@@ -13,6 +13,27 @@ Feature: Application Security
13
13
And a valid "appKeyAuth" key in the system
14
14
And an instance of "ApplicationSecurity" API
15
15
16
+ @generated @skip @team:DataDog/asm-backend
17
+ Scenario : Create a WAF Policy returns "Bad Request" response
18
+ Given new "CreateApplicationSecurityWafPolicy" request
19
+ And body with value {"data" : {"attributes" : {"basedOn" : "recommended" , "description" : "Policy applied to internal web applications." , "isDefault" : false, "name" : "Internal Network Policy" , "protectionPresets" : ["attack-tools" ], "rules" : [{"blocking" : false, "enabled" : true, "id" : "rasp-001-002" }], "scope" : [{"env" : "prod" , "service" : "billing-service" }], "version" : 0}, "type" : "policy" }}
20
+ When the request is sent
21
+ Then the response status is 400 Bad Request
22
+
23
+ @generated @skip @team:DataDog/asm-backend
24
+ Scenario : Create a WAF Policy returns "Concurrent Modification" response
25
+ Given new "CreateApplicationSecurityWafPolicy" request
26
+ And body with value {"data" : {"attributes" : {"basedOn" : "recommended" , "description" : "Policy applied to internal web applications." , "isDefault" : false, "name" : "Internal Network Policy" , "protectionPresets" : ["attack-tools" ], "rules" : [{"blocking" : false, "enabled" : true, "id" : "rasp-001-002" }], "scope" : [{"env" : "prod" , "service" : "billing-service" }], "version" : 0}, "type" : "policy" }}
27
+ When the request is sent
28
+ Then the response status is 409 Concurrent Modification
29
+
30
+ @generated @skip @team:DataDog/asm-backend
31
+ Scenario : Create a WAF Policy returns "Created" response
32
+ Given new "CreateApplicationSecurityWafPolicy" request
33
+ And body with value {"data" : {"attributes" : {"basedOn" : "recommended" , "description" : "Policy applied to internal web applications." , "isDefault" : false, "name" : "Internal Network Policy" , "protectionPresets" : ["attack-tools" ], "rules" : [{"blocking" : false, "enabled" : true, "id" : "rasp-001-002" }], "scope" : [{"env" : "prod" , "service" : "billing-service" }], "version" : 0}, "type" : "policy" }}
34
+ When the request is sent
35
+ Then the response status is 201 Created
36
+
16
37
@generated @skip @team:DataDog/asm-backend
17
38
Scenario : Create a WAF custom rule returns "Bad Request" response
18
39
Given new "CreateApplicationSecurityWafCustomRule" request
@@ -84,6 +105,27 @@ Feature: Application Security
84
105
When the request is sent
85
106
Then the response status is 404 Not Found
86
107
108
+ @generated @skip @team:DataDog/asm-backend
109
+ Scenario : Delete a WAF Policy returns "Concurrent Modification" response
110
+ Given new "DeleteApplicationSecurityWafPolicy" request
111
+ And request contains "policy_id" parameter from "REPLACE.ME"
112
+ When the request is sent
113
+ Then the response status is 409 Concurrent Modification
114
+
115
+ @generated @skip @team:DataDog/asm-backend
116
+ Scenario : Delete a WAF Policy returns "No Content" response
117
+ Given new "DeleteApplicationSecurityWafPolicy" request
118
+ And request contains "policy_id" parameter from "REPLACE.ME"
119
+ When the request is sent
120
+ Then the response status is 204 No Content
121
+
122
+ @generated @skip @team:DataDog/asm-backend
123
+ Scenario : Delete a WAF Policy returns "Not Found" response
124
+ Given new "DeleteApplicationSecurityWafPolicy" request
125
+ And request contains "policy_id" parameter from "REPLACE.ME"
126
+ When the request is sent
127
+ Then the response status is 404 Not Found
128
+
87
129
@generated @skip @team:DataDog/asm-backend
88
130
Scenario : Delete a WAF exclusion filter returns "Concurrent Modification" response
89
131
Given new "DeleteApplicationSecurityWafExclusionFilter" request
@@ -106,6 +148,13 @@ Feature: Application Security
106
148
When the request is sent
107
149
Then the response status is 204 OK
108
150
151
+ @generated @skip @team:DataDog/asm-backend
152
+ Scenario : Get a WAF Policy returns "OK" response
153
+ Given new "GetApplicationSecurityWafPolicy" request
154
+ And request contains "policy_id" parameter from "REPLACE.ME"
155
+ When the request is sent
156
+ Then the response status is 200 OK
157
+
109
158
@generated @skip @team:DataDog/asm-backend
110
159
Scenario : Get a WAF custom rule returns "OK" response
111
160
Given new "GetApplicationSecurityWafCustomRule" request
@@ -140,6 +189,12 @@ Feature: Application Security
140
189
When the request is sent
141
190
Then the response status is 200 OK
142
191
192
+ @generated @skip @team:DataDog/asm-backend
193
+ Scenario : List all WAF policies returns "OK" response
194
+ Given new "ListApplicationSecurityWAFPolicies" request
195
+ When the request is sent
196
+ Then the response status is 200 OK
197
+
143
198
@team:DataDog/asm-backend
144
199
Scenario : Update a WAF Custom Rule returns "Bad Request" response
145
200
Given there is a valid "custom_rule" in the system
@@ -174,6 +229,38 @@ Feature: Application Security
174
229
When the request is sent
175
230
Then the response status is 200 OK
176
231
232
+ @generated @skip @team:DataDog/asm-backend
233
+ Scenario : Update a WAF Policy returns "Bad Request" response
234
+ Given new "UpdateApplicationSecurityWafPolicy" request
235
+ And request contains "policy_id" parameter from "REPLACE.ME"
236
+ And body with value {"data" : {"attributes" : {"description" : "Policy applied to internal web applications." , "isDefault" : false, "name" : "Internal Network Policy" , "protectionPresets" : ["attack-tools" ], "rules" : [{"blocking" : false, "enabled" : true, "id" : "rasp-001-002" }], "scope" : [{"env" : "prod" , "service" : "billing-service" }], "version" : 0}, "type" : "policy" }}
237
+ When the request is sent
238
+ Then the response status is 400 Bad Request
239
+
240
+ @generated @skip @team:DataDog/asm-backend
241
+ Scenario : Update a WAF Policy returns "Concurrent Modification" response
242
+ Given new "UpdateApplicationSecurityWafPolicy" request
243
+ And request contains "policy_id" parameter from "REPLACE.ME"
244
+ And body with value {"data" : {"attributes" : {"description" : "Policy applied to internal web applications." , "isDefault" : false, "name" : "Internal Network Policy" , "protectionPresets" : ["attack-tools" ], "rules" : [{"blocking" : false, "enabled" : true, "id" : "rasp-001-002" }], "scope" : [{"env" : "prod" , "service" : "billing-service" }], "version" : 0}, "type" : "policy" }}
245
+ When the request is sent
246
+ Then the response status is 409 Concurrent Modification
247
+
248
+ @generated @skip @team:DataDog/asm-backend
249
+ Scenario : Update a WAF Policy returns "Not Found" response
250
+ Given new "UpdateApplicationSecurityWafPolicy" request
251
+ And request contains "policy_id" parameter from "REPLACE.ME"
252
+ And body with value {"data" : {"attributes" : {"description" : "Policy applied to internal web applications." , "isDefault" : false, "name" : "Internal Network Policy" , "protectionPresets" : ["attack-tools" ], "rules" : [{"blocking" : false, "enabled" : true, "id" : "rasp-001-002" }], "scope" : [{"env" : "prod" , "service" : "billing-service" }], "version" : 0}, "type" : "policy" }}
253
+ When the request is sent
254
+ Then the response status is 404 Not Found
255
+
256
+ @generated @skip @team:DataDog/asm-backend
257
+ Scenario : Update a WAF Policy returns "OK" response
258
+ Given new "UpdateApplicationSecurityWafPolicy" request
259
+ And request contains "policy_id" parameter from "REPLACE.ME"
260
+ And body with value {"data" : {"attributes" : {"description" : "Policy applied to internal web applications." , "isDefault" : false, "name" : "Internal Network Policy" , "protectionPresets" : ["attack-tools" ], "rules" : [{"blocking" : false, "enabled" : true, "id" : "rasp-001-002" }], "scope" : [{"env" : "prod" , "service" : "billing-service" }], "version" : 0}, "type" : "policy" }}
261
+ When the request is sent
262
+ Then the response status is 200 OK
263
+
177
264
@team:DataDog/asm-backend
178
265
Scenario : Update a WAF exclusion filter returns "Bad Request" response
179
266
Given there is a valid "custom_rule" in the system
0 commit comments