Documentation ¶
Index ¶
- Variables
- type AttackCandidateBasedEmailPayload
- type AttackCandidateBasedJiraPayload
- type AttackCandidateBasedWebhookPayload
- type EmailConfiguration
- type JiraConfiguration
- type NotificationTrigger
- type NotificationType
- type SecurityProblemBasedEmailPayload
- type SecurityProblemBasedJiraPayload
- type SecurityProblemBasedWebhookPayload
- type Settings
- type WebhookConfiguration
- type WebhookConfigurationHeader
- type WebhookConfigurationHeaders
Constants ¶
This section is empty.
Variables ¶
View Source
var NotificationTriggers = struct { AttackCandidate NotificationTrigger SecurityProblem NotificationTrigger }{ "ATTACK_CANDIDATE", "SECURITY_PROBLEM", }
View Source
var NotificationTypes = struct { Email NotificationType Jira NotificationType Webhook NotificationType }{ "EMAIL", "JIRA", "WEBHOOK", }
Functions ¶
This section is empty.
Types ¶
type AttackCandidateBasedEmailPayload ¶
type AttackCandidateBasedEmailPayload struct { Body string `json:"body"` // The template of the email notifications. \nIn case a value of a security problem is not set, the placeholder will be replaced by an empty string.. **Note:** Security notifications contain sensitive information. Excessive usage of placeholders in the body might leak information to untrusted parties. \n \nAvailable placeholders: \n**{AttackDisplayId}**: The unique identifier assigned by Dynatrace, for example: \"A-1234\". \n**{Title}**: Location of the attack, for example: \"com.dynatrace.Class.method():120\" \n**{Type}**: The type of attack, for example: \"SQL Injection\". \n**{AttackUrl}**: URL of the attack in Dynatrace. \n**{ProcessGroupId}**: Details about the process group attacked. \n**{EntryPoint}**: The entry point of the attack into the process, for example: \"/login\". Can be empty. \n**{Status}**: The status of the attack, for example: \"Exploited\" \n**{Timestamp}**: When the attack happened. \n**{VulnerabilityName}**: Name of the associated code-level vulnerability, for example: \"InMemoryDatabaseCaller.getAccountInfo():51\". Can be empty. Subject string `json:"subject"` // The subject of the email notifications.. Available placeholders: \n**{AttackDisplayId}**: The unique identifier assigned by Dynatrace, for example, \"A-1234\". \n**{Title}**: Location of the attack, for example: \"com.dynatrace.Class.method():120\" \n**{Type}**: The type of attack, for example: \"SQL Injection\". \n**{AttackUrl}**: URL of the attack in Dynatrace. \n**{ProcessGroupId}**: Details about the process group attacked. \n**{EntryPoint}**: The entry point of the attack into the process, for example: \"/login\". Can be empty. \n**{Status}**: The status of the attack, for example: \"Exploited\" \n**{Timestamp}**: When the attack happened. \n**{VulnerabilityName}**: Name of the associated code-level vulnerability, for example: \"InMemoryDatabaseCaller.getAccountInfo():51\". Can be empty. }
func (*AttackCandidateBasedEmailPayload) MarshalHCL ¶
func (me *AttackCandidateBasedEmailPayload) MarshalHCL(properties hcl.Properties) error
func (*AttackCandidateBasedEmailPayload) Schema ¶
func (me *AttackCandidateBasedEmailPayload) Schema() map[string]*schema.Schema
func (*AttackCandidateBasedEmailPayload) UnmarshalHCL ¶
func (me *AttackCandidateBasedEmailPayload) UnmarshalHCL(decoder hcl.Decoder) error
type AttackCandidateBasedJiraPayload ¶
type AttackCandidateBasedJiraPayload struct { Description string `json:"description"` // The description of the Jira issue to be created by this notification. \nIn case a value of an attack is not set, the placeholder will be replaced by an empty string.. **Note:** Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties. \n \nAvailable placeholders: \n**{AttackDisplayId}**: The unique identifier assigned by Dynatrace, for example: \"A-1234\". \n**{Title}**: Location of the attack, for example: \"com.dynatrace.Class.method():120\" \n**{Type}**: The type of attack, for example: \"SQL Injection\". \n**{AttackUrl}**: URL of the attack in Dynatrace. \n**{ProcessGroupId}**: Details about the process group attacked. \n**{EntryPoint}**: The entry point of the attack into the process, for example: \"/login\". Can be empty. \n**{Status}**: The status of the attack, for example: \"Exploited\" \n**{Timestamp}**: When the attack happened. \n**{VulnerabilityName}**: Name of the associated code-level vulnerability, for example: \"InMemoryDatabaseCaller.getAccountInfo():51\". Can be empty. Summary string `json:"summary"` // The summary of the Jira issue to be created by this notification.. **Note:** The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded. \n \nAvailable placeholders: \n**{AttackDisplayId}**: The unique identifier assigned by Dynatrace, for example, \"A-1234\". \n**{Title}**: Location of the attack, for example: \"com.dynatrace.Class.method():120\" \n**{Type}**: The type of attack, for example: \"SQL Injection\". \n**{AttackUrl}**: URL of the attack in Dynatrace. \n**{ProcessGroupId}**: Details about the process group attacked. \n**{EntryPoint}**: The entry point of the attack into the process, for example: \"/login\". Can be empty. \n**{Status}**: The status of the attack, for example: \"Exploited\" \n**{Timestamp}**: When the attack happened. \n**{VulnerabilityName}**: Name of the associated code-level vulnerability, for example: \"InMemoryDatabaseCaller.getAccountInfo():51\". Can be empty. }
func (*AttackCandidateBasedJiraPayload) MarshalHCL ¶
func (me *AttackCandidateBasedJiraPayload) MarshalHCL(properties hcl.Properties) error
func (*AttackCandidateBasedJiraPayload) Schema ¶
func (me *AttackCandidateBasedJiraPayload) Schema() map[string]*schema.Schema
func (*AttackCandidateBasedJiraPayload) UnmarshalHCL ¶
func (me *AttackCandidateBasedJiraPayload) UnmarshalHCL(decoder hcl.Decoder) error
type AttackCandidateBasedWebhookPayload ¶
type AttackCandidateBasedWebhookPayload struct {
Payload string `json:"payload"` // This is the content your notification message will include when users view it. \nIn case a value of an attack is not set, the placeholder will be replaced by an empty string.. **Note:** Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties. \n \nAvailable placeholders: \n**{AttackDisplayId}**: The unique identifier assigned by Dynatrace, for example: \"A-1234\". \n**{Title}**: Location of the attack, for example: \"com.dynatrace.Class.method():120\" \n**{Type}**: The type of attack, for example: \"SQL Injection\". \n**{AttackUrl}**: URL of the attack in Dynatrace. \n**{ProcessGroupId}**: Details about the process group attacked. \n**{EntryPoint}**: The entry point of the attack into the process, for example: \"/login\". Can be empty. \n**{Status}**: The status of the attack, for example: \"Exploited\" \n**{Timestamp}**: When the attack happened. \n**{VulnerabilityName}**: Name of the associated code-level vulnerability, for example: \"InMemoryDatabaseCaller.getAccountInfo():51\". Can be empty.
}
func (*AttackCandidateBasedWebhookPayload) MarshalHCL ¶
func (me *AttackCandidateBasedWebhookPayload) MarshalHCL(properties hcl.Properties) error
func (*AttackCandidateBasedWebhookPayload) Schema ¶
func (me *AttackCandidateBasedWebhookPayload) Schema() map[string]*schema.Schema
func (*AttackCandidateBasedWebhookPayload) UnmarshalHCL ¶
func (me *AttackCandidateBasedWebhookPayload) UnmarshalHCL(decoder hcl.Decoder) error
type EmailConfiguration ¶
type EmailConfiguration struct { BccRecipients []string `json:"bccRecipients,omitempty"` // BCC CcRecipients []string `json:"ccRecipients,omitempty"` // CC Recipients []string `json:"recipients"` // To }
func (*EmailConfiguration) MarshalHCL ¶
func (me *EmailConfiguration) MarshalHCL(properties hcl.Properties) error
func (*EmailConfiguration) Schema ¶
func (me *EmailConfiguration) Schema() map[string]*schema.Schema
func (*EmailConfiguration) UnmarshalHCL ¶
func (me *EmailConfiguration) UnmarshalHCL(decoder hcl.Decoder) error
type JiraConfiguration ¶
type JiraConfiguration struct { ApiToken string `json:"apiToken"` // The API token for the Jira profile. Using password authentication [was deprecated by Jira](https://developer.atlassian.com/cloud/jira/platform/deprecation-notice-basic-auth-and-cookie-based-auth/) IssueType string `json:"issueType"` // The type of the Jira issue to be created by this notification.\n\nTo find all available issue types or create your own, in Jira, go to Project settings > Issue types. ProjectKey string `json:"projectKey"` // The project key of the Jira issue to be created by this notification. Url string `json:"url"` // The URL of the Jira API endpoint. Username string `json:"username"` // The username of the Jira profile. }
func (*JiraConfiguration) MarshalHCL ¶
func (me *JiraConfiguration) MarshalHCL(properties hcl.Properties) error
func (*JiraConfiguration) UnmarshalHCL ¶
func (me *JiraConfiguration) UnmarshalHCL(decoder hcl.Decoder) error
type NotificationTrigger ¶
type NotificationTrigger string
type NotificationType ¶
type NotificationType string
type SecurityProblemBasedEmailPayload ¶
type SecurityProblemBasedEmailPayload struct { Body string `json:"body"` // The template of the email notifications. \nIn case a value of a security problem is not set, the placeholder will be replaced by an empty string.. **Note:** Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties. \n \nAvailable placeholders: \n**{SecurityProblemId}**: The unique identifier assigned by Dynatrace, for example, \"S-1234\". \n**{Title}**: A short summary of the type of vulnerability that was found, for example, \"Remote Code Execution\". \n**{Description}**: A more detailed description of the vulnerability. \n**{CvssScore}**: CVSS score of the identified vulnerability, for example, \"10.0\". Can be empty. \n**{DavisSecurityScore}**: [Davis Security Score](https://www.dynatrace.com/support/help/how-to-use-dynatrace/application-security/davis-security-score/) is an enhanced risk-calculation score based on the CVSS, for example, \"10.0\". \n**{Severity}**: The security problem severity, for example, \"Critical\" or \"Medium\". \n**{SecurityProblemUrl}**: URL of the security problem in Dynatrace. \n**{AffectedEntities}**: Details about the entities affected by the security problem in a json array. \n**{ManagementZones}**: Comma-separated list of all management zones affected by the vulnerability at the time of detection. \n**{Tags}**: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: \"PROD, owner:John\". Assign the tag's key in square brackets: **{Tags[key]}** to get all associated values. For example: \"{Tags[owner]}\" will be resolved as \"John\". Tags without an assigned value will be resolved as empty string. \n**{Exposed}**: Describes whether one or more affected process is exposed to the public Internet. Can be \"true\" or \"false\". \n**{DataAssetsReachable}**: Describes whether one or more affected process can reach data assets. Can be \"true\" or \"false\". \n**{ExploitAvailable}**: Describes whether there's an exploit available for the vulnerability. Can be \"true\" or \"false\". Subject string `json:"subject"` // The subject of the email notifications.. Available placeholders: \n**{SecurityProblemId}**: The unique identifier assigned by Dynatrace, for example, \"S-1234\". \n**{Title}**: A short summary of the type of vulnerability that was found, for example, \"Remote Code Execution\". \n**{CvssScore}**: CVSS score of the identified vulnerability, for example, \"10.0\". Can be empty. \n**{DavisSecurityScore}**: [Davis Security Score](https://www.dynatrace.com/support/help/how-to-use-dynatrace/application-security/davis-security-score/) is an enhanced risk-calculation score based on the CVSS, for example, \"10.0\". \n**{Severity}**: The security problem severity, for example, \"Critical\" or \"Medium\". \n**{SecurityProblemUrl}**: URL of the security problem in Dynatrace. \n**{Exposed}**: Describes whether one or more affected process is exposed to the public Internet. Can be \"true\" or \"false\". \n**{DataAssetsReachable}**: Describes whether one or more affected process can reach data assets. Can be \"true\" or \"false\". \n**{ExploitAvailable}**: Describes whether there's an exploit available for the vulnerability. Can be \"true\" or \"false\". }
func (*SecurityProblemBasedEmailPayload) MarshalHCL ¶
func (me *SecurityProblemBasedEmailPayload) MarshalHCL(properties hcl.Properties) error
func (*SecurityProblemBasedEmailPayload) Schema ¶
func (me *SecurityProblemBasedEmailPayload) Schema() map[string]*schema.Schema
func (*SecurityProblemBasedEmailPayload) UnmarshalHCL ¶
func (me *SecurityProblemBasedEmailPayload) UnmarshalHCL(decoder hcl.Decoder) error
type SecurityProblemBasedJiraPayload ¶
type SecurityProblemBasedJiraPayload struct { Description string `json:"description"` // The description of the Jira issue to be created by this notification. \nIn case a value of a security problem is not set, the placeholder will be replaced by an empty string.. **Note:** Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties. \n \nAvailable placeholders: \n**{SecurityProblemId}**: The unique identifier assigned by Dynatrace, for example, \"S-1234\". \n**{Title}**: A short summary of the type of vulnerability that was found, for example, \"Remote Code Execution\". \n**{Description}**: A more detailed description of the vulnerability. \n**{CvssScore}**: CVSS score of the identified vulnerability, for example, \"10.0\". Can be empty. \n**{DavisSecurityScore}**: [Davis Security Score](https://www.dynatrace.com/support/help/how-to-use-dynatrace/application-security/davis-security-score/) is an enhanced risk-calculation score based on the CVSS, for example, \"10.0\". \n**{Severity}**: The security problem severity, for example, \"Critical\" or \"Medium\". \n**{SecurityProblemUrl}**: URL of the security problem in Dynatrace. \n**{AffectedEntities}**: Details about the entities affected by the security problem in a json array. \n**{ManagementZones}**: Comma-separated list of all management zones affected by the vulnerability at the time of detection. \n**{Tags}**: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: \"PROD, owner:John\". Assign the tag's key in square brackets: **{Tags[key]}** to get all associated values. For example: \"{Tags[owner]}\" will be resolved as \"John\". Tags without an assigned value will be resolved as empty string. \n**{Exposed}**: Describes whether one or more affected process is exposed to the public Internet. Can be \"true\" or \"false\". \n**{DataAssetsReachable}**: Describes whether one or more affected process can reach data assets. Can be \"true\" or \"false\". \n**{ExploitAvailable}**: Describes whether there's an exploit available for the vulnerability. Can be \"true\" or \"false\". Summary string `json:"summary"` // The summary of the Jira issue to be created by this notification.. **Note:** The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded. \n \nAvailable placeholders: \n**{SecurityProblemId}**: The unique identifier assigned by Dynatrace, for example, \"S-1234\". \n**{Title}**: A short summary of the type of vulnerability that was found, for example, \"Remote Code Execution\". \n**{CvssScore}**: CVSS score of the identified vulnerability, for example, \"10.0\". Can be empty. \n**{DavisSecurityScore}**: [Davis Security Score](https://www.dynatrace.com/support/help/how-to-use-dynatrace/application-security/davis-security-score/) is an enhanced risk-calculation score based on the CVSS, for example, \"10.0\". \n**{Severity}**: The security problem severity, for example, \"Critical\" or \"Medium\". \n**{SecurityProblemUrl}**: URL of the security problem in Dynatrace. \n**{Exposed}**: Describes whether one or more affected process is exposed to the public Internet. Can be \"true\" or \"false\". \n**{DataAssetsReachable}**: Describes whether one or more affected process can reach data assets. Can be \"true\" or \"false\". \n**{ExploitAvailable}**: Describes whether there's an exploit available for the vulnerability. Can be \"true\" or \"false\". }
func (*SecurityProblemBasedJiraPayload) MarshalHCL ¶
func (me *SecurityProblemBasedJiraPayload) MarshalHCL(properties hcl.Properties) error
func (*SecurityProblemBasedJiraPayload) Schema ¶
func (me *SecurityProblemBasedJiraPayload) Schema() map[string]*schema.Schema
func (*SecurityProblemBasedJiraPayload) UnmarshalHCL ¶
func (me *SecurityProblemBasedJiraPayload) UnmarshalHCL(decoder hcl.Decoder) error
type SecurityProblemBasedWebhookPayload ¶
type SecurityProblemBasedWebhookPayload struct {
Payload string `json:"payload"` // This is the content your notification message will include when users view it. \nIn case a value of a security problem is not set, the placeholder will be replaced by an empty string.. **Note:** Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties. \n \nAvailable placeholders: \n**{SecurityProblemId}**: The unique identifier assigned by Dynatrace, for example, \"S-1234\". \n**{Title}**: A short summary of the type of vulnerability that was found, for example, \"Remote Code Execution\". \n**{Description}**: A more detailed description of the vulnerability. \n**{CvssScore}**: CVSS score of the identified vulnerability, for example, \"10.0\". Can be empty. \n**{DavisSecurityScore}**: [Davis Security Score](https://www.dynatrace.com/support/help/how-to-use-dynatrace/application-security/davis-security-score/) is an enhanced risk-calculation score based on the CVSS, for example, \"10.0\". \n**{Severity}**: The security problem severity, for example, \"Critical\" or \"Medium\". \n**{SecurityProblemUrl}**: URL of the security problem in Dynatrace. \n**{AffectedEntities}**: Details about the entities affected by the security problem in a json array. \n**{ManagementZones}**: Comma-separated list of all management zones affected by the vulnerability at the time of detection. \n**{Tags}**: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: \"PROD, owner:John\". Assign the tag's key in square brackets: **{Tags[key]}** to get all associated values. For example: \"{Tags[owner]}\" will be resolved as \"John\". Tags without an assigned value will be resolved as empty string. \n**{Exposed}**: Describes whether one or more affected process is exposed to the public Internet. Can be \"true\" or \"false\". \n**{DataAssetsReachable}**: Describes whether one or more affected process can reach data assets. Can be \"true\" or \"false\". \n**{ExploitAvailable}**: Describes whether there's an exploit available for the vulnerability. Can be \"true\" or \"false\".
}
func (*SecurityProblemBasedWebhookPayload) MarshalHCL ¶
func (me *SecurityProblemBasedWebhookPayload) MarshalHCL(properties hcl.Properties) error
func (*SecurityProblemBasedWebhookPayload) Schema ¶
func (me *SecurityProblemBasedWebhookPayload) Schema() map[string]*schema.Schema
func (*SecurityProblemBasedWebhookPayload) UnmarshalHCL ¶
func (me *SecurityProblemBasedWebhookPayload) UnmarshalHCL(decoder hcl.Decoder) error
type Settings ¶
type Settings struct { AttackCandidateBasedAlertingProfile *string `json:"attackCandidateBasedAlertingProfile,omitempty"` // For attack candidate alerts, select an [alerting profile](/ui/settings/builtin:appsec.notification-attack-alerting-profile) to control the delivery of security notifications related to this integration. AttackCandidateBasedEmailPayload *AttackCandidateBasedEmailPayload `json:"attackCandidateBasedEmailPayload,omitempty"` // Attack candidate based email payload, required when `trigger` equals `ATTACK_CANDIDATE` and `type` equals `EMAIL` AttackCandidateBasedJiraPayload *AttackCandidateBasedJiraPayload `json:"attackCandidateBasedJiraPayload,omitempty"` // Attack candidate based Jira payload, required when `trigger` equals `ATTACK_CANDIDATE` and `type` equals `JIRA` AttackCandidateBasedWebhookPayload *AttackCandidateBasedWebhookPayload `json:"attackCandidateBasedWebhookPayload,omitempty"` // Attack candidate based webhook payload, required when `trigger` equals `ATTACK_CANDIDATE` and `type` equals `WEBHOOK` DisplayName string `json:"displayName"` // Display name of the security notification EmailConfiguration *EmailConfiguration `json:"emailConfiguration,omitempty"` // Email configuration, required when `type` equals `EMAIL` Enabled bool `json:"enabled"` // Enable/Disable the security notification, enabled (`true`) or disabled (`false`) JiraConfiguration *JiraConfiguration `json:"jiraConfiguration,omitempty"` // Jira configuration, required when `type` equals `JIRA` SecurityProblemBasedAlertingProfile *string `json:"securityProblemBasedAlertingProfile,omitempty"` // For security problem alerts, select an [alerting profile](/ui/settings/builtin:appsec.notification-alerting-profile) to control the delivery of security notifications related to this integration. SecurityProblemBasedEmailPayload *SecurityProblemBasedEmailPayload `json:"securityProblemBasedEmailPayload,omitempty"` // Security problem based email payload, required when `trigger` equals `SECURITY_PROBLEM` and `type` equals `EMAIL` SecurityProblemBasedJiraPayload *SecurityProblemBasedJiraPayload `json:"securityProblemBasedJiraPayload,omitempty"` // Security problem based Jira payload, required when `trigger` equals `SECURITY_PROBLEM` and `type` equals `JIRA` SecurityProblemBasedWebhookPayload *SecurityProblemBasedWebhookPayload `json:"securityProblemBasedWebhookPayload,omitempty"` // Security problem based webhook payload, required when `trigger` equals `SECURITY_PROBLEM` and `type` equals `WEBHOOK` Trigger NotificationTrigger `json:"trigger"` // Security alert type, possible Values: `ATTACK_CANDIDATE`, `SECURITY_PROBLEM` Type NotificationType `json:"type"` // Notification type, possible Values: `EMAIL`, `JIRA`, `WEBHOOK` WebhookConfiguration *WebhookConfiguration `json:"webhookConfiguration,omitempty"` // Webhook configuration, required when `type` equals `WEBHOOK` }
func (*Settings) HandlePreconditions ¶
func (*Settings) MarshalHCL ¶
func (me *Settings) MarshalHCL(properties hcl.Properties) error
type WebhookConfiguration ¶
type WebhookConfiguration struct { AcceptAnyCertificate bool `json:"acceptAnyCertificate"` // Accept any SSL certificate (including self-signed and invalid certificates) Headers WebhookConfigurationHeaders `json:"headers,omitempty"` // Use additional HTTP headers to attach any additional information, for example, configuration, authorization, or metadata. \n \nNote that JSON-based webhook endpoints require the addition of the **Content-Type: application/json** header to enable escaping of special characters and to avoid malformed JSON content. Url string `json:"url"` // Webhook endpoint URL }
func (*WebhookConfiguration) MarshalHCL ¶
func (me *WebhookConfiguration) MarshalHCL(properties hcl.Properties) error
func (*WebhookConfiguration) Schema ¶
func (me *WebhookConfiguration) Schema() map[string]*schema.Schema
func (*WebhookConfiguration) UnmarshalHCL ¶
func (me *WebhookConfiguration) UnmarshalHCL(decoder hcl.Decoder) error
type WebhookConfigurationHeader ¶
type WebhookConfigurationHeader struct { Name string `json:"name"` Secret bool `json:"secret"` // Secret HTTP header value SecretValue *string `json:"secretValue,omitempty"` // The secret value of the HTTP header. May contain an empty value. Value *string `json:"value,omitempty"` // The value of the HTTP header. May contain an empty value. }
func (*WebhookConfigurationHeader) HandlePreconditions ¶
func (me *WebhookConfigurationHeader) HandlePreconditions() error
func (*WebhookConfigurationHeader) MarshalHCL ¶
func (me *WebhookConfigurationHeader) MarshalHCL(properties hcl.Properties) error
func (*WebhookConfigurationHeader) Schema ¶
func (me *WebhookConfigurationHeader) Schema() map[string]*schema.Schema
func (*WebhookConfigurationHeader) UnmarshalHCL ¶
func (me *WebhookConfigurationHeader) UnmarshalHCL(decoder hcl.Decoder) error
type WebhookConfigurationHeaders ¶
type WebhookConfigurationHeaders []*WebhookConfigurationHeader
func (WebhookConfigurationHeaders) MarshalHCL ¶
func (me WebhookConfigurationHeaders) MarshalHCL(properties hcl.Properties) error
func (*WebhookConfigurationHeaders) Schema ¶
func (me *WebhookConfigurationHeaders) Schema() map[string]*schema.Schema
func (*WebhookConfigurationHeaders) UnmarshalHCL ¶
func (me *WebhookConfigurationHeaders) UnmarshalHCL(decoder hcl.Decoder) error
Source Files ¶
- attack_candidate_based_email_payload.go
- attack_candidate_based_jira_payload.go
- attack_candidate_based_webhook_payload.go
- email_configuration.go
- enums.go
- jira_configuration.go
- security_problem_based_email_payload.go
- security_problem_based_jira_payload.go
- security_problem_based_webhook_payload.go
- settings.go
- webhook_configuration.go
- webhook_configuration_header.go
Click to show internal directories.
Click to hide internal directories.