Skip to content

Commit 73cf26a

Browse files
api-clients-generation-pipeline[bot]ci.datadog-api-spec
andauthored
Support Host and IaC finding types in security notifications (#3265)
Co-authored-by: ci.datadog-api-spec <packages@datadoghq.com>
1 parent 889a255 commit 73cf26a

File tree

3 files changed

+12
-4
lines changed

3 files changed

+12
-4
lines changed

.generated-info

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
11
{
2-
"spec_repo_commit": "f391bf6",
3-
"generated": "2025-08-06 15:15:49.158"
2+
"spec_repo_commit": "a6f5281",
3+
"generated": "2025-08-06 17:44:48.123"
44
}

.generator/schemas/v2/openapi.yaml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33749,7 +33749,7 @@ components:
3374933749
rule types application_code_vulnerability,
3375033750

3375133751
application_library_vulnerability, attack_path, container_image_vulnerability,
33752-
identity_risk, misconfiguration, and api_security.'
33752+
identity_risk, misconfiguration, api_security, host_vulnerability and iac_misconfiguration.'
3375333753
enum:
3375433754
- application_security
3375533755
- log_detection
@@ -33764,6 +33764,8 @@ components:
3376433764
- identity_risk
3376533765
- misconfiguration
3376633766
- api_security
33767+
- host_vulnerability
33768+
- iac_misconfiguration
3376733769
type: string
3376833770
x-enum-varnames:
3376933771
- APPLICATION_SECURITY
@@ -33779,6 +33781,8 @@ components:
3377933781
- IDENTITY_RISK
3378033782
- MISCONFIGURATION
3378133783
- API_SECURITY
33784+
- HOST_VULNERABILITY
33785+
- IAC_MISCONFIGURATION
3378233786
RuleUser:
3378333787
description: User creating or modifying a rule.
3378433788
properties:

api/datadogV2/model_rule_types_items.go

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ import (
1414
// Signal-based notification rules can filter signals based on rule types application_security, log_detection,
1515
// workload_security, signal_correlation, cloud_configuration and infrastructure_configuration.
1616
// Vulnerability-based notification rules can filter vulnerabilities based on rule types application_code_vulnerability,
17-
// application_library_vulnerability, attack_path, container_image_vulnerability, identity_risk, misconfiguration, and api_security.
17+
// application_library_vulnerability, attack_path, container_image_vulnerability, identity_risk, misconfiguration, api_security, host_vulnerability and iac_misconfiguration.
1818
type RuleTypesItems string
1919

2020
// List of RuleTypesItems.
@@ -32,6 +32,8 @@ const (
3232
RULETYPESITEMS_IDENTITY_RISK RuleTypesItems = "identity_risk"
3333
RULETYPESITEMS_MISCONFIGURATION RuleTypesItems = "misconfiguration"
3434
RULETYPESITEMS_API_SECURITY RuleTypesItems = "api_security"
35+
RULETYPESITEMS_HOST_VULNERABILITY RuleTypesItems = "host_vulnerability"
36+
RULETYPESITEMS_IAC_MISCONFIGURATION RuleTypesItems = "iac_misconfiguration"
3537
)
3638

3739
var allowedRuleTypesItemsEnumValues = []RuleTypesItems{
@@ -48,6 +50,8 @@ var allowedRuleTypesItemsEnumValues = []RuleTypesItems{
4850
RULETYPESITEMS_IDENTITY_RISK,
4951
RULETYPESITEMS_MISCONFIGURATION,
5052
RULETYPESITEMS_API_SECURITY,
53+
RULETYPESITEMS_HOST_VULNERABILITY,
54+
RULETYPESITEMS_IAC_MISCONFIGURATION,
5155
}
5256

5357
// GetAllowedValues reeturns the list of possible values.

0 commit comments

Comments
 (0)