Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

runtime-pascal-update-2-AG #974

Merged
merged 6 commits into from
Nov 24, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -75,6 +75,23 @@ Select *Export OpenAPI* next to the resource path to export all the API endpoint

image::export-api-specifications.png[width=150]

[NOTE]
====
The export of API endpoints in OpenAPI format does not support custom HTTP methods. The following HTTP methods specified in RFC-7231 section 4.3 are supported:

* GET
* POST
* PUT
* DELETE
* OPTIONS
* HEAD
* PATCH
* TRACE
* CONNECT

For more details, refer to the https://datatracker.ietf.org/doc/html/rfc7231#section-4.3[RFC-7231 documentation].
====

=== Limitations

* Click to Protect/Delete/Download openAPI actions apply to all paths in the app, and not possible to select individual paths.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -151,7 +151,7 @@ chmod +x pcc-apply-permissions.sh
+
[source]
----
apply pcc-apply-permissions.sh <OCI-Compartment>
apply ./pcc-apply-permissions.sh <OCI-Compartment>
----

. Verify that the changed statements for the policy are correct and enter `y` to continue.
Expand Down
2 changes: 1 addition & 1 deletion docs/en/compute-edition/33/admin-guide/tools/twistcli.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -201,7 +201,7 @@ The following table highlights where functions are disabled, or work differently
|Yes
|Yes

|`pcf`
|`tas`
|`scan`
|Yes
|No
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -142,7 +142,7 @@ chmod +x pcc-apply-permissions.sh
+
[source]
----
apply pcc-apply-permissions.sh <OCI-Compartment>
apply ./pcc-apply-permissions.sh <OCI-Compartment>
----

. Verify that the changed statements for the policy are correct and enter `y` to continue.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -23,10 +23,6 @@ This document summarizes all the runtime audits (detections) that are available
|
|Containers

|<process> launched and is identified as a process used for port scanning
|xref:incident-types/port-scanning.adoc[Port scanning]
|Containers

|Explicitly Denied Process
|Indicates that a process listed in the *Denied & fallback* list was spawned.

Expand Down Expand Up @@ -257,12 +253,6 @@ Containers
|
Containers

|Port scanning
|Indicates a process was spawned, that is identified as being used for port scanning.

* Enable and disable this detection through the *Port scanning* effects, under the Container runtime rule for Networking.
* Avoid audits on specific known and allowed processes, by adding process names to the runtime rule processes *Allowed* list.

|Explicitly Denied IP
|Indicates that access to an IP address listed in the *Denied & fallback* list was detected.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -176,7 +176,7 @@ The following table highlights where functions are disabled, or work differently
|Yes
|Yes

|`pcf`
|`tas`
|`scan`
|Yes
|No
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -59,6 +59,8 @@ image::runtime-security/api-def-scan-list.png[]
+
You can also filter the API definition files by using the scan date, import source, or file name.

Note: In case of any internal server errors, validate the API definition file for structural issues and upload it again.

[.task]
=== View API Definition Scan Report Details

Expand Down
Loading