Build #1808235 2025-02-26 19:36:16
# rustc version
rustc 1.87.0-nightly (85abb2763 2025-02-25)# docs.rs version
docsrs 0.6.0 (35977596 2025-02-09)# build log
[INFO] running `Command { std: "docker" "create" "-v" "/home/cratesfyi/workspace/builds/rusoto_securityhub-0.48.0/target:/opt/rustwide/target:rw,Z" "-v" "/home/cratesfyi/workspace/builds/rusoto_securityhub-0.48.0/source:/opt/rustwide/workdir:ro,Z" "-v" "/home/cratesfyi/workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/home/cratesfyi/workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "DOCS_RS=1" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "6442450944" "--cpus" "6" "--user" "1001:1001" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:3959728d45483eb673ba100a951a6b9f5012970368db2a9e08e0ac9b67c8a5ad" "/opt/rustwide/cargo-home/bin/cargo" "+nightly" "rustdoc" "--lib" "-Zrustdoc-map" "--config" "build.rustdocflags=[\"--cfg\", \"docsrs\", \"-Z\", \"unstable-options\", \"--emit=invocation-specific\", \"--resource-suffix\", \"-20250225-1.87.0-nightly-85abb2763\", \"--static-root-path\", \"/-/rustdoc.static/\", \"--cap-lints\", \"warn\", \"--extern-html-root-takes-precedence\"]" "--offline" "-Zunstable-options" "--config=doc.extern-map.registries.crates-io=\"https://docs.rs/{pkg_name}/{version}/x86_64-unknown-linux-gnu\"" "-Zrustdoc-scrape-examples" "-j6" "--target" "x86_64-unknown-linux-gnu", kill_on_drop: false }`
[INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap.
[INFO] [stdout] 92dbf5a88040d7f819fd6d6b0d13a096f929a69aa548d57946bf3133077ff68d
[INFO] running `Command { std: "docker" "start" "-a" "92dbf5a88040d7f819fd6d6b0d13a096f929a69aa548d57946bf3133077ff68d", kill_on_drop: false }`
[INFO] [stderr] warning: target filter specified, but no targets matched; this is a no-op
[INFO] [stderr] Documenting rusoto_securityhub v0.48.0 (/opt/rustwide/workdir)
[INFO] [stderr] warning: unclosed HTML tag `em`
[INFO] [stderr] --> src/generated.rs:74:115
[INFO] [stderr] |
[INFO] [stderr] 74 | /// <p><p>The type of action that was detected. The possible action types are:</p> <ul> <li> <p> <code>NETWORK<em>CONNECTION</code> <...
[INFO] [stderr] | ^^^^
[INFO] [stderr] |
[INFO] [stderr] = note: `#[warn(rustdoc::invalid_html_tags)]` on by default
[INFO] [stderr] help: try marking as source code
[INFO] [stderr] |
[INFO] [stderr] 74 | /// <p><p>The type of action that was detected. The possible action types are:</p> <ul> <li> <p> <code>`NETWORK<em>`CONNECTION</code> </p> </li> <li> <p> <code>AWS</em>API<em>CALL</code> </p> </li> <li> <p> <code>DNS</em>REQUEST</code> </p> </li> <li> <p> <code>PORT_PROBE</code> </p> </li> </ul></p>
[INFO] [stderr] | + +
[INFO] [stderr]
[INFO] [stderr] warning: unopened HTML tag `em`
[INFO] [stderr] --> src/generated.rs:74:166
[INFO] [stderr] |
[INFO] [stderr] 74 | ...<code>NETWORK<em>CONNECTION</code> </p> </li> <li> <p> <code>AWS</em>API<em>CALL</code> </p> </li> <li> <p> <code>DNS</em>REQUEST</cod...
[INFO] [stderr] | ^^^^^
[INFO] [stderr]
[INFO] [stderr] warning: unclosed HTML tag `em`
[INFO] [stderr] --> src/generated.rs:74:174
[INFO] [stderr] |
[INFO] [stderr] 74 | ...ETWORK<em>CONNECTION</code> </p> </li> <li> <p> <code>AWS</em>API<em>CALL</code> </p> </li> <li> <p> <code>DNS</em>REQUEST</code> </p>...
[INFO] [stderr] | ^^^^
[INFO] [stderr] |
[INFO] [stderr] help: try marking as source code
[INFO] [stderr] |
[INFO] [stderr] 74 | /// <p><p>The type of action that was detected. The possible action types are:</p> <ul> <li> <p> <code>NETWORK<em>CONNECTION</code> </p> </li> <li> <p> <code>AWS</em>`API<em>`CALL</code> </p> </li> <li> <p> <code>DNS</em>REQUEST</code> </p> </li> <li> <p> <code>PORT_PROBE</code> </p> </li> </ul></p>
[INFO] [stderr] | + +
[INFO] [stderr]
[INFO] [stderr] warning: unopened HTML tag `em`
[INFO] [stderr] --> src/generated.rs:74:219
[INFO] [stderr] |
[INFO] [stderr] 74 | ...> <code>AWS</em>API<em>CALL</code> </p> </li> <li> <p> <code>DNS</em>REQUEST</code> </p> </li> <li> <p> <code>PORT_PROBE</code> </p> <...
[INFO] [stderr] | ^^^^^
[INFO] [stderr]
[INFO] [stderr] warning: unclosed HTML tag `em`
[INFO] [stderr] --> src/generated.rs:1118:542
[INFO] [stderr] |
[INFO] [stderr] 1118 | ...e code is in a GitHub repository.</p> </li> <li> <p> <code>GITHUB<em>ENTERPRISE</code> - The source code is in a GitHub Enterprise rep...
[INFO] [stderr] | ^^^^
[INFO] [stderr] |
[INFO] [stderr] help: try marking as source code
[INFO] [stderr] |
[INFO] [stderr] 1118 | /// <p><p>The type of repository that contains the source code to be built. Valid values are:</p> <ul> <li> <p> <code>BITBUCKET</code> - The source code is in a Bitbucket repository.</p> </li> <li> <p> <code>CODECOMMIT</code> - The source code is in an AWS CodeCommit repository.</p> </li> <li> <p> <code>CODEPIPELINE</code> - The source code settings are specified in the source action of a pipeline in AWS CodePipeline.</p> </li> <li> <p> <code>GITHUB</code> - The source code is in a GitHub repository.</p> </li> <li> <p> <code>`GITHUB<em>`ENTERPRISE</code> - The source code is in a GitHub Enterprise repository.</p> </li> <li> <p> <code>NO</em>SOURCE</code> - The project does not have input source code.</p> </li> <li> <p> <code>S3</code> - The source code is in an S3 input bucket. </p> </li> </ul></p>
[INFO] [stderr] | + +
[INFO] [stderr]
[INFO] [stderr] warning: unopened HTML tag `em`
[INFO] [stderr] --> src/generated.rs:1118:647
[INFO] [stderr] |
[INFO] [stderr] 1118 | ...s in a GitHub Enterprise repository.</p> </li> <li> <p> <code>NO</em>SOURCE</code> - The project does not have input source code.</p> ...
[INFO] [stderr] | ^^^^^
[INFO] [stderr]
[INFO] [stderr] warning: invalid self-closing HTML tag `p`
[INFO] [stderr] --> src/generated.rs:2782:8
[INFO] [stderr] |
[INFO] [stderr] 2782 | /// <p><p/></p>
[INFO] [stderr] | ^^
[INFO] [stderr]
[INFO] [stderr] warning: unclosed HTML tag `em`
[INFO] [stderr] --> src/generated.rs:6332:161
[INFO] [stderr] |
[INFO] [stderr] 6332 | ...ul> <li> <p> <code>COMPLIANT</code> </p> </li> <li> <p> <code>NON<em>COMPLIANT</code> </p> </li> <li> <p> <code>UNSPECIFIED</em>DATA</...
[INFO] [stderr] | ^^^^
[INFO] [stderr] |
[INFO] [stderr] help: try marking as source code
[INFO] [stderr] |
[INFO] [stderr] 6332 | /// <p><p>The current patch compliance status.</p> <p>The possible status values are:</p> <ul> <li> <p> <code>COMPLIANT</code> </p> </li> <li> <p> <code>`NON<em>`COMPLIANT</code> </p> </li> <li> <p> <code>UNSPECIFIED</em>DATA</code> </p> </li> </ul></p>
[INFO] [stderr] | + +
[INFO] [stderr]
[INFO] [stderr] warning: unopened HTML tag `em`
[INFO] [stderr] --> src/generated.rs:6332:219
[INFO] [stderr] |
[INFO] [stderr] 6332 | ...de>NON<em>COMPLIANT</code> </p> </li> <li> <p> <code>UNSPECIFIED</em>DATA</code> </p> </li> </ul></p>
[INFO] [stderr] | ^^^^^
[INFO] [stderr]
[INFO] [stderr] warning: unclosed HTML tag `em`
[INFO] [stderr] --> src/generated.rs:6496:247
[INFO] [stderr] |
[INFO] [stderr] 6496 | ...t disposition of a security finding</p> </li> <li> <p> <code>TRUE<em>POSITIVE</code> – The security finding is confirmed</p> </li> <li...
[INFO] [stderr] | ^^^^
[INFO] [stderr] |
[INFO] [stderr] help: try marking as source code
[INFO] [stderr] |
[INFO] [stderr] 6496 | /// <p><p>Indicates the veracity of a finding.</p> <p>The available values for <code>VerificationState</code> are as follows.</p> <ul> <li> <p> <code>UNKNOWN</code> – The default disposition of a security finding</p> </li> <li> <p> <code>`TRUE<em>`POSITIVE</code> – The security finding is confirmed</p> </li> <li> <p> <code>FALSE</em>POSITIVE</code> – The security finding was determined to be a false alarm</p> </li> <li> <p> <code>BENIGN<em>POSITIVE</code> – A special case of <code>TRUE</em>POSITIVE</code> where the finding doesn't pose any threat, is expected, or both</p> </li> </ul></p>
[INFO] [stderr] | + +
[INFO] [stderr]
[INFO] [stderr] warning: unopened HTML tag `em`
[INFO] [stderr] --> src/generated.rs:6496:333
[INFO] [stderr] |
[INFO] [stderr] 6496 | ...The security finding is confirmed</p> </li> <li> <p> <code>FALSE</em>POSITIVE</code> – The security finding was determined to be a fal...
[INFO] [stderr] | ^^^^^
[INFO] [stderr]
[INFO] [stderr] warning: unclosed HTML tag `em`
[INFO] [stderr] --> src/generated.rs:6496:443
[INFO] [stderr] |
[INFO] [stderr] 6496 | ...as determined to be a false alarm</p> </li> <li> <p> <code>BENIGN<em>POSITIVE</code> – A special case of <code>TRUE</em>POSITIVE</code...
[INFO] [stderr] | ^^^^
[INFO] [stderr] |
[INFO] [stderr] help: try marking as source code
[INFO] [stderr] |
[INFO] [stderr] 6496 | /// <p><p>Indicates the veracity of a finding.</p> <p>The available values for <code>VerificationState</code> are as follows.</p> <ul> <li> <p> <code>UNKNOWN</code> – The default disposition of a security finding</p> </li> <li> <p> <code>TRUE<em>POSITIVE</code> – The security finding is confirmed</p> </li> <li> <p> <code>FALSE</em>POSITIVE</code> – The security finding was determined to be a false alarm</p> </li> <li> <p> <code>`BENIGN<em>`POSITIVE</code> – A special case of <code>TRUE</em>POSITIVE</code> where the finding doesn't pose any threat, is expected, or both</p> </li> </ul></p>
[INFO] [stderr] | + +
[INFO] [stderr]
[INFO] [stderr] warning: unopened HTML tag `em`
[INFO] [stderr] --> src/generated.rs:6496:493
[INFO] [stderr] |
[INFO] [stderr] 6496 | ...> <code>BENIGN<em>POSITIVE</code> – A special case of <code>TRUE</em>POSITIVE</code> where the finding doesn't pose any threat, is...
[INFO] [stderr] | ^^^^^
[INFO] [stderr]
[INFO] [stderr] warning: unclosed HTML tag `em`
[INFO] [stderr] --> src/generated.rs:6628:468
[INFO] [stderr] |
[INFO] [stderr] 6628 | ...for at least one evaluated resource.</p> </li> <li> <p> <code>NOT<em>AVAILABLE</code> - Check could not be performed due to a service ...
[INFO] [stderr] | ^^^^
[INFO] [stderr] |
[INFO] [stderr] help: try marking as source code
[INFO] [stderr] |
[INFO] [stderr] 6628 | /// <p><p>The result of a standards check.</p> <p>The valid values for <code>Status</code> are as follows.</p> <ul> <li> <ul> <li> <p> <code>PASSED</code> - Standards check passed for all evaluated resources.</p> </li> <li> <p> <code>WARNING</code> - Some information is missing or this check is not supported for your configuration.</p> </li> <li> <p> <code>FAILED</code> - Standards check failed for at least one evaluated resource.</p> </li> <li> <p> <code>`NOT<em>`AVAILABLE</code> - Check could not be performed due to a service outage, API error, or because the result of the AWS Config evaluation was <code>NOT</em>APPLICABLE</code>. If the AWS Config evaluation result was <code>NOT_APPLICABLE</code>, then after 3 days, Security Hub automatically archives the finding.</p> </li> </ul> </li> </ul></p>
[INFO] [stderr] | + +
[INFO] [stderr]
[INFO] [stderr] warning: unopened HTML tag `em`
[INFO] [stderr] --> src/generated.rs:6628:620
[INFO] [stderr] |
[INFO] [stderr] 6628 | ...or because the result of the AWS Config evaluation was <code>NOT</em>APPLICABLE</code>. If the AWS Config evaluation result was <code>...
[INFO] [stderr] | ^^^^^
[INFO] [stderr]
[INFO] [stderr] warning: unclosed HTML tag `em`
[INFO] [stderr] --> src/generated.rs:8701:1236
[INFO] [stderr] |
[INFO] [stderr] 8701 | ... values that do not exactly match the filter value, use <code>NOT<em>EQUALS</code>.</p> <p>For example, the filter <code>ResourceType ...
[INFO] [stderr] | ^^^^
[INFO] [stderr] |
[INFO] [stderr] help: try marking as source code
[INFO] [stderr] |
[INFO] [stderr] 8701 | /// <p><p>The condition to apply to a string value when querying for findings. To search for values that contain the filter criteria value, use one of the following comparison operators:</p> <ul> <li> <p>To search for values that exactly match the filter value, use <code>EQUALS</code>.</p> <p>For example, the filter <code>ResourceType EQUALS AwsEc2SecurityGroup</code> only matches findings that have a resource type of <code>AwsEc2SecurityGroup</code>.</p> </li> <li> <p>To search for values that start with the filter value, use <code>PREFIX</code>.</p> <p>For example, the filter <code>ResourceType PREFIX AwsIam</code> matches findings that have a resource type that starts with <code>AwsIam</code>. Findings with a resource type of <code>AwsIamPolicy</code>, <code>AwsIamRole</code>, or <code>AwsIamUser</code> would all match.</p> </li> </ul> <p> <code>EQUALS</code> and <code>PREFIX</code> filters on the same field are joined by <code>OR</code>. A finding matches if it matches any one of those filters.</p> <p>To search for values that do not contain the filter criteria value, use one of the following comparison operators:</p> <ul> <li> <p>To search for values that do not exactly match the filter value, use <code>`NOT<em>`EQUALS</code>.</p> <p>For example, the filter <code>ResourceType NOT</em>EQUALS AwsIamPolicy</code> matches findings that have a resource type other than <code>AwsIamPolicy</code>.</p> </li> <li> <p>To search for values that do not start with the filter value, use <code>PREFIX<em>NOT</em>EQUALS</code>.</p> <p>For example, the filter <code>ResourceType PREFIX<em>NOT</em>EQUALS AwsIam</code> matches findings that have a resource type that does not start with <code>AwsIam</code>. Findings with a resource type of <code>AwsIamPolicy</code>, <code>AwsIamRole</code>, or <code>AwsIamUser</code> would all be excluded from the results.</p> </li> </ul> <p> <code>NOT<em>EQUALS</code> and <code>PREFIX</em>NOT<em>EQUALS</code> filters on the same field are joined by <code>AND</code>. A finding matches only if it matches all of those filters.</p> <p>For filters on the same field, you cannot provide both an <code>EQUALS</code> filter and a <code>NOT</em>EQUALS</code> or <code>PREFIX<em>NOT</em>EQUALS</code> filter. Combining filters in this way always returns an error, even if the provided filter values would return valid results.</p> <p>You can combine <code>PREFIX</code> filters with <code>NOT<em>EQUALS</code> or <code>PREFIX</em>NOT<em>EQUALS</code> filters for the same field. Security Hub first processes the <code>PREFIX</code> filters, then the <code>NOT</em>EQUALS</code> or <code>PREFIX<em>NOT</em>EQUALS</code> filters.</p> <p> For example, for the following filter, Security Hub first identifies findings that have resource types that start with either <code>AwsIAM</code> or <code>AwsEc2</code>. It then excludes findings that have a resource type of <code>AwsIamPolicy</code> and findings that have a resource type of <code>AwsEc2NetworkInterface</code>.</p> <ul> <li> <p> <code>ResourceType PREFIX AwsIam</code> </p> </li> <li> <p> <code>ResourceType PREFIX AwsEc2</code> </p> </li> <li> <p> <code>ResourceType NOT<em>EQUALS AwsIamPolicy</code> </p> </li> <li> <p> <code>ResourceType NOT</em>EQUALS AwsEc2NetworkInterface</code> </p> </li> </ul></p>
[INFO] [stderr] | + +
[INFO] [stderr]
[INFO] [stderr] warning: unopened HTML tag `em`
[INFO] [stderr] --> src/generated.rs:8701:1308
[INFO] [stderr] |
[INFO] [stderr] 8701 | ...LS</code>.</p> <p>For example, the filter <code>ResourceType NOT</em>EQUALS AwsIamPolicy</code> matches findings that have a resource ...
[INFO] [stderr] | ^^^^^
[INFO] [stderr]
[INFO] [stderr] warning: unclosed HTML tag `em`
[INFO] [stderr] --> src/generated.rs:8701:1903
[INFO] [stderr] |
[INFO] [stderr] 8701 | ...d all be excluded from the results.</p> </li> </ul> <p> <code>NOT<em>EQUALS</code> and <code>PREFIX</em>NOT<em>EQUALS</code> filters o...
[INFO] [stderr] | ^^^^
[INFO] [stderr] |
[INFO] [stderr] help: try marking as source code
[INFO] [stderr] |
[INFO] [stderr] 8701 | /// <p><p>The condition to apply to a string value when querying for findings. To search for values that contain the filter criteria value, use one of the following comparison operators:</p> <ul> <li> <p>To search for values that exactly match the filter value, use <code>EQUALS</code>.</p> <p>For example, the filter <code>ResourceType EQUALS AwsEc2SecurityGroup</code> only matches findings that have a resource type of <code>AwsEc2SecurityGroup</code>.</p> </li> <li> <p>To search for values that start with the filter value, use <code>PREFIX</code>.</p> <p>For example, the filter <code>ResourceType PREFIX AwsIam</code> matches findings that have a resource type that starts with <code>AwsIam</code>. Findings with a resource type of <code>AwsIamPolicy</code>, <code>AwsIamRole</code>, or <code>AwsIamUser</code> would all match.</p> </li> </ul> <p> <code>EQUALS</code> and <code>PREFIX</code> filters on the same field are joined by <code>OR</code>. A finding matches if it matches any one of those filters.</p> <p>To search for values that do not contain the filter criteria value, use one of the following comparison operators:</p> <ul> <li> <p>To search for values that do not exactly match the filter value, use <code>NOT<em>EQUALS</code>.</p> <p>For example, the filter <code>ResourceType NOT</em>EQUALS AwsIamPolicy</code> matches findings that have a resource type other than <code>AwsIamPolicy</code>.</p> </li> <li> <p>To search for values that do not start with the filter value, use <code>PREFIX<em>NOT</em>EQUALS</code>.</p> <p>For example, the filter <code>ResourceType PREFIX<em>NOT</em>EQUALS AwsIam</code> matches findings that have a resource type that does not start with <code>AwsIam</code>. Findings with a resource type of <code>AwsIamPolicy</code>, <code>AwsIamRole</code>, or <code>AwsIamUser</code> would all be excluded from the results.</p> </li> </ul> <p> <code>`NOT<em>`EQUALS</code> and <code>PREFIX</em>NOT<em>EQUALS</code> filters on the same field are joined by <code>AND</code>. A finding matches only if it matches all of those filters.</p> <p>For filters on the same field, you cannot provide both an <code>EQUALS</code> filter and a <code>NOT</em>EQUALS</code> or <code>PREFIX<em>NOT</em>EQUALS</code> filter. Combining filters in this way always returns an error, even if the provided filter values would return valid results.</p> <p>You can combine <code>PREFIX</code> filters with <code>NOT<em>EQUALS</code> or <code>PREFIX</em>NOT<em>EQUALS</code> filters for the same field. Security Hub first processes the <code>PREFIX</code> filters, then the <code>NOT</em>EQUALS</code> or <code>PREFIX<em>NOT</em>EQUALS</code> filters.</p> <p> For example, for the following filter, Security Hub first identifies findings that have resource types that start with either <code>AwsIAM</code> or <code>AwsEc2</code>. It then excludes findings that have a resource type of <code>AwsIamPolicy</code> and findings that have a resource type of <code>AwsEc2NetworkInterface</code>.</p> <ul> <li> <p> <code>ResourceType PREFIX AwsIam</code> </p> </li> <li> <p> <code>ResourceType PREFIX AwsEc2</code> </p> </li> <li> <p> <code>ResourceType NOT<em>EQUALS AwsIamPolicy</code> </p> </li> <li> <p> <code>ResourceType NOT</em>EQUALS AwsEc2NetworkInterface</code> </p> </li> </ul></p>
[INFO] [stderr] | + +
[INFO] [stderr]
[INFO] [stderr] warning: unopened HTML tag `em`
[INFO] [stderr] --> src/generated.rs:8701:1937
[INFO] [stderr] |
[INFO] [stderr] 8701 | ...</p> </li> </ul> <p> <code>NOT<em>EQUALS</code> and <code>PREFIX</em>NOT<em>EQUALS</code> filters on the same field are joined by <cod...
[INFO] [stderr] | ^^^^^
[INFO] [stderr]
[INFO] [stderr] warning: unclosed HTML tag `em`
[INFO] [stderr] --> src/generated.rs:8701:1945
[INFO] [stderr] |
[INFO] [stderr] 8701 | ...li> </ul> <p> <code>NOT<em>EQUALS</code> and <code>PREFIX</em>NOT<em>EQUALS</code> filters on the same field are joined by <code>AND</...
[INFO] [stderr] | ^^^^
[INFO] [stderr] |
[INFO] [stderr] help: try marking as source code
[INFO] [stderr] |
[INFO] [stderr] 8701 | /// <p><p>The condition to apply to a string value when querying for findings. To search for values that contain the filter criteria value, use one of the following comparison operators:</p> <ul> <li> <p>To search for values that exactly match the filter value, use <code>EQUALS</code>.</p> <p>For example, the filter <code>ResourceType EQUALS AwsEc2SecurityGroup</code> only matches findings that have a resource type of <code>AwsEc2SecurityGroup</code>.</p> </li> <li> <p>To search for values that start with the filter value, use <code>PREFIX</code>.</p> <p>For example, the filter <code>ResourceType PREFIX AwsIam</code> matches findings that have a resource type that starts with <code>AwsIam</code>. Findings with a resource type of <code>AwsIamPolicy</code>, <code>AwsIamRole</code>, or <code>AwsIamUser</code> would all match.</p> </li> </ul> <p> <code>EQUALS</code> and <code>PREFIX</code> filters on the same field are joined by <code>OR</code>. A finding matches if it matches any one of those filters.</p> <p>To search for values that do not contain the filter criteria value, use one of the following comparison operators:</p> <ul> <li> <p>To search for values that do not exactly match the filter value, use <code>NOT<em>EQUALS</code>.</p> <p>For example, the filter <code>ResourceType NOT</em>EQUALS AwsIamPolicy</code> matches findings that have a resource type other than <code>AwsIamPolicy</code>.</p> </li> <li> <p>To search for values that do not start with the filter value, use <code>PREFIX<em>NOT</em>EQUALS</code>.</p> <p>For example, the filter <code>ResourceType PREFIX<em>NOT</em>EQUALS AwsIam</code> matches findings that have a resource type that does not start with <code>AwsIam</code>. Findings with a resource type of <code>AwsIamPolicy</code>, <code>AwsIamRole</code>, or <code>AwsIamUser</code> would all be excluded from the results.</p> </li> </ul> <p> <code>NOT<em>EQUALS</code> and <code>PREFIX</em>`NOT<em>`EQUALS</code> filters on the same field are joined by <code>AND</code>. A finding matches only if it matches all of those filters.</p> <p>For filters on the same field, you cannot provide both an <code>EQUALS</code> filter and a <code>NOT</em>EQUALS</code> or <code>PREFIX<em>NOT</em>EQUALS</code> filter. Combining filters in this way always returns an error, even if the provided filter values would return valid results.</p> <p>You can combine <code>PREFIX</code> filters with <code>NOT<em>EQUALS</code> or <code>PREFIX</em>NOT<em>EQUALS</code> filters for the same field. Security Hub first processes the <code>PREFIX</code> filters, then the <code>NOT</em>EQUALS</code> or <code>PREFIX<em>NOT</em>EQUALS</code> filters.</p> <p> For example, for the following filter, Security Hub first identifies findings that have resource types that start with either <code>AwsIAM</code> or <code>AwsEc2</code>. It then excludes findings that have a resource type of <code>AwsIamPolicy</code> and findings that have a resource type of <code>AwsEc2NetworkInterface</code>.</p> <ul> <li> <p> <code>ResourceType PREFIX AwsIam</code> </p> </li> <li> <p> <code>ResourceType PREFIX AwsEc2</code> </p> </li> <li> <p> <code>ResourceType NOT<em>EQUALS AwsIamPolicy</code> </p> </li> <li> <p> <code>ResourceType NOT</em>EQUALS AwsEc2NetworkInterface</code> </p> </li> </ul></p>
[INFO] [stderr] | + +
[INFO] [stderr]
[INFO] [stderr] warning: unopened HTML tag `em`
[INFO] [stderr] --> src/generated.rs:8701:2187
[INFO] [stderr] |
[INFO] [stderr] 8701 | ...annot provide both an <code>EQUALS</code> filter and a <code>NOT</em>EQUALS</code> or <code>PREFIX<em>NOT</em>EQUALS</code> filter. Co...
[INFO] [stderr] | ^^^^^
[INFO] [stderr]
[INFO] [stderr] warning: unclosed HTML tag `em`
[INFO] [stderr] --> src/generated.rs:8701:2438
[INFO] [stderr] |
[INFO] [stderr] 8701 | .../p> <p>You can combine <code>PREFIX</code> filters with <code>NOT<em>EQUALS</code> or <code>PREFIX</em>NOT<em>EQUALS</code> filters fo...
[INFO] [stderr] | ^^^^
[INFO] [stderr] |
[INFO] [stderr] help: try marking as source code
[INFO] [stderr] |
[INFO] [stderr] 8701 | /// <p><p>The condition to apply to a string value when querying for findings. To search for values that contain the filter criteria value, use one of the following comparison operators:</p> <ul> <li> <p>To search for values that exactly match the filter value, use <code>EQUALS</code>.</p> <p>For example, the filter <code>ResourceType EQUALS AwsEc2SecurityGroup</code> only matches findings that have a resource type of <code>AwsEc2SecurityGroup</code>.</p> </li> <li> <p>To search for values that start with the filter value, use <code>PREFIX</code>.</p> <p>For example, the filter <code>ResourceType PREFIX AwsIam</code> matches findings that have a resource type that starts with <code>AwsIam</code>. Findings with a resource type of <code>AwsIamPolicy</code>, <code>AwsIamRole</code>, or <code>AwsIamUser</code> would all match.</p> </li> </ul> <p> <code>EQUALS</code> and <code>PREFIX</code> filters on the same field are joined by <code>OR</code>. A finding matches if it matches any one of those filters.</p> <p>To search for values that do not contain the filter criteria value, use one of the following comparison operators:</p> <ul> <li> <p>To search for values that do not exactly match the filter value, use <code>NOT<em>EQUALS</code>.</p> <p>For example, the filter <code>ResourceType NOT</em>EQUALS AwsIamPolicy</code> matches findings that have a resource type other than <code>AwsIamPolicy</code>.</p> </li> <li> <p>To search for values that do not start with the filter value, use <code>PREFIX<em>NOT</em>EQUALS</code>.</p> <p>For example, the filter <code>ResourceType PREFIX<em>NOT</em>EQUALS AwsIam</code> matches findings that have a resource type that does not start with <code>AwsIam</code>. Findings with a resource type of <code>AwsIamPolicy</code>, <code>AwsIamRole</code>, or <code>AwsIamUser</code> would all be excluded from the results.</p> </li> </ul> <p> <code>NOT<em>EQUALS</code> and <code>PREFIX</em>NOT<em>EQUALS</code> filters on the same field are joined by <code>AND</code>. A finding matches only if it matches all of those filters.</p> <p>For filters on the same field, you cannot provide both an <code>EQUALS</code> filter and a <code>NOT</em>EQUALS</code> or <code>PREFIX<em>NOT</em>EQUALS</code> filter. Combining filters in this way always returns an error, even if the provided filter values would return valid results.</p> <p>You can combine <code>PREFIX</code> filters with <code>`NOT<em>`EQUALS</code> or <code>PREFIX</em>NOT<em>EQUALS</code> filters for the same field. Security Hub first processes the <code>PREFIX</code> filters, then the <code>NOT</em>EQUALS</code> or <code>PREFIX<em>NOT</em>EQUALS</code> filters.</p> <p> For example, for the following filter, Security Hub first identifies findings that have resource types that start with either <code>AwsIAM</code> or <code>AwsEc2</code>. It then excludes findings that have a resource type of <code>AwsIamPolicy</code> and findings that have a resource type of <code>AwsEc2NetworkInterface</code>.</p> <ul> <li> <p> <code>ResourceType PREFIX AwsIam</code> </p> </li> <li> <p> <code>ResourceType PREFIX AwsEc2</code> </p> </li> <li> <p> <code>ResourceType NOT<em>EQUALS AwsIamPolicy</code> </p> </li> <li> <p> <code>ResourceType NOT</em>EQUALS AwsEc2NetworkInterface</code> </p> </li> </ul></p>
[INFO] [stderr] | + +
[INFO] [stderr]
[INFO] [stderr] warning: unopened HTML tag `em`
[INFO] [stderr] --> src/generated.rs:8701:2471
[INFO] [stderr] |
[INFO] [stderr] 8701 | ...X</code> filters with <code>NOT<em>EQUALS</code> or <code>PREFIX</em>NOT<em>EQUALS</code> filters for the same field. Security Hub fir...
[INFO] [stderr] | ^^^^^
[INFO] [stderr]
[INFO] [stderr] warning: unclosed HTML tag `em`
[INFO] [stderr] --> src/generated.rs:8701:2479
[INFO] [stderr] |
[INFO] [stderr] 8701 | ...> filters with <code>NOT<em>EQUALS</code> or <code>PREFIX</em>NOT<em>EQUALS</code> filters for the same field. Security Hub first proc...
[INFO] [stderr] | ^^^^
[INFO] [stderr] |
[INFO] [stderr] help: try marking as source code
[INFO] [stderr] |
[INFO] [stderr] 8701 | /// <p><p>The condition to apply to a string value when querying for findings. To search for values that contain the filter criteria value, use one of the following comparison operators:</p> <ul> <li> <p>To search for values that exactly match the filter value, use <code>EQUALS</code>.</p> <p>For example, the filter <code>ResourceType EQUALS AwsEc2SecurityGroup</code> only matches findings that have a resource type of <code>AwsEc2SecurityGroup</code>.</p> </li> <li> <p>To search for values that start with the filter value, use <code>PREFIX</code>.</p> <p>For example, the filter <code>ResourceType PREFIX AwsIam</code> matches findings that have a resource type that starts with <code>AwsIam</code>. Findings with a resource type of <code>AwsIamPolicy</code>, <code>AwsIamRole</code>, or <code>AwsIamUser</code> would all match.</p> </li> </ul> <p> <code>EQUALS</code> and <code>PREFIX</code> filters on the same field are joined by <code>OR</code>. A finding matches if it matches any one of those filters.</p> <p>To search for values that do not contain the filter criteria value, use one of the following comparison operators:</p> <ul> <li> <p>To search for values that do not exactly match the filter value, use <code>NOT<em>EQUALS</code>.</p> <p>For example, the filter <code>ResourceType NOT</em>EQUALS AwsIamPolicy</code> matches findings that have a resource type other than <code>AwsIamPolicy</code>.</p> </li> <li> <p>To search for values that do not start with the filter value, use <code>PREFIX<em>NOT</em>EQUALS</code>.</p> <p>For example, the filter <code>ResourceType PREFIX<em>NOT</em>EQUALS AwsIam</code> matches findings that have a resource type that does not start with <code>AwsIam</code>. Findings with a resource type of <code>AwsIamPolicy</code>, <code>AwsIamRole</code>, or <code>AwsIamUser</code> would all be excluded from the results.</p> </li> </ul> <p> <code>NOT<em>EQUALS</code> and <code>PREFIX</em>NOT<em>EQUALS</code> filters on the same field are joined by <code>AND</code>. A finding matches only if it matches all of those filters.</p> <p>For filters on the same field, you cannot provide both an <code>EQUALS</code> filter and a <code>NOT</em>EQUALS</code> or <code>PREFIX<em>NOT</em>EQUALS</code> filter. Combining filters in this way always returns an error, even if the provided filter values would return valid results.</p> <p>You can combine <code>PREFIX</code> filters with <code>NOT<em>EQUALS</code> or <code>PREFIX</em>`NOT<em>`EQUALS</code> filters for the same field. Security Hub first processes the <code>PREFIX</code> filters, then the <code>NOT</em>EQUALS</code> or <code>PREFIX<em>NOT</em>EQUALS</code> filters.</p> <p> For example, for the following filter, Security Hub first identifies findings that have resource types that start with either <code>AwsIAM</code> or <code>AwsEc2</code>. It then excludes findings that have a resource type of <code>AwsIamPolicy</code> and findings that have a resource type of <code>AwsEc2NetworkInterface</code>.</p> <ul> <li> <p> <code>ResourceType PREFIX AwsIam</code> </p> </li> <li> <p> <code>ResourceType PREFIX AwsEc2</code> </p> </li> <li> <p> <code>ResourceType NOT<em>EQUALS AwsIamPolicy</code> </p> </li> <li> <p> <code>ResourceType NOT</em>EQUALS AwsEc2NetworkInterface</code> </p> </li> </ul></p>
[INFO] [stderr] | + +
[INFO] [stderr]
[INFO] [stderr] warning: unopened HTML tag `em`
[INFO] [stderr] --> src/generated.rs:8701:2605
[INFO] [stderr] |
[INFO] [stderr] 8701 | ...st processes the <code>PREFIX</code> filters, then the <code>NOT</em>EQUALS</code> or <code>PREFIX<em>NOT</em>EQUALS</code> filters.</...
[INFO] [stderr] | ^^^^^
[INFO] [stderr]
[INFO] [stderr] warning: unclosed HTML tag `em`
[INFO] [stderr] --> src/generated.rs:8701:3172
[INFO] [stderr] |
[INFO] [stderr] 8701 | ...e PREFIX AwsEc2</code> </p> </li> <li> <p> <code>ResourceType NOT<em>EQUALS AwsIamPolicy</code> </p> </li> <li> <p> <code>ResourceType...
[INFO] [stderr] | ^^^^
[INFO] [stderr] |
[INFO] [stderr] help: try marking as source code
[INFO] [stderr] |
[INFO] [stderr] 8701 | /// <p><p>The condition to apply to a string value when querying for findings. To search for values that contain the filter criteria value, use one of the following comparison operators:</p> <ul> <li> <p>To search for values that exactly match the filter value, use <code>EQUALS</code>.</p> <p>For example, the filter <code>ResourceType EQUALS AwsEc2SecurityGroup</code> only matches findings that have a resource type of <code>AwsEc2SecurityGroup</code>.</p> </li> <li> <p>To search for values that start with the filter value, use <code>PREFIX</code>.</p> <p>For example, the filter <code>ResourceType PREFIX AwsIam</code> matches findings that have a resource type that starts with <code>AwsIam</code>. Findings with a resource type of <code>AwsIamPolicy</code>, <code>AwsIamRole</code>, or <code>AwsIamUser</code> would all match.</p> </li> </ul> <p> <code>EQUALS</code> and <code>PREFIX</code> filters on the same field are joined by <code>OR</code>. A finding matches if it matches any one of those filters.</p> <p>To search for values that do not contain the filter criteria value, use one of the following comparison operators:</p> <ul> <li> <p>To search for values that do not exactly match the filter value, use <code>NOT<em>EQUALS</code>.</p> <p>For example, the filter <code>ResourceType NOT</em>EQUALS AwsIamPolicy</code> matches findings that have a resource type other than <code>AwsIamPolicy</code>.</p> </li> <li> <p>To search for values that do not start with the filter value, use <code>PREFIX<em>NOT</em>EQUALS</code>.</p> <p>For example, the filter <code>ResourceType PREFIX<em>NOT</em>EQUALS AwsIam</code> matches findings that have a resource type that does not start with <code>AwsIam</code>. Findings with a resource type of <code>AwsIamPolicy</code>, <code>AwsIamRole</code>, or <code>AwsIamUser</code> would all be excluded from the results.</p> </li> </ul> <p> <code>NOT<em>EQUALS</code> and <code>PREFIX</em>NOT<em>EQUALS</code> filters on the same field are joined by <code>AND</code>. A finding matches only if it matches all of those filters.</p> <p>For filters on the same field, you cannot provide both an <code>EQUALS</code> filter and a <code>NOT</em>EQUALS</code> or <code>PREFIX<em>NOT</em>EQUALS</code> filter. Combining filters in this way always returns an error, even if the provided filter values would return valid results.</p> <p>You can combine <code>PREFIX</code> filters with <code>NOT<em>EQUALS</code> or <code>PREFIX</em>NOT<em>EQUALS</code> filters for the same field. Security Hub first processes the <code>PREFIX</code> filters, then the <code>NOT</em>EQUALS</code> or <code>PREFIX<em>NOT</em>EQUALS</code> filters.</p> <p> For example, for the following filter, Security Hub first identifies findings that have resource types that start with either <code>AwsIAM</code> or <code>AwsEc2</code>. It then excludes findings that have a resource type of <code>AwsIamPolicy</code> and findings that have a resource type of <code>AwsEc2NetworkInterface</code>.</p> <ul> <li> <p> <code>ResourceType PREFIX AwsIam</code> </p> </li> <li> <p> <code>ResourceType PREFIX AwsEc2</code> </p> </li> <li> <p> <code>ResourceType `NOT<em>`EQUALS AwsIamPolicy</code> </p> </li> <li> <p> <code>ResourceType NOT</em>EQUALS AwsEc2NetworkInterface</code> </p> </li> </ul></p>
[INFO] [stderr] | + +
[INFO] [stderr]
[INFO] [stderr] warning: unopened HTML tag `em`
[INFO] [stderr] --> src/generated.rs:8701:3245
[INFO] [stderr] |
[INFO] [stderr] 8701 | ...S AwsIamPolicy</code> </p> </li> <li> <p> <code>ResourceType NOT</em>EQUALS AwsEc2NetworkInterface</code> </p> </li> </ul></p>
[INFO] [stderr] | ^^^^^
[INFO] [stderr]
[INFO] [stderr] warning: `rusoto_securityhub` (lib doc) generated 27 warnings
[INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 4.79s
[INFO] [stderr] Generated /opt/rustwide/target/x86_64-unknown-linux-gnu/doc/rusoto_securityhub/index.html
[INFO] running `Command { std: "docker" "inspect" "92dbf5a88040d7f819fd6d6b0d13a096f929a69aa548d57946bf3133077ff68d", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "92dbf5a88040d7f819fd6d6b0d13a096f929a69aa548d57946bf3133077ff68d", kill_on_drop: false }`
[INFO] [stdout] 92dbf5a88040d7f819fd6d6b0d13a096f929a69aa548d57946bf3133077ff68d