From d401919176a8093c82097082f09d7fb728d6e90e Mon Sep 17 00:00:00 2001 From: "ci.datadog-api-spec" Date: Wed, 6 May 2026 07:40:10 +0000 Subject: [PATCH] Regenerate client from commit a8c070f of spec repo --- .generator/schemas/v2/openapi.yaml | 33 +++++++++++++++++++ ...agentless-scanning_CreateAwsScanOptions.rs | 2 +- .../model_aws_scan_options_attributes.rs | 18 ++++++++++ ...odel_aws_scan_options_create_attributes.rs | 13 ++++++++ ...odel_aws_scan_options_update_attributes.rs | 18 ++++++++++ ...odel_azure_scan_options_data_attributes.rs | 18 ++++++++++ ...an_options_input_update_data_attributes.rs | 18 ++++++++++ .../model_gcp_scan_options_data_attributes.rs | 18 ++++++++++ ...an_options_input_update_data_attributes.rs | 18 ++++++++++ ...ptions-returns-Bad-Request-response.frozen | 2 +- ...-options-returns-Bad-Request-response.json | 4 +-- ...n-options-returns-Conflict-response.frozen | 2 +- ...can-options-returns-Conflict-response.json | 4 +-- .../features/v2/agentless_scanning.feature | 6 ++-- 14 files changed, 164 insertions(+), 10 deletions(-) diff --git a/.generator/schemas/v2/openapi.yaml b/.generator/schemas/v2/openapi.yaml index df325279ee..5d6f2f7348 100644 --- a/.generator/schemas/v2/openapi.yaml +++ b/.generator/schemas/v2/openapi.yaml @@ -7731,6 +7731,10 @@ components: AwsScanOptionsAttributes: description: Attributes for the AWS scan options. properties: + compliance_host: + description: Indicates whether host compliance scanning is enabled. + example: false + type: boolean lambda: description: Indicates if scanning of Lambda functions is enabled. example: true @@ -7751,6 +7755,10 @@ components: AwsScanOptionsCreateAttributes: description: Attributes for the AWS scan options to create. properties: + compliance_host: + description: Indicates whether host compliance scanning is enabled. + example: false + type: boolean lambda: description: Indicates if scanning of Lambda functions is enabled. example: true @@ -7768,6 +7776,7 @@ components: example: true type: boolean required: + - compliance_host - lambda - sensitive_data - vuln_containers_os @@ -7833,6 +7842,10 @@ components: AwsScanOptionsUpdateAttributes: description: Attributes for the AWS scan options to update. properties: + compliance_host: + description: Indicates whether host compliance scanning is enabled. + example: false + type: boolean lambda: description: Indicates if scanning of Lambda functions is enabled. example: true @@ -7914,6 +7927,7 @@ components: example: data: attributes: + compliance_host: false vuln_containers_os: true vuln_host_os: true id: 12345678-90ab-cdef-1234-567890abcdef @@ -7927,6 +7941,7 @@ components: example: data: - attributes: + compliance_host: false vuln_containers_os: true vuln_host_os: true id: 12345678-90ab-cdef-1234-567890abcdef @@ -7958,6 +7973,9 @@ components: AzureScanOptionsDataAttributes: description: Attributes for Azure scan options configuration. properties: + compliance_host: + description: Indicates whether host compliance scanning is enabled. + type: boolean vuln_containers_os: description: Indicates if scanning for vulnerabilities in containers is enabled. type: boolean @@ -8002,6 +8020,9 @@ components: AzureScanOptionsInputUpdateDataAttributes: description: Attributes for updating Azure scan options configuration. properties: + compliance_host: + description: Indicates whether host compliance scanning is enabled. + type: boolean vuln_containers_os: description: Indicates if scanning for vulnerabilities in containers is enabled. type: boolean @@ -30081,6 +30102,7 @@ components: example: data: attributes: + compliance_host: false vuln_containers_os: true vuln_host_os: true id: company-project-id @@ -30094,6 +30116,7 @@ components: example: data: - attributes: + compliance_host: false vuln_containers_os: true vuln_host_os: true id: company-project-id @@ -30125,6 +30148,9 @@ components: GcpScanOptionsDataAttributes: description: Attributes for GCP scan options configuration. properties: + compliance_host: + description: Indicates whether host compliance scanning is enabled. + type: boolean vuln_containers_os: description: Indicates if scanning for vulnerabilities in containers is enabled. type: boolean @@ -30169,6 +30195,9 @@ components: GcpScanOptionsInputUpdateDataAttributes: description: Attributes for updating GCP scan options configuration. properties: + compliance_host: + description: Indicates whether host compliance scanning is enabled. + type: boolean vuln_containers_os: description: Indicates if scanning for vulnerabilities in containers is enabled. type: boolean @@ -85870,6 +85899,7 @@ paths: value: data: attributes: + compliance_host: false lambda: true sensitive_data: false vuln_containers_os: true @@ -85967,6 +85997,7 @@ paths: value: data: attributes: + compliance_host: false lambda: true sensitive_data: false vuln_containers_os: true @@ -86028,6 +86059,7 @@ paths: value: data: attributes: + compliance_host: false vuln_containers_os: true vuln_host_os: true id: 12345678-90ab-cdef-1234-567890abcdef @@ -86186,6 +86218,7 @@ paths: value: data: attributes: + compliance_host: false vuln_containers_os: true vuln_host_os: true id: company-project-id diff --git a/examples/v2_agentless-scanning_CreateAwsScanOptions.rs b/examples/v2_agentless-scanning_CreateAwsScanOptions.rs index 039f668689..e0d1ee0936 100644 --- a/examples/v2_agentless-scanning_CreateAwsScanOptions.rs +++ b/examples/v2_agentless-scanning_CreateAwsScanOptions.rs @@ -10,7 +10,7 @@ use datadog_api_client::datadogV2::model::AwsScanOptionsType; #[tokio::main] async fn main() { let body = AwsScanOptionsCreateRequest::new(AwsScanOptionsCreateData::new( - AwsScanOptionsCreateAttributes::new(true, false, true, true), + AwsScanOptionsCreateAttributes::new(true, true, false, true, true), "000000000003".to_string(), AwsScanOptionsType::AWS_SCAN_OPTIONS, )); diff --git a/src/datadogV2/model/model_aws_scan_options_attributes.rs b/src/datadogV2/model/model_aws_scan_options_attributes.rs index 1dec7a6721..9a4a6e3609 100644 --- a/src/datadogV2/model/model_aws_scan_options_attributes.rs +++ b/src/datadogV2/model/model_aws_scan_options_attributes.rs @@ -11,6 +11,9 @@ use std::fmt::{self, Formatter}; #[skip_serializing_none] #[derive(Clone, Debug, PartialEq, Serialize)] pub struct AwsScanOptionsAttributes { + /// Indicates whether host compliance scanning is enabled. + #[serde(rename = "compliance_host")] + pub compliance_host: Option, /// Indicates if scanning of Lambda functions is enabled. #[serde(rename = "lambda")] pub lambda: Option, @@ -33,6 +36,7 @@ pub struct AwsScanOptionsAttributes { impl AwsScanOptionsAttributes { pub fn new() -> AwsScanOptionsAttributes { AwsScanOptionsAttributes { + compliance_host: None, lambda: None, sensitive_data: None, vuln_containers_os: None, @@ -42,6 +46,11 @@ impl AwsScanOptionsAttributes { } } + pub fn compliance_host(mut self, value: bool) -> Self { + self.compliance_host = Some(value); + self + } + pub fn lambda(mut self, value: bool) -> Self { self.lambda = Some(value); self @@ -94,6 +103,7 @@ impl<'de> Deserialize<'de> for AwsScanOptionsAttributes { where M: MapAccess<'a>, { + let mut compliance_host: Option = None; let mut lambda: Option = None; let mut sensitive_data: Option = None; let mut vuln_containers_os: Option = None; @@ -106,6 +116,13 @@ impl<'de> Deserialize<'de> for AwsScanOptionsAttributes { while let Some((k, v)) = map.next_entry::()? { match k.as_str() { + "compliance_host" => { + if v.is_null() { + continue; + } + compliance_host = + Some(serde_json::from_value(v).map_err(M::Error::custom)?); + } "lambda" => { if v.is_null() { continue; @@ -142,6 +159,7 @@ impl<'de> Deserialize<'de> for AwsScanOptionsAttributes { } let content = AwsScanOptionsAttributes { + compliance_host, lambda, sensitive_data, vuln_containers_os, diff --git a/src/datadogV2/model/model_aws_scan_options_create_attributes.rs b/src/datadogV2/model/model_aws_scan_options_create_attributes.rs index 09d404b41b..f630dbbd1e 100644 --- a/src/datadogV2/model/model_aws_scan_options_create_attributes.rs +++ b/src/datadogV2/model/model_aws_scan_options_create_attributes.rs @@ -11,6 +11,9 @@ use std::fmt::{self, Formatter}; #[skip_serializing_none] #[derive(Clone, Debug, PartialEq, Serialize)] pub struct AwsScanOptionsCreateAttributes { + /// Indicates whether host compliance scanning is enabled. + #[serde(rename = "compliance_host")] + pub compliance_host: bool, /// Indicates if scanning of Lambda functions is enabled. #[serde(rename = "lambda")] pub lambda: bool, @@ -32,12 +35,14 @@ pub struct AwsScanOptionsCreateAttributes { impl AwsScanOptionsCreateAttributes { pub fn new( + compliance_host: bool, lambda: bool, sensitive_data: bool, vuln_containers_os: bool, vuln_host_os: bool, ) -> AwsScanOptionsCreateAttributes { AwsScanOptionsCreateAttributes { + compliance_host, lambda, sensitive_data, vuln_containers_os, @@ -73,6 +78,7 @@ impl<'de> Deserialize<'de> for AwsScanOptionsCreateAttributes { where M: MapAccess<'a>, { + let mut compliance_host: Option = None; let mut lambda: Option = None; let mut sensitive_data: Option = None; let mut vuln_containers_os: Option = None; @@ -85,6 +91,10 @@ impl<'de> Deserialize<'de> for AwsScanOptionsCreateAttributes { while let Some((k, v)) = map.next_entry::()? { match k.as_str() { + "compliance_host" => { + compliance_host = + Some(serde_json::from_value(v).map_err(M::Error::custom)?); + } "lambda" => { lambda = Some(serde_json::from_value(v).map_err(M::Error::custom)?); } @@ -107,6 +117,8 @@ impl<'de> Deserialize<'de> for AwsScanOptionsCreateAttributes { } } } + let compliance_host = + compliance_host.ok_or_else(|| M::Error::missing_field("compliance_host"))?; let lambda = lambda.ok_or_else(|| M::Error::missing_field("lambda"))?; let sensitive_data = sensitive_data.ok_or_else(|| M::Error::missing_field("sensitive_data"))?; @@ -116,6 +128,7 @@ impl<'de> Deserialize<'de> for AwsScanOptionsCreateAttributes { vuln_host_os.ok_or_else(|| M::Error::missing_field("vuln_host_os"))?; let content = AwsScanOptionsCreateAttributes { + compliance_host, lambda, sensitive_data, vuln_containers_os, diff --git a/src/datadogV2/model/model_aws_scan_options_update_attributes.rs b/src/datadogV2/model/model_aws_scan_options_update_attributes.rs index da7ef8bf55..b41af1d76d 100644 --- a/src/datadogV2/model/model_aws_scan_options_update_attributes.rs +++ b/src/datadogV2/model/model_aws_scan_options_update_attributes.rs @@ -11,6 +11,9 @@ use std::fmt::{self, Formatter}; #[skip_serializing_none] #[derive(Clone, Debug, PartialEq, Serialize)] pub struct AwsScanOptionsUpdateAttributes { + /// Indicates whether host compliance scanning is enabled. + #[serde(rename = "compliance_host")] + pub compliance_host: Option, /// Indicates if scanning of Lambda functions is enabled. #[serde(rename = "lambda")] pub lambda: Option, @@ -33,6 +36,7 @@ pub struct AwsScanOptionsUpdateAttributes { impl AwsScanOptionsUpdateAttributes { pub fn new() -> AwsScanOptionsUpdateAttributes { AwsScanOptionsUpdateAttributes { + compliance_host: None, lambda: None, sensitive_data: None, vuln_containers_os: None, @@ -42,6 +46,11 @@ impl AwsScanOptionsUpdateAttributes { } } + pub fn compliance_host(mut self, value: bool) -> Self { + self.compliance_host = Some(value); + self + } + pub fn lambda(mut self, value: bool) -> Self { self.lambda = Some(value); self @@ -94,6 +103,7 @@ impl<'de> Deserialize<'de> for AwsScanOptionsUpdateAttributes { where M: MapAccess<'a>, { + let mut compliance_host: Option = None; let mut lambda: Option = None; let mut sensitive_data: Option = None; let mut vuln_containers_os: Option = None; @@ -106,6 +116,13 @@ impl<'de> Deserialize<'de> for AwsScanOptionsUpdateAttributes { while let Some((k, v)) = map.next_entry::()? { match k.as_str() { + "compliance_host" => { + if v.is_null() { + continue; + } + compliance_host = + Some(serde_json::from_value(v).map_err(M::Error::custom)?); + } "lambda" => { if v.is_null() { continue; @@ -142,6 +159,7 @@ impl<'de> Deserialize<'de> for AwsScanOptionsUpdateAttributes { } let content = AwsScanOptionsUpdateAttributes { + compliance_host, lambda, sensitive_data, vuln_containers_os, diff --git a/src/datadogV2/model/model_azure_scan_options_data_attributes.rs b/src/datadogV2/model/model_azure_scan_options_data_attributes.rs index f2b2f6d87d..a32bbb9c4a 100644 --- a/src/datadogV2/model/model_azure_scan_options_data_attributes.rs +++ b/src/datadogV2/model/model_azure_scan_options_data_attributes.rs @@ -11,6 +11,9 @@ use std::fmt::{self, Formatter}; #[skip_serializing_none] #[derive(Clone, Debug, PartialEq, Serialize)] pub struct AzureScanOptionsDataAttributes { + /// Indicates whether host compliance scanning is enabled. + #[serde(rename = "compliance_host")] + pub compliance_host: Option, /// Indicates if scanning for vulnerabilities in containers is enabled. #[serde(rename = "vuln_containers_os")] pub vuln_containers_os: Option, @@ -27,6 +30,7 @@ pub struct AzureScanOptionsDataAttributes { impl AzureScanOptionsDataAttributes { pub fn new() -> AzureScanOptionsDataAttributes { AzureScanOptionsDataAttributes { + compliance_host: None, vuln_containers_os: None, vuln_host_os: None, additional_properties: std::collections::BTreeMap::new(), @@ -34,6 +38,11 @@ impl AzureScanOptionsDataAttributes { } } + pub fn compliance_host(mut self, value: bool) -> Self { + self.compliance_host = Some(value); + self + } + pub fn vuln_containers_os(mut self, value: bool) -> Self { self.vuln_containers_os = Some(value); self @@ -76,6 +85,7 @@ impl<'de> Deserialize<'de> for AzureScanOptionsDataAttributes { where M: MapAccess<'a>, { + let mut compliance_host: Option = None; let mut vuln_containers_os: Option = None; let mut vuln_host_os: Option = None; let mut additional_properties: std::collections::BTreeMap< @@ -86,6 +96,13 @@ impl<'de> Deserialize<'de> for AzureScanOptionsDataAttributes { while let Some((k, v)) = map.next_entry::()? { match k.as_str() { + "compliance_host" => { + if v.is_null() { + continue; + } + compliance_host = + Some(serde_json::from_value(v).map_err(M::Error::custom)?); + } "vuln_containers_os" => { if v.is_null() { continue; @@ -109,6 +126,7 @@ impl<'de> Deserialize<'de> for AzureScanOptionsDataAttributes { } let content = AzureScanOptionsDataAttributes { + compliance_host, vuln_containers_os, vuln_host_os, additional_properties, diff --git a/src/datadogV2/model/model_azure_scan_options_input_update_data_attributes.rs b/src/datadogV2/model/model_azure_scan_options_input_update_data_attributes.rs index 9751391e40..7732abe9c2 100644 --- a/src/datadogV2/model/model_azure_scan_options_input_update_data_attributes.rs +++ b/src/datadogV2/model/model_azure_scan_options_input_update_data_attributes.rs @@ -11,6 +11,9 @@ use std::fmt::{self, Formatter}; #[skip_serializing_none] #[derive(Clone, Debug, PartialEq, Serialize)] pub struct AzureScanOptionsInputUpdateDataAttributes { + /// Indicates whether host compliance scanning is enabled. + #[serde(rename = "compliance_host")] + pub compliance_host: Option, /// Indicates if scanning for vulnerabilities in containers is enabled. #[serde(rename = "vuln_containers_os")] pub vuln_containers_os: Option, @@ -27,6 +30,7 @@ pub struct AzureScanOptionsInputUpdateDataAttributes { impl AzureScanOptionsInputUpdateDataAttributes { pub fn new() -> AzureScanOptionsInputUpdateDataAttributes { AzureScanOptionsInputUpdateDataAttributes { + compliance_host: None, vuln_containers_os: None, vuln_host_os: None, additional_properties: std::collections::BTreeMap::new(), @@ -34,6 +38,11 @@ impl AzureScanOptionsInputUpdateDataAttributes { } } + pub fn compliance_host(mut self, value: bool) -> Self { + self.compliance_host = Some(value); + self + } + pub fn vuln_containers_os(mut self, value: bool) -> Self { self.vuln_containers_os = Some(value); self @@ -76,6 +85,7 @@ impl<'de> Deserialize<'de> for AzureScanOptionsInputUpdateDataAttributes { where M: MapAccess<'a>, { + let mut compliance_host: Option = None; let mut vuln_containers_os: Option = None; let mut vuln_host_os: Option = None; let mut additional_properties: std::collections::BTreeMap< @@ -86,6 +96,13 @@ impl<'de> Deserialize<'de> for AzureScanOptionsInputUpdateDataAttributes { while let Some((k, v)) = map.next_entry::()? { match k.as_str() { + "compliance_host" => { + if v.is_null() { + continue; + } + compliance_host = + Some(serde_json::from_value(v).map_err(M::Error::custom)?); + } "vuln_containers_os" => { if v.is_null() { continue; @@ -109,6 +126,7 @@ impl<'de> Deserialize<'de> for AzureScanOptionsInputUpdateDataAttributes { } let content = AzureScanOptionsInputUpdateDataAttributes { + compliance_host, vuln_containers_os, vuln_host_os, additional_properties, diff --git a/src/datadogV2/model/model_gcp_scan_options_data_attributes.rs b/src/datadogV2/model/model_gcp_scan_options_data_attributes.rs index 59a0fc4a03..87aef969bb 100644 --- a/src/datadogV2/model/model_gcp_scan_options_data_attributes.rs +++ b/src/datadogV2/model/model_gcp_scan_options_data_attributes.rs @@ -11,6 +11,9 @@ use std::fmt::{self, Formatter}; #[skip_serializing_none] #[derive(Clone, Debug, PartialEq, Serialize)] pub struct GcpScanOptionsDataAttributes { + /// Indicates whether host compliance scanning is enabled. + #[serde(rename = "compliance_host")] + pub compliance_host: Option, /// Indicates if scanning for vulnerabilities in containers is enabled. #[serde(rename = "vuln_containers_os")] pub vuln_containers_os: Option, @@ -27,6 +30,7 @@ pub struct GcpScanOptionsDataAttributes { impl GcpScanOptionsDataAttributes { pub fn new() -> GcpScanOptionsDataAttributes { GcpScanOptionsDataAttributes { + compliance_host: None, vuln_containers_os: None, vuln_host_os: None, additional_properties: std::collections::BTreeMap::new(), @@ -34,6 +38,11 @@ impl GcpScanOptionsDataAttributes { } } + pub fn compliance_host(mut self, value: bool) -> Self { + self.compliance_host = Some(value); + self + } + pub fn vuln_containers_os(mut self, value: bool) -> Self { self.vuln_containers_os = Some(value); self @@ -76,6 +85,7 @@ impl<'de> Deserialize<'de> for GcpScanOptionsDataAttributes { where M: MapAccess<'a>, { + let mut compliance_host: Option = None; let mut vuln_containers_os: Option = None; let mut vuln_host_os: Option = None; let mut additional_properties: std::collections::BTreeMap< @@ -86,6 +96,13 @@ impl<'de> Deserialize<'de> for GcpScanOptionsDataAttributes { while let Some((k, v)) = map.next_entry::()? { match k.as_str() { + "compliance_host" => { + if v.is_null() { + continue; + } + compliance_host = + Some(serde_json::from_value(v).map_err(M::Error::custom)?); + } "vuln_containers_os" => { if v.is_null() { continue; @@ -109,6 +126,7 @@ impl<'de> Deserialize<'de> for GcpScanOptionsDataAttributes { } let content = GcpScanOptionsDataAttributes { + compliance_host, vuln_containers_os, vuln_host_os, additional_properties, diff --git a/src/datadogV2/model/model_gcp_scan_options_input_update_data_attributes.rs b/src/datadogV2/model/model_gcp_scan_options_input_update_data_attributes.rs index 6e6711c35b..7a6dd38958 100644 --- a/src/datadogV2/model/model_gcp_scan_options_input_update_data_attributes.rs +++ b/src/datadogV2/model/model_gcp_scan_options_input_update_data_attributes.rs @@ -11,6 +11,9 @@ use std::fmt::{self, Formatter}; #[skip_serializing_none] #[derive(Clone, Debug, PartialEq, Serialize)] pub struct GcpScanOptionsInputUpdateDataAttributes { + /// Indicates whether host compliance scanning is enabled. + #[serde(rename = "compliance_host")] + pub compliance_host: Option, /// Indicates if scanning for vulnerabilities in containers is enabled. #[serde(rename = "vuln_containers_os")] pub vuln_containers_os: Option, @@ -27,6 +30,7 @@ pub struct GcpScanOptionsInputUpdateDataAttributes { impl GcpScanOptionsInputUpdateDataAttributes { pub fn new() -> GcpScanOptionsInputUpdateDataAttributes { GcpScanOptionsInputUpdateDataAttributes { + compliance_host: None, vuln_containers_os: None, vuln_host_os: None, additional_properties: std::collections::BTreeMap::new(), @@ -34,6 +38,11 @@ impl GcpScanOptionsInputUpdateDataAttributes { } } + pub fn compliance_host(mut self, value: bool) -> Self { + self.compliance_host = Some(value); + self + } + pub fn vuln_containers_os(mut self, value: bool) -> Self { self.vuln_containers_os = Some(value); self @@ -76,6 +85,7 @@ impl<'de> Deserialize<'de> for GcpScanOptionsInputUpdateDataAttributes { where M: MapAccess<'a>, { + let mut compliance_host: Option = None; let mut vuln_containers_os: Option = None; let mut vuln_host_os: Option = None; let mut additional_properties: std::collections::BTreeMap< @@ -86,6 +96,13 @@ impl<'de> Deserialize<'de> for GcpScanOptionsInputUpdateDataAttributes { while let Some((k, v)) = map.next_entry::()? { match k.as_str() { + "compliance_host" => { + if v.is_null() { + continue; + } + compliance_host = + Some(serde_json::from_value(v).map_err(M::Error::custom)?); + } "vuln_containers_os" => { if v.is_null() { continue; @@ -109,6 +126,7 @@ impl<'de> Deserialize<'de> for GcpScanOptionsInputUpdateDataAttributes { } let content = GcpScanOptionsInputUpdateDataAttributes { + compliance_host, vuln_containers_os, vuln_host_os, additional_properties, diff --git a/tests/scenarios/cassettes/v2/agentless_scanning/Create-AWS-scan-options-returns-Bad-Request-response.frozen b/tests/scenarios/cassettes/v2/agentless_scanning/Create-AWS-scan-options-returns-Bad-Request-response.frozen index 95529acf62..93069672a0 100644 --- a/tests/scenarios/cassettes/v2/agentless_scanning/Create-AWS-scan-options-returns-Bad-Request-response.frozen +++ b/tests/scenarios/cassettes/v2/agentless_scanning/Create-AWS-scan-options-returns-Bad-Request-response.frozen @@ -1 +1 @@ -2025-10-23T22:21:54.335Z \ No newline at end of file +2026-04-28T07:51:17.007Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/agentless_scanning/Create-AWS-scan-options-returns-Bad-Request-response.json b/tests/scenarios/cassettes/v2/agentless_scanning/Create-AWS-scan-options-returns-Bad-Request-response.json index 5c58c3a53e..8e8e58f279 100644 --- a/tests/scenarios/cassettes/v2/agentless_scanning/Create-AWS-scan-options-returns-Bad-Request-response.json +++ b/tests/scenarios/cassettes/v2/agentless_scanning/Create-AWS-scan-options-returns-Bad-Request-response.json @@ -3,7 +3,7 @@ { "request": { "body": { - "string": "{\"data\":{\"attributes\":{\"lambda\":true,\"sensitive_data\":false,\"vuln_containers_os\":true,\"vuln_host_os\":true},\"id\":\"123\",\"type\":\"aws_scan_options\"}}", + "string": "{\"data\":{\"attributes\":{\"compliance_host\":true,\"lambda\":true,\"sensitive_data\":false,\"vuln_containers_os\":true,\"vuln_host_os\":true},\"id\":\"123\",\"type\":\"aws_scan_options\"}}", "encoding": null }, "headers": { @@ -32,7 +32,7 @@ "message": "Bad Request" } }, - "recorded_at": "Thu, 23 Oct 2025 22:21:54 GMT" + "recorded_at": "Tue, 28 Apr 2026 07:51:17 GMT" } ], "recorded_with": "VCR 6.0.0" diff --git a/tests/scenarios/cassettes/v2/agentless_scanning/Create-AWS-scan-options-returns-Conflict-response.frozen b/tests/scenarios/cassettes/v2/agentless_scanning/Create-AWS-scan-options-returns-Conflict-response.frozen index f60e6f4b6c..3fa4086603 100644 --- a/tests/scenarios/cassettes/v2/agentless_scanning/Create-AWS-scan-options-returns-Conflict-response.frozen +++ b/tests/scenarios/cassettes/v2/agentless_scanning/Create-AWS-scan-options-returns-Conflict-response.frozen @@ -1 +1 @@ -2025-10-23T22:21:54.694Z \ No newline at end of file +2026-04-28T07:51:17.457Z \ No newline at end of file diff --git a/tests/scenarios/cassettes/v2/agentless_scanning/Create-AWS-scan-options-returns-Conflict-response.json b/tests/scenarios/cassettes/v2/agentless_scanning/Create-AWS-scan-options-returns-Conflict-response.json index 49524ca6a5..bae6bf7eef 100644 --- a/tests/scenarios/cassettes/v2/agentless_scanning/Create-AWS-scan-options-returns-Conflict-response.json +++ b/tests/scenarios/cassettes/v2/agentless_scanning/Create-AWS-scan-options-returns-Conflict-response.json @@ -3,7 +3,7 @@ { "request": { "body": { - "string": "{\"data\":{\"attributes\":{\"lambda\":false,\"sensitive_data\":false,\"vuln_containers_os\":true,\"vuln_host_os\":true},\"id\":\"000000000002\",\"type\":\"aws_scan_options\"}}", + "string": "{\"data\":{\"attributes\":{\"compliance_host\":true,\"lambda\":false,\"sensitive_data\":false,\"vuln_containers_os\":true,\"vuln_host_os\":true},\"id\":\"000000000002\",\"type\":\"aws_scan_options\"}}", "encoding": null }, "headers": { @@ -32,7 +32,7 @@ "message": "Conflict" } }, - "recorded_at": "Thu, 23 Oct 2025 22:21:54 GMT" + "recorded_at": "Tue, 28 Apr 2026 07:51:17 GMT" } ], "recorded_with": "VCR 6.0.0" diff --git a/tests/scenarios/features/v2/agentless_scanning.feature b/tests/scenarios/features/v2/agentless_scanning.feature index 919d43c75b..bbbf5b71f9 100644 --- a/tests/scenarios/features/v2/agentless_scanning.feature +++ b/tests/scenarios/features/v2/agentless_scanning.feature @@ -31,21 +31,21 @@ Feature: Agentless Scanning @skip @team:DataDog/k9-agentless Scenario: Create AWS scan options returns "Agentless scan options enabled successfully." response Given new "CreateAwsScanOptions" request - And body with value {"data": {"id": "000000000003", "type": "aws_scan_options", "attributes": {"lambda": true, "sensitive_data": false, "vuln_containers_os": true, "vuln_host_os": true}}} + And body with value {"data": {"id": "000000000003", "type": "aws_scan_options", "attributes": {"compliance_host": true, "lambda": true, "sensitive_data": false, "vuln_containers_os": true, "vuln_host_os": true}}} When the request is sent Then the response status is 201 Created @team:DataDog/k9-agentless Scenario: Create AWS scan options returns "Bad Request" response Given new "CreateAwsScanOptions" request - And body with value {"data": {"id": "123", "type": "aws_scan_options", "attributes": {"lambda": true, "sensitive_data": false, "vuln_containers_os": true, "vuln_host_os": true}}} + And body with value {"data": {"id": "123", "type": "aws_scan_options", "attributes": {"compliance_host": true, "lambda": true, "sensitive_data": false, "vuln_containers_os": true, "vuln_host_os": true}}} When the request is sent Then the response status is 400 Bad Request @team:DataDog/k9-agentless Scenario: Create AWS scan options returns "Conflict" response Given new "CreateAwsScanOptions" request - And body with value {"data":{"type":"aws_scan_options","id":"000000000002","attributes":{"vuln_host_os":true,"vuln_containers_os":true,"sensitive_data":false,"lambda":false}}} + And body with value {"data":{"type":"aws_scan_options","id":"000000000002","attributes":{"compliance_host":true,"vuln_host_os":true,"vuln_containers_os":true,"sensitive_data":false,"lambda":false}}} When the request is sent Then the response status is 409 Conflict