From b7b785f77e4d88abae979c96ccd5a5266fc12b29 Mon Sep 17 00:00:00 2001 From: "ci.datadog-api-spec" Date: Wed, 18 Dec 2024 15:54:10 +0000 Subject: [PATCH] Regenerate client from commit dabda1fa of spec repo --- .apigentools-info | 8 +- config/_default/menus/api.en.yaml | 16 + .../api/latest/agentless-scanning/_index.md | 3 + .../en/api/v2/agentless-scanning/_index.md | 4 + .../api/v2/agentless-scanning/examples.json | 44 +++ content/en/api/v2/apps/request.CreateApp.json | 55 ++++ .../en/api/v2/apps/request.DeleteApps.json | 8 + content/en/api/v2/apps/request.UpdateApp.json | 10 + data/api/v2/CodeExamples.json | 21 ++ data/api/v2/full_spec.yaml | 77 +++++ data/api/v2/full_spec_deref.json | 288 ++++++++++++++++++ data/api/v2/translate_actions.json | 4 + data/api/v2/translate_tags.json | 4 + static/resources/json/full_spec_v2.json | 288 ++++++++++++++++++ 14 files changed, 826 insertions(+), 4 deletions(-) create mode 100644 content/en/api/latest/agentless-scanning/_index.md create mode 100644 content/en/api/v2/agentless-scanning/_index.md create mode 100644 content/en/api/v2/agentless-scanning/examples.json create mode 100644 content/en/api/v2/apps/request.CreateApp.json create mode 100644 content/en/api/v2/apps/request.DeleteApps.json create mode 100644 content/en/api/v2/apps/request.UpdateApp.json diff --git a/.apigentools-info b/.apigentools-info index 711e299634cd9..32c4088222c06 100644 --- a/.apigentools-info +++ b/.apigentools-info @@ -4,13 +4,13 @@ "spec_versions": { "v1": { "apigentools_version": "1.6.6", - "regenerated": "2024-12-17 09:00:58.142334", - "spec_repo_commit": "88ba4c60" + "regenerated": "2024-12-18 15:53:52.638134", + "spec_repo_commit": "dabda1fa" }, "v2": { "apigentools_version": "1.6.6", - "regenerated": "2024-12-17 09:01:05.974466", - "spec_repo_commit": "88ba4c60" + "regenerated": "2024-12-18 15:54:00.716606", + "spec_repo_commit": "dabda1fa" } } } \ No newline at end of file diff --git a/config/_default/menus/api.en.yaml b/config/_default/menus/api.en.yaml index 87f11e69a7abc..67410b80dcd00 100644 --- a/config/_default/menus/api.en.yaml +++ b/config/_default/menus/api.en.yaml @@ -4503,6 +4503,22 @@ menu: - ListApmRetentionFilters unstable: [] order: 1 + - name: Agentless Scanning + url: /api/latest/agentless-scanning/ + identifier: agentless-scanning + generated: true + - name: Get AWS Scan Options + url: '#get-aws-scan-options' + identifier: agentless-scanning-get-aws-scan-options + parent: agentless-scanning + generated: true + params: + versions: + - v2 + operationids: + - ListAwsScanOptions + unstable: [] + order: 3 - name: Audit url: /api/latest/audit/ identifier: audit diff --git a/content/en/api/latest/agentless-scanning/_index.md b/content/en/api/latest/agentless-scanning/_index.md new file mode 100644 index 0000000000000..24fe396979c17 --- /dev/null +++ b/content/en/api/latest/agentless-scanning/_index.md @@ -0,0 +1,3 @@ +--- +title: Agentless Scanning +--- diff --git a/content/en/api/v2/agentless-scanning/_index.md b/content/en/api/v2/agentless-scanning/_index.md new file mode 100644 index 0000000000000..ec1b1b73b89fe --- /dev/null +++ b/content/en/api/v2/agentless-scanning/_index.md @@ -0,0 +1,4 @@ +--- +title: Agentless Scanning +headless: true +--- diff --git a/content/en/api/v2/agentless-scanning/examples.json b/content/en/api/v2/agentless-scanning/examples.json new file mode 100644 index 0000000000000..17ee84caa423a --- /dev/null +++ b/content/en/api/v2/agentless-scanning/examples.json @@ -0,0 +1,44 @@ +{ + "ListAwsScanOptions": { + "responses": { + "200": { + "json": { + "data": [ + { + "attributes": { + "lambda": true, + "sensitive_data": false, + "vuln_containers_os": true, + "vuln_host_os": true + }, + "id": "184366314700", + "type": "aws_scan_options" + } + ] + }, + "html": "
\n
\n
\n
\n

data

\n
\n

[object]

\n

A list of AWS scan options.

\n
\n
\n
\n
\n
\n

attributes

\n
\n

object

\n

Attributes for the AWS scan options.

\n
\n
\n
\n
\n
\n

lambda

\n
\n

boolean

\n

Indicates if scanning of Lambda functions is enabled.

\n
\n \n
\n
\n
\n
\n
\n

sensitive_data

\n
\n

boolean

\n

Indicates if scanning for sensitive data is enabled.

\n
\n \n
\n
\n
\n
\n
\n

vuln_containers_os

\n
\n

boolean

\n

Indicates if scanning for vulnerabilities in containers is enabled.

\n
\n \n
\n
\n
\n
\n
\n

vuln_host_os

\n
\n

boolean

\n

Indicates if scanning for vulnerabilities in hosts is enabled.

\n
\n \n
\n
\n
\n
\n
\n
\n
\n

id

\n
\n

string

\n

The ID of the AWS account.

\n
\n \n
\n
\n
\n
\n
\n

type

\n
\n

enum

\n

The type of the resource. The value should always be aws_scan_options. \nAllowed enum values: aws_scan_options

default: aws_scan_options

\n
\n \n
\n
\n
\n
" + }, + "403": { + "json": { + "errors": [ + "Bad Request" + ] + }, + "html": "
\n
\n
\n
\n

errors [required]

\n
\n

[string]

\n

A list of errors.

\n
\n \n
\n
" + }, + "429": { + "json": { + "errors": [ + "Bad Request" + ] + }, + "html": "
\n
\n
\n
\n

errors [required]

\n
\n

[string]

\n

A list of errors.

\n
\n \n
\n
" + } + }, + "request": { + "json_curl": {}, + "json": {}, + "html": "" + } + } +} \ No newline at end of file diff --git a/content/en/api/v2/apps/request.CreateApp.json b/content/en/api/v2/apps/request.CreateApp.json new file mode 100644 index 0000000000000..4b03f3668b0c7 --- /dev/null +++ b/content/en/api/v2/apps/request.CreateApp.json @@ -0,0 +1,55 @@ +{ + "data": { + "attributes": { + "components": [ + { + "events": [], + "name": "grid0", + "properties": { + "children": [ + { + "events": [], + "name": "gridCell0", + "properties": { + "children": [ + { + "events": [], + "name": "calloutValue0", + "properties": { + "isVisible": true, + "isDisabled": false, + "isLoading": false, + "label": "CPU Usage", + "size": "sm", + "style": "vivid_yellow", + "unit": "kB", + "value": "42" + }, + "type": "calloutValue" + } + ], + "isVisible": "true", + "layout": { + "default": { + "height": 8, + "width": 2, + "x": 0, + "y": 0 + } + } + }, + "type": "gridCell" + } + ] + }, + "type": "grid" + } + ], + "description": "This is a simple example app", + "embeddedQueries": [], + "name": "Example App", + "rootInstanceName": "grid0" + }, + "type": "appDefinitions" + } +} \ No newline at end of file diff --git a/content/en/api/v2/apps/request.DeleteApps.json b/content/en/api/v2/apps/request.DeleteApps.json new file mode 100644 index 0000000000000..b2b217531ecb4 --- /dev/null +++ b/content/en/api/v2/apps/request.DeleteApps.json @@ -0,0 +1,8 @@ +{ + "data": [ + { + "id": "", + "type": "appDefinitions" + } + ] +} \ No newline at end of file diff --git a/content/en/api/v2/apps/request.UpdateApp.json b/content/en/api/v2/apps/request.UpdateApp.json new file mode 100644 index 0000000000000..517d27d656ca7 --- /dev/null +++ b/content/en/api/v2/apps/request.UpdateApp.json @@ -0,0 +1,10 @@ +{ + "data": { + "attributes": { + "name": "Updated Name", + "rootInstanceName": "grid0" + }, + "id": "", + "type": "appDefinitions" + } +} \ No newline at end of file diff --git a/data/api/v2/CodeExamples.json b/data/api/v2/CodeExamples.json index b47ac3e90e714..3d8a7984b6ebd 100644 --- a/data/api/v2/CodeExamples.json +++ b/data/api/v2/CodeExamples.json @@ -39,6 +39,27 @@ "description": "Update an AWS integration returns \"AWS Account object\" response" } ], + "CreateApp": [ + { + "group": "apps", + "suffix": "", + "description": "Create App returns \"App Created\" response" + } + ], + "DeleteApps": [ + { + "group": "apps", + "suffix": "", + "description": "Delete Multiple Apps returns \"OK\" response" + } + ], + "UpdateApp": [ + { + "group": "apps", + "suffix": "", + "description": "Update App returns \"OK\" response" + } + ], "SearchAuditLogs": [ { "group": "audit", diff --git a/data/api/v2/full_spec.yaml b/data/api/v2/full_spec.yaml index 7687ecdfb26eb..e24bca44117f3 100644 --- a/data/api/v2/full_spec.yaml +++ b/data/api/v2/full_spec.yaml @@ -2525,6 +2525,57 @@ components: $ref: '#/components/schemas/AwsCURConfig' type: array type: object + AwsScanOptionsAttributes: + description: Attributes for the AWS scan options. + properties: + lambda: + description: Indicates if scanning of Lambda functions is enabled. + example: true + type: boolean + sensitive_data: + description: Indicates if scanning for sensitive data is enabled. + example: false + type: boolean + vuln_containers_os: + description: Indicates if scanning for vulnerabilities in containers is + enabled. + example: true + type: boolean + vuln_host_os: + description: Indicates if scanning for vulnerabilities in hosts is enabled. + example: true + type: boolean + type: object + AwsScanOptionsData: + description: Single AWS Scan Options entry. + properties: + attributes: + $ref: '#/components/schemas/AwsScanOptionsAttributes' + id: + description: The ID of the AWS account. + example: '184366314700' + type: string + type: + $ref: '#/components/schemas/AwsScanOptionsType' + type: object + AwsScanOptionsResponse: + description: Response object that includes a list of AWS scan options. + properties: + data: + description: A list of AWS scan options. + items: + $ref: '#/components/schemas/AwsScanOptionsData' + type: array + type: object + AwsScanOptionsType: + default: aws_scan_options + description: The type of the resource. The value should always be `aws_scan_options`. + enum: + - aws_scan_options + example: aws_scan_options + type: string + x-enum-varnames: + - AWS_SCAN_OPTIONS AzureUCConfig: description: Azure config. properties: @@ -28696,6 +28747,27 @@ info: version: '1.0' openapi: 3.0.0 paths: + /api/v2/agentless_scanning/accounts/aws: + get: + description: Fetches the scan options configured for AWS accounts. + operationId: ListAwsScanOptions + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/AwsScanOptionsResponse' + description: OK + '403': + $ref: '#/components/responses/NotAuthorizedResponse' + '429': + $ref: '#/components/responses/TooManyRequestsResponse' + summary: Get AWS Scan Options + tags: + - Agentless Scanning + x-menu-order: 3 + x-undo: + type: safe /api/v2/api_keys: get: description: List all API keys available for your account. @@ -48612,6 +48684,11 @@ tags: externalDocs: url: https://docs.datadoghq.com/integrations/amazon_web_services/#log-collection name: AWS Logs Integration +- description: "Datadog Agentless Scanning provides visibility into risks and vulnerabilities\nwithin + your hosts, running containers, and serverless functions\u2014all without\nrequiring + teams to install agents on every host or where agents cannot be installed.\nGo + to https://www.datadoghq.com/blog/agentless-scanning/ to learn more" + name: Agentless Scanning - description: Search your Audit Logs events over HTTP. name: Audit - description: '[The AuthN Mappings API](https://docs.datadoghq.com/account_management/authn_mapping/?tab=example) diff --git a/data/api/v2/full_spec_deref.json b/data/api/v2/full_spec_deref.json index 82eb162c266a1..a4a07a5b0d7d3 100644 --- a/data/api/v2/full_spec_deref.json +++ b/data/api/v2/full_spec_deref.json @@ -12868,6 +12868,152 @@ }, "type": "object" }, + "AwsScanOptionsAttributes": { + "description": "Attributes for the AWS scan options.", + "properties": { + "lambda": { + "description": "Indicates if scanning of Lambda functions is enabled.", + "example": true, + "type": "boolean" + }, + "sensitive_data": { + "description": "Indicates if scanning for sensitive data is enabled.", + "example": false, + "type": "boolean" + }, + "vuln_containers_os": { + "description": "Indicates if scanning for vulnerabilities in containers is enabled.", + "example": true, + "type": "boolean" + }, + "vuln_host_os": { + "description": "Indicates if scanning for vulnerabilities in hosts is enabled.", + "example": true, + "type": "boolean" + } + }, + "type": "object" + }, + "AwsScanOptionsData": { + "description": "Single AWS Scan Options entry.", + "properties": { + "attributes": { + "description": "Attributes for the AWS scan options.", + "properties": { + "lambda": { + "description": "Indicates if scanning of Lambda functions is enabled.", + "example": true, + "type": "boolean" + }, + "sensitive_data": { + "description": "Indicates if scanning for sensitive data is enabled.", + "example": false, + "type": "boolean" + }, + "vuln_containers_os": { + "description": "Indicates if scanning for vulnerabilities in containers is enabled.", + "example": true, + "type": "boolean" + }, + "vuln_host_os": { + "description": "Indicates if scanning for vulnerabilities in hosts is enabled.", + "example": true, + "type": "boolean" + } + }, + "type": "object" + }, + "id": { + "description": "The ID of the AWS account.", + "example": "184366314700", + "type": "string" + }, + "type": { + "default": "aws_scan_options", + "description": "The type of the resource. The value should always be `aws_scan_options`.", + "enum": [ + "aws_scan_options" + ], + "example": "aws_scan_options", + "type": "string", + "x-enum-varnames": [ + "AWS_SCAN_OPTIONS" + ] + } + }, + "type": "object" + }, + "AwsScanOptionsResponse": { + "description": "Response object that includes a list of AWS scan options.", + "properties": { + "data": { + "description": "A list of AWS scan options.", + "items": { + "description": "Single AWS Scan Options entry.", + "properties": { + "attributes": { + "description": "Attributes for the AWS scan options.", + "properties": { + "lambda": { + "description": "Indicates if scanning of Lambda functions is enabled.", + "example": true, + "type": "boolean" + }, + "sensitive_data": { + "description": "Indicates if scanning for sensitive data is enabled.", + "example": false, + "type": "boolean" + }, + "vuln_containers_os": { + "description": "Indicates if scanning for vulnerabilities in containers is enabled.", + "example": true, + "type": "boolean" + }, + "vuln_host_os": { + "description": "Indicates if scanning for vulnerabilities in hosts is enabled.", + "example": true, + "type": "boolean" + } + }, + "type": "object" + }, + "id": { + "description": "The ID of the AWS account.", + "example": "184366314700", + "type": "string" + }, + "type": { + "default": "aws_scan_options", + "description": "The type of the resource. The value should always be `aws_scan_options`.", + "enum": [ + "aws_scan_options" + ], + "example": "aws_scan_options", + "type": "string", + "x-enum-varnames": [ + "AWS_SCAN_OPTIONS" + ] + } + }, + "type": "object" + }, + "type": "array" + } + }, + "type": "object" + }, + "AwsScanOptionsType": { + "default": "aws_scan_options", + "description": "The type of the resource. The value should always be `aws_scan_options`.", + "enum": [ + "aws_scan_options" + ], + "example": "aws_scan_options", + "type": "string", + "x-enum-varnames": [ + "AWS_SCAN_OPTIONS" + ] + }, "AzureUCConfig": { "description": "Azure config.", "properties": { @@ -187392,6 +187538,144 @@ }, "openapi": "3.0.0", "paths": { + "/api/v2/agentless_scanning/accounts/aws": { + "get": { + "description": "Fetches the scan options configured for AWS accounts.", + "operationId": "ListAwsScanOptions", + "responses": { + "200": { + "content": { + "application/json": { + "schema": { + "description": "Response object that includes a list of AWS scan options.", + "properties": { + "data": { + "description": "A list of AWS scan options.", + "items": { + "description": "Single AWS Scan Options entry.", + "properties": { + "attributes": { + "description": "Attributes for the AWS scan options.", + "properties": { + "lambda": { + "description": "Indicates if scanning of Lambda functions is enabled.", + "example": true, + "type": "boolean" + }, + "sensitive_data": { + "description": "Indicates if scanning for sensitive data is enabled.", + "example": false, + "type": "boolean" + }, + "vuln_containers_os": { + "description": "Indicates if scanning for vulnerabilities in containers is enabled.", + "example": true, + "type": "boolean" + }, + "vuln_host_os": { + "description": "Indicates if scanning for vulnerabilities in hosts is enabled.", + "example": true, + "type": "boolean" + } + }, + "type": "object" + }, + "id": { + "description": "The ID of the AWS account.", + "example": "184366314700", + "type": "string" + }, + "type": { + "default": "aws_scan_options", + "description": "The type of the resource. The value should always be `aws_scan_options`.", + "enum": [ + "aws_scan_options" + ], + "example": "aws_scan_options", + "type": "string", + "x-enum-varnames": [ + "AWS_SCAN_OPTIONS" + ] + } + }, + "type": "object" + }, + "type": "array" + } + }, + "type": "object" + } + } + }, + "description": "OK" + }, + "403": { + "content": { + "application/json": { + "schema": { + "description": "API error response.", + "properties": { + "errors": { + "description": "A list of errors.", + "example": [ + "Bad Request" + ], + "items": { + "description": "A list of items.", + "example": "Bad Request", + "type": "string" + }, + "type": "array" + } + }, + "required": [ + "errors" + ], + "type": "object" + } + } + }, + "description": "Not Authorized" + }, + "429": { + "content": { + "application/json": { + "schema": { + "description": "API error response.", + "properties": { + "errors": { + "description": "A list of errors.", + "example": [ + "Bad Request" + ], + "items": { + "description": "A list of items.", + "example": "Bad Request", + "type": "string" + }, + "type": "array" + } + }, + "required": [ + "errors" + ], + "type": "object" + } + } + }, + "description": "Too many requests" + } + }, + "summary": "Get AWS Scan Options", + "tags": [ + "Agentless Scanning" + ], + "x-menu-order": 3, + "x-undo": { + "type": "safe" + } + } + }, "/api/v2/api_keys": { "get": { "description": "List all API keys available for your account.", @@ -363988,6 +364272,10 @@ }, "name": "AWS Logs Integration" }, + { + "description": "Datadog Agentless Scanning provides visibility into risks and vulnerabilities\nwithin your hosts, running containers, and serverless functions—all without\nrequiring teams to install agents on every host or where agents cannot be installed.\nGo to https://www.datadoghq.com/blog/agentless-scanning/ to learn more", + "name": "Agentless Scanning" + }, { "description": "Search your Audit Logs events over HTTP.", "name": "Audit" diff --git a/data/api/v2/translate_actions.json b/data/api/v2/translate_actions.json index 0989c3d52099a..b012a4935855e 100644 --- a/data/api/v2/translate_actions.json +++ b/data/api/v2/translate_actions.json @@ -1,4 +1,8 @@ { + "ListAwsScanOptions": { + "description": "Fetches the scan options configured for AWS accounts.", + "summary": "Get AWS Scan Options" + }, "ListAPIKeys": { "description": "List all API keys available for your account.", "summary": "Get all API keys" diff --git a/data/api/v2/translate_tags.json b/data/api/v2/translate_tags.json index 40d5210e00328..5d7bf0f5dea40 100644 --- a/data/api/v2/translate_tags.json +++ b/data/api/v2/translate_tags.json @@ -15,6 +15,10 @@ "name": "AWS Logs Integration", "description": "Configure your Datadog-AWS-Logs integration directly through Datadog API.\nFor more information, see the [AWS integration page](https://docs.datadoghq.com/integrations/amazon_web_services/#log-collection)." }, + "agentless-scanning": { + "name": "Agentless Scanning", + "description": "Datadog Agentless Scanning provides visibility into risks and vulnerabilities\nwithin your hosts, running containers, and serverless functions—all without\nrequiring teams to install agents on every host or where agents cannot be installed.\nGo to https://www.datadoghq.com/blog/agentless-scanning/ to learn more" + }, "audit": { "name": "Audit", "description": "Search your Audit Logs events over HTTP." diff --git a/static/resources/json/full_spec_v2.json b/static/resources/json/full_spec_v2.json index 82eb162c266a1..a4a07a5b0d7d3 100644 --- a/static/resources/json/full_spec_v2.json +++ b/static/resources/json/full_spec_v2.json @@ -12868,6 +12868,152 @@ }, "type": "object" }, + "AwsScanOptionsAttributes": { + "description": "Attributes for the AWS scan options.", + "properties": { + "lambda": { + "description": "Indicates if scanning of Lambda functions is enabled.", + "example": true, + "type": "boolean" + }, + "sensitive_data": { + "description": "Indicates if scanning for sensitive data is enabled.", + "example": false, + "type": "boolean" + }, + "vuln_containers_os": { + "description": "Indicates if scanning for vulnerabilities in containers is enabled.", + "example": true, + "type": "boolean" + }, + "vuln_host_os": { + "description": "Indicates if scanning for vulnerabilities in hosts is enabled.", + "example": true, + "type": "boolean" + } + }, + "type": "object" + }, + "AwsScanOptionsData": { + "description": "Single AWS Scan Options entry.", + "properties": { + "attributes": { + "description": "Attributes for the AWS scan options.", + "properties": { + "lambda": { + "description": "Indicates if scanning of Lambda functions is enabled.", + "example": true, + "type": "boolean" + }, + "sensitive_data": { + "description": "Indicates if scanning for sensitive data is enabled.", + "example": false, + "type": "boolean" + }, + "vuln_containers_os": { + "description": "Indicates if scanning for vulnerabilities in containers is enabled.", + "example": true, + "type": "boolean" + }, + "vuln_host_os": { + "description": "Indicates if scanning for vulnerabilities in hosts is enabled.", + "example": true, + "type": "boolean" + } + }, + "type": "object" + }, + "id": { + "description": "The ID of the AWS account.", + "example": "184366314700", + "type": "string" + }, + "type": { + "default": "aws_scan_options", + "description": "The type of the resource. The value should always be `aws_scan_options`.", + "enum": [ + "aws_scan_options" + ], + "example": "aws_scan_options", + "type": "string", + "x-enum-varnames": [ + "AWS_SCAN_OPTIONS" + ] + } + }, + "type": "object" + }, + "AwsScanOptionsResponse": { + "description": "Response object that includes a list of AWS scan options.", + "properties": { + "data": { + "description": "A list of AWS scan options.", + "items": { + "description": "Single AWS Scan Options entry.", + "properties": { + "attributes": { + "description": "Attributes for the AWS scan options.", + "properties": { + "lambda": { + "description": "Indicates if scanning of Lambda functions is enabled.", + "example": true, + "type": "boolean" + }, + "sensitive_data": { + "description": "Indicates if scanning for sensitive data is enabled.", + "example": false, + "type": "boolean" + }, + "vuln_containers_os": { + "description": "Indicates if scanning for vulnerabilities in containers is enabled.", + "example": true, + "type": "boolean" + }, + "vuln_host_os": { + "description": "Indicates if scanning for vulnerabilities in hosts is enabled.", + "example": true, + "type": "boolean" + } + }, + "type": "object" + }, + "id": { + "description": "The ID of the AWS account.", + "example": "184366314700", + "type": "string" + }, + "type": { + "default": "aws_scan_options", + "description": "The type of the resource. The value should always be `aws_scan_options`.", + "enum": [ + "aws_scan_options" + ], + "example": "aws_scan_options", + "type": "string", + "x-enum-varnames": [ + "AWS_SCAN_OPTIONS" + ] + } + }, + "type": "object" + }, + "type": "array" + } + }, + "type": "object" + }, + "AwsScanOptionsType": { + "default": "aws_scan_options", + "description": "The type of the resource. The value should always be `aws_scan_options`.", + "enum": [ + "aws_scan_options" + ], + "example": "aws_scan_options", + "type": "string", + "x-enum-varnames": [ + "AWS_SCAN_OPTIONS" + ] + }, "AzureUCConfig": { "description": "Azure config.", "properties": { @@ -187392,6 +187538,144 @@ }, "openapi": "3.0.0", "paths": { + "/api/v2/agentless_scanning/accounts/aws": { + "get": { + "description": "Fetches the scan options configured for AWS accounts.", + "operationId": "ListAwsScanOptions", + "responses": { + "200": { + "content": { + "application/json": { + "schema": { + "description": "Response object that includes a list of AWS scan options.", + "properties": { + "data": { + "description": "A list of AWS scan options.", + "items": { + "description": "Single AWS Scan Options entry.", + "properties": { + "attributes": { + "description": "Attributes for the AWS scan options.", + "properties": { + "lambda": { + "description": "Indicates if scanning of Lambda functions is enabled.", + "example": true, + "type": "boolean" + }, + "sensitive_data": { + "description": "Indicates if scanning for sensitive data is enabled.", + "example": false, + "type": "boolean" + }, + "vuln_containers_os": { + "description": "Indicates if scanning for vulnerabilities in containers is enabled.", + "example": true, + "type": "boolean" + }, + "vuln_host_os": { + "description": "Indicates if scanning for vulnerabilities in hosts is enabled.", + "example": true, + "type": "boolean" + } + }, + "type": "object" + }, + "id": { + "description": "The ID of the AWS account.", + "example": "184366314700", + "type": "string" + }, + "type": { + "default": "aws_scan_options", + "description": "The type of the resource. The value should always be `aws_scan_options`.", + "enum": [ + "aws_scan_options" + ], + "example": "aws_scan_options", + "type": "string", + "x-enum-varnames": [ + "AWS_SCAN_OPTIONS" + ] + } + }, + "type": "object" + }, + "type": "array" + } + }, + "type": "object" + } + } + }, + "description": "OK" + }, + "403": { + "content": { + "application/json": { + "schema": { + "description": "API error response.", + "properties": { + "errors": { + "description": "A list of errors.", + "example": [ + "Bad Request" + ], + "items": { + "description": "A list of items.", + "example": "Bad Request", + "type": "string" + }, + "type": "array" + } + }, + "required": [ + "errors" + ], + "type": "object" + } + } + }, + "description": "Not Authorized" + }, + "429": { + "content": { + "application/json": { + "schema": { + "description": "API error response.", + "properties": { + "errors": { + "description": "A list of errors.", + "example": [ + "Bad Request" + ], + "items": { + "description": "A list of items.", + "example": "Bad Request", + "type": "string" + }, + "type": "array" + } + }, + "required": [ + "errors" + ], + "type": "object" + } + } + }, + "description": "Too many requests" + } + }, + "summary": "Get AWS Scan Options", + "tags": [ + "Agentless Scanning" + ], + "x-menu-order": 3, + "x-undo": { + "type": "safe" + } + } + }, "/api/v2/api_keys": { "get": { "description": "List all API keys available for your account.", @@ -363988,6 +364272,10 @@ }, "name": "AWS Logs Integration" }, + { + "description": "Datadog Agentless Scanning provides visibility into risks and vulnerabilities\nwithin your hosts, running containers, and serverless functions—all without\nrequiring teams to install agents on every host or where agents cannot be installed.\nGo to https://www.datadoghq.com/blog/agentless-scanning/ to learn more", + "name": "Agentless Scanning" + }, { "description": "Search your Audit Logs events over HTTP.", "name": "Audit"