# Vulnerabilities

This is a simple module that supports listing existing Vulnerabilities

## Example Syntax

```yaml

    - name: List Vulnerabilities
        registry_vulnerability_info:
            registry: "RegistryName"
            repository: "repositoryName"
            arifact: "<arifact_digest>"
        register: vulnerabilities_response


    - name: Show Vulnerabilities
        debug:
            var: vulnerabilities_response.result

```

&#x20;

&#x20;

## Returned object

```json
{
    "href": "<base_api>/registries/0d6fd999-9bf9-462c-a148-951198ebca8f/repositories/image-test/artifacts/<digest>",
    "id": "vulnerabilities",
    "items": [
        {
            "href": "<base_api>/vulnerabilities/<ID>",
            "id": "<ID>",
            "metadata": {
                "publishedAt": "<datetime>",
                "updatedAt": "<datetime>"
            },
            "properties": {
                "affects": [
                    {
                        "name": "libc-bin",
                        "type": "deb",
                        "version": "2.31-0ubuntu9.2"
                    },
                    {
                        "name": "libc6",
                        "type": "deb",
                        "version": "2.31-0ubuntu9.2"
                    }
                ],
                "dataSource": {
                    "id": null,
                    "url": null
                },
                "description": "<description>",
                "fixable": true,
                "recommendations": "<recommendations>",
                "references": [
                    "<references>"
                ],
                "score": 2.5,
                "severity": "medium"
            },
            "type": "vulnerability"
        }
    ],
    "limit": 100,
    "links": {
        "next": null,
        "prev": null,
        "varSelf": "<base_api>/registries/0d6fd999-9bf9-462c-a148-951198ebca8f/repositories/image-test/artifacts/<digest>?limit=100&offset=100&orderBy=-score"
    },
    "offset": 0,
    "type": "collection"
}

```

&#x20;

### For more examples please check out the tests [here](https://github.com/ionos-cloud/module-ansible/tree/master/tests/container-registry).

&#x20;

### Available parameters:

&#x20;

<table data-full-width="true"><thead><tr><th>Name</th><th align="center">Required</th><th>Description</th></tr></thead><tbody><tr><td>registry<br><mark style="color:blue;">str</mark></td><td align="center">True</td><td>The ID or name of an existing Registry.</td></tr><tr><td>repository<br><mark style="color:blue;">str</mark></td><td align="center">True</td><td>The name of an existing Repository.</td></tr><tr><td>artifact<br><mark style="color:blue;">str</mark></td><td align="center">True</td><td>The digest of an existing Artifact.</td></tr><tr><td>filters<br><mark style="color:blue;">dict</mark></td><td align="center">False</td><td>Filter that can be used to list only objects which have a certain set of properties. Filters should be a dict with a key containing keys and value pair in the following format: 'properties.name': 'server_name'</td></tr><tr><td>api_url<br><mark style="color:blue;">str</mark></td><td align="center">False</td><td>The Ionos API base URL.</td></tr><tr><td>certificate_fingerprint<br><mark style="color:blue;">str</mark></td><td align="center">False</td><td>The Ionos API certificate fingerprint.</td></tr><tr><td>username<br><mark style="color:blue;">str</mark></td><td align="center">False</td><td>The Ionos username. Overrides the IONOS_USERNAME environment variable.</td></tr><tr><td>password<br><mark style="color:blue;">str</mark></td><td align="center">False</td><td>The Ionos password. Overrides the IONOS_PASSWORD environment variable.</td></tr><tr><td>token<br><mark style="color:blue;">str</mark></td><td align="center">False</td><td>The Ionos token. Overrides the IONOS_TOKEN environment variable.</td></tr></tbody></table>
