Skip to content

Commit ac10d68

Browse files
author
ci.datadog-api-spec
committed
Regenerate client from commit cfbf5cd of spec repo
1 parent 1173408 commit ac10d68

File tree

7 files changed

+56
-7
lines changed

7 files changed

+56
-7
lines changed

.generator/schemas/v2/openapi.yaml

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46982,6 +46982,14 @@ components:
4698246982
the queries to search signals in the signal explorer.
4698346983
example: env:staging status:low
4698446984
type: string
46985+
tags:
46986+
description: List of tags associated with the suppression rule.
46987+
example:
46988+
- technique:T1110-brute-force
46989+
- source:cloudtrail
46990+
items:
46991+
type: string
46992+
type: array
4698546993
update_date:
4698646994
description: A Unix millisecond timestamp given the update date of the suppression
4698746995
rule.
@@ -47043,6 +47051,14 @@ components:
4704347051
same syntax as the queries to search signals in the Signals Explorer.
4704447052
example: env:staging status:low
4704547053
type: string
47054+
tags:
47055+
description: List of tags associated with the suppression rule.
47056+
example:
47057+
- technique:T1110-brute-force
47058+
- source:cloudtrail
47059+
items:
47060+
type: string
47061+
type: array
4704647062
required:
4704747063
- name
4704847064
- enabled
@@ -47138,6 +47154,14 @@ components:
4713847154
the queries to search signals in the signal explorer.
4713947155
example: env:staging status:low
4714047156
type: string
47157+
tags:
47158+
description: List of tags associated with the suppression rule.
47159+
example:
47160+
- technique:T1110-brute-force
47161+
- source:cloudtrail
47162+
items:
47163+
type: string
47164+
type: array
4714147165
version:
4714247166
description: The current version of the suppression. This is optional, but
4714347167
it can help prevent concurrent modifications.

examples/v2/security-monitoring/CreateSecurityMonitoringSuppression.ts

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@ const params: v2.SecurityMonitoringApiCreateSecurityMonitoringSuppressionRequest
2020
name: "Example-Security-Monitoring",
2121
ruleQuery: "type:log_detection source:cloudtrail",
2222
suppressionQuery: "env:staging status:low",
23+
tags: ["technique:T1110-brute-force", "source:cloudtrail"],
2324
},
2425
type: "suppressions",
2526
},

features/v2/given.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -967,7 +967,7 @@
967967
"parameters": [
968968
{
969969
"name": "body",
970-
"value": "{\n \"data\": {\n \"type\": \"suppressions\",\n \"attributes\": {\n \"enabled\": true,\n \"name\": \"{{ unique }}\",\n \"description\": \"{{ unique }}\",\n \"rule_query\": \"source:cloudtrail\",\n \"suppression_query\": \"env:test\"\n }\n }\n}"
970+
"value": "{\n \"data\": {\n \"type\": \"suppressions\",\n \"attributes\": {\n \"enabled\": true,\n \"name\": \"{{ unique }}\",\n \"description\": \"{{ unique }}\",\n \"rule_query\": \"source:cloudtrail\",\n \"suppression_query\": \"env:test\",\n \"tags\": [\"technique:T1110-brute-force\", \"source:cloudtrail\"]\n }\n }\n}"
971971
}
972972
],
973973
"step": "there is a valid \"suppression\" in the system",

features/v2/security_monitoring.feature

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -376,21 +376,21 @@ Feature: Security Monitoring
376376
@generated @skip @team:DataDog/k9-cloud-security-platform
377377
Scenario: Create a suppression rule returns "Bad Request" response
378378
Given new "CreateSecurityMonitoringSuppression" request
379-
And body with value {"data": {"attributes": {"data_exclusion_query": "source:cloudtrail account_id:12345", "description": "This rule suppresses low-severity signals in staging environments.", "enabled": true, "expiration_date": 1703187336000, "name": "Custom suppression", "rule_query": "type:log_detection source:cloudtrail", "start_date": 1703187336000, "suppression_query": "env:staging status:low"}, "type": "suppressions"}}
379+
And body with value {"data": {"attributes": {"data_exclusion_query": "source:cloudtrail account_id:12345", "description": "This rule suppresses low-severity signals in staging environments.", "enabled": true, "expiration_date": 1703187336000, "name": "Custom suppression", "rule_query": "type:log_detection source:cloudtrail", "start_date": 1703187336000, "suppression_query": "env:staging status:low", "tags": ["technique:T1110-brute-force", "source:cloudtrail"]}, "type": "suppressions"}}
380380
When the request is sent
381381
Then the response status is 400 Bad Request
382382

383383
@generated @skip @team:DataDog/k9-cloud-security-platform
384384
Scenario: Create a suppression rule returns "Conflict" response
385385
Given new "CreateSecurityMonitoringSuppression" request
386-
And body with value {"data": {"attributes": {"data_exclusion_query": "source:cloudtrail account_id:12345", "description": "This rule suppresses low-severity signals in staging environments.", "enabled": true, "expiration_date": 1703187336000, "name": "Custom suppression", "rule_query": "type:log_detection source:cloudtrail", "start_date": 1703187336000, "suppression_query": "env:staging status:low"}, "type": "suppressions"}}
386+
And body with value {"data": {"attributes": {"data_exclusion_query": "source:cloudtrail account_id:12345", "description": "This rule suppresses low-severity signals in staging environments.", "enabled": true, "expiration_date": 1703187336000, "name": "Custom suppression", "rule_query": "type:log_detection source:cloudtrail", "start_date": 1703187336000, "suppression_query": "env:staging status:low", "tags": ["technique:T1110-brute-force", "source:cloudtrail"]}, "type": "suppressions"}}
387387
When the request is sent
388388
Then the response status is 409 Conflict
389389

390390
@skip-validation @team:DataDog/k9-cloud-security-platform
391391
Scenario: Create a suppression rule returns "OK" response
392392
Given new "CreateSecurityMonitoringSuppression" request
393-
And body with value {"data": {"attributes": {"description": "This rule suppresses low-severity signals in staging environments.", "enabled": true, "start_date": {{ timestamp('now + 10d') }}000, "expiration_date": {{ timestamp('now + 21d') }}000, "name": "{{ unique }}", "rule_query": "type:log_detection source:cloudtrail", "suppression_query": "env:staging status:low"}, "type": "suppressions"}}
393+
And body with value {"data": {"attributes": {"description": "This rule suppresses low-severity signals in staging environments.", "enabled": true, "start_date": {{ timestamp('now + 10d') }}000, "expiration_date": {{ timestamp('now + 21d') }}000, "name": "{{ unique }}", "rule_query": "type:log_detection source:cloudtrail", "suppression_query": "env:staging status:low", "tags": ["technique:T1110-brute-force", "source:cloudtrail"]}, "type": "suppressions"}}
394394
When the request is sent
395395
Then the response status is 200 OK
396396
And the response "data.type" is equal to "suppressions"
@@ -1474,23 +1474,23 @@ Feature: Security Monitoring
14741474
Scenario: Update a suppression rule returns "Bad Request" response
14751475
Given new "UpdateSecurityMonitoringSuppression" request
14761476
And request contains "suppression_id" parameter from "REPLACE.ME"
1477-
And body with value {"data": {"attributes": {"data_exclusion_query": "source:cloudtrail account_id:12345", "description": "This rule suppresses low-severity signals in staging environments.", "enabled": true, "expiration_date": 1703187336000, "name": "Custom suppression", "rule_query": "type:log_detection source:cloudtrail", "start_date": 1703187336000, "suppression_query": "env:staging status:low"}, "type": "suppressions"}}
1477+
And body with value {"data": {"attributes": {"data_exclusion_query": "source:cloudtrail account_id:12345", "description": "This rule suppresses low-severity signals in staging environments.", "enabled": true, "expiration_date": 1703187336000, "name": "Custom suppression", "rule_query": "type:log_detection source:cloudtrail", "start_date": 1703187336000, "suppression_query": "env:staging status:low", "tags": ["technique:T1110-brute-force", "source:cloudtrail"]}, "type": "suppressions"}}
14781478
When the request is sent
14791479
Then the response status is 400 Bad Request
14801480

14811481
@generated @skip @team:DataDog/k9-cloud-security-platform
14821482
Scenario: Update a suppression rule returns "Concurrent Modification" response
14831483
Given new "UpdateSecurityMonitoringSuppression" request
14841484
And request contains "suppression_id" parameter from "REPLACE.ME"
1485-
And body with value {"data": {"attributes": {"data_exclusion_query": "source:cloudtrail account_id:12345", "description": "This rule suppresses low-severity signals in staging environments.", "enabled": true, "expiration_date": 1703187336000, "name": "Custom suppression", "rule_query": "type:log_detection source:cloudtrail", "start_date": 1703187336000, "suppression_query": "env:staging status:low"}, "type": "suppressions"}}
1485+
And body with value {"data": {"attributes": {"data_exclusion_query": "source:cloudtrail account_id:12345", "description": "This rule suppresses low-severity signals in staging environments.", "enabled": true, "expiration_date": 1703187336000, "name": "Custom suppression", "rule_query": "type:log_detection source:cloudtrail", "start_date": 1703187336000, "suppression_query": "env:staging status:low", "tags": ["technique:T1110-brute-force", "source:cloudtrail"]}, "type": "suppressions"}}
14861486
When the request is sent
14871487
Then the response status is 409 Concurrent Modification
14881488

14891489
@generated @skip @team:DataDog/k9-cloud-security-platform
14901490
Scenario: Update a suppression rule returns "Not Found" response
14911491
Given new "UpdateSecurityMonitoringSuppression" request
14921492
And request contains "suppression_id" parameter from "REPLACE.ME"
1493-
And body with value {"data": {"attributes": {"data_exclusion_query": "source:cloudtrail account_id:12345", "description": "This rule suppresses low-severity signals in staging environments.", "enabled": true, "expiration_date": 1703187336000, "name": "Custom suppression", "rule_query": "type:log_detection source:cloudtrail", "start_date": 1703187336000, "suppression_query": "env:staging status:low"}, "type": "suppressions"}}
1493+
And body with value {"data": {"attributes": {"data_exclusion_query": "source:cloudtrail account_id:12345", "description": "This rule suppresses low-severity signals in staging environments.", "enabled": true, "expiration_date": 1703187336000, "name": "Custom suppression", "rule_query": "type:log_detection source:cloudtrail", "start_date": 1703187336000, "suppression_query": "env:staging status:low", "tags": ["technique:T1110-brute-force", "source:cloudtrail"]}, "type": "suppressions"}}
14941494
When the request is sent
14951495
Then the response status is 404 Not Found
14961496

packages/datadog-api-client-v2/models/SecurityMonitoringSuppressionAttributes.ts

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,10 @@ export class SecurityMonitoringSuppressionAttributes {
5555
* The suppression query of the suppression rule. If a signal matches this query, it is suppressed and not triggered. Same syntax as the queries to search signals in the signal explorer.
5656
*/
5757
"suppressionQuery"?: string;
58+
/**
59+
* List of tags associated with the suppression rule.
60+
*/
61+
"tags"?: Array<string>;
5862
/**
5963
* A Unix millisecond timestamp given the update date of the suppression rule.
6064
*/
@@ -131,6 +135,10 @@ export class SecurityMonitoringSuppressionAttributes {
131135
baseName: "suppression_query",
132136
type: "string",
133137
},
138+
tags: {
139+
baseName: "tags",
140+
type: "Array<string>",
141+
},
134142
updateDate: {
135143
baseName: "update_date",
136144
type: "number",

packages/datadog-api-client-v2/models/SecurityMonitoringSuppressionCreateAttributes.ts

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,10 @@ export class SecurityMonitoringSuppressionCreateAttributes {
4242
* The suppression query of the suppression rule. If a signal matches this query, it is suppressed and is not triggered. It uses the same syntax as the queries to search signals in the Signals Explorer.
4343
*/
4444
"suppressionQuery"?: string;
45+
/**
46+
* List of tags associated with the suppression rule.
47+
*/
48+
"tags"?: Array<string>;
4549

4650
/**
4751
* A container for additional, undeclared properties.
@@ -96,6 +100,10 @@ export class SecurityMonitoringSuppressionCreateAttributes {
96100
baseName: "suppression_query",
97101
type: "string",
98102
},
103+
tags: {
104+
baseName: "tags",
105+
type: "Array<string>",
106+
},
99107
additionalProperties: {
100108
baseName: "additionalProperties",
101109
type: "{ [key: string]: any; }",

packages/datadog-api-client-v2/models/SecurityMonitoringSuppressionUpdateAttributes.ts

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,10 @@ export class SecurityMonitoringSuppressionUpdateAttributes {
4242
* The suppression query of the suppression rule. If a signal matches this query, it is suppressed and not triggered. Same syntax as the queries to search signals in the signal explorer.
4343
*/
4444
"suppressionQuery"?: string;
45+
/**
46+
* List of tags associated with the suppression rule.
47+
*/
48+
"tags"?: Array<string>;
4549
/**
4650
* The current version of the suppression. This is optional, but it can help prevent concurrent modifications.
4751
*/
@@ -97,6 +101,10 @@ export class SecurityMonitoringSuppressionUpdateAttributes {
97101
baseName: "suppression_query",
98102
type: "string",
99103
},
104+
tags: {
105+
baseName: "tags",
106+
type: "Array<string>",
107+
},
100108
version: {
101109
baseName: "version",
102110
type: "number",

0 commit comments

Comments
 (0)