diff --git a/asset-manifest.json b/asset-manifest.json index 09486ee7..1f1075a7 100644 --- a/asset-manifest.json +++ b/asset-manifest.json @@ -1,7 +1,7 @@ { "files": { "main.css": "/api-documentation-frontend/static/css/main.3cc1bf37.css", - "main.js": "/api-documentation-frontend/static/js/main.1d3474e0.js", + "main.js": "/api-documentation-frontend/static/js/main.d1e151bc.js", "static/js/5322.37959faf.chunk.js": "/api-documentation-frontend/static/js/5322.37959faf.chunk.js", "static/js/9511.0184e6df.chunk.js": "/api-documentation-frontend/static/js/9511.0184e6df.chunk.js", "static/js/1087.242821e0.chunk.js": "/api-documentation-frontend/static/js/1087.242821e0.chunk.js", @@ -32,7 +32,7 @@ "static/js/7325.0fe7bf16.chunk.js": "/api-documentation-frontend/static/js/7325.0fe7bf16.chunk.js", "static/js/6865.ec9ea981.chunk.js": "/api-documentation-frontend/static/js/6865.ec9ea981.chunk.js", "static/js/7832.0344219f.chunk.js": "/api-documentation-frontend/static/js/7832.0344219f.chunk.js", - "static/js/5781.4b22b0f2.chunk.js": "/api-documentation-frontend/static/js/5781.4b22b0f2.chunk.js", + "static/js/5781.8699be94.chunk.js": "/api-documentation-frontend/static/js/5781.8699be94.chunk.js", "static/js/8171.64234381.chunk.js": "/api-documentation-frontend/static/js/8171.64234381.chunk.js", "static/js/4982.fc641823.chunk.js": "/api-documentation-frontend/static/js/4982.fc641823.chunk.js", "static/js/750.7e565c9f.chunk.js": "/api-documentation-frontend/static/js/750.7e565c9f.chunk.js", @@ -43,7 +43,7 @@ "static/js/7352.4d56e13e.chunk.js": "/api-documentation-frontend/static/js/7352.4d56e13e.chunk.js", "static/js/4147.b7c52098.chunk.js": "/api-documentation-frontend/static/js/4147.b7c52098.chunk.js", "static/js/5271.975aa159.chunk.js": "/api-documentation-frontend/static/js/5271.975aa159.chunk.js", - "static/js/8387.0ae35a35.chunk.js": "/api-documentation-frontend/static/js/8387.0ae35a35.chunk.js", + "static/js/8387.46169d91.chunk.js": "/api-documentation-frontend/static/js/8387.46169d91.chunk.js", "static/js/6760.3a7fb545.chunk.js": "/api-documentation-frontend/static/js/6760.3a7fb545.chunk.js", "static/js/7299.8c76628a.chunk.js": "/api-documentation-frontend/static/js/7299.8c76628a.chunk.js", "static/js/5328.f35f9abe.chunk.js": "/api-documentation-frontend/static/js/5328.f35f9abe.chunk.js", @@ -132,7 +132,7 @@ "static/media/status-icon-sprite.svg": "/api-documentation-frontend/static/media/status-icon-sprite.4fee9fefc3971799d2dd.svg", "index.html": "/api-documentation-frontend/index.html", "main.3cc1bf37.css.map": "/api-documentation-frontend/static/css/main.3cc1bf37.css.map", - "main.1d3474e0.js.map": "/api-documentation-frontend/static/js/main.1d3474e0.js.map", + "main.d1e151bc.js.map": "/api-documentation-frontend/static/js/main.d1e151bc.js.map", "7299.8c76628a.chunk.js.map": "/api-documentation-frontend/static/js/7299.8c76628a.chunk.js.map", "5328.f35f9abe.chunk.js.map": "/api-documentation-frontend/static/js/5328.f35f9abe.chunk.js.map", "7615.c56e9218.chunk.js.map": "/api-documentation-frontend/static/js/7615.c56e9218.chunk.js.map", @@ -145,6 +145,6 @@ }, "entrypoints": [ "static/css/main.3cc1bf37.css", - "static/js/main.1d3474e0.js" + "static/js/main.d1e151bc.js" ] } \ No newline at end of file diff --git a/index.html b/index.html index d0833b0c..724eeadb 100644 --- a/index.html +++ b/index.html @@ -1 +1 @@ -API Catalog
\ No newline at end of file +API Catalog
\ No newline at end of file diff --git a/static/js/5781.4b22b0f2.chunk.js b/static/js/5781.8699be94.chunk.js similarity index 99% rename from static/js/5781.4b22b0f2.chunk.js rename to static/js/5781.8699be94.chunk.js index 5787df74..3a7ddc46 100644 --- a/static/js/5781.4b22b0f2.chunk.js +++ b/static/js/5781.8699be94.chunk.js @@ -1 +1 @@ -"use strict";(self.webpackChunkapidocs=self.webpackChunkapidocs||[]).push([[5781],{75781:function(e){e.exports=JSON.parse('{"extras":{},"openapi":{"components":{"parameters":{"account_id":{"description":"Account ID of user.","example":"123456","in":"path","name":"account_id","required":true,"schema":{"type":"string"}},"advanced_report":{"description":"Needs to be used when endpoint data is used for Report by CVEs feature, checks RBAC permission for advanced report.","example":false,"in":"query","name":"advanced_report","schema":{"type":"boolean"}},"advisory":{"description":"Filter by advisory name, works only with show_advisories=true","example":"RHSA-2019:1481","in":"query","name":"advisory","schema":{"type":"string"}},"advisory_available":{"description":"String of booleans (array of booleans), where true shows CVE-system pairs with available advisory, false shows CVE-system pairs without available advisory.","example":"true,false","in":"query","name":"advisory_available","schema":{"items":{"type":"boolean"},"maxItems":2,"type":"array"}},"affecting":{"description":"Comma seprated string with bools (array of bools). True value controls displaying CVEs with at least one system affected. False value toggles CVEs with no systems affected. Defaults to showing only CVEs with at least one system affected.","example":"true,false","in":"query","name":"affecting","schema":{"items":{"type":"boolean"},"maxItems":2,"type":"array"}},"affecting_host_type":{"description":"Controls, whenever CVE has 1 or more affecting systems. Value \\"edge\\" returns CVEs with one or more vulnerable immutable systems, value \\"rpmdnf\\" returns CVEs with one or more vulnerable conventional systems. Value \\"none\\" returns CVEs not affecting systems of any kind.","example":"edge,none","in":"query","name":"affecting_host_type","schema":{"items":{"enum":["rpmdnf","edge","none"],"type":"string"},"maxItems":3,"type":"array"}},"ansible":{"description":"Boolean value which shows systems managed by Ansible Automation Platform.","example":false,"in":"query","name":"ansible","schema":{"type":"boolean"}},"business_risk_id":{"description":"Filter based on business risk IDs.","in":"query","name":"business_risk_id","schema":{"example":"1,3","type":"string"}},"cve_filter":{"description":"Full text filter for CVE and it\'s description text.","example":"CVE-2017","in":"query","name":"filter","schema":{"type":"string"}},"cve_id":{"description":"CVE id.","example":"CVE-2016-0800","in":"path","name":"cve_id","required":true,"schema":{"type":"string"}},"cve_sort":{"description":"Sorting used for response.","example":"-synopsis","in":"query","name":"sort","schema":{"type":"string"}},"cvss_from":{"description":"Filter based on cvss score, starting from the value. Use -1 to include also CVEs with N/A cvss score.","example":4.6,"in":"query","name":"cvss_from","schema":{"type":"number"}},"cvss_to":{"description":"Filter based on cvss score, up to the value.","example":7.2,"in":"query","name":"cvss_to","schema":{"type":"number"}},"data_format":{"description":"Format of the output data, either JSON (default) or CSV.","in":"query","name":"data_format","schema":{"example":"json","type":"string"}},"excluded":{"description":"Comma seprated string with bools (array of bools). True boolean value displays systems which are excluded. False value displays systems excluded from vulnerability analysis. Defaults to showing only those systems which are not excluded.","example":"true,false","in":"query","name":"excluded","schema":{"items":{"type":"boolean"},"maxItems":2,"type":"array"}},"filter":{"description":"Full text filter for the display name of system.","example":"INV-ID-1234","in":"query","name":"filter","schema":{"type":"string"}},"first_reported_from":{"description":"Filter for CVEs/Systems where the vulnerability appeared after given date.","example":"2017-09-18T00:00:00+00:00","in":"query","name":"first_reported_from","required":false,"schema":{"description":"Datetime string","type":"string"}},"first_reported_to":{"description":"Filter for CVEs/Systems where the vulnerability appeared before given date.","example":"2017-09-18T00:00:00+00:00","in":"query","name":"first_reported_to","required":false,"schema":{"description":"Datetime string","type":"string"}},"group_ids":{"description":"IDs of the inventory groups.","example":"00000000-1111-0000-0000-000000000000,00000000-2222-0000-0000-000000000000","in":"query","name":"group_ids","schema":{"items":{"type":"string"},"type":"array"}},"group_names":{"description":"Names of the inventory groups.","example":"Production,Stage","in":"query","name":"group_names","schema":{"items":{"type":"string"},"type":"array"}},"host_type":{"description":"For filtering out the systems based on their type. Value \\"rpmdnf\\" for RPMDNF systems, \\"edge\\" for OSTree systems.","in":"query","name":"host_type","schema":{"items":{"enum":["rpmdnf","edge"],"type":"string"},"maxItems":2,"type":"array"}},"impact":{"description":"Filter based on impact IDs.","example":"5,7","in":"query","name":"impact","schema":{"type":"string"}},"inventory_id":{"description":"Inventory ID.","example":"INV-ID-0000-1234","in":"path","name":"inventory_id","required":true,"schema":{"format":"uuid","type":"string"}},"known_exploit":{"description":"String of booleans (array of booleans), where true shows CVEs with known exploits, false shows CVEs without known exploits.","example":"true,false","in":"query","name":"known_exploit","schema":{"items":{"type":"boolean"},"maxItems":2,"type":"array"}},"limit":{"description":"Maximum number of records per page. Limit/Offset pagination wins over page/page_size pagination.","example":25,"in":"query","name":"limit","schema":{"maximum":9007199254740991,"minimum":1,"type":"integer"}},"mssql":{"description":"Boolean value which shows systems managed by MSSQL.","example":false,"in":"query","name":"mssql","schema":{"type":"boolean"}},"offset":{"description":"Offset of first record of paginated response. Limit/Offset pagination wins over page/page_size pagination.","example":1,"in":"query","name":"offset","schema":{"maximum":9007199254740991,"minimum":0,"type":"integer"}},"page":{"description":"Page number of paginated response. Limit/Offset pagination wins over page/page_size pagination.","example":1,"in":"query","name":"page","schema":{"maximum":9007199254740991,"minimum":1,"type":"integer"}},"page_size":{"description":"Page size of paginated response. Limit/Offset pagination wins over page/page_size pagination.","example":25,"in":"query","name":"page_size","schema":{"maximum":9007199254740991,"minimum":1,"type":"integer"}},"public_from":{"description":"Filter CVEs based on their published date, starting from the date.","example":"2017-09-18T00:00:00+00:00","in":"query","name":"public_from","schema":{"type":"string"}},"public_to":{"description":"Filter CVEs based on their published date, up to the date.","example":"2017-09-18T00:00:00+00:00","in":"query","name":"public_to","schema":{"type":"string"}},"remediation":{"description":"Filer based on available remediation type id.","in":"query","name":"remediation","schema":{"example":1,"type":"string"}},"report":{"description":"Needs to be used when endpoint data is used for report generation, checks RBAC permission for report and export feature.","example":false,"in":"query","name":"report","required":false,"schema":{"type":"boolean"}},"rhel_version":{"description":"Filters results by RHEL OS version. Automatically flters out systems which are not RHEL or have uknown OS.","in":"query","name":"rhel_version","required":false,"schema":{"description":"List of RHEL versions. E.g. 7,8.1 will filter out everything which is not RHEL 7.x or RHEL 8.1","type":"string"}},"rule":{"description":"Filters CVEs or systems by security rule, has two functionalities. If value is false, shows results without security rules, every other value is taken as rule error key.","example":"CVE_2018_3639_cpu_kernel|CVE_2018_3639_CPU_BAD_MICROCODE_2,CVE_2018_12207_cpu_kernel|CVE_2018_12207_CPU_KERNEL_FOR_SURE","in":"query","name":"rule","schema":{"items":{"minLength":1,"type":"string"},"type":"array"}},"rule_key":{"description":"Filters security rules by its error key.","example":"CVE_2018_3639_cpu_kernel|CVE_2018_3639_CPU_BAD_MICROCODE_2,CVE_2018_12207_cpu_kernel|CVE_2018_12207_CPU_KERNEL_FOR_SURE","in":"query","name":"rule_key","schema":{"items":{"type":"string"},"type":"array"}},"rule_key_deprecated":{"deprecated":true,"description":"Filters security rules by its error key.","example":"CVE_2018_3639_cpu_kernel|CVE_2018_3639_CPU_BAD_MICROCODE_2,CVE_2018_12207_cpu_kernel|CVE_2018_12207_CPU_KERNEL_FOR_SURE","in":"query","name":"rule_key","schema":{"items":{"type":"string"},"type":"array"}},"rule_presence":{"description":"Comma seprated string with bools. If true shows only CVEs with security rule associated, if false shows CVEs without rules. true, false shows all.","example":"true,false","in":"query","name":"rule_presence","schema":{"items":{"type":"boolean"},"maxItems":2,"type":"array"}},"rule_presence_deprecated":{"deprecated":true,"description":"Comma seprated string with bools. If true shows only CVEs with security rule associated, if false shows CVEs without rules. true, false shows all.","example":"true,false","in":"query","name":"rule_presence","schema":{"items":{"type":"boolean"},"maxItems":2,"type":"array"}},"sap_sids":{"description":"List of SAP IDs to filter with","example":"ABC,CDE","in":"query","name":"sap_sids","schema":{"items":{"type":"string"},"type":"array"}},"sap_system":{"description":"Boolean value which shows systems managed by SAP.","example":false,"in":"query","name":"sap_system","schema":{"type":"boolean"}},"show_advisories":{"description":"If true shows advisories list","example":false,"in":"query","name":"show_advisories","schema":{"type":"boolean"}},"sort":{"description":"Sorting used for response.","example":"-inventory_id","in":"query","name":"sort","schema":{"type":"string"}},"stale":{"description":"If set to true, shows stale systems. If not set defaults to false.","in":"query","name":"stale","schema":{"type":"boolean"}},"status_id":{"description":"Filer based on CVE status ID.","in":"query","name":"status_id","schema":{"example":"1,4","type":"string"}},"tags":{"description":"Filter based on hosts tags. Tags needs to be in query format, that means /= or / if value is null. Characters \'/\', \'=\' in tag values needs to be escaped by url encoding.","example":"vulnerability/usage=server","in":"query","name":"tags","schema":{"items":{"pattern":"^([^=/]+\\\\/){1}([^=/])+(=[^=/]+)?$","type":"string"},"type":"array"}},"uuid":{"description":"Filter based on UUID of inventory.","example":"2ee58c62-809f-11ea-bc55-0242ac130003","in":"query","name":"uuid","schema":{"type":"string"}}},"schemas":{"AffectedSystemsIdsOut":{"properties":{"data":{"oneOf":[{"description":"CSV export of the JSON.","type":"string"},{"items":{"description":"Smallest dataset for frontend to work.","properties":{"display_name":{"description":"System\'s name.","example":"system.example.com","type":"string"},"inventory_id":{"description":"Host ID.","example":"INV-ID00-0000-1234","type":"string"},"mitigation_reason":{"description":"Reason why the system is not vulnerable.","example":"SELinux mitigates the issue","nullable":true,"type":"string"},"remediation":{"description":"Type of available remediation, 0 for none, 1 for manual, 2 for playbook.","enum":[0,1,2],"type":"number"},"rule_id":{"description":"ID of associated security rule.","example":"CVE_2017_14491_dnsmasq|CVE_2017_14491_ERROR","nullable":true,"type":"string"},"status_id":{"description":"Internal ID of the vulnerability status.","example":4,"type":"integer"},"status_text":{"description":"Complementary text to the status.","example":"Not relevant","nullable":true,"type":"string"}},"required":["inventory_id","rule_id","status_id","status_text","display_name","remediation"],"type":"object"},"type":"array"}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaAffectedSystems"}},"required":["data","links","meta"],"type":"object"},"AffectedSystemsOut":{"properties":{"data":{"oneOf":[{"description":"CSV export of the JSON.","type":"string"},{"items":{"properties":{"attributes":{"properties":{"advisories_list":{"description":"List of advisories for system","items":{"description":"Advisory id","example":"RHSA-2019:1481","type":"string"},"type":"array"},"advisory_available":{"description":"Shows whether a CVE has available advisory or not","example":true,"type":"boolean"},"culled_timestamp":{"description":"Timestamp from which the host is considered deleted.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"cve_status_id":{"description":"Internal ID of the CVE status.","example":4,"type":"integer"},"display_name":{"description":"System\'s name.","example":"system.example.com","nullable":true,"type":"string"},"first_reported":{"description":"Date of when the CVE was first reported on the system.","example":"2018-09-22T16:00:00+00:00","type":"string"},"insights_id":{"description":"Insights host ID.","example":"0035f6bc-cdb0-4763-8fcd-1dc58f716359","nullable":true,"type":"string"},"inventory_group":{"items":{"properties":{"id":{"description":"ID of inventory group.","example":"00000000-1111-0000-0000-000000000000","type":"string"},"name":{"description":"Name of inventory group.","example":"group01","type":"string"}},"required":["id","name"],"type":"object"},"type":"array"},"inventory_id":{"description":"Host ID.","example":"INV-ID00-0000-1234","type":"string"},"last_evaluation":{"description":"Date of last evaluation.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"mitigation_reason":{"description":"Reason why the system is not vulnerable.","example":"SELinux mitigates the issue","nullable":true,"type":"string"},"os":{"description":"Operating system.","example":"RHEL 8.4","type":"string"},"remediation":{"description":"Type of available remediation, 0 for none, 1 for manual, 2 for playbook.","enum":[0,1,2],"type":"number"},"reporter":{"description":"Reporter of the vulnerability, 1 for VMaaS, 2 for security rule, 3 for both VMaaS and rule.","enum":[0,1,2,3],"type":"number"},"rule":{"description":"Details of associated security rule.","nullable":true,"properties":{"details":{"description":"Additional information specific to the system rule hit.","type":"object"},"resolution":{"description":"Details of recommended resolution.","properties":{"resolution":{"description":"Recommended resolution of the issue.","example":"Red Hat recommends that you update the dnsmasq package","nullable":true,"type":"string"}},"required":["resolution"],"type":"object"},"rule":{"properties":{"description":{"description":"Description of the associated security rule.","example":"CVE-2017-14491 dnsmasq code execution with listening processes","nullable":true,"type":"string"},"more_info":{"description":"Additional information about the issue.","example":"For more information about this specific flaw, see its ...","nullable":true,"type":"string"},"node_id":{"description":"ID of associated Red Hat knowledgebase article.","example":3199382,"nullable":true,"type":"integer"},"reason":{"description":"Reason of why rule did hit.","example":"This system is vulnerable because it is running a vulnerable package.","nullable":true,"type":"string"},"rule_id":{"description":"ID of associated security rule.","example":"CVE_2017_14491_dnsmasq|CVE_2017_14491_ERROR","type":"string"}},"required":["description","more_info","node_id","reason","rule_id"],"type":"object"}},"required":["details","resolution","rule"],"type":"object"},"rules_evaluation":{"description":"Date of last security rules evaluation.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"stale_timestamp":{"description":"Date when stale system becomes stale.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"stale_warning_timestamp":{"description":"Date when stale system becomes hidden in the application.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"status_id":{"description":"Internal ID of the vulnerability status.","example":4,"type":"integer"},"status_name":{"description":"Status of the vulnerability for the application\'s point of view.","example":"Resolved","type":"string"},"status_text":{"description":"Complementary text to the status.","example":"Not relevant","nullable":true,"type":"string"},"tags":{"items":{"properties":{"key":{"description":"Key of the single tag.","example":"CVE","type":"string"},"namespace":{"description":"Namespace of single tag.","example":"vulnerability","nullable":true,"type":"string"},"value":{"description":"Value of the single tag.","example":"CVE-2017-1","nullable":true,"type":"string"}},"required":["namespace","key","value"],"type":"object"},"type":"array"},"updated":{"description":"Date of the lastest upload of archive taken from Inventory syndicated data.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"}},"required":["cve_status_id","culled_timestamp","display_name","first_reported","inventory_id","insights_id","last_evaluation","os","reporter","rule","rules_evaluation","stale_timestamp","stale_warning_timestamp","status_id","status_name","status_text","tags","updated","advisory_available","remediation","mitigation_reason","inventory_group"],"type":"object"},"id":{"description":"Host id.","example":"INV-ID-0000-1234","type":"string"},"type":{"description":"Type of the record.","example":"system","type":"string"}},"required":["id","type","attributes"],"type":"object"},"type":"array"}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaAffectedSystems"}},"required":["data","links","meta"],"type":"object"},"AnnouncementOut":{"properties":{"last_updated":{"description":"Datetime string.","example":"2004-10-19 10:23:54+02","type":"string"},"message":{"description":"Announcement message.","example":"Hello from Vulnerability team :).","type":"string"}},"required":["message","last_updated"],"type":"object"},"BulkChangeOut":{"properties":{"meta":{"$ref":"#/components/schemas/MetaPermissions"},"updated":{"description":"List of updated objects/updated object IDs.","items":{"example":"f35b1e1d-d231-43f2-8e4f-8f9cb01e3aa2","type":"string"},"type":"array"}},"required":["updated"],"type":"object"},"BusinessRiskListOut":{"properties":{"data":{"description":"List of available business risk/business_risk_id pairs.","items":{"properties":{"id":{"description":"Internal business_risk_id.","example":3,"type":"integer"},"name":{"description":"Represenation of internal business_risk_id.","example":"Low","type":"string"}},"required":["id","name"],"type":"object"},"type":"array"},"meta":{"properties":{"total_items":{"description":"Total number of available business risk/business_risk_id pairs.","example":1,"type":"integer"}},"required":["total_items"],"type":"object"}},"required":["data","meta"],"type":"object"},"CveDetailOut":{"properties":{"data":{"properties":{"attributes":{"properties":{"advisories_list":{"description":"List of advisory names or detailed advisory information","items":{"oneOf":[{"example":"RHSA-2015:0809","type":"string"},{"properties":{"attributes":{"properties":{"advisory_type":{"example":3,"type":"integer"},"applicable_systems":{"example":2559,"type":"integer"},"description":{"example":"The bash packages provide Bash (Bourne-again shell), which is the default shell for Red Hat Enterprise Linux...","type":"string"},"public_date":{"example":"2020-09-01T15:22:07Z","type":"string"},"severity":{"example":2,"type":"integer"},"synopsis":{"example":"Moderate: bash security update","type":"string"}},"required":["applicable_systems"],"type":"object"},"id":{"example":"RHSA-2020:3592","type":"string"},"type":{"example":"advisory","type":"string"}},"required":["id","type"],"type":"object"}]},"nullable":true,"type":"array"},"affected_but_not_vulnerable":{"description":"Number of systems that are affected by given CVE but are not vulnerable.","example":0,"nullable":true,"type":"integer"},"affected_systems":{"description":"Number of systems that are overall affected by given CVE","example":52,"nullable":true,"type":"integer"},"business_risk":{"description":"Business risk of the vulnerability.","example":"Low","type":"string"},"business_risk_id":{"description":"Internal ID of the vulnerability business risk.","example":1,"type":"integer"},"business_risk_text":{"description":"Complementary text to the business risk.","example":"QA environment => Low business risk","nullable":true,"type":"string"},"celebrity_name":{"description":"\\"Celebrity\\" name of the CVE.","example":"Spectre/Meltdown","nullable":true,"type":"string"},"cvss2_metrics":{"description":"cvss2 metrics of the CVE.","example":"AV:N/AC:M/Au:N/C:P/I:P/A:N","nullable":true,"type":"string"},"cvss2_score":{"description":"String representation of cvss2 score of the CVE.","example":"5.800","nullable":true,"type":"string"},"cvss3_metrics":{"description":"cvss3 metrics of the CVE.","example":"AV:N/AC:M/Au:N/C:P/I:P/A:N","nullable":true,"type":"string"},"cvss3_score":{"description":"String representation of cvss3 score of the CVE.","example":"4.400","nullable":true,"type":"string"},"description":{"description":"Description of the CVE.","example":"A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker could...","type":"string"},"impact":{"description":"Red Hat security impact of the CVE.","example":"Important","type":"string"},"known_exploit":{"description":"Shows whether a CVE has known exploits or not","example":true,"type":"boolean"},"modified_date":{"description":"String representation of ISO-8601 formatted date of last modification of the CVE.","example":"2019-03-07T08:15:36+00:00","nullable":true,"type":"string"},"public_date":{"description":"String representation of ISO-8601 formatted date of first public disclosure of the CVE.","example":"2016-03-01T00:00:00+00:00","nullable":true,"type":"string"},"redhat_url":{"description":"Additional resource about the CVE, provided by Red Hat.","example":"https://access.redhat.com/security/cve/cve-2016-0800","nullable":true,"type":"string"},"rules":{"items":{"$ref":"#/components/schemas/InsightsRule"},"type":"array"},"secondary_url":{"description":"Additional resources about the CVE.","example":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800","nullable":true,"type":"string"},"status":{"description":"Status of the vulnerability.","example":"Not Reviewed","type":"string"},"status_id":{"description":"Internal ID of the vulnerability status.","example":1,"type":"integer"},"status_text":{"description":"Complementary text to the status.","example":"Not relevant","nullable":true,"type":"string"},"synopsis":{"description":"Synopsis of the CVE.","example":"CVE-2016-0800","type":"string"},"systems_status_detail":{"description":"Counts of systems with given status type.","type":"object"},"systems_status_divergent":{"description":"How many systems-CVE pairs have different status than CVE-level.","example":20,"type":"integer"}},"required":["business_risk","business_risk_id","business_risk_text","celebrity_name","cvss2_metrics","cvss2_score","cvss3_metrics","cvss3_score","description","impact","modified_date","public_date","redhat_url","rules","secondary_url","status","status_id","status_text","synopsis","systems_status_detail","systems_status_divergent","advisories_list","known_exploit","affected_but_not_vulnerable"],"type":"object"},"id":{"description":"CVE id.","example":"CVE-2016-0800","type":"string"},"type":{"description":"Type of the record.","example":"cve","type":"string"}},"required":["id","type","attributes"],"type":"object"},"meta":{"$ref":"#/components/schemas/MetaPermissions"}},"type":"object"},"CveOrList":{"example":"CVE-2016-0800","oneOf":[{"description":"CVE name.","example":"CVE-2016-0800","type":"string"},{"description":"List of CVEs for a bulk change.","items":{"example":"CVE-2016-0800","type":"string"},"type":"array"}]},"CveRiskIn":{"properties":{"business_risk_id":{"description":"Business risk ID to be set, obtained by GET method.","example":3,"type":"integer"},"business_risk_text":{"description":"Complementary text to the business risk.","example":"Not relevant","nullable":true,"type":"string"},"cve":{"$ref":"#/components/schemas/CveOrList"}},"required":["cve"],"type":"object"},"CveStatusIn":{"properties":{"cve":{"$ref":"#/components/schemas/CveOrList"},"status_id":{"description":"Status ID to be set, obtained by GET method.","example":3,"type":"integer"},"status_text":{"description":"Complementary text to the status.","example":"Not relevant","nullable":true,"type":"string"}},"required":["cve"],"type":"object"},"CvesWithoutErrataIn":{"properties":{"enable":{"description":"Enable or disable CVEs without Errata feature.","example":true,"type":"boolean"}},"required":["enable"],"type":"object"},"CvesWithoutErrataOut":{"properties":{"meta":{"$ref":"#/components/schemas/MetaPermissions"},"updated":{"properties":{"cves_without_errata":{"properties":{"enabled":{"type":"boolean"}},"type":"object"},"org_id":{"type":"string"}},"type":"object"}},"required":["updated","meta"],"type":"object"},"DashbarOut":{"properties":{"critical_cves":{"type":"number"},"cves_with_rule":{"type":"number"},"exploitable_cves":{"type":"number"},"important_cves":{"type":"number"}},"type":"object"},"Dashboard":{"properties":{"cves_by_severity":{"description":"Number of CVEs discovered on the managed systems, divided into buckets based on their CVSSv3 score (CVSSv2 is used when CVSSv3 is not available).","properties":{"0to3.9":{"properties":{"count":{"description":"Number of CVEs with CVSS score lower than 4.","example":1902,"type":"integer"},"known_exploits":{"description":"Number of CVEs in given bracket with a known exploit.","example":6,"type":"number"},"percentage":{"description":"Percentage of CVEs with CVSS score lower than 4.","example":60,"type":"number"}},"required":["count","percentage"],"type":"object"},"4to7.9":{"properties":{"count":{"description":"Number of CVEs with CVSS score higher or equal to 4 and lower then 8.","example":400,"type":"integer"},"known_exploits":{"description":"Number of CVEs in given bracket with a known exploit.","example":6,"type":"number"},"percentage":{"description":"Percentage of CVEs with CVSS score higher or equal to 4 and lower then 8.","example":15,"type":"number"}},"required":["count","percentage"],"type":"object"},"8to10":{"properties":{"count":{"description":"Number of CVEs with CVSS score higher or equal to 8.","example":109,"type":"integer"},"known_exploits":{"description":"Number of CVEs in given bracket with a known exploit.","example":6,"type":"number"},"percentage":{"description":"Percentage of CVEs with CVSS score higher or equal to 8.","example":2,"type":"number"}},"required":["count","percentage"],"type":"object"}},"required":["0to3.9","4to7.9","8to10"],"type":"object"},"cves_total":{"description":"Number of unique CVEs discovered on the managed systems.","example":1902,"type":"integer"},"exploited_cves_count":{"description":"unique number of CVEs having known exploit affecting at least one system","example":5,"type":"integer"},"recent_cves":{"description":"Number of recently published CVEs identified on managed systems","properties":{"last30days":{"description":"Number of CVEs identified on managed systems published in last 30 days.","example":62,"type":"integer"},"last7days":{"description":"Number of CVEs identified on managed systems published in last 7 days.","example":14,"type":"integer"},"last90days":{"description":"Number of CVEs identified on managed systems published in last 90 days.","example":156,"type":"integer"}},"required":["last7days","last30days","last90days"],"type":"object"},"recent_rules":{"description":"List of recently (14 days) released security rules.","items":{"description":"Security rule.","properties":{"associated_cves":{"description":"List of CVEs associated with the security rule.","items":{"description":"CVE name.","example":"CVE-2016-0800","type":"string"},"type":"array"},"description":{"description":"Description of the issue related with the security rule.","example":"A heap-based buffer overflow was found in the way ...","type":"string"},"id":{"description":"ID of the security rule.","example":"CVE_2019_11135_cpu_taa|CVE_2019_11135_CPU_TAA_KERNEL","type":"string"},"name":{"description":"Name of the security rule.","example":"sudo privilege escalation","type":"string"},"node_id":{"description":"Node id of access.redhat.com/node/* article.","example":5737621,"nullable":true,"type":"number"},"public_date":{"description":"String representation of ISO-8601 formatted date of release of the security rule.","example":"2016-03-01T00:00:00+00:00","nullable":true,"type":"string"},"severity":{"description":"Number representation of the security rule severity.","example":3,"type":"number"},"systems_affected":{"description":"Number of systems triggering the security rule.","example":178,"type":"number"}},"type":"object"},"required":["associated_cves","description","name","node_id","severity","systems_affected"],"type":"array"},"rules_cves_total":{"description":"Total number of CVEs with associated security rules affecting given account.","example":12,"type":"integer"},"system_count":{"description":"Total systems registered to Vulnerability service (with applied filtering).","example":241,"type":"integer"}},"required":["cves_total","cves_by_severity","recent_cves","recent_rules","rules_cves_total","system_count","exploited_cves_count"],"type":"object"},"Errors":{"properties":{"errors":{"items":{"properties":{"detail":{"oneOf":[{"description":"Error detail.","example":"Record not found.","type":"string"},{"description":"Returned with RBAC (user permissions) related issue","properties":{"msg":{"description":"Error detail related to RBAC problem","type":"string"},"permissions":{"description":"Array with RBAC permissions of user","items":{"type":"string"},"type":"array"}},"type":"object"}]},"status":{"description":"String representation of HTTP status code.","example":404,"type":"string"}},"required":["detail","status"],"type":"object"},"minItems":1,"type":"array"}},"required":["errors"],"type":"object"},"ExecutiveReport":{"properties":{"cves_by_severity":{"description":"Number of CVEs discovered on the managed systems, divided into buckets based on their CVSSv3 score (CVSSv2 is used when CVSSv3 is not available).","properties":{"0to3.9":{"properties":{"count":{"description":"Number of CVEs with CVSS score lower than 4.","example":1902,"type":"integer"},"percentage":{"description":"Percentage of CVEs with CVSS score lower than 4.","example":60,"type":"number"}},"required":["count","percentage"],"type":"object"},"4to7.9":{"properties":{"count":{"description":"Number of CVEs with CVSS score higher or equal to 4 and lower then 8.","example":400,"type":"integer"},"percentage":{"description":"Percentage of CVEs with CVSS score higher or equal to 4 and lower then 8.","example":15,"type":"number"}},"required":["count","percentage"],"type":"object"},"8to10":{"properties":{"count":{"description":"Number of CVEs with CVSS score higher or equal to 8.","example":109,"type":"integer"},"percentage":{"description":"Percentage of CVEs with CVSS score higher or equal to 8.","example":2,"type":"number"}},"required":["count","percentage"],"type":"object"}},"required":["0to3.9","4to7.9","8to10"],"type":"object"},"cves_total":{"description":"Number of unique CVEs discovered on the managed systems.","example":1902,"type":"integer"},"meta":{"$ref":"#/components/schemas/MetaPermissions"},"recent_cves":{"description":"Number of recently published CVEs identified on managed systems","properties":{"last30days":{"description":"Number of CVEs identified on managed systems published in last 30 days.","example":62,"type":"integer"},"last7days":{"description":"Number of CVEs identified on managed systems published in last 7 days.","example":14,"type":"integer"},"last90days":{"description":"Number of CVEs identified on managed systems published in last 90 days.","example":156,"type":"integer"}},"required":["last7days","last30days","last90days"],"type":"object"},"rules_by_severity":{"description":"Information about how much systems are affected by a security rule, broken down by rule severity.","properties":{"1":{"properties":{"rule_count":{"description":"How many unique rules with at least system affected are present.","example":12,"type":"integer"},"systems_affected":{"description":"How many unique systems are affected by at least one rules with given severity","example":443,"type":"integer"}},"required":["rule_count","systems_affected"],"type":"object"},"2":{"properties":{"rule_count":{"description":"How many unique rules with at least system affected are present.","example":12,"type":"integer"},"systems_affected":{"description":"How many unique systems are affected by at least one rules with given severity","example":443,"type":"integer"}},"required":["rule_count","systems_affected"],"type":"object"},"3":{"properties":{"rule_count":{"description":"How many unique rules with at least system affected are present.","example":12,"type":"integer"},"systems_affected":{"description":"How many unique systems are affected by at least one rules with given severity","example":443,"type":"integer"}},"required":["rule_count","systems_affected"],"type":"object"},"4":{"properties":{"rule_count":{"description":"How many unique rules with at least system affected are present.","example":12,"type":"integer"},"systems_affected":{"description":"How many unique systems are affected by at least one rules with given severity","example":443,"type":"integer"}},"required":["rule_count","systems_affected"],"type":"object"}},"required":["1","2","3","4"],"type":"object"},"rules_total":{"description":"Number of unique CVEs discovered on the managed systems.","example":1902,"type":"integer"},"system_count":{"description":"Total number of systems managed by vulnerability application.","example":25641,"type":"integer"},"system_count_per_type":{"description":"Number of systems managed by vulnerability application, grouped by host type.","properties":{"edge":{"description":"Number of immutable systems.","example":3,"nullable":true,"type":"number"},"rpmdnf":{"description":"Number of conventional systems.","example":26,"type":"number"}},"type":"object"},"top_cves":{"items":{"properties":{"cvss2_score":{"description":"String representation of cvss2 score of the CVE.","example":"5.800","nullable":true,"type":"string"},"cvss3_score":{"description":"String representation of cvss3 score of the CVE.","example":"4.400","nullable":true,"type":"string"},"description":{"description":"Description of the CVE.","example":"A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker could...","type":"string"},"known_exploit":{"description":"Shows whether a CVE has known exploits or not","example":true,"type":"boolean"},"rule_presence":{"description":"Indicator of security rule presence","example":true,"type":"boolean"},"security_rule":{"deprecated":true,"description":"Indicator of security rule presence","example":true,"type":"boolean"},"synopsis":{"description":"CVE synopsis","example":"CVE-2016-0800","type":"string"},"systems_affected":{"description":"Systems affected by the CVE.","example":1795,"type":"integer"}},"required":["synopsis","cvss2_score","cvss3_score","description","systems_affected","known_exploit"],"type":"object"},"type":"array"},"top_rules":{"items":{"properties":{"associated_cves":{"description":"All CVEs associated with the rule","items":{"example":"CVE-2019-1125","type":"string"},"type":"array"},"description":{"description":"Brief description of the issue.","example":"Privilege Escalation with running service (no fix available for this version)","type":"string"},"name":{"description":"Name of the security rule.","example":"httpd denial of service with running services","type":"string"},"rule_id":{"description":"ID of associated security rule.","example":"CVE_2017_14491_dnsmasq|CVE_2017_14491_ERROR","type":"string"},"severity":{"description":"Severity of the security rule.","example":3,"type":"integer"},"systems_affected":{"description":"Number of systems affected by the rule.","example":443,"type":"integer"}},"required":["associated_cves","description","name","rule_id","severity","systems_affected"],"type":"object"},"type":"array"}},"required":["system_count","cves_total","cves_by_severity","rules_by_severity","rules_total","recent_cves"],"type":"object"},"InsightsRule":{"properties":{"associated_cves":{"description":"List of CVEs associated with the rule.","items":{"example":"CVE-2016-0800","type":"string"},"type":"array"},"change_risk":{"description":"Indicates how likely remediation can change environment on the remediatied system.","example":1,"nullable":true,"type":"integer"},"description":{"description":"Description of the rule.","example":"CVE-2017-14491 dnsmasq code execution with listening processes","nullable":true,"type":"string"},"kbase_node_id":{"description":"ID of associated Red Hat knowledgebase article.","example":3199382,"nullable":true,"type":"integer"},"playbook_count":{"description":"Number of available Ansible playbooks for remediation/mitigation.","example":1,"nullable":true,"type":"integer"},"publish_date":{"description":"Date when the rule was published.","example":"2018-05-15T13:00:00Z","nullable":true,"type":"string"},"reboot_required":{"description":"Indicator whter reboot is required to mitigate vulnerability.","example":false,"nullable":true,"type":"boolean"},"rule_id":{"description":"ID(s) of associated security rule(s).","example":"CVE_2017_14491_dnsmasq|CVE_2017_14491_ERROR","type":"string"},"rule_impact":{"description":"Shows rules impact number from 1 to 4","example":1,"nullable":true,"type":"integer"},"summary":{"description":"Summary of the rule.","example":"A buffer overflow vulnerability was found in `Dnsmasq`, a popular lightweight DNS and DHCP server....","nullable":true,"type":"string"},"systems_affected":{"description":"Number of systems affected by the rule.","example":72,"type":"integer"}},"required":["associated_cves","change_risk","description","kbase_node_id","playbook_count","reboot_required","rule_id","summary","rule_impact","publish_date"],"type":"object"},"InventoryIdOrList":{"example":"f35b1e1d-d231-43f2-8e4f-8f9cb01e3aa2","oneOf":[{"description":"Inventory ID.","example":"f35b1e1d-d231-43f2-8e4f-8f9cb01e3aa2","type":"string"},{"description":"List of inventory IDs for a bulk change.","items":{"example":"f35b1e1d-d231-43f2-8e4f-8f9cb01e3aa2","type":"string"},"type":"array"}]},"Links":{"properties":{"first":{"description":"Link to first page.","example":"/api?offset=0&limit=1","type":"string"},"last":{"description":"Link to last page.","example":"/api?offset=7&limit=1","type":"string"},"next":{"description":"Link to next page.","example":"/api?offset=5&limit=1","nullable":true,"type":"string"},"previous":{"description":"Link to next page.","example":"/api?offset=3&limit=1","nullable":true,"type":"string"}},"required":["first","last","next","previous"],"type":"object"},"Meta":{"properties":{"data_format":{"description":"Format of the output data, either JSON (default) or CSV.","example":"JSON","type":"string"},"filter":{"description":"Full text filter","example":"CVE-2016-0800","nullable":true,"type":"string"},"limit":{"description":"Maximum number of paginated results.","example":25,"type":"integer"},"offset":{"description":"First record of paginated response.","example":0,"type":"integer"},"page":{"description":"Page number of paginated response.","example":1,"type":"integer"},"page_size":{"description":"Number of records per page of paginated response.","example":25,"type":"integer"},"pages":{"description":"Total number of pages of paginated response.","example":1,"type":"integer"},"sort":{"description":"Sorting filter.","example":"-inventory_id","nullable":true,"type":"string"},"total_items":{"description":"Total number of records.","example":37,"type":"integer"}},"required":["filter","limit","offset","page","page_size","pages","sort","total_items","data_format"],"type":"object"},"MetaAffectedSystems":{"allOf":[{"$ref":"#/components/schemas/Meta"},{"$ref":"#/components/schemas/MetaPermissions"},{"properties":{"cves_without_errata":{"description":"CVEs without Errata feature flag","nullable":true,"type":"boolean"},"first_reported_from":{"description":"Filter system-cve pairs based on first time of detection of CVE.","example":"2017-09-18T00:00:00+00:00","nullable":true,"type":"string"},"first_reported_to":{"description":"Filter system-cve pairs based on first time of detection of CVE.","example":"2017-09-18T00:00:00+00:00","nullable":true,"type":"string"},"group_ids":{"description":"ID of the inventory group.","example":"00000000-1111-0000-0000-000000000000,00000000-2222-0000-0000-000000000000","nullable":true,"type":"string"},"group_names":{"description":"Name of the inventory group.","example":"Production,Stage","nullable":true,"type":"string"},"patch_access":{"description":"If show_advisories=true shows access to patch service else null","example":true,"nullable":true,"type":"boolean"},"rhel_version":{"description":"Filter base on system RHEL version.","example":"8.2","nullable":true,"type":"string"},"rule_key":{"description":"Filters security rules by its error key.","example":"CVE_2018_3639_cpu_kernel|CVE_2018_3639_CPU_BAD_MICROCODE_2,CVE_2018_12207_cpu_kernel|CVE_2018_12207_CPU_KERNEL_FOR_SURE","nullable":true,"type":"string"},"rule_presence":{"description":"Filter based on presence of security rule","example":"true,false","nullable":true,"type":"string"},"status_id":{"description":"Filer based on CVE status ID.","example":"1,4","nullable":true,"type":"string"}},"required":["status_id","rule_key","rule_presence","patch_access","rhel_version","first_reported_from","first_reported_to","cves_without_errata","group_names","group_ids"],"type":"object"}]},"MetaCves":{"allOf":[{"$ref":"#/components/schemas/Meta"},{"$ref":"#/components/schemas/MetaPermissions"},{"properties":{"business_risk_id":{"description":"Filter based on business risk IDs.","example":"1,3","nullable":true,"type":"string"},"cves_without_errata":{"description":"CVEs without Errata feature flag","nullable":true,"type":"boolean"},"cvss_from":{"description":"Filter based on cvss score, starting from the value. Use -1 to include also CVEs with N/A cvss score.","example":4.6,"nullable":true,"type":"number"},"cvss_to":{"description":"Filter based on cvss score, up to the value.","example":7.2,"nullable":true,"type":"number"},"first_reported_from":{"description":"Filter system-cve pairs based on first time of detection of CVE.","example":"2017-09-18T00:00:00+00:00","nullable":true,"type":"string"},"first_reported_to":{"description":"Filter system-cve pairs based on first time of detection of CVE.","example":"2017-09-18T00:00:00+00:00","nullable":true,"type":"string"},"impact":{"description":"Filter based on impact IDs.","example":"5,7","nullable":true,"type":"string"},"patch_access":{"description":"If show_advisories=true shows access to patch service else null","example":true,"nullable":true,"type":"boolean"},"public_from":{"description":"Filter CVEs based on their published date, starting from the date.","example":"2017-09-18T00:00:00+00:00","nullable":true,"type":"string"},"public_to":{"description":"Filter CVEs based on their published date, up to the date.","example":"2017-09-18T00:00:00+00:00","nullable":true,"type":"string"},"rule_presence":{"description":"Filter based on presence of security rule","example":"true,false","nullable":true,"type":"string"},"status_id":{"description":"Filer based on CVE status ID.","example":"1,4","nullable":true,"type":"string"}},"required":["business_risk_id","cvss_from","cvss_to","public_from","public_to","impact","status_id","rule_presence","patch_access","first_reported_from","first_reported_to","cves_without_errata"],"type":"object"}]},"MetaCvesSystems":{"allOf":[{"$ref":"#/components/schemas/MetaCves"},{"properties":{"opt_out":{"description":"If given system was opted out.","example":true,"type":"boolean"}},"required":["opt_out"],"type":"object"}]},"MetaPermissions":{"properties":{"permissions":{"description":"Fetched permissions from RBAC for given user","items":{"example":"vulnerability:vulnerability_results:read","type":"string"},"nullable":false,"type":"array"}},"required":["permissions"],"type":"object"},"MetaSystems":{"allOf":[{"$ref":"#/components/schemas/Meta"},{"$ref":"#/components/schemas/MetaPermissions"},{"properties":{"excluded":{"description":"Display setting of opted out systems.","example":"true,false","nullable":true,"type":"string"},"rhel_version":{"description":"Filter base on system RHEL version.","example":"8.2","nullable":true,"type":"string"}},"required":["excluded","rhel_version"],"type":"object"}]},"MetaVulnerabilitiesOut":{"allOf":[{"$ref":"#/components/schemas/Meta"},{"$ref":"#/components/schemas/MetaPermissions"},{"properties":{"advisory_available":{"description":"Shows whether a CVE has available advisory or not","example":"true,false","nullable":true,"type":"string"},"affecting":{"description":"Description of CVE showing preferences","example":"True,False","nullable":true,"type":"string"},"business_risk_id":{"description":"Filter based on business risk IDs.","example":"1,3","nullable":true,"type":"string"},"cves_without_errata":{"description":"CVEs without Errata feature flag","nullable":true,"type":"boolean"},"cvss_from":{"description":"Filter based on cvss score, starting from the value. Use -1 to include also CVEs with N/A cvss score.","example":4.6,"nullable":true,"type":"number"},"cvss_to":{"description":"Filter based on cvss score, up to the value.","example":7.2,"nullable":true,"type":"number"},"impact":{"description":"Filter based on impact IDs.","example":"5,7","nullable":true,"type":"string"},"public_from":{"description":"Filter CVEs based on their published date, starting from the date.","example":"2017-09-18T00:00:00+00:00","nullable":true,"type":"string"},"public_to":{"description":"Filter CVEs based on their published date, up to the date.","example":"2017-09-18T00:00:00+00:00","nullable":true,"type":"string"},"rhel_version":{"description":"Filter base on system RHEL version.","example":"8.2","nullable":true,"type":"string"},"rule_presence":{"description":"Filter based on presence of security rule","example":"true,false","nullable":true,"type":"string"},"system_count":{"description":"Total number of systems managed by vulnerability application.","example":25641,"type":"integer"},"system_count_per_type":{"description":"Number of systems managed by vulnerability application, grouped by host type.","properties":{"edge":{"description":"Number of immutable systems.","example":3,"nullable":true,"type":"number"},"rpmdnf":{"description":"Number of conventional systems.","example":26,"type":"number"}},"type":"object"}},"required":["affecting","business_risk_id","cvss_from","cvss_to","public_from","public_to","impact","rhel_version","rule_presence","cves_without_errata","advisory_available"],"type":"object"}]},"MitigatedSystemsIdsOut":{"properties":{"data":{"oneOf":[{"description":"CSV export of the JSON.","type":"string"},{"items":{"description":"Smallest dataset for frontend to work.","properties":{"inventory_id":{"description":"Host ID.","example":"INV-ID00-0000-1234","type":"string"},"rule_id":{"description":"ID of associated security rule.","example":"CVE_2017_14491_dnsmasq|CVE_2017_14491_ERROR","nullable":true,"type":"string"},"status_id":{"description":"Internal ID of the vulnerability status.","example":4,"type":"integer"},"status_text":{"description":"Complementary text to the status.","example":"Not relevant","nullable":true,"type":"string"}},"required":["inventory_id","rule_id","status_id","status_text"],"type":"object"},"type":"array"}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaAffectedSystems"}},"required":["data","links","meta"],"type":"object"},"MitigatedSystemsOut":{"properties":{"data":{"oneOf":[{"description":"CSV export of the JSON.","type":"string"},{"items":{"properties":{"attributes":{"properties":{"advisories_list":{"description":"List of advisories for system","items":{"description":"Advisory id","example":"RHSA-2019:1481","type":"string"},"type":"array"},"advisory_available":{"description":"Shows whether a CVE has available advisory or not","example":true,"type":"boolean"},"culled_timestamp":{"description":"Timestamp from which the host is considered deleted.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"cve_status_id":{"description":"Internal ID of the CVE status.","example":4,"type":"integer"},"display_name":{"description":"System\'s name.","example":"system.example.com","nullable":true,"type":"string"},"insights_id":{"description":"Insights host ID.","example":"0035f6bc-cdb0-4763-8fcd-1dc58f716359","nullable":true,"type":"string"},"inventory_id":{"description":"Host ID.","example":"INV-ID00-0000-1234","type":"string"},"last_evaluation":{"description":"Date of last evaluation.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"mitigation_reason":{"description":"Reason why the system is not vulnerable","example":"SELinux mitigates the issue","type":"string"},"os":{"description":"Operating system.","example":"RHEL 8.4","type":"string"},"remediation":{"description":"Type of available remediation, 0 for none, 1 for manual, 2 for playbook.","enum":[0,1,2],"type":"number"},"reporter":{"description":"Reporter of the vulnerability, 1 for VMaaS, 2 for security rule, 3 for both VMaaS and rule.","enum":[0,1,2,3],"type":"number"},"rule_id":{"description":"ID(s) of associated security rule(s)..","example":"CVE_2017_14491_dnsmasq|CVE_2017_14491_ERROR","type":"string"},"rules_evaluation":{"description":"Date of last security rules evaluation.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"stale_timestamp":{"description":"Date when stale system becomes stale.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"stale_warning_timestamp":{"description":"Date when stale system becomes hidden in the application.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"status_id":{"description":"Internal ID of the vulnerability status.","example":4,"type":"integer"},"status_name":{"description":"Status of the vulnerability for the application\'s point of view.","example":"Resolved","type":"string"},"status_text":{"description":"Complementary text to the status.","example":"Not relevant","nullable":true,"type":"string"},"tags":{"items":{"properties":{"key":{"description":"Key of the single tag.","example":"CVE","type":"string"},"namespace":{"description":"Namespace of single tag.","example":"vulnerability","nullable":true,"type":"string"},"value":{"description":"Value of the single tag.","example":"CVE-2017-1","nullable":true,"type":"string"}},"required":["namespace","key","value"],"type":"object"},"type":"array"},"updated":{"description":"Date of the lastest upload of archive taken from Inventory syndicated data.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"}},"required":["cve_status_id","culled_timestamp","display_name","inventory_id","insights_id","last_evaluation","mitigation_reason","os","reporter","rules_evaluation","stale_timestamp","stale_warning_timestamp","status_id","status_name","status_text","tags","updated","advisory_available","remediation"],"type":"object"},"id":{"description":"Host id.","example":"INV-ID-0000-1234","type":"string"},"type":{"description":"Type of the record.","example":"system","type":"string"}},"required":["id","type","attributes"],"type":"object"},"type":"array"}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaAffectedSystems"}},"required":["data","links","meta"],"type":"object"},"NotificationsOut":{"properties":{"deleted":{"description":"Number of deleted notifications for CVEs","example":50,"type":"number"}},"required":["deleted"],"type":"object"},"OptOutIn":{"properties":{"inventory_id":{"$ref":"#/components/schemas/InventoryIdOrList"},"opt_out":{"description":"Opt out setting to be set.","example":true,"type":"boolean"}},"required":["inventory_id","opt_out"],"type":"object"},"PlaybookTemplate":{"properties":{"data":{"items":{"properties":{"description":{"description":"Playbook template description.","example":"Fix issues caused by CVE_2017_6074_kernel|KERNEL_CVE_2017_6074.","type":"string"},"play":{"description":"Actual playbook template.","type":"string"},"reboot_required":{"description":"Indicator whter reboot is required to mitigate vulnerability.","example":false,"nullable":true,"type":"boolean"},"resolution_type":{"description":"Type of the resolution provided by playbook.","type":"string"},"version":{"description":"Revision of the playbook template.","example":"93a1ced8a259666f0505cd20b7cb8e7a1c65b868","type":"string"}},"required":["description","play","version","resolution_type"],"type":"object"},"type":"array"}},"type":"object"},"StatusIn":{"properties":{"cve":{"$ref":"#/components/schemas/CveOrList"},"inventory_id":{"$ref":"#/components/schemas/InventoryIdOrList"},"status_id":{"description":"Status ID to be set, obtained by GET method. If not specified, global CVE status is set.","example":3,"type":"integer"},"status_text":{"description":"Complementary text to the status.","example":"Not relevant","nullable":true,"type":"string"}},"required":["cve"],"type":"object"},"StatusListOut":{"properties":{"data":{"description":"List of available status/status_id pairs.","items":{"properties":{"id":{"description":"Internal status_id.","example":3,"type":"integer"},"name":{"description":"Represenation of internal status_id.","example":"Scheduled for Patch","type":"string"}},"required":["id","name"],"type":"object"},"type":"array"},"meta":{"properties":{"total_items":{"description":"Total number of available status/status_id pairs.","example":1,"type":"integer"}},"required":["total_items"],"type":"object"}},"required":["data","meta"],"type":"object"},"StatusOut":{"properties":{"meta":{"$ref":"#/components/schemas/MetaPermissions"},"updated":{"description":"List of updated objects/updated object IDs.","items":{"properties":{"cve":{"example":"CVE-2016-0800","type":"string"},"inventory_id":{"example":"f35b1e1d-d231-43f2-8e4f-8f9cb01e3aa2","type":"string"}},"required":["inventory_id","cve"],"type":"object"},"type":"array"}},"required":["updated"],"type":"object"},"SystemCvesIdsOut":{"properties":{"data":{"oneOf":[{"description":"CSV export of the JSON.","type":"string"},{"items":{"description":"CVE id and minimal information for frontend","properties":{"cve_status_id":{"description":"Internal ID of the CVE status.","example":4,"type":"integer"},"cve_status_text":{"description":"Status text to the whole cve.","example":"Not relevant for all","nullable":true,"type":"string"},"id":{"description":"CVE id.","example":"CVE-2016-0800","type":"string"},"remediation":{"description":"Type of available remediation, 0 for none, 1 for manual, 2 for playbook.","enum":[0,1,2],"type":"number"},"rule_id":{"description":"ID(s) of associated security rule(s)..","example":"CVE_2017_14491_dnsmasq|CVE_2017_14491_ERROR","nullable":true,"type":"string"},"status_id":{"description":"Internal ID of the vulnerability status.","example":4,"type":"integer"},"status_text":{"description":"Complementary text to the status.","example":"Not relevant","nullable":true,"type":"string"}},"required":["id","rule_id","status_id","status_text","cve_status_id","cve_status_text","remediation"],"type":"object"},"type":"array"}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaCves"}},"required":["data","links","meta"],"type":"object"},"SystemCvesOut":{"properties":{"data":{"oneOf":[{"description":"CSV export of the JSON.","type":"string"},{"items":{"properties":{"attributes":{"properties":{"advisories_list":{"description":"List of advisories for CVE","items":{"description":"Advisory id","example":"RHSA-2019:1481","type":"string"},"type":"array"},"advisory_available":{"description":"Shows whether a CVE has available advisory or not","example":true,"type":"boolean"},"business_risk":{"description":"Business risk of the vulnerability.","example":"Low","type":"string"},"business_risk_id":{"description":"Internal ID of the vulnerability business risk.","example":1,"type":"integer"},"business_risk_text":{"description":"Complementary text to the business risk.","example":"QA environment => Low business risk","nullable":true,"type":"string"},"cve_status_id":{"description":"Internal ID of the CVE status.","example":4,"type":"integer"},"cve_status_text":{"description":"Status text to the whole cve.","example":"Not relevant for all","nullable":true,"type":"string"},"cvss2_score":{"description":"String representation of cvss2 score of the CVE.","example":"5.800","nullable":true,"type":"string"},"cvss3_score":{"description":"String representation of cvss3 score of the CVE.","example":"4.400","nullable":true,"type":"string"},"description":{"description":"Description of the CVE.","example":"A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker could...","type":"string"},"first_reported":{"description":"Date of when the CVE was first reported on the system.","example":"2018-09-22T16:00:00+00:00","type":"string"},"impact":{"description":"Red Hat security impact of the CVE.","example":"Important","type":"string"},"known_exploit":{"description":"Shows whether a CVE has known exploits or not","example":true,"type":"boolean"},"public_date":{"description":"String representation of ISO-8601 formatted date of first public disclosure of the CVE.","example":"2016-03-01T00:00:00+00:00","nullable":true,"type":"string"},"remediation":{"description":"Type of available remediation, 0 for none, 1 for manual, 2 for playbook.","enum":[0,1,2],"type":"number"},"reporter":{"description":"Reporter of the vulnerability, 1 for VMaaS, 2 for security rule, 3 for both VMaaS and rule.","enum":[0,1,2,3],"type":"number"},"rule":{"nullable":true,"properties":{"change_risk":{"description":"Indicates how likely remediation can change environment on the remediatied system.","example":1,"nullable":true,"type":"integer"},"description":{"description":"Description of the rule.","example":"CVE-2017-14491 dnsmasq code execution with listening processes","nullable":true,"type":"string"},"generate_autoplaybook":{"description":"Indicates whether a playbook should be auto-generated.","example":true,"nullable":true,"type":"boolean"},"kbase_node_id":{"description":"ID of associated Red Hat knowledgebase article.","example":3199382,"nullable":true,"type":"integer"},"playbook_count":{"description":"Number of available Ansible playbooks for remediation/mitigation.","example":1,"nullable":true,"type":"integer"},"reboot_required":{"description":"Indicator whter reboot is required to mitigate vulnerability.","example":false,"nullable":true,"type":"boolean"},"rule_id":{"description":"ID(s) of associated security rule(s).","example":"CVE_2017_14491_dnsmasq|CVE_2017_14491_ERROR","type":"string"},"summary":{"description":"Summary of the rule.","example":"A buffer overflow vulnerability was found in `Dnsmasq`, a popular lightweight DNS and DHCP server....","nullable":true,"type":"string"}},"required":["change_risk","description","kbase_node_id","playbook_count","reboot_required","rule_id","summary","generate_autoplaybook"],"type":"object"},"status":{"description":"Status of the vulnerability for the application\'s point of view.","example":"Resolved","type":"string"},"status_id":{"description":"Internal ID of the vulnerability status.","example":4,"type":"integer"},"status_text":{"description":"Complementary text to the status.","example":"Not relevant","nullable":true,"type":"string"},"synopsis":{"description":"Synopsis of the CVE.","example":"CVE-2016-0800","type":"string"}},"required":["business_risk","business_risk_id","business_risk_text","cve_status_id","cve_status_text","cvss2_score","cvss3_score","description","first_reported","impact","public_date","reporter","rule","status","status_id","status_text","synopsis","known_exploit","advisory_available","remediation"],"type":"object"},"id":{"description":"CVE id.","example":"CVE-2016-0800","type":"string"},"type":{"description":"Type of the record.","example":"cve","type":"string"}},"required":["id","type","attributes"],"type":"object"},"type":"array"}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaCves"}},"required":["data","links","meta"],"type":"object"},"SystemDetailsOut":{"properties":{"data":{"properties":{"last_evaluation":{"description":"Date of last evaluation.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"last_upload":{"description":"Date of the latest upload of archive.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"opt_out":{"description":"System opt out status.","example":true,"type":"boolean"},"os":{"description":"Operating system.","example":"RHEL 8.4","type":"string"},"rules_evaluation":{"description":"Date of last security rules evaluation.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"stale":{"description":"System stale status.","example":true,"type":"boolean"},"tags":{"items":{"properties":{"key":{"description":"Key of the single tag.","example":"CVE","type":"string"},"namespace":{"description":"Namespace of single tag.","example":"vulnerability","nullable":true,"type":"string"},"value":{"description":"Value of the single tag.","example":"CVE-2017-1","nullable":true,"type":"string"}},"required":["namespace","key","value"],"type":"object"},"type":"array"},"updated":{"description":"Date of the lastest upload of archive taken from Inventory syndicated data.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"}},"required":["last_evaluation","rules_evaluation","opt_out","last_upload","tags","os"],"type":"object"},"meta":{"$ref":"#/components/schemas/MetaPermissions"}},"required":["data","meta"],"type":"object"},"SystemIdsOut":{"properties":{"data":{"oneOf":[{"description":"CSV export of the JSON.","type":"string"},{"items":{"properties":{"display_name":{"description":"System\'s name.","example":"system.example.com","nullable":true,"type":"string"},"id":{"description":"Inventory ID.","example":"INV-ID00-0000-1234","type":"string"},"opt_out":{"description":"Whether the system is active or not.","example":false,"nullable":true,"type":"boolean"}},"type":"object"},"type":"array"}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaSystems"}},"required":["data","links","meta"],"type":"object"},"SystemListOut":{"properties":{"data":{"oneOf":[{"description":"CSV export of the JSON.","type":"string"},{"items":{"properties":{"attributes":{"properties":{"culled_timestamp":{"description":"Timestamp from which the host is considered deleted.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"cve_count":{"description":"Number of CVE exposures for the system.","example":7,"nullable":true,"type":"integer"},"display_name":{"description":"System\'s name,","example":"system.example.com","nullable":true,"type":"string"},"insights_id":{"description":"Insights host ID.","example":"0035f6bc-cdb0-4763-8fcd-1dc58f716359","nullable":true,"type":"string"},"inventory_group":{"items":{"properties":{"id":{"description":"ID of inventory group.","example":"00000000-1111-0000-0000-000000000000","type":"string"},"name":{"description":"Name of inventory group.","example":"group01","type":"string"}},"required":["id","name"],"type":"object"},"type":"array"},"inventory_id":{"description":"Host ID.","example":"INV-ID00-0000-1234","type":"string"},"last_evaluation":{"description":"Date of last evaluation.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"last_upload":{"description":"Date of the latest upload of archive.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"opt_out":{"description":"Opt out status of the system.","example":false,"type":"boolean"},"os":{"description":"Operating system.","example":"RHEL 8.4","type":"string"},"rules_evaluation":{"description":"Date of last security rules evaluation.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"stale_timestamp":{"description":"Date when stale system becomes stale.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"stale_warning_timestamp":{"description":"Date when stale system becomes hidden in the application.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"tags":{"description":"Tags given to the system.","items":{"properties":{"key":{"description":"Key of the single tag.","example":"CVE","type":"string"},"namespace":{"description":"Namespace of single tag.","example":"vulnerability","nullable":true,"type":"string"},"value":{"description":"Value of the single tag.","example":"CVE-2017-1","nullable":true,"type":"string"}},"required":["namespace","key","value"],"type":"object"},"nullable":true,"type":"array"},"updated":{"description":"Date of the lastest upload of archive taken from Inventory syndicated data.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"}},"required":["cve_count","display_name","inventory_id","insights_id","last_evaluation","rules_evaluation","opt_out","last_upload","os","stale_timestamp","stale_warning_timestamp","tags","culled_timestamp","inventory_group"],"type":"object"},"id":{"description":"Host ID.","example":"INV-ID00-0000-1234","type":"string"},"type":{"description":"Type of the record.","example":"system","type":"string"}},"required":["id","type","attributes"],"type":"object"},"type":"array"}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaSystems"}},"required":["data","links","meta"],"type":"object"},"VersionOut":{"properties":{"application_version":{"description":"Version of application.","example":"0.1.2","type":"string"},"database_version":{"description":"Version of database schema.","example":1,"oneOf":[{"type":"string"},{"type":"number"}]}},"required":["application_version","database_version"],"type":"object"},"VulnerabilitiesIdsOut":{"properties":{"data":{"oneOf":[{"description":"CSV export of the JSON.","type":"string"},{"items":{"description":"CVE id and minimal information.","properties":{"business_risk_id":{"description":"Internal ID of the vulnerability business risk.","example":1,"type":"integer"},"business_risk_text":{"description":"Complementary text to the business risk.","example":"QA environment => Low business risk","nullable":true,"type":"string"},"id":{"description":"CVE id.","example":"CVE-2016-0800","type":"string"},"status_id":{"description":"Internal ID of the vulnerability status.","example":1,"type":"integer"},"status_text":{"description":"Complementary text to the status.","example":"Not Relevant","nullable":true,"type":"string"}},"type":"object"},"required":["business_risk_id","business_risk_text","id","status_id","status_text"],"type":"array"}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaVulnerabilitiesOut"}},"required":["data","links","meta"],"type":"object"},"VulnerabilitiesOut":{"properties":{"data":{"oneOf":[{"description":"CSV export of the JSON.","type":"string"},{"items":{"properties":{"attributes":{"properties":{"advisory_available":{"description":"Shows whether a CVE has available advisory or not","example":true,"type":"boolean"},"business_risk":{"description":"Business risk of the vulnerability.","example":"Low","type":"string"},"business_risk_id":{"description":"Internal ID of the vulnerability business risk.","example":1,"type":"integer"},"business_risk_text":{"description":"Complementary text to the business risk.","example":"QA environment => Low business risk","nullable":true,"type":"string"},"cvss2_score":{"description":"String representation of cvss2 score of the CVE.","example":"5.800","nullable":true,"type":"string"},"cvss3_score":{"description":"String representation of cvss3 score of the CVE.","example":"4.400","nullable":true,"type":"string"},"description":{"description":"Description of the CVE.","example":"A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker could...","type":"string"},"impact":{"description":"Red Hat security impact of the CVE.","example":"Important","type":"string"},"known_exploit":{"description":"Shows whether a CVE has known exploits or not","example":true,"type":"boolean"},"public_date":{"description":"String representation of ISO-8601 formatted date of first public disclosure of the CVE.","example":"2016-03-01T00:00:00+00:00","nullable":true,"type":"string"},"rules":{"items":{"$ref":"#/components/schemas/InsightsRule"},"type":"array"},"status":{"description":"Status of the vulnerability.","example":"Not Reviewed","type":"string"},"status_id":{"description":"Internal ID of the vulnerability status.","example":1,"type":"integer"},"status_text":{"description":"Complementary text to the status.","example":"Not Relevant","nullable":true,"type":"string"},"synopsis":{"description":"Synopsis of the CVE.","example":"CVE-2016-0800","type":"string"},"systems_affected":{"description":"Number of systems affected by the CVE.","example":7,"type":"integer"},"systems_status_divergent":{"description":"How many systems-CVE pairs have different status than CVE-level.","example":20,"type":"integer"}},"required":["business_risk","business_risk_id","business_risk_text","cvss2_score","cvss3_score","description","impact","public_date","rules","status","status_id","status_text","synopsis","systems_affected","systems_status_divergent","known_exploit","advisory_available"],"type":"object"},"id":{"description":"CVE id.","example":"CVE-2016-0800","type":"string"},"type":{"description":"Type of the record.","example":"cve","type":"string"}},"required":["id","type","attributes"],"type":"object"},"type":"array"}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaVulnerabilitiesOut"}},"required":["data","links","meta"],"type":"object"},"VulnerabilitiesPostIn":{"properties":{"cve_list":{"description":"Array of CVEs to provide info about","items":{"description":"CVE id.","example":"CVE-2016-0800","type":"string"},"type":"array"}},"required":["cve_list"],"type":"object"},"VulnerabilitiesPostOut":{"properties":{"data":{"items":{"properties":{"attributes":{"properties":{"cvss_score":{"description":"String representation of cvss3 or cvvs2 (if v3 is not present) score of the CVE.","example":"5.800","nullable":true,"type":"string"},"impact":{"description":"Red Hat security impact of the CVE.","example":"Important","type":"string"},"synopsis":{"description":"Synopsis of the CVE.","example":"CVE-2016-0800","type":"string"}},"required":["cvss_score","impact","synopsis"],"type":"object"},"id":{"description":"CVE id.","example":"CVE-2016-0800","type":"string"},"type":{"description":"Type of the record.","example":"cve","type":"string"}},"required":["id","type","attributes"],"type":"object"},"type":"array"},"links":{"$ref":"#/components/schemas/Links"},"meta":{"allOf":[{"$ref":"#/components/schemas/Meta"},{"$ref":"#/components/schemas/MetaPermissions"}]}},"required":["data","links","meta"],"type":"object"}},"securitySchemes":{"Authorization":{"in":"header","name":"Authorization","type":"apiKey"},"BasicAuth":{"description":"Username and password login.","scheme":"basic","type":"http","x-basicInfoFunc":"manager.base.basic_auth"}}},"info":{"title":"Vulnerability Engine Manager","version":"2.37.3"},"openapi":"3.0.0","paths":{"/announcement":{"get":{"description":"This endpoint provides vulnerability service announcements. Remain informed about important alerts for the vulnerability service. Announcements are issued by Insights Product Managers and other subject matter experts.\\n","operationId":"manager.announcement_handler.GetAnnouncement.get","responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/AnnouncementOut"}}},"description":"Announcement."}},"summary":"Announce important updates","x-methodName":"getAnnouncement"}},"/apistatus":{"get":{"description":"Checks database availability and API response threshold time.","operationId":"manager.api_status_handler.GetApiStatus.get","responses":{"200":{"description":"API is healthy"},"503":{"description":"Database is unavaiable"}},"summary":"Determine the health of the application","x-methodName":"getApiStatus"}},"/business_risk":{"get":{"description":"This endpoint helps you determine the numeric business risk for a given CVE. A business risk is a label you can set for a given CVE. Choose one of five business risk options ranging from 0-4, where 0 is not defined and 4 indicates a critical risk. You must call this endpoint to choose a numerical value before calling the *PATCH/cves/business_risk* endpoint.\\n","operationId":"manager.risk_handler.GetRisk.get","responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/BusinessRiskListOut"}}},"description":"List of business risk/business_risk_id pairs."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Access business risk values","x-methodName":"getBusinessRiskList"}},"/cves/business_risk":{"patch":{"description":"This sets a business risk for a specific CVE. Set a value of low, medium, high or critical for a given CVE. These values are obtained by the business risk path *GET/business_risk*. To set a business risk, you must call the GET/business_risk endpoint first, followed by the *PATCH/cves/business_risk* path.\\n","operationId":"manager.cve_handler.PatchCveRisk.patch","requestBody":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/CveRiskIn","x-body-name":"data"}}},"description":"Values to be set. At least one of the \\"business_risk_id\\" or \\"business_risk_text\\" parameters is required.","required":true},"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/BulkChangeOut"}}},"description":"Business risk successfully updated."},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Given CVE does not exist."},"503":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Service is running in read-only mode."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Set business risk for a CVE","x-methodName":"setCveBusinessRisk"}},"/cves/status":{"patch":{"description":"This sets the status for a specific CVE. Set a status value for a given CVE (e.g. in-review, on-hold, scheduled for a patch, or resolved). These values are obtained by sending a *GET/status* request. To set a status, you must call the *GET/business_risk* first, followed by the *PATCH/cves/status* path.\\n","operationId":"manager.cve_handler.PatchCveStatus.patch","requestBody":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/CveStatusIn","x-body-name":"data"}}},"description":"Values to be set. At least one of the \\"status_id\\" or \\"status_text\\" parameters is required.","required":true},"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/BulkChangeOut"}}},"description":"Status successfully updated."},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Given CVE does not exist."},"503":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Service is running in read-only mode."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Set status for a CVE","x-methodName":"setCveStatus"}},"/cves/{cve_id}":{"get":{"description":"This endpoint returns the CVE identification number, description, scores and other metadata. The metadata includes the description, CVSS 2/3 Score, CVSS 2/3 attack vector, severity, public date, modified date, business risk, status, a URL to Red Hat web pages, a list of advisories remediating the CVE, and information regarding known exploits for the CVE.\\n","operationId":"manager.cve_handler.GetCves.get","parameters":[{"$ref":"#/components/parameters/cve_id"},{"$ref":"#/components/parameters/advisory_available"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/CveDetailOut"}}},"description":"CVE details"},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Given CVE does not exist."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Get CVE details","x-methodName":"getCveDetails"}},"/cves/{cve_id}/affected_systems":{"get":{"description":"This is a report of affected systems for a given CVE. Use this request to obtain server identification numbers of all affected servers along with last check-in, system name and more.\\n","operationId":"manager.cve_handler.GetCvesAffectedSystems.get","parameters":[{"$ref":"#/components/parameters/filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/sort"},{"$ref":"#/components/parameters/cve_id"},{"$ref":"#/components/parameters/status_id"},{"$ref":"#/components/parameters/data_format"},{"$ref":"#/components/parameters/uuid"},{"$ref":"#/components/parameters/rule_key_deprecated"},{"$ref":"#/components/parameters/rule_presence_deprecated"},{"$ref":"#/components/parameters/rule"},{"$ref":"#/components/parameters/tags"},{"$ref":"#/components/parameters/sap_sids"},{"$ref":"#/components/parameters/sap_system"},{"$ref":"#/components/parameters/show_advisories"},{"$ref":"#/components/parameters/advisory"},{"$ref":"#/components/parameters/rhel_version"},{"$ref":"#/components/parameters/first_reported_from"},{"$ref":"#/components/parameters/first_reported_to"},{"$ref":"#/components/parameters/advisory_available"},{"$ref":"#/components/parameters/remediation"},{"$ref":"#/components/parameters/report"},{"$ref":"#/components/parameters/ansible"},{"$ref":"#/components/parameters/mssql"},{"$ref":"#/components/parameters/group_names"},{"$ref":"#/components/parameters/group_ids"},{"$ref":"#/components/parameters/host_type"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/AffectedSystemsOut"}}},"description":"Report of affected systems for a given CVE."},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Given CVE does not exist."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Determine affected systems for a given CVE","x-methodName":"getAffectedSystemsByCve"}},"/cves/{cve_id}/affected_systems/ids":{"get":{"description":"This is a report of identification numbers of affected systems for a given CVE. Use this request to obtain server identification numbers of all affected systems.\\n","operationId":"manager.cve_handler.GetCvesAffectedSystemsIds.get","parameters":[{"$ref":"#/components/parameters/filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/sort"},{"$ref":"#/components/parameters/cve_id"},{"$ref":"#/components/parameters/status_id"},{"$ref":"#/components/parameters/data_format"},{"$ref":"#/components/parameters/uuid"},{"$ref":"#/components/parameters/rule_key_deprecated"},{"$ref":"#/components/parameters/rule_presence_deprecated"},{"$ref":"#/components/parameters/rule"},{"$ref":"#/components/parameters/tags"},{"$ref":"#/components/parameters/sap_sids"},{"$ref":"#/components/parameters/sap_system"},{"$ref":"#/components/parameters/show_advisories"},{"$ref":"#/components/parameters/advisory"},{"$ref":"#/components/parameters/rhel_version"},{"$ref":"#/components/parameters/first_reported_from"},{"$ref":"#/components/parameters/first_reported_to"},{"$ref":"#/components/parameters/advisory_available"},{"$ref":"#/components/parameters/remediation"},{"$ref":"#/components/parameters/ansible"},{"$ref":"#/components/parameters/mssql"},{"$ref":"#/components/parameters/group_names"},{"$ref":"#/components/parameters/group_ids"},{"$ref":"#/components/parameters/host_type"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/AffectedSystemsIdsOut"}}},"description":"Report of IDs of affected systems for a given CVE."},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Given CVE does not exist."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Get identification numbers of affected systems for a given CVE","x-methodName":"getAffectedSystemsIdsByCve"}},"/dashbar":{"get":{"description":"These are aggregations summarizing your account such as number of unique CVEs, list of security rules, CVEs by severity and more. Use this endpoint to obtain a snapshot of all the CVES and details about their prevalence, severity and other details.\\n","operationId":"manager.dashbar_handler.GetDashbar.get","parameters":[{"$ref":"#/components/parameters/tags"},{"$ref":"#/components/parameters/sap_sids"},{"$ref":"#/components/parameters/sap_system"},{"$ref":"#/components/parameters/ansible"},{"$ref":"#/components/parameters/mssql"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/DashbarOut"}}},"description":"Dashbar aggregations."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Get aggregations for the dashbar","x-methodName":"getDashbar"}},"/dashboard":{"get":{"description":"These are aggregations summarizing your account such as number of unique CVEs, list of security rules, CVEs by severity, and more. Use this endpoint to obtain a snapshot of all the CVES and details about their prevalence and severity.\\n","operationId":"manager.dashboard_handler.GetDashboard.get","parameters":[{"$ref":"#/components/parameters/tags"},{"$ref":"#/components/parameters/sap_sids"},{"$ref":"#/components/parameters/sap_system"},{"$ref":"#/components/parameters/ansible"},{"$ref":"#/components/parameters/mssql"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Dashboard"}}},"description":"Dashboard."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Get a macro level overview of aggregated vulnerabilities","x-methodName":"getDashboard"}},"/feature/cves_without_errata":{"patch":{"description":"Use this endpoint to enable/disable reporting CVEs that do not have advisories (errata) for your customer account. If the feature is disabled, CVEs without advisories will be hidden in outputs of all endpoints.\\n","operationId":"manager.feature_handler.PatchCvesWithoutErrata.patch","requestBody":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/CvesWithoutErrataIn","x-body-name":"data"}}},"description":"Values to be set.","required":true},"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/CvesWithoutErrataOut"}}},"description":"CVEs without Errata feature successfully updated."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Set a feature flag for CVEs without errata","x-methodName":"setCvesWithoutErrata"}},"/notifications":{"delete":{"description":"Use this endpoint for restarting your already obtained notifications for CVEs.\\n","operationId":"manager.feature_handler.DeleteNotifications.delete","responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/NotificationsOut"}}},"description":"Sent notifications deleted."},"403":{"description":"Non-existing account."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Delete already sent notifications for CVEs","x-methodName":"deleteNotifications"}},"/playbooks/templates/{rule_id}":{"get":{"description":"This returns an Ansible playbook template for a given rule identification number. Use this endpoint to return an Ansible playbook template for a given rule error key. The template is used to remediate issues on your system.\\n","operationId":"manager.playbook_handler.GetTemplate.get","parameters":[{"description":"Insights security rule ID.","example":"CVE_2017_8779_rpc|CVE_2017_8779_WARN","in":"path","name":"rule_id","required":true,"schema":{"type":"string"}}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/PlaybookTemplate"}}},"description":"Playbook template response"},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Given rule id does not exist."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Get an Ansible Playbook template for CVEs with security rules","x-methodName":"getPlaybookTemplate"}},"/report/executive":{"get":{"description":"This returns an overview of vulnerabilities affecting a given account. Use this request when you need to download a high-level, executive report summarizing the security exposure of your infrastructure. These reports are designed for an executive audience and include data such as the number of RHEL systems analyzed, the number of security rules in your infrastructure, percentage of CVEs with a certain severity and more.\\n","operationId":"manager.report_handler.GetExecutive.get","responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/ExecutiveReport"}}},"description":"Executive report."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Generate an executive report","x-methodName":"getExecutiveReport"}},"/status":{"get":{"description":"This endpoint returns a list of possible values for setting status for a CVE or system-CVE pair. Call this api when you want to know which values are available for setting a status. A list of numbers will be returned. You must call this endpoint before calling the *PATCH/cves/status* endpoint.\\n","operationId":"manager.status_handler.GetStatus.get","responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/StatusListOut"}}},"description":"List of status/status_id pairs."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Access available status values","x-methodName":"getStatusList"},"patch":{"description":"This endpoint sets status for given systems and CVEs. Use this endpoint when you need to set a status value for system-CVE pairs.\\n","operationId":"manager.status_handler.PatchStatus.patch","requestBody":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/StatusIn","x-body-name":"data"}}},"description":"Values to be set.","required":true},"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/StatusOut"}}},"description":"Status successfully updated."},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Given host/CVE does not exist."},"503":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Service is running in read-only mode."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Set status for system vulnerabilities","x-methodName":"setStatus"}},"/systems":{"get":{"description":"List systems that are accessible when you are logged into your account. Use this endpoint to view basic system attributes such as display name and system type.\\n","operationId":"manager.system_handler.GetSystems.get","parameters":[{"$ref":"#/components/parameters/filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/sort"},{"$ref":"#/components/parameters/data_format"},{"$ref":"#/components/parameters/stale"},{"$ref":"#/components/parameters/uuid"},{"$ref":"#/components/parameters/tags"},{"$ref":"#/components/parameters/sap_sids"},{"$ref":"#/components/parameters/sap_system"},{"$ref":"#/components/parameters/excluded"},{"$ref":"#/components/parameters/rhel_version"},{"$ref":"#/components/parameters/report"},{"$ref":"#/components/parameters/ansible"},{"$ref":"#/components/parameters/mssql"},{"$ref":"#/components/parameters/group_names"},{"$ref":"#/components/parameters/group_ids"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/SystemListOut"}}},"description":"System list"}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"List systems","x-methodName":"getSystemsList"}},"/systems/ids":{"get":{"description":"This lists systems including those that have opted out of the current query. Use this when you do not want to see a registered system or systems in your reports.\\n","operationId":"manager.system_handler.GetSystemsIds.get","parameters":[{"$ref":"#/components/parameters/filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/sort"},{"$ref":"#/components/parameters/data_format"},{"$ref":"#/components/parameters/stale"},{"$ref":"#/components/parameters/uuid"},{"$ref":"#/components/parameters/tags"},{"$ref":"#/components/parameters/sap_sids"},{"$ref":"#/components/parameters/sap_system"},{"$ref":"#/components/parameters/excluded"},{"$ref":"#/components/parameters/rhel_version"},{"$ref":"#/components/parameters/ansible"},{"$ref":"#/components/parameters/mssql"},{"$ref":"#/components/parameters/group_names"},{"$ref":"#/components/parameters/group_ids"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/SystemIdsOut"}}},"description":"System list"}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"List systems identification numbers along with opt out state","x-methodName":"getSystemsIds"}},"/systems/opt_out":{"patch":{"description":"Opt a specific system in or out of vulnerability analysis. Use this when you want to use other Insights services but do not want to see specific systems in vulnerability reports. This allows you to hide select systems.\\n","operationId":"manager.system_handler.PatchBulkSystemsOptOut.patch","requestBody":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/OptOutIn","x-body-name":"data"}}},"description":"Values to be set.","required":true},"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/BulkChangeOut"}}},"description":"System(s) setting has been updated."},"503":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Service is running in read-only mode."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Opt a system in or out of the vulnerability service","x-methodName":"setSystemsOptOut"}},"/systems/{inventory_id}":{"get":{"description":"This allows you to get information about systems related to an inventory identification number. This includes details such as operating system, inventory tags, last update, opt-out status, and more.\\n","operationId":"manager.system_handler.GetSystemDetails.get","parameters":[{"$ref":"#/components/parameters/inventory_id"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/SystemDetailsOut"}}},"description":"System details"},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"System has not been found in the database."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Get system details","x-methodName":"getSystemDetails"}},"/systems/{inventory_id}/cves":{"get":{"description":"This endpoint displays detailed information about all CVEs for which a system is exposed. Use this endpoint to discover which CVEs are affecting a given system. CVE metadata is included.\\n","operationId":"manager.system_handler.GetSystemsCves.get","parameters":[{"$ref":"#/components/parameters/inventory_id"},{"$ref":"#/components/parameters/cve_filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/cve_sort"},{"$ref":"#/components/parameters/cvss_from"},{"$ref":"#/components/parameters/cvss_to"},{"$ref":"#/components/parameters/public_from"},{"$ref":"#/components/parameters/public_to"},{"$ref":"#/components/parameters/impact"},{"$ref":"#/components/parameters/status_id"},{"$ref":"#/components/parameters/data_format"},{"$ref":"#/components/parameters/business_risk_id"},{"$ref":"#/components/parameters/rule_presence"},{"$ref":"#/components/parameters/show_advisories"},{"$ref":"#/components/parameters/advisory"},{"$ref":"#/components/parameters/rule_key"},{"$ref":"#/components/parameters/known_exploit"},{"$ref":"#/components/parameters/first_reported_from"},{"$ref":"#/components/parameters/first_reported_to"},{"$ref":"#/components/parameters/advisory_available"},{"$ref":"#/components/parameters/remediation"},{"$ref":"#/components/parameters/report"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/SystemCvesOut"}}},"description":"CVE report."},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"System has not been found in the database."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Get a CVE report for a system","x-methodName":"getCveListBySystem"}},"/systems/{inventory_id}/cves/ids":{"get":{"description":"This endpoint displays identification numbers of all CVEs for which a system is exposed. Use this endpoint to learn which CVEs are affecting a given system.\\n","operationId":"manager.system_handler.GetSystemsCvesIds.get","parameters":[{"$ref":"#/components/parameters/inventory_id"},{"$ref":"#/components/parameters/cve_filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/cve_sort"},{"$ref":"#/components/parameters/cvss_from"},{"$ref":"#/components/parameters/cvss_to"},{"$ref":"#/components/parameters/public_from"},{"$ref":"#/components/parameters/public_to"},{"$ref":"#/components/parameters/impact"},{"$ref":"#/components/parameters/status_id"},{"$ref":"#/components/parameters/data_format"},{"$ref":"#/components/parameters/business_risk_id"},{"$ref":"#/components/parameters/rule_presence"},{"$ref":"#/components/parameters/show_advisories"},{"$ref":"#/components/parameters/advisory"},{"$ref":"#/components/parameters/rule_key"},{"$ref":"#/components/parameters/known_exploit"},{"$ref":"#/components/parameters/first_reported_from"},{"$ref":"#/components/parameters/first_reported_to"},{"$ref":"#/components/parameters/advisory_available"},{"$ref":"#/components/parameters/remediation"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/SystemCvesIdsOut"}}},"description":"CVE Ids report."},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"System has not been found in the database."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Get a CVE identification number report for a system","x-methodName":"getCveIdsBySystem"}},"/version":{"get":{"description":"This endpoint will provide you with the application version. Use this endpoint to track application changes.\\n","operationId":"manager.version_handler.GetVersion.get","responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/VersionOut"}}},"description":"Application version."}},"summary":"Get application version","x-methodName":"getVersion"}},"/vulnerabilities/cves":{"get":{"description":"This provides an overview of vulnerabilities across your entire system inventory. Use this endpoint to get an overview of which CVEs are affecting your account, including some CVE metadata, how many systems are affected by each CVE, and more.\\n","operationId":"manager.vulnerabilities_handler.GetCves.get","parameters":[{"$ref":"#/components/parameters/cve_filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/cve_sort"},{"$ref":"#/components/parameters/cvss_from"},{"$ref":"#/components/parameters/cvss_to"},{"$ref":"#/components/parameters/public_from"},{"$ref":"#/components/parameters/public_to"},{"$ref":"#/components/parameters/impact"},{"$ref":"#/components/parameters/data_format"},{"$ref":"#/components/parameters/business_risk_id"},{"$ref":"#/components/parameters/status_id"},{"$ref":"#/components/parameters/rule_presence"},{"$ref":"#/components/parameters/tags"},{"$ref":"#/components/parameters/sap_sids"},{"$ref":"#/components/parameters/sap_system"},{"$ref":"#/components/parameters/known_exploit"},{"$ref":"#/components/parameters/affecting"},{"$ref":"#/components/parameters/rhel_version"},{"$ref":"#/components/parameters/report"},{"$ref":"#/components/parameters/advanced_report"},{"$ref":"#/components/parameters/ansible"},{"$ref":"#/components/parameters/mssql"},{"$ref":"#/components/parameters/advisory_available"},{"$ref":"#/components/parameters/group_names"},{"$ref":"#/components/parameters/group_ids"},{"$ref":"#/components/parameters/affecting_host_type"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/VulnerabilitiesOut"}}},"description":"Vulnerabilities overview."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Get a vulnerabilities overview","x-methodName":"getCveList"},"post":{"description":"This is an overview of vulnerabilities for specific CVEs provided in the body. Use this endpoint to get a CVSS score, and learn the severity for a list of CVEs provided in the request.\\n","operationId":"manager.vulnerabilities_handler.PostCves.post","parameters":[{"$ref":"#/components/parameters/cve_filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/sort"}],"requestBody":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/VulnerabilitiesPostIn","x-body-name":"data"}}},"description":"List of CVEs to provide info about.","required":true},"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/VulnerabilitiesPostOut"}}},"description":"Vulnerabilities overview."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Send a vulnerabilities overview","x-methodName":"getCveList"}},"/vulnerabilities/cves/ids":{"get":{"description":"This is an overview of vulnerabilities identification numbers across your entire system inventory. Use this endpoint to get an overview of which CVEs are affecting your account.\\n","operationId":"manager.vulnerabilities_handler.GetCvesIds.get","parameters":[{"$ref":"#/components/parameters/cve_filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/cve_sort"},{"$ref":"#/components/parameters/cvss_from"},{"$ref":"#/components/parameters/cvss_to"},{"$ref":"#/components/parameters/public_from"},{"$ref":"#/components/parameters/public_to"},{"$ref":"#/components/parameters/impact"},{"$ref":"#/components/parameters/data_format"},{"$ref":"#/components/parameters/business_risk_id"},{"$ref":"#/components/parameters/status_id"},{"$ref":"#/components/parameters/rule_presence"},{"$ref":"#/components/parameters/tags"},{"$ref":"#/components/parameters/sap_sids"},{"$ref":"#/components/parameters/sap_system"},{"$ref":"#/components/parameters/known_exploit"},{"$ref":"#/components/parameters/affecting"},{"$ref":"#/components/parameters/rhel_version"},{"$ref":"#/components/parameters/ansible"},{"$ref":"#/components/parameters/mssql"},{"$ref":"#/components/parameters/advisory_available"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/VulnerabilitiesIdsOut"}}},"description":"Vulnerabilities IDs overview."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Get an overview of Vulnerabilities\' identification numbers","x-methodName":"getCveIdsList"}}},"servers":[{"url":"/api/vulnerability/v1"}]}}')}}]); \ No newline at end of file +"use strict";(self.webpackChunkapidocs=self.webpackChunkapidocs||[]).push([[5781],{75781:function(e){e.exports=JSON.parse('{"extras":{},"openapi":{"components":{"parameters":{"account_id":{"description":"Account ID of user.","example":"123456","in":"path","name":"account_id","required":true,"schema":{"type":"string"}},"advanced_report":{"description":"Needs to be used when endpoint data is used for Report by CVEs feature, checks RBAC permission for advanced report.","example":false,"in":"query","name":"advanced_report","schema":{"type":"boolean"}},"advisory":{"description":"Filter by advisory name, works only with show_advisories=true","example":"RHSA-2019:1481","in":"query","name":"advisory","schema":{"type":"string"}},"advisory_available":{"description":"String of booleans (array of booleans), where true shows CVE-system pairs with available advisory, false shows CVE-system pairs without available advisory.","example":"true,false","in":"query","name":"advisory_available","schema":{"items":{"type":"boolean"},"maxItems":2,"type":"array"}},"affecting":{"description":"Comma seprated string with bools (array of bools). True value controls displaying CVEs with at least one system affected. False value toggles CVEs with no systems affected. Defaults to showing only CVEs with at least one system affected.","example":"true,false","in":"query","name":"affecting","schema":{"items":{"type":"boolean"},"maxItems":2,"type":"array"}},"affecting_host_type":{"description":"Controls, whenever CVE has 1 or more affecting systems. Value \\"edge\\" returns CVEs with one or more vulnerable immutable systems, value \\"rpmdnf\\" returns CVEs with one or more vulnerable conventional systems. Value \\"none\\" returns CVEs not affecting systems of any kind.","example":"edge,none","in":"query","name":"affecting_host_type","schema":{"items":{"enum":["rpmdnf","edge","none"],"type":"string"},"maxItems":3,"type":"array"}},"ansible":{"description":"Boolean value which shows systems managed by Ansible Automation Platform.","example":false,"in":"query","name":"ansible","schema":{"type":"boolean"}},"business_risk_id":{"description":"Filter based on business risk IDs.","in":"query","name":"business_risk_id","schema":{"example":"1,3","type":"string"}},"cve_filter":{"description":"Full text filter for CVE and it\'s description text.","example":"CVE-2017","in":"query","name":"filter","schema":{"type":"string"}},"cve_id":{"description":"CVE id.","example":"CVE-2016-0800","in":"path","name":"cve_id","required":true,"schema":{"type":"string"}},"cve_sort":{"description":"Sorting used for response.","example":"-synopsis","in":"query","name":"sort","schema":{"type":"string"}},"cvss_from":{"description":"Filter based on cvss score, starting from the value. Use -1 to include also CVEs with N/A cvss score.","example":4.6,"in":"query","name":"cvss_from","schema":{"type":"number"}},"cvss_to":{"description":"Filter based on cvss score, up to the value.","example":7.2,"in":"query","name":"cvss_to","schema":{"type":"number"}},"data_format":{"description":"Format of the output data, either JSON (default) or CSV.","in":"query","name":"data_format","schema":{"example":"json","type":"string"}},"excluded":{"description":"Comma seprated string with bools (array of bools). True boolean value displays systems which are excluded. False value displays systems excluded from vulnerability analysis. Defaults to showing only those systems which are not excluded.","example":"true,false","in":"query","name":"excluded","schema":{"items":{"type":"boolean"},"maxItems":2,"type":"array"}},"filter":{"description":"Full text filter for the display name of system.","example":"INV-ID-1234","in":"query","name":"filter","schema":{"type":"string"}},"first_reported_from":{"description":"Filter for CVEs/Systems where the vulnerability appeared after given date.","example":"2017-09-18T00:00:00+00:00","in":"query","name":"first_reported_from","required":false,"schema":{"description":"Datetime string","type":"string"}},"first_reported_to":{"description":"Filter for CVEs/Systems where the vulnerability appeared before given date.","example":"2017-09-18T00:00:00+00:00","in":"query","name":"first_reported_to","required":false,"schema":{"description":"Datetime string","type":"string"}},"group_ids":{"description":"IDs of the inventory groups.","example":"00000000-1111-0000-0000-000000000000,00000000-2222-0000-0000-000000000000","in":"query","name":"group_ids","schema":{"items":{"type":"string"},"type":"array"}},"group_names":{"description":"Names of the inventory groups.","example":"Production,Stage","in":"query","name":"group_names","schema":{"items":{"type":"string"},"type":"array"}},"host_type":{"description":"For filtering out the systems based on their type. Value \\"rpmdnf\\" for RPMDNF systems, \\"edge\\" for OSTree systems.","in":"query","name":"host_type","schema":{"items":{"enum":["rpmdnf","edge"],"type":"string"},"maxItems":2,"type":"array"}},"impact":{"description":"Filter based on impact IDs.","example":"5,7","in":"query","name":"impact","schema":{"type":"string"}},"inventory_id":{"description":"Inventory ID.","example":"INV-ID-0000-1234","in":"path","name":"inventory_id","required":true,"schema":{"format":"uuid","type":"string"}},"known_exploit":{"description":"String of booleans (array of booleans), where true shows CVEs with known exploits, false shows CVEs without known exploits.","example":"true,false","in":"query","name":"known_exploit","schema":{"items":{"type":"boolean"},"maxItems":2,"type":"array"}},"limit":{"description":"Maximum number of records per page. Limit/Offset pagination wins over page/page_size pagination.","example":25,"in":"query","name":"limit","schema":{"maximum":9007199254740991,"minimum":1,"type":"integer"}},"mssql":{"description":"Boolean value which shows systems managed by MSSQL.","example":false,"in":"query","name":"mssql","schema":{"type":"boolean"}},"offset":{"description":"Offset of first record of paginated response. Limit/Offset pagination wins over page/page_size pagination.","example":1,"in":"query","name":"offset","schema":{"maximum":9007199254740991,"minimum":0,"type":"integer"}},"page":{"description":"Page number of paginated response. Limit/Offset pagination wins over page/page_size pagination.","example":1,"in":"query","name":"page","schema":{"maximum":9007199254740991,"minimum":1,"type":"integer"}},"page_size":{"description":"Page size of paginated response. Limit/Offset pagination wins over page/page_size pagination.","example":25,"in":"query","name":"page_size","schema":{"maximum":9007199254740991,"minimum":1,"type":"integer"}},"public_from":{"description":"Filter CVEs based on their published date, starting from the date.","example":"2017-09-18T00:00:00+00:00","in":"query","name":"public_from","schema":{"type":"string"}},"public_to":{"description":"Filter CVEs based on their published date, up to the date.","example":"2017-09-18T00:00:00+00:00","in":"query","name":"public_to","schema":{"type":"string"}},"remediation":{"description":"Filer based on available remediation type id.","in":"query","name":"remediation","schema":{"example":1,"type":"string"}},"report":{"description":"Needs to be used when endpoint data is used for report generation, checks RBAC permission for report and export feature.","example":false,"in":"query","name":"report","required":false,"schema":{"type":"boolean"}},"rhel_version":{"description":"Filters results by RHEL OS version. Automatically flters out systems which are not RHEL or have uknown OS.","in":"query","name":"rhel_version","required":false,"schema":{"description":"List of RHEL versions. E.g. 7,8.1 will filter out everything which is not RHEL 7.x or RHEL 8.1","type":"string"}},"rule":{"description":"Filters CVEs or systems by security rule, has two functionalities. If value is false, shows results without security rules, every other value is taken as rule error key.","example":"CVE_2018_3639_cpu_kernel|CVE_2018_3639_CPU_BAD_MICROCODE_2,CVE_2018_12207_cpu_kernel|CVE_2018_12207_CPU_KERNEL_FOR_SURE","in":"query","name":"rule","schema":{"items":{"minLength":1,"type":"string"},"type":"array"}},"rule_key":{"description":"Filters security rules by its error key.","example":"CVE_2018_3639_cpu_kernel|CVE_2018_3639_CPU_BAD_MICROCODE_2,CVE_2018_12207_cpu_kernel|CVE_2018_12207_CPU_KERNEL_FOR_SURE","in":"query","name":"rule_key","schema":{"items":{"type":"string"},"type":"array"}},"rule_key_deprecated":{"deprecated":true,"description":"Filters security rules by its error key.","example":"CVE_2018_3639_cpu_kernel|CVE_2018_3639_CPU_BAD_MICROCODE_2,CVE_2018_12207_cpu_kernel|CVE_2018_12207_CPU_KERNEL_FOR_SURE","in":"query","name":"rule_key","schema":{"items":{"type":"string"},"type":"array"}},"rule_presence":{"description":"Comma seprated string with bools. If true shows only CVEs with security rule associated, if false shows CVEs without rules. true, false shows all.","example":"true,false","in":"query","name":"rule_presence","schema":{"items":{"type":"boolean"},"maxItems":2,"type":"array"}},"rule_presence_deprecated":{"deprecated":true,"description":"Comma seprated string with bools. If true shows only CVEs with security rule associated, if false shows CVEs without rules. true, false shows all.","example":"true,false","in":"query","name":"rule_presence","schema":{"items":{"type":"boolean"},"maxItems":2,"type":"array"}},"sap_sids":{"description":"List of SAP IDs to filter with","example":"ABC,CDE","in":"query","name":"sap_sids","schema":{"items":{"type":"string"},"type":"array"}},"sap_system":{"description":"Boolean value which shows systems managed by SAP.","example":false,"in":"query","name":"sap_system","schema":{"type":"boolean"}},"show_advisories":{"description":"If true shows advisories list","example":false,"in":"query","name":"show_advisories","schema":{"type":"boolean"}},"sort":{"description":"Sorting used for response.","example":"-inventory_id","in":"query","name":"sort","schema":{"type":"string"}},"stale":{"description":"If set to true, shows stale systems. If not set defaults to false.","in":"query","name":"stale","schema":{"type":"boolean"}},"status_id":{"description":"Filer based on CVE status ID.","in":"query","name":"status_id","schema":{"example":"1,4","type":"string"}},"tags":{"description":"Filter based on hosts tags. Tags needs to be in query format, that means /= or / if value is null. Characters \'/\', \'=\' in tag values needs to be escaped by url encoding.","example":"vulnerability/usage=server","in":"query","name":"tags","schema":{"items":{"pattern":"^([^=/]+\\\\/){1}([^=/])+(=[^=/]+)?$","type":"string"},"type":"array"}},"uuid":{"description":"Filter based on UUID of inventory.","example":"2ee58c62-809f-11ea-bc55-0242ac130003","in":"query","name":"uuid","schema":{"type":"string"}}},"schemas":{"AffectedSystemsIdsOut":{"properties":{"data":{"oneOf":[{"description":"CSV export of the JSON.","type":"string"},{"items":{"description":"Smallest dataset for frontend to work.","properties":{"display_name":{"description":"System\'s name.","example":"system.example.com","type":"string"},"inventory_id":{"description":"Host ID.","example":"INV-ID00-0000-1234","type":"string"},"mitigation_reason":{"description":"Reason why the system is not vulnerable.","example":"SELinux mitigates the issue","nullable":true,"type":"string"},"remediation":{"description":"Type of available remediation, 0 for none, 1 for manual, 2 for playbook.","enum":[0,1,2],"type":"number"},"rule_id":{"description":"ID of associated security rule.","example":"CVE_2017_14491_dnsmasq|CVE_2017_14491_ERROR","nullable":true,"type":"string"},"status_id":{"description":"Internal ID of the vulnerability status.","example":4,"type":"integer"},"status_text":{"description":"Complementary text to the status.","example":"Not relevant","nullable":true,"type":"string"}},"required":["inventory_id","rule_id","status_id","status_text","display_name","remediation"],"type":"object"},"type":"array"}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaAffectedSystems"}},"required":["data","links","meta"],"type":"object"},"AffectedSystemsOut":{"properties":{"data":{"oneOf":[{"description":"CSV export of the JSON.","type":"string"},{"items":{"properties":{"attributes":{"properties":{"advisories_list":{"description":"List of advisories for system","items":{"description":"Advisory id","example":"RHSA-2019:1481","type":"string"},"type":"array"},"advisory_available":{"description":"Shows whether a CVE has available advisory or not","example":true,"type":"boolean"},"culled_timestamp":{"description":"Timestamp from which the host is considered deleted.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"cve_status_id":{"description":"Internal ID of the CVE status.","example":4,"type":"integer"},"display_name":{"description":"System\'s name.","example":"system.example.com","nullable":true,"type":"string"},"first_reported":{"description":"Date of when the CVE was first reported on the system.","example":"2018-09-22T16:00:00+00:00","type":"string"},"insights_id":{"description":"Insights host ID.","example":"0035f6bc-cdb0-4763-8fcd-1dc58f716359","nullable":true,"type":"string"},"inventory_group":{"items":{"properties":{"id":{"description":"ID of inventory group.","example":"00000000-1111-0000-0000-000000000000","type":"string"},"name":{"description":"Name of inventory group.","example":"group01","type":"string"}},"required":["id","name"],"type":"object"},"type":"array"},"inventory_id":{"description":"Host ID.","example":"INV-ID00-0000-1234","type":"string"},"last_evaluation":{"description":"Date of last evaluation.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"mitigation_reason":{"description":"Reason why the system is not vulnerable.","example":"SELinux mitigates the issue","nullable":true,"type":"string"},"os":{"description":"Operating system.","example":"RHEL 8.4","type":"string"},"remediation":{"description":"Type of available remediation, 0 for none, 1 for manual, 2 for playbook.","enum":[0,1,2],"type":"number"},"reporter":{"description":"Reporter of the vulnerability, 1 for VMaaS, 2 for security rule, 3 for both VMaaS and rule.","enum":[0,1,2,3],"type":"number"},"rule":{"description":"Details of associated security rule.","nullable":true,"properties":{"details":{"description":"Additional information specific to the system rule hit.","type":"object"},"resolution":{"description":"Details of recommended resolution.","properties":{"resolution":{"description":"Recommended resolution of the issue.","example":"Red Hat recommends that you update the dnsmasq package","nullable":true,"type":"string"}},"required":["resolution"],"type":"object"},"rule":{"properties":{"description":{"description":"Description of the associated security rule.","example":"CVE-2017-14491 dnsmasq code execution with listening processes","nullable":true,"type":"string"},"more_info":{"description":"Additional information about the issue.","example":"For more information about this specific flaw, see its ...","nullable":true,"type":"string"},"node_id":{"description":"ID of associated Red Hat knowledgebase article.","example":3199382,"nullable":true,"type":"integer"},"reason":{"description":"Reason of why rule did hit.","example":"This system is vulnerable because it is running a vulnerable package.","nullable":true,"type":"string"},"rule_id":{"description":"ID of associated security rule.","example":"CVE_2017_14491_dnsmasq|CVE_2017_14491_ERROR","type":"string"}},"required":["description","more_info","node_id","reason","rule_id"],"type":"object"}},"required":["details","resolution","rule"],"type":"object"},"rules_evaluation":{"description":"Date of last security rules evaluation.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"stale_timestamp":{"description":"Date when stale system becomes stale.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"stale_warning_timestamp":{"description":"Date when stale system becomes hidden in the application.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"status_id":{"description":"Internal ID of the vulnerability status.","example":4,"type":"integer"},"status_name":{"description":"Status of the vulnerability for the application\'s point of view.","example":"Resolved","type":"string"},"status_text":{"description":"Complementary text to the status.","example":"Not relevant","nullable":true,"type":"string"},"tags":{"items":{"properties":{"key":{"description":"Key of the single tag.","example":"CVE","type":"string"},"namespace":{"description":"Namespace of single tag.","example":"vulnerability","nullable":true,"type":"string"},"value":{"description":"Value of the single tag.","example":"CVE-2017-1","nullable":true,"type":"string"}},"required":["namespace","key","value"],"type":"object"},"type":"array"},"updated":{"description":"Date of the lastest upload of archive taken from Inventory syndicated data.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"}},"required":["cve_status_id","culled_timestamp","display_name","first_reported","inventory_id","insights_id","last_evaluation","os","reporter","rule","rules_evaluation","stale_timestamp","stale_warning_timestamp","status_id","status_name","status_text","tags","updated","advisory_available","remediation","mitigation_reason","inventory_group"],"type":"object"},"id":{"description":"Host id.","example":"INV-ID-0000-1234","type":"string"},"type":{"description":"Type of the record.","example":"system","type":"string"}},"required":["id","type","attributes"],"type":"object"},"type":"array"}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaAffectedSystems"}},"required":["data","links","meta"],"type":"object"},"AnnouncementOut":{"properties":{"last_updated":{"description":"Datetime string.","example":"2004-10-19 10:23:54+02","type":"string"},"message":{"description":"Announcement message.","example":"Hello from Vulnerability team :).","type":"string"}},"required":["message","last_updated"],"type":"object"},"BulkChangeOut":{"properties":{"meta":{"$ref":"#/components/schemas/MetaPermissions"},"updated":{"description":"List of updated objects/updated object IDs.","items":{"example":"f35b1e1d-d231-43f2-8e4f-8f9cb01e3aa2","type":"string"},"type":"array"}},"required":["updated"],"type":"object"},"BusinessRiskListOut":{"properties":{"data":{"description":"List of available business risk/business_risk_id pairs.","items":{"properties":{"id":{"description":"Internal business_risk_id.","example":3,"type":"integer"},"name":{"description":"Represenation of internal business_risk_id.","example":"Low","type":"string"}},"required":["id","name"],"type":"object"},"type":"array"},"meta":{"properties":{"total_items":{"description":"Total number of available business risk/business_risk_id pairs.","example":1,"type":"integer"}},"required":["total_items"],"type":"object"}},"required":["data","meta"],"type":"object"},"CveDetailOut":{"properties":{"data":{"properties":{"attributes":{"properties":{"advisories_list":{"description":"List of advisory names or detailed advisory information","items":{"oneOf":[{"example":"RHSA-2015:0809","type":"string"},{"properties":{"attributes":{"properties":{"advisory_type":{"example":3,"type":"integer"},"applicable_systems":{"example":2559,"type":"integer"},"description":{"example":"The bash packages provide Bash (Bourne-again shell), which is the default shell for Red Hat Enterprise Linux...","type":"string"},"public_date":{"example":"2020-09-01T15:22:07Z","type":"string"},"severity":{"example":2,"type":"integer"},"synopsis":{"example":"Moderate: bash security update","type":"string"}},"required":["applicable_systems"],"type":"object"},"id":{"example":"RHSA-2020:3592","type":"string"},"type":{"example":"advisory","type":"string"}},"required":["id","type"],"type":"object"}]},"nullable":true,"type":"array"},"affected_but_not_vulnerable":{"description":"Number of systems that are affected by given CVE but are not vulnerable.","example":0,"nullable":true,"type":"integer"},"affected_systems":{"description":"Number of systems that are overall affected by given CVE","example":52,"nullable":true,"type":"integer"},"business_risk":{"description":"Business risk of the vulnerability.","example":"Low","type":"string"},"business_risk_id":{"description":"Internal ID of the vulnerability business risk.","example":1,"type":"integer"},"business_risk_text":{"description":"Complementary text to the business risk.","example":"QA environment => Low business risk","nullable":true,"type":"string"},"celebrity_name":{"description":"\\"Celebrity\\" name of the CVE.","example":"Spectre/Meltdown","nullable":true,"type":"string"},"cvss2_metrics":{"description":"cvss2 metrics of the CVE.","example":"AV:N/AC:M/Au:N/C:P/I:P/A:N","nullable":true,"type":"string"},"cvss2_score":{"description":"String representation of cvss2 score of the CVE.","example":"5.800","nullable":true,"type":"string"},"cvss3_metrics":{"description":"cvss3 metrics of the CVE.","example":"AV:N/AC:M/Au:N/C:P/I:P/A:N","nullable":true,"type":"string"},"cvss3_score":{"description":"String representation of cvss3 score of the CVE.","example":"4.400","nullable":true,"type":"string"},"description":{"description":"Description of the CVE.","example":"A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker could...","type":"string"},"impact":{"description":"Red Hat security impact of the CVE.","example":"Important","type":"string"},"known_exploit":{"description":"Shows whether a CVE has known exploits or not","example":true,"type":"boolean"},"modified_date":{"description":"String representation of ISO-8601 formatted date of last modification of the CVE.","example":"2019-03-07T08:15:36+00:00","nullable":true,"type":"string"},"public_date":{"description":"String representation of ISO-8601 formatted date of first public disclosure of the CVE.","example":"2016-03-01T00:00:00+00:00","nullable":true,"type":"string"},"redhat_url":{"description":"Additional resource about the CVE, provided by Red Hat.","example":"https://access.redhat.com/security/cve/cve-2016-0800","nullable":true,"type":"string"},"rules":{"items":{"$ref":"#/components/schemas/InsightsRule"},"type":"array"},"secondary_url":{"description":"Additional resources about the CVE.","example":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800","nullable":true,"type":"string"},"status":{"description":"Status of the vulnerability.","example":"Not Reviewed","type":"string"},"status_id":{"description":"Internal ID of the vulnerability status.","example":1,"type":"integer"},"status_text":{"description":"Complementary text to the status.","example":"Not relevant","nullable":true,"type":"string"},"synopsis":{"description":"Synopsis of the CVE.","example":"CVE-2016-0800","type":"string"},"systems_status_detail":{"description":"Counts of systems with given status type.","type":"object"},"systems_status_divergent":{"description":"How many systems-CVE pairs have different status than CVE-level.","example":20,"type":"integer"}},"required":["business_risk","business_risk_id","business_risk_text","celebrity_name","cvss2_metrics","cvss2_score","cvss3_metrics","cvss3_score","description","impact","modified_date","public_date","redhat_url","rules","secondary_url","status","status_id","status_text","synopsis","systems_status_detail","systems_status_divergent","advisories_list","known_exploit","affected_but_not_vulnerable"],"type":"object"},"id":{"description":"CVE id.","example":"CVE-2016-0800","type":"string"},"type":{"description":"Type of the record.","example":"cve","type":"string"}},"required":["id","type","attributes"],"type":"object"},"meta":{"$ref":"#/components/schemas/MetaPermissions"}},"type":"object"},"CveOrList":{"example":"CVE-2016-0800","oneOf":[{"description":"CVE name.","example":"CVE-2016-0800","type":"string"},{"description":"List of CVEs for a bulk change.","items":{"example":"CVE-2016-0800","type":"string"},"type":"array"}]},"CveRiskIn":{"properties":{"business_risk_id":{"description":"Business risk ID to be set, obtained by GET method.","example":3,"type":"integer"},"business_risk_text":{"description":"Complementary text to the business risk.","example":"Not relevant","nullable":true,"type":"string"},"cve":{"$ref":"#/components/schemas/CveOrList"}},"required":["cve"],"type":"object"},"CveStatusIn":{"properties":{"cve":{"$ref":"#/components/schemas/CveOrList"},"status_id":{"description":"Status ID to be set, obtained by GET method.","example":3,"type":"integer"},"status_text":{"description":"Complementary text to the status.","example":"Not relevant","nullable":true,"type":"string"}},"required":["cve"],"type":"object"},"CvesWithoutErrataIn":{"properties":{"enable":{"description":"Enable or disable CVEs without Errata feature.","example":true,"type":"boolean"}},"required":["enable"],"type":"object"},"CvesWithoutErrataOut":{"properties":{"meta":{"$ref":"#/components/schemas/MetaPermissions"},"updated":{"properties":{"cves_without_errata":{"properties":{"enabled":{"type":"boolean"}},"type":"object"},"org_id":{"type":"string"}},"type":"object"}},"required":["updated","meta"],"type":"object"},"DashbarOut":{"properties":{"critical_cves":{"type":"number"},"cves_with_rule":{"type":"number"},"exploitable_cves":{"type":"number"},"important_cves":{"type":"number"}},"type":"object"},"Dashboard":{"properties":{"cves_by_severity":{"description":"Number of CVEs discovered on the managed systems, divided into buckets based on their CVSSv3 score (CVSSv2 is used when CVSSv3 is not available).","properties":{"0to3.9":{"properties":{"count":{"description":"Number of CVEs with CVSS score lower than 4.","example":1902,"type":"integer"},"known_exploits":{"description":"Number of CVEs in given bracket with a known exploit.","example":6,"type":"number"},"percentage":{"description":"Percentage of CVEs with CVSS score lower than 4.","example":60,"type":"number"}},"required":["count","percentage"],"type":"object"},"4to7.9":{"properties":{"count":{"description":"Number of CVEs with CVSS score higher or equal to 4 and lower then 8.","example":400,"type":"integer"},"known_exploits":{"description":"Number of CVEs in given bracket with a known exploit.","example":6,"type":"number"},"percentage":{"description":"Percentage of CVEs with CVSS score higher or equal to 4 and lower then 8.","example":15,"type":"number"}},"required":["count","percentage"],"type":"object"},"8to10":{"properties":{"count":{"description":"Number of CVEs with CVSS score higher or equal to 8.","example":109,"type":"integer"},"known_exploits":{"description":"Number of CVEs in given bracket with a known exploit.","example":6,"type":"number"},"percentage":{"description":"Percentage of CVEs with CVSS score higher or equal to 8.","example":2,"type":"number"}},"required":["count","percentage"],"type":"object"}},"required":["0to3.9","4to7.9","8to10"],"type":"object"},"cves_total":{"description":"Number of unique CVEs discovered on the managed systems.","example":1902,"type":"integer"},"exploited_cves_count":{"description":"unique number of CVEs having known exploit affecting at least one system","example":5,"type":"integer"},"recent_cves":{"description":"Number of recently published CVEs identified on managed systems","properties":{"last30days":{"description":"Number of CVEs identified on managed systems published in last 30 days.","example":62,"type":"integer"},"last7days":{"description":"Number of CVEs identified on managed systems published in last 7 days.","example":14,"type":"integer"},"last90days":{"description":"Number of CVEs identified on managed systems published in last 90 days.","example":156,"type":"integer"}},"required":["last7days","last30days","last90days"],"type":"object"},"recent_rules":{"description":"List of recently (14 days) released security rules.","items":{"description":"Security rule.","properties":{"associated_cves":{"description":"List of CVEs associated with the security rule.","items":{"description":"CVE name.","example":"CVE-2016-0800","type":"string"},"type":"array"},"description":{"description":"Description of the issue related with the security rule.","example":"A heap-based buffer overflow was found in the way ...","type":"string"},"id":{"description":"ID of the security rule.","example":"CVE_2019_11135_cpu_taa|CVE_2019_11135_CPU_TAA_KERNEL","type":"string"},"name":{"description":"Name of the security rule.","example":"sudo privilege escalation","type":"string"},"node_id":{"description":"Node id of access.redhat.com/node/* article.","example":5737621,"nullable":true,"type":"number"},"public_date":{"description":"String representation of ISO-8601 formatted date of release of the security rule.","example":"2016-03-01T00:00:00+00:00","nullable":true,"type":"string"},"severity":{"description":"Number representation of the security rule severity.","example":3,"type":"number"},"systems_affected":{"description":"Number of systems triggering the security rule.","example":178,"type":"number"}},"type":"object"},"required":["associated_cves","description","name","node_id","severity","systems_affected"],"type":"array"},"rules_cves_total":{"description":"Total number of CVEs with associated security rules affecting given account.","example":12,"type":"integer"},"system_count":{"description":"Total systems registered to Vulnerability service (with applied filtering).","example":241,"type":"integer"}},"required":["cves_total","cves_by_severity","recent_cves","recent_rules","rules_cves_total","system_count","exploited_cves_count"],"type":"object"},"Errors":{"properties":{"errors":{"items":{"properties":{"detail":{"oneOf":[{"description":"Error detail.","example":"Record not found.","type":"string"},{"description":"Returned with RBAC (user permissions) related issue","properties":{"msg":{"description":"Error detail related to RBAC problem","type":"string"},"permissions":{"description":"Array with RBAC permissions of user","items":{"type":"string"},"type":"array"}},"type":"object"}]},"status":{"description":"String representation of HTTP status code.","example":404,"type":"string"}},"required":["detail","status"],"type":"object"},"minItems":1,"type":"array"}},"required":["errors"],"type":"object"},"ExecutiveReport":{"properties":{"cves_by_severity":{"description":"Number of CVEs discovered on the managed systems, divided into buckets based on their CVSSv3 score (CVSSv2 is used when CVSSv3 is not available).","properties":{"0to3.9":{"properties":{"count":{"description":"Number of CVEs with CVSS score lower than 4.","example":1902,"type":"integer"},"percentage":{"description":"Percentage of CVEs with CVSS score lower than 4.","example":60,"type":"number"}},"required":["count","percentage"],"type":"object"},"4to7.9":{"properties":{"count":{"description":"Number of CVEs with CVSS score higher or equal to 4 and lower then 8.","example":400,"type":"integer"},"percentage":{"description":"Percentage of CVEs with CVSS score higher or equal to 4 and lower then 8.","example":15,"type":"number"}},"required":["count","percentage"],"type":"object"},"8to10":{"properties":{"count":{"description":"Number of CVEs with CVSS score higher or equal to 8.","example":109,"type":"integer"},"percentage":{"description":"Percentage of CVEs with CVSS score higher or equal to 8.","example":2,"type":"number"}},"required":["count","percentage"],"type":"object"}},"required":["0to3.9","4to7.9","8to10"],"type":"object"},"cves_total":{"description":"Number of unique CVEs discovered on the managed systems.","example":1902,"type":"integer"},"meta":{"$ref":"#/components/schemas/MetaPermissions"},"recent_cves":{"description":"Number of recently published CVEs identified on managed systems","properties":{"last30days":{"description":"Number of CVEs identified on managed systems published in last 30 days.","example":62,"type":"integer"},"last7days":{"description":"Number of CVEs identified on managed systems published in last 7 days.","example":14,"type":"integer"},"last90days":{"description":"Number of CVEs identified on managed systems published in last 90 days.","example":156,"type":"integer"}},"required":["last7days","last30days","last90days"],"type":"object"},"rules_by_severity":{"description":"Information about how much systems are affected by a security rule, broken down by rule severity.","properties":{"1":{"properties":{"rule_count":{"description":"How many unique rules with at least system affected are present.","example":12,"type":"integer"},"systems_affected":{"description":"How many unique systems are affected by at least one rules with given severity","example":443,"type":"integer"}},"required":["rule_count","systems_affected"],"type":"object"},"2":{"properties":{"rule_count":{"description":"How many unique rules with at least system affected are present.","example":12,"type":"integer"},"systems_affected":{"description":"How many unique systems are affected by at least one rules with given severity","example":443,"type":"integer"}},"required":["rule_count","systems_affected"],"type":"object"},"3":{"properties":{"rule_count":{"description":"How many unique rules with at least system affected are present.","example":12,"type":"integer"},"systems_affected":{"description":"How many unique systems are affected by at least one rules with given severity","example":443,"type":"integer"}},"required":["rule_count","systems_affected"],"type":"object"},"4":{"properties":{"rule_count":{"description":"How many unique rules with at least system affected are present.","example":12,"type":"integer"},"systems_affected":{"description":"How many unique systems are affected by at least one rules with given severity","example":443,"type":"integer"}},"required":["rule_count","systems_affected"],"type":"object"}},"required":["1","2","3","4"],"type":"object"},"rules_total":{"description":"Number of unique CVEs discovered on the managed systems.","example":1902,"type":"integer"},"system_count":{"description":"Total number of systems managed by vulnerability application.","example":25641,"type":"integer"},"system_count_per_type":{"description":"Number of systems managed by vulnerability application, grouped by host type.","properties":{"edge":{"description":"Number of immutable systems.","example":3,"nullable":true,"type":"number"},"rpmdnf":{"description":"Number of conventional systems.","example":26,"type":"number"}},"type":"object"},"top_cves":{"items":{"properties":{"cvss2_score":{"description":"String representation of cvss2 score of the CVE.","example":"5.800","nullable":true,"type":"string"},"cvss3_score":{"description":"String representation of cvss3 score of the CVE.","example":"4.400","nullable":true,"type":"string"},"description":{"description":"Description of the CVE.","example":"A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker could...","type":"string"},"known_exploit":{"description":"Shows whether a CVE has known exploits or not","example":true,"type":"boolean"},"rule_presence":{"description":"Indicator of security rule presence","example":true,"type":"boolean"},"security_rule":{"deprecated":true,"description":"Indicator of security rule presence","example":true,"type":"boolean"},"synopsis":{"description":"CVE synopsis","example":"CVE-2016-0800","type":"string"},"systems_affected":{"description":"Systems affected by the CVE.","example":1795,"type":"integer"}},"required":["synopsis","cvss2_score","cvss3_score","description","systems_affected","known_exploit"],"type":"object"},"type":"array"},"top_rules":{"items":{"properties":{"associated_cves":{"description":"All CVEs associated with the rule","items":{"example":"CVE-2019-1125","type":"string"},"type":"array"},"description":{"description":"Brief description of the issue.","example":"Privilege Escalation with running service (no fix available for this version)","type":"string"},"name":{"description":"Name of the security rule.","example":"httpd denial of service with running services","type":"string"},"rule_id":{"description":"ID of associated security rule.","example":"CVE_2017_14491_dnsmasq|CVE_2017_14491_ERROR","type":"string"},"severity":{"description":"Severity of the security rule.","example":3,"type":"integer"},"systems_affected":{"description":"Number of systems affected by the rule.","example":443,"type":"integer"}},"required":["associated_cves","description","name","rule_id","severity","systems_affected"],"type":"object"},"type":"array"}},"required":["system_count","cves_total","cves_by_severity","rules_by_severity","rules_total","recent_cves"],"type":"object"},"InsightsRule":{"properties":{"associated_cves":{"description":"List of CVEs associated with the rule.","items":{"example":"CVE-2016-0800","type":"string"},"type":"array"},"change_risk":{"description":"Indicates how likely remediation can change environment on the remediatied system.","example":1,"nullable":true,"type":"integer"},"description":{"description":"Description of the rule.","example":"CVE-2017-14491 dnsmasq code execution with listening processes","nullable":true,"type":"string"},"kbase_node_id":{"description":"ID of associated Red Hat knowledgebase article.","example":3199382,"nullable":true,"type":"integer"},"playbook_count":{"description":"Number of available Ansible playbooks for remediation/mitigation.","example":1,"nullable":true,"type":"integer"},"publish_date":{"description":"Date when the rule was published.","example":"2018-05-15T13:00:00Z","nullable":true,"type":"string"},"reboot_required":{"description":"Indicator whter reboot is required to mitigate vulnerability.","example":false,"nullable":true,"type":"boolean"},"rule_id":{"description":"ID(s) of associated security rule(s).","example":"CVE_2017_14491_dnsmasq|CVE_2017_14491_ERROR","type":"string"},"rule_impact":{"description":"Shows rules impact number from 1 to 4","example":1,"nullable":true,"type":"integer"},"summary":{"description":"Summary of the rule.","example":"A buffer overflow vulnerability was found in `Dnsmasq`, a popular lightweight DNS and DHCP server....","nullable":true,"type":"string"},"systems_affected":{"description":"Number of systems affected by the rule.","example":72,"type":"integer"}},"required":["associated_cves","change_risk","description","kbase_node_id","playbook_count","reboot_required","rule_id","summary","rule_impact","publish_date"],"type":"object"},"InventoryIdOrList":{"example":"f35b1e1d-d231-43f2-8e4f-8f9cb01e3aa2","oneOf":[{"description":"Inventory ID.","example":"f35b1e1d-d231-43f2-8e4f-8f9cb01e3aa2","type":"string"},{"description":"List of inventory IDs for a bulk change.","items":{"example":"f35b1e1d-d231-43f2-8e4f-8f9cb01e3aa2","type":"string"},"type":"array"}]},"Links":{"properties":{"first":{"description":"Link to first page.","example":"/api?offset=0&limit=1","type":"string"},"last":{"description":"Link to last page.","example":"/api?offset=7&limit=1","type":"string"},"next":{"description":"Link to next page.","example":"/api?offset=5&limit=1","nullable":true,"type":"string"},"previous":{"description":"Link to next page.","example":"/api?offset=3&limit=1","nullable":true,"type":"string"}},"required":["first","last","next","previous"],"type":"object"},"Meta":{"properties":{"data_format":{"description":"Format of the output data, either JSON (default) or CSV.","example":"JSON","type":"string"},"filter":{"description":"Full text filter","example":"CVE-2016-0800","nullable":true,"type":"string"},"limit":{"description":"Maximum number of paginated results.","example":25,"type":"integer"},"offset":{"description":"First record of paginated response.","example":0,"type":"integer"},"page":{"description":"Page number of paginated response.","example":1,"type":"integer"},"page_size":{"description":"Number of records per page of paginated response.","example":25,"type":"integer"},"pages":{"description":"Total number of pages of paginated response.","example":1,"type":"integer"},"sort":{"description":"Sorting filter.","example":"-inventory_id","nullable":true,"type":"string"},"total_items":{"description":"Total number of records.","example":37,"type":"integer"}},"required":["filter","limit","offset","page","page_size","pages","sort","total_items","data_format"],"type":"object"},"MetaAffectedSystems":{"allOf":[{"$ref":"#/components/schemas/Meta"},{"$ref":"#/components/schemas/MetaPermissions"},{"properties":{"cves_without_errata":{"description":"CVEs without Errata feature flag","nullable":true,"type":"boolean"},"first_reported_from":{"description":"Filter system-cve pairs based on first time of detection of CVE.","example":"2017-09-18T00:00:00+00:00","nullable":true,"type":"string"},"first_reported_to":{"description":"Filter system-cve pairs based on first time of detection of CVE.","example":"2017-09-18T00:00:00+00:00","nullable":true,"type":"string"},"group_ids":{"description":"ID of the inventory group.","example":"00000000-1111-0000-0000-000000000000,00000000-2222-0000-0000-000000000000","nullable":true,"type":"string"},"group_names":{"description":"Name of the inventory group.","example":"Production,Stage","nullable":true,"type":"string"},"patch_access":{"description":"If show_advisories=true shows access to patch service else null","example":true,"nullable":true,"type":"boolean"},"rhel_version":{"description":"Filter base on system RHEL version.","example":"8.2","nullable":true,"type":"string"},"rule_key":{"description":"Filters security rules by its error key.","example":"CVE_2018_3639_cpu_kernel|CVE_2018_3639_CPU_BAD_MICROCODE_2,CVE_2018_12207_cpu_kernel|CVE_2018_12207_CPU_KERNEL_FOR_SURE","nullable":true,"type":"string"},"rule_presence":{"description":"Filter based on presence of security rule","example":"true,false","nullable":true,"type":"string"},"status_id":{"description":"Filer based on CVE status ID.","example":"1,4","nullable":true,"type":"string"}},"required":["status_id","rule_key","rule_presence","patch_access","rhel_version","first_reported_from","first_reported_to","cves_without_errata","group_names","group_ids"],"type":"object"}]},"MetaCves":{"allOf":[{"$ref":"#/components/schemas/Meta"},{"$ref":"#/components/schemas/MetaPermissions"},{"properties":{"business_risk_id":{"description":"Filter based on business risk IDs.","example":"1,3","nullable":true,"type":"string"},"cves_without_errata":{"description":"CVEs without Errata feature flag","nullable":true,"type":"boolean"},"cvss_from":{"description":"Filter based on cvss score, starting from the value. Use -1 to include also CVEs with N/A cvss score.","example":4.6,"nullable":true,"type":"number"},"cvss_to":{"description":"Filter based on cvss score, up to the value.","example":7.2,"nullable":true,"type":"number"},"first_reported_from":{"description":"Filter system-cve pairs based on first time of detection of CVE.","example":"2017-09-18T00:00:00+00:00","nullable":true,"type":"string"},"first_reported_to":{"description":"Filter system-cve pairs based on first time of detection of CVE.","example":"2017-09-18T00:00:00+00:00","nullable":true,"type":"string"},"impact":{"description":"Filter based on impact IDs.","example":"5,7","nullable":true,"type":"string"},"patch_access":{"description":"If show_advisories=true shows access to patch service else null","example":true,"nullable":true,"type":"boolean"},"public_from":{"description":"Filter CVEs based on their published date, starting from the date.","example":"2017-09-18T00:00:00+00:00","nullable":true,"type":"string"},"public_to":{"description":"Filter CVEs based on their published date, up to the date.","example":"2017-09-18T00:00:00+00:00","nullable":true,"type":"string"},"rule_presence":{"description":"Filter based on presence of security rule","example":"true,false","nullable":true,"type":"string"},"status_id":{"description":"Filer based on CVE status ID.","example":"1,4","nullable":true,"type":"string"}},"required":["business_risk_id","cvss_from","cvss_to","public_from","public_to","impact","status_id","rule_presence","patch_access","first_reported_from","first_reported_to","cves_without_errata"],"type":"object"}]},"MetaCvesSystems":{"allOf":[{"$ref":"#/components/schemas/MetaCves"},{"properties":{"opt_out":{"description":"If given system was opted out.","example":true,"type":"boolean"}},"required":["opt_out"],"type":"object"}]},"MetaPermissions":{"properties":{"permissions":{"description":"Fetched permissions from RBAC for given user","items":{"example":"vulnerability:vulnerability_results:read","type":"string"},"nullable":false,"type":"array"}},"required":["permissions"],"type":"object"},"MetaSystems":{"allOf":[{"$ref":"#/components/schemas/Meta"},{"$ref":"#/components/schemas/MetaPermissions"},{"properties":{"excluded":{"description":"Display setting of opted out systems.","example":"true,false","nullable":true,"type":"string"},"rhel_version":{"description":"Filter base on system RHEL version.","example":"8.2","nullable":true,"type":"string"}},"required":["excluded","rhel_version"],"type":"object"}]},"MetaVulnerabilitiesOut":{"allOf":[{"$ref":"#/components/schemas/Meta"},{"$ref":"#/components/schemas/MetaPermissions"},{"properties":{"advisory_available":{"description":"Shows whether a CVE has available advisory or not","example":"true,false","nullable":true,"type":"string"},"affecting":{"description":"Description of CVE showing preferences","example":"True,False","nullable":true,"type":"string"},"business_risk_id":{"description":"Filter based on business risk IDs.","example":"1,3","nullable":true,"type":"string"},"cves_without_errata":{"description":"CVEs without Errata feature flag","nullable":true,"type":"boolean"},"cvss_from":{"description":"Filter based on cvss score, starting from the value. Use -1 to include also CVEs with N/A cvss score.","example":4.6,"nullable":true,"type":"number"},"cvss_to":{"description":"Filter based on cvss score, up to the value.","example":7.2,"nullable":true,"type":"number"},"impact":{"description":"Filter based on impact IDs.","example":"5,7","nullable":true,"type":"string"},"public_from":{"description":"Filter CVEs based on their published date, starting from the date.","example":"2017-09-18T00:00:00+00:00","nullable":true,"type":"string"},"public_to":{"description":"Filter CVEs based on their published date, up to the date.","example":"2017-09-18T00:00:00+00:00","nullable":true,"type":"string"},"rhel_version":{"description":"Filter base on system RHEL version.","example":"8.2","nullable":true,"type":"string"},"rule_presence":{"description":"Filter based on presence of security rule","example":"true,false","nullable":true,"type":"string"},"system_count":{"description":"Total number of systems managed by vulnerability application.","example":25641,"type":"integer"},"system_count_per_type":{"description":"Number of systems managed by vulnerability application, grouped by host type.","properties":{"edge":{"description":"Number of immutable systems.","example":3,"nullable":true,"type":"number"},"rpmdnf":{"description":"Number of conventional systems.","example":26,"type":"number"}},"type":"object"}},"required":["affecting","business_risk_id","cvss_from","cvss_to","public_from","public_to","impact","rhel_version","rule_presence","cves_without_errata","advisory_available"],"type":"object"}]},"MitigatedSystemsIdsOut":{"properties":{"data":{"oneOf":[{"description":"CSV export of the JSON.","type":"string"},{"items":{"description":"Smallest dataset for frontend to work.","properties":{"inventory_id":{"description":"Host ID.","example":"INV-ID00-0000-1234","type":"string"},"rule_id":{"description":"ID of associated security rule.","example":"CVE_2017_14491_dnsmasq|CVE_2017_14491_ERROR","nullable":true,"type":"string"},"status_id":{"description":"Internal ID of the vulnerability status.","example":4,"type":"integer"},"status_text":{"description":"Complementary text to the status.","example":"Not relevant","nullable":true,"type":"string"}},"required":["inventory_id","rule_id","status_id","status_text"],"type":"object"},"type":"array"}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaAffectedSystems"}},"required":["data","links","meta"],"type":"object"},"MitigatedSystemsOut":{"properties":{"data":{"oneOf":[{"description":"CSV export of the JSON.","type":"string"},{"items":{"properties":{"attributes":{"properties":{"advisories_list":{"description":"List of advisories for system","items":{"description":"Advisory id","example":"RHSA-2019:1481","type":"string"},"type":"array"},"advisory_available":{"description":"Shows whether a CVE has available advisory or not","example":true,"type":"boolean"},"culled_timestamp":{"description":"Timestamp from which the host is considered deleted.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"cve_status_id":{"description":"Internal ID of the CVE status.","example":4,"type":"integer"},"display_name":{"description":"System\'s name.","example":"system.example.com","nullable":true,"type":"string"},"insights_id":{"description":"Insights host ID.","example":"0035f6bc-cdb0-4763-8fcd-1dc58f716359","nullable":true,"type":"string"},"inventory_id":{"description":"Host ID.","example":"INV-ID00-0000-1234","type":"string"},"last_evaluation":{"description":"Date of last evaluation.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"mitigation_reason":{"description":"Reason why the system is not vulnerable","example":"SELinux mitigates the issue","type":"string"},"os":{"description":"Operating system.","example":"RHEL 8.4","type":"string"},"remediation":{"description":"Type of available remediation, 0 for none, 1 for manual, 2 for playbook.","enum":[0,1,2],"type":"number"},"reporter":{"description":"Reporter of the vulnerability, 1 for VMaaS, 2 for security rule, 3 for both VMaaS and rule.","enum":[0,1,2,3],"type":"number"},"rule_id":{"description":"ID(s) of associated security rule(s)..","example":"CVE_2017_14491_dnsmasq|CVE_2017_14491_ERROR","type":"string"},"rules_evaluation":{"description":"Date of last security rules evaluation.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"stale_timestamp":{"description":"Date when stale system becomes stale.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"stale_warning_timestamp":{"description":"Date when stale system becomes hidden in the application.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"status_id":{"description":"Internal ID of the vulnerability status.","example":4,"type":"integer"},"status_name":{"description":"Status of the vulnerability for the application\'s point of view.","example":"Resolved","type":"string"},"status_text":{"description":"Complementary text to the status.","example":"Not relevant","nullable":true,"type":"string"},"tags":{"items":{"properties":{"key":{"description":"Key of the single tag.","example":"CVE","type":"string"},"namespace":{"description":"Namespace of single tag.","example":"vulnerability","nullable":true,"type":"string"},"value":{"description":"Value of the single tag.","example":"CVE-2017-1","nullable":true,"type":"string"}},"required":["namespace","key","value"],"type":"object"},"type":"array"},"updated":{"description":"Date of the lastest upload of archive taken from Inventory syndicated data.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"}},"required":["cve_status_id","culled_timestamp","display_name","inventory_id","insights_id","last_evaluation","mitigation_reason","os","reporter","rules_evaluation","stale_timestamp","stale_warning_timestamp","status_id","status_name","status_text","tags","updated","advisory_available","remediation"],"type":"object"},"id":{"description":"Host id.","example":"INV-ID-0000-1234","type":"string"},"type":{"description":"Type of the record.","example":"system","type":"string"}},"required":["id","type","attributes"],"type":"object"},"type":"array"}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaAffectedSystems"}},"required":["data","links","meta"],"type":"object"},"NotificationsOut":{"properties":{"deleted":{"description":"Number of deleted notifications for CVEs","example":50,"type":"number"}},"required":["deleted"],"type":"object"},"OptOutIn":{"properties":{"inventory_id":{"$ref":"#/components/schemas/InventoryIdOrList"},"opt_out":{"description":"Opt out setting to be set.","example":true,"type":"boolean"}},"required":["inventory_id","opt_out"],"type":"object"},"PlaybookTemplate":{"properties":{"data":{"items":{"properties":{"description":{"description":"Playbook template description.","example":"Fix issues caused by CVE_2017_6074_kernel|KERNEL_CVE_2017_6074.","type":"string"},"play":{"description":"Actual playbook template.","type":"string"},"reboot_required":{"description":"Indicator whter reboot is required to mitigate vulnerability.","example":false,"nullable":true,"type":"boolean"},"resolution_type":{"description":"Type of the resolution provided by playbook.","type":"string"},"version":{"description":"Revision of the playbook template.","example":"93a1ced8a259666f0505cd20b7cb8e7a1c65b868","type":"string"}},"required":["description","play","version","resolution_type"],"type":"object"},"type":"array"}},"type":"object"},"StatusIn":{"properties":{"cve":{"$ref":"#/components/schemas/CveOrList"},"inventory_id":{"$ref":"#/components/schemas/InventoryIdOrList"},"status_id":{"description":"Status ID to be set, obtained by GET method. If not specified, global CVE status is set.","example":3,"type":"integer"},"status_text":{"description":"Complementary text to the status.","example":"Not relevant","nullable":true,"type":"string"}},"required":["cve"],"type":"object"},"StatusListOut":{"properties":{"data":{"description":"List of available status/status_id pairs.","items":{"properties":{"id":{"description":"Internal status_id.","example":3,"type":"integer"},"name":{"description":"Represenation of internal status_id.","example":"Scheduled for Patch","type":"string"}},"required":["id","name"],"type":"object"},"type":"array"},"meta":{"properties":{"total_items":{"description":"Total number of available status/status_id pairs.","example":1,"type":"integer"}},"required":["total_items"],"type":"object"}},"required":["data","meta"],"type":"object"},"StatusOut":{"properties":{"meta":{"$ref":"#/components/schemas/MetaPermissions"},"updated":{"description":"List of updated objects/updated object IDs.","items":{"properties":{"cve":{"example":"CVE-2016-0800","type":"string"},"inventory_id":{"example":"f35b1e1d-d231-43f2-8e4f-8f9cb01e3aa2","type":"string"}},"required":["inventory_id","cve"],"type":"object"},"type":"array"}},"required":["updated"],"type":"object"},"SystemCvesIdsOut":{"properties":{"data":{"oneOf":[{"description":"CSV export of the JSON.","type":"string"},{"items":{"description":"CVE id and minimal information for frontend","properties":{"cve_status_id":{"description":"Internal ID of the CVE status.","example":4,"type":"integer"},"cve_status_text":{"description":"Status text to the whole cve.","example":"Not relevant for all","nullable":true,"type":"string"},"id":{"description":"CVE id.","example":"CVE-2016-0800","type":"string"},"remediation":{"description":"Type of available remediation, 0 for none, 1 for manual, 2 for playbook.","enum":[0,1,2],"type":"number"},"rule_id":{"description":"ID(s) of associated security rule(s)..","example":"CVE_2017_14491_dnsmasq|CVE_2017_14491_ERROR","nullable":true,"type":"string"},"status_id":{"description":"Internal ID of the vulnerability status.","example":4,"type":"integer"},"status_text":{"description":"Complementary text to the status.","example":"Not relevant","nullable":true,"type":"string"}},"required":["id","rule_id","status_id","status_text","cve_status_id","cve_status_text","remediation"],"type":"object"},"type":"array"}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaCves"}},"required":["data","links","meta"],"type":"object"},"SystemCvesOut":{"properties":{"data":{"oneOf":[{"description":"CSV export of the JSON.","type":"string"},{"items":{"properties":{"attributes":{"properties":{"advisories_list":{"description":"List of advisories for CVE","items":{"description":"Advisory id","example":"RHSA-2019:1481","type":"string"},"type":"array"},"advisory_available":{"description":"Shows whether a CVE has available advisory or not","example":true,"type":"boolean"},"business_risk":{"description":"Business risk of the vulnerability.","example":"Low","type":"string"},"business_risk_id":{"description":"Internal ID of the vulnerability business risk.","example":1,"type":"integer"},"business_risk_text":{"description":"Complementary text to the business risk.","example":"QA environment => Low business risk","nullable":true,"type":"string"},"cve_status_id":{"description":"Internal ID of the CVE status.","example":4,"type":"integer"},"cve_status_text":{"description":"Status text to the whole cve.","example":"Not relevant for all","nullable":true,"type":"string"},"cvss2_score":{"description":"String representation of cvss2 score of the CVE.","example":"5.800","nullable":true,"type":"string"},"cvss3_score":{"description":"String representation of cvss3 score of the CVE.","example":"4.400","nullable":true,"type":"string"},"description":{"description":"Description of the CVE.","example":"A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker could...","type":"string"},"first_reported":{"description":"Date of when the CVE was first reported on the system.","example":"2018-09-22T16:00:00+00:00","type":"string"},"impact":{"description":"Red Hat security impact of the CVE.","example":"Important","type":"string"},"known_exploit":{"description":"Shows whether a CVE has known exploits or not","example":true,"type":"boolean"},"public_date":{"description":"String representation of ISO-8601 formatted date of first public disclosure of the CVE.","example":"2016-03-01T00:00:00+00:00","nullable":true,"type":"string"},"remediation":{"description":"Type of available remediation, 0 for none, 1 for manual, 2 for playbook.","enum":[0,1,2],"type":"number"},"reporter":{"description":"Reporter of the vulnerability, 1 for VMaaS, 2 for security rule, 3 for both VMaaS and rule.","enum":[0,1,2,3],"type":"number"},"rule":{"nullable":true,"properties":{"change_risk":{"description":"Indicates how likely remediation can change environment on the remediatied system.","example":1,"nullable":true,"type":"integer"},"description":{"description":"Description of the rule.","example":"CVE-2017-14491 dnsmasq code execution with listening processes","nullable":true,"type":"string"},"generate_autoplaybook":{"description":"Indicates whether a playbook should be auto-generated.","example":true,"nullable":true,"type":"boolean"},"kbase_node_id":{"description":"ID of associated Red Hat knowledgebase article.","example":3199382,"nullable":true,"type":"integer"},"playbook_count":{"description":"Number of available Ansible playbooks for remediation/mitigation.","example":1,"nullable":true,"type":"integer"},"reboot_required":{"description":"Indicator whter reboot is required to mitigate vulnerability.","example":false,"nullable":true,"type":"boolean"},"rule_id":{"description":"ID(s) of associated security rule(s).","example":"CVE_2017_14491_dnsmasq|CVE_2017_14491_ERROR","type":"string"},"summary":{"description":"Summary of the rule.","example":"A buffer overflow vulnerability was found in `Dnsmasq`, a popular lightweight DNS and DHCP server....","nullable":true,"type":"string"}},"required":["change_risk","description","kbase_node_id","playbook_count","reboot_required","rule_id","summary","generate_autoplaybook"],"type":"object"},"status":{"description":"Status of the vulnerability for the application\'s point of view.","example":"Resolved","type":"string"},"status_id":{"description":"Internal ID of the vulnerability status.","example":4,"type":"integer"},"status_text":{"description":"Complementary text to the status.","example":"Not relevant","nullable":true,"type":"string"},"synopsis":{"description":"Synopsis of the CVE.","example":"CVE-2016-0800","type":"string"}},"required":["business_risk","business_risk_id","business_risk_text","cve_status_id","cve_status_text","cvss2_score","cvss3_score","description","first_reported","impact","public_date","reporter","rule","status","status_id","status_text","synopsis","known_exploit","advisory_available","remediation"],"type":"object"},"id":{"description":"CVE id.","example":"CVE-2016-0800","type":"string"},"type":{"description":"Type of the record.","example":"cve","type":"string"}},"required":["id","type","attributes"],"type":"object"},"type":"array"}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaCves"}},"required":["data","links","meta"],"type":"object"},"SystemDetailsOut":{"properties":{"data":{"properties":{"last_evaluation":{"description":"Date of last evaluation.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"last_upload":{"description":"Date of the latest upload of archive.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"opt_out":{"description":"System opt out status.","example":true,"type":"boolean"},"os":{"description":"Operating system.","example":"RHEL 8.4","type":"string"},"rules_evaluation":{"description":"Date of last security rules evaluation.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"stale":{"description":"System stale status.","example":true,"type":"boolean"},"tags":{"items":{"properties":{"key":{"description":"Key of the single tag.","example":"CVE","type":"string"},"namespace":{"description":"Namespace of single tag.","example":"vulnerability","nullable":true,"type":"string"},"value":{"description":"Value of the single tag.","example":"CVE-2017-1","nullable":true,"type":"string"}},"required":["namespace","key","value"],"type":"object"},"type":"array"},"updated":{"description":"Date of the lastest upload of archive taken from Inventory syndicated data.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"}},"required":["last_evaluation","rules_evaluation","opt_out","last_upload","tags","os"],"type":"object"},"meta":{"$ref":"#/components/schemas/MetaPermissions"}},"required":["data","meta"],"type":"object"},"SystemIdsOut":{"properties":{"data":{"oneOf":[{"description":"CSV export of the JSON.","type":"string"},{"items":{"properties":{"display_name":{"description":"System\'s name.","example":"system.example.com","nullable":true,"type":"string"},"id":{"description":"Inventory ID.","example":"INV-ID00-0000-1234","type":"string"},"opt_out":{"description":"Whether the system is active or not.","example":false,"nullable":true,"type":"boolean"}},"type":"object"},"type":"array"}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaSystems"}},"required":["data","links","meta"],"type":"object"},"SystemListOut":{"properties":{"data":{"oneOf":[{"description":"CSV export of the JSON.","type":"string"},{"items":{"properties":{"attributes":{"properties":{"culled_timestamp":{"description":"Timestamp from which the host is considered deleted.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"cve_count":{"description":"Number of CVE exposures for the system.","example":7,"nullable":true,"type":"integer"},"display_name":{"description":"System\'s name,","example":"system.example.com","nullable":true,"type":"string"},"insights_id":{"description":"Insights host ID.","example":"0035f6bc-cdb0-4763-8fcd-1dc58f716359","nullable":true,"type":"string"},"inventory_group":{"items":{"properties":{"id":{"description":"ID of inventory group.","example":"00000000-1111-0000-0000-000000000000","type":"string"},"name":{"description":"Name of inventory group.","example":"group01","type":"string"}},"required":["id","name"],"type":"object"},"type":"array"},"inventory_id":{"description":"Host ID.","example":"INV-ID00-0000-1234","type":"string"},"last_evaluation":{"description":"Date of last evaluation.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"last_upload":{"description":"Date of the latest upload of archive.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"opt_out":{"description":"Opt out status of the system.","example":false,"type":"boolean"},"os":{"description":"Operating system.","example":"RHEL 8.4","type":"string"},"rules_evaluation":{"description":"Date of last security rules evaluation.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"stale_timestamp":{"description":"Date when stale system becomes stale.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"stale_warning_timestamp":{"description":"Date when stale system becomes hidden in the application.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"},"tags":{"description":"Tags given to the system.","items":{"properties":{"key":{"description":"Key of the single tag.","example":"CVE","type":"string"},"namespace":{"description":"Namespace of single tag.","example":"vulnerability","nullable":true,"type":"string"},"value":{"description":"Value of the single tag.","example":"CVE-2017-1","nullable":true,"type":"string"}},"required":["namespace","key","value"],"type":"object"},"nullable":true,"type":"array"},"updated":{"description":"Date of the lastest upload of archive taken from Inventory syndicated data.","example":"2018-09-22T16:00:00+00:00","nullable":true,"type":"string"}},"required":["cve_count","display_name","inventory_id","insights_id","last_evaluation","rules_evaluation","opt_out","last_upload","os","stale_timestamp","stale_warning_timestamp","tags","culled_timestamp","inventory_group"],"type":"object"},"id":{"description":"Host ID.","example":"INV-ID00-0000-1234","type":"string"},"type":{"description":"Type of the record.","example":"system","type":"string"}},"required":["id","type","attributes"],"type":"object"},"type":"array"}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaSystems"}},"required":["data","links","meta"],"type":"object"},"VersionOut":{"properties":{"application_version":{"description":"Version of application.","example":"0.1.2","type":"string"},"database_version":{"description":"Version of database schema.","example":1,"oneOf":[{"type":"string"},{"type":"number"}]}},"required":["application_version","database_version"],"type":"object"},"VulnerabilitiesIdsOut":{"properties":{"data":{"oneOf":[{"description":"CSV export of the JSON.","type":"string"},{"items":{"description":"CVE id and minimal information.","properties":{"business_risk_id":{"description":"Internal ID of the vulnerability business risk.","example":1,"type":"integer"},"business_risk_text":{"description":"Complementary text to the business risk.","example":"QA environment => Low business risk","nullable":true,"type":"string"},"id":{"description":"CVE id.","example":"CVE-2016-0800","type":"string"},"status_id":{"description":"Internal ID of the vulnerability status.","example":1,"type":"integer"},"status_text":{"description":"Complementary text to the status.","example":"Not Relevant","nullable":true,"type":"string"}},"type":"object"},"required":["business_risk_id","business_risk_text","id","status_id","status_text"],"type":"array"}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaVulnerabilitiesOut"}},"required":["data","links","meta"],"type":"object"},"VulnerabilitiesOut":{"properties":{"data":{"oneOf":[{"description":"CSV export of the JSON.","type":"string"},{"items":{"properties":{"attributes":{"properties":{"advisory_available":{"description":"Shows whether a CVE has available advisory or not","example":true,"type":"boolean"},"business_risk":{"description":"Business risk of the vulnerability.","example":"Low","type":"string"},"business_risk_id":{"description":"Internal ID of the vulnerability business risk.","example":1,"type":"integer"},"business_risk_text":{"description":"Complementary text to the business risk.","example":"QA environment => Low business risk","nullable":true,"type":"string"},"cvss2_score":{"description":"String representation of cvss2 score of the CVE.","example":"5.800","nullable":true,"type":"string"},"cvss3_score":{"description":"String representation of cvss3 score of the CVE.","example":"4.400","nullable":true,"type":"string"},"description":{"description":"Description of the CVE.","example":"A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker could...","type":"string"},"impact":{"description":"Red Hat security impact of the CVE.","example":"Important","type":"string"},"known_exploit":{"description":"Shows whether a CVE has known exploits or not","example":true,"type":"boolean"},"public_date":{"description":"String representation of ISO-8601 formatted date of first public disclosure of the CVE.","example":"2016-03-01T00:00:00+00:00","nullable":true,"type":"string"},"rules":{"items":{"$ref":"#/components/schemas/InsightsRule"},"type":"array"},"status":{"description":"Status of the vulnerability.","example":"Not Reviewed","type":"string"},"status_id":{"description":"Internal ID of the vulnerability status.","example":1,"type":"integer"},"status_text":{"description":"Complementary text to the status.","example":"Not Relevant","nullable":true,"type":"string"},"synopsis":{"description":"Synopsis of the CVE.","example":"CVE-2016-0800","type":"string"},"systems_affected":{"description":"Number of systems affected by the CVE.","example":7,"type":"integer"},"systems_status_divergent":{"description":"How many systems-CVE pairs have different status than CVE-level.","example":20,"type":"integer"}},"required":["business_risk","business_risk_id","business_risk_text","cvss2_score","cvss3_score","description","impact","public_date","rules","status","status_id","status_text","synopsis","systems_affected","systems_status_divergent","known_exploit","advisory_available"],"type":"object"},"id":{"description":"CVE id.","example":"CVE-2016-0800","type":"string"},"type":{"description":"Type of the record.","example":"cve","type":"string"}},"required":["id","type","attributes"],"type":"object"},"type":"array"}]},"links":{"$ref":"#/components/schemas/Links"},"meta":{"$ref":"#/components/schemas/MetaVulnerabilitiesOut"}},"required":["data","links","meta"],"type":"object"},"VulnerabilitiesPostIn":{"properties":{"cve_list":{"description":"Array of CVEs to provide info about","items":{"description":"CVE id.","example":"CVE-2016-0800","type":"string"},"type":"array"}},"required":["cve_list"],"type":"object"},"VulnerabilitiesPostOut":{"properties":{"data":{"items":{"properties":{"attributes":{"properties":{"cvss_score":{"description":"String representation of cvss3 or cvvs2 (if v3 is not present) score of the CVE.","example":"5.800","nullable":true,"type":"string"},"impact":{"description":"Red Hat security impact of the CVE.","example":"Important","type":"string"},"synopsis":{"description":"Synopsis of the CVE.","example":"CVE-2016-0800","type":"string"}},"required":["cvss_score","impact","synopsis"],"type":"object"},"id":{"description":"CVE id.","example":"CVE-2016-0800","type":"string"},"type":{"description":"Type of the record.","example":"cve","type":"string"}},"required":["id","type","attributes"],"type":"object"},"type":"array"},"links":{"$ref":"#/components/schemas/Links"},"meta":{"allOf":[{"$ref":"#/components/schemas/Meta"},{"$ref":"#/components/schemas/MetaPermissions"}]}},"required":["data","links","meta"],"type":"object"}},"securitySchemes":{"Authorization":{"in":"header","name":"Authorization","type":"apiKey"},"BasicAuth":{"description":"Username and password login.","scheme":"basic","type":"http","x-basicInfoFunc":"manager.base.basic_auth"}}},"info":{"title":"Vulnerability Engine Manager","version":"2.37.4"},"openapi":"3.0.0","paths":{"/announcement":{"get":{"description":"This endpoint provides vulnerability service announcements. Remain informed about important alerts for the vulnerability service. Announcements are issued by Insights Product Managers and other subject matter experts.\\n","operationId":"manager.announcement_handler.GetAnnouncement.get","responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/AnnouncementOut"}}},"description":"Announcement."}},"summary":"Announce important updates","x-methodName":"getAnnouncement"}},"/apistatus":{"get":{"description":"Checks database availability and API response threshold time.","operationId":"manager.api_status_handler.GetApiStatus.get","responses":{"200":{"description":"API is healthy"},"503":{"description":"Database is unavaiable"}},"summary":"Determine the health of the application","x-methodName":"getApiStatus"}},"/business_risk":{"get":{"description":"This endpoint helps you determine the numeric business risk for a given CVE. A business risk is a label you can set for a given CVE. Choose one of five business risk options ranging from 0-4, where 0 is not defined and 4 indicates a critical risk. You must call this endpoint to choose a numerical value before calling the *PATCH/cves/business_risk* endpoint.\\n","operationId":"manager.risk_handler.GetRisk.get","responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/BusinessRiskListOut"}}},"description":"List of business risk/business_risk_id pairs."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Access business risk values","x-methodName":"getBusinessRiskList"}},"/cves/business_risk":{"patch":{"description":"This sets a business risk for a specific CVE. Set a value of low, medium, high or critical for a given CVE. These values are obtained by the business risk path *GET/business_risk*. To set a business risk, you must call the GET/business_risk endpoint first, followed by the *PATCH/cves/business_risk* path.\\n","operationId":"manager.cve_handler.PatchCveRisk.patch","requestBody":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/CveRiskIn","x-body-name":"data"}}},"description":"Values to be set. At least one of the \\"business_risk_id\\" or \\"business_risk_text\\" parameters is required.","required":true},"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/BulkChangeOut"}}},"description":"Business risk successfully updated."},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Given CVE does not exist."},"503":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Service is running in read-only mode."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Set business risk for a CVE","x-methodName":"setCveBusinessRisk"}},"/cves/status":{"patch":{"description":"This sets the status for a specific CVE. Set a status value for a given CVE (e.g. in-review, on-hold, scheduled for a patch, or resolved). These values are obtained by sending a *GET/status* request. To set a status, you must call the *GET/business_risk* first, followed by the *PATCH/cves/status* path.\\n","operationId":"manager.cve_handler.PatchCveStatus.patch","requestBody":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/CveStatusIn","x-body-name":"data"}}},"description":"Values to be set. At least one of the \\"status_id\\" or \\"status_text\\" parameters is required.","required":true},"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/BulkChangeOut"}}},"description":"Status successfully updated."},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Given CVE does not exist."},"503":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Service is running in read-only mode."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Set status for a CVE","x-methodName":"setCveStatus"}},"/cves/{cve_id}":{"get":{"description":"This endpoint returns the CVE identification number, description, scores and other metadata. The metadata includes the description, CVSS 2/3 Score, CVSS 2/3 attack vector, severity, public date, modified date, business risk, status, a URL to Red Hat web pages, a list of advisories remediating the CVE, and information regarding known exploits for the CVE.\\n","operationId":"manager.cve_handler.GetCves.get","parameters":[{"$ref":"#/components/parameters/cve_id"},{"$ref":"#/components/parameters/advisory_available"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/CveDetailOut"}}},"description":"CVE details"},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Given CVE does not exist."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Get CVE details","x-methodName":"getCveDetails"}},"/cves/{cve_id}/affected_systems":{"get":{"description":"This is a report of affected systems for a given CVE. Use this request to obtain server identification numbers of all affected servers along with last check-in, system name and more.\\n","operationId":"manager.cve_handler.GetCvesAffectedSystems.get","parameters":[{"$ref":"#/components/parameters/filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/sort"},{"$ref":"#/components/parameters/cve_id"},{"$ref":"#/components/parameters/status_id"},{"$ref":"#/components/parameters/data_format"},{"$ref":"#/components/parameters/uuid"},{"$ref":"#/components/parameters/rule_key_deprecated"},{"$ref":"#/components/parameters/rule_presence_deprecated"},{"$ref":"#/components/parameters/rule"},{"$ref":"#/components/parameters/tags"},{"$ref":"#/components/parameters/sap_sids"},{"$ref":"#/components/parameters/sap_system"},{"$ref":"#/components/parameters/show_advisories"},{"$ref":"#/components/parameters/advisory"},{"$ref":"#/components/parameters/rhel_version"},{"$ref":"#/components/parameters/first_reported_from"},{"$ref":"#/components/parameters/first_reported_to"},{"$ref":"#/components/parameters/advisory_available"},{"$ref":"#/components/parameters/remediation"},{"$ref":"#/components/parameters/report"},{"$ref":"#/components/parameters/ansible"},{"$ref":"#/components/parameters/mssql"},{"$ref":"#/components/parameters/group_names"},{"$ref":"#/components/parameters/group_ids"},{"$ref":"#/components/parameters/host_type"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/AffectedSystemsOut"}}},"description":"Report of affected systems for a given CVE."},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Given CVE does not exist."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Determine affected systems for a given CVE","x-methodName":"getAffectedSystemsByCve"}},"/cves/{cve_id}/affected_systems/ids":{"get":{"description":"This is a report of identification numbers of affected systems for a given CVE. Use this request to obtain server identification numbers of all affected systems.\\n","operationId":"manager.cve_handler.GetCvesAffectedSystemsIds.get","parameters":[{"$ref":"#/components/parameters/filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/sort"},{"$ref":"#/components/parameters/cve_id"},{"$ref":"#/components/parameters/status_id"},{"$ref":"#/components/parameters/data_format"},{"$ref":"#/components/parameters/uuid"},{"$ref":"#/components/parameters/rule_key_deprecated"},{"$ref":"#/components/parameters/rule_presence_deprecated"},{"$ref":"#/components/parameters/rule"},{"$ref":"#/components/parameters/tags"},{"$ref":"#/components/parameters/sap_sids"},{"$ref":"#/components/parameters/sap_system"},{"$ref":"#/components/parameters/show_advisories"},{"$ref":"#/components/parameters/advisory"},{"$ref":"#/components/parameters/rhel_version"},{"$ref":"#/components/parameters/first_reported_from"},{"$ref":"#/components/parameters/first_reported_to"},{"$ref":"#/components/parameters/advisory_available"},{"$ref":"#/components/parameters/remediation"},{"$ref":"#/components/parameters/ansible"},{"$ref":"#/components/parameters/mssql"},{"$ref":"#/components/parameters/group_names"},{"$ref":"#/components/parameters/group_ids"},{"$ref":"#/components/parameters/host_type"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/AffectedSystemsIdsOut"}}},"description":"Report of IDs of affected systems for a given CVE."},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Given CVE does not exist."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Get identification numbers of affected systems for a given CVE","x-methodName":"getAffectedSystemsIdsByCve"}},"/dashbar":{"get":{"description":"These are aggregations summarizing your account such as number of unique CVEs, list of security rules, CVEs by severity and more. Use this endpoint to obtain a snapshot of all the CVES and details about their prevalence, severity and other details.\\n","operationId":"manager.dashbar_handler.GetDashbar.get","parameters":[{"$ref":"#/components/parameters/tags"},{"$ref":"#/components/parameters/sap_sids"},{"$ref":"#/components/parameters/sap_system"},{"$ref":"#/components/parameters/ansible"},{"$ref":"#/components/parameters/mssql"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/DashbarOut"}}},"description":"Dashbar aggregations."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Get aggregations for the dashbar","x-methodName":"getDashbar"}},"/dashboard":{"get":{"description":"These are aggregations summarizing your account such as number of unique CVEs, list of security rules, CVEs by severity, and more. Use this endpoint to obtain a snapshot of all the CVES and details about their prevalence and severity.\\n","operationId":"manager.dashboard_handler.GetDashboard.get","parameters":[{"$ref":"#/components/parameters/tags"},{"$ref":"#/components/parameters/sap_sids"},{"$ref":"#/components/parameters/sap_system"},{"$ref":"#/components/parameters/ansible"},{"$ref":"#/components/parameters/mssql"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Dashboard"}}},"description":"Dashboard."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Get a macro level overview of aggregated vulnerabilities","x-methodName":"getDashboard"}},"/feature/cves_without_errata":{"patch":{"description":"Use this endpoint to enable/disable reporting CVEs that do not have advisories (errata) for your customer account. If the feature is disabled, CVEs without advisories will be hidden in outputs of all endpoints.\\n","operationId":"manager.feature_handler.PatchCvesWithoutErrata.patch","requestBody":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/CvesWithoutErrataIn","x-body-name":"data"}}},"description":"Values to be set.","required":true},"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/CvesWithoutErrataOut"}}},"description":"CVEs without Errata feature successfully updated."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Set a feature flag for CVEs without errata","x-methodName":"setCvesWithoutErrata"}},"/notifications":{"delete":{"description":"Use this endpoint for restarting your already obtained notifications for CVEs.\\n","operationId":"manager.feature_handler.DeleteNotifications.delete","responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/NotificationsOut"}}},"description":"Sent notifications deleted."},"403":{"description":"Non-existing account."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Delete already sent notifications for CVEs","x-methodName":"deleteNotifications"}},"/playbooks/templates/{rule_id}":{"get":{"description":"This returns an Ansible playbook template for a given rule identification number. Use this endpoint to return an Ansible playbook template for a given rule error key. The template is used to remediate issues on your system.\\n","operationId":"manager.playbook_handler.GetTemplate.get","parameters":[{"description":"Insights security rule ID.","example":"CVE_2017_8779_rpc|CVE_2017_8779_WARN","in":"path","name":"rule_id","required":true,"schema":{"type":"string"}}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/PlaybookTemplate"}}},"description":"Playbook template response"},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Given rule id does not exist."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Get an Ansible Playbook template for CVEs with security rules","x-methodName":"getPlaybookTemplate"}},"/report/executive":{"get":{"description":"This returns an overview of vulnerabilities affecting a given account. Use this request when you need to download a high-level, executive report summarizing the security exposure of your infrastructure. These reports are designed for an executive audience and include data such as the number of RHEL systems analyzed, the number of security rules in your infrastructure, percentage of CVEs with a certain severity and more.\\n","operationId":"manager.report_handler.GetExecutive.get","responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/ExecutiveReport"}}},"description":"Executive report."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Generate an executive report","x-methodName":"getExecutiveReport"}},"/status":{"get":{"description":"This endpoint returns a list of possible values for setting status for a CVE or system-CVE pair. Call this api when you want to know which values are available for setting a status. A list of numbers will be returned. You must call this endpoint before calling the *PATCH/cves/status* endpoint.\\n","operationId":"manager.status_handler.GetStatus.get","responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/StatusListOut"}}},"description":"List of status/status_id pairs."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Access available status values","x-methodName":"getStatusList"},"patch":{"description":"This endpoint sets status for given systems and CVEs. Use this endpoint when you need to set a status value for system-CVE pairs.\\n","operationId":"manager.status_handler.PatchStatus.patch","requestBody":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/StatusIn","x-body-name":"data"}}},"description":"Values to be set.","required":true},"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/StatusOut"}}},"description":"Status successfully updated."},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Given host/CVE does not exist."},"503":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Service is running in read-only mode."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Set status for system vulnerabilities","x-methodName":"setStatus"}},"/systems":{"get":{"description":"List systems that are accessible when you are logged into your account. Use this endpoint to view basic system attributes such as display name and system type.\\n","operationId":"manager.system_handler.GetSystems.get","parameters":[{"$ref":"#/components/parameters/filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/sort"},{"$ref":"#/components/parameters/data_format"},{"$ref":"#/components/parameters/stale"},{"$ref":"#/components/parameters/uuid"},{"$ref":"#/components/parameters/tags"},{"$ref":"#/components/parameters/sap_sids"},{"$ref":"#/components/parameters/sap_system"},{"$ref":"#/components/parameters/excluded"},{"$ref":"#/components/parameters/rhel_version"},{"$ref":"#/components/parameters/report"},{"$ref":"#/components/parameters/ansible"},{"$ref":"#/components/parameters/mssql"},{"$ref":"#/components/parameters/group_names"},{"$ref":"#/components/parameters/group_ids"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/SystemListOut"}}},"description":"System list"}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"List systems","x-methodName":"getSystemsList"}},"/systems/ids":{"get":{"description":"This lists systems including those that have opted out of the current query. Use this when you do not want to see a registered system or systems in your reports.\\n","operationId":"manager.system_handler.GetSystemsIds.get","parameters":[{"$ref":"#/components/parameters/filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/sort"},{"$ref":"#/components/parameters/data_format"},{"$ref":"#/components/parameters/stale"},{"$ref":"#/components/parameters/uuid"},{"$ref":"#/components/parameters/tags"},{"$ref":"#/components/parameters/sap_sids"},{"$ref":"#/components/parameters/sap_system"},{"$ref":"#/components/parameters/excluded"},{"$ref":"#/components/parameters/rhel_version"},{"$ref":"#/components/parameters/ansible"},{"$ref":"#/components/parameters/mssql"},{"$ref":"#/components/parameters/group_names"},{"$ref":"#/components/parameters/group_ids"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/SystemIdsOut"}}},"description":"System list"}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"List systems identification numbers along with opt out state","x-methodName":"getSystemsIds"}},"/systems/opt_out":{"patch":{"description":"Opt a specific system in or out of vulnerability analysis. Use this when you want to use other Insights services but do not want to see specific systems in vulnerability reports. This allows you to hide select systems.\\n","operationId":"manager.system_handler.PatchBulkSystemsOptOut.patch","requestBody":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/OptOutIn","x-body-name":"data"}}},"description":"Values to be set.","required":true},"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/BulkChangeOut"}}},"description":"System(s) setting has been updated."},"503":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"Service is running in read-only mode."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Opt a system in or out of the vulnerability service","x-methodName":"setSystemsOptOut"}},"/systems/{inventory_id}":{"get":{"description":"This allows you to get information about systems related to an inventory identification number. This includes details such as operating system, inventory tags, last update, opt-out status, and more.\\n","operationId":"manager.system_handler.GetSystemDetails.get","parameters":[{"$ref":"#/components/parameters/inventory_id"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/SystemDetailsOut"}}},"description":"System details"},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"System has not been found in the database."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Get system details","x-methodName":"getSystemDetails"}},"/systems/{inventory_id}/cves":{"get":{"description":"This endpoint displays detailed information about all CVEs for which a system is exposed. Use this endpoint to discover which CVEs are affecting a given system. CVE metadata is included.\\n","operationId":"manager.system_handler.GetSystemsCves.get","parameters":[{"$ref":"#/components/parameters/inventory_id"},{"$ref":"#/components/parameters/cve_filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/cve_sort"},{"$ref":"#/components/parameters/cvss_from"},{"$ref":"#/components/parameters/cvss_to"},{"$ref":"#/components/parameters/public_from"},{"$ref":"#/components/parameters/public_to"},{"$ref":"#/components/parameters/impact"},{"$ref":"#/components/parameters/status_id"},{"$ref":"#/components/parameters/data_format"},{"$ref":"#/components/parameters/business_risk_id"},{"$ref":"#/components/parameters/rule_presence"},{"$ref":"#/components/parameters/show_advisories"},{"$ref":"#/components/parameters/advisory"},{"$ref":"#/components/parameters/rule_key"},{"$ref":"#/components/parameters/known_exploit"},{"$ref":"#/components/parameters/first_reported_from"},{"$ref":"#/components/parameters/first_reported_to"},{"$ref":"#/components/parameters/advisory_available"},{"$ref":"#/components/parameters/remediation"},{"$ref":"#/components/parameters/report"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/SystemCvesOut"}}},"description":"CVE report."},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"System has not been found in the database."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Get a CVE report for a system","x-methodName":"getCveListBySystem"}},"/systems/{inventory_id}/cves/ids":{"get":{"description":"This endpoint displays identification numbers of all CVEs for which a system is exposed. Use this endpoint to learn which CVEs are affecting a given system.\\n","operationId":"manager.system_handler.GetSystemsCvesIds.get","parameters":[{"$ref":"#/components/parameters/inventory_id"},{"$ref":"#/components/parameters/cve_filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/cve_sort"},{"$ref":"#/components/parameters/cvss_from"},{"$ref":"#/components/parameters/cvss_to"},{"$ref":"#/components/parameters/public_from"},{"$ref":"#/components/parameters/public_to"},{"$ref":"#/components/parameters/impact"},{"$ref":"#/components/parameters/status_id"},{"$ref":"#/components/parameters/data_format"},{"$ref":"#/components/parameters/business_risk_id"},{"$ref":"#/components/parameters/rule_presence"},{"$ref":"#/components/parameters/show_advisories"},{"$ref":"#/components/parameters/advisory"},{"$ref":"#/components/parameters/rule_key"},{"$ref":"#/components/parameters/known_exploit"},{"$ref":"#/components/parameters/first_reported_from"},{"$ref":"#/components/parameters/first_reported_to"},{"$ref":"#/components/parameters/advisory_available"},{"$ref":"#/components/parameters/remediation"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/SystemCvesIdsOut"}}},"description":"CVE Ids report."},"404":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/Errors"}}},"description":"System has not been found in the database."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Get a CVE identification number report for a system","x-methodName":"getCveIdsBySystem"}},"/version":{"get":{"description":"This endpoint will provide you with the application version. Use this endpoint to track application changes.\\n","operationId":"manager.version_handler.GetVersion.get","responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/VersionOut"}}},"description":"Application version."}},"summary":"Get application version","x-methodName":"getVersion"}},"/vulnerabilities/cves":{"get":{"description":"This provides an overview of vulnerabilities across your entire system inventory. Use this endpoint to get an overview of which CVEs are affecting your account, including some CVE metadata, how many systems are affected by each CVE, and more.\\n","operationId":"manager.vulnerabilities_handler.GetCves.get","parameters":[{"$ref":"#/components/parameters/cve_filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/cve_sort"},{"$ref":"#/components/parameters/cvss_from"},{"$ref":"#/components/parameters/cvss_to"},{"$ref":"#/components/parameters/public_from"},{"$ref":"#/components/parameters/public_to"},{"$ref":"#/components/parameters/impact"},{"$ref":"#/components/parameters/data_format"},{"$ref":"#/components/parameters/business_risk_id"},{"$ref":"#/components/parameters/status_id"},{"$ref":"#/components/parameters/rule_presence"},{"$ref":"#/components/parameters/tags"},{"$ref":"#/components/parameters/sap_sids"},{"$ref":"#/components/parameters/sap_system"},{"$ref":"#/components/parameters/known_exploit"},{"$ref":"#/components/parameters/affecting"},{"$ref":"#/components/parameters/rhel_version"},{"$ref":"#/components/parameters/report"},{"$ref":"#/components/parameters/advanced_report"},{"$ref":"#/components/parameters/ansible"},{"$ref":"#/components/parameters/mssql"},{"$ref":"#/components/parameters/advisory_available"},{"$ref":"#/components/parameters/group_names"},{"$ref":"#/components/parameters/group_ids"},{"$ref":"#/components/parameters/affecting_host_type"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/VulnerabilitiesOut"}}},"description":"Vulnerabilities overview."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Get a vulnerabilities overview","x-methodName":"getCveList"},"post":{"description":"This is an overview of vulnerabilities for specific CVEs provided in the body. Use this endpoint to get a CVSS score, and learn the severity for a list of CVEs provided in the request.\\n","operationId":"manager.vulnerabilities_handler.PostCves.post","parameters":[{"$ref":"#/components/parameters/cve_filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/sort"}],"requestBody":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/VulnerabilitiesPostIn","x-body-name":"data"}}},"description":"List of CVEs to provide info about.","required":true},"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/VulnerabilitiesPostOut"}}},"description":"Vulnerabilities overview."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Send a vulnerabilities overview","x-methodName":"getCveList"}},"/vulnerabilities/cves/ids":{"get":{"description":"This is an overview of vulnerabilities identification numbers across your entire system inventory. Use this endpoint to get an overview of which CVEs are affecting your account.\\n","operationId":"manager.vulnerabilities_handler.GetCvesIds.get","parameters":[{"$ref":"#/components/parameters/cve_filter"},{"$ref":"#/components/parameters/limit"},{"$ref":"#/components/parameters/offset"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/page_size"},{"$ref":"#/components/parameters/cve_sort"},{"$ref":"#/components/parameters/cvss_from"},{"$ref":"#/components/parameters/cvss_to"},{"$ref":"#/components/parameters/public_from"},{"$ref":"#/components/parameters/public_to"},{"$ref":"#/components/parameters/impact"},{"$ref":"#/components/parameters/data_format"},{"$ref":"#/components/parameters/business_risk_id"},{"$ref":"#/components/parameters/status_id"},{"$ref":"#/components/parameters/rule_presence"},{"$ref":"#/components/parameters/tags"},{"$ref":"#/components/parameters/sap_sids"},{"$ref":"#/components/parameters/sap_system"},{"$ref":"#/components/parameters/known_exploit"},{"$ref":"#/components/parameters/affecting"},{"$ref":"#/components/parameters/rhel_version"},{"$ref":"#/components/parameters/ansible"},{"$ref":"#/components/parameters/mssql"},{"$ref":"#/components/parameters/advisory_available"}],"responses":{"200":{"content":{"application/vnd.api+json":{"schema":{"$ref":"#/components/schemas/VulnerabilitiesIdsOut"}}},"description":"Vulnerabilities IDs overview."}},"security":[{"ApiKeyAuth":[]},{"BasicAuth":[]}],"summary":"Get an overview of Vulnerabilities\' identification numbers","x-methodName":"getCveIdsList"}}},"servers":[{"url":"/api/vulnerability/v1"}]}}')}}]); \ No newline at end of file diff --git a/static/js/8387.0ae35a35.chunk.js b/static/js/8387.0ae35a35.chunk.js deleted file mode 100644 index 984d2558..00000000 --- a/static/js/8387.0ae35a35.chunk.js +++ /dev/null @@ -1 +0,0 @@ -"use strict";(self.webpackChunkapidocs=self.webpackChunkapidocs||[]).push([[8387],{68387:function(e){e.exports=JSON.parse('{"extras":{},"openapi":{"components":{"parameters":{"checked":{"description":"Filter notification by checked field.\\nWhen checked: true returns only checked notifications.\\nWhen checked: false returns only NOT checked notifications.\\nWhen left empty returns all notification.","in":"query","name":"checked","required":false,"schema":{"nullable":true,"type":"boolean"}},"created_after":{"description":"Restrict results to all records created after the given date.","in":"query","name":"created_after","required":false,"schema":{"format":"date-time","type":"string"}},"created_before":{"description":"Restrict results to all records created before the given date.","in":"query","name":"created_before","required":false,"schema":{"format":"date-time","type":"string"}},"creator_id":{"description":"The public id of a creator of an Incident","in":"query","name":"creator_id","required":false,"schema":{"type":"string"}},"event_id":{"description":"The id of an Event","in":"path","name":"event_id","required":true,"schema":{"type":"string"}},"event_type":{"description":"Comma separated list of event types to display","in":"query","name":"event_type","required":false,"schema":{"type":"string"}},"follow_up_status":{"description":"Comma separated list of incident statuses. \\ndone: done == true\\nopen: done == false\\narchived: archived == true\\n\\"\\": default value, archived = false\\nBy default you wont get any archived follow ups, but you can explicitly tell that you want archived.\\nMultiple value create disjunction.\\n\\"done,archived\\" -> done OR archived\\n\\"done,open\\" -> \\"done OR not done\\" -> \\"not archived\\"","in":"query","name":"follow_up_status","required":false,"schema":{"default":"","type":"string"}},"follow_up_status_rep":{"description":"Textual value of the follow up status.\\nE.g. open, done, archived","in":"query","name":"follow_up_status","required":false,"schema":{"default":"","type":"string"}},"from":{"description":"Restrict results to all records created after the given date.","in":"query","name":"from","required":false,"schema":{"format":"date-time","type":"string"}},"id":{"description":"The id of record","in":"path","name":"id","required":true,"schema":{"type":"string"}},"incident_commander_id":{"description":"Comma separated list of incident commander ids","in":"query","name":"incident_commander_id","required":false,"schema":{"type":"string"}},"incident_id":{"description":"The id of an Incident","in":"path","name":"incident_id","required":true,"schema":{"type":"string"}},"incident_name":{"description":"Keyword for case insensitive search of the incident id or the incident summary.","in":"query","name":"incident_name","required":false,"schema":{"type":"string"}},"invalid":{"description":"true restricts output to only invalid incidents and omits incident details from reporting, false restricts output to real valid incidents and includes incident details in reporting. No value or nil means all incidents.","in":"query","name":"invalid","required":false,"schema":{"nullable":true,"type":"boolean"}},"mine":{"description":"If true, restricts output to records owned by the requesting user.","in":"query","name":"mine","required":false,"schema":{"default":false,"type":"boolean"}},"note":{"description":"Keyword for case insensitive search of the note of an Event.","in":"query","name":"note","required":false,"schema":{"type":"string"}},"occurred_after":{"description":"Restrict results to all records occurred after the given date.","in":"query","name":"occurred_after","required":false,"schema":{"format":"date-time","type":"string"}},"occurred_before":{"description":"Restrict results to all records occurred before the given date.","in":"query","name":"occurred_before","required":false,"schema":{"format":"date-time","type":"string"}},"on_call_id":{"description":"the on-call person of an Incident","in":"query","name":"on_call_id","required":false,"schema":{"type":"string"}},"order_by":{"description":"Specifies the order by criteria. The syntax of this parameter is\\nsimilar to the syntax of the _order by_ clause of an SQL statement.\\nWe support ordering by these fields:\\n- id\\n- incident_id\\n- name\\n- email\\n- username\\n- status\\n- severity\\n- product\\n- last_updated\\n- summary\\n- created_at\\n- working_time\\n\\n\\n\\n```sql\\nname asc\\n```\\n\\nOr in order to retrieve all incidents ordered by username _and_ email:\\n\\n```sql\\nname asc, email asc\\n```\\n\\nIf the parameter isn\'t provided, or if the value is empty, then\\nno explicit ordering will be applied.","in":"query","name":"order_by","required":false,"schema":{"type":"string"}},"page":{"description":"Page number of record list when record list exceeds specified page size","in":"query","name":"page","required":false,"schema":{"default":1,"minimum":1,"type":"integer"}},"participant_id":{"description":"the id of a user participating in an Incident, regardless of role","in":"query","name":"participant_id","required":false,"schema":{"type":"string"}},"private":{"description":"true restricts output to private incidents, false restricts output to public incidents. No value or nil means all incidents.","in":"query","name":"private","required":false,"schema":{"nullable":true,"type":"boolean"}},"product_id":{"description":"Comma separated list of product ids","in":"query","name":"product_id","required":false,"schema":{"type":"string"}},"products":{"description":"comma separated list of products","in":"query","name":"products","required":false,"schema":{"type":"string"}},"public_id":{"description":"The public id of an Incident","in":"query","name":"public_id","required":false,"schema":{"type":"string"}},"responsible_manager_id":{"description":"the manager responsible for an Incident","in":"query","name":"responsible_manager_id","required":false,"schema":{"type":"string"}},"search":{"description":"Search string for searching records. In case of users it\'s matched\\nagainst Name, Username and Email fields.","in":"query","name":"search","required":false,"schema":{"type":"string"}},"show_system_events":{"description":"Filter events by show_system_events field.\\nWhen show_system_events: true returns only system events.\\nWhen show_system_events: false returns only non-system events.\\nWhen left empty returns all events.","in":"query","name":"show_system_events","required":false,"schema":{"nullable":true,"type":"boolean"}},"size":{"description":"Maximum number of records to return","in":"query","name":"size","required":false,"schema":{"default":100,"minimum":0,"type":"integer"}},"status":{"description":"Comma separated list of incident statuses","in":"query","name":"status","required":false,"schema":{"type":"string"}},"to":{"description":"Restrict results to all records created before the given date.","in":"query","name":"to","required":false,"schema":{"format":"date-time","type":"string"}},"user_id":{"description":"The id of a User","in":"path","name":"user_id","required":true,"schema":{"type":"string"}}},"schemas":{"Attachment":{"allOf":[{"$ref":"#/components/schemas/ObjectReference"},{"properties":{"content_type":{"type":"string"},"creator":{"$ref":"#/components/schemas/User"},"data":{"format":"byte","type":"string"},"event":{"$ref":"#/components/schemas/ObjectReference"},"file_size":{"format":"int64","type":"integer"},"name":{"type":"string"},"sha1_sum":{"format":"byte","type":"string"},"slack_file_id":{"type":"string"}},"type":"object"}]},"AttachmentList":{"allOf":[{"$ref":"#/components/schemas/List"},{"properties":{"items":{"items":{"allOf":[{"$ref":"#/components/schemas/Attachment"}]},"type":"array"}},"type":"object"}]},"AttachmentPatchRequest":{"properties":{"content_type":{"type":"string"},"data":{"format":"byte","type":"string"}},"type":"object"},"Error":{"allOf":[{"$ref":"#/components/schemas/ObjectReference"},{"properties":{"code":{"type":"string"},"operation_id":{"type":"string"},"reason":{"type":"string"}},"type":"object"}]},"ErrorList":{"allOf":[{"$ref":"#/components/schemas/List"},{"properties":{"items":{"items":{"$ref":"#/components/schemas/Error"},"type":"array"}},"type":"object"}]},"Escalation":{"allOf":[{"properties":{"id":{"format":"uuid","type":"string"},"user":{"$ref":"#/components/schemas/User"}},"type":"object"}]},"EscalationList":{"allOf":[{"$ref":"#/components/schemas/List"},{"properties":{"items":{"items":{"allOf":[{"$ref":"#/components/schemas/Escalation"}]},"type":"array"}},"type":"object"}]},"Event":{"allOf":[{"$ref":"#/components/schemas/ObjectReference"},{"properties":{"attachments":{"items":{"$ref":"#/components/schemas/Attachment"},"type":"array"},"created_at":{"format":"date-time","type":"string"},"creator":{"$ref":"#/components/schemas/User"},"escalation":{"$ref":"#/components/schemas/Escalation"},"event_type":{"type":"string"},"external_reference":{"$ref":"#/components/schemas/ExternalReference"},"follow_up":{"$ref":"#/components/schemas/FollowUp"},"follow_up_change":{"$ref":"#/components/schemas/FollowUpChange"},"handoff":{"$ref":"#/components/schemas/Handoff"},"incident":{"$ref":"#/components/schemas/ObjectReference"},"metadata":{"type":"object"},"note":{"type":"string"},"occurred_at":{"format":"date-time","type":"string"},"slack_message_timestamp":{"type":"string"},"status_change":{"$ref":"#/components/schemas/StatusChange"},"updated_at":{"format":"date-time","type":"string"}},"type":"object"}]},"EventList":{"allOf":[{"$ref":"#/components/schemas/List"},{"properties":{"items":{"items":{"allOf":[{"$ref":"#/components/schemas/Event"}]},"type":"array"}},"type":"object"}]},"EventPatchRequest":{"properties":{"note":{"type":"string"},"occurred_at":{"format":"date-time","type":"string"},"url":{"type":"string"}},"type":"object"},"ExternalReference":{"allOf":[{"properties":{"url":{"type":"string"}},"type":"object"}]},"FollowUp":{"allOf":[{"$ref":"#/components/schemas/ObjectReference"},{"properties":{"archived":{"type":"boolean"},"created_at":{"format":"date-time","type":"string"},"done":{"type":"boolean"},"follow_up_type":{"type":"string"},"incident":{"$ref":"#/components/schemas/ObjectReference"},"issue_created_at":{"format":"date-time","type":"string"},"owner":{"type":"string"},"priority":{"type":"string"},"status":{"type":"string"},"title":{"type":"string"},"updated_at":{"format":"date-time","type":"string"},"url":{"type":"string"}},"type":"object"}]},"FollowUpChange":{"allOf":[{"properties":{"follow_up_id":{"format":"uuid","type":"string"},"status":{"type":"object"}},"type":"object"}]},"FollowUpList":{"allOf":[{"$ref":"#/components/schemas/List"},{"properties":{"items":{"items":{"allOf":[{"$ref":"#/components/schemas/FollowUp"}]},"type":"array"}},"type":"object"}]},"Handoff":{"allOf":[{"properties":{"handoff_from":{"$ref":"#/components/schemas/User"},"handoff_to":{"$ref":"#/components/schemas/User"},"handoff_type":{"type":"string"},"id":{"format":"uuid","type":"string"}},"type":"object"}]},"HandoffList":{"allOf":[{"$ref":"#/components/schemas/List"},{"properties":{"items":{"items":{"allOf":[{"$ref":"#/components/schemas/Handoff"}]},"type":"array"}},"type":"object"}]},"Incident":{"allOf":[{"$ref":"#/components/schemas/ObjectReference"},{"properties":{"ansible_playbook":{"type":"string"},"bad_rollout_commit":{"type":"string"},"created_at":{"format":"date-time","type":"string"},"creator":{"$ref":"#/components/schemas/User"},"description":{"type":"string"},"external_coordination":{"items":{"type":"string"},"type":"array"},"impacted_products":{"items":{"type":"string"},"type":"array"},"incident_commander":{"$ref":"#/components/schemas/User"},"incident_id":{"type":"string"},"incident_owner":{"$ref":"#/components/schemas/User"},"incident_type":{"type":"string"},"invalid":{"nullable":true,"type":"boolean"},"metadata":{"nullable":true,"type":"object"},"on_call_person":{"$ref":"#/components/schemas/User"},"participants":{"items":{"$ref":"#/components/schemas/User"},"type":"array"},"post_mortem_review":{"type":"string"},"primary_team":{"type":"string"},"private":{"nullable":true,"type":"boolean"},"product_engineering_lead":{"$ref":"#/components/schemas/User"},"product_manager":{"$ref":"#/components/schemas/User"},"product_owner":{"$ref":"#/components/schemas/User"},"products":{"items":{"type":"string"},"type":"array"},"reopen_counter":{"format":"int64","type":"integer"},"resolved_at":{"format":"date-time","type":"string"},"responsible_manager":{"$ref":"#/components/schemas/User"},"scribe":{"$ref":"#/components/schemas/User"},"severity":{"type":"string"},"slack_channel_id":{"type":"string"},"slack_team_id":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"task_runs":{"items":{"$ref":"#/components/schemas/IncidentTaskRun"},"type":"array"},"updated_at":{"format":"date-time","type":"string"},"viewers":{"items":{"$ref":"#/components/schemas/User"},"type":"array"},"working_time":{"format":"int64","type":"integer"}},"type":"object"}]},"IncidentList":{"allOf":[{"$ref":"#/components/schemas/List"},{"properties":{"items":{"items":{"allOf":[{"$ref":"#/components/schemas/Incident"}]},"type":"array"}},"type":"object"}]},"IncidentPatchRequest":{"properties":{"bad_rollout_commit":{"type":"string"},"description":{"type":"string"},"external_coordination":{"items":{"type":"string"},"type":"array"},"impacted_products":{"items":{"type":"string"},"type":"array"},"incident_commander":{"$ref":"#/components/schemas/ObjectReference"},"incident_owner":{"$ref":"#/components/schemas/ObjectReference"},"incident_type":{"type":"string"},"invalid":{"type":"boolean"},"on_call_person":{"$ref":"#/components/schemas/ObjectReference"},"post_mortem_review":{"type":"string"},"primary_team":{"type":"string"},"private":{"type":"boolean"},"product_engineering_lead":{"$ref":"#/components/schemas/ObjectReference"},"product_manager":{"$ref":"#/components/schemas/ObjectReference"},"product_owner":{"$ref":"#/components/schemas/ObjectReference"},"products":{"items":{"type":"string"},"type":"array"},"responsible_manager":{"$ref":"#/components/schemas/ObjectReference"},"scribe":{"$ref":"#/components/schemas/ObjectReference"},"severity":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"viewers":{"items":{"$ref":"#/components/schemas/User"},"type":"array"}},"type":"object"},"IncidentRetrospective":{"allOf":[{"$ref":"#/components/schemas/ObjectReference"},{"properties":{"created_at":{"format":"date-time","type":"string"},"google_doc_link":{"type":"string"},"google_doc_status":{"type":"string"},"updated_at":{"format":"date-time","type":"string"}},"type":"object"}]},"IncidentTaskRun":{"allOf":[{"$ref":"#/components/schemas/ObjectReference"},{"properties":{"ansible_playbook":{"type":"string"},"created_at":{"format":"date-time","type":"string"},"name":{"type":"string"},"parameters":{"nullable":true,"type":"object"},"result":{"nullable":true,"type":"object"},"updated_at":{"format":"date-time","type":"string"},"url":{"type":"string"}},"type":"object"}]},"IncidentTaskRunList":{"allOf":[{"$ref":"#/components/schemas/List"},{"properties":{"items":{"items":{"allOf":[{"$ref":"#/components/schemas/IncidentTaskRun"}]},"type":"array"}},"type":"object"}]},"List":{"properties":{"kind":{"type":"string"},"page":{"type":"integer"},"size":{"type":"integer"},"total":{"type":"integer"}},"required":["kind","page","size","total","items"],"type":"object"},"Notification":{"allOf":[{"$ref":"#/components/schemas/ObjectReference"},{"properties":{"checked":{"type":"boolean"},"created_at":{"format":"date-time","type":"string"},"incident":{"$ref":"#/components/schemas/ObjectReference"},"name":{"type":"string"},"updated_at":{"format":"date-time","type":"string"}},"type":"object"}]},"NotificationList":{"allOf":[{"$ref":"#/components/schemas/List"},{"properties":{"items":{"items":{"allOf":[{"$ref":"#/components/schemas/Notification"}]},"type":"array"}},"type":"object"}]},"NotificationPatchRequest":{"properties":{"checked":{"type":"boolean"},"name":{"type":"string"},"place_after":{"description":"HEAD - place on the top, - place after this notification","type":"string"}},"type":"object"},"ObjectReference":{"properties":{"href":{"type":"string"},"id":{"format":"uuid","type":"string"},"kind":{"type":"string"}},"type":"object"},"Playbook":{"allOf":[{"$ref":"#/components/schemas/ObjectReference"},{"properties":{"name":{"type":"string"}},"type":"object"}]},"PlaybookList":{"allOf":[{"$ref":"#/components/schemas/List"},{"properties":{"items":{"items":{"$ref":"#/components/schemas/Playbook"},"type":"array"}},"type":"object"}]},"SlackLinkInfo":{"allOf":[{"properties":{"client_id":{"type":"string"},"redirect_uri":{"type":"string"},"scope":{"type":"string"},"state":{"type":"string"}},"type":"object"}]},"SlackUser":{"allOf":[{"$ref":"#/components/schemas/ObjectReference"},{"properties":{"channel_id":{"type":"string"},"nonce":{"type":"string"},"slack_id":{"type":"string"},"team_id":{"type":"string"},"team_name":{"type":"string"}},"type":"object"}]},"StatusChange":{"allOf":[{"properties":{"status":{"type":"object"},"status_id":{"format":"uuid","type":"string"}},"type":"object"}]},"User":{"allOf":[{"$ref":"#/components/schemas/ObjectReference"},{"properties":{"created_at":{"format":"date-time","type":"string"},"email":{"type":"string"},"name":{"type":"string"},"slack_users":{"items":{"$ref":"#/components/schemas/SlackUser"},"type":"array"},"updated_at":{"format":"date-time","type":"string"},"username":{"type":"string"}},"type":"object"}]},"UserList":{"allOf":[{"$ref":"#/components/schemas/List"},{"properties":{"items":{"items":{"allOf":[{"$ref":"#/components/schemas/User"}]},"type":"array"}},"type":"object"}]},"WebsocketAuthToken":{"allOf":[{"properties":{"incident_id":{"type":"string"},"token":{"type":"string"},"user_id":{"type":"string"}},"type":"object"}]}},"securitySchemes":{"Bearer":{"bearerFormat":"JWT","scheme":"bearer","type":"http"}}},"info":{"description":"Web-RCA Service API","title":"Web-RCA Service API","version":"0.0.1"},"openapi":"3.0.0","paths":{"/api/web-rca/v1/errors":{"get":{"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/ErrorList"}}},"description":"A JSON array or errors"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"summary":"Returns a list of errors"},"parameters":[{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/size"}]},"/api/web-rca/v1/errors/{id}":{"get":{"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Error found by id"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No error with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"summary":"Get an error by id"},"parameters":[{"$ref":"#/components/parameters/id"}]},"/api/web-rca/v1/incidents":{"get":{"parameters":[{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/size"},{"$ref":"#/components/parameters/order_by"},{"$ref":"#/components/parameters/search"},{"$ref":"#/components/parameters/public_id"},{"$ref":"#/components/parameters/creator_id"},{"$ref":"#/components/parameters/incident_commander_id"},{"$ref":"#/components/parameters/product_id"},{"$ref":"#/components/parameters/on_call_id"},{"$ref":"#/components/parameters/responsible_manager_id"},{"$ref":"#/components/parameters/participant_id"},{"$ref":"#/components/parameters/mine"},{"$ref":"#/components/parameters/status"},{"$ref":"#/components/parameters/incident_name"},{"$ref":"#/components/parameters/private"},{"$ref":"#/components/parameters/invalid"}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/IncidentList"}}},"description":"A JSON array of incident objects"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Return a list of Incidents"},"post":{"requestBody":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Incident"}}},"description":"Incident data","required":true},"responses":{"201":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Incident"}}},"description":"Created"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Validation errors occurred"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"409":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Incident already exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"An unexpected error occurred creating the Incident"}},"security":[{"Bearer":[]}],"summary":"Create a new Incident"}},"/api/web-rca/v1/incidents/{id}":{"delete":{"responses":{"204":{"description":"Incident successfully deleted"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No Incident with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"An unexpected error occurred deleting the Incident"}},"security":[{"Bearer":[]}],"summary":"Delete an Incident"},"get":{"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Incident"}}},"description":"Incident found by id"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No Incident with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Get an Incident by id"},"parameters":[{"$ref":"#/components/parameters/id"}],"patch":{"requestBody":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/IncidentPatchRequest"}}},"description":"Incident data","required":true},"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Incident"}}},"description":"Incident updated successfully"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Validation errors occurred"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No Incident with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error updating Incident"}},"security":[{"Bearer":[]}],"summary":"Update an Incident"}},"/api/web-rca/v1/incidents/{id}/events":{"get":{"parameters":[{"$ref":"#/components/parameters/id"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/size"},{"$ref":"#/components/parameters/order_by"},{"$ref":"#/components/parameters/note"},{"$ref":"#/components/parameters/created_after"},{"$ref":"#/components/parameters/created_before"},{"$ref":"#/components/parameters/occurred_after"},{"$ref":"#/components/parameters/occurred_before"},{"$ref":"#/components/parameters/show_system_events"},{"$ref":"#/components/parameters/event_type"}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/EventList"}}},"description":"A JSON array of Event objects"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No Incident with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Get Events in given Incident by Incident id"},"post":{"parameters":[{"$ref":"#/components/parameters/id"}],"requestBody":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Event"}}},"description":"Event data","required":true},"responses":{"201":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Event"}}},"description":"Created"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Validation errors occurred"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"An unexpected error occurred creating the Event"}},"security":[{"Bearer":[]}],"summary":"Create a new Event under the Incident"}},"/api/web-rca/v1/incidents/{id}/follow_ups":{"get":{"parameters":[{"$ref":"#/components/parameters/id"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/size"},{"$ref":"#/components/parameters/order_by"},{"$ref":"#/components/parameters/created_after"},{"$ref":"#/components/parameters/created_before"},{"$ref":"#/components/parameters/follow_up_status"}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/FollowUpList"}}},"description":"A JSON array of followup objects"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Get FollowUps in given Incident by Incident id"}},"/api/web-rca/v1/incidents/{id}/notifications":{"get":{"parameters":[{"$ref":"#/components/parameters/id"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/size"},{"$ref":"#/components/parameters/checked"}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/NotificationList"}}},"description":"A JSON array of Notification objects"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Get Notifications in given Incident by Incident id"},"post":{"parameters":[{"$ref":"#/components/parameters/id"}],"requestBody":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Notification"}}},"description":"Notification data","required":true},"responses":{"201":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Notification"}}},"description":"Created"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Validation errors occurred"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"An unexpected error occurred creating the Notification"}},"security":[{"Bearer":[]}],"summary":"Create a new Notification under the Incident"}},"/api/web-rca/v1/incidents/{id}/retrospective":{"get":{"parameters":[{"$ref":"#/components/parameters/id"}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/IncidentRetrospective"}}},"description":"Incident retrospective object"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No Incident with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Get the incident retrospective for the incident"},"post":{"parameters":[{"$ref":"#/components/parameters/id"}],"requestBody":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/IncidentRetrospective"}}},"description":"Event data","required":true},"responses":{"201":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/IncidentRetrospective"}}},"description":"Created"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Validation errors occurred"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"An unexpected error occurred creating the incident retrospective"}},"security":[{"Bearer":[]}],"summary":"Start a new incident retrospective"}},"/api/web-rca/v1/incidents/{id}/task_runs":{"get":{"parameters":[{"$ref":"#/components/parameters/id"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/size"},{"$ref":"#/components/parameters/order_by"}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/IncidentTaskRunList"}}},"description":"A JSON array of IncidentTaskRun objects"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No Incident with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Get IncidentTaskRuns in given Incident by Incident id"}},"/api/web-rca/v1/incidents/{incident_id}/events/{event_id}/attachments":{"get":{"parameters":[{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/size"},{"$ref":"#/components/parameters/order_by"}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/AttachmentList"}}},"description":"A JSON array of attachment objects"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Get Attachments in given Event by Event id"},"parameters":[{"$ref":"#/components/parameters/incident_id"},{"$ref":"#/components/parameters/event_id"}],"post":{"requestBody":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Attachment"}}},"description":"Event data","required":true},"responses":{"201":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Attachment"}}},"description":"Created"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Validation errors occurred"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"An unexpected error occurred creating the Attachment"}},"security":[{"Bearer":[]}],"summary":"Create a new Attachment under the Event"}},"/api/web-rca/v1/incidents/{incident_id}/events/{event_id}/attachments/{id}":{"delete":{"responses":{"204":{"description":"attachment successfully deleted"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No attachment with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"An unexpected error occurred deleting the attachment"}},"security":[{"Bearer":[]}],"summary":"Delete an attachment"},"get":{"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Attachment"}}},"description":"Attachment found by id"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Return an attachment by incident id, event id, and attachment id"},"parameters":[{"$ref":"#/components/parameters/incident_id"},{"$ref":"#/components/parameters/event_id"},{"$ref":"#/components/parameters/id"}],"patch":{"requestBody":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/AttachmentPatchRequest"}}},"description":"Attachment data","required":true},"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Attachment"}}},"description":"Attachment updated successfully"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Validation errors occurred"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No attachment with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error updating attachment"}},"security":[{"Bearer":[]}],"summary":"Update an Attachment"}},"/api/web-rca/v1/incidents/{incident_id}/events/{id}":{"delete":{"responses":{"204":{"description":"event successfully deleted"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No event with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"An unexpected error occurred deleting the event"}},"security":[{"Bearer":[]}],"summary":"Delete an event"},"get":{"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Event"}}},"description":"A JSON representation of an Event object"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Return an event by Incident id and Event id"},"parameters":[{"$ref":"#/components/parameters/id"},{"$ref":"#/components/parameters/incident_id"}],"patch":{"requestBody":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/EventPatchRequest"}}},"description":"Event data","required":true},"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Event"}}},"description":"Event updated successfully"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Validation errors occurred"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No Event with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error updating Event"}},"security":[{"Bearer":[]}],"summary":"Upate an Event"}},"/api/web-rca/v1/incidents/{incident_id}/follow_ups/{id}":{"delete":{"responses":{"204":{"description":"Follow up successfully deleted"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No Notication with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"An unexpected error occurred deleting the Follow up"}},"security":[{"Bearer":[]}],"summary":"Delete a Follow up"},"get":{"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/FollowUp"}}},"description":"A JSON representation of a FollowUp object"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Return a FollowUp by Incident id and FollowUp id"},"parameters":[{"$ref":"#/components/parameters/id"},{"$ref":"#/components/parameters/incident_id"}]},"/api/web-rca/v1/incidents/{incident_id}/get_ws_auth":{"get":{"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/WebsocketAuthToken"}}},"description":"Temporary token to open WebSocket"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Return temporary auth token to open WebSocket"},"parameters":[{"$ref":"#/components/parameters/incident_id"}]},"/api/web-rca/v1/incidents/{incident_id}/notifications/{id}":{"delete":{"responses":{"204":{"description":"Notification successfully deleted"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No Notication with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"An unexpected error occurred deleting the Notification"}},"security":[{"Bearer":[]}],"summary":"Delete a Notification"},"get":{"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Notification"}}},"description":"A JSON array of Notification objects"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Return an Notification by Incident id and Notification id"},"parameters":[{"$ref":"#/components/parameters/id"},{"$ref":"#/components/parameters/incident_id"}],"patch":{"requestBody":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/NotificationPatchRequest"}}},"description":"Notification patch data","required":true},"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Notification"}}},"description":"Notification updated successfully"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Validation errors occurred"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No Incident with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error updating Incident"}},"security":[{"Bearer":[]}],"summary":"Update a Notification"}},"/api/web-rca/v1/incidents/{incident_id}/task_runs/{id}":{"get":{"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/IncidentTaskRun"}}},"description":"A JSON representation of an IncidentTaskRun object"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Return an IncidentTaskRun by Incident id and IncidentTaskRun id"},"parameters":[{"$ref":"#/components/parameters/id"},{"$ref":"#/components/parameters/incident_id"}]},"/api/web-rca/v1/playbooks":{"get":{"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/PlaybookList"}}},"description":"A JSON array or playbooks"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"summary":"Returns a list of playbooks"}},"/api/web-rca/v1/report/{id}":{"get":{"responses":{"200":{"content":{"text/csv":{}},"description":"Report was executed, results follow"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Report does not exist"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Execute a report by report ID"},"parameters":[{"$ref":"#/components/parameters/id"},{"$ref":"#/components/parameters/from"},{"$ref":"#/components/parameters/to"},{"$ref":"#/components/parameters/products"},{"$ref":"#/components/parameters/follow_up_status_rep"}]},"/api/web-rca/v1/slack-state":{"get":{"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/SlackLinkInfo"}}},"description":"Temporary state token to compose Add to Slack link"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Return temporary state token to compose Add to Slack link"}},"/api/web-rca/v1/users":{"get":{"parameters":[{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/size"},{"$ref":"#/components/parameters/order_by"},{"$ref":"#/components/parameters/search"}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/UserList"}}},"description":"A JSON array of users"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Return the list of all users in the system"}},"/api/web-rca/v1/users/{id}":{"get":{"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/User"}}},"description":"User found by id"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No User with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Get an User by id"},"parameters":[{"$ref":"#/components/parameters/id"}]},"/api/web-rca/v1/users/{id}/slack_users":{"post":{"parameters":[{"$ref":"#/components/parameters/id"}],"requestBody":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/SlackUser"}}},"description":"Notification data","required":true},"responses":{"201":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/User"}}},"description":"Created"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Validation errors occurred"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"An unexpected error occurred creating the SlackUser"}},"security":[{"Bearer":[]}],"summary":"Marry a slack id to a user id"}},"/api/web-rca/v1/users/{user_id}/slack_users/{id}":{"delete":{"responses":{"204":{"description":"slack user mapping successfully deleted"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No slack user mapping with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"An unexpected error occurred deleting the slack user mapping"}},"security":[{"Bearer":[]}],"summary":"Delete a slack user mapping"},"parameters":[{"$ref":"#/components/parameters/id"},{"$ref":"#/components/parameters/user_id"}]}},"servers":[{"description":"Main (production) server","url":"https://api.openshift.com"},{"description":"Staging server","url":"https://api.stage.openshift.com"},{"description":"Local development server","url":"http://localhost:8000"},{"description":"current domain","url":"/"}]}}')}}]); \ No newline at end of file diff --git a/static/js/8387.46169d91.chunk.js b/static/js/8387.46169d91.chunk.js new file mode 100644 index 00000000..ca9e1fca --- /dev/null +++ b/static/js/8387.46169d91.chunk.js @@ -0,0 +1 @@ +"use strict";(self.webpackChunkapidocs=self.webpackChunkapidocs||[]).push([[8387],{68387:function(e){e.exports=JSON.parse('{"extras":{},"openapi":{"components":{"parameters":{"checked":{"description":"Filter notification by checked field.\\nWhen checked: true returns only checked notifications.\\nWhen checked: false returns only NOT checked notifications.\\nWhen left empty returns all notification.","in":"query","name":"checked","required":false,"schema":{"nullable":true,"type":"boolean"}},"created_after":{"description":"Restrict results to all records created after the given date.","in":"query","name":"created_after","required":false,"schema":{"format":"date-time","type":"string"}},"created_before":{"description":"Restrict results to all records created before the given date.","in":"query","name":"created_before","required":false,"schema":{"format":"date-time","type":"string"}},"creator_id":{"description":"The public id of a creator of an Incident","in":"query","name":"creator_id","required":false,"schema":{"type":"string"}},"event_id":{"description":"The id of an Event","in":"path","name":"event_id","required":true,"schema":{"type":"string"}},"event_type":{"description":"Comma separated list of event types to display","in":"query","name":"event_type","required":false,"schema":{"type":"string"}},"follow_up_status":{"description":"Comma separated list of incident statuses. \\ndone: done == true\\nopen: done == false\\narchived: archived == true\\n\\"\\": default value, archived = false\\nBy default you wont get any archived follow ups, but you can explicitly tell that you want archived.\\nMultiple value create disjunction.\\n\\"done,archived\\" -> done OR archived\\n\\"done,open\\" -> \\"done OR not done\\" -> \\"not archived\\"","in":"query","name":"follow_up_status","required":false,"schema":{"default":"","type":"string"}},"follow_up_status_rep":{"description":"Textual value of the follow up status.\\nE.g. open, done, archived","in":"query","name":"follow_up_status","required":false,"schema":{"default":"","type":"string"}},"from":{"description":"Restrict results to all records created after the given date.","in":"query","name":"from","required":false,"schema":{"format":"date-time","type":"string"}},"id":{"description":"The id of record","in":"path","name":"id","required":true,"schema":{"type":"string"}},"incident_commander_id":{"description":"Comma separated list of incident commander ids","in":"query","name":"incident_commander_id","required":false,"schema":{"type":"string"}},"incident_id":{"description":"The id of an Incident","in":"path","name":"incident_id","required":true,"schema":{"type":"string"}},"incident_name":{"description":"Keyword for case insensitive search of the incident id or the incident summary.","in":"query","name":"incident_name","required":false,"schema":{"type":"string"}},"invalid":{"description":"true restricts output to only invalid incidents and omits incident details from reporting, false restricts output to real valid incidents and includes incident details in reporting. No value or nil means all incidents.","in":"query","name":"invalid","required":false,"schema":{"nullable":true,"type":"boolean"}},"mine":{"description":"If true, restricts output to records owned by the requesting user.","in":"query","name":"mine","required":false,"schema":{"default":false,"type":"boolean"}},"note":{"description":"Keyword for case insensitive search of the note of an Event.","in":"query","name":"note","required":false,"schema":{"type":"string"}},"occurred_after":{"description":"Restrict results to all records occurred after the given date.","in":"query","name":"occurred_after","required":false,"schema":{"format":"date-time","type":"string"}},"occurred_before":{"description":"Restrict results to all records occurred before the given date.","in":"query","name":"occurred_before","required":false,"schema":{"format":"date-time","type":"string"}},"on_call_id":{"description":"the on-call person of an Incident","in":"query","name":"on_call_id","required":false,"schema":{"type":"string"}},"order_by":{"description":"Specifies the order by criteria. The syntax of this parameter is\\nsimilar to the syntax of the _order by_ clause of an SQL statement.\\nWe support ordering by these fields:\\n- id\\n- incident_id\\n- name\\n- email\\n- username\\n- status\\n- severity\\n- product\\n- last_updated\\n- summary\\n- created_at\\n- working_time\\n\\n\\n\\n```sql\\nname asc\\n```\\n\\nOr in order to retrieve all incidents ordered by username _and_ email:\\n\\n```sql\\nname asc, email asc\\n```\\n\\nIf the parameter isn\'t provided, or if the value is empty, then\\nno explicit ordering will be applied.","in":"query","name":"order_by","required":false,"schema":{"type":"string"}},"page":{"description":"Page number of record list when record list exceeds specified page size","in":"query","name":"page","required":false,"schema":{"default":1,"minimum":1,"type":"integer"}},"participant_id":{"description":"the id of a user participating in an Incident, regardless of role","in":"query","name":"participant_id","required":false,"schema":{"type":"string"}},"private":{"description":"true restricts output to private incidents, false restricts output to public incidents. No value or nil means all incidents.","in":"query","name":"private","required":false,"schema":{"nullable":true,"type":"boolean"}},"product_id":{"description":"Comma separated list of product ids","in":"query","name":"product_id","required":false,"schema":{"type":"string"}},"products":{"description":"comma separated list of products","in":"query","name":"products","required":false,"schema":{"type":"string"}},"public_id":{"description":"The public id of an Incident","in":"query","name":"public_id","required":false,"schema":{"type":"string"}},"responsible_manager_id":{"description":"the manager responsible for an Incident","in":"query","name":"responsible_manager_id","required":false,"schema":{"type":"string"}},"search":{"description":"Search string for searching records. In case of users it\'s matched\\nagainst Name, Username and Email fields.","in":"query","name":"search","required":false,"schema":{"type":"string"}},"show_system_events":{"description":"Filter events by show_system_events field.\\nWhen show_system_events: true returns only system events.\\nWhen show_system_events: false returns only non-system events.\\nWhen left empty returns all events.","in":"query","name":"show_system_events","required":false,"schema":{"nullable":true,"type":"boolean"}},"size":{"description":"Maximum number of records to return","in":"query","name":"size","required":false,"schema":{"default":100,"minimum":0,"type":"integer"}},"status":{"description":"Comma separated list of incident statuses","in":"query","name":"status","required":false,"schema":{"type":"string"}},"to":{"description":"Restrict results to all records created before the given date.","in":"query","name":"to","required":false,"schema":{"format":"date-time","type":"string"}},"user_id":{"description":"The id of a User","in":"path","name":"user_id","required":true,"schema":{"type":"string"}}},"schemas":{"Attachment":{"allOf":[{"$ref":"#/components/schemas/ObjectReference"},{"properties":{"content_type":{"type":"string"},"creator":{"$ref":"#/components/schemas/User"},"data":{"format":"byte","type":"string"},"event":{"$ref":"#/components/schemas/ObjectReference"},"file_size":{"format":"int64","type":"integer"},"name":{"type":"string"},"sha1_sum":{"format":"byte","type":"string"},"slack_file_id":{"type":"string"}},"type":"object"}]},"AttachmentList":{"allOf":[{"$ref":"#/components/schemas/List"},{"properties":{"items":{"items":{"allOf":[{"$ref":"#/components/schemas/Attachment"}]},"type":"array"}},"type":"object"}]},"AttachmentPatchRequest":{"properties":{"content_type":{"type":"string"},"data":{"format":"byte","type":"string"}},"type":"object"},"Error":{"allOf":[{"$ref":"#/components/schemas/ObjectReference"},{"properties":{"code":{"type":"string"},"operation_id":{"type":"string"},"reason":{"type":"string"}},"type":"object"}]},"ErrorList":{"allOf":[{"$ref":"#/components/schemas/List"},{"properties":{"items":{"items":{"$ref":"#/components/schemas/Error"},"type":"array"}},"type":"object"}]},"Escalation":{"allOf":[{"properties":{"id":{"format":"uuid","type":"string"},"user":{"$ref":"#/components/schemas/User"}},"type":"object"}]},"EscalationList":{"allOf":[{"$ref":"#/components/schemas/List"},{"properties":{"items":{"items":{"allOf":[{"$ref":"#/components/schemas/Escalation"}]},"type":"array"}},"type":"object"}]},"Event":{"allOf":[{"$ref":"#/components/schemas/ObjectReference"},{"properties":{"attachments":{"items":{"$ref":"#/components/schemas/Attachment"},"type":"array"},"created_at":{"format":"date-time","type":"string"},"creator":{"$ref":"#/components/schemas/User"},"escalation":{"$ref":"#/components/schemas/Escalation"},"event_type":{"type":"string"},"external_reference":{"$ref":"#/components/schemas/ExternalReference"},"follow_up":{"$ref":"#/components/schemas/FollowUp"},"follow_up_change":{"$ref":"#/components/schemas/FollowUpChange"},"handoff":{"$ref":"#/components/schemas/Handoff"},"incident":{"$ref":"#/components/schemas/ObjectReference"},"metadata":{"type":"object"},"note":{"type":"string"},"occurred_at":{"format":"date-time","type":"string"},"slack_message_timestamp":{"type":"string"},"status_change":{"$ref":"#/components/schemas/StatusChange"},"updated_at":{"format":"date-time","type":"string"}},"type":"object"}]},"EventList":{"allOf":[{"$ref":"#/components/schemas/List"},{"properties":{"items":{"items":{"allOf":[{"$ref":"#/components/schemas/Event"}]},"type":"array"}},"type":"object"}]},"EventPatchRequest":{"properties":{"note":{"type":"string"},"occurred_at":{"format":"date-time","type":"string"},"url":{"type":"string"}},"type":"object"},"ExternalReference":{"allOf":[{"properties":{"url":{"type":"string"}},"type":"object"}]},"FollowUp":{"allOf":[{"$ref":"#/components/schemas/ObjectReference"},{"properties":{"archived":{"type":"boolean"},"created_at":{"format":"date-time","type":"string"},"done":{"type":"boolean"},"follow_up_type":{"type":"string"},"incident":{"$ref":"#/components/schemas/ObjectReference"},"issue_created_at":{"format":"date-time","type":"string"},"owner":{"type":"string"},"priority":{"type":"string"},"status":{"type":"string"},"title":{"type":"string"},"updated_at":{"format":"date-time","type":"string"},"url":{"type":"string"}},"type":"object"}]},"FollowUpChange":{"allOf":[{"properties":{"follow_up_id":{"format":"uuid","type":"string"},"status":{"type":"object"}},"type":"object"}]},"FollowUpList":{"allOf":[{"$ref":"#/components/schemas/List"},{"properties":{"items":{"items":{"allOf":[{"$ref":"#/components/schemas/FollowUp"}]},"type":"array"}},"type":"object"}]},"FollowUpPatchRequest":{"properties":{"archived":{"type":"boolean"},"url":{"type":"string"}},"type":"object"},"Handoff":{"allOf":[{"properties":{"handoff_from":{"$ref":"#/components/schemas/User"},"handoff_to":{"$ref":"#/components/schemas/User"},"handoff_type":{"type":"string"},"id":{"format":"uuid","type":"string"}},"type":"object"}]},"HandoffList":{"allOf":[{"$ref":"#/components/schemas/List"},{"properties":{"items":{"items":{"allOf":[{"$ref":"#/components/schemas/Handoff"}]},"type":"array"}},"type":"object"}]},"Incident":{"allOf":[{"$ref":"#/components/schemas/ObjectReference"},{"properties":{"ansible_playbook":{"type":"string"},"bad_rollout_commit":{"type":"string"},"created_at":{"format":"date-time","type":"string"},"creator":{"$ref":"#/components/schemas/User"},"description":{"type":"string"},"external_coordination":{"items":{"type":"string"},"type":"array"},"impacted_products":{"items":{"type":"string"},"type":"array"},"incident_commander":{"$ref":"#/components/schemas/User"},"incident_id":{"type":"string"},"incident_owner":{"$ref":"#/components/schemas/User"},"incident_type":{"type":"string"},"invalid":{"nullable":true,"type":"boolean"},"metadata":{"nullable":true,"type":"object"},"on_call_person":{"$ref":"#/components/schemas/User"},"participants":{"items":{"$ref":"#/components/schemas/User"},"type":"array"},"post_mortem_review":{"type":"string"},"primary_team":{"type":"string"},"private":{"nullable":true,"type":"boolean"},"product_engineering_lead":{"$ref":"#/components/schemas/User"},"product_manager":{"$ref":"#/components/schemas/User"},"product_owner":{"$ref":"#/components/schemas/User"},"products":{"items":{"type":"string"},"type":"array"},"reopen_counter":{"format":"int64","type":"integer"},"resolved_at":{"format":"date-time","type":"string"},"responsible_manager":{"$ref":"#/components/schemas/User"},"scribe":{"$ref":"#/components/schemas/User"},"severity":{"type":"string"},"slack_channel_id":{"type":"string"},"slack_team_id":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"task_runs":{"items":{"$ref":"#/components/schemas/IncidentTaskRun"},"type":"array"},"updated_at":{"format":"date-time","type":"string"},"viewers":{"items":{"$ref":"#/components/schemas/User"},"type":"array"},"working_time":{"format":"int64","type":"integer"}},"type":"object"}]},"IncidentList":{"allOf":[{"$ref":"#/components/schemas/List"},{"properties":{"items":{"items":{"allOf":[{"$ref":"#/components/schemas/Incident"}]},"type":"array"}},"type":"object"}]},"IncidentPatchRequest":{"properties":{"bad_rollout_commit":{"type":"string"},"description":{"type":"string"},"external_coordination":{"items":{"type":"string"},"type":"array"},"impacted_products":{"items":{"type":"string"},"type":"array"},"incident_commander":{"$ref":"#/components/schemas/ObjectReference"},"incident_owner":{"$ref":"#/components/schemas/ObjectReference"},"incident_type":{"type":"string"},"invalid":{"type":"boolean"},"on_call_person":{"$ref":"#/components/schemas/ObjectReference"},"post_mortem_review":{"type":"string"},"primary_team":{"type":"string"},"private":{"type":"boolean"},"product_engineering_lead":{"$ref":"#/components/schemas/ObjectReference"},"product_manager":{"$ref":"#/components/schemas/ObjectReference"},"product_owner":{"$ref":"#/components/schemas/ObjectReference"},"products":{"items":{"type":"string"},"type":"array"},"responsible_manager":{"$ref":"#/components/schemas/ObjectReference"},"scribe":{"$ref":"#/components/schemas/ObjectReference"},"severity":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"viewers":{"items":{"$ref":"#/components/schemas/User"},"type":"array"}},"type":"object"},"IncidentRetrospective":{"allOf":[{"$ref":"#/components/schemas/ObjectReference"},{"properties":{"created_at":{"format":"date-time","type":"string"},"deleted":{"type":"boolean"},"google_doc_error":{"type":"string"},"google_doc_link":{"type":"string"},"google_doc_status":{"type":"string"},"google_pdf_error":{"type":"string"},"google_pdf_link":{"type":"string"},"updated_at":{"format":"date-time","type":"string"}},"type":"object"}]},"IncidentRetrospectivePatchRequest":{"properties":{"locked":{"type":"boolean"}},"type":"object"},"IncidentTaskRun":{"allOf":[{"$ref":"#/components/schemas/ObjectReference"},{"properties":{"ansible_playbook":{"type":"string"},"created_at":{"format":"date-time","type":"string"},"name":{"type":"string"},"parameters":{"nullable":true,"type":"object"},"result":{"nullable":true,"type":"object"},"updated_at":{"format":"date-time","type":"string"},"url":{"type":"string"}},"type":"object"}]},"IncidentTaskRunList":{"allOf":[{"$ref":"#/components/schemas/List"},{"properties":{"items":{"items":{"allOf":[{"$ref":"#/components/schemas/IncidentTaskRun"}]},"type":"array"}},"type":"object"}]},"List":{"properties":{"kind":{"type":"string"},"page":{"type":"integer"},"size":{"type":"integer"},"total":{"type":"integer"}},"required":["kind","page","size","total","items"],"type":"object"},"Notification":{"allOf":[{"$ref":"#/components/schemas/ObjectReference"},{"properties":{"checked":{"type":"boolean"},"created_at":{"format":"date-time","type":"string"},"incident":{"$ref":"#/components/schemas/ObjectReference"},"name":{"type":"string"},"updated_at":{"format":"date-time","type":"string"}},"type":"object"}]},"NotificationList":{"allOf":[{"$ref":"#/components/schemas/List"},{"properties":{"items":{"items":{"allOf":[{"$ref":"#/components/schemas/Notification"}]},"type":"array"}},"type":"object"}]},"NotificationPatchRequest":{"properties":{"checked":{"type":"boolean"},"name":{"type":"string"},"place_after":{"description":"HEAD - place on the top, - place after this notification","type":"string"}},"type":"object"},"ObjectReference":{"properties":{"href":{"type":"string"},"id":{"format":"uuid","type":"string"},"kind":{"type":"string"}},"type":"object"},"Playbook":{"allOf":[{"$ref":"#/components/schemas/ObjectReference"},{"properties":{"name":{"type":"string"}},"type":"object"}]},"PlaybookList":{"allOf":[{"$ref":"#/components/schemas/List"},{"properties":{"items":{"items":{"$ref":"#/components/schemas/Playbook"},"type":"array"}},"type":"object"}]},"Report":{"allOf":[{"$ref":"#/components/schemas/ObjectReference"},{"properties":{"description":{"type":"string"},"id":{"type":"string"},"path":{"type":"string"},"supported_parameters":{"items":{"type":"string"},"type":"array"}},"type":"object"}]},"ReportList":{"allOf":[{"$ref":"#/components/schemas/List"},{"properties":{"items":{"items":{"allOf":[{"$ref":"#/components/schemas/Report"}]},"type":"array"}},"type":"object"}]},"SlackLinkInfo":{"allOf":[{"properties":{"client_id":{"type":"string"},"redirect_uri":{"type":"string"},"scope":{"type":"string"},"state":{"type":"string"}},"type":"object"}]},"SlackUser":{"allOf":[{"$ref":"#/components/schemas/ObjectReference"},{"properties":{"channel_id":{"type":"string"},"nonce":{"type":"string"},"slack_id":{"type":"string"},"team_id":{"type":"string"},"team_name":{"type":"string"}},"type":"object"}]},"StatusChange":{"allOf":[{"properties":{"status":{"type":"object"},"status_id":{"format":"uuid","type":"string"}},"type":"object"}]},"User":{"allOf":[{"$ref":"#/components/schemas/ObjectReference"},{"properties":{"created_at":{"format":"date-time","type":"string"},"email":{"type":"string"},"name":{"type":"string"},"slack_users":{"items":{"$ref":"#/components/schemas/SlackUser"},"type":"array"},"updated_at":{"format":"date-time","type":"string"},"username":{"type":"string"}},"type":"object"}]},"UserList":{"allOf":[{"$ref":"#/components/schemas/List"},{"properties":{"items":{"items":{"allOf":[{"$ref":"#/components/schemas/User"}]},"type":"array"}},"type":"object"}]},"WebsocketAuthToken":{"allOf":[{"properties":{"incident_id":{"type":"string"},"token":{"type":"string"},"user_id":{"type":"string"}},"type":"object"}]}},"securitySchemes":{"Bearer":{"bearerFormat":"JWT","scheme":"bearer","type":"http"}}},"info":{"description":"Web-RCA Service API","title":"Web-RCA Service API","version":"0.0.1"},"openapi":"3.0.0","paths":{"/api/web-rca/v1/errors":{"get":{"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/ErrorList"}}},"description":"A JSON array or errors"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"summary":"Returns a list of errors"},"parameters":[{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/size"}]},"/api/web-rca/v1/errors/{id}":{"get":{"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Error found by id"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No error with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"summary":"Get an error by id"},"parameters":[{"$ref":"#/components/parameters/id"}]},"/api/web-rca/v1/incidents":{"get":{"parameters":[{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/size"},{"$ref":"#/components/parameters/order_by"},{"$ref":"#/components/parameters/search"},{"$ref":"#/components/parameters/public_id"},{"$ref":"#/components/parameters/creator_id"},{"$ref":"#/components/parameters/incident_commander_id"},{"$ref":"#/components/parameters/product_id"},{"$ref":"#/components/parameters/on_call_id"},{"$ref":"#/components/parameters/responsible_manager_id"},{"$ref":"#/components/parameters/participant_id"},{"$ref":"#/components/parameters/mine"},{"$ref":"#/components/parameters/status"},{"$ref":"#/components/parameters/incident_name"},{"$ref":"#/components/parameters/private"},{"$ref":"#/components/parameters/invalid"}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/IncidentList"}}},"description":"A JSON array of incident objects"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Return a list of Incidents"},"post":{"requestBody":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Incident"}}},"description":"Incident data","required":true},"responses":{"201":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Incident"}}},"description":"Created"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Validation errors occurred"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"409":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Incident already exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"An unexpected error occurred creating the Incident"}},"security":[{"Bearer":[]}],"summary":"Create a new Incident"}},"/api/web-rca/v1/incidents/{id}":{"delete":{"responses":{"204":{"description":"Incident successfully deleted"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No Incident with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"An unexpected error occurred deleting the Incident"}},"security":[{"Bearer":[]}],"summary":"Delete an Incident"},"get":{"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Incident"}}},"description":"Incident found by id"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No Incident with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Get an Incident by id"},"parameters":[{"$ref":"#/components/parameters/id"}],"patch":{"requestBody":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/IncidentPatchRequest"}}},"description":"Incident data","required":true},"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Incident"}}},"description":"Incident updated successfully"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Validation errors occurred"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No Incident with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error updating Incident"}},"security":[{"Bearer":[]}],"summary":"Update an Incident"}},"/api/web-rca/v1/incidents/{id}/events":{"get":{"parameters":[{"$ref":"#/components/parameters/id"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/size"},{"$ref":"#/components/parameters/order_by"},{"$ref":"#/components/parameters/note"},{"$ref":"#/components/parameters/created_after"},{"$ref":"#/components/parameters/created_before"},{"$ref":"#/components/parameters/occurred_after"},{"$ref":"#/components/parameters/occurred_before"},{"$ref":"#/components/parameters/show_system_events"},{"$ref":"#/components/parameters/event_type"}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/EventList"}}},"description":"A JSON array of Event objects"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No Incident with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Get Events in given Incident by Incident id"},"post":{"parameters":[{"$ref":"#/components/parameters/id"}],"requestBody":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Event"}}},"description":"Event data","required":true},"responses":{"201":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Event"}}},"description":"Created"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Validation errors occurred"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"An unexpected error occurred creating the Event"}},"security":[{"Bearer":[]}],"summary":"Create a new Event under the Incident"}},"/api/web-rca/v1/incidents/{id}/follow_ups":{"get":{"parameters":[{"$ref":"#/components/parameters/id"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/size"},{"$ref":"#/components/parameters/order_by"},{"$ref":"#/components/parameters/created_after"},{"$ref":"#/components/parameters/created_before"},{"$ref":"#/components/parameters/follow_up_status"}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/FollowUpList"}}},"description":"A JSON array of followup objects"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Get FollowUps in given Incident by Incident id"}},"/api/web-rca/v1/incidents/{id}/notifications":{"get":{"parameters":[{"$ref":"#/components/parameters/id"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/size"},{"$ref":"#/components/parameters/checked"}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/NotificationList"}}},"description":"A JSON array of Notification objects"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Get Notifications in given Incident by Incident id"},"post":{"parameters":[{"$ref":"#/components/parameters/id"}],"requestBody":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Notification"}}},"description":"Notification data","required":true},"responses":{"201":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Notification"}}},"description":"Created"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Validation errors occurred"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"An unexpected error occurred creating the Notification"}},"security":[{"Bearer":[]}],"summary":"Create a new Notification under the Incident"}},"/api/web-rca/v1/incidents/{id}/retrospective":{"delete":{"parameters":[{"$ref":"#/components/parameters/id"}],"responses":{"200":{"description":"incident retrospective successfully deleted"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No incident retrospective with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"An unexpected error occurred deleting the incident retrospective"}},"security":[{"Bearer":[]}],"summary":"Delete an incident retrospective"},"get":{"parameters":[{"$ref":"#/components/parameters/id"}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/IncidentRetrospective"}}},"description":"Incident retrospective object"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No Incident with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Get the incident retrospective for the incident"},"patch":{"parameters":[{"$ref":"#/components/parameters/id"}],"requestBody":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/IncidentRetrospectivePatchRequest"}}},"description":"Incident retrospective patch data","required":true},"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/IncidentRetrospective"}}},"description":"Incident retrospective updated successfully"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Validation errors occurred"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No incident with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error updating incident retrospective"}},"security":[{"Bearer":[]}],"summary":"Update an incident retrospective"},"post":{"parameters":[{"$ref":"#/components/parameters/id"}],"requestBody":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/IncidentRetrospective"}}},"description":"Event data","required":true},"responses":{"201":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/IncidentRetrospective"}}},"description":"Created"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Validation errors occurred"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"An unexpected error occurred creating the incident retrospective"}},"security":[{"Bearer":[]}],"summary":"Start a new incident retrospective"}},"/api/web-rca/v1/incidents/{id}/retrospective/restore":{"post":{"parameters":[{"$ref":"#/components/parameters/id"}],"requestBody":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/IncidentRetrospective"}}},"description":"Event data","required":true},"responses":{"200":{"description":"Incident retrospective restored successfully"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No incident retrospective with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"An unexpected error occurred restoring the incident retrospective"}},"security":[{"Bearer":[]}],"summary":"Restore an incident retrospective"}},"/api/web-rca/v1/incidents/{id}/task_runs":{"get":{"parameters":[{"$ref":"#/components/parameters/id"},{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/size"},{"$ref":"#/components/parameters/order_by"}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/IncidentTaskRunList"}}},"description":"A JSON array of IncidentTaskRun objects"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No Incident with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Get IncidentTaskRuns in given Incident by Incident id"}},"/api/web-rca/v1/incidents/{incident_id}/events/{event_id}/attachments":{"get":{"parameters":[{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/size"},{"$ref":"#/components/parameters/order_by"}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/AttachmentList"}}},"description":"A JSON array of attachment objects"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Get Attachments in given Event by Event id"},"parameters":[{"$ref":"#/components/parameters/incident_id"},{"$ref":"#/components/parameters/event_id"}],"post":{"requestBody":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Attachment"}}},"description":"Event data","required":true},"responses":{"201":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Attachment"}}},"description":"Created"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Validation errors occurred"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"An unexpected error occurred creating the Attachment"}},"security":[{"Bearer":[]}],"summary":"Create a new Attachment under the Event"}},"/api/web-rca/v1/incidents/{incident_id}/events/{event_id}/attachments/{id}":{"delete":{"responses":{"204":{"description":"attachment successfully deleted"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No attachment with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"An unexpected error occurred deleting the attachment"}},"security":[{"Bearer":[]}],"summary":"Delete an attachment"},"get":{"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Attachment"}}},"description":"Attachment found by id"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Return an attachment by incident id, event id, and attachment id"},"parameters":[{"$ref":"#/components/parameters/incident_id"},{"$ref":"#/components/parameters/event_id"},{"$ref":"#/components/parameters/id"}],"patch":{"requestBody":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/AttachmentPatchRequest"}}},"description":"Attachment data","required":true},"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Attachment"}}},"description":"Attachment updated successfully"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Validation errors occurred"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No attachment with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error updating attachment"}},"security":[{"Bearer":[]}],"summary":"Update an Attachment"}},"/api/web-rca/v1/incidents/{incident_id}/events/{id}":{"delete":{"responses":{"204":{"description":"event successfully deleted"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No event with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"An unexpected error occurred deleting the event"}},"security":[{"Bearer":[]}],"summary":"Delete an event"},"get":{"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Event"}}},"description":"A JSON representation of an Event object"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Return an event by Incident id and Event id"},"parameters":[{"$ref":"#/components/parameters/id"},{"$ref":"#/components/parameters/incident_id"}],"patch":{"requestBody":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/EventPatchRequest"}}},"description":"Event data","required":true},"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Event"}}},"description":"Event updated successfully"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Validation errors occurred"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No Event with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error updating Event"}},"security":[{"Bearer":[]}],"summary":"Upate an Event"}},"/api/web-rca/v1/incidents/{incident_id}/follow_ups/{id}":{"get":{"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/FollowUp"}}},"description":"A JSON representation of a FollowUp object"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Return a FollowUp by Incident id and FollowUp id"},"parameters":[{"$ref":"#/components/parameters/id"},{"$ref":"#/components/parameters/incident_id"}],"patch":{"requestBody":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/FollowUpPatchRequest"}}},"description":"FollowUp patch data","required":true},"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/FollowUp"}}},"description":"FollowUp updated successfully"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Validation errors occurred"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No FollowUp with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error updating FollowUp"}},"security":[{"Bearer":[]}],"summary":"Update a FollowUp"}},"/api/web-rca/v1/incidents/{incident_id}/get_ws_auth":{"get":{"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/WebsocketAuthToken"}}},"description":"Temporary token to open WebSocket"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Return temporary auth token to open WebSocket"},"parameters":[{"$ref":"#/components/parameters/incident_id"}]},"/api/web-rca/v1/incidents/{incident_id}/notifications/{id}":{"delete":{"responses":{"204":{"description":"Notification successfully deleted"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No Notication with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"An unexpected error occurred deleting the Notification"}},"security":[{"Bearer":[]}],"summary":"Delete a Notification"},"get":{"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Notification"}}},"description":"A JSON array of Notification objects"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Return an Notification by Incident id and Notification id"},"parameters":[{"$ref":"#/components/parameters/id"},{"$ref":"#/components/parameters/incident_id"}],"patch":{"requestBody":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/NotificationPatchRequest"}}},"description":"Notification patch data","required":true},"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Notification"}}},"description":"Notification updated successfully"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Validation errors occurred"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No Incident with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error updating Incident"}},"security":[{"Bearer":[]}],"summary":"Update a Notification"}},"/api/web-rca/v1/incidents/{incident_id}/task_runs/{id}":{"get":{"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/IncidentTaskRun"}}},"description":"A JSON representation of an IncidentTaskRun object"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Return an IncidentTaskRun by Incident id and IncidentTaskRun id"},"parameters":[{"$ref":"#/components/parameters/id"},{"$ref":"#/components/parameters/incident_id"}]},"/api/web-rca/v1/playbooks":{"get":{"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/PlaybookList"}}},"description":"A JSON array or playbooks"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"summary":"Returns a list of playbooks"}},"/api/web-rca/v1/report":{"get":{"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/ReportList"}}},"description":"a JSON array of report types"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Return a list of report types"},"parameters":[{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/size"}]},"/api/web-rca/v1/report/{id}":{"get":{"responses":{"200":{"content":{"text/csv":{}},"description":"Report was executed, results follow"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Report does not exist"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Execute a report by report ID"},"parameters":[{"$ref":"#/components/parameters/id"},{"$ref":"#/components/parameters/from"},{"$ref":"#/components/parameters/to"},{"$ref":"#/components/parameters/products"},{"$ref":"#/components/parameters/follow_up_status_rep"}]},"/api/web-rca/v1/slack-state":{"get":{"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/SlackLinkInfo"}}},"description":"Temporary state token to compose Add to Slack link"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Return temporary state token to compose Add to Slack link"}},"/api/web-rca/v1/users":{"get":{"parameters":[{"$ref":"#/components/parameters/page"},{"$ref":"#/components/parameters/size"},{"$ref":"#/components/parameters/order_by"},{"$ref":"#/components/parameters/search"}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/UserList"}}},"description":"A JSON array of users"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Return the list of all users in the system"}},"/api/web-rca/v1/users/{id}":{"get":{"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/User"}}},"description":"User found by id"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No User with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unexpected error occurred"}},"security":[{"Bearer":[]}],"summary":"Get an User by id"},"parameters":[{"$ref":"#/components/parameters/id"}]},"/api/web-rca/v1/users/{id}/slack_users":{"post":{"parameters":[{"$ref":"#/components/parameters/id"}],"requestBody":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/SlackUser"}}},"description":"Notification data","required":true},"responses":{"201":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/User"}}},"description":"Created"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Validation errors occurred"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"An unexpected error occurred creating the SlackUser"}},"security":[{"Bearer":[]}],"summary":"Marry a slack id to a user id"}},"/api/web-rca/v1/users/{user_id}/slack_users/{id}":{"delete":{"responses":{"204":{"description":"slack user mapping successfully deleted"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Auth token is invalid"},"403":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"Unauthorized to perform operation"},"404":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"No slack user mapping with specified id exists"},"500":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}},"description":"An unexpected error occurred deleting the slack user mapping"}},"security":[{"Bearer":[]}],"summary":"Delete a slack user mapping"},"parameters":[{"$ref":"#/components/parameters/id"},{"$ref":"#/components/parameters/user_id"}]}},"servers":[{"description":"Main (production) server","url":"https://api.openshift.com"},{"description":"Staging server","url":"https://api.stage.openshift.com"},{"description":"Local development server","url":"http://localhost:8000"},{"description":"current domain","url":"/"}]}}')}}]); \ No newline at end of file diff --git a/static/js/main.1d3474e0.js b/static/js/main.d1e151bc.js similarity index 99% rename from static/js/main.1d3474e0.js rename to static/js/main.d1e151bc.js index 311d3cf8..25811090 100644 --- a/static/js/main.1d3474e0.js +++ b/static/js/main.d1e151bc.js @@ -1,3 +1,3 @@ -/*! For license information please see main.1d3474e0.js.LICENSE.txt */ -!function(){var e={16599:function(e,t,n){var i;self.MonacoEnvironment=(i={editorWorkerService:"editor.worker.js",json:"json.worker.js"},{globalAPI:!1,getWorkerUrl:function(e,t){var r=n.p,o=(r?r.replace(/\/$/,"")+"/":"")+i[t];if(/^((http:)|(https:)|(file:)|(\/\/))/.test(o)){var a=String(window.location),s=a.substr(0,a.length-window.location.hash.length-window.location.search.length-window.location.pathname.length);if(o.substring(0,s.length)!==s){/^(\/\/)/.test(o)&&(o=window.location.protocol+o);var l=new Blob(["/*"+t+'*/importScripts("'+o+'");'],{type:"application/javascript"});return URL.createObjectURL(l)}}return o}}),n(54962),n(1791),n(56816),n(79240),n(45716),n(17094),n(28485),n(89977),n(75580),n(970),n(6893),n(55693),n(15389),n(45627),n(74361),n(52330),n(34464),n(22155),n(74166),n(42259),n(43869),n(52348),n(34403),n(49474),n(34775),n(80613),n(11366),n(36262),n(52791),n(51088),n(22939),n(47372),n(98361),n(56653),n(47226),n(93161),n(15157),n(94355),n(86854),n(46948),n(44356),n(26034),n(55553),n(3565),n(10102),n(44152),n(4327),n(99249),n(87629),n(16420),n(36373),n(6981),n(23957),n(94075),n(12548),n(54796),n(69321),n(95483),e.exports=n(6014),n(1153),n(32472),n(30790),n(9435),n(40987),n(93841),n(55738),n(88082)},60322:function(e,t,n){"use strict";var i=n(56690).default,r=n(89728).default,o=n(61655).default,a=n(26389).default;t.IU=t.ap=t.Jh=void 0;var s,l=n(29388),u=l.__importStar(n(72791));!function(e){e.sm="sm",e.md="md",e.lg="lg",e.xl="xl"}(s=t.Jh||(t.Jh={}));t.ap=function(e){switch(e){case s.sm:return"1em";case s.md:return"1.5em";case s.lg:return"2em";case s.xl:return"3em";default:return"1em"}};var c=0;t.IU=function(e){var n,d=e.name,h=e.xOffset,f=void 0===h?0:h,p=e.yOffset,g=void 0===p?0:p,v=e.width,m=e.height,y=e.svgPath;return n=function(e){o(s,e);var n=a(s);function s(){var e;return i(this,s),(e=n.apply(this,arguments)).id="icon-title-".concat(c++),e}return r(s,[{key:"render",value:function(){var e=this.props,n=e.size,i=e.color,r=e.title,o=e.noVerticalAlign,a=l.__rest(e,["size","color","title","noVerticalAlign"]),s=Boolean(r),c=(0,t.ap)(n),d=-.125*Number.parseFloat(c),h=o?null:{verticalAlign:"".concat(d,"em")},p=[f,g,v,m].join(" ");return u.createElement("svg",Object.assign({style:h,fill:i,height:c,width:c,viewBox:p,"aria-labelledby":s?this.id:null,"aria-hidden":!s||null,role:"img"},a),s&&u.createElement("title",{id:this.id},r),u.createElement("path",{d:y}))}}]),s}(u.Component),n.displayName=d,n.defaultProps={color:"currentColor",size:s.sm,noVerticalAlign:!1},n}},96659:function(e,t,n){"use strict";t.Lb={name:"ThIcon",height:512,width:512,svgPath:"M149.333 56v80c0 13.255-10.745 24-24 24H24c-13.255 0-24-10.745-24-24V56c0-13.255 10.745-24 24-24h101.333c13.255 0 24 10.745 24 24zm181.334 240v-80c0-13.255-10.745-24-24-24H205.333c-13.255 0-24 10.745-24 24v80c0 13.255 10.745 24 24 24h101.333c13.256 0 24.001-10.745 24.001-24zm32-240v80c0 13.255 10.745 24 24 24H488c13.255 0 24-10.745 24-24V56c0-13.255-10.745-24-24-24H386.667c-13.255 0-24 10.745-24 24zm-32 80V56c0-13.255-10.745-24-24-24H205.333c-13.255 0-24 10.745-24 24v80c0 13.255 10.745 24 24 24h101.333c13.256 0 24.001-10.745 24.001-24zm-205.334 56H24c-13.255 0-24 10.745-24 24v80c0 13.255 10.745 24 24 24h101.333c13.255 0 24-10.745 24-24v-80c0-13.255-10.745-24-24-24zM0 376v80c0 13.255 10.745 24 24 24h101.333c13.255 0 24-10.745 24-24v-80c0-13.255-10.745-24-24-24H24c-13.255 0-24 10.745-24 24zm386.667-56H488c13.255 0 24-10.745 24-24v-80c0-13.255-10.745-24-24-24H386.667c-13.255 0-24 10.745-24 24v80c0 13.255 10.745 24 24 24zm0 160H488c13.255 0 24-10.745 24-24v-80c0-13.255-10.745-24-24-24H386.667c-13.255 0-24 10.745-24 24v80c0 13.255 10.745 24 24 24zM181.333 376v80c0 13.255 10.745 24 24 24h101.333c13.255 0 24-10.745 24-24v-80c0-13.255-10.745-24-24-24H205.333c-13.255 0-24 10.745-24 24z",yOffset:0,xOffset:0},t.X_=n(60322).IU(t.Lb),t.ZP=t.X_},9605:function(e,t,n){"use strict";t.AR={name:"ThListIcon",height:512,width:512,svgPath:"M149.333 216v80c0 13.255-10.745 24-24 24H24c-13.255 0-24-10.745-24-24v-80c0-13.255 10.745-24 24-24h101.333c13.255 0 24 10.745 24 24zM0 376v80c0 13.255 10.745 24 24 24h101.333c13.255 0 24-10.745 24-24v-80c0-13.255-10.745-24-24-24H24c-13.255 0-24 10.745-24 24zM125.333 32H24C10.745 32 0 42.745 0 56v80c0 13.255 10.745 24 24 24h101.333c13.255 0 24-10.745 24-24V56c0-13.255-10.745-24-24-24zm80 448H488c13.255 0 24-10.745 24-24v-80c0-13.255-10.745-24-24-24H205.333c-13.255 0-24 10.745-24 24v80c0 13.255 10.745 24 24 24zm-24-424v80c0 13.255 10.745 24 24 24H488c13.255 0 24-10.745 24-24V56c0-13.255-10.745-24-24-24H205.333c-13.255 0-24 10.745-24 24zm24 264H488c13.255 0 24-10.745 24-24v-80c0-13.255-10.745-24-24-24H205.333c-13.255 0-24 10.745-24 24v80c0 13.255 10.745 24 24 24z",yOffset:0,xOffset:0},t.DZ=n(60322).IU(t.AR),t.ZP=t.DZ},41596:function(e,t){"use strict";function n(e,t){if(t)return e;throw new Error("Unhandled discriminated union member: "+JSON.stringify(e))}t.ZP=n},9940:function(e){e.exports=function(e){function t(i){if(n[i])return n[i].exports;var r=n[i]={i:i,l:!1,exports:{}};return e[i].call(r.exports,r,r.exports,t),r.l=!0,r.exports}var n={};return t.m=e,t.c=n,t.d=function(e,n,i){t.o(e,n)||Object.defineProperty(e,n,{configurable:!1,enumerable:!0,get:i})},t.n=function(e){var n=e&&e.__esModule?function(){return e.default}:function(){return e};return t.d(n,"a",n),n},t.o=function(e,t){return Object.prototype.hasOwnProperty.call(e,t)},t.p="",t(t.s=13)}([function(e,t){var n=e.exports="undefined"!=typeof window&&window.Math==Math?window:"undefined"!=typeof self&&self.Math==Math?self:Function("return this")();"number"==typeof __g&&(__g=n)},function(e,t){e.exports=function(e){return"object"==typeof e?null!==e:"function"==typeof e}},function(e,t){var n=e.exports={version:"2.5.0"};"number"==typeof __e&&(__e=n)},function(e,t,n){e.exports=!n(4)((function(){return 7!=Object.defineProperty({},"a",{get:function(){return 7}}).a}))},function(e,t){e.exports=function(e){try{return!!e()}catch(e){return!0}}},function(e,t){var n={}.toString;e.exports=function(e){return n.call(e).slice(8,-1)}},function(e,t,n){var i=n(32)("wks"),r=n(9),o=n(0).Symbol,a="function"==typeof o;(e.exports=function(e){return i[e]||(i[e]=a&&o[e]||(a?o:r)("Symbol."+e))}).store=i},function(e,t,n){var i=n(0),r=n(2),o=n(8),a=n(22),s=n(10),l=function e(t,n,l){var u,c,d,h,f=t&e.F,p=t&e.G,g=t&e.P,v=t&e.B,m=p?i:t&e.S?i[n]||(i[n]={}):(i[n]||{}).prototype,y=p?r:r[n]||(r[n]={}),_=y.prototype||(y.prototype={});for(u in p&&(l=n),l)d=((c=!f&&m&&void 0!==m[u])?m:l)[u],h=v&&c?s(d,i):g&&"function"==typeof d?s(Function.call,d):d,m&&a(m,u,d,t&e.U),y[u]!=d&&o(y,u,h),g&&_[u]!=d&&(_[u]=d)};i.core=r,l.F=1,l.G=2,l.S=4,l.P=8,l.B=16,l.W=32,l.U=64,l.R=128,e.exports=l},function(e,t,n){var i=n(16),r=n(21);e.exports=n(3)?function(e,t,n){return i.f(e,t,r(1,n))}:function(e,t,n){return e[t]=n,e}},function(e,t){var n=0,i=Math.random();e.exports=function(e){return"Symbol(".concat(void 0===e?"":e,")_",(++n+i).toString(36))}},function(e,t,n){var i=n(24);e.exports=function(e,t,n){if(i(e),void 0===t)return e;switch(n){case 1:return function(n){return e.call(t,n)};case 2:return function(n,i){return e.call(t,n,i)};case 3:return function(n,i,r){return e.call(t,n,i,r)}}return function(){return e.apply(t,arguments)}}},function(e,t){e.exports=function(e){if(void 0==e)throw TypeError("Can't call method on "+e);return e}},function(e,t,n){var i=n(28),r=Math.min;e.exports=function(e){return e>0?r(i(e),9007199254740991):0}},function(e,t,n){"use strict";t.__esModule=!0,t.default=function(e,t){if(e&&t){var n=Array.isArray(t)?t:t.split(","),i=e.name||"",r=e.type||"",o=r.replace(/\/.*$/,"");return n.some((function(e){var t=e.trim();return"."===t.charAt(0)?i.toLowerCase().endsWith(t.toLowerCase()):t.endsWith("/*")?o===t.replace(/\/.*$/,""):r===t}))}return!0},n(14),n(34)},function(e,t,n){n(15),e.exports=n(2).Array.some},function(e,t,n){"use strict";var i=n(7),r=n(25)(3);i(i.P+i.F*!n(33)([].some,!0),"Array",{some:function(e){return r(this,e,arguments[1])}})},function(e,t,n){var i=n(17),r=n(18),o=n(20),a=Object.defineProperty;t.f=n(3)?Object.defineProperty:function(e,t,n){if(i(e),t=o(t,!0),i(n),r)try{return a(e,t,n)}catch(e){}if("get"in n||"set"in n)throw TypeError("Accessors not supported!");return"value"in n&&(e[t]=n.value),e}},function(e,t,n){var i=n(1);e.exports=function(e){if(!i(e))throw TypeError(e+" is not an object!");return e}},function(e,t,n){e.exports=!n(3)&&!n(4)((function(){return 7!=Object.defineProperty(n(19)("div"),"a",{get:function(){return 7}}).a}))},function(e,t,n){var i=n(1),r=n(0).document,o=i(r)&&i(r.createElement);e.exports=function(e){return o?r.createElement(e):{}}},function(e,t,n){var i=n(1);e.exports=function(e,t){if(!i(e))return e;var n,r;if(t&&"function"==typeof(n=e.toString)&&!i(r=n.call(e)))return r;if("function"==typeof(n=e.valueOf)&&!i(r=n.call(e)))return r;if(!t&&"function"==typeof(n=e.toString)&&!i(r=n.call(e)))return r;throw TypeError("Can't convert object to primitive value")}},function(e,t){e.exports=function(e,t){return{enumerable:!(1&e),configurable:!(2&e),writable:!(4&e),value:t}}},function(e,t,n){var i=n(0),r=n(8),o=n(23),a=n(9)("src"),s=Function.toString,l=(""+s).split("toString");n(2).inspectSource=function(e){return s.call(e)},(e.exports=function(e,t,n,s){var u="function"==typeof n;u&&(o(n,"name")||r(n,"name",t)),e[t]!==n&&(u&&(o(n,a)||r(n,a,e[t]?""+e[t]:l.join(String(t)))),e===i?e[t]=n:s?e[t]?e[t]=n:r(e,t,n):(delete e[t],r(e,t,n)))})(Function.prototype,"toString",(function(){return"function"==typeof this&&this[a]||s.call(this)}))},function(e,t){var n={}.hasOwnProperty;e.exports=function(e,t){return n.call(e,t)}},function(e,t){e.exports=function(e){if("function"!=typeof e)throw TypeError(e+" is not a function!");return e}},function(e,t,n){var i=n(10),r=n(26),o=n(27),a=n(12),s=n(29);e.exports=function(e,t){var n=1==e,l=2==e,u=3==e,c=4==e,d=6==e,h=5==e||d,f=t||s;return function(t,s,p){for(var g,v,m=o(t),y=r(m),_=i(s,p,3),b=a(y.length),k=0,C=n?f(t,b):l?f(t,0):void 0;b>k;k++)if((h||k in y)&&(v=_(g=y[k],k,m),e))if(n)C[k]=v;else if(v)switch(e){case 3:return!0;case 5:return g;case 6:return k;case 2:C.push(g)}else if(c)return!1;return d?-1:u||c?c:C}}},function(e,t,n){var i=n(5);e.exports=Object("z").propertyIsEnumerable(0)?Object:function(e){return"String"==i(e)?e.split(""):Object(e)}},function(e,t,n){var i=n(11);e.exports=function(e){return Object(i(e))}},function(e,t){var n=Math.ceil,i=Math.floor;e.exports=function(e){return isNaN(e=+e)?0:(e>0?i:n)(e)}},function(e,t,n){var i=n(30);e.exports=function(e,t){return new(i(e))(t)}},function(e,t,n){var i=n(1),r=n(31),o=n(6)("species");e.exports=function(e){var t;return r(e)&&("function"!=typeof(t=e.constructor)||t!==Array&&!r(t.prototype)||(t=void 0),i(t)&&null===(t=t[o])&&(t=void 0)),void 0===t?Array:t}},function(e,t,n){var i=n(5);e.exports=Array.isArray||function(e){return"Array"==i(e)}},function(e,t,n){var i=n(0),r=i["__core-js_shared__"]||(i["__core-js_shared__"]={});e.exports=function(e){return r[e]||(r[e]={})}},function(e,t,n){"use strict";var i=n(4);e.exports=function(e,t){return!!e&&i((function(){t?e.call(null,(function(){}),1):e.call(null)}))}},function(e,t,n){n(35),e.exports=n(2).String.endsWith},function(e,t,n){"use strict";var i=n(7),r=n(12),o=n(36),a="".endsWith;i(i.P+i.F*n(38)("endsWith"),"String",{endsWith:function(e){var t=o(this,e,"endsWith"),n=arguments.length>1?arguments[1]:void 0,i=r(t.length),s=void 0===n?i:Math.min(r(n),i),l=String(e);return a?a.call(t,l,s):t.slice(s-l.length,s)===l}})},function(e,t,n){var i=n(37),r=n(11);e.exports=function(e,t,n){if(i(t))throw TypeError("String#"+n+" doesn't accept regex!");return String(r(e))}},function(e,t,n){var i=n(1),r=n(5),o=n(6)("match");e.exports=function(e){var t;return i(e)&&(void 0!==(t=e[o])?!!t:"RegExp"==r(e))}},function(e,t,n){var i=n(6)("match");e.exports=function(e){var t=/./;try{"/./"[e](t)}catch(n){try{return t[i]=!1,!"/./"[e](t)}catch(e){}}return!0}}])},11132:function(e){"use strict";var t=Object.prototype.hasOwnProperty,n=Object.prototype.toString,i=Object.defineProperty,r=Object.getOwnPropertyDescriptor,o=function(e){return"function"===typeof Array.isArray?Array.isArray(e):"[object Array]"===n.call(e)},a=function(e){if(!e||"[object Object]"!==n.call(e))return!1;var i,r=t.call(e,"constructor"),o=e.constructor&&e.constructor.prototype&&t.call(e.constructor.prototype,"isPrototypeOf");if(e.constructor&&!r&&!o)return!1;for(i in e);return"undefined"===typeof i||t.call(e,i)},s=function(e,t){i&&"__proto__"===t.name?i(e,t.name,{enumerable:!0,configurable:!0,value:t.newValue,writable:!0}):e[t.name]=t.newValue},l=function(e,n){if("__proto__"===n){if(!t.call(e,n))return;if(r)return r(e,n).value}return e[n]};e.exports=function e(){var t,n,i,r,u,c,d=arguments[0],h=1,f=arguments.length,p=!1;for("boolean"===typeof d&&(p=d,d=arguments[1]||{},h=2),(null==d||"object"!==typeof d&&"function"!==typeof d)&&(d={});h=i?e:function(e,t,n){var i=-1,r=e.length;t<0&&(t=-t>r?0:r+t),(n=n>r?r:n)<0&&(n+=r),r=t>n?0:n-t>>>0,t>>>=0;for(var o=Array(r);++i1?n[o-1]:void 0,s=o>2?n[2]:void 0;for(a=e.length>3&&"function"==typeof a?(o--,a):void 0,s&&r(n[0],n[1],s)&&(a=o<3?void 0:a,o=1),t=Object(t);++i-1&&e%1==0&&e-1}},87109:function(e,t,n){var i=n(27112);e.exports=function(e,t){var n=this.__data__,r=i(n,e);return r<0?(++this.size,n.push([e,t])):n[r][1]=t,this}},34086:function(e,t,n){var i=n(29676),r=n(38384),o=n(95797);e.exports=function(){this.size=0,this.__data__={hash:new i,map:new(o||r),string:new i}}},9255:function(e,t,n){var i=n(32799);e.exports=function(e){var t=i(this,e).delete(e);return this.size-=t?1:0,t}},29186:function(e,t,n){var i=n(32799);e.exports=function(e){return i(this,e).get(e)}},13423:function(e,t,n){var i=n(32799);e.exports=function(e){return i(this,e).has(e)}},73739:function(e,t,n){var i=n(32799);e.exports=function(e,t){var n=i(this,e),r=n.size;return n.set(e,t),this.size+=n.size==r?0:1,this}},49620:function(e,t,n){var i=n(68136)(Object,"create");e.exports=i},4221:function(e){e.exports=function(e){var t=[];if(null!=e)for(var n in Object(e))t.push(n);return t}},49494:function(e,t,n){e=n.nmd(e);var i=n(31032),r=t&&!t.nodeType&&t,o=r&&e&&!e.nodeType&&e,a=o&&o.exports===r&&i.process,s=function(){try{var e=o&&o.require&&o.require("util").types;return e||a&&a.binding&&a.binding("util")}catch(t){}}();e.exports=s},43581:function(e){var t=Object.prototype.toString;e.exports=function(e){return t.call(e)}},12709:function(e){e.exports=function(e,t){return function(n){return e(t(n))}}},64262:function(e,t,n){var i=n(13665),r=Math.max;e.exports=function(e,t,n){return t=r(void 0===t?e.length-1:t,0),function(){for(var o=arguments,a=-1,s=r(o.length-t,0),l=Array(s);++a0){if(++n>=800)return arguments[0]}else n=0;return e.apply(void 0,arguments)}}},20511:function(e,t,n){var i=n(38384);e.exports=function(){this.__data__=new i,this.size=0}},50835:function(e){e.exports=function(e){var t=this.__data__,n=t.delete(e);return this.size=t.size,n}},90707:function(e){e.exports=function(e){return this.__data__.get(e)}},18832:function(e){e.exports=function(e){return this.__data__.has(e)}},35077:function(e,t,n){var i=n(38384),r=n(95797),o=n(78059);e.exports=function(e,t){var n=this.__data__;if(n instanceof i){var a=n.__data__;if(!r||a.length<199)return a.push([e,t]),this.size=++n.size,this;n=this.__data__=new o(a)}return n.set(e,t),this.size=n.size,this}},27907:function(e){var t=Function.prototype.toString;e.exports=function(e){if(null!=e){try{return t.call(e)}catch(n){}try{return e+""}catch(n){}}return""}},71547:function(e){e.exports=function(e){return function(){return e}}},29231:function(e){e.exports=function(e,t){return e===t||e!==e&&t!==t}},2100:function(e){e.exports=function(e){return e}},34963:function(e,t,n){var i=n(4906),r=n(43141),o=Object.prototype,a=o.hasOwnProperty,s=o.propertyIsEnumerable,l=i(function(){return arguments}())?i:function(e){return r(e)&&a.call(e,"callee")&&!s.call(e,"callee")};e.exports=l},93629:function(e){var t=Array.isArray;e.exports=t},21473:function(e,t,n){var i=n(74786),r=n(24635);e.exports=function(e){return null!=e&&r(e.length)&&!i(e)}},56279:function(e,t,n){var i=n(21473),r=n(43141);e.exports=function(e){return r(e)&&i(e)}},5174:function(e,t,n){e=n.nmd(e);var i=n(97009),r=n(49488),o=t&&!t.nodeType&&t,a=o&&e&&!e.nodeType&&e,s=a&&a.exports===o?i.Buffer:void 0,l=(s?s.isBuffer:void 0)||r;e.exports=l},74786:function(e,t,n){var i=n(39066),r=n(8092);e.exports=function(e){if(!r(e))return!1;var t=i(e);return"[object Function]"==t||"[object GeneratorFunction]"==t||"[object AsyncFunction]"==t||"[object Proxy]"==t}},24635:function(e){e.exports=function(e){return"number"==typeof e&&e>-1&&e%1==0&&e<=9007199254740991}},8092:function(e){e.exports=function(e){var t=typeof e;return null!=e&&("object"==t||"function"==t)}},43141:function(e){e.exports=function(e){return null!=e&&"object"==typeof e}},93977:function(e,t,n){var i=n(39066),r=n(31137),o=n(43141),a=Function.prototype,s=Object.prototype,l=a.toString,u=s.hasOwnProperty,c=l.call(Object);e.exports=function(e){if(!o(e)||"[object Object]"!=i(e))return!1;var t=r(e);if(null===t)return!0;var n=u.call(t,"constructor")&&t.constructor;return"function"==typeof n&&n instanceof n&&l.call(n)==c}},19102:function(e,t,n){var i=n(68150),r=n(16194),o=n(49494),a=o&&o.isTypedArray,s=a?r(a):i;e.exports=s},73961:function(e,t,n){var i=n(47538),r=n(8664),o=n(21473);e.exports=function(e){return o(e)?i(e,!0):r(e)}},763:function(e,t,n){var i;e=n.nmd(e),function(){var r,o="Expected a function",a="__lodash_hash_undefined__",s="__lodash_placeholder__",l=16,u=32,c=64,d=128,h=256,f=1/0,p=9007199254740991,g=NaN,v=4294967295,m=[["ary",d],["bind",1],["bindKey",2],["curry",8],["curryRight",l],["flip",512],["partial",u],["partialRight",c],["rearg",h]],y="[object Arguments]",_="[object Array]",b="[object Boolean]",k="[object Date]",C="[object Error]",w="[object Function]",S="[object GeneratorFunction]",x="[object Map]",L="[object Number]",N="[object Object]",D="[object Promise]",E="[object RegExp]",I="[object Set]",T="[object String]",O="[object Symbol]",A="[object WeakMap]",P="[object ArrayBuffer]",M="[object DataView]",R="[object Float32Array]",Z="[object Float64Array]",F="[object Int8Array]",B="[object Int16Array]",W="[object Int32Array]",V="[object Uint8Array]",H="[object Uint8ClampedArray]",j="[object Uint16Array]",z="[object Uint32Array]",U=/\b__p \+= '';/g,K=/\b(__p \+=) '' \+/g,q=/(__e\(.*?\)|\b__t\)) \+\n'';/g,G=/&(?:amp|lt|gt|quot|#39);/g,Q=/[&<>"']/g,$=RegExp(G.source),Y=RegExp(Q.source),X=/<%-([\s\S]+?)%>/g,J=/<%([\s\S]+?)%>/g,ee=/<%=([\s\S]+?)%>/g,te=/\.|\[(?:[^[\]]*|(["'])(?:(?!\1)[^\\]|\\.)*?\1)\]/,ne=/^\w*$/,ie=/[^.[\]]+|\[(?:(-?\d+(?:\.\d+)?)|(["'])((?:(?!\2)[^\\]|\\.)*?)\2)\]|(?=(?:\.|\[\])(?:\.|\[\]|$))/g,re=/[\\^$.*+?()[\]{}|]/g,oe=RegExp(re.source),ae=/^\s+/,se=/\s/,le=/\{(?:\n\/\* \[wrapped with .+\] \*\/)?\n?/,ue=/\{\n\/\* \[wrapped with (.+)\] \*/,ce=/,? & /,de=/[^\x00-\x2f\x3a-\x40\x5b-\x60\x7b-\x7f]+/g,he=/[()=,{}\[\]\/\s]/,fe=/\\(\\)?/g,pe=/\$\{([^\\}]*(?:\\.[^\\}]*)*)\}/g,ge=/\w*$/,ve=/^[-+]0x[0-9a-f]+$/i,me=/^0b[01]+$/i,ye=/^\[object .+?Constructor\]$/,_e=/^0o[0-7]+$/i,be=/^(?:0|[1-9]\d*)$/,ke=/[\xc0-\xd6\xd8-\xf6\xf8-\xff\u0100-\u017f]/g,Ce=/($^)/,we=/['\n\r\u2028\u2029\\]/g,Se="\\ud800-\\udfff",xe="\\u0300-\\u036f\\ufe20-\\ufe2f\\u20d0-\\u20ff",Le="\\u2700-\\u27bf",Ne="a-z\\xdf-\\xf6\\xf8-\\xff",De="A-Z\\xc0-\\xd6\\xd8-\\xde",Ee="\\ufe0e\\ufe0f",Ie="\\xac\\xb1\\xd7\\xf7\\x00-\\x2f\\x3a-\\x40\\x5b-\\x60\\x7b-\\xbf\\u2000-\\u206f \\t\\x0b\\f\\xa0\\ufeff\\n\\r\\u2028\\u2029\\u1680\\u180e\\u2000\\u2001\\u2002\\u2003\\u2004\\u2005\\u2006\\u2007\\u2008\\u2009\\u200a\\u202f\\u205f\\u3000",Te="['\u2019]",Oe="["+Se+"]",Ae="["+Ie+"]",Pe="["+xe+"]",Me="\\d+",Re="["+Le+"]",Ze="["+Ne+"]",Fe="[^"+Se+Ie+Me+Le+Ne+De+"]",Be="\\ud83c[\\udffb-\\udfff]",We="[^"+Se+"]",Ve="(?:\\ud83c[\\udde6-\\uddff]){2}",He="[\\ud800-\\udbff][\\udc00-\\udfff]",je="["+De+"]",ze="\\u200d",Ue="(?:"+Ze+"|"+Fe+")",Ke="(?:"+je+"|"+Fe+")",qe="(?:['\u2019](?:d|ll|m|re|s|t|ve))?",Ge="(?:['\u2019](?:D|LL|M|RE|S|T|VE))?",Qe="(?:"+Pe+"|"+Be+")"+"?",$e="["+Ee+"]?",Ye=$e+Qe+("(?:"+ze+"(?:"+[We,Ve,He].join("|")+")"+$e+Qe+")*"),Xe="(?:"+[Re,Ve,He].join("|")+")"+Ye,Je="(?:"+[We+Pe+"?",Pe,Ve,He,Oe].join("|")+")",et=RegExp(Te,"g"),tt=RegExp(Pe,"g"),nt=RegExp(Be+"(?="+Be+")|"+Je+Ye,"g"),it=RegExp([je+"?"+Ze+"+"+qe+"(?="+[Ae,je,"$"].join("|")+")",Ke+"+"+Ge+"(?="+[Ae,je+Ue,"$"].join("|")+")",je+"?"+Ue+"+"+qe,je+"+"+Ge,"\\d*(?:1ST|2ND|3RD|(?![123])\\dTH)(?=\\b|[a-z_])","\\d*(?:1st|2nd|3rd|(?![123])\\dth)(?=\\b|[A-Z_])",Me,Xe].join("|"),"g"),rt=RegExp("["+ze+Se+xe+Ee+"]"),ot=/[a-z][A-Z]|[A-Z]{2}[a-z]|[0-9][a-zA-Z]|[a-zA-Z][0-9]|[^a-zA-Z0-9 ]/,at=["Array","Buffer","DataView","Date","Error","Float32Array","Float64Array","Function","Int8Array","Int16Array","Int32Array","Map","Math","Object","Promise","RegExp","Set","String","Symbol","TypeError","Uint8Array","Uint8ClampedArray","Uint16Array","Uint32Array","WeakMap","_","clearTimeout","isFinite","parseInt","setTimeout"],st=-1,lt={};lt[R]=lt[Z]=lt[F]=lt[B]=lt[W]=lt[V]=lt[H]=lt[j]=lt[z]=!0,lt[y]=lt[_]=lt[P]=lt[b]=lt[M]=lt[k]=lt[C]=lt[w]=lt[x]=lt[L]=lt[N]=lt[E]=lt[I]=lt[T]=lt[A]=!1;var ut={};ut[y]=ut[_]=ut[P]=ut[M]=ut[b]=ut[k]=ut[R]=ut[Z]=ut[F]=ut[B]=ut[W]=ut[x]=ut[L]=ut[N]=ut[E]=ut[I]=ut[T]=ut[O]=ut[V]=ut[H]=ut[j]=ut[z]=!0,ut[C]=ut[w]=ut[A]=!1;var ct={"\\":"\\","'":"'","\n":"n","\r":"r","\u2028":"u2028","\u2029":"u2029"},dt=parseFloat,ht=parseInt,ft="object"==typeof n.g&&n.g&&n.g.Object===Object&&n.g,pt="object"==typeof self&&self&&self.Object===Object&&self,gt=ft||pt||Function("return this")(),vt=t&&!t.nodeType&&t,mt=vt&&e&&!e.nodeType&&e,yt=mt&&mt.exports===vt,_t=yt&&ft.process,bt=function(){try{var e=mt&&mt.require&&mt.require("util").types;return e||_t&&_t.binding&&_t.binding("util")}catch(t){}}(),kt=bt&&bt.isArrayBuffer,Ct=bt&&bt.isDate,wt=bt&&bt.isMap,St=bt&&bt.isRegExp,xt=bt&&bt.isSet,Lt=bt&&bt.isTypedArray;function Nt(e,t,n){switch(n.length){case 0:return e.call(t);case 1:return e.call(t,n[0]);case 2:return e.call(t,n[0],n[1]);case 3:return e.call(t,n[0],n[1],n[2])}return e.apply(t,n)}function Dt(e,t,n,i){for(var r=-1,o=null==e?0:e.length;++r-1}function Pt(e,t,n){for(var i=-1,r=null==e?0:e.length;++i-1;);return n}function rn(e,t){for(var n=e.length;n--&&jt(t,e[n],0)>-1;);return n}function on(e,t){for(var n=e.length,i=0;n--;)e[n]===t&&++i;return i}var an=Gt({"\xc0":"A","\xc1":"A","\xc2":"A","\xc3":"A","\xc4":"A","\xc5":"A","\xe0":"a","\xe1":"a","\xe2":"a","\xe3":"a","\xe4":"a","\xe5":"a","\xc7":"C","\xe7":"c","\xd0":"D","\xf0":"d","\xc8":"E","\xc9":"E","\xca":"E","\xcb":"E","\xe8":"e","\xe9":"e","\xea":"e","\xeb":"e","\xcc":"I","\xcd":"I","\xce":"I","\xcf":"I","\xec":"i","\xed":"i","\xee":"i","\xef":"i","\xd1":"N","\xf1":"n","\xd2":"O","\xd3":"O","\xd4":"O","\xd5":"O","\xd6":"O","\xd8":"O","\xf2":"o","\xf3":"o","\xf4":"o","\xf5":"o","\xf6":"o","\xf8":"o","\xd9":"U","\xda":"U","\xdb":"U","\xdc":"U","\xf9":"u","\xfa":"u","\xfb":"u","\xfc":"u","\xdd":"Y","\xfd":"y","\xff":"y","\xc6":"Ae","\xe6":"ae","\xde":"Th","\xfe":"th","\xdf":"ss","\u0100":"A","\u0102":"A","\u0104":"A","\u0101":"a","\u0103":"a","\u0105":"a","\u0106":"C","\u0108":"C","\u010a":"C","\u010c":"C","\u0107":"c","\u0109":"c","\u010b":"c","\u010d":"c","\u010e":"D","\u0110":"D","\u010f":"d","\u0111":"d","\u0112":"E","\u0114":"E","\u0116":"E","\u0118":"E","\u011a":"E","\u0113":"e","\u0115":"e","\u0117":"e","\u0119":"e","\u011b":"e","\u011c":"G","\u011e":"G","\u0120":"G","\u0122":"G","\u011d":"g","\u011f":"g","\u0121":"g","\u0123":"g","\u0124":"H","\u0126":"H","\u0125":"h","\u0127":"h","\u0128":"I","\u012a":"I","\u012c":"I","\u012e":"I","\u0130":"I","\u0129":"i","\u012b":"i","\u012d":"i","\u012f":"i","\u0131":"i","\u0134":"J","\u0135":"j","\u0136":"K","\u0137":"k","\u0138":"k","\u0139":"L","\u013b":"L","\u013d":"L","\u013f":"L","\u0141":"L","\u013a":"l","\u013c":"l","\u013e":"l","\u0140":"l","\u0142":"l","\u0143":"N","\u0145":"N","\u0147":"N","\u014a":"N","\u0144":"n","\u0146":"n","\u0148":"n","\u014b":"n","\u014c":"O","\u014e":"O","\u0150":"O","\u014d":"o","\u014f":"o","\u0151":"o","\u0154":"R","\u0156":"R","\u0158":"R","\u0155":"r","\u0157":"r","\u0159":"r","\u015a":"S","\u015c":"S","\u015e":"S","\u0160":"S","\u015b":"s","\u015d":"s","\u015f":"s","\u0161":"s","\u0162":"T","\u0164":"T","\u0166":"T","\u0163":"t","\u0165":"t","\u0167":"t","\u0168":"U","\u016a":"U","\u016c":"U","\u016e":"U","\u0170":"U","\u0172":"U","\u0169":"u","\u016b":"u","\u016d":"u","\u016f":"u","\u0171":"u","\u0173":"u","\u0174":"W","\u0175":"w","\u0176":"Y","\u0177":"y","\u0178":"Y","\u0179":"Z","\u017b":"Z","\u017d":"Z","\u017a":"z","\u017c":"z","\u017e":"z","\u0132":"IJ","\u0133":"ij","\u0152":"Oe","\u0153":"oe","\u0149":"'n","\u017f":"s"}),sn=Gt({"&":"&","<":"<",">":">",'"':""","'":"'"});function ln(e){return"\\"+ct[e]}function un(e){return rt.test(e)}function cn(e){var t=-1,n=Array(e.size);return e.forEach((function(e,i){n[++t]=[i,e]})),n}function dn(e,t){return function(n){return e(t(n))}}function hn(e,t){for(var n=-1,i=e.length,r=0,o=[];++n",""":'"',"'":"'"});var _n=function e(t){var n=(t=null==t?gt:_n.defaults(gt.Object(),t,_n.pick(gt,at))).Array,i=t.Date,se=t.Error,Se=t.Function,xe=t.Math,Le=t.Object,Ne=t.RegExp,De=t.String,Ee=t.TypeError,Ie=n.prototype,Te=Se.prototype,Oe=Le.prototype,Ae=t["__core-js_shared__"],Pe=Te.toString,Me=Oe.hasOwnProperty,Re=0,Ze=function(){var e=/[^.]+$/.exec(Ae&&Ae.keys&&Ae.keys.IE_PROTO||"");return e?"Symbol(src)_1."+e:""}(),Fe=Oe.toString,Be=Pe.call(Le),We=gt._,Ve=Ne("^"+Pe.call(Me).replace(re,"\\$&").replace(/hasOwnProperty|(function).*?(?=\\\()| for .+?(?=\\\])/g,"$1.*?")+"$"),He=yt?t.Buffer:r,je=t.Symbol,ze=t.Uint8Array,Ue=He?He.allocUnsafe:r,Ke=dn(Le.getPrototypeOf,Le),qe=Le.create,Ge=Oe.propertyIsEnumerable,Qe=Ie.splice,$e=je?je.isConcatSpreadable:r,Ye=je?je.iterator:r,Xe=je?je.toStringTag:r,Je=function(){try{var e=fo(Le,"defineProperty");return e({},"",{}),e}catch(t){}}(),nt=t.clearTimeout!==gt.clearTimeout&&t.clearTimeout,rt=i&&i.now!==gt.Date.now&&i.now,ct=t.setTimeout!==gt.setTimeout&&t.setTimeout,ft=xe.ceil,pt=xe.floor,vt=Le.getOwnPropertySymbols,mt=He?He.isBuffer:r,_t=t.isFinite,bt=Ie.join,Wt=dn(Le.keys,Le),Gt=xe.max,bn=xe.min,kn=i.now,Cn=t.parseInt,wn=xe.random,Sn=Ie.reverse,xn=fo(t,"DataView"),Ln=fo(t,"Map"),Nn=fo(t,"Promise"),Dn=fo(t,"Set"),En=fo(t,"WeakMap"),In=fo(Le,"create"),Tn=En&&new En,On={},An=Wo(xn),Pn=Wo(Ln),Mn=Wo(Nn),Rn=Wo(Dn),Zn=Wo(En),Fn=je?je.prototype:r,Bn=Fn?Fn.valueOf:r,Wn=Fn?Fn.toString:r;function Vn(e){if(is(e)&&!Ka(e)&&!(e instanceof Un)){if(e instanceof zn)return e;if(Me.call(e,"__wrapped__"))return Vo(e)}return new zn(e)}var Hn=function(){function e(){}return function(t){if(!ns(t))return{};if(qe)return qe(t);e.prototype=t;var n=new e;return e.prototype=r,n}}();function jn(){}function zn(e,t){this.__wrapped__=e,this.__actions__=[],this.__chain__=!!t,this.__index__=0,this.__values__=r}function Un(e){this.__wrapped__=e,this.__actions__=[],this.__dir__=1,this.__filtered__=!1,this.__iteratees__=[],this.__takeCount__=v,this.__views__=[]}function Kn(e){var t=-1,n=null==e?0:e.length;for(this.clear();++t=t?e:t)),e}function ui(e,t,n,i,o,a){var s,l=1&t,u=2&t,c=4&t;if(n&&(s=o?n(e,i,o,a):n(e)),s!==r)return s;if(!ns(e))return e;var d=Ka(e);if(d){if(s=function(e){var t=e.length,n=new e.constructor(t);t&&"string"==typeof e[0]&&Me.call(e,"index")&&(n.index=e.index,n.input=e.input);return n}(e),!l)return Ir(e,s)}else{var h=vo(e),f=h==w||h==S;if($a(e))return Sr(e,l);if(h==N||h==y||f&&!o){if(s=u||f?{}:yo(e),!l)return u?function(e,t){return Tr(e,go(e),t)}(e,function(e,t){return e&&Tr(t,Ps(t),e)}(s,e)):function(e,t){return Tr(e,po(e),t)}(e,oi(s,e))}else{if(!ut[h])return o?e:{};s=function(e,t,n){var i=e.constructor;switch(t){case P:return xr(e);case b:case k:return new i(+e);case M:return function(e,t){var n=t?xr(e.buffer):e.buffer;return new e.constructor(n,e.byteOffset,e.byteLength)}(e,n);case R:case Z:case F:case B:case W:case V:case H:case j:case z:return Lr(e,n);case x:return new i;case L:case T:return new i(e);case E:return function(e){var t=new e.constructor(e.source,ge.exec(e));return t.lastIndex=e.lastIndex,t}(e);case I:return new i;case O:return r=e,Bn?Le(Bn.call(r)):{}}var r}(e,h,l)}}a||(a=new $n);var p=a.get(e);if(p)return p;a.set(e,s),ls(e)?e.forEach((function(i){s.add(ui(i,t,n,i,e,a))})):rs(e)&&e.forEach((function(i,r){s.set(r,ui(i,t,n,r,e,a))}));var g=d?r:(c?u?oo:ro:u?Ps:As)(e);return Et(g||e,(function(i,r){g&&(i=e[r=i]),ni(s,r,ui(i,t,n,r,e,a))})),s}function ci(e,t,n){var i=n.length;if(null==e)return!i;for(e=Le(e);i--;){var o=n[i],a=t[o],s=e[o];if(s===r&&!(o in e)||!a(s))return!1}return!0}function di(e,t,n){if("function"!=typeof e)throw new Ee(o);return Ao((function(){e.apply(r,n)}),t)}function hi(e,t,n,i){var r=-1,o=At,a=!0,s=e.length,l=[],u=t.length;if(!s)return l;n&&(t=Mt(t,Jt(n))),i?(o=Pt,a=!1):t.length>=200&&(o=tn,a=!1,t=new Qn(t));e:for(;++r-1},qn.prototype.set=function(e,t){var n=this.__data__,i=ii(n,e);return i<0?(++this.size,n.push([e,t])):n[i][1]=t,this},Gn.prototype.clear=function(){this.size=0,this.__data__={hash:new Kn,map:new(Ln||qn),string:new Kn}},Gn.prototype.delete=function(e){var t=co(this,e).delete(e);return this.size-=t?1:0,t},Gn.prototype.get=function(e){return co(this,e).get(e)},Gn.prototype.has=function(e){return co(this,e).has(e)},Gn.prototype.set=function(e,t){var n=co(this,e),i=n.size;return n.set(e,t),this.size+=n.size==i?0:1,this},Qn.prototype.add=Qn.prototype.push=function(e){return this.__data__.set(e,a),this},Qn.prototype.has=function(e){return this.__data__.has(e)},$n.prototype.clear=function(){this.__data__=new qn,this.size=0},$n.prototype.delete=function(e){var t=this.__data__,n=t.delete(e);return this.size=t.size,n},$n.prototype.get=function(e){return this.__data__.get(e)},$n.prototype.has=function(e){return this.__data__.has(e)},$n.prototype.set=function(e,t){var n=this.__data__;if(n instanceof qn){var i=n.__data__;if(!Ln||i.length<199)return i.push([e,t]),this.size=++n.size,this;n=this.__data__=new Gn(i)}return n.set(e,t),this.size=n.size,this};var fi=Pr(ki),pi=Pr(Ci,!0);function gi(e,t){var n=!0;return fi(e,(function(e,i,r){return n=!!t(e,i,r)})),n}function vi(e,t,n){for(var i=-1,o=e.length;++i0&&n(s)?t>1?yi(s,t-1,n,i,r):Rt(r,s):i||(r[r.length]=s)}return r}var _i=Mr(),bi=Mr(!0);function ki(e,t){return e&&_i(e,t,As)}function Ci(e,t){return e&&bi(e,t,As)}function wi(e,t){return Ot(t,(function(t){return Ja(e[t])}))}function Si(e,t){for(var n=0,i=(t=br(t,e)).length;null!=e&&nt}function Di(e,t){return null!=e&&Me.call(e,t)}function Ei(e,t){return null!=e&&t in Le(e)}function Ii(e,t,i){for(var o=i?Pt:At,a=e[0].length,s=e.length,l=s,u=n(s),c=1/0,d=[];l--;){var h=e[l];l&&t&&(h=Mt(h,Jt(t))),c=bn(h.length,c),u[l]=!i&&(t||a>=120&&h.length>=120)?new Qn(l&&h):r}h=e[0];var f=-1,p=u[0];e:for(;++f=s?l:l*("desc"==n[i]?-1:1)}return e.index-t.index}(e,t,n)}))}function Ki(e,t,n){for(var i=-1,r=t.length,o={};++i-1;)s!==e&&Qe.call(s,l,1),Qe.call(e,l,1);return e}function Gi(e,t){for(var n=e?t.length:0,i=n-1;n--;){var r=t[n];if(n==i||r!==o){var o=r;bo(r)?Qe.call(e,r,1):hr(e,r)}}return e}function Qi(e,t){return e+pt(wn()*(t-e+1))}function $i(e,t){var n="";if(!e||t<1||t>p)return n;do{t%2&&(n+=e),(t=pt(t/2))&&(e+=e)}while(t);return n}function Yi(e,t){return Po(Do(e,t,ol),e+"")}function Xi(e){return Xn(Hs(e))}function Ji(e,t){var n=Hs(e);return Zo(n,li(t,0,n.length))}function er(e,t,n,i){if(!ns(e))return e;for(var o=-1,a=(t=br(t,e)).length,s=a-1,l=e;null!=l&&++oo?0:o+t),(i=i>o?o:i)<0&&(i+=o),o=t>i?0:i-t>>>0,t>>>=0;for(var a=n(o);++r>>1,a=e[o];null!==a&&!cs(a)&&(n?a<=t:a=200){var u=t?null:$r(e);if(u)return fn(u);a=!1,r=tn,l=new Qn}else l=t?[]:s;e:for(;++i=i?e:rr(e,t,n)}var wr=nt||function(e){return gt.clearTimeout(e)};function Sr(e,t){if(t)return e.slice();var n=e.length,i=Ue?Ue(n):new e.constructor(n);return e.copy(i),i}function xr(e){var t=new e.constructor(e.byteLength);return new ze(t).set(new ze(e)),t}function Lr(e,t){var n=t?xr(e.buffer):e.buffer;return new e.constructor(n,e.byteOffset,e.length)}function Nr(e,t){if(e!==t){var n=e!==r,i=null===e,o=e===e,a=cs(e),s=t!==r,l=null===t,u=t===t,c=cs(t);if(!l&&!c&&!a&&e>t||a&&s&&u&&!l&&!c||i&&s&&u||!n&&u||!o)return 1;if(!i&&!a&&!c&&e1?n[o-1]:r,s=o>2?n[2]:r;for(a=e.length>3&&"function"==typeof a?(o--,a):r,s&&ko(n[0],n[1],s)&&(a=o<3?r:a,o=1),t=Le(t);++i-1?o[a?t[s]:s]:r}}function Wr(e){return io((function(t){var n=t.length,i=n,a=zn.prototype.thru;for(e&&t.reverse();i--;){var s=t[i];if("function"!=typeof s)throw new Ee(o);if(a&&!l&&"wrapper"==so(s))var l=new zn([],!0)}for(i=l?i:n;++i1&&_.reverse(),f&&cl))return!1;var c=a.get(e),d=a.get(t);if(c&&d)return c==t&&d==e;var h=-1,f=!0,p=2&n?new Qn:r;for(a.set(e,t),a.set(t,e);++h-1&&e%1==0&&e1?"& ":"")+t[i],t=t.join(n>2?", ":" "),e.replace(le,"{\n/* [wrapped with "+t+"] */\n")}(i,function(e,t){return Et(m,(function(n){var i="_."+n[0];t&n[1]&&!At(e,i)&&e.push(i)})),e.sort()}(function(e){var t=e.match(ue);return t?t[1].split(ce):[]}(i),n)))}function Ro(e){var t=0,n=0;return function(){var i=kn(),o=16-(i-n);if(n=i,o>0){if(++t>=800)return arguments[0]}else t=0;return e.apply(r,arguments)}}function Zo(e,t){var n=-1,i=e.length,o=i-1;for(t=t===r?i:t;++n1?e[t-1]:r;return n="function"==typeof n?(e.pop(),n):r,sa(e,n)}));function pa(e){var t=Vn(e);return t.__chain__=!0,t}function ga(e,t){return t(e)}var va=io((function(e){var t=e.length,n=t?e[0]:0,i=this.__wrapped__,o=function(t){return si(t,e)};return!(t>1||this.__actions__.length)&&i instanceof Un&&bo(n)?((i=i.slice(n,+n+(t?1:0))).__actions__.push({func:ga,args:[o],thisArg:r}),new zn(i,this.__chain__).thru((function(e){return t&&!e.length&&e.push(r),e}))):this.thru(o)}));var ma=Or((function(e,t,n){Me.call(e,n)?++e[n]:ai(e,n,1)}));var ya=Br(Uo),_a=Br(Ko);function ba(e,t){return(Ka(e)?Et:fi)(e,uo(t,3))}function ka(e,t){return(Ka(e)?It:pi)(e,uo(t,3))}var Ca=Or((function(e,t,n){Me.call(e,n)?e[n].push(t):ai(e,n,[t])}));var wa=Yi((function(e,t,i){var r=-1,o="function"==typeof t,a=Ga(e)?n(e.length):[];return fi(e,(function(e){a[++r]=o?Nt(t,e,i):Ti(e,t,i)})),a})),Sa=Or((function(e,t,n){ai(e,n,t)}));function xa(e,t){return(Ka(e)?Mt:Wi)(e,uo(t,3))}var La=Or((function(e,t,n){e[n?0:1].push(t)}),(function(){return[[],[]]}));var Na=Yi((function(e,t){if(null==e)return[];var n=t.length;return n>1&&ko(e,t[0],t[1])?t=[]:n>2&&ko(t[0],t[1],t[2])&&(t=[t[0]]),Ui(e,yi(t,1),[])})),Da=rt||function(){return gt.Date.now()};function Ea(e,t,n){return t=n?r:t,t=e&&null==t?e.length:t,Xr(e,d,r,r,r,r,t)}function Ia(e,t){var n;if("function"!=typeof t)throw new Ee(o);return e=vs(e),function(){return--e>0&&(n=t.apply(this,arguments)),e<=1&&(t=r),n}}var Ta=Yi((function(e,t,n){var i=1;if(n.length){var r=hn(n,lo(Ta));i|=u}return Xr(e,i,t,n,r)})),Oa=Yi((function(e,t,n){var i=3;if(n.length){var r=hn(n,lo(Oa));i|=u}return Xr(t,i,e,n,r)}));function Aa(e,t,n){var i,a,s,l,u,c,d=0,h=!1,f=!1,p=!0;if("function"!=typeof e)throw new Ee(o);function g(t){var n=i,o=a;return i=a=r,d=t,l=e.apply(o,n)}function v(e){return d=e,u=Ao(y,t),h?g(e):l}function m(e){var n=e-c;return c===r||n>=t||n<0||f&&e-d>=s}function y(){var e=Da();if(m(e))return _(e);u=Ao(y,function(e){var n=t-(e-c);return f?bn(n,s-(e-d)):n}(e))}function _(e){return u=r,p&&i?g(e):(i=a=r,l)}function b(){var e=Da(),n=m(e);if(i=arguments,a=this,c=e,n){if(u===r)return v(c);if(f)return wr(u),u=Ao(y,t),g(c)}return u===r&&(u=Ao(y,t)),l}return t=ys(t)||0,ns(n)&&(h=!!n.leading,s=(f="maxWait"in n)?Gt(ys(n.maxWait)||0,t):s,p="trailing"in n?!!n.trailing:p),b.cancel=function(){u!==r&&wr(u),d=0,i=c=a=u=r},b.flush=function(){return u===r?l:_(Da())},b}var Pa=Yi((function(e,t){return di(e,1,t)})),Ma=Yi((function(e,t,n){return di(e,ys(t)||0,n)}));function Ra(e,t){if("function"!=typeof e||null!=t&&"function"!=typeof t)throw new Ee(o);var n=function n(){var i=arguments,r=t?t.apply(this,i):i[0],o=n.cache;if(o.has(r))return o.get(r);var a=e.apply(this,i);return n.cache=o.set(r,a)||o,a};return n.cache=new(Ra.Cache||Gn),n}function Za(e){if("function"!=typeof e)throw new Ee(o);return function(){var t=arguments;switch(t.length){case 0:return!e.call(this);case 1:return!e.call(this,t[0]);case 2:return!e.call(this,t[0],t[1]);case 3:return!e.call(this,t[0],t[1],t[2])}return!e.apply(this,t)}}Ra.Cache=Gn;var Fa=kr((function(e,t){var n=(t=1==t.length&&Ka(t[0])?Mt(t[0],Jt(uo())):Mt(yi(t,1),Jt(uo()))).length;return Yi((function(i){for(var r=-1,o=bn(i.length,n);++r=t})),Ua=Oi(function(){return arguments}())?Oi:function(e){return is(e)&&Me.call(e,"callee")&&!Ge.call(e,"callee")},Ka=n.isArray,qa=kt?Jt(kt):function(e){return is(e)&&Li(e)==P};function Ga(e){return null!=e&&ts(e.length)&&!Ja(e)}function Qa(e){return is(e)&&Ga(e)}var $a=mt||yl,Ya=Ct?Jt(Ct):function(e){return is(e)&&Li(e)==k};function Xa(e){if(!is(e))return!1;var t=Li(e);return t==C||"[object DOMException]"==t||"string"==typeof e.message&&"string"==typeof e.name&&!as(e)}function Ja(e){if(!ns(e))return!1;var t=Li(e);return t==w||t==S||"[object AsyncFunction]"==t||"[object Proxy]"==t}function es(e){return"number"==typeof e&&e==vs(e)}function ts(e){return"number"==typeof e&&e>-1&&e%1==0&&e<=p}function ns(e){var t=typeof e;return null!=e&&("object"==t||"function"==t)}function is(e){return null!=e&&"object"==typeof e}var rs=wt?Jt(wt):function(e){return is(e)&&vo(e)==x};function os(e){return"number"==typeof e||is(e)&&Li(e)==L}function as(e){if(!is(e)||Li(e)!=N)return!1;var t=Ke(e);if(null===t)return!0;var n=Me.call(t,"constructor")&&t.constructor;return"function"==typeof n&&n instanceof n&&Pe.call(n)==Be}var ss=St?Jt(St):function(e){return is(e)&&Li(e)==E};var ls=xt?Jt(xt):function(e){return is(e)&&vo(e)==I};function us(e){return"string"==typeof e||!Ka(e)&&is(e)&&Li(e)==T}function cs(e){return"symbol"==typeof e||is(e)&&Li(e)==O}var ds=Lt?Jt(Lt):function(e){return is(e)&&ts(e.length)&&!!lt[Li(e)]};var hs=qr(Bi),fs=qr((function(e,t){return e<=t}));function ps(e){if(!e)return[];if(Ga(e))return us(e)?vn(e):Ir(e);if(Ye&&e[Ye])return function(e){for(var t,n=[];!(t=e.next()).done;)n.push(t.value);return n}(e[Ye]());var t=vo(e);return(t==x?cn:t==I?fn:Hs)(e)}function gs(e){return e?(e=ys(e))===f||e===-1/0?17976931348623157e292*(e<0?-1:1):e===e?e:0:0===e?e:0}function vs(e){var t=gs(e),n=t%1;return t===t?n?t-n:t:0}function ms(e){return e?li(vs(e),0,v):0}function ys(e){if("number"==typeof e)return e;if(cs(e))return g;if(ns(e)){var t="function"==typeof e.valueOf?e.valueOf():e;e=ns(t)?t+"":t}if("string"!=typeof e)return 0===e?e:+e;e=Xt(e);var n=me.test(e);return n||_e.test(e)?ht(e.slice(2),n?2:8):ve.test(e)?g:+e}function _s(e){return Tr(e,Ps(e))}function bs(e){return null==e?"":cr(e)}var ks=Ar((function(e,t){if(xo(t)||Ga(t))Tr(t,As(t),e);else for(var n in t)Me.call(t,n)&&ni(e,n,t[n])})),Cs=Ar((function(e,t){Tr(t,Ps(t),e)})),ws=Ar((function(e,t,n,i){Tr(t,Ps(t),e,i)})),Ss=Ar((function(e,t,n,i){Tr(t,As(t),e,i)})),xs=io(si);var Ls=Yi((function(e,t){e=Le(e);var n=-1,i=t.length,o=i>2?t[2]:r;for(o&&ko(t[0],t[1],o)&&(i=1);++n1),t})),Tr(e,oo(e),n),i&&(n=ui(n,7,to));for(var r=t.length;r--;)hr(n,t[r]);return n}));var Fs=io((function(e,t){return null==e?{}:function(e,t){return Ki(e,t,(function(t,n){return Es(e,n)}))}(e,t)}));function Bs(e,t){if(null==e)return{};var n=Mt(oo(e),(function(e){return[e]}));return t=uo(t),Ki(e,n,(function(e,n){return t(e,n[0])}))}var Ws=Yr(As),Vs=Yr(Ps);function Hs(e){return null==e?[]:en(e,As(e))}var js=Zr((function(e,t,n){return t=t.toLowerCase(),e+(n?zs(t):t)}));function zs(e){return Xs(bs(e).toLowerCase())}function Us(e){return(e=bs(e))&&e.replace(ke,an).replace(tt,"")}var Ks=Zr((function(e,t,n){return e+(n?"-":"")+t.toLowerCase()})),qs=Zr((function(e,t,n){return e+(n?" ":"")+t.toLowerCase()})),Gs=Rr("toLowerCase");var Qs=Zr((function(e,t,n){return e+(n?"_":"")+t.toLowerCase()}));var $s=Zr((function(e,t,n){return e+(n?" ":"")+Xs(t)}));var Ys=Zr((function(e,t,n){return e+(n?" ":"")+t.toUpperCase()})),Xs=Rr("toUpperCase");function Js(e,t,n){return e=bs(e),(t=n?r:t)===r?function(e){return ot.test(e)}(e)?function(e){return e.match(it)||[]}(e):function(e){return e.match(de)||[]}(e):e.match(t)||[]}var el=Yi((function(e,t){try{return Nt(e,r,t)}catch(n){return Xa(n)?n:new se(n)}})),tl=io((function(e,t){return Et(t,(function(t){t=Bo(t),ai(e,t,Ta(e[t],e))})),e}));function nl(e){return function(){return e}}var il=Wr(),rl=Wr(!0);function ol(e){return e}function al(e){return Ri("function"==typeof e?e:ui(e,1))}var sl=Yi((function(e,t){return function(n){return Ti(n,e,t)}})),ll=Yi((function(e,t){return function(n){return Ti(e,n,t)}}));function ul(e,t,n){var i=As(t),r=wi(t,i);null!=n||ns(t)&&(r.length||!i.length)||(n=t,t=e,e=this,r=wi(t,As(t)));var o=!(ns(n)&&"chain"in n)||!!n.chain,a=Ja(e);return Et(r,(function(n){var i=t[n];e[n]=i,a&&(e.prototype[n]=function(){var t=this.__chain__;if(o||t){var n=e(this.__wrapped__),r=n.__actions__=Ir(this.__actions__);return r.push({func:i,args:arguments,thisArg:e}),n.__chain__=t,n}return i.apply(e,Rt([this.value()],arguments))})})),e}function cl(){}var dl=zr(Mt),hl=zr(Tt),fl=zr(Bt);function pl(e){return Co(e)?qt(Bo(e)):function(e){return function(t){return Si(t,e)}}(e)}var gl=Kr(),vl=Kr(!0);function ml(){return[]}function yl(){return!1}var _l=jr((function(e,t){return e+t}),0),bl=Qr("ceil"),kl=jr((function(e,t){return e/t}),1),Cl=Qr("floor");var wl=jr((function(e,t){return e*t}),1),Sl=Qr("round"),xl=jr((function(e,t){return e-t}),0);return Vn.after=function(e,t){if("function"!=typeof t)throw new Ee(o);return e=vs(e),function(){if(--e<1)return t.apply(this,arguments)}},Vn.ary=Ea,Vn.assign=ks,Vn.assignIn=Cs,Vn.assignInWith=ws,Vn.assignWith=Ss,Vn.at=xs,Vn.before=Ia,Vn.bind=Ta,Vn.bindAll=tl,Vn.bindKey=Oa,Vn.castArray=function(){if(!arguments.length)return[];var e=arguments[0];return Ka(e)?e:[e]},Vn.chain=pa,Vn.chunk=function(e,t,i){t=(i?ko(e,t,i):t===r)?1:Gt(vs(t),0);var o=null==e?0:e.length;if(!o||t<1)return[];for(var a=0,s=0,l=n(ft(o/t));ao?0:o+n),(i=i===r||i>o?o:vs(i))<0&&(i+=o),i=n>i?0:ms(i);n>>0)?(e=bs(e))&&("string"==typeof t||null!=t&&!ss(t))&&!(t=cr(t))&&un(e)?Cr(vn(e),0,n):e.split(t,n):[]},Vn.spread=function(e,t){if("function"!=typeof e)throw new Ee(o);return t=null==t?0:Gt(vs(t),0),Yi((function(n){var i=n[t],r=Cr(n,0,t);return i&&Rt(r,i),Nt(e,this,r)}))},Vn.tail=function(e){var t=null==e?0:e.length;return t?rr(e,1,t):[]},Vn.take=function(e,t,n){return e&&e.length?rr(e,0,(t=n||t===r?1:vs(t))<0?0:t):[]},Vn.takeRight=function(e,t,n){var i=null==e?0:e.length;return i?rr(e,(t=i-(t=n||t===r?1:vs(t)))<0?0:t,i):[]},Vn.takeRightWhile=function(e,t){return e&&e.length?pr(e,uo(t,3),!1,!0):[]},Vn.takeWhile=function(e,t){return e&&e.length?pr(e,uo(t,3)):[]},Vn.tap=function(e,t){return t(e),e},Vn.throttle=function(e,t,n){var i=!0,r=!0;if("function"!=typeof e)throw new Ee(o);return ns(n)&&(i="leading"in n?!!n.leading:i,r="trailing"in n?!!n.trailing:r),Aa(e,t,{leading:i,maxWait:t,trailing:r})},Vn.thru=ga,Vn.toArray=ps,Vn.toPairs=Ws,Vn.toPairsIn=Vs,Vn.toPath=function(e){return Ka(e)?Mt(e,Bo):cs(e)?[e]:Ir(Fo(bs(e)))},Vn.toPlainObject=_s,Vn.transform=function(e,t,n){var i=Ka(e),r=i||$a(e)||ds(e);if(t=uo(t,4),null==n){var o=e&&e.constructor;n=r?i?new o:[]:ns(e)&&Ja(o)?Hn(Ke(e)):{}}return(r?Et:ki)(e,(function(e,i,r){return t(n,e,i,r)})),n},Vn.unary=function(e){return Ea(e,1)},Vn.union=ia,Vn.unionBy=ra,Vn.unionWith=oa,Vn.uniq=function(e){return e&&e.length?dr(e):[]},Vn.uniqBy=function(e,t){return e&&e.length?dr(e,uo(t,2)):[]},Vn.uniqWith=function(e,t){return t="function"==typeof t?t:r,e&&e.length?dr(e,r,t):[]},Vn.unset=function(e,t){return null==e||hr(e,t)},Vn.unzip=aa,Vn.unzipWith=sa,Vn.update=function(e,t,n){return null==e?e:fr(e,t,_r(n))},Vn.updateWith=function(e,t,n,i){return i="function"==typeof i?i:r,null==e?e:fr(e,t,_r(n),i)},Vn.values=Hs,Vn.valuesIn=function(e){return null==e?[]:en(e,Ps(e))},Vn.without=la,Vn.words=Js,Vn.wrap=function(e,t){return Ba(_r(t),e)},Vn.xor=ua,Vn.xorBy=ca,Vn.xorWith=da,Vn.zip=ha,Vn.zipObject=function(e,t){return mr(e||[],t||[],ni)},Vn.zipObjectDeep=function(e,t){return mr(e||[],t||[],er)},Vn.zipWith=fa,Vn.entries=Ws,Vn.entriesIn=Vs,Vn.extend=Cs,Vn.extendWith=ws,ul(Vn,Vn),Vn.add=_l,Vn.attempt=el,Vn.camelCase=js,Vn.capitalize=zs,Vn.ceil=bl,Vn.clamp=function(e,t,n){return n===r&&(n=t,t=r),n!==r&&(n=(n=ys(n))===n?n:0),t!==r&&(t=(t=ys(t))===t?t:0),li(ys(e),t,n)},Vn.clone=function(e){return ui(e,4)},Vn.cloneDeep=function(e){return ui(e,5)},Vn.cloneDeepWith=function(e,t){return ui(e,5,t="function"==typeof t?t:r)},Vn.cloneWith=function(e,t){return ui(e,4,t="function"==typeof t?t:r)},Vn.conformsTo=function(e,t){return null==t||ci(e,t,As(t))},Vn.deburr=Us,Vn.defaultTo=function(e,t){return null==e||e!==e?t:e},Vn.divide=kl,Vn.endsWith=function(e,t,n){e=bs(e),t=cr(t);var i=e.length,o=n=n===r?i:li(vs(n),0,i);return(n-=t.length)>=0&&e.slice(n,o)==t},Vn.eq=Ha,Vn.escape=function(e){return(e=bs(e))&&Y.test(e)?e.replace(Q,sn):e},Vn.escapeRegExp=function(e){return(e=bs(e))&&oe.test(e)?e.replace(re,"\\$&"):e},Vn.every=function(e,t,n){var i=Ka(e)?Tt:gi;return n&&ko(e,t,n)&&(t=r),i(e,uo(t,3))},Vn.find=ya,Vn.findIndex=Uo,Vn.findKey=function(e,t){return Vt(e,uo(t,3),ki)},Vn.findLast=_a,Vn.findLastIndex=Ko,Vn.findLastKey=function(e,t){return Vt(e,uo(t,3),Ci)},Vn.floor=Cl,Vn.forEach=ba,Vn.forEachRight=ka,Vn.forIn=function(e,t){return null==e?e:_i(e,uo(t,3),Ps)},Vn.forInRight=function(e,t){return null==e?e:bi(e,uo(t,3),Ps)},Vn.forOwn=function(e,t){return e&&ki(e,uo(t,3))},Vn.forOwnRight=function(e,t){return e&&Ci(e,uo(t,3))},Vn.get=Ds,Vn.gt=ja,Vn.gte=za,Vn.has=function(e,t){return null!=e&&mo(e,t,Di)},Vn.hasIn=Es,Vn.head=Go,Vn.identity=ol,Vn.includes=function(e,t,n,i){e=Ga(e)?e:Hs(e),n=n&&!i?vs(n):0;var r=e.length;return n<0&&(n=Gt(r+n,0)),us(e)?n<=r&&e.indexOf(t,n)>-1:!!r&&jt(e,t,n)>-1},Vn.indexOf=function(e,t,n){var i=null==e?0:e.length;if(!i)return-1;var r=null==n?0:vs(n);return r<0&&(r=Gt(i+r,0)),jt(e,t,r)},Vn.inRange=function(e,t,n){return t=gs(t),n===r?(n=t,t=0):n=gs(n),function(e,t,n){return e>=bn(t,n)&&e=-9007199254740991&&e<=p},Vn.isSet=ls,Vn.isString=us,Vn.isSymbol=cs,Vn.isTypedArray=ds,Vn.isUndefined=function(e){return e===r},Vn.isWeakMap=function(e){return is(e)&&vo(e)==A},Vn.isWeakSet=function(e){return is(e)&&"[object WeakSet]"==Li(e)},Vn.join=function(e,t){return null==e?"":bt.call(e,t)},Vn.kebabCase=Ks,Vn.last=Xo,Vn.lastIndexOf=function(e,t,n){var i=null==e?0:e.length;if(!i)return-1;var o=i;return n!==r&&(o=(o=vs(n))<0?Gt(i+o,0):bn(o,i-1)),t===t?function(e,t,n){for(var i=n+1;i--;)if(e[i]===t)return i;return i}(e,t,o):Ht(e,Ut,o,!0)},Vn.lowerCase=qs,Vn.lowerFirst=Gs,Vn.lt=hs,Vn.lte=fs,Vn.max=function(e){return e&&e.length?vi(e,ol,Ni):r},Vn.maxBy=function(e,t){return e&&e.length?vi(e,uo(t,2),Ni):r},Vn.mean=function(e){return Kt(e,ol)},Vn.meanBy=function(e,t){return Kt(e,uo(t,2))},Vn.min=function(e){return e&&e.length?vi(e,ol,Bi):r},Vn.minBy=function(e,t){return e&&e.length?vi(e,uo(t,2),Bi):r},Vn.stubArray=ml,Vn.stubFalse=yl,Vn.stubObject=function(){return{}},Vn.stubString=function(){return""},Vn.stubTrue=function(){return!0},Vn.multiply=wl,Vn.nth=function(e,t){return e&&e.length?zi(e,vs(t)):r},Vn.noConflict=function(){return gt._===this&&(gt._=We),this},Vn.noop=cl,Vn.now=Da,Vn.pad=function(e,t,n){e=bs(e);var i=(t=vs(t))?gn(e):0;if(!t||i>=t)return e;var r=(t-i)/2;return Ur(pt(r),n)+e+Ur(ft(r),n)},Vn.padEnd=function(e,t,n){e=bs(e);var i=(t=vs(t))?gn(e):0;return t&&it){var i=e;e=t,t=i}if(n||e%1||t%1){var o=wn();return bn(e+o*(t-e+dt("1e-"+((o+"").length-1))),t)}return Qi(e,t)},Vn.reduce=function(e,t,n){var i=Ka(e)?Zt:Qt,r=arguments.length<3;return i(e,uo(t,4),n,r,fi)},Vn.reduceRight=function(e,t,n){var i=Ka(e)?Ft:Qt,r=arguments.length<3;return i(e,uo(t,4),n,r,pi)},Vn.repeat=function(e,t,n){return t=(n?ko(e,t,n):t===r)?1:vs(t),$i(bs(e),t)},Vn.replace=function(){var e=arguments,t=bs(e[0]);return e.length<3?t:t.replace(e[1],e[2])},Vn.result=function(e,t,n){var i=-1,o=(t=br(t,e)).length;for(o||(o=1,e=r);++ip)return[];var n=v,i=bn(e,v);t=uo(t),e-=v;for(var r=Yt(i,t);++n=a)return e;var l=n-gn(i);if(l<1)return i;var u=s?Cr(s,0,l).join(""):e.slice(0,l);if(o===r)return u+i;if(s&&(l+=u.length-l),ss(o)){if(e.slice(l).search(o)){var c,d=u;for(o.global||(o=Ne(o.source,bs(ge.exec(o))+"g")),o.lastIndex=0;c=o.exec(d);)var h=c.index;u=u.slice(0,h===r?l:h)}}else if(e.indexOf(cr(o),l)!=l){var f=u.lastIndexOf(o);f>-1&&(u=u.slice(0,f))}return u+i},Vn.unescape=function(e){return(e=bs(e))&&$.test(e)?e.replace(G,yn):e},Vn.uniqueId=function(e){var t=++Re;return bs(e)+t},Vn.upperCase=Ys,Vn.upperFirst=Xs,Vn.each=ba,Vn.eachRight=ka,Vn.first=Go,ul(Vn,function(){var e={};return ki(Vn,(function(t,n){Me.call(Vn.prototype,n)||(e[n]=t)})),e}(),{chain:!1}),Vn.VERSION="4.17.21",Et(["bind","bindKey","curry","curryRight","partial","partialRight"],(function(e){Vn[e].placeholder=Vn})),Et(["drop","take"],(function(e,t){Un.prototype[e]=function(n){n=n===r?1:Gt(vs(n),0);var i=this.__filtered__&&!t?new Un(this):this.clone();return i.__filtered__?i.__takeCount__=bn(n,i.__takeCount__):i.__views__.push({size:bn(n,v),type:e+(i.__dir__<0?"Right":"")}),i},Un.prototype[e+"Right"]=function(t){return this.reverse()[e](t).reverse()}})),Et(["filter","map","takeWhile"],(function(e,t){var n=t+1,i=1==n||3==n;Un.prototype[e]=function(e){var t=this.clone();return t.__iteratees__.push({iteratee:uo(e,3),type:n}),t.__filtered__=t.__filtered__||i,t}})),Et(["head","last"],(function(e,t){var n="take"+(t?"Right":"");Un.prototype[e]=function(){return this[n](1).value()[0]}})),Et(["initial","tail"],(function(e,t){var n="drop"+(t?"":"Right");Un.prototype[e]=function(){return this.__filtered__?new Un(this):this[n](1)}})),Un.prototype.compact=function(){return this.filter(ol)},Un.prototype.find=function(e){return this.filter(e).head()},Un.prototype.findLast=function(e){return this.reverse().find(e)},Un.prototype.invokeMap=Yi((function(e,t){return"function"==typeof e?new Un(this):this.map((function(n){return Ti(n,e,t)}))})),Un.prototype.reject=function(e){return this.filter(Za(uo(e)))},Un.prototype.slice=function(e,t){e=vs(e);var n=this;return n.__filtered__&&(e>0||t<0)?new Un(n):(e<0?n=n.takeRight(-e):e&&(n=n.drop(e)),t!==r&&(n=(t=vs(t))<0?n.dropRight(-t):n.take(t-e)),n)},Un.prototype.takeRightWhile=function(e){return this.reverse().takeWhile(e).reverse()},Un.prototype.toArray=function(){return this.take(v)},ki(Un.prototype,(function(e,t){var n=/^(?:filter|find|map|reject)|While$/.test(t),i=/^(?:head|last)$/.test(t),o=Vn[i?"take"+("last"==t?"Right":""):t],a=i||/^find/.test(t);o&&(Vn.prototype[t]=function(){var t=this.__wrapped__,s=i?[1]:arguments,l=t instanceof Un,u=s[0],c=l||Ka(t),d=function(e){var t=o.apply(Vn,Rt([e],s));return i&&h?t[0]:t};c&&n&&"function"==typeof u&&1!=u.length&&(l=c=!1);var h=this.__chain__,f=!!this.__actions__.length,p=a&&!h,g=l&&!f;if(!a&&c){t=g?t:new Un(this);var v=e.apply(t,s);return v.__actions__.push({func:ga,args:[d],thisArg:r}),new zn(v,h)}return p&&g?e.apply(this,s):(v=this.thru(d),p?i?v.value()[0]:v.value():v)})})),Et(["pop","push","shift","sort","splice","unshift"],(function(e){var t=Ie[e],n=/^(?:push|sort|unshift)$/.test(e)?"tap":"thru",i=/^(?:pop|shift)$/.test(e);Vn.prototype[e]=function(){var e=arguments;if(i&&!this.__chain__){var r=this.value();return t.apply(Ka(r)?r:[],e)}return this[n]((function(n){return t.apply(Ka(n)?n:[],e)}))}})),ki(Un.prototype,(function(e,t){var n=Vn[t];if(n){var i=n.name+"";Me.call(On,i)||(On[i]=[]),On[i].push({name:t,func:n})}})),On[Vr(r,2).name]=[{name:"wrapper",func:r}],Un.prototype.clone=function(){var e=new Un(this.__wrapped__);return e.__actions__=Ir(this.__actions__),e.__dir__=this.__dir__,e.__filtered__=this.__filtered__,e.__iteratees__=Ir(this.__iteratees__),e.__takeCount__=this.__takeCount__,e.__views__=Ir(this.__views__),e},Un.prototype.reverse=function(){if(this.__filtered__){var e=new Un(this);e.__dir__=-1,e.__filtered__=!0}else(e=this.clone()).__dir__*=-1;return e},Un.prototype.value=function(){var e=this.__wrapped__.value(),t=this.__dir__,n=Ka(e),i=t<0,r=n?e.length:0,o=function(e,t,n){var i=-1,r=n.length;for(;++i=this.__values__.length;return{done:e,value:e?r:this.__values__[this.__index__++]}},Vn.prototype.plant=function(e){for(var t,n=this;n instanceof jn;){var i=Vo(n);i.__index__=0,i.__values__=r,t?o.__wrapped__=i:t=i;var o=i;n=n.__wrapped__}return o.__wrapped__=e,t},Vn.prototype.reverse=function(){var e=this.__wrapped__;if(e instanceof Un){var t=e;return this.__actions__.length&&(t=new Un(this)),(t=t.reverse()).__actions__.push({func:ga,args:[na],thisArg:r}),new zn(t,this.__chain__)}return this.thru(na)},Vn.prototype.toJSON=Vn.prototype.valueOf=Vn.prototype.value=function(){return gr(this.__wrapped__,this.__actions__)},Vn.prototype.first=Vn.prototype.head,Ye&&(Vn.prototype[Ye]=function(){return this}),Vn}();gt._=_n,(i=function(){return _n}.call(t,n,t,e))===r||(e.exports=i)}.call(this)},72617:function(e,t,n){var i=n(64173),r=n(39934)((function(e,t,n,r){i(e,t,n,r)}));e.exports=r},49488:function(e){e.exports=function(){return!1}},6576:function(e,t,n){var i=n(64503),r=n(73961);e.exports=function(e){return i(e,r(e))}},81294:function(e,t,n){"use strict";var i=this&&this.__createBinding||(Object.create?function(e,t,n,i){void 0===i&&(i=n),Object.defineProperty(e,i,{enumerable:!0,get:function(){return t[n]}})}:function(e,t,n,i){void 0===i&&(i=n),e[i]=t[n]}),r=this&&this.__exportStar||function(e,t){for(var n in e)"default"===n||t.hasOwnProperty(n)||i(t,e,n)};Object.defineProperty(t,"__esModule",{value:!0}),t.mock=void 0;var o=n(50012);Object.defineProperty(t,"mock",{enumerable:!0,get:function(){return o.mock}}),r(n(50012),t)},50012:function(e,t,n){"use strict";var i=this&&this.__importDefault||function(e){return e&&e.__esModule?e:{default:e}};Object.defineProperty(t,"__esModule",{value:!0}),t.mock=void 0;var r=i(n(763));function o(e){return e.allOf&&e.allOf[0]&&(e=r.default.reduce(e.allOf,(function(e,t){return r.default.merge({},e,o(t))}),e)),e}t.mock=function e(t){if(void 0!==(t=o(t)).example)return t.example;if(void 0!==t.default)return t.default;if(t.oneOf&&t.oneOf[0])return e(t.oneOf[0]);if(t.anyOf&&t.anyOf[0])return e(t.anyOf[0]);var n=r.default.isArray(t)?r.default.first(t.type):t.type;if("object"===n){var i=t.properties;return i?r.default.mapValues(i,e):{}}if("array"===n){var a=t,s=a.items;if(!s)return[];var l=[],u=s.oneOf&&s.oneOf[0]||s;if(s.anyOf)for(var c=0,d=s.anyOf;c=0,m=g.indexOf("AppleWebKit")>=0,y=g.indexOf("Chrome")>=0,_=!y&&g.indexOf("Safari")>=0,b=!y&&!_&&m,k=g.indexOf("Electron/")>=0,C=g.indexOf("Android")>=0,w=!1;if(window.matchMedia){var S=window.matchMedia("(display-mode: standalone)");w=S.matches,h(S,(function(e){var t=e.matches;w=t}))}function x(){return w}},57572:function(e,t,n){"use strict";n.d(t,{D:function(){return o}});var i=n(62865),r=n(73616),o={clipboard:{writeText:r.tY||document.queryCommandSupported&&document.queryCommandSupported("copy")||!!(navigator&&navigator.clipboard&&navigator.clipboard.writeText),readText:r.tY||!!(navigator&&navigator.clipboard&&navigator.clipboard.readText)},keyboard:r.tY||i.isStandalone()?0:navigator.keyboard||i.isSafari?1:2,touch:"ontouchstart"in window||navigator.maxTouchPoints>0,pointerEvents:window.PointerEvent&&("ontouchstart"in window||window.navigator.maxTouchPoints>0||navigator.maxTouchPoints>0)}},94021:function(e,t,n){"use strict";n.d(t,{P:function(){return r},g:function(){return i}});var i={RESOURCES:"ResourceURLs",DOWNLOAD_URL:"DownloadURL",FILES:"Files",TEXT:n(62684).v.text},r={CurrentDragAndDropData:void 0}},81531:function(e,t,n){"use strict";n.r(t),n.d(t,{$:function(){return xe},Dimension:function(){return j},DragAndDropObserver:function(){return Re},EventHelper:function(){return pe},EventType:function(){return fe},ModifierKeyEmitter:function(){return Me},Namespace:function(){return Ce},StandardWindow:function(){return G},addDisposableGenericMouseDownListener:function(){return O},addDisposableGenericMouseUpListener:function(){return A},addDisposableListener:function(){return N},addStandardDisposableGenericMouseDownListener:function(){return I},addStandardDisposableGenericMouseUpListener:function(){return T},addStandardDisposableListener:function(){return E},animate:function(){return Te},append:function(){return _e},asCSSPropertyValue:function(){return Ae},asCSSUrl:function(){return Oe},clearNode:function(){return S},computeScreenAwareSize:function(){return Ee},createCSSRule:function(){return ce},createEventEmitter:function(){return P},createStyleSheet:function(){return ae},findParentWithClass:function(){return ee},getActiveElement:function(){return oe},getClientArea:function(){return V},getComputedStyle:function(){return W},getContentHeight:function(){return Y},getContentWidth:function(){return $},getDomNodePagePosition:function(){return K},getDomNodeZoomLevel:function(){return q},getElementsByTagName:function(){return De},getShadowRoot:function(){return re},getTopLeftOffset:function(){return z},getTotalHeight:function(){return X},getTotalWidth:function(){return Q},h:function(){return Fe},hasParentWithClass:function(){return te},hide:function(){return Ne},hookDomPurifyHrefAndSrcSanitizer:function(){return Pe},isAncestor:function(){return J},isHTMLElement:function(){return he},isInDOM:function(){return x},isInShadowDOM:function(){return ie},isShadowRoot:function(){return ne},prepend:function(){return be},removeCSSRulesContainingSelector:function(){return de},reset:function(){return ke},restoreParentsScrollTop:function(){return ve},runAtThisOrScheduleAtNextAnimationFrame:function(){return M},saveParentsScrollTop:function(){return ge},scheduleAtNextAnimationFrame:function(){return R},show:function(){return Le},size:function(){return U},trackFocus:function(){return ye},windowOpenNoOpener:function(){return Ie}});var i=n(29439),r=n(37762),o=n(71002),a=n(89611),s=n(60136);function l(){l=function(e,t){return new n(e,void 0,t)};var e=RegExp.prototype,t=new WeakMap;function n(e,i,r){var o=new RegExp(e,i);return t.set(o,r||t.get(e)),(0,a.Z)(o,n.prototype)}function i(e,n){var i=t.get(n);return Object.keys(i).reduce((function(t,n){var r=i[n];if("number"==typeof r)t[n]=e[r];else{for(var o=0;void 0===e[r[o]]&&o+1]+)>/g,(function(e,t){var n=a[t];return"$"+(Array.isArray(n)?n.join("$"):n)})))}if("function"==typeof r){var s=this;return e[Symbol.replace].call(this,n,(function(){var e=arguments;return"object"!=(0,o.Z)(e[e.length-1])&&(e=[].slice.call(e)).push(i(e,s)),r.apply(this,e)}))}return e[Symbol.replace].call(this,n,r)},l.apply(this,arguments)}var u=n(11752),c=n(61120),d=n(27277),h=n(15671),f=n(43144),p=n(62865),g=n(57572),v=n(33813),m=n(2524),y=n(14173),_=n(73097),b=n(67797),k=n(11860),C=n(84855),w=n(73616);function S(e){for(;e.firstChild;)e.firstChild.remove()}function x(e){var t;return null!==(t=null===e||void 0===e?void 0:e.isConnected)&&void 0!==t&&t}var L=function(){function e(t,n,i,r){(0,h.Z)(this,e),this._node=t,this._type=n,this._handler=i,this._options=r||!1,this._node.addEventListener(this._type,this._handler,this._options)}return(0,f.Z)(e,[{key:"dispose",value:function(){this._handler&&(this._node.removeEventListener(this._type,this._handler,this._options),this._node=null,this._handler=null)}}]),e}();function N(e,t,n,i){return new L(e,t,n,i)}function D(e){return function(t){return e(new m.n(t))}}var E=function(e,t,n,i){var r=n;return"click"===t||"mousedown"===t?r=D(n):"keydown"!==t&&"keypress"!==t&&"keyup"!==t||(r=function(e){return function(t){return e(new v.y(t))}}(n)),N(e,t,r,i)},I=function(e,t,n){return O(e,D(t),n)},T=function(e,t,n){return A(e,D(t),n)};function O(e,t,n){return N(e,w.gn&&g.D.pointerEvents?fe.POINTER_DOWN:fe.MOUSE_DOWN,t,n)}function A(e,t,n){return N(e,w.gn&&g.D.pointerEvents?fe.POINTER_UP:fe.MOUSE_UP,t,n)}function P(e,t,n){var i=null,r=function(e){return o.fire(e)},o=new _.Q5({onFirstListenerAdd:function(){i||(i=new L(e,t,r,n))},onLastListenerRemove:function(){i&&(i.dispose(),i=null)}});return o}var M,R,Z=null;function F(e){if(!Z){Z=self.requestAnimationFrame||self.msRequestAnimationFrame||self.webkitRequestAnimationFrame||self.mozRequestAnimationFrame||self.oRequestAnimationFrame||function(e){return setTimeout((function(){return e((new Date).getTime())}),0)}}return Z.call(self,e)}var B=function(){function e(t){var n=arguments.length>1&&void 0!==arguments[1]?arguments[1]:0;(0,h.Z)(this,e),this._runner=t,this.priority=n,this._canceled=!1}return(0,f.Z)(e,[{key:"dispose",value:function(){this._canceled=!0}},{key:"execute",value:function(){if(!this._canceled)try{this._runner()}catch(e){(0,y.dL)(e)}}}],[{key:"sort",value:function(e,t){return t.priority-e.priority}}]),e}();function W(e){return document.defaultView.getComputedStyle(e,null)}function V(e){if(e!==document.body)return new j(e.clientWidth,e.clientHeight);if(w.gn&&window.visualViewport)return new j(window.visualViewport.width,window.visualViewport.height);if(window.innerWidth&&window.innerHeight)return new j(window.innerWidth,window.innerHeight);if(document.body&&document.body.clientWidth&&document.body.clientHeight)return new j(document.body.clientWidth,document.body.clientHeight);if(document.documentElement&&document.documentElement.clientWidth&&document.documentElement.clientHeight)return new j(document.documentElement.clientWidth,document.documentElement.clientHeight);throw new Error("Unable to figure out browser width and height")}!function(){var e=[],t=null,n=!1,i=!1,r=function(){for(n=!1,t=e,e=[],i=!0;t.length>0;){t.sort(B.sort),t.shift().execute()}i=!1};R=function(t){var i=arguments.length>1&&void 0!==arguments[1]?arguments[1]:0,o=new B(t,i);return e.push(o),n||(n=!0,F(r)),o},M=function(e,n){if(i){var r=new B(e,n);return t.push(r),r}return R(e,n)}}();var H=function(){function e(){(0,h.Z)(this,e)}return(0,f.Z)(e,null,[{key:"convertToPixels",value:function(e,t){return parseFloat(t)||0}},{key:"getDimension",value:function(t,n,i){var r=W(t),o="0";return r&&(o=r.getPropertyValue?r.getPropertyValue(n):r.getAttribute(i)),e.convertToPixels(t,o)}},{key:"getBorderLeftWidth",value:function(t){return e.getDimension(t,"border-left-width","borderLeftWidth")}},{key:"getBorderRightWidth",value:function(t){return e.getDimension(t,"border-right-width","borderRightWidth")}},{key:"getBorderTopWidth",value:function(t){return e.getDimension(t,"border-top-width","borderTopWidth")}},{key:"getBorderBottomWidth",value:function(t){return e.getDimension(t,"border-bottom-width","borderBottomWidth")}},{key:"getPaddingLeft",value:function(t){return e.getDimension(t,"padding-left","paddingLeft")}},{key:"getPaddingRight",value:function(t){return e.getDimension(t,"padding-right","paddingRight")}},{key:"getPaddingTop",value:function(t){return e.getDimension(t,"padding-top","paddingTop")}},{key:"getPaddingBottom",value:function(t){return e.getDimension(t,"padding-bottom","paddingBottom")}},{key:"getMarginLeft",value:function(t){return e.getDimension(t,"margin-left","marginLeft")}},{key:"getMarginTop",value:function(t){return e.getDimension(t,"margin-top","marginTop")}},{key:"getMarginRight",value:function(t){return e.getDimension(t,"margin-right","marginRight")}},{key:"getMarginBottom",value:function(t){return e.getDimension(t,"margin-bottom","marginBottom")}}]),e}(),j=function(){function e(t,n){(0,h.Z)(this,e),this.width=t,this.height=n}return(0,f.Z)(e,[{key:"with",value:function(){var t=arguments.length>0&&void 0!==arguments[0]?arguments[0]:this.width,n=arguments.length>1&&void 0!==arguments[1]?arguments[1]:this.height;return t!==this.width||n!==this.height?new e(t,n):this}}],[{key:"is",value:function(e){return"object"===typeof e&&"number"===typeof e.height&&"number"===typeof e.width}},{key:"lift",value:function(t){return t instanceof e?t:new e(t.width,t.height)}},{key:"equals",value:function(e,t){return e===t||!(!e||!t)&&(e.width===t.width&&e.height===t.height)}}]),e}();function z(e){for(var t=e.offsetParent,n=e.offsetTop,i=e.offsetLeft;null!==(e=e.parentNode)&&e!==document.body&&e!==document.documentElement;){n-=e.scrollTop;var r=ne(e)?null:W(e);r&&(i-="rtl"!==r.direction?e.scrollLeft:-e.scrollLeft),e===t&&(i+=H.getBorderLeftWidth(e),n+=H.getBorderTopWidth(e),n+=e.offsetTop,i+=e.offsetLeft,t=e.offsetParent)}return{left:i,top:n}}function U(e,t,n){"number"===typeof t&&(e.style.width="".concat(t,"px")),"number"===typeof n&&(e.style.height="".concat(n,"px"))}function K(e){var t=e.getBoundingClientRect();return{left:t.left+G.scrollX,top:t.top+G.scrollY,width:t.width,height:t.height}}function q(e){var t=e,n=1;do{var i=W(t).zoom;null!==i&&void 0!==i&&"1"!==i&&(n*=i),t=t.parentElement}while(null!==t&&t!==document.documentElement);return n}j.None=new j(0,0);var G=new(function(){function e(){(0,h.Z)(this,e)}return(0,f.Z)(e,[{key:"scrollX",get:function(){return"number"===typeof window.scrollX?window.scrollX:document.body.scrollLeft+document.documentElement.scrollLeft}},{key:"scrollY",get:function(){return"number"===typeof window.scrollY?window.scrollY:document.body.scrollTop+document.documentElement.scrollTop}}]),e}());function Q(e){var t=H.getMarginLeft(e)+H.getMarginRight(e);return e.offsetWidth+t}function $(e){var t=H.getBorderLeftWidth(e)+H.getBorderRightWidth(e),n=H.getPaddingLeft(e)+H.getPaddingRight(e);return e.offsetWidth-t-n}function Y(e){var t=H.getBorderTopWidth(e)+H.getBorderBottomWidth(e),n=H.getPaddingTop(e)+H.getPaddingBottom(e);return e.offsetHeight-t-n}function X(e){var t=H.getMarginTop(e)+H.getMarginBottom(e);return e.offsetHeight+t}function J(e,t){for(;e;){if(e===t)return!0;e=e.parentNode}return!1}function ee(e,t,n){for(;e&&e.nodeType===e.ELEMENT_NODE;){if(e.classList.contains(t))return e;if(n)if("string"===typeof n){if(e.classList.contains(n))return null}else if(e===n)return null;e=e.parentNode}return null}function te(e,t,n){return!!ee(e,t,n)}function ne(e){return e&&!!e.host&&!!e.mode}function ie(e){return!!re(e)}function re(e){for(;e.parentNode;){if(e===document.body)return null;e=e.parentNode}return ne(e)?e:null}function oe(){for(var e=document.activeElement;null===e||void 0===e?void 0:e.shadowRoot;)e=e.shadowRoot.activeElement;return e}function ae(){var e=arguments.length>0&&void 0!==arguments[0]?arguments[0]:document.getElementsByTagName("head")[0],t=document.createElement("style");return t.type="text/css",t.media="screen",e.appendChild(t),t}var se=null;function le(){return se||(se=ae()),se}function ue(e){var t,n;return(null===(t=null===e||void 0===e?void 0:e.sheet)||void 0===t?void 0:t.rules)?e.sheet.rules:(null===(n=null===e||void 0===e?void 0:e.sheet)||void 0===n?void 0:n.cssRules)?e.sheet.cssRules:[]}function ce(e,t){var n=arguments.length>2&&void 0!==arguments[2]?arguments[2]:le();n&&t&&n.sheet.insertRule(e+"{"+t+"}",0)}function de(e){var t=arguments.length>1&&void 0!==arguments[1]?arguments[1]:le();if(t){for(var n=ue(t),i=[],r=0;r=0;a--)t.sheet.deleteRule(i[a])}}function he(e){return"object"===typeof HTMLElement?e instanceof HTMLElement:e&&"object"===typeof e&&1===e.nodeType&&"string"===typeof e.nodeName}var fe={CLICK:"click",AUXCLICK:"auxclick",DBLCLICK:"dblclick",MOUSE_UP:"mouseup",MOUSE_DOWN:"mousedown",MOUSE_OVER:"mouseover",MOUSE_MOVE:"mousemove",MOUSE_OUT:"mouseout",MOUSE_ENTER:"mouseenter",MOUSE_LEAVE:"mouseleave",MOUSE_WHEEL:"wheel",POINTER_UP:"pointerup",POINTER_DOWN:"pointerdown",POINTER_MOVE:"pointermove",POINTER_LEAVE:"pointerleave",CONTEXT_MENU:"contextmenu",WHEEL:"wheel",KEY_DOWN:"keydown",KEY_PRESS:"keypress",KEY_UP:"keyup",LOAD:"load",BEFORE_UNLOAD:"beforeunload",UNLOAD:"unload",PAGE_SHOW:"pageshow",PAGE_HIDE:"pagehide",ABORT:"abort",ERROR:"error",RESIZE:"resize",SCROLL:"scroll",FULLSCREEN_CHANGE:"fullscreenchange",WK_FULLSCREEN_CHANGE:"webkitfullscreenchange",SELECT:"select",CHANGE:"change",SUBMIT:"submit",RESET:"reset",FOCUS:"focus",FOCUS_IN:"focusin",FOCUS_OUT:"focusout",BLUR:"blur",INPUT:"input",STORAGE:"storage",DRAG_START:"dragstart",DRAG:"drag",DRAG_ENTER:"dragenter",DRAG_LEAVE:"dragleave",DRAG_OVER:"dragover",DROP:"drop",DRAG_END:"dragend",ANIMATION_START:p.isWebKit?"webkitAnimationStart":"animationstart",ANIMATION_END:p.isWebKit?"webkitAnimationEnd":"animationend",ANIMATION_ITERATION:p.isWebKit?"webkitAnimationIteration":"animationiteration"},pe={stop:function(e,t){e.preventDefault?e.preventDefault():e.returnValue=!1,t&&(e.stopPropagation?e.stopPropagation():e.cancelBubble=!0)}};function ge(e){for(var t=[],n=0;e&&e.nodeType===e.ELEMENT_NODE;n++)t[n]=e.scrollTop,e=e.parentNode;return t}function ve(e,t){for(var n=0;e&&e.nodeType===e.ELEMENT_NODE;n++)e.scrollTop!==t[n]&&(e.scrollTop=t[n]),e=e.parentNode}var me=function(e){(0,s.Z)(n,e);var t=(0,d.Z)(n);function n(e){var i;(0,h.Z)(this,n),(i=t.call(this))._onDidFocus=i._register(new _.Q5),i.onDidFocus=i._onDidFocus.event,i._onDidBlur=i._register(new _.Q5),i.onDidBlur=i._onDidBlur.event;var r=n.hasFocusWithin(e),o=!1,a=function(){o=!1,r||(r=!0,i._onDidFocus.fire())},s=function(){r&&(o=!0,window.setTimeout((function(){o&&(o=!1,r=!1,i._onDidBlur.fire())}),0))};return i._refreshStateHandler=function(){n.hasFocusWithin(e)!==r&&(r?s():a())},i._register(N(e,fe.FOCUS,a,!0)),i._register(N(e,fe.BLUR,s,!0)),i._register(N(e,fe.FOCUS_IN,(function(){return i._refreshStateHandler()}))),i._register(N(e,fe.FOCUS_OUT,(function(){return i._refreshStateHandler()}))),i}return(0,f.Z)(n,null,[{key:"hasFocusWithin",value:function(e){var t=re(e);return J(t?t.activeElement:document.activeElement,e)}}]),n}(k.JT);function ye(e){return new me(e)}function _e(e){for(var t=arguments.length,n=new Array(t>1?t-1:0),i=1;i1?t-1:0),i=1;i3?s-3:0),u=3;u2?n-2:0),r=2;r1&&void 0!==arguments[1]&&arguments[1],n=document.createElement("a");return b.v5("afterSanitizeAttributes",(function(i){for(var r=0,o=["href","src"];r2?n-2:0),r=2;r1?n-1:0),r=1;r/gm),H=u(/^data-[\-\w.\u00B7-\uFFFF]/),j=u(/^aria-[\-\w]+$/),z=u(/^(?:(?:(?:f|ht)tps?|mailto|tel|callto|cid|xmpp):|[^a-z]|[a-z+.\-]+(?:[^a-z+.\-:]|$))/i),U=u(/^(?:\w+script|data):/i),K=u(/[\u0000-\u0020\u00A0\u1680\u180E\u2000-\u2029\u205F\u3000]/g),q="function"===typeof Symbol&&"symbol"===typeof Symbol.iterator?function(e){return typeof e}:function(e){return e&&"function"===typeof Symbol&&e.constructor===Symbol&&e!==Symbol.prototype?"symbol":typeof e};function G(e){if(Array.isArray(e)){for(var t=0,n=Array(e.length);t0&&void 0!==arguments[0]?arguments[0]:Q(),n=function(t){return e(t)};if(n.version="2.3.1",n.removed=[],!t||!t.document||9!==t.document.nodeType)return n.isSupported=!1,n;var i=t.document,r=t.document,o=t.DocumentFragment,a=t.HTMLTemplateElement,s=t.Node,u=t.Element,c=t.NodeFilter,d=t.NamedNodeMap,h=void 0===d?t.NamedNodeMap||t.MozNamedAttrMap:d,f=t.Text,p=t.Comment,x=t.DOMParser,Y=t.trustedTypes,X=u.prototype,J=D(X,"cloneNode"),ee=D(X,"nextSibling"),te=D(X,"childNodes"),ne=D(X,"parentNode");if("function"===typeof a){var ie=r.createElement("template");ie.content&&ie.content.ownerDocument&&(r=ie.content.ownerDocument)}var re=$(Y,i),oe=re&&Ze?re.createHTML(""):"",ae=r,se=ae.implementation,le=ae.createNodeIterator,ue=ae.createDocumentFragment,ce=ae.getElementsByTagName,de=i.importNode,he={};try{he=N(r).documentMode?r.documentMode:{}}catch(yt){}var fe={};n.isSupported="function"===typeof ne&&se&&"undefined"!==typeof se.createHTMLDocument&&9!==he;var pe=W,ge=V,ve=H,me=j,ye=U,_e=K,be=z,ke=null,Ce=L({},[].concat(G(E),G(I),G(T),G(A),G(M))),we=null,Se=L({},[].concat(G(R),G(Z),G(F),G(B))),xe=null,Le=null,Ne=!0,De=!0,Ee=!1,Ie=!1,Te=!1,Oe=!1,Ae=!1,Pe=!1,Me=!1,Re=!0,Ze=!1,Fe=!0,Be=!0,We=!1,Ve={},He=null,je=L({},["annotation-xml","audio","colgroup","desc","foreignobject","head","iframe","math","mi","mn","mo","ms","mtext","noembed","noframes","noscript","plaintext","script","style","svg","template","thead","title","video","xmp"]),ze=null,Ue=L({},["audio","video","img","source","image","track"]),Ke=null,qe=L({},["alt","class","for","id","label","name","pattern","placeholder","role","summary","title","value","style","xmlns"]),Ge="http://www.w3.org/1998/Math/MathML",Qe="http://www.w3.org/2000/svg",$e="http://www.w3.org/1999/xhtml",Ye=$e,Xe=!1,Je=null,et=r.createElement("form"),tt=function(e){Je&&Je===e||(e&&"object"===("undefined"===typeof e?"undefined":q(e))||(e={}),e=N(e),ke="ALLOWED_TAGS"in e?L({},e.ALLOWED_TAGS):Ce,we="ALLOWED_ATTR"in e?L({},e.ALLOWED_ATTR):Se,Ke="ADD_URI_SAFE_ATTR"in e?L(N(qe),e.ADD_URI_SAFE_ATTR):qe,ze="ADD_DATA_URI_TAGS"in e?L(N(Ue),e.ADD_DATA_URI_TAGS):Ue,He="FORBID_CONTENTS"in e?L({},e.FORBID_CONTENTS):je,xe="FORBID_TAGS"in e?L({},e.FORBID_TAGS):{},Le="FORBID_ATTR"in e?L({},e.FORBID_ATTR):{},Ve="USE_PROFILES"in e&&e.USE_PROFILES,Ne=!1!==e.ALLOW_ARIA_ATTR,De=!1!==e.ALLOW_DATA_ATTR,Ee=e.ALLOW_UNKNOWN_PROTOCOLS||!1,Ie=e.SAFE_FOR_TEMPLATES||!1,Te=e.WHOLE_DOCUMENT||!1,Pe=e.RETURN_DOM||!1,Me=e.RETURN_DOM_FRAGMENT||!1,Re=!1!==e.RETURN_DOM_IMPORT,Ze=e.RETURN_TRUSTED_TYPE||!1,Ae=e.FORCE_BODY||!1,Fe=!1!==e.SANITIZE_DOM,Be=!1!==e.KEEP_CONTENT,We=e.IN_PLACE||!1,be=e.ALLOWED_URI_REGEXP||be,Ye=e.NAMESPACE||$e,Ie&&(De=!1),Me&&(Pe=!0),Ve&&(ke=L({},[].concat(G(M))),we=[],!0===Ve.html&&(L(ke,E),L(we,R)),!0===Ve.svg&&(L(ke,I),L(we,Z),L(we,B)),!0===Ve.svgFilters&&(L(ke,T),L(we,Z),L(we,B)),!0===Ve.mathMl&&(L(ke,A),L(we,F),L(we,B))),e.ADD_TAGS&&(ke===Ce&&(ke=N(ke)),L(ke,e.ADD_TAGS)),e.ADD_ATTR&&(we===Se&&(we=N(we)),L(we,e.ADD_ATTR)),e.ADD_URI_SAFE_ATTR&&L(Ke,e.ADD_URI_SAFE_ATTR),e.FORBID_CONTENTS&&(He===je&&(He=N(He)),L(He,e.FORBID_CONTENTS)),Be&&(ke["#text"]=!0),Te&&L(ke,["html","head","body"]),ke.table&&(L(ke,["tbody"]),delete xe.tbody),l&&l(e),Je=e)},nt=L({},["mi","mo","mn","ms","mtext"]),it=L({},["foreignobject","desc","title","annotation-xml"]),rt=L({},I);L(rt,T),L(rt,O);var ot=L({},A);L(ot,P);var at=function(e){var t=ne(e);t&&t.tagName||(t={namespaceURI:$e,tagName:"template"});var n=y(e.tagName),i=y(t.tagName);if(e.namespaceURI===Qe)return t.namespaceURI===$e?"svg"===n:t.namespaceURI===Ge?"svg"===n&&("annotation-xml"===i||nt[i]):Boolean(rt[n]);if(e.namespaceURI===Ge)return t.namespaceURI===$e?"math"===n:t.namespaceURI===Qe?"math"===n&&it[i]:Boolean(ot[n]);if(e.namespaceURI===$e){if(t.namespaceURI===Qe&&!it[i])return!1;if(t.namespaceURI===Ge&&!nt[i])return!1;var r=L({},["title","style","font","a","script"]);return!ot[n]&&(r[n]||!rt[n])}return!1},st=function(e){m(n.removed,{element:e});try{e.parentNode.removeChild(e)}catch(yt){try{e.outerHTML=oe}catch(yt){e.remove()}}},lt=function(e,t){try{m(n.removed,{attribute:t.getAttributeNode(e),from:t})}catch(yt){m(n.removed,{attribute:null,from:t})}if(t.removeAttribute(e),"is"===e&&!we[e])if(Pe||Me)try{st(t)}catch(yt){}else try{t.setAttribute(e,"")}catch(yt){}},ut=function(e){var t=void 0,n=void 0;if(Ae)e=""+e;else{var i=_(e,/^[\r\n\t ]+/);n=i&&i[0]}var o=re?re.createHTML(e):e;if(Ye===$e)try{t=(new x).parseFromString(o,"text/html")}catch(yt){}if(!t||!t.documentElement){t=se.createDocument(Ye,"template",null);try{t.documentElement.innerHTML=Xe?"":o}catch(yt){}}var a=t.body||t.documentElement;return e&&n&&a.insertBefore(r.createTextNode(n),a.childNodes[0]||null),Ye===$e?ce.call(t,Te?"html":"body")[0]:Te?t.documentElement:a},ct=function(e){return le.call(e.ownerDocument||e,e,c.SHOW_ELEMENT|c.SHOW_COMMENT|c.SHOW_TEXT,null,!1)},dt=function(e){return!(e instanceof f||e instanceof p)&&!("string"===typeof e.nodeName&&"string"===typeof e.textContent&&"function"===typeof e.removeChild&&e.attributes instanceof h&&"function"===typeof e.removeAttribute&&"function"===typeof e.setAttribute&&"string"===typeof e.namespaceURI&&"function"===typeof e.insertBefore)},ht=function(e){return"object"===("undefined"===typeof s?"undefined":q(s))?e instanceof s:e&&"object"===("undefined"===typeof e?"undefined":q(e))&&"number"===typeof e.nodeType&&"string"===typeof e.nodeName},ft=function(e,t,i){fe[e]&&g(fe[e],(function(e){e.call(n,t,i,Je)}))},pt=function(e){var t=void 0;if(ft("beforeSanitizeElements",e,null),dt(e))return st(e),!0;if(_(e.nodeName,/[\u0080-\uFFFF]/))return st(e),!0;var i=y(e.nodeName);if(ft("uponSanitizeElement",e,{tagName:i,allowedTags:ke}),!ht(e.firstElementChild)&&(!ht(e.content)||!ht(e.content.firstElementChild))&&w(/<[/\w]/g,e.innerHTML)&&w(/<[/\w]/g,e.textContent))return st(e),!0;if("select"===i&&w(/