@@ -13,6 +13,27 @@ Feature: Application Security
1313 And a valid "appKeyAuth" key in the system
1414 And an instance of "ApplicationSecurity" API
1515
16+ @generated @skip @team:DataDog/asm-backend
17+ Scenario : Create a WAF Policy returns "Bad Request" response
18+ Given new "CreateApplicationSecurityWafPolicy" request
19+ And body with value {"data" : {"attributes" : {"basedOn" : "recommended" , "description" : "Policy applied to internal web applications." , "isDefault" : false, "name" : "Internal Network Policy" , "protectionPresets" : ["attack-tools" ], "rules" : [{"blocking" : false, "enabled" : true, "id" : "rasp-001-002" }], "scope" : [{"env" : "prod" , "service" : "billing-service" }], "version" : 0}, "type" : "policy" }}
20+ When the request is sent
21+ Then the response status is 400 Bad Request
22+
23+ @generated @skip @team:DataDog/asm-backend
24+ Scenario : Create a WAF Policy returns "Concurrent Modification" response
25+ Given new "CreateApplicationSecurityWafPolicy" request
26+ And body with value {"data" : {"attributes" : {"basedOn" : "recommended" , "description" : "Policy applied to internal web applications." , "isDefault" : false, "name" : "Internal Network Policy" , "protectionPresets" : ["attack-tools" ], "rules" : [{"blocking" : false, "enabled" : true, "id" : "rasp-001-002" }], "scope" : [{"env" : "prod" , "service" : "billing-service" }], "version" : 0}, "type" : "policy" }}
27+ When the request is sent
28+ Then the response status is 409 Concurrent Modification
29+
30+ @generated @skip @team:DataDog/asm-backend
31+ Scenario : Create a WAF Policy returns "Created" response
32+ Given new "CreateApplicationSecurityWafPolicy" request
33+ And body with value {"data" : {"attributes" : {"basedOn" : "recommended" , "description" : "Policy applied to internal web applications." , "isDefault" : false, "name" : "Internal Network Policy" , "protectionPresets" : ["attack-tools" ], "rules" : [{"blocking" : false, "enabled" : true, "id" : "rasp-001-002" }], "scope" : [{"env" : "prod" , "service" : "billing-service" }], "version" : 0}, "type" : "policy" }}
34+ When the request is sent
35+ Then the response status is 201 Created
36+
1637 @generated @skip @team:DataDog/asm-backend
1738 Scenario : Create a WAF custom rule returns "Bad Request" response
1839 Given new "CreateApplicationSecurityWafCustomRule" request
@@ -84,6 +105,27 @@ Feature: Application Security
84105 When the request is sent
85106 Then the response status is 404 Not Found
86107
108+ @generated @skip @team:DataDog/asm-backend
109+ Scenario : Delete a WAF Policy returns "Concurrent Modification" response
110+ Given new "DeleteApplicationSecurityWafPolicy" request
111+ And request contains "policy_id" parameter from "REPLACE.ME"
112+ When the request is sent
113+ Then the response status is 409 Concurrent Modification
114+
115+ @generated @skip @team:DataDog/asm-backend
116+ Scenario : Delete a WAF Policy returns "No Content" response
117+ Given new "DeleteApplicationSecurityWafPolicy" request
118+ And request contains "policy_id" parameter from "REPLACE.ME"
119+ When the request is sent
120+ Then the response status is 204 No Content
121+
122+ @generated @skip @team:DataDog/asm-backend
123+ Scenario : Delete a WAF Policy returns "Not Found" response
124+ Given new "DeleteApplicationSecurityWafPolicy" request
125+ And request contains "policy_id" parameter from "REPLACE.ME"
126+ When the request is sent
127+ Then the response status is 404 Not Found
128+
87129 @generated @skip @team:DataDog/asm-backend
88130 Scenario : Delete a WAF exclusion filter returns "Concurrent Modification" response
89131 Given new "DeleteApplicationSecurityWafExclusionFilter" request
@@ -106,6 +148,13 @@ Feature: Application Security
106148 When the request is sent
107149 Then the response status is 204 OK
108150
151+ @generated @skip @team:DataDog/asm-backend
152+ Scenario : Get a WAF Policy returns "OK" response
153+ Given new "GetApplicationSecurityWafPolicy" request
154+ And request contains "policy_id" parameter from "REPLACE.ME"
155+ When the request is sent
156+ Then the response status is 200 OK
157+
109158 @generated @skip @team:DataDog/asm-backend
110159 Scenario : Get a WAF custom rule returns "OK" response
111160 Given new "GetApplicationSecurityWafCustomRule" request
@@ -140,6 +189,12 @@ Feature: Application Security
140189 When the request is sent
141190 Then the response status is 200 OK
142191
192+ @generated @skip @team:DataDog/asm-backend
193+ Scenario : List all WAF policies returns "OK" response
194+ Given new "ListApplicationSecurityWAFPolicies" request
195+ When the request is sent
196+ Then the response status is 200 OK
197+
143198 @team:DataDog/asm-backend
144199 Scenario : Update a WAF Custom Rule returns "Bad Request" response
145200 Given there is a valid "custom_rule" in the system
@@ -174,6 +229,38 @@ Feature: Application Security
174229 When the request is sent
175230 Then the response status is 200 OK
176231
232+ @generated @skip @team:DataDog/asm-backend
233+ Scenario : Update a WAF Policy returns "Bad Request" response
234+ Given new "UpdateApplicationSecurityWafPolicy" request
235+ And request contains "policy_id" parameter from "REPLACE.ME"
236+ And body with value {"data" : {"attributes" : {"description" : "Policy applied to internal web applications." , "isDefault" : false, "name" : "Internal Network Policy" , "protectionPresets" : ["attack-tools" ], "rules" : [{"blocking" : false, "enabled" : true, "id" : "rasp-001-002" }], "scope" : [{"env" : "prod" , "service" : "billing-service" }], "version" : 0}, "type" : "policy" }}
237+ When the request is sent
238+ Then the response status is 400 Bad Request
239+
240+ @generated @skip @team:DataDog/asm-backend
241+ Scenario : Update a WAF Policy returns "Concurrent Modification" response
242+ Given new "UpdateApplicationSecurityWafPolicy" request
243+ And request contains "policy_id" parameter from "REPLACE.ME"
244+ And body with value {"data" : {"attributes" : {"description" : "Policy applied to internal web applications." , "isDefault" : false, "name" : "Internal Network Policy" , "protectionPresets" : ["attack-tools" ], "rules" : [{"blocking" : false, "enabled" : true, "id" : "rasp-001-002" }], "scope" : [{"env" : "prod" , "service" : "billing-service" }], "version" : 0}, "type" : "policy" }}
245+ When the request is sent
246+ Then the response status is 409 Concurrent Modification
247+
248+ @generated @skip @team:DataDog/asm-backend
249+ Scenario : Update a WAF Policy returns "Not Found" response
250+ Given new "UpdateApplicationSecurityWafPolicy" request
251+ And request contains "policy_id" parameter from "REPLACE.ME"
252+ And body with value {"data" : {"attributes" : {"description" : "Policy applied to internal web applications." , "isDefault" : false, "name" : "Internal Network Policy" , "protectionPresets" : ["attack-tools" ], "rules" : [{"blocking" : false, "enabled" : true, "id" : "rasp-001-002" }], "scope" : [{"env" : "prod" , "service" : "billing-service" }], "version" : 0}, "type" : "policy" }}
253+ When the request is sent
254+ Then the response status is 404 Not Found
255+
256+ @generated @skip @team:DataDog/asm-backend
257+ Scenario : Update a WAF Policy returns "OK" response
258+ Given new "UpdateApplicationSecurityWafPolicy" request
259+ And request contains "policy_id" parameter from "REPLACE.ME"
260+ And body with value {"data" : {"attributes" : {"description" : "Policy applied to internal web applications." , "isDefault" : false, "name" : "Internal Network Policy" , "protectionPresets" : ["attack-tools" ], "rules" : [{"blocking" : false, "enabled" : true, "id" : "rasp-001-002" }], "scope" : [{"env" : "prod" , "service" : "billing-service" }], "version" : 0}, "type" : "policy" }}
261+ When the request is sent
262+ Then the response status is 200 OK
263+
177264 @team:DataDog/asm-backend
178265 Scenario : Update a WAF exclusion filter returns "Bad Request" response
179266 Given there is a valid "custom_rule" in the system
0 commit comments