From 0cf784c13ebbf21bbd9eb11d7525f3196f9de79e Mon Sep 17 00:00:00 2001 From: cibot Date: Thu, 29 Feb 2024 12:00:48 +0000 Subject: [PATCH] Definitions Update remediations --- .../apis/remediations/assets_query.v1.yaml | 87 ++++- alsdkdefs/apis/remediations/examples.yaml | 347 ++++++++++++++++++ alsdkdefs/apis/remediations/parameters.yaml | 58 ++- alsdkdefs/apis/remediations/schemas.yaml | 3 + 4 files changed, 478 insertions(+), 17 deletions(-) diff --git a/alsdkdefs/apis/remediations/assets_query.v1.yaml b/alsdkdefs/apis/remediations/assets_query.v1.yaml index 8c7a65e..1f8fd45 100644 --- a/alsdkdefs/apis/remediations/assets_query.v1.yaml +++ b/alsdkdefs/apis/remediations/assets_query.v1.yaml @@ -1633,7 +1633,8 @@ paths: operationId: query_exposures summary: Query Exposures description: |- - Groups vulnerabilities for an account by exposure (by default), remediation, or vulnerable asset. + Groups vulnerabilities for an account by remediation (by default), exposure, or vulnerable asset and returns + paginated items if `page_size` is provided. In combination with filtering, it's easy to view vulnerabilities across your account in the manner most appropriate. @@ -1647,6 +1648,7 @@ paths: - Exposures and Remediations parameters: - $ref: 'parameters.yaml#/ParamConcluded' + - $ref: 'parameters.yaml#/ParamContinue' - $ref: 'parameters.yaml#/ParamQueryExposuresBasicDetails' - $ref: 'parameters.yaml#/ParamQueryExposuresDetails' - $ref: 'parameters.yaml#/ParamDisposed' @@ -1658,14 +1660,26 @@ paths: - $ref: 'parameters.yaml#/ParamIncludeRemediationItems' - $ref: 'parameters.yaml#/ParamIncludeSummary' - $ref: 'parameters.yaml#/ParamLimit' + - $ref: 'parameters.yaml#/ParamPageSize' - $ref: 'parameters.yaml#/ParamScopeTrue' - $ref: 'parameters.yaml#/ParamSort' + - $ref: 'parameters.yaml#/ParamSearch' x-codeSamples: - lang: Shell label: Basic exposures query source: |- curl "https://api.cloudinsight.alertlogic.com/assets_query/v2/12345678/exposures" \ -H "x-aims-auth-token: $TOKEN" -H "accept: application/json" + - lang: Shell + label: Exposures with page_size 1 + source: |- + curl "https://api.cloudinsight.alertlogic.com/assets_query/v2/12345678/exposures?page_size=1" \ + -H "x-aims-auth-token: $TOKEN" -H "accept: application/json" + - lang: Shell + label: Exposures with continue + source: |- + curl "https://api.cloudinsight.alertlogic.com/assets_query/v2/12345678/exposures?continue=g2gDZAATb2Zmc2V0X2NvbnRpbnVhdGlvbmwAAAADaAJtAAAABm9mZnNldGEBaAJtAAAAD2luY2x1ZGVfZmlsdGVyc20AAAAFZmFsc2VoAm0AAAAJcGFnZV9zaXplbQAAAAExamEC" \ + -H "x-aims-auth-token: $TOKEN" -H "accept: application/json" - lang: Shell label: Exposures with filter by deployment ID source: |- @@ -1711,6 +1725,16 @@ paths: source: |- curl "https://api.cloudinsight.alertlogic.com/assets_query/v2/12345678/exposures?group=asset&filter=asset_type:host" \ -H "x-aims-auth-token: $TOKEN" -H "accept: application/json" + - lang: Shell + label: Exposures filtered via search string + source: |- + curl "https://api.cloudinsight.alertlogic.com/assets_query/v2/12345678/exposures?search=CVE-2016-5387" \ + -H "x-aims-auth-token: $TOKEN" -H "accept: application/json" + - lang: Shell + label: Remediations sorted by Name ascending + source: |- + curl "https://api.cloudinsight.alertlogic.com/assets_query/v2/12345678/exposures?sort=name:asc" \ + -H "x-aims-auth-token: $TOKEN" -H "accept: application/json" responses: "200": description: OK @@ -1725,6 +1749,10 @@ paths: $ref: 'examples.yaml#/QueryExposuresWholeAccountExample' Exposures for specific deployment ID (details=false, include_filters=true): $ref: 'examples.yaml#/QueryExposuresSpecificDeploymentExample' + Exposures with page_size (page_size=1): + $ref: 'examples.yaml#/QueryExposuresWithPagination' + Exposures with continue (continue=g2gDZAATb2Zmc2V0X2NvbnRpbnVhdGlvbmwAAAADaAJtAAAABm9mZnNldGEBaAJtAAAAD2luY2x1ZGVfZmlsdGVyc20AAAAFZmFsc2VoAm0AAAAJcGFnZV9zaXplbQAAAAExamEC): + $ref: 'examples.yaml#/QueryExposuresWithPaginationContinue' Remediations (include_filters=false, include_remediations=false): $ref: 'examples.yaml#/QueryExposuresRemediationsExample' Remediations for whole account (details=true, include_filters=true, include_remediation_items=true): @@ -1739,6 +1767,10 @@ paths: $ref: 'examples.yaml#/QueryExposuresVulnerableAssetsSpecificDeploymentExample' Most vulnerable assets by type (group=asset, filter=asset_type:host, limit=2): $ref: 'examples.yaml#/QueryExposuresMostVulnerableAssetsExample' + Exposures filtered via search string: + $ref: 'examples.yaml#/QueryExposuresSearch' + Remediations sorted by Name ascending: + $ref: 'examples.yaml#/QueryExposuresSortedByNameExample' "400": $ref: 'responses.yaml#/InvalidValueError' "401": @@ -1755,7 +1787,8 @@ paths: summary: Query Exposures operationId: query_exposures_post description: |- - Groups vulnerabilities for an account by exposure (by default), remediation, or vulnerable asset. + Groups vulnerabilities for an account by remediation (by default), exposure, or vulnerable asset and returns + paginated items if `page_size` is provided. In combination with filtering, it's easy to view vulnerabilities across your account in the manner most appropriate. @@ -1775,6 +1808,8 @@ paths: properties: concluded: $ref: parameters.yaml#/ExposuresConcluded + continue: + $ref: parameters.yaml#/ExposuresContinue basic_details: $ref: parameters.yaml#/ExposuresBasicDetails details: @@ -1797,10 +1832,14 @@ paths: $ref: parameters.yaml#/IncludeSummary limit: $ref: parameters.yaml#/ExposuresLimit + page_size: + $ref: parameters.yaml#/ExposuresPageSize scope: $ref: parameters.yaml#/ScopeTrue sort: $ref: parameters.yaml#/ExposuresSort + search: + $ref: parameters.yaml#/ExposuresSearch security: - x-aims-auth-token: [] x-codeSamples: @@ -1811,6 +1850,24 @@ paths: -X POST -H "x-aims-auth-token: $TOKEN" -H "accept: application/json" -d@- << EOF {} EOF + - lang: Shell + label: Exposures with page_size 1 + source: |- + curl "https://api.cloudinsight.alertlogic.com/assets_query/v2/12345678/exposures" \ + -X POST -H "x-aims-auth-token: $TOKEN" -H "accept: application/json" -d@- << EOF + { + "page_size": "1" + } + EOF + - lang: Shell + label: Exposures with continue + source: |- + curl "https://api.cloudinsight.alertlogic.com/assets_query/v2/12345678/exposures" \ + -X POST -H "x-aims-auth-token: $TOKEN" -H "accept: application/json" -d@- << EOF + { + "continue": "g2gDZAATb2Zmc2V0X2NvbnRpbnVhdGlvbmwAAAADaAJtAAAABm9mZnNldGEBaAJtAAAAD2luY2x1ZGVfZmlsdGVyc20AAAAFZmFsc2VoAm0AAAAJcGFnZV9zaXplbQAAAAExamEC" + } + EOF - lang: Shell label: Exposures with filter by deployment ID source: |- @@ -1916,6 +1973,24 @@ paths: "group": "asset" } EOF + - lang: Shell + label: Exposures filtered via search string + source: |- + curl "https://api.cloudinsight.alertlogic.com/assets_query/v2/12345678/exposures" \ + -X POST -H "x-aims-auth-token: $TOKEN" -H "accept: application/json" -d@- << EOF + { + "search": "CVE-2016-5387" + } + EOF + - lang: Shell + label: Remediations sorted by Name ascending + source: |- + curl "https://api.cloudinsight.alertlogic.com/assets_query/v2/12345678/exposures" \ + -X POST -H "x-aims-auth-token: $TOKEN" -H "accept: application/json" -d@- << EOF + { + "sort": "name:asc" + } + EOF responses: '200': description: OK @@ -1930,6 +2005,10 @@ paths: $ref: examples.yaml#/QueryExposuresWholeAccountExample 'Exposures for specific deployment ID (details=false, include_filters=true)': $ref: examples.yaml#/QueryExposuresSpecificDeploymentExample + 'Exposures with page_size (page_size=1)': + $ref: examples.yaml#/QueryExposuresWithPagination + 'Exposures with continue (continue=g2gDZAATb2Zmc2V0X2NvbnRpbnVhdGlvbmwAAAADaAJtAAAABm9mZnNldGEBaAJtAAAAD2luY2x1ZGVfZmlsdGVyc20AAAAFZmFsc2VoAm0AAAAJcGFnZV9zaXplbQAAAAExamEC)': + $ref: examples.yaml#/QueryExposuresWithPaginationContinue 'Remediations (include_filters=false, include_remediations=false)': $ref: examples.yaml#/QueryExposuresRemediationsExample 'Remediations for whole account (details=true, include_filters=true, include_remediation_items=true)': @@ -1944,6 +2023,10 @@ paths: $ref: examples.yaml#/QueryExposuresVulnerableAssetsSpecificDeploymentExample 'Most vulnerable assets by type (group=asset, filter=asset_type:host, limit=2)': $ref: examples.yaml#/QueryExposuresMostVulnerableAssetsExample + 'Exposures filtered via search string': + $ref: examples.yaml#/QueryExposuresSearch + 'Remediations sorted by Name ascending': + $ref: examples.yaml#/QueryExposuresSortedByNameExample '400': $ref: responses.yaml#/InvalidValueError '401': diff --git a/alsdkdefs/apis/remediations/examples.yaml b/alsdkdefs/apis/remediations/examples.yaml index 972d373..40c55d3 100644 --- a/alsdkdefs/apis/remediations/examples.yaml +++ b/alsdkdefs/apis/remediations/examples.yaml @@ -2818,6 +2818,124 @@ QueryExposuresSpecificDeploymentExample: info: 0 low: 0 medium: 0 +QueryExposuresWithPagination: + value: + exposures: + assets: + - categories: + - security + asset_count: 1 + deployment_ids: + - 814C2911-09BB-1005-9916-7831C1BAC182 + name: ELB Listener Security (1 of 4) + remediation_items: {} + remediations: + - account_id: '12345678' + asset_count: 2 + categories: + - security + name: It is recommended that users use the most current predefined security + policy. + remediation_id: 7d4d31c20d895bfb79581fde5814eb8d + tags: {} + target_asset_type: load-balancer + threat_level: 2 + threatiness: 24 + type: remediation + remediation_count: 1 + severity: high + threat_score: 10 + threatiness: 24 + vinstances: + - categories: + - security + details: '{"evidence":{"type":"elb_with_insecure_protocol","key":"/aws/us-east-1/load-balancer/my-test-elb","affected-listeners":[{"listener":{"key":"/aws/us-east-1/listener/my-test-elb/80","port":80,"protocol":"tcp"}},{"listener":{"key":"/aws/us-east-1/listener/my-test-elb/443","port":443,"protocol":"tcp"}}]}}' + concluded: false + disposed: false + key: "/aws/us-east-1/load-balancer/my-test-elb/vulnerability/eca86a6ac47cb34a554ab76a714d847f" + modified_on: 1560954506756 + target: + account_id: '12345678' + deployment_id: 814C2911-09BB-1005-9916-7831C1BAC182 + dns_name: my-test-elb-1864329672.us-east-1.elb.amazonaws.com + key: "/aws/us-east-1/load-balancer/my-test-elb" + name: my-test-elb + scheme: internet-facing + tags: {} + threat_level: 3 + threatiness: 12.0347 + type: load-balancer + threatiness: 8 + vinstances_count: 1 + vulnerability_id: cda9dc8fdf5fcb8775b6217f9ad62f04 + rows: 1 + summary: + severities: + all: 1 + high: 1 + info: 0 + low: 0 + medium: 0 + continue: g2gDZAATb2Zmc2V0X2NvbnRpbnVhdGlvbmwAAAADaAJtAAAABm9mZnNldGEBaAJtAAAAD2luY2x1ZGVfZmlsdGVyc20AAAAFZmFsc2VoAm0AAAAJcGFnZV9zaXplbQAAAAExamEC +QueryExposuresWithPaginationContinue: + value: + exposures: + assets: + - categories: + - security + asset_count: 1 + deployment_ids: + - 814C2911-09BB-1005-9916-7831C1BAC182 + name: ELB Listener Security (1 of 4) + remediation_items: {} + remediations: + - account_id: '12345678' + asset_count: 2 + categories: + - security + name: It is recommended that users use the most current predefined security + policy. + remediation_id: 7d4d31c20d895bfb79581fde5814eb8d + tags: {} + target_asset_type: load-balancer + threat_level: 2 + threatiness: 24 + type: remediation + remediation_count: 1 + severity: high + threat_score: 10 + threatiness: 24 + vinstances: + - categories: + - security + details: '{"evidence":{"type":"elb_with_insecure_protocol","key":"/aws/us-east-1/load-balancer/my-test-elb","affected-listeners":[{"listener":{"key":"/aws/us-east-1/listener/my-test-elb/80","port":80,"protocol":"tcp"}},{"listener":{"key":"/aws/us-east-1/listener/my-test-elb/443","port":443,"protocol":"tcp"}}]}}' + concluded: false + disposed: false + key: "/aws/us-east-1/load-balancer/my-test-elb/vulnerability/eca86a6ac47cb34a554ab76a714d847f" + modified_on: 1560954506756 + target: + account_id: '12345678' + deployment_id: 814C2911-09BB-1005-9916-7831C1BAC182 + dns_name: my-test-elb-1864329672.us-east-1.elb.amazonaws.com + key: "/aws/us-east-1/load-balancer/my-test-elb" + name: my-test-elb + scheme: internet-facing + tags: {} + threat_level: 3 + threatiness: 12.0347 + type: load-balancer + threatiness: 8 + vinstances_count: 1 + vulnerability_id: cda9dc8fdf5fcb8775b6217f9ad62f04 + rows: 1 + summary: + severities: + all: 1 + high: 1 + info: 0 + low: 0 + medium: 0 + continue: g2gDZAATb2Zmc2V0X2NvbnRpbnVhdGlvbmwAAAADaAJtAAAABm9mZnNldGECaAJtAAAAD2luY2x1ZGVfZmlsdGVyc20AAAAFZmFsc2VoAm0AAAAJcGFnZV9zaXplbQAAAAExamED QueryExposuresRemediationsExample: value: filters: [] @@ -3359,6 +3477,96 @@ QueryExposuresMostVulnerableAssetsExample: info: 0 low: 0 medium: 0 +QueryExposuresSearch: + value: + filters: + - key: security + threat_level: 2 + threatiness: 66.3 + type: category + vinstances_count: 1 + - key: host + threat_level: 3 + threatiness: 73.1 + type: asset_type + vinstances_count: 1 + - account_id: '12345678' + deployment_id: 814C2911-09BB-1005-9916-7831C1BAC182 + deployment_name: Test Deployment 1 + key: 814C2911-09BB-1005-9916-7831C1BAC182 + name: Test Deployment 1 + threat_level: 3 + threatiness: 73.1 + type: deployment_id + vinstances_count: 1 + - key: aws + threat_level: 3 + threatiness: 73.1 + type: deployment_type + vinstances_count: 1 + - key: high + threat_level: 2 + threatiness: 38.7 + type: severity + vinstances_count: 1 + remediations: + assets: + - account_id: '12345678' + asset_count: 1 + created_on: 1676027060918 + deployment_ids: + - 814C2911-09BB-1005-9916-7831C1BAC182 + exposures: + - account_id: '12345678' + asset_count: 1 + categories: + - security + concluded: false + created_on: 1708489019938 + cvss_score: 6.5 + cvss_vector: 'AV:N/AC:L/Au:S/C:P/I:P/A:P/PL:R/EM:A' + cvss_version: 'CCSS v2.0' + disposed: false + external: false + modified_on: 1508432528546 + name: 'CVE-2016-5387 - Apache - HTTP Server - httpoxy Issue' + remediation_id: '7a20aaf8182deb0bd8e4c5e7a1b2374c' + severity: 'high' + tags: {} + threat_level: 2 + threat_score: 5.1 + threat_vector: 'AV:N/AC:L/Au:S/C:P/I:P/A:P/PL:R/EM:A' + threatiness: 1 + type: 'vulnerability' + vinstance_count: 1 + vulnerability_id: 'be3b6be1afe854736f8a09d114fcf043' + vulnerability_span_id: 'C1634CB1-8D8C-E6BE-91B9-3484993E71C8' + exposures_count: 1 + modified_on: 1676027060918 + name: 'Resolve CVE-2016-5387' + remediation_id: '7a20aaf8182deb0bd8e4c5e7a1b2374c' + severities: + all: 1 + critical: 0 + high: 1 + medium: 0 + low: 0 + info: 0 + tags: {} + target_asset_type: 'host' + threat_level: 2 + threat_pct: 24.07 + threatiness: 1 + type: 'remediation' + vinstances_count: 1 + rows: 1 + summary: + severities: + all: 1 + high: 1 + info: 0 + low: 0 + medium: 0 QueryExposureFiltersExample: value: filters: @@ -3373,6 +3581,145 @@ QueryExposureFiltersExample: type: deployment_type - key: high type: severity +QueryExposuresSortedByNameExample: + value: + filters: + - key: security + threat_level: 3 + threatiness: 93.3 + type: category + vinstances_count: 1 + - account_id: '12345678' + deployment_id: 814C2911-09BB-1005-9916-7831C1BAC182 + deployment_name: Test Deployment 1 + key: 814C2911-09BB-1005-9916-7831C1BAC182 + name: Test Deployment 1 + threat_level: 3 + threatiness: 93.3 + type: deployment_id + vinstances_count: 1 + - key: aws + threat_level: 3 + threatiness: 93.3 + type: deployment_type + vinstances_count: 1 + - key: high + threat_level: 3 + threatiness: 93.3 + type: severity + vinstances_count: 1 + remediations: + assets: + - account_id: '12345678' + asset_count: 1 + categories: + - security + deployment_ids: + - 814C2911-09BB-1005-9916-7831C1BAC182 + name: It is recommended that users use the most current predefined security policy. + remediation_id: 7d4d31c20d895bfb79581fde5814eb8d + remediation_items: {} + severities: + all: 1 + high: 1 + info: 0 + low: 0 + medium: 0 + tags: {} + target_asset_type: load-balancer + threat_level: 2 + threatiness: 24 + type: remediation + exposures: + - categories: + - security + asset_count: 1 + name: ELB Listener Security (1 of 4) + severity: high + threat_score: 10 + threatiness: 24 + vinstances: + - categories: + - security + details: '{"evidence":{"type":"elb_with_insecure_protocol","key":"/aws/us-east-1/load-balancer/my-test-elb","affected-listeners":[{"listener":{"key":"/aws/us-east-1/listener/my-test-elb/80","port":80,"protocol":"tcp"}},{"listener":{"key":"/aws/us-east-1/listener/my-test-elb/443","port":443,"protocol":"tcp"}}]}}' + concluded: false + disposed: false + key: "/aws/us-east-1/load-balancer/my-test-elb/vulnerability/eca86a6ac47cb34a554ab76a714d847f" + modified_on: 1560954506756 + target: + account_id: '12345678' + deployment_id: 814C2911-09BB-1005-9916-7831C1BAC182 + dns_name: my-test-elb-1864329672.us-east-1.elb.amazonaws.com + key: "/aws/us-east-1/load-balancer/my-test-elb" + name: my-test-elb + scheme: internet-facing + tags: {} + threat_level: 3 + threatiness: 12.0347 + type: load-balancer + threatiness: 8 + vulnerability_id: cda9dc8fdf5fcb8775b6217f9ad62f04 + vinstances_count: 1 + exposures_count: 1 + - account_id: '12345678' + asset_count: 1 + categories: + - security + deployment_ids: + - 814C2911-09BB-1005-9916-7831C1BAC182 + name: Update security policies to prevent cross-account access. + remediation_id: 8e5e42d31e995cfc89692fef6824fc9e + remediation_items: {} + severities: + all: 1 + high: 0 + info: 0 + low: 0 + medium: 1 + tags: {} + target_asset_type: load-balancer + threat_level: 1 + threatiness: 14 + type: remediation + exposures: + - categories: + - security + asset_count: 1 + name: ELB Listener Security (2 of 4) + severity: high + threat_score: 10 + threatiness: 24 + vinstances: + - categories: + - security + details: '{"evidence":{"type":"elb_with_insecure_protocol","key":"/aws/us-east-1/load-balancer/my-test-elb","affected-listeners":[{"listener":{"key":"/aws/us-east-1/listener/my-test-elb/80","port":80,"protocol":"tcp"}},{"listener":{"key":"/aws/us-east-1/listener/my-test-elb/443","port":443,"protocol":"tcp"}}]}}' + concluded: false + disposed: false + key: "/aws/us-east-1/load-balancer/my-test-elb/vulnerability/adf97b7bd58ac23b444ab76a714d847f" + modified_on: 1560954506756 + target: + account_id: '12345678' + deployment_id: 814C2911-09BB-1005-9916-7831C1BAC182 + dns_name: my-test-elb-1864329672.us-east-1.elb.amazonaws.com + key: "/aws/us-east-1/load-balancer/my-test-elb" + name: my-test-elb + scheme: internet-facing + tags: {} + threat_level: 3 + threatiness: 12.0347 + type: load-balancer + threatiness: 8 + vulnerability_id: adf97b7bd58ac23b444ab76a714d847f + vinstances_count: 1 + exposures_count: 1 + rows: 2 + summary: + severities: + all: 2 + high: 1 + info: 0 + low: 0 + medium: 1 QueryTopologyExample: value: topology: diff --git a/alsdkdefs/apis/remediations/parameters.yaml b/alsdkdefs/apis/remediations/parameters.yaml index 0121803..5908400 100644 --- a/alsdkdefs/apis/remediations/parameters.yaml +++ b/alsdkdefs/apis/remediations/parameters.yaml @@ -343,6 +343,17 @@ ExposuresBasicDetails: Modifies the `vinstance` `target` asset properties to include a minimal subset of properties. **Note: `vinstances` are only returned if the `details` parameter is `true`.** +ParamContinue: + schema: + $ref: '#/ExposuresContinue' + in: query + name: continue +ExposuresContinue: + type: string + description: |- + A continuation token returned from a previous call to GET assets. + When provided to subsequent GET assets calls, the next set of results and a new + `continue` token will be returned. ParamQueryExposuresDetails: schema: $ref: '#/ExposuresDetails' @@ -490,6 +501,16 @@ ExposuresLimit: returned, will be computed exclusively from the limited results (not the full result set). Note that it limits the number of exposures/remediations returned, but that the summary counts are generated based on the full data set before applying the limit. +ParamPageSize: + schema: + $ref: '#/ExposuresPageSize' + in: query + name: page_size +ExposuresPageSize: + type: integer + description: |- + The number of results to be returned, maximum is 10000. `page_size` is only valid + on initial calls to GET assets and will have no effect on subsequent calls. ParamSort: schema: $ref: '#/ExposuresSort' @@ -501,12 +522,25 @@ ExposuresSort: enum: - asset_count - exposures_count + - name - severity + - threat_score - threatiness - vinstances_count description: |- Controls how to order the exposures/remediations. Must be a CSV of at least one of the - allowed values. Note that `asset_count` will not work with `group=asset`. + allowed values. Sort precedence is controlled by the order of values in the CSV so properties + appearing later in the CSV will be used to determine the sort order of entities with identical property + values appearing eralier in the CSV. + + Sort direction is also configurable by appending a sort direction of `:asc` or `:desc` to the property + being sorted by. e.g. `name:asc` will sort by name in the ascending direction. + + There are some additional caveats that should be taken into consideration while utilizing the sort option: + - `asset_count`, `severity`, `threat_score`, and `vinstances_count` will not work with `group=asset` + - `exposures_count` will not work with `group=exposure` + - `severity`, `threat_score` will not work with `group=remediation` (default group) + - When a sort property does not exist on an entity being sorted, a default lowest possible sort value will be utilized ParamTopoChain: schema: type: boolean @@ -561,20 +595,14 @@ ParamReturnAllProperties: description: |- When true, causes the inclusion of all asset properties in the response. By default, the assets in the response only includes summary properties. -ParamContinue: - schema: - type: string - in: query - name: continue - description: |- - A continuation token returned from a previous call to GET assets. - When provided to subsequent GET assets calls, the next set of results and a new - `continue` token will be returned. -ParamPageSize: +ParamSearch: schema: - type: integer + $ref: '#/ExposuresSearch' in: query - name: page_size + name: search +ExposuresSearch: + type: string description: |- - The number of results to be returned, maximum is 10000. `page_size` is only valid - on initial calls to GET assets and will have no effect on subsequent calls. + A string which can be optionally passed to limit the set of returned items to those whose + name property contains the string passed. Search parameter is case insensitive and will attempt + to match any part of the name property. diff --git a/alsdkdefs/apis/remediations/schemas.yaml b/alsdkdefs/apis/remediations/schemas.yaml index c4328e9..ea39b4f 100644 --- a/alsdkdefs/apis/remediations/schemas.yaml +++ b/alsdkdefs/apis/remediations/schemas.yaml @@ -381,6 +381,9 @@ QueryExposuresResponse: type: integer medium: type: integer + continue: + type: string + description: Pagination continue token for the next request QueryExposureFiltersResponse: title: Query exposure filters response type: object