Skip to content

Commit

Permalink
Regenerate client from commit 3b9e60ec of spec repo
Browse files Browse the repository at this point in the history
  • Loading branch information
ci.datadog-api-spec committed Jan 31, 2025
1 parent 85bfe0b commit e2dd98d
Show file tree
Hide file tree
Showing 16 changed files with 24 additions and 46 deletions.
8 changes: 4 additions & 4 deletions .apigentools-info
Original file line number Diff line number Diff line change
Expand Up @@ -4,13 +4,13 @@
"spec_versions": {
"v1": {
"apigentools_version": "1.6.6",
"regenerated": "2025-01-30 13:13:54.596747",
"spec_repo_commit": "833109b8"
"regenerated": "2025-01-31 13:32:57.286255",
"spec_repo_commit": "3b9e60ec"
},
"v2": {
"apigentools_version": "1.6.6",
"regenerated": "2025-01-30 13:13:54.612098",
"spec_repo_commit": "833109b8"
"regenerated": "2025-01-31 13:32:57.301012",
"spec_repo_commit": "3b9e60ec"
}
}
}
9 changes: 0 additions & 9 deletions .generator/schemas/v2/openapi.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -43595,9 +43595,6 @@ paths:
summary: List vulnerable assets
tags:
- Security Monitoring
x-unstable: '**Note**: This endpoint is a private preview.

If you are interested in accessing this API, please [fill out this form](https://forms.gle/kMYC1sDr6WDUBDsx9).'
/api/v2/security/cloud_workload/policy/download:
get:
description: 'The download endpoint generates a Cloud Workload Security policy
Expand Down Expand Up @@ -43690,9 +43687,6 @@ paths:
summary: Get SBOM
tags:
- Security Monitoring
x-unstable: '**Note**: This endpoint is a private preview.

If you are interested in accessing this API, please [fill out this form](https://forms.gle/kMYC1sDr6WDUBDsx9).'
/api/v2/security/signals/notification_rules:
get:
description: Returns the list of notification rules for security signals.
Expand Down Expand Up @@ -44251,9 +44245,6 @@ paths:
summary: List vulnerabilities
tags:
- Security Monitoring
x-unstable: '**Note**: This endpoint is a private preview.

If you are interested in accessing this API, please [fill out this form](https://forms.gle/kMYC1sDr6WDUBDsx9).'
/api/v2/security/vulnerabilities/notification_rules:
get:
description: Returns the list of notification rules for security vulnerabilities.
Expand Down
1 change: 0 additions & 1 deletion examples/v2/security-monitoring/GetSBOM.py
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,6 @@
from datadog_api_client.v2.model.asset_type import AssetType

configuration = Configuration()
configuration.unstable_operations["get_sbom"] = True
with ApiClient(configuration) as api_client:
api_instance = SecurityMonitoringApi(api_client)
response = api_instance.get_sbom(
Expand Down
1 change: 0 additions & 1 deletion examples/v2/security-monitoring/ListVulnerabilities.py
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,6 @@
from datadog_api_client.v2.model.vulnerability_tool import VulnerabilityTool

configuration = Configuration()
configuration.unstable_operations["list_vulnerabilities"] = True
with ApiClient(configuration) as api_client:
api_instance = SecurityMonitoringApi(api_client)
response = api_instance.list_vulnerabilities(
Expand Down
1 change: 0 additions & 1 deletion examples/v2/security-monitoring/ListVulnerableAssets.py
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,6 @@
from datadog_api_client.v2.model.asset_type import AssetType

configuration = Configuration()
configuration.unstable_operations["list_vulnerable_assets"] = True
with ApiClient(configuration) as api_client:
api_instance = SecurityMonitoringApi(api_client)
response = api_instance.list_vulnerable_assets(
Expand Down
3 changes: 0 additions & 3 deletions src/datadog_api_client/configuration.py
Original file line number Diff line number Diff line change
Expand Up @@ -290,11 +290,8 @@ def __init__(
"v2.delete_historical_job": False,
"v2.get_finding": False,
"v2.get_historical_job": False,
"v2.get_sbom": False,
"v2.list_findings": False,
"v2.list_historical_jobs": False,
"v2.list_vulnerabilities": False,
"v2.list_vulnerable_assets": False,
"v2.mute_findings": False,
"v2.run_historical_job": False,
"v2.create_scorecard_outcomes_batch": False,
Expand Down
Original file line number Diff line number Diff line change
@@ -1 +1 @@
2025-01-15T14:19:46.527Z
2025-01-31T12:04:00.490Z
Original file line number Diff line number Diff line change
@@ -1 +1 @@
2025-01-17T13:12:50.575Z
2025-01-31T12:04:14.913Z

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -1 +1 @@
2024-12-19T16:15:23.508Z
2025-01-31T12:04:28.397Z
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,8 @@ interactions:
uri: https://api.datadoghq.com/api/v2/security/vulnerabilities?page%5Btoken%5D=unknown&page%5Bnumber%5D=1
response:
body:
string: '{"errors":[{"status":"404","title":"Not Found"}]}'
string: '{"errors":[{"title":"Generic Error","detail":"rpc error: code = Internal
desc = no cached result set found for queryID: unknown"}]}'
headers:
content-type:
- application/vnd.api+json
Expand Down
Original file line number Diff line number Diff line change
@@ -1 +1 @@
2024-12-19T16:15:24.088Z
2025-01-31T12:04:39.730Z
Original file line number Diff line number Diff line change
@@ -1 +1 @@
2024-12-19T16:15:24.530Z
2025-01-31T12:04:52.159Z
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,8 @@ interactions:
uri: https://api.datadoghq.com/api/v2/security/assets?page%5Btoken%5D=unknown&page%5Bnumber%5D=1
response:
body:
string: '{"errors":[{"status":"404","title":"Not Found"}]}'
string: '{"errors":[{"title":"Generic Error","detail":"rpc error: code = Internal
desc = no cached result set found for queryID: unknown"}]}'
headers:
content-type:
- application/vnd.api+json
Expand Down
Original file line number Diff line number Diff line change
@@ -1 +1 @@
2024-12-19T16:15:24.699Z
2025-01-31T12:05:04.773Z
27 changes: 9 additions & 18 deletions tests/v2/features/security_monitoring.feature
Original file line number Diff line number Diff line change
Expand Up @@ -447,26 +447,23 @@ Feature: Security Monitoring

@generated @skip @team:DataDog/asm-vm
Scenario: Get SBOM returns "Bad request: The server cannot process the request due to invalid syntax in the request." response
Given operation "GetSBOM" enabled
And new "GetSBOM" request
Given new "GetSBOM" request
And request contains "asset_type" parameter from "REPLACE.ME"
And request contains "filter[asset_name]" parameter from "REPLACE.ME"
When the request is sent
Then the response status is 400 Bad request: The server cannot process the request due to invalid syntax in the request.

@team:DataDog/asm-vm
Scenario: Get SBOM returns "Not found: asset not found" response
Given operation "GetSBOM" enabled
And new "GetSBOM" request
Given new "GetSBOM" request
And request contains "asset_type" parameter with value "Host"
And request contains "filter[asset_name]" parameter with value "unknown-host"
When the request is sent
Then the response status is 404 Not found: asset not found

@team:DataDog/asm-vm
Scenario: Get SBOM returns "OK" response
Given operation "GetSBOM" enabled
And new "GetSBOM" request
Given new "GetSBOM" request
And request contains "asset_type" parameter with value "Repository"
And request contains "filter[asset_name]" parameter with value "github.com/datadog/datadog-agent"
When the request is sent
Expand Down Expand Up @@ -783,24 +780,21 @@ Feature: Security Monitoring

@generated @skip @team:DataDog/asm-vm
Scenario: List vulnerabilities returns "Bad request: The server cannot process the request due to invalid syntax in the request." response
Given operation "ListVulnerabilities" enabled
And new "ListVulnerabilities" request
Given new "ListVulnerabilities" request
When the request is sent
Then the response status is 400 Bad request: The server cannot process the request due to invalid syntax in the request.

@team:DataDog/asm-vm
Scenario: List vulnerabilities returns "Not found: There is no request associated with the provided token." response
Given operation "ListVulnerabilities" enabled
And new "ListVulnerabilities" request
Given new "ListVulnerabilities" request
And request contains "page[token]" parameter with value "unknown"
And request contains "page[number]" parameter with value 1
When the request is sent
Then the response status is 404 Not found: There is no request associated with the provided token.

@team:DataDog/asm-vm
Scenario: List vulnerabilities returns "OK" response
Given operation "ListVulnerabilities" enabled
And new "ListVulnerabilities" request
Given new "ListVulnerabilities" request
And request contains "filter[cvss.base.severity]" parameter with value "High"
And request contains "filter[asset.type]" parameter with value "Service"
And request contains "filter[tool]" parameter with value "Infra"
Expand All @@ -809,24 +803,21 @@ Feature: Security Monitoring

@generated @skip @team:DataDog/asm-vm
Scenario: List vulnerable assets returns "Bad request: The server cannot process the request due to invalid syntax in the request." response
Given operation "ListVulnerableAssets" enabled
And new "ListVulnerableAssets" request
Given new "ListVulnerableAssets" request
When the request is sent
Then the response status is 400 Bad request: The server cannot process the request due to invalid syntax in the request.

@team:DataDog/asm-vm
Scenario: List vulnerable assets returns "Not found: There is no request associated with the provided token." response
Given operation "ListVulnerableAssets" enabled
And new "ListVulnerableAssets" request
Given new "ListVulnerableAssets" request
And request contains "page[token]" parameter with value "unknown"
And request contains "page[number]" parameter with value 1
When the request is sent
Then the response status is 404 Not found: There is no request associated with the provided token.

@team:DataDog/asm-vm
Scenario: List vulnerable assets returns "OK" response
Given operation "ListVulnerableAssets" enabled
And new "ListVulnerableAssets" request
Given new "ListVulnerableAssets" request
And request contains "filter[type]" parameter with value "Host"
And request contains "filter[repository_url]" parameter with value "github.com/datadog/dd-go"
And request contains "filter[risks.in_production]" parameter with value true
Expand Down

0 comments on commit e2dd98d

Please sign in to comment.