Skip to content

Commit c075181

Browse files
author
ci.datadog-api-spec
committed
Regenerate client from commit 04665a8 of spec repo
1 parent 539aaff commit c075181

File tree

47 files changed

+4033
-7
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

47 files changed

+4033
-7
lines changed

.generator/schemas/v2/openapi.yaml

Lines changed: 417 additions & 0 deletions
Large diffs are not rendered by default.
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
// Create a critical asset returns "OK" response
2+
use datadog_api_client::datadog;
3+
use datadog_api_client::datadogV2::api_security_monitoring::SecurityMonitoringAPI;
4+
use datadog_api_client::datadogV2::model::SecurityMonitoringCriticalAssetCreateAttributes;
5+
use datadog_api_client::datadogV2::model::SecurityMonitoringCriticalAssetCreateData;
6+
use datadog_api_client::datadogV2::model::SecurityMonitoringCriticalAssetCreateRequest;
7+
use datadog_api_client::datadogV2::model::SecurityMonitoringCriticalAssetSeverity;
8+
use datadog_api_client::datadogV2::model::SecurityMonitoringCriticalAssetType;
9+
10+
#[tokio::main]
11+
async fn main() {
12+
let body =
13+
SecurityMonitoringCriticalAssetCreateRequest::new(
14+
SecurityMonitoringCriticalAssetCreateData::new(
15+
SecurityMonitoringCriticalAssetCreateAttributes::new(
16+
"host:examplesecuritymonitoring".to_string(),
17+
"type:(log_detection OR signal_correlation OR workload_security OR application_security) source:cloudtrail".to_string(),
18+
SecurityMonitoringCriticalAssetSeverity::DECREASE,
19+
).tags(vec!["team:security".to_string(), "env:test".to_string()]),
20+
SecurityMonitoringCriticalAssetType::CRITICAL_ASSETS,
21+
),
22+
);
23+
let configuration = datadog::Configuration::new();
24+
let api = SecurityMonitoringAPI::with_config(configuration);
25+
let resp = api.create_security_monitoring_critical_asset(body).await;
26+
if let Ok(value) = resp {
27+
println!("{:#?}", value);
28+
} else {
29+
println!("{:#?}", resp.unwrap_err());
30+
}
31+
}
Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
// Delete a critical asset returns "OK" response
2+
use datadog_api_client::datadog;
3+
use datadog_api_client::datadogV2::api_security_monitoring::SecurityMonitoringAPI;
4+
5+
#[tokio::main]
6+
async fn main() {
7+
// there is a valid "critical_asset" in the system
8+
let critical_asset_data_id = std::env::var("CRITICAL_ASSET_DATA_ID").unwrap();
9+
let configuration = datadog::Configuration::new();
10+
let api = SecurityMonitoringAPI::with_config(configuration);
11+
let resp = api
12+
.delete_security_monitoring_critical_asset(critical_asset_data_id.clone())
13+
.await;
14+
if let Ok(value) = resp {
15+
println!("{:#?}", value);
16+
} else {
17+
println!("{:#?}", resp.unwrap_err());
18+
}
19+
}
Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
// Get critical assets affecting a specific rule returns "OK" response
2+
use datadog_api_client::datadog;
3+
use datadog_api_client::datadogV2::api_security_monitoring::SecurityMonitoringAPI;
4+
5+
#[tokio::main]
6+
async fn main() {
7+
// there is a valid "security_rule" in the system
8+
let security_rule_id = std::env::var("SECURITY_RULE_ID").unwrap();
9+
let configuration = datadog::Configuration::new();
10+
let api = SecurityMonitoringAPI::with_config(configuration);
11+
let resp = api
12+
.get_critical_assets_affecting_rule(security_rule_id.clone())
13+
.await;
14+
if let Ok(value) = resp {
15+
println!("{:#?}", value);
16+
} else {
17+
println!("{:#?}", resp.unwrap_err());
18+
}
19+
}
Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
// Get a critical asset returns "OK" response
2+
use datadog_api_client::datadog;
3+
use datadog_api_client::datadogV2::api_security_monitoring::SecurityMonitoringAPI;
4+
5+
#[tokio::main]
6+
async fn main() {
7+
// there is a valid "critical_asset" in the system
8+
let critical_asset_data_id = std::env::var("CRITICAL_ASSET_DATA_ID").unwrap();
9+
let configuration = datadog::Configuration::new();
10+
let api = SecurityMonitoringAPI::with_config(configuration);
11+
let resp = api
12+
.get_security_monitoring_critical_asset(critical_asset_data_id.clone())
13+
.await;
14+
if let Ok(value) = resp {
15+
println!("{:#?}", value);
16+
} else {
17+
println!("{:#?}", resp.unwrap_err());
18+
}
19+
}
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
// Get all critical assets returns "OK" response
2+
use datadog_api_client::datadog;
3+
use datadog_api_client::datadogV2::api_security_monitoring::ListSecurityMonitoringCriticalAssetsOptionalParams;
4+
use datadog_api_client::datadogV2::api_security_monitoring::SecurityMonitoringAPI;
5+
6+
#[tokio::main]
7+
async fn main() {
8+
let configuration = datadog::Configuration::new();
9+
let api = SecurityMonitoringAPI::with_config(configuration);
10+
let resp = api
11+
.list_security_monitoring_critical_assets(
12+
ListSecurityMonitoringCriticalAssetsOptionalParams::default(),
13+
)
14+
.await;
15+
if let Ok(value) = resp {
16+
println!("{:#?}", value);
17+
} else {
18+
println!("{:#?}", resp.unwrap_err());
19+
}
20+
}
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
// Update a critical asset returns "OK" response
2+
use datadog_api_client::datadog;
3+
use datadog_api_client::datadogV2::api_security_monitoring::SecurityMonitoringAPI;
4+
use datadog_api_client::datadogV2::model::SecurityMonitoringCriticalAssetSeverity;
5+
use datadog_api_client::datadogV2::model::SecurityMonitoringCriticalAssetType;
6+
use datadog_api_client::datadogV2::model::SecurityMonitoringCriticalAssetUpdateAttributes;
7+
use datadog_api_client::datadogV2::model::SecurityMonitoringCriticalAssetUpdateData;
8+
use datadog_api_client::datadogV2::model::SecurityMonitoringCriticalAssetUpdateRequest;
9+
10+
#[tokio::main]
11+
async fn main() {
12+
// there is a valid "critical_asset" in the system
13+
let critical_asset_data_id = std::env::var("CRITICAL_ASSET_DATA_ID").unwrap();
14+
let body =
15+
SecurityMonitoringCriticalAssetUpdateRequest::new(
16+
SecurityMonitoringCriticalAssetUpdateData::new(
17+
SecurityMonitoringCriticalAssetUpdateAttributes::new()
18+
.enabled(false)
19+
.query("no:alert".to_string())
20+
.rule_query(
21+
"type:(log_detection OR signal_correlation OR workload_security OR application_security) ruleId:djg-ktx-ipq".to_string(),
22+
)
23+
.severity(SecurityMonitoringCriticalAssetSeverity::DECREASE)
24+
.tags(vec!["env:production".to_string()])
25+
.version(1),
26+
SecurityMonitoringCriticalAssetType::CRITICAL_ASSETS,
27+
),
28+
);
29+
let configuration = datadog::Configuration::new();
30+
let api = SecurityMonitoringAPI::with_config(configuration);
31+
let resp = api
32+
.update_security_monitoring_critical_asset(critical_asset_data_id.clone(), body)
33+
.await;
34+
if let Ok(value) = resp {
35+
println!("{:#?}", value);
36+
} else {
37+
println!("{:#?}", resp.unwrap_err());
38+
}
39+
}

0 commit comments

Comments
 (0)