Skip to content

Commit c405f0f

Browse files
api-clients-generation-pipeline[bot]ci.datadog-api-spec
andauthored
Remove team and user beta tags from restriction policy API docs (#1719)
Co-authored-by: ci.datadog-api-spec <[email protected]>
1 parent 9e7a7ef commit c405f0f

File tree

5 files changed

+13
-14
lines changed

5 files changed

+13
-14
lines changed

.apigentools-info

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,13 +4,13 @@
44
"spec_versions": {
55
"v1": {
66
"apigentools_version": "1.6.6",
7-
"regenerated": "2023-10-12 17:29:36.397424",
8-
"spec_repo_commit": "201be608"
7+
"regenerated": "2023-10-12 18:33:22.507320",
8+
"spec_repo_commit": "1ddbcdce"
99
},
1010
"v2": {
1111
"apigentools_version": "1.6.6",
12-
"regenerated": "2023-10-12 17:29:36.410797",
13-
"spec_repo_commit": "201be608"
12+
"regenerated": "2023-10-12 18:33:22.526135",
13+
"spec_repo_commit": "1ddbcdce"
1414
}
1515
}
1616
}

.generator/schemas/v2/openapi.yaml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12405,8 +12405,8 @@ components:
1240512405
description: 'An array of principals. A principal is a subject or group
1240612406
of subjects.
1240712407

12408-
Each principal is formatted as `type:id`. Supported types: `role`, `team`
12409-
(beta), `user` (beta), and `org`.
12408+
Each principal is formatted as `type:id`. Supported types: `role`, `team`,
12409+
`user`, and `org`.
1241012410

1241112411
The org ID can be obtained through the api/v2/current_user API.
1241212412

@@ -12417,7 +12417,7 @@ components:
1241712417
description: 'Subject or group of subjects. Each principal is formatted
1241812418
as `type:id`.
1241912419

12420-
Supported types: `role`, `team` (beta), `user` (beta), and `org`.
12420+
Supported types: `role`, `team`, `user`, and `org`.
1242112421

1242212422
The org ID can be obtained through the api/v2/current_user API.
1242312423

@@ -29513,8 +29513,8 @@ tags:
2951329513
- description: 'A restriction policy defines the access control rules for a resource,
2951429514
mapping a set of relations
2951529515

29516-
(such as editor and viewer) to a set of allowed principals (such as roles, teams
29517-
(beta), or users (beta)).
29516+
(such as editor and viewer) to a set of allowed principals (such as roles, teams,
29517+
or users).
2951829518

2951929519
The restriction policy determines who is authorized to perform what actions on
2952029520
the resource.'

src/datadog_api_client/v2/api/restriction_policies_api.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414
class RestrictionPoliciesApi:
1515
"""
1616
A restriction policy defines the access control rules for a resource, mapping a set of relations
17-
(such as editor and viewer) to a set of allowed principals (such as roles, teams (beta), or users (beta)).
17+
(such as editor and viewer) to a set of allowed principals (such as roles, teams, or users).
1818
The restriction policy determines who is authorized to perform what actions on the resource.
1919
"""
2020

src/datadog_api_client/v2/model/restriction_policy_binding.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ def __init__(self_, principals: List[str], relation: str, **kwargs):
2929
Specifies which principals are associated with a relation.
3030
3131
:param principals: An array of principals. A principal is a subject or group of subjects.
32-
Each principal is formatted as ``type:id``. Supported types: ``role`` , ``team`` (beta), ``user`` (beta), and ``org``.
32+
Each principal is formatted as ``type:id``. Supported types: ``role`` , ``team`` , ``user`` , and ``org``.
3333
The org ID can be obtained through the api/v2/current_user API.
3434
The user principal type accepts service account IDs.
3535
:type principals: [str]

tests/v2/features/restriction_policies.feature

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,8 @@
22
Feature: Restriction Policies
33
A restriction policy defines the access control rules for a resource,
44
mapping a set of relations (such as editor and viewer) to a set of allowed
5-
principals (such as roles, teams (beta), or users (beta)). The restriction
6-
policy determines who is authorized to perform what actions on the
7-
resource.
5+
principals (such as roles, teams, or users). The restriction policy
6+
determines who is authorized to perform what actions on the resource.
87

98
Background:
109
Given a valid "apiKeyAuth" key in the system

0 commit comments

Comments
 (0)