Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
460 changes: 460 additions & 0 deletions .generator/schemas/v2/openapi.yaml

Large diffs are not rendered by default.

19 changes: 19 additions & 0 deletions examples/v2_security-monitoring_CreateSecurityFinding.rs
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
// Create security finding returns "OK" response
use datadog_api_client::datadog;
use datadog_api_client::datadogV2::api_security_monitoring::SecurityMonitoringAPI;
use datadog_api_client::datadogV2::model::SecurityFindingType;

#[tokio::main]
async fn main() {
let mut configuration = datadog::Configuration::new();
configuration.set_unstable_operation_enabled("v2.CreateSecurityFinding", true);
let api = SecurityMonitoringAPI::with_config(configuration);
let resp = api
.create_security_finding("vendor".to_string(), SecurityFindingType::VULNERABILITY)
.await;
if let Ok(value) = resp {
println!("{:#?}", value);
} else {
println!("{:#?}", resp.unwrap_err());
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,67 @@
// Import vulnerabilities returns "OK" response
use datadog_api_client::datadog;
use datadog_api_client::datadogV2::api_security_monitoring::SecurityMonitoringAPI;
use datadog_api_client::datadogV2::model::CycloneDXAdvisory;
use datadog_api_client::datadogV2::model::CycloneDXAffect;
use datadog_api_client::datadogV2::model::CycloneDXAssetComponent;
use datadog_api_client::datadogV2::model::CycloneDXBOM;
use datadog_api_client::datadogV2::model::CycloneDXComponent;
use datadog_api_client::datadogV2::model::CycloneDXComponentType;
use datadog_api_client::datadogV2::model::CycloneDXMetadata;
use datadog_api_client::datadogV2::model::CycloneDXRating;
use datadog_api_client::datadogV2::model::CycloneDXReference;
use datadog_api_client::datadogV2::model::CycloneDXReferenceSource;
use datadog_api_client::datadogV2::model::CycloneDXToolComponent;
use datadog_api_client::datadogV2::model::CycloneDXTools;
use datadog_api_client::datadogV2::model::CycloneDXVulnerability;

#[tokio::main]
async fn main() {
let body =
CycloneDXBOM::new(
"CycloneDX".to_string(),
vec![CycloneDXComponent::new(
"a3390fca-c315-41ae-ae05-af5e7859cdee".to_string(),
"lodash".to_string(),
CycloneDXComponentType::LIBRARY,
"4.17.21".to_string(),
)
.purl("pkg:npm/lodash@4.17.21".to_string())],
CycloneDXMetadata::new(
CycloneDXAssetComponent::new("i-12345".to_string())
.bom_ref("asset-ref-123".to_string())
.type_("operating-system".to_string()),
CycloneDXTools::new(vec![CycloneDXToolComponent::new("my-scanner".to_string())
.type_("application".to_string())]),
),
"1.5".to_string(),
1,
vec![CycloneDXVulnerability::new(
vec![CycloneDXAffect::new(
"a3390fca-c315-41ae-ae05-af5e7859cdee".to_string(),
)],
"CVE-2021-1234".to_string(),
vec![CycloneDXRating::new()
.score(9.0 as f64)
.severity("high".to_string())
.vector("CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N".to_string())],
)
.advisories(vec![CycloneDXAdvisory::new()
.url("https://example.com/advisory/CVE-2021-1234".to_string())])
.cwes(vec![123, 345])
.description("Sample vulnerability detected in the application.".to_string())
.detail("Details about the vulnerability".to_string())
.references(vec![CycloneDXReference::new()
.id("GHSA-35m5-8cvj-8783".to_string())
.source(CycloneDXReferenceSource::new().url("https://example.com".to_string()))])],
);
let mut configuration = datadog::Configuration::new();
configuration.set_unstable_operation_enabled("v2.ImportSecurityVulnerabilities", true);
let api = SecurityMonitoringAPI::with_config(configuration);
let resp = api.import_security_vulnerabilities(body).await;
if let Ok(value) = resp {
println!("{:#?}", value);
} else {
println!("{:#?}", resp.unwrap_err());
}
}
24 changes: 24 additions & 0 deletions examples/v2_security-monitoring_ImportThreatIntel.rs
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
// Import threat intelligence feed returns "OK" response
use datadog_api_client::datadog;
use datadog_api_client::datadogV2::api_security_monitoring::ImportThreatIntelOptionalParams;
use datadog_api_client::datadogV2::api_security_monitoring::SecurityMonitoringAPI;
use datadog_api_client::datadogV2::model::ThreatIntelIndicatorType;

#[tokio::main]
async fn main() {
let mut configuration = datadog::Configuration::new();
configuration.set_unstable_operation_enabled("v2.ImportThreatIntel", true);
let api = SecurityMonitoringAPI::with_config(configuration);
let resp = api
.import_threat_intel(
"ti_vendor".to_string(),
ThreatIntelIndicatorType::IP_ADDRESS,
ImportThreatIntelOptionalParams::default(),
)
.await;
if let Ok(value) = resp {
println!("{:#?}", value);
} else {
println!("{:#?}", resp.unwrap_err());
}
}
3 changes: 3 additions & 0 deletions src/datadog/configuration.rs
Original file line number Diff line number Diff line change
Expand Up @@ -151,6 +151,7 @@ impl Default for Configuration {
("v2.activate_content_pack".to_owned(), false),
("v2.cancel_threat_hunting_job".to_owned(), false),
("v2.convert_job_result_to_signal".to_owned(), false),
("v2.create_security_finding".to_owned(), false),
("v2.deactivate_content_pack".to_owned(), false),
("v2.delete_threat_hunting_job".to_owned(), false),
("v2.get_content_packs_states".to_owned(), false),
Expand All @@ -163,6 +164,8 @@ impl Default for Configuration {
false,
),
("v2.get_threat_hunting_job".to_owned(), false),
("v2.import_security_vulnerabilities".to_owned(), false),
("v2.import_threat_intel".to_owned(), false),
("v2.list_findings".to_owned(), false),
("v2.list_multiple_rulesets".to_owned(), false),
("v2.list_scanned_assets_metadata".to_owned(), false),
Expand Down
Loading
Loading