Skip to content

Commit 342abfa

Browse files
committed
Updated dynatrace_vulnerability_settings resource
1 parent 730a712 commit 342abfa

File tree

3 files changed

+32
-8
lines changed

3 files changed

+32
-8
lines changed

dynatrace/api/builtin/appsec/runtimevulnerabilitydetection/schema.json

+17-1
Original file line numberDiff line numberDiff line change
@@ -83,6 +83,22 @@
8383
"$ref": "#/enums/MonitoringMode"
8484
}
8585
},
86+
"globalMonitoringModeGo": {
87+
"description": "Global Go code-level vulnerability detection control defines the default for all process groups. You can use monitoring rules to override the default for certain processes.",
88+
"displayName": "Global Go code-level vulnerability detection control",
89+
"documentation": "Code-level vulnerability detection for Go has been recently released as a preview version. It has been designed to carry a production-ready performance footprint. The overhead is depending on your application, but should be negligible in most cases. You have to enable the OneAgent feature \"Go code-level vulnerability evaluation\" to get started.",
90+
"maxObjects": 1,
91+
"metadata": {
92+
"featureFlag": "com.compuware.EnableCaspClvReportingGo.feature",
93+
"maturity": "EARLY_ADOPTER",
94+
"sortItems": "disabled"
95+
},
96+
"modificationPolicy": "DEFAULT",
97+
"nullable": true,
98+
"type": {
99+
"$ref": "#/enums/MonitoringMode"
100+
}
101+
},
86102
"globalMonitoringModeJava": {
87103
"default": "MONITORING_ON",
88104
"description": "Global Java code-level vulnerability detection control defines the default for all process groups. You can use monitoring rules to override the default for certain processes.",
@@ -304,5 +320,5 @@
304320
]
305321
}
306322
},
307-
"version": "3.7"
323+
"version": "3.8"
308324
}

dynatrace/api/builtin/appsec/runtimevulnerabilitydetection/service.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ import (
2424
"github.com/dynatrace-oss/terraform-provider-dynatrace/dynatrace/settings/services/settings20"
2525
)
2626

27-
const SchemaVersion = "3.7"
27+
const SchemaVersion = "3.8"
2828
const SchemaID = "builtin:appsec.runtime-vulnerability-detection"
2929

3030
func Service(credentials *rest.Credentials) settings.CRUDService[*runtimevulnerabilitydetection.Settings] {

dynatrace/api/builtin/appsec/runtimevulnerabilitydetection/settings/settings.go

+14-6
Original file line numberDiff line numberDiff line change
@@ -23,12 +23,13 @@ import (
2323
)
2424

2525
type Settings struct {
26-
EnableCodeLevelVulnerabilityDetection bool `json:"enableCodeLevelVulnerabilityDetection"` // Enable Code-level Vulnerability Analytics
27-
EnableRuntimeVulnerabilityDetection bool `json:"enableRuntimeVulnerabilityDetection"` // Enable Third-party Vulnerability Analytics
28-
GlobalMonitoringModeDotNet MonitoringMode `json:"globalMonitoringModeDotNet"` // (v1.290) Global .NET code-level vulnerability detection control defines the default for all process groups. You can use monitoring rules to override the default for certain processes. Possible Values: `MONITORING_OFF`, `MONITORING_ON`
29-
GlobalMonitoringModeJava MonitoringMode `json:"globalMonitoringModeJava"` // Global Java code-level vulnerability detection control defines the default for all process groups. You can use monitoring rules to override the default for certain processes. Possible Values: `MONITORING_OFF`, `MONITORING_ON`
30-
GlobalMonitoringModeTPV MonitoringMode `json:"globalMonitoringModeTPV"` // Global third-party vulnerability detection control defines the default for all processes. Possible Values: `MONITORING_OFF`, `MONITORING_ON`
31-
Technologies *Technology `json:"technologies"` // Vulnerability Analytics can be enabled/disabled per supported technology.
26+
EnableCodeLevelVulnerabilityDetection bool `json:"enableCodeLevelVulnerabilityDetection"` // Enable Code-level Vulnerability Analytics
27+
EnableRuntimeVulnerabilityDetection bool `json:"enableRuntimeVulnerabilityDetection"` // Enable Third-party Vulnerability Analytics
28+
GlobalMonitoringModeDotNet MonitoringMode `json:"globalMonitoringModeDotNet"` // (v1.290) Global .NET code-level vulnerability detection control defines the default for all process groups. You can use monitoring rules to override the default for certain processes. Possible Values: `MONITORING_OFF`, `MONITORING_ON`
29+
GlobalMonitoringModeGo *MonitoringMode `json:"globalMonitoringModeGo,omitempty"` // Global Go code-level vulnerability detection control defines the default for all process groups. You can use monitoring rules to override the default for certain processes.
30+
GlobalMonitoringModeJava MonitoringMode `json:"globalMonitoringModeJava"` // Global Java code-level vulnerability detection control defines the default for all process groups. You can use monitoring rules to override the default for certain processes. Possible Values: `MONITORING_OFF`, `MONITORING_ON`
31+
GlobalMonitoringModeTPV MonitoringMode `json:"globalMonitoringModeTPV"` // Global third-party vulnerability detection control defines the default for all processes. Possible Values: `MONITORING_OFF`, `MONITORING_ON`
32+
Technologies *Technology `json:"technologies"` // Vulnerability Analytics can be enabled/disabled per supported technology.
3233
}
3334

3435
func (me *Settings) Name() string {
@@ -53,6 +54,11 @@ func (me *Settings) Schema() map[string]*schema.Schema {
5354
Optional: true, // nullable
5455
Default: "MONITORING_OFF",
5556
},
57+
"global_monitoring_mode_go": {
58+
Type: schema.TypeString,
59+
Description: "Global Go code-level vulnerability detection control defines the default for all process groups. You can use monitoring rules to override the default for certain processes.",
60+
Optional: true, // nullable
61+
},
5662
"global_monitoring_mode_java": {
5763
Type: schema.TypeString,
5864
Description: "Global Java code-level vulnerability detection control defines the default for all process groups. You can use monitoring rules to override the default for certain processes. Possible Values: `MONITORING_OFF`, `MONITORING_ON`",
@@ -84,6 +90,7 @@ func (me *Settings) MarshalHCL(properties hcl.Properties) error {
8490
"enable_code_level_vulnerability_detection": me.EnableCodeLevelVulnerabilityDetection,
8591
"enable_runtime_vulnerability_detection": me.EnableRuntimeVulnerabilityDetection,
8692
"global_monitoring_mode_dot_net": me.GlobalMonitoringModeDotNet,
93+
"global_monitoring_mode_go": me.GlobalMonitoringModeGo,
8794
"global_monitoring_mode_java": me.GlobalMonitoringModeJava,
8895
"global_monitoring_mode_tpv": me.GlobalMonitoringModeTPV,
8996
"technologies": me.Technologies,
@@ -95,6 +102,7 @@ func (me *Settings) UnmarshalHCL(decoder hcl.Decoder) error {
95102
"enable_code_level_vulnerability_detection": &me.EnableCodeLevelVulnerabilityDetection,
96103
"enable_runtime_vulnerability_detection": &me.EnableRuntimeVulnerabilityDetection,
97104
"global_monitoring_mode_dot_net": &me.GlobalMonitoringModeDotNet,
105+
"global_monitoring_mode_go": &me.GlobalMonitoringModeGo,
98106
"global_monitoring_mode_java": &me.GlobalMonitoringModeJava,
99107
"global_monitoring_mode_tpv": &me.GlobalMonitoringModeTPV,
100108
"technologies": &me.Technologies,

0 commit comments

Comments
 (0)