diff --git a/.generator/schemas/v2/openapi.yaml b/.generator/schemas/v2/openapi.yaml index 2994c0bb30b6..3f5be354d3e7 100644 --- a/.generator/schemas/v2/openapi.yaml +++ b/.generator/schemas/v2/openapi.yaml @@ -1140,9 +1140,9 @@ components: schema: type: string PersonalAccessTokenID: - description: The UUID of the personal access token. + description: The ID of the personal access token. in: path - name: pat_uuid + name: pat_id required: true schema: example: "00000000-0000-1234-0000-000000000000" @@ -29180,11 +29180,6 @@ components: FullPersonalAccessTokenAttributes: description: Attributes of a full personal access token, including the token key. properties: - alias: - description: The alias (short identifier) of the personal access token. - example: "2H9MCNMBM8FQjQ16YucXkX" - readOnly: true - type: string created_at: description: Creation date of the personal access token. example: "2024-01-01T00:00:00+00:00" @@ -53415,11 +53410,6 @@ components: PersonalAccessTokenAttributes: description: Attributes of a personal access token. properties: - alias: - description: The alias (short identifier) of the personal access token. - example: "2H9MCNMBM8FQjQ16YucXkX" - readOnly: true - type: string created_at: description: Creation date of the personal access token. example: "2024-01-01T00:00:00+00:00" @@ -62654,19 +62644,23 @@ components: - DONE - TIMEOUT SecurityMonitoringContentPackActivation: - description: The activation status of a content pack + description: The activation status of a content pack. enum: - never_activated - activated - deactivated example: activated type: string + x-enum-descriptions: + - Pack has never been activated for this organization. + - Pack is currently activated. + - Pack was previously activated but has since been deactivated. x-enum-varnames: - NEVER_ACTIVATED - ACTIVATED - DEACTIVATED SecurityMonitoringContentPackIntegrationStatus: - description: The installation status of the related integration + description: The installation status of the related integration. enum: - installed - available @@ -62675,6 +62669,12 @@ components: - error example: installed type: string + x-enum-descriptions: + - Integration is fully installed. + - Integration exists in the catalog but is not installed. + - Integration is only partially configured. + - Integration detected (for example, logs are flowing) but not explicitly installed. + - Integration is in an error state. x-enum-varnames: - INSTALLED - AVAILABLE @@ -62691,7 +62691,9 @@ components: cp_activation: $ref: "#/components/schemas/SecurityMonitoringContentPackActivation" filters_configured_for_logs: - description: Whether filters (Security Filters or Index Query depending on the pricing model) are configured for logs + description: |- + Whether filters (Security Filters or Index Query depending on the pricing model) are + present and correctly configured to route logs into Cloud SIEM. example: true type: boolean integration_installed_status: @@ -62699,7 +62701,7 @@ components: logs_last_collected: $ref: "#/components/schemas/SecurityMonitoringContentPackTimestampBucket" logs_seen_from_any_index: - description: Whether logs have been seen from any index + description: Whether logs for this content pack have been seen in any Datadog index within the last 72 hours. example: true type: boolean state: @@ -62764,7 +62766,7 @@ components: - meta type: object SecurityMonitoringContentPackStatus: - description: The current status of a content pack + description: The current operational status of a content pack. enum: - install - activate @@ -62774,6 +62776,13 @@ components: - broken example: active type: string + x-enum-descriptions: + - Not activated; no logs detected in the last 72 hours. + - Not activated; logs are flowing into a Datadog index but not yet routed through Cloud SIEM. + - Activated; awaiting first log ingestion. + - Activated; logs received within the last 24 hours. + - Activated; integration not installed or logs last seen 24 to 72 hours ago. + - Activated; no logs for over 72 hours, filter missing, or Cloud SIEM index incorrectly ordered. x-enum-varnames: - INSTALL - ACTIVATE @@ -62782,7 +62791,7 @@ components: - WARNING - BROKEN SecurityMonitoringContentPackTimestampBucket: - description: Timestamp bucket indicating when logs were last collected + description: Timestamp bucket indicating when logs were last collected. enum: - not_seen - within_24_hours @@ -62791,6 +62800,12 @@ components: - over_30d example: within_24_hours type: string + x-enum-descriptions: + - No logs observed. + - Logs received within the last 24 hours. + - Logs last seen 24 to 72 hours ago. + - Logs last seen 3 to 30 days ago. + - Logs last seen more than 30 days ago. x-enum-varnames: - NOT_SEEN - WITHIN_24_HOURS @@ -63881,7 +63896,7 @@ components: - $ref: "#/components/schemas/SecurityMonitoringSignalRulePayload" - $ref: "#/components/schemas/CloudConfigurationRulePayload" SecurityMonitoringSKU: - description: The SIEM pricing model (SKU) for the organization + description: The Cloud SIEM pricing model (SKU) for the organization. enum: - per_gb_analyzed - per_event_in_siem_index_2023 @@ -77940,6 +77955,10 @@ components: description: Title of the user. nullable: true type: string + uuid: + description: UUID of the user. + readOnly: true + type: string verified: description: Whether the user is verified. type: boolean @@ -109575,7 +109594,7 @@ paths: operator: OR permissions: - user_app_keys - /api/v2/personal_access_tokens/{pat_uuid}: + /api/v2/personal_access_tokens/{pat_id}: delete: description: Revoke a specific personal access token. operationId: RevokePersonalAccessToken @@ -118804,9 +118823,8 @@ paths: /api/v2/security_monitoring/content_packs/states: get: description: |- - Get the activation and configuration states for all security monitoring content packs. - This endpoint returns status information about each content pack including activation state, - integration status, and log collection status. + Get the activation state, integration status, and log collection status + for all Cloud SIEM content packs. operationId: GetContentPacksStates responses: "200": @@ -118829,21 +118847,31 @@ paths: description: Not Found "429": $ref: "#/components/responses/TooManyRequestsResponse" + security: + - apiKeyAuth: [] + appKeyAuth: [] + - AuthZ: + - security_monitoring_filters_read summary: Get content pack states tags: - Security Monitoring + "x-permission": + operator: OR + permissions: + - security_monitoring_filters_read + - logs_read_index_data x-unstable: |- **Note**: This endpoint is in preview and is subject to change. If you have any feedback, contact [Datadog support](https://docs.datadoghq.com/help/). /api/v2/security_monitoring/content_packs/{content_pack_id}/activate: put: description: |- - Activate a security monitoring content pack. This operation configures the necessary + Activate a Cloud SIEM content pack. This operation configures the necessary log filters or security filters depending on the pricing model and updates the content pack activation state. operationId: ActivateContentPack parameters: - - description: The ID of the content pack to activate. + - description: The ID of the content pack to activate (for example, `aws-cloudtrail`). in: path name: content_pack_id required: true @@ -118867,20 +118895,30 @@ paths: description: Not Found "429": $ref: "#/components/responses/TooManyRequestsResponse" + security: + - apiKeyAuth: [] + appKeyAuth: [] + - AuthZ: + - security_monitoring_filters_write summary: Activate content pack tags: - Security Monitoring + "x-permission": + operator: OR + permissions: + - security_monitoring_filters_write + - logs_modify_indexes x-unstable: |- **Note**: This endpoint is in preview and is subject to change. If you have any feedback, contact [Datadog support](https://docs.datadoghq.com/help/). /api/v2/security_monitoring/content_packs/{content_pack_id}/deactivate: put: description: |- - Deactivate a security monitoring content pack. This operation removes the content pack's + Deactivate a Cloud SIEM content pack. This operation removes the content pack's configuration from log filters or security filters and updates the content pack activation state. operationId: DeactivateContentPack parameters: - - description: The ID of the content pack to deactivate. + - description: The ID of the content pack to deactivate (for example, `aws-cloudtrail`). in: path name: content_pack_id required: true @@ -118904,9 +118942,19 @@ paths: description: Not Found "429": $ref: "#/components/responses/TooManyRequestsResponse" + security: + - apiKeyAuth: [] + appKeyAuth: [] + - AuthZ: + - security_monitoring_filters_write summary: Deactivate content pack tags: - Security Monitoring + "x-permission": + operator: OR + permissions: + - security_monitoring_filters_write + - logs_modify_indexes x-unstable: |- **Note**: This endpoint is in preview and is subject to change. If you have any feedback, contact [Datadog support](https://docs.datadoghq.com/help/). @@ -121125,7 +121173,7 @@ paths: operator: OR permissions: - service_account_write - /api/v2/service_accounts/{service_account_id}/access_tokens/{pat_uuid}: + /api/v2/service_accounts/{service_account_id}/access_tokens/{pat_id}: delete: description: Revoke a specific access token for a service account. operationId: RevokeServiceAccountAccessToken diff --git a/cassettes/v2/Service-Accounts_4018121712/Create-an-access-token-for-a-service-account-returns-Created-response_1042964283/frozen.json b/cassettes/v2/Service-Accounts_4018121712/Create-an-access-token-for-a-service-account-returns-Created-response_1042964283/frozen.json index f45262c1ba1f..b23defb961bc 100644 --- a/cassettes/v2/Service-Accounts_4018121712/Create-an-access-token-for-a-service-account-returns-Created-response_1042964283/frozen.json +++ b/cassettes/v2/Service-Accounts_4018121712/Create-an-access-token-for-a-service-account-returns-Created-response_1042964283/frozen.json @@ -1 +1 @@ -"2026-04-03T21:02:56.793Z" +"2026-04-16T20:03:06.304Z" diff --git a/cassettes/v2/Service-Accounts_4018121712/Create-an-access-token-for-a-service-account-returns-Created-response_1042964283/recording.har b/cassettes/v2/Service-Accounts_4018121712/Create-an-access-token-for-a-service-account-returns-Created-response_1042964283/recording.har index 08ce56d903ce..c3a6669120b9 100644 --- a/cassettes/v2/Service-Accounts_4018121712/Create-an-access-token-for-a-service-account-returns-Created-response_1042964283/recording.har +++ b/cassettes/v2/Service-Accounts_4018121712/Create-an-access-token-for-a-service-account-returns-Created-response_1042964283/recording.har @@ -1,6 +1,5 @@ { "log": { - "_recordingName": "Service Accounts/Create an access token for a service account returns \"Created\" response", "creator": { "comment": "persister:fs", "name": "Polly.JS", @@ -8,7 +7,7 @@ }, "entries": [ { - "_id": "567c34c3ae3c8785a73a27fcc9a742ba", + "_id": "f47bb188a2e6ba96a9a6a881be2e659e", "_order": 0, "cache": {}, "request": { @@ -32,7 +31,7 @@ "postData": { "mimeType": "application/json", "params": [], - "text": "{\"data\":{\"attributes\":{\"email\":\"Test-Create_an_access_token_for_a_service_account_returns_Created_response-1775250176@datadoghq.com\",\"service_account\":true,\"title\":\"user title\"},\"type\":\"users\"}}" + "text": "{\"data\":{\"attributes\":{\"email\":\"Test-Create_an_access_token_for_a_service_account_returns_Created_response-1776369786@datadoghq.com\",\"service_account\":true,\"title\":\"user title\"},\"type\":\"users\"}}" }, "queryString": [], "url": "https://api.datadoghq.com/api/v2/service_accounts" @@ -42,7 +41,7 @@ "content": { "mimeType": "application/json", "size": 746, - "text": "{\"data\":{\"type\":\"users\",\"id\":\"7d5e5ea9-2fa0-11f1-991f-62f4bfc595d0\",\"attributes\":{\"name\":null,\"handle\":\"7d5e5ea9-2fa0-11f1-991f-62f4bfc595d0\",\"created_at\":\"2026-04-03T21:02:56.980609+00:00\",\"modified_at\":\"2026-04-03T21:02:56.980609+00:00\",\"email\":\"test-create_an_access_token_for_a_service_account_returns_created_response-1775250176@datadoghq.com\",\"icon\":\"https://secure.gravatar.com/avatar/1a703b50769c96d7b84a5470f474ef74?s=48&d=retro\",\"title\":\"user title\",\"verified\":true,\"service_account\":true,\"disabled\":false,\"allowed_login_methods\":[],\"status\":\"Active\",\"last_login_time\":null},\"relationships\":{\"roles\":{\"data\":[]},\"org\":{\"data\":{\"type\":\"orgs\",\"id\":\"4dee724d-00cc-11ea-a77b-570c9d03c6c5\"}}}}}\n" + "text": "{\"data\":{\"type\":\"users\",\"id\":\"498cce13-39cf-11f1-9928-be1871753dee\",\"attributes\":{\"uuid\":\"498cce13-39cf-11f1-9928-be1871753dee\",\"name\":null,\"handle\":\"498cce13-39cf-11f1-9928-be1871753dee\",\"created_at\":\"2026-04-16T20:03:08.017467+00:00\",\"modified_at\":\"2026-04-16T20:03:08.017467+00:00\",\"email\":\"test-create_an_access_token_for_a_service_account_returns_created_response-1776369786@datadoghq.com\",\"icon\":\"https://secure.gravatar.com/avatar/ed167ebfacd06c99ea70d4c121f5a7f1?s=48&d=retro\",\"title\":\"user title\",\"verified\":true,\"service_account\":true,\"disabled\":false,\"allowed_login_methods\":[],\"status\":\"Active\",\"last_login_time\":null},\"relationships\":{\"roles\":{\"data\":[]},\"org\":{\"data\":{\"type\":\"orgs\",\"id\":\"4dee724d-00cc-11ea-a77b-570c9d03c6c5\"}}}}}\n" }, "cookies": [], "headers": [ @@ -51,17 +50,17 @@ "value": "application/json" } ], - "headersSize": 688, + "headersSize": 689, "httpVersion": "HTTP/1.1", "redirectURL": "", "status": 201, "statusText": "Created" }, - "startedDateTime": "2026-04-03T21:02:56.794Z", - "time": 259 + "startedDateTime": "2026-04-16T20:03:07.804Z", + "time": 348 }, { - "_id": "c6adfa6b102761d3a8c2030c2ba28080", + "_id": "6d806020455611833ebca80b6034dce9", "_order": 0, "cache": {}, "request": { @@ -85,17 +84,17 @@ "postData": { "mimeType": "application/json", "params": [], - "text": "{\"data\":{\"attributes\":{\"name\":\"Test-Create_an_access_token_for_a_service_account_returns_Created_response-1775250176\",\"scopes\":[\"dashboards_read\"]},\"type\":\"personal_access_tokens\"}}" + "text": "{\"data\":{\"attributes\":{\"name\":\"Test-Create_an_access_token_for_a_service_account_returns_Created_response-1776369786\",\"scopes\":[\"dashboards_read\"]},\"type\":\"personal_access_tokens\"}}" }, "queryString": [], - "url": "https://api.datadoghq.com/api/v2/service_accounts/7d5e5ea9-2fa0-11f1-991f-62f4bfc595d0/access_tokens" + "url": "https://api.datadoghq.com/api/v2/service_accounts/498cce13-39cf-11f1-9928-be1871753dee/access_tokens" }, "response": { - "bodySize": 537, + "bodySize": 510, "content": { "mimeType": "application/vnd.api+json", - "size": 537, - "text": "{\"data\":{\"id\":\"6f2491f5-8c3f-45a3-962a-5f769b95e806\",\"type\":\"personal_access_tokens\",\"attributes\":{\"alias\":\"3NirNJ5Y2qB4Fmac8B4wnm\",\"created_at\":\"2026-04-03T21:02:57.288351972Z\",\"expires_at\":null,\"key\":\"xxxxx_xxxxxxxxxxxxxxxxxxxxxx_xxxxxxxxxxxxXxxxxxxxxxxxxxxxxxxxxxxx\",\"name\":\"Test-Create_an_access_token_for_a_service_account_returns_Created_response-1775250176\",\"public_portion\":\"3NirNJ5Y2qB4Fmac8B4wnm\",\"scopes\":[\"dashboards_read\"]},\"relationships\":{\"owned_by\":{\"data\":{\"id\":\"7d5e5ea9-2fa0-11f1-991f-62f4bfc595d0\",\"type\":\"users\"}}}}}" + "size": 510, + "text": "{\"data\":{\"id\":\"88337232-8552-4495-987c-1cfed567d461\",\"type\":\"personal_access_tokens\",\"attributes\":{\"created_at\":\"2026-04-16T20:03:08.381725456Z\",\"expires_at\":null,\"key\":\"xxxxx_xxxxxxxxxxxxxxxxxxxxxx_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\",\"name\":\"Test-Create_an_access_token_for_a_service_account_returns_Created_response-1776369786\",\"public_portion\":\"ddpat_490SyfYQqhqnr008BTjQWn\",\"scopes\":[\"dashboards_read\"]},\"relationships\":{\"owned_by\":{\"data\":{\"id\":\"498cce13-39cf-11f1-9928-be1871753dee\",\"type\":\"users\"}}}}}" }, "cookies": [], "headers": [ @@ -110,11 +109,11 @@ "status": 201, "statusText": "Created" }, - "startedDateTime": "2026-04-03T21:02:57.059Z", - "time": 207 + "startedDateTime": "2026-04-16T20:03:08.161Z", + "time": 253 }, { - "_id": "09473a0acca978f1677a1a4f8ac133da", + "_id": "9f6795a33733f1de83fa480c56c66320", "_order": 0, "cache": {}, "request": { @@ -131,7 +130,7 @@ "httpVersion": "HTTP/1.1", "method": "DELETE", "queryString": [], - "url": "https://api.datadoghq.com/api/v2/service_accounts/7d5e5ea9-2fa0-11f1-991f-62f4bfc595d0/access_tokens/6f2491f5-8c3f-45a3-962a-5f769b95e806" + "url": "https://api.datadoghq.com/api/v2/service_accounts/498cce13-39cf-11f1-9928-be1871753dee/access_tokens/88337232-8552-4495-987c-1cfed567d461" }, "response": { "bodySize": 0, @@ -147,11 +146,11 @@ "status": 204, "statusText": "No Content" }, - "startedDateTime": "2026-04-03T21:02:57.272Z", - "time": 161 + "startedDateTime": "2026-04-16T20:03:08.421Z", + "time": 247 }, { - "_id": "393e616cbf0575841cd30dad62ab2cff", + "_id": "8fda343ec9208ee6219af8b36492a756", "_order": 0, "cache": {}, "request": { @@ -168,7 +167,7 @@ "httpVersion": "HTTP/1.1", "method": "DELETE", "queryString": [], - "url": "https://api.datadoghq.com/api/v2/users/7d5e5ea9-2fa0-11f1-991f-62f4bfc595d0" + "url": "https://api.datadoghq.com/api/v2/users/498cce13-39cf-11f1-9928-be1871753dee" }, "response": { "bodySize": 0, @@ -184,11 +183,12 @@ "status": 204, "statusText": "No Content" }, - "startedDateTime": "2026-04-03T21:02:57.437Z", - "time": 828 + "startedDateTime": "2026-04-16T20:03:08.671Z", + "time": 435 } ], "pages": [], - "version": "1.2" + "version": "1.2", + "_recordingName": "Service Accounts/Create an access token for a service account returns \"Created\" response" } } diff --git a/cassettes/v2/Service-Accounts_4018121712/Get-an-access-token-for-a-service-account-returns-OK-response_3450780675/frozen.json b/cassettes/v2/Service-Accounts_4018121712/Get-an-access-token-for-a-service-account-returns-OK-response_3450780675/frozen.json index b2a607dd8c4f..1aa001d81bf5 100644 --- a/cassettes/v2/Service-Accounts_4018121712/Get-an-access-token-for-a-service-account-returns-OK-response_3450780675/frozen.json +++ b/cassettes/v2/Service-Accounts_4018121712/Get-an-access-token-for-a-service-account-returns-OK-response_3450780675/frozen.json @@ -1 +1 @@ -"2026-04-03T21:03:03.500Z" +"2026-04-16T20:03:09.123Z" diff --git a/cassettes/v2/Service-Accounts_4018121712/Get-an-access-token-for-a-service-account-returns-OK-response_3450780675/recording.har b/cassettes/v2/Service-Accounts_4018121712/Get-an-access-token-for-a-service-account-returns-OK-response_3450780675/recording.har index 1aa5cc128cfb..2c0e47871c8a 100644 --- a/cassettes/v2/Service-Accounts_4018121712/Get-an-access-token-for-a-service-account-returns-OK-response_3450780675/recording.har +++ b/cassettes/v2/Service-Accounts_4018121712/Get-an-access-token-for-a-service-account-returns-OK-response_3450780675/recording.har @@ -1,6 +1,5 @@ { "log": { - "_recordingName": "Service Accounts/Get an access token for a service account returns \"OK\" response", "creator": { "comment": "persister:fs", "name": "Polly.JS", @@ -8,7 +7,7 @@ }, "entries": [ { - "_id": "145227f547e335aa327f58dc2e4b258b", + "_id": "d077c285816609b6bafdac466b66d2ea", "_order": 0, "cache": {}, "request": { @@ -32,7 +31,7 @@ "postData": { "mimeType": "application/json", "params": [], - "text": "{\"data\":{\"attributes\":{\"email\":\"Test-Get_an_access_token_for_a_service_account_returns_OK_response-1775250183@datadoghq.com\",\"service_account\":true,\"title\":\"user title\"},\"type\":\"users\"}}" + "text": "{\"data\":{\"attributes\":{\"email\":\"Test-Get_an_access_token_for_a_service_account_returns_OK_response-1776369789@datadoghq.com\",\"service_account\":true,\"title\":\"user title\"},\"type\":\"users\"}}" }, "queryString": [], "url": "https://api.datadoghq.com/api/v2/service_accounts" @@ -42,7 +41,7 @@ "content": { "mimeType": "application/json", "size": 738, - "text": "{\"data\":{\"type\":\"users\",\"id\":\"8161ef90-2fa0-11f1-991f-62f4bfc595d0\",\"attributes\":{\"name\":null,\"handle\":\"8161ef90-2fa0-11f1-991f-62f4bfc595d0\",\"created_at\":\"2026-04-03T21:03:03.714879+00:00\",\"modified_at\":\"2026-04-03T21:03:03.714879+00:00\",\"email\":\"test-get_an_access_token_for_a_service_account_returns_ok_response-1775250183@datadoghq.com\",\"icon\":\"https://secure.gravatar.com/avatar/bb3c6df0d99066bbe05cf7dff99b5561?s=48&d=retro\",\"title\":\"user title\",\"verified\":true,\"service_account\":true,\"disabled\":false,\"allowed_login_methods\":[],\"status\":\"Active\",\"last_login_time\":null},\"relationships\":{\"roles\":{\"data\":[]},\"org\":{\"data\":{\"type\":\"orgs\",\"id\":\"4dee724d-00cc-11ea-a77b-570c9d03c6c5\"}}}}}\n" + "text": "{\"data\":{\"type\":\"users\",\"id\":\"4a56376d-39cf-11f1-9a29-2eb65349fc01\",\"attributes\":{\"uuid\":\"4a56376d-39cf-11f1-9a29-2eb65349fc01\",\"name\":null,\"handle\":\"4a56376d-39cf-11f1-9a29-2eb65349fc01\",\"created_at\":\"2026-04-16T20:03:09.337439+00:00\",\"modified_at\":\"2026-04-16T20:03:09.337439+00:00\",\"email\":\"test-get_an_access_token_for_a_service_account_returns_ok_response-1776369789@datadoghq.com\",\"icon\":\"https://secure.gravatar.com/avatar/7473377b9dced0689feddb50f5d82d29?s=48&d=retro\",\"title\":\"user title\",\"verified\":true,\"service_account\":true,\"disabled\":false,\"allowed_login_methods\":[],\"status\":\"Active\",\"last_login_time\":null},\"relationships\":{\"roles\":{\"data\":[]},\"org\":{\"data\":{\"type\":\"orgs\",\"id\":\"4dee724d-00cc-11ea-a77b-570c9d03c6c5\"}}}}}\n" }, "cookies": [], "headers": [ @@ -57,11 +56,11 @@ "status": 201, "statusText": "Created" }, - "startedDateTime": "2026-04-03T21:03:03.502Z", - "time": 293 + "startedDateTime": "2026-04-16T20:03:09.127Z", + "time": 336 }, { - "_id": "fdccf2049c1e92e90008e334c10c3ed8", + "_id": "43c626108b63b6e6616225e0c9c01f18", "_order": 0, "cache": {}, "request": { @@ -85,17 +84,17 @@ "postData": { "mimeType": "application/json", "params": [], - "text": "{\"data\":{\"attributes\":{\"name\":\"Test-Get_an_access_token_for_a_service_account_returns_OK_response-1775250183\",\"scopes\":[\"dashboards_read\"]},\"type\":\"personal_access_tokens\"}}" + "text": "{\"data\":{\"attributes\":{\"name\":\"Test-Get_an_access_token_for_a_service_account_returns_OK_response-1776369789\",\"scopes\":[\"dashboards_read\"]},\"type\":\"personal_access_tokens\"}}" }, "queryString": [], - "url": "https://api.datadoghq.com/api/v2/service_accounts/8161ef90-2fa0-11f1-991f-62f4bfc595d0/access_tokens" + "url": "https://api.datadoghq.com/api/v2/service_accounts/4a56376d-39cf-11f1-9a29-2eb65349fc01/access_tokens" }, "response": { - "bodySize": 529, + "bodySize": 502, "content": { "mimeType": "application/vnd.api+json", - "size": 529, - "text": "{\"data\":{\"id\":\"f2362958-1e67-414b-985d-d3196afd9315\",\"type\":\"personal_access_tokens\",\"attributes\":{\"alias\":\"7N2tUOwxIjSF8QziOBIpVd\",\"created_at\":\"2026-04-03T21:03:04.002376467Z\",\"expires_at\":null,\"key\":\"xxxxx_xxxxxxxxxxxxxxxxxxxxxx_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\",\"name\":\"Test-Get_an_access_token_for_a_service_account_returns_OK_response-1775250183\",\"public_portion\":\"7N2tUOwxIjSF8QziOBIpVd\",\"scopes\":[\"dashboards_read\"]},\"relationships\":{\"owned_by\":{\"data\":{\"id\":\"8161ef90-2fa0-11f1-991f-62f4bfc595d0\",\"type\":\"users\"}}}}}" + "size": 502, + "text": "{\"data\":{\"id\":\"b84d8c2c-b88c-4f72-82ef-fc09dddd1153\",\"type\":\"personal_access_tokens\",\"attributes\":{\"created_at\":\"2026-04-16T20:03:09.695802251Z\",\"expires_at\":null,\"key\":\"xxxxx_xxxxxxxxxxxxxxxxxxxxxx_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\",\"name\":\"Test-Get_an_access_token_for_a_service_account_returns_OK_response-1776369789\",\"public_portion\":\"ddpat_5bm1hhcTKQzH22hPiJgkEN\",\"scopes\":[\"dashboards_read\"]},\"relationships\":{\"owned_by\":{\"data\":{\"id\":\"4a56376d-39cf-11f1-9a29-2eb65349fc01\",\"type\":\"users\"}}}}}" }, "cookies": [], "headers": [ @@ -110,11 +109,11 @@ "status": 201, "statusText": "Created" }, - "startedDateTime": "2026-04-03T21:03:03.800Z", - "time": 182 + "startedDateTime": "2026-04-16T20:03:09.467Z", + "time": 267 }, { - "_id": "8e65c5a64047d080cfc9d5fed107089c", + "_id": "421343475af4f8df719356b4cfa2f4f0", "_order": 0, "cache": {}, "request": { @@ -131,14 +130,14 @@ "httpVersion": "HTTP/1.1", "method": "GET", "queryString": [], - "url": "https://api.datadoghq.com/api/v2/service_accounts/8161ef90-2fa0-11f1-991f-62f4bfc595d0/access_tokens/f2362958-1e67-414b-985d-d3196afd9315" + "url": "https://api.datadoghq.com/api/v2/service_accounts/4a56376d-39cf-11f1-9a29-2eb65349fc01/access_tokens/b84d8c2c-b88c-4f72-82ef-fc09dddd1153" }, "response": { - "bodySize": 472, + "bodySize": 445, "content": { "mimeType": "application/vnd.api+json", - "size": 472, - "text": "{\"data\":{\"id\":\"f2362958-1e67-414b-985d-d3196afd9315\",\"type\":\"personal_access_tokens\",\"attributes\":{\"alias\":\"7N2tUOwxIjSF8QziOBIpVd\",\"created_at\":\"2026-04-03T21:03:04.002376Z\",\"expires_at\":null,\"last_used_at\":null,\"name\":\"Test-Get_an_access_token_for_a_service_account_returns_OK_response-1775250183\",\"public_portion\":\"7N2tUOwxIjSF8QziOBIpVd\",\"scopes\":[\"dashboards_read\"]},\"relationships\":{\"owned_by\":{\"data\":{\"id\":\"8161ef90-2fa0-11f1-991f-62f4bfc595d0\",\"type\":\"users\"}}}}}" + "size": 445, + "text": "{\"data\":{\"id\":\"b84d8c2c-b88c-4f72-82ef-fc09dddd1153\",\"type\":\"personal_access_tokens\",\"attributes\":{\"created_at\":\"2026-04-16T20:03:09.695802Z\",\"expires_at\":null,\"last_used_at\":null,\"name\":\"Test-Get_an_access_token_for_a_service_account_returns_OK_response-1776369789\",\"public_portion\":\"ddpat_5bm1hhcTKQzH22hPiJgkEN\",\"scopes\":[\"dashboards_read\"]},\"relationships\":{\"owned_by\":{\"data\":{\"id\":\"4a56376d-39cf-11f1-9a29-2eb65349fc01\",\"type\":\"users\"}}}}}" }, "cookies": [], "headers": [ @@ -153,11 +152,11 @@ "status": 200, "statusText": "OK" }, - "startedDateTime": "2026-04-03T21:03:03.991Z", - "time": 166 + "startedDateTime": "2026-04-16T20:03:09.740Z", + "time": 253 }, { - "_id": "c26607f1bdf6dc7e1abeba1d99b0d986", + "_id": "207dc4ce726fbb5df2ec232ddf8d8fb9", "_order": 0, "cache": {}, "request": { @@ -174,7 +173,7 @@ "httpVersion": "HTTP/1.1", "method": "DELETE", "queryString": [], - "url": "https://api.datadoghq.com/api/v2/service_accounts/8161ef90-2fa0-11f1-991f-62f4bfc595d0/access_tokens/f2362958-1e67-414b-985d-d3196afd9315" + "url": "https://api.datadoghq.com/api/v2/service_accounts/4a56376d-39cf-11f1-9a29-2eb65349fc01/access_tokens/b84d8c2c-b88c-4f72-82ef-fc09dddd1153" }, "response": { "bodySize": 0, @@ -190,11 +189,11 @@ "status": 204, "statusText": "No Content" }, - "startedDateTime": "2026-04-03T21:03:04.161Z", - "time": 141 + "startedDateTime": "2026-04-16T20:03:09.999Z", + "time": 222 }, { - "_id": "18d29cd2ed0567c0ce3fcd340445e82f", + "_id": "983430383a18ef139153732118bbfdc9", "_order": 0, "cache": {}, "request": { @@ -211,7 +210,7 @@ "httpVersion": "HTTP/1.1", "method": "DELETE", "queryString": [], - "url": "https://api.datadoghq.com/api/v2/users/8161ef90-2fa0-11f1-991f-62f4bfc595d0" + "url": "https://api.datadoghq.com/api/v2/users/4a56376d-39cf-11f1-9a29-2eb65349fc01" }, "response": { "bodySize": 0, @@ -227,11 +226,12 @@ "status": 204, "statusText": "No Content" }, - "startedDateTime": "2026-04-03T21:03:04.306Z", - "time": 293 + "startedDateTime": "2026-04-16T20:03:10.223Z", + "time": 379 } ], "pages": [], - "version": "1.2" + "version": "1.2", + "_recordingName": "Service Accounts/Get an access token for a service account returns \"OK\" response" } } diff --git a/cassettes/v2/Service-Accounts_4018121712/List-access-tokens-for-a-service-account-returns-OK-response_2179051883/frozen.json b/cassettes/v2/Service-Accounts_4018121712/List-access-tokens-for-a-service-account-returns-OK-response_2179051883/frozen.json index 9ff4ef642118..8d1f4c087717 100644 --- a/cassettes/v2/Service-Accounts_4018121712/List-access-tokens-for-a-service-account-returns-OK-response_2179051883/frozen.json +++ b/cassettes/v2/Service-Accounts_4018121712/List-access-tokens-for-a-service-account-returns-OK-response_2179051883/frozen.json @@ -1 +1 @@ -"2026-04-03T21:03:09.026Z" +"2026-04-16T20:03:10.610Z" diff --git a/cassettes/v2/Service-Accounts_4018121712/List-access-tokens-for-a-service-account-returns-OK-response_2179051883/recording.har b/cassettes/v2/Service-Accounts_4018121712/List-access-tokens-for-a-service-account-returns-OK-response_2179051883/recording.har index a999ff81fb84..65947a284a04 100644 --- a/cassettes/v2/Service-Accounts_4018121712/List-access-tokens-for-a-service-account-returns-OK-response_2179051883/recording.har +++ b/cassettes/v2/Service-Accounts_4018121712/List-access-tokens-for-a-service-account-returns-OK-response_2179051883/recording.har @@ -1,6 +1,5 @@ { "log": { - "_recordingName": "Service Accounts/List access tokens for a service account returns \"OK\" response", "creator": { "comment": "persister:fs", "name": "Polly.JS", @@ -8,7 +7,7 @@ }, "entries": [ { - "_id": "15159bebc452f76cc58b3dd52e769af5", + "_id": "315fbb2a1c6840672ddf70846fbd17d2", "_order": 0, "cache": {}, "request": { @@ -32,7 +31,7 @@ "postData": { "mimeType": "application/json", "params": [], - "text": "{\"data\":{\"attributes\":{\"email\":\"Test-List_access_tokens_for_a_service_account_returns_OK_response-1775250189@datadoghq.com\",\"service_account\":true,\"title\":\"user title\"},\"type\":\"users\"}}" + "text": "{\"data\":{\"attributes\":{\"email\":\"Test-List_access_tokens_for_a_service_account_returns_OK_response-1776369790@datadoghq.com\",\"service_account\":true,\"title\":\"user title\"},\"type\":\"users\"}}" }, "queryString": [], "url": "https://api.datadoghq.com/api/v2/service_accounts" @@ -42,7 +41,7 @@ "content": { "mimeType": "application/json", "size": 737, - "text": "{\"data\":{\"type\":\"users\",\"id\":\"84a7b33b-2fa0-11f1-96b6-7a9b8860a1d7\",\"attributes\":{\"name\":null,\"handle\":\"84a7b33b-2fa0-11f1-96b6-7a9b8860a1d7\",\"created_at\":\"2026-04-03T21:03:09.205232+00:00\",\"modified_at\":\"2026-04-03T21:03:09.205232+00:00\",\"email\":\"test-list_access_tokens_for_a_service_account_returns_ok_response-1775250189@datadoghq.com\",\"icon\":\"https://secure.gravatar.com/avatar/816e106f74328dd4c20e98c116a9edeb?s=48&d=retro\",\"title\":\"user title\",\"verified\":true,\"service_account\":true,\"disabled\":false,\"allowed_login_methods\":[],\"status\":\"Active\",\"last_login_time\":null},\"relationships\":{\"roles\":{\"data\":[]},\"org\":{\"data\":{\"type\":\"orgs\",\"id\":\"4dee724d-00cc-11ea-a77b-570c9d03c6c5\"}}}}}" + "text": "{\"data\":{\"type\":\"users\",\"id\":\"4b3b0a2c-39cf-11f1-bf73-ce6d1c25b9b4\",\"attributes\":{\"uuid\":\"4b3b0a2c-39cf-11f1-bf73-ce6d1c25b9b4\",\"name\":null,\"handle\":\"4b3b0a2c-39cf-11f1-bf73-ce6d1c25b9b4\",\"created_at\":\"2026-04-16T20:03:10.837056+00:00\",\"modified_at\":\"2026-04-16T20:03:10.837056+00:00\",\"email\":\"test-list_access_tokens_for_a_service_account_returns_ok_response-1776369790@datadoghq.com\",\"icon\":\"https://secure.gravatar.com/avatar/0a5772e4c2381e3c1061e55142e2281a?s=48&d=retro\",\"title\":\"user title\",\"verified\":true,\"service_account\":true,\"disabled\":false,\"allowed_login_methods\":[],\"status\":\"Active\",\"last_login_time\":null},\"relationships\":{\"roles\":{\"data\":[]},\"org\":{\"data\":{\"type\":\"orgs\",\"id\":\"4dee724d-00cc-11ea-a77b-570c9d03c6c5\"}}}}}\n" }, "cookies": [], "headers": [ @@ -57,11 +56,11 @@ "status": 201, "statusText": "Created" }, - "startedDateTime": "2026-04-03T21:03:09.027Z", - "time": 245 + "startedDateTime": "2026-04-16T20:03:10.613Z", + "time": 346 }, { - "_id": "fcd67808c945bd4d6169075b41c61c92", + "_id": "e891763083f67504ebf6c0d63c473dbc", "_order": 0, "cache": {}, "request": { @@ -74,11 +73,11 @@ "value": "application/json" } ], - "headersSize": 578, + "headersSize": 577, "httpVersion": "HTTP/1.1", "method": "GET", "queryString": [], - "url": "https://api.datadoghq.com/api/v2/service_accounts/84a7b33b-2fa0-11f1-96b6-7a9b8860a1d7/access_tokens" + "url": "https://api.datadoghq.com/api/v2/service_accounts/4b3b0a2c-39cf-11f1-bf73-ce6d1c25b9b4/access_tokens" }, "response": { "bodySize": 54, @@ -100,11 +99,11 @@ "status": 200, "statusText": "OK" }, - "startedDateTime": "2026-04-03T21:03:09.276Z", - "time": 149 + "startedDateTime": "2026-04-16T20:03:10.964Z", + "time": 250 }, { - "_id": "29e3fcdb4d74bd98edbd15ce7445207c", + "_id": "03782f84f04fb21002b4e3f5ca9577df", "_order": 0, "cache": {}, "request": { @@ -117,11 +116,11 @@ "value": "*/*" } ], - "headersSize": 524, + "headersSize": 523, "httpVersion": "HTTP/1.1", "method": "DELETE", "queryString": [], - "url": "https://api.datadoghq.com/api/v2/users/84a7b33b-2fa0-11f1-96b6-7a9b8860a1d7" + "url": "https://api.datadoghq.com/api/v2/users/4b3b0a2c-39cf-11f1-bf73-ce6d1c25b9b4" }, "response": { "bodySize": 0, @@ -137,11 +136,12 @@ "status": 204, "statusText": "No Content" }, - "startedDateTime": "2026-04-03T21:03:09.431Z", - "time": 316 + "startedDateTime": "2026-04-16T20:03:11.219Z", + "time": 1705 } ], "pages": [], - "version": "1.2" + "version": "1.2", + "_recordingName": "Service Accounts/List access tokens for a service account returns \"OK\" response" } } diff --git a/cassettes/v2/Service-Accounts_4018121712/Revoke-an-access-token-for-a-service-account-returns-No-Content-response_720352087/frozen.json b/cassettes/v2/Service-Accounts_4018121712/Revoke-an-access-token-for-a-service-account-returns-No-Content-response_720352087/frozen.json index 9c19423f7c40..e8dd69608b98 100644 --- a/cassettes/v2/Service-Accounts_4018121712/Revoke-an-access-token-for-a-service-account-returns-No-Content-response_720352087/frozen.json +++ b/cassettes/v2/Service-Accounts_4018121712/Revoke-an-access-token-for-a-service-account-returns-No-Content-response_720352087/frozen.json @@ -1 +1 @@ -"2026-04-03T21:03:10.520Z" +"2026-04-16T20:03:12.932Z" diff --git a/cassettes/v2/Service-Accounts_4018121712/Revoke-an-access-token-for-a-service-account-returns-No-Content-response_720352087/recording.har b/cassettes/v2/Service-Accounts_4018121712/Revoke-an-access-token-for-a-service-account-returns-No-Content-response_720352087/recording.har index 38122f0bba02..e787619839f6 100644 --- a/cassettes/v2/Service-Accounts_4018121712/Revoke-an-access-token-for-a-service-account-returns-No-Content-response_720352087/recording.har +++ b/cassettes/v2/Service-Accounts_4018121712/Revoke-an-access-token-for-a-service-account-returns-No-Content-response_720352087/recording.har @@ -1,6 +1,5 @@ { "log": { - "_recordingName": "Service Accounts/Revoke an access token for a service account returns \"No Content\" response", "creator": { "comment": "persister:fs", "name": "Polly.JS", @@ -8,7 +7,7 @@ }, "entries": [ { - "_id": "8e80ce1ebaea0855a5165204026b7cb0", + "_id": "feae69d6cf824560fc06fba6fe8c4884", "_order": 0, "cache": {}, "request": { @@ -32,7 +31,7 @@ "postData": { "mimeType": "application/json", "params": [], - "text": "{\"data\":{\"attributes\":{\"email\":\"Test-Revoke_an_access_token_for_a_service_account_returns_No_Content_response-1775250190@datadoghq.com\",\"service_account\":true,\"title\":\"user title\"},\"type\":\"users\"}}" + "text": "{\"data\":{\"attributes\":{\"email\":\"Test-Revoke_an_access_token_for_a_service_account_returns_No_Content_response-1776369792@datadoghq.com\",\"service_account\":true,\"title\":\"user title\"},\"type\":\"users\"}}" }, "queryString": [], "url": "https://api.datadoghq.com/api/v2/service_accounts" @@ -42,7 +41,7 @@ "content": { "mimeType": "application/json", "size": 749, - "text": "{\"data\":{\"type\":\"users\",\"id\":\"860878b5-2fa0-11f1-991f-62f4bfc595d0\",\"attributes\":{\"name\":null,\"handle\":\"860878b5-2fa0-11f1-991f-62f4bfc595d0\",\"created_at\":\"2026-04-03T21:03:11.517157+00:00\",\"modified_at\":\"2026-04-03T21:03:11.517157+00:00\",\"email\":\"test-revoke_an_access_token_for_a_service_account_returns_no_content_response-1775250190@datadoghq.com\",\"icon\":\"https://secure.gravatar.com/avatar/7d18813f3cbc71a5e46b1184fc3ad8fb?s=48&d=retro\",\"title\":\"user title\",\"verified\":true,\"service_account\":true,\"disabled\":false,\"allowed_login_methods\":[],\"status\":\"Active\",\"last_login_time\":null},\"relationships\":{\"roles\":{\"data\":[]},\"org\":{\"data\":{\"type\":\"orgs\",\"id\":\"4dee724d-00cc-11ea-a77b-570c9d03c6c5\"}}}}}\n" + "text": "{\"data\":{\"type\":\"users\",\"id\":\"4c99fbee-39cf-11f1-beb2-cad70c641dfa\",\"attributes\":{\"uuid\":\"4c99fbee-39cf-11f1-beb2-cad70c641dfa\",\"name\":null,\"handle\":\"4c99fbee-39cf-11f1-beb2-cad70c641dfa\",\"created_at\":\"2026-04-16T20:03:13.136998+00:00\",\"modified_at\":\"2026-04-16T20:03:13.136998+00:00\",\"email\":\"test-revoke_an_access_token_for_a_service_account_returns_no_content_response-1776369792@datadoghq.com\",\"icon\":\"https://secure.gravatar.com/avatar/7586d09a6a08e32a963f425a34463a4d?s=48&d=retro\",\"title\":\"user title\",\"verified\":true,\"service_account\":true,\"disabled\":false,\"allowed_login_methods\":[],\"status\":\"Active\",\"last_login_time\":null},\"relationships\":{\"roles\":{\"data\":[]},\"org\":{\"data\":{\"type\":\"orgs\",\"id\":\"4dee724d-00cc-11ea-a77b-570c9d03c6c5\"}}}}}\n" }, "cookies": [], "headers": [ @@ -57,11 +56,11 @@ "status": 201, "statusText": "Created" }, - "startedDateTime": "2026-04-03T21:03:10.522Z", - "time": 1066 + "startedDateTime": "2026-04-16T20:03:12.935Z", + "time": 330 }, { - "_id": "0f38e844717192c4d5571f9a6b65056c", + "_id": "8a5a8becf645edef33c1e3ea927b06ff", "_order": 0, "cache": {}, "request": { @@ -79,23 +78,23 @@ "value": "application/json" } ], - "headersSize": 633, + "headersSize": 632, "httpVersion": "HTTP/1.1", "method": "POST", "postData": { "mimeType": "application/json", "params": [], - "text": "{\"data\":{\"attributes\":{\"name\":\"Test-Revoke_an_access_token_for_a_service_account_returns_No_Content_response-1775250190\",\"scopes\":[\"dashboards_read\"]},\"type\":\"personal_access_tokens\"}}" + "text": "{\"data\":{\"attributes\":{\"name\":\"Test-Revoke_an_access_token_for_a_service_account_returns_No_Content_response-1776369792\",\"scopes\":[\"dashboards_read\"]},\"type\":\"personal_access_tokens\"}}" }, "queryString": [], - "url": "https://api.datadoghq.com/api/v2/service_accounts/860878b5-2fa0-11f1-991f-62f4bfc595d0/access_tokens" + "url": "https://api.datadoghq.com/api/v2/service_accounts/4c99fbee-39cf-11f1-beb2-cad70c641dfa/access_tokens" }, "response": { - "bodySize": 540, + "bodySize": 513, "content": { "mimeType": "application/vnd.api+json", - "size": 540, - "text": "{\"data\":{\"id\":\"7346d75b-83f3-48ba-9186-899fc80bce16\",\"type\":\"personal_access_tokens\",\"attributes\":{\"alias\":\"3VWUVmuRsjFIKue2Uq9ii6\",\"created_at\":\"2026-04-03T21:03:11.782016283Z\",\"expires_at\":null,\"key\":\"xxxxx_xxxxxxxxxxxxxxxxxxxxxx_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\",\"name\":\"Test-Revoke_an_access_token_for_a_service_account_returns_No_Content_response-1775250190\",\"public_portion\":\"3VWUVmuRsjFIKue2Uq9ii6\",\"scopes\":[\"dashboards_read\"]},\"relationships\":{\"owned_by\":{\"data\":{\"id\":\"860878b5-2fa0-11f1-991f-62f4bfc595d0\",\"type\":\"users\"}}}}}" + "size": 513, + "text": "{\"data\":{\"id\":\"a5b5e3c3-2b58-448b-a1b1-5c97f16837a6\",\"type\":\"personal_access_tokens\",\"attributes\":{\"created_at\":\"2026-04-16T20:03:13.505344652Z\",\"expires_at\":null,\"key\":\"xxxxx_xxxxxxxxxxxxxxxxxxxxxx_xxxxxxxxxXxxxxxxxxxxxxxxxxxxxxxxxxxx\",\"name\":\"Test-Revoke_an_access_token_for_a_service_account_returns_No_Content_response-1776369792\",\"public_portion\":\"ddpat_52grBIAi4zKGY0uxhjLVVW\",\"scopes\":[\"dashboards_read\"]},\"relationships\":{\"owned_by\":{\"data\":{\"id\":\"4c99fbee-39cf-11f1-beb2-cad70c641dfa\",\"type\":\"users\"}}}}}" }, "cookies": [], "headers": [ @@ -110,11 +109,11 @@ "status": 201, "statusText": "Created" }, - "startedDateTime": "2026-04-03T21:03:11.591Z", - "time": 168 + "startedDateTime": "2026-04-16T20:03:13.270Z", + "time": 274 }, { - "_id": "69600d2698fcc50dde4a9a91c7a31bbe", + "_id": "9f2fc74e4b0e839a3ec09da4a2a8ae4b", "_order": 0, "cache": {}, "request": { @@ -127,11 +126,11 @@ "value": "*/*" } ], - "headersSize": 606, + "headersSize": 605, "httpVersion": "HTTP/1.1", "method": "DELETE", "queryString": [], - "url": "https://api.datadoghq.com/api/v2/service_accounts/860878b5-2fa0-11f1-991f-62f4bfc595d0/access_tokens/7346d75b-83f3-48ba-9186-899fc80bce16" + "url": "https://api.datadoghq.com/api/v2/service_accounts/4c99fbee-39cf-11f1-beb2-cad70c641dfa/access_tokens/a5b5e3c3-2b58-448b-a1b1-5c97f16837a6" }, "response": { "bodySize": 0, @@ -147,11 +146,11 @@ "status": 204, "statusText": "No Content" }, - "startedDateTime": "2026-04-03T21:03:11.762Z", - "time": 199 + "startedDateTime": "2026-04-16T20:03:13.549Z", + "time": 240 }, { - "_id": "69600d2698fcc50dde4a9a91c7a31bbe", + "_id": "9f2fc74e4b0e839a3ec09da4a2a8ae4b", "_order": 1, "cache": {}, "request": { @@ -168,7 +167,7 @@ "httpVersion": "HTTP/1.1", "method": "DELETE", "queryString": [], - "url": "https://api.datadoghq.com/api/v2/service_accounts/860878b5-2fa0-11f1-991f-62f4bfc595d0/access_tokens/7346d75b-83f3-48ba-9186-899fc80bce16" + "url": "https://api.datadoghq.com/api/v2/service_accounts/4c99fbee-39cf-11f1-beb2-cad70c641dfa/access_tokens/a5b5e3c3-2b58-448b-a1b1-5c97f16837a6" }, "response": { "bodySize": 0, @@ -184,11 +183,11 @@ "status": 204, "statusText": "No Content" }, - "startedDateTime": "2026-04-03T21:03:11.968Z", - "time": 190 + "startedDateTime": "2026-04-16T20:03:13.794Z", + "time": 218 }, { - "_id": "6877b2e2ef9429e486b5baf7800f86bd", + "_id": "994e08b8d361e7d6a7a28323e62d9c95", "_order": 0, "cache": {}, "request": { @@ -205,7 +204,7 @@ "httpVersion": "HTTP/1.1", "method": "DELETE", "queryString": [], - "url": "https://api.datadoghq.com/api/v2/users/860878b5-2fa0-11f1-991f-62f4bfc595d0" + "url": "https://api.datadoghq.com/api/v2/users/4c99fbee-39cf-11f1-beb2-cad70c641dfa" }, "response": { "bodySize": 0, @@ -221,11 +220,12 @@ "status": 204, "statusText": "No Content" }, - "startedDateTime": "2026-04-03T21:03:12.161Z", - "time": 332 + "startedDateTime": "2026-04-16T20:03:14.016Z", + "time": 503 } ], "pages": [], - "version": "1.2" + "version": "1.2", + "_recordingName": "Service Accounts/Revoke an access token for a service account returns \"No Content\" response" } } diff --git a/cassettes/v2/Service-Accounts_4018121712/Update-an-access-token-for-a-service-account-returns-OK-response_2145625972/frozen.json b/cassettes/v2/Service-Accounts_4018121712/Update-an-access-token-for-a-service-account-returns-OK-response_2145625972/frozen.json index bad3066d8976..df188030778a 100644 --- a/cassettes/v2/Service-Accounts_4018121712/Update-an-access-token-for-a-service-account-returns-OK-response_2145625972/frozen.json +++ b/cassettes/v2/Service-Accounts_4018121712/Update-an-access-token-for-a-service-account-returns-OK-response_2145625972/frozen.json @@ -1 +1 @@ -"2026-04-03T21:03:12.499Z" +"2026-04-16T20:03:14.527Z" diff --git a/cassettes/v2/Service-Accounts_4018121712/Update-an-access-token-for-a-service-account-returns-OK-response_2145625972/recording.har b/cassettes/v2/Service-Accounts_4018121712/Update-an-access-token-for-a-service-account-returns-OK-response_2145625972/recording.har index fd95b784c8b5..9957cbf90369 100644 --- a/cassettes/v2/Service-Accounts_4018121712/Update-an-access-token-for-a-service-account-returns-OK-response_2145625972/recording.har +++ b/cassettes/v2/Service-Accounts_4018121712/Update-an-access-token-for-a-service-account-returns-OK-response_2145625972/recording.har @@ -1,6 +1,5 @@ { "log": { - "_recordingName": "Service Accounts/Update an access token for a service account returns \"OK\" response", "creator": { "comment": "persister:fs", "name": "Polly.JS", @@ -8,7 +7,7 @@ }, "entries": [ { - "_id": "284472d599737d0e2c046ac82d23b165", + "_id": "fcac50ec362baf119f232eea03a03b40", "_order": 0, "cache": {}, "request": { @@ -32,7 +31,7 @@ "postData": { "mimeType": "application/json", "params": [], - "text": "{\"data\":{\"attributes\":{\"email\":\"Test-Update_an_access_token_for_a_service_account_returns_OK_response-1775250192@datadoghq.com\",\"service_account\":true,\"title\":\"user title\"},\"type\":\"users\"}}" + "text": "{\"data\":{\"attributes\":{\"email\":\"Test-Update_an_access_token_for_a_service_account_returns_OK_response-1776369794@datadoghq.com\",\"service_account\":true,\"title\":\"user title\"},\"type\":\"users\"}}" }, "queryString": [], "url": "https://api.datadoghq.com/api/v2/service_accounts" @@ -42,7 +41,7 @@ "content": { "mimeType": "application/json", "size": 741, - "text": "{\"data\":{\"type\":\"users\",\"id\":\"86bdf0d7-2fa0-11f1-991f-62f4bfc595d0\",\"attributes\":{\"name\":null,\"handle\":\"86bdf0d7-2fa0-11f1-991f-62f4bfc595d0\",\"created_at\":\"2026-04-03T21:03:12.706435+00:00\",\"modified_at\":\"2026-04-03T21:03:12.706435+00:00\",\"email\":\"test-update_an_access_token_for_a_service_account_returns_ok_response-1775250192@datadoghq.com\",\"icon\":\"https://secure.gravatar.com/avatar/8ef25c203ebdbe5e11acb74bd99ba7da?s=48&d=retro\",\"title\":\"user title\",\"verified\":true,\"service_account\":true,\"disabled\":false,\"allowed_login_methods\":[],\"status\":\"Active\",\"last_login_time\":null},\"relationships\":{\"roles\":{\"data\":[]},\"org\":{\"data\":{\"type\":\"orgs\",\"id\":\"4dee724d-00cc-11ea-a77b-570c9d03c6c5\"}}}}}\n" + "text": "{\"data\":{\"type\":\"users\",\"id\":\"4d8efdef-39cf-11f1-bf73-ce6d1c25b9b4\",\"attributes\":{\"uuid\":\"4d8efdef-39cf-11f1-bf73-ce6d1c25b9b4\",\"name\":null,\"handle\":\"4d8efdef-39cf-11f1-bf73-ce6d1c25b9b4\",\"created_at\":\"2026-04-16T20:03:14.742691+00:00\",\"modified_at\":\"2026-04-16T20:03:14.742691+00:00\",\"email\":\"test-update_an_access_token_for_a_service_account_returns_ok_response-1776369794@datadoghq.com\",\"icon\":\"https://secure.gravatar.com/avatar/05aacae415f13819561258b03c973881?s=48&d=retro\",\"title\":\"user title\",\"verified\":true,\"service_account\":true,\"disabled\":false,\"allowed_login_methods\":[],\"status\":\"Active\",\"last_login_time\":null},\"relationships\":{\"roles\":{\"data\":[]},\"org\":{\"data\":{\"type\":\"orgs\",\"id\":\"4dee724d-00cc-11ea-a77b-570c9d03c6c5\"}}}}}\n" }, "cookies": [], "headers": [ @@ -57,11 +56,11 @@ "status": 201, "statusText": "Created" }, - "startedDateTime": "2026-04-03T21:03:12.503Z", - "time": 280 + "startedDateTime": "2026-04-16T20:03:14.529Z", + "time": 355 }, { - "_id": "00c32353a37b6c00e2675c108c52d533", + "_id": "f623cff46c3a0e8371be452b054aad18", "_order": 0, "cache": {}, "request": { @@ -85,17 +84,17 @@ "postData": { "mimeType": "application/json", "params": [], - "text": "{\"data\":{\"attributes\":{\"name\":\"Test-Update_an_access_token_for_a_service_account_returns_OK_response-1775250192\",\"scopes\":[\"dashboards_read\"]},\"type\":\"personal_access_tokens\"}}" + "text": "{\"data\":{\"attributes\":{\"name\":\"Test-Update_an_access_token_for_a_service_account_returns_OK_response-1776369794\",\"scopes\":[\"dashboards_read\"]},\"type\":\"personal_access_tokens\"}}" }, "queryString": [], - "url": "https://api.datadoghq.com/api/v2/service_accounts/86bdf0d7-2fa0-11f1-991f-62f4bfc595d0/access_tokens" + "url": "https://api.datadoghq.com/api/v2/service_accounts/4d8efdef-39cf-11f1-bf73-ce6d1c25b9b4/access_tokens" }, "response": { - "bodySize": 532, + "bodySize": 505, "content": { "mimeType": "application/vnd.api+json", - "size": 532, - "text": "{\"data\":{\"id\":\"9a7d27cc-4969-4a57-990c-03c23a9f2adc\",\"type\":\"personal_access_tokens\",\"attributes\":{\"alias\":\"4hW0tyOpjf5Dj84mZaXqwe\",\"created_at\":\"2026-04-03T21:03:12.978132411Z\",\"expires_at\":null,\"key\":\"xxxxx_xxxxxxxxxxxxxxxxxxXxxx_xxxxxXxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\",\"name\":\"Test-Update_an_access_token_for_a_service_account_returns_OK_response-1775250192\",\"public_portion\":\"4hW0tyOpjf5Dj84mZaXqwe\",\"scopes\":[\"dashboards_read\"]},\"relationships\":{\"owned_by\":{\"data\":{\"id\":\"86bdf0d7-2fa0-11f1-991f-62f4bfc595d0\",\"type\":\"users\"}}}}}" + "size": 505, + "text": "{\"data\":{\"id\":\"eafa3dd9-430d-4075-a183-63171c7f3de5\",\"type\":\"personal_access_tokens\",\"attributes\":{\"created_at\":\"2026-04-16T20:03:15.138533237Z\",\"expires_at\":null,\"key\":\"xxxxx_xxxxxxxxxxxxxxxxxxxxxx_xxxxxxxxxxxxxxxXxxxxxxxxxxxxxxxxxxxx\",\"name\":\"Test-Update_an_access_token_for_a_service_account_returns_OK_response-1776369794\",\"public_portion\":\"ddpat_79OZ2nUHcB3McO399ZaVVt\",\"scopes\":[\"dashboards_read\"]},\"relationships\":{\"owned_by\":{\"data\":{\"id\":\"4d8efdef-39cf-11f1-bf73-ce6d1c25b9b4\",\"type\":\"users\"}}}}}" }, "cookies": [], "headers": [ @@ -110,11 +109,11 @@ "status": 201, "statusText": "Created" }, - "startedDateTime": "2026-04-03T21:03:12.787Z", - "time": 167 + "startedDateTime": "2026-04-16T20:03:14.889Z", + "time": 282 }, { - "_id": "601591e122a4cbbd2ab8729d01a9e7bb", + "_id": "10f625153f2fdceb9e2f46e87cf0e500", "_order": 0, "cache": {}, "request": { @@ -138,17 +137,17 @@ "postData": { "mimeType": "application/json", "params": [], - "text": "{\"data\":{\"attributes\":{\"name\":\"Test-Update_an_access_token_for_a_service_account_returns_OK_response-1775250192-updated\"},\"id\":\"9a7d27cc-4969-4a57-990c-03c23a9f2adc\",\"type\":\"personal_access_tokens\"}}" + "text": "{\"data\":{\"attributes\":{\"name\":\"Test-Update_an_access_token_for_a_service_account_returns_OK_response-1776369794-updated\"},\"id\":\"eafa3dd9-430d-4075-a183-63171c7f3de5\",\"type\":\"personal_access_tokens\"}}" }, "queryString": [], - "url": "https://api.datadoghq.com/api/v2/service_accounts/86bdf0d7-2fa0-11f1-991f-62f4bfc595d0/access_tokens/9a7d27cc-4969-4a57-990c-03c23a9f2adc" + "url": "https://api.datadoghq.com/api/v2/service_accounts/4d8efdef-39cf-11f1-bf73-ce6d1c25b9b4/access_tokens/eafa3dd9-430d-4075-a183-63171c7f3de5" }, "response": { - "bodySize": 527, + "bodySize": 500, "content": { "mimeType": "application/vnd.api+json", - "size": 527, - "text": "{\"data\":{\"id\":\"9a7d27cc-4969-4a57-990c-03c23a9f2adc\",\"type\":\"personal_access_tokens\",\"attributes\":{\"alias\":\"4hW0tyOpjf5Dj84mZaXqwe\",\"created_at\":\"2026-04-03T21:03:12.978132Z\",\"expires_at\":null,\"last_used_at\":null,\"modified_at\":\"2026-04-03T21:03:13.152078Z\",\"name\":\"Test-Update_an_access_token_for_a_service_account_returns_OK_response-1775250192-updated\",\"public_portion\":\"4hW0tyOpjf5Dj84mZaXqwe\",\"scopes\":[\"dashboards_read\"]},\"relationships\":{\"owned_by\":{\"data\":{\"id\":\"86bdf0d7-2fa0-11f1-991f-62f4bfc595d0\",\"type\":\"users\"}}}}}" + "size": 500, + "text": "{\"data\":{\"id\":\"eafa3dd9-430d-4075-a183-63171c7f3de5\",\"type\":\"personal_access_tokens\",\"attributes\":{\"created_at\":\"2026-04-16T20:03:15.138533Z\",\"expires_at\":null,\"last_used_at\":null,\"modified_at\":\"2026-04-16T20:03:15.375809Z\",\"name\":\"Test-Update_an_access_token_for_a_service_account_returns_OK_response-1776369794-updated\",\"public_portion\":\"ddpat_79OZ2nUHcB3McO399ZaVVt\",\"scopes\":[\"dashboards_read\"]},\"relationships\":{\"owned_by\":{\"data\":{\"id\":\"4d8efdef-39cf-11f1-bf73-ce6d1c25b9b4\",\"type\":\"users\"}}}}}" }, "cookies": [], "headers": [ @@ -163,11 +162,11 @@ "status": 200, "statusText": "OK" }, - "startedDateTime": "2026-04-03T21:03:12.959Z", - "time": 178 + "startedDateTime": "2026-04-16T20:03:15.177Z", + "time": 237 }, { - "_id": "d69fc8d66af56d67b24912a17d3fc28f", + "_id": "ade5368b108f866d88036d4c5735ba3c", "_order": 0, "cache": {}, "request": { @@ -184,7 +183,7 @@ "httpVersion": "HTTP/1.1", "method": "DELETE", "queryString": [], - "url": "https://api.datadoghq.com/api/v2/service_accounts/86bdf0d7-2fa0-11f1-991f-62f4bfc595d0/access_tokens/9a7d27cc-4969-4a57-990c-03c23a9f2adc" + "url": "https://api.datadoghq.com/api/v2/service_accounts/4d8efdef-39cf-11f1-bf73-ce6d1c25b9b4/access_tokens/eafa3dd9-430d-4075-a183-63171c7f3de5" }, "response": { "bodySize": 0, @@ -200,11 +199,11 @@ "status": 204, "statusText": "No Content" }, - "startedDateTime": "2026-04-03T21:03:13.142Z", - "time": 159 + "startedDateTime": "2026-04-16T20:03:15.419Z", + "time": 240 }, { - "_id": "96de1c9caa071667ed8e5edd9be98b5e", + "_id": "a3dce74c505e2fbbb31aa8b86157dc12", "_order": 0, "cache": {}, "request": { @@ -221,7 +220,7 @@ "httpVersion": "HTTP/1.1", "method": "DELETE", "queryString": [], - "url": "https://api.datadoghq.com/api/v2/users/86bdf0d7-2fa0-11f1-991f-62f4bfc595d0" + "url": "https://api.datadoghq.com/api/v2/users/4d8efdef-39cf-11f1-bf73-ce6d1c25b9b4" }, "response": { "bodySize": 0, @@ -237,11 +236,12 @@ "status": 204, "statusText": "No Content" }, - "startedDateTime": "2026-04-03T21:03:13.304Z", - "time": 377 + "startedDateTime": "2026-04-16T20:03:15.663Z", + "time": 369 } ], "pages": [], - "version": "1.2" + "version": "1.2", + "_recordingName": "Service Accounts/Update an access token for a service account returns \"OK\" response" } } diff --git a/features/v2/key_management.feature b/features/v2/key_management.feature index 6c4648455625..365c53ed7c27 100644 --- a/features/v2/key_management.feature +++ b/features/v2/key_management.feature @@ -221,7 +221,7 @@ Feature: Key Management @generated @skip @team:DataDog/credentials-management Scenario: Get a personal access token returns "Not Found" response Given new "GetPersonalAccessToken" request - And request contains "pat_uuid" parameter from "REPLACE.ME" + And request contains "pat_id" parameter from "REPLACE.ME" When the request is sent Then the response status is 404 Not Found @@ -229,7 +229,7 @@ Feature: Key Management Scenario: Get a personal access token returns "OK" response Given there is a valid "personal_access_token" in the system And new "GetPersonalAccessToken" request - And request contains "pat_uuid" parameter from "personal_access_token.data.id" + And request contains "pat_id" parameter from "personal_access_token.data.id" When the request is sent Then the response status is 200 OK And the response "data.type" is equal to "personal_access_tokens" @@ -355,21 +355,21 @@ Feature: Key Management Scenario: Revoke a personal access token returns "No Content" response Given there is a valid "personal_access_token" in the system And new "RevokePersonalAccessToken" request - And request contains "pat_uuid" parameter from "personal_access_token.data.id" + And request contains "pat_id" parameter from "personal_access_token.data.id" When the request is sent Then the response status is 204 No Content @generated @skip @team:DataDog/credentials-management Scenario: Revoke a personal access token returns "Not Found" response Given new "RevokePersonalAccessToken" request - And request contains "pat_uuid" parameter from "REPLACE.ME" + And request contains "pat_id" parameter from "REPLACE.ME" When the request is sent Then the response status is 404 Not Found @generated @skip @team:DataDog/credentials-management Scenario: Update a personal access token returns "Bad Request" response Given new "UpdatePersonalAccessToken" request - And request contains "pat_uuid" parameter from "REPLACE.ME" + And request contains "pat_id" parameter from "REPLACE.ME" And body with value {"data": {"attributes": {"name": "Updated Personal Access Token", "scopes": ["dashboards_read", "dashboards_write"]}, "id": "00112233-4455-6677-8899-aabbccddeeff", "type": "personal_access_tokens"}} When the request is sent Then the response status is 400 Bad Request @@ -377,7 +377,7 @@ Feature: Key Management @generated @skip @team:DataDog/credentials-management Scenario: Update a personal access token returns "Not Found" response Given new "UpdatePersonalAccessToken" request - And request contains "pat_uuid" parameter from "REPLACE.ME" + And request contains "pat_id" parameter from "REPLACE.ME" And body with value {"data": {"attributes": {"name": "Updated Personal Access Token", "scopes": ["dashboards_read", "dashboards_write"]}, "id": "00112233-4455-6677-8899-aabbccddeeff", "type": "personal_access_tokens"}} When the request is sent Then the response status is 404 Not Found @@ -386,7 +386,7 @@ Feature: Key Management Scenario: Update a personal access token returns "OK" response Given there is a valid "personal_access_token" in the system And new "UpdatePersonalAccessToken" request - And request contains "pat_uuid" parameter from "personal_access_token.data.id" + And request contains "pat_id" parameter from "personal_access_token.data.id" And body with value {"data": {"type": "personal_access_tokens", "id": "{{ personal_access_token.data.id }}", "attributes": {"name": "{{ unique }}-updated"}}} When the request is sent Then the response status is 200 OK diff --git a/features/v2/service_accounts.feature b/features/v2/service_accounts.feature index 25744abc832d..fa8c81440e26 100644 --- a/features/v2/service_accounts.feature +++ b/features/v2/service_accounts.feature @@ -142,7 +142,7 @@ Feature: Service Accounts Scenario: Get an access token for a service account returns "Not Found" response Given new "GetServiceAccountAccessToken" request And request contains "service_account_id" parameter from "REPLACE.ME" - And request contains "pat_uuid" parameter from "REPLACE.ME" + And request contains "pat_id" parameter from "REPLACE.ME" When the request is sent Then the response status is 404 Not Found @@ -152,7 +152,7 @@ Feature: Service Accounts And there is a valid "service_account_access_token" for "service_account_user" And new "GetServiceAccountAccessToken" request And request contains "service_account_id" parameter from "service_account_user.data.id" - And request contains "pat_uuid" parameter from "service_account_access_token.data.id" + And request contains "pat_id" parameter from "service_account_access_token.data.id" When the request is sent Then the response status is 200 OK And the response "data.attributes.name" has the same value as "service_account_access_token.data.attributes.name" @@ -232,7 +232,7 @@ Feature: Service Accounts And there is a valid "service_account_access_token" for "service_account_user" And new "RevokeServiceAccountAccessToken" request And request contains "service_account_id" parameter from "service_account_user.data.id" - And request contains "pat_uuid" parameter from "service_account_access_token.data.id" + And request contains "pat_id" parameter from "service_account_access_token.data.id" When the request is sent Then the response status is 204 No Content @@ -240,7 +240,7 @@ Feature: Service Accounts Scenario: Revoke an access token for a service account returns "Not Found" response Given new "RevokeServiceAccountAccessToken" request And request contains "service_account_id" parameter from "REPLACE.ME" - And request contains "pat_uuid" parameter from "REPLACE.ME" + And request contains "pat_id" parameter from "REPLACE.ME" When the request is sent Then the response status is 404 Not Found @@ -248,7 +248,7 @@ Feature: Service Accounts Scenario: Update an access token for a service account returns "Bad Request" response Given new "UpdateServiceAccountAccessToken" request And request contains "service_account_id" parameter from "REPLACE.ME" - And request contains "pat_uuid" parameter from "REPLACE.ME" + And request contains "pat_id" parameter from "REPLACE.ME" And body with value {"data": {"attributes": {"name": "Updated Personal Access Token", "scopes": ["dashboards_read", "dashboards_write"]}, "id": "00112233-4455-6677-8899-aabbccddeeff", "type": "personal_access_tokens"}} When the request is sent Then the response status is 400 Bad Request @@ -257,7 +257,7 @@ Feature: Service Accounts Scenario: Update an access token for a service account returns "Not Found" response Given new "UpdateServiceAccountAccessToken" request And request contains "service_account_id" parameter from "REPLACE.ME" - And request contains "pat_uuid" parameter from "REPLACE.ME" + And request contains "pat_id" parameter from "REPLACE.ME" And body with value {"data": {"attributes": {"name": "Updated Personal Access Token", "scopes": ["dashboards_read", "dashboards_write"]}, "id": "00112233-4455-6677-8899-aabbccddeeff", "type": "personal_access_tokens"}} When the request is sent Then the response status is 404 Not Found @@ -268,7 +268,7 @@ Feature: Service Accounts And there is a valid "service_account_access_token" for "service_account_user" And new "UpdateServiceAccountAccessToken" request And request contains "service_account_id" parameter from "service_account_user.data.id" - And request contains "pat_uuid" parameter from "service_account_access_token.data.id" + And request contains "pat_id" parameter from "service_account_access_token.data.id" And body with value {"data": {"id": "{{ service_account_access_token.data.id }}", "type": "personal_access_tokens", "attributes": {"name": "{{ service_account_access_token.data.attributes.name }}-updated"}}} When the request is sent Then the response status is 200 OK diff --git a/features/v2/undo.json b/features/v2/undo.json index 31f26b910917..c32ecaf107d9 100644 --- a/features/v2/undo.json +++ b/features/v2/undo.json @@ -4318,7 +4318,7 @@ "operationId": "RevokePersonalAccessToken", "parameters": [ { - "name": "pat_uuid", + "name": "pat_id", "source": "data.id" } ], @@ -5883,7 +5883,7 @@ "source": "data.relationships.owned_by.data.id" }, { - "name": "pat_uuid", + "name": "pat_id", "source": "data.id" } ], diff --git a/private/bdd_runner/src/support/scenarios_model_mapping.ts b/private/bdd_runner/src/support/scenarios_model_mapping.ts index 37373d86b165..be23e3632f56 100644 --- a/private/bdd_runner/src/support/scenarios_model_mapping.ts +++ b/private/bdd_runner/src/support/scenarios_model_mapping.ts @@ -3410,21 +3410,21 @@ export const ScenariosModelMappings: { [key: string]: OperationMapping } = { operationResponseType: "PersonalAccessTokenCreateResponse", }, "KeyManagementApi.V2.GetPersonalAccessToken": { - patUuid: { + patId: { type: "string", format: "", }, operationResponseType: "PersonalAccessTokenResponse", }, "KeyManagementApi.V2.RevokePersonalAccessToken": { - patUuid: { + patId: { type: "string", format: "", }, operationResponseType: "{}", }, "KeyManagementApi.V2.UpdatePersonalAccessToken": { - patUuid: { + patId: { type: "string", format: "", }, @@ -11259,7 +11259,7 @@ export const ScenariosModelMappings: { [key: string]: OperationMapping } = { type: "string", format: "", }, - patUuid: { + patId: { type: "string", format: "", }, @@ -11270,7 +11270,7 @@ export const ScenariosModelMappings: { [key: string]: OperationMapping } = { type: "string", format: "", }, - patUuid: { + patId: { type: "string", format: "", }, @@ -11281,7 +11281,7 @@ export const ScenariosModelMappings: { [key: string]: OperationMapping } = { type: "string", format: "", }, - patUuid: { + patId: { type: "string", format: "", }, diff --git a/services/downtimes/src/v2/models/UserAttributes.ts b/services/downtimes/src/v2/models/UserAttributes.ts index 44cbbbb41b98..6d239559f02f 100644 --- a/services/downtimes/src/v2/models/UserAttributes.ts +++ b/services/downtimes/src/v2/models/UserAttributes.ts @@ -52,6 +52,10 @@ export class UserAttributes { * Title of the user. */ "title"?: string; + /** + * UUID of the user. + */ + "uuid"?: string; /** * Whether the user is verified. */ @@ -122,6 +126,10 @@ export class UserAttributes { baseName: "title", type: "string", }, + uuid: { + baseName: "uuid", + type: "string", + }, verified: { baseName: "verified", type: "boolean", diff --git a/services/incident_services/src/v2/models/UserAttributes.ts b/services/incident_services/src/v2/models/UserAttributes.ts index 44cbbbb41b98..6d239559f02f 100644 --- a/services/incident_services/src/v2/models/UserAttributes.ts +++ b/services/incident_services/src/v2/models/UserAttributes.ts @@ -52,6 +52,10 @@ export class UserAttributes { * Title of the user. */ "title"?: string; + /** + * UUID of the user. + */ + "uuid"?: string; /** * Whether the user is verified. */ @@ -122,6 +126,10 @@ export class UserAttributes { baseName: "title", type: "string", }, + uuid: { + baseName: "uuid", + type: "string", + }, verified: { baseName: "verified", type: "boolean", diff --git a/services/incident_teams/src/v2/models/UserAttributes.ts b/services/incident_teams/src/v2/models/UserAttributes.ts index 44cbbbb41b98..6d239559f02f 100644 --- a/services/incident_teams/src/v2/models/UserAttributes.ts +++ b/services/incident_teams/src/v2/models/UserAttributes.ts @@ -52,6 +52,10 @@ export class UserAttributes { * Title of the user. */ "title"?: string; + /** + * UUID of the user. + */ + "uuid"?: string; /** * Whether the user is verified. */ @@ -122,6 +126,10 @@ export class UserAttributes { baseName: "title", type: "string", }, + uuid: { + baseName: "uuid", + type: "string", + }, verified: { baseName: "verified", type: "boolean", diff --git a/services/incidents/src/v2/models/UserAttributes.ts b/services/incidents/src/v2/models/UserAttributes.ts index 44cbbbb41b98..6d239559f02f 100644 --- a/services/incidents/src/v2/models/UserAttributes.ts +++ b/services/incidents/src/v2/models/UserAttributes.ts @@ -52,6 +52,10 @@ export class UserAttributes { * Title of the user. */ "title"?: string; + /** + * UUID of the user. + */ + "uuid"?: string; /** * Whether the user is verified. */ @@ -122,6 +126,10 @@ export class UserAttributes { baseName: "title", type: "string", }, + uuid: { + baseName: "uuid", + type: "string", + }, verified: { baseName: "verified", type: "boolean", diff --git a/services/key_management/src/v2/KeyManagementApi.ts b/services/key_management/src/v2/KeyManagementApi.ts index 35334c065c60..24c771ffe418 100644 --- a/services/key_management/src/v2/KeyManagementApi.ts +++ b/services/key_management/src/v2/KeyManagementApi.ts @@ -487,20 +487,20 @@ export class KeyManagementApiRequestFactory extends BaseAPIRequestFactory { } public async getPersonalAccessToken( - patUuid: string, + patId: string, _options?: Configuration, ): Promise { const _config = _options || this.configuration; - // verify required parameter 'patUuid' is not null or undefined - if (patUuid === null || patUuid === undefined) { - throw new RequiredError("patUuid", "getPersonalAccessToken"); + // verify required parameter 'patId' is not null or undefined + if (patId === null || patId === undefined) { + throw new RequiredError("patId", "getPersonalAccessToken"); } // Path Params - const localVarPath = "/api/v2/personal_access_tokens/{pat_uuid}".replace( - "{pat_uuid}", - encodeURIComponent(String(patUuid)), + const localVarPath = "/api/v2/personal_access_tokens/{pat_id}".replace( + "{pat_id}", + encodeURIComponent(String(patId)), ); // Make Request Context @@ -919,20 +919,20 @@ export class KeyManagementApiRequestFactory extends BaseAPIRequestFactory { } public async revokePersonalAccessToken( - patUuid: string, + patId: string, _options?: Configuration, ): Promise { const _config = _options || this.configuration; - // verify required parameter 'patUuid' is not null or undefined - if (patUuid === null || patUuid === undefined) { - throw new RequiredError("patUuid", "revokePersonalAccessToken"); + // verify required parameter 'patId' is not null or undefined + if (patId === null || patId === undefined) { + throw new RequiredError("patId", "revokePersonalAccessToken"); } // Path Params - const localVarPath = "/api/v2/personal_access_tokens/{pat_uuid}".replace( - "{pat_uuid}", - encodeURIComponent(String(patUuid)), + const localVarPath = "/api/v2/personal_access_tokens/{pat_id}".replace( + "{pat_id}", + encodeURIComponent(String(patId)), ); // Make Request Context @@ -1141,15 +1141,15 @@ export class KeyManagementApiRequestFactory extends BaseAPIRequestFactory { } public async updatePersonalAccessToken( - patUuid: string, + patId: string, body: PersonalAccessTokenUpdateRequest, _options?: Configuration, ): Promise { const _config = _options || this.configuration; - // verify required parameter 'patUuid' is not null or undefined - if (patUuid === null || patUuid === undefined) { - throw new RequiredError("patUuid", "updatePersonalAccessToken"); + // verify required parameter 'patId' is not null or undefined + if (patId === null || patId === undefined) { + throw new RequiredError("patId", "updatePersonalAccessToken"); } // verify required parameter 'body' is not null or undefined @@ -1158,9 +1158,9 @@ export class KeyManagementApiRequestFactory extends BaseAPIRequestFactory { } // Path Params - const localVarPath = "/api/v2/personal_access_tokens/{pat_uuid}".replace( - "{pat_uuid}", - encodeURIComponent(String(patUuid)), + const localVarPath = "/api/v2/personal_access_tokens/{pat_id}".replace( + "{pat_id}", + encodeURIComponent(String(patId)), ); // Make Request Context @@ -2380,10 +2380,10 @@ export interface KeyManagementApiGetCurrentUserApplicationKeyRequest { export interface KeyManagementApiGetPersonalAccessTokenRequest { /** - * The UUID of the personal access token. + * The ID of the personal access token. * @type string */ - patUuid: string; + patId: string; } export interface KeyManagementApiListAPIKeysRequest { @@ -2558,10 +2558,10 @@ export interface KeyManagementApiListPersonalAccessTokensRequest { export interface KeyManagementApiRevokePersonalAccessTokenRequest { /** - * The UUID of the personal access token. + * The ID of the personal access token. * @type string */ - patUuid: string; + patId: string; } export interface KeyManagementApiUpdateAPIKeyRequest { @@ -2602,10 +2602,10 @@ export interface KeyManagementApiUpdateCurrentUserApplicationKeyRequest { export interface KeyManagementApiUpdatePersonalAccessTokenRequest { /** - * The UUID of the personal access token. + * The ID of the personal access token. * @type string */ - patUuid: string; + patId: string; /** * @type PersonalAccessTokenUpdateRequest */ @@ -2837,7 +2837,7 @@ export class KeyManagementApi { options?: Configuration, ): Promise { const requestContextPromise = this.requestFactory.getPersonalAccessToken( - param.patUuid, + param.patId, options, ); return requestContextPromise.then((requestContext) => { @@ -2973,7 +2973,7 @@ export class KeyManagementApi { options?: Configuration, ): Promise { const requestContextPromise = this.requestFactory.revokePersonalAccessToken( - param.patUuid, + param.patId, options, ); return requestContextPromise.then((requestContext) => { @@ -3066,7 +3066,7 @@ export class KeyManagementApi { options?: Configuration, ): Promise { const requestContextPromise = this.requestFactory.updatePersonalAccessToken( - param.patUuid, + param.patId, param.body, options, ); diff --git a/services/key_management/src/v2/models/FullPersonalAccessTokenAttributes.ts b/services/key_management/src/v2/models/FullPersonalAccessTokenAttributes.ts index 7e7cc1e71890..ec576f5840a0 100644 --- a/services/key_management/src/v2/models/FullPersonalAccessTokenAttributes.ts +++ b/services/key_management/src/v2/models/FullPersonalAccessTokenAttributes.ts @@ -4,10 +4,6 @@ import { AttributeTypeMap } from "@datadog/datadog-api-client"; * Attributes of a full personal access token, including the token key. */ export class FullPersonalAccessTokenAttributes { - /** - * The alias (short identifier) of the personal access token. - */ - "alias"?: string; /** * Creation date of the personal access token. */ @@ -47,10 +43,6 @@ export class FullPersonalAccessTokenAttributes { * @ignore */ static readonly attributeTypeMap: AttributeTypeMap = { - alias: { - baseName: "alias", - type: "string", - }, createdAt: { baseName: "created_at", type: "Date", diff --git a/services/key_management/src/v2/models/PersonalAccessTokenAttributes.ts b/services/key_management/src/v2/models/PersonalAccessTokenAttributes.ts index 86af80153092..36a824f87ed0 100644 --- a/services/key_management/src/v2/models/PersonalAccessTokenAttributes.ts +++ b/services/key_management/src/v2/models/PersonalAccessTokenAttributes.ts @@ -4,10 +4,6 @@ import { AttributeTypeMap } from "@datadog/datadog-api-client"; * Attributes of a personal access token. */ export class PersonalAccessTokenAttributes { - /** - * The alias (short identifier) of the personal access token. - */ - "alias"?: string; /** * Creation date of the personal access token. */ @@ -51,10 +47,6 @@ export class PersonalAccessTokenAttributes { * @ignore */ static readonly attributeTypeMap: AttributeTypeMap = { - alias: { - baseName: "alias", - type: "string", - }, createdAt: { baseName: "created_at", type: "Date", diff --git a/services/key_management/src/v2/models/UserAttributes.ts b/services/key_management/src/v2/models/UserAttributes.ts index 44cbbbb41b98..6d239559f02f 100644 --- a/services/key_management/src/v2/models/UserAttributes.ts +++ b/services/key_management/src/v2/models/UserAttributes.ts @@ -52,6 +52,10 @@ export class UserAttributes { * Title of the user. */ "title"?: string; + /** + * UUID of the user. + */ + "uuid"?: string; /** * Whether the user is verified. */ @@ -122,6 +126,10 @@ export class UserAttributes { baseName: "title", type: "string", }, + uuid: { + baseName: "uuid", + type: "string", + }, verified: { baseName: "verified", type: "boolean", diff --git a/services/monitors/src/v2/models/UserAttributes.ts b/services/monitors/src/v2/models/UserAttributes.ts index 44cbbbb41b98..6d239559f02f 100644 --- a/services/monitors/src/v2/models/UserAttributes.ts +++ b/services/monitors/src/v2/models/UserAttributes.ts @@ -52,6 +52,10 @@ export class UserAttributes { * Title of the user. */ "title"?: string; + /** + * UUID of the user. + */ + "uuid"?: string; /** * Whether the user is verified. */ @@ -122,6 +126,10 @@ export class UserAttributes { baseName: "title", type: "string", }, + uuid: { + baseName: "uuid", + type: "string", + }, verified: { baseName: "verified", type: "boolean", diff --git a/services/on_call/src/v2/models/UserAttributes.ts b/services/on_call/src/v2/models/UserAttributes.ts index 44cbbbb41b98..6d239559f02f 100644 --- a/services/on_call/src/v2/models/UserAttributes.ts +++ b/services/on_call/src/v2/models/UserAttributes.ts @@ -52,6 +52,10 @@ export class UserAttributes { * Title of the user. */ "title"?: string; + /** + * UUID of the user. + */ + "uuid"?: string; /** * Whether the user is verified. */ @@ -122,6 +126,10 @@ export class UserAttributes { baseName: "title", type: "string", }, + uuid: { + baseName: "uuid", + type: "string", + }, verified: { baseName: "verified", type: "boolean", diff --git a/services/powerpack/src/v2/models/UserAttributes.ts b/services/powerpack/src/v2/models/UserAttributes.ts index 44cbbbb41b98..6d239559f02f 100644 --- a/services/powerpack/src/v2/models/UserAttributes.ts +++ b/services/powerpack/src/v2/models/UserAttributes.ts @@ -52,6 +52,10 @@ export class UserAttributes { * Title of the user. */ "title"?: string; + /** + * UUID of the user. + */ + "uuid"?: string; /** * Whether the user is verified. */ @@ -122,6 +126,10 @@ export class UserAttributes { baseName: "title", type: "string", }, + uuid: { + baseName: "uuid", + type: "string", + }, verified: { baseName: "verified", type: "boolean", diff --git a/services/roles/src/v2/models/UserAttributes.ts b/services/roles/src/v2/models/UserAttributes.ts index 44cbbbb41b98..6d239559f02f 100644 --- a/services/roles/src/v2/models/UserAttributes.ts +++ b/services/roles/src/v2/models/UserAttributes.ts @@ -52,6 +52,10 @@ export class UserAttributes { * Title of the user. */ "title"?: string; + /** + * UUID of the user. + */ + "uuid"?: string; /** * Whether the user is verified. */ @@ -122,6 +126,10 @@ export class UserAttributes { baseName: "title", type: "string", }, + uuid: { + baseName: "uuid", + type: "string", + }, verified: { baseName: "verified", type: "boolean", diff --git a/services/security_monitoring/src/v2/SecurityMonitoringApi.ts b/services/security_monitoring/src/v2/SecurityMonitoringApi.ts index 6a9fe063a870..4ef9e054f591 100644 --- a/services/security_monitoring/src/v2/SecurityMonitoringApi.ts +++ b/services/security_monitoring/src/v2/SecurityMonitoringApi.ts @@ -193,6 +193,7 @@ export class SecurityMonitoringApiRequestFactory extends BaseAPIRequestFactory { applySecurityAuthentication(_config, requestContext, [ "apiKeyAuth", "appKeyAuth", + "AuthZ", ]); return requestContext; @@ -1444,6 +1445,7 @@ export class SecurityMonitoringApiRequestFactory extends BaseAPIRequestFactory { applySecurityAuthentication(_config, requestContext, [ "apiKeyAuth", "appKeyAuth", + "AuthZ", ]); return requestContext; @@ -2258,6 +2260,7 @@ export class SecurityMonitoringApiRequestFactory extends BaseAPIRequestFactory { applySecurityAuthentication(_config, requestContext, [ "apiKeyAuth", "appKeyAuth", + "AuthZ", ]); return requestContext; @@ -12098,7 +12101,7 @@ export class SecurityMonitoringApiResponseProcessor { export interface SecurityMonitoringApiActivateContentPackRequest { /** - * The ID of the content pack to activate. + * The ID of the content pack to activate (for example, `aws-cloudtrail`). * @type string */ contentPackId: string; @@ -12282,7 +12285,7 @@ export interface SecurityMonitoringApiCreateVulnerabilityNotificationRuleRequest export interface SecurityMonitoringApiDeactivateContentPackRequest { /** - * The ID of the content pack to deactivate. + * The ID of the content pack to deactivate (for example, `aws-cloudtrail`). * @type string */ contentPackId: string; @@ -13540,7 +13543,7 @@ export class SecurityMonitoringApi { } /** - * Activate a security monitoring content pack. This operation configures the necessary + * Activate a Cloud SIEM content pack. This operation configures the necessary * log filters or security filters depending on the pricing model and updates the content * pack activation state. * @param param The request object @@ -14071,7 +14074,7 @@ export class SecurityMonitoringApi { } /** - * Deactivate a security monitoring content pack. This operation removes the content pack's + * Deactivate a Cloud SIEM content pack. This operation removes the content pack's * configuration from log filters or security filters and updates the content pack activation state. * @param param The request object */ @@ -14420,9 +14423,8 @@ export class SecurityMonitoringApi { } /** - * Get the activation and configuration states for all security monitoring content packs. - * This endpoint returns status information about each content pack including activation state, - * integration status, and log collection status. + * Get the activation state, integration status, and log collection status + * for all Cloud SIEM content packs. * @param param The request object */ public getContentPacksStates( diff --git a/services/security_monitoring/src/v2/models/SecurityMonitoringContentPackActivation.ts b/services/security_monitoring/src/v2/models/SecurityMonitoringContentPackActivation.ts index 1e2edb794932..59125c6f7cbf 100644 --- a/services/security_monitoring/src/v2/models/SecurityMonitoringContentPackActivation.ts +++ b/services/security_monitoring/src/v2/models/SecurityMonitoringContentPackActivation.ts @@ -1,7 +1,7 @@ import { UnparsedObject } from "@datadog/datadog-api-client"; /** - * The activation status of a content pack + * The activation status of a content pack. */ export type SecurityMonitoringContentPackActivation = | typeof NEVER_ACTIVATED diff --git a/services/security_monitoring/src/v2/models/SecurityMonitoringContentPackIntegrationStatus.ts b/services/security_monitoring/src/v2/models/SecurityMonitoringContentPackIntegrationStatus.ts index 78d8d0f08144..feadc6a653e7 100644 --- a/services/security_monitoring/src/v2/models/SecurityMonitoringContentPackIntegrationStatus.ts +++ b/services/security_monitoring/src/v2/models/SecurityMonitoringContentPackIntegrationStatus.ts @@ -1,7 +1,7 @@ import { UnparsedObject } from "@datadog/datadog-api-client"; /** - * The installation status of the related integration + * The installation status of the related integration. */ export type SecurityMonitoringContentPackIntegrationStatus = | typeof INSTALLED diff --git a/services/security_monitoring/src/v2/models/SecurityMonitoringContentPackStateAttributes.ts b/services/security_monitoring/src/v2/models/SecurityMonitoringContentPackStateAttributes.ts index 0536899e9be2..bc1c618c9a7d 100644 --- a/services/security_monitoring/src/v2/models/SecurityMonitoringContentPackStateAttributes.ts +++ b/services/security_monitoring/src/v2/models/SecurityMonitoringContentPackStateAttributes.ts @@ -14,27 +14,28 @@ export class SecurityMonitoringContentPackStateAttributes { */ "cloudSiemIndexIncorrect": boolean; /** - * The activation status of a content pack + * The activation status of a content pack. */ "cpActivation": SecurityMonitoringContentPackActivation; /** - * Whether filters (Security Filters or Index Query depending on the pricing model) are configured for logs + * Whether filters (Security Filters or Index Query depending on the pricing model) are + * present and correctly configured to route logs into Cloud SIEM. */ "filtersConfiguredForLogs": boolean; /** - * The installation status of the related integration + * The installation status of the related integration. */ "integrationInstalledStatus"?: SecurityMonitoringContentPackIntegrationStatus; /** - * Timestamp bucket indicating when logs were last collected + * Timestamp bucket indicating when logs were last collected. */ "logsLastCollected": SecurityMonitoringContentPackTimestampBucket; /** - * Whether logs have been seen from any index + * Whether logs for this content pack have been seen in any Datadog index within the last 72 hours. */ "logsSeenFromAnyIndex": boolean; /** - * The current status of a content pack + * The current operational status of a content pack. */ "state": SecurityMonitoringContentPackStatus; /** diff --git a/services/security_monitoring/src/v2/models/SecurityMonitoringContentPackStateMeta.ts b/services/security_monitoring/src/v2/models/SecurityMonitoringContentPackStateMeta.ts index c6b062a1b486..f64853c43097 100644 --- a/services/security_monitoring/src/v2/models/SecurityMonitoringContentPackStateMeta.ts +++ b/services/security_monitoring/src/v2/models/SecurityMonitoringContentPackStateMeta.ts @@ -11,7 +11,7 @@ export class SecurityMonitoringContentPackStateMeta { */ "cloudSiemIndexIncorrect": boolean; /** - * The SIEM pricing model (SKU) for the organization + * The Cloud SIEM pricing model (SKU) for the organization. */ "sku": SecurityMonitoringSKU; /** diff --git a/services/security_monitoring/src/v2/models/SecurityMonitoringContentPackStatus.ts b/services/security_monitoring/src/v2/models/SecurityMonitoringContentPackStatus.ts index ad35f1c523eb..da1e91e5dce9 100644 --- a/services/security_monitoring/src/v2/models/SecurityMonitoringContentPackStatus.ts +++ b/services/security_monitoring/src/v2/models/SecurityMonitoringContentPackStatus.ts @@ -1,7 +1,7 @@ import { UnparsedObject } from "@datadog/datadog-api-client"; /** - * The current status of a content pack + * The current operational status of a content pack. */ export type SecurityMonitoringContentPackStatus = | typeof INSTALL diff --git a/services/security_monitoring/src/v2/models/SecurityMonitoringContentPackTimestampBucket.ts b/services/security_monitoring/src/v2/models/SecurityMonitoringContentPackTimestampBucket.ts index 95b2aa81b659..83f6d2b8dca1 100644 --- a/services/security_monitoring/src/v2/models/SecurityMonitoringContentPackTimestampBucket.ts +++ b/services/security_monitoring/src/v2/models/SecurityMonitoringContentPackTimestampBucket.ts @@ -1,7 +1,7 @@ import { UnparsedObject } from "@datadog/datadog-api-client"; /** - * Timestamp bucket indicating when logs were last collected + * Timestamp bucket indicating when logs were last collected. */ export type SecurityMonitoringContentPackTimestampBucket = | typeof NOT_SEEN diff --git a/services/security_monitoring/src/v2/models/SecurityMonitoringSKU.ts b/services/security_monitoring/src/v2/models/SecurityMonitoringSKU.ts index ad08a6d0fb2b..4d6205df8642 100644 --- a/services/security_monitoring/src/v2/models/SecurityMonitoringSKU.ts +++ b/services/security_monitoring/src/v2/models/SecurityMonitoringSKU.ts @@ -1,7 +1,7 @@ import { UnparsedObject } from "@datadog/datadog-api-client"; /** - * The SIEM pricing model (SKU) for the organization + * The Cloud SIEM pricing model (SKU) for the organization. */ export type SecurityMonitoringSKU = | typeof PER_GB_ANALYZED diff --git a/services/service_accounts/src/v2/ServiceAccountsApi.ts b/services/service_accounts/src/v2/ServiceAccountsApi.ts index a5943f03ceb2..c773993d6ec9 100644 --- a/services/service_accounts/src/v2/ServiceAccountsApi.ts +++ b/services/service_accounts/src/v2/ServiceAccountsApi.ts @@ -282,7 +282,7 @@ export class ServiceAccountsApiRequestFactory extends BaseAPIRequestFactory { public async getServiceAccountAccessToken( serviceAccountId: string, - patUuid: string, + patId: string, _options?: Configuration, ): Promise { const _config = _options || this.configuration; @@ -295,19 +295,19 @@ export class ServiceAccountsApiRequestFactory extends BaseAPIRequestFactory { ); } - // verify required parameter 'patUuid' is not null or undefined - if (patUuid === null || patUuid === undefined) { - throw new RequiredError("patUuid", "getServiceAccountAccessToken"); + // verify required parameter 'patId' is not null or undefined + if (patId === null || patId === undefined) { + throw new RequiredError("patId", "getServiceAccountAccessToken"); } // Path Params const localVarPath = - "/api/v2/service_accounts/{service_account_id}/access_tokens/{pat_uuid}" + "/api/v2/service_accounts/{service_account_id}/access_tokens/{pat_id}" .replace( "{service_account_id}", encodeURIComponent(String(serviceAccountId)), ) - .replace("{pat_uuid}", encodeURIComponent(String(patUuid))); + .replace("{pat_id}", encodeURIComponent(String(patId))); // Make Request Context const { server, overrides } = _config.getServerAndOverrides( @@ -574,7 +574,7 @@ export class ServiceAccountsApiRequestFactory extends BaseAPIRequestFactory { public async revokeServiceAccountAccessToken( serviceAccountId: string, - patUuid: string, + patId: string, _options?: Configuration, ): Promise { const _config = _options || this.configuration; @@ -587,19 +587,19 @@ export class ServiceAccountsApiRequestFactory extends BaseAPIRequestFactory { ); } - // verify required parameter 'patUuid' is not null or undefined - if (patUuid === null || patUuid === undefined) { - throw new RequiredError("patUuid", "revokeServiceAccountAccessToken"); + // verify required parameter 'patId' is not null or undefined + if (patId === null || patId === undefined) { + throw new RequiredError("patId", "revokeServiceAccountAccessToken"); } // Path Params const localVarPath = - "/api/v2/service_accounts/{service_account_id}/access_tokens/{pat_uuid}" + "/api/v2/service_accounts/{service_account_id}/access_tokens/{pat_id}" .replace( "{service_account_id}", encodeURIComponent(String(serviceAccountId)), ) - .replace("{pat_uuid}", encodeURIComponent(String(patUuid))); + .replace("{pat_id}", encodeURIComponent(String(patId))); // Make Request Context const { server, overrides } = _config.getServerAndOverrides( @@ -630,7 +630,7 @@ export class ServiceAccountsApiRequestFactory extends BaseAPIRequestFactory { public async updateServiceAccountAccessToken( serviceAccountId: string, - patUuid: string, + patId: string, body: PersonalAccessTokenUpdateRequest, _options?: Configuration, ): Promise { @@ -644,9 +644,9 @@ export class ServiceAccountsApiRequestFactory extends BaseAPIRequestFactory { ); } - // verify required parameter 'patUuid' is not null or undefined - if (patUuid === null || patUuid === undefined) { - throw new RequiredError("patUuid", "updateServiceAccountAccessToken"); + // verify required parameter 'patId' is not null or undefined + if (patId === null || patId === undefined) { + throw new RequiredError("patId", "updateServiceAccountAccessToken"); } // verify required parameter 'body' is not null or undefined @@ -656,12 +656,12 @@ export class ServiceAccountsApiRequestFactory extends BaseAPIRequestFactory { // Path Params const localVarPath = - "/api/v2/service_accounts/{service_account_id}/access_tokens/{pat_uuid}" + "/api/v2/service_accounts/{service_account_id}/access_tokens/{pat_id}" .replace( "{service_account_id}", encodeURIComponent(String(serviceAccountId)), ) - .replace("{pat_uuid}", encodeURIComponent(String(patUuid))); + .replace("{pat_id}", encodeURIComponent(String(patId))); // Make Request Context const { server, overrides } = _config.getServerAndOverrides( @@ -1467,10 +1467,10 @@ export interface ServiceAccountsApiGetServiceAccountAccessTokenRequest { */ serviceAccountId: string; /** - * The UUID of the personal access token. + * The ID of the personal access token. * @type string */ - patUuid: string; + patId: string; } export interface ServiceAccountsApiGetServiceAccountApplicationKeyRequest { @@ -1563,10 +1563,10 @@ export interface ServiceAccountsApiRevokeServiceAccountAccessTokenRequest { */ serviceAccountId: string; /** - * The UUID of the personal access token. + * The ID of the personal access token. * @type string */ - patUuid: string; + patId: string; } export interface ServiceAccountsApiUpdateServiceAccountAccessTokenRequest { @@ -1576,10 +1576,10 @@ export interface ServiceAccountsApiUpdateServiceAccountAccessTokenRequest { */ serviceAccountId: string; /** - * The UUID of the personal access token. + * The ID of the personal access token. * @type string */ - patUuid: string; + patId: string; /** * @type PersonalAccessTokenUpdateRequest */ @@ -1730,7 +1730,7 @@ export class ServiceAccountsApi { const requestContextPromise = this.requestFactory.getServiceAccountAccessToken( param.serviceAccountId, - param.patUuid, + param.patId, options, ); return requestContextPromise.then((requestContext) => { @@ -1838,7 +1838,7 @@ export class ServiceAccountsApi { const requestContextPromise = this.requestFactory.revokeServiceAccountAccessToken( param.serviceAccountId, - param.patUuid, + param.patId, options, ); return requestContextPromise.then((requestContext) => { @@ -1863,7 +1863,7 @@ export class ServiceAccountsApi { const requestContextPromise = this.requestFactory.updateServiceAccountAccessToken( param.serviceAccountId, - param.patUuid, + param.patId, param.body, options, ); diff --git a/services/service_accounts/src/v2/models/FullPersonalAccessTokenAttributes.ts b/services/service_accounts/src/v2/models/FullPersonalAccessTokenAttributes.ts index 7e7cc1e71890..ec576f5840a0 100644 --- a/services/service_accounts/src/v2/models/FullPersonalAccessTokenAttributes.ts +++ b/services/service_accounts/src/v2/models/FullPersonalAccessTokenAttributes.ts @@ -4,10 +4,6 @@ import { AttributeTypeMap } from "@datadog/datadog-api-client"; * Attributes of a full personal access token, including the token key. */ export class FullPersonalAccessTokenAttributes { - /** - * The alias (short identifier) of the personal access token. - */ - "alias"?: string; /** * Creation date of the personal access token. */ @@ -47,10 +43,6 @@ export class FullPersonalAccessTokenAttributes { * @ignore */ static readonly attributeTypeMap: AttributeTypeMap = { - alias: { - baseName: "alias", - type: "string", - }, createdAt: { baseName: "created_at", type: "Date", diff --git a/services/service_accounts/src/v2/models/PersonalAccessTokenAttributes.ts b/services/service_accounts/src/v2/models/PersonalAccessTokenAttributes.ts index 86af80153092..36a824f87ed0 100644 --- a/services/service_accounts/src/v2/models/PersonalAccessTokenAttributes.ts +++ b/services/service_accounts/src/v2/models/PersonalAccessTokenAttributes.ts @@ -4,10 +4,6 @@ import { AttributeTypeMap } from "@datadog/datadog-api-client"; * Attributes of a personal access token. */ export class PersonalAccessTokenAttributes { - /** - * The alias (short identifier) of the personal access token. - */ - "alias"?: string; /** * Creation date of the personal access token. */ @@ -51,10 +47,6 @@ export class PersonalAccessTokenAttributes { * @ignore */ static readonly attributeTypeMap: AttributeTypeMap = { - alias: { - baseName: "alias", - type: "string", - }, createdAt: { baseName: "created_at", type: "Date", diff --git a/services/service_accounts/src/v2/models/UserAttributes.ts b/services/service_accounts/src/v2/models/UserAttributes.ts index 44cbbbb41b98..6d239559f02f 100644 --- a/services/service_accounts/src/v2/models/UserAttributes.ts +++ b/services/service_accounts/src/v2/models/UserAttributes.ts @@ -52,6 +52,10 @@ export class UserAttributes { * Title of the user. */ "title"?: string; + /** + * UUID of the user. + */ + "uuid"?: string; /** * Whether the user is verified. */ @@ -122,6 +126,10 @@ export class UserAttributes { baseName: "title", type: "string", }, + uuid: { + baseName: "uuid", + type: "string", + }, verified: { baseName: "verified", type: "boolean", diff --git a/services/teams/src/v2/models/UserAttributes.ts b/services/teams/src/v2/models/UserAttributes.ts index 44cbbbb41b98..6d239559f02f 100644 --- a/services/teams/src/v2/models/UserAttributes.ts +++ b/services/teams/src/v2/models/UserAttributes.ts @@ -52,6 +52,10 @@ export class UserAttributes { * Title of the user. */ "title"?: string; + /** + * UUID of the user. + */ + "uuid"?: string; /** * Whether the user is verified. */ @@ -122,6 +126,10 @@ export class UserAttributes { baseName: "title", type: "string", }, + uuid: { + baseName: "uuid", + type: "string", + }, verified: { baseName: "verified", type: "boolean", diff --git a/services/users/src/v2/models/UserAttributes.ts b/services/users/src/v2/models/UserAttributes.ts index 44cbbbb41b98..6d239559f02f 100644 --- a/services/users/src/v2/models/UserAttributes.ts +++ b/services/users/src/v2/models/UserAttributes.ts @@ -52,6 +52,10 @@ export class UserAttributes { * Title of the user. */ "title"?: string; + /** + * UUID of the user. + */ + "uuid"?: string; /** * Whether the user is verified. */ @@ -122,6 +126,10 @@ export class UserAttributes { baseName: "title", type: "string", }, + uuid: { + baseName: "uuid", + type: "string", + }, verified: { baseName: "verified", type: "boolean",