From 8f11e437d013115df5494d0a2f23e2c565e15eae Mon Sep 17 00:00:00 2001 From: "ci.datadog-api-spec" Date: Mon, 4 May 2026 06:51:58 +0000 Subject: [PATCH] Regenerate client from commit 8026a6e of spec repo --- .generator/schemas/v2/openapi.yaml | 33 +++++++++++++++++++ .../CreateAwsScanOptions.py | 1 + .../v2/model/aws_scan_options_attributes.py | 8 +++++ .../aws_scan_options_create_attributes.py | 16 ++++++++- .../aws_scan_options_update_attributes.py | 8 +++++ .../azure_scan_options_data_attributes.py | 8 +++++ ...an_options_input_update_data_attributes.py | 8 +++++ .../model/gcp_scan_options_data_attributes.py | 8 +++++ ...an_options_input_update_data_attributes.py | 8 +++++ ...ptions_returns_bad_request_response.frozen | 2 +- ..._options_returns_bad_request_response.yaml | 2 +- ...n_options_returns_conflict_response.frozen | 2 +- ...can_options_returns_conflict_response.yaml | 2 +- tests/v2/features/agentless_scanning.feature | 6 ++-- 14 files changed, 104 insertions(+), 8 deletions(-) diff --git a/.generator/schemas/v2/openapi.yaml b/.generator/schemas/v2/openapi.yaml index 382c9233aa..9225e72b63 100644 --- a/.generator/schemas/v2/openapi.yaml +++ b/.generator/schemas/v2/openapi.yaml @@ -7731,6 +7731,10 @@ components: AwsScanOptionsAttributes: description: Attributes for the AWS scan options. properties: + compliance_host: + description: Indicates whether host compliance scanning is enabled. + example: false + type: boolean lambda: description: Indicates if scanning of Lambda functions is enabled. example: true @@ -7751,6 +7755,10 @@ components: AwsScanOptionsCreateAttributes: description: Attributes for the AWS scan options to create. properties: + compliance_host: + description: Indicates whether host compliance scanning is enabled. + example: false + type: boolean lambda: description: Indicates if scanning of Lambda functions is enabled. example: true @@ -7768,6 +7776,7 @@ components: example: true type: boolean required: + - compliance_host - lambda - sensitive_data - vuln_containers_os @@ -7833,6 +7842,10 @@ components: AwsScanOptionsUpdateAttributes: description: Attributes for the AWS scan options to update. properties: + compliance_host: + description: Indicates whether host compliance scanning is enabled. + example: false + type: boolean lambda: description: Indicates if scanning of Lambda functions is enabled. example: true @@ -7914,6 +7927,7 @@ components: example: data: attributes: + compliance_host: false vuln_containers_os: true vuln_host_os: true id: 12345678-90ab-cdef-1234-567890abcdef @@ -7927,6 +7941,7 @@ components: example: data: - attributes: + compliance_host: false vuln_containers_os: true vuln_host_os: true id: 12345678-90ab-cdef-1234-567890abcdef @@ -7958,6 +7973,9 @@ components: AzureScanOptionsDataAttributes: description: Attributes for Azure scan options configuration. properties: + compliance_host: + description: Indicates whether host compliance scanning is enabled. + type: boolean vuln_containers_os: description: Indicates if scanning for vulnerabilities in containers is enabled. type: boolean @@ -8002,6 +8020,9 @@ components: AzureScanOptionsInputUpdateDataAttributes: description: Attributes for updating Azure scan options configuration. properties: + compliance_host: + description: Indicates whether host compliance scanning is enabled. + type: boolean vuln_containers_os: description: Indicates if scanning for vulnerabilities in containers is enabled. type: boolean @@ -29874,6 +29895,7 @@ components: example: data: attributes: + compliance_host: false vuln_containers_os: true vuln_host_os: true id: company-project-id @@ -29887,6 +29909,7 @@ components: example: data: - attributes: + compliance_host: false vuln_containers_os: true vuln_host_os: true id: company-project-id @@ -29918,6 +29941,9 @@ components: GcpScanOptionsDataAttributes: description: Attributes for GCP scan options configuration. properties: + compliance_host: + description: Indicates whether host compliance scanning is enabled. + type: boolean vuln_containers_os: description: Indicates if scanning for vulnerabilities in containers is enabled. type: boolean @@ -29962,6 +29988,9 @@ components: GcpScanOptionsInputUpdateDataAttributes: description: Attributes for updating GCP scan options configuration. properties: + compliance_host: + description: Indicates whether host compliance scanning is enabled. + type: boolean vuln_containers_os: description: Indicates if scanning for vulnerabilities in containers is enabled. type: boolean @@ -85433,6 +85462,7 @@ paths: value: data: attributes: + compliance_host: false lambda: true sensitive_data: false vuln_containers_os: true @@ -85530,6 +85560,7 @@ paths: value: data: attributes: + compliance_host: false lambda: true sensitive_data: false vuln_containers_os: true @@ -85591,6 +85622,7 @@ paths: value: data: attributes: + compliance_host: false vuln_containers_os: true vuln_host_os: true id: 12345678-90ab-cdef-1234-567890abcdef @@ -85749,6 +85781,7 @@ paths: value: data: attributes: + compliance_host: false vuln_containers_os: true vuln_host_os: true id: company-project-id diff --git a/examples/v2/agentless-scanning/CreateAwsScanOptions.py b/examples/v2/agentless-scanning/CreateAwsScanOptions.py index 7d59817dc0..9f41e9e67c 100644 --- a/examples/v2/agentless-scanning/CreateAwsScanOptions.py +++ b/examples/v2/agentless-scanning/CreateAwsScanOptions.py @@ -14,6 +14,7 @@ id="000000000003", type=AwsScanOptionsType.AWS_SCAN_OPTIONS, attributes=AwsScanOptionsCreateAttributes( + compliance_host=True, _lambda=True, sensitive_data=False, vuln_containers_os=True, diff --git a/src/datadog_api_client/v2/model/aws_scan_options_attributes.py b/src/datadog_api_client/v2/model/aws_scan_options_attributes.py index bb0862861f..25e8f1cb64 100644 --- a/src/datadog_api_client/v2/model/aws_scan_options_attributes.py +++ b/src/datadog_api_client/v2/model/aws_scan_options_attributes.py @@ -17,6 +17,7 @@ class AwsScanOptionsAttributes(ModelNormal): @cached_property def openapi_types(_): return { + "compliance_host": (bool,), "_lambda": (bool,), "sensitive_data": (bool,), "vuln_containers_os": (bool,), @@ -24,6 +25,7 @@ def openapi_types(_): } attribute_map = { + "compliance_host": "compliance_host", "_lambda": "lambda", "sensitive_data": "sensitive_data", "vuln_containers_os": "vuln_containers_os", @@ -32,6 +34,7 @@ def openapi_types(_): def __init__( self_, + compliance_host: Union[bool, UnsetType] = unset, _lambda: Union[bool, UnsetType] = unset, sensitive_data: Union[bool, UnsetType] = unset, vuln_containers_os: Union[bool, UnsetType] = unset, @@ -41,6 +44,9 @@ def __init__( """ Attributes for the AWS scan options. + :param compliance_host: Indicates whether host compliance scanning is enabled. + :type compliance_host: bool, optional + :param _lambda: Indicates if scanning of Lambda functions is enabled. :type _lambda: bool, optional @@ -53,6 +59,8 @@ def __init__( :param vuln_host_os: Indicates if scanning for vulnerabilities in hosts is enabled. :type vuln_host_os: bool, optional """ + if compliance_host is not unset: + kwargs["compliance_host"] = compliance_host if _lambda is not unset: kwargs["_lambda"] = _lambda if sensitive_data is not unset: diff --git a/src/datadog_api_client/v2/model/aws_scan_options_create_attributes.py b/src/datadog_api_client/v2/model/aws_scan_options_create_attributes.py index 73598422ff..437e3fd8d4 100644 --- a/src/datadog_api_client/v2/model/aws_scan_options_create_attributes.py +++ b/src/datadog_api_client/v2/model/aws_scan_options_create_attributes.py @@ -14,6 +14,7 @@ class AwsScanOptionsCreateAttributes(ModelNormal): @cached_property def openapi_types(_): return { + "compliance_host": (bool,), "_lambda": (bool,), "sensitive_data": (bool,), "vuln_containers_os": (bool,), @@ -21,16 +22,28 @@ def openapi_types(_): } attribute_map = { + "compliance_host": "compliance_host", "_lambda": "lambda", "sensitive_data": "sensitive_data", "vuln_containers_os": "vuln_containers_os", "vuln_host_os": "vuln_host_os", } - def __init__(self_, _lambda: bool, sensitive_data: bool, vuln_containers_os: bool, vuln_host_os: bool, **kwargs): + def __init__( + self_, + compliance_host: bool, + _lambda: bool, + sensitive_data: bool, + vuln_containers_os: bool, + vuln_host_os: bool, + **kwargs, + ): """ Attributes for the AWS scan options to create. + :param compliance_host: Indicates whether host compliance scanning is enabled. + :type compliance_host: bool + :param _lambda: Indicates if scanning of Lambda functions is enabled. :type _lambda: bool @@ -45,6 +58,7 @@ def __init__(self_, _lambda: bool, sensitive_data: bool, vuln_containers_os: boo """ super().__init__(kwargs) + self_.compliance_host = compliance_host self_._lambda = _lambda self_.sensitive_data = sensitive_data self_.vuln_containers_os = vuln_containers_os diff --git a/src/datadog_api_client/v2/model/aws_scan_options_update_attributes.py b/src/datadog_api_client/v2/model/aws_scan_options_update_attributes.py index 190c379004..cdfb45bcc4 100644 --- a/src/datadog_api_client/v2/model/aws_scan_options_update_attributes.py +++ b/src/datadog_api_client/v2/model/aws_scan_options_update_attributes.py @@ -17,6 +17,7 @@ class AwsScanOptionsUpdateAttributes(ModelNormal): @cached_property def openapi_types(_): return { + "compliance_host": (bool,), "_lambda": (bool,), "sensitive_data": (bool,), "vuln_containers_os": (bool,), @@ -24,6 +25,7 @@ def openapi_types(_): } attribute_map = { + "compliance_host": "compliance_host", "_lambda": "lambda", "sensitive_data": "sensitive_data", "vuln_containers_os": "vuln_containers_os", @@ -32,6 +34,7 @@ def openapi_types(_): def __init__( self_, + compliance_host: Union[bool, UnsetType] = unset, _lambda: Union[bool, UnsetType] = unset, sensitive_data: Union[bool, UnsetType] = unset, vuln_containers_os: Union[bool, UnsetType] = unset, @@ -41,6 +44,9 @@ def __init__( """ Attributes for the AWS scan options to update. + :param compliance_host: Indicates whether host compliance scanning is enabled. + :type compliance_host: bool, optional + :param _lambda: Indicates if scanning of Lambda functions is enabled. :type _lambda: bool, optional @@ -53,6 +59,8 @@ def __init__( :param vuln_host_os: Indicates if scanning for vulnerabilities in hosts is enabled. :type vuln_host_os: bool, optional """ + if compliance_host is not unset: + kwargs["compliance_host"] = compliance_host if _lambda is not unset: kwargs["_lambda"] = _lambda if sensitive_data is not unset: diff --git a/src/datadog_api_client/v2/model/azure_scan_options_data_attributes.py b/src/datadog_api_client/v2/model/azure_scan_options_data_attributes.py index 827e65261f..1f06c909ee 100644 --- a/src/datadog_api_client/v2/model/azure_scan_options_data_attributes.py +++ b/src/datadog_api_client/v2/model/azure_scan_options_data_attributes.py @@ -17,17 +17,20 @@ class AzureScanOptionsDataAttributes(ModelNormal): @cached_property def openapi_types(_): return { + "compliance_host": (bool,), "vuln_containers_os": (bool,), "vuln_host_os": (bool,), } attribute_map = { + "compliance_host": "compliance_host", "vuln_containers_os": "vuln_containers_os", "vuln_host_os": "vuln_host_os", } def __init__( self_, + compliance_host: Union[bool, UnsetType] = unset, vuln_containers_os: Union[bool, UnsetType] = unset, vuln_host_os: Union[bool, UnsetType] = unset, **kwargs, @@ -35,12 +38,17 @@ def __init__( """ Attributes for Azure scan options configuration. + :param compliance_host: Indicates whether host compliance scanning is enabled. + :type compliance_host: bool, optional + :param vuln_containers_os: Indicates if scanning for vulnerabilities in containers is enabled. :type vuln_containers_os: bool, optional :param vuln_host_os: Indicates if scanning for vulnerabilities in hosts is enabled. :type vuln_host_os: bool, optional """ + if compliance_host is not unset: + kwargs["compliance_host"] = compliance_host if vuln_containers_os is not unset: kwargs["vuln_containers_os"] = vuln_containers_os if vuln_host_os is not unset: diff --git a/src/datadog_api_client/v2/model/azure_scan_options_input_update_data_attributes.py b/src/datadog_api_client/v2/model/azure_scan_options_input_update_data_attributes.py index 94d4291e0c..d9af7c6c70 100644 --- a/src/datadog_api_client/v2/model/azure_scan_options_input_update_data_attributes.py +++ b/src/datadog_api_client/v2/model/azure_scan_options_input_update_data_attributes.py @@ -17,17 +17,20 @@ class AzureScanOptionsInputUpdateDataAttributes(ModelNormal): @cached_property def openapi_types(_): return { + "compliance_host": (bool,), "vuln_containers_os": (bool,), "vuln_host_os": (bool,), } attribute_map = { + "compliance_host": "compliance_host", "vuln_containers_os": "vuln_containers_os", "vuln_host_os": "vuln_host_os", } def __init__( self_, + compliance_host: Union[bool, UnsetType] = unset, vuln_containers_os: Union[bool, UnsetType] = unset, vuln_host_os: Union[bool, UnsetType] = unset, **kwargs, @@ -35,12 +38,17 @@ def __init__( """ Attributes for updating Azure scan options configuration. + :param compliance_host: Indicates whether host compliance scanning is enabled. + :type compliance_host: bool, optional + :param vuln_containers_os: Indicates if scanning for vulnerabilities in containers is enabled. :type vuln_containers_os: bool, optional :param vuln_host_os: Indicates if scanning for vulnerabilities in hosts is enabled. :type vuln_host_os: bool, optional """ + if compliance_host is not unset: + kwargs["compliance_host"] = compliance_host if vuln_containers_os is not unset: kwargs["vuln_containers_os"] = vuln_containers_os if vuln_host_os is not unset: diff --git a/src/datadog_api_client/v2/model/gcp_scan_options_data_attributes.py b/src/datadog_api_client/v2/model/gcp_scan_options_data_attributes.py index f90979aadb..3467c99db1 100644 --- a/src/datadog_api_client/v2/model/gcp_scan_options_data_attributes.py +++ b/src/datadog_api_client/v2/model/gcp_scan_options_data_attributes.py @@ -17,17 +17,20 @@ class GcpScanOptionsDataAttributes(ModelNormal): @cached_property def openapi_types(_): return { + "compliance_host": (bool,), "vuln_containers_os": (bool,), "vuln_host_os": (bool,), } attribute_map = { + "compliance_host": "compliance_host", "vuln_containers_os": "vuln_containers_os", "vuln_host_os": "vuln_host_os", } def __init__( self_, + compliance_host: Union[bool, UnsetType] = unset, vuln_containers_os: Union[bool, UnsetType] = unset, vuln_host_os: Union[bool, UnsetType] = unset, **kwargs, @@ -35,12 +38,17 @@ def __init__( """ Attributes for GCP scan options configuration. + :param compliance_host: Indicates whether host compliance scanning is enabled. + :type compliance_host: bool, optional + :param vuln_containers_os: Indicates if scanning for vulnerabilities in containers is enabled. :type vuln_containers_os: bool, optional :param vuln_host_os: Indicates if scanning for vulnerabilities in hosts is enabled. :type vuln_host_os: bool, optional """ + if compliance_host is not unset: + kwargs["compliance_host"] = compliance_host if vuln_containers_os is not unset: kwargs["vuln_containers_os"] = vuln_containers_os if vuln_host_os is not unset: diff --git a/src/datadog_api_client/v2/model/gcp_scan_options_input_update_data_attributes.py b/src/datadog_api_client/v2/model/gcp_scan_options_input_update_data_attributes.py index 31595e329e..cb0f956bd5 100644 --- a/src/datadog_api_client/v2/model/gcp_scan_options_input_update_data_attributes.py +++ b/src/datadog_api_client/v2/model/gcp_scan_options_input_update_data_attributes.py @@ -17,17 +17,20 @@ class GcpScanOptionsInputUpdateDataAttributes(ModelNormal): @cached_property def openapi_types(_): return { + "compliance_host": (bool,), "vuln_containers_os": (bool,), "vuln_host_os": (bool,), } attribute_map = { + "compliance_host": "compliance_host", "vuln_containers_os": "vuln_containers_os", "vuln_host_os": "vuln_host_os", } def __init__( self_, + compliance_host: Union[bool, UnsetType] = unset, vuln_containers_os: Union[bool, UnsetType] = unset, vuln_host_os: Union[bool, UnsetType] = unset, **kwargs, @@ -35,12 +38,17 @@ def __init__( """ Attributes for updating GCP scan options configuration. + :param compliance_host: Indicates whether host compliance scanning is enabled. + :type compliance_host: bool, optional + :param vuln_containers_os: Indicates if scanning for vulnerabilities in containers is enabled. :type vuln_containers_os: bool, optional :param vuln_host_os: Indicates if scanning for vulnerabilities in hosts is enabled. :type vuln_host_os: bool, optional """ + if compliance_host is not unset: + kwargs["compliance_host"] = compliance_host if vuln_containers_os is not unset: kwargs["vuln_containers_os"] = vuln_containers_os if vuln_host_os is not unset: diff --git a/tests/v2/cassettes/test_scenarios/test_create_aws_scan_options_returns_bad_request_response.frozen b/tests/v2/cassettes/test_scenarios/test_create_aws_scan_options_returns_bad_request_response.frozen index 95529acf62..93069672a0 100644 --- a/tests/v2/cassettes/test_scenarios/test_create_aws_scan_options_returns_bad_request_response.frozen +++ b/tests/v2/cassettes/test_scenarios/test_create_aws_scan_options_returns_bad_request_response.frozen @@ -1 +1 @@ -2025-10-23T22:21:54.335Z \ No newline at end of file +2026-04-28T07:51:17.007Z \ No newline at end of file diff --git a/tests/v2/cassettes/test_scenarios/test_create_aws_scan_options_returns_bad_request_response.yaml b/tests/v2/cassettes/test_scenarios/test_create_aws_scan_options_returns_bad_request_response.yaml index ac672e4770..7361d36aea 100644 --- a/tests/v2/cassettes/test_scenarios/test_create_aws_scan_options_returns_bad_request_response.yaml +++ b/tests/v2/cassettes/test_scenarios/test_create_aws_scan_options_returns_bad_request_response.yaml @@ -1,6 +1,6 @@ interactions: - request: - body: '{"data":{"attributes":{"lambda":true,"sensitive_data":false,"vuln_containers_os":true,"vuln_host_os":true},"id":"123","type":"aws_scan_options"}}' + body: '{"data":{"attributes":{"compliance_host":true,"lambda":true,"sensitive_data":false,"vuln_containers_os":true,"vuln_host_os":true},"id":"123","type":"aws_scan_options"}}' headers: accept: - application/json diff --git a/tests/v2/cassettes/test_scenarios/test_create_aws_scan_options_returns_conflict_response.frozen b/tests/v2/cassettes/test_scenarios/test_create_aws_scan_options_returns_conflict_response.frozen index f60e6f4b6c..3fa4086603 100644 --- a/tests/v2/cassettes/test_scenarios/test_create_aws_scan_options_returns_conflict_response.frozen +++ b/tests/v2/cassettes/test_scenarios/test_create_aws_scan_options_returns_conflict_response.frozen @@ -1 +1 @@ -2025-10-23T22:21:54.694Z \ No newline at end of file +2026-04-28T07:51:17.457Z \ No newline at end of file diff --git a/tests/v2/cassettes/test_scenarios/test_create_aws_scan_options_returns_conflict_response.yaml b/tests/v2/cassettes/test_scenarios/test_create_aws_scan_options_returns_conflict_response.yaml index 38f2b347a3..88e4e6b9e5 100644 --- a/tests/v2/cassettes/test_scenarios/test_create_aws_scan_options_returns_conflict_response.yaml +++ b/tests/v2/cassettes/test_scenarios/test_create_aws_scan_options_returns_conflict_response.yaml @@ -1,6 +1,6 @@ interactions: - request: - body: '{"data":{"attributes":{"lambda":false,"sensitive_data":false,"vuln_containers_os":true,"vuln_host_os":true},"id":"000000000002","type":"aws_scan_options"}}' + body: '{"data":{"attributes":{"compliance_host":true,"lambda":false,"sensitive_data":false,"vuln_containers_os":true,"vuln_host_os":true},"id":"000000000002","type":"aws_scan_options"}}' headers: accept: - application/json diff --git a/tests/v2/features/agentless_scanning.feature b/tests/v2/features/agentless_scanning.feature index 919d43c75b..bbbf5b71f9 100644 --- a/tests/v2/features/agentless_scanning.feature +++ b/tests/v2/features/agentless_scanning.feature @@ -31,21 +31,21 @@ Feature: Agentless Scanning @skip @team:DataDog/k9-agentless Scenario: Create AWS scan options returns "Agentless scan options enabled successfully." response Given new "CreateAwsScanOptions" request - And body with value {"data": {"id": "000000000003", "type": "aws_scan_options", "attributes": {"lambda": true, "sensitive_data": false, "vuln_containers_os": true, "vuln_host_os": true}}} + And body with value {"data": {"id": "000000000003", "type": "aws_scan_options", "attributes": {"compliance_host": true, "lambda": true, "sensitive_data": false, "vuln_containers_os": true, "vuln_host_os": true}}} When the request is sent Then the response status is 201 Created @team:DataDog/k9-agentless Scenario: Create AWS scan options returns "Bad Request" response Given new "CreateAwsScanOptions" request - And body with value {"data": {"id": "123", "type": "aws_scan_options", "attributes": {"lambda": true, "sensitive_data": false, "vuln_containers_os": true, "vuln_host_os": true}}} + And body with value {"data": {"id": "123", "type": "aws_scan_options", "attributes": {"compliance_host": true, "lambda": true, "sensitive_data": false, "vuln_containers_os": true, "vuln_host_os": true}}} When the request is sent Then the response status is 400 Bad Request @team:DataDog/k9-agentless Scenario: Create AWS scan options returns "Conflict" response Given new "CreateAwsScanOptions" request - And body with value {"data":{"type":"aws_scan_options","id":"000000000002","attributes":{"vuln_host_os":true,"vuln_containers_os":true,"sensitive_data":false,"lambda":false}}} + And body with value {"data":{"type":"aws_scan_options","id":"000000000002","attributes":{"compliance_host":true,"vuln_host_os":true,"vuln_containers_os":true,"sensitive_data":false,"lambda":false}}} When the request is sent Then the response status is 409 Conflict