/* * Copyright 2018-2023 Amazon.com, Inc. or its affiliates. All Rights Reserved. * * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with * the License. A copy of the License is located at * * http://aws.amazon.com/apache2.0 * * or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR * CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions * and limitations under the License. */ package com.amazonaws.services.simplesystemsmanagement.model; import java.io.Serializable; import javax.annotation.Generated; import com.amazonaws.AmazonWebServiceRequest; /** * * @see AWS API * Documentation */ @Generated("com.amazonaws:aws-java-sdk-code-generator") public class DescribeAvailablePatchesRequest extends com.amazonaws.AmazonWebServiceRequest implements Serializable, Cloneable { /** *
* Each element in the array is a structure containing a key-value pair. *
** Windows Server *
** Supported keys for Windows Server managed node patches include the following: *
*
* PATCH_SET
*
* Sample values: OS
| APPLICATION
*
* PRODUCT
*
* Sample values: WindowsServer2012
| Office 2010
|
* MicrosoftDefenderAntivirus
*
* PRODUCT_FAMILY
*
* Sample values: Windows
| Office
*
* MSRC_SEVERITY
*
* Sample values: ServicePacks
| Important
| Moderate
*
* CLASSIFICATION
*
* Sample values: ServicePacks
| SecurityUpdates
| DefinitionUpdates
*
* PATCH_ID
*
* Sample values: KB123456
| KB4516046
*
* Linux *
*
* When specifying filters for Linux patches, you must specify a key-pair for PRODUCT
. For example,
* using the Command Line Interface (CLI), the following command fails:
*
* aws ssm describe-available-patches --filters Key=CVE_ID,Values=CVE-2018-3615
*
* However, the following command succeeds: *
*
* aws ssm describe-available-patches --filters Key=PRODUCT,Values=AmazonLinux2018.03 Key=CVE_ID,Values=CVE-2018-3615
*
* Supported keys for Linux managed node patches include the following: *
*
* PRODUCT
*
* Sample values: AmazonLinux2018.03
| AmazonLinux2.0
*
* NAME
*
* Sample values: kernel-headers
| samba-python
| php
*
* SEVERITY
*
* Sample values: Critical
| Important
| Medium
| Low
*
* EPOCH
*
* Sample values: 0
| 1
*
* VERSION
*
* Sample values: 78.6.1
| 4.10.16
*
* RELEASE
*
* Sample values: 9.56.amzn1
| 1.amzn2
*
* ARCH
*
* Sample values: i686
| x86_64
*
* REPOSITORY
*
* Sample values: Core
| Updates
*
* ADVISORY_ID
*
* Sample values: ALAS-2018-1058
| ALAS2-2021-1594
*
* CVE_ID
*
* Sample values: CVE-2018-3615
| CVE-2020-1472
*
* BUGZILLA_ID
*
* Sample values: 1463241
*
* The maximum number of patches to return (per page). *
*/ private Integer maxResults; /** ** The token for the next set of items to return. (You received this token from a previous call.) *
*/ private String nextToken; /** ** Each element in the array is a structure containing a key-value pair. *
** Windows Server *
** Supported keys for Windows Server managed node patches include the following: *
*
* PATCH_SET
*
* Sample values: OS
| APPLICATION
*
* PRODUCT
*
* Sample values: WindowsServer2012
| Office 2010
|
* MicrosoftDefenderAntivirus
*
* PRODUCT_FAMILY
*
* Sample values: Windows
| Office
*
* MSRC_SEVERITY
*
* Sample values: ServicePacks
| Important
| Moderate
*
* CLASSIFICATION
*
* Sample values: ServicePacks
| SecurityUpdates
| DefinitionUpdates
*
* PATCH_ID
*
* Sample values: KB123456
| KB4516046
*
* Linux *
*
* When specifying filters for Linux patches, you must specify a key-pair for PRODUCT
. For example,
* using the Command Line Interface (CLI), the following command fails:
*
* aws ssm describe-available-patches --filters Key=CVE_ID,Values=CVE-2018-3615
*
* However, the following command succeeds: *
*
* aws ssm describe-available-patches --filters Key=PRODUCT,Values=AmazonLinux2018.03 Key=CVE_ID,Values=CVE-2018-3615
*
* Supported keys for Linux managed node patches include the following: *
*
* PRODUCT
*
* Sample values: AmazonLinux2018.03
| AmazonLinux2.0
*
* NAME
*
* Sample values: kernel-headers
| samba-python
| php
*
* SEVERITY
*
* Sample values: Critical
| Important
| Medium
| Low
*
* EPOCH
*
* Sample values: 0
| 1
*
* VERSION
*
* Sample values: 78.6.1
| 4.10.16
*
* RELEASE
*
* Sample values: 9.56.amzn1
| 1.amzn2
*
* ARCH
*
* Sample values: i686
| x86_64
*
* REPOSITORY
*
* Sample values: Core
| Updates
*
* ADVISORY_ID
*
* Sample values: ALAS-2018-1058
| ALAS2-2021-1594
*
* CVE_ID
*
* Sample values: CVE-2018-3615
| CVE-2020-1472
*
* BUGZILLA_ID
*
* Sample values: 1463241
*
* Windows Server *
** Supported keys for Windows Server managed node patches include the following: *
*
* PATCH_SET
*
* Sample values: OS
| APPLICATION
*
* PRODUCT
*
* Sample values: WindowsServer2012
| Office 2010
|
* MicrosoftDefenderAntivirus
*
* PRODUCT_FAMILY
*
* Sample values: Windows
| Office
*
* MSRC_SEVERITY
*
* Sample values: ServicePacks
| Important
| Moderate
*
* CLASSIFICATION
*
* Sample values: ServicePacks
| SecurityUpdates
| DefinitionUpdates
*
* PATCH_ID
*
* Sample values: KB123456
| KB4516046
*
* Linux *
*
* When specifying filters for Linux patches, you must specify a key-pair for PRODUCT
. For
* example, using the Command Line Interface (CLI), the following command fails:
*
* aws ssm describe-available-patches --filters Key=CVE_ID,Values=CVE-2018-3615
*
* However, the following command succeeds: *
*
* aws ssm describe-available-patches --filters Key=PRODUCT,Values=AmazonLinux2018.03 Key=CVE_ID,Values=CVE-2018-3615
*
* Supported keys for Linux managed node patches include the following: *
*
* PRODUCT
*
* Sample values: AmazonLinux2018.03
| AmazonLinux2.0
*
* NAME
*
* Sample values: kernel-headers
| samba-python
| php
*
* SEVERITY
*
* Sample values: Critical
| Important
| Medium
| Low
*
* EPOCH
*
* Sample values: 0
| 1
*
* VERSION
*
* Sample values: 78.6.1
| 4.10.16
*
* RELEASE
*
* Sample values: 9.56.amzn1
| 1.amzn2
*
* ARCH
*
* Sample values: i686
| x86_64
*
* REPOSITORY
*
* Sample values: Core
| Updates
*
* ADVISORY_ID
*
* Sample values: ALAS-2018-1058
| ALAS2-2021-1594
*
* CVE_ID
*
* Sample values: CVE-2018-3615
| CVE-2020-1472
*
* BUGZILLA_ID
*
* Sample values: 1463241
*
* Each element in the array is a structure containing a key-value pair. *
** Windows Server *
** Supported keys for Windows Server managed node patches include the following: *
*
* PATCH_SET
*
* Sample values: OS
| APPLICATION
*
* PRODUCT
*
* Sample values: WindowsServer2012
| Office 2010
|
* MicrosoftDefenderAntivirus
*
* PRODUCT_FAMILY
*
* Sample values: Windows
| Office
*
* MSRC_SEVERITY
*
* Sample values: ServicePacks
| Important
| Moderate
*
* CLASSIFICATION
*
* Sample values: ServicePacks
| SecurityUpdates
| DefinitionUpdates
*
* PATCH_ID
*
* Sample values: KB123456
| KB4516046
*
* Linux *
*
* When specifying filters for Linux patches, you must specify a key-pair for PRODUCT
. For example,
* using the Command Line Interface (CLI), the following command fails:
*
* aws ssm describe-available-patches --filters Key=CVE_ID,Values=CVE-2018-3615
*
* However, the following command succeeds: *
*
* aws ssm describe-available-patches --filters Key=PRODUCT,Values=AmazonLinux2018.03 Key=CVE_ID,Values=CVE-2018-3615
*
* Supported keys for Linux managed node patches include the following: *
*
* PRODUCT
*
* Sample values: AmazonLinux2018.03
| AmazonLinux2.0
*
* NAME
*
* Sample values: kernel-headers
| samba-python
| php
*
* SEVERITY
*
* Sample values: Critical
| Important
| Medium
| Low
*
* EPOCH
*
* Sample values: 0
| 1
*
* VERSION
*
* Sample values: 78.6.1
| 4.10.16
*
* RELEASE
*
* Sample values: 9.56.amzn1
| 1.amzn2
*
* ARCH
*
* Sample values: i686
| x86_64
*
* REPOSITORY
*
* Sample values: Core
| Updates
*
* ADVISORY_ID
*
* Sample values: ALAS-2018-1058
| ALAS2-2021-1594
*
* CVE_ID
*
* Sample values: CVE-2018-3615
| CVE-2020-1472
*
* BUGZILLA_ID
*
* Sample values: 1463241
*
* Windows Server *
** Supported keys for Windows Server managed node patches include the following: *
*
* PATCH_SET
*
* Sample values: OS
| APPLICATION
*
* PRODUCT
*
* Sample values: WindowsServer2012
| Office 2010
|
* MicrosoftDefenderAntivirus
*
* PRODUCT_FAMILY
*
* Sample values: Windows
| Office
*
* MSRC_SEVERITY
*
* Sample values: ServicePacks
| Important
| Moderate
*
* CLASSIFICATION
*
* Sample values: ServicePacks
| SecurityUpdates
| DefinitionUpdates
*
* PATCH_ID
*
* Sample values: KB123456
| KB4516046
*
* Linux *
*
* When specifying filters for Linux patches, you must specify a key-pair for PRODUCT
. For
* example, using the Command Line Interface (CLI), the following command fails:
*
* aws ssm describe-available-patches --filters Key=CVE_ID,Values=CVE-2018-3615
*
* However, the following command succeeds: *
*
* aws ssm describe-available-patches --filters Key=PRODUCT,Values=AmazonLinux2018.03 Key=CVE_ID,Values=CVE-2018-3615
*
* Supported keys for Linux managed node patches include the following: *
*
* PRODUCT
*
* Sample values: AmazonLinux2018.03
| AmazonLinux2.0
*
* NAME
*
* Sample values: kernel-headers
| samba-python
| php
*
* SEVERITY
*
* Sample values: Critical
| Important
| Medium
| Low
*
* EPOCH
*
* Sample values: 0
| 1
*
* VERSION
*
* Sample values: 78.6.1
| 4.10.16
*
* RELEASE
*
* Sample values: 9.56.amzn1
| 1.amzn2
*
* ARCH
*
* Sample values: i686
| x86_64
*
* REPOSITORY
*
* Sample values: Core
| Updates
*
* ADVISORY_ID
*
* Sample values: ALAS-2018-1058
| ALAS2-2021-1594
*
* CVE_ID
*
* Sample values: CVE-2018-3615
| CVE-2020-1472
*
* BUGZILLA_ID
*
* Sample values: 1463241
*
* Each element in the array is a structure containing a key-value pair. *
** Windows Server *
** Supported keys for Windows Server managed node patches include the following: *
*
* PATCH_SET
*
* Sample values: OS
| APPLICATION
*
* PRODUCT
*
* Sample values: WindowsServer2012
| Office 2010
|
* MicrosoftDefenderAntivirus
*
* PRODUCT_FAMILY
*
* Sample values: Windows
| Office
*
* MSRC_SEVERITY
*
* Sample values: ServicePacks
| Important
| Moderate
*
* CLASSIFICATION
*
* Sample values: ServicePacks
| SecurityUpdates
| DefinitionUpdates
*
* PATCH_ID
*
* Sample values: KB123456
| KB4516046
*
* Linux *
*
* When specifying filters for Linux patches, you must specify a key-pair for PRODUCT
. For example,
* using the Command Line Interface (CLI), the following command fails:
*
* aws ssm describe-available-patches --filters Key=CVE_ID,Values=CVE-2018-3615
*
* However, the following command succeeds: *
*
* aws ssm describe-available-patches --filters Key=PRODUCT,Values=AmazonLinux2018.03 Key=CVE_ID,Values=CVE-2018-3615
*
* Supported keys for Linux managed node patches include the following: *
*
* PRODUCT
*
* Sample values: AmazonLinux2018.03
| AmazonLinux2.0
*
* NAME
*
* Sample values: kernel-headers
| samba-python
| php
*
* SEVERITY
*
* Sample values: Critical
| Important
| Medium
| Low
*
* EPOCH
*
* Sample values: 0
| 1
*
* VERSION
*
* Sample values: 78.6.1
| 4.10.16
*
* RELEASE
*
* Sample values: 9.56.amzn1
| 1.amzn2
*
* ARCH
*
* Sample values: i686
| x86_64
*
* REPOSITORY
*
* Sample values: Core
| Updates
*
* ADVISORY_ID
*
* Sample values: ALAS-2018-1058
| ALAS2-2021-1594
*
* CVE_ID
*
* Sample values: CVE-2018-3615
| CVE-2020-1472
*
* BUGZILLA_ID
*
* Sample values: 1463241
*
* NOTE: This method appends the values to the existing list (if any). Use * {@link #setFilters(java.util.Collection)} or {@link #withFilters(java.util.Collection)} if you want to override * the existing values. *
* * @param filters * Each element in the array is a structure containing a key-value pair. ** Windows Server *
** Supported keys for Windows Server managed node patches include the following: *
*
* PATCH_SET
*
* Sample values: OS
| APPLICATION
*
* PRODUCT
*
* Sample values: WindowsServer2012
| Office 2010
|
* MicrosoftDefenderAntivirus
*
* PRODUCT_FAMILY
*
* Sample values: Windows
| Office
*
* MSRC_SEVERITY
*
* Sample values: ServicePacks
| Important
| Moderate
*
* CLASSIFICATION
*
* Sample values: ServicePacks
| SecurityUpdates
| DefinitionUpdates
*
* PATCH_ID
*
* Sample values: KB123456
| KB4516046
*
* Linux *
*
* When specifying filters for Linux patches, you must specify a key-pair for PRODUCT
. For
* example, using the Command Line Interface (CLI), the following command fails:
*
* aws ssm describe-available-patches --filters Key=CVE_ID,Values=CVE-2018-3615
*
* However, the following command succeeds: *
*
* aws ssm describe-available-patches --filters Key=PRODUCT,Values=AmazonLinux2018.03 Key=CVE_ID,Values=CVE-2018-3615
*
* Supported keys for Linux managed node patches include the following: *
*
* PRODUCT
*
* Sample values: AmazonLinux2018.03
| AmazonLinux2.0
*
* NAME
*
* Sample values: kernel-headers
| samba-python
| php
*
* SEVERITY
*
* Sample values: Critical
| Important
| Medium
| Low
*
* EPOCH
*
* Sample values: 0
| 1
*
* VERSION
*
* Sample values: 78.6.1
| 4.10.16
*
* RELEASE
*
* Sample values: 9.56.amzn1
| 1.amzn2
*
* ARCH
*
* Sample values: i686
| x86_64
*
* REPOSITORY
*
* Sample values: Core
| Updates
*
* ADVISORY_ID
*
* Sample values: ALAS-2018-1058
| ALAS2-2021-1594
*
* CVE_ID
*
* Sample values: CVE-2018-3615
| CVE-2020-1472
*
* BUGZILLA_ID
*
* Sample values: 1463241
*
* Each element in the array is a structure containing a key-value pair. *
** Windows Server *
** Supported keys for Windows Server managed node patches include the following: *
*
* PATCH_SET
*
* Sample values: OS
| APPLICATION
*
* PRODUCT
*
* Sample values: WindowsServer2012
| Office 2010
|
* MicrosoftDefenderAntivirus
*
* PRODUCT_FAMILY
*
* Sample values: Windows
| Office
*
* MSRC_SEVERITY
*
* Sample values: ServicePacks
| Important
| Moderate
*
* CLASSIFICATION
*
* Sample values: ServicePacks
| SecurityUpdates
| DefinitionUpdates
*
* PATCH_ID
*
* Sample values: KB123456
| KB4516046
*
* Linux *
*
* When specifying filters for Linux patches, you must specify a key-pair for PRODUCT
. For example,
* using the Command Line Interface (CLI), the following command fails:
*
* aws ssm describe-available-patches --filters Key=CVE_ID,Values=CVE-2018-3615
*
* However, the following command succeeds: *
*
* aws ssm describe-available-patches --filters Key=PRODUCT,Values=AmazonLinux2018.03 Key=CVE_ID,Values=CVE-2018-3615
*
* Supported keys for Linux managed node patches include the following: *
*
* PRODUCT
*
* Sample values: AmazonLinux2018.03
| AmazonLinux2.0
*
* NAME
*
* Sample values: kernel-headers
| samba-python
| php
*
* SEVERITY
*
* Sample values: Critical
| Important
| Medium
| Low
*
* EPOCH
*
* Sample values: 0
| 1
*
* VERSION
*
* Sample values: 78.6.1
| 4.10.16
*
* RELEASE
*
* Sample values: 9.56.amzn1
| 1.amzn2
*
* ARCH
*
* Sample values: i686
| x86_64
*
* REPOSITORY
*
* Sample values: Core
| Updates
*
* ADVISORY_ID
*
* Sample values: ALAS-2018-1058
| ALAS2-2021-1594
*
* CVE_ID
*
* Sample values: CVE-2018-3615
| CVE-2020-1472
*
* BUGZILLA_ID
*
* Sample values: 1463241
*
* Windows Server *
** Supported keys for Windows Server managed node patches include the following: *
*
* PATCH_SET
*
* Sample values: OS
| APPLICATION
*
* PRODUCT
*
* Sample values: WindowsServer2012
| Office 2010
|
* MicrosoftDefenderAntivirus
*
* PRODUCT_FAMILY
*
* Sample values: Windows
| Office
*
* MSRC_SEVERITY
*
* Sample values: ServicePacks
| Important
| Moderate
*
* CLASSIFICATION
*
* Sample values: ServicePacks
| SecurityUpdates
| DefinitionUpdates
*
* PATCH_ID
*
* Sample values: KB123456
| KB4516046
*
* Linux *
*
* When specifying filters for Linux patches, you must specify a key-pair for PRODUCT
. For
* example, using the Command Line Interface (CLI), the following command fails:
*
* aws ssm describe-available-patches --filters Key=CVE_ID,Values=CVE-2018-3615
*
* However, the following command succeeds: *
*
* aws ssm describe-available-patches --filters Key=PRODUCT,Values=AmazonLinux2018.03 Key=CVE_ID,Values=CVE-2018-3615
*
* Supported keys for Linux managed node patches include the following: *
*
* PRODUCT
*
* Sample values: AmazonLinux2018.03
| AmazonLinux2.0
*
* NAME
*
* Sample values: kernel-headers
| samba-python
| php
*
* SEVERITY
*
* Sample values: Critical
| Important
| Medium
| Low
*
* EPOCH
*
* Sample values: 0
| 1
*
* VERSION
*
* Sample values: 78.6.1
| 4.10.16
*
* RELEASE
*
* Sample values: 9.56.amzn1
| 1.amzn2
*
* ARCH
*
* Sample values: i686
| x86_64
*
* REPOSITORY
*
* Sample values: Core
| Updates
*
* ADVISORY_ID
*
* Sample values: ALAS-2018-1058
| ALAS2-2021-1594
*
* CVE_ID
*
* Sample values: CVE-2018-3615
| CVE-2020-1472
*
* BUGZILLA_ID
*
* Sample values: 1463241
*
* The maximum number of patches to return (per page). *
* * @param maxResults * The maximum number of patches to return (per page). */ public void setMaxResults(Integer maxResults) { this.maxResults = maxResults; } /** ** The maximum number of patches to return (per page). *
* * @return The maximum number of patches to return (per page). */ public Integer getMaxResults() { return this.maxResults; } /** ** The maximum number of patches to return (per page). *
* * @param maxResults * The maximum number of patches to return (per page). * @return Returns a reference to this object so that method calls can be chained together. */ public DescribeAvailablePatchesRequest withMaxResults(Integer maxResults) { setMaxResults(maxResults); return this; } /** ** The token for the next set of items to return. (You received this token from a previous call.) *
* * @param nextToken * The token for the next set of items to return. (You received this token from a previous call.) */ public void setNextToken(String nextToken) { this.nextToken = nextToken; } /** ** The token for the next set of items to return. (You received this token from a previous call.) *
* * @return The token for the next set of items to return. (You received this token from a previous call.) */ public String getNextToken() { return this.nextToken; } /** ** The token for the next set of items to return. (You received this token from a previous call.) *
* * @param nextToken * The token for the next set of items to return. (You received this token from a previous call.) * @return Returns a reference to this object so that method calls can be chained together. */ public DescribeAvailablePatchesRequest withNextToken(String nextToken) { setNextToken(nextToken); return this; } /** * Returns a string representation of this object. This is useful for testing and debugging. Sensitive data will be * redacted from this string using a placeholder value. * * @return A string representation of this object. * * @see java.lang.Object#toString() */ @Override public String toString() { StringBuilder sb = new StringBuilder(); sb.append("{"); if (getFilters() != null) sb.append("Filters: ").append(getFilters()).append(","); if (getMaxResults() != null) sb.append("MaxResults: ").append(getMaxResults()).append(","); if (getNextToken() != null) sb.append("NextToken: ").append(getNextToken()); sb.append("}"); return sb.toString(); } @Override public boolean equals(Object obj) { if (this == obj) return true; if (obj == null) return false; if (obj instanceof DescribeAvailablePatchesRequest == false) return false; DescribeAvailablePatchesRequest other = (DescribeAvailablePatchesRequest) obj; if (other.getFilters() == null ^ this.getFilters() == null) return false; if (other.getFilters() != null && other.getFilters().equals(this.getFilters()) == false) return false; if (other.getMaxResults() == null ^ this.getMaxResults() == null) return false; if (other.getMaxResults() != null && other.getMaxResults().equals(this.getMaxResults()) == false) return false; if (other.getNextToken() == null ^ this.getNextToken() == null) return false; if (other.getNextToken() != null && other.getNextToken().equals(this.getNextToken()) == false) return false; return true; } @Override public int hashCode() { final int prime = 31; int hashCode = 1; hashCode = prime * hashCode + ((getFilters() == null) ? 0 : getFilters().hashCode()); hashCode = prime * hashCode + ((getMaxResults() == null) ? 0 : getMaxResults().hashCode()); hashCode = prime * hashCode + ((getNextToken() == null) ? 0 : getNextToken().hashCode()); return hashCode; } @Override public DescribeAvailablePatchesRequest clone() { return (DescribeAvailablePatchesRequest) super.clone(); } }