diff --git a/falcon/client/recon/create_rules_v1_parameters.go b/falcon/client/recon/create_rules_v1_parameters.go index f486801e..da0b563d 100644 --- a/falcon/client/recon/create_rules_v1_parameters.go +++ b/falcon/client/recon/create_rules_v1_parameters.go @@ -61,12 +61,6 @@ func NewCreateRulesV1ParamsWithHTTPClient(client *http.Client) *CreateRulesV1Par */ type CreateRulesV1Params struct { - /* XCSUSERUUID. - - User UUID - */ - XCSUSERUUID *string - // Body. Body []*models.SadomainCreateRuleRequestV1 @@ -123,17 +117,6 @@ func (o *CreateRulesV1Params) SetHTTPClient(client *http.Client) { o.HTTPClient = client } -// WithXCSUSERUUID adds the xCSUSERUUID to the create rules v1 params -func (o *CreateRulesV1Params) WithXCSUSERUUID(xCSUSERUUID *string) *CreateRulesV1Params { - o.SetXCSUSERUUID(xCSUSERUUID) - return o -} - -// SetXCSUSERUUID adds the xCSUSERUuid to the create rules v1 params -func (o *CreateRulesV1Params) SetXCSUSERUUID(xCSUSERUUID *string) { - o.XCSUSERUUID = xCSUSERUUID -} - // WithBody adds the body to the create rules v1 params func (o *CreateRulesV1Params) WithBody(body []*models.SadomainCreateRuleRequestV1) *CreateRulesV1Params { o.SetBody(body) @@ -152,14 +135,6 @@ func (o *CreateRulesV1Params) WriteToRequest(r runtime.ClientRequest, reg strfmt return err } var res []error - - if o.XCSUSERUUID != nil { - - // header param X-CS-USERUUID - if err := r.SetHeaderParam("X-CS-USERUUID", *o.XCSUSERUUID); err != nil { - return err - } - } if o.Body != nil { if err := r.SetBodyParam(o.Body); err != nil { return err diff --git a/falcon/client/recon/delete_rules_v1_parameters.go b/falcon/client/recon/delete_rules_v1_parameters.go index c5e5b662..c5107b7f 100644 --- a/falcon/client/recon/delete_rules_v1_parameters.go +++ b/falcon/client/recon/delete_rules_v1_parameters.go @@ -60,12 +60,6 @@ func NewDeleteRulesV1ParamsWithHTTPClient(client *http.Client) *DeleteRulesV1Par */ type DeleteRulesV1Params struct { - /* XCSUSERUUID. - - User UUID - */ - XCSUSERUUID *string - /* Ids. IDs of rules. @@ -125,17 +119,6 @@ func (o *DeleteRulesV1Params) SetHTTPClient(client *http.Client) { o.HTTPClient = client } -// WithXCSUSERUUID adds the xCSUSERUUID to the delete rules v1 params -func (o *DeleteRulesV1Params) WithXCSUSERUUID(xCSUSERUUID *string) *DeleteRulesV1Params { - o.SetXCSUSERUUID(xCSUSERUUID) - return o -} - -// SetXCSUSERUUID adds the xCSUSERUuid to the delete rules v1 params -func (o *DeleteRulesV1Params) SetXCSUSERUUID(xCSUSERUUID *string) { - o.XCSUSERUUID = xCSUSERUUID -} - // WithIds adds the ids to the delete rules v1 params func (o *DeleteRulesV1Params) WithIds(ids []string) *DeleteRulesV1Params { o.SetIds(ids) @@ -155,14 +138,6 @@ func (o *DeleteRulesV1Params) WriteToRequest(r runtime.ClientRequest, reg strfmt } var res []error - if o.XCSUSERUUID != nil { - - // header param X-CS-USERUUID - if err := r.SetHeaderParam("X-CS-USERUUID", *o.XCSUSERUUID); err != nil { - return err - } - } - if o.Ids != nil { // binding items for ids diff --git a/falcon/client/recon/get_rules_v1_parameters.go b/falcon/client/recon/get_rules_v1_parameters.go index c9b124b1..e4d74dad 100644 --- a/falcon/client/recon/get_rules_v1_parameters.go +++ b/falcon/client/recon/get_rules_v1_parameters.go @@ -60,12 +60,6 @@ func NewGetRulesV1ParamsWithHTTPClient(client *http.Client) *GetRulesV1Params { */ type GetRulesV1Params struct { - /* XCSUSERUUID. - - User UUID - */ - XCSUSERUUID *string - /* Ids. IDs of rules. @@ -125,17 +119,6 @@ func (o *GetRulesV1Params) SetHTTPClient(client *http.Client) { o.HTTPClient = client } -// WithXCSUSERUUID adds the xCSUSERUUID to the get rules v1 params -func (o *GetRulesV1Params) WithXCSUSERUUID(xCSUSERUUID *string) *GetRulesV1Params { - o.SetXCSUSERUUID(xCSUSERUUID) - return o -} - -// SetXCSUSERUUID adds the xCSUSERUuid to the get rules v1 params -func (o *GetRulesV1Params) SetXCSUSERUUID(xCSUSERUUID *string) { - o.XCSUSERUUID = xCSUSERUUID -} - // WithIds adds the ids to the get rules v1 params func (o *GetRulesV1Params) WithIds(ids []string) *GetRulesV1Params { o.SetIds(ids) @@ -155,14 +138,6 @@ func (o *GetRulesV1Params) WriteToRequest(r runtime.ClientRequest, reg strfmt.Re } var res []error - if o.XCSUSERUUID != nil { - - // header param X-CS-USERUUID - if err := r.SetHeaderParam("X-CS-USERUUID", *o.XCSUSERUUID); err != nil { - return err - } - } - if o.Ids != nil { // binding items for ids diff --git a/falcon/client/recon/preview_rule_v1_parameters.go b/falcon/client/recon/preview_rule_v1_parameters.go index 0e2812f8..56d51ace 100644 --- a/falcon/client/recon/preview_rule_v1_parameters.go +++ b/falcon/client/recon/preview_rule_v1_parameters.go @@ -61,12 +61,6 @@ func NewPreviewRuleV1ParamsWithHTTPClient(client *http.Client) *PreviewRuleV1Par */ type PreviewRuleV1Params struct { - /* XCSUSERUUID. - - User UUID - */ - XCSUSERUUID *string - // Body. Body *models.DomainRulePreviewRequest @@ -123,17 +117,6 @@ func (o *PreviewRuleV1Params) SetHTTPClient(client *http.Client) { o.HTTPClient = client } -// WithXCSUSERUUID adds the xCSUSERUUID to the preview rule v1 params -func (o *PreviewRuleV1Params) WithXCSUSERUUID(xCSUSERUUID *string) *PreviewRuleV1Params { - o.SetXCSUSERUUID(xCSUSERUUID) - return o -} - -// SetXCSUSERUUID adds the xCSUSERUuid to the preview rule v1 params -func (o *PreviewRuleV1Params) SetXCSUSERUUID(xCSUSERUUID *string) { - o.XCSUSERUUID = xCSUSERUUID -} - // WithBody adds the body to the preview rule v1 params func (o *PreviewRuleV1Params) WithBody(body *models.DomainRulePreviewRequest) *PreviewRuleV1Params { o.SetBody(body) @@ -152,14 +135,6 @@ func (o *PreviewRuleV1Params) WriteToRequest(r runtime.ClientRequest, reg strfmt return err } var res []error - - if o.XCSUSERUUID != nil { - - // header param X-CS-USERUUID - if err := r.SetHeaderParam("X-CS-USERUUID", *o.XCSUSERUUID); err != nil { - return err - } - } if o.Body != nil { if err := r.SetBodyParam(o.Body); err != nil { return err diff --git a/falcon/client/recon/query_rules_v1_parameters.go b/falcon/client/recon/query_rules_v1_parameters.go index 52eeddd1..3c7e7082 100644 --- a/falcon/client/recon/query_rules_v1_parameters.go +++ b/falcon/client/recon/query_rules_v1_parameters.go @@ -60,12 +60,6 @@ func NewQueryRulesV1ParamsWithHTTPClient(client *http.Client) *QueryRulesV1Param */ type QueryRulesV1Params struct { - /* XCSUSERUUID. - - User UUID - */ - XCSUSERUUID *string - /* Filter. FQL query to filter rules by. Possible filter properties are: [id cid user_uuid topic priority permissions filter status created_timestamp last_updated_timestamp] @@ -74,7 +68,7 @@ type QueryRulesV1Params struct { /* Limit. - Number of ids to return. + Number of IDs to return. Offset + limit should NOT be above 10K. */ Limit *int64 @@ -82,7 +76,7 @@ type QueryRulesV1Params struct { Starting index of overall result set from which to return ids. */ - Offset *string + Offset *int64 /* Q. @@ -149,17 +143,6 @@ func (o *QueryRulesV1Params) SetHTTPClient(client *http.Client) { o.HTTPClient = client } -// WithXCSUSERUUID adds the xCSUSERUUID to the query rules v1 params -func (o *QueryRulesV1Params) WithXCSUSERUUID(xCSUSERUUID *string) *QueryRulesV1Params { - o.SetXCSUSERUUID(xCSUSERUUID) - return o -} - -// SetXCSUSERUUID adds the xCSUSERUuid to the query rules v1 params -func (o *QueryRulesV1Params) SetXCSUSERUUID(xCSUSERUUID *string) { - o.XCSUSERUUID = xCSUSERUUID -} - // WithFilter adds the filter to the query rules v1 params func (o *QueryRulesV1Params) WithFilter(filter *string) *QueryRulesV1Params { o.SetFilter(filter) @@ -183,13 +166,13 @@ func (o *QueryRulesV1Params) SetLimit(limit *int64) { } // WithOffset adds the offset to the query rules v1 params -func (o *QueryRulesV1Params) WithOffset(offset *string) *QueryRulesV1Params { +func (o *QueryRulesV1Params) WithOffset(offset *int64) *QueryRulesV1Params { o.SetOffset(offset) return o } // SetOffset adds the offset to the query rules v1 params -func (o *QueryRulesV1Params) SetOffset(offset *string) { +func (o *QueryRulesV1Params) SetOffset(offset *int64) { o.Offset = offset } @@ -223,14 +206,6 @@ func (o *QueryRulesV1Params) WriteToRequest(r runtime.ClientRequest, reg strfmt. } var res []error - if o.XCSUSERUUID != nil { - - // header param X-CS-USERUUID - if err := r.SetHeaderParam("X-CS-USERUUID", *o.XCSUSERUUID); err != nil { - return err - } - } - if o.Filter != nil { // query param filter @@ -268,12 +243,12 @@ func (o *QueryRulesV1Params) WriteToRequest(r runtime.ClientRequest, reg strfmt. if o.Offset != nil { // query param offset - var qrOffset string + var qrOffset int64 if o.Offset != nil { qrOffset = *o.Offset } - qOffset := qrOffset + qOffset := swag.FormatInt64(qrOffset) if qOffset != "" { if err := r.SetQueryParam("offset", qOffset); err != nil { diff --git a/falcon/client/recon/recon_client.go b/falcon/client/recon/recon_client.go index 25784108..c38fb745 100644 --- a/falcon/client/recon/recon_client.go +++ b/falcon/client/recon/recon_client.go @@ -477,7 +477,7 @@ func (a *Client) GetNotificationsV1(params *GetNotificationsV1Params, opts ...Cl } /* - GetRulesV1 gets monitoring rules rules by provided i ds + GetRulesV1 gets monitoring rules based on their i ds i ds can be retrieved using the g e t queries rules v1 endpoint */ func (a *Client) GetRulesV1(params *GetRulesV1Params, opts ...ClientOption) (*GetRulesV1OK, error) { // TODO: Validate the params before sending diff --git a/falcon/client/recon/update_rules_v1_parameters.go b/falcon/client/recon/update_rules_v1_parameters.go index 6b9fc15e..311619d3 100644 --- a/falcon/client/recon/update_rules_v1_parameters.go +++ b/falcon/client/recon/update_rules_v1_parameters.go @@ -61,12 +61,6 @@ func NewUpdateRulesV1ParamsWithHTTPClient(client *http.Client) *UpdateRulesV1Par */ type UpdateRulesV1Params struct { - /* XCSUSERUUID. - - User UUID - */ - XCSUSERUUID *string - // Body. Body []*models.DomainUpdateRuleRequestV1 @@ -123,17 +117,6 @@ func (o *UpdateRulesV1Params) SetHTTPClient(client *http.Client) { o.HTTPClient = client } -// WithXCSUSERUUID adds the xCSUSERUUID to the update rules v1 params -func (o *UpdateRulesV1Params) WithXCSUSERUUID(xCSUSERUUID *string) *UpdateRulesV1Params { - o.SetXCSUSERUUID(xCSUSERUUID) - return o -} - -// SetXCSUSERUUID adds the xCSUSERUuid to the update rules v1 params -func (o *UpdateRulesV1Params) SetXCSUSERUUID(xCSUSERUUID *string) { - o.XCSUSERUUID = xCSUSERUUID -} - // WithBody adds the body to the update rules v1 params func (o *UpdateRulesV1Params) WithBody(body []*models.DomainUpdateRuleRequestV1) *UpdateRulesV1Params { o.SetBody(body) @@ -152,14 +135,6 @@ func (o *UpdateRulesV1Params) WriteToRequest(r runtime.ClientRequest, reg strfmt return err } var res []error - - if o.XCSUSERUUID != nil { - - // header param X-CS-USERUUID - if err := r.SetHeaderParam("X-CS-USERUUID", *o.XCSUSERUUID); err != nil { - return err - } - } if o.Body != nil { if err := r.SetBodyParam(o.Body); err != nil { return err diff --git a/falcon/models/domain_rule_meta_info.go b/falcon/models/domain_rule_meta_info.go index 130ae052..16dd70f0 100644 --- a/falcon/models/domain_rule_meta_info.go +++ b/falcon/models/domain_rule_meta_info.go @@ -37,7 +37,7 @@ type DomainRuleMetaInfo struct { TraceID *string `json:"trace_id"` // writes - Writes *MsaResources `json:"writes,omitempty"` + Writes *MsaspecWrites `json:"writes,omitempty"` } // Validate validates this domain rule meta info diff --git a/falcon/models/domain_update_rule_request_v1.go b/falcon/models/domain_update_rule_request_v1.go index 3ae260e8..8ab75702 100644 --- a/falcon/models/domain_update_rule_request_v1.go +++ b/falcon/models/domain_update_rule_request_v1.go @@ -19,6 +19,10 @@ import ( // swagger:model domain.UpdateRuleRequestV1 type DomainUpdateRuleRequestV1 struct { + // Whether to monitor for breach data + // Required: true + BreachMonitoringEnabled *bool `json:"breach_monitoring_enabled"` + // The filter to be used for searching // Required: true Filter *string `json:"filter"` @@ -31,7 +35,7 @@ type DomainUpdateRuleRequestV1 struct { // Required: true Name *string `json:"name"` - // The permissions for a particular rule which specifies the rule's access by other users. Possible values: [private public] + // The permissions for a particular rule which specifies the rule's access by other users. Possible values: [public private] // Required: true Permissions *string `json:"permissions"` @@ -44,6 +48,10 @@ type DomainUpdateRuleRequestV1 struct { func (m *DomainUpdateRuleRequestV1) Validate(formats strfmt.Registry) error { var res []error + if err := m.validateBreachMonitoringEnabled(formats); err != nil { + res = append(res, err) + } + if err := m.validateFilter(formats); err != nil { res = append(res, err) } @@ -70,6 +78,15 @@ func (m *DomainUpdateRuleRequestV1) Validate(formats strfmt.Registry) error { return nil } +func (m *DomainUpdateRuleRequestV1) validateBreachMonitoringEnabled(formats strfmt.Registry) error { + + if err := validate.Required("breach_monitoring_enabled", "body", m.BreachMonitoringEnabled); err != nil { + return err + } + + return nil +} + func (m *DomainUpdateRuleRequestV1) validateFilter(formats strfmt.Registry) error { if err := validate.Required("filter", "body", m.Filter); err != nil { diff --git a/falcon/models/sadomain_create_rule_request_v1.go b/falcon/models/sadomain_create_rule_request_v1.go index 4162cc42..0ae87d97 100644 --- a/falcon/models/sadomain_create_rule_request_v1.go +++ b/falcon/models/sadomain_create_rule_request_v1.go @@ -19,6 +19,10 @@ import ( // swagger:model sadomain.CreateRuleRequestV1 type SadomainCreateRuleRequestV1 struct { + // Whether to monitor for breach data. Available only for `Company Domains` and `Email addresses` rule topics. When enabled, ownership of the monitored domains or emails is required. + // Required: true + BreachMonitoringEnabled *bool `json:"breach_monitoring_enabled"` + // The filter to be used for searching // Required: true Filter *string `json:"filter"` @@ -27,15 +31,15 @@ type SadomainCreateRuleRequestV1 struct { // Required: true Name *string `json:"name"` - // The permissions for a particular rule which specifies the rule's access by other users. Possible values: [public private] + // The permissions for a particular rule which specifies the rule's access by other users. Possible values: [private public] // Required: true Permissions *string `json:"permissions"` - // The priority for a particular rule. Possible values: [medium high low] + // The priority for a particular rule. Possible values: [low medium high] // Required: true Priority *string `json:"priority"` - // The topic of a given rule. Possible values: [SA_THIRD_PARTY SA_CVE SA_ALIAS SA_AUTHOR SA_BRAND_PRODUCT SA_VIP SA_IP SA_BIN SA_DOMAIN SA_EMAIL SA_CUSTOM] + // The topic of a given rule. Possible values: [SA_BRAND_PRODUCT SA_THIRD_PARTY SA_IP SA_CVE SA_DOMAIN SA_AUTHOR SA_CUSTOM SA_VIP SA_BIN SA_EMAIL SA_ALIAS] // Required: true Topic *string `json:"topic"` } @@ -44,6 +48,10 @@ type SadomainCreateRuleRequestV1 struct { func (m *SadomainCreateRuleRequestV1) Validate(formats strfmt.Registry) error { var res []error + if err := m.validateBreachMonitoringEnabled(formats); err != nil { + res = append(res, err) + } + if err := m.validateFilter(formats); err != nil { res = append(res, err) } @@ -70,6 +78,15 @@ func (m *SadomainCreateRuleRequestV1) Validate(formats strfmt.Registry) error { return nil } +func (m *SadomainCreateRuleRequestV1) validateBreachMonitoringEnabled(formats strfmt.Registry) error { + + if err := validate.Required("breach_monitoring_enabled", "body", m.BreachMonitoringEnabled); err != nil { + return err + } + + return nil +} + func (m *SadomainCreateRuleRequestV1) validateFilter(formats strfmt.Registry) error { if err := validate.Required("filter", "body", m.Filter); err != nil { diff --git a/falcon/models/sadomain_customer_assets.go b/falcon/models/sadomain_customer_assets.go new file mode 100644 index 00000000..e4bfc2f3 --- /dev/null +++ b/falcon/models/sadomain_customer_assets.go @@ -0,0 +1,53 @@ +// Code generated by go-swagger; DO NOT EDIT. + +package models + +// This file was generated by the swagger tool. +// Editing this file might prove futile when you re-run the swagger generate command + +import ( + "context" + + "github.com/go-openapi/strfmt" + "github.com/go-openapi/swag" +) + +// SadomainCustomerAssets sadomain customer assets +// +// swagger:model sadomain.CustomerAssets +type SadomainCustomerAssets struct { + + // domains + Domains []string `json:"domains"` + + // emails + Emails []string `json:"emails"` +} + +// Validate validates this sadomain customer assets +func (m *SadomainCustomerAssets) Validate(formats strfmt.Registry) error { + return nil +} + +// ContextValidate validates this sadomain customer assets based on context it is used +func (m *SadomainCustomerAssets) ContextValidate(ctx context.Context, formats strfmt.Registry) error { + return nil +} + +// MarshalBinary interface implementation +func (m *SadomainCustomerAssets) MarshalBinary() ([]byte, error) { + if m == nil { + return nil, nil + } + return swag.WriteJSON(m) +} + +// UnmarshalBinary interface implementation +func (m *SadomainCustomerAssets) UnmarshalBinary(b []byte) error { + var res SadomainCustomerAssets + if err := swag.ReadJSON(b, &res); err != nil { + return err + } + *m = res + return nil +} diff --git a/falcon/models/sadomain_rule.go b/falcon/models/sadomain_rule.go index 5e9f64a4..96c75443 100644 --- a/falcon/models/sadomain_rule.go +++ b/falcon/models/sadomain_rule.go @@ -19,6 +19,10 @@ import ( // swagger:model sadomain.Rule type SadomainRule struct { + // Whether to monitor for breach data. Available only for `Company Domains` and `Email addresses` rule topics. When enabled, ownership of the monitored domains or emails is required. + // Required: true + BreachMonitoringEnabled *bool `json:"breach_monitoring_enabled"` + // cid // Required: true Cid *string `json:"cid"` @@ -28,7 +32,7 @@ type SadomainRule struct { // Format: date-time CreatedTimestamp *strfmt.DateTime `json:"created_timestamp"` - // The FQL filter contained in a rule and used for searching + // The FQL filter contained in a rule and used for searching. Parentheses may be added automatically for clarity. // Required: true Filter *string `json:"filter"` @@ -40,6 +44,9 @@ type SadomainRule struct { // Required: true Name *string `json:"name"` + // The customer assets for which ownership must be verified, in order to monitor for breach data + OwnershipAssets *SadomainCustomerAssets `json:"ownership_assets,omitempty"` + // The permissions of a given rule // Required: true Permissions *string `json:"permissions"` @@ -79,6 +86,10 @@ type SadomainRule struct { func (m *SadomainRule) Validate(formats strfmt.Registry) error { var res []error + if err := m.validateBreachMonitoringEnabled(formats); err != nil { + res = append(res, err) + } + if err := m.validateCid(formats); err != nil { res = append(res, err) } @@ -99,6 +110,10 @@ func (m *SadomainRule) Validate(formats strfmt.Registry) error { res = append(res, err) } + if err := m.validateOwnershipAssets(formats); err != nil { + res = append(res, err) + } + if err := m.validatePermissions(formats); err != nil { res = append(res, err) } @@ -129,6 +144,15 @@ func (m *SadomainRule) Validate(formats strfmt.Registry) error { return nil } +func (m *SadomainRule) validateBreachMonitoringEnabled(formats strfmt.Registry) error { + + if err := validate.Required("breach_monitoring_enabled", "body", m.BreachMonitoringEnabled); err != nil { + return err + } + + return nil +} + func (m *SadomainRule) validateCid(formats strfmt.Registry) error { if err := validate.Required("cid", "body", m.Cid); err != nil { @@ -178,6 +202,25 @@ func (m *SadomainRule) validateName(formats strfmt.Registry) error { return nil } +func (m *SadomainRule) validateOwnershipAssets(formats strfmt.Registry) error { + if swag.IsZero(m.OwnershipAssets) { // not required + return nil + } + + if m.OwnershipAssets != nil { + if err := m.OwnershipAssets.Validate(formats); err != nil { + if ve, ok := err.(*errors.Validation); ok { + return ve.ValidateName("ownership_assets") + } else if ce, ok := err.(*errors.CompositeError); ok { + return ce.ValidateName("ownership_assets") + } + return err + } + } + + return nil +} + func (m *SadomainRule) validatePermissions(formats strfmt.Registry) error { if err := validate.Required("permissions", "body", m.Permissions); err != nil { @@ -236,8 +279,33 @@ func (m *SadomainRule) validateUserUUID(formats strfmt.Registry) error { return nil } -// ContextValidate validates this sadomain rule based on context it is used +// ContextValidate validate this sadomain rule based on the context it is used func (m *SadomainRule) ContextValidate(ctx context.Context, formats strfmt.Registry) error { + var res []error + + if err := m.contextValidateOwnershipAssets(ctx, formats); err != nil { + res = append(res, err) + } + + if len(res) > 0 { + return errors.CompositeValidationError(res...) + } + return nil +} + +func (m *SadomainRule) contextValidateOwnershipAssets(ctx context.Context, formats strfmt.Registry) error { + + if m.OwnershipAssets != nil { + if err := m.OwnershipAssets.ContextValidate(ctx, formats); err != nil { + if ve, ok := err.(*errors.Validation); ok { + return ve.ValidateName("ownership_assets") + } else if ce, ok := err.(*errors.CompositeError); ok { + return ce.ValidateName("ownership_assets") + } + return err + } + } + return nil } diff --git a/specs/transformation.jq b/specs/transformation.jq index c1eba984..730e7425 100644 --- a/specs/transformation.jq +++ b/specs/transformation.jq @@ -14,9 +14,12 @@ | .definitions."msaspec.ResponseFields".properties.errors.items."$ref" = "#/definitions/msa.APIError" # Rename msaspec.Paging to msa.Paging. These are two names for the same type. | del(.definitions."msaspec.Paging") + | .definitions."domain.RuleMetaInfo".properties.pagination."$ref" = "#/definitions/msa.Paging" # Rename msaspec.MetaInfo to msa.MetaInfo. These are two names for the same type. | del(.definitions."msaspec.MetaInfo") | .definitions."domain.DiscoverAPIHostEntitiesResponse".properties.meta."$ref" = "#/definitions/msa.MetaInfo" + | .definitions."domain.AggregatesResponse".properties.meta."$ref" = "#/definitions/msa.MetaInfo" + | .definitions."domain.ErrorsOnly".properties.meta."$ref" = "#/definitions/msa.MetaInfo" | .definitions."msa.QueryResponse".properties.meta."$ref" = "#/definitions/msa.MetaInfo" | .definitions."msaspec.ResponseFields".properties.meta."$ref" = "#/definitions/msa.MetaInfo" # Misc fixes