diff --git a/.apigentools-info b/.apigentools-info index e66f8ad0b5bc..1358f1970b33 100644 --- a/.apigentools-info +++ b/.apigentools-info @@ -4,13 +4,13 @@ "spec_versions": { "v1": { "apigentools_version": "1.6.6", - "regenerated": "2025-01-02 15:18:20.432882", - "spec_repo_commit": "bc53c28f" + "regenerated": "2025-01-02 17:32:16.354936", + "spec_repo_commit": "733cf3ea" }, "v2": { "apigentools_version": "1.6.6", - "regenerated": "2025-01-02 15:18:20.447693", - "spec_repo_commit": "bc53c28f" + "regenerated": "2025-01-02 17:32:16.370268", + "spec_repo_commit": "733cf3ea" } } } \ No newline at end of file diff --git a/.generator/schemas/v2/openapi.yaml b/.generator/schemas/v2/openapi.yaml index 941ec65aef2c..76195d0bb3d0 100644 --- a/.generator/schemas/v2/openapi.yaml +++ b/.generator/schemas/v2/openapi.yaml @@ -40985,6 +40985,14 @@ paths: operationId: UpdateRestrictionPolicy parameters: - $ref: '#/components/parameters/ResourceID' + - description: Allows admins (users with the `user_access_manage` permission) + to remove their own access from the resource if set to `true`. By default, + this is set to `false`, preventing admins from locking themselves out. + in: query + name: allow_self_lockout + required: false + schema: + type: string requestBody: content: application/json: diff --git a/features/support/scenarios_model_mapping.ts b/features/support/scenarios_model_mapping.ts index 8fe1f9d7eeed..77b9fd6b4e98 100644 --- a/features/support/scenarios_model_mapping.ts +++ b/features/support/scenarios_model_mapping.ts @@ -5754,6 +5754,10 @@ export const ScenariosModelMappings: {[key: string]: {[key: string]: any}} = { "type": "string", "format": "", }, + "allowSelfLockout": { + "type": "string", + "format": "", + }, "body": { "type": "RestrictionPolicyUpdateRequest", "format": "", diff --git a/packages/datadog-api-client-v2/apis/RestrictionPoliciesApi.ts b/packages/datadog-api-client-v2/apis/RestrictionPoliciesApi.ts index fcb227c6498a..bd2eccac0e04 100644 --- a/packages/datadog-api-client-v2/apis/RestrictionPoliciesApi.ts +++ b/packages/datadog-api-client-v2/apis/RestrictionPoliciesApi.ts @@ -92,6 +92,7 @@ export class RestrictionPoliciesApiRequestFactory extends BaseAPIRequestFactory public async updateRestrictionPolicy( resourceId: string, body: RestrictionPolicyUpdateRequest, + allowSelfLockout?: string, _options?: Configuration ): Promise { const _config = _options || this.configuration; @@ -119,6 +120,15 @@ export class RestrictionPoliciesApiRequestFactory extends BaseAPIRequestFactory requestContext.setHeaderParam("Accept", "application/json"); requestContext.setHttpConfig(_config.httpConfig); + // Query Params + if (allowSelfLockout !== undefined) { + requestContext.setQueryParam( + "allow_self_lockout", + ObjectSerializer.serialize(allowSelfLockout, "string", ""), + "" + ); + } + // Body Params const contentType = ObjectSerializer.getPreferredMediaType([ "application/json", @@ -352,6 +362,11 @@ export interface RestrictionPoliciesApiUpdateRestrictionPolicyRequest { * @type RestrictionPolicyUpdateRequest */ body: RestrictionPolicyUpdateRequest; + /** + * Allows admins (users with the `user_access_manage` permission) to remove their own access from the resource if set to `true`. By default, this is set to `false`, preventing admins from locking themselves out. + * @type string + */ + allowSelfLockout?: string; } export class RestrictionPoliciesApi { @@ -453,6 +468,7 @@ export class RestrictionPoliciesApi { const requestContextPromise = this.requestFactory.updateRestrictionPolicy( param.resourceId, param.body, + param.allowSelfLockout, options ); return requestContextPromise.then((requestContext) => {