/** * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * SPDX-License-Identifier: Apache-2.0. */ #pragma once #include #include #include #include #include #include namespace Aws { namespace SSM { namespace Model { /** */ class DescribeAvailablePatchesRequest : public SSMRequest { public: AWS_SSM_API DescribeAvailablePatchesRequest(); // Service request name is the Operation name which will send this request out, // each operation should has unique request name, so that we can get operation's name from this request. // Note: this is not true for response, multiple operations may have the same response name, // so we can not get operation's name from response. inline virtual const char* GetServiceRequestName() const override { return "DescribeAvailablePatches"; } AWS_SSM_API Aws::String SerializePayload() const override; AWS_SSM_API Aws::Http::HeaderValueCollection GetRequestSpecificHeaders() const override; /** *

Each element in the array is a structure containing a key-value pair.

* Windows Server

Supported keys for Windows Server managed node * patches include the following:

  • PATCH_SET *

    Sample values: OS | APPLICATION

  • *
  • PRODUCT

    Sample values: * WindowsServer2012 | Office 2010 | * MicrosoftDefenderAntivirus

  • * PRODUCT_FAMILY

    Sample values: Windows | * Office

  • MSRC_SEVERITY

    *

    Sample values: ServicePacks | Important | * Moderate

  • CLASSIFICATION *

    Sample values: ServicePacks | SecurityUpdates * | DefinitionUpdates

  • PATCH_ID *

    Sample values: KB123456 | KB4516046

    *

Linux

When specifying filters for * Linux patches, you must specify a key-pair for PRODUCT. For * example, using the Command Line Interface (CLI), the following command * fails:

aws ssm describe-available-patches --filters * Key=CVE_ID,Values=CVE-2018-3615

However, the following command * succeeds:

aws ssm describe-available-patches --filters * Key=PRODUCT,Values=AmazonLinux2018.03 Key=CVE_ID,Values=CVE-2018-3615 *

Supported keys for Linux managed node patches include the * following:

  • PRODUCT

    Sample * values: AmazonLinux2018.03 | AmazonLinux2.0

  • *
  • NAME

    Sample values: * kernel-headers | samba-python | php

    *
  • SEVERITY

    Sample values: * Critical | Important | Medium | * Low

  • EPOCH

    Sample * values: 0 | 1

  • * VERSION

    Sample values: 78.6.1 | * 4.10.16

  • RELEASE

    *

    Sample values: 9.56.amzn1 | 1.amzn2

  • *

    ARCH

    Sample values: i686 | * x86_64

  • REPOSITORY

    *

    Sample values: Core | Updates

  • * ADVISORY_ID

    Sample values: * ALAS-2018-1058 | ALAS2-2021-1594

  • * CVE_ID

    Sample values: CVE-2018-3615 | * CVE-2020-1472

  • BUGZILLA_ID *

    Sample values: 1463241

*/ inline const Aws::Vector& GetFilters() const{ return m_filters; } /** *

Each element in the array is a structure containing a key-value pair.

* Windows Server

Supported keys for Windows Server managed node * patches include the following:

  • PATCH_SET *

    Sample values: OS | APPLICATION

  • *
  • PRODUCT

    Sample values: * WindowsServer2012 | Office 2010 | * MicrosoftDefenderAntivirus

  • * PRODUCT_FAMILY

    Sample values: Windows | * Office

  • MSRC_SEVERITY

    *

    Sample values: ServicePacks | Important | * Moderate

  • CLASSIFICATION *

    Sample values: ServicePacks | SecurityUpdates * | DefinitionUpdates

  • PATCH_ID *

    Sample values: KB123456 | KB4516046

    *

Linux

When specifying filters for * Linux patches, you must specify a key-pair for PRODUCT. For * example, using the Command Line Interface (CLI), the following command * fails:

aws ssm describe-available-patches --filters * Key=CVE_ID,Values=CVE-2018-3615

However, the following command * succeeds:

aws ssm describe-available-patches --filters * Key=PRODUCT,Values=AmazonLinux2018.03 Key=CVE_ID,Values=CVE-2018-3615 *

Supported keys for Linux managed node patches include the * following:

  • PRODUCT

    Sample * values: AmazonLinux2018.03 | AmazonLinux2.0

  • *
  • NAME

    Sample values: * kernel-headers | samba-python | php

    *
  • SEVERITY

    Sample values: * Critical | Important | Medium | * Low

  • EPOCH

    Sample * values: 0 | 1

  • * VERSION

    Sample values: 78.6.1 | * 4.10.16

  • RELEASE

    *

    Sample values: 9.56.amzn1 | 1.amzn2

  • *

    ARCH

    Sample values: i686 | * x86_64

  • REPOSITORY

    *

    Sample values: Core | Updates

  • * ADVISORY_ID

    Sample values: * ALAS-2018-1058 | ALAS2-2021-1594

  • * CVE_ID

    Sample values: CVE-2018-3615 | * CVE-2020-1472

  • BUGZILLA_ID *

    Sample values: 1463241

*/ inline bool FiltersHasBeenSet() const { return m_filtersHasBeenSet; } /** *

Each element in the array is a structure containing a key-value pair.

* Windows Server

Supported keys for Windows Server managed node * patches include the following:

  • PATCH_SET *

    Sample values: OS | APPLICATION

  • *
  • PRODUCT

    Sample values: * WindowsServer2012 | Office 2010 | * MicrosoftDefenderAntivirus

  • * PRODUCT_FAMILY

    Sample values: Windows | * Office

  • MSRC_SEVERITY

    *

    Sample values: ServicePacks | Important | * Moderate

  • CLASSIFICATION *

    Sample values: ServicePacks | SecurityUpdates * | DefinitionUpdates

  • PATCH_ID *

    Sample values: KB123456 | KB4516046

    *

Linux

When specifying filters for * Linux patches, you must specify a key-pair for PRODUCT. For * example, using the Command Line Interface (CLI), the following command * fails:

aws ssm describe-available-patches --filters * Key=CVE_ID,Values=CVE-2018-3615

However, the following command * succeeds:

aws ssm describe-available-patches --filters * Key=PRODUCT,Values=AmazonLinux2018.03 Key=CVE_ID,Values=CVE-2018-3615 *

Supported keys for Linux managed node patches include the * following:

  • PRODUCT

    Sample * values: AmazonLinux2018.03 | AmazonLinux2.0

  • *
  • NAME

    Sample values: * kernel-headers | samba-python | php

    *
  • SEVERITY

    Sample values: * Critical | Important | Medium | * Low

  • EPOCH

    Sample * values: 0 | 1

  • * VERSION

    Sample values: 78.6.1 | * 4.10.16

  • RELEASE

    *

    Sample values: 9.56.amzn1 | 1.amzn2

  • *

    ARCH

    Sample values: i686 | * x86_64

  • REPOSITORY

    *

    Sample values: Core | Updates

  • * ADVISORY_ID

    Sample values: * ALAS-2018-1058 | ALAS2-2021-1594

  • * CVE_ID

    Sample values: CVE-2018-3615 | * CVE-2020-1472

  • BUGZILLA_ID *

    Sample values: 1463241

*/ inline void SetFilters(const Aws::Vector& value) { m_filtersHasBeenSet = true; m_filters = value; } /** *

Each element in the array is a structure containing a key-value pair.

* Windows Server

Supported keys for Windows Server managed node * patches include the following:

  • PATCH_SET *

    Sample values: OS | APPLICATION

  • *
  • PRODUCT

    Sample values: * WindowsServer2012 | Office 2010 | * MicrosoftDefenderAntivirus

  • * PRODUCT_FAMILY

    Sample values: Windows | * Office

  • MSRC_SEVERITY

    *

    Sample values: ServicePacks | Important | * Moderate

  • CLASSIFICATION *

    Sample values: ServicePacks | SecurityUpdates * | DefinitionUpdates

  • PATCH_ID *

    Sample values: KB123456 | KB4516046

    *

Linux

When specifying filters for * Linux patches, you must specify a key-pair for PRODUCT. For * example, using the Command Line Interface (CLI), the following command * fails:

aws ssm describe-available-patches --filters * Key=CVE_ID,Values=CVE-2018-3615

However, the following command * succeeds:

aws ssm describe-available-patches --filters * Key=PRODUCT,Values=AmazonLinux2018.03 Key=CVE_ID,Values=CVE-2018-3615 *

Supported keys for Linux managed node patches include the * following:

  • PRODUCT

    Sample * values: AmazonLinux2018.03 | AmazonLinux2.0

  • *
  • NAME

    Sample values: * kernel-headers | samba-python | php

    *
  • SEVERITY

    Sample values: * Critical | Important | Medium | * Low

  • EPOCH

    Sample * values: 0 | 1

  • * VERSION

    Sample values: 78.6.1 | * 4.10.16

  • RELEASE

    *

    Sample values: 9.56.amzn1 | 1.amzn2

  • *

    ARCH

    Sample values: i686 | * x86_64

  • REPOSITORY

    *

    Sample values: Core | Updates

  • * ADVISORY_ID

    Sample values: * ALAS-2018-1058 | ALAS2-2021-1594

  • * CVE_ID

    Sample values: CVE-2018-3615 | * CVE-2020-1472

  • BUGZILLA_ID *

    Sample values: 1463241

*/ inline void SetFilters(Aws::Vector&& value) { m_filtersHasBeenSet = true; m_filters = std::move(value); } /** *

Each element in the array is a structure containing a key-value pair.

* Windows Server

Supported keys for Windows Server managed node * patches include the following:

  • PATCH_SET *

    Sample values: OS | APPLICATION

  • *
  • PRODUCT

    Sample values: * WindowsServer2012 | Office 2010 | * MicrosoftDefenderAntivirus

  • * PRODUCT_FAMILY

    Sample values: Windows | * Office

  • MSRC_SEVERITY

    *

    Sample values: ServicePacks | Important | * Moderate

  • CLASSIFICATION *

    Sample values: ServicePacks | SecurityUpdates * | DefinitionUpdates

  • PATCH_ID *

    Sample values: KB123456 | KB4516046

    *

Linux

When specifying filters for * Linux patches, you must specify a key-pair for PRODUCT. For * example, using the Command Line Interface (CLI), the following command * fails:

aws ssm describe-available-patches --filters * Key=CVE_ID,Values=CVE-2018-3615

However, the following command * succeeds:

aws ssm describe-available-patches --filters * Key=PRODUCT,Values=AmazonLinux2018.03 Key=CVE_ID,Values=CVE-2018-3615 *

Supported keys for Linux managed node patches include the * following:

  • PRODUCT

    Sample * values: AmazonLinux2018.03 | AmazonLinux2.0

  • *
  • NAME

    Sample values: * kernel-headers | samba-python | php

    *
  • SEVERITY

    Sample values: * Critical | Important | Medium | * Low

  • EPOCH

    Sample * values: 0 | 1

  • * VERSION

    Sample values: 78.6.1 | * 4.10.16

  • RELEASE

    *

    Sample values: 9.56.amzn1 | 1.amzn2

  • *

    ARCH

    Sample values: i686 | * x86_64

  • REPOSITORY

    *

    Sample values: Core | Updates

  • * ADVISORY_ID

    Sample values: * ALAS-2018-1058 | ALAS2-2021-1594

  • * CVE_ID

    Sample values: CVE-2018-3615 | * CVE-2020-1472

  • BUGZILLA_ID *

    Sample values: 1463241

*/ inline DescribeAvailablePatchesRequest& WithFilters(const Aws::Vector& value) { SetFilters(value); return *this;} /** *

Each element in the array is a structure containing a key-value pair.

* Windows Server

Supported keys for Windows Server managed node * patches include the following:

  • PATCH_SET *

    Sample values: OS | APPLICATION

  • *
  • PRODUCT

    Sample values: * WindowsServer2012 | Office 2010 | * MicrosoftDefenderAntivirus

  • * PRODUCT_FAMILY

    Sample values: Windows | * Office

  • MSRC_SEVERITY

    *

    Sample values: ServicePacks | Important | * Moderate

  • CLASSIFICATION *

    Sample values: ServicePacks | SecurityUpdates * | DefinitionUpdates

  • PATCH_ID *

    Sample values: KB123456 | KB4516046

    *

Linux

When specifying filters for * Linux patches, you must specify a key-pair for PRODUCT. For * example, using the Command Line Interface (CLI), the following command * fails:

aws ssm describe-available-patches --filters * Key=CVE_ID,Values=CVE-2018-3615

However, the following command * succeeds:

aws ssm describe-available-patches --filters * Key=PRODUCT,Values=AmazonLinux2018.03 Key=CVE_ID,Values=CVE-2018-3615 *

Supported keys for Linux managed node patches include the * following:

  • PRODUCT

    Sample * values: AmazonLinux2018.03 | AmazonLinux2.0

  • *
  • NAME

    Sample values: * kernel-headers | samba-python | php

    *
  • SEVERITY

    Sample values: * Critical | Important | Medium | * Low

  • EPOCH

    Sample * values: 0 | 1

  • * VERSION

    Sample values: 78.6.1 | * 4.10.16

  • RELEASE

    *

    Sample values: 9.56.amzn1 | 1.amzn2

  • *

    ARCH

    Sample values: i686 | * x86_64

  • REPOSITORY

    *

    Sample values: Core | Updates

  • * ADVISORY_ID

    Sample values: * ALAS-2018-1058 | ALAS2-2021-1594

  • * CVE_ID

    Sample values: CVE-2018-3615 | * CVE-2020-1472

  • BUGZILLA_ID *

    Sample values: 1463241

*/ inline DescribeAvailablePatchesRequest& WithFilters(Aws::Vector&& value) { SetFilters(std::move(value)); return *this;} /** *

Each element in the array is a structure containing a key-value pair.

* Windows Server

Supported keys for Windows Server managed node * patches include the following:

  • PATCH_SET *

    Sample values: OS | APPLICATION

  • *
  • PRODUCT

    Sample values: * WindowsServer2012 | Office 2010 | * MicrosoftDefenderAntivirus

  • * PRODUCT_FAMILY

    Sample values: Windows | * Office

  • MSRC_SEVERITY

    *

    Sample values: ServicePacks | Important | * Moderate

  • CLASSIFICATION *

    Sample values: ServicePacks | SecurityUpdates * | DefinitionUpdates

  • PATCH_ID *

    Sample values: KB123456 | KB4516046

    *

Linux

When specifying filters for * Linux patches, you must specify a key-pair for PRODUCT. For * example, using the Command Line Interface (CLI), the following command * fails:

aws ssm describe-available-patches --filters * Key=CVE_ID,Values=CVE-2018-3615

However, the following command * succeeds:

aws ssm describe-available-patches --filters * Key=PRODUCT,Values=AmazonLinux2018.03 Key=CVE_ID,Values=CVE-2018-3615 *

Supported keys for Linux managed node patches include the * following:

  • PRODUCT

    Sample * values: AmazonLinux2018.03 | AmazonLinux2.0

  • *
  • NAME

    Sample values: * kernel-headers | samba-python | php

    *
  • SEVERITY

    Sample values: * Critical | Important | Medium | * Low

  • EPOCH

    Sample * values: 0 | 1

  • * VERSION

    Sample values: 78.6.1 | * 4.10.16

  • RELEASE

    *

    Sample values: 9.56.amzn1 | 1.amzn2

  • *

    ARCH

    Sample values: i686 | * x86_64

  • REPOSITORY

    *

    Sample values: Core | Updates

  • * ADVISORY_ID

    Sample values: * ALAS-2018-1058 | ALAS2-2021-1594

  • * CVE_ID

    Sample values: CVE-2018-3615 | * CVE-2020-1472

  • BUGZILLA_ID *

    Sample values: 1463241

*/ inline DescribeAvailablePatchesRequest& AddFilters(const PatchOrchestratorFilter& value) { m_filtersHasBeenSet = true; m_filters.push_back(value); return *this; } /** *

Each element in the array is a structure containing a key-value pair.

* Windows Server

Supported keys for Windows Server managed node * patches include the following:

  • PATCH_SET *

    Sample values: OS | APPLICATION

  • *
  • PRODUCT

    Sample values: * WindowsServer2012 | Office 2010 | * MicrosoftDefenderAntivirus

  • * PRODUCT_FAMILY

    Sample values: Windows | * Office

  • MSRC_SEVERITY

    *

    Sample values: ServicePacks | Important | * Moderate

  • CLASSIFICATION *

    Sample values: ServicePacks | SecurityUpdates * | DefinitionUpdates

  • PATCH_ID *

    Sample values: KB123456 | KB4516046

    *

Linux

When specifying filters for * Linux patches, you must specify a key-pair for PRODUCT. For * example, using the Command Line Interface (CLI), the following command * fails:

aws ssm describe-available-patches --filters * Key=CVE_ID,Values=CVE-2018-3615

However, the following command * succeeds:

aws ssm describe-available-patches --filters * Key=PRODUCT,Values=AmazonLinux2018.03 Key=CVE_ID,Values=CVE-2018-3615 *

Supported keys for Linux managed node patches include the * following:

  • PRODUCT

    Sample * values: AmazonLinux2018.03 | AmazonLinux2.0

  • *
  • NAME

    Sample values: * kernel-headers | samba-python | php

    *
  • SEVERITY

    Sample values: * Critical | Important | Medium | * Low

  • EPOCH

    Sample * values: 0 | 1

  • * VERSION

    Sample values: 78.6.1 | * 4.10.16

  • RELEASE

    *

    Sample values: 9.56.amzn1 | 1.amzn2

  • *

    ARCH

    Sample values: i686 | * x86_64

  • REPOSITORY

    *

    Sample values: Core | Updates

  • * ADVISORY_ID

    Sample values: * ALAS-2018-1058 | ALAS2-2021-1594

  • * CVE_ID

    Sample values: CVE-2018-3615 | * CVE-2020-1472

  • BUGZILLA_ID *

    Sample values: 1463241

*/ inline DescribeAvailablePatchesRequest& AddFilters(PatchOrchestratorFilter&& value) { m_filtersHasBeenSet = true; m_filters.push_back(std::move(value)); return *this; } /** *

The maximum number of patches to return (per page).

*/ inline int GetMaxResults() const{ return m_maxResults; } /** *

The maximum number of patches to return (per page).

*/ inline bool MaxResultsHasBeenSet() const { return m_maxResultsHasBeenSet; } /** *

The maximum number of patches to return (per page).

*/ inline void SetMaxResults(int value) { m_maxResultsHasBeenSet = true; m_maxResults = value; } /** *

The maximum number of patches to return (per page).

*/ inline DescribeAvailablePatchesRequest& WithMaxResults(int value) { SetMaxResults(value); return *this;} /** *

The token for the next set of items to return. (You received this token from * a previous call.)

*/ inline const Aws::String& GetNextToken() const{ return m_nextToken; } /** *

The token for the next set of items to return. (You received this token from * a previous call.)

*/ inline bool NextTokenHasBeenSet() const { return m_nextTokenHasBeenSet; } /** *

The token for the next set of items to return. (You received this token from * a previous call.)

*/ inline void SetNextToken(const Aws::String& value) { m_nextTokenHasBeenSet = true; m_nextToken = value; } /** *

The token for the next set of items to return. (You received this token from * a previous call.)

*/ inline void SetNextToken(Aws::String&& value) { m_nextTokenHasBeenSet = true; m_nextToken = std::move(value); } /** *

The token for the next set of items to return. (You received this token from * a previous call.)

*/ inline void SetNextToken(const char* value) { m_nextTokenHasBeenSet = true; m_nextToken.assign(value); } /** *

The token for the next set of items to return. (You received this token from * a previous call.)

*/ inline DescribeAvailablePatchesRequest& WithNextToken(const Aws::String& value) { SetNextToken(value); return *this;} /** *

The token for the next set of items to return. (You received this token from * a previous call.)

*/ inline DescribeAvailablePatchesRequest& WithNextToken(Aws::String&& value) { SetNextToken(std::move(value)); return *this;} /** *

The token for the next set of items to return. (You received this token from * a previous call.)

*/ inline DescribeAvailablePatchesRequest& WithNextToken(const char* value) { SetNextToken(value); return *this;} private: Aws::Vector m_filters; bool m_filtersHasBeenSet = false; int m_maxResults; bool m_maxResultsHasBeenSet = false; Aws::String m_nextToken; bool m_nextTokenHasBeenSet = false; }; } // namespace Model } // namespace SSM } // namespace Aws