Struct aws_sdk_ssm::types::Patch
source · #[non_exhaustive]pub struct Patch {Show 23 fields
pub id: Option<String>,
pub release_date: Option<DateTime>,
pub title: Option<String>,
pub description: Option<String>,
pub content_url: Option<String>,
pub vendor: Option<String>,
pub product_family: Option<String>,
pub product: Option<String>,
pub classification: Option<String>,
pub msrc_severity: Option<String>,
pub kb_number: Option<String>,
pub msrc_number: Option<String>,
pub language: Option<String>,
pub advisory_ids: Option<Vec<String>>,
pub bugzilla_ids: Option<Vec<String>>,
pub cve_ids: Option<Vec<String>>,
pub name: Option<String>,
pub epoch: i32,
pub version: Option<String>,
pub release: Option<String>,
pub arch: Option<String>,
pub severity: Option<String>,
pub repository: Option<String>,
}
Expand description
Represents metadata about a patch.
Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.id: Option<String>
The ID of the patch. Applies to Windows patches only.
This ID isn't the same as the Microsoft Knowledge Base ID.
release_date: Option<DateTime>
The date the patch was released.
title: Option<String>
The title of the patch.
description: Option<String>
The description of the patch.
content_url: Option<String>
The URL where more information can be obtained about the patch.
vendor: Option<String>
The name of the vendor providing the patch.
product_family: Option<String>
The product family the patch is applicable for. For example, Windows
or Amazon Linux 2
.
product: Option<String>
The specific product the patch is applicable for. For example, WindowsServer2016
or AmazonLinux2018.03
.
classification: Option<String>
The classification of the patch. For example, SecurityUpdates
, Updates
, or CriticalUpdates
.
msrc_severity: Option<String>
The severity of the patch, such as Critical
, Important
, or Moderate
. Applies to Windows patches only.
kb_number: Option<String>
The Microsoft Knowledge Base ID of the patch. Applies to Windows patches only.
msrc_number: Option<String>
The ID of the Microsoft Security Response Center (MSRC) bulletin the patch is related to. For example, MS14-045
. Applies to Windows patches only.
language: Option<String>
The language of the patch if it's language-specific.
advisory_ids: Option<Vec<String>>
The Advisory ID of the patch. For example, RHSA-2020:3779
. Applies to Linux-based managed nodes only.
bugzilla_ids: Option<Vec<String>>
The Bugzilla ID of the patch. For example, 1600646
. Applies to Linux-based managed nodes only.
cve_ids: Option<Vec<String>>
The Common Vulnerabilities and Exposures (CVE) ID of the patch. For example, CVE-2011-3192
. Applies to Linux-based managed nodes only.
name: Option<String>
The name of the patch. Applies to Linux-based managed nodes only.
epoch: i32
The epoch of the patch. For example in pkg-example-EE-20180914-2.2.amzn1.noarch
, the epoch value is 20180914-2
. Applies to Linux-based managed nodes only.
version: Option<String>
The version number of the patch. For example, in example-pkg-1.710.10-2.7.abcd.x86_64
, the version number is indicated by -1
. Applies to Linux-based managed nodes only.
release: Option<String>
The particular release of a patch. For example, in pkg-example-EE-20180914-2.2.amzn1.noarch
, the release is 2.amaz1
. Applies to Linux-based managed nodes only.
arch: Option<String>
The architecture of the patch. For example, in example-pkg-0.710.10-2.7.abcd.x86_64
, the architecture is indicated by x86_64
. Applies to Linux-based managed nodes only.
severity: Option<String>
The severity level of the patch. For example, CRITICAL
or MODERATE
.
repository: Option<String>
The source patch repository for the operating system and version, such as trusty-security
for Ubuntu Server 14.04 LTE and focal-security
for Ubuntu Server 20.04 LTE. Applies to Linux-based managed nodes only.
Implementations§
source§impl Patch
impl Patch
sourcepub fn id(&self) -> Option<&str>
pub fn id(&self) -> Option<&str>
The ID of the patch. Applies to Windows patches only.
This ID isn't the same as the Microsoft Knowledge Base ID.
sourcepub fn release_date(&self) -> Option<&DateTime>
pub fn release_date(&self) -> Option<&DateTime>
The date the patch was released.
sourcepub fn description(&self) -> Option<&str>
pub fn description(&self) -> Option<&str>
The description of the patch.
sourcepub fn content_url(&self) -> Option<&str>
pub fn content_url(&self) -> Option<&str>
The URL where more information can be obtained about the patch.
sourcepub fn product_family(&self) -> Option<&str>
pub fn product_family(&self) -> Option<&str>
The product family the patch is applicable for. For example, Windows
or Amazon Linux 2
.
sourcepub fn product(&self) -> Option<&str>
pub fn product(&self) -> Option<&str>
The specific product the patch is applicable for. For example, WindowsServer2016
or AmazonLinux2018.03
.
sourcepub fn classification(&self) -> Option<&str>
pub fn classification(&self) -> Option<&str>
The classification of the patch. For example, SecurityUpdates
, Updates
, or CriticalUpdates
.
sourcepub fn msrc_severity(&self) -> Option<&str>
pub fn msrc_severity(&self) -> Option<&str>
The severity of the patch, such as Critical
, Important
, or Moderate
. Applies to Windows patches only.
sourcepub fn kb_number(&self) -> Option<&str>
pub fn kb_number(&self) -> Option<&str>
The Microsoft Knowledge Base ID of the patch. Applies to Windows patches only.
sourcepub fn msrc_number(&self) -> Option<&str>
pub fn msrc_number(&self) -> Option<&str>
The ID of the Microsoft Security Response Center (MSRC) bulletin the patch is related to. For example, MS14-045
. Applies to Windows patches only.
sourcepub fn advisory_ids(&self) -> &[String]
pub fn advisory_ids(&self) -> &[String]
The Advisory ID of the patch. For example, RHSA-2020:3779
. Applies to Linux-based managed nodes only.
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .advisory_ids.is_none()
.
sourcepub fn bugzilla_ids(&self) -> &[String]
pub fn bugzilla_ids(&self) -> &[String]
The Bugzilla ID of the patch. For example, 1600646
. Applies to Linux-based managed nodes only.
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .bugzilla_ids.is_none()
.
sourcepub fn cve_ids(&self) -> &[String]
pub fn cve_ids(&self) -> &[String]
The Common Vulnerabilities and Exposures (CVE) ID of the patch. For example, CVE-2011-3192
. Applies to Linux-based managed nodes only.
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .cve_ids.is_none()
.
sourcepub fn name(&self) -> Option<&str>
pub fn name(&self) -> Option<&str>
The name of the patch. Applies to Linux-based managed nodes only.
sourcepub fn epoch(&self) -> i32
pub fn epoch(&self) -> i32
The epoch of the patch. For example in pkg-example-EE-20180914-2.2.amzn1.noarch
, the epoch value is 20180914-2
. Applies to Linux-based managed nodes only.
sourcepub fn version(&self) -> Option<&str>
pub fn version(&self) -> Option<&str>
The version number of the patch. For example, in example-pkg-1.710.10-2.7.abcd.x86_64
, the version number is indicated by -1
. Applies to Linux-based managed nodes only.
sourcepub fn release(&self) -> Option<&str>
pub fn release(&self) -> Option<&str>
The particular release of a patch. For example, in pkg-example-EE-20180914-2.2.amzn1.noarch
, the release is 2.amaz1
. Applies to Linux-based managed nodes only.
sourcepub fn arch(&self) -> Option<&str>
pub fn arch(&self) -> Option<&str>
The architecture of the patch. For example, in example-pkg-0.710.10-2.7.abcd.x86_64
, the architecture is indicated by x86_64
. Applies to Linux-based managed nodes only.
sourcepub fn severity(&self) -> Option<&str>
pub fn severity(&self) -> Option<&str>
The severity level of the patch. For example, CRITICAL
or MODERATE
.
sourcepub fn repository(&self) -> Option<&str>
pub fn repository(&self) -> Option<&str>
The source patch repository for the operating system and version, such as trusty-security
for Ubuntu Server 14.04 LTE and focal-security
for Ubuntu Server 20.04 LTE. Applies to Linux-based managed nodes only.