Skip to content

Commit 79a1d3c

Browse files
api-clients-generation-pipeline[bot]ci.datadog-api-spec
and
ci.datadog-api-spec
authored
chore(codeowners): merge ASM teams into single backend team (#598)
Co-authored-by: ci.datadog-api-spec <[email protected]>
1 parent e1ca298 commit 79a1d3c

File tree

2 files changed

+31
-31
lines changed

2 files changed

+31
-31
lines changed

.apigentools-info

+4-4
Original file line numberDiff line numberDiff line change
@@ -4,13 +4,13 @@
44
"spec_versions": {
55
"v1": {
66
"apigentools_version": "1.6.6",
7-
"regenerated": "2025-04-11 12:59:10.820309",
8-
"spec_repo_commit": "7307da21"
7+
"regenerated": "2025-04-11 15:05:37.258509",
8+
"spec_repo_commit": "d209cd40"
99
},
1010
"v2": {
1111
"apigentools_version": "1.6.6",
12-
"regenerated": "2025-04-11 12:59:10.835773",
13-
"spec_repo_commit": "7307da21"
12+
"regenerated": "2025-04-11 15:05:37.274982",
13+
"spec_repo_commit": "d209cd40"
1414
}
1515
}
1616
}

tests/scenarios/features/v2/application_security.feature

+27-27
Original file line numberDiff line numberDiff line change
@@ -13,134 +13,134 @@ Feature: Application Security
1313
And a valid "appKeyAuth" key in the system
1414
And an instance of "ApplicationSecurity" API
1515

16-
@generated @skip @team:DataDog/asm-respond-backend
16+
@generated @skip @team:DataDog/asm-backend
1717
Scenario: Create a WAF custom rule returns "Bad Request" response
1818
Given new "CreateApplicationSecurityWafCustomRule" request
1919
And body with value {"data": {"attributes": {"action": {"action": "block_request", "parameters": {"location": "/blocking", "status_code": 403}}, "blocking": false, "conditions": [{"operator": "match_regex", "parameters": {"data": "blocked_users", "inputs": [{"address": "server.db.statement", "key_path": []}], "list": [], "options": {"case_sensitive": false, "min_length": 0}, "regex": "path.*", "value": "custom_tag"}}], "enabled": false, "name": "Block request from a bad useragent", "path_glob": "/api/search/*", "scope": [{"env": "prod", "service": "billing-service"}], "tags": {"category": "business_logic", "type": "users.login.success"}}, "type": "custom_rule"}}
2020
When the request is sent
2121
Then the response status is 400 Bad Request
2222

23-
@generated @skip @team:DataDog/asm-respond-backend
23+
@generated @skip @team:DataDog/asm-backend
2424
Scenario: Create a WAF custom rule returns "Concurrent Modification" response
2525
Given new "CreateApplicationSecurityWafCustomRule" request
2626
And body with value {"data": {"attributes": {"action": {"action": "block_request", "parameters": {"location": "/blocking", "status_code": 403}}, "blocking": false, "conditions": [{"operator": "match_regex", "parameters": {"data": "blocked_users", "inputs": [{"address": "server.db.statement", "key_path": []}], "list": [], "options": {"case_sensitive": false, "min_length": 0}, "regex": "path.*", "value": "custom_tag"}}], "enabled": false, "name": "Block request from a bad useragent", "path_glob": "/api/search/*", "scope": [{"env": "prod", "service": "billing-service"}], "tags": {"category": "business_logic", "type": "users.login.success"}}, "type": "custom_rule"}}
2727
When the request is sent
2828
Then the response status is 409 Concurrent Modification
2929

30-
@generated @skip @team:DataDog/asm-respond-backend
30+
@generated @skip @team:DataDog/asm-backend
3131
Scenario: Create a WAF custom rule returns "Created" response
3232
Given new "CreateApplicationSecurityWafCustomRule" request
3333
And body with value {"data": {"attributes": {"action": {"action": "block_request", "parameters": {"location": "/blocking", "status_code": 403}}, "blocking": false, "conditions": [{"operator": "match_regex", "parameters": {"data": "blocked_users", "inputs": [{"address": "server.db.statement", "key_path": []}], "list": [], "options": {"case_sensitive": false, "min_length": 0}, "regex": "path.*", "value": "custom_tag"}}], "enabled": false, "name": "Block request from a bad useragent", "path_glob": "/api/search/*", "scope": [{"env": "prod", "service": "billing-service"}], "tags": {"category": "business_logic", "type": "users.login.success"}}, "type": "custom_rule"}}
3434
When the request is sent
3535
Then the response status is 201 Created
3636

37-
@generated @skip @team:DataDog/asm-respond-backend
37+
@generated @skip @team:DataDog/asm-backend
3838
Scenario: Create a WAF exclusion filter returns "Bad Request" response
3939
Given new "CreateApplicationSecurityWafExclusionFilter" request
4040
And body with value {"data": {"attributes": {"description": "Exclude false positives on a path", "enabled": true, "ip_list": ["198.51.100.72"], "on_match": "monitor", "parameters": ["list.search.query"], "path_glob": "/accounts/*", "rules_target": [{"rule_id": "dog-913-009", "tags": {"category": "attack_attempt", "type": "lfi"}}], "scope": [{"env": "www", "service": "prod"}]}, "type": "exclusion_filter"}}
4141
When the request is sent
4242
Then the response status is 400 Bad Request
4343

44-
@generated @skip @team:DataDog/asm-respond-backend
44+
@generated @skip @team:DataDog/asm-backend
4545
Scenario: Create a WAF exclusion filter returns "Concurrent Modification" response
4646
Given new "CreateApplicationSecurityWafExclusionFilter" request
4747
And body with value {"data": {"attributes": {"description": "Exclude false positives on a path", "enabled": true, "ip_list": ["198.51.100.72"], "on_match": "monitor", "parameters": ["list.search.query"], "path_glob": "/accounts/*", "rules_target": [{"rule_id": "dog-913-009", "tags": {"category": "attack_attempt", "type": "lfi"}}], "scope": [{"env": "www", "service": "prod"}]}, "type": "exclusion_filter"}}
4848
When the request is sent
4949
Then the response status is 409 Concurrent Modification
5050

51-
@team:DataDog/asm-respond-backend
51+
@team:DataDog/asm-backend
5252
Scenario: Create a WAF exclusion filter returns "OK" response
5353
Given new "CreateApplicationSecurityWafExclusionFilter" request
5454
And body with value {"data": {"attributes": {"description": "Exclude false positives on a path", "enabled": true, "parameters": ["list.search.query"], "path_glob": "/accounts/*", "rules_target": [{"tags": {"category": "attack_attempt", "type": "lfi"}}], "scope": [{"env": "www", "service": "prod"}]}, "type": "exclusion_filter"}}
5555
When the request is sent
5656
Then the response status is 200 OK
5757
And the response "data.attributes.enabled" is equal to true
5858

59-
@team:DataDog/asm-respond-backend
59+
@team:DataDog/asm-backend
6060
Scenario: Create a legacy WAF exclusion filter returns "Bad Request" response
6161
Given new "CreateApplicationSecurityWafExclusionFilter" request
6262
And body with value {"data": {"attributes": {"description": "Exclude false positives on a path", "enabled": true, "event_query": "test:1"}, "type": "exclusion_filter"}}
6363
When the request is sent
6464
Then the response status is 400 Bad Request
6565

66-
@generated @skip @team:DataDog/asm-respond-backend
66+
@generated @skip @team:DataDog/asm-backend
6767
Scenario: Delete a WAF Custom Rule returns "Concurrent Modification" response
6868
Given new "DeleteApplicationSecurityWafCustomRule" request
6969
And request contains "custom_rule_id" parameter from "REPLACE.ME"
7070
When the request is sent
7171
Then the response status is 409 Concurrent Modification
7272

73-
@generated @skip @team:DataDog/asm-respond-backend
73+
@generated @skip @team:DataDog/asm-backend
7474
Scenario: Delete a WAF Custom Rule returns "No Content" response
7575
Given new "DeleteApplicationSecurityWafCustomRule" request
7676
And request contains "custom_rule_id" parameter from "REPLACE.ME"
7777
When the request is sent
7878
Then the response status is 204 No Content
7979

80-
@generated @skip @team:DataDog/asm-respond-backend
80+
@generated @skip @team:DataDog/asm-backend
8181
Scenario: Delete a WAF Custom Rule returns "Not Found" response
8282
Given new "DeleteApplicationSecurityWafCustomRule" request
8383
And request contains "custom_rule_id" parameter from "REPLACE.ME"
8484
When the request is sent
8585
Then the response status is 404 Not Found
8686

87-
@generated @skip @team:DataDog/asm-respond-backend
87+
@generated @skip @team:DataDog/asm-backend
8888
Scenario: Delete a WAF exclusion filter returns "Concurrent Modification" response
8989
Given new "DeleteApplicationSecurityWafExclusionFilter" request
9090
And request contains "exclusion_filter_id" parameter from "REPLACE.ME"
9191
When the request is sent
9292
Then the response status is 409 Concurrent Modification
9393

94-
@team:DataDog/asm-respond-backend
94+
@team:DataDog/asm-backend
9595
Scenario: Delete a WAF exclusion filter returns "Not Found" response
9696
Given new "DeleteApplicationSecurityWafExclusionFilter" request
9797
And request contains "exclusion_filter_id" parameter with value "unknown"
9898
When the request is sent
9999
Then the response status is 404 Not Found
100100

101-
@team:DataDog/asm-respond-backend
101+
@team:DataDog/asm-backend
102102
Scenario: Delete a WAF exclusion filter returns "OK" response
103103
Given there is a valid "exclusion_filter" in the system
104104
And new "DeleteApplicationSecurityWafExclusionFilter" request
105105
And request contains "exclusion_filter_id" parameter from "exclusion_filter.data.id"
106106
When the request is sent
107107
Then the response status is 204 OK
108108

109-
@generated @skip @team:DataDog/asm-respond-backend
109+
@generated @skip @team:DataDog/asm-backend
110110
Scenario: Get a WAF custom rule returns "OK" response
111111
Given new "GetApplicationSecurityWafCustomRule" request
112112
And request contains "custom_rule_id" parameter from "REPLACE.ME"
113113
When the request is sent
114114
Then the response status is 200 OK
115115

116-
@generated @skip @team:DataDog/asm-respond-backend
116+
@generated @skip @team:DataDog/asm-backend
117117
Scenario: Get a WAF exclusion filter returns "Not Found" response
118118
Given new "GetApplicationSecurityWafExclusionFilter" request
119119
And request contains "exclusion_filter_id" parameter from "REPLACE.ME"
120120
When the request is sent
121121
Then the response status is 404 Not Found
122122

123-
@team:DataDog/asm-respond-backend
123+
@team:DataDog/asm-backend
124124
Scenario: Get a WAF exclusion filter returns "OK" response
125125
Given there is a valid "exclusion_filter" in the system
126126
And new "GetApplicationSecurityWafExclusionFilter" request
127127
And request contains "exclusion_filter_id" parameter from "exclusion_filter.data.id"
128128
When the request is sent
129129
Then the response status is 200 OK
130130

131-
@team:DataDog/asm-respond-backend
131+
@team:DataDog/asm-backend
132132
Scenario: List all WAF custom rules returns "OK" response
133133
Given new "ListApplicationSecurityWAFCustomRules" request
134134
When the request is sent
135135
Then the response status is 200 OK
136136

137-
@team:DataDog/asm-respond-backend
137+
@team:DataDog/asm-backend
138138
Scenario: List all WAF exclusion filters returns "OK" response
139139
Given new "ListApplicationSecurityWafExclusionFilters" request
140140
When the request is sent
141141
Then the response status is 200 OK
142142

143-
@team:DataDog/asm-respond-backend
143+
@team:DataDog/asm-backend
144144
Scenario: Update a WAF Custom Rule returns "Bad Request" response
145145
Given there is a valid "custom_rule" in the system
146146
And new "UpdateApplicationSecurityWafCustomRule" request
@@ -149,23 +149,23 @@ Feature: Application Security
149149
When the request is sent
150150
Then the response status is 400 Bad Request
151151

152-
@generated @skip @team:DataDog/asm-respond-backend
152+
@generated @skip @team:DataDog/asm-backend
153153
Scenario: Update a WAF Custom Rule returns "Concurrent Modification" response
154154
Given new "UpdateApplicationSecurityWafCustomRule" request
155155
And request contains "custom_rule_id" parameter from "REPLACE.ME"
156156
And body with value {"data": {"attributes": {"action": {"action": "block_request", "parameters": {"location": "/blocking", "status_code": 403}}, "blocking": false, "conditions": [{"operator": "match_regex", "parameters": {"data": "blocked_users", "inputs": [{"address": "server.db.statement", "key_path": []}], "list": [], "options": {"case_sensitive": false, "min_length": 0}, "regex": "path.*", "value": "custom_tag"}}], "enabled": false, "name": "Block request from bad useragent", "path_glob": "/api/search/*", "scope": [{"env": "prod", "service": "billing-service"}], "tags": {"category": "business_logic", "type": "users.login.success"}}, "type": "custom_rule"}}
157157
When the request is sent
158158
Then the response status is 409 Concurrent Modification
159159

160-
@generated @skip @team:DataDog/asm-respond-backend
160+
@generated @skip @team:DataDog/asm-backend
161161
Scenario: Update a WAF Custom Rule returns "Not Found" response
162162
Given new "UpdateApplicationSecurityWafCustomRule" request
163163
And request contains "custom_rule_id" parameter from "REPLACE.ME"
164164
And body with value {"data": {"attributes": {"action": {"action": "block_request", "parameters": {"location": "/blocking", "status_code": 403}}, "blocking": false, "conditions": [{"operator": "match_regex", "parameters": {"data": "blocked_users", "inputs": [{"address": "server.db.statement", "key_path": []}], "list": [], "options": {"case_sensitive": false, "min_length": 0}, "regex": "path.*", "value": "custom_tag"}}], "enabled": false, "name": "Block request from bad useragent", "path_glob": "/api/search/*", "scope": [{"env": "prod", "service": "billing-service"}], "tags": {"category": "business_logic", "type": "users.login.success"}}, "type": "custom_rule"}}
165165
When the request is sent
166166
Then the response status is 404 Not Found
167167

168-
@team:DataDog/asm-respond-backend
168+
@team:DataDog/asm-backend
169169
Scenario: Update a WAF Custom Rule returns "OK" response
170170
Given there is a valid "custom_rule" in the system
171171
And new "UpdateApplicationSecurityWafCustomRule" request
@@ -174,7 +174,7 @@ Feature: Application Security
174174
When the request is sent
175175
Then the response status is 200 OK
176176

177-
@team:DataDog/asm-respond-backend
177+
@team:DataDog/asm-backend
178178
Scenario: Update a WAF exclusion filter returns "Bad Request" response
179179
Given there is a valid "custom_rule" in the system
180180
And new "UpdateApplicationSecurityWafExclusionFilter" request
@@ -183,23 +183,23 @@ Feature: Application Security
183183
When the request is sent
184184
Then the response status is 400 Bad Request
185185

186-
@generated @skip @team:DataDog/asm-respond-backend
186+
@generated @skip @team:DataDog/asm-backend
187187
Scenario: Update a WAF exclusion filter returns "Concurrent Modification" response
188188
Given new "UpdateApplicationSecurityWafExclusionFilter" request
189189
And request contains "exclusion_filter_id" parameter from "REPLACE.ME"
190190
And body with value {"data": {"attributes": {"description": "Exclude false positives on a path", "enabled": true, "ip_list": ["198.51.100.72"], "on_match": "monitor", "parameters": ["list.search.query"], "path_glob": "/accounts/*", "rules_target": [{"rule_id": "dog-913-009", "tags": {"category": "attack_attempt", "type": "lfi"}}], "scope": [{"env": "www", "service": "prod"}]}, "type": "exclusion_filter"}}
191191
When the request is sent
192192
Then the response status is 409 Concurrent Modification
193193

194-
@team:DataDog/asm-respond-backend
194+
@team:DataDog/asm-backend
195195
Scenario: Update a WAF exclusion filter returns "Not Found" response
196196
Given new "UpdateApplicationSecurityWafExclusionFilter" request
197197
And request contains "exclusion_filter_id" parameter with value "unknown"
198198
And body with value {"data": {"attributes": {"description": "Exclude false positives on a path", "enabled": true, "parameters": ["list.search.query"], "path_glob": "/accounts/*", "rules_target": [{"rule_id": "dog-913-009", "tags": {"category": "attack_attempt", "type": "lfi"}}], "scope": [{"env": "www", "service": "prod"}]}, "type": "exclusion_filter"}}
199199
When the request is sent
200200
Then the response status is 404 Not Found
201201

202-
@team:DataDog/asm-respond-backend
202+
@team:DataDog/asm-backend
203203
Scenario: Update a WAF exclusion filter returns "OK" response
204204
Given there is a valid "exclusion_filter" in the system
205205
And new "UpdateApplicationSecurityWafExclusionFilter" request
@@ -208,7 +208,7 @@ Feature: Application Security
208208
When the request is sent
209209
Then the response status is 200 OK
210210

211-
@team:DataDog/asm-respond-backend
211+
@team:DataDog/asm-backend
212212
Scenario: Update a legacy WAF exclusion filter returns "Bad Request" response
213213
Given there is a valid "exclusion_filter" in the system
214214
And new "UpdateApplicationSecurityWafExclusionFilter" request

0 commit comments

Comments
 (0)