import { Command as $Command } from "@smithy/smithy-client"; import { MetadataBearer as __MetadataBearer } from "@smithy/types"; import { UpdatePatchBaselineRequest, UpdatePatchBaselineResult } from "../models/models_2"; import { ServiceInputTypes, ServiceOutputTypes, SSMClientResolvedConfig } from "../SSMClient"; /** * @public */ export type { __MetadataBearer }; export { $Command }; /** * @public * * The input for {@link UpdatePatchBaselineCommand}. */ export interface UpdatePatchBaselineCommandInput extends UpdatePatchBaselineRequest { } /** * @public * * The output of {@link UpdatePatchBaselineCommand}. */ export interface UpdatePatchBaselineCommandOutput extends UpdatePatchBaselineResult, __MetadataBearer { } declare const UpdatePatchBaselineCommand_base: { new (input: UpdatePatchBaselineCommandInput): import("@smithy/smithy-client").CommandImpl; new (input: UpdatePatchBaselineCommandInput): import("@smithy/smithy-client").CommandImpl; getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions; }; /** *

Modifies an existing patch baseline. Fields not specified in the request are left * unchanged.

* *

For information about valid key-value pairs in PatchFilters for each supported * operating system type, see PatchFilter.

*
* @example * Use a bare-bones client and the command you need to make an API call. * ```javascript * import { SSMClient, UpdatePatchBaselineCommand } from "@aws-sdk/client-ssm"; // ES Modules import * // const { SSMClient, UpdatePatchBaselineCommand } = require("@aws-sdk/client-ssm"); // CommonJS import * const client = new SSMClient(config); * const input = { // UpdatePatchBaselineRequest * BaselineId: "STRING_VALUE", // required * Name: "STRING_VALUE", * GlobalFilters: { // PatchFilterGroup * PatchFilters: [ // PatchFilterList // required * { // PatchFilter * Key: "ARCH" || "ADVISORY_ID" || "BUGZILLA_ID" || "PATCH_SET" || "PRODUCT" || "PRODUCT_FAMILY" || "CLASSIFICATION" || "CVE_ID" || "EPOCH" || "MSRC_SEVERITY" || "NAME" || "PATCH_ID" || "SECTION" || "PRIORITY" || "REPOSITORY" || "RELEASE" || "SEVERITY" || "SECURITY" || "VERSION", // required * Values: [ // PatchFilterValueList // required * "STRING_VALUE", * ], * }, * ], * }, * ApprovalRules: { // PatchRuleGroup * PatchRules: [ // PatchRuleList // required * { // PatchRule * PatchFilterGroup: { * PatchFilters: [ // required * { * Key: "ARCH" || "ADVISORY_ID" || "BUGZILLA_ID" || "PATCH_SET" || "PRODUCT" || "PRODUCT_FAMILY" || "CLASSIFICATION" || "CVE_ID" || "EPOCH" || "MSRC_SEVERITY" || "NAME" || "PATCH_ID" || "SECTION" || "PRIORITY" || "REPOSITORY" || "RELEASE" || "SEVERITY" || "SECURITY" || "VERSION", // required * Values: [ // required * "STRING_VALUE", * ], * }, * ], * }, * ComplianceLevel: "CRITICAL" || "HIGH" || "MEDIUM" || "LOW" || "INFORMATIONAL" || "UNSPECIFIED", * ApproveAfterDays: Number("int"), * ApproveUntilDate: "STRING_VALUE", * EnableNonSecurity: true || false, * }, * ], * }, * ApprovedPatches: [ // PatchIdList * "STRING_VALUE", * ], * ApprovedPatchesComplianceLevel: "CRITICAL" || "HIGH" || "MEDIUM" || "LOW" || "INFORMATIONAL" || "UNSPECIFIED", * ApprovedPatchesEnableNonSecurity: true || false, * RejectedPatches: [ * "STRING_VALUE", * ], * RejectedPatchesAction: "ALLOW_AS_DEPENDENCY" || "BLOCK", * Description: "STRING_VALUE", * Sources: [ // PatchSourceList * { // PatchSource * Name: "STRING_VALUE", // required * Products: [ // PatchSourceProductList // required * "STRING_VALUE", * ], * Configuration: "STRING_VALUE", // required * }, * ], * AvailableSecurityUpdatesComplianceStatus: "COMPLIANT" || "NON_COMPLIANT", * Replace: true || false, * }; * const command = new UpdatePatchBaselineCommand(input); * const response = await client.send(command); * // { // UpdatePatchBaselineResult * // BaselineId: "STRING_VALUE", * // Name: "STRING_VALUE", * // OperatingSystem: "WINDOWS" || "AMAZON_LINUX" || "AMAZON_LINUX_2" || "AMAZON_LINUX_2022" || "UBUNTU" || "REDHAT_ENTERPRISE_LINUX" || "SUSE" || "CENTOS" || "ORACLE_LINUX" || "DEBIAN" || "MACOS" || "RASPBIAN" || "ROCKY_LINUX" || "ALMA_LINUX" || "AMAZON_LINUX_2023", * // GlobalFilters: { // PatchFilterGroup * // PatchFilters: [ // PatchFilterList // required * // { // PatchFilter * // Key: "ARCH" || "ADVISORY_ID" || "BUGZILLA_ID" || "PATCH_SET" || "PRODUCT" || "PRODUCT_FAMILY" || "CLASSIFICATION" || "CVE_ID" || "EPOCH" || "MSRC_SEVERITY" || "NAME" || "PATCH_ID" || "SECTION" || "PRIORITY" || "REPOSITORY" || "RELEASE" || "SEVERITY" || "SECURITY" || "VERSION", // required * // Values: [ // PatchFilterValueList // required * // "STRING_VALUE", * // ], * // }, * // ], * // }, * // ApprovalRules: { // PatchRuleGroup * // PatchRules: [ // PatchRuleList // required * // { // PatchRule * // PatchFilterGroup: { * // PatchFilters: [ // required * // { * // Key: "ARCH" || "ADVISORY_ID" || "BUGZILLA_ID" || "PATCH_SET" || "PRODUCT" || "PRODUCT_FAMILY" || "CLASSIFICATION" || "CVE_ID" || "EPOCH" || "MSRC_SEVERITY" || "NAME" || "PATCH_ID" || "SECTION" || "PRIORITY" || "REPOSITORY" || "RELEASE" || "SEVERITY" || "SECURITY" || "VERSION", // required * // Values: [ // required * // "STRING_VALUE", * // ], * // }, * // ], * // }, * // ComplianceLevel: "CRITICAL" || "HIGH" || "MEDIUM" || "LOW" || "INFORMATIONAL" || "UNSPECIFIED", * // ApproveAfterDays: Number("int"), * // ApproveUntilDate: "STRING_VALUE", * // EnableNonSecurity: true || false, * // }, * // ], * // }, * // ApprovedPatches: [ // PatchIdList * // "STRING_VALUE", * // ], * // ApprovedPatchesComplianceLevel: "CRITICAL" || "HIGH" || "MEDIUM" || "LOW" || "INFORMATIONAL" || "UNSPECIFIED", * // ApprovedPatchesEnableNonSecurity: true || false, * // RejectedPatches: [ * // "STRING_VALUE", * // ], * // RejectedPatchesAction: "ALLOW_AS_DEPENDENCY" || "BLOCK", * // CreatedDate: new Date("TIMESTAMP"), * // ModifiedDate: new Date("TIMESTAMP"), * // Description: "STRING_VALUE", * // Sources: [ // PatchSourceList * // { // PatchSource * // Name: "STRING_VALUE", // required * // Products: [ // PatchSourceProductList // required * // "STRING_VALUE", * // ], * // Configuration: "STRING_VALUE", // required * // }, * // ], * // AvailableSecurityUpdatesComplianceStatus: "COMPLIANT" || "NON_COMPLIANT", * // }; * * ``` * * @param UpdatePatchBaselineCommandInput - {@link UpdatePatchBaselineCommandInput} * @returns {@link UpdatePatchBaselineCommandOutput} * @see {@link UpdatePatchBaselineCommandInput} for command's `input` shape. * @see {@link UpdatePatchBaselineCommandOutput} for command's `response` shape. * @see {@link SSMClientResolvedConfig | config} for SSMClient's `config` shape. * * @throws {@link DoesNotExistException} (client fault) *

Error returned when the ID specified for a resource, such as a maintenance window or patch * baseline, doesn't exist.

*

For information about resource quotas in Amazon Web Services Systems Manager, see Systems Manager service quotas in the * Amazon Web Services General Reference.

* * @throws {@link InternalServerError} (server fault) *

An error occurred on the server side.

* * @throws {@link SSMServiceException} *

Base exception class for all service exceptions from SSM service.

* * * @public */ export declare class UpdatePatchBaselineCommand extends UpdatePatchBaselineCommand_base { /** @internal type navigation helper, not in runtime. */ protected static __types: { api: { input: UpdatePatchBaselineRequest; output: UpdatePatchBaselineResult; }; sdk: { input: UpdatePatchBaselineCommandInput; output: UpdatePatchBaselineCommandOutput; }; }; }