crimson-falcon 0.5.0 → 1.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (515) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +2151 -1857
  3. data/lib/crimson-falcon/api/{alerts_api.rb → alerts.rb} +105 -39
  4. data/lib/crimson-falcon/api/{api_integrations_api.rb → api_integrations.rb} +12 -12
  5. data/lib/crimson-falcon/api/{aspm_api.rb → aspm.rb} +295 -96
  6. data/lib/crimson-falcon/api/{certificate_based_exclusions_api.rb → certificate_based_exclusions.rb} +25 -25
  7. data/lib/crimson-falcon/api/{default_api.rb → cloud_aws_registration.rb} +29 -29
  8. data/lib/crimson-falcon/api/cloud_azure_registration.rb +105 -0
  9. data/lib/crimson-falcon/api/{cloud_connect_aws_api.rb → cloud_connect_aws.rb} +35 -35
  10. data/lib/crimson-falcon/api/cloud_security_assets.rb +179 -0
  11. data/lib/crimson-falcon/api/{cloud_snapshots_api.rb → cloud_snapshots.rb} +22 -22
  12. data/lib/crimson-falcon/api/{compliance_assessments_api.rb → compliance_assessments.rb} +34 -34
  13. data/lib/crimson-falcon/api/{configuration_assessment_api.rb → configuration_assessment.rb} +11 -11
  14. data/lib/crimson-falcon/api/{configuration_assessment_evaluation_logic_api.rb → configuration_assessment_evaluation_logic.rb} +5 -5
  15. data/lib/crimson-falcon/api/{container_alerts_api.rb → container_alerts.rb} +20 -20
  16. data/lib/crimson-falcon/api/{container_detections_api.rb → container_detections.rb} +46 -46
  17. data/lib/crimson-falcon/api/{container_images_api.rb → container_images.rb} +116 -116
  18. data/lib/crimson-falcon/api/{container_packages_api.rb → container_packages.rb} +122 -52
  19. data/lib/crimson-falcon/api/{container_vulnerabilities_api.rb → container_vulnerabilities.rb} +93 -93
  20. data/lib/crimson-falcon/api/content_update_policies.rb +769 -0
  21. data/lib/crimson-falcon/api/correlation_rules.rb +505 -0
  22. data/lib/crimson-falcon/api/{cspg_iacapi_api.rb → cspg_iac.rb} +4 -4
  23. data/lib/crimson-falcon/api/{cspm_registration_api.rb → cspm_registration.rb} +473 -414
  24. data/lib/crimson-falcon/api/{custom_ioa_api.rb → custom_ioa.rb} +82 -82
  25. data/lib/crimson-falcon/api/{custom_storage_api.rb → custom_storage.rb} +136 -136
  26. data/lib/crimson-falcon/api/{d4c_registration_api.rb → d4c_registration.rb} +97 -178
  27. data/lib/crimson-falcon/api/{datascanner_api.rb → datascanner.rb} +13 -13
  28. data/lib/crimson-falcon/api/{delivery_settings_api.rb → delivery_settings.rb} +8 -8
  29. data/lib/crimson-falcon/api/deployments.rb +115 -0
  30. data/lib/crimson-falcon/api/{detects_api.rb → detects.rb} +18 -18
  31. data/lib/crimson-falcon/api/device_content.rb +176 -0
  32. data/lib/crimson-falcon/api/{device_control_policies_api.rb → device_control_policies.rb} +57 -57
  33. data/lib/crimson-falcon/api/{discover_api.rb → discover.rb} +119 -53
  34. data/lib/crimson-falcon/api/{discover_iot_api.rb → discover_iot.rb} +16 -16
  35. data/lib/crimson-falcon/api/downloads.rb +108 -0
  36. data/lib/crimson-falcon/api/{downloads_api_api.rb → downloads_api.rb} +4 -73
  37. data/lib/crimson-falcon/api/{drift_indicators_api.rb → drift_indicators.rb} +38 -38
  38. data/lib/crimson-falcon/api/{event_schema_api.rb → event_schema.rb} +10 -10
  39. data/lib/crimson-falcon/api/{event_streams_api.rb → event_streams.rb} +11 -11
  40. data/lib/crimson-falcon/api/{exposure_management_api.rb → exposure_management.rb} +47 -41
  41. data/lib/crimson-falcon/api/{falcon_complete_dashboard_api.rb → falcon_complete_dashboard.rb} +73 -73
  42. data/lib/crimson-falcon/api/{falcon_container_api.rb → falcon_container.rb} +4 -4
  43. data/lib/crimson-falcon/api/{falcon_container_cli_api.rb → falcon_container_cli.rb} +5 -5
  44. data/lib/crimson-falcon/api/{falcon_container_image_api.rb → falcon_container_image.rb} +46 -46
  45. data/lib/crimson-falcon/api/{falconx_sandbox_api.rb → falconx_sandbox.rb} +62 -62
  46. data/lib/crimson-falcon/api/{field_schema_api.rb → field_schema.rb} +7 -7
  47. data/lib/crimson-falcon/api/{filevantage_api.rb → filevantage.rb} +149 -149
  48. data/lib/crimson-falcon/api/{firewall_management_api.rb → firewall_management.rb} +138 -138
  49. data/lib/crimson-falcon/api/{firewall_policies_api.rb → firewall_policies.rb} +52 -52
  50. data/lib/crimson-falcon/api/{foundry_logscale_api.rb → foundry_logscale.rb} +65 -65
  51. data/lib/crimson-falcon/api/{handle_api.rb → handle.rb} +4 -4
  52. data/lib/crimson-falcon/api/{host_group_api.rb → host_group.rb} +46 -46
  53. data/lib/crimson-falcon/api/{host_migration_api.rb → host_migration.rb} +49 -49
  54. data/lib/crimson-falcon/api/{hosts_api.rb → hosts.rb} +50 -50
  55. data/lib/crimson-falcon/api/{humio_auth_proxy_api.rb → humio_auth_proxy.rb} +37 -37
  56. data/lib/crimson-falcon/api/{identity_entities_api.rb → identity_entities.rb} +12 -12
  57. data/lib/crimson-falcon/api/{identity_protection_api.rb → identity_protection.rb} +28 -28
  58. data/lib/crimson-falcon/api/{image_assessment_policies_api.rb → image_assessment_policies.rb} +44 -44
  59. data/lib/crimson-falcon/api/{incidents_api.rb → incidents.rb} +22 -22
  60. data/lib/crimson-falcon/api/{installation_tokens_api.rb → installation_tokens.rb} +29 -29
  61. data/lib/crimson-falcon/api/{installation_tokens_settings_api.rb → installation_tokens_settings.rb} +5 -5
  62. data/lib/crimson-falcon/api/{intel_api.rb → intel.rb} +85 -85
  63. data/lib/crimson-falcon/api/intelligence_indicator_graph.rb +118 -0
  64. data/lib/crimson-falcon/api/{ioa_exclusions_api.rb → ioa_exclusions.rb} +20 -20
  65. data/lib/crimson-falcon/api/{ioc_api.rb → ioc.rb} +61 -61
  66. data/lib/crimson-falcon/api/{iocs_api.rb → iocs.rb} +21 -21
  67. data/lib/crimson-falcon/api/{kubernetes_protection_api.rb → kubernetes_protection.rb} +370 -370
  68. data/lib/crimson-falcon/api/lookup_files.rb +239 -0
  69. data/lib/crimson-falcon/api/{malquery_api.rb → malquery.rb} +36 -36
  70. data/lib/crimson-falcon/api/{message_center_api.rb → message_center.rb} +42 -42
  71. data/lib/crimson-falcon/api/{ml_exclusions_api.rb → ml_exclusions.rb} +20 -20
  72. data/lib/crimson-falcon/api/{mobile_enrollment_api.rb → mobile_enrollment.rb} +9 -9
  73. data/lib/crimson-falcon/api/{mssp_api.rb → mssp.rb} +117 -117
  74. data/lib/crimson-falcon/api/{oauth2_api.rb → oauth2.rb} +10 -10
  75. data/lib/crimson-falcon/api/{ods_api.rb → ods.rb} +61 -61
  76. data/lib/crimson-falcon/api/{overwatch_dashboard_api.rb → overwatch_dashboard.rb} +21 -21
  77. data/lib/crimson-falcon/api/{prevention_policies_api.rb → prevention_policies.rb} +50 -50
  78. data/lib/crimson-falcon/api/{quarantine_api.rb → quarantine.rb} +24 -24
  79. data/lib/crimson-falcon/api/{quick_scan_api.rb → quick_scan.rb} +16 -16
  80. data/lib/crimson-falcon/api/{quick_scan_pro_api.rb → quick_scan_pro.rb} +25 -25
  81. data/lib/crimson-falcon/api/{real_time_response_api.rb → real_time_response.rb} +98 -98
  82. data/lib/crimson-falcon/api/{real_time_response_admin_api.rb → real_time_response_admin.rb} +72 -72
  83. data/lib/crimson-falcon/api/{real_time_response_audit_api.rb → real_time_response_audit.rb} +4 -4
  84. data/lib/crimson-falcon/api/{recon_api.rb → recon.rb} +109 -109
  85. data/lib/crimson-falcon/api/release_notes.rb +287 -0
  86. data/lib/crimson-falcon/api/releases.rb +125 -0
  87. data/lib/crimson-falcon/api/{report_executions_api.rb → report_executions.rb} +16 -16
  88. data/lib/crimson-falcon/api/{response_policies_api.rb → response_policies.rb} +50 -50
  89. data/lib/crimson-falcon/api/{runtime_detections_api.rb → runtime_detections.rb} +13 -13
  90. data/lib/crimson-falcon/api/{sample_uploads_api.rb → sample_uploads.rb} +49 -49
  91. data/lib/crimson-falcon/api/{scheduled_reports_api.rb → scheduled_reports.rb} +12 -12
  92. data/lib/crimson-falcon/api/{sensor_download_api.rb → sensor_download.rb} +32 -32
  93. data/lib/crimson-falcon/api/{sensor_update_policies_api.rb → sensor_update_policies.rb} +88 -88
  94. data/lib/crimson-falcon/api/{sensor_usage_api_api.rb → sensor_usage.rb} +4 -4
  95. data/lib/crimson-falcon/api/{sensor_visibility_exclusions_api.rb → sensor_visibility_exclusions.rb} +20 -20
  96. data/lib/crimson-falcon/api/{spotlight_evaluation_logic_api.rb → spotlight_evaluation_logic.rb} +13 -13
  97. data/lib/crimson-falcon/api/{spotlight_vulnerabilities_api.rb → spotlight_vulnerabilities.rb} +27 -27
  98. data/lib/crimson-falcon/api/{threatgraph_api.rb → threatgraph.rb} +42 -42
  99. data/lib/crimson-falcon/api/{unidentified_containers_api.rb → unidentified_containers.rb} +23 -23
  100. data/lib/crimson-falcon/api/{user_management_api.rb → user_management.rb} +94 -94
  101. data/lib/crimson-falcon/api/vulnerabilities.rb +106 -0
  102. data/lib/crimson-falcon/api/{workflows_api.rb → workflows.rb} +76 -76
  103. data/lib/crimson-falcon/api/{zero_trust_assessment_api.rb → zero_trust_assessment.rb} +12 -12
  104. data/lib/crimson-falcon/models/api_create_rule_operation_v1.rb +257 -0
  105. data/lib/crimson-falcon/models/api_get_entities_rules_response_v1.rb +266 -0
  106. data/lib/crimson-falcon/models/api_patch_rule_operation_v1.rb +257 -0
  107. data/lib/crimson-falcon/models/api_patch_rule_search_v1.rb +261 -0
  108. data/lib/crimson-falcon/models/api_rule_create_request_v1.rb +354 -0
  109. data/lib/crimson-falcon/models/api_rule_operation_v1.rb +266 -0
  110. data/lib/crimson-falcon/models/api_rule_patch_request_v1.rb +311 -0
  111. data/lib/crimson-falcon/models/api_rule_schedule_v1.rb +239 -0
  112. data/lib/crimson-falcon/models/api_rule_schedule_v1_patch.rb +239 -0
  113. data/lib/crimson-falcon/models/api_rule_search_v1.rb +276 -0
  114. data/lib/crimson-falcon/models/api_rule_v1.rb +132 -203
  115. data/lib/crimson-falcon/models/apidomain_saved_search_execute_request_v1.rb +1 -89
  116. data/lib/crimson-falcon/models/assets_get_resource_ids_response.rb +261 -0
  117. data/lib/crimson-falcon/models/assets_get_resources_response.rb +266 -0
  118. data/lib/crimson-falcon/models/base_set_content_update_policy_precedence_req_v1.rb +242 -0
  119. data/lib/crimson-falcon/models/content_update_create_policies_req_v1.rb +241 -0
  120. data/lib/crimson-falcon/models/content_update_create_policy_req_v1.rb +259 -0
  121. data/lib/crimson-falcon/models/content_update_ring_assignment_settings_v1.rb +253 -0
  122. data/lib/crimson-falcon/models/content_update_settings_v1.rb +241 -0
  123. data/lib/crimson-falcon/models/content_update_update_policies_req_v1.rb +241 -0
  124. data/lib/crimson-falcon/models/content_update_update_policy_req_v1.rb +269 -0
  125. data/lib/crimson-falcon/models/dataclassifications_label.rb +267 -0
  126. data/lib/crimson-falcon/models/dataclassifications_response.rb +284 -0
  127. data/lib/crimson-falcon/models/dataclassifications_tag.rb +283 -0
  128. data/lib/crimson-falcon/models/deployments_api_deployment_ring_view.rb +302 -0
  129. data/lib/crimson-falcon/models/deployments_api_deployment_view.rb +309 -0
  130. data/lib/crimson-falcon/models/deployments_api_deployment_view_wrapper.rb +271 -0
  131. data/lib/crimson-falcon/models/detectsapi_post_combined_alerts_v1_meta.rb +271 -0
  132. data/lib/crimson-falcon/models/detectsapi_post_combined_alerts_v1_paging.rb +262 -0
  133. data/lib/crimson-falcon/models/detectsapi_post_combined_alerts_v1_request_swagger.rb +261 -0
  134. data/lib/crimson-falcon/models/detectsapi_post_combined_alerts_v1_response_swagger.rb +272 -0
  135. data/lib/crimson-falcon/models/device_control_usb_class_exceptions_req_v1.rb +3 -3
  136. data/lib/crimson-falcon/models/device_control_usb_class_exceptions_response.rb +3 -3
  137. data/lib/crimson-falcon/models/devicecontent_content_category.rb +234 -0
  138. data/lib/crimson-falcon/models/devicecontent_state.rb +345 -0
  139. data/lib/crimson-falcon/models/devicecontentapi_entities_response_v1.rb +271 -0
  140. data/lib/crimson-falcon/models/devicecontentapi_query_response_v1.rb +271 -0
  141. data/lib/crimson-falcon/models/domain_aws_account_resource_metadata.rb +66 -1
  142. data/lib/crimson-falcon/models/domain_benchmark.rb +12 -1
  143. data/lib/crimson-falcon/models/domain_content_update_policy_resp_v1.rb +474 -0
  144. data/lib/crimson-falcon/models/domain_content_update_settings_v1.rb +241 -0
  145. data/lib/crimson-falcon/models/domain_discover_api_active_discovery_host.rb +21 -1
  146. data/lib/crimson-falcon/models/domain_discover_api_application_host.rb +13 -1
  147. data/lib/crimson-falcon/models/domain_discover_api_host.rb +33 -1
  148. data/lib/crimson-falcon/models/domain_discover_apiio_t_host.rb +33 -1
  149. data/lib/crimson-falcon/models/domain_kestrel_params.rb +239 -0
  150. data/lib/crimson-falcon/models/domain_lookup_file.rb +453 -0
  151. data/lib/crimson-falcon/models/domain_lookup_file_wrapper.rb +271 -0
  152. data/lib/crimson-falcon/models/domain_report_metadata.rb +10 -1
  153. data/lib/crimson-falcon/models/domain_ring_assignment_settings_v1.rb +267 -0
  154. data/lib/crimson-falcon/models/domain_scheduled_report_v1.rb +15 -1
  155. data/lib/crimson-falcon/models/domain_update_rule_request_v1.rb +18 -1
  156. data/lib/crimson-falcon/models/figapi_adversary.rb +235 -0
  157. data/lib/crimson-falcon/models/figapi_country.rb +245 -0
  158. data/lib/crimson-falcon/models/figapi_domain.rb +345 -0
  159. data/lib/crimson-falcon/models/figapi_email_address.rb +252 -0
  160. data/lib/crimson-falcon/models/figapi_file.rb +299 -0
  161. data/lib/crimson-falcon/models/figapi_indicator.rb +458 -0
  162. data/lib/crimson-falcon/models/figapi_ipv4.rb +269 -0
  163. data/lib/crimson-falcon/models/figapi_ipv6.rb +269 -0
  164. data/lib/crimson-falcon/models/figapi_mx_record.rb +284 -0
  165. data/lib/crimson-falcon/models/figapi_name_server.rb +254 -0
  166. data/lib/crimson-falcon/models/figapi_report.rb +235 -0
  167. data/lib/crimson-falcon/models/figapi_sector.rb +245 -0
  168. data/lib/crimson-falcon/models/figapi_threat.rb +235 -0
  169. data/lib/crimson-falcon/models/figapi_url.rb +247 -0
  170. data/lib/crimson-falcon/models/figapi_vulnerability.rb +374 -0
  171. data/lib/crimson-falcon/models/figapi_who_is.rb +261 -0
  172. data/lib/crimson-falcon/models/figapi_whois_record.rb +306 -0
  173. data/lib/crimson-falcon/models/figapi_x509_certificate.rb +297 -0
  174. data/lib/crimson-falcon/models/graph_condition.rb +2 -12
  175. data/lib/crimson-falcon/models/help.rb +239 -0
  176. data/lib/crimson-falcon/models/ingestion_cve_exploit_reference.rb +267 -0
  177. data/lib/crimson-falcon/models/ingestion_cve_exploit_source.rb +283 -0
  178. data/lib/crimson-falcon/models/ingestion_ex_prt_rating_factors.rb +281 -0
  179. data/lib/crimson-falcon/models/ingestion_reference.rb +255 -0
  180. data/lib/crimson-falcon/models/inventoryapi_surface_error.rb +260 -0
  181. data/lib/crimson-falcon/models/{client_fql_statement.rb → inventoryapi_user_external_asset.rb} +16 -28
  182. data/lib/crimson-falcon/models/inventoryapi_user_external_asset_create.rb +257 -0
  183. data/lib/crimson-falcon/models/inventoryapi_user_external_asset_create_request_v1.rb +242 -0
  184. data/lib/crimson-falcon/models/inventoryapi_user_external_asset_create_response_v1.rb +266 -0
  185. data/lib/crimson-falcon/models/inventoryapi_user_external_asset_result.rb +322 -0
  186. data/lib/crimson-falcon/models/inventoryapidomain_subsidiary.rb +245 -0
  187. data/lib/crimson-falcon/models/jsonschema_pivot.rb +19 -1
  188. data/lib/crimson-falcon/models/jsonschema_signals_extensions.rb +22 -4
  189. data/lib/crimson-falcon/models/jsonschema_ui_extensions.rb +34 -4
  190. data/lib/crimson-falcon/models/models_api_customer_and_image.rb +15 -1
  191. data/lib/crimson-falcon/models/models_api_image_combined_export.rb +26 -1
  192. data/lib/crimson-falcon/models/models_api_package_combined.rb +15 -1
  193. data/lib/crimson-falcon/models/models_api_package_combined_v2.rb +381 -0
  194. data/lib/crimson-falcon/models/models_api_vulnerability_combined.rb +15 -1
  195. data/lib/crimson-falcon/models/models_application_library.rb +13 -4
  196. data/lib/crimson-falcon/models/models_container.rb +15 -1
  197. data/lib/crimson-falcon/models/models_ext_api_image_combined.rb +15 -1
  198. data/lib/crimson-falcon/models/models_message.rb +239 -0
  199. data/lib/crimson-falcon/models/models_partial_fingerprints.rb +239 -0
  200. data/lib/crimson-falcon/models/models_result.rb +339 -0
  201. data/lib/crimson-falcon/models/models_result_location.rb +253 -0
  202. data/lib/crimson-falcon/models/models_result_location_properties.rb +253 -0
  203. data/lib/crimson-falcon/models/models_result_physical_location.rb +253 -0
  204. data/lib/crimson-falcon/models/models_result_physical_location_artifact_location.rb +239 -0
  205. data/lib/crimson-falcon/models/models_result_physical_location_region.rb +239 -0
  206. data/lib/crimson-falcon/models/models_result_properties.rb +365 -0
  207. data/lib/crimson-falcon/models/models_rule.rb +337 -0
  208. data/lib/crimson-falcon/models/models_rule_default_configuration.rb +239 -0
  209. data/lib/crimson-falcon/models/models_rule_properties.rb +669 -0
  210. data/lib/crimson-falcon/models/models_run.rb +255 -0
  211. data/lib/crimson-falcon/models/models_run_tool.rb +239 -0
  212. data/lib/crimson-falcon/models/models_run_tool_driver.rb +283 -0
  213. data/lib/crimson-falcon/models/models_vulnerability_sarif.rb +269 -0
  214. data/lib/crimson-falcon/models/packages_api_combined_package_v2.rb +266 -0
  215. data/lib/crimson-falcon/models/policyframework_benchmark.rb +253 -0
  216. data/lib/crimson-falcon/models/policyframework_control.rb +290 -0
  217. data/lib/crimson-falcon/models/quickscanpro_query_scan_results_response.rb +10 -1
  218. data/lib/crimson-falcon/models/registration_aws_account_ext_v2.rb +19 -1
  219. data/lib/crimson-falcon/models/registration_aws_account_patch.rb +19 -1
  220. data/lib/crimson-falcon/models/registration_aws_account_response_v2.rb +0 -5
  221. data/lib/crimson-falcon/models/registration_azure_download_certificate_response_v1.rb +0 -5
  222. data/lib/crimson-falcon/models/registration_iom_event_v2.rb +12 -1
  223. data/lib/crimson-falcon/models/releasecontents_release_content.rb +327 -0
  224. data/lib/crimson-falcon/models/releasecontents_release_content_version.rb +267 -0
  225. data/lib/crimson-falcon/models/releasenotes_entities_get_request.rb +241 -0
  226. data/lib/crimson-falcon/models/releasenotes_entities_get_response_wrapper.rb +269 -0
  227. data/lib/crimson-falcon/models/releasenotes_note_detail.rb +270 -0
  228. data/lib/crimson-falcon/models/releasenotes_release_note_v1.rb +303 -0
  229. data/lib/crimson-falcon/models/releasenotes_release_note_wrapper_v1.rb +271 -0
  230. data/lib/crimson-falcon/models/releases_release.rb +328 -0
  231. data/lib/crimson-falcon/models/releases_release_wrapper.rb +271 -0
  232. data/lib/crimson-falcon/models/resources_app.rb +243 -0
  233. data/lib/crimson-falcon/models/resources_asset_graph.rb +243 -0
  234. data/lib/crimson-falcon/models/resources_cloud_context.rb +378 -0
  235. data/lib/crimson-falcon/models/resources_cloud_resource.rb +604 -0
  236. data/lib/crimson-falcon/models/resources_compliance.rb +307 -0
  237. data/lib/crimson-falcon/models/resources_detections.rb +291 -0
  238. data/lib/crimson-falcon/models/resources_host.rb +390 -0
  239. data/lib/crimson-falcon/models/resources_relationship.rb +261 -0
  240. data/lib/crimson-falcon/models/resources_vulnerability.rb +262 -0
  241. data/lib/crimson-falcon/models/rest_azure_download_script_request_data.rb +239 -0
  242. data/lib/crimson-falcon/models/rest_azure_download_script_request_v1.rb +241 -0
  243. data/lib/crimson-falcon/models/rest_azure_provision_get_account_script_response_v1.rb +266 -0
  244. data/lib/crimson-falcon/models/rest_azure_script.rb +276 -0
  245. data/lib/crimson-falcon/models/rest_cursor_and_limit_meta_info.rb +289 -0
  246. data/lib/crimson-falcon/models/rest_cursor_meta_info.rb +280 -0
  247. data/lib/crimson-falcon/models/rest_cursor_response_fields.rb +250 -0
  248. data/lib/crimson-falcon/models/rest_paging.rb +262 -0
  249. data/lib/crimson-falcon/models/restapi_indicator_response.rb +271 -0
  250. data/lib/crimson-falcon/models/restapi_indicators_query_request.rb +255 -0
  251. data/lib/crimson-falcon/models/restapi_indicators_query_sort_request.rb +267 -0
  252. data/lib/crimson-falcon/models/sadomain_typosquatting_base_domain.rb +19 -1
  253. data/lib/crimson-falcon/models/sadomain_typosquatting_subdomain.rb +1 -15
  254. data/lib/crimson-falcon/models/string_wrapper.rb +266 -0
  255. data/lib/crimson-falcon/models/types_get_executor_nodes_metadata_response.rb +278 -0
  256. data/lib/crimson-falcon/models/types_get_integration_tasks_metadata_response.rb +267 -0
  257. data/lib/crimson-falcon/models/v2_for_loop.rb +10 -1
  258. data/lib/crimson-falcon/models/vulnerabilities_vulnerability_entity_sarif_response.rb +266 -0
  259. data/lib/crimson-falcon/version.rb +2 -2
  260. data/lib/crimson-falcon.rb +223 -90
  261. data/spec/api/{alerts_api_spec.rb → alerts_spec.rb} +21 -10
  262. data/spec/api/{api_integrations_api_spec.rb → api_integrations_spec.rb} +8 -8
  263. data/spec/api/{aspm_api_spec.rb → aspm_spec.rb} +51 -8
  264. data/spec/api/{certificate_based_exclusions_api_spec.rb → certificate_based_exclusions_spec.rb} +8 -8
  265. data/spec/api/{default_api_spec.rb → cloud_aws_registration_spec.rb} +8 -8
  266. data/spec/api/cloud_azure_registration_spec.rb +63 -0
  267. data/spec/api/{cloud_connect_aws_api_spec.rb → cloud_connect_aws_spec.rb} +8 -8
  268. data/spec/api/cloud_security_assets_spec.rb +78 -0
  269. data/spec/api/{cloud_snapshots_api_spec.rb → cloud_snapshots_spec.rb} +8 -8
  270. data/spec/api/{compliance_assessments_api_spec.rb → compliance_assessments_spec.rb} +8 -8
  271. data/spec/api/{configuration_assessment_evaluation_logic_api_spec.rb → configuration_assessment_evaluation_logic_spec.rb} +8 -8
  272. data/spec/api/{configuration_assessment_api_spec.rb → configuration_assessment_spec.rb} +8 -8
  273. data/spec/api/{container_alerts_api_spec.rb → container_alerts_spec.rb} +12 -12
  274. data/spec/api/{container_detections_api_spec.rb → container_detections_spec.rb} +18 -18
  275. data/spec/api/{container_images_api_spec.rb → container_images_spec.rb} +38 -38
  276. data/spec/api/{container_packages_api_spec.rb → container_packages_spec.rb} +36 -21
  277. data/spec/api/{container_vulnerabilities_api_spec.rb → container_vulnerabilities_spec.rb} +28 -28
  278. data/spec/api/content_update_policies_spec.rb +177 -0
  279. data/spec/api/correlation_rules_spec.rb +137 -0
  280. data/spec/api/{cspg_iacapi_api_spec.rb → cspg_iac_spec.rb} +8 -8
  281. data/spec/api/{cspm_registration_api_spec.rb → cspm_registration_spec.rb} +94 -84
  282. data/spec/api/{custom_ioa_api_spec.rb → custom_ioa_spec.rb} +12 -12
  283. data/spec/api/{custom_storage_api_spec.rb → custom_storage_spec.rb} +8 -8
  284. data/spec/api/{d4c_registration_api_spec.rb → d4c_registration_spec.rb} +9 -22
  285. data/spec/api/{datascanner_api_spec.rb → datascanner_spec.rb} +8 -8
  286. data/spec/api/{delivery_settings_api_spec.rb → delivery_settings_spec.rb} +8 -8
  287. data/spec/api/deployments_spec.rb +65 -0
  288. data/spec/api/{detects_api_spec.rb → detects_spec.rb} +8 -8
  289. data/spec/api/device_content_spec.rb +77 -0
  290. data/spec/api/{device_control_policies_api_spec.rb → device_control_policies_spec.rb} +8 -8
  291. data/spec/api/{discover_iot_api_spec.rb → discover_iot_spec.rb} +8 -8
  292. data/spec/api/{discover_api_spec.rb → discover_spec.rb} +19 -8
  293. data/spec/api/{downloads_api_api_spec.rb → downloads_spec.rb} +8 -20
  294. data/spec/api/{drift_indicators_api_spec.rb → drift_indicators_spec.rb} +16 -16
  295. data/spec/api/{event_schema_api_spec.rb → event_schema_spec.rb} +8 -8
  296. data/spec/api/{event_streams_api_spec.rb → event_streams_spec.rb} +8 -8
  297. data/spec/api/{exposure_management_api_spec.rb → exposure_management_spec.rb} +10 -8
  298. data/spec/api/{falcon_complete_dashboard_api_spec.rb → falcon_complete_dashboard_spec.rb} +8 -8
  299. data/spec/api/{falcon_container_cli_api_spec.rb → falcon_container_cli_spec.rb} +8 -8
  300. data/spec/api/{falcon_container_image_api_spec.rb → falcon_container_image_spec.rb} +13 -13
  301. data/spec/api/{falcon_container_api_spec.rb → falcon_container_spec.rb} +8 -8
  302. data/spec/api/{falconx_sandbox_api_spec.rb → falconx_sandbox_spec.rb} +8 -8
  303. data/spec/api/{field_schema_api_spec.rb → field_schema_spec.rb} +8 -8
  304. data/spec/api/{filevantage_api_spec.rb → filevantage_spec.rb} +14 -14
  305. data/spec/api/{firewall_management_api_spec.rb → firewall_management_spec.rb} +16 -16
  306. data/spec/api/{firewall_policies_api_spec.rb → firewall_policies_spec.rb} +8 -8
  307. data/spec/api/{foundry_logscale_api_spec.rb → foundry_logscale_spec.rb} +8 -8
  308. data/spec/api/{handle_api_spec.rb → handle_spec.rb} +8 -8
  309. data/spec/api/{host_group_api_spec.rb → host_group_spec.rb} +8 -8
  310. data/spec/api/{host_migration_api_spec.rb → host_migration_spec.rb} +10 -10
  311. data/spec/api/{hosts_api_spec.rb → hosts_spec.rb} +8 -8
  312. data/spec/api/{humio_auth_proxy_api_spec.rb → humio_auth_proxy_spec.rb} +8 -8
  313. data/spec/api/{identity_entities_api_spec.rb → identity_entities_spec.rb} +8 -8
  314. data/spec/api/{identity_protection_api_spec.rb → identity_protection_spec.rb} +8 -8
  315. data/spec/api/{image_assessment_policies_api_spec.rb → image_assessment_policies_spec.rb} +8 -8
  316. data/spec/api/{incidents_api_spec.rb → incidents_spec.rb} +8 -8
  317. data/spec/api/{installation_tokens_settings_api_spec.rb → installation_tokens_settings_spec.rb} +8 -8
  318. data/spec/api/{installation_tokens_api_spec.rb → installation_tokens_spec.rb} +8 -8
  319. data/spec/api/{intel_api_spec.rb → intel_spec.rb} +8 -8
  320. data/spec/api/intelligence_indicator_graph_spec.rb +66 -0
  321. data/spec/api/{ioa_exclusions_api_spec.rb → ioa_exclusions_spec.rb} +8 -8
  322. data/spec/api/{ioc_api_spec.rb → ioc_spec.rb} +8 -8
  323. data/spec/api/{iocs_api_spec.rb → iocs_spec.rb} +8 -8
  324. data/spec/api/{kubernetes_protection_api_spec.rb → kubernetes_protection_spec.rb} +66 -66
  325. data/spec/api/lookup_files_spec.rb +80 -0
  326. data/spec/api/{malquery_api_spec.rb → malquery_spec.rb} +8 -8
  327. data/spec/api/{message_center_api_spec.rb → message_center_spec.rb} +8 -8
  328. data/spec/api/{ml_exclusions_api_spec.rb → ml_exclusions_spec.rb} +8 -8
  329. data/spec/api/{mobile_enrollment_api_spec.rb → mobile_enrollment_spec.rb} +8 -8
  330. data/spec/api/{mssp_api_spec.rb → mssp_spec.rb} +8 -8
  331. data/spec/api/{oauth2_api_spec.rb → oauth2_spec.rb} +8 -8
  332. data/spec/api/{ods_api_spec.rb → ods_spec.rb} +8 -8
  333. data/spec/api/{overwatch_dashboard_api_spec.rb → overwatch_dashboard_spec.rb} +8 -8
  334. data/spec/api/{prevention_policies_api_spec.rb → prevention_policies_spec.rb} +8 -8
  335. data/spec/api/{quarantine_api_spec.rb → quarantine_spec.rb} +8 -8
  336. data/spec/api/{quick_scan_pro_api_spec.rb → quick_scan_pro_spec.rb} +8 -8
  337. data/spec/api/{quick_scan_api_spec.rb → quick_scan_spec.rb} +8 -8
  338. data/spec/api/{real_time_response_admin_api_spec.rb → real_time_response_admin_spec.rb} +8 -8
  339. data/spec/api/{real_time_response_audit_api_spec.rb → real_time_response_audit_spec.rb} +8 -8
  340. data/spec/api/{real_time_response_api_spec.rb → real_time_response_spec.rb} +8 -8
  341. data/spec/api/{recon_api_spec.rb → recon_spec.rb} +8 -8
  342. data/spec/api/release_notes_spec.rb +97 -0
  343. data/spec/api/releases_spec.rb +68 -0
  344. data/spec/api/{report_executions_api_spec.rb → report_executions_spec.rb} +8 -8
  345. data/spec/api/{response_policies_api_spec.rb → response_policies_spec.rb} +8 -8
  346. data/spec/api/{runtime_detections_api_spec.rb → runtime_detections_spec.rb} +11 -11
  347. data/spec/api/{sample_uploads_api_spec.rb → sample_uploads_spec.rb} +8 -8
  348. data/spec/api/{scheduled_reports_api_spec.rb → scheduled_reports_spec.rb} +8 -8
  349. data/spec/api/{sensor_download_api_spec.rb → sensor_download_spec.rb} +8 -8
  350. data/spec/api/{sensor_update_policies_api_spec.rb → sensor_update_policies_spec.rb} +8 -8
  351. data/spec/api/{sensor_usage_api_api_spec.rb → sensor_usage_spec.rb} +8 -8
  352. data/spec/api/{sensor_visibility_exclusions_api_spec.rb → sensor_visibility_exclusions_spec.rb} +8 -8
  353. data/spec/api/{spotlight_evaluation_logic_api_spec.rb → spotlight_evaluation_logic_spec.rb} +8 -8
  354. data/spec/api/{spotlight_vulnerabilities_api_spec.rb → spotlight_vulnerabilities_spec.rb} +12 -12
  355. data/spec/api/{threatgraph_api_spec.rb → threatgraph_spec.rb} +8 -8
  356. data/spec/api/{unidentified_containers_api_spec.rb → unidentified_containers_spec.rb} +13 -13
  357. data/spec/api/{user_management_api_spec.rb → user_management_spec.rb} +8 -8
  358. data/spec/api/vulnerabilities_spec.rb +66 -0
  359. data/spec/api/{workflows_api_spec.rb → workflows_spec.rb} +8 -8
  360. data/spec/api/{zero_trust_assessment_api_spec.rb → zero_trust_assessment_spec.rb} +8 -8
  361. data/spec/models/api_create_rule_operation_v1_spec.rb +63 -0
  362. data/spec/models/api_get_entities_rules_response_v1_spec.rb +63 -0
  363. data/spec/models/api_patch_rule_operation_v1_spec.rb +63 -0
  364. data/spec/models/api_patch_rule_search_v1_spec.rb +69 -0
  365. data/spec/models/api_rule_create_request_v1_spec.rb +111 -0
  366. data/spec/models/api_rule_operation_v1_spec.rb +69 -0
  367. data/spec/models/api_rule_patch_request_v1_spec.rb +99 -0
  368. data/spec/models/api_rule_schedule_v1_patch_spec.rb +51 -0
  369. data/spec/models/api_rule_schedule_v1_spec.rb +51 -0
  370. data/spec/models/api_rule_search_v1_spec.rb +69 -0
  371. data/spec/models/api_rule_v1_spec.rb +16 -34
  372. data/spec/models/apidomain_saved_search_execute_request_v1_spec.rb +0 -36
  373. data/spec/models/assets_get_resource_ids_response_spec.rb +63 -0
  374. data/spec/models/assets_get_resources_response_spec.rb +63 -0
  375. data/spec/models/base_set_content_update_policy_precedence_req_v1_spec.rb +51 -0
  376. data/spec/models/content_update_create_policies_req_v1_spec.rb +51 -0
  377. data/spec/models/content_update_create_policy_req_v1_spec.rb +63 -0
  378. data/spec/models/content_update_ring_assignment_settings_v1_spec.rb +57 -0
  379. data/spec/models/content_update_settings_v1_spec.rb +51 -0
  380. data/spec/models/content_update_update_policies_req_v1_spec.rb +51 -0
  381. data/spec/models/content_update_update_policy_req_v1_spec.rb +69 -0
  382. data/spec/models/dataclassifications_label_spec.rb +63 -0
  383. data/spec/models/dataclassifications_response_spec.rb +75 -0
  384. data/spec/models/dataclassifications_tag_spec.rb +69 -0
  385. data/spec/models/deployments_api_deployment_ring_view_spec.rb +87 -0
  386. data/spec/models/deployments_api_deployment_view_spec.rb +93 -0
  387. data/spec/models/deployments_api_deployment_view_wrapper_spec.rb +63 -0
  388. data/spec/models/detectsapi_post_combined_alerts_v1_meta_spec.rb +69 -0
  389. data/spec/models/detectsapi_post_combined_alerts_v1_paging_spec.rb +63 -0
  390. data/spec/models/detectsapi_post_combined_alerts_v1_request_swagger_spec.rb +69 -0
  391. data/spec/models/detectsapi_post_combined_alerts_v1_response_swagger_spec.rb +63 -0
  392. data/spec/models/device_control_usb_class_exceptions_req_v1_spec.rb +1 -1
  393. data/spec/models/device_control_usb_class_exceptions_response_spec.rb +1 -1
  394. data/spec/models/devicecontent_content_category_spec.rb +51 -0
  395. data/spec/models/devicecontent_state_spec.rb +117 -0
  396. data/spec/models/devicecontentapi_entities_response_v1_spec.rb +63 -0
  397. data/spec/models/devicecontentapi_query_response_v1_spec.rb +63 -0
  398. data/spec/models/domain_aws_account_resource_metadata_spec.rb +30 -0
  399. data/spec/models/domain_benchmark_spec.rb +6 -0
  400. data/spec/models/domain_content_update_policy_resp_v1_spec.rb +153 -0
  401. data/spec/models/domain_content_update_settings_v1_spec.rb +51 -0
  402. data/spec/models/domain_discover_api_active_discovery_host_spec.rb +12 -0
  403. data/spec/models/domain_discover_api_application_host_spec.rb +6 -0
  404. data/spec/models/domain_discover_api_host_spec.rb +18 -0
  405. data/spec/models/domain_discover_apiio_t_host_spec.rb +18 -0
  406. data/spec/models/domain_kestrel_params_spec.rb +51 -0
  407. data/spec/models/domain_lookup_file_spec.rb +147 -0
  408. data/spec/models/domain_lookup_file_wrapper_spec.rb +63 -0
  409. data/spec/models/domain_report_metadata_spec.rb +6 -0
  410. data/spec/models/domain_ring_assignment_settings_v1_spec.rb +63 -0
  411. data/spec/models/domain_scheduled_report_v1_spec.rb +6 -0
  412. data/spec/models/domain_update_rule_request_v1_spec.rb +6 -0
  413. data/spec/models/figapi_adversary_spec.rb +51 -0
  414. data/spec/models/figapi_country_spec.rb +57 -0
  415. data/spec/models/figapi_domain_spec.rb +117 -0
  416. data/spec/models/figapi_email_address_spec.rb +63 -0
  417. data/spec/models/figapi_file_spec.rb +87 -0
  418. data/spec/models/figapi_indicator_spec.rb +183 -0
  419. data/spec/models/figapi_ipv4_spec.rb +69 -0
  420. data/spec/models/figapi_ipv6_spec.rb +69 -0
  421. data/spec/models/figapi_mx_record_spec.rb +75 -0
  422. data/spec/models/figapi_name_server_spec.rb +63 -0
  423. data/spec/models/figapi_report_spec.rb +51 -0
  424. data/spec/models/figapi_sector_spec.rb +57 -0
  425. data/spec/models/figapi_threat_spec.rb +51 -0
  426. data/spec/models/figapi_url_spec.rb +57 -0
  427. data/spec/models/figapi_vulnerability_spec.rb +141 -0
  428. data/spec/models/figapi_who_is_spec.rb +69 -0
  429. data/spec/models/figapi_whois_record_spec.rb +99 -0
  430. data/spec/models/figapi_x509_certificate_spec.rb +93 -0
  431. data/spec/models/graph_condition_spec.rb +0 -6
  432. data/spec/models/help_spec.rb +51 -0
  433. data/spec/models/ingestion_cve_exploit_reference_spec.rb +63 -0
  434. data/spec/models/ingestion_cve_exploit_source_spec.rb +69 -0
  435. data/spec/models/ingestion_ex_prt_rating_factors_spec.rb +69 -0
  436. data/spec/models/ingestion_reference_spec.rb +57 -0
  437. data/spec/models/inventoryapi_surface_error_spec.rb +63 -0
  438. data/spec/models/inventoryapi_user_external_asset_create_request_v1_spec.rb +51 -0
  439. data/spec/models/inventoryapi_user_external_asset_create_response_v1_spec.rb +63 -0
  440. data/spec/models/inventoryapi_user_external_asset_create_spec.rb +57 -0
  441. data/spec/models/inventoryapi_user_external_asset_result_spec.rb +93 -0
  442. data/spec/models/inventoryapi_user_external_asset_spec.rb +57 -0
  443. data/spec/models/inventoryapidomain_subsidiary_spec.rb +57 -0
  444. data/spec/models/jsonschema_pivot_spec.rb +12 -0
  445. data/spec/models/jsonschema_signals_extensions_spec.rb +12 -0
  446. data/spec/models/jsonschema_ui_extensions_spec.rb +18 -0
  447. data/spec/models/models_api_customer_and_image_spec.rb +6 -0
  448. data/spec/models/models_api_image_combined_export_spec.rb +12 -0
  449. data/spec/models/models_api_package_combined_spec.rb +6 -0
  450. data/spec/models/models_api_package_combined_v2_spec.rb +111 -0
  451. data/spec/models/models_api_vulnerability_combined_spec.rb +6 -0
  452. data/spec/models/models_application_library_spec.rb +6 -0
  453. data/spec/models/models_container_spec.rb +6 -0
  454. data/spec/models/models_ext_api_image_combined_spec.rb +6 -0
  455. data/spec/models/models_message_spec.rb +51 -0
  456. data/spec/models/models_partial_fingerprints_spec.rb +51 -0
  457. data/spec/models/models_result_location_properties_spec.rb +57 -0
  458. data/spec/models/models_result_location_spec.rb +57 -0
  459. data/spec/models/models_result_physical_location_artifact_location_spec.rb +51 -0
  460. data/spec/models/models_result_physical_location_region_spec.rb +51 -0
  461. data/spec/models/models_result_physical_location_spec.rb +57 -0
  462. data/spec/models/models_result_properties_spec.rb +105 -0
  463. data/spec/models/models_result_spec.rb +93 -0
  464. data/spec/models/models_rule_default_configuration_spec.rb +51 -0
  465. data/spec/models/models_rule_properties_spec.rb +231 -0
  466. data/spec/models/models_rule_spec.rb +93 -0
  467. data/spec/models/models_run_spec.rb +57 -0
  468. data/spec/models/models_run_tool_driver_spec.rb +69 -0
  469. data/spec/models/models_run_tool_spec.rb +51 -0
  470. data/spec/models/models_vulnerability_sarif_spec.rb +63 -0
  471. data/spec/models/packages_api_combined_package_v2_spec.rb +63 -0
  472. data/spec/models/policyframework_benchmark_spec.rb +57 -0
  473. data/spec/models/policyframework_control_spec.rb +87 -0
  474. data/spec/models/quickscanpro_query_scan_results_response_spec.rb +6 -0
  475. data/spec/models/registration_aws_account_ext_v2_spec.rb +12 -0
  476. data/spec/models/registration_aws_account_patch_spec.rb +12 -0
  477. data/spec/models/registration_iom_event_v2_spec.rb +6 -0
  478. data/spec/models/releasecontents_release_content_spec.rb +93 -0
  479. data/spec/models/releasecontents_release_content_version_spec.rb +63 -0
  480. data/spec/models/releasenotes_entities_get_request_spec.rb +51 -0
  481. data/spec/models/releasenotes_entities_get_response_wrapper_spec.rb +63 -0
  482. data/spec/models/releasenotes_note_detail_spec.rb +69 -0
  483. data/spec/models/releasenotes_release_note_v1_spec.rb +81 -0
  484. data/spec/models/releasenotes_release_note_wrapper_v1_spec.rb +63 -0
  485. data/spec/models/releases_release_spec.rb +99 -0
  486. data/spec/models/releases_release_wrapper_spec.rb +63 -0
  487. data/spec/models/resources_app_spec.rb +57 -0
  488. data/spec/models/resources_asset_graph_spec.rb +57 -0
  489. data/spec/models/resources_cloud_context_spec.rb +147 -0
  490. data/spec/models/resources_cloud_resource_spec.rb +291 -0
  491. data/spec/models/resources_compliance_spec.rb +87 -0
  492. data/spec/models/resources_detections_spec.rb +81 -0
  493. data/spec/models/resources_host_spec.rb +147 -0
  494. data/spec/models/resources_relationship_spec.rb +69 -0
  495. data/spec/models/resources_vulnerability_spec.rb +63 -0
  496. data/spec/models/rest_azure_download_script_request_data_spec.rb +51 -0
  497. data/spec/models/rest_azure_download_script_request_v1_spec.rb +51 -0
  498. data/spec/models/rest_azure_provision_get_account_script_response_v1_spec.rb +63 -0
  499. data/spec/models/rest_azure_script_spec.rb +69 -0
  500. data/spec/models/rest_cursor_and_limit_meta_info_spec.rb +81 -0
  501. data/spec/models/rest_cursor_meta_info_spec.rb +75 -0
  502. data/spec/models/rest_cursor_response_fields_spec.rb +57 -0
  503. data/spec/models/{client_fql_statement_spec.rb → rest_paging_spec.rb} +9 -9
  504. data/spec/models/restapi_indicator_response_spec.rb +63 -0
  505. data/spec/models/restapi_indicators_query_request_spec.rb +57 -0
  506. data/spec/models/restapi_indicators_query_sort_request_spec.rb +63 -0
  507. data/spec/models/sadomain_typosquatting_base_domain_spec.rb +12 -0
  508. data/spec/models/sadomain_typosquatting_subdomain_spec.rb +0 -6
  509. data/spec/models/string_wrapper_spec.rb +63 -0
  510. data/spec/models/types_get_executor_nodes_metadata_response_spec.rb +75 -0
  511. data/spec/models/types_get_integration_tasks_metadata_response_spec.rb +69 -0
  512. data/spec/models/v2_for_loop_spec.rb +6 -0
  513. data/spec/models/vulnerabilities_vulnerability_entity_sarif_response_spec.rb +63 -0
  514. data/spec/spec_helper.rb +8 -0
  515. metadata +2129 -1732
@@ -30,22 +30,22 @@ SOFTWARE.
30
30
  require 'spec_helper'
31
31
  require 'json'
32
32
 
33
- # Unit tests for Falcon::KubernetesProtectionApi
33
+ # Unit tests for Falcon::KubernetesProtection
34
34
  # Automatically generated by openapi-generator (https://openapi-generator.tech)
35
35
  # Please update as you see appropriate
36
- describe 'KubernetesProtectionApi' do
37
- before do
36
+ describe 'KubernetesProtection' do
37
+ before(:all) do
38
38
  # run before each test
39
- @api_instance = Falcon::KubernetesProtectionApi.new
39
+ @api_instance = Falcon::KubernetesProtection.new
40
40
  end
41
41
 
42
- after do
42
+ after(:all) do
43
43
  # run after each test
44
44
  end
45
45
 
46
- describe 'test an instance of KubernetesProtectionApi' do
47
- it 'should create an instance of KubernetesProtectionApi' do
48
- expect(@api_instance).to be_instance_of(Falcon::KubernetesProtectionApi)
46
+ describe 'test an instance of KubernetesProtection' do
47
+ it 'should create an instance of KubernetesProtection' do
48
+ expect(@api_instance).to be_instance_of(Falcon::KubernetesProtection)
49
49
  end
50
50
  end
51
51
 
@@ -94,12 +94,12 @@ describe 'KubernetesProtectionApi' do
94
94
  end
95
95
 
96
96
  # unit tests for find_containers_by_container_run_time_version
97
- # Retrieve containers by container_runtime_version
97
+ # Maximum offset = 10000 - limit
98
98
  # @param [Hash] opts the optional parameters
99
- # @option opts [Integer] :limit The upper-bound on the number of container records to retrieve.
100
- # @option opts [Integer] :offset It is used to get the offset
101
- # @option opts [String] :sort Field to sort results by
102
- # @option opts [String] :filter Retrieve count of Kubernetes containers that match a query in Falcon Query Language (FQL). Supported filters: agent_id,agent_type,allow_privilege_escalation,cid,cloud_account_id,cloud_name,cloud_region,cloud_service,cluster_id,cluster_name,container_id,container_image_id,container_name,cve_id,detection_name,first_seen,image_detection_count,image_digest,image_has_been_assessed,image_id,image_registry,image_repository,image_tag,image_vulnerability_count,insecure_mount_source,insecure_mount_type,insecure_propagation_mode,interactive_mode,ipv4,ipv6,kac_agent_id,labels,last_seen,namespace,node_name,node_uid,package_name_version,pod_id,pod_name,port,privileged,root_write_access,run_as_root_group,run_as_root_user,running_status
99
+ # @option opts [Integer] :limit The upper-bound on the number of records to retrieve.
100
+ # @option opts [Integer] :offset The offset from where to begin.
101
+ # @option opts [String] :sort The fields to sort the records on.
102
+ # @option opts [String] :filter Retrieve count of Kubernetes containers that match a query in Falcon Query Language (FQL). Supported filter fields: - `agent_id` - `agent_type` - `allow_privilege_escalation` - `cid` - `cloud_account_id` - `cloud_instance_id` - `cloud_name` - `cloud_region` - `cloud_service` - `cluster_id` - `cluster_name` - `container_id` - `container_image_id` - `container_name` - `cve_id` - `detection_name` - `first_seen` - `image_detection_count` - `image_digest` - `image_has_been_assessed` - `image_id` - `image_registry` - `image_repository` - `image_tag` - `image_vulnerability_count` - `insecure_mount_source` - `insecure_mount_type` - `insecure_propagation_mode` - `interactive_mode` - `ipv4` - `ipv6` - `kac_agent_id` - `labels` - `last_seen` - `namespace` - `node_name` - `node_uid` - `package_name_version` - `pod_id` - `pod_name` - `port` - `privileged` - `root_write_access` - `run_as_root_group` - `run_as_root_user` - `running_status`
103
103
  # @return [ModelsContainerRuntimePivotResponse]
104
104
  describe 'find_containers_by_container_run_time_version test' do
105
105
  it 'should work' do
@@ -240,7 +240,7 @@ describe 'KubernetesProtectionApi' do
240
240
  # unit tests for group_containers_by_managed
241
241
  # Group the containers by Managed
242
242
  # @param [Hash] opts the optional parameters
243
- # @option opts [String] :filter Retrieve count of Kubernetes containers that match a query in Falcon Query Language (FQL). Supported filters: agent_id,allow_privilege_escalation,cid,cloud_account_id,cloud_name,cloud_region,cloud_service,cluster_id,cluster_name,container_id,container_image_id,container_name,cve_id,detection_name,first_seen,image_detection_count,image_digest,image_has_been_assessed,image_id,image_registry,image_repository,image_tag,image_vulnerability_count,insecure_mount_source,insecure_mount_type,insecure_propagation_mode,interactive_mode,ipv4,ipv6,kac_agent_id,labels,last_seen,namespace,node_name,node_uid,pod_id,pod_name,port,privileged,root_write_access,run_as_root_group,run_as_root_user,running_status
243
+ # @option opts [String] :filter Retrieve count of Kubernetes containers that match a query in Falcon Query Language (FQL). Supported filter fields: - `agent_id` - `allow_privilege_escalation` - `cid` - `cloud_account_id` - `cloud_instance_id` - `cloud_name` - `cloud_region` - `cloud_service` - `cluster_id` - `cluster_name` - `container_id` - `container_image_id` - `container_name` - `cve_id` - `detection_name` - `first_seen` - `image_detection_count` - `image_digest` - `image_has_been_assessed` - `image_id` - `image_registry` - `image_repository` - `image_tag` - `image_vulnerability_count` - `insecure_mount_source` - `insecure_mount_type` - `insecure_propagation_mode` - `interactive_mode` - `ipv4` - `ipv6` - `kac_agent_id` - `labels` - `last_seen` - `namespace` - `node_name` - `node_uid` - `pod_id` - `pod_name` - `port` - `privileged` - `root_write_access` - `run_as_root_group` - `run_as_root_user` - `running_status`
244
244
  # @return [ModelsContainerCoverageResponseEntity]
245
245
  describe 'group_containers_by_managed test' do
246
246
  it 'should work' do
@@ -277,12 +277,12 @@ describe 'KubernetesProtectionApi' do
277
277
  end
278
278
 
279
279
  # unit tests for read_cluster_combined
280
- # Retrieve kubernetes clusters identified by the provided filter criteria
280
+ # Maximum offset = 10000 - limit
281
281
  # @param [Hash] opts the optional parameters
282
- # @option opts [String] :filter Search Kubernetes clusters using a query in Falcon Query Language (FQL). Supported filters: access,agent_id,agent_status,agent_type,cid,cloud_account_id,cloud_name,cloud_region,cloud_service,cluster_id,cluster_name,cluster_status,container_count,iar_coverage,kac_agent_id,kubernetes_version,last_seen,management_status,node_count,pod_count,tags
282
+ # @option opts [String] :filter Search Kubernetes clusters using a query in Falcon Query Language (FQL). Supported filter fields: - `access` - `agent_id` - `agent_status` - `agent_type` - `cid` - `cloud_account_id` - `cloud_name` - `cloud_region` - `cloud_service` - `cluster_id` - `cluster_name` - `cluster_status` - `container_count` - `iar_coverage` - `kac_agent_id` - `kubernetes_version` - `last_seen` - `management_status` - `node_count` - `pod_count` - `tags`
283
+ # @option opts [String] :sort The fields to sort the records on.
283
284
  # @option opts [Integer] :limit The upper-bound on the number of records to retrieve.
284
285
  # @option opts [Integer] :offset The offset from where to begin.
285
- # @option opts [String] :sort Field to sort results by
286
286
  # @return [ModelsClusterEntityResponse]
287
287
  describe 'read_cluster_combined test' do
288
288
  it 'should work' do
@@ -293,7 +293,7 @@ describe 'KubernetesProtectionApi' do
293
293
  # unit tests for read_cluster_count
294
294
  # Retrieve cluster counts
295
295
  # @param [Hash] opts the optional parameters
296
- # @option opts [String] :filter Retrieve count of Kubernetes clusters that match a query in Falcon Query Language (FQL). Supported filters: access,agent_id,agent_status,agent_type,cid,cloud_account_id,cloud_name,cloud_region,cloud_service,cluster_id,cluster_name,cluster_status,container_count,iar_coverage,kac_agent_id,kubernetes_version,last_seen,management_status,node_count,pod_count,tags
296
+ # @option opts [String] :filter Retrieve count of Kubernetes clusters that match a query in Falcon Query Language (FQL). Supported filter fields: - `access` - `agent_id` - `agent_status` - `agent_type` - `cid` - `cloud_account_id` - `cloud_name` - `cloud_region` - `cloud_service` - `cluster_id` - `cluster_name` - `cluster_status` - `container_count` - `iar_coverage` - `kac_agent_id` - `kubernetes_version` - `last_seen` - `management_status` - `node_count` - `pod_count` - `tags`
297
297
  # @return [CommonCountResponse]
298
298
  describe 'read_cluster_count test' do
299
299
  it 'should work' do
@@ -305,7 +305,7 @@ describe 'KubernetesProtectionApi' do
305
305
  # Retrieve cluster enrichment data
306
306
  # @param cluster_id One or more cluster ids for which to retrieve enrichment info
307
307
  # @param [Hash] opts the optional parameters
308
- # @option opts [String] :filter Supported filters: last_seen
308
+ # @option opts [String] :filter Supported filter fields: - `last_seen`
309
309
  # @return [K8sassetsClusterEnrichmentResponse]
310
310
  describe 'read_cluster_enrichment test' do
311
311
  it 'should work' do
@@ -326,7 +326,7 @@ describe 'KubernetesProtectionApi' do
326
326
  # unit tests for read_clusters_by_kubernetes_version_count
327
327
  # Bucket clusters by kubernetes version
328
328
  # @param [Hash] opts the optional parameters
329
- # @option opts [String] :filter Retrieve count of Kubernetes clusters that match a query in Falcon Query Language (FQL). Supported filters: access,agent_id,agent_status,agent_type,cid,cloud_account_id,cloud_name,cloud_region,cloud_service,cluster_id,cluster_name,cluster_status,container_count,iar_coverage,kac_agent_id,kubernetes_version,last_seen,management_status,node_count,pod_count,tags
329
+ # @option opts [String] :filter Retrieve count of Kubernetes clusters that match a query in Falcon Query Language (FQL). Supported filter fields: - `access` - `agent_id` - `agent_status` - `agent_type` - `cid` - `cloud_account_id` - `cloud_name` - `cloud_region` - `cloud_service` - `cluster_id` - `cluster_name` - `cluster_status` - `container_count` - `iar_coverage` - `kac_agent_id` - `kubernetes_version` - `last_seen` - `management_status` - `node_count` - `pod_count` - `tags`
330
330
  # @return [ModelsAggregateValuesByFieldResponse]
331
331
  describe 'read_clusters_by_kubernetes_version_count test' do
332
332
  it 'should work' do
@@ -337,7 +337,7 @@ describe 'KubernetesProtectionApi' do
337
337
  # unit tests for read_clusters_by_status_count
338
338
  # Bucket clusters by status
339
339
  # @param [Hash] opts the optional parameters
340
- # @option opts [String] :filter Retrieve count of Kubernetes clusters that match a query in Falcon Query Language (FQL). Supported filters: access,agent_id,agent_status,agent_type,cid,cloud_account_id,cloud_name,cloud_region,cloud_service,cluster_id,cluster_name,cluster_status,container_count,iar_coverage,kac_agent_id,kubernetes_version,last_seen,management_status,node_count,pod_count,tags
340
+ # @option opts [String] :filter Retrieve count of Kubernetes clusters that match a query in Falcon Query Language (FQL). Supported filter fields: - `access` - `agent_id` - `agent_status` - `agent_type` - `cid` - `cloud_account_id` - `cloud_name` - `cloud_region` - `cloud_service` - `cluster_id` - `cluster_name` - `cluster_status` - `container_count` - `iar_coverage` - `kac_agent_id` - `kubernetes_version` - `last_seen` - `management_status` - `node_count` - `pod_count` - `tags`
341
341
  # @return [ModelsAggregateValuesByFieldResponse]
342
342
  describe 'read_clusters_by_status_count test' do
343
343
  it 'should work' do
@@ -346,12 +346,12 @@ describe 'KubernetesProtectionApi' do
346
346
  end
347
347
 
348
348
  # unit tests for read_container_combined
349
- # Retrieve containers identified by the provided filter criteria
349
+ # Maximum offset = 10000 - limit
350
350
  # @param [Hash] opts the optional parameters
351
- # @option opts [String] :filter Search Kubernetes containers using a query in Falcon Query Language (FQL). Supported filters: agent_id,agent_type,allow_privilege_escalation,cid,cloud_account_id,cloud_name,cloud_region,cloud_service,cluster_id,cluster_name,container_id,container_image_id,container_name,cve_id,detection_name,first_seen,image_detection_count,image_digest,image_has_been_assessed,image_id,image_registry,image_repository,image_tag,image_vulnerability_count,insecure_mount_source,insecure_mount_type,insecure_propagation_mode,interactive_mode,ipv4,ipv6,kac_agent_id,labels,last_seen,namespace,node_name,node_uid,package_name_version,pod_id,pod_name,port,privileged,root_write_access,run_as_root_group,run_as_root_user,running_status
351
+ # @option opts [String] :filter Search Kubernetes containers using a query in Falcon Query Language (FQL). Supported filter fields: - `agent_id` - `agent_type` - `allow_privilege_escalation` - `cid` - `cloud_account_id` - `cloud_instance_id` - `cloud_name` - `cloud_region` - `cloud_service` - `cluster_id` - `cluster_name` - `container_id` - `container_image_id` - `container_name` - `cve_id` - `detection_name` - `first_seen` - `image_detection_count` - `image_digest` - `image_has_been_assessed` - `image_id` - `image_registry` - `image_repository` - `image_tag` - `image_vulnerability_count` - `insecure_mount_source` - `insecure_mount_type` - `insecure_propagation_mode` - `interactive_mode` - `ipv4` - `ipv6` - `kac_agent_id` - `labels` - `last_seen` - `namespace` - `node_name` - `node_uid` - `package_name_version` - `pod_id` - `pod_name` - `port` - `privileged` - `root_write_access` - `run_as_root_group` - `run_as_root_user` - `running_status`
352
+ # @option opts [String] :sort The fields to sort the records on.
352
353
  # @option opts [Integer] :limit The upper-bound on the number of records to retrieve.
353
354
  # @option opts [Integer] :offset The offset from where to begin.
354
- # @option opts [String] :sort Field to sort results by
355
355
  # @return [ModelsContainerEntityResponse]
356
356
  describe 'read_container_combined test' do
357
357
  it 'should work' do
@@ -362,7 +362,7 @@ describe 'KubernetesProtectionApi' do
362
362
  # unit tests for read_container_count
363
363
  # Retrieve container counts
364
364
  # @param [Hash] opts the optional parameters
365
- # @option opts [String] :filter Retrieve count of Kubernetes containers that match a query in Falcon Query Language (FQL). Supported filters: agent_id,agent_type,allow_privilege_escalation,cid,cloud_account_id,cloud_name,cloud_region,cloud_service,cluster_id,cluster_name,container_id,container_image_id,container_name,cve_id,detection_name,first_seen,image_detection_count,image_digest,image_has_been_assessed,image_id,image_registry,image_repository,image_tag,image_vulnerability_count,insecure_mount_source,insecure_mount_type,insecure_propagation_mode,interactive_mode,ipv4,ipv6,kac_agent_id,labels,last_seen,namespace,node_name,node_uid,package_name_version,pod_id,pod_name,port,privileged,root_write_access,run_as_root_group,run_as_root_user,running_status
365
+ # @option opts [String] :filter Retrieve count of Kubernetes containers that match a query in Falcon Query Language (FQL). Supported filter fields: - `agent_id` - `agent_type` - `allow_privilege_escalation` - `cid` - `cloud_account_id` - `cloud_instance_id` - `cloud_name` - `cloud_region` - `cloud_service` - `cluster_id` - `cluster_name` - `container_id` - `container_image_id` - `container_name` - `cve_id` - `detection_name` - `first_seen` - `image_detection_count` - `image_digest` - `image_has_been_assessed` - `image_id` - `image_registry` - `image_repository` - `image_tag` - `image_vulnerability_count` - `insecure_mount_source` - `insecure_mount_type` - `insecure_propagation_mode` - `interactive_mode` - `ipv4` - `ipv6` - `kac_agent_id` - `labels` - `last_seen` - `namespace` - `node_name` - `node_uid` - `package_name_version` - `pod_id` - `pod_name` - `port` - `privileged` - `root_write_access` - `run_as_root_group` - `run_as_root_user` - `running_status`
366
366
  # @return [CommonCountResponse]
367
367
  describe 'read_container_count test' do
368
368
  it 'should work' do
@@ -371,9 +371,9 @@ describe 'KubernetesProtectionApi' do
371
371
  end
372
372
 
373
373
  # unit tests for read_container_count_by_registry
374
- # Retrieve top container image registries
374
+ # Retrieves a list with the top container image registries. Maximum page size: 200
375
375
  # @param [Hash] opts the optional parameters
376
- # @option opts [Boolean] :under_assessment (true/false) whether to return registries under assessment or not under assessment. If not provided all registries are considered
376
+ # @option opts [Boolean] :under_assessment (true/false) whether to return registries under assessment or not under assessment. If not provided all registries are considered
377
377
  # @option opts [Integer] :limit The upper-bound on the number of records to retrieve.
378
378
  # @return [ModelsAPIFilterResponse]
379
379
  describe 'read_container_count_by_registry test' do
@@ -386,7 +386,7 @@ describe 'KubernetesProtectionApi' do
386
386
  # Retrieve container enrichment data
387
387
  # @param container_id One or more container ids for which to retrieve enrichment info
388
388
  # @param [Hash] opts the optional parameters
389
- # @option opts [String] :filter Supported filters: last_seen
389
+ # @option opts [String] :filter Supported filter fields: - `last_seen`
390
390
  # @return [K8sassetsContainerEnrichmentResponse]
391
391
  describe 'read_container_enrichment test' do
392
392
  it 'should work' do
@@ -397,7 +397,7 @@ describe 'KubernetesProtectionApi' do
397
397
  # unit tests for read_container_image_detections_count_by_date
398
398
  # Retrieve count of image assessment detections on running containers over a period of time
399
399
  # @param [Hash] opts the optional parameters
400
- # @option opts [String] :filter Retrieve count of Kubernetes containers that match a query in Falcon Query Language (FQL). Supported filters: agent_id,agent_type,allow_privilege_escalation,cid,cloud_account_id,cloud_name,cloud_region,cloud_service,cluster_id,cluster_name,container_id,container_image_id,container_name,cve_id,detection_name,first_seen,image_detection_count,image_digest,image_has_been_assessed,image_id,image_registry,image_repository,image_tag,image_vulnerability_count,insecure_mount_source,insecure_mount_type,insecure_propagation_mode,interactive_mode,ipv4,ipv6,kac_agent_id,labels,last_seen,namespace,node_name,node_uid,package_name_version,pod_id,pod_name,port,privileged,root_write_access,run_as_root_group,run_as_root_user,running_status
400
+ # @option opts [String] :filter Retrieve count of Kubernetes containers that match a query in Falcon Query Language (FQL). Supported filter fields: - `agent_id` - `agent_type` - `allow_privilege_escalation` - `cid` - `cloud_account_id` - `cloud_instance_id` - `cloud_name` - `cloud_region` - `cloud_service` - `cluster_id` - `cluster_name` - `container_id` - `container_image_id` - `container_name` - `cve_id` - `detection_name` - `first_seen` - `image_detection_count` - `image_digest` - `image_has_been_assessed` - `image_id` - `image_registry` - `image_repository` - `image_tag` - `image_vulnerability_count` - `insecure_mount_source` - `insecure_mount_type` - `insecure_propagation_mode` - `interactive_mode` - `ipv4` - `ipv6` - `kac_agent_id` - `labels` - `last_seen` - `namespace` - `node_name` - `node_uid` - `package_name_version` - `pod_id` - `pod_name` - `port` - `privileged` - `root_write_access` - `run_as_root_group` - `run_as_root_user` - `running_status`
401
401
  # @return [ModelsAPIFilterResponse]
402
402
  describe 'read_container_image_detections_count_by_date test' do
403
403
  it 'should work' do
@@ -408,7 +408,7 @@ describe 'KubernetesProtectionApi' do
408
408
  # unit tests for read_container_images_by_most_used
409
409
  # Bucket container by image-digest
410
410
  # @param [Hash] opts the optional parameters
411
- # @option opts [String] :filter Retrieve count of Kubernetes containers that match a query in Falcon Query Language (FQL). Supported filters: agent_id,agent_type,allow_privilege_escalation,cid,cloud_account_id,cloud_name,cloud_region,cloud_service,cluster_id,cluster_name,container_id,container_image_id,container_name,cve_id,detection_name,first_seen,image_detection_count,image_digest,image_has_been_assessed,image_id,image_registry,image_repository,image_tag,image_vulnerability_count,insecure_mount_source,insecure_mount_type,insecure_propagation_mode,interactive_mode,ipv4,ipv6,kac_agent_id,labels,last_seen,namespace,node_name,node_uid,package_name_version,pod_id,pod_name,port,privileged,root_write_access,run_as_root_group,run_as_root_user,running_status
411
+ # @option opts [String] :filter Retrieve count of Kubernetes containers that match a query in Falcon Query Language (FQL). Supported filter fields: - `agent_id` - `agent_type` - `allow_privilege_escalation` - `cid` - `cloud_account_id` - `cloud_instance_id` - `cloud_name` - `cloud_region` - `cloud_service` - `cluster_id` - `cluster_name` - `container_id` - `container_image_id` - `container_name` - `cve_id` - `detection_name` - `first_seen` - `image_detection_count` - `image_digest` - `image_has_been_assessed` - `image_id` - `image_registry` - `image_repository` - `image_tag` - `image_vulnerability_count` - `insecure_mount_source` - `insecure_mount_type` - `insecure_propagation_mode` - `interactive_mode` - `ipv4` - `ipv6` - `kac_agent_id` - `labels` - `last_seen` - `namespace` - `node_name` - `node_uid` - `package_name_version` - `pod_id` - `pod_name` - `port` - `privileged` - `root_write_access` - `run_as_root_group` - `run_as_root_user` - `running_status`
412
412
  # @return [ModelsAggregateValuesByFieldResponse]
413
413
  describe 'read_container_images_by_most_used test' do
414
414
  it 'should work' do
@@ -419,7 +419,7 @@ describe 'KubernetesProtectionApi' do
419
419
  # unit tests for read_container_images_by_state
420
420
  # Retrieve count of image states running on containers
421
421
  # @param [Hash] opts the optional parameters
422
- # @option opts [String] :filter Filter using a query in Falcon Query Language (FQL). Supported filters: cid
422
+ # @option opts [String] :filter Filter using a query in Falcon Query Language (FQL). Supported filter fields: - `cid`
423
423
  # @return [ModelsAPIFilterResponse]
424
424
  describe 'read_container_images_by_state test' do
425
425
  it 'should work' do
@@ -430,7 +430,7 @@ describe 'KubernetesProtectionApi' do
430
430
  # unit tests for read_container_vulnerabilities_by_severity_count
431
431
  # Retrieve container vulnerabilities by severity counts
432
432
  # @param [Hash] opts the optional parameters
433
- # @option opts [String] :filter Get vulnerabilities count by severity for container using a query in Falcon Query Language (FQL). Supported filters: agent_id,agent_type,allow_privilege_escalation,cid,cloud_account_id,cloud_name,cloud_region,cloud_service,cluster_id,cluster_name,container_id,container_image_id,container_name,cve_id,detection_name,first_seen,image_detection_count,image_digest,image_has_been_assessed,image_id,image_registry,image_repository,image_tag,image_vulnerability_count,insecure_mount_source,insecure_mount_type,insecure_propagation_mode,interactive_mode,ipv4,ipv6,kac_agent_id,labels,last_seen,namespace,node_name,node_uid,package_name_version,pod_id,pod_name,port,privileged,root_write_access,run_as_root_group,run_as_root_user,running_status
433
+ # @option opts [String] :filter Get vulnerabilities count by severity for container using a query in Falcon Query Language (FQL). Supported filter fields: - `agent_id` - `agent_type` - `allow_privilege_escalation` - `cid` - `cloud_account_id` - `cloud_instance_id` - `cloud_name` - `cloud_region` - `cloud_service` - `cluster_id` - `cluster_name` - `container_id` - `container_image_id` - `container_name` - `cve_id` - `detection_name` - `first_seen` - `image_detection_count` - `image_digest` - `image_has_been_assessed` - `image_id` - `image_registry` - `image_repository` - `image_tag` - `image_vulnerability_count` - `insecure_mount_source` - `insecure_mount_type` - `insecure_propagation_mode` - `interactive_mode` - `ipv4` - `ipv6` - `kac_agent_id` - `labels` - `last_seen` - `namespace` - `node_name` - `node_uid` - `package_name_version` - `pod_id` - `pod_name` - `port` - `privileged` - `root_write_access` - `run_as_root_group` - `run_as_root_user` - `running_status`
434
434
  # @return [ModelsAggregateValuesByFieldResponse]
435
435
  describe 'read_container_vulnerabilities_by_severity_count test' do
436
436
  it 'should work' do
@@ -441,7 +441,7 @@ describe 'KubernetesProtectionApi' do
441
441
  # unit tests for read_containers_by_date_range_count
442
442
  # Retrieve containers by date range counts
443
443
  # @param [Hash] opts the optional parameters
444
- # @option opts [String] :filter Get container counts using a query in Falcon Query Language (FQL). Supported filters: agent_id,agent_type,allow_privilege_escalation,cid,cloud_account_id,cloud_name,cloud_region,cloud_service,cluster_id,cluster_name,container_id,container_image_id,container_name,cve_id,detection_name,first_seen,image_detection_count,image_digest,image_has_been_assessed,image_id,image_registry,image_repository,image_tag,image_vulnerability_count,insecure_mount_source,insecure_mount_type,insecure_propagation_mode,interactive_mode,ipv4,ipv6,kac_agent_id,labels,last_seen,namespace,node_name,node_uid,package_name_version,pod_id,pod_name,port,privileged,root_write_access,run_as_root_group,run_as_root_user,running_status
444
+ # @option opts [String] :filter Get container counts using a query in Falcon Query Language (FQL). Supported filter fields: - `agent_id` - `agent_type` - `allow_privilege_escalation` - `cid` - `cloud_account_id` - `cloud_instance_id` - `cloud_name` - `cloud_region` - `cloud_service` - `cluster_id` - `cluster_name` - `container_id` - `container_image_id` - `container_name` - `cve_id` - `detection_name` - `first_seen` - `image_detection_count` - `image_digest` - `image_has_been_assessed` - `image_id` - `image_registry` - `image_repository` - `image_tag` - `image_vulnerability_count` - `insecure_mount_source` - `insecure_mount_type` - `insecure_propagation_mode` - `interactive_mode` - `ipv4` - `ipv6` - `kac_agent_id` - `labels` - `last_seen` - `namespace` - `node_name` - `node_uid` - `package_name_version` - `pod_id` - `pod_name` - `port` - `privileged` - `root_write_access` - `run_as_root_group` - `run_as_root_user` - `running_status`
445
445
  # @return [ModelsAggregateValuesByFieldResponse]
446
446
  describe 'read_containers_by_date_range_count test' do
447
447
  it 'should work' do
@@ -452,7 +452,7 @@ describe 'KubernetesProtectionApi' do
452
452
  # unit tests for read_containers_sensor_coverage
453
453
  # Bucket containers by agent type and calculate sensor coverage
454
454
  # @param [Hash] opts the optional parameters
455
- # @option opts [String] :filter Retrieve count of Kubernetes containers that match a query in Falcon Query Language (FQL). Supported filters: agent_id,agent_type,allow_privilege_escalation,cid,cloud_account_id,cloud_name,cloud_region,cloud_service,cluster_id,cluster_name,container_id,container_image_id,container_name,cve_id,detection_name,first_seen,image_detection_count,image_digest,image_has_been_assessed,image_id,image_registry,image_repository,image_tag,image_vulnerability_count,insecure_mount_source,insecure_mount_type,insecure_propagation_mode,interactive_mode,ipv4,ipv6,kac_agent_id,labels,last_seen,namespace,node_name,node_uid,package_name_version,pod_id,pod_name,port,privileged,root_write_access,run_as_root_group,run_as_root_user,running_status
455
+ # @option opts [String] :filter Retrieve count of Kubernetes containers that match a query in Falcon Query Language (FQL). Supported filter fields: - `agent_id` - `agent_type` - `allow_privilege_escalation` - `cid` - `cloud_account_id` - `cloud_instance_id` - `cloud_name` - `cloud_region` - `cloud_service` - `cluster_id` - `cluster_name` - `container_id` - `container_image_id` - `container_name` - `cve_id` - `detection_name` - `first_seen` - `image_detection_count` - `image_digest` - `image_has_been_assessed` - `image_id` - `image_registry` - `image_repository` - `image_tag` - `image_vulnerability_count` - `insecure_mount_source` - `insecure_mount_type` - `insecure_propagation_mode` - `interactive_mode` - `ipv4` - `ipv6` - `kac_agent_id` - `labels` - `last_seen` - `namespace` - `node_name` - `node_uid` - `package_name_version` - `pod_id` - `pod_name` - `port` - `privileged` - `root_write_access` - `run_as_root_group` - `run_as_root_user` - `running_status`
456
456
  # @return [ModelsAggregateValuesByFieldResponse]
457
457
  describe 'read_containers_sensor_coverage test' do
458
458
  it 'should work' do
@@ -461,12 +461,12 @@ describe 'KubernetesProtectionApi' do
461
461
  end
462
462
 
463
463
  # unit tests for read_deployment_combined
464
- # Retrieve kubernetes deployments identified by the provided filter criteria
464
+ # Maximum offset = 10000 - limit
465
465
  # @param [Hash] opts the optional parameters
466
- # @option opts [String] :filter Search Kubernetes deployments using a query in Falcon Query Language (FQL). Supported filters: agent_id,agent_type,annotations_list,cid,cloud_account_id,cloud_name,cloud_region,cloud_service,cluster_id,cluster_name,deployment_id,deployment_name,deployment_status,first_seen,kac_agent_id,last_seen,namespace,pod_count,resource_status
466
+ # @option opts [String] :filter Search Kubernetes deployments using a query in Falcon Query Language (FQL). Supported filter fields: - `agent_id` - `agent_type` - `annotations_list` - `cid` - `cloud_account_id` - `cloud_name` - `cloud_region` - `cloud_service` - `cluster_id` - `cluster_name` - `deployment_id` - `deployment_name` - `deployment_status` - `first_seen` - `kac_agent_id` - `last_seen` - `namespace` - `pod_count` - `resource_status`
467
+ # @option opts [String] :sort The fields to sort the records on.
467
468
  # @option opts [Integer] :limit The upper-bound on the number of records to retrieve.
468
469
  # @option opts [Integer] :offset The offset from where to begin.
469
- # @option opts [String] :sort Field to sort results by
470
470
  # @return [ModelsDeploymentEntityResponse]
471
471
  describe 'read_deployment_combined test' do
472
472
  it 'should work' do
@@ -477,7 +477,7 @@ describe 'KubernetesProtectionApi' do
477
477
  # unit tests for read_deployment_count
478
478
  # Retrieve deployment counts
479
479
  # @param [Hash] opts the optional parameters
480
- # @option opts [String] :filter Retrieve count of Kubernetes deployments that match a query in Falcon Query Language (FQL). Supported filters: agent_id,agent_type,annotations_list,cid,cloud_account_id,cloud_name,cloud_region,cloud_service,cluster_id,cluster_name,deployment_id,deployment_name,deployment_status,first_seen,kac_agent_id,last_seen,namespace,pod_count,resource_status
480
+ # @option opts [String] :filter Retrieve count of Kubernetes deployments that match a query in Falcon Query Language (FQL). Supported filter fields: - `agent_id` - `agent_type` - `annotations_list` - `cid` - `cloud_account_id` - `cloud_name` - `cloud_region` - `cloud_service` - `cluster_id` - `cluster_name` - `deployment_id` - `deployment_name` - `deployment_status` - `first_seen` - `kac_agent_id` - `last_seen` - `namespace` - `pod_count` - `resource_status`
481
481
  # @return [CommonCountResponse]
482
482
  describe 'read_deployment_count test' do
483
483
  it 'should work' do
@@ -489,7 +489,7 @@ describe 'KubernetesProtectionApi' do
489
489
  # Retrieve deployment enrichment data
490
490
  # @param deployment_id One or more deployment ids for which to retrieve enrichment info
491
491
  # @param [Hash] opts the optional parameters
492
- # @option opts [String] :filter Supported filters: last_seen
492
+ # @option opts [String] :filter Supported filter fields: - `last_seen`
493
493
  # @return [K8sassetsDeploymentEnrichmentResponse]
494
494
  describe 'read_deployment_enrichment test' do
495
495
  it 'should work' do
@@ -510,7 +510,7 @@ describe 'KubernetesProtectionApi' do
510
510
  # unit tests for read_distinct_container_image_count
511
511
  # Retrieve count of distinct images running on containers
512
512
  # @param [Hash] opts the optional parameters
513
- # @option opts [String] :filter Search Kubernetes containers using a query in Falcon Query Language (FQL). Supported filters: agent_id,agent_type,allow_privilege_escalation,cid,cloud_account_id,cloud_name,cloud_region,cloud_service,cluster_id,cluster_name,container_id,container_image_id,container_name,cve_id,detection_name,first_seen,image_detection_count,image_digest,image_has_been_assessed,image_id,image_registry,image_repository,image_tag,image_vulnerability_count,insecure_mount_source,insecure_mount_type,insecure_propagation_mode,interactive_mode,ipv4,ipv6,kac_agent_id,labels,last_seen,namespace,node_name,node_uid,package_name_version,pod_id,pod_name,port,privileged,root_write_access,run_as_root_group,run_as_root_user,running_status
513
+ # @option opts [String] :filter Search Kubernetes containers using a query in Falcon Query Language (FQL). Supported filter fields: - `agent_id` - `agent_type` - `allow_privilege_escalation` - `cid` - `cloud_account_id` - `cloud_instance_id` - `cloud_name` - `cloud_region` - `cloud_service` - `cluster_id` - `cluster_name` - `container_id` - `container_image_id` - `container_name` - `cve_id` - `detection_name` - `first_seen` - `image_detection_count` - `image_digest` - `image_has_been_assessed` - `image_id` - `image_registry` - `image_repository` - `image_tag` - `image_vulnerability_count` - `insecure_mount_source` - `insecure_mount_type` - `insecure_propagation_mode` - `interactive_mode` - `ipv4` - `ipv6` - `kac_agent_id` - `labels` - `last_seen` - `namespace` - `node_name` - `node_uid` - `package_name_version` - `pod_id` - `pod_name` - `port` - `privileged` - `root_write_access` - `run_as_root_group` - `run_as_root_user` - `running_status`
514
514
  # @return [ModelsAPIFilterResponse]
515
515
  describe 'read_distinct_container_image_count test' do
516
516
  it 'should work' do
@@ -521,7 +521,7 @@ describe 'KubernetesProtectionApi' do
521
521
  # unit tests for read_kubernetes_iom_by_date_range
522
522
  # Returns the count of Kubernetes IOMs by the date. by default it's for 7 days.
523
523
  # @param [Hash] opts the optional parameters
524
- # @option opts [String] :filter Filter images using a query in Falcon Query Language (FQL). Supported filters: cid,created_timestamp,detect_timestamp,prevented,severity
524
+ # @option opts [String] :filter Filter Kubernetes IOMs using a query in Falcon Query Language (FQL). Supported filter fields: - `cid` - `created_timestamp` - `detect_timestamp` - `prevented` - `severity`
525
525
  # @return [K8siomsKubernetesIOMFieldValue]
526
526
  describe 'read_kubernetes_iom_by_date_range test' do
527
527
  it 'should work' do
@@ -532,7 +532,7 @@ describe 'KubernetesProtectionApi' do
532
532
  # unit tests for read_kubernetes_iom_count
533
533
  # Returns the total count of Kubernetes IOMs over the past seven days
534
534
  # @param [Hash] opts the optional parameters
535
- # @option opts [String] :filter Filter images using a query in Falcon Query Language (FQL). Supported filters: cid,created_timestamp,detect_timestamp,prevented,severity
535
+ # @option opts [String] :filter Filter Kubernetes IOMs using a query in Falcon Query Language (FQL). Supported filter fields: - `cid` - `created_timestamp` - `detect_timestamp` - `prevented` - `severity`
536
536
  # @return [K8siomsKubernetesIOMCountValue]
537
537
  describe 'read_kubernetes_iom_count test' do
538
538
  it 'should work' do
@@ -554,7 +554,7 @@ describe 'KubernetesProtectionApi' do
554
554
  # unit tests for read_namespace_count
555
555
  # Retrieve namespace counts
556
556
  # @param [Hash] opts the optional parameters
557
- # @option opts [String] :filter Retrieve count of Kubernetes namespaces that match a query in Falcon Query Language (FQL). Supported filters: agent_id,agent_type,annotations_list,cid,cloud_account_id,cloud_name,cloud_region,cloud_service,cluster_id,cluster_name,first_seen,kac_agent_id,last_seen,namespace_id,namespace_name,resource_status
557
+ # @option opts [String] :filter Retrieve count of Kubernetes namespaces that match a query in Falcon Query Language (FQL). Supported filter fields: - `agent_id` - `agent_type` - `annotations_list` - `cid` - `cloud_account_id` - `cloud_name` - `cloud_region` - `cloud_service` - `cluster_id` - `cluster_name` - `first_seen` - `kac_agent_id` - `last_seen` - `namespace_id` - `namespace_name` - `resource_status`
558
558
  # @return [CommonCountResponse]
559
559
  describe 'read_namespace_count test' do
560
560
  it 'should work' do
@@ -573,12 +573,12 @@ describe 'KubernetesProtectionApi' do
573
573
  end
574
574
 
575
575
  # unit tests for read_node_combined
576
- # Retrieve kubernetes nodes identified by the provided filter criteria
576
+ # Maximum offset = 10000 - limit
577
577
  # @param [Hash] opts the optional parameters
578
- # @option opts [String] :filter Search Kubernetes nodes using a query in Falcon Query Language (FQL). Supported filters: agent_id,agent_type,annotations_list,cid,cloud_account_id,cloud_name,cloud_region,cloud_service,cluster_id,cluster_name,container_count,container_runtime_version,first_seen,image_digest,ipv4,kac_agent_id,last_seen,linux_sensor_coverage,node_name,pod_count,resource_status
578
+ # @option opts [String] :filter Search Kubernetes nodes using a query in Falcon Query Language (FQL). Supported filter fields: - `agent_id` - `agent_type` - `annotations_list` - `cid` - `cloud_account_id` - `cloud_name` - `cloud_region` - `cloud_service` - `cluster_id` - `cluster_name` - `container_count` - `container_runtime_version` - `first_seen` - `image_digest` - `ipv4` - `kac_agent_id` - `last_seen` - `linux_sensor_coverage` - `node_name` - `pod_count` - `resource_status`
579
+ # @option opts [String] :sort The fields to sort the records on.
579
580
  # @option opts [Integer] :limit The upper-bound on the number of records to retrieve.
580
581
  # @option opts [Integer] :offset The offset from where to begin.
581
- # @option opts [String] :sort Field to sort results by
582
582
  # @return [ModelsNodeEntityResponse]
583
583
  describe 'read_node_combined test' do
584
584
  it 'should work' do
@@ -589,7 +589,7 @@ describe 'KubernetesProtectionApi' do
589
589
  # unit tests for read_node_count
590
590
  # Retrieve node counts
591
591
  # @param [Hash] opts the optional parameters
592
- # @option opts [String] :filter Retrieve count of Kubernetes nodes that match a query in Falcon Query Language (FQL). Supported filters: agent_id,agent_type,annotations_list,cid,cloud_account_id,cloud_name,cloud_region,cloud_service,cluster_id,cluster_name,container_count,container_runtime_version,first_seen,image_digest,ipv4,kac_agent_id,last_seen,linux_sensor_coverage,node_name,pod_count,resource_status
592
+ # @option opts [String] :filter Retrieve count of Kubernetes nodes that match a query in Falcon Query Language (FQL). Supported filter fields: - `agent_id` - `agent_type` - `annotations_list` - `cid` - `cloud_account_id` - `cloud_name` - `cloud_region` - `cloud_service` - `cluster_id` - `cluster_name` - `container_count` - `container_runtime_version` - `first_seen` - `image_digest` - `ipv4` - `kac_agent_id` - `last_seen` - `linux_sensor_coverage` - `node_name` - `pod_count` - `resource_status`
593
593
  # @return [CommonCountResponse]
594
594
  describe 'read_node_count test' do
595
595
  it 'should work' do
@@ -601,7 +601,7 @@ describe 'KubernetesProtectionApi' do
601
601
  # Retrieve node enrichment data
602
602
  # @param node_name One or more node names for which to retrieve enrichment info
603
603
  # @param [Hash] opts the optional parameters
604
- # @option opts [String] :filter Supported filters: last_seen
604
+ # @option opts [String] :filter Supported filter fields: - `last_seen`
605
605
  # @return [K8sassetsNodeEnrichmentResponse]
606
606
  describe 'read_node_enrichment test' do
607
607
  it 'should work' do
@@ -612,7 +612,7 @@ describe 'KubernetesProtectionApi' do
612
612
  # unit tests for read_nodes_by_cloud_count
613
613
  # Bucket nodes by cloud providers
614
614
  # @param [Hash] opts the optional parameters
615
- # @option opts [String] :filter Search Kubernetes nodes using a query in Falcon Query Language (FQL). Supported filters: agent_id,agent_type,annotations_list,cid,cloud_account_id,cloud_name,cloud_region,cloud_service,cluster_id,cluster_name,container_count,container_runtime_version,first_seen,image_digest,ipv4,kac_agent_id,last_seen,linux_sensor_coverage,node_name,pod_count,resource_status
615
+ # @option opts [String] :filter Search Kubernetes nodes using a query in Falcon Query Language (FQL). Supported filter fields: - `agent_id` - `agent_type` - `annotations_list` - `cid` - `cloud_account_id` - `cloud_name` - `cloud_region` - `cloud_service` - `cluster_id` - `cluster_name` - `container_count` - `container_runtime_version` - `first_seen` - `image_digest` - `ipv4` - `kac_agent_id` - `last_seen` - `linux_sensor_coverage` - `node_name` - `pod_count` - `resource_status`
616
616
  # @return [ModelsAggregateValuesByFieldResponse]
617
617
  describe 'read_nodes_by_cloud_count test' do
618
618
  it 'should work' do
@@ -623,7 +623,7 @@ describe 'KubernetesProtectionApi' do
623
623
  # unit tests for read_nodes_by_container_engine_version_count
624
624
  # Bucket nodes by their container engine version
625
625
  # @param [Hash] opts the optional parameters
626
- # @option opts [String] :filter Search Kubernetes nodes using a query in Falcon Query Language (FQL). Supported filters: agent_id,agent_type,annotations_list,cid,cloud_account_id,cloud_name,cloud_region,cloud_service,cluster_id,cluster_name,container_count,container_runtime_version,first_seen,image_digest,ipv4,kac_agent_id,last_seen,linux_sensor_coverage,node_name,pod_count,resource_status
626
+ # @option opts [String] :filter Search Kubernetes nodes using a query in Falcon Query Language (FQL). Supported filter fields: - `agent_id` - `agent_type` - `annotations_list` - `cid` - `cloud_account_id` - `cloud_name` - `cloud_region` - `cloud_service` - `cluster_id` - `cluster_name` - `container_count` - `container_runtime_version` - `first_seen` - `image_digest` - `ipv4` - `kac_agent_id` - `last_seen` - `linux_sensor_coverage` - `node_name` - `pod_count` - `resource_status`
627
627
  # @return [ModelsAggregateValuesByFieldResponse]
628
628
  describe 'read_nodes_by_container_engine_version_count test' do
629
629
  it 'should work' do
@@ -634,7 +634,7 @@ describe 'KubernetesProtectionApi' do
634
634
  # unit tests for read_nodes_by_date_range_count
635
635
  # Retrieve nodes by date range counts
636
636
  # @param [Hash] opts the optional parameters
637
- # @option opts [String] :filter Search Kubernetes nodes using a query in Falcon Query Language (FQL). Supported filters: agent_id,agent_type,annotations_list,cid,cloud_account_id,cloud_name,cloud_region,cloud_service,cluster_id,cluster_name,container_count,container_runtime_version,first_seen,image_digest,ipv4,kac_agent_id,last_seen,linux_sensor_coverage,node_name,pod_count,resource_status
637
+ # @option opts [String] :filter Search Kubernetes nodes using a query in Falcon Query Language (FQL). Supported filter fields: - `agent_id` - `agent_type` - `annotations_list` - `cid` - `cloud_account_id` - `cloud_name` - `cloud_region` - `cloud_service` - `cluster_id` - `cluster_name` - `container_count` - `container_runtime_version` - `first_seen` - `image_digest` - `ipv4` - `kac_agent_id` - `last_seen` - `linux_sensor_coverage` - `node_name` - `pod_count` - `resource_status`
638
638
  # @return [ModelsAggregateValuesByFieldResponse]
639
639
  describe 'read_nodes_by_date_range_count test' do
640
640
  it 'should work' do
@@ -643,12 +643,12 @@ describe 'KubernetesProtectionApi' do
643
643
  end
644
644
 
645
645
  # unit tests for read_pod_combined
646
- # Retrieve kubernetes pods identified by the provided filter criteria
646
+ # Maximum offset = 10000 - limit
647
647
  # @param [Hash] opts the optional parameters
648
- # @option opts [String] :filter Search Kubernetes pods using a query in Falcon Query Language (FQL). Supported filters: agent_id,agent_type,allow_privilege_escalation,annotations_list,cid,cloud_account_id,cloud_name,cloud_region,cloud_service,cluster_id,cluster_name,container_count,first_seen,ipv4,ipv6,kac_agent_id,labels,last_seen,namespace,node_name,node_uid,owner_id,owner_type,pod_external_id,pod_id,pod_name,port,privileged,resource_status,root_write_access,run_as_root_group,run_as_root_user
648
+ # @option opts [String] :filter Search Kubernetes pods using a query in Falcon Query Language (FQL). Supported filter fields: - `agent_id` - `agent_type` - `allow_privilege_escalation` - `annotations_list` - `cid` - `cloud_account_id` - `cloud_name` - `cloud_region` - `cloud_service` - `cluster_id` - `cluster_name` - `container_count` - `first_seen` - `ipv4` - `ipv6` - `kac_agent_id` - `labels` - `last_seen` - `namespace` - `node_name` - `node_uid` - `owner_id` - `owner_type` - `pod_external_id` - `pod_id` - `pod_name` - `port` - `privileged` - `resource_status` - `root_write_access` - `run_as_root_group` - `run_as_root_user`
649
+ # @option opts [String] :sort The fields to sort the records on.
649
650
  # @option opts [Integer] :limit The upper-bound on the number of records to retrieve.
650
651
  # @option opts [Integer] :offset The offset from where to begin.
651
- # @option opts [String] :sort Field to sort results by
652
652
  # @return [ModelsPodEntityResponse]
653
653
  describe 'read_pod_combined test' do
654
654
  it 'should work' do
@@ -659,7 +659,7 @@ describe 'KubernetesProtectionApi' do
659
659
  # unit tests for read_pod_count
660
660
  # Retrieve pod counts
661
661
  # @param [Hash] opts the optional parameters
662
- # @option opts [String] :filter Retrieve count of Kubernetes pods that match a query in Falcon Query Language (FQL). Supported filters: agent_id,agent_type,allow_privilege_escalation,annotations_list,cid,cloud_account_id,cloud_name,cloud_region,cloud_service,cluster_id,cluster_name,container_count,first_seen,ipv4,ipv6,kac_agent_id,labels,last_seen,namespace,node_name,node_uid,owner_id,owner_type,pod_external_id,pod_id,pod_name,port,privileged,resource_status,root_write_access,run_as_root_group,run_as_root_user
662
+ # @option opts [String] :filter Retrieve count of Kubernetes pods that match a query in Falcon Query Language (FQL). Supported filter fields: - `agent_id` - `agent_type` - `allow_privilege_escalation` - `annotations_list` - `cid` - `cloud_account_id` - `cloud_name` - `cloud_region` - `cloud_service` - `cluster_id` - `cluster_name` - `container_count` - `first_seen` - `ipv4` - `ipv6` - `kac_agent_id` - `labels` - `last_seen` - `namespace` - `node_name` - `node_uid` - `owner_id` - `owner_type` - `pod_external_id` - `pod_id` - `pod_name` - `port` - `privileged` - `resource_status` - `root_write_access` - `run_as_root_group` - `run_as_root_user`
663
663
  # @return [CommonCountResponse]
664
664
  describe 'read_pod_count test' do
665
665
  it 'should work' do
@@ -671,7 +671,7 @@ describe 'KubernetesProtectionApi' do
671
671
  # Retrieve pod enrichment data
672
672
  # @param pod_id One or more pod ids for which to retrieve enrichment info
673
673
  # @param [Hash] opts the optional parameters
674
- # @option opts [String] :filter Supported filters: last_seen
674
+ # @option opts [String] :filter Supported filter fields: - `last_seen`
675
675
  # @return [K8sassetsPodEnrichmentResponse]
676
676
  describe 'read_pod_enrichment test' do
677
677
  it 'should work' do
@@ -690,12 +690,12 @@ describe 'KubernetesProtectionApi' do
690
690
  end
691
691
 
692
692
  # unit tests for read_running_container_images
693
- # Retrieve images on running containers
693
+ # Maximum offset = 10000 - limit
694
694
  # @param [Hash] opts the optional parameters
695
- # @option opts [String] :filter Retrieve list of images on running containers using a query in Falcon Query Language (FQL). Supported filters: cid,cluster_id,cluster_name,hosts,image_digest,image_has_been_assessed,image_id,image_name,image_registry,image_repository,image_tag,last_seen,running_status
695
+ # @option opts [String] :filter Retrieve list of images on running containers using a query in Falcon Query Language (FQL). Supported filter fields: - `cid` - `cluster_id` - `cluster_name` - `hosts` - `image_digest` - `image_has_been_assessed` - `image_id` - `image_name` - `image_registry` - `image_repository` - `image_tag` - `last_seen` - `running_status`
696
+ # @option opts [String] :sort The fields to sort the records on.
696
697
  # @option opts [Integer] :limit The upper-bound on the number of records to retrieve.
697
698
  # @option opts [Integer] :offset The offset from where to begin.
698
- # @option opts [String] :sort Field to sort results by
699
699
  # @return [ModelsContainerImage]
700
700
  describe 'read_running_container_images test' do
701
701
  it 'should work' do
@@ -706,7 +706,7 @@ describe 'KubernetesProtectionApi' do
706
706
  # unit tests for read_vulnerable_container_image_count
707
707
  # Retrieve count of vulnerable images running on containers
708
708
  # @param [Hash] opts the optional parameters
709
- # @option opts [String] :filter Retrieve count of Kubernetes containers that match a query in Falcon Query Language (FQL). Supported filters: agent_id,agent_type,allow_privilege_escalation,cid,cloud_account_id,cloud_name,cloud_region,cloud_service,cluster_id,cluster_name,container_id,container_image_id,container_name,cve_id,detection_name,first_seen,image_detection_count,image_digest,image_has_been_assessed,image_id,image_registry,image_repository,image_tag,image_vulnerability_count,insecure_mount_source,insecure_mount_type,insecure_propagation_mode,interactive_mode,ipv4,ipv6,kac_agent_id,labels,last_seen,namespace,node_name,node_uid,package_name_version,pod_id,pod_name,port,privileged,root_write_access,run_as_root_group,run_as_root_user,running_status
709
+ # @option opts [String] :filter Retrieve count of Kubernetes containers that match a query in Falcon Query Language (FQL). Supported filter fields: - `agent_id` - `agent_type` - `allow_privilege_escalation` - `cid` - `cloud_account_id` - `cloud_instance_id` - `cloud_name` - `cloud_region` - `cloud_service` - `cluster_id` - `cluster_name` - `container_id` - `container_image_id` - `container_name` - `cve_id` - `detection_name` - `first_seen` - `image_detection_count` - `image_digest` - `image_has_been_assessed` - `image_id` - `image_registry` - `image_repository` - `image_tag` - `image_vulnerability_count` - `insecure_mount_source` - `insecure_mount_type` - `insecure_propagation_mode` - `interactive_mode` - `ipv4` - `ipv6` - `kac_agent_id` - `labels` - `last_seen` - `namespace` - `node_name` - `node_uid` - `package_name_version` - `pod_id` - `pod_name` - `port` - `privileged` - `root_write_access` - `run_as_root_group` - `run_as_root_user` - `running_status`
710
710
  # @return [ModelsAPIFilterResponse]
711
711
  describe 'read_vulnerable_container_image_count test' do
712
712
  it 'should work' do
@@ -725,12 +725,12 @@ describe 'KubernetesProtectionApi' do
725
725
  end
726
726
 
727
727
  # unit tests for search_and_read_kubernetes_iom_entities
728
- # Search Kubernetes IOM by the provided search criteria
728
+ # Maximum offset = 10000 - limit
729
729
  # @param [Hash] opts the optional parameters
730
- # @option opts [String] :filter Search Kubernetes IOMs using a query in Falcon Query Language (FQL). Supported filters: cid,cis_id,cluster_id,cluster_name,containers_impacted_count,containers_impacted_ids,detection_type,name,namespace,prevented,resource_id,resource_name,resource_type,severity
730
+ # @option opts [String] :filter Search Kubernetes IOMs using a query in Falcon Query Language (FQL). Supported filter fields: - `cid` - `cis_id` - `cluster_id` - `cluster_name` - `containers_impacted_count` - `containers_impacted_ids` - `detection_type` - `name` - `namespace` - `prevented` - `resource_id` - `resource_name` - `resource_type` - `severity`
731
+ # @option opts [String] :sort The fields to sort the records on.
731
732
  # @option opts [Integer] :limit The upper-bound on the number of records to retrieve.
732
733
  # @option opts [Integer] :offset The offset from where to begin.
733
- # @option opts [String] :sort The fields to sort the records on.
734
734
  # @return [K8siomsKubernetesIOMEntityResponse]
735
735
  describe 'search_and_read_kubernetes_iom_entities test' do
736
736
  it 'should work' do
@@ -739,12 +739,12 @@ describe 'KubernetesProtectionApi' do
739
739
  end
740
740
 
741
741
  # unit tests for search_kubernetes_ioms
742
- # Search Kubernetes IOMs by the provided search criteria. this endpoint returns a list of Kubernetes IOM UUIDs matching the query
742
+ # Maximum offset = 10000 - limit
743
743
  # @param [Hash] opts the optional parameters
744
- # @option opts [String] :filter Search Kubernetes IOMs using a query in Falcon Query Language (FQL). Supported filters: cid,cis_id,cluster_id,cluster_name,containers_impacted_count,containers_impacted_ids,detection_type,name,namespace,prevented,resource_id,resource_name,resource_type,severity
744
+ # @option opts [String] :filter Search Kubernetes IOMs using a query in Falcon Query Language (FQL). Supported filter fields: - `cid` - `cis_id` - `cluster_id` - `cluster_name` - `containers_impacted_count` - `containers_impacted_ids` - `detection_type` - `name` - `namespace` - `prevented` - `resource_id` - `resource_name` - `resource_type` - `severity`
745
+ # @option opts [String] :sort The fields to sort the records on.
745
746
  # @option opts [Integer] :limit The upper-bound on the number of records to retrieve.
746
747
  # @option opts [Integer] :offset The offset from where to begin.
747
- # @option opts [String] :sort The fields to sort the records on.
748
748
  # @return [CommonGenericEntityResponseString]
749
749
  describe 'search_kubernetes_ioms test' do
750
750
  it 'should work' do
@@ -0,0 +1,80 @@
1
+ =begin
2
+ Crimson Falcon - Ruby Client SDK
3
+
4
+ Code auto-generated by OpenAPI Generator; DO NOT EDIT.
5
+
6
+ MIT License
7
+
8
+ Copyright (c) 2023 Crowdstrike
9
+
10
+ Permission is hereby granted, free of charge, to any person obtaining a copy
11
+ of this software and associated documentation files (the "Software"), to deal
12
+ in the Software without restriction, including without limitation the rights
13
+ to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
14
+ copies of the Software, and to permit persons to whom the Software is
15
+ furnished to do so, subject to the following conditions:
16
+
17
+ The above copyright notice and this permission notice shall be included in all
18
+ copies or substantial portions of the Software.
19
+
20
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
21
+ IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
22
+ FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
23
+ AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
24
+ LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
25
+ OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
26
+ SOFTWARE.
27
+
28
+ =end
29
+
30
+ require 'spec_helper'
31
+ require 'json'
32
+
33
+ # Unit tests for Falcon::LookupFiles
34
+ # Automatically generated by openapi-generator (https://openapi-generator.tech)
35
+ # Please update as you see appropriate
36
+ describe 'LookupFiles' do
37
+ before(:all) do
38
+ # run before each test
39
+ @api_instance = Falcon::LookupFiles.new
40
+ end
41
+
42
+ after(:all) do
43
+ # run after each test
44
+ end
45
+
46
+ describe 'test an instance of LookupFiles' do
47
+ it 'should create an instance of LookupFiles' do
48
+ expect(@api_instance).to be_instance_of(Falcon::LookupFiles)
49
+ end
50
+ end
51
+
52
+ # unit tests for create_file_v1
53
+ # Creates a lookup file
54
+ # @param file File to be uploaded
55
+ # @param name Name used to identify the file
56
+ # @param [Hash] opts the optional parameters
57
+ # @option opts [String] :description File description
58
+ # @option opts [String] :id Unique identifier of the file being updated.
59
+ # @option opts [String] :repo Name of repository or view to save the file
60
+ # @return [DomainLookupFileWrapper]
61
+ describe 'create_file_v1 test' do
62
+ it 'should work' do
63
+ # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/
64
+ end
65
+ end
66
+
67
+ # unit tests for update_file_v1
68
+ # Updates a lookup file
69
+ # @param id Unique identifier of the file being updated.
70
+ # @param [Hash] opts the optional parameters
71
+ # @option opts [String] :description File description
72
+ # @option opts [File] :file File to be uploaded
73
+ # @return [DomainLookupFileWrapper]
74
+ describe 'update_file_v1 test' do
75
+ it 'should work' do
76
+ # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/
77
+ end
78
+ end
79
+
80
+ end