diff --git a/.generator/schemas/v2/openapi.yaml b/.generator/schemas/v2/openapi.yaml index eea8d903b4d..ee3cd5595e1 100644 --- a/.generator/schemas/v2/openapi.yaml +++ b/.generator/schemas/v2/openapi.yaml @@ -29996,6 +29996,13 @@ components: Library: description: Vulnerability library. properties: + additional_names: + description: Related library or package names (such as child packages or + affected binary paths). + items: + example: linux-tools-common + type: string + type: array name: description: Vulnerability library name. example: linux-aws-5.15 @@ -57371,6 +57378,12 @@ components: type: array risks: $ref: '#/components/schemas/VulnerabilityRisks' + running_kernel: + description: "True if the vulnerability affects a package in the host\u2019s + running kernel, false if it affects a non-running kernel, and omit if + it is not kernel-related." + example: true + type: boolean status: $ref: '#/components/schemas/VulnerabilityStatus' title: @@ -57431,10 +57444,15 @@ components: - RubyGems - Go - Packagist - - Ddeb + - Deb - Rpm - Apk - Windows + - Generic + - MacOs + - Oci + - BottleRocket + - None type: string x-enum-varnames: - PYPI @@ -57444,10 +57462,15 @@ components: - RUBY_GEMS - GO - PACKAGIST - - D_DEB + - DEB - RPM - APK - WINDOWS + - GENERIC + - MAC_OS + - OCI + - BOTTLE_ROCKET + - NONE VulnerabilityRelationships: description: Related entities object. properties: @@ -57548,12 +57571,14 @@ components: - IAST - SCA - Infra + - SAST example: SCA type: string x-enum-varnames: - IAST - SCA - INFRA + - SAST VulnerabilityType: description: The vulnerability type. enum: @@ -80311,6 +80336,10 @@ paths: summary: List assets SBOMs tags: - Security Monitoring + x-permission: + operator: OR + permissions: + - appsec_vm_read x-unstable: '**Note**: This endpoint is a private preview. If you are interested in accessing this API, [fill out this form](https://forms.gle/kMYC1sDr6WDUBDsx9).' @@ -80382,6 +80411,10 @@ paths: summary: Get SBOM tags: - Security Monitoring + x-permission: + operator: OR + permissions: + - appsec_vm_read x-unstable: '**Note**: This endpoint is a private preview. If you are interested in accessing this API, [fill out this form](https://forms.gle/kMYC1sDr6WDUBDsx9).' @@ -80496,6 +80529,10 @@ paths: summary: List scanned assets metadata tags: - Security Monitoring + x-permission: + operator: OR + permissions: + - appsec_vm_read x-unstable: '**Note**: This endpoint is a private preview. If you are interested in accessing this API, [fill out this form](https://forms.gle/kMYC1sDr6WDUBDsx9).' @@ -80924,6 +80961,14 @@ paths: required: false schema: type: string + - description: Filter for whether the vulnerability affects a running kernel + (for vulnerabilities related to a `Host` asset). + example: true + in: query + name: filter[running_kernel] + required: false + schema: + type: boolean - description: Filter by asset name. This field supports the usage of wildcards (*). example: datadog-agent @@ -81067,6 +81112,10 @@ paths: summary: List vulnerabilities tags: - Security Monitoring + x-permission: + operator: OR + permissions: + - appsec_vm_read x-unstable: '**Note**: This endpoint is a private preview. If you are interested in accessing this API, [fill out this form](https://forms.gle/kMYC1sDr6WDUBDsx9).' @@ -81425,6 +81474,10 @@ paths: summary: List vulnerable assets tags: - Security Monitoring + x-permission: + operator: OR + permissions: + - appsec_vm_read x-unstable: '**Note**: This endpoint is a private preview. If you are interested in accessing this API, [fill out this form](https://forms.gle/kMYC1sDr6WDUBDsx9).' @@ -84562,8 +84615,8 @@ paths: x-unstable: '**Note**: This endpoint may be subject to changes.' /api/v2/static-analysis/secrets/rules: get: - description: Returns list of Secrets rules with ID, Pattern, Description, Priority, - and SDS ID + description: Returns a list of Secrets rules with ID, Pattern, Description, + Priority, and SDS ID. operationId: GetSecretsRules responses: '200': @@ -84579,7 +84632,7 @@ paths: appKeyAuth: [] - AuthZ: - code_analysis_read - summary: Returns list of Secrets rules + summary: Returns a list of Secrets rules tags: - Security Monitoring x-unstable: '**Note**: This endpoint may be subject to changes.' diff --git a/examples/v2/security-monitoring/GetSecretsRules.java b/examples/v2/security-monitoring/GetSecretsRules.java index 9a2dda746b3..d349a5037bf 100644 --- a/examples/v2/security-monitoring/GetSecretsRules.java +++ b/examples/v2/security-monitoring/GetSecretsRules.java @@ -1,4 +1,4 @@ -// Returns list of Secrets rules returns "OK" response +// Returns a list of Secrets rules returns "OK" response import com.datadog.api.client.ApiClient; import com.datadog.api.client.ApiException; diff --git a/src/main/java/com/datadog/api/client/v2/api/SecurityMonitoringApi.java b/src/main/java/com/datadog/api/client/v2/api/SecurityMonitoringApi.java index c261e96ae68..78a496b31f9 100644 --- a/src/main/java/com/datadog/api/client/v2/api/SecurityMonitoringApi.java +++ b/src/main/java/com/datadog/api/client/v2/api/SecurityMonitoringApi.java @@ -4879,7 +4879,7 @@ public CompletableFuture> getSBOMWithHttpInfoAsync( } /** - * Returns list of Secrets rules. + * Returns a list of Secrets rules. * *

See {@link #getSecretsRulesWithHttpInfo}. * @@ -4891,7 +4891,7 @@ public SecretRuleArray getSecretsRules() throws ApiException { } /** - * Returns list of Secrets rules. + * Returns a list of Secrets rules. * *

See {@link #getSecretsRulesWithHttpInfoAsync}. * @@ -4906,7 +4906,7 @@ public CompletableFuture getSecretsRulesAsync() { } /** - * Returns list of Secrets rules with ID, Pattern, Description, Priority, and SDS ID + * Returns a list of Secrets rules with ID, Pattern, Description, Priority, and SDS ID. * * @return ApiResponse<SecretRuleArray> * @throws ApiException if fails to make API call @@ -4953,7 +4953,7 @@ public ApiResponse getSecretsRulesWithHttpInfo() throws ApiExce } /** - * Returns list of Secrets rules. + * Returns a list of Secrets rules. * *

See {@link #getSecretsRulesWithHttpInfo}. * @@ -9689,6 +9689,7 @@ public static class ListVulnerabilitiesOptionalParameters { private Boolean filterFixAvailable; private String filterRepoDigests; private String filterOrigin; + private Boolean filterRunningKernel; private String filterAssetName; private AssetType filterAssetType; private String filterAssetVersionFirst; @@ -10022,6 +10023,18 @@ public ListVulnerabilitiesOptionalParameters filterOrigin(String filterOrigin) { return this; } + /** + * Set filterRunningKernel. + * + * @param filterRunningKernel Filter for whether the vulnerability affects a running kernel (for + * vulnerabilities related to a Host asset). (optional) + * @return ListVulnerabilitiesOptionalParameters + */ + public ListVulnerabilitiesOptionalParameters filterRunningKernel(Boolean filterRunningKernel) { + this.filterRunningKernel = filterRunningKernel; + return this; + } + /** * Set filterAssetName. * @@ -10431,6 +10444,7 @@ public ApiResponse listVulnerabilitiesWithHttpInfo( Boolean filterFixAvailable = parameters.filterFixAvailable; String filterRepoDigests = parameters.filterRepoDigests; String filterOrigin = parameters.filterOrigin; + Boolean filterRunningKernel = parameters.filterRunningKernel; String filterAssetName = parameters.filterAssetName; AssetType filterAssetType = parameters.filterAssetType; String filterAssetVersionFirst = parameters.filterAssetVersionFirst; @@ -10506,6 +10520,8 @@ public ApiResponse listVulnerabilitiesWithHttpInfo( localVarQueryParams.addAll( apiClient.parameterToPairs("", "filter[repo_digests]", filterRepoDigests)); localVarQueryParams.addAll(apiClient.parameterToPairs("", "filter[origin]", filterOrigin)); + localVarQueryParams.addAll( + apiClient.parameterToPairs("", "filter[running_kernel]", filterRunningKernel)); localVarQueryParams.addAll( apiClient.parameterToPairs("", "filter[asset.name]", filterAssetName)); localVarQueryParams.addAll( @@ -10617,6 +10633,7 @@ public ApiResponse listVulnerabilitiesWithHttpInfo( Boolean filterFixAvailable = parameters.filterFixAvailable; String filterRepoDigests = parameters.filterRepoDigests; String filterOrigin = parameters.filterOrigin; + Boolean filterRunningKernel = parameters.filterRunningKernel; String filterAssetName = parameters.filterAssetName; AssetType filterAssetType = parameters.filterAssetType; String filterAssetVersionFirst = parameters.filterAssetVersionFirst; @@ -10692,6 +10709,8 @@ public ApiResponse listVulnerabilitiesWithHttpInfo( localVarQueryParams.addAll( apiClient.parameterToPairs("", "filter[repo_digests]", filterRepoDigests)); localVarQueryParams.addAll(apiClient.parameterToPairs("", "filter[origin]", filterOrigin)); + localVarQueryParams.addAll( + apiClient.parameterToPairs("", "filter[running_kernel]", filterRunningKernel)); localVarQueryParams.addAll( apiClient.parameterToPairs("", "filter[asset.name]", filterAssetName)); localVarQueryParams.addAll( diff --git a/src/main/java/com/datadog/api/client/v2/model/Library.java b/src/main/java/com/datadog/api/client/v2/model/Library.java index 98a0c0f3134..bc224ed71d9 100644 --- a/src/main/java/com/datadog/api/client/v2/model/Library.java +++ b/src/main/java/com/datadog/api/client/v2/model/Library.java @@ -13,16 +13,25 @@ import com.fasterxml.jackson.annotation.JsonInclude; import com.fasterxml.jackson.annotation.JsonProperty; import com.fasterxml.jackson.annotation.JsonPropertyOrder; +import java.util.ArrayList; import java.util.HashMap; +import java.util.List; import java.util.Map; import java.util.Objects; /** Vulnerability library. */ -@JsonPropertyOrder({Library.JSON_PROPERTY_NAME, Library.JSON_PROPERTY_VERSION}) +@JsonPropertyOrder({ + Library.JSON_PROPERTY_ADDITIONAL_NAMES, + Library.JSON_PROPERTY_NAME, + Library.JSON_PROPERTY_VERSION +}) @jakarta.annotation.Generated( value = "https://github.com/DataDog/datadog-api-client-java/blob/master/.generator") public class Library { @JsonIgnore public boolean unparsed = false; + public static final String JSON_PROPERTY_ADDITIONAL_NAMES = "additional_names"; + private List additionalNames = null; + public static final String JSON_PROPERTY_NAME = "name"; private String name; @@ -36,6 +45,35 @@ public Library(@JsonProperty(required = true, value = JSON_PROPERTY_NAME) String this.name = name; } + public Library additionalNames(List additionalNames) { + this.additionalNames = additionalNames; + return this; + } + + public Library addAdditionalNamesItem(String additionalNamesItem) { + if (this.additionalNames == null) { + this.additionalNames = new ArrayList<>(); + } + this.additionalNames.add(additionalNamesItem); + return this; + } + + /** + * Related library or package names (such as child packages or affected binary paths). + * + * @return additionalNames + */ + @jakarta.annotation.Nullable + @JsonProperty(JSON_PROPERTY_ADDITIONAL_NAMES) + @JsonInclude(value = JsonInclude.Include.USE_DEFAULTS) + public List getAdditionalNames() { + return additionalNames; + } + + public void setAdditionalNames(List additionalNames) { + this.additionalNames = additionalNames; + } + public Library name(String name) { this.name = name; return this; @@ -133,20 +171,22 @@ public boolean equals(Object o) { return false; } Library library = (Library) o; - return Objects.equals(this.name, library.name) + return Objects.equals(this.additionalNames, library.additionalNames) + && Objects.equals(this.name, library.name) && Objects.equals(this.version, library.version) && Objects.equals(this.additionalProperties, library.additionalProperties); } @Override public int hashCode() { - return Objects.hash(name, version, additionalProperties); + return Objects.hash(additionalNames, name, version, additionalProperties); } @Override public String toString() { StringBuilder sb = new StringBuilder(); sb.append("class Library {\n"); + sb.append(" additionalNames: ").append(toIndentedString(additionalNames)).append("\n"); sb.append(" name: ").append(toIndentedString(name)).append("\n"); sb.append(" version: ").append(toIndentedString(version)).append("\n"); sb.append(" additionalProperties: ") diff --git a/src/main/java/com/datadog/api/client/v2/model/VulnerabilityAttributes.java b/src/main/java/com/datadog/api/client/v2/model/VulnerabilityAttributes.java index e7abd3673e2..1524f880366 100644 --- a/src/main/java/com/datadog/api/client/v2/model/VulnerabilityAttributes.java +++ b/src/main/java/com/datadog/api/client/v2/model/VulnerabilityAttributes.java @@ -39,6 +39,7 @@ VulnerabilityAttributes.JSON_PROPERTY_REMEDIATIONS, VulnerabilityAttributes.JSON_PROPERTY_REPO_DIGESTS, VulnerabilityAttributes.JSON_PROPERTY_RISKS, + VulnerabilityAttributes.JSON_PROPERTY_RUNNING_KERNEL, VulnerabilityAttributes.JSON_PROPERTY_STATUS, VulnerabilityAttributes.JSON_PROPERTY_TITLE, VulnerabilityAttributes.JSON_PROPERTY_TOOL, @@ -102,6 +103,9 @@ public class VulnerabilityAttributes { public static final String JSON_PROPERTY_RISKS = "risks"; private VulnerabilityRisks risks; + public static final String JSON_PROPERTY_RUNNING_KERNEL = "running_kernel"; + private Boolean runningKernel; + public static final String JSON_PROPERTY_STATUS = "status"; private VulnerabilityStatus status; @@ -564,6 +568,28 @@ public void setRisks(VulnerabilityRisks risks) { this.risks = risks; } + public VulnerabilityAttributes runningKernel(Boolean runningKernel) { + this.runningKernel = runningKernel; + return this; + } + + /** + * True if the vulnerability affects a package in the host’s running kernel, false if it affects a + * non-running kernel, and omit if it is not kernel-related. + * + * @return runningKernel + */ + @jakarta.annotation.Nullable + @JsonProperty(JSON_PROPERTY_RUNNING_KERNEL) + @JsonInclude(value = JsonInclude.Include.USE_DEFAULTS) + public Boolean getRunningKernel() { + return runningKernel; + } + + public void setRunningKernel(Boolean runningKernel) { + this.runningKernel = runningKernel; + } + public VulnerabilityAttributes status(VulnerabilityStatus status) { this.status = status; this.unparsed |= !status.isValid(); @@ -730,6 +756,7 @@ public boolean equals(Object o) { && Objects.equals(this.remediations, vulnerabilityAttributes.remediations) && Objects.equals(this.repoDigests, vulnerabilityAttributes.repoDigests) && Objects.equals(this.risks, vulnerabilityAttributes.risks) + && Objects.equals(this.runningKernel, vulnerabilityAttributes.runningKernel) && Objects.equals(this.status, vulnerabilityAttributes.status) && Objects.equals(this.title, vulnerabilityAttributes.title) && Objects.equals(this.tool, vulnerabilityAttributes.tool) @@ -758,6 +785,7 @@ public int hashCode() { remediations, repoDigests, risks, + runningKernel, status, title, tool, @@ -789,6 +817,7 @@ public String toString() { sb.append(" remediations: ").append(toIndentedString(remediations)).append("\n"); sb.append(" repoDigests: ").append(toIndentedString(repoDigests)).append("\n"); sb.append(" risks: ").append(toIndentedString(risks)).append("\n"); + sb.append(" runningKernel: ").append(toIndentedString(runningKernel)).append("\n"); sb.append(" status: ").append(toIndentedString(status)).append("\n"); sb.append(" title: ").append(toIndentedString(title)).append("\n"); sb.append(" tool: ").append(toIndentedString(tool)).append("\n"); diff --git a/src/main/java/com/datadog/api/client/v2/model/VulnerabilityEcosystem.java b/src/main/java/com/datadog/api/client/v2/model/VulnerabilityEcosystem.java index 5be068f9a26..44653130fd0 100644 --- a/src/main/java/com/datadog/api/client/v2/model/VulnerabilityEcosystem.java +++ b/src/main/java/com/datadog/api/client/v2/model/VulnerabilityEcosystem.java @@ -32,10 +32,15 @@ public class VulnerabilityEcosystem extends ModelEnum { "RubyGems", "Go", "Packagist", - "Ddeb", + "Deb", "Rpm", "Apk", - "Windows")); + "Windows", + "Generic", + "MacOs", + "Oci", + "BottleRocket", + "None")); public static final VulnerabilityEcosystem PYPI = new VulnerabilityEcosystem("PyPI"); public static final VulnerabilityEcosystem MAVEN = new VulnerabilityEcosystem("Maven"); @@ -44,10 +49,16 @@ public class VulnerabilityEcosystem extends ModelEnum { public static final VulnerabilityEcosystem RUBY_GEMS = new VulnerabilityEcosystem("RubyGems"); public static final VulnerabilityEcosystem GO = new VulnerabilityEcosystem("Go"); public static final VulnerabilityEcosystem PACKAGIST = new VulnerabilityEcosystem("Packagist"); - public static final VulnerabilityEcosystem D_DEB = new VulnerabilityEcosystem("Ddeb"); + public static final VulnerabilityEcosystem DEB = new VulnerabilityEcosystem("Deb"); public static final VulnerabilityEcosystem RPM = new VulnerabilityEcosystem("Rpm"); public static final VulnerabilityEcosystem APK = new VulnerabilityEcosystem("Apk"); public static final VulnerabilityEcosystem WINDOWS = new VulnerabilityEcosystem("Windows"); + public static final VulnerabilityEcosystem GENERIC = new VulnerabilityEcosystem("Generic"); + public static final VulnerabilityEcosystem MAC_OS = new VulnerabilityEcosystem("MacOs"); + public static final VulnerabilityEcosystem OCI = new VulnerabilityEcosystem("Oci"); + public static final VulnerabilityEcosystem BOTTLE_ROCKET = + new VulnerabilityEcosystem("BottleRocket"); + public static final VulnerabilityEcosystem NONE = new VulnerabilityEcosystem("None"); VulnerabilityEcosystem(String value) { super(value, allowedValues); diff --git a/src/main/java/com/datadog/api/client/v2/model/VulnerabilityTool.java b/src/main/java/com/datadog/api/client/v2/model/VulnerabilityTool.java index 88fc9665c7e..7eb1463d784 100644 --- a/src/main/java/com/datadog/api/client/v2/model/VulnerabilityTool.java +++ b/src/main/java/com/datadog/api/client/v2/model/VulnerabilityTool.java @@ -23,11 +23,12 @@ public class VulnerabilityTool extends ModelEnum { private static final Set allowedValues = - new HashSet(Arrays.asList("IAST", "SCA", "Infra")); + new HashSet(Arrays.asList("IAST", "SCA", "Infra", "SAST")); public static final VulnerabilityTool IAST = new VulnerabilityTool("IAST"); public static final VulnerabilityTool SCA = new VulnerabilityTool("SCA"); public static final VulnerabilityTool INFRA = new VulnerabilityTool("Infra"); + public static final VulnerabilityTool SAST = new VulnerabilityTool("SAST"); VulnerabilityTool(String value) { super(value, allowedValues); diff --git a/src/test/resources/cassettes/features/v2/List_vulnerabilities_returns_Not_found_There_is_no_request_associated_with_the_provided_token_response.freeze b/src/test/resources/cassettes/features/v2/List_vulnerabilities_returns_Not_found_There_is_no_request_associated_with_the_provided_token_response.freeze index bebe5144844..ae0101c9ee3 100644 --- a/src/test/resources/cassettes/features/v2/List_vulnerabilities_returns_Not_found_There_is_no_request_associated_with_the_provided_token_response.freeze +++ b/src/test/resources/cassettes/features/v2/List_vulnerabilities_returns_Not_found_There_is_no_request_associated_with_the_provided_token_response.freeze @@ -1 +1 @@ -2025-01-31T12:04:28.397Z \ No newline at end of file +2025-12-12T14:36:04.169Z \ No newline at end of file diff --git a/src/test/resources/cassettes/features/v2/List_vulnerabilities_returns_Not_found_There_is_no_request_associated_with_the_provided_token_response.json b/src/test/resources/cassettes/features/v2/List_vulnerabilities_returns_Not_found_There_is_no_request_associated_with_the_provided_token_response.json index 38cbd41a514..ae44604c1f3 100644 --- a/src/test/resources/cassettes/features/v2/List_vulnerabilities_returns_Not_found_There_is_no_request_associated_with_the_provided_token_response.json +++ b/src/test/resources/cassettes/features/v2/List_vulnerabilities_returns_Not_found_There_is_no_request_associated_with_the_provided_token_response.json @@ -16,7 +16,7 @@ "secure": true }, "httpResponse": { - "body": "{\"errors\":[{\"title\":\"Generic Error\",\"detail\":\"rpc error: code = Internal desc = no cached result set found for queryID: unknown\"}]}", + "body": "{\"errors\":[{\"status\":\"404\",\"title\":\"Unexpected internal error\"}]}", "headers": { "Content-Type": [ "application/vnd.api+json" diff --git a/src/test/resources/cassettes/features/v2/List_vulnerabilities_returns_OK_response.freeze b/src/test/resources/cassettes/features/v2/List_vulnerabilities_returns_OK_response.freeze index 9ddcdc5dd29..e3e6312eec9 100644 --- a/src/test/resources/cassettes/features/v2/List_vulnerabilities_returns_OK_response.freeze +++ b/src/test/resources/cassettes/features/v2/List_vulnerabilities_returns_OK_response.freeze @@ -1 +1 @@ -2025-01-31T12:04:39.730Z \ No newline at end of file +2025-12-12T14:36:49.310Z \ No newline at end of file diff --git a/src/test/resources/com/datadog/api/client/v2/api/security_monitoring.feature b/src/test/resources/com/datadog/api/client/v2/api/security_monitoring.feature index 7dc352a7a4e..e8b72066af0 100644 --- a/src/test/resources/com/datadog/api/client/v2/api/security_monitoring.feature +++ b/src/test/resources/com/datadog/api/client/v2/api/security_monitoring.feature @@ -781,7 +781,7 @@ Feature: Security Monitoring When the request is sent Then the response status is 404 Not Found - @generated @skip @team:DataDog/asm-vm + @generated @skip @team:DataDog/k9-cloud-vm Scenario: Get SBOM returns "Bad request: The server cannot process the request due to invalid syntax in the request." response Given operation "GetSBOM" enabled And new "GetSBOM" request @@ -790,7 +790,7 @@ Feature: Security Monitoring When the request is sent Then the response status is 400 Bad request: The server cannot process the request due to invalid syntax in the request. - @team:DataDog/asm-vm + @team:DataDog/k9-cloud-vm Scenario: Get SBOM returns "Not found: asset not found" response Given operation "GetSBOM" enabled And new "GetSBOM" request @@ -799,7 +799,7 @@ Feature: Security Monitoring When the request is sent Then the response status is 404 Not found: asset not found - @skip @team:DataDog/asm-vm + @skip @team:DataDog/k9-cloud-vm Scenario: Get SBOM returns "OK" response Given operation "GetSBOM" enabled And new "GetSBOM" request @@ -1182,14 +1182,14 @@ Feature: Security Monitoring When the request is sent Then the response status is 200 The list of notification rules. - @generated @skip @team:DataDog/asm-vm + @generated @skip @team:DataDog/k9-cloud-vm Scenario: List assets SBOMs returns "Bad request: The server cannot process the request due to invalid syntax in the request." response Given operation "ListAssetsSBOMs" enabled And new "ListAssetsSBOMs" request When the request is sent Then the response status is 400 Bad request: The server cannot process the request due to invalid syntax in the request. - @team:DataDog/asm-vm + @team:DataDog/k9-cloud-vm Scenario: List assets SBOMs returns "Not found: There is no request associated with the provided token." response Given operation "ListAssetsSBOMs" enabled And new "ListAssetsSBOMs" request @@ -1198,14 +1198,14 @@ Feature: Security Monitoring When the request is sent Then the response status is 404 Not found: There is no request associated with the provided token. - @generated @skip @team:DataDog/asm-vm + @generated @skip @team:DataDog/k9-cloud-vm Scenario: List assets SBOMs returns "Not found: asset not found" response Given operation "ListAssetsSBOMs" enabled And new "ListAssetsSBOMs" request When the request is sent Then the response status is 404 Not found: asset not found - @team:DataDog/asm-vm + @team:DataDog/k9-cloud-vm Scenario: List assets SBOMs returns "OK" response Given operation "ListAssetsSBOMs" enabled And new "ListAssetsSBOMs" request @@ -1317,14 +1317,14 @@ Feature: Security Monitoring When the request is sent Then the response status is 200 OK - @skip @team:DataDog/asm-vm + @skip @team:DataDog/k9-cloud-vm Scenario: List scanned assets metadata returns "Bad request: The server cannot process the request due to invalid syntax in the request." response Given operation "ListScannedAssetsMetadata" enabled And new "ListScannedAssetsMetadata" request When the request is sent Then the response status is 400 Bad request: The server cannot process the request due to invalid syntax in the request. - @team:DataDog/asm-vm + @team:DataDog/k9-cloud-vm Scenario: List scanned assets metadata returns "Not found: asset not found" response Given operation "ListScannedAssetsMetadata" enabled And new "ListScannedAssetsMetadata" request @@ -1333,7 +1333,7 @@ Feature: Security Monitoring When the request is sent Then the response status is 404 Not found: asset not found - @team:DataDog/asm-vm + @team:DataDog/k9-cloud-vm Scenario: List scanned assets metadata returns "OK" response Given operation "ListScannedAssetsMetadata" enabled And new "ListScannedAssetsMetadata" request @@ -1354,14 +1354,14 @@ Feature: Security Monitoring When the request is sent Then the response status is 200 OK - @generated @skip @team:DataDog/asm-vm + @generated @skip @team:DataDog/k9-cloud-vm Scenario: List vulnerabilities returns "Bad request: The server cannot process the request due to invalid syntax in the request." response Given operation "ListVulnerabilities" enabled And new "ListVulnerabilities" request When the request is sent Then the response status is 400 Bad request: The server cannot process the request due to invalid syntax in the request. - @team:DataDog/asm-vm + @team:DataDog/k9-cloud-vm Scenario: List vulnerabilities returns "Not found: There is no request associated with the provided token." response Given operation "ListVulnerabilities" enabled And new "ListVulnerabilities" request @@ -1370,7 +1370,7 @@ Feature: Security Monitoring When the request is sent Then the response status is 404 Not found: There is no request associated with the provided token. - @team:DataDog/asm-vm + @team:DataDog/k9-cloud-vm Scenario: List vulnerabilities returns "OK" response Given operation "ListVulnerabilities" enabled And new "ListVulnerabilities" request @@ -1380,14 +1380,14 @@ Feature: Security Monitoring When the request is sent Then the response status is 200 OK - @generated @skip @team:DataDog/asm-vm + @generated @skip @team:DataDog/k9-cloud-vm Scenario: List vulnerable assets returns "Bad request: The server cannot process the request due to invalid syntax in the request." response Given operation "ListVulnerableAssets" enabled And new "ListVulnerableAssets" request When the request is sent Then the response status is 400 Bad request: The server cannot process the request due to invalid syntax in the request. - @team:DataDog/asm-vm + @team:DataDog/k9-cloud-vm Scenario: List vulnerable assets returns "Not found: There is no request associated with the provided token." response Given operation "ListVulnerableAssets" enabled And new "ListVulnerableAssets" request @@ -1396,7 +1396,7 @@ Feature: Security Monitoring When the request is sent Then the response status is 404 Not found: There is no request associated with the provided token. - @team:DataDog/asm-vm + @team:DataDog/k9-cloud-vm Scenario: List vulnerable assets returns "OK" response Given operation "ListVulnerableAssets" enabled And new "ListVulnerableAssets" request @@ -1530,14 +1530,14 @@ Feature: Security Monitoring When the request is sent Then the response status is 422 The server cannot process the request because it contains invalid data. - @generated @skip @team:DataDog/asm-vm - Scenario: Returns list of Secrets rules returns "OK" response + @generated @skip @team:DataDog/k9-vm-ast + Scenario: Returns a list of Secrets rules returns "OK" response Given operation "GetSecretsRules" enabled And new "GetSecretsRules" request When the request is sent Then the response status is 200 OK - @generated @skip @team:DataDog/asm-vm + @generated @skip @team:DataDog/k9-vm-ast Scenario: Ruleset get multiple returns "OK" response Given operation "ListMultipleRulesets" enabled And new "ListMultipleRulesets" request