All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.aliyun.sas20181203.models.ModifyCreateVulWhitelistRequest Maven / Gradle / Ivy

There is a newer version: 3.0.0
Show newest version
// This file is auto-generated, don't edit it. Thanks.
package com.aliyun.sas20181203.models;

import com.aliyun.tea.*;

public class ModifyCreateVulWhitelistRequest extends TeaModel {
    /**
     * 

The reason why you add the vulnerability to the whitelist.

*/ @NameInMap("Reason") public String reason; /** *

The applicable scope of the whitelist. The value of this parameter is in the JSON format and contains the following fields:

*
*

* **type**: the type of the applicable scope. Valid values:

*
*

* **GroupId**: the ID of a server group

*

* **Uuid**: the UUID of a server

*
*

* **uuids**: the UUIDs of servers

*
*

* **groupIds**: the IDs of server groups

*
*

> If you leave this parameter empty, all servers are added to the whitelist. If you set the **type** field to **GroupId**, you must also specify the **groupIds** field. If you set **type** to **Uuid**, you must specify the **uuids** parameter.

*/ @NameInMap("TargetInfo") public String targetInfo; /** *

The information about the vulnerability that you want to add to the whitelist. The value is a JSON string that contains the following fields:

*
*

* **Status**: the status of the vulnerability.

*
*

* **GmtLast**: the timestamp when the vulnerability was last detected. Unit: milliseconds.

*
*

* **LaterCount**: the number of vulnerabilities that have the medium priority.

*
*

* **AsapCount**: the number of vulnerabilities that have the high priority.

*
*

* **Name**: the name of the vulnerability.

*
*

* **Type**: the type of the vulnerability. Valid values:

*
*

* **cve**: Linux software vulnerability

*

* **sys**: Windows system vulnerability

*

* **cms**: Web-CMS vulnerability

*

* **app**: application vulnerability

*

* **emg**: urgent vulnerability

*
*

* **Related**: the Common Vulnerabilities and Exposures (CVE) ID of the vulnerability.

*
*

* **HandledCount**: the number of handled vulnerabilities.

*
*

* **AliasName**: the alias of the vulnerability.

*
*

* **RuleModifyTime**: the time when the vulnerability was last disclosed.

*
*

* **NntfCount**: the number of vulnerabilities that have the low priority.

*
*

* **TotalFixCount**: the total number of fixed vulnerabilities.

*
*

* **Tags**: the tag that is added to the vulnerability.

*
*

> You can call the [DescribeGroupedVul](~~DescribeGroupedVul~~) operation to query the information about the vulnerability that you want to add to the whitelist.

*/ @NameInMap("Whitelist") public String whitelist; public static ModifyCreateVulWhitelistRequest build(java.util.Map map) throws Exception { ModifyCreateVulWhitelistRequest self = new ModifyCreateVulWhitelistRequest(); return TeaModel.build(map, self); } public ModifyCreateVulWhitelistRequest setReason(String reason) { this.reason = reason; return this; } public String getReason() { return this.reason; } public ModifyCreateVulWhitelistRequest setTargetInfo(String targetInfo) { this.targetInfo = targetInfo; return this; } public String getTargetInfo() { return this.targetInfo; } public ModifyCreateVulWhitelistRequest setWhitelist(String whitelist) { this.whitelist = whitelist; return this; } public String getWhitelist() { return this.whitelist; } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy