diff --git a/.apigentools-info b/.apigentools-info index ad40227d6..515115efa 100644 --- a/.apigentools-info +++ b/.apigentools-info @@ -4,13 +4,13 @@ "spec_versions": { "v1": { "apigentools_version": "1.6.6", - "regenerated": "2025-02-04 14:10:06.221297", - "spec_repo_commit": "4fb9047a" + "regenerated": "2025-02-06 16:33:54.648658", + "spec_repo_commit": "0c05948e" }, "v2": { "apigentools_version": "1.6.6", - "regenerated": "2025-02-04 14:10:06.239068", - "spec_repo_commit": "4fb9047a" + "regenerated": "2025-02-06 16:33:54.663780", + "spec_repo_commit": "0c05948e" } } } \ No newline at end of file diff --git a/.generator/schemas/v1/openapi.yaml b/.generator/schemas/v1/openapi.yaml index ad8e3b54c..2145ba7d6 100644 --- a/.generator/schemas/v1/openapi.yaml +++ b/.generator/schemas/v1/openapi.yaml @@ -14988,7 +14988,6 @@ components: - element - email - global - - javascript - text example: text type: string @@ -14996,7 +14995,6 @@ components: - ELEMENT - EMAIL - GLOBAL - - JAVASCRIPT - TEXT SyntheticsCIBatchMetadata: description: Metadata for the Synthetic tests run. diff --git a/.generator/schemas/v2/openapi.yaml b/.generator/schemas/v2/openapi.yaml index 831530e25..d5fbf684d 100644 --- a/.generator/schemas/v2/openapi.yaml +++ b/.generator/schemas/v2/openapi.yaml @@ -23184,8 +23184,7 @@ components: x-enum-varnames: - RULE RuleTypes: - description: Security rule types used to filter signals and vulnerabilities - generating notifications. + description: Security rule types used as filters in security rules. example: - misconfiguration - attack_path @@ -23193,7 +23192,7 @@ components: $ref: '#/components/schemas/RuleTypesItems' type: array RuleTypesItems: - description: 'Security rule types which can be used in notification rules. + description: 'Security rule type which can be used in security rules. Signal-based notification rules can filter signals based on rule types application_security, log_detection, @@ -44078,7 +44077,7 @@ paths: appKeyAuth: [] - AuthZ: - security_monitoring_notification_profiles_read - summary: Get the list of signal-based rules + summary: Get the list of signal-based notification rules tags: - Security Monitoring x-permission: @@ -44120,7 +44119,7 @@ paths: appKeyAuth: [] - AuthZ: - security_monitoring_notification_profiles_write - summary: Create a new signal-based rule + summary: Create a new signal-based notification rule tags: - Security Monitoring x-codegen-request-body-name: body @@ -44153,7 +44152,7 @@ paths: appKeyAuth: [] - AuthZ: - security_monitoring_notification_profiles_write - summary: Delete a signal-based rule + summary: Delete a signal-based notification rule tags: - Security Monitoring x-permission: @@ -44190,7 +44189,7 @@ paths: appKeyAuth: [] - AuthZ: - security_monitoring_notification_profiles_read - summary: Get details of a signal-based rule + summary: Get details of a signal-based notification rule tags: - Security Monitoring x-permission: @@ -44236,7 +44235,7 @@ paths: appKeyAuth: [] - AuthZ: - security_monitoring_notification_profiles_write - summary: Patch a signal-based rule + summary: Patch a signal-based notification rule tags: - Security Monitoring x-codegen-request-body-name: body @@ -44636,7 +44635,7 @@ paths: appKeyAuth: [] - AuthZ: - security_monitoring_notification_profiles_read - summary: Get the list of vulnerability-based rules + summary: Get the list of vulnerability notification rules tags: - Security Monitoring x-permission: @@ -44678,7 +44677,7 @@ paths: appKeyAuth: [] - AuthZ: - security_monitoring_notification_profiles_write - summary: Create a new vulnerability-based rule + summary: Create a new vulnerability-based notification rule tags: - Security Monitoring x-codegen-request-body-name: body @@ -44711,7 +44710,7 @@ paths: appKeyAuth: [] - AuthZ: - security_monitoring_notification_profiles_write - summary: Delete a vulnerability-based rule + summary: Delete a vulnerability-based notification rule tags: - Security Monitoring x-permission: @@ -44748,7 +44747,7 @@ paths: appKeyAuth: [] - AuthZ: - security_monitoring_notification_profiles_read - summary: Get details of a vulnerability-based rule + summary: Get details of a vulnerability notification rule tags: - Security Monitoring x-permission: @@ -44794,7 +44793,7 @@ paths: appKeyAuth: [] - AuthZ: - security_monitoring_notification_profiles_write - summary: Patch a vulnerability-based rule + summary: Patch a vulnerability-based notification rule tags: - Security Monitoring x-codegen-request-body-name: body diff --git a/examples/v2_security-monitoring_CreateSignalNotificationRule.rs b/examples/v2_security-monitoring_CreateSignalNotificationRule.rs index 849c587ab..7344deeeb 100644 --- a/examples/v2_security-monitoring_CreateSignalNotificationRule.rs +++ b/examples/v2_security-monitoring_CreateSignalNotificationRule.rs @@ -1,5 +1,5 @@ -// Create a new signal-based rule returns "Successfully created the notification -// rule." response +// Create a new signal-based notification rule returns "Successfully created the +// notification rule." response use datadog_api_client::datadog; use datadog_api_client::datadogV2::api_security_monitoring::SecurityMonitoringAPI; use datadog_api_client::datadogV2::model::CreateNotificationRuleParameters; diff --git a/examples/v2_security-monitoring_CreateVulnerabilityNotificationRule.rs b/examples/v2_security-monitoring_CreateVulnerabilityNotificationRule.rs index e0269946b..e3e2138ce 100644 --- a/examples/v2_security-monitoring_CreateVulnerabilityNotificationRule.rs +++ b/examples/v2_security-monitoring_CreateVulnerabilityNotificationRule.rs @@ -1,5 +1,5 @@ -// Create a new vulnerability-based rule returns "Successfully created the -// notification rule." response +// Create a new vulnerability-based notification rule returns "Successfully +// created the notification rule." response use datadog_api_client::datadog; use datadog_api_client::datadogV2::api_security_monitoring::SecurityMonitoringAPI; use datadog_api_client::datadogV2::model::CreateNotificationRuleParameters; diff --git a/examples/v2_security-monitoring_DeleteSignalNotificationRule.rs b/examples/v2_security-monitoring_DeleteSignalNotificationRule.rs index e5409b197..a758bf7f7 100644 --- a/examples/v2_security-monitoring_DeleteSignalNotificationRule.rs +++ b/examples/v2_security-monitoring_DeleteSignalNotificationRule.rs @@ -1,4 +1,5 @@ -// Delete a signal-based rule returns "Rule successfully deleted." response +// Delete a signal-based notification rule returns "Rule successfully deleted." +// response use datadog_api_client::datadog; use datadog_api_client::datadogV2::api_security_monitoring::SecurityMonitoringAPI; diff --git a/examples/v2_security-monitoring_DeleteVulnerabilityNotificationRule.rs b/examples/v2_security-monitoring_DeleteVulnerabilityNotificationRule.rs index 56e7aba8b..aa493dfcb 100644 --- a/examples/v2_security-monitoring_DeleteVulnerabilityNotificationRule.rs +++ b/examples/v2_security-monitoring_DeleteVulnerabilityNotificationRule.rs @@ -1,4 +1,5 @@ -// Delete a vulnerability-based rule returns "Rule successfully deleted." response +// Delete a vulnerability-based notification rule returns "Rule successfully +// deleted." response use datadog_api_client::datadog; use datadog_api_client::datadogV2::api_security_monitoring::SecurityMonitoringAPI; diff --git a/examples/v2_security-monitoring_GetSignalNotificationRule.rs b/examples/v2_security-monitoring_GetSignalNotificationRule.rs index d7e653f20..3964fe106 100644 --- a/examples/v2_security-monitoring_GetSignalNotificationRule.rs +++ b/examples/v2_security-monitoring_GetSignalNotificationRule.rs @@ -1,4 +1,5 @@ -// Get details of a signal-based rule returns "Notification rule details." response +// Get details of a signal-based notification rule returns "Notification rule +// details." response use datadog_api_client::datadog; use datadog_api_client::datadogV2::api_security_monitoring::SecurityMonitoringAPI; diff --git a/examples/v2_security-monitoring_GetSignalNotificationRules.rs b/examples/v2_security-monitoring_GetSignalNotificationRules.rs index 0c1861009..6481293d1 100644 --- a/examples/v2_security-monitoring_GetSignalNotificationRules.rs +++ b/examples/v2_security-monitoring_GetSignalNotificationRules.rs @@ -1,5 +1,5 @@ -// Get the list of signal-based rules returns "The list of notification rules." -// response +// Get the list of signal-based notification rules returns "The list of +// notification rules." response use datadog_api_client::datadog; use datadog_api_client::datadogV2::api_security_monitoring::SecurityMonitoringAPI; diff --git a/examples/v2_security-monitoring_GetVulnerabilityNotificationRule.rs b/examples/v2_security-monitoring_GetVulnerabilityNotificationRule.rs index b08c3a2d6..195f71f2c 100644 --- a/examples/v2_security-monitoring_GetVulnerabilityNotificationRule.rs +++ b/examples/v2_security-monitoring_GetVulnerabilityNotificationRule.rs @@ -1,5 +1,5 @@ -// Get details of a vulnerability-based rule returns "Notification rule details." -// response +// Get details of a vulnerability notification rule returns "Notification rule +// details." response use datadog_api_client::datadog; use datadog_api_client::datadogV2::api_security_monitoring::SecurityMonitoringAPI; diff --git a/examples/v2_security-monitoring_GetVulnerabilityNotificationRules.rs b/examples/v2_security-monitoring_GetVulnerabilityNotificationRules.rs index 7009dd73a..7d2310e5c 100644 --- a/examples/v2_security-monitoring_GetVulnerabilityNotificationRules.rs +++ b/examples/v2_security-monitoring_GetVulnerabilityNotificationRules.rs @@ -1,5 +1,5 @@ -// Get the list of vulnerability-based rules returns "The list of notification -// rules." response +// Get the list of vulnerability notification rules returns "The list of +// notification rules." response use datadog_api_client::datadog; use datadog_api_client::datadogV2::api_security_monitoring::SecurityMonitoringAPI; diff --git a/examples/v2_security-monitoring_PatchSignalNotificationRule.rs b/examples/v2_security-monitoring_PatchSignalNotificationRule.rs index d64fddb3e..ff14513ac 100644 --- a/examples/v2_security-monitoring_PatchSignalNotificationRule.rs +++ b/examples/v2_security-monitoring_PatchSignalNotificationRule.rs @@ -1,5 +1,5 @@ -// Patch a signal-based rule returns "Notification rule successfully patched." -// response +// Patch a signal-based notification rule returns "Notification rule successfully +// patched." response use datadog_api_client::datadog; use datadog_api_client::datadogV2::api_security_monitoring::SecurityMonitoringAPI; use datadog_api_client::datadogV2::model::NotificationRulesType; diff --git a/examples/v2_security-monitoring_PatchVulnerabilityNotificationRule.rs b/examples/v2_security-monitoring_PatchVulnerabilityNotificationRule.rs index 04ff64df9..26eafac47 100644 --- a/examples/v2_security-monitoring_PatchVulnerabilityNotificationRule.rs +++ b/examples/v2_security-monitoring_PatchVulnerabilityNotificationRule.rs @@ -1,5 +1,5 @@ -// Patch a vulnerability-based rule returns "Notification rule successfully -// patched." response +// Patch a vulnerability-based notification rule returns "Notification rule +// successfully patched." response use datadog_api_client::datadog; use datadog_api_client::datadogV2::api_security_monitoring::SecurityMonitoringAPI; use datadog_api_client::datadogV2::model::NotificationRulesType; diff --git a/src/datadogV1/model/model_synthetics_browser_variable_type.rs b/src/datadogV1/model/model_synthetics_browser_variable_type.rs index 759aa3549..719ed94e4 100644 --- a/src/datadogV1/model/model_synthetics_browser_variable_type.rs +++ b/src/datadogV1/model/model_synthetics_browser_variable_type.rs @@ -10,7 +10,6 @@ pub enum SyntheticsBrowserVariableType { ELEMENT, EMAIL, GLOBAL, - JAVASCRIPT, TEXT, UnparsedObject(crate::datadog::UnparsedObject), } @@ -21,7 +20,6 @@ impl ToString for SyntheticsBrowserVariableType { Self::ELEMENT => String::from("element"), Self::EMAIL => String::from("email"), Self::GLOBAL => String::from("global"), - Self::JAVASCRIPT => String::from("javascript"), Self::TEXT => String::from("text"), Self::UnparsedObject(v) => v.value.to_string(), } @@ -50,7 +48,6 @@ impl<'de> Deserialize<'de> for SyntheticsBrowserVariableType { "element" => Self::ELEMENT, "email" => Self::EMAIL, "global" => Self::GLOBAL, - "javascript" => Self::JAVASCRIPT, "text" => Self::TEXT, _ => Self::UnparsedObject(crate::datadog::UnparsedObject { value: serde_json::Value::String(s.into()), diff --git a/src/datadogV2/model/model_selectors.rs b/src/datadogV2/model/model_selectors.rs index 66c1a55af..49753593b 100644 --- a/src/datadogV2/model/model_selectors.rs +++ b/src/datadogV2/model/model_selectors.rs @@ -16,7 +16,7 @@ pub struct Selectors { /// The query is composed of one or several key:value pairs, which can be used to filter security issues on tags and attributes. #[serde(rename = "query")] pub query: Option, - /// Security rule types used to filter signals and vulnerabilities generating notifications. + /// Security rule types used as filters in security rules. #[serde(rename = "rule_types")] pub rule_types: Option>, /// The security rules severities to consider. diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Create-a-new-signal-based-notification-rule-returns-Successfully-created-the-notification-rule-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Create-a-new-signal-based-notification-rule-returns-Successfully-created-the-notification-rule-response.frozen new file mode 100644 index 000000000..594e432cb --- /dev/null +++ b/tests/scenarios/cassettes/v2/security_monitoring/Create-a-new-signal-based-notification-rule-returns-Successfully-created-the-notification-rule-response.frozen @@ -0,0 +1 @@ +2025-02-05T13:45:37.454Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Create-a-new-signal-based-rule-returns-Successfully-created-the-notification-rule-response.json b/tests/scenarios/cassettes/v2/security_monitoring/Create-a-new-signal-based-notification-rule-returns-Successfully-created-the-notification-rule-response.json similarity index 65% rename from tests/scenarios/cassettes/v2/security_monitoring/Create-a-new-signal-based-rule-returns-Successfully-created-the-notification-rule-response.json rename to tests/scenarios/cassettes/v2/security_monitoring/Create-a-new-signal-based-notification-rule-returns-Successfully-created-the-notification-rule-response.json index a0f8572a3..ce1ab58e0 100644 --- a/tests/scenarios/cassettes/v2/security_monitoring/Create-a-new-signal-based-rule-returns-Successfully-created-the-notification-rule-response.json +++ b/tests/scenarios/cassettes/v2/security_monitoring/Create-a-new-signal-based-notification-rule-returns-Successfully-created-the-notification-rule-response.json @@ -19,7 +19,7 @@ }, "response": { "body": { - "string": "{\"data\":{\"id\":\"xen-2ux-w4q\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1737628559636,\"created_by\":{\"name\":\"CI Account\",\"handle\":\"9919ec9b-ebc7-49ee-8dc8-03626e717cca\"},\"enabled\":true,\"modified_at\":1737628559636,\"modified_by\":{\"name\":\"CI Account\",\"handle\":\"9919ec9b-ebc7-49ee-8dc8-03626e717cca\"},\"name\":\"Rule 1\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"query\":\"(source:production_service OR env:prod)\",\"trigger_source\":\"security_findings\"},\"targets\":[\"@john.doe@email.com\"],\"time_aggregation\":86400,\"version\":1}}}", + "string": "{\"data\":{\"id\":\"hvb-for-lpm\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1738763137979,\"created_by\":{\"name\":\"\",\"handle\":\"\"},\"enabled\":true,\"modified_at\":1738763137979,\"modified_by\":{\"name\":\"\",\"handle\":\"\"},\"name\":\"Rule 1\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"query\":\"(source:production_service OR env:prod)\",\"trigger_source\":\"security_findings\"},\"targets\":[\"@john.doe@email.com\"],\"time_aggregation\":86400,\"version\":1}}}", "encoding": null }, "headers": { @@ -32,7 +32,7 @@ "message": "Created" } }, - "recorded_at": "Thu, 23 Jan 2025 10:35:59 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:45:37 GMT" }, { "request": { @@ -43,7 +43,7 @@ ] }, "method": "delete", - "uri": "https://api.datadoghq.com/api/v2/security/signals/notification_rules/xen-2ux-w4q" + "uri": "https://api.datadoghq.com/api/v2/security/signals/notification_rules/hvb-for-lpm" }, "response": { "body": { @@ -56,7 +56,7 @@ "message": "No Content" } }, - "recorded_at": "Thu, 23 Jan 2025 10:35:59 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:45:37 GMT" } ], "recorded_with": "VCR 6.0.0" diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Create-a-new-signal-based-rule-returns-Successfully-created-the-notification-rule-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Create-a-new-signal-based-rule-returns-Successfully-created-the-notification-rule-response.frozen deleted file mode 100644 index b05034048..000000000 --- a/tests/scenarios/cassettes/v2/security_monitoring/Create-a-new-signal-based-rule-returns-Successfully-created-the-notification-rule-response.frozen +++ /dev/null @@ -1 +0,0 @@ -2025-01-23T10:35:59.157Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Create-a-new-vulnerability-based-notification-rule-returns-Successfully-created-the-notification-rule-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Create-a-new-vulnerability-based-notification-rule-returns-Successfully-created-the-notification-rule-response.frozen new file mode 100644 index 000000000..e3138e7d6 --- /dev/null +++ b/tests/scenarios/cassettes/v2/security_monitoring/Create-a-new-vulnerability-based-notification-rule-returns-Successfully-created-the-notification-rule-response.frozen @@ -0,0 +1 @@ +2025-02-05T13:45:38.493Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Create-a-new-vulnerability-based-rule-returns-Successfully-created-the-notification-rule-response.json b/tests/scenarios/cassettes/v2/security_monitoring/Create-a-new-vulnerability-based-notification-rule-returns-Successfully-created-the-notification-rule-response.json similarity index 65% rename from tests/scenarios/cassettes/v2/security_monitoring/Create-a-new-vulnerability-based-rule-returns-Successfully-created-the-notification-rule-response.json rename to tests/scenarios/cassettes/v2/security_monitoring/Create-a-new-vulnerability-based-notification-rule-returns-Successfully-created-the-notification-rule-response.json index 8945ee691..22f0e6cfc 100644 --- a/tests/scenarios/cassettes/v2/security_monitoring/Create-a-new-vulnerability-based-rule-returns-Successfully-created-the-notification-rule-response.json +++ b/tests/scenarios/cassettes/v2/security_monitoring/Create-a-new-vulnerability-based-notification-rule-returns-Successfully-created-the-notification-rule-response.json @@ -19,7 +19,7 @@ }, "response": { "body": { - "string": "{\"data\":{\"id\":\"757-rvr-pnu\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1737628559864,\"created_by\":{\"name\":\"CI Account\",\"handle\":\"9919ec9b-ebc7-49ee-8dc8-03626e717cca\"},\"enabled\":true,\"modified_at\":1737628559864,\"modified_by\":{\"name\":\"CI Account\",\"handle\":\"9919ec9b-ebc7-49ee-8dc8-03626e717cca\"},\"name\":\"Rule 1\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"query\":\"(source:production_service OR env:prod)\",\"trigger_source\":\"security_findings\"},\"targets\":[\"@john.doe@email.com\"],\"time_aggregation\":86400,\"version\":1}}}", + "string": "{\"data\":{\"id\":\"iwz-k3b-tpk\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1738763138982,\"created_by\":{\"name\":\"\",\"handle\":\"\"},\"enabled\":true,\"modified_at\":1738763138982,\"modified_by\":{\"name\":\"\",\"handle\":\"\"},\"name\":\"Rule 1\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"query\":\"(source:production_service OR env:prod)\",\"trigger_source\":\"security_findings\"},\"targets\":[\"@john.doe@email.com\"],\"time_aggregation\":86400,\"version\":1}}}", "encoding": null }, "headers": { @@ -32,7 +32,7 @@ "message": "Created" } }, - "recorded_at": "Thu, 23 Jan 2025 10:35:59 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:45:38 GMT" }, { "request": { @@ -43,7 +43,7 @@ ] }, "method": "delete", - "uri": "https://api.datadoghq.com/api/v2/security/vulnerabilities/notification_rules/757-rvr-pnu" + "uri": "https://api.datadoghq.com/api/v2/security/vulnerabilities/notification_rules/iwz-k3b-tpk" }, "response": { "body": { @@ -56,7 +56,7 @@ "message": "No Content" } }, - "recorded_at": "Thu, 23 Jan 2025 10:35:59 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:45:38 GMT" } ], "recorded_with": "VCR 6.0.0" diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Create-a-new-vulnerability-based-rule-returns-Successfully-created-the-notification-rule-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Create-a-new-vulnerability-based-rule-returns-Successfully-created-the-notification-rule-response.frozen deleted file mode 100644 index 4df775f84..000000000 --- a/tests/scenarios/cassettes/v2/security_monitoring/Create-a-new-vulnerability-based-rule-returns-Successfully-created-the-notification-rule-response.frozen +++ /dev/null @@ -1 +0,0 @@ -2025-01-23T10:35:59.776Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-signal-based-notification-rule-returns-Not-Found-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-signal-based-notification-rule-returns-Not-Found-response.frozen new file mode 100644 index 000000000..f0d2ec714 --- /dev/null +++ b/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-signal-based-notification-rule-returns-Not-Found-response.frozen @@ -0,0 +1 @@ +2025-02-05T13:45:43.873Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-signal-based-rule-returns-Not-Found-response.json b/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-signal-based-notification-rule-returns-Not-Found-response.json similarity index 93% rename from tests/scenarios/cassettes/v2/security_monitoring/Delete-a-signal-based-rule-returns-Not-Found-response.json rename to tests/scenarios/cassettes/v2/security_monitoring/Delete-a-signal-based-notification-rule-returns-Not-Found-response.json index f39bbb3bb..8f65729a0 100644 --- a/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-signal-based-rule-returns-Not-Found-response.json +++ b/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-signal-based-notification-rule-returns-Not-Found-response.json @@ -26,7 +26,7 @@ "message": "Not Found" } }, - "recorded_at": "Wed, 22 Jan 2025 09:50:04 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:45:43 GMT" } ], "recorded_with": "VCR 6.0.0" diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-signal-based-notification-rule-returns-Rule-successfully-deleted-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-signal-based-notification-rule-returns-Rule-successfully-deleted-response.frozen new file mode 100644 index 000000000..f51e67baf --- /dev/null +++ b/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-signal-based-notification-rule-returns-Rule-successfully-deleted-response.frozen @@ -0,0 +1 @@ +2025-02-05T13:45:44.348Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-signal-based-rule-returns-Rule-successfully-deleted-response.json b/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-signal-based-notification-rule-returns-Rule-successfully-deleted-response.json similarity index 59% rename from tests/scenarios/cassettes/v2/security_monitoring/Delete-a-signal-based-rule-returns-Rule-successfully-deleted-response.json rename to tests/scenarios/cassettes/v2/security_monitoring/Delete-a-signal-based-notification-rule-returns-Rule-successfully-deleted-response.json index d0d7ddb10..cfae07050 100644 --- a/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-signal-based-rule-returns-Rule-successfully-deleted-response.json +++ b/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-signal-based-notification-rule-returns-Rule-successfully-deleted-response.json @@ -3,7 +3,7 @@ { "request": { "body": { - "string": "{\"data\":{\"attributes\":{\"enabled\":true,\"name\":\"Test-Delete_a_signal_based_rule_returns_Rule_successfully_deleted_response-1737539405\",\"selectors\":{\"query\":\"env:test\",\"rule_types\":[\"signal_correlation\"],\"severities\":[\"critical\"],\"trigger_source\":\"security_signals\"},\"targets\":[\"@email@email.com\"]},\"type\":\"notification_rules\"}}", + "string": "{\"data\":{\"attributes\":{\"enabled\":true,\"name\":\"Test-Delete_a_signal_based_notification_rule_returns_Rule_successfully_deleted_response-1738763144\",\"selectors\":{\"query\":\"env:test\",\"rule_types\":[\"signal_correlation\"],\"severities\":[\"critical\"],\"trigger_source\":\"security_signals\"},\"targets\":[\"@email@email.com\"]},\"type\":\"notification_rules\"}}", "encoding": null }, "headers": { @@ -19,7 +19,7 @@ }, "response": { "body": { - "string": "{\"data\":{\"id\":\"ukc-0jn-maf\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1737539405540,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1737539405540,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Delete_a_signal_based_rule_returns_Rule_successfully_deleted_response-1737539405\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"signal_correlation\"],\"query\":\"env:test\",\"trigger_source\":\"security_signals\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":0,\"version\":1}}}", + "string": "{\"data\":{\"id\":\"x4n-qps-p3w\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1738763144838,\"created_by\":{\"name\":\"\",\"handle\":\"\"},\"enabled\":true,\"modified_at\":1738763144838,\"modified_by\":{\"name\":\"\",\"handle\":\"\"},\"name\":\"Test-Delete_a_signal_based_notification_rule_returns_Rule_successfully_deleted_response-1738763144\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"signal_correlation\"],\"query\":\"env:test\",\"trigger_source\":\"security_signals\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":0,\"version\":1}}}", "encoding": null }, "headers": { @@ -32,7 +32,7 @@ "message": "Created" } }, - "recorded_at": "Wed, 22 Jan 2025 09:50:05 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:45:44 GMT" }, { "request": { @@ -43,7 +43,7 @@ ] }, "method": "delete", - "uri": "https://api.datadoghq.com/api/v2/security/signals/notification_rules/ukc-0jn-maf" + "uri": "https://api.datadoghq.com/api/v2/security/signals/notification_rules/x4n-qps-p3w" }, "response": { "body": { @@ -56,7 +56,7 @@ "message": "No Content" } }, - "recorded_at": "Wed, 22 Jan 2025 09:50:05 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:45:44 GMT" }, { "request": { @@ -67,11 +67,11 @@ ] }, "method": "delete", - "uri": "https://api.datadoghq.com/api/v2/security/signals/notification_rules/ukc-0jn-maf" + "uri": "https://api.datadoghq.com/api/v2/security/signals/notification_rules/x4n-qps-p3w" }, "response": { "body": { - "string": "{\"errors\":[\"not_found(Notification rule with id 'ukc-0jn-maf' not found)\"]}", + "string": "{\"errors\":[\"not_found(Notification rule with id 'x4n-qps-p3w' not found)\"]}", "encoding": null }, "headers": { @@ -84,7 +84,7 @@ "message": "Not Found" } }, - "recorded_at": "Wed, 22 Jan 2025 09:50:05 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:45:44 GMT" } ], "recorded_with": "VCR 6.0.0" diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-signal-based-rule-returns-Not-Found-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-signal-based-rule-returns-Not-Found-response.frozen deleted file mode 100644 index 5ed3da996..000000000 --- a/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-signal-based-rule-returns-Not-Found-response.frozen +++ /dev/null @@ -1 +0,0 @@ -2025-01-22T09:50:04.605Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-signal-based-rule-returns-Rule-successfully-deleted-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-signal-based-rule-returns-Rule-successfully-deleted-response.frozen deleted file mode 100644 index 5b9cab2f5..000000000 --- a/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-signal-based-rule-returns-Rule-successfully-deleted-response.frozen +++ /dev/null @@ -1 +0,0 @@ -2025-01-22T09:50:05.107Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-vulnerability-based-notification-rule-returns-Not-Found-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-vulnerability-based-notification-rule-returns-Not-Found-response.frozen new file mode 100644 index 000000000..5d7f042ad --- /dev/null +++ b/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-vulnerability-based-notification-rule-returns-Not-Found-response.frozen @@ -0,0 +1 @@ +2025-02-05T13:45:46.942Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-vulnerability-based-rule-returns-Not-Found-response.json b/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-vulnerability-based-notification-rule-returns-Not-Found-response.json similarity index 93% rename from tests/scenarios/cassettes/v2/security_monitoring/Delete-a-vulnerability-based-rule-returns-Not-Found-response.json rename to tests/scenarios/cassettes/v2/security_monitoring/Delete-a-vulnerability-based-notification-rule-returns-Not-Found-response.json index b0eb97a68..55fc44e23 100644 --- a/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-vulnerability-based-rule-returns-Not-Found-response.json +++ b/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-vulnerability-based-notification-rule-returns-Not-Found-response.json @@ -26,7 +26,7 @@ "message": "Not Found" } }, - "recorded_at": "Wed, 22 Jan 2025 09:50:08 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:45:46 GMT" } ], "recorded_with": "VCR 6.0.0" diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-vulnerability-based-notification-rule-returns-Rule-successfully-deleted-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-vulnerability-based-notification-rule-returns-Rule-successfully-deleted-response.frozen new file mode 100644 index 000000000..c5f1ae221 --- /dev/null +++ b/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-vulnerability-based-notification-rule-returns-Rule-successfully-deleted-response.frozen @@ -0,0 +1 @@ +2025-02-05T13:45:47.393Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-vulnerability-based-rule-returns-Rule-successfully-deleted-response.json b/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-vulnerability-based-notification-rule-returns-Rule-successfully-deleted-response.json similarity index 57% rename from tests/scenarios/cassettes/v2/security_monitoring/Delete-a-vulnerability-based-rule-returns-Rule-successfully-deleted-response.json rename to tests/scenarios/cassettes/v2/security_monitoring/Delete-a-vulnerability-based-notification-rule-returns-Rule-successfully-deleted-response.json index 834d7354c..60f0f9274 100644 --- a/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-vulnerability-based-rule-returns-Rule-successfully-deleted-response.json +++ b/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-vulnerability-based-notification-rule-returns-Rule-successfully-deleted-response.json @@ -3,7 +3,7 @@ { "request": { "body": { - "string": "{\"data\":{\"attributes\":{\"enabled\":true,\"name\":\"Test-Delete_a_vulnerability_based_rule_returns_Rule_successfully_deleted_response-1737539408\",\"selectors\":{\"query\":\"env:test\",\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"severities\":[\"critical\"],\"trigger_source\":\"security_findings\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":86400},\"type\":\"notification_rules\"}}", + "string": "{\"data\":{\"attributes\":{\"enabled\":true,\"name\":\"Test-Delete_a_vulnerability_based_notification_rule_returns_Rule_successfully_deleted_response-1738763147\",\"selectors\":{\"query\":\"env:test\",\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"severities\":[\"critical\"],\"trigger_source\":\"security_findings\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":86400},\"type\":\"notification_rules\"}}", "encoding": null }, "headers": { @@ -19,7 +19,7 @@ }, "response": { "body": { - "string": "{\"data\":{\"id\":\"qip-ygy-7ke\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1737539409090,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1737539409090,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Delete_a_vulnerability_based_rule_returns_Rule_successfully_deleted_response-1737539408\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"query\":\"env:test\",\"trigger_source\":\"security_findings\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":86400,\"version\":1}}}", + "string": "{\"data\":{\"id\":\"p3z-nij-ygf\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1738763147765,\"created_by\":{\"name\":\"\",\"handle\":\"\"},\"enabled\":true,\"modified_at\":1738763147765,\"modified_by\":{\"name\":\"\",\"handle\":\"\"},\"name\":\"Test-Delete_a_vulnerability_based_notification_rule_returns_Rule_successfully_deleted_response-1738763147\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"query\":\"env:test\",\"trigger_source\":\"security_findings\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":86400,\"version\":1}}}", "encoding": null }, "headers": { @@ -32,7 +32,7 @@ "message": "Created" } }, - "recorded_at": "Wed, 22 Jan 2025 09:50:08 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:45:47 GMT" }, { "request": { @@ -43,7 +43,7 @@ ] }, "method": "delete", - "uri": "https://api.datadoghq.com/api/v2/security/vulnerabilities/notification_rules/qip-ygy-7ke" + "uri": "https://api.datadoghq.com/api/v2/security/vulnerabilities/notification_rules/p3z-nij-ygf" }, "response": { "body": { @@ -56,7 +56,7 @@ "message": "No Content" } }, - "recorded_at": "Wed, 22 Jan 2025 09:50:08 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:45:47 GMT" }, { "request": { @@ -67,11 +67,11 @@ ] }, "method": "delete", - "uri": "https://api.datadoghq.com/api/v2/security/vulnerabilities/notification_rules/qip-ygy-7ke" + "uri": "https://api.datadoghq.com/api/v2/security/vulnerabilities/notification_rules/p3z-nij-ygf" }, "response": { "body": { - "string": "{\"errors\":[\"not_found(Notification rule with id 'qip-ygy-7ke' not found)\"]}", + "string": "{\"errors\":[\"not_found(Notification rule with id 'p3z-nij-ygf' not found)\"]}", "encoding": null }, "headers": { @@ -84,7 +84,7 @@ "message": "Not Found" } }, - "recorded_at": "Wed, 22 Jan 2025 09:50:08 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:45:47 GMT" } ], "recorded_with": "VCR 6.0.0" diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-vulnerability-based-rule-returns-Not-Found-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-vulnerability-based-rule-returns-Not-Found-response.frozen deleted file mode 100644 index 31d1497fd..000000000 --- a/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-vulnerability-based-rule-returns-Not-Found-response.frozen +++ /dev/null @@ -1 +0,0 @@ -2025-01-22T09:50:08.134Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-vulnerability-based-rule-returns-Rule-successfully-deleted-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-vulnerability-based-rule-returns-Rule-successfully-deleted-response.frozen deleted file mode 100644 index f80fa5308..000000000 --- a/tests/scenarios/cassettes/v2/security_monitoring/Delete-a-vulnerability-based-rule-returns-Rule-successfully-deleted-response.frozen +++ /dev/null @@ -1 +0,0 @@ -2025-01-22T09:50:08.640Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-signal-based-notification-rule-returns-Not-Found-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-signal-based-notification-rule-returns-Not-Found-response.frozen new file mode 100644 index 000000000..7a9e3b4bd --- /dev/null +++ b/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-signal-based-notification-rule-returns-Not-Found-response.frozen @@ -0,0 +1 @@ +2025-02-05T13:46:01.149Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-signal-based-rule-returns-Not-Found-response.json b/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-signal-based-notification-rule-returns-Not-Found-response.json similarity index 93% rename from tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-signal-based-rule-returns-Not-Found-response.json rename to tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-signal-based-notification-rule-returns-Not-Found-response.json index cbb1d4dbd..df5ffc50d 100644 --- a/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-signal-based-rule-returns-Not-Found-response.json +++ b/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-signal-based-notification-rule-returns-Not-Found-response.json @@ -26,7 +26,7 @@ "message": "Not Found" } }, - "recorded_at": "Wed, 22 Jan 2025 09:50:23 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:46:01 GMT" } ], "recorded_with": "VCR 6.0.0" diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-signal-based-notification-rule-returns-Notification-rule-details-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-signal-based-notification-rule-returns-Notification-rule-details-response.frozen new file mode 100644 index 000000000..51dd6f917 --- /dev/null +++ b/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-signal-based-notification-rule-returns-Notification-rule-details-response.frozen @@ -0,0 +1 @@ +2025-02-05T13:46:01.602Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-signal-based-notification-rule-returns-Notification-rule-details-response.json b/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-signal-based-notification-rule-returns-Notification-rule-details-response.json new file mode 100644 index 000000000..58f6b1894 --- /dev/null +++ b/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-signal-based-notification-rule-returns-Notification-rule-details-response.json @@ -0,0 +1,91 @@ +{ + "http_interactions": [ + { + "request": { + "body": { + "string": "{\"data\":{\"attributes\":{\"enabled\":true,\"name\":\"Test-Get_details_of_a_signal_based_notification_rule_returns_Notification_rule_details_response-1738763161\",\"selectors\":{\"query\":\"env:test\",\"rule_types\":[\"signal_correlation\"],\"severities\":[\"critical\"],\"trigger_source\":\"security_signals\"},\"targets\":[\"@email@email.com\"]},\"type\":\"notification_rules\"}}", + "encoding": null + }, + "headers": { + "Accept": [ + "application/json" + ], + "Content-Type": [ + "application/json" + ] + }, + "method": "post", + "uri": "https://api.datadoghq.com/api/v2/security/signals/notification_rules" + }, + "response": { + "body": { + "string": "{\"data\":{\"id\":\"tcf-juk-5tr\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1738763162076,\"created_by\":{\"name\":\"\",\"handle\":\"\"},\"enabled\":true,\"modified_at\":1738763162076,\"modified_by\":{\"name\":\"\",\"handle\":\"\"},\"name\":\"Test-Get_details_of_a_signal_based_notification_rule_returns_Notification_rule_details_response-1738763161\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"signal_correlation\"],\"query\":\"env:test\",\"trigger_source\":\"security_signals\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":0,\"version\":1}}}", + "encoding": null + }, + "headers": { + "Content-Type": [ + "application/vnd.api+json" + ] + }, + "status": { + "code": 201, + "message": "Created" + } + }, + "recorded_at": "Wed, 05 Feb 2025 13:46:01 GMT" + }, + { + "request": { + "body": "", + "headers": { + "Accept": [ + "application/json" + ] + }, + "method": "get", + "uri": "https://api.datadoghq.com/api/v2/security/signals/notification_rules/tcf-juk-5tr" + }, + "response": { + "body": { + "string": "{\"data\":{\"id\":\"tcf-juk-5tr\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1738763162076,\"created_by\":{\"name\":\"\",\"handle\":\"\"},\"enabled\":true,\"modified_at\":1738763162076,\"modified_by\":{\"name\":\"\",\"handle\":\"\"},\"name\":\"Test-Get_details_of_a_signal_based_notification_rule_returns_Notification_rule_details_response-1738763161\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"signal_correlation\"],\"query\":\"env:test\",\"trigger_source\":\"security_signals\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":0,\"version\":1}}}", + "encoding": null + }, + "headers": { + "Content-Type": [ + "application/vnd.api+json" + ] + }, + "status": { + "code": 200, + "message": "OK" + } + }, + "recorded_at": "Wed, 05 Feb 2025 13:46:01 GMT" + }, + { + "request": { + "body": "", + "headers": { + "Accept": [ + "*/*" + ] + }, + "method": "delete", + "uri": "https://api.datadoghq.com/api/v2/security/signals/notification_rules/tcf-juk-5tr" + }, + "response": { + "body": { + "string": "", + "encoding": null + }, + "headers": {}, + "status": { + "code": 204, + "message": "No Content" + } + }, + "recorded_at": "Wed, 05 Feb 2025 13:46:01 GMT" + } + ], + "recorded_with": "VCR 6.0.0" +} \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-signal-based-rule-returns-Not-Found-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-signal-based-rule-returns-Not-Found-response.frozen deleted file mode 100644 index 6d4de62a5..000000000 --- a/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-signal-based-rule-returns-Not-Found-response.frozen +++ /dev/null @@ -1 +0,0 @@ -2025-01-22T09:50:23.414Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-signal-based-rule-returns-Notification-rule-details-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-signal-based-rule-returns-Notification-rule-details-response.frozen deleted file mode 100644 index fe7b63784..000000000 --- a/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-signal-based-rule-returns-Notification-rule-details-response.frozen +++ /dev/null @@ -1 +0,0 @@ -2025-01-22T09:50:23.939Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-signal-based-rule-returns-Notification-rule-details-response.json b/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-signal-based-rule-returns-Notification-rule-details-response.json deleted file mode 100644 index a404f7ba6..000000000 --- a/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-signal-based-rule-returns-Notification-rule-details-response.json +++ /dev/null @@ -1,91 +0,0 @@ -{ - "http_interactions": [ - { - "request": { - "body": { - "string": "{\"data\":{\"attributes\":{\"enabled\":true,\"name\":\"Test-Get_details_of_a_signal_based_rule_returns_Notification_rule_details_response-1737539423\",\"selectors\":{\"query\":\"env:test\",\"rule_types\":[\"signal_correlation\"],\"severities\":[\"critical\"],\"trigger_source\":\"security_signals\"},\"targets\":[\"@email@email.com\"]},\"type\":\"notification_rules\"}}", - "encoding": null - }, - "headers": { - "Accept": [ - "application/json" - ], - "Content-Type": [ - "application/json" - ] - }, - "method": "post", - "uri": "https://api.datadoghq.com/api/v2/security/signals/notification_rules" - }, - "response": { - "body": { - "string": "{\"data\":{\"id\":\"t8x-amt-d52\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1737539424372,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1737539424372,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Get_details_of_a_signal_based_rule_returns_Notification_rule_details_response-1737539423\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"signal_correlation\"],\"query\":\"env:test\",\"trigger_source\":\"security_signals\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":0,\"version\":1}}}", - "encoding": null - }, - "headers": { - "Content-Type": [ - "application/vnd.api+json" - ] - }, - "status": { - "code": 201, - "message": "Created" - } - }, - "recorded_at": "Wed, 22 Jan 2025 09:50:23 GMT" - }, - { - "request": { - "body": "", - "headers": { - "Accept": [ - "application/json" - ] - }, - "method": "get", - "uri": "https://api.datadoghq.com/api/v2/security/signals/notification_rules/t8x-amt-d52" - }, - "response": { - "body": { - "string": "{\"data\":{\"id\":\"t8x-amt-d52\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1737539424372,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1737539424372,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Get_details_of_a_signal_based_rule_returns_Notification_rule_details_response-1737539423\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"signal_correlation\"],\"query\":\"env:test\",\"trigger_source\":\"security_signals\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":0,\"version\":1}}}", - "encoding": null - }, - "headers": { - "Content-Type": [ - "application/vnd.api+json" - ] - }, - "status": { - "code": 200, - "message": "OK" - } - }, - "recorded_at": "Wed, 22 Jan 2025 09:50:23 GMT" - }, - { - "request": { - "body": "", - "headers": { - "Accept": [ - "*/*" - ] - }, - "method": "delete", - "uri": "https://api.datadoghq.com/api/v2/security/signals/notification_rules/t8x-amt-d52" - }, - "response": { - "body": { - "string": "", - "encoding": null - }, - "headers": {}, - "status": { - "code": 204, - "message": "No Content" - } - }, - "recorded_at": "Wed, 22 Jan 2025 09:50:23 GMT" - } - ], - "recorded_with": "VCR 6.0.0" -} \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-vulnerability-based-rule-returns-Not-Found-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-vulnerability-based-rule-returns-Not-Found-response.frozen deleted file mode 100644 index d1e876719..000000000 --- a/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-vulnerability-based-rule-returns-Not-Found-response.frozen +++ /dev/null @@ -1 +0,0 @@ -2025-01-22T09:50:25.480Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-vulnerability-based-rule-returns-Notification-rule-details-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-vulnerability-based-rule-returns-Notification-rule-details-response.frozen deleted file mode 100644 index 1aed5057f..000000000 --- a/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-vulnerability-based-rule-returns-Notification-rule-details-response.frozen +++ /dev/null @@ -1 +0,0 @@ -2025-01-22T09:50:25.988Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-vulnerability-based-rule-returns-Notification-rule-details-response.json b/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-vulnerability-based-rule-returns-Notification-rule-details-response.json deleted file mode 100644 index 5f5b97354..000000000 --- a/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-vulnerability-based-rule-returns-Notification-rule-details-response.json +++ /dev/null @@ -1,91 +0,0 @@ -{ - "http_interactions": [ - { - "request": { - "body": { - "string": "{\"data\":{\"attributes\":{\"enabled\":true,\"name\":\"Test-Get_details_of_a_vulnerability_based_rule_returns_Notification_rule_details_response-1737539425\",\"selectors\":{\"query\":\"env:test\",\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"severities\":[\"critical\"],\"trigger_source\":\"security_findings\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":86400},\"type\":\"notification_rules\"}}", - "encoding": null - }, - "headers": { - "Accept": [ - "application/json" - ], - "Content-Type": [ - "application/json" - ] - }, - "method": "post", - "uri": "https://api.datadoghq.com/api/v2/security/vulnerabilities/notification_rules" - }, - "response": { - "body": { - "string": "{\"data\":{\"id\":\"aqq-x71-k2h\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1737539426417,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1737539426417,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Get_details_of_a_vulnerability_based_rule_returns_Notification_rule_details_response-1737539425\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"query\":\"env:test\",\"trigger_source\":\"security_findings\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":86400,\"version\":1}}}", - "encoding": null - }, - "headers": { - "Content-Type": [ - "application/vnd.api+json" - ] - }, - "status": { - "code": 201, - "message": "Created" - } - }, - "recorded_at": "Wed, 22 Jan 2025 09:50:25 GMT" - }, - { - "request": { - "body": "", - "headers": { - "Accept": [ - "application/json" - ] - }, - "method": "get", - "uri": "https://api.datadoghq.com/api/v2/security/vulnerabilities/notification_rules/aqq-x71-k2h" - }, - "response": { - "body": { - "string": "{\"data\":{\"id\":\"aqq-x71-k2h\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1737539426417,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1737539426417,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Get_details_of_a_vulnerability_based_rule_returns_Notification_rule_details_response-1737539425\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"query\":\"env:test\",\"trigger_source\":\"security_findings\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":86400,\"version\":1}}}", - "encoding": null - }, - "headers": { - "Content-Type": [ - "application/vnd.api+json" - ] - }, - "status": { - "code": 200, - "message": "OK" - } - }, - "recorded_at": "Wed, 22 Jan 2025 09:50:25 GMT" - }, - { - "request": { - "body": "", - "headers": { - "Accept": [ - "*/*" - ] - }, - "method": "delete", - "uri": "https://api.datadoghq.com/api/v2/security/vulnerabilities/notification_rules/aqq-x71-k2h" - }, - "response": { - "body": { - "string": "", - "encoding": null - }, - "headers": {}, - "status": { - "code": 204, - "message": "No Content" - } - }, - "recorded_at": "Wed, 22 Jan 2025 09:50:25 GMT" - } - ], - "recorded_with": "VCR 6.0.0" -} \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-vulnerability-notification-rule-returns-Not-Found-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-vulnerability-notification-rule-returns-Not-Found-response.frozen new file mode 100644 index 000000000..df4c4888e --- /dev/null +++ b/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-vulnerability-notification-rule-returns-Not-Found-response.frozen @@ -0,0 +1 @@ +2025-02-05T13:46:02.886Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-vulnerability-based-rule-returns-Not-Found-response.json b/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-vulnerability-notification-rule-returns-Not-Found-response.json similarity index 93% rename from tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-vulnerability-based-rule-returns-Not-Found-response.json rename to tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-vulnerability-notification-rule-returns-Not-Found-response.json index c7b9ee220..738cb8ce6 100644 --- a/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-vulnerability-based-rule-returns-Not-Found-response.json +++ b/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-vulnerability-notification-rule-returns-Not-Found-response.json @@ -26,7 +26,7 @@ "message": "Not Found" } }, - "recorded_at": "Wed, 22 Jan 2025 09:50:25 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:46:02 GMT" } ], "recorded_with": "VCR 6.0.0" diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-vulnerability-notification-rule-returns-Notification-rule-details-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-vulnerability-notification-rule-returns-Notification-rule-details-response.frozen new file mode 100644 index 000000000..5c0ebad97 --- /dev/null +++ b/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-vulnerability-notification-rule-returns-Notification-rule-details-response.frozen @@ -0,0 +1 @@ +2025-02-05T13:46:03.335Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-vulnerability-notification-rule-returns-Notification-rule-details-response.json b/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-vulnerability-notification-rule-returns-Notification-rule-details-response.json new file mode 100644 index 000000000..765596b51 --- /dev/null +++ b/tests/scenarios/cassettes/v2/security_monitoring/Get-details-of-a-vulnerability-notification-rule-returns-Notification-rule-details-response.json @@ -0,0 +1,91 @@ +{ + "http_interactions": [ + { + "request": { + "body": { + "string": "{\"data\":{\"attributes\":{\"enabled\":true,\"name\":\"Test-Get_details_of_a_vulnerability_notification_rule_returns_Notification_rule_details_response-1738763163\",\"selectors\":{\"query\":\"env:test\",\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"severities\":[\"critical\"],\"trigger_source\":\"security_findings\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":86400},\"type\":\"notification_rules\"}}", + "encoding": null + }, + "headers": { + "Accept": [ + "application/json" + ], + "Content-Type": [ + "application/json" + ] + }, + "method": "post", + "uri": "https://api.datadoghq.com/api/v2/security/vulnerabilities/notification_rules" + }, + "response": { + "body": { + "string": "{\"data\":{\"id\":\"ryn-rs2-tef\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1738763163705,\"created_by\":{\"name\":\"\",\"handle\":\"\"},\"enabled\":true,\"modified_at\":1738763163705,\"modified_by\":{\"name\":\"\",\"handle\":\"\"},\"name\":\"Test-Get_details_of_a_vulnerability_notification_rule_returns_Notification_rule_details_response-1738763163\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"query\":\"env:test\",\"trigger_source\":\"security_findings\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":86400,\"version\":1}}}", + "encoding": null + }, + "headers": { + "Content-Type": [ + "application/vnd.api+json" + ] + }, + "status": { + "code": 201, + "message": "Created" + } + }, + "recorded_at": "Wed, 05 Feb 2025 13:46:03 GMT" + }, + { + "request": { + "body": "", + "headers": { + "Accept": [ + "application/json" + ] + }, + "method": "get", + "uri": "https://api.datadoghq.com/api/v2/security/vulnerabilities/notification_rules/ryn-rs2-tef" + }, + "response": { + "body": { + "string": "{\"data\":{\"id\":\"ryn-rs2-tef\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1738763163705,\"created_by\":{\"name\":\"\",\"handle\":\"\"},\"enabled\":true,\"modified_at\":1738763163705,\"modified_by\":{\"name\":\"\",\"handle\":\"\"},\"name\":\"Test-Get_details_of_a_vulnerability_notification_rule_returns_Notification_rule_details_response-1738763163\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"query\":\"env:test\",\"trigger_source\":\"security_findings\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":86400,\"version\":1}}}", + "encoding": null + }, + "headers": { + "Content-Type": [ + "application/vnd.api+json" + ] + }, + "status": { + "code": 200, + "message": "OK" + } + }, + "recorded_at": "Wed, 05 Feb 2025 13:46:03 GMT" + }, + { + "request": { + "body": "", + "headers": { + "Accept": [ + "*/*" + ] + }, + "method": "delete", + "uri": "https://api.datadoghq.com/api/v2/security/vulnerabilities/notification_rules/ryn-rs2-tef" + }, + "response": { + "body": { + "string": "", + "encoding": null + }, + "headers": {}, + "status": { + "code": 204, + "message": "No Content" + } + }, + "recorded_at": "Wed, 05 Feb 2025 13:46:03 GMT" + } + ], + "recorded_with": "VCR 6.0.0" +} \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Get-the-list-of-signal-based-notification-rules-returns-The-list-of-notification-rules-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Get-the-list-of-signal-based-notification-rules-returns-The-list-of-notification-rules-response.frozen new file mode 100644 index 000000000..2c353113b --- /dev/null +++ b/tests/scenarios/cassettes/v2/security_monitoring/Get-the-list-of-signal-based-notification-rules-returns-The-list-of-notification-rules-response.frozen @@ -0,0 +1 @@ +2025-02-05T13:46:04.585Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Get-the-list-of-signal-based-notification-rules-returns-The-list-of-notification-rules-response.json b/tests/scenarios/cassettes/v2/security_monitoring/Get-the-list-of-signal-based-notification-rules-returns-The-list-of-notification-rules-response.json new file mode 100644 index 000000000..119f50837 --- /dev/null +++ b/tests/scenarios/cassettes/v2/security_monitoring/Get-the-list-of-signal-based-notification-rules-returns-The-list-of-notification-rules-response.json @@ -0,0 +1,91 @@ +{ + "http_interactions": [ + { + "request": { + "body": { + "string": "{\"data\":{\"attributes\":{\"enabled\":true,\"name\":\"Test-Get_the_list_of_signal_based_notification_rules_returns_The_list_of_notification_rules_response-1738763164\",\"selectors\":{\"query\":\"env:test\",\"rule_types\":[\"signal_correlation\"],\"severities\":[\"critical\"],\"trigger_source\":\"security_signals\"},\"targets\":[\"@email@email.com\"]},\"type\":\"notification_rules\"}}", + "encoding": null + }, + "headers": { + "Accept": [ + "application/json" + ], + "Content-Type": [ + "application/json" + ] + }, + "method": "post", + "uri": "https://api.datadoghq.com/api/v2/security/signals/notification_rules" + }, + "response": { + "body": { + "string": "{\"data\":{\"id\":\"btd-udo-vn7\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1738763164939,\"created_by\":{\"name\":\"\",\"handle\":\"\"},\"enabled\":true,\"modified_at\":1738763164939,\"modified_by\":{\"name\":\"\",\"handle\":\"\"},\"name\":\"Test-Get_the_list_of_signal_based_notification_rules_returns_The_list_of_notification_rules_response-1738763164\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"signal_correlation\"],\"query\":\"env:test\",\"trigger_source\":\"security_signals\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":0,\"version\":1}}}", + "encoding": null + }, + "headers": { + "Content-Type": [ + "application/vnd.api+json" + ] + }, + "status": { + "code": 201, + "message": "Created" + } + }, + "recorded_at": "Wed, 05 Feb 2025 13:46:04 GMT" + }, + { + "request": { + "body": "", + "headers": { + "Accept": [ + "application/json" + ] + }, + "method": "get", + "uri": "https://api.datadoghq.com/api/v2/security/signals/notification_rules" + }, + "response": { + "body": { + "string": "{\"data\":[{\"id\":\"btd-udo-vn7\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1738763164939,\"created_by\":{\"name\":\"\",\"handle\":\"\"},\"enabled\":true,\"modified_at\":1738763164939,\"modified_by\":{\"name\":\"\",\"handle\":\"\"},\"name\":\"Test-Get_the_list_of_signal_based_notification_rules_returns_The_list_of_notification_rules_response-1738763164\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"signal_correlation\"],\"query\":\"env:test\",\"trigger_source\":\"security_signals\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":0,\"version\":1}}]}", + "encoding": null + }, + "headers": { + "Content-Type": [ + "application/vnd.api+json" + ] + }, + "status": { + "code": 200, + "message": "OK" + } + }, + "recorded_at": "Wed, 05 Feb 2025 13:46:04 GMT" + }, + { + "request": { + "body": "", + "headers": { + "Accept": [ + "*/*" + ] + }, + "method": "delete", + "uri": "https://api.datadoghq.com/api/v2/security/signals/notification_rules/btd-udo-vn7" + }, + "response": { + "body": { + "string": "", + "encoding": null + }, + "headers": {}, + "status": { + "code": 204, + "message": "No Content" + } + }, + "recorded_at": "Wed, 05 Feb 2025 13:46:04 GMT" + } + ], + "recorded_with": "VCR 6.0.0" +} \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Get-the-list-of-signal-based-rules-returns-The-list-of-notification-rules-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Get-the-list-of-signal-based-rules-returns-The-list-of-notification-rules-response.frozen deleted file mode 100644 index 3f0d8fa07..000000000 --- a/tests/scenarios/cassettes/v2/security_monitoring/Get-the-list-of-signal-based-rules-returns-The-list-of-notification-rules-response.frozen +++ /dev/null @@ -1 +0,0 @@ -2025-01-23T10:36:01.381Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Get-the-list-of-signal-based-rules-returns-The-list-of-notification-rules-response.json b/tests/scenarios/cassettes/v2/security_monitoring/Get-the-list-of-signal-based-rules-returns-The-list-of-notification-rules-response.json deleted file mode 100644 index 939c31f32..000000000 --- a/tests/scenarios/cassettes/v2/security_monitoring/Get-the-list-of-signal-based-rules-returns-The-list-of-notification-rules-response.json +++ /dev/null @@ -1,91 +0,0 @@ -{ - "http_interactions": [ - { - "request": { - "body": { - "string": "{\"data\":{\"attributes\":{\"enabled\":true,\"name\":\"Test-Get_the_list_of_signal_based_rules_returns_The_list_of_notification_rules_response-1737628561\",\"selectors\":{\"query\":\"env:test\",\"rule_types\":[\"signal_correlation\"],\"severities\":[\"critical\"],\"trigger_source\":\"security_signals\"},\"targets\":[\"@email@email.com\"]},\"type\":\"notification_rules\"}}", - "encoding": null - }, - "headers": { - "Accept": [ - "application/json" - ], - "Content-Type": [ - "application/json" - ] - }, - "method": "post", - "uri": "https://api.datadoghq.com/api/v2/security/signals/notification_rules" - }, - "response": { - "body": { - "string": "{\"data\":{\"id\":\"wt5-y8s-3fa\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1737628561456,\"created_by\":{\"name\":\"CI Account\",\"handle\":\"9919ec9b-ebc7-49ee-8dc8-03626e717cca\"},\"enabled\":true,\"modified_at\":1737628561456,\"modified_by\":{\"name\":\"CI Account\",\"handle\":\"9919ec9b-ebc7-49ee-8dc8-03626e717cca\"},\"name\":\"Test-Get_the_list_of_signal_based_rules_returns_The_list_of_notification_rules_response-1737628561\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"signal_correlation\"],\"query\":\"env:test\",\"trigger_source\":\"security_signals\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":0,\"version\":1}}}", - "encoding": null - }, - "headers": { - "Content-Type": [ - "application/vnd.api+json" - ] - }, - "status": { - "code": 201, - "message": "Created" - } - }, - "recorded_at": "Thu, 23 Jan 2025 10:36:01 GMT" - }, - { - "request": { - "body": "", - "headers": { - "Accept": [ - "application/json" - ] - }, - "method": "get", - "uri": "https://api.datadoghq.com/api/v2/security/signals/notification_rules" - }, - "response": { - "body": { - "string": "{\"data\":[{\"id\":\"hwk-zqh-vg4\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1699905830776,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1725452072048,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-List_notification_profiles_returns_OK_response-1699905830\",\"selectors\":{\"severities\":[\"high\"],\"rule_types\":[\"log_detection\",\"cloud_configuration\"],\"query\":\"\",\"trigger_source\":\"security_signals\"},\"targets\":[\"test\"],\"time_aggregation\":0,\"version\":2}},{\"id\":\"fsm-4am-ozw\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1699905832107,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1725452072048,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Update_a_notification_profile_returns_OK_response-1699905832\",\"selectors\":{\"severities\":[\"high\"],\"rule_types\":[\"log_detection\",\"cloud_configuration\"],\"query\":\"\",\"trigger_source\":\"security_signals\"},\"targets\":[\"test\"],\"time_aggregation\":0,\"version\":2}},{\"id\":\"px4-xrb-b9v\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1699905992485,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1725452072048,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Create_a_notification_profile_returns_OK_response-1699905992\",\"selectors\":{\"severities\":[\"high\"],\"rule_types\":[\"application_security\",\"log_detection\"],\"query\":\"(env:\\\"prod\\\" OR @env:\\\"prod\\\") AND (test:\\\"123\\\" OR @test:\\\"123\\\")\",\"trigger_source\":\"security_signals\"},\"targets\":[\"@slack-test\"],\"time_aggregation\":0,\"version\":2}},{\"id\":\"ukt-yim-ouw\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1699905996937,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1725452072048,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Get_notification_profile_by_ID_returns_OK_response-1699905996\",\"selectors\":{\"severities\":[\"high\"],\"rule_types\":[\"log_detection\",\"cloud_configuration\"],\"query\":\"\",\"trigger_source\":\"security_signals\"},\"targets\":[\"test\"],\"time_aggregation\":0,\"version\":2}},{\"id\":\"tpj-yqn-fcw\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1699905997240,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1725452072048,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-List_notification_profiles_returns_OK_response-1699905997\",\"selectors\":{\"severities\":[\"high\"],\"rule_types\":[\"log_detection\",\"cloud_configuration\"],\"query\":\"\",\"trigger_source\":\"security_signals\"},\"targets\":[\"test\"],\"time_aggregation\":0,\"version\":2}},{\"id\":\"tv9-9dw-fbd\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1699905998529,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1725452072048,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Update_a_notification_profile_returns_OK_response-1699905998\",\"selectors\":{\"severities\":[\"high\"],\"rule_types\":[\"log_detection\",\"cloud_configuration\"],\"query\":\"\",\"trigger_source\":\"security_signals\"},\"targets\":[\"test\"],\"time_aggregation\":0,\"version\":2}},{\"id\":\"pdt-i8z-vcs\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1699906082093,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1725452072048,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Create_a_notification_profile_returns_OK_response-1699906081\",\"selectors\":{\"severities\":[\"high\"],\"rule_types\":[\"application_security\",\"log_detection\"],\"query\":\"(env:\\\"prod\\\" OR @env:\\\"prod\\\") AND (test:\\\"123\\\" OR @test:\\\"123\\\")\",\"trigger_source\":\"security_signals\"},\"targets\":[\"@slack-test\"],\"time_aggregation\":0,\"version\":2}},{\"id\":\"tlb-cvk-wup\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1699906087769,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1725452072048,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Get_notification_profile_by_ID_returns_OK_response-1699906087\",\"selectors\":{\"severities\":[\"high\"],\"rule_types\":[\"log_detection\",\"cloud_configuration\"],\"query\":\"\",\"trigger_source\":\"security_signals\"},\"targets\":[\"test\"],\"time_aggregation\":0,\"version\":2}},{\"id\":\"sqp-oih-tp8\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1699906088050,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1725452072048,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-List_notification_profiles_returns_OK_response-1699906087\",\"selectors\":{\"severities\":[\"high\"],\"rule_types\":[\"log_detection\",\"cloud_configuration\"],\"query\":\"\",\"trigger_source\":\"security_signals\"},\"targets\":[\"test\"],\"time_aggregation\":0,\"version\":2}},{\"id\":\"zll-nff-pbx\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1699906089134,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1725452072048,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Update_a_notification_profile_returns_OK_response-1699906089\",\"selectors\":{\"severities\":[\"high\"],\"rule_types\":[\"log_detection\",\"cloud_configuration\"],\"query\":\"\",\"trigger_source\":\"security_signals\"},\"targets\":[\"test\"],\"time_aggregation\":0,\"version\":2}},{\"id\":\"4u9-ooz-fwf\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1699906572841,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1725452072048,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Create_a_notification_profile_returns_OK_response-1699906572\",\"selectors\":{\"severities\":[\"high\"],\"rule_types\":[\"application_security\",\"log_detection\"],\"query\":\"(env:\\\"prod\\\" OR @env:\\\"prod\\\") AND (test:\\\"123\\\" OR @test:\\\"123\\\")\",\"trigger_source\":\"security_signals\"},\"targets\":[\"@slack-test\"],\"time_aggregation\":0,\"version\":2}},{\"id\":\"lny-xec-2r7\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1699906577427,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1725452072048,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Get_notification_profile_by_ID_returns_OK_response-1699906577\",\"selectors\":{\"severities\":[\"high\"],\"rule_types\":[\"log_detection\",\"cloud_configuration\"],\"query\":\"\",\"trigger_source\":\"security_signals\"},\"targets\":[\"test\"],\"time_aggregation\":0,\"version\":2}},{\"id\":\"qfa-6nt-wn2\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1699906577706,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1725452072048,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-List_notification_profiles_returns_OK_response-1699906577\",\"selectors\":{\"severities\":[\"high\"],\"rule_types\":[\"log_detection\",\"cloud_configuration\"],\"query\":\"\",\"trigger_source\":\"security_signals\"},\"targets\":[\"test\"],\"time_aggregation\":0,\"version\":2}},{\"id\":\"zcr-tja-rut\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1699906578815,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1725452072048,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Update_a_notification_profile_returns_OK_response-1699906578\",\"selectors\":{\"severities\":[\"high\"],\"rule_types\":[\"log_detection\",\"cloud_configuration\"],\"query\":\"\",\"trigger_source\":\"security_signals\"},\"targets\":[\"test\"],\"time_aggregation\":0,\"version\":3}},{\"id\":\"rca-ogs-ckx\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1699906789206,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1725452072048,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Create_a_notification_profile_returns_OK_response-1699906789\",\"selectors\":{\"severities\":[\"high\"],\"rule_types\":[\"application_security\",\"log_detection\"],\"query\":\"(env:\\\"prod\\\" OR @env:\\\"prod\\\") AND (test:\\\"123\\\" OR @test:\\\"123\\\")\",\"trigger_source\":\"security_signals\"},\"targets\":[\"@slack-test\"],\"time_aggregation\":0,\"version\":2}},{\"id\":\"dis-abp-grp\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1699906793874,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1725452072048,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Get_notification_profile_by_ID_returns_OK_response-1699906793\",\"selectors\":{\"severities\":[\"high\"],\"rule_types\":[\"log_detection\",\"cloud_configuration\"],\"query\":\"\",\"trigger_source\":\"security_signals\"},\"targets\":[\"test\"],\"time_aggregation\":0,\"version\":2}},{\"id\":\"n5i-avj-8br\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1699906794201,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1725452072048,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-List_notification_profiles_returns_OK_response-1699906794\",\"selectors\":{\"severities\":[\"high\"],\"rule_types\":[\"log_detection\",\"cloud_configuration\"],\"query\":\"\",\"trigger_source\":\"security_signals\"},\"targets\":[\"test\"],\"time_aggregation\":0,\"version\":2}},{\"id\":\"wct-cix-3ay\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1699906795311,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":false,\"modified_at\":1725452072048,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Update_a_notification_profile_returns_OK_response-1699906795\",\"selectors\":{\"severities\":[\"high\"],\"rule_types\":[\"log_detection\",\"cloud_configuration\"],\"query\":\"\",\"trigger_source\":\"security_signals\"},\"targets\":[\"test2\"],\"time_aggregation\":0,\"version\":3}},{\"id\":\"pyf-t6u-dxp\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1699907487559,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1725452072048,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Create_a_notification_profile_returns_OK_response-1699907487\",\"selectors\":{\"severities\":[\"high\"],\"rule_types\":[\"application_security\",\"log_detection\"],\"query\":\"(env:\\\"prod\\\" OR @env:\\\"prod\\\") AND (test:\\\"123\\\" OR @test:\\\"123\\\")\",\"trigger_source\":\"security_signals\"},\"targets\":[\"@slack-test\"],\"time_aggregation\":0,\"version\":2}},{\"id\":\"vwj-uew-mas\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1699907492243,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1725452072048,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Get_notification_profile_by_ID_returns_OK_response-1699907492\",\"selectors\":{\"severities\":[\"high\"],\"rule_types\":[\"log_detection\",\"cloud_configuration\"],\"query\":\"\",\"trigger_source\":\"security_signals\"},\"targets\":[\"test\"],\"time_aggregation\":0,\"version\":2}},{\"id\":\"a1y-ysu-rvw\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1699907492600,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1725452072048,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-List_notification_profiles_returns_OK_response-1699907492\",\"selectors\":{\"severities\":[\"high\"],\"rule_types\":[\"log_detection\",\"cloud_configuration\"],\"query\":\"\",\"trigger_source\":\"security_signals\"},\"targets\":[\"test\"],\"time_aggregation\":0,\"version\":2}},{\"id\":\"kq1-edx-tkt\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1699907493778,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":false,\"modified_at\":1725452072048,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Update_a_notification_profile_returns_OK_response-1699907493\",\"selectors\":{\"severities\":[\"high\"],\"rule_types\":[\"log_detection\",\"cloud_configuration\"],\"query\":\"\",\"trigger_source\":\"security_signals\"},\"targets\":[\"test2\"],\"time_aggregation\":0,\"version\":3}},{\"id\":\"4i4-raj-t0a\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1699908569876,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1725452072048,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Create_a_notification_profile_returns_OK_response-1699908569\",\"selectors\":{\"severities\":[\"high\"],\"rule_types\":[\"application_security\",\"log_detection\"],\"query\":\"(env:\\\"prod\\\" OR @env:\\\"prod\\\") AND (test:\\\"123\\\" OR @test:\\\"123\\\")\",\"trigger_source\":\"security_signals\"},\"targets\":[\"@slack-test\"],\"time_aggregation\":0,\"version\":2}},{\"id\":\"ncy-2zl-jge\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1699908575238,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1725452072048,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Get_notification_profile_by_ID_returns_OK_response-1699908575\",\"selectors\":{\"severities\":[\"high\"],\"rule_types\":[\"log_detection\",\"cloud_configuration\"],\"query\":\"(fim:\\\"true\\\" OR @fim:\\\"true\\\")\",\"trigger_source\":\"security_signals\"},\"targets\":[\"test\"],\"time_aggregation\":0,\"version\":2}},{\"id\":\"tiq-glx-quq\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1699908575600,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1725452072048,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-List_notification_profiles_returns_OK_response-1699908575\",\"selectors\":{\"severities\":[\"high\"],\"rule_types\":[\"log_detection\",\"cloud_configuration\"],\"query\":\"(fim:\\\"true\\\" OR @fim:\\\"true\\\")\",\"trigger_source\":\"security_signals\"},\"targets\":[\"test\"],\"time_aggregation\":0,\"version\":2}},{\"id\":\"ue7-0sv-du1\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1699908576920,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":false,\"modified_at\":1725452072048,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Update_a_notification_profile_returns_OK_response-1699908576\",\"selectors\":{\"severities\":[\"high\"],\"rule_types\":[\"log_detection\",\"cloud_configuration\"],\"query\":\"(fim:\\\"true\\\" OR @fim:\\\"true\\\")\",\"trigger_source\":\"security_signals\"},\"targets\":[\"test2\"],\"time_aggregation\":0,\"version\":3}},{\"id\":\"wt5-y8s-3fa\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1737628561456,\"created_by\":{\"name\":\"CI Account\",\"handle\":\"9919ec9b-ebc7-49ee-8dc8-03626e717cca\"},\"enabled\":true,\"modified_at\":1737628561456,\"modified_by\":{\"name\":\"CI Account\",\"handle\":\"9919ec9b-ebc7-49ee-8dc8-03626e717cca\"},\"name\":\"Test-Get_the_list_of_signal_based_rules_returns_The_list_of_notification_rules_response-1737628561\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"signal_correlation\"],\"query\":\"env:test\",\"trigger_source\":\"security_signals\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":0,\"version\":1}}]}", - "encoding": null - }, - "headers": { - "Content-Type": [ - "application/vnd.api+json" - ] - }, - "status": { - "code": 200, - "message": "OK" - } - }, - "recorded_at": "Thu, 23 Jan 2025 10:36:01 GMT" - }, - { - "request": { - "body": "", - "headers": { - "Accept": [ - "*/*" - ] - }, - "method": "delete", - "uri": "https://api.datadoghq.com/api/v2/security/signals/notification_rules/wt5-y8s-3fa" - }, - "response": { - "body": { - "string": "", - "encoding": null - }, - "headers": {}, - "status": { - "code": 204, - "message": "No Content" - } - }, - "recorded_at": "Thu, 23 Jan 2025 10:36:01 GMT" - } - ], - "recorded_with": "VCR 6.0.0" -} \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Get-the-list-of-vulnerability-based-rules-returns-The-list-of-notification-rules-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Get-the-list-of-vulnerability-based-rules-returns-The-list-of-notification-rules-response.frozen deleted file mode 100644 index 1c559ecb1..000000000 --- a/tests/scenarios/cassettes/v2/security_monitoring/Get-the-list-of-vulnerability-based-rules-returns-The-list-of-notification-rules-response.frozen +++ /dev/null @@ -1 +0,0 @@ -2025-01-23T10:36:01.893Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Get-the-list-of-vulnerability-based-rules-returns-The-list-of-notification-rules-response.json b/tests/scenarios/cassettes/v2/security_monitoring/Get-the-list-of-vulnerability-based-rules-returns-The-list-of-notification-rules-response.json deleted file mode 100644 index fdb1c3e97..000000000 --- a/tests/scenarios/cassettes/v2/security_monitoring/Get-the-list-of-vulnerability-based-rules-returns-The-list-of-notification-rules-response.json +++ /dev/null @@ -1,91 +0,0 @@ -{ - "http_interactions": [ - { - "request": { - "body": { - "string": "{\"data\":{\"attributes\":{\"enabled\":true,\"name\":\"Test-Get_the_list_of_vulnerability_based_rules_returns_The_list_of_notification_rules_response-1737628561\",\"selectors\":{\"query\":\"env:test\",\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"severities\":[\"critical\"],\"trigger_source\":\"security_findings\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":86400},\"type\":\"notification_rules\"}}", - "encoding": null - }, - "headers": { - "Accept": [ - "application/json" - ], - "Content-Type": [ - "application/json" - ] - }, - "method": "post", - "uri": "https://api.datadoghq.com/api/v2/security/vulnerabilities/notification_rules" - }, - "response": { - "body": { - "string": "{\"data\":{\"id\":\"hrp-9cl-j7q\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1737628561955,\"created_by\":{\"name\":\"CI Account\",\"handle\":\"9919ec9b-ebc7-49ee-8dc8-03626e717cca\"},\"enabled\":true,\"modified_at\":1737628561955,\"modified_by\":{\"name\":\"CI Account\",\"handle\":\"9919ec9b-ebc7-49ee-8dc8-03626e717cca\"},\"name\":\"Test-Get_the_list_of_vulnerability_based_rules_returns_The_list_of_notification_rules_response-1737628561\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"query\":\"env:test\",\"trigger_source\":\"security_findings\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":86400,\"version\":1}}}", - "encoding": null - }, - "headers": { - "Content-Type": [ - "application/vnd.api+json" - ] - }, - "status": { - "code": 201, - "message": "Created" - } - }, - "recorded_at": "Thu, 23 Jan 2025 10:36:01 GMT" - }, - { - "request": { - "body": "", - "headers": { - "Accept": [ - "application/json" - ] - }, - "method": "get", - "uri": "https://api.datadoghq.com/api/v2/security/vulnerabilities/notification_rules" - }, - "response": { - "body": { - "string": "{\"data\":[{\"id\":\"hrp-9cl-j7q\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1737628561955,\"created_by\":{\"name\":\"CI Account\",\"handle\":\"9919ec9b-ebc7-49ee-8dc8-03626e717cca\"},\"enabled\":true,\"modified_at\":1737628561955,\"modified_by\":{\"name\":\"CI Account\",\"handle\":\"9919ec9b-ebc7-49ee-8dc8-03626e717cca\"},\"name\":\"Test-Get_the_list_of_vulnerability_based_rules_returns_The_list_of_notification_rules_response-1737628561\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"query\":\"env:test\",\"trigger_source\":\"security_findings\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":86400,\"version\":1}}]}", - "encoding": null - }, - "headers": { - "Content-Type": [ - "application/vnd.api+json" - ] - }, - "status": { - "code": 200, - "message": "OK" - } - }, - "recorded_at": "Thu, 23 Jan 2025 10:36:01 GMT" - }, - { - "request": { - "body": "", - "headers": { - "Accept": [ - "*/*" - ] - }, - "method": "delete", - "uri": "https://api.datadoghq.com/api/v2/security/vulnerabilities/notification_rules/hrp-9cl-j7q" - }, - "response": { - "body": { - "string": "", - "encoding": null - }, - "headers": {}, - "status": { - "code": 204, - "message": "No Content" - } - }, - "recorded_at": "Thu, 23 Jan 2025 10:36:01 GMT" - } - ], - "recorded_with": "VCR 6.0.0" -} \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Get-the-list-of-vulnerability-notification-rules-returns-The-list-of-notification-rules-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Get-the-list-of-vulnerability-notification-rules-returns-The-list-of-notification-rules-response.frozen new file mode 100644 index 000000000..a29f84ee4 --- /dev/null +++ b/tests/scenarios/cassettes/v2/security_monitoring/Get-the-list-of-vulnerability-notification-rules-returns-The-list-of-notification-rules-response.frozen @@ -0,0 +1 @@ +2025-02-05T13:46:05.871Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Get-the-list-of-vulnerability-notification-rules-returns-The-list-of-notification-rules-response.json b/tests/scenarios/cassettes/v2/security_monitoring/Get-the-list-of-vulnerability-notification-rules-returns-The-list-of-notification-rules-response.json new file mode 100644 index 000000000..22f0ddc75 --- /dev/null +++ b/tests/scenarios/cassettes/v2/security_monitoring/Get-the-list-of-vulnerability-notification-rules-returns-The-list-of-notification-rules-response.json @@ -0,0 +1,91 @@ +{ + "http_interactions": [ + { + "request": { + "body": { + "string": "{\"data\":{\"attributes\":{\"enabled\":true,\"name\":\"Test-Get_the_list_of_vulnerability_notification_rules_returns_The_list_of_notification_rules_response-1738763165\",\"selectors\":{\"query\":\"env:test\",\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"severities\":[\"critical\"],\"trigger_source\":\"security_findings\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":86400},\"type\":\"notification_rules\"}}", + "encoding": null + }, + "headers": { + "Accept": [ + "application/json" + ], + "Content-Type": [ + "application/json" + ] + }, + "method": "post", + "uri": "https://api.datadoghq.com/api/v2/security/vulnerabilities/notification_rules" + }, + "response": { + "body": { + "string": "{\"data\":{\"id\":\"jl2-gq4-vr0\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1738763166229,\"created_by\":{\"name\":\"\",\"handle\":\"\"},\"enabled\":true,\"modified_at\":1738763166229,\"modified_by\":{\"name\":\"\",\"handle\":\"\"},\"name\":\"Test-Get_the_list_of_vulnerability_notification_rules_returns_The_list_of_notification_rules_response-1738763165\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"query\":\"env:test\",\"trigger_source\":\"security_findings\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":86400,\"version\":1}}}", + "encoding": null + }, + "headers": { + "Content-Type": [ + "application/vnd.api+json" + ] + }, + "status": { + "code": 201, + "message": "Created" + } + }, + "recorded_at": "Wed, 05 Feb 2025 13:46:05 GMT" + }, + { + "request": { + "body": "", + "headers": { + "Accept": [ + "application/json" + ] + }, + "method": "get", + "uri": "https://api.datadoghq.com/api/v2/security/vulnerabilities/notification_rules" + }, + "response": { + "body": { + "string": "{\"data\":[{\"id\":\"jl2-gq4-vr0\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1738763166229,\"created_by\":{\"name\":\"\",\"handle\":\"\"},\"enabled\":true,\"modified_at\":1738763166229,\"modified_by\":{\"name\":\"\",\"handle\":\"\"},\"name\":\"Test-Get_the_list_of_vulnerability_notification_rules_returns_The_list_of_notification_rules_response-1738763165\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"query\":\"env:test\",\"trigger_source\":\"security_findings\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":86400,\"version\":1}}]}", + "encoding": null + }, + "headers": { + "Content-Type": [ + "application/vnd.api+json" + ] + }, + "status": { + "code": 200, + "message": "OK" + } + }, + "recorded_at": "Wed, 05 Feb 2025 13:46:05 GMT" + }, + { + "request": { + "body": "", + "headers": { + "Accept": [ + "*/*" + ] + }, + "method": "delete", + "uri": "https://api.datadoghq.com/api/v2/security/vulnerabilities/notification_rules/jl2-gq4-vr0" + }, + "response": { + "body": { + "string": "", + "encoding": null + }, + "headers": {}, + "status": { + "code": 204, + "message": "No Content" + } + }, + "recorded_at": "Wed, 05 Feb 2025 13:46:05 GMT" + } + ], + "recorded_with": "VCR 6.0.0" +} \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-notification-rule-returns-Bad-Request-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-notification-rule-returns-Bad-Request-response.frozen new file mode 100644 index 000000000..3ba9d1b93 --- /dev/null +++ b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-notification-rule-returns-Bad-Request-response.frozen @@ -0,0 +1 @@ +2025-02-05T13:46:11.165Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-rule-returns-Bad-Request-response.json b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-notification-rule-returns-Bad-Request-response.json similarity index 67% rename from tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-rule-returns-Bad-Request-response.json rename to tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-notification-rule-returns-Bad-Request-response.json index 0c523bede..e4fe2c3ea 100644 --- a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-rule-returns-Bad-Request-response.json +++ b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-notification-rule-returns-Bad-Request-response.json @@ -3,7 +3,7 @@ { "request": { "body": { - "string": "{\"data\":{\"attributes\":{\"enabled\":true,\"name\":\"Test-Patch_a_signal_based_rule_returns_Bad_Request_response-1737539435\",\"selectors\":{\"query\":\"env:test\",\"rule_types\":[\"signal_correlation\"],\"severities\":[\"critical\"],\"trigger_source\":\"security_signals\"},\"targets\":[\"@email@email.com\"]},\"type\":\"notification_rules\"}}", + "string": "{\"data\":{\"attributes\":{\"enabled\":true,\"name\":\"Test-Patch_a_signal_based_notification_rule_returns_Bad_Request_response-1738763171\",\"selectors\":{\"query\":\"env:test\",\"rule_types\":[\"signal_correlation\"],\"severities\":[\"critical\"],\"trigger_source\":\"security_signals\"},\"targets\":[\"@email@email.com\"]},\"type\":\"notification_rules\"}}", "encoding": null }, "headers": { @@ -19,7 +19,7 @@ }, "response": { "body": { - "string": "{\"data\":{\"id\":\"urx-vcd-58d\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1737539435658,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1737539435658,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Patch_a_signal_based_rule_returns_Bad_Request_response-1737539435\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"signal_correlation\"],\"query\":\"env:test\",\"trigger_source\":\"security_signals\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":0,\"version\":1}}}", + "string": "{\"data\":{\"id\":\"uwx-6n1-x2z\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1738763171531,\"created_by\":{\"name\":\"\",\"handle\":\"\"},\"enabled\":true,\"modified_at\":1738763171531,\"modified_by\":{\"name\":\"\",\"handle\":\"\"},\"name\":\"Test-Patch_a_signal_based_notification_rule_returns_Bad_Request_response-1738763171\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"signal_correlation\"],\"query\":\"env:test\",\"trigger_source\":\"security_signals\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":0,\"version\":1}}}", "encoding": null }, "headers": { @@ -32,7 +32,7 @@ "message": "Created" } }, - "recorded_at": "Wed, 22 Jan 2025 09:50:35 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:46:11 GMT" }, { "request": { @@ -49,7 +49,7 @@ ] }, "method": "patch", - "uri": "https://api.datadoghq.com/api/v2/security/signals/notification_rules/urx-vcd-58d" + "uri": "https://api.datadoghq.com/api/v2/security/signals/notification_rules/uwx-6n1-x2z" }, "response": { "body": { @@ -66,7 +66,7 @@ "message": "Bad Request" } }, - "recorded_at": "Wed, 22 Jan 2025 09:50:35 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:46:11 GMT" }, { "request": { @@ -77,7 +77,7 @@ ] }, "method": "delete", - "uri": "https://api.datadoghq.com/api/v2/security/signals/notification_rules/urx-vcd-58d" + "uri": "https://api.datadoghq.com/api/v2/security/signals/notification_rules/uwx-6n1-x2z" }, "response": { "body": { @@ -90,7 +90,7 @@ "message": "No Content" } }, - "recorded_at": "Wed, 22 Jan 2025 09:50:35 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:46:11 GMT" } ], "recorded_with": "VCR 6.0.0" diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-notification-rule-returns-Not-Found-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-notification-rule-returns-Not-Found-response.frozen new file mode 100644 index 000000000..ab16b00a3 --- /dev/null +++ b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-notification-rule-returns-Not-Found-response.frozen @@ -0,0 +1 @@ +2025-02-05T13:46:12.411Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-rule-returns-Not-Found-response.json b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-notification-rule-returns-Not-Found-response.json similarity index 95% rename from tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-rule-returns-Not-Found-response.json rename to tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-notification-rule-returns-Not-Found-response.json index 8b788dcaa..ddf989558 100644 --- a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-rule-returns-Not-Found-response.json +++ b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-notification-rule-returns-Not-Found-response.json @@ -32,7 +32,7 @@ "message": "Not Found" } }, - "recorded_at": "Wed, 22 Jan 2025 09:50:36 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:46:12 GMT" } ], "recorded_with": "VCR 6.0.0" diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-notification-rule-returns-Notification-rule-successfully-patched-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-notification-rule-returns-Notification-rule-successfully-patched-response.frozen new file mode 100644 index 000000000..4a3199554 --- /dev/null +++ b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-notification-rule-returns-Notification-rule-successfully-patched-response.frozen @@ -0,0 +1 @@ +2025-02-05T13:46:12.789Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-rule-returns-Notification-rule-successfully-patched-response.json b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-notification-rule-returns-Notification-rule-successfully-patched-response.json similarity index 55% rename from tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-rule-returns-Notification-rule-successfully-patched-response.json rename to tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-notification-rule-returns-Notification-rule-successfully-patched-response.json index cd5cd254f..64362b7f8 100644 --- a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-rule-returns-Notification-rule-successfully-patched-response.json +++ b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-notification-rule-returns-Notification-rule-successfully-patched-response.json @@ -3,7 +3,7 @@ { "request": { "body": { - "string": "{\"data\":{\"attributes\":{\"enabled\":true,\"name\":\"Test-Patch_a_signal_based_rule_returns_Notification_rule_successfully_patched_response-1737539437\",\"selectors\":{\"query\":\"env:test\",\"rule_types\":[\"signal_correlation\"],\"severities\":[\"critical\"],\"trigger_source\":\"security_signals\"},\"targets\":[\"@email@email.com\"]},\"type\":\"notification_rules\"}}", + "string": "{\"data\":{\"attributes\":{\"enabled\":true,\"name\":\"Test-Patch_a_signal_based_notification_rule_returns_Notification_rule_successfully_patched_response-1738763172\",\"selectors\":{\"query\":\"env:test\",\"rule_types\":[\"signal_correlation\"],\"severities\":[\"critical\"],\"trigger_source\":\"security_signals\"},\"targets\":[\"@email@email.com\"]},\"type\":\"notification_rules\"}}", "encoding": null }, "headers": { @@ -19,7 +19,7 @@ }, "response": { "body": { - "string": "{\"data\":{\"id\":\"h6x-nyx-fkm\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1737539437401,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1737539437401,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Patch_a_signal_based_rule_returns_Notification_rule_successfully_patched_response-1737539437\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"signal_correlation\"],\"query\":\"env:test\",\"trigger_source\":\"security_signals\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":0,\"version\":1}}}", + "string": "{\"data\":{\"id\":\"ob0-6ru-hc6\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1738763173259,\"created_by\":{\"name\":\"\",\"handle\":\"\"},\"enabled\":true,\"modified_at\":1738763173259,\"modified_by\":{\"name\":\"\",\"handle\":\"\"},\"name\":\"Test-Patch_a_signal_based_notification_rule_returns_Notification_rule_successfully_patched_response-1738763172\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"signal_correlation\"],\"query\":\"env:test\",\"trigger_source\":\"security_signals\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":0,\"version\":1}}}", "encoding": null }, "headers": { @@ -32,7 +32,7 @@ "message": "Created" } }, - "recorded_at": "Wed, 22 Jan 2025 09:50:37 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:46:12 GMT" }, { "request": { @@ -49,11 +49,11 @@ ] }, "method": "patch", - "uri": "https://api.datadoghq.com/api/v2/security/signals/notification_rules/h6x-nyx-fkm" + "uri": "https://api.datadoghq.com/api/v2/security/signals/notification_rules/ob0-6ru-hc6" }, "response": { "body": { - "string": "{\"data\":{\"id\":\"h6x-nyx-fkm\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1737539437401,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1737539437810,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Rule 1\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"query\":\"(source:production_service OR env:prod)\",\"trigger_source\":\"security_findings\"},\"targets\":[\"@john.doe@email.com\"],\"time_aggregation\":86400,\"version\":2}}}", + "string": "{\"data\":{\"id\":\"ob0-6ru-hc6\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1738763173259,\"created_by\":{\"name\":\"\",\"handle\":\"\"},\"enabled\":true,\"modified_at\":1738763173722,\"modified_by\":{\"name\":\"\",\"handle\":\"\"},\"name\":\"Rule 1\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"query\":\"(source:production_service OR env:prod)\",\"trigger_source\":\"security_findings\"},\"targets\":[\"@john.doe@email.com\"],\"time_aggregation\":86400,\"version\":2}}}", "encoding": null }, "headers": { @@ -66,7 +66,7 @@ "message": "OK" } }, - "recorded_at": "Wed, 22 Jan 2025 09:50:37 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:46:12 GMT" }, { "request": { @@ -77,7 +77,7 @@ ] }, "method": "delete", - "uri": "https://api.datadoghq.com/api/v2/security/signals/notification_rules/h6x-nyx-fkm" + "uri": "https://api.datadoghq.com/api/v2/security/signals/notification_rules/ob0-6ru-hc6" }, "response": { "body": { @@ -90,7 +90,7 @@ "message": "No Content" } }, - "recorded_at": "Wed, 22 Jan 2025 09:50:37 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:46:12 GMT" } ], "recorded_with": "VCR 6.0.0" diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-rule-returns-Bad-Request-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-rule-returns-Bad-Request-response.frozen deleted file mode 100644 index 50ebef7d3..000000000 --- a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-rule-returns-Bad-Request-response.frozen +++ /dev/null @@ -1 +0,0 @@ -2025-01-22T09:50:35.238Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-rule-returns-Not-Found-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-rule-returns-Not-Found-response.frozen deleted file mode 100644 index cbf78acea..000000000 --- a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-rule-returns-Not-Found-response.frozen +++ /dev/null @@ -1 +0,0 @@ -2025-01-22T09:50:36.599Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-rule-returns-Notification-rule-successfully-patched-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-rule-returns-Notification-rule-successfully-patched-response.frozen deleted file mode 100644 index dbfecb797..000000000 --- a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-signal-based-rule-returns-Notification-rule-successfully-patched-response.frozen +++ /dev/null @@ -1 +0,0 @@ -2025-01-22T09:50:37.086Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-notification-rule-returns-Bad-Request-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-notification-rule-returns-Bad-Request-response.frozen new file mode 100644 index 000000000..9c16ba59f --- /dev/null +++ b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-notification-rule-returns-Bad-Request-response.frozen @@ -0,0 +1 @@ +2025-02-05T13:46:14.056Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-rule-returns-Bad-Request-response.json b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-notification-rule-returns-Bad-Request-response.json similarity index 66% rename from tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-rule-returns-Bad-Request-response.json rename to tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-notification-rule-returns-Bad-Request-response.json index d5c9776e1..e045d4bdc 100644 --- a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-rule-returns-Bad-Request-response.json +++ b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-notification-rule-returns-Bad-Request-response.json @@ -3,7 +3,7 @@ { "request": { "body": { - "string": "{\"data\":{\"attributes\":{\"enabled\":true,\"name\":\"Test-Patch_a_vulnerability_based_rule_returns_Bad_Request_response-1737539438\",\"selectors\":{\"query\":\"env:test\",\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"severities\":[\"critical\"],\"trigger_source\":\"security_findings\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":86400},\"type\":\"notification_rules\"}}", + "string": "{\"data\":{\"attributes\":{\"enabled\":true,\"name\":\"Test-Patch_a_vulnerability_based_notification_rule_returns_Bad_Request_response-1738763174\",\"selectors\":{\"query\":\"env:test\",\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"severities\":[\"critical\"],\"trigger_source\":\"security_findings\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":86400},\"type\":\"notification_rules\"}}", "encoding": null }, "headers": { @@ -19,7 +19,7 @@ }, "response": { "body": { - "string": "{\"data\":{\"id\":\"ks5-ywq-grp\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1737539438831,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1737539438831,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Patch_a_vulnerability_based_rule_returns_Bad_Request_response-1737539438\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"query\":\"env:test\",\"trigger_source\":\"security_findings\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":86400,\"version\":1}}}", + "string": "{\"data\":{\"id\":\"flc-8up-dya\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1738763174531,\"created_by\":{\"name\":\"\",\"handle\":\"\"},\"enabled\":true,\"modified_at\":1738763174531,\"modified_by\":{\"name\":\"\",\"handle\":\"\"},\"name\":\"Test-Patch_a_vulnerability_based_notification_rule_returns_Bad_Request_response-1738763174\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"query\":\"env:test\",\"trigger_source\":\"security_findings\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":86400,\"version\":1}}}", "encoding": null }, "headers": { @@ -32,7 +32,7 @@ "message": "Created" } }, - "recorded_at": "Wed, 22 Jan 2025 09:50:38 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:46:14 GMT" }, { "request": { @@ -49,7 +49,7 @@ ] }, "method": "patch", - "uri": "https://api.datadoghq.com/api/v2/security/vulnerabilities/notification_rules/ks5-ywq-grp" + "uri": "https://api.datadoghq.com/api/v2/security/vulnerabilities/notification_rules/flc-8up-dya" }, "response": { "body": { @@ -66,7 +66,7 @@ "message": "Bad Request" } }, - "recorded_at": "Wed, 22 Jan 2025 09:50:38 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:46:14 GMT" }, { "request": { @@ -77,7 +77,7 @@ ] }, "method": "delete", - "uri": "https://api.datadoghq.com/api/v2/security/vulnerabilities/notification_rules/ks5-ywq-grp" + "uri": "https://api.datadoghq.com/api/v2/security/vulnerabilities/notification_rules/flc-8up-dya" }, "response": { "body": { @@ -90,7 +90,7 @@ "message": "No Content" } }, - "recorded_at": "Wed, 22 Jan 2025 09:50:38 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:46:14 GMT" } ], "recorded_with": "VCR 6.0.0" diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-notification-rule-returns-Not-Found-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-notification-rule-returns-Not-Found-response.frozen new file mode 100644 index 000000000..07ce0c964 --- /dev/null +++ b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-notification-rule-returns-Not-Found-response.frozen @@ -0,0 +1 @@ +2025-02-05T13:46:15.338Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-rule-returns-Not-Found-response.json b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-notification-rule-returns-Not-Found-response.json similarity index 95% rename from tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-rule-returns-Not-Found-response.json rename to tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-notification-rule-returns-Not-Found-response.json index ce9e2bab3..0c6f0368c 100644 --- a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-rule-returns-Not-Found-response.json +++ b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-notification-rule-returns-Not-Found-response.json @@ -32,7 +32,7 @@ "message": "Not Found" } }, - "recorded_at": "Wed, 22 Jan 2025 09:50:39 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:46:15 GMT" } ], "recorded_with": "VCR 6.0.0" diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-notification-rule-returns-Notification-rule-successfully-patched-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-notification-rule-returns-Notification-rule-successfully-patched-response.frozen new file mode 100644 index 000000000..f3adcb384 --- /dev/null +++ b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-notification-rule-returns-Notification-rule-successfully-patched-response.frozen @@ -0,0 +1 @@ +2025-02-05T13:46:15.824Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-rule-returns-Notification-rule-successfully-patched-response.json b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-notification-rule-returns-Notification-rule-successfully-patched-response.json similarity index 54% rename from tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-rule-returns-Notification-rule-successfully-patched-response.json rename to tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-notification-rule-returns-Notification-rule-successfully-patched-response.json index 9bcaa4785..5e3f9c34a 100644 --- a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-rule-returns-Notification-rule-successfully-patched-response.json +++ b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-notification-rule-returns-Notification-rule-successfully-patched-response.json @@ -3,7 +3,7 @@ { "request": { "body": { - "string": "{\"data\":{\"attributes\":{\"enabled\":true,\"name\":\"Test-Patch_a_vulnerability_based_rule_returns_Notification_rule_successfully_patched_response-1737539440\",\"selectors\":{\"query\":\"env:test\",\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"severities\":[\"critical\"],\"trigger_source\":\"security_findings\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":86400},\"type\":\"notification_rules\"}}", + "string": "{\"data\":{\"attributes\":{\"enabled\":true,\"name\":\"Test-Patch_a_vulnerability_based_notification_rule_returns_Notification_rule_successfully_patched_respons-1738763175\",\"selectors\":{\"query\":\"env:test\",\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"severities\":[\"critical\"],\"trigger_source\":\"security_findings\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":86400},\"type\":\"notification_rules\"}}", "encoding": null }, "headers": { @@ -19,7 +19,7 @@ }, "response": { "body": { - "string": "{\"data\":{\"id\":\"a40-xl3-95h\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1737539440872,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1737539440872,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Test-Patch_a_vulnerability_based_rule_returns_Notification_rule_successfully_patched_response-1737539440\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"query\":\"env:test\",\"trigger_source\":\"security_findings\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":86400,\"version\":1}}}", + "string": "{\"data\":{\"id\":\"tnd-jgq-yl5\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1738763176297,\"created_by\":{\"name\":\"\",\"handle\":\"\"},\"enabled\":true,\"modified_at\":1738763176297,\"modified_by\":{\"name\":\"\",\"handle\":\"\"},\"name\":\"Test-Patch_a_vulnerability_based_notification_rule_returns_Notification_rule_successfully_patched_respons-1738763175\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"query\":\"env:test\",\"trigger_source\":\"security_findings\"},\"targets\":[\"@email@email.com\"],\"time_aggregation\":86400,\"version\":1}}}", "encoding": null }, "headers": { @@ -32,7 +32,7 @@ "message": "Created" } }, - "recorded_at": "Wed, 22 Jan 2025 09:50:40 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:46:15 GMT" }, { "request": { @@ -49,11 +49,11 @@ ] }, "method": "patch", - "uri": "https://api.datadoghq.com/api/v2/security/vulnerabilities/notification_rules/a40-xl3-95h" + "uri": "https://api.datadoghq.com/api/v2/security/vulnerabilities/notification_rules/tnd-jgq-yl5" }, "response": { "body": { - "string": "{\"data\":{\"id\":\"a40-xl3-95h\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1737539440872,\"created_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"enabled\":true,\"modified_at\":1737539441254,\"modified_by\":{\"name\":\"frog\",\"handle\":\"frog@datadoghq.com\"},\"name\":\"Rule 1\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"query\":\"(source:production_service OR env:prod)\",\"trigger_source\":\"security_findings\"},\"targets\":[\"@john.doe@email.com\"],\"time_aggregation\":86400,\"version\":2}}}", + "string": "{\"data\":{\"id\":\"tnd-jgq-yl5\",\"type\":\"notification_rules\",\"attributes\":{\"created_at\":1738763176297,\"created_by\":{\"name\":\"\",\"handle\":\"\"},\"enabled\":true,\"modified_at\":1738763176649,\"modified_by\":{\"name\":\"\",\"handle\":\"\"},\"name\":\"Rule 1\",\"selectors\":{\"severities\":[\"critical\"],\"rule_types\":[\"misconfiguration\",\"attack_path\"],\"query\":\"(source:production_service OR env:prod)\",\"trigger_source\":\"security_findings\"},\"targets\":[\"@john.doe@email.com\"],\"time_aggregation\":86400,\"version\":2}}}", "encoding": null }, "headers": { @@ -66,7 +66,7 @@ "message": "OK" } }, - "recorded_at": "Wed, 22 Jan 2025 09:50:40 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:46:15 GMT" }, { "request": { @@ -77,7 +77,7 @@ ] }, "method": "delete", - "uri": "https://api.datadoghq.com/api/v2/security/vulnerabilities/notification_rules/a40-xl3-95h" + "uri": "https://api.datadoghq.com/api/v2/security/vulnerabilities/notification_rules/tnd-jgq-yl5" }, "response": { "body": { @@ -90,7 +90,7 @@ "message": "No Content" } }, - "recorded_at": "Wed, 22 Jan 2025 09:50:40 GMT" + "recorded_at": "Wed, 05 Feb 2025 13:46:15 GMT" } ], "recorded_with": "VCR 6.0.0" diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-rule-returns-Bad-Request-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-rule-returns-Bad-Request-response.frozen deleted file mode 100644 index fcdc31ed0..000000000 --- a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-rule-returns-Bad-Request-response.frozen +++ /dev/null @@ -1 +0,0 @@ -2025-01-22T09:50:38.399Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-rule-returns-Not-Found-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-rule-returns-Not-Found-response.frozen deleted file mode 100644 index f24abb9c9..000000000 --- a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-rule-returns-Not-Found-response.frozen +++ /dev/null @@ -1 +0,0 @@ -2025-01-22T09:50:39.942Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-rule-returns-Notification-rule-successfully-patched-response.frozen b/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-rule-returns-Notification-rule-successfully-patched-response.frozen deleted file mode 100644 index e2e97276a..000000000 --- a/tests/scenarios/cassettes/v2/security_monitoring/Patch-a-vulnerability-based-rule-returns-Notification-rule-successfully-patched-response.frozen +++ /dev/null @@ -1 +0,0 @@ -2025-01-22T09:50:40.442Z \ No newline at end of file diff --git a/tests/scenarios/features/v2/security_monitoring.feature b/tests/scenarios/features/v2/security_monitoring.feature index d7e7f9af7..aaea07a9f 100644 --- a/tests/scenarios/features/v2/security_monitoring.feature +++ b/tests/scenarios/features/v2/security_monitoring.feature @@ -236,28 +236,28 @@ Feature: Security Monitoring And the response "isEnabled" is equal to true @generated @skip @team:DataDog/cloud-security-posture-management - Scenario: Create a new signal-based rule returns "Bad Request" response + Scenario: Create a new signal-based notification rule returns "Bad Request" response Given new "CreateSignalNotificationRule" request And body with value {"data": {"attributes": {"enabled": true, "name": "Rule 1", "selectors": {"query": "(source:production_service OR env:prod)", "rule_types": ["misconfiguration", "attack_path"], "severities": ["critical"], "trigger_source": "security_findings"}, "targets": ["@john.doe@email.com"], "time_aggregation": 86400}, "type": "notification_rules"}} When the request is sent Then the response status is 400 Bad Request @team:DataDog/cloud-security-posture-management - Scenario: Create a new signal-based rule returns "Successfully created the notification rule." response + Scenario: Create a new signal-based notification rule returns "Successfully created the notification rule." response Given new "CreateSignalNotificationRule" request And body with value {"data": {"attributes": {"enabled": true, "name": "Rule 1", "selectors": {"query": "(source:production_service OR env:prod)", "rule_types": ["misconfiguration", "attack_path"], "severities": ["critical"], "trigger_source": "security_findings"}, "targets": ["@john.doe@email.com"], "time_aggregation": 86400}, "type": "notification_rules"}} When the request is sent Then the response status is 201 Successfully created the notification rule. @generated @skip @team:DataDog/cloud-security-posture-management - Scenario: Create a new vulnerability-based rule returns "Bad Request" response + Scenario: Create a new vulnerability-based notification rule returns "Bad Request" response Given new "CreateVulnerabilityNotificationRule" request And body with value {"data": {"attributes": {"enabled": true, "name": "Rule 1", "selectors": {"query": "(source:production_service OR env:prod)", "rule_types": ["misconfiguration", "attack_path"], "severities": ["critical"], "trigger_source": "security_findings"}, "targets": ["@john.doe@email.com"], "time_aggregation": 86400}, "type": "notification_rules"}} When the request is sent Then the response status is 400 Bad Request @team:DataDog/cloud-security-posture-management - Scenario: Create a new vulnerability-based rule returns "Successfully created the notification rule." response + Scenario: Create a new vulnerability-based notification rule returns "Successfully created the notification rule." response Given new "CreateVulnerabilityNotificationRule" request And body with value {"data": {"attributes": {"enabled": true, "name": "Rule 1", "selectors": {"query": "(source:production_service OR env:prod)", "rule_types": ["misconfiguration", "attack_path"], "severities": ["critical"], "trigger_source": "security_findings"}, "targets": ["@john.doe@email.com"], "time_aggregation": 86400}, "type": "notification_rules"}} When the request is sent @@ -354,14 +354,14 @@ Feature: Security Monitoring Then the response status is 204 OK @team:DataDog/cloud-security-posture-management - Scenario: Delete a signal-based rule returns "Not Found" response + Scenario: Delete a signal-based notification rule returns "Not Found" response Given new "DeleteSignalNotificationRule" request And request contains "id" parameter with value "000-000-000" When the request is sent Then the response status is 404 Not Found @team:DataDog/cloud-security-posture-management - Scenario: Delete a signal-based rule returns "Rule successfully deleted." response + Scenario: Delete a signal-based notification rule returns "Rule successfully deleted." response Given there is a valid "valid_signal_notification_rule" in the system And new "DeleteSignalNotificationRule" request And request contains "id" parameter from "valid_signal_notification_rule.data.id" @@ -384,14 +384,14 @@ Feature: Security Monitoring Then the response status is 204 OK @team:DataDog/cloud-security-posture-management - Scenario: Delete a vulnerability-based rule returns "Not Found" response + Scenario: Delete a vulnerability-based notification rule returns "Not Found" response Given new "DeleteVulnerabilityNotificationRule" request And request contains "id" parameter with value "000-000-000" When the request is sent Then the response status is 404 Not Found @team:DataDog/cloud-security-posture-management - Scenario: Delete a vulnerability-based rule returns "Rule successfully deleted." response + Scenario: Delete a vulnerability-based notification rule returns "Rule successfully deleted." response Given there is a valid "valid_vulnerability_notification_rule" in the system And new "DeleteVulnerabilityNotificationRule" request And request contains "id" parameter from "valid_vulnerability_notification_rule.data.id" @@ -655,21 +655,21 @@ Feature: Security Monitoring Then the response status is 200 OK @generated @skip @team:DataDog/cloud-security-posture-management - Scenario: Get details of a signal-based rule returns "Bad Request" response + Scenario: Get details of a signal-based notification rule returns "Bad Request" response Given new "GetSignalNotificationRule" request And request contains "id" parameter from "REPLACE.ME" When the request is sent Then the response status is 400 Bad Request @team:DataDog/cloud-security-posture-management - Scenario: Get details of a signal-based rule returns "Not Found" response + Scenario: Get details of a signal-based notification rule returns "Not Found" response Given new "GetSignalNotificationRule" request And request contains "id" parameter with value "000-000-000" When the request is sent Then the response status is 404 Not Found @team:DataDog/cloud-security-posture-management - Scenario: Get details of a signal-based rule returns "Notification rule details." response + Scenario: Get details of a signal-based notification rule returns "Notification rule details." response Given there is a valid "valid_signal_notification_rule" in the system And new "GetSignalNotificationRule" request And request contains "id" parameter from "valid_signal_notification_rule.data.id" @@ -677,21 +677,21 @@ Feature: Security Monitoring Then the response status is 200 Notification rule details. @generated @skip @team:DataDog/cloud-security-posture-management - Scenario: Get details of a vulnerability-based rule returns "Bad Request" response + Scenario: Get details of a vulnerability notification rule returns "Bad Request" response Given new "GetVulnerabilityNotificationRule" request And request contains "id" parameter from "REPLACE.ME" When the request is sent Then the response status is 400 Bad Request @team:DataDog/cloud-security-posture-management - Scenario: Get details of a vulnerability-based rule returns "Not Found" response + Scenario: Get details of a vulnerability notification rule returns "Not Found" response Given new "GetVulnerabilityNotificationRule" request And request contains "id" parameter with value "000-000-000" When the request is sent Then the response status is 404 Not Found @team:DataDog/cloud-security-posture-management - Scenario: Get details of a vulnerability-based rule returns "Notification rule details." response + Scenario: Get details of a vulnerability notification rule returns "Notification rule details." response Given there is a valid "valid_vulnerability_notification_rule" in the system And new "GetVulnerabilityNotificationRule" request And request contains "id" parameter from "valid_vulnerability_notification_rule.data.id" @@ -699,14 +699,14 @@ Feature: Security Monitoring Then the response status is 200 Notification rule details. @team:DataDog/cloud-security-posture-management - Scenario: Get the list of signal-based rules returns "The list of notification rules." response + Scenario: Get the list of signal-based notification rules returns "The list of notification rules." response Given there is a valid "valid_signal_notification_rule" in the system And new "GetSignalNotificationRules" request When the request is sent Then the response status is 200 The list of notification rules. @team:DataDog/cloud-security-posture-management - Scenario: Get the list of vulnerability-based rules returns "The list of notification rules." response + Scenario: Get the list of vulnerability notification rules returns "The list of notification rules." response Given there is a valid "valid_vulnerability_notification_rule" in the system And new "GetVulnerabilityNotificationRules" request When the request is sent @@ -881,7 +881,7 @@ Feature: Security Monitoring Then the response status is 200 OK @team:DataDog/cloud-security-posture-management - Scenario: Patch a signal-based rule returns "Bad Request" response + Scenario: Patch a signal-based notification rule returns "Bad Request" response Given new "PatchSignalNotificationRule" request And there is a valid "valid_signal_notification_rule" in the system And request contains "id" parameter from "valid_signal_notification_rule.data.id" @@ -890,7 +890,7 @@ Feature: Security Monitoring Then the response status is 400 Bad Request @team:DataDog/cloud-security-posture-management - Scenario: Patch a signal-based rule returns "Not Found" response + Scenario: Patch a signal-based notification rule returns "Not Found" response Given new "PatchSignalNotificationRule" request And request contains "id" parameter with value "000-000-000" And body with value {"data": {"attributes": {"enabled": true, "name": "Rule 1", "selectors": {"query": "(source:production_service OR env:prod)", "rule_types": ["misconfiguration", "attack_path"], "severities": ["critical"], "trigger_source": "security_findings"}, "targets": ["@john.doe@email.com"], "time_aggregation": 86400, "version": 1}, "id": "aaa-bbb-ccc", "type": "notification_rules"}} @@ -898,7 +898,7 @@ Feature: Security Monitoring Then the response status is 404 Not Found @team:DataDog/cloud-security-posture-management - Scenario: Patch a signal-based rule returns "Notification rule successfully patched." response + Scenario: Patch a signal-based notification rule returns "Notification rule successfully patched." response Given new "PatchSignalNotificationRule" request And there is a valid "valid_signal_notification_rule" in the system And request contains "id" parameter from "valid_signal_notification_rule.data.id" @@ -907,7 +907,7 @@ Feature: Security Monitoring Then the response status is 200 Notification rule successfully patched. @generated @skip @team:DataDog/cloud-security-posture-management - Scenario: Patch a signal-based rule returns "The server cannot process the request because it contains invalid data." response + Scenario: Patch a signal-based notification rule returns "The server cannot process the request because it contains invalid data." response Given new "PatchSignalNotificationRule" request And request contains "id" parameter from "REPLACE.ME" And body with value {"data": {"attributes": {"enabled": true, "name": "Rule 1", "selectors": {"query": "(source:production_service OR env:prod)", "rule_types": ["misconfiguration", "attack_path"], "severities": ["critical"], "trigger_source": "security_findings"}, "targets": ["@john.doe@email.com"], "time_aggregation": 86400, "version": 1}, "id": "aaa-bbb-ccc", "type": "notification_rules"}} @@ -915,7 +915,7 @@ Feature: Security Monitoring Then the response status is 422 The server cannot process the request because it contains invalid data. @team:DataDog/cloud-security-posture-management - Scenario: Patch a vulnerability-based rule returns "Bad Request" response + Scenario: Patch a vulnerability-based notification rule returns "Bad Request" response Given new "PatchVulnerabilityNotificationRule" request And there is a valid "valid_vulnerability_notification_rule" in the system And request contains "id" parameter from "valid_vulnerability_notification_rule.data.id" @@ -924,7 +924,7 @@ Feature: Security Monitoring Then the response status is 400 Bad Request @team:DataDog/cloud-security-posture-management - Scenario: Patch a vulnerability-based rule returns "Not Found" response + Scenario: Patch a vulnerability-based notification rule returns "Not Found" response Given new "PatchVulnerabilityNotificationRule" request And request contains "id" parameter with value "000-000-000" And body with value {"data": {"attributes": {"enabled": true, "name": "Rule 1", "selectors": {"query": "(source:production_service OR env:prod)", "rule_types": ["misconfiguration", "attack_path"], "severities": ["critical"], "trigger_source": "security_findings"}, "targets": ["@john.doe@email.com"], "time_aggregation": 86400, "version": 1}, "id": "aaa-bbb-ccc", "type": "notification_rules"}} @@ -932,7 +932,7 @@ Feature: Security Monitoring Then the response status is 404 Not Found @team:DataDog/cloud-security-posture-management - Scenario: Patch a vulnerability-based rule returns "Notification rule successfully patched." response + Scenario: Patch a vulnerability-based notification rule returns "Notification rule successfully patched." response Given new "PatchVulnerabilityNotificationRule" request And there is a valid "valid_vulnerability_notification_rule" in the system And request contains "id" parameter from "valid_vulnerability_notification_rule.data.id" @@ -941,7 +941,7 @@ Feature: Security Monitoring Then the response status is 200 Notification rule successfully patched. @generated @skip @team:DataDog/cloud-security-posture-management - Scenario: Patch a vulnerability-based rule returns "The server cannot process the request because it contains invalid data." response + Scenario: Patch a vulnerability-based notification rule returns "The server cannot process the request because it contains invalid data." response Given new "PatchVulnerabilityNotificationRule" request And request contains "id" parameter from "REPLACE.ME" And body with value {"data": {"attributes": {"enabled": true, "name": "Rule 1", "selectors": {"query": "(source:production_service OR env:prod)", "rule_types": ["misconfiguration", "attack_path"], "severities": ["critical"], "trigger_source": "security_findings"}, "targets": ["@john.doe@email.com"], "time_aggregation": 86400, "version": 1}, "id": "aaa-bbb-ccc", "type": "notification_rules"}}