures for the system.","example":7,"nullable":true},"inventory_id":{"type":"string","description":"Host ID.","example":"INV-ID00-0000-1234"},"last_evaluation":{"type":"string","description":"Date of last evaluation.","example":"2018-09-22T16:00:00+00:00"},"opt_out":{"type":"boolean","description":"Opt out status of the system.","example":false},"last_upload":{"type":"string","description":"Date of the latest upload of archive.","example":"2018-09-22T16:00:00+00:00","nullable":true}},"required":["cve_count","inventory_id","last_evaluation","opt_out","last_upload"]}},"required":["id","type","attributes"]}}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaSystems"}},"required":["data","links","meta"]},"VulnerabilitiesOut":{"type":"object","properties":{"data":{"oneOf":[{"type":"string","description":"CSV export of the JSON."},{"type":"array","items":{"type":"object","properties":{"id":{"type":"string","description":"CVE id.","example":"CVE-2016-0800"},"type":{"type":"string","description":"Type of the record.","example":"cve"},"attributes":{"type":"object","properties":{"cvss2_score":{"type":"string","description":"String representation of cvss2 score of the CVE.","example":"5.800"},"cvss3_score":{"type":"string","description":"String representation of cvss3 score of the CVE.","example":"4.400"},"description":{"type":"string","description":"Description of the CVE.","example":"A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker could..."},"impact":{"type":"string","description":"Red Hat security impact of the CVE.","example":"Important"},"public_date":{"type":"string","description":"String representation of ISO-8601 formatted date of first public disclosure of the CVE.","example":"2016-03-01T00:00:00+00:00"},"synopsis":{"type":"string","description":"Synopsis of the CVE.","example":"CVE-2016-0800"},"systems_affected":{"type":"integer","description":"Number of systems affected by the CVE.","example":7}},"required":["cvss2_score","cvss3_score","description","impact","public_date","synopsis","systems_affected"]}},"required":["id","type","attributes"]}}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaVulnerabilitiesOut"}},"required":["data","links","meta"]},"VersionOut":{"type":"object","properties":{"application_version":{"oneOf":[{"type":"string"},{"type":"number"}],"description":"Version of application.","example":0.1},"database_version":{"oneOf":[{"type":"string"},{"type":"number"}],"description":"Version of database schema.","example":1}},"required":["application_version","database_version"]}}}} | ||
{"openapi":"3.0.0","info":{"title":"Vulnerability Engine Manager"},"paths":{"/v1/version":{"get":{"summary":"Application version","description":"Get application version.","operationId":"getVersion","x-methodName":"getVersion","responses":{"200":{"description":"Application version.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/VersionOut"}}}}}}},"/v1/business_risk":{"get":{"summary":"Available business risk/business_risk_id pairs.","description":"Returns available business risk and business_risk_id pairs where business_risk_id is internal ID of the business risk.","operationId":"getBusinessRiskList","x-methodName":"getBusinessRiskList","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"List of business risk/business_risk_id pairs.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/BusinessRiskListOut"}}}}}}},"/v1/cves/{cve_id}":{"get":{"summary":"Details of a CVE.","description":"Show all information about given CVE.","operationId":"getCveDetails","x-methodName":"getCveDetails","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"CVE details","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/CveDetailOut"}}}},"404":{"description":"Given CVE does not exist.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/cve_id"}]}},"/v1/cves/{cve_id}/affected_systems":{"get":{"summary":"Affected systems for a given CVE.","description":"Report of affected systems for a given CVE.","operationId":"getAffectedSystemsByCve","x-methodName":"getAffectedSystemsByCve","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"Report of affected systems for a given CVE.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/AffectedSystemsOut"}}}},"404":{"description":"Given CVE does not exist.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/sort"},{"$ref":"#/components/parameters/cve_id"},{"$ref":"#/components/parameters/status_id"},{"$ref":"#/components/parameters/data_format"}]}},"/v1/cves/business_risk":{"patch":{"summary":"Set business risk for a CVE.","description":"Sets business risk for a CVE.","operationId":"setCveBusinessRisk","x-methodName":"setCveBusinessRisk","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"requestBody":{"description":"Values to be set. At least one of the \"business_risk_id\" or \"business_risk_text\" parameters is required.","required":true,"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/CveRiskIn","x-body-name":"data"}}}},"responses":{"200":{"description":"Business risk sucessfully updated.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/BulkChangeOut"}}}},"404":{"description":"Given CVE does not exist.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}},"503":{"description":"Service is running in read-only mode.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}}}},"/v1/cves/status":{"patch":{"summary":"Set status for a CVE.","description":"Sets status for a CVE.","operationId":"setCveStatus","x-methodName":"setCveStatus","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"requestBody":{"description":"Values to be set. At least one of the \"status_id\" or \"status_text\" parameters is required.","required":true,"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/CveStatusIn","x-body-name":"data"}}}},"responses":{"200":{"description":"Status sucessfully updated.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/BulkChangeOut"}}}},"404":{"description":"Given CVE does not exist.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}},"503":{"description":"Service is running in read-only mode.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}}}},"/v1/status":{"get":{"summary":"Available status/status_id pairs.","description":"Returns available status and status_id pairs where status_id is internal ID of the status.","operationId":"getStatusList","x-methodName":"getStatusList","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"List of status/status_id pairs.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/StatusListOut"}}}}}},"patch":{"summary":"Set status for system vulnerabilites.","description":"Sets status for given hosts and CVEs.","operationId":"setStatus","x-methodName":"setStatus","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"requestBody":{"description":"Values to be set.","required":true,"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/StatusIn","x-body-name":"data"}}}},"responses":{"200":{"description":"Status sucessfully updated.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/StatusOut"}}}},"404":{"description":"Given host/CVE does not exist.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}},"503":{"description":"Service is running in read-only mode.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}}}},"/v1/systems":{"get":{"summary":"List systems.","description":"List systems visible to logged in account with basic information related to vulnerabilities.","operationId":"getSystemsList","x-methodName":"getSystemsList","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"System list","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/SystemListOut"}}}}},"parameters":[{"$ref":"#/components/parameters/filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/sort"},{"$ref":"#/components/parameters/data_format"},{"in":"query","name":"opt_out","description":"If set to true, shows systems which have been opted out from vulnerability application. If not set defaults to false.","schema":{"type":"boolean"},"example":true}]}},"/v1/systems/{inventory_id}":{"get":{"summary":"System details.","description":"Provides details of a system, e.g. it's opt out status.","operationId":"getSystemDetails","x-methodName":"getSystemDetails","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"System details","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/SystemDetailsOut"}}}},"404":{"description":"System has not been found in the database.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/inventory_id"}]},"delete":{"summary":"Delete system.","description":"Deletes system from database.","operationId":"deleteSystem","x-methodName":"deleteSystem","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"System has been deleted."},"404":{"description":"System has not been found in the database.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}},"503":{"description":"Service is running in read-only mode.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/inventory_id"}]}},"/v1/systems/{inventory_id}/cves":{"get":{"summary":"CVE report for a system.","description":"Shows detailed infomation about all CVEs the system is exposed to.","operationId":"getCveListBySystem","x-methodName":"getCveListBySystem","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"CVE report.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/SystemCvesOut"}}}},"404":{"description":"System has not been found in the database.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/inventory_id"},{"$ref":"#/components/parameters/filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/sort"},{"$ref":"#/components/parameters/cvss_from"},{"$ref":"#/components/parameters/cvss_to"},{"$ref":"#/components/parameters/public_from"},{"$ref":"#/components/parameters/public_to"},{"$ref":"#/components/parameters/impact"},{"$ref":"#/components/parameters/status_id"},{"$ref":"#/components/parameters/data_format"},{"$ref":"#/components/parameters/business_risk_id"}]}},"/v1/systems/{inventory_id}/opt_out":{"patch":{"summary":"Opt in/out a system to/from vulnerability application.","description":"Opts in/out a systems. Opted out system is not shown and manageable by the vulnerability application.","operationId":"setSystemOptOut","x-methodName":"setSystemOptOut","deprecated":true,"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"System setting has been updated."},"404":{"description":"System has not been found in the database.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}},"503":{"description":"Service is running in read-only mode.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/inventory_id"},{"in":"query","name":"value","description":"opt_out setting of the host.","required":true,"schema":{"type":"boolean","example":true}}]}},"/v1/systems/opt_out":{"patch":{"summary":"Opt in/out a system to/from vulnerability application.","description":"Opts in/out a systems. Opted out system is not shown and manageable by the vulnerability application.","operationId":"setSystemsOptOut","x-methodName":"setSystemsOptOut","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"requestBody":{"description":"Values to be set.","required":true,"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/OptOutIn","x-body-name":"data"}}}},"responses":{"200":{"description":"System(s) setting has been updated.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/BulkChangeOut"}}}},"503":{"description":"Service is running in read-only mode.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}}}},"/v1/vulnerabilities/cves":{"get":{"summary":"Vulnerabilities overview.","description":"Overview of vulnerabilities across whole host inventory.","operationId":"getCveList","x-methodName":"getCveList","security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"Vulnerabilities overview.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/VulnerabilitiesOut"}}}}},"parameters":[{"$ref":"#/components/parameters/filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/sort"},{"$ref":"#/components/parameters/cvss_from"},{"$ref":"#/components/parameters/cvss_to"},{"$ref":"#/components/parameters/public_from"},{"$ref":"#/components/parameters/public_to"},{"$ref":"#/components/parameters/impact"},{"$ref":"#/components/parameters/data_format"},{"$ref":"#/components/parameters/business_risk_id"},{"$ref":"#/components/parameters/status_id"},{"in":"query","name":"show_all","description":"Show all known vulnerabilities, regardless of number of affected systems.","schema":{"type":"boolean"},"example":true}]}},"/v1/refresh/accounts/{account_id}":{"put":{"summary":"Refresh cached counts for given account ID.","description":"Refresh cached counts for given account ID. Admin interface, available only to internal users.","operationId":"refreshAccount","x-methodName":"refreshAccount","security":[{"ApiKeyAuthInternal":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"Cached counts for given account sucessfully updated."},"404":{"description":"Account was not found.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}},"503":{"description":"Service is running in read-only mode.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/account_id"}],"tags":["internal"]}},"/v1/refresh/accounts/{account_id}/cves/{cve_id}":{"put":{"summary":"Refresh cached counts for given account ID and CVE.","description":"Refresh cached counts for given account ID and CVE. Admin interface, available only to internal users.","operationId":"refreshAccountCve","x-methodName":"refreshAccountCve","security":[{"ApiKeyAuthInternal":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"Cached counts for given account and CVE sucessfully updated."},"404":{"description":"Account or CVE was not found.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}},"503":{"description":"Service is running in read-only mode.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/account_id"},{"$ref":"#/components/parameters/cve_id"}],"tags":["internal"]}},"/v1/refresh/cves/{cve_id}":{"put":{"summary":"Refresh cached counts for given CVE.","description":"Refresh cached counts for given CVE. Admin interface, available only to internal users.","operationId":"refreshCve","x-methodName":"refreshCve","security":[{"ApiKeyAuthInternal":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"Cached counts for given CVE sucessfully updated."},"404":{"description":"CVE was not found.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}},"503":{"description":"Service is running in read-only mode.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/cve_id"}],"tags":["internal"]}},"/v1/refresh/systems/{inventory_id}":{"put":{"summary":"Refresh cached counts for given inventory ID.","description":"Refresh cached counts for given inventory ID. Admin interface, available only to internal users.","operationId":"refreshSystem","x-methodName":"refreshSystem","security":[{"ApiKeyAuthInternal":[]},{"BasicAuth":[]}],"responses":{"200":{"description":"Cached counts for given system sucessfully updated."},"404":{"description":"System was not found.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}},"503":{"description":"Service is running in read-only mode.","content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}}}},"parameters":[{"$ref":"#/components/parameters/inventory_id"}],"tags":["internal"]}}},"components":{"parameters":{"filter":{"in":"query","name":"filter","description":"Full text filter.","schema":{"type":"string"},"example":"INV-ID-1234"},"limit":{"in":"query","name":"limit","description":"Maximum number of records per page. Limit/Offset pagination wins over page/page_size pagination.","schema":{"type":"integer"},"example":25},"offset":{"in":"query","name":"offset","description":"Offset of first record of paginated response. Limit/Offset pagination wins over page/page_size pagination.","schema":{"type":"integer"},"example":1},"page":{"in":"query","name":"page","description":"Page number of paginated response. Limit/Offset pagination wins over page/page_size pagination.","schema":{"type":"integer"},"example":1},"page_size":{"in":"query","name":"page_size","description":"Page size of paginated response. Limit/Offset pagination wins over page/page_size pagination.","schema":{"type":"integer"},"example":25},"sort":{"in":"query","name":"sort","description":"Sorting used for response.","schema":{"type":"string"},"example":"-inventory_id"},"inventory_id":{"in":"path","name":"inventory_id","description":"Inventory ID.","required":true,"schema":{"type":"string"},"example":"INV-ID-0000-1234"},"cve_id":{"in":"path","name":"cve_id","description":"CVE id.","required":true,"schema":{"type":"string"},"example":"CVE-2016-0800"},"public_from":{"in":"query","name":"public_from","description":"Filter CVEs based on their published date, starting from the date.","schema":{"type":"string"},"example":"2017-09-18T00:00:00+00:00"},"public_to":{"in":"query","name":"public_to","description":"Filter CVEs based on their published date, up to the date.","schema":{"type":"string"},"example":"2017-09-18T00:00:00+00:00"},"cvss_from":{"in":"query","name":"cvss_from","description":"Filter based on cvss score, starting from the value.","schema":{"type":"number"},"example":4.6},"cvss_to":{"in":"query","name":"cvss_to","description":"Filter based on cvss score, up to the value.","schema":{"type":"number"},"example":7.2},"impact":{"in":"query","name":"impact","description":"Filter based on impact IDs.","schema":{"type":"string"},"example":"5,7"},"status_id":{"in":"query","name":"status_id","description":"Filer based on CVE status ID.","schema":{"type":"string","example":"1,4"}},"business_risk_id":{"in":"query","name":"business_risk_id","description":"Filter based on business risk IDs.","schema":{"type":"string","example":"1,3"}},"data_format":{"in":"query","name":"data_format","description":"Format of the output data, either JSON (default) or CSV.","schema":{"type":"string","example":"json"}},"account_id":{"in":"path","name":"account_id","description":"Account ID of user.","required":true,"schema":{"type":"string"},"example":"123456"}},"securitySchemes":{"BasicAuth":{"type":"http","scheme":"basic","description":"Username and password login.","x-basicInfoFunc":"manager.base.basic_auth"},"ApiKeyAuth":{"type":"apiKey","in":"header","name":"x-rh-identity","description":"Identity header provided by 3scale (for non-prod testing only).","x-apikeyInfoFunc":"manager.base.auth"},"ApiKeyAuthInternal":{"type":"apiKey","in":"header","name":"x-rh-identity","description":"Identity header provided by 3scale (for non-prod testing only).","x-apikeyInfoFunc":"manager.base.auth_internal"}},"schemas":{"Errors":{"type":"object","properties":{"errors":{"type":"array","items":{"type":"object","properties":{"detail":{"type":"string","description":"Error detail.","example":"Record not found."},"status":{"type":"string","description":"String representation of HTTP status code.","example":404}},"required":["detail","status"]},"minItems":1}},"required":["errors"]},"Links":{"type":"object","properties":{"first":{"type":"string","description":"Link to first page.","example":"/api?offset=0&limit=1"},"last":{"type":"string","description":"Link to last page.","example":"/api?offset=7&limit=1"},"next":{"type":"string","description":"Link to next page.","example":"/api?offset=5&limit=1","nullable":true},"previous":{"type":"string","description":"Link to next page.","example":"/api?offset=3&limit=1","nullable":true}},"required":["first","last","next","previous"]},"Meta":{"type":"object","properties":{"filter":{"type":"string","description":"Full text filter","example":"CVE-2016-0800","nullable":true},"limit":{"type":"integer","description":"Maximum number of paginated results.","example":25},"offset":{"type":"integer","description":"First record of paginated response.","example":0},"page":{"type":"integer","description":"Page number of paginated response.","example":1},"page_size":{"type":"integer","description":"Number of records per page of paginated response.","example":25},"pages":{"type":"integer","description":"Total number of pages of paginated response.","example":1},"sort":{"type":"string","description":"Sorting filter.","example":"-inventory_id","nullable":true},"total_items":{"type":"integer","description":"Total number of records.","example":37},"data_format":{"type":"string","description":"Format of the output data, either JSON (default) or CSV.","example":"JSON"}},"required":["filter","limit","offset","page","page_size","pages","sort","total_items","data_format"]},"MetaVulnerabilitiesOut":{"allOf":[{"$ref":"#/components/schemas/Meta"},{"type":"object","properties":{"business_risk_id":{"type":"string","description":"Filter based on business risk IDs.","example":"1,3","nullable":true},"cvss_from":{"type":"number","description":"Filter based on cvss score, starting from the value.","example":4.6,"nullable":true},"cvss_to":{"type":"number","description":"Filter based on cvss score, up to the value.","example":7.2,"nullable":true},"show_all":{"type":"boolean","description":"Show all known vulnerabilities, regardless of number of affected systems.","example":true,"nullable":true},"public_from":{"type":"string","description":"Filter CVEs based on their published date, starting from the date.","example":"2017-09-18T00:00:00+00:00","nullable":true},"public_to":{"type":"string","description":"Filter CVEs based on their published date, up to the date.","example":"2017-09-18T00:00:00+00:00","nullable":true},"impact":{"type":"string","description":"Filter based on impact IDs.","example":"5,7","nullable":true}},"required":["business_risk_id","cvss_from","cvss_to","show_all","public_from","public_to","impact"]}]},"MetaAffectedSystems":{"allOf":[{"$ref":"#/components/schemas/Meta"},{"type":"object","properties":{"status_id":{"type":"string","description":"Filer based on CVE status ID.","example":"1,4","nullable":true}},"required":["status_id"]}]},"MetaSystems":{"allOf":[{"$ref":"#/components/schemas/Meta"},{"type":"object","properties":{"opt_out":{"type":"boolean","description":"Whether the filter to show opted out systems is active or not. If not set, defaults to hiding opted out systems.","example":false,"nullable":true}},"required":["opt_out"]}]},"MetaCves":{"allOf":[{"$ref":"#/components/schemas/Meta"},{"type":"object","properties":{"business_risk_id":{"type":"string","description":"Filter based on business risk IDs.","example":"1,3","nullable":true},"cvss_from":{"type":"number","description":"Filter based on cvss score, starting from the value.","example":4.6,"nullable":true},"cvss_to":{"type":"number","description":"Filter based on cvss score, up to the value.","example":7.2,"nullable":true},"public_from":{"type":"string","description":"Filter CVEs based on their published date, starting from the date.","example":"2017-09-18T00:00:00+00:00","nullable":true},"public_to":{"type":"string","description":"Filter CVEs based on their published date, up to the date.","example":"2017-09-18T00:00:00+00:00","nullable":true},"impact":{"type":"string","description":"Filter based on impact IDs.","example":"5,7","nullable":true},"status_id":{"type":"string","description":"Filer based on CVE status ID.","example":"1,4","nullable":true}},"required":["business_risk_id","cvss_from","cvss_to","public_from","public_to","impact","status_id"]}]},"MetaCvesSystems":{"allOf":[{"$ref":"#/components/schemas/MetaCves"},{"type":"object","properties":{"opt_out":{"type":"boolean","description":"If given system was opted out.","example":true}},"required":["opt_out"]}]},"AffectedSystemsOut":{"type":"object","properties":{"data":{"oneOf":[{"type":"string","description":"CSV export of the JSON."},{"type":"array","items":{"type":"object","properties":{"id":{"type":"string","description":"Host id.","example":"INV-ID-0000-1234"},"type":{"type":"string","description":"Type of the record.","example":"system"},"attributes":{"type":"object","properties":{"inventory_id":{"type":"string","description":"Host ID.","example":"INV-ID00-0000-1234"},"last_evaluation":{"type":"string","description":"Date of last evaluation.","example":"2018-09-22T16:00:00+00:00"},"status_id":{"type":"integer","description":"Internal ID of the vulnerability status.","example":4},"status_name":{"type":"string","description":"Status of the vulnerability for the application's point of view.","example":"Resolved"},"status_text":{"type":"string","description":"Complementary text to the status.","example":"Not relevant","nullable":true}},"required":["inventory_id","last_evaluation","status_id","status_name","status_text"]}},"required":["id","type","attributes"]}}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaAffectedSystems"}},"required":["data","links","meta"]},"BusinessRiskListOut":{"type":"object","properties":{"data":{"type":"array","description":"List of available business risk/business_risk_id pairs.","items":{"type":"object","properties":{"id":{"type":"integer","description":"Internal business_risk_id.","example":3},"name":{"type":"string","description":"Represenation of internal business_risk_id.","example":"Low"}},"required":["id","name"]}},"meta":{"type":"object","properties":{"total_items":{"type":"integer","description":"Total number of available business risk/business_risk_id pairs.","example":1}},"required":["total_items"]}},"required":["data","meta"]},"CveDetailOut":{"type":"object","properties":{"data":{"type":"object","properties":{"id":{"type":"string","description":"CVE id.","example":"CVE-2016-0800"},"type":{"type":"string","description":"Type of the record.","example":"cve"},"attributes":{"type":"object","properties":{"business_risk":{"type":"string","description":"Business risk of the vulnerability.","example":"Low"},"business_risk_id":{"type":"integer","description":"Internal ID of the vulnerability business risk.","example":1},"business_risk_text":{"type":"string","description":"Complementary text to the business risk.","example":"QA environment => Low business risk","nullable":true},"cvss2_metrics":{"type":"string","description":"cvss2 metrics of the CVE.","example":"AV:N/AC:M/Au:N/C:P/I:P/A:N","nullable":true},"cvss2_score":{"type":"string","description":"String representation of cvss2 score of the CVE.","example":"5.800","nullable":true},"cvss3_metrics":{"type":"string","description":"cvss3 metrics of the CVE.","example":"AV:N/AC:M/Au:N/C:P/I:P/A:N","nullable":true},"cvss3_score":{"type":"string","description":"String representation of cvss3 score of the CVE.","example":"4.400","nullable":true},"description":{"type":"string","description":"Description of the CVE.","example":"A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker could..."},"modified_date":{"type":"string","description":"String representation of ISO-8601 formatted date of last modification of the CVE.","example":"2019-03-07T08:15:36+00:00","nullable":true},"impact":{"type":"string","description":"Red Hat security impact of the CVE.","example":"Important"},"public_date":{"type":"string","description":"String representation of ISO-8601 formatted date of first public disclosure of the CVE.","example":"2016-03-01T00:00:00+00:00","nullable":true},"redhat_url":{"type":"string","description":"Additional resource about the CVE, provided by Red Hat.","example":"https://access.redhat.com/security/cve/cve-2016-0800","nullable":true},"secondary_url":{"type":"string","description":"Additional resources about the CVE.","example":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800","nullable":true},"status":{"type":"string","description":"Status of the vulnerability.","example":"Not Reviewed"},"status_id":{"type":"integer","description":"Internal ID of the vulnerability status.","example":1},"status_text":{"type":"string","description":"Complementary text to the status.","example":"Not relevant","nullable":true},"synopsis":{"type":"string","description":"Synopsis of the CVE.","example":"CVE-2016-0800"},"systems_status_detail":{"type":"object","description":"Counts of systems with given status type."},"systems_status_divergent":{"type":"integer","description":"How many systems-CVE pairs have different status than CVE-level.","example":20}},"required":["business_risk","business_risk_id","business_risk_text","cvss2_metrics","cvss2_score","cvss3_metrics","cvss3_score","description","impact","modified_date","public_date","redhat_url","secondary_url","status","status_id","status_text","synopsis","systems_status_detail","systems_status_divergent"]}},"required":["id","type","attributes"]}}},"CveRiskIn":{"type":"object","properties":{"cve":{"$ref":"#/components/schemas/CveOrList"},"business_risk_id":{"type":"integer","description":"Business risk ID to be set, obtained by GET method.","example":3},"business_risk_text":{"type":"string","description":"Complementary text to the business risk.","example":"Not relevant","nullable":true}},"required":["cve"]},"CveStatusIn":{"type":"object","properties":{"cve":{"$ref":"#/components/schemas/CveOrList"},"status_id":{"type":"integer","description":"Status ID to be set, obtained by GET method.","example":3},"status_text":{"type":"string","description":"Complementary text to the status.","example":"Not relevant","nullable":true}},"required":["cve"]},"CveOrList":{"oneOf":[{"type":"string","description":"CVE name.","example":"CVE-2016-0800"},{"type":"array","items":{"type":"string","example":"CVE-2016-0800"},"description":"List of CVEs for a bulk change."}],"example":"CVE-2016-0800"},"InventoryIdOrList":{"oneOf":[{"type":"string","description":"Inventory ID.","example":"f35b1e1d-d231-43f2-8e4f-8f9cb01e3aa2"},{"type":"array","items":{"type":"string","example":"f35b1e1d-d231-43f2-8e4f-8f9cb01e3aa2"},"description":"List of inventory IDs for a bulk change."}],"example":"f35b1e1d-d231-43f2-8e4f-8f9cb01e3aa2"},"OptOutIn":{"type":"object","properties":{"inventory_id":{"$ref":"#/components/schemas/InventoryIdOrList"},"opt_out":{"type":"boolean","description":"Opt out setting to be set.","example":true}},"required":["inventory_id","opt_out"]},"BulkChangeOut":{"type":"object","properties":{"updated":{"type":"array","items":{"type":"string","example":"f35b1e1d-d231-43f2-8e4f-8f9cb01e3aa2"},"description":"List of updated objects/updated object IDs."}},"required":["updated"]},"StatusIn":{"type":"object","properties":{"inventory_id":{"$ref":"#/components/schemas/InventoryIdOrList"},"cve":{"$ref":"#/components/schemas/CveOrList"},"status_id":{"type":"integer","description":"Status ID to be set, obtained by GET method. If not specified, global CVE status is set.","example":3},"status_text":{"type":"string","description":"Complementary text to the status.","example":"Not relevant","nullable":true}},"required":["cve"]},"StatusOut":{"type":"object","properties":{"updated":{"type":"array","items":{"type":"object","properties":{"inventory_id":{"type":"string","example":"f35b1e1d-d231-43f2-8e4f-8f9cb01e3aa2"},"cve":{"type":"string","example":"CVE-2016-0800"}},"required":["inventory_id","cve"]},"description":"List of updated objects/updated object IDs."}},"required":["updated"]},"StatusListOut":{"type":"object","properties":{"data":{"type":"array","description":"List of available status/status_id pairs.","items":{"type":"object","properties":{"id":{"type":"integer","description":"Internal status_id.","example":3},"name":{"type":"string","description":"Represenation of internal status_id.","example":"Scheduled for Patch"}},"required":["id","name"]}},"meta":{"type":"object","properties":{"total_items":{"type":"integer","description":"Total number of available status/status_id pairs.","example":1}},"required":["total_items"]}},"required":["data","meta"]},"SystemCvesOut":{"type":"object","properties":{"data":{"oneOf":[{"type":"string","description":"CSV export of the JSON."},{"type":"array","items":{"type":"object","properties":{"id":{"type":"string","description":"CVE id.","example":"CVE-2016-0800"},"type":{"type":"string","description":"Type of the record.","example":"cve"},"attributes":{"type":"object","properties":{"business_risk":{"type":"string","description":"Business risk of the vulnerability.","example":"Low"},"business_risk_id":{"type":"integer","description":"Internal ID of the vulnerability business risk.","example":1},"business_risk_text":{"type":"string","description":"Complementary text to the business risk.","example":"QA environment => Low business risk","nullable":true},"cvss2_score":{"type":"string","description":"String representation of cvss2 score of the CVE.","example":"5.800","nullable":true},"cvss3_score":{"type":"string","description":"String representation of cvss3 score of the CVE.","example":"4.400","nullable":true},"description":{"type":"string","description":"Description of the CVE.","example":"A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker could..."},"impact":{"type":"string","description":"Red Hat security impact of the CVE.","example":"Important"},"public_date":{"type":"string","description":"String representation of ISO-8601 formatted date of first public disclosure of the CVE.","example":"2016-03-01T00:00:00+00:00","nullable":true},"status":{"type":"string","description":"Status of the vulnerability for the application's point of view.","example":"Resolved"},"status_id":{"type":"integer","description":"Internal ID of the vulnerability status.","example":4},"status_text":{"type":"string","description":"Complementary text to the status.","example":"Not relevant","nullable":true},"synopsis":{"type":"string","description":"Synopsis of the CVE.","example":"CVE-2016-0800"}},"required":["business_risk","business_risk_id","business_risk_text","cvss2_score","cvss3_score","description","impact","public_date","status","status_id","status_text","synopsis"]}},"required":["id","type","attributes"]}}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaCves"}},"required":["data","links","meta"]},"SystemDetailsOut":{"type":"object","properties":{"data":{"type":"object","properties":{"last_evaluation":{"type":"string","description":"Date of last evaluation.","example":"2018-09-22T16:00:00+00:00","nullable":true},"opt_out":{"type":"boolean","description":"System opt out status.","example":true},"last_upload":{"type":"string","description":"Date of the latest upload of archive.","example":"2018-09-22T16:00:00+00:00","nullable":true}},"required":["last_evaluation","opt_out","last_upload"]}},"required":["data"]},"SystemListOut":{"type":"object","properties":{"data":{"oneOf":[{"type":"string","description":"CSV export of the JSON."},{"type":"array","items":{"type":"object","properties":{"id":{"type":"string","description":"Host ID.","example":"INV-ID00-0000-1234"},"type":{"type":"string","description":"Type of the record.","example":"system"},"attributes":{"type":"object","properties":{"cve_count":{"type":"integer","description":"Number of CVE exposures for the system.","example":7,"nullable":true},"inventory_id":{"type":"string","description":"Host ID.","example":"INV-ID00-0000-1234"},"last_evaluation":{"type":"string","description":"Date of last evaluation.","example":"2018-09-22T16:00:00+00:00"},"opt_out":{"type":"boolean","description":"Opt out status of the system.","example":false},"last_upload":{"type":"string","description":"Date of the latest upload of archive.","example":"2018-09-22T16:00:00+00:00","nullable":true}},"required":["cve_count","inventory_id","last_evaluation","opt_out","last_upload"]}},"required":["id","type","attributes"]}}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaSystems"}},"required":["data","links","meta"]},"VulnerabilitiesOut":{"type":"object","properties":{"data":{"oneOf":[{"type":"string","description":"CSV export of the JSON."},{"type":"array","items":{"type":"object","properties":{"id":{"type":"string","description":"CVE id.","example":"CVE-2016-0800"},"type":{"type":"string","description":"Type of the record.","example":"cve"},"attributes":{"type":"object","properties":{"business_risk":{"type":"string","description":"Business risk of the vulnerability.","example":"Low"},"business_risk_id":{"type":"integer","description":"Internal ID of the vulnerability business risk.","example":1},"business_risk_text":{"type":"string","description":"Complementary text to the business risk.","example":"QA environment => Low business risk","nullable":true},"cvss2_score":{"type":"string","description":"String representation of cvss2 score of the CVE.","example":"5.800","nullable":true},"cvss3_score":{"type":"string","description":"String representation of cvss3 score of the CVE.","example":"4.400","nullable":true},"description":{"type":"string","description":"Description of the CVE.","example":"A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker could..."},"impact":{"type":"string","description":"Red Hat security impact of the CVE.","example":"Important"},"public_date":{"type":"string","description":"String representation of ISO-8601 formatted date of first public disclosure of the CVE.","example":"2016-03-01T00:00:00+00:00","nullable":true},"status":{"type":"string","description":"Status of the vulnerability.","example":"Not Reviewed"},"status_id":{"type":"integer","description":"Internal ID of the vulnerability status.","example":1},"status_text":{"type":"string","description":"Complementary text to the status.","example":"Not Relevant","nullable":true},"synopsis":{"type":"string","description":"Synopsis of the CVE.","example":"CVE-2016-0800"},"systems_affected":{"type":"integer","description":"Number of systems affected by the CVE.","example":7},"systems_status_divergent":{"type":"integer","description":"How many systems-CVE pairs have different status than CVE-level.","example":20}},"required":["business_risk","business_risk_id","business_risk_text","cvss2_score","cvss3_score","description","impact","public_date","status","status_id","status_text","synopsis","systems_affected","systems_status_divergent"]}},"required":["id","type","attributes"]}}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaVulnerabilitiesOut"}},"required":["data","links","meta"]},"VersionOut":{"type":"object","properties":{"application_version":{"oneOf":[{"type":"string"},{"type":"number"}],"description":"Version of application.","example":0.1},"database_version":{"oneOf":[{"type":"string"},{"type":"number"}],"description":"Version of database schema.","example":1}},"required":["application_version","database_version"]}}}} |
@@ -35,2 +35,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [DefaultApi](../classes/defaultapi.md) | ||
* [getAffectedSystemsByCve](defaultapi.md#getaffectedsystemsbycve) | ||
* [getBusinessRiskList](defaultapi.md#getbusinessrisklist) | ||
* [getCveDetails](defaultapi.md#getcvedetails) | ||
@@ -43,2 +44,4 @@ * [getCveList](defaultapi.md#getcvelist) | ||
* [getVersion](defaultapi.md#getversion) | ||
* [setCveBusinessRisk](defaultapi.md#setcvebusinessrisk) | ||
* [setCveStatus](defaultapi.md#setcvestatus) | ||
* [setStatus](defaultapi.md#setstatus) | ||
@@ -118,3 +121,3 @@ * [setSystemOptOut](defaultapi.md#setsystemoptout) | ||
*Defined in [api.ts:2214](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2214)* | ||
*Defined in [api.ts:2648](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2648)* | ||
@@ -145,3 +148,3 @@ Deletes system from database. | ||
*Defined in [api.ts:2234](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2234)* | ||
*Defined in [api.ts:2668](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2668)* | ||
@@ -174,2 +177,27 @@ Report of affected systems for a given CVE. | ||
___ | ||
<a id="getbusinessrisklist"></a> | ||
### getBusinessRiskList | ||
▸ **getBusinessRiskList**(options?: *`any`*): `AxiosPromise`<[BusinessRiskListOut](../interfaces/businessrisklistout.md)> | ||
*Defined in [api.ts:2679](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2679)* | ||
Returns available business risk and business\_risk\_id pairs where business\_risk\_id is internal ID of the business risk. | ||
*__summary__*: Available business risk/business\_risk\_id pairs. | ||
*__throws__*: {RequiredError} | ||
*__memberof__*: DefaultApi | ||
**Parameters:** | ||
| Name | Type | | ||
| ------ | ------ | | ||
| `Optional` options | `any` | | ||
**Returns:** `AxiosPromise`<[BusinessRiskListOut](../interfaces/businessrisklistout.md)> | ||
___ | ||
<a id="getcvedetails"></a> | ||
@@ -181,3 +209,3 @@ | ||
*Defined in [api.ts:2246](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2246)* | ||
*Defined in [api.ts:2691](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2691)* | ||
@@ -206,5 +234,5 @@ Show all information about given CVE. | ||
▸ **getCveList**(filter?: *`string`*, limit?: *`number`*, offset?: *`number`*, page?: *`number`*, pageSize?: *`number`*, sort?: *`string`*, cvssFrom?: *`number`*, cvssTo?: *`number`*, publicFrom?: *`string`*, publicTo?: *`string`*, impact?: *`string`*, dataFormat?: *`string`*, showAll?: *`boolean`*, options?: *`any`*): `AxiosPromise`<[VulnerabilitiesOut](../interfaces/vulnerabilitiesout.md)> | ||
▸ **getCveList**(filter?: *`string`*, limit?: *`number`*, offset?: *`number`*, page?: *`number`*, pageSize?: *`number`*, sort?: *`string`*, cvssFrom?: *`number`*, cvssTo?: *`number`*, publicFrom?: *`string`*, publicTo?: *`string`*, impact?: *`string`*, dataFormat?: *`string`*, businessRiskId?: *`string`*, statusId?: *`string`*, showAll?: *`boolean`*, options?: *`any`*): `AxiosPromise`<[VulnerabilitiesOut](../interfaces/vulnerabilitiesout.md)> | ||
*Defined in [api.ts:2270](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2270)* | ||
*Defined in [api.ts:2717](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2717)* | ||
@@ -235,2 +263,4 @@ Overview of vulnerabilities across whole host inventory. | ||
| `Optional` dataFormat | `string` | | ||
| `Optional` businessRiskId | `string` | | ||
| `Optional` statusId | `string` | | ||
| `Optional` showAll | `boolean` | | ||
@@ -246,5 +276,5 @@ | `Optional` options | `any` | | ||
▸ **getCveListBySystem**(inventoryId: *`string`*, filter?: *`string`*, limit?: *`number`*, offset?: *`number`*, page?: *`number`*, pageSize?: *`number`*, sort?: *`string`*, cvssFrom?: *`number`*, cvssTo?: *`number`*, publicFrom?: *`string`*, publicTo?: *`string`*, impact?: *`string`*, statusId?: *`string`*, dataFormat?: *`string`*, options?: *`any`*): `AxiosPromise`<[SystemCvesOut](../interfaces/systemcvesout.md)> | ||
▸ **getCveListBySystem**(inventoryId: *`string`*, filter?: *`string`*, limit?: *`number`*, offset?: *`number`*, page?: *`number`*, pageSize?: *`number`*, sort?: *`string`*, cvssFrom?: *`number`*, cvssTo?: *`number`*, publicFrom?: *`string`*, publicTo?: *`string`*, impact?: *`string`*, statusId?: *`string`*, dataFormat?: *`string`*, businessRiskId?: *`string`*, options?: *`any`*): `AxiosPromise`<[SystemCvesOut](../interfaces/systemcvesout.md)> | ||
*Defined in [api.ts:2295](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2295)* | ||
*Defined in [api.ts:2743](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2743)* | ||
@@ -277,2 +307,3 @@ Shows detailed infomation about all CVEs the system is exposed to. | ||
| `Optional` dataFormat | `string` | | ||
| `Optional` businessRiskId | `string` | | ||
| `Optional` options | `any` | | ||
@@ -289,3 +320,3 @@ | ||
*Defined in [api.ts:2306](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2306)* | ||
*Defined in [api.ts:2754](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2754)* | ||
@@ -315,3 +346,3 @@ Returns available status and status\_id pairs where status\_id is internal ID of the status. | ||
*Defined in [api.ts:2318](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2318)* | ||
*Defined in [api.ts:2766](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2766)* | ||
@@ -342,3 +373,3 @@ Provides details of a system, e.g. it's opt out status. | ||
*Defined in [api.ts:2337](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2337)* | ||
*Defined in [api.ts:2785](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2785)* | ||
@@ -376,3 +407,3 @@ List systems visible to logged in account with basic information related to vulnerabilities. | ||
*Defined in [api.ts:2348](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2348)* | ||
*Defined in [api.ts:2796](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2796)* | ||
@@ -396,2 +427,54 @@ Get application version. | ||
___ | ||
<a id="setcvebusinessrisk"></a> | ||
### setCveBusinessRisk | ||
▸ **setCveBusinessRisk**(cveRiskIn: *[CveRiskIn](../interfaces/cveriskin.md)*, options?: *`any`*): `AxiosPromise`<[BulkChangeOut](../interfaces/bulkchangeout.md)> | ||
*Defined in [api.ts:2808](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2808)* | ||
Sets business risk for a CVE. | ||
*__summary__*: Set business risk for a CVE. | ||
*__throws__*: {RequiredError} | ||
*__memberof__*: DefaultApi | ||
**Parameters:** | ||
| Name | Type | Description | | ||
| ------ | ------ | ------ | | ||
| cveRiskIn | [CveRiskIn](../interfaces/cveriskin.md) | Values to be set. At least one of the "business\_risk\_id" or "business\_risk\_text" parameters is required. | | ||
| `Optional` options | `any` | | ||
**Returns:** `AxiosPromise`<[BulkChangeOut](../interfaces/bulkchangeout.md)> | ||
___ | ||
<a id="setcvestatus"></a> | ||
### setCveStatus | ||
▸ **setCveStatus**(cveStatusIn: *[CveStatusIn](../interfaces/cvestatusin.md)*, options?: *`any`*): `AxiosPromise`<[BulkChangeOut](../interfaces/bulkchangeout.md)> | ||
*Defined in [api.ts:2820](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2820)* | ||
Sets status for a CVE. | ||
*__summary__*: Set status for a CVE. | ||
*__throws__*: {RequiredError} | ||
*__memberof__*: DefaultApi | ||
**Parameters:** | ||
| Name | Type | Description | | ||
| ------ | ------ | ------ | | ||
| cveStatusIn | [CveStatusIn](../interfaces/cvestatusin.md) | Values to be set. At least one of the "status\_id" or "status\_text" parameters is required. | | ||
| `Optional` options | `any` | | ||
**Returns:** `AxiosPromise`<[BulkChangeOut](../interfaces/bulkchangeout.md)> | ||
___ | ||
<a id="setstatus"></a> | ||
@@ -401,9 +484,9 @@ | ||
▸ **setStatus**(statusIn: *[StatusIn](../interfaces/statusin.md)*, options?: *`any`*): `AxiosPromise`<`Response`> | ||
▸ **setStatus**(statusIn: *[StatusIn](../interfaces/statusin.md)*, options?: *`any`*): `AxiosPromise`<[StatusOut](../interfaces/statusout.md)> | ||
*Defined in [api.ts:2360](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2360)* | ||
*Defined in [api.ts:2832](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2832)* | ||
Sets status for given host and CVE. | ||
Sets status for given hosts and CVEs. | ||
*__summary__*: Set status for system vulnerability. | ||
*__summary__*: Set status for system vulnerabilites. | ||
@@ -421,3 +504,3 @@ *__throws__*: {RequiredError} | ||
**Returns:** `AxiosPromise`<`Response`> | ||
**Returns:** `AxiosPromise`<[StatusOut](../interfaces/statusout.md)> | ||
@@ -431,3 +514,3 @@ ___ | ||
*Defined in [api.ts:2373](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2373)* | ||
*Defined in [api.ts:2845](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2845)* | ||
@@ -459,3 +542,3 @@ Opts in/out a systems. Opted out system is not shown and manageable by the vulnerability application. | ||
*Defined in [api.ts:2385](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2385)* | ||
*Defined in [api.ts:2857](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2857)* | ||
@@ -462,0 +545,0 @@ Opts in/out a systems. Opted out system is not shown and manageable by the vulnerability application. |
@@ -108,3 +108,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [InternalApi](../classes/internalapi.md) | ||
*Defined in [api.ts:2725](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2725)* | ||
*Defined in [api.ts:3197](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L3197)* | ||
@@ -135,3 +135,3 @@ Refresh cached counts for given account ID. Admin interface, available only to internal users. | ||
*Defined in [api.ts:2738](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2738)* | ||
*Defined in [api.ts:3210](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L3210)* | ||
@@ -163,3 +163,3 @@ Refresh cached counts for given account ID and CVE. Admin interface, available only to internal users. | ||
*Defined in [api.ts:2750](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2750)* | ||
*Defined in [api.ts:3222](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L3222)* | ||
@@ -190,3 +190,3 @@ Refresh cached counts for given CVE. Admin interface, available only to internal users. | ||
*Defined in [api.ts:2762](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2762)* | ||
*Defined in [api.ts:3234](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L3234)* | ||
@@ -193,0 +193,0 @@ Refresh cached counts for given inventory ID. Admin interface, available only to internal users. |
@@ -31,3 +31,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [BulkChangeOut](../interfaces/bulkchangeout.md) | ||
List of updated inventory IDs. | ||
List of updated objects/updated object IDs. | ||
@@ -34,0 +34,0 @@ *__type__*: {Array} |
@@ -29,3 +29,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [CveDetailOut](../interfaces/cvedetailout.md) | ||
*Defined in [api.ts:123](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L123)* | ||
*Defined in [api.ts:177](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L177)* | ||
@@ -32,0 +32,0 @@ *__type__*: {CveDetailOutData} |
@@ -31,3 +31,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [CveDetailOutData](../interfaces/cvedetailoutdata.md) | ||
*Defined in [api.ts:149](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L149)* | ||
*Defined in [api.ts:203](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L203)* | ||
@@ -45,3 +45,3 @@ *__type__*: {CveDetailOutDataAttributes} | ||
*Defined in [api.ts:137](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L137)* | ||
*Defined in [api.ts:191](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L191)* | ||
@@ -61,3 +61,3 @@ CVE id. | ||
*Defined in [api.ts:143](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L143)* | ||
*Defined in [api.ts:197](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L197)* | ||
@@ -64,0 +64,0 @@ Type of the record. |
@@ -17,2 +17,5 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [CveDetailOutDataAttributes](../interfaces/cvedetailoutdataattributes.md) | ||
* [businessRisk](cvedetailoutdataattributes.md#businessrisk) | ||
* [businessRiskId](cvedetailoutdataattributes.md#businessriskid) | ||
* [businessRiskText](cvedetailoutdataattributes.md#businessrisktext) | ||
* [cvss2Metrics](cvedetailoutdataattributes.md#cvss2metrics) | ||
@@ -22,12 +25,14 @@ * [cvss2Score](cvedetailoutdataattributes.md#cvss2score) | ||
* [cvss3Score](cvedetailoutdataattributes.md#cvss3score) | ||
* [cweList](cvedetailoutdataattributes.md#cwelist) | ||
* [description](cvedetailoutdataattributes.md#description) | ||
* [errataList](cvedetailoutdataattributes.md#erratalist) | ||
* [impact](cvedetailoutdataattributes.md#impact) | ||
* [modifiedDate](cvedetailoutdataattributes.md#modifieddate) | ||
* [packageList](cvedetailoutdataattributes.md#packagelist) | ||
* [publicDate](cvedetailoutdataattributes.md#publicdate) | ||
* [redhatUrl](cvedetailoutdataattributes.md#redhaturl) | ||
* [secondaryUrl](cvedetailoutdataattributes.md#secondaryurl) | ||
* [status](cvedetailoutdataattributes.md#status) | ||
* [statusId](cvedetailoutdataattributes.md#statusid) | ||
* [statusText](cvedetailoutdataattributes.md#statustext) | ||
* [synopsis](cvedetailoutdataattributes.md#synopsis) | ||
* [systemsStatusDetail](cvedetailoutdataattributes.md#systemsstatusdetail) | ||
* [systemsStatusDivergent](cvedetailoutdataattributes.md#systemsstatusdivergent) | ||
@@ -38,2 +43,47 @@ --- | ||
<a id="businessrisk"></a> | ||
### businessRisk | ||
**● businessRisk**: *`string`* | ||
*Defined in [api.ts:217](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L217)* | ||
Business risk of the vulnerability. | ||
*__type__*: {string} | ||
*__memberof__*: CveDetailOutDataAttributes | ||
___ | ||
<a id="businessriskid"></a> | ||
### businessRiskId | ||
**● businessRiskId**: *`number`* | ||
*Defined in [api.ts:223](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L223)* | ||
Internal ID of the vulnerability business risk. | ||
*__type__*: {number} | ||
*__memberof__*: CveDetailOutDataAttributes | ||
___ | ||
<a id="businessrisktext"></a> | ||
### businessRiskText | ||
**● businessRiskText**: *`string` \| `null`* | ||
*Defined in [api.ts:229](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L229)* | ||
Complementary text to the business risk. | ||
*__type__*: {string} | ||
*__memberof__*: CveDetailOutDataAttributes | ||
___ | ||
<a id="cvss2metrics"></a> | ||
@@ -43,5 +93,5 @@ | ||
**● cvss2Metrics**: *`string`* | ||
**● cvss2Metrics**: *`string` \| `null`* | ||
*Defined in [api.ts:163](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L163)* | ||
*Defined in [api.ts:235](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L235)* | ||
@@ -59,5 +109,5 @@ cvss2 metrics of the CVE. | ||
**● cvss2Score**: *`string`* | ||
**● cvss2Score**: *`string` \| `null`* | ||
*Defined in [api.ts:169](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L169)* | ||
*Defined in [api.ts:241](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L241)* | ||
@@ -75,5 +125,5 @@ String representation of cvss2 score of the CVE. | ||
**● cvss3Metrics**: *`string`* | ||
**● cvss3Metrics**: *`string` \| `null`* | ||
*Defined in [api.ts:175](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L175)* | ||
*Defined in [api.ts:247](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L247)* | ||
@@ -91,5 +141,5 @@ cvss3 metrics of the CVE. | ||
**● cvss3Score**: *`string`* | ||
**● cvss3Score**: *`string` \| `null`* | ||
*Defined in [api.ts:181](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L181)* | ||
*Defined in [api.ts:253](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L253)* | ||
@@ -103,24 +153,26 @@ String representation of cvss3 score of the CVE. | ||
___ | ||
<a id="cwelist"></a> | ||
<a id="description"></a> | ||
### cweList | ||
### description | ||
**● cweList**: *`Array`<`string`>* | ||
**● description**: *`string`* | ||
*Defined in [api.ts:187](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L187)* | ||
*Defined in [api.ts:259](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L259)* | ||
*__type__*: {Array} | ||
Description of the CVE. | ||
*__type__*: {string} | ||
*__memberof__*: CveDetailOutDataAttributes | ||
___ | ||
<a id="description"></a> | ||
<a id="impact"></a> | ||
### description | ||
### impact | ||
**● description**: *`string`* | ||
**● impact**: *`string`* | ||
*Defined in [api.ts:193](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L193)* | ||
*Defined in [api.ts:271](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L271)* | ||
Description of the CVE. | ||
Red Hat security impact of the CVE. | ||
@@ -132,13 +184,13 @@ *__type__*: {string} | ||
___ | ||
<a id="erratalist"></a> | ||
<a id="modifieddate"></a> | ||
### errataList | ||
### modifiedDate | ||
**● errataList**: *`Array`<`string`>* | ||
**● modifiedDate**: *`string` \| `null`* | ||
*Defined in [api.ts:199](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L199)* | ||
*Defined in [api.ts:265](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L265)* | ||
List of Red Hat erratas fixing the CVE. | ||
String representation of ISO-8601 formatted date of last modification of the CVE. | ||
*__type__*: {Array} | ||
*__type__*: {string} | ||
@@ -148,11 +200,11 @@ *__memberof__*: CveDetailOutDataAttributes | ||
___ | ||
<a id="impact"></a> | ||
<a id="publicdate"></a> | ||
### impact | ||
### publicDate | ||
**● impact**: *`string`* | ||
**● publicDate**: *`string` \| `null`* | ||
*Defined in [api.ts:211](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L211)* | ||
*Defined in [api.ts:277](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L277)* | ||
Red Hat security impact of the CVE. | ||
String representation of ISO-8601 formatted date of first public disclosure of the CVE. | ||
@@ -164,11 +216,11 @@ *__type__*: {string} | ||
___ | ||
<a id="modifieddate"></a> | ||
<a id="redhaturl"></a> | ||
### modifiedDate | ||
### redhatUrl | ||
**● modifiedDate**: *`string`* | ||
**● redhatUrl**: *`string` \| `null`* | ||
*Defined in [api.ts:205](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L205)* | ||
*Defined in [api.ts:283](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L283)* | ||
String representation of ISO-8601 formatted date of last modification of the CVE. | ||
Additional resource about the CVE, provided by Red Hat. | ||
@@ -180,13 +232,13 @@ *__type__*: {string} | ||
___ | ||
<a id="packagelist"></a> | ||
<a id="secondaryurl"></a> | ||
### packageList | ||
### secondaryUrl | ||
**● packageList**: *`Array`<`string`>* | ||
**● secondaryUrl**: *`string` \| `null`* | ||
*Defined in [api.ts:217](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L217)* | ||
*Defined in [api.ts:289](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L289)* | ||
List of packages where the fix for the CVE appeared. | ||
Additional resources about the CVE. | ||
*__type__*: {Array} | ||
*__type__*: {string} | ||
@@ -196,11 +248,11 @@ *__memberof__*: CveDetailOutDataAttributes | ||
___ | ||
<a id="publicdate"></a> | ||
<a id="status"></a> | ||
### publicDate | ||
### status | ||
**● publicDate**: *`string`* | ||
**● status**: *`string`* | ||
*Defined in [api.ts:223](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L223)* | ||
*Defined in [api.ts:295](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L295)* | ||
String representation of ISO-8601 formatted date of first public disclosure of the CVE. | ||
Status of the vulnerability. | ||
@@ -212,13 +264,13 @@ *__type__*: {string} | ||
___ | ||
<a id="redhaturl"></a> | ||
<a id="statusid"></a> | ||
### redhatUrl | ||
### statusId | ||
**● redhatUrl**: *`string`* | ||
**● statusId**: *`number`* | ||
*Defined in [api.ts:229](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L229)* | ||
*Defined in [api.ts:301](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L301)* | ||
Additional resource about the CVE, provided by Red Hat. | ||
Internal ID of the vulnerability status. | ||
*__type__*: {string} | ||
*__type__*: {number} | ||
@@ -228,11 +280,11 @@ *__memberof__*: CveDetailOutDataAttributes | ||
___ | ||
<a id="secondaryurl"></a> | ||
<a id="statustext"></a> | ||
### secondaryUrl | ||
### statusText | ||
**● secondaryUrl**: *`string`* | ||
**● statusText**: *`string` \| `null`* | ||
*Defined in [api.ts:235](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L235)* | ||
*Defined in [api.ts:307](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L307)* | ||
Additional resources about the CVE. | ||
Complementary text to the status. | ||
@@ -250,3 +302,3 @@ *__type__*: {string} | ||
*Defined in [api.ts:241](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L241)* | ||
*Defined in [api.ts:313](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L313)* | ||
@@ -260,2 +312,32 @@ Synopsis of the CVE. | ||
___ | ||
<a id="systemsstatusdetail"></a> | ||
### systemsStatusDetail | ||
**● systemsStatusDetail**: *`any`* | ||
*Defined in [api.ts:319](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L319)* | ||
Counts of systems with given status type. | ||
*__type__*: {any} | ||
*__memberof__*: CveDetailOutDataAttributes | ||
___ | ||
<a id="systemsstatusdivergent"></a> | ||
### systemsStatusDivergent | ||
**● systemsStatusDivergent**: *`number`* | ||
*Defined in [api.ts:325](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L325)* | ||
How many systems-CVE pairs have different status than CVE-level. | ||
*__type__*: {number} | ||
*__memberof__*: CveDetailOutDataAttributes | ||
___ | ||
@@ -29,3 +29,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [Errors](../interfaces/errors.md) | ||
*Defined in [api.ts:255](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L255)* | ||
*Defined in [api.ts:399](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L399)* | ||
@@ -32,0 +32,0 @@ *__type__*: {Array} |
@@ -30,3 +30,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [ErrorsErrors](../interfaces/errorserrors.md) | ||
*Defined in [api.ts:269](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L269)* | ||
*Defined in [api.ts:413](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L413)* | ||
@@ -46,3 +46,3 @@ Error detail. | ||
*Defined in [api.ts:275](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L275)* | ||
*Defined in [api.ts:419](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L419)* | ||
@@ -49,0 +49,0 @@ String representation of HTTP status code. |
@@ -32,3 +32,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [Links](../interfaces/links.md) | ||
*Defined in [api.ts:297](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L297)* | ||
*Defined in [api.ts:441](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L441)* | ||
@@ -48,3 +48,3 @@ Link to first page. | ||
*Defined in [api.ts:303](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L303)* | ||
*Defined in [api.ts:447](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L447)* | ||
@@ -64,3 +64,3 @@ Link to last page. | ||
*Defined in [api.ts:309](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L309)* | ||
*Defined in [api.ts:453](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L453)* | ||
@@ -80,3 +80,3 @@ Link to next page. | ||
*Defined in [api.ts:315](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L315)* | ||
*Defined in [api.ts:459](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L459)* | ||
@@ -83,0 +83,0 @@ Link to next page. |
@@ -37,3 +37,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [Meta](../interfaces/meta.md) | ||
*Defined in [api.ts:377](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L377)* | ||
*Defined in [api.ts:521](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L521)* | ||
@@ -53,3 +53,3 @@ Format of the output data, either JSON (default) or CSV. | ||
*Defined in [api.ts:329](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L329)* | ||
*Defined in [api.ts:473](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L473)* | ||
@@ -69,3 +69,3 @@ Full text filter | ||
*Defined in [api.ts:335](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L335)* | ||
*Defined in [api.ts:479](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L479)* | ||
@@ -85,3 +85,3 @@ Maximum number of paginated results. | ||
*Defined in [api.ts:341](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L341)* | ||
*Defined in [api.ts:485](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L485)* | ||
@@ -101,3 +101,3 @@ First record of paginated response. | ||
*Defined in [api.ts:347](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L347)* | ||
*Defined in [api.ts:491](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L491)* | ||
@@ -117,3 +117,3 @@ Page number of paginated response. | ||
*Defined in [api.ts:353](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L353)* | ||
*Defined in [api.ts:497](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L497)* | ||
@@ -133,3 +133,3 @@ Number of records per page of paginated response. | ||
*Defined in [api.ts:359](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L359)* | ||
*Defined in [api.ts:503](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L503)* | ||
@@ -149,3 +149,3 @@ Total number of pages of paginated response. | ||
*Defined in [api.ts:365](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L365)* | ||
*Defined in [api.ts:509](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L509)* | ||
@@ -165,3 +165,3 @@ Sorting filter. | ||
*Defined in [api.ts:371](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L371)* | ||
*Defined in [api.ts:515](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L515)* | ||
@@ -168,0 +168,0 @@ Total number of records. |
@@ -38,3 +38,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [MetaAffectedSystems](../interfaces/metaaffectedsystems.md) | ||
*Defined in [api.ts:439](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L439)* | ||
*Defined in [api.ts:583](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L583)* | ||
@@ -54,3 +54,3 @@ Format of the output data, either JSON (default) or CSV. | ||
*Defined in [api.ts:391](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L391)* | ||
*Defined in [api.ts:535](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L535)* | ||
@@ -70,3 +70,3 @@ Full text filter | ||
*Defined in [api.ts:397](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L397)* | ||
*Defined in [api.ts:541](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L541)* | ||
@@ -86,3 +86,3 @@ Maximum number of paginated results. | ||
*Defined in [api.ts:403](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L403)* | ||
*Defined in [api.ts:547](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L547)* | ||
@@ -102,3 +102,3 @@ First record of paginated response. | ||
*Defined in [api.ts:409](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L409)* | ||
*Defined in [api.ts:553](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L553)* | ||
@@ -118,3 +118,3 @@ Page number of paginated response. | ||
*Defined in [api.ts:415](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L415)* | ||
*Defined in [api.ts:559](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L559)* | ||
@@ -134,3 +134,3 @@ Number of records per page of paginated response. | ||
*Defined in [api.ts:421](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L421)* | ||
*Defined in [api.ts:565](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L565)* | ||
@@ -150,3 +150,3 @@ Total number of pages of paginated response. | ||
*Defined in [api.ts:427](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L427)* | ||
*Defined in [api.ts:571](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L571)* | ||
@@ -166,3 +166,3 @@ Sorting filter. | ||
*Defined in [api.ts:445](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L445)* | ||
*Defined in [api.ts:589](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L589)* | ||
@@ -182,3 +182,3 @@ Filer based on CVE status ID. | ||
*Defined in [api.ts:433](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L433)* | ||
*Defined in [api.ts:577](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L577)* | ||
@@ -185,0 +185,0 @@ Total number of records. |
@@ -17,2 +17,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [MetaCves](../interfaces/metacves.md) | ||
* [businessRiskId](metacves.md#businessriskid) | ||
* [cvssFrom](metacves.md#cvssfrom) | ||
@@ -38,2 +39,17 @@ * [cvssTo](metacves.md#cvssto) | ||
<a id="businessriskid"></a> | ||
### businessRiskId | ||
**● businessRiskId**: *`string` \| `null`* | ||
*Defined in [api.ts:657](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L657)* | ||
Filter based on business risk IDs. | ||
*__type__*: {string} | ||
*__memberof__*: MetaCves | ||
___ | ||
<a id="cvssfrom"></a> | ||
@@ -45,3 +61,3 @@ | ||
*Defined in [api.ts:513](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L513)* | ||
*Defined in [api.ts:663](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L663)* | ||
@@ -61,3 +77,3 @@ Filter based on cvss score, starting from the value. | ||
*Defined in [api.ts:519](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L519)* | ||
*Defined in [api.ts:669](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L669)* | ||
@@ -77,3 +93,3 @@ Filter based on cvss score, up to the value. | ||
*Defined in [api.ts:507](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L507)* | ||
*Defined in [api.ts:651](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L651)* | ||
@@ -93,3 +109,3 @@ Format of the output data, either JSON (default) or CSV. | ||
*Defined in [api.ts:459](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L459)* | ||
*Defined in [api.ts:603](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L603)* | ||
@@ -105,7 +121,7 @@ Full text filter | ||
### `<Optional>` impact | ||
### impact | ||
**● impact**: *`string` \| `null`* | ||
*Defined in [api.ts:537](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L537)* | ||
*Defined in [api.ts:687](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L687)* | ||
@@ -125,3 +141,3 @@ Filter based on impact IDs. | ||
*Defined in [api.ts:465](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L465)* | ||
*Defined in [api.ts:609](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L609)* | ||
@@ -141,3 +157,3 @@ Maximum number of paginated results. | ||
*Defined in [api.ts:471](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L471)* | ||
*Defined in [api.ts:615](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L615)* | ||
@@ -157,3 +173,3 @@ First record of paginated response. | ||
*Defined in [api.ts:477](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L477)* | ||
*Defined in [api.ts:621](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L621)* | ||
@@ -173,3 +189,3 @@ Page number of paginated response. | ||
*Defined in [api.ts:483](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L483)* | ||
*Defined in [api.ts:627](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L627)* | ||
@@ -189,3 +205,3 @@ Number of records per page of paginated response. | ||
*Defined in [api.ts:489](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L489)* | ||
*Defined in [api.ts:633](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L633)* | ||
@@ -205,3 +221,3 @@ Total number of pages of paginated response. | ||
*Defined in [api.ts:525](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L525)* | ||
*Defined in [api.ts:675](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L675)* | ||
@@ -221,3 +237,3 @@ Filter CVEs based on their published date, starting from the date. | ||
*Defined in [api.ts:531](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L531)* | ||
*Defined in [api.ts:681](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L681)* | ||
@@ -237,3 +253,3 @@ Filter CVEs based on their published date, up to the date. | ||
*Defined in [api.ts:495](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L495)* | ||
*Defined in [api.ts:639](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L639)* | ||
@@ -253,3 +269,3 @@ Sorting filter. | ||
*Defined in [api.ts:543](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L543)* | ||
*Defined in [api.ts:693](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L693)* | ||
@@ -269,3 +285,3 @@ Filer based on CVE status ID. | ||
*Defined in [api.ts:501](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L501)* | ||
*Defined in [api.ts:645](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L645)* | ||
@@ -272,0 +288,0 @@ Total number of records. |
@@ -17,2 +17,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [MetaCvesSystems](../interfaces/metacvessystems.md) | ||
* [businessRiskId](metacvessystems.md#businessriskid) | ||
* [cvssFrom](metacvessystems.md#cvssfrom) | ||
@@ -39,2 +40,17 @@ * [cvssTo](metacvessystems.md#cvssto) | ||
<a id="businessriskid"></a> | ||
### businessRiskId | ||
**● businessRiskId**: *`string` \| `null`* | ||
*Defined in [api.ts:761](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L761)* | ||
Filter based on business risk IDs. | ||
*__type__*: {string} | ||
*__memberof__*: MetaCvesSystems | ||
___ | ||
<a id="cvssfrom"></a> | ||
@@ -46,3 +62,3 @@ | ||
*Defined in [api.ts:611](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L611)* | ||
*Defined in [api.ts:767](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L767)* | ||
@@ -62,3 +78,3 @@ Filter based on cvss score, starting from the value. | ||
*Defined in [api.ts:617](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L617)* | ||
*Defined in [api.ts:773](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L773)* | ||
@@ -78,3 +94,3 @@ Filter based on cvss score, up to the value. | ||
*Defined in [api.ts:605](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L605)* | ||
*Defined in [api.ts:755](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L755)* | ||
@@ -94,3 +110,3 @@ Format of the output data, either JSON (default) or CSV. | ||
*Defined in [api.ts:557](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L557)* | ||
*Defined in [api.ts:707](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L707)* | ||
@@ -106,7 +122,7 @@ Full text filter | ||
### `<Optional>` impact | ||
### impact | ||
**● impact**: *`string` \| `null`* | ||
*Defined in [api.ts:635](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L635)* | ||
*Defined in [api.ts:791](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L791)* | ||
@@ -126,3 +142,3 @@ Filter based on impact IDs. | ||
*Defined in [api.ts:563](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L563)* | ||
*Defined in [api.ts:713](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L713)* | ||
@@ -142,3 +158,3 @@ Maximum number of paginated results. | ||
*Defined in [api.ts:569](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L569)* | ||
*Defined in [api.ts:719](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L719)* | ||
@@ -158,3 +174,3 @@ First record of paginated response. | ||
*Defined in [api.ts:647](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L647)* | ||
*Defined in [api.ts:803](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L803)* | ||
@@ -174,3 +190,3 @@ If given system was opted out. | ||
*Defined in [api.ts:575](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L575)* | ||
*Defined in [api.ts:725](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L725)* | ||
@@ -190,3 +206,3 @@ Page number of paginated response. | ||
*Defined in [api.ts:581](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L581)* | ||
*Defined in [api.ts:731](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L731)* | ||
@@ -206,3 +222,3 @@ Number of records per page of paginated response. | ||
*Defined in [api.ts:587](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L587)* | ||
*Defined in [api.ts:737](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L737)* | ||
@@ -222,3 +238,3 @@ Total number of pages of paginated response. | ||
*Defined in [api.ts:623](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L623)* | ||
*Defined in [api.ts:779](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L779)* | ||
@@ -238,3 +254,3 @@ Filter CVEs based on their published date, starting from the date. | ||
*Defined in [api.ts:629](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L629)* | ||
*Defined in [api.ts:785](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L785)* | ||
@@ -254,3 +270,3 @@ Filter CVEs based on their published date, up to the date. | ||
*Defined in [api.ts:593](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L593)* | ||
*Defined in [api.ts:743](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L743)* | ||
@@ -270,3 +286,3 @@ Sorting filter. | ||
*Defined in [api.ts:641](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L641)* | ||
*Defined in [api.ts:797](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L797)* | ||
@@ -286,3 +302,3 @@ Filer based on CVE status ID. | ||
*Defined in [api.ts:599](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L599)* | ||
*Defined in [api.ts:749](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L749)* | ||
@@ -289,0 +305,0 @@ Total number of records. |
@@ -38,3 +38,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [MetaSystems](../interfaces/metasystems.md) | ||
*Defined in [api.ts:709](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L709)* | ||
*Defined in [api.ts:865](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L865)* | ||
@@ -54,3 +54,3 @@ Format of the output data, either JSON (default) or CSV. | ||
*Defined in [api.ts:661](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L661)* | ||
*Defined in [api.ts:817](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L817)* | ||
@@ -70,3 +70,3 @@ Full text filter | ||
*Defined in [api.ts:667](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L667)* | ||
*Defined in [api.ts:823](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L823)* | ||
@@ -86,3 +86,3 @@ Maximum number of paginated results. | ||
*Defined in [api.ts:673](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L673)* | ||
*Defined in [api.ts:829](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L829)* | ||
@@ -102,3 +102,3 @@ First record of paginated response. | ||
*Defined in [api.ts:715](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L715)* | ||
*Defined in [api.ts:871](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L871)* | ||
@@ -118,3 +118,3 @@ Whether the filter to show opted out systems is active or not. If not set, defaults to hiding opted out systems. | ||
*Defined in [api.ts:679](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L679)* | ||
*Defined in [api.ts:835](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L835)* | ||
@@ -134,3 +134,3 @@ Page number of paginated response. | ||
*Defined in [api.ts:685](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L685)* | ||
*Defined in [api.ts:841](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L841)* | ||
@@ -150,3 +150,3 @@ Number of records per page of paginated response. | ||
*Defined in [api.ts:691](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L691)* | ||
*Defined in [api.ts:847](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L847)* | ||
@@ -166,3 +166,3 @@ Total number of pages of paginated response. | ||
*Defined in [api.ts:697](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L697)* | ||
*Defined in [api.ts:853](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L853)* | ||
@@ -182,3 +182,3 @@ Sorting filter. | ||
*Defined in [api.ts:703](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L703)* | ||
*Defined in [api.ts:859](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L859)* | ||
@@ -185,0 +185,0 @@ Total number of records. |
@@ -17,2 +17,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [MetaVulnerabilitiesOut](../interfaces/metavulnerabilitiesout.md) | ||
* [businessRiskId](metavulnerabilitiesout.md#businessriskid) | ||
* [cvssFrom](metavulnerabilitiesout.md#cvssfrom) | ||
@@ -38,2 +39,17 @@ * [cvssTo](metavulnerabilitiesout.md#cvssto) | ||
<a id="businessriskid"></a> | ||
### businessRiskId | ||
**● businessRiskId**: *`string` \| `null`* | ||
*Defined in [api.ts:939](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L939)* | ||
Filter based on business risk IDs. | ||
*__type__*: {string} | ||
*__memberof__*: MetaVulnerabilitiesOut | ||
___ | ||
<a id="cvssfrom"></a> | ||
@@ -45,3 +61,3 @@ | ||
*Defined in [api.ts:783](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L783)* | ||
*Defined in [api.ts:945](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L945)* | ||
@@ -61,3 +77,3 @@ Filter based on cvss score, starting from the value. | ||
*Defined in [api.ts:789](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L789)* | ||
*Defined in [api.ts:951](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L951)* | ||
@@ -77,3 +93,3 @@ Filter based on cvss score, up to the value. | ||
*Defined in [api.ts:777](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L777)* | ||
*Defined in [api.ts:933](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L933)* | ||
@@ -93,3 +109,3 @@ Format of the output data, either JSON (default) or CSV. | ||
*Defined in [api.ts:729](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L729)* | ||
*Defined in [api.ts:885](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L885)* | ||
@@ -109,3 +125,3 @@ Full text filter | ||
*Defined in [api.ts:813](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L813)* | ||
*Defined in [api.ts:975](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L975)* | ||
@@ -125,3 +141,3 @@ Filter based on impact IDs. | ||
*Defined in [api.ts:735](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L735)* | ||
*Defined in [api.ts:891](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L891)* | ||
@@ -141,3 +157,3 @@ Maximum number of paginated results. | ||
*Defined in [api.ts:741](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L741)* | ||
*Defined in [api.ts:897](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L897)* | ||
@@ -157,3 +173,3 @@ First record of paginated response. | ||
*Defined in [api.ts:747](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L747)* | ||
*Defined in [api.ts:903](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L903)* | ||
@@ -173,3 +189,3 @@ Page number of paginated response. | ||
*Defined in [api.ts:753](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L753)* | ||
*Defined in [api.ts:909](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L909)* | ||
@@ -189,3 +205,3 @@ Number of records per page of paginated response. | ||
*Defined in [api.ts:759](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L759)* | ||
*Defined in [api.ts:915](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L915)* | ||
@@ -205,3 +221,3 @@ Total number of pages of paginated response. | ||
*Defined in [api.ts:801](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L801)* | ||
*Defined in [api.ts:963](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L963)* | ||
@@ -221,3 +237,3 @@ Filter CVEs based on their published date, starting from the date. | ||
*Defined in [api.ts:807](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L807)* | ||
*Defined in [api.ts:969](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L969)* | ||
@@ -237,3 +253,3 @@ Filter CVEs based on their published date, up to the date. | ||
*Defined in [api.ts:795](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L795)* | ||
*Defined in [api.ts:957](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L957)* | ||
@@ -253,3 +269,3 @@ Show all known vulnerabilities, regardless of number of affected systems. | ||
*Defined in [api.ts:765](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L765)* | ||
*Defined in [api.ts:921](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L921)* | ||
@@ -269,3 +285,3 @@ Sorting filter. | ||
*Defined in [api.ts:771](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L771)* | ||
*Defined in [api.ts:927](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L927)* | ||
@@ -272,0 +288,0 @@ Total number of records. |
@@ -30,3 +30,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [OptOutIn](../interfaces/optoutin.md) | ||
*Defined in [api.ts:827](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L827)* | ||
*Defined in [api.ts:989](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L989)* | ||
@@ -44,3 +44,3 @@ *__type__*: {InventoryIdOrList} | ||
*Defined in [api.ts:833](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L833)* | ||
*Defined in [api.ts:995](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L995)* | ||
@@ -47,0 +47,0 @@ Opt out setting to be set. |
@@ -20,2 +20,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [StatusIn](../interfaces/statusin.md) | ||
* [statusId](statusin.md#statusid) | ||
* [statusText](statusin.md#statustext) | ||
@@ -30,10 +31,8 @@ --- | ||
**● cve**: *`string`* | ||
**● cve**: *[CveOrList](cveorlist.md)* | ||
*Defined in [api.ts:853](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L853)* | ||
*Defined in [api.ts:1015](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1015)* | ||
CVE name. | ||
*__type__*: {CveOrList} | ||
*__type__*: {string} | ||
*__memberof__*: StatusIn | ||
@@ -44,12 +43,10 @@ | ||
### inventoryId | ||
### `<Optional>` inventoryId | ||
**● inventoryId**: *`string`* | ||
**● inventoryId**: *[InventoryIdOrList](inventoryidorlist.md)* | ||
*Defined in [api.ts:847](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L847)* | ||
*Defined in [api.ts:1009](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1009)* | ||
Host ID. | ||
*__type__*: {InventoryIdOrList} | ||
*__type__*: {string} | ||
*__memberof__*: StatusIn | ||
@@ -60,9 +57,9 @@ | ||
### statusId | ||
### `<Optional>` statusId | ||
**● statusId**: *`number`* | ||
*Defined in [api.ts:859](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L859)* | ||
*Defined in [api.ts:1021](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1021)* | ||
Status ID to be set, obtained by GET method. | ||
Status ID to be set, obtained by GET method. If not specified, global CVE status is set. | ||
@@ -74,2 +71,17 @@ *__type__*: {number} | ||
___ | ||
<a id="statustext"></a> | ||
### `<Optional>` statusText | ||
**● statusText**: *`string` \| `null`* | ||
*Defined in [api.ts:1027](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1027)* | ||
Complementary text to the status. | ||
*__type__*: {string} | ||
*__memberof__*: StatusIn | ||
___ | ||
@@ -30,3 +30,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [StatusListOut](../interfaces/statuslistout.md) | ||
*Defined in [api.ts:873](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L873)* | ||
*Defined in [api.ts:1041](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1041)* | ||
@@ -46,3 +46,3 @@ List of available status/status\_id pairs. | ||
*Defined in [api.ts:879](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L879)* | ||
*Defined in [api.ts:1047](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1047)* | ||
@@ -49,0 +49,0 @@ *__type__*: {StatusListOutMeta} |
@@ -30,3 +30,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [StatusListOutData](../interfaces/statuslistoutdata.md) | ||
*Defined in [api.ts:893](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L893)* | ||
*Defined in [api.ts:1061](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1061)* | ||
@@ -46,3 +46,3 @@ Internal status\_id. | ||
*Defined in [api.ts:899](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L899)* | ||
*Defined in [api.ts:1067](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1067)* | ||
@@ -49,0 +49,0 @@ Represenation of internal status\_id. |
@@ -29,3 +29,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [StatusListOutMeta](../interfaces/statuslistoutmeta.md) | ||
*Defined in [api.ts:913](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L913)* | ||
*Defined in [api.ts:1081](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1081)* | ||
@@ -32,0 +32,0 @@ Total number of available status/status\_id pairs. |
@@ -31,3 +31,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [SystemCvesOut](../interfaces/systemcvesout.md) | ||
*Defined in [api.ts:927](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L927)* | ||
*Defined in [api.ts:1129](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1129)* | ||
@@ -45,3 +45,3 @@ *__type__*: {Object} | ||
*Defined in [api.ts:933](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L933)* | ||
*Defined in [api.ts:1135](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1135)* | ||
@@ -59,3 +59,3 @@ *__type__*: {Links} | ||
*Defined in [api.ts:939](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L939)* | ||
*Defined in [api.ts:1141](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1141)* | ||
@@ -62,0 +62,0 @@ *__type__*: {MetaCves} |
@@ -29,3 +29,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [SystemDetailsOut](../interfaces/systemdetailsout.md) | ||
*Defined in [api.ts:953](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L953)* | ||
*Defined in [api.ts:1155](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1155)* | ||
@@ -32,0 +32,0 @@ *__type__*: {SystemDetailsOutData} |
@@ -31,3 +31,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [SystemDetailsOutData](../interfaces/systemdetailsoutdata.md) | ||
*Defined in [api.ts:967](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L967)* | ||
*Defined in [api.ts:1169](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1169)* | ||
@@ -47,3 +47,3 @@ Date of last evaluation. | ||
*Defined in [api.ts:979](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L979)* | ||
*Defined in [api.ts:1181](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1181)* | ||
@@ -63,3 +63,3 @@ Date of the latest upload of archive. | ||
*Defined in [api.ts:973](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L973)* | ||
*Defined in [api.ts:1175](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1175)* | ||
@@ -66,0 +66,0 @@ System opt out status. |
@@ -31,3 +31,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [SystemListOut](../interfaces/systemlistout.md) | ||
*Defined in [api.ts:993](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L993)* | ||
*Defined in [api.ts:1195](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1195)* | ||
@@ -45,3 +45,3 @@ *__type__*: {Object} | ||
*Defined in [api.ts:999](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L999)* | ||
*Defined in [api.ts:1201](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1201)* | ||
@@ -59,3 +59,3 @@ *__type__*: {Links} | ||
*Defined in [api.ts:1005](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1005)* | ||
*Defined in [api.ts:1207](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1207)* | ||
@@ -62,0 +62,0 @@ *__type__*: {MetaSystems} |
@@ -30,3 +30,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [VersionOut](../interfaces/versionout.md) | ||
*Defined in [api.ts:1019](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1019)* | ||
*Defined in [api.ts:1221](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1221)* | ||
@@ -46,3 +46,3 @@ Version of application. | ||
*Defined in [api.ts:1025](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1025)* | ||
*Defined in [api.ts:1227](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1227)* | ||
@@ -49,0 +49,0 @@ Version of database schema. |
@@ -31,3 +31,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [VulnerabilitiesOut](../interfaces/vulnerabilitiesout.md) | ||
*Defined in [api.ts:1039](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1039)* | ||
*Defined in [api.ts:1241](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1241)* | ||
@@ -45,3 +45,3 @@ *__type__*: {Object} | ||
*Defined in [api.ts:1045](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1045)* | ||
*Defined in [api.ts:1247](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1247)* | ||
@@ -59,3 +59,3 @@ *__type__*: {Links} | ||
*Defined in [api.ts:1051](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1051)* | ||
*Defined in [api.ts:1253](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1253)* | ||
@@ -62,0 +62,0 @@ *__type__*: {MetaVulnerabilitiesOut} |
@@ -86,2 +86,5 @@ | ||
* [BulkChangeOut](interfaces/bulkchangeout.md) | ||
* [BusinessRiskListOut](interfaces/businessrisklistout.md) | ||
* [BusinessRiskListOutData](interfaces/businessrisklistoutdata.md) | ||
* [BusinessRiskListOutMeta](interfaces/businessrisklistoutmeta.md) | ||
* [ConfigurationParameters](interfaces/configurationparameters.md) | ||
@@ -91,2 +94,5 @@ * [CveDetailOut](interfaces/cvedetailout.md) | ||
* [CveDetailOutDataAttributes](interfaces/cvedetailoutdataattributes.md) | ||
* [CveOrList](interfaces/cveorlist.md) | ||
* [CveRiskIn](interfaces/cveriskin.md) | ||
* [CveStatusIn](interfaces/cvestatusin.md) | ||
* [Errors](interfaces/errors.md) | ||
@@ -108,2 +114,4 @@ * [ErrorsErrors](interfaces/errorserrors.md) | ||
* [StatusListOutMeta](interfaces/statuslistoutmeta.md) | ||
* [StatusOut](interfaces/statusout.md) | ||
* [StatusOutUpdated](interfaces/statusoutupdated.md) | ||
* [SystemCvesOut](interfaces/systemcvesout.md) | ||
@@ -155,3 +163,3 @@ * [SystemDetailsOut](interfaces/systemdetailsout.md) | ||
*Defined in [api.ts:1059](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1059)* | ||
*Defined in [api.ts:1261](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1261)* | ||
@@ -175,3 +183,3 @@ DefaultApi - axios parameter creator | ||
*Defined in [api.ts:2035](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2035)* | ||
*Defined in [api.ts:2437](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2437)* | ||
@@ -197,3 +205,3 @@ DefaultApi - factory interface | ||
*Defined in [api.ts:1819](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L1819)* | ||
*Defined in [api.ts:2177](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2177)* | ||
@@ -217,3 +225,3 @@ DefaultApi - functional programming interface | ||
*Defined in [api.ts:2395](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2395)* | ||
*Defined in [api.ts:2867](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2867)* | ||
@@ -237,3 +245,3 @@ InternalApi - axios parameter creator | ||
*Defined in [api.ts:2664](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2664)* | ||
*Defined in [api.ts:3136](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L3136)* | ||
@@ -259,3 +267,3 @@ InternalApi - factory interface | ||
*Defined in [api.ts:2598](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L2598)* | ||
*Defined in [api.ts:3070](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/api.ts#L3070)* | ||
@@ -262,0 +270,0 @@ InternalApi - functional programming interface |
@@ -119,3 +119,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [DefaultApi](../classes/defaultapi.md) | ||
*Defined in [api.ts:2642](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2642)* | ||
*Defined in [api.ts:2648](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2648)* | ||
@@ -146,3 +146,3 @@ Deletes system from database. | ||
*Defined in [api.ts:2662](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2662)* | ||
*Defined in [api.ts:2668](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2668)* | ||
@@ -181,3 +181,3 @@ Report of affected systems for a given CVE. | ||
*Defined in [api.ts:2673](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2673)* | ||
*Defined in [api.ts:2679](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2679)* | ||
@@ -207,3 +207,3 @@ Returns available business risk and business\_risk\_id pairs where business\_risk\_id is internal ID of the business risk. | ||
*Defined in [api.ts:2685](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2685)* | ||
*Defined in [api.ts:2691](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2691)* | ||
@@ -234,3 +234,3 @@ Show all information about given CVE. | ||
*Defined in [api.ts:2711](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2711)* | ||
*Defined in [api.ts:2717](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2717)* | ||
@@ -275,3 +275,3 @@ Overview of vulnerabilities across whole host inventory. | ||
*Defined in [api.ts:2737](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2737)* | ||
*Defined in [api.ts:2743](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2743)* | ||
@@ -316,3 +316,3 @@ Shows detailed infomation about all CVEs the system is exposed to. | ||
*Defined in [api.ts:2748](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2748)* | ||
*Defined in [api.ts:2754](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2754)* | ||
@@ -342,3 +342,3 @@ Returns available status and status\_id pairs where status\_id is internal ID of the status. | ||
*Defined in [api.ts:2760](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2760)* | ||
*Defined in [api.ts:2766](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2766)* | ||
@@ -369,3 +369,3 @@ Provides details of a system, e.g. it's opt out status. | ||
*Defined in [api.ts:2779](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2779)* | ||
*Defined in [api.ts:2785](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2785)* | ||
@@ -403,3 +403,3 @@ List systems visible to logged in account with basic information related to vulnerabilities. | ||
*Defined in [api.ts:2790](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2790)* | ||
*Defined in [api.ts:2796](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2796)* | ||
@@ -429,3 +429,3 @@ Get application version. | ||
*Defined in [api.ts:2802](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2802)* | ||
*Defined in [api.ts:2808](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2808)* | ||
@@ -456,3 +456,3 @@ Sets business risk for a CVE. | ||
*Defined in [api.ts:2814](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2814)* | ||
*Defined in [api.ts:2820](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2820)* | ||
@@ -483,3 +483,3 @@ Sets status for a CVE. | ||
*Defined in [api.ts:2826](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2826)* | ||
*Defined in [api.ts:2832](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2832)* | ||
@@ -510,3 +510,3 @@ Sets status for given hosts and CVEs. | ||
*Defined in [api.ts:2839](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2839)* | ||
*Defined in [api.ts:2845](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2845)* | ||
@@ -538,3 +538,3 @@ Opts in/out a systems. Opted out system is not shown and manageable by the vulnerability application. | ||
*Defined in [api.ts:2851](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2851)* | ||
*Defined in [api.ts:2857](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2857)* | ||
@@ -541,0 +541,0 @@ Opts in/out a systems. Opted out system is not shown and manageable by the vulnerability application. |
@@ -108,3 +108,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [InternalApi](../classes/internalapi.md) | ||
*Defined in [api.ts:3191](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L3191)* | ||
*Defined in [api.ts:3197](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L3197)* | ||
@@ -135,3 +135,3 @@ Refresh cached counts for given account ID. Admin interface, available only to internal users. | ||
*Defined in [api.ts:3204](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L3204)* | ||
*Defined in [api.ts:3210](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L3210)* | ||
@@ -163,3 +163,3 @@ Refresh cached counts for given account ID and CVE. Admin interface, available only to internal users. | ||
*Defined in [api.ts:3216](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L3216)* | ||
*Defined in [api.ts:3222](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L3222)* | ||
@@ -190,3 +190,3 @@ Refresh cached counts for given CVE. Admin interface, available only to internal users. | ||
*Defined in [api.ts:3228](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L3228)* | ||
*Defined in [api.ts:3234](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L3234)* | ||
@@ -193,0 +193,0 @@ Refresh cached counts for given inventory ID. Admin interface, available only to internal users. |
@@ -34,2 +34,4 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [CveDetailOutDataAttributes](../interfaces/cvedetailoutdataattributes.md) | ||
* [synopsis](cvedetailoutdataattributes.md#synopsis) | ||
* [systemsStatusDetail](cvedetailoutdataattributes.md#systemsstatusdetail) | ||
* [systemsStatusDivergent](cvedetailoutdataattributes.md#systemsstatusdivergent) | ||
@@ -295,2 +297,32 @@ --- | ||
___ | ||
<a id="systemsstatusdetail"></a> | ||
### systemsStatusDetail | ||
**● systemsStatusDetail**: *`any`* | ||
*Defined in [api.ts:319](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L319)* | ||
Counts of systems with given status type. | ||
*__type__*: {any} | ||
*__memberof__*: CveDetailOutDataAttributes | ||
___ | ||
<a id="systemsstatusdivergent"></a> | ||
### systemsStatusDivergent | ||
**● systemsStatusDivergent**: *`number`* | ||
*Defined in [api.ts:325](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L325)* | ||
How many systems-CVE pairs have different status than CVE-level. | ||
*__type__*: {number} | ||
*__memberof__*: CveDetailOutDataAttributes | ||
___ | ||
@@ -31,3 +31,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [CveRiskIn](../interfaces/cveriskin.md) | ||
*Defined in [api.ts:341](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L341)* | ||
*Defined in [api.ts:353](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L353)* | ||
@@ -47,3 +47,3 @@ Business risk ID to be set, obtained by GET method. | ||
*Defined in [api.ts:347](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L347)* | ||
*Defined in [api.ts:359](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L359)* | ||
@@ -63,3 +63,3 @@ Complementary text to the business risk. | ||
*Defined in [api.ts:335](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L335)* | ||
*Defined in [api.ts:347](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L347)* | ||
@@ -66,0 +66,0 @@ *__type__*: {CveOrList} |
@@ -18,3 +18,2 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [CveStatusIn](../interfaces/cvestatusin.md) | ||
* [cve](cvestatusin.md#cve) | ||
* [preserveIndividual](cvestatusin.md#preserveindividual) | ||
* [statusId](cvestatusin.md#statusid) | ||
@@ -33,3 +32,3 @@ * [statusText](cvestatusin.md#statustext) | ||
*Defined in [api.ts:361](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L361)* | ||
*Defined in [api.ts:373](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L373)* | ||
@@ -41,17 +40,2 @@ *__type__*: {CveOrList} | ||
___ | ||
<a id="preserveindividual"></a> | ||
### `<Optional>` preserveIndividual | ||
**● preserveIndividual**: *`boolean`* | ||
*Defined in [api.ts:379](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L379)* | ||
Preserve previously set status for individual hosts. | ||
*__type__*: {boolean} | ||
*__memberof__*: CveStatusIn | ||
___ | ||
<a id="statusid"></a> | ||
@@ -63,3 +47,3 @@ | ||
*Defined in [api.ts:367](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L367)* | ||
*Defined in [api.ts:379](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L379)* | ||
@@ -79,3 +63,3 @@ Status ID to be set, obtained by GET method. | ||
*Defined in [api.ts:373](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L373)* | ||
*Defined in [api.ts:385](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L385)* | ||
@@ -82,0 +66,0 @@ Complementary text to the status. |
@@ -29,3 +29,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [Errors](../interfaces/errors.md) | ||
*Defined in [api.ts:393](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L393)* | ||
*Defined in [api.ts:399](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L399)* | ||
@@ -32,0 +32,0 @@ *__type__*: {Array} |
@@ -30,3 +30,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [ErrorsErrors](../interfaces/errorserrors.md) | ||
*Defined in [api.ts:407](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L407)* | ||
*Defined in [api.ts:413](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L413)* | ||
@@ -46,3 +46,3 @@ Error detail. | ||
*Defined in [api.ts:413](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L413)* | ||
*Defined in [api.ts:419](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L419)* | ||
@@ -49,0 +49,0 @@ String representation of HTTP status code. |
@@ -32,3 +32,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [Links](../interfaces/links.md) | ||
*Defined in [api.ts:435](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L435)* | ||
*Defined in [api.ts:441](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L441)* | ||
@@ -48,3 +48,3 @@ Link to first page. | ||
*Defined in [api.ts:441](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L441)* | ||
*Defined in [api.ts:447](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L447)* | ||
@@ -64,3 +64,3 @@ Link to last page. | ||
*Defined in [api.ts:447](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L447)* | ||
*Defined in [api.ts:453](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L453)* | ||
@@ -80,3 +80,3 @@ Link to next page. | ||
*Defined in [api.ts:453](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L453)* | ||
*Defined in [api.ts:459](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L459)* | ||
@@ -83,0 +83,0 @@ Link to next page. |
@@ -37,3 +37,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [Meta](../interfaces/meta.md) | ||
*Defined in [api.ts:515](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L515)* | ||
*Defined in [api.ts:521](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L521)* | ||
@@ -53,3 +53,3 @@ Format of the output data, either JSON (default) or CSV. | ||
*Defined in [api.ts:467](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L467)* | ||
*Defined in [api.ts:473](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L473)* | ||
@@ -69,3 +69,3 @@ Full text filter | ||
*Defined in [api.ts:473](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L473)* | ||
*Defined in [api.ts:479](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L479)* | ||
@@ -85,3 +85,3 @@ Maximum number of paginated results. | ||
*Defined in [api.ts:479](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L479)* | ||
*Defined in [api.ts:485](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L485)* | ||
@@ -101,3 +101,3 @@ First record of paginated response. | ||
*Defined in [api.ts:485](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L485)* | ||
*Defined in [api.ts:491](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L491)* | ||
@@ -117,3 +117,3 @@ Page number of paginated response. | ||
*Defined in [api.ts:491](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L491)* | ||
*Defined in [api.ts:497](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L497)* | ||
@@ -133,3 +133,3 @@ Number of records per page of paginated response. | ||
*Defined in [api.ts:497](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L497)* | ||
*Defined in [api.ts:503](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L503)* | ||
@@ -149,3 +149,3 @@ Total number of pages of paginated response. | ||
*Defined in [api.ts:503](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L503)* | ||
*Defined in [api.ts:509](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L509)* | ||
@@ -165,3 +165,3 @@ Sorting filter. | ||
*Defined in [api.ts:509](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L509)* | ||
*Defined in [api.ts:515](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L515)* | ||
@@ -168,0 +168,0 @@ Total number of records. |
@@ -38,3 +38,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [MetaAffectedSystems](../interfaces/metaaffectedsystems.md) | ||
*Defined in [api.ts:577](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L577)* | ||
*Defined in [api.ts:583](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L583)* | ||
@@ -54,3 +54,3 @@ Format of the output data, either JSON (default) or CSV. | ||
*Defined in [api.ts:529](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L529)* | ||
*Defined in [api.ts:535](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L535)* | ||
@@ -70,3 +70,3 @@ Full text filter | ||
*Defined in [api.ts:535](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L535)* | ||
*Defined in [api.ts:541](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L541)* | ||
@@ -86,3 +86,3 @@ Maximum number of paginated results. | ||
*Defined in [api.ts:541](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L541)* | ||
*Defined in [api.ts:547](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L547)* | ||
@@ -102,3 +102,3 @@ First record of paginated response. | ||
*Defined in [api.ts:547](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L547)* | ||
*Defined in [api.ts:553](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L553)* | ||
@@ -118,3 +118,3 @@ Page number of paginated response. | ||
*Defined in [api.ts:553](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L553)* | ||
*Defined in [api.ts:559](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L559)* | ||
@@ -134,3 +134,3 @@ Number of records per page of paginated response. | ||
*Defined in [api.ts:559](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L559)* | ||
*Defined in [api.ts:565](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L565)* | ||
@@ -150,3 +150,3 @@ Total number of pages of paginated response. | ||
*Defined in [api.ts:565](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L565)* | ||
*Defined in [api.ts:571](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L571)* | ||
@@ -166,3 +166,3 @@ Sorting filter. | ||
*Defined in [api.ts:583](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L583)* | ||
*Defined in [api.ts:589](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L589)* | ||
@@ -182,3 +182,3 @@ Filer based on CVE status ID. | ||
*Defined in [api.ts:571](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L571)* | ||
*Defined in [api.ts:577](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L577)* | ||
@@ -185,0 +185,0 @@ Total number of records. |
@@ -44,3 +44,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [MetaCves](../interfaces/metacves.md) | ||
*Defined in [api.ts:651](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L651)* | ||
*Defined in [api.ts:657](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L657)* | ||
@@ -60,3 +60,3 @@ Filter based on business risk IDs. | ||
*Defined in [api.ts:657](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L657)* | ||
*Defined in [api.ts:663](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L663)* | ||
@@ -76,3 +76,3 @@ Filter based on cvss score, starting from the value. | ||
*Defined in [api.ts:663](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L663)* | ||
*Defined in [api.ts:669](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L669)* | ||
@@ -92,3 +92,3 @@ Filter based on cvss score, up to the value. | ||
*Defined in [api.ts:645](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L645)* | ||
*Defined in [api.ts:651](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L651)* | ||
@@ -108,3 +108,3 @@ Format of the output data, either JSON (default) or CSV. | ||
*Defined in [api.ts:597](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L597)* | ||
*Defined in [api.ts:603](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L603)* | ||
@@ -124,3 +124,3 @@ Full text filter | ||
*Defined in [api.ts:681](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L681)* | ||
*Defined in [api.ts:687](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L687)* | ||
@@ -140,3 +140,3 @@ Filter based on impact IDs. | ||
*Defined in [api.ts:603](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L603)* | ||
*Defined in [api.ts:609](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L609)* | ||
@@ -156,3 +156,3 @@ Maximum number of paginated results. | ||
*Defined in [api.ts:609](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L609)* | ||
*Defined in [api.ts:615](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L615)* | ||
@@ -172,3 +172,3 @@ First record of paginated response. | ||
*Defined in [api.ts:615](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L615)* | ||
*Defined in [api.ts:621](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L621)* | ||
@@ -188,3 +188,3 @@ Page number of paginated response. | ||
*Defined in [api.ts:621](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L621)* | ||
*Defined in [api.ts:627](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L627)* | ||
@@ -204,3 +204,3 @@ Number of records per page of paginated response. | ||
*Defined in [api.ts:627](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L627)* | ||
*Defined in [api.ts:633](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L633)* | ||
@@ -220,3 +220,3 @@ Total number of pages of paginated response. | ||
*Defined in [api.ts:669](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L669)* | ||
*Defined in [api.ts:675](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L675)* | ||
@@ -236,3 +236,3 @@ Filter CVEs based on their published date, starting from the date. | ||
*Defined in [api.ts:675](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L675)* | ||
*Defined in [api.ts:681](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L681)* | ||
@@ -252,3 +252,3 @@ Filter CVEs based on their published date, up to the date. | ||
*Defined in [api.ts:633](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L633)* | ||
*Defined in [api.ts:639](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L639)* | ||
@@ -268,3 +268,3 @@ Sorting filter. | ||
*Defined in [api.ts:687](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L687)* | ||
*Defined in [api.ts:693](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L693)* | ||
@@ -284,3 +284,3 @@ Filer based on CVE status ID. | ||
*Defined in [api.ts:639](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L639)* | ||
*Defined in [api.ts:645](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L645)* | ||
@@ -287,0 +287,0 @@ Total number of records. |
@@ -45,3 +45,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [MetaCvesSystems](../interfaces/metacvessystems.md) | ||
*Defined in [api.ts:755](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L755)* | ||
*Defined in [api.ts:761](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L761)* | ||
@@ -61,3 +61,3 @@ Filter based on business risk IDs. | ||
*Defined in [api.ts:761](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L761)* | ||
*Defined in [api.ts:767](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L767)* | ||
@@ -77,3 +77,3 @@ Filter based on cvss score, starting from the value. | ||
*Defined in [api.ts:767](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L767)* | ||
*Defined in [api.ts:773](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L773)* | ||
@@ -93,3 +93,3 @@ Filter based on cvss score, up to the value. | ||
*Defined in [api.ts:749](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L749)* | ||
*Defined in [api.ts:755](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L755)* | ||
@@ -109,3 +109,3 @@ Format of the output data, either JSON (default) or CSV. | ||
*Defined in [api.ts:701](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L701)* | ||
*Defined in [api.ts:707](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L707)* | ||
@@ -125,3 +125,3 @@ Full text filter | ||
*Defined in [api.ts:785](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L785)* | ||
*Defined in [api.ts:791](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L791)* | ||
@@ -141,3 +141,3 @@ Filter based on impact IDs. | ||
*Defined in [api.ts:707](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L707)* | ||
*Defined in [api.ts:713](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L713)* | ||
@@ -157,3 +157,3 @@ Maximum number of paginated results. | ||
*Defined in [api.ts:713](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L713)* | ||
*Defined in [api.ts:719](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L719)* | ||
@@ -173,3 +173,3 @@ First record of paginated response. | ||
*Defined in [api.ts:797](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L797)* | ||
*Defined in [api.ts:803](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L803)* | ||
@@ -189,3 +189,3 @@ If given system was opted out. | ||
*Defined in [api.ts:719](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L719)* | ||
*Defined in [api.ts:725](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L725)* | ||
@@ -205,3 +205,3 @@ Page number of paginated response. | ||
*Defined in [api.ts:725](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L725)* | ||
*Defined in [api.ts:731](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L731)* | ||
@@ -221,3 +221,3 @@ Number of records per page of paginated response. | ||
*Defined in [api.ts:731](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L731)* | ||
*Defined in [api.ts:737](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L737)* | ||
@@ -237,3 +237,3 @@ Total number of pages of paginated response. | ||
*Defined in [api.ts:773](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L773)* | ||
*Defined in [api.ts:779](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L779)* | ||
@@ -253,3 +253,3 @@ Filter CVEs based on their published date, starting from the date. | ||
*Defined in [api.ts:779](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L779)* | ||
*Defined in [api.ts:785](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L785)* | ||
@@ -269,3 +269,3 @@ Filter CVEs based on their published date, up to the date. | ||
*Defined in [api.ts:737](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L737)* | ||
*Defined in [api.ts:743](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L743)* | ||
@@ -285,3 +285,3 @@ Sorting filter. | ||
*Defined in [api.ts:791](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L791)* | ||
*Defined in [api.ts:797](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L797)* | ||
@@ -301,3 +301,3 @@ Filer based on CVE status ID. | ||
*Defined in [api.ts:743](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L743)* | ||
*Defined in [api.ts:749](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L749)* | ||
@@ -304,0 +304,0 @@ Total number of records. |
@@ -38,3 +38,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [MetaSystems](../interfaces/metasystems.md) | ||
*Defined in [api.ts:859](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L859)* | ||
*Defined in [api.ts:865](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L865)* | ||
@@ -54,3 +54,3 @@ Format of the output data, either JSON (default) or CSV. | ||
*Defined in [api.ts:811](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L811)* | ||
*Defined in [api.ts:817](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L817)* | ||
@@ -70,3 +70,3 @@ Full text filter | ||
*Defined in [api.ts:817](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L817)* | ||
*Defined in [api.ts:823](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L823)* | ||
@@ -86,3 +86,3 @@ Maximum number of paginated results. | ||
*Defined in [api.ts:823](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L823)* | ||
*Defined in [api.ts:829](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L829)* | ||
@@ -102,3 +102,3 @@ First record of paginated response. | ||
*Defined in [api.ts:865](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L865)* | ||
*Defined in [api.ts:871](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L871)* | ||
@@ -118,3 +118,3 @@ Whether the filter to show opted out systems is active or not. If not set, defaults to hiding opted out systems. | ||
*Defined in [api.ts:829](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L829)* | ||
*Defined in [api.ts:835](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L835)* | ||
@@ -134,3 +134,3 @@ Page number of paginated response. | ||
*Defined in [api.ts:835](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L835)* | ||
*Defined in [api.ts:841](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L841)* | ||
@@ -150,3 +150,3 @@ Number of records per page of paginated response. | ||
*Defined in [api.ts:841](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L841)* | ||
*Defined in [api.ts:847](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L847)* | ||
@@ -166,3 +166,3 @@ Total number of pages of paginated response. | ||
*Defined in [api.ts:847](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L847)* | ||
*Defined in [api.ts:853](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L853)* | ||
@@ -182,3 +182,3 @@ Sorting filter. | ||
*Defined in [api.ts:853](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L853)* | ||
*Defined in [api.ts:859](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L859)* | ||
@@ -185,0 +185,0 @@ Total number of records. |
@@ -44,3 +44,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [MetaVulnerabilitiesOut](../interfaces/metavulnerabilitiesout.md) | ||
*Defined in [api.ts:933](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L933)* | ||
*Defined in [api.ts:939](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L939)* | ||
@@ -60,3 +60,3 @@ Filter based on business risk IDs. | ||
*Defined in [api.ts:939](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L939)* | ||
*Defined in [api.ts:945](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L945)* | ||
@@ -76,3 +76,3 @@ Filter based on cvss score, starting from the value. | ||
*Defined in [api.ts:945](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L945)* | ||
*Defined in [api.ts:951](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L951)* | ||
@@ -92,3 +92,3 @@ Filter based on cvss score, up to the value. | ||
*Defined in [api.ts:927](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L927)* | ||
*Defined in [api.ts:933](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L933)* | ||
@@ -108,3 +108,3 @@ Format of the output data, either JSON (default) or CSV. | ||
*Defined in [api.ts:879](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L879)* | ||
*Defined in [api.ts:885](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L885)* | ||
@@ -124,3 +124,3 @@ Full text filter | ||
*Defined in [api.ts:969](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L969)* | ||
*Defined in [api.ts:975](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L975)* | ||
@@ -140,3 +140,3 @@ Filter based on impact IDs. | ||
*Defined in [api.ts:885](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L885)* | ||
*Defined in [api.ts:891](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L891)* | ||
@@ -156,3 +156,3 @@ Maximum number of paginated results. | ||
*Defined in [api.ts:891](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L891)* | ||
*Defined in [api.ts:897](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L897)* | ||
@@ -172,3 +172,3 @@ First record of paginated response. | ||
*Defined in [api.ts:897](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L897)* | ||
*Defined in [api.ts:903](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L903)* | ||
@@ -188,3 +188,3 @@ Page number of paginated response. | ||
*Defined in [api.ts:903](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L903)* | ||
*Defined in [api.ts:909](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L909)* | ||
@@ -204,3 +204,3 @@ Number of records per page of paginated response. | ||
*Defined in [api.ts:909](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L909)* | ||
*Defined in [api.ts:915](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L915)* | ||
@@ -220,3 +220,3 @@ Total number of pages of paginated response. | ||
*Defined in [api.ts:957](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L957)* | ||
*Defined in [api.ts:963](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L963)* | ||
@@ -236,3 +236,3 @@ Filter CVEs based on their published date, starting from the date. | ||
*Defined in [api.ts:963](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L963)* | ||
*Defined in [api.ts:969](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L969)* | ||
@@ -252,3 +252,3 @@ Filter CVEs based on their published date, up to the date. | ||
*Defined in [api.ts:951](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L951)* | ||
*Defined in [api.ts:957](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L957)* | ||
@@ -268,3 +268,3 @@ Show all known vulnerabilities, regardless of number of affected systems. | ||
*Defined in [api.ts:915](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L915)* | ||
*Defined in [api.ts:921](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L921)* | ||
@@ -284,3 +284,3 @@ Sorting filter. | ||
*Defined in [api.ts:921](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L921)* | ||
*Defined in [api.ts:927](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L927)* | ||
@@ -287,0 +287,0 @@ Total number of records. |
@@ -30,3 +30,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [OptOutIn](../interfaces/optoutin.md) | ||
*Defined in [api.ts:983](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L983)* | ||
*Defined in [api.ts:989](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L989)* | ||
@@ -44,3 +44,3 @@ *__type__*: {InventoryIdOrList} | ||
*Defined in [api.ts:989](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L989)* | ||
*Defined in [api.ts:995](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L995)* | ||
@@ -47,0 +47,0 @@ Opt out setting to be set. |
@@ -32,3 +32,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [StatusIn](../interfaces/statusin.md) | ||
*Defined in [api.ts:1009](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1009)* | ||
*Defined in [api.ts:1015](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1015)* | ||
@@ -46,3 +46,3 @@ *__type__*: {CveOrList} | ||
*Defined in [api.ts:1003](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1003)* | ||
*Defined in [api.ts:1009](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1009)* | ||
@@ -60,3 +60,3 @@ *__type__*: {InventoryIdOrList} | ||
*Defined in [api.ts:1015](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1015)* | ||
*Defined in [api.ts:1021](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1021)* | ||
@@ -76,3 +76,3 @@ Status ID to be set, obtained by GET method. If not specified, global CVE status is set. | ||
*Defined in [api.ts:1021](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1021)* | ||
*Defined in [api.ts:1027](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1027)* | ||
@@ -79,0 +79,0 @@ Complementary text to the status. |
@@ -30,3 +30,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [StatusListOut](../interfaces/statuslistout.md) | ||
*Defined in [api.ts:1035](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1035)* | ||
*Defined in [api.ts:1041](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1041)* | ||
@@ -46,3 +46,3 @@ List of available status/status\_id pairs. | ||
*Defined in [api.ts:1041](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1041)* | ||
*Defined in [api.ts:1047](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1047)* | ||
@@ -49,0 +49,0 @@ *__type__*: {StatusListOutMeta} |
@@ -30,3 +30,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [StatusListOutData](../interfaces/statuslistoutdata.md) | ||
*Defined in [api.ts:1055](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1055)* | ||
*Defined in [api.ts:1061](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1061)* | ||
@@ -46,3 +46,3 @@ Internal status\_id. | ||
*Defined in [api.ts:1061](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1061)* | ||
*Defined in [api.ts:1067](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1067)* | ||
@@ -49,0 +49,0 @@ Represenation of internal status\_id. |
@@ -29,3 +29,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [StatusListOutMeta](../interfaces/statuslistoutmeta.md) | ||
*Defined in [api.ts:1075](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1075)* | ||
*Defined in [api.ts:1081](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1081)* | ||
@@ -32,0 +32,0 @@ Total number of available status/status\_id pairs. |
@@ -29,3 +29,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [StatusOut](../interfaces/statusout.md) | ||
*Defined in [api.ts:1089](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1089)* | ||
*Defined in [api.ts:1095](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1095)* | ||
@@ -32,0 +32,0 @@ List of updated objects/updated object IDs. |
@@ -30,3 +30,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [StatusOutUpdated](../interfaces/statusoutupdated.md) | ||
*Defined in [api.ts:1109](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1109)* | ||
*Defined in [api.ts:1115](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1115)* | ||
@@ -44,3 +44,3 @@ *__type__*: {string} | ||
*Defined in [api.ts:1103](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1103)* | ||
*Defined in [api.ts:1109](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1109)* | ||
@@ -47,0 +47,0 @@ *__type__*: {string} |
@@ -31,3 +31,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [SystemCvesOut](../interfaces/systemcvesout.md) | ||
*Defined in [api.ts:1123](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1123)* | ||
*Defined in [api.ts:1129](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1129)* | ||
@@ -45,3 +45,3 @@ *__type__*: {Object} | ||
*Defined in [api.ts:1129](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1129)* | ||
*Defined in [api.ts:1135](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1135)* | ||
@@ -59,3 +59,3 @@ *__type__*: {Links} | ||
*Defined in [api.ts:1135](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1135)* | ||
*Defined in [api.ts:1141](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1141)* | ||
@@ -62,0 +62,0 @@ *__type__*: {MetaCves} |
@@ -29,3 +29,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [SystemDetailsOut](../interfaces/systemdetailsout.md) | ||
*Defined in [api.ts:1149](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1149)* | ||
*Defined in [api.ts:1155](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1155)* | ||
@@ -32,0 +32,0 @@ *__type__*: {SystemDetailsOutData} |
@@ -31,3 +31,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [SystemDetailsOutData](../interfaces/systemdetailsoutdata.md) | ||
*Defined in [api.ts:1163](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1163)* | ||
*Defined in [api.ts:1169](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1169)* | ||
@@ -47,3 +47,3 @@ Date of last evaluation. | ||
*Defined in [api.ts:1175](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1175)* | ||
*Defined in [api.ts:1181](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1181)* | ||
@@ -63,3 +63,3 @@ Date of the latest upload of archive. | ||
*Defined in [api.ts:1169](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1169)* | ||
*Defined in [api.ts:1175](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1175)* | ||
@@ -66,0 +66,0 @@ System opt out status. |
@@ -31,3 +31,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [SystemListOut](../interfaces/systemlistout.md) | ||
*Defined in [api.ts:1189](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1189)* | ||
*Defined in [api.ts:1195](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1195)* | ||
@@ -45,3 +45,3 @@ *__type__*: {Object} | ||
*Defined in [api.ts:1195](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1195)* | ||
*Defined in [api.ts:1201](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1201)* | ||
@@ -59,3 +59,3 @@ *__type__*: {Links} | ||
*Defined in [api.ts:1201](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1201)* | ||
*Defined in [api.ts:1207](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1207)* | ||
@@ -62,0 +62,0 @@ *__type__*: {MetaSystems} |
@@ -30,3 +30,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [VersionOut](../interfaces/versionout.md) | ||
*Defined in [api.ts:1215](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1215)* | ||
*Defined in [api.ts:1221](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1221)* | ||
@@ -46,3 +46,3 @@ Version of application. | ||
*Defined in [api.ts:1221](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1221)* | ||
*Defined in [api.ts:1227](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1227)* | ||
@@ -49,0 +49,0 @@ Version of database schema. |
@@ -31,3 +31,3 @@ [@redhat-cloud-services/vulnerabilities-client](../README.md) > [VulnerabilitiesOut](../interfaces/vulnerabilitiesout.md) | ||
*Defined in [api.ts:1235](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1235)* | ||
*Defined in [api.ts:1241](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1241)* | ||
@@ -45,3 +45,3 @@ *__type__*: {Object} | ||
*Defined in [api.ts:1241](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1241)* | ||
*Defined in [api.ts:1247](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1247)* | ||
@@ -59,3 +59,3 @@ *__type__*: {Links} | ||
*Defined in [api.ts:1247](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1247)* | ||
*Defined in [api.ts:1253](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1253)* | ||
@@ -62,0 +62,0 @@ *__type__*: {MetaVulnerabilitiesOut} |
@@ -160,3 +160,3 @@ | ||
*Defined in [api.ts:1255](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1255)* | ||
*Defined in [api.ts:1261](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L1261)* | ||
@@ -180,3 +180,3 @@ DefaultApi - axios parameter creator | ||
*Defined in [api.ts:2431](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2431)* | ||
*Defined in [api.ts:2437](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2437)* | ||
@@ -202,3 +202,3 @@ DefaultApi - factory interface | ||
*Defined in [api.ts:2171](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2171)* | ||
*Defined in [api.ts:2177](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2177)* | ||
@@ -222,3 +222,3 @@ DefaultApi - functional programming interface | ||
*Defined in [api.ts:2861](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2861)* | ||
*Defined in [api.ts:2867](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L2867)* | ||
@@ -242,3 +242,3 @@ InternalApi - axios parameter creator | ||
*Defined in [api.ts:3130](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L3130)* | ||
*Defined in [api.ts:3136](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L3136)* | ||
@@ -264,3 +264,3 @@ InternalApi - factory interface | ||
*Defined in [api.ts:3064](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L3064)* | ||
*Defined in [api.ts:3070](https://github.com/RedHatInsights/javascript-clients/blob/master/packages/vulnerabilities/git-api/api.ts#L3070)* | ||
@@ -267,0 +267,0 @@ InternalApi - functional programming interface |
{ | ||
"name": "@redhat-cloud-services/vulnerabilities-client", | ||
"version": "1.0.34", | ||
"version": "1.0.35", | ||
"description": "", | ||
@@ -5,0 +5,0 @@ "main": "dist/index.js", |
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is too big to display
561038
99
6211