All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.amazonaws.services.simplesystemsmanagement.model.DescribeAvailablePatchesRequest Maven / Gradle / Ivy

Go to download

The AWS Java SDK for AWS Simple Systems Management Service holds the client classes that are used for communicating with the AWS Simple Systems Management Service

The newest version!
/*
 * Copyright 2019-2024 Amazon.com, Inc. or its affiliates. All Rights Reserved.
 * 
 * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with
 * the License. A copy of the License is located at
 * 
 * http://aws.amazon.com/apache2.0
 * 
 * or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
 * CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions
 * and limitations under the License.
 */
package com.amazonaws.services.simplesystemsmanagement.model;

import java.io.Serializable;
import javax.annotation.Generated;

import com.amazonaws.AmazonWebServiceRequest;

/**
 * 
 * @see AWS API
 *      Documentation
 */
@Generated("com.amazonaws:aws-java-sdk-code-generator")
public class DescribeAvailablePatchesRequest extends com.amazonaws.AmazonWebServiceRequest implements Serializable, Cloneable {

    /**
     * 

* Each element in the array is a structure containing a key-value pair. *

*

* Windows Server *

*

* Supported keys for Windows Server managed node patches include the following: *

*
    *
  • *

    * PATCH_SET *

    *

    * Sample values: OS | APPLICATION *

    *
  • *
  • *

    * PRODUCT *

    *

    * Sample values: WindowsServer2012 | Office 2010 | * MicrosoftDefenderAntivirus *

    *
  • *
  • *

    * PRODUCT_FAMILY *

    *

    * Sample values: Windows | Office *

    *
  • *
  • *

    * MSRC_SEVERITY *

    *

    * Sample values: ServicePacks | Important | Moderate *

    *
  • *
  • *

    * CLASSIFICATION *

    *

    * Sample values: ServicePacks | SecurityUpdates | DefinitionUpdates *

    *
  • *
  • *

    * PATCH_ID *

    *

    * Sample values: KB123456 | KB4516046 *

    *
  • *
*

* Linux *

* *

* When specifying filters for Linux patches, you must specify a key-pair for PRODUCT. For example, * using the Command Line Interface (CLI), the following command fails: *

*

* aws ssm describe-available-patches --filters Key=CVE_ID,Values=CVE-2018-3615 *

*

* However, the following command succeeds: *

*

* aws ssm describe-available-patches --filters Key=PRODUCT,Values=AmazonLinux2018.03 Key=CVE_ID,Values=CVE-2018-3615 *

*
*

* Supported keys for Linux managed node patches include the following: *

*
    *
  • *

    * PRODUCT *

    *

    * Sample values: AmazonLinux2018.03 | AmazonLinux2.0 *

    *
  • *
  • *

    * NAME *

    *

    * Sample values: kernel-headers | samba-python | php *

    *
  • *
  • *

    * SEVERITY *

    *

    * Sample values: Critical | Important | Medium | Low *

    *
  • *
  • *

    * EPOCH *

    *

    * Sample values: 0 | 1 *

    *
  • *
  • *

    * VERSION *

    *

    * Sample values: 78.6.1 | 4.10.16 *

    *
  • *
  • *

    * RELEASE *

    *

    * Sample values: 9.56.amzn1 | 1.amzn2 *

    *
  • *
  • *

    * ARCH *

    *

    * Sample values: i686 | x86_64 *

    *
  • *
  • *

    * REPOSITORY *

    *

    * Sample values: Core | Updates *

    *
  • *
  • *

    * ADVISORY_ID *

    *

    * Sample values: ALAS-2018-1058 | ALAS2-2021-1594 *

    *
  • *
  • *

    * CVE_ID *

    *

    * Sample values: CVE-2018-3615 | CVE-2020-1472 *

    *
  • *
  • *

    * BUGZILLA_ID *

    *

    * Sample values: 1463241 *

    *
  • *
*/ private com.amazonaws.internal.SdkInternalList filters; /** *

* The maximum number of patches to return (per page). *

*/ private Integer maxResults; /** *

* The token for the next set of items to return. (You received this token from a previous call.) *

*/ private String nextToken; /** *

* Each element in the array is a structure containing a key-value pair. *

*

* Windows Server *

*

* Supported keys for Windows Server managed node patches include the following: *

*
    *
  • *

    * PATCH_SET *

    *

    * Sample values: OS | APPLICATION *

    *
  • *
  • *

    * PRODUCT *

    *

    * Sample values: WindowsServer2012 | Office 2010 | * MicrosoftDefenderAntivirus *

    *
  • *
  • *

    * PRODUCT_FAMILY *

    *

    * Sample values: Windows | Office *

    *
  • *
  • *

    * MSRC_SEVERITY *

    *

    * Sample values: ServicePacks | Important | Moderate *

    *
  • *
  • *

    * CLASSIFICATION *

    *

    * Sample values: ServicePacks | SecurityUpdates | DefinitionUpdates *

    *
  • *
  • *

    * PATCH_ID *

    *

    * Sample values: KB123456 | KB4516046 *

    *
  • *
*

* Linux *

* *

* When specifying filters for Linux patches, you must specify a key-pair for PRODUCT. For example, * using the Command Line Interface (CLI), the following command fails: *

*

* aws ssm describe-available-patches --filters Key=CVE_ID,Values=CVE-2018-3615 *

*

* However, the following command succeeds: *

*

* aws ssm describe-available-patches --filters Key=PRODUCT,Values=AmazonLinux2018.03 Key=CVE_ID,Values=CVE-2018-3615 *

*
*

* Supported keys for Linux managed node patches include the following: *

*
    *
  • *

    * PRODUCT *

    *

    * Sample values: AmazonLinux2018.03 | AmazonLinux2.0 *

    *
  • *
  • *

    * NAME *

    *

    * Sample values: kernel-headers | samba-python | php *

    *
  • *
  • *

    * SEVERITY *

    *

    * Sample values: Critical | Important | Medium | Low *

    *
  • *
  • *

    * EPOCH *

    *

    * Sample values: 0 | 1 *

    *
  • *
  • *

    * VERSION *

    *

    * Sample values: 78.6.1 | 4.10.16 *

    *
  • *
  • *

    * RELEASE *

    *

    * Sample values: 9.56.amzn1 | 1.amzn2 *

    *
  • *
  • *

    * ARCH *

    *

    * Sample values: i686 | x86_64 *

    *
  • *
  • *

    * REPOSITORY *

    *

    * Sample values: Core | Updates *

    *
  • *
  • *

    * ADVISORY_ID *

    *

    * Sample values: ALAS-2018-1058 | ALAS2-2021-1594 *

    *
  • *
  • *

    * CVE_ID *

    *

    * Sample values: CVE-2018-3615 | CVE-2020-1472 *

    *
  • *
  • *

    * BUGZILLA_ID *

    *

    * Sample values: 1463241 *

    *
  • *
* * @return Each element in the array is a structure containing a key-value pair.

*

* Windows Server *

*

* Supported keys for Windows Server managed node patches include the following: *

*
    *
  • *

    * PATCH_SET *

    *

    * Sample values: OS | APPLICATION *

    *
  • *
  • *

    * PRODUCT *

    *

    * Sample values: WindowsServer2012 | Office 2010 | * MicrosoftDefenderAntivirus *

    *
  • *
  • *

    * PRODUCT_FAMILY *

    *

    * Sample values: Windows | Office *

    *
  • *
  • *

    * MSRC_SEVERITY *

    *

    * Sample values: ServicePacks | Important | Moderate *

    *
  • *
  • *

    * CLASSIFICATION *

    *

    * Sample values: ServicePacks | SecurityUpdates | DefinitionUpdates *

    *
  • *
  • *

    * PATCH_ID *

    *

    * Sample values: KB123456 | KB4516046 *

    *
  • *
*

* Linux *

* *

* When specifying filters for Linux patches, you must specify a key-pair for PRODUCT. For * example, using the Command Line Interface (CLI), the following command fails: *

*

* aws ssm describe-available-patches --filters Key=CVE_ID,Values=CVE-2018-3615 *

*

* However, the following command succeeds: *

*

* aws ssm describe-available-patches --filters Key=PRODUCT,Values=AmazonLinux2018.03 Key=CVE_ID,Values=CVE-2018-3615 *

*
*

* Supported keys for Linux managed node patches include the following: *

*
    *
  • *

    * PRODUCT *

    *

    * Sample values: AmazonLinux2018.03 | AmazonLinux2.0 *

    *
  • *
  • *

    * NAME *

    *

    * Sample values: kernel-headers | samba-python | php *

    *
  • *
  • *

    * SEVERITY *

    *

    * Sample values: Critical | Important | Medium | Low *

    *
  • *
  • *

    * EPOCH *

    *

    * Sample values: 0 | 1 *

    *
  • *
  • *

    * VERSION *

    *

    * Sample values: 78.6.1 | 4.10.16 *

    *
  • *
  • *

    * RELEASE *

    *

    * Sample values: 9.56.amzn1 | 1.amzn2 *

    *
  • *
  • *

    * ARCH *

    *

    * Sample values: i686 | x86_64 *

    *
  • *
  • *

    * REPOSITORY *

    *

    * Sample values: Core | Updates *

    *
  • *
  • *

    * ADVISORY_ID *

    *

    * Sample values: ALAS-2018-1058 | ALAS2-2021-1594 *

    *
  • *
  • *

    * CVE_ID *

    *

    * Sample values: CVE-2018-3615 | CVE-2020-1472 *

    *
  • *
  • *

    * BUGZILLA_ID *

    *

    * Sample values: 1463241 *

    *
  • */ public java.util.List getFilters() { if (filters == null) { filters = new com.amazonaws.internal.SdkInternalList(); } return filters; } /** *

    * Each element in the array is a structure containing a key-value pair. *

    *

    * Windows Server *

    *

    * Supported keys for Windows Server managed node patches include the following: *

    *
      *
    • *

      * PATCH_SET *

      *

      * Sample values: OS | APPLICATION *

      *
    • *
    • *

      * PRODUCT *

      *

      * Sample values: WindowsServer2012 | Office 2010 | * MicrosoftDefenderAntivirus *

      *
    • *
    • *

      * PRODUCT_FAMILY *

      *

      * Sample values: Windows | Office *

      *
    • *
    • *

      * MSRC_SEVERITY *

      *

      * Sample values: ServicePacks | Important | Moderate *

      *
    • *
    • *

      * CLASSIFICATION *

      *

      * Sample values: ServicePacks | SecurityUpdates | DefinitionUpdates *

      *
    • *
    • *

      * PATCH_ID *

      *

      * Sample values: KB123456 | KB4516046 *

      *
    • *
    *

    * Linux *

    * *

    * When specifying filters for Linux patches, you must specify a key-pair for PRODUCT. For example, * using the Command Line Interface (CLI), the following command fails: *

    *

    * aws ssm describe-available-patches --filters Key=CVE_ID,Values=CVE-2018-3615 *

    *

    * However, the following command succeeds: *

    *

    * aws ssm describe-available-patches --filters Key=PRODUCT,Values=AmazonLinux2018.03 Key=CVE_ID,Values=CVE-2018-3615 *

    *
    *

    * Supported keys for Linux managed node patches include the following: *

    *
      *
    • *

      * PRODUCT *

      *

      * Sample values: AmazonLinux2018.03 | AmazonLinux2.0 *

      *
    • *
    • *

      * NAME *

      *

      * Sample values: kernel-headers | samba-python | php *

      *
    • *
    • *

      * SEVERITY *

      *

      * Sample values: Critical | Important | Medium | Low *

      *
    • *
    • *

      * EPOCH *

      *

      * Sample values: 0 | 1 *

      *
    • *
    • *

      * VERSION *

      *

      * Sample values: 78.6.1 | 4.10.16 *

      *
    • *
    • *

      * RELEASE *

      *

      * Sample values: 9.56.amzn1 | 1.amzn2 *

      *
    • *
    • *

      * ARCH *

      *

      * Sample values: i686 | x86_64 *

      *
    • *
    • *

      * REPOSITORY *

      *

      * Sample values: Core | Updates *

      *
    • *
    • *

      * ADVISORY_ID *

      *

      * Sample values: ALAS-2018-1058 | ALAS2-2021-1594 *

      *
    • *
    • *

      * CVE_ID *

      *

      * Sample values: CVE-2018-3615 | CVE-2020-1472 *

      *
    • *
    • *

      * BUGZILLA_ID *

      *

      * Sample values: 1463241 *

      *
    • *
    * * @param filters * Each element in the array is a structure containing a key-value pair.

    *

    * Windows Server *

    *

    * Supported keys for Windows Server managed node patches include the following: *

    *
      *
    • *

      * PATCH_SET *

      *

      * Sample values: OS | APPLICATION *

      *
    • *
    • *

      * PRODUCT *

      *

      * Sample values: WindowsServer2012 | Office 2010 | * MicrosoftDefenderAntivirus *

      *
    • *
    • *

      * PRODUCT_FAMILY *

      *

      * Sample values: Windows | Office *

      *
    • *
    • *

      * MSRC_SEVERITY *

      *

      * Sample values: ServicePacks | Important | Moderate *

      *
    • *
    • *

      * CLASSIFICATION *

      *

      * Sample values: ServicePacks | SecurityUpdates | DefinitionUpdates *

      *
    • *
    • *

      * PATCH_ID *

      *

      * Sample values: KB123456 | KB4516046 *

      *
    • *
    *

    * Linux *

    * *

    * When specifying filters for Linux patches, you must specify a key-pair for PRODUCT. For * example, using the Command Line Interface (CLI), the following command fails: *

    *

    * aws ssm describe-available-patches --filters Key=CVE_ID,Values=CVE-2018-3615 *

    *

    * However, the following command succeeds: *

    *

    * aws ssm describe-available-patches --filters Key=PRODUCT,Values=AmazonLinux2018.03 Key=CVE_ID,Values=CVE-2018-3615 *

    *
    *

    * Supported keys for Linux managed node patches include the following: *

    *
      *
    • *

      * PRODUCT *

      *

      * Sample values: AmazonLinux2018.03 | AmazonLinux2.0 *

      *
    • *
    • *

      * NAME *

      *

      * Sample values: kernel-headers | samba-python | php *

      *
    • *
    • *

      * SEVERITY *

      *

      * Sample values: Critical | Important | Medium | Low *

      *
    • *
    • *

      * EPOCH *

      *

      * Sample values: 0 | 1 *

      *
    • *
    • *

      * VERSION *

      *

      * Sample values: 78.6.1 | 4.10.16 *

      *
    • *
    • *

      * RELEASE *

      *

      * Sample values: 9.56.amzn1 | 1.amzn2 *

      *
    • *
    • *

      * ARCH *

      *

      * Sample values: i686 | x86_64 *

      *
    • *
    • *

      * REPOSITORY *

      *

      * Sample values: Core | Updates *

      *
    • *
    • *

      * ADVISORY_ID *

      *

      * Sample values: ALAS-2018-1058 | ALAS2-2021-1594 *

      *
    • *
    • *

      * CVE_ID *

      *

      * Sample values: CVE-2018-3615 | CVE-2020-1472 *

      *
    • *
    • *

      * BUGZILLA_ID *

      *

      * Sample values: 1463241 *

      *
    • */ public void setFilters(java.util.Collection filters) { if (filters == null) { this.filters = null; return; } this.filters = new com.amazonaws.internal.SdkInternalList(filters); } /** *

      * Each element in the array is a structure containing a key-value pair. *

      *

      * Windows Server *

      *

      * Supported keys for Windows Server managed node patches include the following: *

      *
        *
      • *

        * PATCH_SET *

        *

        * Sample values: OS | APPLICATION *

        *
      • *
      • *

        * PRODUCT *

        *

        * Sample values: WindowsServer2012 | Office 2010 | * MicrosoftDefenderAntivirus *

        *
      • *
      • *

        * PRODUCT_FAMILY *

        *

        * Sample values: Windows | Office *

        *
      • *
      • *

        * MSRC_SEVERITY *

        *

        * Sample values: ServicePacks | Important | Moderate *

        *
      • *
      • *

        * CLASSIFICATION *

        *

        * Sample values: ServicePacks | SecurityUpdates | DefinitionUpdates *

        *
      • *
      • *

        * PATCH_ID *

        *

        * Sample values: KB123456 | KB4516046 *

        *
      • *
      *

      * Linux *

      * *

      * When specifying filters for Linux patches, you must specify a key-pair for PRODUCT. For example, * using the Command Line Interface (CLI), the following command fails: *

      *

      * aws ssm describe-available-patches --filters Key=CVE_ID,Values=CVE-2018-3615 *

      *

      * However, the following command succeeds: *

      *

      * aws ssm describe-available-patches --filters Key=PRODUCT,Values=AmazonLinux2018.03 Key=CVE_ID,Values=CVE-2018-3615 *

      *
      *

      * Supported keys for Linux managed node patches include the following: *

      *
        *
      • *

        * PRODUCT *

        *

        * Sample values: AmazonLinux2018.03 | AmazonLinux2.0 *

        *
      • *
      • *

        * NAME *

        *

        * Sample values: kernel-headers | samba-python | php *

        *
      • *
      • *

        * SEVERITY *

        *

        * Sample values: Critical | Important | Medium | Low *

        *
      • *
      • *

        * EPOCH *

        *

        * Sample values: 0 | 1 *

        *
      • *
      • *

        * VERSION *

        *

        * Sample values: 78.6.1 | 4.10.16 *

        *
      • *
      • *

        * RELEASE *

        *

        * Sample values: 9.56.amzn1 | 1.amzn2 *

        *
      • *
      • *

        * ARCH *

        *

        * Sample values: i686 | x86_64 *

        *
      • *
      • *

        * REPOSITORY *

        *

        * Sample values: Core | Updates *

        *
      • *
      • *

        * ADVISORY_ID *

        *

        * Sample values: ALAS-2018-1058 | ALAS2-2021-1594 *

        *
      • *
      • *

        * CVE_ID *

        *

        * Sample values: CVE-2018-3615 | CVE-2020-1472 *

        *
      • *
      • *

        * BUGZILLA_ID *

        *

        * Sample values: 1463241 *

        *
      • *
      *

      * NOTE: This method appends the values to the existing list (if any). Use * {@link #setFilters(java.util.Collection)} or {@link #withFilters(java.util.Collection)} if you want to override * the existing values. *

      * * @param filters * Each element in the array is a structure containing a key-value pair.

      *

      * Windows Server *

      *

      * Supported keys for Windows Server managed node patches include the following: *

      *
        *
      • *

        * PATCH_SET *

        *

        * Sample values: OS | APPLICATION *

        *
      • *
      • *

        * PRODUCT *

        *

        * Sample values: WindowsServer2012 | Office 2010 | * MicrosoftDefenderAntivirus *

        *
      • *
      • *

        * PRODUCT_FAMILY *

        *

        * Sample values: Windows | Office *

        *
      • *
      • *

        * MSRC_SEVERITY *

        *

        * Sample values: ServicePacks | Important | Moderate *

        *
      • *
      • *

        * CLASSIFICATION *

        *

        * Sample values: ServicePacks | SecurityUpdates | DefinitionUpdates *

        *
      • *
      • *

        * PATCH_ID *

        *

        * Sample values: KB123456 | KB4516046 *

        *
      • *
      *

      * Linux *

      * *

      * When specifying filters for Linux patches, you must specify a key-pair for PRODUCT. For * example, using the Command Line Interface (CLI), the following command fails: *

      *

      * aws ssm describe-available-patches --filters Key=CVE_ID,Values=CVE-2018-3615 *

      *

      * However, the following command succeeds: *

      *

      * aws ssm describe-available-patches --filters Key=PRODUCT,Values=AmazonLinux2018.03 Key=CVE_ID,Values=CVE-2018-3615 *

      *
      *

      * Supported keys for Linux managed node patches include the following: *

      *
        *
      • *

        * PRODUCT *

        *

        * Sample values: AmazonLinux2018.03 | AmazonLinux2.0 *

        *
      • *
      • *

        * NAME *

        *

        * Sample values: kernel-headers | samba-python | php *

        *
      • *
      • *

        * SEVERITY *

        *

        * Sample values: Critical | Important | Medium | Low *

        *
      • *
      • *

        * EPOCH *

        *

        * Sample values: 0 | 1 *

        *
      • *
      • *

        * VERSION *

        *

        * Sample values: 78.6.1 | 4.10.16 *

        *
      • *
      • *

        * RELEASE *

        *

        * Sample values: 9.56.amzn1 | 1.amzn2 *

        *
      • *
      • *

        * ARCH *

        *

        * Sample values: i686 | x86_64 *

        *
      • *
      • *

        * REPOSITORY *

        *

        * Sample values: Core | Updates *

        *
      • *
      • *

        * ADVISORY_ID *

        *

        * Sample values: ALAS-2018-1058 | ALAS2-2021-1594 *

        *
      • *
      • *

        * CVE_ID *

        *

        * Sample values: CVE-2018-3615 | CVE-2020-1472 *

        *
      • *
      • *

        * BUGZILLA_ID *

        *

        * Sample values: 1463241 *

        *
      • * @return Returns a reference to this object so that method calls can be chained together. */ public DescribeAvailablePatchesRequest withFilters(PatchOrchestratorFilter... filters) { if (this.filters == null) { setFilters(new com.amazonaws.internal.SdkInternalList(filters.length)); } for (PatchOrchestratorFilter ele : filters) { this.filters.add(ele); } return this; } /** *

        * Each element in the array is a structure containing a key-value pair. *

        *

        * Windows Server *

        *

        * Supported keys for Windows Server managed node patches include the following: *

        *
          *
        • *

          * PATCH_SET *

          *

          * Sample values: OS | APPLICATION *

          *
        • *
        • *

          * PRODUCT *

          *

          * Sample values: WindowsServer2012 | Office 2010 | * MicrosoftDefenderAntivirus *

          *
        • *
        • *

          * PRODUCT_FAMILY *

          *

          * Sample values: Windows | Office *

          *
        • *
        • *

          * MSRC_SEVERITY *

          *

          * Sample values: ServicePacks | Important | Moderate *

          *
        • *
        • *

          * CLASSIFICATION *

          *

          * Sample values: ServicePacks | SecurityUpdates | DefinitionUpdates *

          *
        • *
        • *

          * PATCH_ID *

          *

          * Sample values: KB123456 | KB4516046 *

          *
        • *
        *

        * Linux *

        * *

        * When specifying filters for Linux patches, you must specify a key-pair for PRODUCT. For example, * using the Command Line Interface (CLI), the following command fails: *

        *

        * aws ssm describe-available-patches --filters Key=CVE_ID,Values=CVE-2018-3615 *

        *

        * However, the following command succeeds: *

        *

        * aws ssm describe-available-patches --filters Key=PRODUCT,Values=AmazonLinux2018.03 Key=CVE_ID,Values=CVE-2018-3615 *

        *
        *

        * Supported keys for Linux managed node patches include the following: *

        *
          *
        • *

          * PRODUCT *

          *

          * Sample values: AmazonLinux2018.03 | AmazonLinux2.0 *

          *
        • *
        • *

          * NAME *

          *

          * Sample values: kernel-headers | samba-python | php *

          *
        • *
        • *

          * SEVERITY *

          *

          * Sample values: Critical | Important | Medium | Low *

          *
        • *
        • *

          * EPOCH *

          *

          * Sample values: 0 | 1 *

          *
        • *
        • *

          * VERSION *

          *

          * Sample values: 78.6.1 | 4.10.16 *

          *
        • *
        • *

          * RELEASE *

          *

          * Sample values: 9.56.amzn1 | 1.amzn2 *

          *
        • *
        • *

          * ARCH *

          *

          * Sample values: i686 | x86_64 *

          *
        • *
        • *

          * REPOSITORY *

          *

          * Sample values: Core | Updates *

          *
        • *
        • *

          * ADVISORY_ID *

          *

          * Sample values: ALAS-2018-1058 | ALAS2-2021-1594 *

          *
        • *
        • *

          * CVE_ID *

          *

          * Sample values: CVE-2018-3615 | CVE-2020-1472 *

          *
        • *
        • *

          * BUGZILLA_ID *

          *

          * Sample values: 1463241 *

          *
        • *
        * * @param filters * Each element in the array is a structure containing a key-value pair.

        *

        * Windows Server *

        *

        * Supported keys for Windows Server managed node patches include the following: *

        *
          *
        • *

          * PATCH_SET *

          *

          * Sample values: OS | APPLICATION *

          *
        • *
        • *

          * PRODUCT *

          *

          * Sample values: WindowsServer2012 | Office 2010 | * MicrosoftDefenderAntivirus *

          *
        • *
        • *

          * PRODUCT_FAMILY *

          *

          * Sample values: Windows | Office *

          *
        • *
        • *

          * MSRC_SEVERITY *

          *

          * Sample values: ServicePacks | Important | Moderate *

          *
        • *
        • *

          * CLASSIFICATION *

          *

          * Sample values: ServicePacks | SecurityUpdates | DefinitionUpdates *

          *
        • *
        • *

          * PATCH_ID *

          *

          * Sample values: KB123456 | KB4516046 *

          *
        • *
        *

        * Linux *

        * *

        * When specifying filters for Linux patches, you must specify a key-pair for PRODUCT. For * example, using the Command Line Interface (CLI), the following command fails: *

        *

        * aws ssm describe-available-patches --filters Key=CVE_ID,Values=CVE-2018-3615 *

        *

        * However, the following command succeeds: *

        *

        * aws ssm describe-available-patches --filters Key=PRODUCT,Values=AmazonLinux2018.03 Key=CVE_ID,Values=CVE-2018-3615 *

        *
        *

        * Supported keys for Linux managed node patches include the following: *

        *
          *
        • *

          * PRODUCT *

          *

          * Sample values: AmazonLinux2018.03 | AmazonLinux2.0 *

          *
        • *
        • *

          * NAME *

          *

          * Sample values: kernel-headers | samba-python | php *

          *
        • *
        • *

          * SEVERITY *

          *

          * Sample values: Critical | Important | Medium | Low *

          *
        • *
        • *

          * EPOCH *

          *

          * Sample values: 0 | 1 *

          *
        • *
        • *

          * VERSION *

          *

          * Sample values: 78.6.1 | 4.10.16 *

          *
        • *
        • *

          * RELEASE *

          *

          * Sample values: 9.56.amzn1 | 1.amzn2 *

          *
        • *
        • *

          * ARCH *

          *

          * Sample values: i686 | x86_64 *

          *
        • *
        • *

          * REPOSITORY *

          *

          * Sample values: Core | Updates *

          *
        • *
        • *

          * ADVISORY_ID *

          *

          * Sample values: ALAS-2018-1058 | ALAS2-2021-1594 *

          *
        • *
        • *

          * CVE_ID *

          *

          * Sample values: CVE-2018-3615 | CVE-2020-1472 *

          *
        • *
        • *

          * BUGZILLA_ID *

          *

          * Sample values: 1463241 *

          *
        • * @return Returns a reference to this object so that method calls can be chained together. */ public DescribeAvailablePatchesRequest withFilters(java.util.Collection filters) { setFilters(filters); return this; } /** *

          * The maximum number of patches to return (per page). *

          * * @param maxResults * The maximum number of patches to return (per page). */ public void setMaxResults(Integer maxResults) { this.maxResults = maxResults; } /** *

          * The maximum number of patches to return (per page). *

          * * @return The maximum number of patches to return (per page). */ public Integer getMaxResults() { return this.maxResults; } /** *

          * The maximum number of patches to return (per page). *

          * * @param maxResults * The maximum number of patches to return (per page). * @return Returns a reference to this object so that method calls can be chained together. */ public DescribeAvailablePatchesRequest withMaxResults(Integer maxResults) { setMaxResults(maxResults); return this; } /** *

          * The token for the next set of items to return. (You received this token from a previous call.) *

          * * @param nextToken * The token for the next set of items to return. (You received this token from a previous call.) */ public void setNextToken(String nextToken) { this.nextToken = nextToken; } /** *

          * The token for the next set of items to return. (You received this token from a previous call.) *

          * * @return The token for the next set of items to return. (You received this token from a previous call.) */ public String getNextToken() { return this.nextToken; } /** *

          * The token for the next set of items to return. (You received this token from a previous call.) *

          * * @param nextToken * The token for the next set of items to return. (You received this token from a previous call.) * @return Returns a reference to this object so that method calls can be chained together. */ public DescribeAvailablePatchesRequest withNextToken(String nextToken) { setNextToken(nextToken); return this; } /** * Returns a string representation of this object. This is useful for testing and debugging. Sensitive data will be * redacted from this string using a placeholder value. * * @return A string representation of this object. * * @see java.lang.Object#toString() */ @Override public String toString() { StringBuilder sb = new StringBuilder(); sb.append("{"); if (getFilters() != null) sb.append("Filters: ").append(getFilters()).append(","); if (getMaxResults() != null) sb.append("MaxResults: ").append(getMaxResults()).append(","); if (getNextToken() != null) sb.append("NextToken: ").append(getNextToken()); sb.append("}"); return sb.toString(); } @Override public boolean equals(Object obj) { if (this == obj) return true; if (obj == null) return false; if (obj instanceof DescribeAvailablePatchesRequest == false) return false; DescribeAvailablePatchesRequest other = (DescribeAvailablePatchesRequest) obj; if (other.getFilters() == null ^ this.getFilters() == null) return false; if (other.getFilters() != null && other.getFilters().equals(this.getFilters()) == false) return false; if (other.getMaxResults() == null ^ this.getMaxResults() == null) return false; if (other.getMaxResults() != null && other.getMaxResults().equals(this.getMaxResults()) == false) return false; if (other.getNextToken() == null ^ this.getNextToken() == null) return false; if (other.getNextToken() != null && other.getNextToken().equals(this.getNextToken()) == false) return false; return true; } @Override public int hashCode() { final int prime = 31; int hashCode = 1; hashCode = prime * hashCode + ((getFilters() == null) ? 0 : getFilters().hashCode()); hashCode = prime * hashCode + ((getMaxResults() == null) ? 0 : getMaxResults().hashCode()); hashCode = prime * hashCode + ((getNextToken() == null) ? 0 : getNextToken().hashCode()); return hashCode; } @Override public DescribeAvailablePatchesRequest clone() { return (DescribeAvailablePatchesRequest) super.clone(); } }




© 2015 - 2025 Weber Informatics LLC | Privacy Policy