Skip to content

Commit d829454

Browse files
author
awstools
committed
feat(client-ecr): The DescribeImageScanning API now includes fixAvailable, exploitAvailable, and fixedInVersion fields to provide more detailed information about the availability of fixes, exploits, and fixed versions for identified image vulnerabilities.
1 parent 566bb05 commit d829454

File tree

4 files changed

+58
-5
lines changed

4 files changed

+58
-5
lines changed

clients/client-ecr/src/commands/DescribeImageScanFindingsCommand.ts

+3
Original file line numberDiff line numberDiff line change
@@ -116,6 +116,7 @@ export interface DescribeImageScanFindingsCommandOutput extends DescribeImageSca
116116
* // release: "STRING_VALUE",
117117
* // sourceLayerHash: "STRING_VALUE",
118118
* // version: "STRING_VALUE",
119+
* // fixedInVersion: "STRING_VALUE",
119120
* // },
120121
* // ],
121122
* // },
@@ -168,6 +169,8 @@ export interface DescribeImageScanFindingsCommandOutput extends DescribeImageSca
168169
* // title: "STRING_VALUE",
169170
* // type: "STRING_VALUE",
170171
* // updatedAt: new Date("TIMESTAMP"),
172+
* // fixAvailable: "STRING_VALUE",
173+
* // exploitAvailable: "STRING_VALUE",
171174
* // },
172175
* // ],
173176
* // },

clients/client-ecr/src/models/models_0.ts

+25-4
Original file line numberDiff line numberDiff line change
@@ -1065,14 +1065,14 @@ export interface EncryptionConfiguration {
10651065
* for Amazon ECR, or specify your own KMS key, which you already created.</p>
10661066
* <p>If you use the <code>KMS_DSSE</code> encryption type, the contents of the repository
10671067
* will be encrypted with two layers of encryption using server-side encryption with the
1068-
* KMS Management Service key stored in KMS. Similar to the KMS encryption type, you
1068+
* KMS Management Service key stored in KMS. Similar to the <code>KMS</code> encryption type, you
10691069
* can either use the default Amazon Web Services managed KMS key for Amazon ECR, or specify your own KMS
10701070
* key, which you've already created. </p>
10711071
* <p>If you use the <code>AES256</code> encryption type, Amazon ECR uses server-side encryption
10721072
* with Amazon S3-managed encryption keys which encrypts the images in the repository using an
1073-
* AES256 encryption algorithm. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingServerSideEncryption.html">Protecting data using
1074-
* server-side encryption with Amazon S3-managed encryption keys (SSE-S3)</a> in the
1075-
* <i>Amazon Simple Storage Service Console Developer Guide</i>.</p>
1073+
* AES256 encryption algorithm.</p>
1074+
* <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonECR/latest/userguide/encryption-at-rest.html">Amazon ECR encryption at
1075+
* rest</a> in the <i>Amazon Elastic Container Registry User Guide</i>.</p>
10761076
* @public
10771077
*/
10781078
encryptionType: EncryptionType | undefined;
@@ -2456,6 +2456,12 @@ export interface VulnerablePackage {
24562456
* @public
24572457
*/
24582458
version?: string;
2459+
2460+
/**
2461+
* <p>The version of the package that contains the vulnerability fix.</p>
2462+
* @public
2463+
*/
2464+
fixedInVersion?: string;
24592465
}
24602466

24612467
/**
@@ -2814,6 +2820,21 @@ export interface EnhancedImageScanFinding {
28142820
* @public
28152821
*/
28162822
updatedAt?: Date;
2823+
2824+
/**
2825+
* <p>Details on whether a fix is available through a version update. This value can be
2826+
* <code>YES</code>, <code>NO</code>, or <code>PARTIAL</code>. A <code>PARTIAL</code>
2827+
* fix means that some, but not all, of the packages identified in the finding have fixes
2828+
* available through updated versions.</p>
2829+
* @public
2830+
*/
2831+
fixAvailable?: string;
2832+
2833+
/**
2834+
* <p>If a finding discovered in your environment has an exploit available.</p>
2835+
* @public
2836+
*/
2837+
exploitAvailable?: string;
28172838
}
28182839

28192840
/**

clients/client-ecr/src/protocols/Aws_json1_1.ts

+2
Original file line numberDiff line numberDiff line change
@@ -3133,8 +3133,10 @@ const de_EnhancedImageScanFinding = (output: any, context: __SerdeContext): Enha
31333133
return take(output, {
31343134
awsAccountId: __expectString,
31353135
description: __expectString,
3136+
exploitAvailable: __expectString,
31363137
findingArn: __expectString,
31373138
firstObservedAt: (_: any) => __expectNonNull(__parseEpochTimestamp(__expectNumber(_))),
3139+
fixAvailable: __expectString,
31383140
lastObservedAt: (_: any) => __expectNonNull(__parseEpochTimestamp(__expectNumber(_))),
31393141
packageVulnerabilityDetails: (_: any) => de_PackageVulnerabilityDetails(_, context),
31403142
remediation: _json,

codegen/sdk-codegen/aws-models/ecr.json

+28-1
Original file line numberDiff line numberDiff line change
@@ -3499,7 +3499,7 @@
34993499
"encryptionType": {
35003500
"target": "com.amazonaws.ecr#EncryptionType",
35013501
"traits": {
3502-
"smithy.api#documentation": "<p>The encryption type to use.</p>\n <p>If you use the <code>KMS</code> encryption type, the contents of the repository will\n be encrypted using server-side encryption with Key Management Service key stored in KMS. When you\n use KMS to encrypt your data, you can either use the default Amazon Web Services managed KMS key\n for Amazon ECR, or specify your own KMS key, which you already created.</p>\n <p>If you use the <code>KMS_DSSE</code> encryption type, the contents of the repository\n will be encrypted with two layers of encryption using server-side encryption with the\n KMS Management Service key stored in KMS. Similar to the KMS encryption type, you\n can either use the default Amazon Web Services managed KMS key for Amazon ECR, or specify your own KMS\n key, which you've already created. </p>\n <p>If you use the <code>AES256</code> encryption type, Amazon ECR uses server-side encryption\n with Amazon S3-managed encryption keys which encrypts the images in the repository using an\n AES256 encryption algorithm. For more information, see <a href=\"https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingServerSideEncryption.html\">Protecting data using\n server-side encryption with Amazon S3-managed encryption keys (SSE-S3)</a> in the\n <i>Amazon Simple Storage Service Console Developer Guide</i>.</p>",
3502+
"smithy.api#documentation": "<p>The encryption type to use.</p>\n <p>If you use the <code>KMS</code> encryption type, the contents of the repository will\n be encrypted using server-side encryption with Key Management Service key stored in KMS. When you\n use KMS to encrypt your data, you can either use the default Amazon Web Services managed KMS key\n for Amazon ECR, or specify your own KMS key, which you already created.</p>\n <p>If you use the <code>KMS_DSSE</code> encryption type, the contents of the repository\n will be encrypted with two layers of encryption using server-side encryption with the\n KMS Management Service key stored in KMS. Similar to the <code>KMS</code> encryption type, you\n can either use the default Amazon Web Services managed KMS key for Amazon ECR, or specify your own KMS\n key, which you've already created. </p>\n <p>If you use the <code>AES256</code> encryption type, Amazon ECR uses server-side encryption\n with Amazon S3-managed encryption keys which encrypts the images in the repository using an\n AES256 encryption algorithm.</p>\n <p>For more information, see <a href=\"https://docs.aws.amazon.com/AmazonECR/latest/userguide/encryption-at-rest.html\">Amazon ECR encryption at\n rest</a> in the <i>Amazon Elastic Container Registry User Guide</i>.</p>",
35033503
"smithy.api#required": {}
35043504
}
35053505
},
@@ -3651,6 +3651,18 @@
36513651
"traits": {
36523652
"smithy.api#documentation": "<p>The date and time the finding was last updated at.</p>"
36533653
}
3654+
},
3655+
"fixAvailable": {
3656+
"target": "com.amazonaws.ecr#FixAvailable",
3657+
"traits": {
3658+
"smithy.api#documentation": "<p>Details on whether a fix is available through a version update. This value can be\n <code>YES</code>, <code>NO</code>, or <code>PARTIAL</code>. A <code>PARTIAL</code>\n fix means that some, but not all, of the packages identified in the finding have fixes\n available through updated versions.</p>"
3659+
}
3660+
},
3661+
"exploitAvailable": {
3662+
"target": "com.amazonaws.ecr#ExploitAvailable",
3663+
"traits": {
3664+
"smithy.api#documentation": "<p>If a finding discovered in your environment has an exploit available.</p>"
3665+
}
36543666
}
36553667
},
36563668
"traits": {
@@ -3675,6 +3687,9 @@
36753687
"com.amazonaws.ecr#ExpirationTimestamp": {
36763688
"type": "timestamp"
36773689
},
3690+
"com.amazonaws.ecr#ExploitAvailable": {
3691+
"type": "string"
3692+
},
36783693
"com.amazonaws.ecr#FilePath": {
36793694
"type": "string"
36803695
},
@@ -3737,6 +3752,12 @@
37373752
"target": "com.amazonaws.ecr#SeverityCount"
37383753
}
37393754
},
3755+
"com.amazonaws.ecr#FixAvailable": {
3756+
"type": "string"
3757+
},
3758+
"com.amazonaws.ecr#FixedInVersion": {
3759+
"type": "string"
3760+
},
37403761
"com.amazonaws.ecr#ForceFlag": {
37413762
"type": "boolean",
37423763
"traits": {
@@ -8639,6 +8660,12 @@
86398660
"traits": {
86408661
"smithy.api#documentation": "<p>The version of the vulnerable package.</p>"
86418662
}
8663+
},
8664+
"fixedInVersion": {
8665+
"target": "com.amazonaws.ecr#FixedInVersion",
8666+
"traits": {
8667+
"smithy.api#documentation": "<p>The version of the package that contains the vulnerability fix.</p>"
8668+
}
86428669
}
86438670
},
86448671
"traits": {

0 commit comments

Comments
 (0)