Skip to content

/AWS1/IF_GDY=>LISTMALWARESCANS()

About ListMalwareScans

Returns a list of malware scans. Each member account can view the malware scans for their own accounts. An administrator can view the malware scans for all of its members' accounts.

Method Signature

METHODS /AWS1/IF_GDY~LISTMALWARESCANS
  IMPORTING
    !IV_MAXRESULTS TYPE /AWS1/GDYMAXRESULTS OPTIONAL
    !IV_NEXTTOKEN TYPE /AWS1/GDYSTRING OPTIONAL
    !IO_FILTERCRITERIA TYPE REF TO /AWS1/CL_GDYLSTMALWARESCANSF00 OPTIONAL
    !IO_SORTCRITERIA TYPE REF TO /AWS1/CL_GDYSORTCRITERIA OPTIONAL
  RETURNING
    VALUE(OO_OUTPUT) TYPE REF TO /aws1/cl_gdylstmalwarescansrsp
  RAISING
    /AWS1/CX_GDYBADREQUESTEX
    /AWS1/CX_GDYINTERNALSERVERER00
    /AWS1/CX_GDYCLIENTEXC
    /AWS1/CX_GDYSERVEREXC
    /AWS1/CX_RT_TECHNICAL_GENERIC
    /AWS1/CX_RT_SERVICE_GENERIC.

IMPORTING

Optional arguments:

iv_maxresults TYPE /AWS1/GDYMAXRESULTS /AWS1/GDYMAXRESULTS

You can use this parameter to indicate the maximum number of items that you want in the response. The default value is 50. The maximum value is 50.

iv_nexttoken TYPE /AWS1/GDYSTRING /AWS1/GDYSTRING

You can use this parameter when paginating results. Set the value of this parameter to null on your first call to the list action. For subsequent calls to the action, fill nextToken in the request with the value of NextToken from the previous response to continue listing results.

io_filtercriteria TYPE REF TO /AWS1/CL_GDYLSTMALWARESCANSF00 /AWS1/CL_GDYLSTMALWARESCANSF00

Represents the criteria used to filter the malware scan entries.

io_sortcriteria TYPE REF TO /AWS1/CL_GDYSORTCRITERIA /AWS1/CL_GDYSORTCRITERIA

Represents the criteria used for sorting malware scan entries.

RETURNING

oo_output TYPE REF TO /aws1/cl_gdylstmalwarescansrsp /AWS1/CL_GDYLSTMALWARESCANSRSP

Domain /AWS1/RT_ACCOUNT_ID
Primitive Type NUMC

Examples

Syntax Example

This is an example of the syntax for calling the method. It includes every possible argument and initializes every possible value. The data provided is not necessarily semantically accurate (for example the value "string" may be provided for something that is intended to be an instance ID, or in some cases two arguments may be mutually exclusive). The syntax shows the ABAP syntax for creating the various data structures.

DATA(lo_result) = lo_client->listmalwarescans(
  io_filtercriteria = new /aws1/cl_gdylstmalwarescansf00(
    it_lstmalwarescansfiltcrit00 = VALUE /aws1/cl_gdylstmalwarescansf01=>tt_lstmalwarescansfiltcriter00(
      (
        new /aws1/cl_gdylstmalwarescansf01(
          io_filtercondition = new /aws1/cl_gdyfiltercondition(
            iv_equalsvalue = |string|
            iv_greaterthan = 123
            iv_lessthan = 123
          )
          iv_lstmalwarescanscriterio00 = |string|
        )
      )
    )
  )
  io_sortcriteria = new /aws1/cl_gdysortcriteria(
    iv_attributename = |string|
    iv_orderby = |string|
  )
  iv_maxresults = 123
  iv_nexttoken = |string|
).

This is an example of reading all possible response values

lo_result = lo_result.
IF lo_result IS NOT INITIAL.
  LOOP AT lo_result->get_scans( ) into lo_row.
    lo_row_1 = lo_row.
    IF lo_row_1 IS NOT INITIAL.
      lv_nonemptystring = lo_row_1->get_resourcearn( ).
      lv_malwareprotectionresour = lo_row_1->get_resourcetype( ).
      lv_nonemptystring = lo_row_1->get_scanid( ).
      lv_malwareprotectionscanst = lo_row_1->get_scanstatus( ).
      lv_scanresultstatus = lo_row_1->get_scanresultstatus( ).
      lv_malwareprotectionscanty = lo_row_1->get_scantype( ).
      lv_timestamp = lo_row_1->get_scanstartedat( ).
      lv_timestamp = lo_row_1->get_scancompletedat( ).
    ENDIF.
  ENDLOOP.
  lv_string = lo_result->get_nexttoken( ).
ENDIF.