diff --git a/.apigentools-info b/.apigentools-info index 9b8cf60948e9..398e4de9ebe5 100644 --- a/.apigentools-info +++ b/.apigentools-info @@ -4,13 +4,13 @@ "spec_versions": { "v1": { "apigentools_version": "1.6.6", - "regenerated": "2024-05-17 20:25:17.670535", - "spec_repo_commit": "77064b00" + "regenerated": "2024-05-20 18:10:23.565068", + "spec_repo_commit": "6340fda5" }, "v2": { "apigentools_version": "1.6.6", - "regenerated": "2024-05-17 20:25:17.688122", - "spec_repo_commit": "77064b00" + "regenerated": "2024-05-20 18:10:23.583452", + "spec_repo_commit": "6340fda5" } } } \ No newline at end of file diff --git a/cassettes/features/v2/security_monitoring/Create-a-suppression-rule-returns-OK-response.frozen b/cassettes/features/v2/security_monitoring/Create-a-suppression-rule-returns-OK-response.frozen index 7acdf532429f..5ff3562b5a8b 100644 --- a/cassettes/features/v2/security_monitoring/Create-a-suppression-rule-returns-OK-response.frozen +++ b/cassettes/features/v2/security_monitoring/Create-a-suppression-rule-returns-OK-response.frozen @@ -1 +1 @@ -2024-05-10T16:34:35.792Z \ No newline at end of file +2024-05-20T17:07:03.155Z \ No newline at end of file diff --git a/cassettes/features/v2/security_monitoring/Create-a-suppression-rule-returns-OK-response.yml b/cassettes/features/v2/security_monitoring/Create-a-suppression-rule-returns-OK-response.yml index a9f2d66024c0..0930977c7280 100644 --- a/cassettes/features/v2/security_monitoring/Create-a-suppression-rule-returns-OK-response.yml +++ b/cassettes/features/v2/security_monitoring/Create-a-suppression-rule-returns-OK-response.yml @@ -1,10 +1,10 @@ http_interactions: -- recorded_at: Fri, 10 May 2024 16:34:35 GMT +- recorded_at: Mon, 20 May 2024 17:07:03 GMT request: body: encoding: UTF-8 string: '{"data":{"attributes":{"description":"This rule suppresses low-severity - signals in staging environments.","enabled":true,"expiration_date":1703187336000,"name":"Test-Create_a_suppression_rule_returns_OK_response-1715358875","rule_query":"type:log_detection + signals in staging environments.","enabled":true,"expiration_date":1718039223000,"name":"Test-Create_a_suppression_rule_returns_OK_response-1716224823","rule_query":"type:log_detection source:cloudtrail","suppression_query":"env:staging status:low"},"type":"suppressions"}}' headers: Accept: @@ -16,9 +16,9 @@ http_interactions: response: body: encoding: UTF-8 - string: '{"data":{"id":"lzo-uda-vpz","attributes":{"name":"Test-Create_a_suppression_rule_returns_OK_response-1715358875","enabled":true,"description":"This + string: '{"data":{"id":"8qj-mmz-zym","attributes":{"name":"Test-Create_a_suppression_rule_returns_OK_response-1716224823","enabled":true,"description":"This rule suppresses low-severity signals in staging environments.","rule_query":"type:log_detection - source:cloudtrail","suppression_query":"env:staging status:low","data_exclusion_query":"","expiration_date":1703187336000,"version":1,"creation_date":1715358876178,"update_date":1715358876178,"creator":{"name":null,"handle":"frog@datadoghq.com"},"updater":{"name":null,"handle":"frog@datadoghq.com"}},"type":"suppressions"}} + source:cloudtrail","suppression_query":"env:staging status:low","data_exclusion_query":"","expiration_date":1718039223000,"version":1,"creation_date":1716224823374,"update_date":1716224823374,"creator":{"name":null,"handle":"frog@datadoghq.com"},"updater":{"name":null,"handle":"frog@datadoghq.com"}},"type":"suppressions"}} ' headers: @@ -27,14 +27,14 @@ http_interactions: status: code: 200 message: OK -- recorded_at: Fri, 10 May 2024 16:34:35 GMT +- recorded_at: Mon, 20 May 2024 17:07:03 GMT request: body: null headers: Accept: - '*/*' method: DELETE - uri: https://api.datadoghq.com/api/v2/security_monitoring/configuration/suppressions/lzo-uda-vpz + uri: https://api.datadoghq.com/api/v2/security_monitoring/configuration/suppressions/8qj-mmz-zym response: body: encoding: UTF-8 diff --git a/cassettes/features/v2/security_monitoring/Create-a-suppression-rule-with-an-exclusion-query-returns-OK-response.frozen b/cassettes/features/v2/security_monitoring/Create-a-suppression-rule-with-an-exclusion-query-returns-OK-response.frozen index c75deebb166c..c745e451305a 100644 --- a/cassettes/features/v2/security_monitoring/Create-a-suppression-rule-with-an-exclusion-query-returns-OK-response.frozen +++ b/cassettes/features/v2/security_monitoring/Create-a-suppression-rule-with-an-exclusion-query-returns-OK-response.frozen @@ -1 +1 @@ -2024-05-10T16:34:36.621Z \ No newline at end of file +2024-05-20T17:07:12.131Z \ No newline at end of file diff --git a/cassettes/features/v2/security_monitoring/Create-a-suppression-rule-with-an-exclusion-query-returns-OK-response.yml b/cassettes/features/v2/security_monitoring/Create-a-suppression-rule-with-an-exclusion-query-returns-OK-response.yml index ac6b4898ce2e..bc7d65503364 100644 --- a/cassettes/features/v2/security_monitoring/Create-a-suppression-rule-with-an-exclusion-query-returns-OK-response.yml +++ b/cassettes/features/v2/security_monitoring/Create-a-suppression-rule-with-an-exclusion-query-returns-OK-response.yml @@ -1,10 +1,10 @@ http_interactions: -- recorded_at: Fri, 10 May 2024 16:34:36 GMT +- recorded_at: Mon, 20 May 2024 17:07:12 GMT request: body: encoding: UTF-8 string: '{"data":{"attributes":{"data_exclusion_query":"account_id:12345","description":"This - rule suppresses low-severity signals in staging environments.","enabled":true,"expiration_date":1703187336000,"name":"Test-Create_a_suppression_rule_with_an_exclusion_query_returns_OK_response-1715358876","rule_query":"type:log_detection + rule suppresses low-severity signals in staging environments.","enabled":true,"expiration_date":1718039232000,"name":"Test-Create_a_suppression_rule_with_an_exclusion_query_returns_OK_response-1716224832","rule_query":"type:log_detection source:cloudtrail"},"type":"suppressions"}}' headers: Accept: @@ -16,9 +16,9 @@ http_interactions: response: body: encoding: UTF-8 - string: '{"data":{"id":"ted-g18-ebn","attributes":{"name":"Test-Create_a_suppression_rule_with_an_exclusion_query_returns_OK_response-1715358876","enabled":true,"description":"This + string: '{"data":{"id":"i9m-nqb-ets","attributes":{"name":"Test-Create_a_suppression_rule_with_an_exclusion_query_returns_OK_response-1716224832","enabled":true,"description":"This rule suppresses low-severity signals in staging environments.","rule_query":"type:log_detection - source:cloudtrail","suppression_query":"","data_exclusion_query":"account_id:12345","expiration_date":1703187336000,"version":1,"creation_date":1715358876924,"update_date":1715358876924,"creator":{"name":null,"handle":"frog@datadoghq.com"},"updater":{"name":null,"handle":"frog@datadoghq.com"}},"type":"suppressions"}} + source:cloudtrail","suppression_query":"","data_exclusion_query":"account_id:12345","expiration_date":1718039232000,"version":1,"creation_date":1716224832354,"update_date":1716224832355,"creator":{"name":null,"handle":"frog@datadoghq.com"},"updater":{"name":null,"handle":"frog@datadoghq.com"}},"type":"suppressions"}} ' headers: @@ -27,14 +27,14 @@ http_interactions: status: code: 200 message: OK -- recorded_at: Fri, 10 May 2024 16:34:36 GMT +- recorded_at: Mon, 20 May 2024 17:07:12 GMT request: body: null headers: Accept: - '*/*' method: DELETE - uri: https://api.datadoghq.com/api/v2/security_monitoring/configuration/suppressions/ted-g18-ebn + uri: https://api.datadoghq.com/api/v2/security_monitoring/configuration/suppressions/i9m-nqb-ets response: body: encoding: UTF-8 diff --git a/examples/v2/security-monitoring/CreateSecurityMonitoringSuppression.rb b/examples/v2/security-monitoring/CreateSecurityMonitoringSuppression.rb index 0b885fc80038..cee561939ef9 100644 --- a/examples/v2/security-monitoring/CreateSecurityMonitoringSuppression.rb +++ b/examples/v2/security-monitoring/CreateSecurityMonitoringSuppression.rb @@ -8,7 +8,7 @@ attributes: DatadogAPIClient::V2::SecurityMonitoringSuppressionCreateAttributes.new({ description: "This rule suppresses low-severity signals in staging environments.", enabled: true, - expiration_date: 1703187336000, + expiration_date: 1638443471000, name: "Example-Security-Monitoring", rule_query: "type:log_detection source:cloudtrail", suppression_query: "env:staging status:low", diff --git a/examples/v2/security-monitoring/CreateSecurityMonitoringSuppression_3192265332.rb b/examples/v2/security-monitoring/CreateSecurityMonitoringSuppression_3192265332.rb index 1a056dc6208b..505a744b4e83 100644 --- a/examples/v2/security-monitoring/CreateSecurityMonitoringSuppression_3192265332.rb +++ b/examples/v2/security-monitoring/CreateSecurityMonitoringSuppression_3192265332.rb @@ -8,7 +8,7 @@ attributes: DatadogAPIClient::V2::SecurityMonitoringSuppressionCreateAttributes.new({ description: "This rule suppresses low-severity signals in staging environments.", enabled: true, - expiration_date: 1703187336000, + expiration_date: 1638443471000, name: "Example-Security-Monitoring", rule_query: "type:log_detection source:cloudtrail", data_exclusion_query: "account_id:12345", diff --git a/features/v1/synthetics.feature b/features/v1/synthetics.feature index 64ccdb946957..1cbc13117886 100644 --- a/features/v1/synthetics.feature +++ b/features/v1/synthetics.feature @@ -100,7 +100,7 @@ Feature: Synthetics When the request is sent Then the response status is 200 OK - @team:DataDog/synthetics-app + @replay-only @team:DataDog/synthetics-app Scenario: Create a private location returns "OK" response Given there is a valid "role" in the system And new "CreatePrivateLocation" request diff --git a/features/v2/security_monitoring.feature b/features/v2/security_monitoring.feature index ba592532d600..837998edb839 100644 --- a/features/v2/security_monitoring.feature +++ b/features/v2/security_monitoring.feature @@ -174,7 +174,7 @@ Feature: Security Monitoring @skip-validation @team:DataDog/k9-cloud-security-platform Scenario: Create a suppression rule returns "OK" response Given new "CreateSecurityMonitoringSuppression" request - And body with value {"data": {"attributes": {"description": "This rule suppresses low-severity signals in staging environments.", "enabled": true, "expiration_date": 1703187336000, "name": "{{ unique }}", "rule_query": "type:log_detection source:cloudtrail", "suppression_query": "env:staging status:low"}, "type": "suppressions"}} + And body with value {"data": {"attributes": {"description": "This rule suppresses low-severity signals in staging environments.", "enabled": true, "expiration_date": {{ timestamp('now + 21d') }}000, "name": "{{ unique }}", "rule_query": "type:log_detection source:cloudtrail", "suppression_query": "env:staging status:low"}, "type": "suppressions"}} When the request is sent Then the response status is 200 OK And the response "data.type" is equal to "suppressions" @@ -184,7 +184,7 @@ Feature: Security Monitoring @skip-validation @team:DataDog/k9-cloud-security-platform Scenario: Create a suppression rule with an exclusion query returns "OK" response Given new "CreateSecurityMonitoringSuppression" request - And body with value {"data": {"attributes": {"description": "This rule suppresses low-severity signals in staging environments.", "enabled": true, "expiration_date": 1703187336000, "name": "{{ unique }}", "rule_query": "type:log_detection source:cloudtrail", "data_exclusion_query": "account_id:12345"}, "type": "suppressions"}} + And body with value {"data": {"attributes": {"description": "This rule suppresses low-severity signals in staging environments.", "enabled": true, "expiration_date": {{ timestamp('now + 21d') }}000, "name": "{{ unique }}", "rule_query": "type:log_detection source:cloudtrail", "data_exclusion_query": "account_id:12345"}, "type": "suppressions"}} When the request is sent Then the response status is 200 OK And the response "data.type" is equal to "suppressions"