Skip to content

Commit 4af098c

Browse files
author
ci.datadog-api-spec
committed
Regenerate client from commit 546916a of spec repo
1 parent 8631953 commit 4af098c

15 files changed

+128
-61
lines changed

.generator/schemas/v2/openapi.yaml

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46982,6 +46982,14 @@ components:
4698246982
the queries to search signals in the signal explorer.
4698346983
example: env:staging status:low
4698446984
type: string
46985+
tags:
46986+
description: List of tags associated with the suppression rule.
46987+
example:
46988+
- technique:T1110-brute-force
46989+
- source:cloudtrail
46990+
items:
46991+
type: string
46992+
type: array
4698546993
update_date:
4698646994
description: A Unix millisecond timestamp given the update date of the suppression
4698746995
rule.
@@ -47043,6 +47051,14 @@ components:
4704347051
same syntax as the queries to search signals in the Signals Explorer.
4704447052
example: env:staging status:low
4704547053
type: string
47054+
tags:
47055+
description: List of tags associated with the suppression rule.
47056+
example:
47057+
- technique:T1110-brute-force
47058+
- source:cloudtrail
47059+
items:
47060+
type: string
47061+
type: array
4704647062
required:
4704747063
- name
4704847064
- enabled
@@ -47138,6 +47154,14 @@ components:
4713847154
the queries to search signals in the signal explorer.
4713947155
example: env:staging status:low
4714047156
type: string
47157+
tags:
47158+
description: List of tags associated with the suppression rule.
47159+
example:
47160+
- technique:T1110-brute-force
47161+
- source:cloudtrail
47162+
items:
47163+
type: string
47164+
type: array
4714147165
version:
4714247166
description: The current version of the suppression. This is optional, but
4714347167
it can help prevent concurrent modifications.

examples/v2_security-monitoring_CreateSecurityMonitoringSuppression.rs

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,11 @@ async fn main() {
2020
)
2121
.expiration_date(1638443471000)
2222
.start_date(1637493071000)
23-
.suppression_query("env:staging status:low".to_string()),
23+
.suppression_query("env:staging status:low".to_string())
24+
.tags(vec![
25+
"technique:T1110-brute-force".to_string(),
26+
"source:cloudtrail".to_string(),
27+
]),
2428
SecurityMonitoringSuppressionType::SUPPRESSIONS,
2529
),
2630
);

src/datadogV2/model/model_security_monitoring_suppression_attributes.rs

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,9 @@ pub struct SecurityMonitoringSuppressionAttributes {
4444
/// The suppression query of the suppression rule. If a signal matches this query, it is suppressed and not triggered. Same syntax as the queries to search signals in the signal explorer.
4545
#[serde(rename = "suppression_query")]
4646
pub suppression_query: Option<String>,
47+
/// List of tags associated with the suppression rule.
48+
#[serde(rename = "tags")]
49+
pub tags: Option<Vec<String>>,
4750
/// A Unix millisecond timestamp given the update date of the suppression rule.
4851
#[serde(rename = "update_date")]
4952
pub update_date: Option<i64>,
@@ -74,6 +77,7 @@ impl SecurityMonitoringSuppressionAttributes {
7477
rule_query: None,
7578
start_date: None,
7679
suppression_query: None,
80+
tags: None,
7781
update_date: None,
7882
updater: None,
7983
version: None,
@@ -137,6 +141,11 @@ impl SecurityMonitoringSuppressionAttributes {
137141
self
138142
}
139143

144+
pub fn tags(mut self, value: Vec<String>) -> Self {
145+
self.tags = Some(value);
146+
self
147+
}
148+
140149
pub fn update_date(mut self, value: i64) -> Self {
141150
self.update_date = Some(value);
142151
self
@@ -195,6 +204,7 @@ impl<'de> Deserialize<'de> for SecurityMonitoringSuppressionAttributes {
195204
let mut rule_query: Option<String> = None;
196205
let mut start_date: Option<i64> = None;
197206
let mut suppression_query: Option<String> = None;
207+
let mut tags: Option<Vec<String>> = None;
198208
let mut update_date: Option<i64> = None;
199209
let mut updater: Option<crate::datadogV2::model::SecurityMonitoringUser> = None;
200210
let mut version: Option<i32> = None;
@@ -277,6 +287,12 @@ impl<'de> Deserialize<'de> for SecurityMonitoringSuppressionAttributes {
277287
suppression_query =
278288
Some(serde_json::from_value(v).map_err(M::Error::custom)?);
279289
}
290+
"tags" => {
291+
if v.is_null() {
292+
continue;
293+
}
294+
tags = Some(serde_json::from_value(v).map_err(M::Error::custom)?);
295+
}
280296
"update_date" => {
281297
if v.is_null() {
282298
continue;
@@ -316,6 +332,7 @@ impl<'de> Deserialize<'de> for SecurityMonitoringSuppressionAttributes {
316332
rule_query,
317333
start_date,
318334
suppression_query,
335+
tags,
319336
update_date,
320337
updater,
321338
version,

src/datadogV2/model/model_security_monitoring_suppression_create_attributes.rs

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,9 @@ pub struct SecurityMonitoringSuppressionCreateAttributes {
3535
/// The suppression query of the suppression rule. If a signal matches this query, it is suppressed and is not triggered. It uses the same syntax as the queries to search signals in the Signals Explorer.
3636
#[serde(rename = "suppression_query")]
3737
pub suppression_query: Option<String>,
38+
/// List of tags associated with the suppression rule.
39+
#[serde(rename = "tags")]
40+
pub tags: Option<Vec<String>>,
3841
#[serde(flatten)]
3942
pub additional_properties: std::collections::BTreeMap<String, serde_json::Value>,
4043
#[serde(skip)]
@@ -57,6 +60,7 @@ impl SecurityMonitoringSuppressionCreateAttributes {
5760
rule_query,
5861
start_date: None,
5962
suppression_query: None,
63+
tags: None,
6064
additional_properties: std::collections::BTreeMap::new(),
6165
_unparsed: false,
6266
}
@@ -87,6 +91,11 @@ impl SecurityMonitoringSuppressionCreateAttributes {
8791
self
8892
}
8993

94+
pub fn tags(mut self, value: Vec<String>) -> Self {
95+
self.tags = Some(value);
96+
self
97+
}
98+
9099
pub fn additional_properties(
91100
mut self,
92101
value: std::collections::BTreeMap<String, serde_json::Value>,
@@ -121,6 +130,7 @@ impl<'de> Deserialize<'de> for SecurityMonitoringSuppressionCreateAttributes {
121130
let mut rule_query: Option<String> = None;
122131
let mut start_date: Option<i64> = None;
123132
let mut suppression_query: Option<String> = None;
133+
let mut tags: Option<Vec<String>> = None;
124134
let mut additional_properties: std::collections::BTreeMap<
125135
String,
126136
serde_json::Value,
@@ -172,6 +182,12 @@ impl<'de> Deserialize<'de> for SecurityMonitoringSuppressionCreateAttributes {
172182
suppression_query =
173183
Some(serde_json::from_value(v).map_err(M::Error::custom)?);
174184
}
185+
"tags" => {
186+
if v.is_null() {
187+
continue;
188+
}
189+
tags = Some(serde_json::from_value(v).map_err(M::Error::custom)?);
190+
}
175191
&_ => {
176192
if let Ok(value) = serde_json::from_value(v.clone()) {
177193
additional_properties.insert(k, value);
@@ -192,6 +208,7 @@ impl<'de> Deserialize<'de> for SecurityMonitoringSuppressionCreateAttributes {
192208
rule_query,
193209
start_date,
194210
suppression_query,
211+
tags,
195212
additional_properties,
196213
_unparsed,
197214
};

src/datadogV2/model/model_security_monitoring_suppression_update_attributes.rs

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,9 @@ pub struct SecurityMonitoringSuppressionUpdateAttributes {
4343
/// The suppression query of the suppression rule. If a signal matches this query, it is suppressed and not triggered. Same syntax as the queries to search signals in the signal explorer.
4444
#[serde(rename = "suppression_query")]
4545
pub suppression_query: Option<String>,
46+
/// List of tags associated with the suppression rule.
47+
#[serde(rename = "tags")]
48+
pub tags: Option<Vec<String>>,
4649
/// The current version of the suppression. This is optional, but it can help prevent concurrent modifications.
4750
#[serde(rename = "version")]
4851
pub version: Option<i32>,
@@ -64,6 +67,7 @@ impl SecurityMonitoringSuppressionUpdateAttributes {
6467
rule_query: None,
6568
start_date: None,
6669
suppression_query: None,
70+
tags: None,
6771
version: None,
6872
additional_properties: std::collections::BTreeMap::new(),
6973
_unparsed: false,
@@ -110,6 +114,11 @@ impl SecurityMonitoringSuppressionUpdateAttributes {
110114
self
111115
}
112116

117+
pub fn tags(mut self, value: Vec<String>) -> Self {
118+
self.tags = Some(value);
119+
self
120+
}
121+
113122
pub fn version(mut self, value: i32) -> Self {
114123
self.version = Some(value);
115124
self
@@ -155,6 +164,7 @@ impl<'de> Deserialize<'de> for SecurityMonitoringSuppressionUpdateAttributes {
155164
let mut rule_query: Option<String> = None;
156165
let mut start_date: Option<Option<i64>> = None;
157166
let mut suppression_query: Option<String> = None;
167+
let mut tags: Option<Vec<String>> = None;
158168
let mut version: Option<i32> = None;
159169
let mut additional_properties: std::collections::BTreeMap<
160170
String,
@@ -210,6 +220,12 @@ impl<'de> Deserialize<'de> for SecurityMonitoringSuppressionUpdateAttributes {
210220
suppression_query =
211221
Some(serde_json::from_value(v).map_err(M::Error::custom)?);
212222
}
223+
"tags" => {
224+
if v.is_null() {
225+
continue;
226+
}
227+
tags = Some(serde_json::from_value(v).map_err(M::Error::custom)?);
228+
}
213229
"version" => {
214230
if v.is_null() {
215231
continue;
@@ -233,6 +249,7 @@ impl<'de> Deserialize<'de> for SecurityMonitoringSuppressionUpdateAttributes {
233249
rule_query,
234250
start_date,
235251
suppression_query,
252+
tags,
236253
version,
237254
additional_properties,
238255
_unparsed,
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
2024-11-27T15:22:34.711Z
1+
2025-11-07T12:27:25.514Z

tests/scenarios/cassettes/v2/security_monitoring/Create-a-suppression-rule-returns-OK-response.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
{
44
"request": {
55
"body": {
6-
"string": "{\"data\":{\"attributes\":{\"description\":\"This rule suppresses low-severity signals in staging environments.\",\"enabled\":true,\"expiration_date\":1734535354000,\"name\":\"Test-Create_a_suppression_rule_returns_OK_response-1732720954\",\"rule_query\":\"type:log_detection source:cloudtrail\",\"start_date\":1733584954000,\"suppression_query\":\"env:staging status:low\"},\"type\":\"suppressions\"}}",
6+
"string": "{\"data\":{\"attributes\":{\"description\":\"This rule suppresses low-severity signals in staging environments.\",\"enabled\":true,\"expiration_date\":1764332845000,\"name\":\"Test-Create_a_suppression_rule_returns_OK_response-1762518445\",\"rule_query\":\"type:log_detection source:cloudtrail\",\"start_date\":1763382445000,\"suppression_query\":\"env:staging status:low\",\"tags\":[\"technique:T1110-brute-force\",\"source:cloudtrail\"]},\"type\":\"suppressions\"}}",
77
"encoding": null
88
},
99
"headers": {
@@ -19,7 +19,7 @@
1919
},
2020
"response": {
2121
"body": {
22-
"string": "{\"data\":{\"id\":\"ejv-ksi-r4j\",\"type\":\"suppressions\",\"attributes\":{\"creation_date\":1732720954868,\"creator\":{\"handle\":\"[email protected]\",\"name\":\"\"},\"data_exclusion_query\":\"\",\"description\":\"This rule suppresses low-severity signals in staging environments.\",\"editable\":true,\"enabled\":true,\"expiration_date\":1734535354000,\"name\":\"Test-Create_a_suppression_rule_returns_OK_response-1732720954\",\"rule_query\":\"type:log_detection source:cloudtrail\",\"start_date\":1733584954000,\"suppression_query\":\"env:staging status:low\",\"update_date\":1732720954868,\"updater\":{\"handle\":\"[email protected]\",\"name\":\"\"},\"version\":1}}}",
22+
"string": "{\"data\":{\"id\":\"oxk-jlo-pc8\",\"type\":\"suppressions\",\"attributes\":{\"creation_date\":1762518446390,\"creator\":{\"handle\":\"9919ec9b-ebc7-49ee-8dc8-03626e717cca\",\"name\":\"CI Account\"},\"data_exclusion_query\":\"\",\"description\":\"This rule suppresses low-severity signals in staging environments.\",\"editable\":true,\"enabled\":true,\"expiration_date\":1764332845000,\"name\":\"Test-Create_a_suppression_rule_returns_OK_response-1762518445\",\"rule_query\":\"type:log_detection source:cloudtrail\",\"start_date\":1763382445000,\"suppression_query\":\"env:staging status:low\",\"tags\":[\"source:cloudtrail\",\"technique:T1110-brute-force\"],\"update_date\":1762518446390,\"updater\":{\"handle\":\"9919ec9b-ebc7-49ee-8dc8-03626e717cca\",\"name\":\"CI Account\"},\"version\":1}}}",
2323
"encoding": null
2424
},
2525
"headers": {
@@ -32,7 +32,7 @@
3232
"message": "OK"
3333
}
3434
},
35-
"recorded_at": "Wed, 27 Nov 2024 15:22:34 GMT"
35+
"recorded_at": "Fri, 07 Nov 2025 12:27:25 GMT"
3636
},
3737
{
3838
"request": {
@@ -43,7 +43,7 @@
4343
]
4444
},
4545
"method": "delete",
46-
"uri": "https://api.datadoghq.com/api/v2/security_monitoring/configuration/suppressions/ejv-ksi-r4j"
46+
"uri": "https://api.datadoghq.com/api/v2/security_monitoring/configuration/suppressions/oxk-jlo-pc8"
4747
},
4848
"response": {
4949
"body": {
@@ -56,7 +56,7 @@
5656
"message": "No Content"
5757
}
5858
},
59-
"recorded_at": "Wed, 27 Nov 2024 15:22:34 GMT"
59+
"recorded_at": "Fri, 07 Nov 2025 12:27:25 GMT"
6060
}
6161
],
6262
"recorded_with": "VCR 6.0.0"
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
2024-05-10T16:34:39.853Z
1+
2025-11-07T12:27:26.759Z

tests/scenarios/cassettes/v2/security_monitoring/Delete-a-suppression-rule-returns-OK-response.json

Lines changed: 10 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
{
44
"request": {
55
"body": {
6-
"string": "{\"data\":{\"attributes\":{\"description\":\"Test-Delete_a_suppression_rule_returns_OK_response-1715358879\",\"enabled\":true,\"name\":\"Test-Delete_a_suppression_rule_returns_OK_response-1715358879\",\"rule_query\":\"source:cloudtrail\",\"suppression_query\":\"env:test\"},\"type\":\"suppressions\"}}",
6+
"string": "{\"data\":{\"attributes\":{\"description\":\"Test-Delete_a_suppression_rule_returns_OK_response-1762518446\",\"enabled\":true,\"name\":\"Test-Delete_a_suppression_rule_returns_OK_response-1762518446\",\"rule_query\":\"source:cloudtrail\",\"suppression_query\":\"env:test\",\"tags\":[\"technique:T1110-brute-force\",\"source:cloudtrail\"]},\"type\":\"suppressions\"}}",
77
"encoding": null
88
},
99
"headers": {
@@ -19,20 +19,20 @@
1919
},
2020
"response": {
2121
"body": {
22-
"string": "{\"data\":{\"id\":\"csf-zrg-af0\",\"attributes\":{\"name\":\"Test-Delete_a_suppression_rule_returns_OK_response-1715358879\",\"enabled\":true,\"description\":\"Test-Delete_a_suppression_rule_returns_OK_response-1715358879\",\"rule_query\":\"source:cloudtrail\",\"suppression_query\":\"env:test\",\"data_exclusion_query\":\"\",\"version\":1,\"creation_date\":1715358880145,\"update_date\":1715358880145,\"creator\":{\"name\":null,\"handle\":\"[email protected]\"},\"updater\":{\"name\":null,\"handle\":\"[email protected]\"}},\"type\":\"suppressions\"}}\n",
22+
"string": "{\"data\":{\"id\":\"uea-lab-big\",\"type\":\"suppressions\",\"attributes\":{\"creation_date\":1762518447002,\"creator\":{\"handle\":\"9919ec9b-ebc7-49ee-8dc8-03626e717cca\",\"name\":\"CI Account\"},\"data_exclusion_query\":\"\",\"description\":\"Test-Delete_a_suppression_rule_returns_OK_response-1762518446\",\"editable\":true,\"enabled\":true,\"name\":\"Test-Delete_a_suppression_rule_returns_OK_response-1762518446\",\"rule_query\":\"source:cloudtrail\",\"suppression_query\":\"env:test\",\"tags\":[\"source:cloudtrail\",\"technique:T1110-brute-force\"],\"update_date\":1762518447002,\"updater\":{\"handle\":\"9919ec9b-ebc7-49ee-8dc8-03626e717cca\",\"name\":\"CI Account\"},\"version\":1}}}",
2323
"encoding": null
2424
},
2525
"headers": {
2626
"Content-Type": [
27-
"application/json"
27+
"application/vnd.api+json"
2828
]
2929
},
3030
"status": {
3131
"code": 200,
3232
"message": "OK"
3333
}
3434
},
35-
"recorded_at": "Fri, 10 May 2024 16:34:39 GMT"
35+
"recorded_at": "Fri, 07 Nov 2025 12:27:26 GMT"
3636
},
3737
{
3838
"request": {
@@ -43,24 +43,20 @@
4343
]
4444
},
4545
"method": "delete",
46-
"uri": "https://api.datadoghq.com/api/v2/security_monitoring/configuration/suppressions/csf-zrg-af0"
46+
"uri": "https://api.datadoghq.com/api/v2/security_monitoring/configuration/suppressions/uea-lab-big"
4747
},
4848
"response": {
4949
"body": {
5050
"string": "",
5151
"encoding": null
5252
},
53-
"headers": {
54-
"Content-Type": [
55-
"text/html; charset=utf-8"
56-
]
57-
},
53+
"headers": {},
5854
"status": {
5955
"code": 204,
6056
"message": "No Content"
6157
}
6258
},
63-
"recorded_at": "Fri, 10 May 2024 16:34:39 GMT"
59+
"recorded_at": "Fri, 07 Nov 2025 12:27:26 GMT"
6460
},
6561
{
6662
"request": {
@@ -71,11 +67,11 @@
7167
]
7268
},
7369
"method": "delete",
74-
"uri": "https://api.datadoghq.com/api/v2/security_monitoring/configuration/suppressions/csf-zrg-af0"
70+
"uri": "https://api.datadoghq.com/api/v2/security_monitoring/configuration/suppressions/uea-lab-big"
7571
},
7672
"response": {
7773
"body": {
78-
"string": "{\"errors\":[\"not_found(Suppression with ID csf-zrg-af0 not found)\"]}\n",
74+
"string": "{\"errors\":[\"not_found(Suppression with ID uea-lab-big not found)\"]}",
7975
"encoding": null
8076
},
8177
"headers": {
@@ -88,7 +84,7 @@
8884
"message": "Not Found"
8985
}
9086
},
91-
"recorded_at": "Fri, 10 May 2024 16:34:39 GMT"
87+
"recorded_at": "Fri, 07 Nov 2025 12:27:26 GMT"
9288
}
9389
],
9490
"recorded_with": "VCR 6.0.0"
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
2024-05-10T16:34:46.398Z
1+
2025-11-07T12:27:27.654Z

0 commit comments

Comments
 (0)