Delete a list of vulnerabilities that can be automatically fixed. After the list is deleted, you can not select the list when you create a vulnerability fixing task on the Playbook page.
Debugging
Authorization information
There is currently no authorization information disclosed in the API.
Request parameters
Parameter | Type | Required | Description | Example |
---|---|---|---|---|
Type | string | No | The type of the vulnerability. Valid values:
| cve |
AliasName | string | No | The alias of the vulnerability. | RHSA-2017:0184-Important: mysql security update |
ConfigIdList | array | No | The configuration ID of the vulnerability. You can call the ListVulAutoRepairConfig operation to query the configuration IDs of the vulnerability. | |
long | No | The configuration ID of the vulnerability. | 1 |
Response parameters
Examples
Sample success responses
JSON
format
{
"RequestId": "3956048F-9D73-5EDB-834B-4827BB48****"
}
Error codes
HTTP status code | Error code | Error message | Description |
---|---|---|---|
400 | InnerError | InnerError | - |
403 | NoPermission | caller has no permission | You are not authorized to do this operation. |
500 | ServerError | ServerError | - |
For a list of error codes, visit the Service error codes.