Skip to content

Commit 8a1568e

Browse files
author
ci.datadog-api-spec
committed
Regenerate client from commit bb11200 of spec repo
1 parent e69ac55 commit 8a1568e

File tree

5 files changed

+69
-32
lines changed

5 files changed

+69
-32
lines changed

.generator/schemas/v2/openapi.yaml

Lines changed: 52 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -45795,6 +45795,13 @@ components:
4579545795
description: The unique identifier for this component. Used in other parts of the pipeline to reference this component (for example, as the `input` to downstream components).
4579645796
example: splunk-hec-source
4579745797
type: string
45798+
store_hec_token:
45799+
default: false
45800+
description: |-
45801+
If `true`, the HEC token is stored in the event's metadata and made available to the Enrichment Table
45802+
processor and the `splunk_hec` destination for routing or enrichment based on the token. Defaults to `false`.
45803+
example: true
45804+
type: boolean
4579845805
tls:
4579945806
$ref: "#/components/schemas/ObservabilityPipelineTls"
4580045807
type:
@@ -57909,7 +57916,6 @@ components:
5790957916
- none
5791057917
- false_positive
5791157918
- testing_or_maintenance
57912-
- remediated
5791357919
- investigated_case_opened
5791457920
- true_positive_benign
5791557921
- true_positive_malicious
@@ -57919,7 +57925,6 @@ components:
5791957925
- NONE
5792057926
- FALSE_POSITIVE
5792157927
- TESTING_OR_MAINTENANCE
57922-
- REMEDIATED
5792357928
- INVESTIGATED_CASE_OPENED
5792457929
- TRUE_POSITIVE_BENIGN
5792557930
- TRUE_POSITIVE_MALICIOUS
@@ -102449,8 +102454,6 @@ paths:
102449102454
schema:
102450102455
$ref: "#/components/schemas/SecurityMonitoringSignalResponse"
102451102456
description: OK
102452-
"403":
102453-
$ref: "#/components/responses/NotAuthorizedResponse"
102454102457
"404":
102455102458
$ref: "#/components/responses/NotFoundResponse"
102456102459
"429":
@@ -102488,17 +102491,25 @@ paths:
102488102491
$ref: "#/components/schemas/SecurityMonitoringSignalTriageUpdateResponse"
102489102492
description: OK
102490102493
"400":
102491-
$ref: "#/components/responses/BadRequestResponse"
102494+
content:
102495+
application/json:
102496+
schema:
102497+
$ref: "#/components/schemas/APIErrorResponse"
102498+
description: Bad Request
102492102499
"403":
102493-
$ref: "#/components/responses/NotAuthorizedResponse"
102500+
content:
102501+
application/json:
102502+
schema:
102503+
$ref: "#/components/schemas/APIErrorResponse"
102504+
description: Forbidden
102494102505
"404":
102495-
$ref: "#/components/responses/NotFoundResponse"
102506+
content:
102507+
application/json:
102508+
schema:
102509+
$ref: "#/components/schemas/APIErrorResponse"
102510+
description: Not Found
102496102511
"429":
102497102512
$ref: "#/components/responses/TooManyRequestsResponse"
102498-
security:
102499-
- apiKeyAuth: []
102500-
appKeyAuth: []
102501-
- AuthZ: []
102502102513
summary: Modify the triage assignee of a security signal
102503102514
tags: ["Security Monitoring"]
102504102515
x-codegen-request-body-name: body
@@ -102528,17 +102539,25 @@ paths:
102528102539
$ref: "#/components/schemas/SecurityMonitoringSignalTriageUpdateResponse"
102529102540
description: OK
102530102541
"400":
102531-
$ref: "#/components/responses/BadRequestResponse"
102542+
content:
102543+
application/json:
102544+
schema:
102545+
$ref: "#/components/schemas/APIErrorResponse"
102546+
description: Bad Request
102532102547
"403":
102533-
$ref: "#/components/responses/NotAuthorizedResponse"
102548+
content:
102549+
application/json:
102550+
schema:
102551+
$ref: "#/components/schemas/APIErrorResponse"
102552+
description: Forbidden
102534102553
"404":
102535-
$ref: "#/components/responses/NotFoundResponse"
102554+
content:
102555+
application/json:
102556+
schema:
102557+
$ref: "#/components/schemas/APIErrorResponse"
102558+
description: Not Found
102536102559
"429":
102537102560
$ref: "#/components/responses/TooManyRequestsResponse"
102538-
security:
102539-
- apiKeyAuth: []
102540-
appKeyAuth: []
102541-
- AuthZ: []
102542102561
summary: Change the related incidents of a security signal
102543102562
tags: ["Security Monitoring"]
102544102563
x-codegen-request-body-name: body
@@ -102568,17 +102587,25 @@ paths:
102568102587
$ref: "#/components/schemas/SecurityMonitoringSignalTriageUpdateResponse"
102569102588
description: OK
102570102589
"400":
102571-
$ref: "#/components/responses/BadRequestResponse"
102590+
content:
102591+
application/json:
102592+
schema:
102593+
$ref: "#/components/schemas/APIErrorResponse"
102594+
description: Bad Request
102572102595
"403":
102573-
$ref: "#/components/responses/NotAuthorizedResponse"
102596+
content:
102597+
application/json:
102598+
schema:
102599+
$ref: "#/components/schemas/APIErrorResponse"
102600+
description: Forbidden
102574102601
"404":
102575-
$ref: "#/components/responses/NotFoundResponse"
102602+
content:
102603+
application/json:
102604+
schema:
102605+
$ref: "#/components/schemas/APIErrorResponse"
102606+
description: Not Found
102576102607
"429":
102577102608
$ref: "#/components/responses/TooManyRequestsResponse"
102578-
security:
102579-
- apiKeyAuth: []
102580-
appKeyAuth: []
102581-
- AuthZ: []
102582102609
summary: Change the triage state of a security signal
102583102610
tags: ["Security Monitoring"]
102584102611
x-codegen-request-body-name: body

src/datadog_api_client/v2/api/security_monitoring_api.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -749,7 +749,7 @@ def __init__(self, api_client=None):
749749
self._edit_security_monitoring_signal_assignee_endpoint = _Endpoint(
750750
settings={
751751
"response_type": (SecurityMonitoringSignalTriageUpdateResponse,),
752-
"auth": ["apiKeyAuth", "appKeyAuth", "AuthZ"],
752+
"auth": ["apiKeyAuth", "appKeyAuth"],
753753
"endpoint_path": "/api/v2/security_monitoring/signals/{signal_id}/assignee",
754754
"operation_id": "edit_security_monitoring_signal_assignee",
755755
"http_method": "PATCH",
@@ -775,7 +775,7 @@ def __init__(self, api_client=None):
775775
self._edit_security_monitoring_signal_incidents_endpoint = _Endpoint(
776776
settings={
777777
"response_type": (SecurityMonitoringSignalTriageUpdateResponse,),
778-
"auth": ["apiKeyAuth", "appKeyAuth", "AuthZ"],
778+
"auth": ["apiKeyAuth", "appKeyAuth"],
779779
"endpoint_path": "/api/v2/security_monitoring/signals/{signal_id}/incidents",
780780
"operation_id": "edit_security_monitoring_signal_incidents",
781781
"http_method": "PATCH",
@@ -801,7 +801,7 @@ def __init__(self, api_client=None):
801801
self._edit_security_monitoring_signal_state_endpoint = _Endpoint(
802802
settings={
803803
"response_type": (SecurityMonitoringSignalTriageUpdateResponse,),
804-
"auth": ["apiKeyAuth", "appKeyAuth", "AuthZ"],
804+
"auth": ["apiKeyAuth", "appKeyAuth"],
805805
"endpoint_path": "/api/v2/security_monitoring/signals/{signal_id}/state",
806806
"operation_id": "edit_security_monitoring_signal_state",
807807
"http_method": "PATCH",

src/datadog_api_client/v2/model/observability_pipeline_config_source_item.py

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -91,6 +91,10 @@ def __init__(self, **kwargs):
9191
:param framing: Framing method configuration for the socket source.
9292
:type framing: ObservabilityPipelineSocketSourceFraming
9393
94+
:param store_hec_token: If `true`, the HEC token is stored in the event's metadata and made available to the Enrichment Table
95+
processor and the `splunk_hec` destination for routing or enrichment based on the token. Defaults to `false`.
96+
:type store_hec_token: bool, optional
97+
9498
:param grpc_address_key: Environment variable name containing the gRPC server address for receiving OTLP data. Must be a valid environment variable name (alphanumeric characters and underscores only).
9599
:type grpc_address_key: str, optional
96100

src/datadog_api_client/v2/model/observability_pipeline_splunk_hec_source.py

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,13 +31,15 @@ def openapi_types(_):
3131
return {
3232
"address_key": (str,),
3333
"id": (str,),
34+
"store_hec_token": (bool,),
3435
"tls": (ObservabilityPipelineTls,),
3536
"type": (ObservabilityPipelineSplunkHecSourceType,),
3637
}
3738

3839
attribute_map = {
3940
"address_key": "address_key",
4041
"id": "id",
42+
"store_hec_token": "store_hec_token",
4143
"tls": "tls",
4244
"type": "type",
4345
}
@@ -47,6 +49,7 @@ def __init__(
4749
id: str,
4850
type: ObservabilityPipelineSplunkHecSourceType,
4951
address_key: Union[str, UnsetType] = unset,
52+
store_hec_token: Union[bool, UnsetType] = unset,
5053
tls: Union[ObservabilityPipelineTls, UnsetType] = unset,
5154
**kwargs,
5255
):
@@ -61,6 +64,10 @@ def __init__(
6164
:param id: The unique identifier for this component. Used in other parts of the pipeline to reference this component (for example, as the ``input`` to downstream components).
6265
:type id: str
6366
67+
:param store_hec_token: If ``true`` , the HEC token is stored in the event's metadata and made available to the Enrichment Table
68+
processor and the ``splunk_hec`` destination for routing or enrichment based on the token. Defaults to ``false``.
69+
:type store_hec_token: bool, optional
70+
6471
:param tls: Configuration for enabling TLS encryption between the pipeline component and external services.
6572
:type tls: ObservabilityPipelineTls, optional
6673
@@ -69,6 +76,8 @@ def __init__(
6976
"""
7077
if address_key is not unset:
7178
kwargs["address_key"] = address_key
79+
if store_hec_token is not unset:
80+
kwargs["store_hec_token"] = store_hec_token
7281
if tls is not unset:
7382
kwargs["tls"] = tls
7483
super().__init__(kwargs)

src/datadog_api_client/v2/model/security_monitoring_signal_archive_reason.py

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,15 +16,14 @@ class SecurityMonitoringSignalArchiveReason(ModelSimple):
1616
"""
1717
Reason a signal is archived.
1818
19-
:param value: Must be one of ["none", "false_positive", "testing_or_maintenance", "remediated", "investigated_case_opened", "true_positive_benign", "true_positive_malicious", "other"].
19+
:param value: Must be one of ["none", "false_positive", "testing_or_maintenance", "investigated_case_opened", "true_positive_benign", "true_positive_malicious", "other"].
2020
:type value: str
2121
"""
2222

2323
allowed_values = {
2424
"none",
2525
"false_positive",
2626
"testing_or_maintenance",
27-
"remediated",
2827
"investigated_case_opened",
2928
"true_positive_benign",
3029
"true_positive_malicious",
@@ -33,7 +32,6 @@ class SecurityMonitoringSignalArchiveReason(ModelSimple):
3332
NONE: ClassVar["SecurityMonitoringSignalArchiveReason"]
3433
FALSE_POSITIVE: ClassVar["SecurityMonitoringSignalArchiveReason"]
3534
TESTING_OR_MAINTENANCE: ClassVar["SecurityMonitoringSignalArchiveReason"]
36-
REMEDIATED: ClassVar["SecurityMonitoringSignalArchiveReason"]
3735
INVESTIGATED_CASE_OPENED: ClassVar["SecurityMonitoringSignalArchiveReason"]
3836
TRUE_POSITIVE_BENIGN: ClassVar["SecurityMonitoringSignalArchiveReason"]
3937
TRUE_POSITIVE_MALICIOUS: ClassVar["SecurityMonitoringSignalArchiveReason"]
@@ -51,7 +49,6 @@ def openapi_types(_):
5149
SecurityMonitoringSignalArchiveReason.TESTING_OR_MAINTENANCE = SecurityMonitoringSignalArchiveReason(
5250
"testing_or_maintenance"
5351
)
54-
SecurityMonitoringSignalArchiveReason.REMEDIATED = SecurityMonitoringSignalArchiveReason("remediated")
5552
SecurityMonitoringSignalArchiveReason.INVESTIGATED_CASE_OPENED = SecurityMonitoringSignalArchiveReason(
5653
"investigated_case_opened"
5754
)

0 commit comments

Comments
 (0)