Queries the result of a security scan task created for an image repository.

Debugging

OpenAPI Explorer automatically calculates the signature value. For your convenience, we recommend that you call this operation in OpenAPI Explorer. OpenAPI Explorer dynamically generates the sample code of the operation for different SDKs.

Request parameters

Parameter Type Required Example Description
Action String Yes ListRepoTagScanResult

The operation that you want to perform. Set the value to ListRepoTagScanResult.

InstanceId String Yes cri-2j88dtld8yelxp6i

The ID of the Container Registry Enterprise Edition instance.

RegionId String Yes cn-shanghai

The ID of the region where the instance resides.

RepoId String Yes crr-uf082u9dg8dorp5f

The ID of the image repository.

Tag String Yes 1

The tag of the images scanned in the image repository.

ScanTaskId String No 6b0b094f-8a90-4f8f-b660-2427aed0d1fa

The ID of the security scan task.

PageNo Integer No 1

The number of the page to return.

PageSize Integer No 30

The number of entries to return on each page.

Severity String No High

The severity of vulnerabilities to query. Valid values: High, Medium, Low, and Unknown.

Response parameters

Parameter Type Example Description
Code String success

The code returned for the request.

IsSuccess Boolean true

Indicates whether the request is successful.

PageNo Integer 1

The page number of the returned page.

PageSize Integer 30

The number of entries returned per page.

RequestId String 56B5C92F-F5D9-46E0-823F-EC71D1892DAA

The ID of the request.

TotalCount Integer 196

The total number of vulnerabilities detected on images.

Vulnerabilities Array

The detected vulnerabilities.

AddedBy String sha256:123456717b8e40b6480979b739010d8d549989602bcdd07922119aec6f9dbe57

The ID of the image layer where the vulnerability was detected.

CveLink String https://security-tracker.debian.org/tracker/CVE-2009-5155

The URL of the vulnerability.

CveName String CVE-2009-5155

The name of the vulnerability.

Description String description.

The description of the vulnerability.

Feature String eglibc

The cause of the vulnerability.

Severity String Medium

The severity of the vulnerability.

Version String 2.19-6.9

The version where the vulnerability was detected.

VersionFixed String 2.19-18+deb8u5

The version where the vulnerability was fixed.

VersionFormat String dpkg

The format of the vulnerability.

Examples

Sample requests

http(s)://[Endpoint]/? Action=ListRepoTagScanResult
&InstanceId=cri-2j88dtld8yelxp6i
&RegionId=cn-shanghai
&RepoId=crr-uf082u9dg8dorp5f
&Tag=1
&<Common request parameters>

Sample success responses

XML format

<code>200</code>
<data>
    <IsSuccess>true</IsSuccess>
    <TotalCount>196</TotalCount>
    <PageSize>30</PageSize>
    <RequestId>56B5C92F-F5D9-46E0-823F-EC71D1892DAA</RequestId>
    <PageNo>1</PageNo>
    <Vulnerabilities>
        <Description>description. </Description>
        <Version>2.19-6.9</Version>
        <VersionFixed>2.19-18+deb8u5</VersionFixed>
        <VersionFormat>dpkg</VersionFormat>
        <Severity>Medium</Severity>
        <CveLink>https://security-tracker.debian.org/tracker/CVE-2009-5155</CveLink>
        <CveName>CVE-2009-5155</CveName>
        <AddedBy>sha256:123456717b8e40b6480979b739010d8d549989602bcdd07922119aec6f9dbe57</AddedBy>
        <Feature>eglibc</Feature>
    </Vulnerabilities>
    <Code>success</Code>
</data>
<requestId>56B5C92F-F5D9-46E0-823F-EC71D1892DAA</requestId>
<successResponse>true</successResponse>

JSON format

{
    "code":"200",
    "data":{
        "IsSuccess":true,
        "TotalCount":196,
        "PageSize":30,
        "RequestId":"56B5C92F-F5D9-46E0-823F-EC71D1892DAA",
        "PageNo":1,
        "Vulnerabilities":[{
                "Description":"description.",
                "Version":"2.19-6.9",
                "VersionFixed":"2.19-18+deb8u5",
                "VersionFormat":"dpkg",
                "Severity":"Medium",
                "CveLink":"https://security-tracker.debian.org/tracker/CVE-2009-5155",
                "CveName":"CVE-2009-5155",
                "AddedBy":"sha256:123456717b8e40b6480979b739010d8d549989602bcdd07922119aec6f9dbe57",
                "Feature":"eglibc"
        }],
        "Code":"success"
    },
    "requestId":"56B5C92F-F5D9-46E0-823F-EC71D1892DAA",
    "successResponse":true
}

Error codes

For a list of error codes, visit the API Error Center.