From 01db5704277a3bdd88d761e2a3ad249a004c0c80 Mon Sep 17 00:00:00 2001 From: samuelFain <65926551+samuelFain@users.noreply.github.com> Date: Tue, 9 Jul 2024 09:58:43 +0300 Subject: [PATCH] [Auto Update Docker] AUD-demisto/auto_update_docker_staging_branch_9 (#35310) * Updated docker image to demisto/python3:3.10.14.100715. PR batch #1/19 (#35234) * Updated docker image to demisto/python3:3.10.14.100715. PR batch #9/19 (#35242) * Updated docker image to demisto/python3:3.10.14.100715. PR batch #8/19 (#35241) * Updated docker image to demisto/python3:3.10.14.100715. PR batch #7/19 (#35240) * Updated docker image to demisto/python3:3.10.14.100715. PR batch #4/19 (#35237) * Updated docker image to demisto/python3:3.10.14.100715. PR batch #11/19 (#35244) * Updated docker image to demisto/python3:3.10.14.100715. PR batch #19/19 (#35252) * Updated docker image to demisto/python3:3.10.14.100715. PR batch #3/19 (#35236) * Updated docker image to demisto/python3:3.10.14.100715. PR batch #10/19 (#35243) * Updated docker image to demisto/python3:3.10.14.100715. PR batch #12/19 (#35245) Co-authored-by: Tal Zichlinsky <35036457+talzich@users.noreply.github.com> * Updated docker image to demisto/python3:3.10.14.100715. PR batch #13/19 (#35246) Co-authored-by: Tal Zichlinsky <35036457+talzich@users.noreply.github.com> * Updated docker image to demisto/python3:3.10.14.100715. PR batch #14/19 (#35247) Co-authored-by: Tal Zichlinsky <35036457+talzich@users.noreply.github.com> * Updated docker image to demisto/python3:3.10.14.100715. PR batch #17/19 (#35250) Co-authored-by: Tal Zichlinsky <35036457+talzich@users.noreply.github.com> * demisto/python3:3.10.14.100715 | 0-100 | PR batch #15/19 (#35248) * Updated docker image to demisto/python3:3.10.14.100715. PR batch #15/19 * Fix text encoding * Update Pulsedive.yml --------- Co-authored-by: Tal Zichlinsky <35036457+talzich@users.noreply.github.com> * demisto/python3:3.10.14.100715 | 0-100 | PR batch #16/19 (#35249) * Updated docker image to demisto/python3:3.10.14.100715. PR batch #16/19 * Update ThousandEyes.yml --------- Co-authored-by: Tal Zichlinsky <35036457+talzich@users.noreply.github.com> * demisto/python3:3.10.14.100715 | 0-100 | PR batch #2/19 (#35235) * Updated docker image to demisto/python3:3.10.14.100715. PR batch #2/19 * pre-commit fixes * fix --------- Co-authored-by: iapt@paloaltonetworks.com * demisto/python3:3.10.14.100715 | 0-100 | PR batch #6/19 (#35239) * Updated docker image to demisto/python3:3.10.14.100715. PR batch #6/19 * Empty commit * fixes * fix * space * fix --------- Co-authored-by: iapt@paloaltonetworks.com * demisto/python3:3.10.14.100715 | 0-100 | PR batch #5/19 (#35238) * Updated docker image to demisto/python3:3.10.14.100715. PR batch #5/19 * fixes * Empty commit * Empty commit * Empty commit * Empty commit --------- Co-authored-by: iapt@paloaltonetworks.com Co-authored-by: inbalapt1 <164751454+inbalapt1@users.noreply.github.com> * Updated docker image to demisto/python3:3.10.14.100715. PR batch #18/19 (#35251) Co-authored-by: Tal Zichlinsky <35036457+talzich@users.noreply.github.com> * Update RN * Empty commit to re-trigger build pipeline --------- Co-authored-by: Tal Zichlinsky <35036457+talzich@users.noreply.github.com> Co-authored-by: iapt@paloaltonetworks.com Co-authored-by: inbalapt1 <164751454+inbalapt1@users.noreply.github.com> --- .../AellaStarLight/AellaStarLight.yml | 14 +- Packs/Aella_StarLight/ReleaseNotes/1_0_14.md | 6 + Packs/Aella_StarLight/pack_metadata.json | 2 +- .../AlphaVantage/AlphaVantage.yml | 50 +- Packs/AlphaVantage/ReleaseNotes/1_0_13.md | 6 + Packs/AlphaVantage/pack_metadata.json | 2 +- .../Arduino/Integrations/Arduino/Arduino.yml | 4 +- Packs/Arduino/ReleaseNotes/1_0_12.md | 6 + Packs/Arduino/pack_metadata.json | 2 +- .../BarracudaReputationBlockListBRBL.yml | 2 +- Packs/Barracuda/ReleaseNotes/1_0_11.md | 6 + Packs/Barracuda/pack_metadata.json | 2 +- Packs/BitDam/Integrations/BitDam/BitDam.yml | 4 +- Packs/BitDam/ReleaseNotes/1_0_14.md | 6 + Packs/BitDam/pack_metadata.json | 2 +- .../BluelivThreatContext.yml | 2 +- .../ReleaseNotes/1_0_10.md | 6 + Packs/BluelivThreatContext/pack_metadata.json | 4 +- .../Bonusly/Integrations/Bonusly/Bonusly.yml | 20 +- Packs/Bonusly/ReleaseNotes/1_0_15.md | 12 + .../IncOwnerToBonuslyUser.yml | 2 +- Packs/Bonusly/pack_metadata.json | 2 +- .../ReleaseNotes/1_4_8.md | 27 + .../AddUserToIncidentTeam.yml | 4 +- .../CaseMgmtAnalystTools.yml | 8 +- .../CaseMgmtDisplayLabels.yml | 2 +- .../CaseMgmtIncidentTypesByRole.py | 2 +- .../CaseMgmtIncidentTypesByRole.yml | 2 +- .../CaseMgmtIncidentTypesDisplay.yml | 2 +- .../CaseMgmtResponseProcess.yml | 2 +- .../CompleteTaskOnTimerBreach.yml | 4 +- .../TimersOnOwnerChange.yml | 2 +- .../CaseManagement-Generic/pack_metadata.json | 2 +- .../CentrifyVault/CentrifyVault.py | 20 +- .../CentrifyVault/CentrifyVault.yml | 10 +- Packs/CentrifyVault/ReleaseNotes/1_0_8.md | 6 + Packs/CentrifyVault/pack_metadata.json | 2 +- .../ReleaseNotes/1_2_4.md | 81 +++ .../Scripts/BatchData/BatchData.py | 2 +- .../Scripts/BatchData/BatchData.yml | 4 +- .../Scripts/CompareList/CompareList.yml | 8 +- .../ConvertUTCEpochTimeToTimeStamp.yml | 4 +- .../CreateArrayWithDuplicates.yml | 11 +- .../CreateFileFromPathObject.yml | 2 +- .../DateTimeToADTime/DateTimeToADTime.yml | 4 +- .../DeleteExpiredIndicatorWithExlusion.yml | 4 +- .../DisplayIndicatorReputationContent.yml | 4 +- .../DisplayTaggedWarroomEntries.yml | 4 +- .../Scripts/GetFields/GetFields.yml | 12 +- .../GetFilePathPreProcessing.yml | 9 +- .../IPCalcCheckSubnetCollision.yml | 2 +- .../IPCalcReturnAddressBinary.yml | 2 +- .../IPCalcReturnAddressIANAAllocation.yml | 2 +- .../IPCalcReturnSubnetAddresses.yml | 2 +- .../IPCalcReturnSubnetBroadcastAddress.yml | 2 +- .../IPCalcReturnSubnetNetwork.yml | 2 +- .../InvertEveryTwoItems.yml | 6 +- .../Scripts/MapRegex/MapRegex.yml | 17 +- .../Scripts/MaxList/MaxList.yml | 2 +- .../Scripts/MinList/MinList.yml | 2 +- .../RandomElementFromList.yml | 2 +- .../RandomPhotoNasa/RandomPhotoNasa.yml | 2 +- .../Scripts/SSLVerifier/SSLVerifier.yml | 4 +- .../StripAccentMarksFromString.yml | 4 +- .../isArrayItemInList/IsArrayItemInList.yml | 11 +- .../CommunityCommonScripts/pack_metadata.json | 4 +- .../Integrations/CyberChef/CyberChef.yml | 2 +- Packs/CyberChef/ReleaseNotes/1_0_5.md | 6 + Packs/CyberChef/pack_metadata.json | 2 +- .../DNSOverHttps/DNSOverHttps.yml | 8 +- Packs/DNSOverHttps/ReleaseNotes/1_0_5.md | 6 + Packs/DNSOverHttps/pack_metadata.json | 2 +- Packs/DeepL/Integrations/DeepL/DeepL.yml | 2 +- Packs/DeepL/ReleaseNotes/1_2_4.md | 6 + Packs/DeepL/pack_metadata.json | 2 +- .../Integrations/DockerEngine/DockerEngine.py | 2 +- .../DockerEngine/DockerEngine.yml | 6 +- Packs/DevSecOps/Integrations/LGTM/LGTM.yml | 20 +- Packs/DevSecOps/ReleaseNotes/1_1_9.md | 9 + Packs/DevSecOps/pack_metadata.json | 4 +- Packs/DeveloperTools/ReleaseNotes/1_3_18.md | 18 + .../FetchFromInstance/FetchFromInstance.py | 8 +- .../FetchFromInstance/FetchFromInstance.yml | 12 +- .../GetInstanceName/GetInstanceName.py | 6 +- .../GetInstanceName/GetInstanceName.yml | 2 +- .../VerifyEnoughIncidents.yml | 2 +- .../VerifyEnoughIndicators.yml | 2 +- .../VerifyObjectFieldsList.py | 6 +- .../VerifyObjectFieldsList.yml | 2 +- Packs/DeveloperTools/pack_metadata.json | 2 +- Packs/Drift/Integrations/Drift/Drift.py | 2 +- Packs/Drift/Integrations/Drift/Drift.yml | 2 +- Packs/Drift/ReleaseNotes/1_0_4.md | 6 + Packs/Drift/pack_metadata.json | 2 +- .../Integrations/EDLMonitor/EDLMonitor.py | 1 + .../Integrations/EDLMonitor/EDLMonitor.yml | 4 +- Packs/EDLMonitor/ReleaseNotes/1_0_2.md | 6 + Packs/EDLMonitor/pack_metadata.json | 6 +- Packs/F5LTM/Integrations/F5LTM/F5LTM.py | 2 +- Packs/F5LTM/Integrations/F5LTM/F5LTM.yml | 2 +- Packs/F5LTM/ReleaseNotes/1_0_9.md | 6 + Packs/F5LTM/pack_metadata.json | 2 +- .../ReleaseNotes/1_5_25.md | 18 + .../CyrenCountryLookup/CyrenCountryLookup.py | 502 +++++++++--------- .../CyrenCountryLookup/CyrenCountryLookup.yml | 2 +- .../CyrenCountryLookup_test.py | 12 +- .../CyrenThreatInDepthRandomHunt.py | 14 +- .../CyrenThreatInDepthRandomHunt.yml | 11 +- .../CyrenThreatInDepthRandomHunt_test.py | 47 +- .../CyrenThreatInDepthRelatedWidget.py | 2 +- .../CyrenThreatInDepthRelatedWidget.yml | 2 +- .../CyrenThreatInDepthRelatedWidget_test.py | 9 +- .../CyrenThreatInDepthRelatedWidgetQuick.py | 4 +- .../CyrenThreatInDepthRelatedWidgetQuick.yml | 2 +- ...renThreatInDepthRelatedWidgetQuick_test.py | 11 +- .../CyrenThreatInDepthRenderRelated.yml | 2 +- .../FeedCyrenThreatInDepth/pack_metadata.json | 2 +- .../Integrations/FeedTalos/FeedTalos.yml | 16 +- Packs/FeedTalos/ReleaseNotes/1_0_7.md | 6 + Packs/FeedTalos/pack_metadata.json | 2 +- .../FortiAuthenticator/FortiAuthenticator.yml | 4 +- .../FortiAuthenticator/ReleaseNotes/1_0_7.md | 6 + Packs/FortiAuthenticator/pack_metadata.json | 2 +- .../Integrations/FullHunt/FullHunt.yml | 6 +- Packs/FullHunt/ReleaseNotes/1_0_4.md | 6 + Packs/FullHunt/pack_metadata.json | 2 +- .../GigamonThreatINSIGHT.yml | 15 +- .../ReleaseNotes/1_0_4.md | 6 + Packs/GigamonThreatINSIGHT/pack_metadata.json | 2 +- .../GoogleDorking/GoogleDorking.yml | 6 +- Packs/GoogleDorking/ReleaseNotes/1_0_4.md | 12 + .../ExtractUsernames/ExtractUsernames.yml | 2 +- Packs/GoogleDorking/pack_metadata.json | 2 +- .../Graylog/Integrations/Graylog/Graylog.yml | 18 +- Packs/Graylog/ReleaseNotes/1_0_7.md | 6 + Packs/Graylog/pack_metadata.json | 2 +- Packs/HealthCheck/ReleaseNotes/2_1_1.md | 54 ++ .../HealthCheckDockerLog.yml | 2 +- .../HealthCheckExportSummary.yml | 2 +- .../HealthCheckFileSystem.yml | 2 +- ...kGetLargestInputsAndOutputsInIncidents.yml | 2 +- .../HealthCheckLicenseData.yml | 2 +- .../HealthCheckNumberOfEngines.yml | 2 +- .../HealthCheckNumberOfLargeIOIncidents.yml | 2 +- .../HealthCheckNumberOfLargeIncidents.yml | 2 +- .../HealthCheckNumberOfPartitions.yml | 2 +- .../HealthCheckOutdatedPacks.yml | 2 +- .../HealthCheckPacksInstalled.yml | 2 +- .../HealthCheckPanicLog.yml | 2 +- .../HealthCheckReadConf.yml | 2 +- .../HealthCheckReadTemeletryLog.yml | 2 +- .../HealthCheckReadVC/HealthCheckReadVC.yml | 2 +- .../HealthCheckServerLog.yml | 2 +- .../HealthCheckUnpack/HealthCheckUnpack.yml | 6 +- Packs/HealthCheck/pack_metadata.json | 2 +- .../FeedHelloWorld/FeedHelloWorld.yml | 4 +- Packs/HelloWorld/ReleaseNotes/3_0_12.md | 6 + Packs/HelloWorld/pack_metadata.json | 2 +- Packs/IP-API/Integrations/IPAPI/IPAPI.yml | 17 +- Packs/IP-API/ReleaseNotes/1_0_4.md | 6 + Packs/IP-API/pack_metadata.json | 2 +- Packs/Ja3er/Integrations/Ja3er/Ja3er.yml | 8 +- Packs/Ja3er/ReleaseNotes/1_0_4.md | 6 + Packs/Ja3er/pack_metadata.json | 4 +- .../Integrations/LINENotify/LINENotify.yml | 2 +- Packs/LINENotify/ReleaseNotes/1_0_4.md | 6 + Packs/LINENotify/pack_metadata.json | 2 +- Packs/MS-ISAC/Integrations/MSISAC/MSISAC.yml | 4 +- Packs/MS-ISAC/ReleaseNotes/1_0_2.md | 6 + Packs/MS-ISAC/pack_metadata.json | 5 +- .../MicroFocusSMAX/MicroFocusSMAX.yml | 2 +- Packs/MicroFocusSMAX/ReleaseNotes/1_0_3.md | 6 + Packs/MicroFocusSMAX/pack_metadata.json | 2 +- .../MinervaLabsAntiEvasionPlatform.yml | 12 +- .../ReleaseNotes/1_0_10.md | 6 + .../pack_metadata.json | 2 +- .../MitreCaldera/MitreCaldera.yml | 2 +- Packs/MitreCaldera/ReleaseNotes/1_0_5.md | 39 ++ .../CalderaGetOperationReport.yml | 2 +- .../CalderaOperationPostProcessing.yml | 2 +- .../CalderaPopulateAdversaryIDField.yml | 2 +- .../CalderaPopulateAgents.yml | 2 +- .../CalderaPopulateEventLogs.yml | 2 +- .../CalderaPopulateObjectiveIDField.yml | 2 +- .../CalderaPopulatePlannerIDField.yml | 2 +- .../CalderaPopulateSourceIDField.yml | 2 +- .../CalderaReadOnlyFields.yml | 2 +- .../CalderaStartOperation.yml | 2 +- Packs/MitreCaldera/pack_metadata.json | 2 +- .../ReleaseNotes/1_1_5.md | 42 ++ .../EntryWidgetNCSCResultsA.yml | 4 +- .../EntryWidgetNCSCResultsB.yml | 4 +- .../EntryWidgetNCSCResultsC.yml | 4 +- .../EntryWidgetNCSCResultsD.yml | 4 +- .../NCSCCalculateQuestionsScore.yml | 4 +- .../NCSCFieldProtection.yml | 4 +- .../NCSCQuestionPopulate.yml | 2 +- .../NCSCReportDetails/NCSCReportDetails.yml | 10 +- .../NCSCReportDetailsA/NCSCReportDetailsA.yml | 10 +- .../NCSCReportDetailsB/NCSCReportDetailsB.yml | 10 +- .../NCSCReportDetailsC/NCSCReportDetailsC.yml | 10 +- .../NCSCReportDetailsD/NCSCReportDetailsD.yml | 10 +- .../NCSCReportOverview/NCSCReportOverview.yml | 10 +- .../pack_metadata.json | 2 +- .../NTT_Cyber_Threat_Sensor.yml | 6 +- .../ReleaseNotes/1_0_7.md | 6 + .../pack_metadata.json | 2 +- .../Integrations/Nexthink/Nexthink.yml | 2 +- Packs/Nexthink/ReleaseNotes/1_0_4.md | 6 + Packs/Nexthink/pack_metadata.json | 2 +- .../Integrations/OSV/OSV.yml | 2 +- .../ReleaseNotes/1_0_2.md | 6 + .../pack_metadata.json | 2 +- .../OracleCloudInfrastructureFeed.yml | 22 +- .../ReleaseNotes/1_0_1.md | 6 + .../pack_metadata.json | 4 +- .../ReleaseNotes/1_1_28.md | 12 + .../EntryWidgetPortBasedRules.yml | 2 +- .../EntryWidgetUnusedApplications.yml | 2 +- .../EntryWidgetUnusedRules.yml | 2 +- Packs/PANOSPolicyOptimizer/pack_metadata.json | 2 +- .../ReleaseNotes/1_0_15.md | 6 + .../PANOStoCortexDataLakeMonitoring.yml | 6 +- Packs/PANOStoCDLMonitoring/pack_metadata.json | 2 +- Packs/PassiveTotal/ReleaseNotes/2_1_16.md | 51 ++ .../RiskIQPassiveTotalComponentsScript.yml | 2 +- ...skIQPassiveTotalComponentsWidgetScript.yml | 2 +- ...skIQPassiveTotalHostPairChildrenScript.yml | 2 +- ...iskIQPassiveTotalHostPairParentsScript.yml | 2 +- ...siveTotalHostPairsChildrenWidgetScript.yml | 2 +- ...ssiveTotalHostPairsParentsWidgetScript.yml | 2 +- .../RiskIQPassiveTotalPDNSScript.yml | 2 +- .../RiskIQPassiveTotalPDNSWidgetScript.yml | 2 +- ...siveTotalSSLForIssuerEmailWidgetScript.yml | 2 +- ...iveTotalSSLForSubjectEmailWidgetScript.yml | 2 +- .../RiskIQPassiveTotalSSLScript.yml | 2 +- .../RiskIQPassiveTotalSSLWidgetScript.yml | 2 +- .../RiskIQPassiveTotalTrackersScript.yml | 2 +- ...RiskIQPassiveTotalTrackersWidgetScript.yml | 2 +- .../RiskIQPassiveTotalWhoisScript.yml | 2 +- .../RiskIQPassiveTotalWhoisWidgetScript.yml | 2 +- Packs/PassiveTotal/pack_metadata.json | 2 +- .../PostmarkSpamcheck/PostmarkSpamcheck.yml | 14 +- Packs/PostmarkSpamcheck/ReleaseNotes/1_0_3.md | 6 + Packs/PostmarkSpamcheck/pack_metadata.json | 4 +- .../Integrations/Pulsedive/Pulsedive.yml | 2 +- Packs/Pulsedive/ReleaseNotes/1_6_6.md | 6 + Packs/Pulsedive/pack_metadata.json | 2 +- .../QRCodeReaderGoqrMe/QRCodeReaderGoqrMe.yml | 4 +- Packs/QRCodeReader/ReleaseNotes/1_0_6.md | 6 + Packs/QRCodeReader/pack_metadata.json | 2 +- .../Rapid7InsightVMCloud.yml | 20 +- .../ReleaseNotes/1_0_2.md | 6 + Packs/Rapid7InsightVMCloud/pack_metadata.json | 2 +- Packs/SSLCertificates/ReleaseNotes/1_0_2.md | 6 + .../SSLVerifierV2ParseOutput.yml | 8 +- Packs/SSLCertificates/pack_metadata.json | 8 +- .../SalesforceIndicators.yml | 4 +- .../ReleaseNotes/1_0_10.md | 6 + Packs/SalesforceIndicators/pack_metadata.json | 2 +- .../SalesforceV2/SalesforceV2.yml | 4 +- Packs/SalesforceV2/ReleaseNotes/1_0_5.md | 15 + .../SalesforceCaseStatus.yml | 9 +- .../SalesforceCaseStatusPicklist.yml | 6 +- Packs/SalesforceV2/pack_metadata.json | 2 +- .../SecurityTrails/SecurityTrails.yml | 44 +- Packs/SecurityTrails/ReleaseNotes/1_1_7.md | 6 + Packs/SecurityTrails/pack_metadata.json | 2 +- .../ReleaseNotes/1_1_5.md | 6 + .../AssignToNextShift/AssignToNextShift.yml | 12 +- .../pack_metadata.json | 2 +- Packs/SimpleDebugger/ReleaseNotes/1_0_2.md | 6 + .../Scripts/SimpleDebugger/SimpleDebugger.yml | 4 +- Packs/SimpleDebugger/pack_metadata.json | 4 +- .../FeedSnortIPBlocklist.yml | 14 +- Packs/SnortIPBlocklist/ReleaseNotes/1_0_2.md | 6 + Packs/SnortIPBlocklist/pack_metadata.json | 12 +- .../Integrations/SpyCloud/SpyCloud.yml | 2 +- Packs/SpyCloud/ReleaseNotes/1_0_4.md | 6 + Packs/SpyCloud/pack_metadata.json | 2 +- .../BaseIntegration/BaseIntegration.yml | 4 +- Packs/StarterPack/ReleaseNotes/1_0_13.md | 12 + .../Scripts/BaseScript/BaseScript.yml | 2 +- Packs/StarterPack/pack_metadata.json | 6 +- Packs/TeamManagement/ReleaseNotes/1_0_3.md | 6 + .../Scripts/EnumerateRoles/EnumerateRoles.yml | 2 +- Packs/TeamManagement/pack_metadata.json | 6 +- .../ThousandEyes/ThousandEyes.yml | 14 +- Packs/ThousandEyes/ReleaseNotes/1_0_2.md | 6 + Packs/ThousandEyes/pack_metadata.json | 8 +- Packs/Trello/Integrations/Trello/Trello.yml | 2 +- Packs/Trello/ReleaseNotes/1_0_10.md | 6 + Packs/Trello/pack_metadata.json | 2 +- .../TwitterIOCHunterFullDailyFeed.yml | 2 +- .../ReleaseNotes/1_0_6.md | 6 + .../pack_metadata.json | 8 +- Packs/USTA/Integrations/USTA/USTA.yml | 4 +- Packs/USTA/ReleaseNotes/1_0_5.md | 6 + Packs/USTA/pack_metadata.json | 2 +- .../Integrations/UltraMSG/UltraMSG.yml | 6 +- Packs/UltraMSG/ReleaseNotes/1_0_2.md | 6 + Packs/UltraMSG/pack_metadata.json | 8 +- .../UnisysStealth/UnisysStealth.yml | 2 +- Packs/UnisysStealth/ReleaseNotes/1_0_4.md | 6 + Packs/UnisysStealth/pack_metadata.json | 2 +- .../ReleaseNotes/1_0_4.md | 12 + .../MarkAsEvidenceBySearch.yml | 14 +- .../MarkAsNoteBySearch/MarkAsNoteBySearch.yml | 20 +- .../SetTagsBySearch/SetTagsBySearch.yml | 16 +- .../UpdateEntriesBySearch/pack_metadata.json | 6 +- Packs/Use_Case_Builder/ReleaseNotes/1_0_7.md | 24 + .../CreateUseCaseStepsList.yml | 4 +- .../CreateXSOARIncidentFlowList.yml | 4 +- .../DeleteAndExcludeIndicators.yml | 2 +- .../GettingStartedWithXSOAR.yml | 4 +- ...bookAutoGeneratorDynamicSectionMessage.yml | 4 +- .../StopUseCaseDevelopmentTimer.yml | 2 +- .../UseCaseDevelopmentTimers.yml | 2 +- Packs/Use_Case_Builder/pack_metadata.json | 2 +- .../VerifyIPv4Indicator/ReleaseNotes/1_0_3.md | 6 + .../VerifyIPv4Indicator.yml | 6 +- Packs/VerifyIPv4Indicator/pack_metadata.json | 6 +- Packs/Viper/Integrations/Viper/Viper.yml | 2 +- Packs/Viper/ReleaseNotes/1_0_4.md | 6 + Packs/Viper/pack_metadata.json | 6 +- .../Integrations/WolkenITSM/WolkenITSM.yml | 46 +- Packs/WolkenITSM/ReleaseNotes/1_0_2.md | 6 + Packs/WolkenITSM/pack_metadata.json | 8 +- .../Integrations/Wordpress/Wordpress.yml | 2 +- Packs/Wordpress/ReleaseNotes/1_0_2.md | 6 + Packs/Wordpress/pack_metadata.json | 2 +- .../ReleaseNotes/1_0_8.md | 12 + .../CollectPacksData/CollectPacksData.yml | 2 +- .../FormatContentData/FormatContentData.yml | 2 +- .../GetLatestReleaseNotes.yml | 2 +- .../pack_metadata.json | 2 +- Packs/XSOAR_EDL_Checker/ReleaseNotes/1_1_1.md | 6 + .../XSOARAllEDLCheckerAutomation.yml | 2 +- Packs/XSOAR_EDL_Checker/pack_metadata.json | 2 +- Packs/XsoarWebserver/ReleaseNotes/1_0_3.md | 12 + .../Scripts/EmailSLABreach/EmailSLABreach.yml | 2 +- .../XsoarWsParseContext.yml | 2 +- .../XsoarWsPollStatus/XsoarWsPollStatus.yml | 12 +- Packs/XsoarWebserver/pack_metadata.json | 2 +- .../Integrations/XsoarUtils/XsoarUtils.yml | 15 +- Packs/Xsoar_Utils/ReleaseNotes/1_0_2.md | 6 + Packs/Xsoar_Utils/pack_metadata.json | 8 +- 347 files changed, 1767 insertions(+), 939 deletions(-) create mode 100644 Packs/Aella_StarLight/ReleaseNotes/1_0_14.md create mode 100644 Packs/AlphaVantage/ReleaseNotes/1_0_13.md create mode 100644 Packs/Arduino/ReleaseNotes/1_0_12.md create mode 100644 Packs/Barracuda/ReleaseNotes/1_0_11.md create mode 100644 Packs/BitDam/ReleaseNotes/1_0_14.md create mode 100644 Packs/BluelivThreatContext/ReleaseNotes/1_0_10.md create mode 100644 Packs/Bonusly/ReleaseNotes/1_0_15.md create mode 100644 Packs/CaseManagement-Generic/ReleaseNotes/1_4_8.md create mode 100644 Packs/CentrifyVault/ReleaseNotes/1_0_8.md create mode 100644 Packs/CommunityCommonScripts/ReleaseNotes/1_2_4.md create mode 100644 Packs/CyberChef/ReleaseNotes/1_0_5.md create mode 100644 Packs/DNSOverHttps/ReleaseNotes/1_0_5.md create mode 100644 Packs/DeepL/ReleaseNotes/1_2_4.md create mode 100644 Packs/DevSecOps/ReleaseNotes/1_1_9.md create mode 100644 Packs/DeveloperTools/ReleaseNotes/1_3_18.md create mode 100644 Packs/Drift/ReleaseNotes/1_0_4.md create mode 100644 Packs/EDLMonitor/ReleaseNotes/1_0_2.md create mode 100644 Packs/F5LTM/ReleaseNotes/1_0_9.md create mode 100644 Packs/FeedCyrenThreatInDepth/ReleaseNotes/1_5_25.md create mode 100644 Packs/FeedTalos/ReleaseNotes/1_0_7.md create mode 100644 Packs/FortiAuthenticator/ReleaseNotes/1_0_7.md create mode 100644 Packs/FullHunt/ReleaseNotes/1_0_4.md create mode 100644 Packs/GigamonThreatINSIGHT/ReleaseNotes/1_0_4.md create mode 100644 Packs/GoogleDorking/ReleaseNotes/1_0_4.md create mode 100644 Packs/Graylog/ReleaseNotes/1_0_7.md create mode 100644 Packs/HealthCheck/ReleaseNotes/2_1_1.md create mode 100644 Packs/HelloWorld/ReleaseNotes/3_0_12.md create mode 100644 Packs/IP-API/ReleaseNotes/1_0_4.md create mode 100644 Packs/Ja3er/ReleaseNotes/1_0_4.md create mode 100644 Packs/LINENotify/ReleaseNotes/1_0_4.md create mode 100644 Packs/MS-ISAC/ReleaseNotes/1_0_2.md create mode 100644 Packs/MicroFocusSMAX/ReleaseNotes/1_0_3.md create mode 100644 Packs/MinervaLabsAntiEvasionPlatform/ReleaseNotes/1_0_10.md create mode 100644 Packs/MitreCaldera/ReleaseNotes/1_0_5.md create mode 100644 Packs/NCSCCyberAsssessmentFramework/ReleaseNotes/1_1_5.md create mode 100644 Packs/NTT_Cyber_Threat_Sensor/ReleaseNotes/1_0_7.md create mode 100644 Packs/Nexthink/ReleaseNotes/1_0_4.md create mode 100644 Packs/OpenSourceVulnerabilities/ReleaseNotes/1_0_2.md create mode 100644 Packs/OracleCloudInfrastructureFeed/ReleaseNotes/1_0_1.md create mode 100644 Packs/PANOSPolicyOptimizer/ReleaseNotes/1_1_28.md create mode 100644 Packs/PANOStoCDLMonitoring/ReleaseNotes/1_0_15.md create mode 100644 Packs/PassiveTotal/ReleaseNotes/2_1_16.md create mode 100644 Packs/PostmarkSpamcheck/ReleaseNotes/1_0_3.md create mode 100644 Packs/Pulsedive/ReleaseNotes/1_6_6.md create mode 100644 Packs/QRCodeReader/ReleaseNotes/1_0_6.md create mode 100644 Packs/Rapid7InsightVMCloud/ReleaseNotes/1_0_2.md create mode 100644 Packs/SSLCertificates/ReleaseNotes/1_0_2.md create mode 100644 Packs/SalesforceIndicators/ReleaseNotes/1_0_10.md create mode 100644 Packs/SalesforceV2/ReleaseNotes/1_0_5.md create mode 100644 Packs/SecurityTrails/ReleaseNotes/1_1_7.md create mode 100644 Packs/ShiftManagement-AssignToNextShift/ReleaseNotes/1_1_5.md create mode 100644 Packs/SimpleDebugger/ReleaseNotes/1_0_2.md create mode 100644 Packs/SnortIPBlocklist/ReleaseNotes/1_0_2.md create mode 100644 Packs/SpyCloud/ReleaseNotes/1_0_4.md create mode 100644 Packs/StarterPack/ReleaseNotes/1_0_13.md create mode 100644 Packs/TeamManagement/ReleaseNotes/1_0_3.md create mode 100644 Packs/ThousandEyes/ReleaseNotes/1_0_2.md create mode 100644 Packs/Trello/ReleaseNotes/1_0_10.md create mode 100644 Packs/TwitterIOCHunter-FullDailyFeed/ReleaseNotes/1_0_6.md create mode 100644 Packs/USTA/ReleaseNotes/1_0_5.md create mode 100644 Packs/UltraMSG/ReleaseNotes/1_0_2.md create mode 100644 Packs/UnisysStealth/ReleaseNotes/1_0_4.md create mode 100644 Packs/UpdateEntriesBySearch/ReleaseNotes/1_0_4.md create mode 100644 Packs/Use_Case_Builder/ReleaseNotes/1_0_7.md create mode 100644 Packs/VerifyIPv4Indicator/ReleaseNotes/1_0_3.md create mode 100644 Packs/Viper/ReleaseNotes/1_0_4.md create mode 100644 Packs/WolkenITSM/ReleaseNotes/1_0_2.md create mode 100644 Packs/Wordpress/ReleaseNotes/1_0_2.md create mode 100644 Packs/XSOARContentUpdateNotifications/ReleaseNotes/1_0_8.md create mode 100644 Packs/XSOAR_EDL_Checker/ReleaseNotes/1_1_1.md create mode 100644 Packs/XsoarWebserver/ReleaseNotes/1_0_3.md create mode 100644 Packs/Xsoar_Utils/ReleaseNotes/1_0_2.md diff --git a/Packs/Aella_StarLight/Integrations/AellaStarLight/AellaStarLight.yml b/Packs/Aella_StarLight/Integrations/AellaStarLight/AellaStarLight.yml index 8051a70a00cb..30d034a8d6ee 100644 --- a/Packs/Aella_StarLight/Integrations/AellaStarLight/AellaStarLight.yml +++ b/Packs/Aella_StarLight/Integrations/AellaStarLight/AellaStarLight.yml @@ -8,12 +8,12 @@ description: Aella Star Light Integration configuration: - display: Server URL (e.g. https://starlight.companyname.com:8889) name: url - defaultvalue: "" + defaultvalue: '' type: 0 required: true - display: User name name: credentials - defaultvalue: "" + defaultvalue: '' type: 9 required: true - display: Fetch incidents @@ -26,17 +26,17 @@ configuration: required: false - display: Fetching interval in minutes (default is 15, minimum is 15 ) name: fetch_interval - defaultvalue: "15" + defaultvalue: '15' type: 0 required: false - display: The specific security event to look for. Default is all events name: event_name - defaultvalue: "" + defaultvalue: '' type: 0 required: false - display: Security event severity threshold, between 0-100 name: severity - defaultvalue: "50" + defaultvalue: '50' type: 0 required: false - display: Trust any certificate (not secure) @@ -45,7 +45,7 @@ configuration: required: false - display: Use system proxy settings name: proxy - defaultvalue: "false" + defaultvalue: 'false' type: 8 required: false script: @@ -87,7 +87,7 @@ script: description: Query the details for a specific Start Light event isfetch: true runonce: false - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 tests: - No test fromversion: 6.5.0 diff --git a/Packs/Aella_StarLight/ReleaseNotes/1_0_14.md b/Packs/Aella_StarLight/ReleaseNotes/1_0_14.md new file mode 100644 index 000000000000..7bd8bad6157f --- /dev/null +++ b/Packs/Aella_StarLight/ReleaseNotes/1_0_14.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Aella Star Light + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/Aella_StarLight/pack_metadata.json b/Packs/Aella_StarLight/pack_metadata.json index 3dd74c095cbf..185e1f66cd44 100644 --- a/Packs/Aella_StarLight/pack_metadata.json +++ b/Packs/Aella_StarLight/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Aella Star Light", "description": "Aella Star Light Integration", "support": "community", - "currentVersion": "1.0.13", + "currentVersion": "1.0.14", "author": "Aella Star Light", "url": "", "email": "", diff --git a/Packs/AlphaVantage/Integrations/AlphaVantage/AlphaVantage.yml b/Packs/AlphaVantage/Integrations/AlphaVantage/AlphaVantage.yml index c0e5d0692c0b..8b4572ca9087 100755 --- a/Packs/AlphaVantage/Integrations/AlphaVantage/AlphaVantage.yml +++ b/Packs/AlphaVantage/Integrations/AlphaVantage/AlphaVantage.yml @@ -29,34 +29,34 @@ script: name: alphavantage-stock-data-get outputs: - contextPath: AlphaVantage.StockData.symbol - description: 'Stock symbol' + description: Stock symbol type: String - contextPath: AlphaVantage.StockData.open - description: 'Open price' + description: Open price type: String - contextPath: AlphaVantage.StockData.high - description: 'Day high price' + description: Day high price type: String - contextPath: AlphaVantage.StockData.low - description: 'Day low price' + description: Day low price type: String - contextPath: AlphaVantage.StockData.price - description: 'Last price recorded' + description: Last price recorded type: String - contextPath: AlphaVantage.StockData.volume - description: 'Trade volume' + description: Trade volume type: String - contextPath: AlphaVantage.StockData.latest trading day - description: 'Last trade day date' + description: Last trade day date type: Date - contextPath: AlphaVantage.StockData.previous close - description: 'Last day close price' + description: Last day close price type: String - contextPath: AlphaVantage.StockData.change - description: 'Change since last close' + description: Change since last close type: String - contextPath: AlphaVantage.StockData.change percent - description: 'Change since last close in %' + description: Change since last close in % type: String - arguments: - description: Symbols of stocksto fetch @@ -64,44 +64,44 @@ script: name: symbol required: true - auto: PREDEFINED - defaultValue: '60min' + defaultValue: 60min description: Time interval between two data points name: interval predefined: - - '1min' - - '5min' - - '15min' - - '30min' - - '60min' + - 1min + - 5min + - 15min + - 30min + - 60min - auto: PREDEFINED defaultValue: compact description: Amount of data return name: output_size predefined: - - 'compact' - - 'full' + - compact + - full description: Gets historical data for a stock name: alphavantage-stock-history-get outputs: - contextPath: AlphaVantage.StockHistory.Information - description: 'Info about each time series' + description: Info about each time series type: String - contextPath: AlphaVantage.StockHistory.Interval - description: 'Time interval between two data samples' + description: Time interval between two data samples type: String - contextPath: AlphaVantage.StockHistory.Last Refreshed - description: 'Last time the API data was refreshed' + description: Last time the API data was refreshed type: String - contextPath: AlphaVantage.StockHistory.Output Size - description: 'Amount of data. Either last 100 samples or as much as possible' + description: Amount of data. Either last 100 samples or as much as possible type: String - contextPath: AlphaVantage.StockHistory.Symbol - description: 'Stock symbol' + description: Stock symbol type: String - contextPath: AlphaVantage.StockHistory.Time Series - description: 'List of all stock data samples' + description: List of all stock data samples type: Unknown - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 runonce: false script: '-' subtype: python3 diff --git a/Packs/AlphaVantage/ReleaseNotes/1_0_13.md b/Packs/AlphaVantage/ReleaseNotes/1_0_13.md new file mode 100644 index 000000000000..7085d010083c --- /dev/null +++ b/Packs/AlphaVantage/ReleaseNotes/1_0_13.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### AlphaVantage + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/AlphaVantage/pack_metadata.json b/Packs/AlphaVantage/pack_metadata.json index a7165d72d35e..1aaf8de1d2f5 100755 --- a/Packs/AlphaVantage/pack_metadata.json +++ b/Packs/AlphaVantage/pack_metadata.json @@ -2,7 +2,7 @@ "name": "AlphaVantage", "description": "The Alpha Vantage content pack provides accessible APIs for financial market data such as stock prices. Utilize this pack to get open stock prices, high/low price, trade volume, and so on.", "support": "community", - "currentVersion": "1.0.12", + "currentVersion": "1.0.13", "author": "Ohad Valtzer", "url": "https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/bd-p/Cortex_XSOAR_Discussions", "email": "", diff --git a/Packs/Arduino/Integrations/Arduino/Arduino.yml b/Packs/Arduino/Integrations/Arduino/Arduino.yml index fa8f39aa1beb..e88b16600133 100644 --- a/Packs/Arduino/Integrations/Arduino/Arduino.yml +++ b/Packs/Arduino/Integrations/Arduino/Arduino.yml @@ -9,7 +9,7 @@ configuration: required: true type: 0 - additionalinfo: Port number - defaultvalue: "9090" + defaultvalue: '9090' display: Port number name: port required: true @@ -123,7 +123,7 @@ script: - contextPath: Arduino.DataSend.Received description: The data received type: string - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 script: '' subtype: python3 type: python diff --git a/Packs/Arduino/ReleaseNotes/1_0_12.md b/Packs/Arduino/ReleaseNotes/1_0_12.md new file mode 100644 index 000000000000..300943139f24 --- /dev/null +++ b/Packs/Arduino/ReleaseNotes/1_0_12.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Arduino + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/Arduino/pack_metadata.json b/Packs/Arduino/pack_metadata.json index af20b07da0ca..906a0cea4704 100644 --- a/Packs/Arduino/pack_metadata.json +++ b/Packs/Arduino/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Arduino", "description": "Communicate with an Arduino over a network. Sample code for the Arduino is provided to get up and running. There are functions in the Arduino code to handle setting and getting pin values as well as arbitrary data.", "support": "community", - "currentVersion": "1.0.11", + "currentVersion": "1.0.12", "author": "Adam Burt", "url": "", "email": "", diff --git a/Packs/Barracuda/Integrations/BarracudaReputationBlockListBRBL/BarracudaReputationBlockListBRBL.yml b/Packs/Barracuda/Integrations/BarracudaReputationBlockListBRBL/BarracudaReputationBlockListBRBL.yml index 928e2144bdbc..3c4496ba42fb 100644 --- a/Packs/Barracuda/Integrations/BarracudaReputationBlockListBRBL/BarracudaReputationBlockListBRBL.yml +++ b/Packs/Barracuda/Integrations/BarracudaReputationBlockListBRBL/BarracudaReputationBlockListBRBL.yml @@ -75,7 +75,7 @@ script: description: A description explaining why the IP address was reported as malicious. type: String description: Get IP Reputation - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 runonce: false subtype: python3 fromversion: 6.0.0 diff --git a/Packs/Barracuda/ReleaseNotes/1_0_11.md b/Packs/Barracuda/ReleaseNotes/1_0_11.md new file mode 100644 index 000000000000..efc658339547 --- /dev/null +++ b/Packs/Barracuda/ReleaseNotes/1_0_11.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Barracuda Reputation Block List (BRBL) + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/Barracuda/pack_metadata.json b/Packs/Barracuda/pack_metadata.json index 6a313300d572..6153998c9c9b 100644 --- a/Packs/Barracuda/pack_metadata.json +++ b/Packs/Barracuda/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Barracuda", "description": "Barracuda Reputation Block List (BRBL)", "support": "community", - "currentVersion": "1.0.10", + "currentVersion": "1.0.11", "author": "Harri Ruuttila", "url": "https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/bd-p/Cortex_XSOAR_Discussions", "email": "", diff --git a/Packs/BitDam/Integrations/BitDam/BitDam.yml b/Packs/BitDam/Integrations/BitDam/BitDam.yml index 978661ce70ed..6ad1c6a90936 100644 --- a/Packs/BitDam/Integrations/BitDam/BitDam.yml +++ b/Packs/BitDam/Integrations/BitDam/BitDam.yml @@ -13,7 +13,7 @@ configuration: required: true - display: API Token name: apitoken - defaultvalue: "" + defaultvalue: '' type: 4 required: true - display: Trust any certificate (not secure) @@ -77,7 +77,7 @@ script: type: string description: Returns the verdict for a scanned file. runonce: false - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 tests: - Detonate File - BitDam Test fromversion: 5.0.0 diff --git a/Packs/BitDam/ReleaseNotes/1_0_14.md b/Packs/BitDam/ReleaseNotes/1_0_14.md new file mode 100644 index 000000000000..840d3942b629 --- /dev/null +++ b/Packs/BitDam/ReleaseNotes/1_0_14.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### BitDam + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/BitDam/pack_metadata.json b/Packs/BitDam/pack_metadata.json index 7d2cf47dbe65..7d9484582b64 100644 --- a/Packs/BitDam/pack_metadata.json +++ b/Packs/BitDam/pack_metadata.json @@ -2,7 +2,7 @@ "name": "BitDam", "description": "BitDam secure email gateway protects from advanced content-borne threats with the most accurate prevention of known and unknown threats, at their source.", "support": "community", - "currentVersion": "1.0.13", + "currentVersion": "1.0.14", "author": "BitDam", "url": "https://www.bitdam.com", "email": "support@bitdam.com", diff --git a/Packs/BluelivThreatContext/Integrations/BluelivThreatContext/BluelivThreatContext.yml b/Packs/BluelivThreatContext/Integrations/BluelivThreatContext/BluelivThreatContext.yml index f704970b21c8..1605d231b7c6 100644 --- a/Packs/BluelivThreatContext/Integrations/BluelivThreatContext/BluelivThreatContext.yml +++ b/Packs/BluelivThreatContext/Integrations/BluelivThreatContext/BluelivThreatContext.yml @@ -637,7 +637,7 @@ script: - contextPath: BluelivThreatContext.signature.type description: Signature type. type: String - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 runonce: false script: '-' subtype: python3 diff --git a/Packs/BluelivThreatContext/ReleaseNotes/1_0_10.md b/Packs/BluelivThreatContext/ReleaseNotes/1_0_10.md new file mode 100644 index 000000000000..f4f03e975627 --- /dev/null +++ b/Packs/BluelivThreatContext/ReleaseNotes/1_0_10.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Blueliv ThreatContext + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/BluelivThreatContext/pack_metadata.json b/Packs/BluelivThreatContext/pack_metadata.json index d107e8e5d43e..492910a21878 100644 --- a/Packs/BluelivThreatContext/pack_metadata.json +++ b/Packs/BluelivThreatContext/pack_metadata.json @@ -2,8 +2,8 @@ "name": "Blueliv ThreatContext", "description": "The Threat Context module provides SOC, Incident Response and Threat Intelligence teams with continuously updated and intuitive information around threat actors, campaigns, malware indicators, attack patterns, tools, signatures and CVEs. Analysts can rapidly gather enriched, contextualized information to enhance cybersecurity processes before, during and after an attack.", "support": "community", - "currentVersion": "1.0.9", - "author": "Oriol Campderr\u00f3s", + "currentVersion": "1.0.10", + "author": "Oriol Campderrós", "url": " ", "email": "", "created": "2020-06-08T15:37:54Z", diff --git a/Packs/Bonusly/Integrations/Bonusly/Bonusly.yml b/Packs/Bonusly/Integrations/Bonusly/Bonusly.yml index 05258e9c40ae..86d0cea6c318 100644 --- a/Packs/Bonusly/Integrations/Bonusly/Bonusly.yml +++ b/Packs/Bonusly/Integrations/Bonusly/Bonusly.yml @@ -59,9 +59,9 @@ script: - defaultValue: '20' description: 'Number of bonuses to retrieve (min: 1, max: 100) Default: 20.' name: limit - - description: 'The start time by which to filter returned bonuses. e.g., 2015-10-28T21:26:50Z.' + - description: The start time by which to filter returned bonuses. e.g., 2015-10-28T21:26:50Z. name: start-time - - description: 'The end time by which to filter returned bonuses, e.g., 2015-10-28T21:26:50Z.' + - description: The end time by which to filter returned bonuses, e.g., 2015-10-28T21:26:50Z. name: end-time - description: Email address of the bonus giver by which to filter results. name: giver-email @@ -71,7 +71,7 @@ script: name: user-email - description: 'Filter to get a list of bonuses by a hashtag Example: %23teamwork' name: hashtag - - description: 'Whether to include child responses of the bonus.' + - description: Whether to include child responses of the bonus. name: include-children - description: Whether to show private bonuses. Requires Admin API key. name: show-private-bonuses @@ -82,7 +82,7 @@ script: description: Bonus ID. type: String - contextPath: Bonusly.Bonus.created_at - description: 'Date the bonus was created (given), e.g., 2015-10-28T21:26:50Z.' + description: Date the bonus was created (given), e.g., 2015-10-28T21:26:50Z. type: Date - contextPath: Bonusly.Bonus.reason description: 'The bonus message, e.g., "For signing up for the world''s favorite employee recognition solution! #problem-solving"' @@ -196,7 +196,7 @@ script: - description: "The bonus message, e.g., \n+10 @george and @john for #execution with that customer #collaboration with the team, and #integrity on the known vulnerabilities to the application. \n\n+10 @francesco because he is fast and detailed\n" name: reason required: true - - description: 'The parent bonus ID with which to associate this bonus, e.g., 24abcdef1234567890abcdef.' + - description: The parent bonus ID with which to associate this bonus, e.g., 24abcdef1234567890abcdef. name: parent-bonus-id description: Creates a Bonusly bonus. name: bonusly-create-bonus @@ -205,7 +205,7 @@ script: description: Bonus ID. type: String - contextPath: Bonusly.Bonus.created_at - description: 'Date the bonus was created (given), e.g., 2015-10-28T21:26:50Z.' + description: Date the bonus was created (given), e.g., 2015-10-28T21:26:50Z. type: Date - contextPath: Bonusly.Bonus.reason description: 'The bonus message, e.g., "For signing up for the world''s favorite employee recognition solution! #problem-solving"' @@ -313,7 +313,7 @@ script: description: Family bonus balance. type: Number - arguments: - - description: 'ID of the bonus to get information for.' + - description: ID of the bonus to get information for. name: id required: true description: Gets a bonus by bonus ID. @@ -323,7 +323,7 @@ script: description: Bonus ID. type: String - contextPath: Bonusly.Bonus.created_at - description: 'Date the bonus was created (given), e.g., 2015-10-28T21:26:50Z.' + description: Date the bonus was created (given), e.g., 2015-10-28T21:26:50Z. type: Date - contextPath: Bonusly.Bonus.reason description: 'The bonus message, e.g., "For signing up for the world''s favorite employee recognition solution! #problem-solving"' @@ -444,7 +444,7 @@ script: description: Bonus ID. type: String - contextPath: Bonusly.Bonus.created_at - description: 'Date the bonus was created (given), e.g., 2015-10-28T21:26:50Z.' + description: Date the bonus was created (given), e.g., 2015-10-28T21:26:50Z. type: Date - contextPath: Bonusly.Bonus.reason description: 'The bonus message, e.g., "For signing up for the world''s favorite employee recognition solution! #problem-solving"' @@ -561,7 +561,7 @@ script: - contextPath: Bonusly.Bonus.message description: Message type: Unknown - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 isfetch: true runonce: false script: '-' diff --git a/Packs/Bonusly/ReleaseNotes/1_0_15.md b/Packs/Bonusly/ReleaseNotes/1_0_15.md new file mode 100644 index 000000000000..cd9f63c7980e --- /dev/null +++ b/Packs/Bonusly/ReleaseNotes/1_0_15.md @@ -0,0 +1,12 @@ + +#### Integrations + +##### Bonusly + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. + +#### Scripts + +##### IncOwnerToBonuslyUser + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/Bonusly/Scripts/IncOwnerToBonuslyUser/IncOwnerToBonuslyUser.yml b/Packs/Bonusly/Scripts/IncOwnerToBonuslyUser/IncOwnerToBonuslyUser.yml index 68060ba74572..a6bbe222236e 100644 --- a/Packs/Bonusly/Scripts/IncOwnerToBonuslyUser/IncOwnerToBonuslyUser.yml +++ b/Packs/Bonusly/Scripts/IncOwnerToBonuslyUser/IncOwnerToBonuslyUser.yml @@ -25,7 +25,7 @@ tags: - Utilities timeout: '0' type: python -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole fromversion: 5.0.0 tests: diff --git a/Packs/Bonusly/pack_metadata.json b/Packs/Bonusly/pack_metadata.json index a89dcaa402d3..6f357b014e29 100644 --- a/Packs/Bonusly/pack_metadata.json +++ b/Packs/Bonusly/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Bonusly", "description": "Bonus.ly is an employee recognition platform which enterprises use to for employee recognition. We're building tools to help people feel a sense of purpose and progress at work. The platform which also has an API enables employees to recognize each other by providing a point based bonus system. Bonus.ly helps your employees feel connected, engaged, and aligned is mission critical right now. Bonusly makes employee recognition easy and fun, fostering community and creating company-wide alignment. It also provides employees with positive feedback in the work that they are doing. ", "support": "community", - "currentVersion": "1.0.14", + "currentVersion": "1.0.15", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CaseManagement-Generic/ReleaseNotes/1_4_8.md b/Packs/CaseManagement-Generic/ReleaseNotes/1_4_8.md new file mode 100644 index 000000000000..407aa7c451ad --- /dev/null +++ b/Packs/CaseManagement-Generic/ReleaseNotes/1_4_8.md @@ -0,0 +1,27 @@ + +#### Scripts + +##### TimersOnOwnerChange + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### AddUserToIncidentTeam + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### CaseMgmtIncidentTypesDisplay + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### CaseMgmtIncidentTypesByRole + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### CaseMgmtAnalystTools + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### CaseMgmtResponseProcess + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### CaseMgmtDisplayLabels + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### CompleteTaskOnTimerBreach + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/CaseManagement-Generic/Scripts/AddUserToIncidentTeam/AddUserToIncidentTeam.yml b/Packs/CaseManagement-Generic/Scripts/AddUserToIncidentTeam/AddUserToIncidentTeam.yml index 052f6c88bf95..fa1807636542 100644 --- a/Packs/CaseManagement-Generic/Scripts/AddUserToIncidentTeam/AddUserToIncidentTeam.yml +++ b/Packs/CaseManagement-Generic/Scripts/AddUserToIncidentTeam/AddUserToIncidentTeam.yml @@ -8,8 +8,8 @@ commonfields: version: -1 contentitemexportablefields: contentitemfields: - fromServerVersion: "" -dockerimage: demisto/python3:3.10.12.63474 + fromServerVersion: '' +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: AddUserToIncidentTeam runas: DBotWeakRole diff --git a/Packs/CaseManagement-Generic/Scripts/CaseMgmtAnalystTools/CaseMgmtAnalystTools.yml b/Packs/CaseManagement-Generic/Scripts/CaseMgmtAnalystTools/CaseMgmtAnalystTools.yml index f1020519180f..2d9195f56407 100644 --- a/Packs/CaseManagement-Generic/Scripts/CaseMgmtAnalystTools/CaseMgmtAnalystTools.yml +++ b/Packs/CaseManagement-Generic/Scripts/CaseMgmtAnalystTools/CaseMgmtAnalystTools.yml @@ -1,11 +1,11 @@ -comment: |- - Dynamic display script to display a list of useful Analyst Tools on an Incident layout. +comment: 'Dynamic display script to display a list of useful Analyst Tools on an Incident layout. - Create an XSOAR list called "Case Management Analyst Tools", and add a markdown table to provide your own list. + + Create an XSOAR list called "Case Management Analyst Tools", and add a markdown table to provide your own list.' commonfields: id: CaseMgmtAnalystTools version: -1 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: CaseMgmtAnalystTools runas: DBotWeakRole diff --git a/Packs/CaseManagement-Generic/Scripts/CaseMgmtDisplayLabels/CaseMgmtDisplayLabels.yml b/Packs/CaseManagement-Generic/Scripts/CaseMgmtDisplayLabels/CaseMgmtDisplayLabels.yml index 94bd2b8a6282..669ddebd08e2 100644 --- a/Packs/CaseManagement-Generic/Scripts/CaseMgmtDisplayLabels/CaseMgmtDisplayLabels.yml +++ b/Packs/CaseManagement-Generic/Scripts/CaseMgmtDisplayLabels/CaseMgmtDisplayLabels.yml @@ -2,7 +2,7 @@ comment: 'Dynamic section that will display the Labels for an Incident in a mark commonfields: id: CaseMgmtDisplayLabels version: -1 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: CaseMgmtDisplayLabels runas: DBotWeakRole diff --git a/Packs/CaseManagement-Generic/Scripts/CaseMgmtIncidentTypesByRole/CaseMgmtIncidentTypesByRole.py b/Packs/CaseManagement-Generic/Scripts/CaseMgmtIncidentTypesByRole/CaseMgmtIncidentTypesByRole.py index 0f918fafcc8b..7fcde77bf89f 100644 --- a/Packs/CaseManagement-Generic/Scripts/CaseMgmtIncidentTypesByRole/CaseMgmtIncidentTypesByRole.py +++ b/Packs/CaseManagement-Generic/Scripts/CaseMgmtIncidentTypesByRole/CaseMgmtIncidentTypesByRole.py @@ -28,7 +28,7 @@ # for each role the user has, add their types if the role exists in the list for role in roles: - if role in role_list.keys(): + if role in role_list: allowedTypes.extend(role_list[role]) # remove duplicates diff --git a/Packs/CaseManagement-Generic/Scripts/CaseMgmtIncidentTypesByRole/CaseMgmtIncidentTypesByRole.yml b/Packs/CaseManagement-Generic/Scripts/CaseMgmtIncidentTypesByRole/CaseMgmtIncidentTypesByRole.yml index 3ac577d64b85..66abf37089d7 100644 --- a/Packs/CaseManagement-Generic/Scripts/CaseMgmtIncidentTypesByRole/CaseMgmtIncidentTypesByRole.yml +++ b/Packs/CaseManagement-Generic/Scripts/CaseMgmtIncidentTypesByRole/CaseMgmtIncidentTypesByRole.yml @@ -2,7 +2,7 @@ comment: "Restricts the Incident Types a user can create manually, based on thei commonfields: id: CaseMgmtIncidentTypesByRole version: -1 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: CaseMgmtIncidentTypesByRole runas: DBotWeakRole diff --git a/Packs/CaseManagement-Generic/Scripts/CaseMgmtIncidentTypesDisplay/CaseMgmtIncidentTypesDisplay.yml b/Packs/CaseManagement-Generic/Scripts/CaseMgmtIncidentTypesDisplay/CaseMgmtIncidentTypesDisplay.yml index 6c26b9d6cf71..ea15c4b9d1e3 100644 --- a/Packs/CaseManagement-Generic/Scripts/CaseMgmtIncidentTypesDisplay/CaseMgmtIncidentTypesDisplay.yml +++ b/Packs/CaseManagement-Generic/Scripts/CaseMgmtIncidentTypesDisplay/CaseMgmtIncidentTypesDisplay.yml @@ -2,7 +2,7 @@ comment: "Restricts the Incident Types a user can create manually based on an XS commonfields: id: CaseMgmtIncidentTypesDisplay version: -1 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: CaseMgmtIncidentTypesDisplay runas: DBotWeakRole diff --git a/Packs/CaseManagement-Generic/Scripts/CaseMgmtResponseProcess/CaseMgmtResponseProcess.yml b/Packs/CaseManagement-Generic/Scripts/CaseMgmtResponseProcess/CaseMgmtResponseProcess.yml index ed919a31029f..86139ccb2d46 100644 --- a/Packs/CaseManagement-Generic/Scripts/CaseMgmtResponseProcess/CaseMgmtResponseProcess.yml +++ b/Packs/CaseManagement-Generic/Scripts/CaseMgmtResponseProcess/CaseMgmtResponseProcess.yml @@ -2,7 +2,7 @@ comment: Dynamic display script to display a response process on an Incident lay commonfields: id: CaseMgmtResponseProcess version: -1 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: CaseMgmtResponseProcess runas: DBotWeakRole diff --git a/Packs/CaseManagement-Generic/Scripts/CompleteTaskOnTimerBreach/CompleteTaskOnTimerBreach.yml b/Packs/CaseManagement-Generic/Scripts/CompleteTaskOnTimerBreach/CompleteTaskOnTimerBreach.yml index b052e5177088..bc00cdc80b97 100644 --- a/Packs/CaseManagement-Generic/Scripts/CompleteTaskOnTimerBreach/CompleteTaskOnTimerBreach.yml +++ b/Packs/CaseManagement-Generic/Scripts/CompleteTaskOnTimerBreach/CompleteTaskOnTimerBreach.yml @@ -4,8 +4,8 @@ commonfields: version: -1 contentitemexportablefields: contentitemfields: - fromServerVersion: "" -dockerimage: demisto/python3:3.10.12.63474 + fromServerVersion: '' +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: CompleteTaskOnTimerBreach runas: DBotWeakRole diff --git a/Packs/CaseManagement-Generic/Scripts/TimersOnOwnerChange/TimersOnOwnerChange.yml b/Packs/CaseManagement-Generic/Scripts/TimersOnOwnerChange/TimersOnOwnerChange.yml index eb7e14edef9b..ffabe0017799 100644 --- a/Packs/CaseManagement-Generic/Scripts/TimersOnOwnerChange/TimersOnOwnerChange.yml +++ b/Packs/CaseManagement-Generic/Scripts/TimersOnOwnerChange/TimersOnOwnerChange.yml @@ -9,7 +9,7 @@ comment: |- commonfields: id: TimersOnOwnerChange version: -1 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: TimersOnOwnerChange runas: DBotWeakRole diff --git a/Packs/CaseManagement-Generic/pack_metadata.json b/Packs/CaseManagement-Generic/pack_metadata.json index e1034e0372b2..d84248042850 100644 --- a/Packs/CaseManagement-Generic/pack_metadata.json +++ b/Packs/CaseManagement-Generic/pack_metadata.json @@ -2,7 +2,7 @@ "name": "CaseManagement-Generic", "description": "Case Management - Generic\n\nBuilt by the Cortex Customer Success Team to provide quick deployment of Case Management with XSOAR", "support": "community", - "currentVersion": "1.4.7", + "currentVersion": "1.4.8", "author": "Cortex XSOAR Customer Success", "url": "", "email": "", diff --git a/Packs/CentrifyVault/Integrations/CentrifyVault/CentrifyVault.py b/Packs/CentrifyVault/Integrations/CentrifyVault/CentrifyVault.py index 60f87be4bb6a..fd9529d5ebab 100644 --- a/Packs/CentrifyVault/Integrations/CentrifyVault/CentrifyVault.py +++ b/Packs/CentrifyVault/Integrations/CentrifyVault/CentrifyVault.py @@ -51,10 +51,9 @@ def authenticate_oauth(self): bearer_token = integration_context.get('bearer_token') valid_until = integration_context.get('valid_until') time_now = int(time.time()) - if bearer_token and valid_until: - if time_now < valid_until: - # Bearer Token is still valid - did not expire yet - return bearer_token + if bearer_token and valid_until and time_now < valid_until: + # Bearer Token is still valid - did not expire yet + return bearer_token response = self.get_token_request() bearer_token = response.get('access_token') t = time.time() @@ -230,10 +229,7 @@ def fetch_set_details(client: Client, set_details_list): centrify_setdetails_response = client.request_set_details(url_suffix=urlSuffix, data=payload) centrify_setdetails_response = centrify_setdetails_response.get('Result').get('Results') for set_item in centrify_setdetails_response: - if 'Description' not in set_item['Row']: - set_description = "" - else: - set_description = set_item['Row']['Description'] + set_description = set_item['Row'].get('Description', '') set_details_list.append({'SetName': set_item['Row']['Name'], 'SetID': set_item['Row']['ID'], 'SetDescription': set_description}) return set_details_list @@ -419,7 +415,7 @@ def fetch_secrets(args: dict, client: Client): else: folder_id = "" secret_ids_list = fetch_secretids_folder(client, folder_id, secret_ids_list, True) - secret_list = list() + secret_list = [] for secret_id in secret_ids_list: secret_list.append(fetch_secret(client, secret_id, secret_name, True)) secret_list = list(filter(None, secret_list)) @@ -492,8 +488,8 @@ def create_vault_secret(args: dict, client: Client): folder_name = args.get('holderName') folder_id = fetch_secret_folder_id(client, folder_name) else: - setId_list = list() - set_name_list = list() + setId_list = [] + set_name_list = [] if ';' in str(args.get('holderName')): set_name_list = str(args.get('holderName')).split(';') for set_item in set_name_list: @@ -681,7 +677,7 @@ def delete_vault_secret(args: dict, client: Client): def delete_vault_secretid(args: dict, client: Client): try: secret_id = args.get('secretId') - delete_secret_id_list = list() + delete_secret_id_list = [] delete_secret_id_list.append(fetch_secret(client, secret_id, None, None)) delete_secret(client, secret_id) if delete_secret_id_list: diff --git a/Packs/CentrifyVault/Integrations/CentrifyVault/CentrifyVault.yml b/Packs/CentrifyVault/Integrations/CentrifyVault/CentrifyVault.yml index 19ca593d5c90..038295bda2d9 100644 --- a/Packs/CentrifyVault/Integrations/CentrifyVault/CentrifyVault.yml +++ b/Packs/CentrifyVault/Integrations/CentrifyVault/CentrifyVault.yml @@ -227,15 +227,15 @@ script: description: '"Yes" if you want to delete all the secrets having same name in all the subfolders recursively. "No" if you want do not want to delete the secret in the subfolders.' name: recursiveDelete predefined: - - "Yes" - - "No" + - 'Yes' + - 'No' required: true - auto: PREDEFINED description: '"Yes" if you want to delete the secret having the provided secretname as a part of the Secret. "No" if you want to delete the secret with the exact name match. Ex: Demisto* will delete all secrets like Demisto_1, Demisto_pwd, Demisto. ' name: matchPartOfSecret predefined: - - "Yes" - - "No" + - 'Yes' + - 'No' required: true description: 'Delete Secret from the Centrify Vault. Please note: Enabling "recursiveDelete" to "Yes" will delete all secrets if there multiple secrets with same name in subfolders.' name: centrify-delete-secret @@ -273,7 +273,7 @@ script: required: true description: Delete set from the Centrify Vault name: centrify-delete-set - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 runonce: false script: '' subtype: python3 diff --git a/Packs/CentrifyVault/ReleaseNotes/1_0_8.md b/Packs/CentrifyVault/ReleaseNotes/1_0_8.md new file mode 100644 index 000000000000..8e5259e808c9 --- /dev/null +++ b/Packs/CentrifyVault/ReleaseNotes/1_0_8.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Centrify Vault + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/CentrifyVault/pack_metadata.json b/Packs/CentrifyVault/pack_metadata.json index edb67bc0f8ec..663b599081da 100644 --- a/Packs/CentrifyVault/pack_metadata.json +++ b/Packs/CentrifyVault/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Centrify Vault", "description": "Centrify Vault integration to create/fetch/delete secrets/folders/sets.", "support": "community", - "currentVersion": "1.0.7", + "currentVersion": "1.0.8", "author": "prashasthbaliga", "url": "", "email": "", diff --git a/Packs/CommunityCommonScripts/ReleaseNotes/1_2_4.md b/Packs/CommunityCommonScripts/ReleaseNotes/1_2_4.md new file mode 100644 index 000000000000..ec0abe3698ca --- /dev/null +++ b/Packs/CommunityCommonScripts/ReleaseNotes/1_2_4.md @@ -0,0 +1,81 @@ + +#### Scripts + +##### DateTimeToADTime + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### MaxList + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### StripAccentMarksFromString + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### GetFields + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### MapRegex + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### IPCalcReturnSubnetNetwork + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### DisplayTaggedWarroomEntries + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### BatchData + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### ConvertUTCEpochTimeToTimeStamp + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### IPCalcReturnAddressIANAAllocation + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### SSLVerifier + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### CreateArrayWithDuplicates + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### RandomElementFromList + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### GetFilePathPreProcessing + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### InvertEveryTwoItems + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### IPCalcReturnSubnetBroadcastAddress + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### IPCalcCheckSubnetCollision + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### CreateFileFromPathObject + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### CompareList + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### IPCalcReturnAddressBinary + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### isArrayItemInList + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### IPCalcReturnSubnetAddresses + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### MinList + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### delete_expired_indicator_with_exlusion + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### DisplayIndicatorReputationContent + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### RandomPhotoNasa + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/CommunityCommonScripts/Scripts/BatchData/BatchData.py b/Packs/CommunityCommonScripts/Scripts/BatchData/BatchData.py index a0d4cc2a8d1f..e687918c3182 100644 --- a/Packs/CommunityCommonScripts/Scripts/BatchData/BatchData.py +++ b/Packs/CommunityCommonScripts/Scripts/BatchData/BatchData.py @@ -8,7 +8,7 @@ list_of_items = list(list_of_items.split(",")) batch_size = int(batch_size) -batch_list = list() +batch_list = [] for i in range(0, len(list_of_items), batch_size): batch_list.append(list_of_items[i:i + batch_size]) diff --git a/Packs/CommunityCommonScripts/Scripts/BatchData/BatchData.yml b/Packs/CommunityCommonScripts/Scripts/BatchData/BatchData.yml index 3cbfac200fe5..0b7526bd7572 100644 --- a/Packs/CommunityCommonScripts/Scripts/BatchData/BatchData.yml +++ b/Packs/CommunityCommonScripts/Scripts/BatchData/BatchData.yml @@ -14,8 +14,8 @@ commonfields: version: -1 contentitemexportablefields: contentitemfields: - fromServerVersion: "" -dockerimage: demisto/python3:3.10.12.63474 + fromServerVersion: '' +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: BatchData runas: DBotWeakRole diff --git a/Packs/CommunityCommonScripts/Scripts/CompareList/CompareList.yml b/Packs/CommunityCommonScripts/Scripts/CompareList/CompareList.yml index fd6f275e6d19..c94e4de1d21c 100644 --- a/Packs/CommunityCommonScripts/Scripts/CompareList/CompareList.yml +++ b/Packs/CommunityCommonScripts/Scripts/CompareList/CompareList.yml @@ -1,15 +1,15 @@ args: - name: list1_name required: true - description: "First list name to compare." + description: First list name to compare. - name: list2_name required: true - description: "Second list name to compare." + description: Second list name to compare. commonfields: id: CompareList version: -1 -dockerimage: demisto/python3:3.10.12.63474 -comment: "Compares two lists." +dockerimage: demisto/python3:3.10.14.100715 +comment: Compares two lists. enabled: true name: CompareList runas: DBotWeakRole diff --git a/Packs/CommunityCommonScripts/Scripts/ConvertUTCEpochTimeToTimeStamp/ConvertUTCEpochTimeToTimeStamp.yml b/Packs/CommunityCommonScripts/Scripts/ConvertUTCEpochTimeToTimeStamp/ConvertUTCEpochTimeToTimeStamp.yml index e52ae3522109..a3c982805b4b 100644 --- a/Packs/CommunityCommonScripts/Scripts/ConvertUTCEpochTimeToTimeStamp/ConvertUTCEpochTimeToTimeStamp.yml +++ b/Packs/CommunityCommonScripts/Scripts/ConvertUTCEpochTimeToTimeStamp/ConvertUTCEpochTimeToTimeStamp.yml @@ -16,8 +16,8 @@ commonfields: version: -1 contentitemexportablefields: contentitemfields: - fromServerVersion: "" -dockerimage: demisto/python3:3.10.12.63474 + fromServerVersion: '' +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: ConvertUTCEpochTimeToTimeStamp runas: DBotWeakRole diff --git a/Packs/CommunityCommonScripts/Scripts/CreateArrayWithDuplicates/CreateArrayWithDuplicates.yml b/Packs/CommunityCommonScripts/Scripts/CreateArrayWithDuplicates/CreateArrayWithDuplicates.yml index 6639d9280555..bd7e39f20039 100644 --- a/Packs/CommunityCommonScripts/Scripts/CreateArrayWithDuplicates/CreateArrayWithDuplicates.yml +++ b/Packs/CommunityCommonScripts/Scripts/CreateArrayWithDuplicates/CreateArrayWithDuplicates.yml @@ -8,19 +8,20 @@ args: name: separator - description: The key to place result array in context, by default will be "array". name: contextKey -comment: |- - Will create an array object in context from a given string input , allowing for duplicate values to be retained +comment: 'Will create an array object in context from a given string input , allowing for duplicate values to be retained + Output is to ContextKey.array as JSON does not permit duplicate key names - e.g., ContextKey.array.value1, ContextKey.array.value2, ContextKey.array.value3, etc. + + e.g., ContextKey.array.value1, ContextKey.array.value2, ContextKey.array.value3, etc.' commonfields: id: CreateArrayWithDuplicates version: -1 contentitemexportablefields: contentitemfields: - fromServerVersion: "" -dockerimage: demisto/python3:3.10.12.63474 + fromServerVersion: '' +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: CreateArrayWithDuplicates runas: DBotWeakRole diff --git a/Packs/CommunityCommonScripts/Scripts/CreateFileFromPathObject/CreateFileFromPathObject.yml b/Packs/CommunityCommonScripts/Scripts/CreateFileFromPathObject/CreateFileFromPathObject.yml index 61701b043819..4e930ca41b8f 100644 --- a/Packs/CommunityCommonScripts/Scripts/CreateFileFromPathObject/CreateFileFromPathObject.yml +++ b/Packs/CommunityCommonScripts/Scripts/CreateFileFromPathObject/CreateFileFromPathObject.yml @@ -10,7 +10,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: '' -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: CreateFileFromPathObject runas: DBotWeakRole diff --git a/Packs/CommunityCommonScripts/Scripts/DateTimeToADTime/DateTimeToADTime.yml b/Packs/CommunityCommonScripts/Scripts/DateTimeToADTime/DateTimeToADTime.yml index 32f84ec61374..36813c97f87f 100644 --- a/Packs/CommunityCommonScripts/Scripts/DateTimeToADTime/DateTimeToADTime.yml +++ b/Packs/CommunityCommonScripts/Scripts/DateTimeToADTime/DateTimeToADTime.yml @@ -1,5 +1,5 @@ args: -- defaultValue: "0" +- defaultValue: '0' description: Number of days before todays date name: days_ago required: true @@ -7,7 +7,7 @@ comment: Converts unix time to AD Integer8 time. This is used in many AD date fi commonfields: id: DateTimeToADTime version: -1 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: DateTimeToADTime runas: DBotWeakRole diff --git a/Packs/CommunityCommonScripts/Scripts/DeleteExpiredIndicatorWithExlusion/DeleteExpiredIndicatorWithExlusion.yml b/Packs/CommunityCommonScripts/Scripts/DeleteExpiredIndicatorWithExlusion/DeleteExpiredIndicatorWithExlusion.yml index 5dac140ecd32..466fbd9e3684 100644 --- a/Packs/CommunityCommonScripts/Scripts/DeleteExpiredIndicatorWithExlusion/DeleteExpiredIndicatorWithExlusion.yml +++ b/Packs/CommunityCommonScripts/Scripts/DeleteExpiredIndicatorWithExlusion/DeleteExpiredIndicatorWithExlusion.yml @@ -3,8 +3,8 @@ commonfields: version: -1 contentitemexportablefields: contentitemfields: - fromServerVersion: "" -dockerimage: demisto/python3:3.10.12.63474 + fromServerVersion: '' +dockerimage: demisto/python3:3.10.14.100715 comment: deletes expired indicators. enabled: true name: delete_expired_indicator_with_exlusion diff --git a/Packs/CommunityCommonScripts/Scripts/DisplayIndicatorReputationContent/DisplayIndicatorReputationContent.yml b/Packs/CommunityCommonScripts/Scripts/DisplayIndicatorReputationContent/DisplayIndicatorReputationContent.yml index a821b890ea78..a2f0035c0def 100644 --- a/Packs/CommunityCommonScripts/Scripts/DisplayIndicatorReputationContent/DisplayIndicatorReputationContent.yml +++ b/Packs/CommunityCommonScripts/Scripts/DisplayIndicatorReputationContent/DisplayIndicatorReputationContent.yml @@ -1,11 +1,11 @@ commonfields: id: DisplayIndicatorReputationContent version: -1 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: DisplayIndicatorReputationContent runas: DBotWeakRole -comment: 'Display the indicator context object in markdown format in a dynamic section layout' +comment: Display the indicator context object in markdown format in a dynamic section layout script: '' scripttarget: 0 subtype: python3 diff --git a/Packs/CommunityCommonScripts/Scripts/DisplayTaggedWarroomEntries/DisplayTaggedWarroomEntries.yml b/Packs/CommunityCommonScripts/Scripts/DisplayTaggedWarroomEntries/DisplayTaggedWarroomEntries.yml index 86f139dfba06..9bafd11dd7f6 100644 --- a/Packs/CommunityCommonScripts/Scripts/DisplayTaggedWarroomEntries/DisplayTaggedWarroomEntries.yml +++ b/Packs/CommunityCommonScripts/Scripts/DisplayTaggedWarroomEntries/DisplayTaggedWarroomEntries.yml @@ -5,9 +5,9 @@ args: commonfields: id: DisplayTaggedWarroomEntries version: -1 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true -comment: "Display warroom entries in a dynamic section which are tagged with 'report'" +comment: Display warroom entries in a dynamic section which are tagged with 'report' name: DisplayTaggedWarroomEntries runas: DBotWeakRole script: '' diff --git a/Packs/CommunityCommonScripts/Scripts/GetFields/GetFields.yml b/Packs/CommunityCommonScripts/Scripts/GetFields/GetFields.yml index 667cc6f24c89..73db679889fd 100644 --- a/Packs/CommunityCommonScripts/Scripts/GetFields/GetFields.yml +++ b/Packs/CommunityCommonScripts/Scripts/GetFields/GetFields.yml @@ -7,22 +7,22 @@ args: description: The field to extract from each item (Optional). name: getField predefined: - - "" + - '' - auto: PREDEFINED - defaultValue: "false" + defaultValue: 'false' description: Whether the argument should be saved as a string (Optional). name: stringify predefined: - - "true" - - "false" + - 'true' + - 'false' comment: Retrieves fields from an object using dot notation commonfields: id: GetFields version: -1 contentitemexportablefields: contentitemfields: - fromServerVersion: "" -dockerimage: demisto/python3:3.10.12.63474 + fromServerVersion: '' +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: GetFields runas: DBotWeakRole diff --git a/Packs/CommunityCommonScripts/Scripts/GetFilePathPreProcessing/GetFilePathPreProcessing.yml b/Packs/CommunityCommonScripts/Scripts/GetFilePathPreProcessing/GetFilePathPreProcessing.yml index e443a3536e83..b5fd53437265 100644 --- a/Packs/CommunityCommonScripts/Scripts/GetFilePathPreProcessing/GetFilePathPreProcessing.yml +++ b/Packs/CommunityCommonScripts/Scripts/GetFilePathPreProcessing/GetFilePathPreProcessing.yml @@ -1,14 +1,15 @@ -comment: |- - This is a pre-processing script that is used to create the attachments of incoming incidents in an existing incident, then drop the incoming incident. +comment: 'This is a pre-processing script that is used to create the attachments of incoming incidents in an existing incident, then drop the incoming incident. + It should be configured as a pre-processing rule, and the logic for finding the right incident should be added to the code manually. - The automation collects the paths and names of the attachments of the incoming incident and passes it to the "CreateFileFromPathObject" automation that is being executed on the existing incident + + The automation collects the paths and names of the attachments of the incoming incident and passes it to the "CreateFileFromPathObject" automation that is being executed on the existing incident' commonfields: id: GetFilePathPreProcessing version: -1 contentitemexportablefields: contentitemfields: fromServerVersion: '' -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: GetFilePathPreProcessing runas: DBotWeakRole diff --git a/Packs/CommunityCommonScripts/Scripts/IPCalcCheckSubnetCollision/IPCalcCheckSubnetCollision.yml b/Packs/CommunityCommonScripts/Scripts/IPCalcCheckSubnetCollision/IPCalcCheckSubnetCollision.yml index 25dcaf20d3bb..43a73d0978c6 100644 --- a/Packs/CommunityCommonScripts/Scripts/IPCalcCheckSubnetCollision/IPCalcCheckSubnetCollision.yml +++ b/Packs/CommunityCommonScripts/Scripts/IPCalcCheckSubnetCollision/IPCalcCheckSubnetCollision.yml @@ -24,7 +24,7 @@ script: '-' subtype: python3 timeout: '0' type: python -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 tests: - No tests fromversion: 6.0.0 diff --git a/Packs/CommunityCommonScripts/Scripts/IPCalcReturnAddressBinary/IPCalcReturnAddressBinary.yml b/Packs/CommunityCommonScripts/Scripts/IPCalcReturnAddressBinary/IPCalcReturnAddressBinary.yml index 56b302ea4c4f..9976771f1851 100644 --- a/Packs/CommunityCommonScripts/Scripts/IPCalcReturnAddressBinary/IPCalcReturnAddressBinary.yml +++ b/Packs/CommunityCommonScripts/Scripts/IPCalcReturnAddressBinary/IPCalcReturnAddressBinary.yml @@ -18,7 +18,7 @@ script: '-' subtype: python3 timeout: '0' type: python -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 tests: - No tests fromversion: 6.0.0 diff --git a/Packs/CommunityCommonScripts/Scripts/IPCalcReturnAddressIANAAllocation/IPCalcReturnAddressIANAAllocation.yml b/Packs/CommunityCommonScripts/Scripts/IPCalcReturnAddressIANAAllocation/IPCalcReturnAddressIANAAllocation.yml index 56db5c149a8c..f515edb65ac6 100644 --- a/Packs/CommunityCommonScripts/Scripts/IPCalcReturnAddressIANAAllocation/IPCalcReturnAddressIANAAllocation.yml +++ b/Packs/CommunityCommonScripts/Scripts/IPCalcReturnAddressIANAAllocation/IPCalcReturnAddressIANAAllocation.yml @@ -18,7 +18,7 @@ script: '-' subtype: python3 timeout: '0' type: python -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 tests: - No tests fromversion: 6.0.0 diff --git a/Packs/CommunityCommonScripts/Scripts/IPCalcReturnSubnetAddresses/IPCalcReturnSubnetAddresses.yml b/Packs/CommunityCommonScripts/Scripts/IPCalcReturnSubnetAddresses/IPCalcReturnSubnetAddresses.yml index 0245e7b9e89a..b3cc5581fc83 100644 --- a/Packs/CommunityCommonScripts/Scripts/IPCalcReturnSubnetAddresses/IPCalcReturnSubnetAddresses.yml +++ b/Packs/CommunityCommonScripts/Scripts/IPCalcReturnSubnetAddresses/IPCalcReturnSubnetAddresses.yml @@ -15,7 +15,7 @@ script: '-' subtype: python3 timeout: '0' type: python -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 tests: - No tests fromversion: 6.0.0 diff --git a/Packs/CommunityCommonScripts/Scripts/IPCalcReturnSubnetBroadcastAddress/IPCalcReturnSubnetBroadcastAddress.yml b/Packs/CommunityCommonScripts/Scripts/IPCalcReturnSubnetBroadcastAddress/IPCalcReturnSubnetBroadcastAddress.yml index e67d89183cb4..43f75a1218e2 100644 --- a/Packs/CommunityCommonScripts/Scripts/IPCalcReturnSubnetBroadcastAddress/IPCalcReturnSubnetBroadcastAddress.yml +++ b/Packs/CommunityCommonScripts/Scripts/IPCalcReturnSubnetBroadcastAddress/IPCalcReturnSubnetBroadcastAddress.yml @@ -15,7 +15,7 @@ script: '-' subtype: python3 timeout: '0' type: python -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 tests: - No tests fromversion: 6.0.0 diff --git a/Packs/CommunityCommonScripts/Scripts/IPCalcReturnSubnetNetwork/IPCalcReturnSubnetNetwork.yml b/Packs/CommunityCommonScripts/Scripts/IPCalcReturnSubnetNetwork/IPCalcReturnSubnetNetwork.yml index 7c012e27616a..6017afcf2351 100644 --- a/Packs/CommunityCommonScripts/Scripts/IPCalcReturnSubnetNetwork/IPCalcReturnSubnetNetwork.yml +++ b/Packs/CommunityCommonScripts/Scripts/IPCalcReturnSubnetNetwork/IPCalcReturnSubnetNetwork.yml @@ -15,7 +15,7 @@ script: '-' subtype: python3 timeout: '0' type: python -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 tests: - No tests fromversion: 6.0.0 diff --git a/Packs/CommunityCommonScripts/Scripts/InvertEveryTwoItems/InvertEveryTwoItems.yml b/Packs/CommunityCommonScripts/Scripts/InvertEveryTwoItems/InvertEveryTwoItems.yml index acea2e81a83d..00516aa27adb 100644 --- a/Packs/CommunityCommonScripts/Scripts/InvertEveryTwoItems/InvertEveryTwoItems.yml +++ b/Packs/CommunityCommonScripts/Scripts/InvertEveryTwoItems/InvertEveryTwoItems.yml @@ -1,15 +1,15 @@ args: - isArray: true name: value - description: "Input list" + description: Input list comment: "This transformer will invert every two items in an array.\nExample: \n[\"A\", \"B\", \"C\", \"D\"]\nResult:\n[\"B\", \"A\", \"D\", \"C\"]\n\nIf the total of items in the array is an odd number the last item will be removed\nExample:\n[\"A\", \"B\", \"C\", \"D\", \"E\"]\nResult:\n[\"B\", \"A\", \"D\", \"C\"]\n\nIf the item is not an array the output will be same passed object." commonfields: id: InvertEveryTwoItems version: -1 contentitemexportablefields: contentitemfields: - fromServerVersion: "" -dockerimage: demisto/python3:3.10.12.63474 + fromServerVersion: '' +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: InvertEveryTwoItems runas: DBotWeakRole diff --git a/Packs/CommunityCommonScripts/Scripts/MapRegex/MapRegex.yml b/Packs/CommunityCommonScripts/Scripts/MapRegex/MapRegex.yml index af60c624e2a8..edcf090b2639 100644 --- a/Packs/CommunityCommonScripts/Scripts/MapRegex/MapRegex.yml +++ b/Packs/CommunityCommonScripts/Scripts/MapRegex/MapRegex.yml @@ -4,24 +4,11 @@ args: required: true - description: A JSON dictionary that contains key:value pairs that represent the "Outcome":"Regex". name: json_regex -comment: |- - This transformer will take in a value and transform it based on multiple regular expressions defined in a JSON dictionary structure. The key:value pair of the JSON dictionary should be: - - "desired outcome": "regex to match" - - For example: - - { - "Match 1": ".*match 1.*", - "Match 2": ".*match 2.*", - "Catch all": ".*" - } - - The transformer will match in order of dictionary entries. +comment: "This transformer will take in a value and transform it based on multiple regular expressions defined in a JSON dictionary structure. The key:value pair of the JSON dictionary should be:\n\n\"desired outcome\": \"regex to match\"\n\nFor example:\n\n{\n \"Match 1\": \".*match 1.*\",\n \"Match 2\": \".*match 2.*\",\n \"Catch all\": \".*\"\n}\n\nThe transformer will match in order of dictionary entries." commonfields: id: MapRegex version: -1 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: MapRegex runas: DBotWeakRole diff --git a/Packs/CommunityCommonScripts/Scripts/MaxList/MaxList.yml b/Packs/CommunityCommonScripts/Scripts/MaxList/MaxList.yml index 3ed66fac3028..38a93389f306 100644 --- a/Packs/CommunityCommonScripts/Scripts/MaxList/MaxList.yml +++ b/Packs/CommunityCommonScripts/Scripts/MaxList/MaxList.yml @@ -8,7 +8,7 @@ comment: "Gets the maximum value from list\ne.g. [\"25\", \"10\", \"25\"] => \" commonfields: id: MaxList version: -1 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: MaxList runas: DBotWeakRole diff --git a/Packs/CommunityCommonScripts/Scripts/MinList/MinList.yml b/Packs/CommunityCommonScripts/Scripts/MinList/MinList.yml index e5a6f3881904..ddc00b80a071 100644 --- a/Packs/CommunityCommonScripts/Scripts/MinList/MinList.yml +++ b/Packs/CommunityCommonScripts/Scripts/MinList/MinList.yml @@ -8,7 +8,7 @@ comment: "Gets the minimum value from list\ne.g. [\"25\", \"10\", \"25\"] => \" commonfields: id: MinList version: -1 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: MinList runas: DBotWeakRole diff --git a/Packs/CommunityCommonScripts/Scripts/RandomElementFromList/RandomElementFromList.yml b/Packs/CommunityCommonScripts/Scripts/RandomElementFromList/RandomElementFromList.yml index fb4a31cd4436..d7614a39b059 100644 --- a/Packs/CommunityCommonScripts/Scripts/RandomElementFromList/RandomElementFromList.yml +++ b/Packs/CommunityCommonScripts/Scripts/RandomElementFromList/RandomElementFromList.yml @@ -11,7 +11,7 @@ comment: randomly select elements from a list in Python commonfields: id: RandomElementFromList version: -1 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: RandomElementFromList runas: DBotWeakRole diff --git a/Packs/CommunityCommonScripts/Scripts/RandomPhotoNasa/RandomPhotoNasa.yml b/Packs/CommunityCommonScripts/Scripts/RandomPhotoNasa/RandomPhotoNasa.yml index df90bab7862a..69b9f7be8e17 100644 --- a/Packs/CommunityCommonScripts/Scripts/RandomPhotoNasa/RandomPhotoNasa.yml +++ b/Packs/CommunityCommonScripts/Scripts/RandomPhotoNasa/RandomPhotoNasa.yml @@ -5,7 +5,7 @@ args: commonfields: id: RandomPhotoNasa version: -1 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: RandomPhotoNasa runas: DBotWeakRole diff --git a/Packs/CommunityCommonScripts/Scripts/SSLVerifier/SSLVerifier.yml b/Packs/CommunityCommonScripts/Scripts/SSLVerifier/SSLVerifier.yml index 6a049355ee32..28bfd71c0c72 100644 --- a/Packs/CommunityCommonScripts/Scripts/SSLVerifier/SSLVerifier.yml +++ b/Packs/CommunityCommonScripts/Scripts/SSLVerifier/SSLVerifier.yml @@ -14,7 +14,7 @@ args: - name: Port default: true description: Port to check - defaultValue: "443" + defaultValue: '443' outputs: - contextPath: SSLVerifier.Certificate.Expiry description: Time of expiration @@ -30,7 +30,7 @@ outputs: type: string scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole fromversion: 5.0.0 tests: diff --git a/Packs/CommunityCommonScripts/Scripts/StripAccentMarksFromString/StripAccentMarksFromString.yml b/Packs/CommunityCommonScripts/Scripts/StripAccentMarksFromString/StripAccentMarksFromString.yml index b0d1a4af1f31..2e0e25e8c9d6 100644 --- a/Packs/CommunityCommonScripts/Scripts/StripAccentMarksFromString/StripAccentMarksFromString.yml +++ b/Packs/CommunityCommonScripts/Scripts/StripAccentMarksFromString/StripAccentMarksFromString.yml @@ -2,14 +2,14 @@ args: - name: value required: true description: Value to strip accent marks from -comment: |- +comment: |- Strip accent marks (diacritics) from a given string. For example: "Niño שָׁלוֹם Montréal اَلسَّلَامُ عَلَيْكُمْ‎" Will return: "Nino שלום Montreal السلام عليكم" commonfields: id: StripAccentMarksFromString version: -1 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: StripAccentMarksFromString runas: DBotWeakRole diff --git a/Packs/CommunityCommonScripts/Scripts/isArrayItemInList/IsArrayItemInList.yml b/Packs/CommunityCommonScripts/Scripts/isArrayItemInList/IsArrayItemInList.yml index f39709366f8b..d0705a26a28a 100644 --- a/Packs/CommunityCommonScripts/Scripts/isArrayItemInList/IsArrayItemInList.yml +++ b/Packs/CommunityCommonScripts/Scripts/isArrayItemInList/IsArrayItemInList.yml @@ -6,17 +6,18 @@ args: - description: the XSOAR system list name. name: listName required: true -comment: |- - This automation is for comparing array(list) data of context to existing lists on XSOAR server. You can avoid using loop of sub-playbook. +comment: 'This automation is for comparing array(list) data of context to existing lists on XSOAR server. You can avoid using loop of sub-playbook. + inputArray: the context array/list data - listName: the XSOAR system list + + listName: the XSOAR system list' commonfields: id: isArrayItemInList version: -1 contentitemexportablefields: contentitemfields: - fromServerVersion: "" -dockerimage: demisto/python3:3.10.12.63474 + fromServerVersion: '' +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: isArrayItemInList runas: DBotWeakRole diff --git a/Packs/CommunityCommonScripts/pack_metadata.json b/Packs/CommunityCommonScripts/pack_metadata.json index 269011ea5636..10fd2dbdadfd 100644 --- a/Packs/CommunityCommonScripts/pack_metadata.json +++ b/Packs/CommunityCommonScripts/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Community Common Scripts", "description": "A pack that contains community scripts", "support": "community", - "currentVersion": "1.2.3", + "currentVersion": "1.2.4", "author": "", "url": "https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/bd-p/Cortex_XSOAR_Discussions", "email": "", @@ -22,4 +22,4 @@ "marketplacev2" ], "githubUser": [] -} +} \ No newline at end of file diff --git a/Packs/CyberChef/Integrations/CyberChef/CyberChef.yml b/Packs/CyberChef/Integrations/CyberChef/CyberChef.yml index 426d886033ca..ed07bf7f3397 100644 --- a/Packs/CyberChef/Integrations/CyberChef/CyberChef.yml +++ b/Packs/CyberChef/Integrations/CyberChef/CyberChef.yml @@ -53,7 +53,7 @@ script: - contextPath: CyberChef.Magic description: Output of the Magic operation type: string - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 runonce: false script: '' subtype: python3 diff --git a/Packs/CyberChef/ReleaseNotes/1_0_5.md b/Packs/CyberChef/ReleaseNotes/1_0_5.md new file mode 100644 index 000000000000..0c7c9d0866b4 --- /dev/null +++ b/Packs/CyberChef/ReleaseNotes/1_0_5.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### CyberChef + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/CyberChef/pack_metadata.json b/Packs/CyberChef/pack_metadata.json index 114d88e3f15c..351591dc44ed 100644 --- a/Packs/CyberChef/pack_metadata.json +++ b/Packs/CyberChef/pack_metadata.json @@ -2,7 +2,7 @@ "name": "CyberChef", "description": "Integration with your CyberChef server or https://prod.apifor.io service for CyberChef.", "support": "community", - "currentVersion": "1.0.4", + "currentVersion": "1.0.5", "author": "Harri Ruuttila", "url": "", "email": "", diff --git a/Packs/DNSOverHttps/Integrations/DNSOverHttps/DNSOverHttps.yml b/Packs/DNSOverHttps/Integrations/DNSOverHttps/DNSOverHttps.yml index 4303cee81de8..0ae9d03d6e7a 100644 --- a/Packs/DNSOverHttps/Integrations/DNSOverHttps/DNSOverHttps.yml +++ b/Packs/DNSOverHttps/Integrations/DNSOverHttps/DNSOverHttps.yml @@ -41,19 +41,19 @@ script: - DNSKEY - NS - auto: PREDEFINED - defaultValue: "True" + defaultValue: 'True' description: If you only want to return the answers name: only_answers predefined: - - "True" - - "False" + - 'True' + - 'False' description: Resolve a name to IP over HTTPS name: doh-resolve outputs: - contextPath: DNSoOverHTTPS.Results description: DNS query results type: list - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 script: '' subtype: python3 type: python diff --git a/Packs/DNSOverHttps/ReleaseNotes/1_0_5.md b/Packs/DNSOverHttps/ReleaseNotes/1_0_5.md new file mode 100644 index 000000000000..1a07431acfb7 --- /dev/null +++ b/Packs/DNSOverHttps/ReleaseNotes/1_0_5.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### DNSOverHttps + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/DNSOverHttps/pack_metadata.json b/Packs/DNSOverHttps/pack_metadata.json index d74b878cc1ce..eec3dc6c2202 100644 --- a/Packs/DNSOverHttps/pack_metadata.json +++ b/Packs/DNSOverHttps/pack_metadata.json @@ -2,7 +2,7 @@ "name": "DNSOverHttps", "description": "Use this pack to make DNS queries over HTTPS to Cloudflare or Google DoH service.", "support": "community", - "currentVersion": "1.0.4", + "currentVersion": "1.0.5", "author": "Harri Ruuttila", "url": "", "email": "", diff --git a/Packs/DeepL/Integrations/DeepL/DeepL.yml b/Packs/DeepL/Integrations/DeepL/DeepL.yml index 7d79e1957a77..56b2851f1be0 100644 --- a/Packs/DeepL/Integrations/DeepL/DeepL.yml +++ b/Packs/DeepL/Integrations/DeepL/DeepL.yml @@ -271,7 +271,7 @@ script: description: File Size - contextPath: InfoFile.Type description: File type e.g. "PDF" - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 runonce: false script: '' subtype: python3 diff --git a/Packs/DeepL/ReleaseNotes/1_2_4.md b/Packs/DeepL/ReleaseNotes/1_2_4.md new file mode 100644 index 000000000000..c0a72f8db8d8 --- /dev/null +++ b/Packs/DeepL/ReleaseNotes/1_2_4.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### DeepL + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/DeepL/pack_metadata.json b/Packs/DeepL/pack_metadata.json index 9298f7265311..9b3622ee5a1f 100644 --- a/Packs/DeepL/pack_metadata.json +++ b/Packs/DeepL/pack_metadata.json @@ -2,7 +2,7 @@ "name": "DeepL", "description": "Uses DeepL (https://www.deepl.com/) to translate text or files", "support": "community", - "currentVersion": "1.2.3", + "currentVersion": "1.2.4", "author": "Harri Ruuttila", "url": "", "email": "", diff --git a/Packs/DevSecOps/Integrations/DockerEngine/DockerEngine.py b/Packs/DevSecOps/Integrations/DockerEngine/DockerEngine.py index 2fcbfb31d0a8..c763df4eeaf8 100644 --- a/Packs/DevSecOps/Integrations/DockerEngine/DockerEngine.py +++ b/Packs/DevSecOps/Integrations/DockerEngine/DockerEngine.py @@ -16,7 +16,7 @@ def __init__(self, server_url, verify, proxy, headers, client_cert, client_key, self._verify = verify self._base_url = server_url self._proxy = proxy - self._headers = headers if headers else dict() + self._headers = headers if headers else {} self._client_cert = client_cert self._client_key = client_key diff --git a/Packs/DevSecOps/Integrations/DockerEngine/DockerEngine.yml b/Packs/DevSecOps/Integrations/DockerEngine/DockerEngine.yml index 0c8af8bd10ba..cc8eb032138c 100644 --- a/Packs/DevSecOps/Integrations/DockerEngine/DockerEngine.yml +++ b/Packs/DevSecOps/Integrations/DockerEngine/DockerEngine.yml @@ -107,7 +107,7 @@ script: - description: ID or name of the container name: id required: true - description: Get changes on a container’s filesystem + description: Get changes on a container's filesystem name: docker-container-changes outputs: - contextPath: Docker.ContainerChangeResponseItem.Path @@ -981,7 +981,7 @@ script: description: 'The network endpoint that the Engine advertises for the purpose of node discovery. ClusterAdvertise is a `host:port` combination on which the daemon is reachable by other hosts. p / /p Deprecated : This field is only propagated when using standalone Swarm mode, and overlay networking using an external k/v store. Overlay networks with Swarm mode enabled use the built-in raft store, and this field will be empty. ' type: String - contextPath: Docker.SystemInfo.Runtimes.path - description: "Name and, optional, path, of the OCI executable binary. If the path is omitted, the daemon searches the host's `$PATH` for the binary and uses the first result. " + description: "Name and, optional, path of the OCI executable binary. If the path is omitted, the daemon searches the host's `$PATH` for the binary and uses the first result. " type: String - contextPath: Docker.SystemInfo.DefaultRuntime description: 'Name of the default OCI runtime that is used when starting containers. The default can be overridden per-container at create time. ' @@ -1234,7 +1234,7 @@ script: - contextPath: Docker.ImageTag.Status Code description: Image Tag Result type: String - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 runonce: false script: '-' subtype: python3 diff --git a/Packs/DevSecOps/Integrations/LGTM/LGTM.yml b/Packs/DevSecOps/Integrations/LGTM/LGTM.yml index 7d530b2c15ac..d7f6cafa3006 100644 --- a/Packs/DevSecOps/Integrations/LGTM/LGTM.yml +++ b/Packs/DevSecOps/Integrations/LGTM/LGTM.yml @@ -29,10 +29,10 @@ script: - description: The URL of the repository to analyze. LGTM tests this against the [repository providers](https://lgtm.com/admin/help/adding-repository-providers) defined for the system. If it doesn't match any of them, the request fails. name: repository required: true - - description: 'Optional, a [language code](https://lgtm.com/help/lgtm/analysis-faqs#which-languages-are-supported) to specify which language to analyze. To request the analysis of more than one language, specify a query meter for each language. By default, LGTM tries to analyze all supported languages.' + - description: Optional, a [language code](https://lgtm.com/help/lgtm/analysis-faqs#which-languages-are-supported) to specify which language to analyze. To request the analysis of more than one language, specify a query meter for each language. By default, LGTM tries to analyze all supported languages. isArray: true name: language - - description: 'The analysis mode of the new project. When set to `full` all commits of the project are analyzed; when set to `sparse` the latest commit of the project is analyzed periodically; when set to `upload`, no automatic analysis is performed, instead externally-generated databases should be uploaded. For new projects the default value is `full`. The `mode` meter cannot be used to change the analysis mode of existing projects. Therefore, for existing projects, it should either be left blank or set to match the analysis mode of the project.' + - description: The analysis mode of the new project. When set to `full` all commits of the project are analyzed; when set to `sparse` the latest commit of the project is analyzed periodically; when set to `upload`, no automatic analysis is performed, instead externally-generated databases should be uploaded. For new projects the default value is `full`. The `mode` meter cannot be used to change the analysis mode of existing projects. Therefore, for existing projects, it should either be left blank or set to match the analysis mode of the project. name: mode - description: Required when `mode=upload`, specify the identifier of the commit used to generate the database. name: commit @@ -71,7 +71,7 @@ script: description: The analysis identifier. type: String - contextPath: LGTM.analysis_summary.commit-id - description: 'The commit identifier. The commit identifier is included only if the same commit was successfully analyzed for all languages. A detailed eakdown of which commit was analyzed for each language is provided in the `languages` property.' + description: The commit identifier. The commit identifier is included only if the same commit was successfully analyzed for all languages. A detailed eakdown of which commit was analyzed for each language is provided in the `languages` property. type: String - contextPath: LGTM.analysis_summary.languages.language description: The short name for the language. @@ -114,7 +114,7 @@ script: description: The analysis identifier. type: String - contextPath: LGTM.analysis_summary.commit-id - description: 'The commit identifier. The commit identifier is included only if the same commit was successfully analyzed for all languages. A detailed eakdown of which commit was analyzed for each language is provided in the `languages` property.' + description: The commit identifier. The commit identifier is included only if the same commit was successfully analyzed for all languages. A detailed eakdown of which commit was analyzed for each language is provided in the `languages` property. type: String - contextPath: LGTM.analysis_summary.languages.language description: The short name for the language. @@ -265,7 +265,7 @@ script: - description: The identifier of the commit to analyze. name: commit required: true - - description: 'The language codes of the languages to analyze. For a list of available languages, see [Supported languages](https://lgtm.com/help/lgtm/analysis-faqs#which-languages-are-supported). To specify more than one language, this meter can be repeated. If no language is specified, all the project''s languages will be analyzed.' + - description: The language codes of the languages to analyze. For a list of available languages, see [Supported languages](https://lgtm.com/help/lgtm/analysis-faqs#which-languages-are-supported). To specify more than one language, this meter can be repeated. If no language is specified, all the project's languages will be analyzed. isArray: true name: language description: Run analysis of a specific commit @@ -293,9 +293,9 @@ script: - description: Your reference number for the code review. name: external-id required: true - - description: 'The callback URL for LGTM to post to on completion of the review. When the code review is complete, the API sends an HTTP POST request to the callback URL with the result of the code review in the request body. The code review results in the request body are identical to the results accessed through the [`/codereviews/{review-id}`](https://lgtm.com/help/lgtm/api/api-v1#opIdgetCodeReview) end-point. If you specify a `callback-secret`, the request also includes an `x-lgtm-signature` header with a digital signature of the request''s contents.' + - description: The callback URL for LGTM to post to on completion of the review. When the code review is complete, the API sends an HTTP POST request to the callback URL with the result of the code review in the request body. The code review results in the request body are identical to the results accessed through the [`/codereviews/{review-id}`](https://lgtm.com/help/lgtm/api/api-v1#opIdgetCodeReview) end-point. If you specify a `callback-secret`, the request also includes an `x-lgtm-signature` header with a digital signature of the request's contents. name: callback-url - - description: 'The `callback-secret` is used to compute a signature which is included in the `x-lgtm-signature` header of the callback response. The receiver of the callback can check the validity of the response by computing the signature using HMAC-SHA1 and verifying that it matches the `x-lgtm-signature` header value. The HMAC algorithm requires byte sequences as inputs for both the secret and the message. The callback secret string must be converted to bytes using UTF-8 encoding. The response body should ideally be read as a plain byte sequence. Conversion to, for example a JSON object, and back to a byte sequence might change the formatting, and would invalidate the signature.' + - description: The `callback-secret` is used to compute a signature which is included in the `x-lgtm-signature` header of the callback response. The receiver of the callback can check the validity of the response by computing the signature using HMAC-SHA1 and verifying that it matches the `x-lgtm-signature` header value. The HMAC algorithm requires byte sequences as inputs for both the secret and the message. The callback secret string must be converted to bytes using UTF-8 encoding. The response body should ideally be read as a plain byte sequence. Conversion to, for example a JSON object, and back to a byte sequence might change the formatting, and would invalidate the signature. name: callback-secret - description: Entry ID of the Patch File , you can use git diff --binary to generate patch file name: patch-entry-id @@ -313,7 +313,7 @@ script: description: LGTM Code Review request task id type: Unknown - arguments: - - description: 'The [language](https://lgtm.com/help/lgtm/analysis-faqs#which-languages-are-supported) you want to analyze.' + - description: The [language](https://lgtm.com/help/lgtm/analysis-faqs#which-languages-are-supported) you want to analyze. name: language required: true - description: The identifier of the project to analyze. Either `project-id` or `projects-list` must be specified. @@ -384,7 +384,7 @@ script: description: Describes whether the query was sucessfully executed against the project. type: String - contextPath: LGTM.queryjob-results-overview.data.total - description: 'Number of results returned by the query. This is oken down further into `internal` and `external` results. Only applies if `status` is `success`.' + description: Number of results returned by the query. This is oken down further into `internal` and `external` results. Only applies if `status` is `success`. type: Number - contextPath: LGTM.queryjob-results-overview.data.internal description: Number of results that refer to elements within the source tree. Only applies if `status` is `success`. @@ -398,7 +398,7 @@ script: - contextPath: LGTM.queryjob-results-overview.next description: LGTM Query Job Results Overview Next type: String - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 runonce: false script: '-' subtype: python3 diff --git a/Packs/DevSecOps/ReleaseNotes/1_1_9.md b/Packs/DevSecOps/ReleaseNotes/1_1_9.md new file mode 100644 index 000000000000..33a9cf163984 --- /dev/null +++ b/Packs/DevSecOps/ReleaseNotes/1_1_9.md @@ -0,0 +1,9 @@ + +#### Integrations + +##### Docker Engine API + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### LGTM + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/DevSecOps/pack_metadata.json b/Packs/DevSecOps/pack_metadata.json index 3b1718cb947a..cdbcfce56c51 100644 --- a/Packs/DevSecOps/pack_metadata.json +++ b/Packs/DevSecOps/pack_metadata.json @@ -2,7 +2,7 @@ "name": "DevSecOps", "description": "DevSecOps CI/CD Orchestration Integration Pack.", "support": "community", - "currentVersion": "1.1.8", + "currentVersion": "1.1.9", "author": "Ayman Mahmoud", "githubUser": [ "ayman-m" @@ -20,4 +20,4 @@ "xsoar", "marketplacev2" ] -} +} \ No newline at end of file diff --git a/Packs/DeveloperTools/ReleaseNotes/1_3_18.md b/Packs/DeveloperTools/ReleaseNotes/1_3_18.md new file mode 100644 index 000000000000..cd34bd2ea380 --- /dev/null +++ b/Packs/DeveloperTools/ReleaseNotes/1_3_18.md @@ -0,0 +1,18 @@ + +#### Scripts + +##### VerifyObjectFieldsList + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### FetchFromInstance + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### VerifyEnoughIncidents + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### GetInstanceName + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### VerifyEnoughIndicators + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/DeveloperTools/Scripts/FetchFromInstance/FetchFromInstance.py b/Packs/DeveloperTools/Scripts/FetchFromInstance/FetchFromInstance.py index b718d2f02c87..239961da0c2a 100644 --- a/Packs/DeveloperTools/Scripts/FetchFromInstance/FetchFromInstance.py +++ b/Packs/DeveloperTools/Scripts/FetchFromInstance/FetchFromInstance.py @@ -30,22 +30,22 @@ def main(): instance_name = get_instance_name(args) instance_name = instance_name.replace(" ", "_") - command = '!{0}-fetch'.format(instance_name) + command = f'!{instance_name}-fetch' response = demisto.executeCommand(command, {}) try: if not response and expect_data: - raise Exception("Error occurred while fetching incidents from {}".format(instance_name)) + raise Exception(f"Error occurred while fetching incidents from {instance_name}") for inc in response: contents = inc.get('Contents', '') error_msg_in_incident = demisto.args().get('error_msg_in_incident') if error_msg_in_incident and error_msg_in_incident in str(contents): - return_error("Error message '{0}' encountered while fetching incidents from {1}: {2}".format( + return_error("Error message '{}' encountered while fetching incidents from {}: {}".format( error_msg_in_incident, instance_name, str(contents))) if re.match("invalid character \'[a-zA-Z]\' looking for beginning of value", str(contents), re.IGNORECASE): - return_error("Error occurred while fetching incidents from {0}: {1}".format(instance_name, str(contents))) + return_error(f"Error occurred while fetching incidents from {instance_name}: {str(contents)}") if add_to_context: try: for entry in contents: diff --git a/Packs/DeveloperTools/Scripts/FetchFromInstance/FetchFromInstance.yml b/Packs/DeveloperTools/Scripts/FetchFromInstance/FetchFromInstance.yml index bdd01a1c0995..78ef2f3bf328 100644 --- a/Packs/DeveloperTools/Scripts/FetchFromInstance/FetchFromInstance.yml +++ b/Packs/DeveloperTools/Scripts/FetchFromInstance/FetchFromInstance.yml @@ -14,19 +14,19 @@ args: description: The name of the instance you want to fetch from - name: expect_data description: Whether to expect data to return from the fetch - defaultValue: "true" + defaultValue: 'true' - name: brand_name description: The name of the brand you want to fetch from - name: add_to_context auto: PREDEFINED predefined: - - "true" - - "false" + - 'true' + - 'false' description: Add the raw JSON of incidents to context - defaultValue: "false" + defaultValue: 'false' - name: error_msg_in_incident description: If this error message appears in the contents of the fetched incidents, will return error - defaultValue: "Error" + defaultValue: Error outputs: - contextPath: FetchedIncidents description: All incidents entries (raw JSON) @@ -34,4 +34,4 @@ scripttarget: 0 runonce: false tests: - No test - cannot create a dummy integration inorder to test that -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 diff --git a/Packs/DeveloperTools/Scripts/GetInstanceName/GetInstanceName.py b/Packs/DeveloperTools/Scripts/GetInstanceName/GetInstanceName.py index e8d0e8bae919..e07cf0d9bd4a 100644 --- a/Packs/DeveloperTools/Scripts/GetInstanceName/GetInstanceName.py +++ b/Packs/DeveloperTools/Scripts/GetInstanceName/GetInstanceName.py @@ -1,10 +1,10 @@ import demistomock as demisto from CommonServerPython import * from CommonServerUserPython import * -from typing import Dict, Any, List +from typing import Any -def instance_check(instances, integration_name: str) -> List: +def instance_check(instances, integration_name: str) -> list: instance_names = [] for instance_name, details in instances.items(): if details.get('brand') == integration_name: @@ -13,7 +13,7 @@ def instance_check(instances, integration_name: str) -> List: return instance_names -def get_instance_name_command(args: Dict[str, Any]) -> CommandResults: +def get_instance_name_command(args: dict[str, Any]) -> CommandResults: integration_name = args.get('integration_name', '') instances = demisto.getModules() diff --git a/Packs/DeveloperTools/Scripts/GetInstanceName/GetInstanceName.yml b/Packs/DeveloperTools/Scripts/GetInstanceName/GetInstanceName.yml index e8e91919bfd5..4e9ee03a605b 100644 --- a/Packs/DeveloperTools/Scripts/GetInstanceName/GetInstanceName.yml +++ b/Packs/DeveloperTools/Scripts/GetInstanceName/GetInstanceName.yml @@ -26,7 +26,7 @@ tags: timeout: '0' type: python subtype: python3 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 fromversion: 6.0.0 tests: - No test diff --git a/Packs/DeveloperTools/Scripts/VerifyEnoughIncidents/VerifyEnoughIncidents.yml b/Packs/DeveloperTools/Scripts/VerifyEnoughIncidents/VerifyEnoughIncidents.yml index 50efdceb7335..baca1191bb83 100644 --- a/Packs/DeveloperTools/Scripts/VerifyEnoughIncidents/VerifyEnoughIncidents.yml +++ b/Packs/DeveloperTools/Scripts/VerifyEnoughIncidents/VerifyEnoughIncidents.yml @@ -27,7 +27,7 @@ outputs: type: boolean scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole tests: - No test diff --git a/Packs/DeveloperTools/Scripts/VerifyEnoughIndicators/VerifyEnoughIndicators.yml b/Packs/DeveloperTools/Scripts/VerifyEnoughIndicators/VerifyEnoughIndicators.yml index 726d2be4b1dc..edd36b61737c 100644 --- a/Packs/DeveloperTools/Scripts/VerifyEnoughIndicators/VerifyEnoughIndicators.yml +++ b/Packs/DeveloperTools/Scripts/VerifyEnoughIndicators/VerifyEnoughIndicators.yml @@ -27,7 +27,7 @@ outputs: type: boolean scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole tests: - No test diff --git a/Packs/DeveloperTools/Scripts/VerifyObjectFieldsList/VerifyObjectFieldsList.py b/Packs/DeveloperTools/Scripts/VerifyObjectFieldsList/VerifyObjectFieldsList.py index 628d85cca0e4..d271c61099f1 100644 --- a/Packs/DeveloperTools/Scripts/VerifyObjectFieldsList/VerifyObjectFieldsList.py +++ b/Packs/DeveloperTools/Scripts/VerifyObjectFieldsList/VerifyObjectFieldsList.py @@ -1,7 +1,7 @@ import demistomock as demisto # noqa: F401 from CommonServerPython import * # noqa: F401 -from typing import Dict, Any, Tuple +from typing import Any def check_components(components: list, context: Any): @@ -21,7 +21,7 @@ def check_components(components: list, context: Any): raise KeyError -def check_fields(fields_to_search_array: list, context_json) -> Tuple[bool, Any]: +def check_fields(fields_to_search_array: list, context_json) -> tuple[bool, Any]: """ Args: fields_to_search_array(list): list of fields to search @@ -42,7 +42,7 @@ def check_fields(fields_to_search_array: list, context_json) -> Tuple[bool, Any] return True, None -def check_fields_command(args: Dict[str, Any]) -> CommandResults: +def check_fields_command(args: dict[str, Any]) -> CommandResults: """ Args: args(dict): args from demisto diff --git a/Packs/DeveloperTools/Scripts/VerifyObjectFieldsList/VerifyObjectFieldsList.yml b/Packs/DeveloperTools/Scripts/VerifyObjectFieldsList/VerifyObjectFieldsList.yml index 510e9c209e05..547b07f3bef7 100644 --- a/Packs/DeveloperTools/Scripts/VerifyObjectFieldsList/VerifyObjectFieldsList.yml +++ b/Packs/DeveloperTools/Scripts/VerifyObjectFieldsList/VerifyObjectFieldsList.yml @@ -22,7 +22,7 @@ tags: timeout: '0' type: python subtype: python3 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 fromversion: 6.0.0 tests: - No test diff --git a/Packs/DeveloperTools/pack_metadata.json b/Packs/DeveloperTools/pack_metadata.json index 8c50c3684c13..76172ac21d0c 100644 --- a/Packs/DeveloperTools/pack_metadata.json +++ b/Packs/DeveloperTools/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Developer Tools", "description": "Basic tools for content development.", "support": "community", - "currentVersion": "1.3.17", + "currentVersion": "1.3.18", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Drift/Integrations/Drift/Drift.py b/Packs/Drift/Integrations/Drift/Drift.py index 9a0401373462..0d6f78a2a280 100644 --- a/Packs/Drift/Integrations/Drift/Drift.py +++ b/Packs/Drift/Integrations/Drift/Drift.py @@ -18,7 +18,7 @@ def post_contact(self, email: dict = None): def get_contact(self, contact_id: str = None, email: str = None): url_suffix = '/contacts' - params = dict() + params = {} if contact_id: url_suffix = f"{url_suffix}/{contact_id}" elif email: diff --git a/Packs/Drift/Integrations/Drift/Drift.yml b/Packs/Drift/Integrations/Drift/Drift.yml index d1d4046e3b12..04403a98fd25 100644 --- a/Packs/Drift/Integrations/Drift/Drift.yml +++ b/Packs/Drift/Integrations/Drift/Drift.yml @@ -86,7 +86,7 @@ script: - contextPath: Drift.Contacts.Attributes description: Attributes of the contact (JSON dict). description: 'Post New Contact using a new contact Email ' - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 runonce: false subtype: python3 fromversion: 6.2.0 diff --git a/Packs/Drift/ReleaseNotes/1_0_4.md b/Packs/Drift/ReleaseNotes/1_0_4.md new file mode 100644 index 000000000000..b826959d263a --- /dev/null +++ b/Packs/Drift/ReleaseNotes/1_0_4.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Drift + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/Drift/pack_metadata.json b/Packs/Drift/pack_metadata.json index c7a23263de4c..9c4d60da4805 100644 --- a/Packs/Drift/pack_metadata.json +++ b/Packs/Drift/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Drift", "description": "Drift Pack containing integrations with the Drift API", "support": "community", - "currentVersion": "1.0.3", + "currentVersion": "1.0.4", "author": "Adriana Rose Diaz", "url": "https://devdocs.drift.com/docs/using-drift-apis", "email": "", diff --git a/Packs/EDLMonitor/Integrations/EDLMonitor/EDLMonitor.py b/Packs/EDLMonitor/Integrations/EDLMonitor/EDLMonitor.py index a3d728932c71..f5fa48f53e3e 100644 --- a/Packs/EDLMonitor/Integrations/EDLMonitor/EDLMonitor.py +++ b/Packs/EDLMonitor/Integrations/EDLMonitor/EDLMonitor.py @@ -172,6 +172,7 @@ def check_edl(cmd, start_time, EDL, edl_user, edl_pwd, verify_certificate, email return ["Success"] elif cmd == "get-edl-contents": return [csv_string, pull_time] + return None ''' MAIN FUNCTION ''' diff --git a/Packs/EDLMonitor/Integrations/EDLMonitor/EDLMonitor.yml b/Packs/EDLMonitor/Integrations/EDLMonitor/EDLMonitor.yml index b3801e01ac18..9828366d2b25 100644 --- a/Packs/EDLMonitor/Integrations/EDLMonitor/EDLMonitor.yml +++ b/Packs/EDLMonitor/Integrations/EDLMonitor/EDLMonitor.yml @@ -4,7 +4,7 @@ commonfields: version: -1 configuration: - additionalinfo: Timeout (in seconds) for how long to wait for EDL response before detecting as down (default 2 minutes) - defaultvalue: "120" + defaultvalue: '120' display: 'Timeout:' name: timeout type: 0 @@ -86,7 +86,7 @@ script: - contextPath: ResponseCode description: The response code. type: number - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 runonce: false script: '' subtype: python3 diff --git a/Packs/EDLMonitor/ReleaseNotes/1_0_2.md b/Packs/EDLMonitor/ReleaseNotes/1_0_2.md new file mode 100644 index 000000000000..78dfffacf08c --- /dev/null +++ b/Packs/EDLMonitor/ReleaseNotes/1_0_2.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### EDL Monitor + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/EDLMonitor/pack_metadata.json b/Packs/EDLMonitor/pack_metadata.json index 9dca0081ae30..bf568652e756 100644 --- a/Packs/EDLMonitor/pack_metadata.json +++ b/Packs/EDLMonitor/pack_metadata.json @@ -2,12 +2,14 @@ "name": "EDL Monitor", "description": "This content pack can monitor EDL contents a by emailing the content of an EDL as a zipped file to a specified user at an interval (simply configure a job to run the playbook included), and/or simply monitor the EDL for availability and email the user if the EDL is not available", "support": "community", - "currentVersion": "1.0.1", + "currentVersion": "1.0.2", "author": "Andrew Murret", "url": "", "email": "", "created": "2023-04-03T14:42:50Z", - "categories": ["Utilities"], + "categories": [ + "Utilities" + ], "tags": [], "useCases": [], "keywords": [], diff --git a/Packs/F5LTM/Integrations/F5LTM/F5LTM.py b/Packs/F5LTM/Integrations/F5LTM/F5LTM.py index 60bdba71ca25..c0f058f118f8 100644 --- a/Packs/F5LTM/Integrations/F5LTM/F5LTM.py +++ b/Packs/F5LTM/Integrations/F5LTM/F5LTM.py @@ -289,7 +289,7 @@ def ltm_get_node_by_address_command(client, args): outputs=node, ) return_error(f'No nodes found matching the address: {ip_address}') - return + return None def ltm_get_pools_by_node_command(client, args) -> CommandResults: diff --git a/Packs/F5LTM/Integrations/F5LTM/F5LTM.yml b/Packs/F5LTM/Integrations/F5LTM/F5LTM.yml index e3084a26951b..7de1fd69e819 100644 --- a/Packs/F5LTM/Integrations/F5LTM/F5LTM.yml +++ b/Packs/F5LTM/Integrations/F5LTM/F5LTM.yml @@ -517,7 +517,7 @@ script: - contextPath: F5.LTM.Nodes.name description: The node name type: String - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 runonce: false script: '-' subtype: python3 diff --git a/Packs/F5LTM/ReleaseNotes/1_0_9.md b/Packs/F5LTM/ReleaseNotes/1_0_9.md new file mode 100644 index 000000000000..4ac8c7471a9c --- /dev/null +++ b/Packs/F5LTM/ReleaseNotes/1_0_9.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### F5 LTM + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/F5LTM/pack_metadata.json b/Packs/F5LTM/pack_metadata.json index 469f477e0537..3c77a71d39ef 100644 --- a/Packs/F5LTM/pack_metadata.json +++ b/Packs/F5LTM/pack_metadata.json @@ -2,7 +2,7 @@ "name": "F5 LTM", "description": "You can use this pack to automate traffic management use cases in integration with F5 Local Traffic Manager (LTM), the integration with F5 LTM included with the pack comes with several commands to get LTM information about nodes, pools and pool members, along with that some of those commands can be used to automate remediation actions such as disabling an active node.", "support": "community", - "currentVersion": "1.0.8", + "currentVersion": "1.0.9", "author": "Ayman Mahmoud", "email": "amahmoud@paloaltonetworks.com", "url": "", diff --git a/Packs/FeedCyrenThreatInDepth/ReleaseNotes/1_5_25.md b/Packs/FeedCyrenThreatInDepth/ReleaseNotes/1_5_25.md new file mode 100644 index 000000000000..7c3e4e2c147e --- /dev/null +++ b/Packs/FeedCyrenThreatInDepth/ReleaseNotes/1_5_25.md @@ -0,0 +1,18 @@ + +#### Scripts + +##### CyrenCountryLookup + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### CyrenThreatInDepthRandomHunt + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### CyrenThreatInDepthRelatedWidgetQuick + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### CyrenThreatInDepthRelatedWidget + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### CyrenThreatInDepthRenderRelated + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/FeedCyrenThreatInDepth/Scripts/CyrenCountryLookup/CyrenCountryLookup.py b/Packs/FeedCyrenThreatInDepth/Scripts/CyrenCountryLookup/CyrenCountryLookup.py index e8dbe83c684a..aaa2588818ce 100644 --- a/Packs/FeedCyrenThreatInDepth/Scripts/CyrenCountryLookup/CyrenCountryLookup.py +++ b/Packs/FeedCyrenThreatInDepth/Scripts/CyrenCountryLookup/CyrenCountryLookup.py @@ -4,257 +4,257 @@ # ISO 3166-1-derived mapping (begin) -COUNTRIES = dict( - AW=dict(name="Aruba"), - AF=dict(name="Afghanistan"), - AO=dict(name="Angola"), - AI=dict(name="Anguilla"), - AX=dict(name="Åland Islands"), - AL=dict(name="Albania"), - AD=dict(name="Andorra"), - AE=dict(name="United Arab Emirates"), - AR=dict(name="Argentina"), - AM=dict(name="Armenia"), - AS=dict(name="American Samoa"), - AQ=dict(name="Antarctica"), - TF=dict(name="French Southern Territories"), - AG=dict(name="Antigua and Barbuda"), - AU=dict(name="Australia"), - AT=dict(name="Austria"), - AZ=dict(name="Azerbaijan"), - BI=dict(name="Burundi"), - BE=dict(name="Belgium"), - BJ=dict(name="Benin"), - BQ=dict(name="Bonaire, Sint Eustatius and Saba"), - BF=dict(name="Burkina Faso"), - BD=dict(name="Bangladesh"), - BG=dict(name="Bulgaria"), - BH=dict(name="Bahrain"), - BS=dict(name="Bahamas"), - BA=dict(name="Bosnia and Herzegovina"), - BL=dict(name="Saint Barthélemy"), - BY=dict(name="Belarus"), - BZ=dict(name="Belize"), - BM=dict(name="Bermuda"), - BO=dict(name="Bolivia, Plurinational State of"), - BR=dict(name="Brazil"), - BB=dict(name="Barbados"), - BN=dict(name="Brunei Darussalam"), - BT=dict(name="Bhutan"), - BV=dict(name="Bouvet Island"), - BW=dict(name="Botswana"), - CF=dict(name="Central African Republic"), - CA=dict(name="Canada"), - CC=dict(name="Cocos (Keeling) Islands"), - CH=dict(name="Switzerland"), - CL=dict(name="Chile"), - CN=dict(name="China"), - CI=dict(name="Côte d'Ivoire"), - CM=dict(name="Cameroon"), - CD=dict(name="Congo, The Democratic Republic of the"), - CG=dict(name="Congo"), - CK=dict(name="Cook Islands"), - CO=dict(name="Colombia"), - KM=dict(name="Comoros"), - CV=dict(name="Cabo Verde"), - CR=dict(name="Costa Rica"), - CU=dict(name="Cuba"), - CW=dict(name="Curaçao"), - CX=dict(name="Christmas Island"), - KY=dict(name="Cayman Islands"), - CY=dict(name="Cyprus"), - CZ=dict(name="Czechia"), - DE=dict(name="Germany"), - DJ=dict(name="Djibouti"), - DM=dict(name="Dominica"), - DK=dict(name="Denmark"), - DO=dict(name="Dominican Republic"), - DZ=dict(name="Algeria"), - EC=dict(name="Ecuador"), - EG=dict(name="Egypt"), - ER=dict(name="Eritrea"), - EH=dict(name="Western Sahara"), - ES=dict(name="Spain"), - EE=dict(name="Estonia"), - ET=dict(name="Ethiopia"), - FI=dict(name="Finland"), - FJ=dict(name="Fiji"), - FK=dict(name="Falkland Islands (Malvinas)"), - FR=dict(name="France"), - FO=dict(name="Faroe Islands"), - FM=dict(name="Micronesia, Federated States of"), - GA=dict(name="Gabon"), - GB=dict(name="United Kingdom"), - GE=dict(name="Georgia"), - GG=dict(name="Guernsey"), - GH=dict(name="Ghana"), - GI=dict(name="Gibraltar"), - GN=dict(name="Guinea"), - GP=dict(name="Guadeloupe"), - GM=dict(name="Gambia"), - GW=dict(name="Guinea-Bissau"), - GQ=dict(name="Equatorial Guinea"), - GR=dict(name="Greece"), - GD=dict(name="Grenada"), - GL=dict(name="Greenland"), - GT=dict(name="Guatemala"), - GF=dict(name="French Guiana"), - GU=dict(name="Guam"), - GY=dict(name="Guyana"), - HK=dict(name="Hong Kong"), - HM=dict(name="Heard Island and McDonald Islands"), - HN=dict(name="Honduras"), - HR=dict(name="Croatia"), - HT=dict(name="Haiti"), - HU=dict(name="Hungary"), - ID=dict(name="Indonesia"), - IM=dict(name="Isle of Man"), - IN=dict(name="India"), - IO=dict(name="British Indian Ocean Territory"), - IE=dict(name="Ireland"), - IR=dict(name="Iran, Islamic Republic of"), - IQ=dict(name="Iraq"), - IS=dict(name="Iceland"), - IL=dict(name="Israel"), - IT=dict(name="Italy"), - JM=dict(name="Jamaica"), - JE=dict(name="Jersey"), - JO=dict(name="Jordan"), - JP=dict(name="Japan"), - KZ=dict(name="Kazakhstan"), - KE=dict(name="Kenya"), - KG=dict(name="Kyrgyzstan"), - KH=dict(name="Cambodia"), - KI=dict(name="Kiribati"), - KN=dict(name="Saint Kitts and Nevis"), - KR=dict(name="Korea, Republic of"), - KW=dict(name="Kuwait"), - LA=dict(name="Lao People's Democratic Republic"), - LB=dict(name="Lebanon"), - LR=dict(name="Liberia"), - LY=dict(name="Libya"), - LC=dict(name="Saint Lucia"), - LI=dict(name="Liechtenstein"), - LK=dict(name="Sri Lanka"), - LS=dict(name="Lesotho"), - LT=dict(name="Lithuania"), - LU=dict(name="Luxembourg"), - LV=dict(name="Latvia"), - MO=dict(name="Macao"), - MF=dict(name="Saint Martin (French part)"), - MA=dict(name="Morocco"), - MC=dict(name="Monaco"), - MD=dict(name="Moldova, Republic of"), - MG=dict(name="Madagascar"), - MV=dict(name="Maldives"), - MX=dict(name="Mexico"), - MH=dict(name="Marshall Islands"), - MK=dict(name="North Macedonia"), - ML=dict(name="Mali"), - MT=dict(name="Malta"), - MM=dict(name="Myanmar"), - ME=dict(name="Montenegro"), - MN=dict(name="Mongolia"), - MP=dict(name="Northern Mariana Islands"), - MZ=dict(name="Mozambique"), - MR=dict(name="Mauritania"), - MS=dict(name="Montserrat"), - MQ=dict(name="Martinique"), - MU=dict(name="Mauritius"), - MW=dict(name="Malawi"), - MY=dict(name="Malaysia"), - YT=dict(name="Mayotte"), - NA=dict(name="Namibia"), - NC=dict(name="New Caledonia"), - NE=dict(name="Niger"), - NF=dict(name="Norfolk Island"), - NG=dict(name="Nigeria"), - NI=dict(name="Nicaragua"), - NU=dict(name="Niue"), - NL=dict(name="Netherlands"), - NO=dict(name="Norway"), - NP=dict(name="Nepal"), - NR=dict(name="Nauru"), - NZ=dict(name="New Zealand"), - OM=dict(name="Oman"), - PK=dict(name="Pakistan"), - PA=dict(name="Panama"), - PN=dict(name="Pitcairn"), - PE=dict(name="Peru"), - PH=dict(name="Philippines"), - PW=dict(name="Palau"), - PG=dict(name="Papua New Guinea"), - PL=dict(name="Poland"), - PR=dict(name="Puerto Rico"), - KP=dict(name="Korea, Democratic People's Republic of"), - PT=dict(name="Portugal"), - PY=dict(name="Paraguay"), - PS=dict(name="Palestine, State of"), - PF=dict(name="French Polynesia"), - QA=dict(name="Qatar"), - RE=dict(name="Réunion"), - RO=dict(name="Romania"), - RU=dict(name="Russian Federation"), - RW=dict(name="Rwanda"), - SA=dict(name="Saudi Arabia"), - SD=dict(name="Sudan"), - SN=dict(name="Senegal"), - SG=dict(name="Singapore"), - GS=dict(name="South Georgia and the South Sandwich Islands"), - SH=dict(name="Saint Helena, Ascension and Tristan da Cunha"), - SJ=dict(name="Svalbard and Jan Mayen"), - SB=dict(name="Solomon Islands"), - SL=dict(name="Sierra Leone"), - SV=dict(name="El Salvador"), - SM=dict(name="San Marino"), - SO=dict(name="Somalia"), - PM=dict(name="Saint Pierre and Miquelon"), - RS=dict(name="Serbia"), - SS=dict(name="South Sudan"), - ST=dict(name="Sao Tome and Principe"), - SR=dict(name="Suriname"), - SK=dict(name="Slovakia"), - SI=dict(name="Slovenia"), - SE=dict(name="Sweden"), - SZ=dict(name="Eswatini"), - SX=dict(name="Sint Maarten (Dutch part)"), - SC=dict(name="Seychelles"), - SY=dict(name="Syrian Arab Republic"), - TC=dict(name="Turks and Caicos Islands"), - TD=dict(name="Chad"), - TG=dict(name="Togo"), - TH=dict(name="Thailand"), - TJ=dict(name="Tajikistan"), - TK=dict(name="Tokelau"), - TM=dict(name="Turkmenistan"), - TL=dict(name="Timor-Leste"), - TO=dict(name="Tonga"), - TT=dict(name="Trinidad and Tobago"), - TN=dict(name="Tunisia"), - TR=dict(name="Turkey"), - TV=dict(name="Tuvalu"), - TW=dict(name="Taiwan, Province of China"), - TZ=dict(name="Tanzania, United Republic of"), - UG=dict(name="Uganda"), - UA=dict(name="Ukraine"), - UM=dict(name="United States Minor Outlying Islands"), - UY=dict(name="Uruguay"), - US=dict(name="United States"), - UZ=dict(name="Uzbekistan"), - VA=dict(name="Holy See (Vatican City State)"), - VC=dict(name="Saint Vincent and the Grenadines"), - VE=dict(name="Venezuela, Bolivarian Republic of"), - VG=dict(name="Virgin Islands, British"), - VI=dict(name="Virgin Islands, U.S."), - VN=dict(name="Viet Nam"), - VU=dict(name="Vanuatu"), - WF=dict(name="Wallis and Futuna"), - WS=dict(name="Samoa"), - YE=dict(name="Yemen"), - ZA=dict(name="South Africa"), - ZM=dict(name="Zambia"), - ZW=dict(name="Zimbabwe"), -) +COUNTRIES = { + "AW": {"name": "Aruba"}, + "AF": {"name": "Afghanistan"}, + "AO": {"name": "Angola"}, + "AI": {"name": "Anguilla"}, + "AX": {"name": "Åland Islands"}, + "AL": {"name": "Albania"}, + "AD": {"name": "Andorra"}, + "AE": {"name": "United Arab Emirates"}, + "AR": {"name": "Argentina"}, + "AM": {"name": "Armenia"}, + "AS": {"name": "American Samoa"}, + "AQ": {"name": "Antarctica"}, + "TF": {"name": "French Southern Territories"}, + "AG": {"name": "Antigua and Barbuda"}, + "AU": {"name": "Australia"}, + "AT": {"name": "Austria"}, + "AZ": {"name": "Azerbaijan"}, + "BI": {"name": "Burundi"}, + "BE": {"name": "Belgium"}, + "BJ": {"name": "Benin"}, + "BQ": {"name": "Bonaire, Sint Eustatius and Saba"}, + "BF": {"name": "Burkina Faso"}, + "BD": {"name": "Bangladesh"}, + "BG": {"name": "Bulgaria"}, + "BH": {"name": "Bahrain"}, + "BS": {"name": "Bahamas"}, + "BA": {"name": "Bosnia and Herzegovina"}, + "BL": {"name": "Saint Barthélemy"}, + "BY": {"name": "Belarus"}, + "BZ": {"name": "Belize"}, + "BM": {"name": "Bermuda"}, + "BO": {"name": "Bolivia, Plurinational State of"}, + "BR": {"name": "Brazil"}, + "BB": {"name": "Barbados"}, + "BN": {"name": "Brunei Darussalam"}, + "BT": {"name": "Bhutan"}, + "BV": {"name": "Bouvet Island"}, + "BW": {"name": "Botswana"}, + "CF": {"name": "Central African Republic"}, + "CA": {"name": "Canada"}, + "CC": {"name": "Cocos (Keeling) Islands"}, + "CH": {"name": "Switzerland"}, + "CL": {"name": "Chile"}, + "CN": {"name": "China"}, + "CI": {"name": "Côte d'Ivoire"}, + "CM": {"name": "Cameroon"}, + "CD": {"name": "Congo, The Democratic Republic of the"}, + "CG": {"name": "Congo"}, + "CK": {"name": "Cook Islands"}, + "CO": {"name": "Colombia"}, + "KM": {"name": "Comoros"}, + "CV": {"name": "Cabo Verde"}, + "CR": {"name": "Costa Rica"}, + "CU": {"name": "Cuba"}, + "CW": {"name": "Curaçao"}, + "CX": {"name": "Christmas Island"}, + "KY": {"name": "Cayman Islands"}, + "CY": {"name": "Cyprus"}, + "CZ": {"name": "Czechia"}, + "DE": {"name": "Germany"}, + "DJ": {"name": "Djibouti"}, + "DM": {"name": "Dominica"}, + "DK": {"name": "Denmark"}, + "DO": {"name": "Dominican Republic"}, + "DZ": {"name": "Algeria"}, + "EC": {"name": "Ecuador"}, + "EG": {"name": "Egypt"}, + "ER": {"name": "Eritrea"}, + "EH": {"name": "Western Sahara"}, + "ES": {"name": "Spain"}, + "EE": {"name": "Estonia"}, + "ET": {"name": "Ethiopia"}, + "FI": {"name": "Finland"}, + "FJ": {"name": "Fiji"}, + "FK": {"name": "Falkland Islands (Malvinas)"}, + "FR": {"name": "France"}, + "FO": {"name": "Faroe Islands"}, + "FM": {"name": "Micronesia, Federated States of"}, + "GA": {"name": "Gabon"}, + "GB": {"name": "United Kingdom"}, + "GE": {"name": "Georgia"}, + "GG": {"name": "Guernsey"}, + "GH": {"name": "Ghana"}, + "GI": {"name": "Gibraltar"}, + "GN": {"name": "Guinea"}, + "GP": {"name": "Guadeloupe"}, + "GM": {"name": "Gambia"}, + "GW": {"name": "Guinea-Bissau"}, + "GQ": {"name": "Equatorial Guinea"}, + "GR": {"name": "Greece"}, + "GD": {"name": "Grenada"}, + "GL": {"name": "Greenland"}, + "GT": {"name": "Guatemala"}, + "GF": {"name": "French Guiana"}, + "GU": {"name": "Guam"}, + "GY": {"name": "Guyana"}, + "HK": {"name": "Hong Kong"}, + "HM": {"name": "Heard Island and McDonald Islands"}, + "HN": {"name": "Honduras"}, + "HR": {"name": "Croatia"}, + "HT": {"name": "Haiti"}, + "HU": {"name": "Hungary"}, + "ID": {"name": "Indonesia"}, + "IM": {"name": "Isle of Man"}, + "IN": {"name": "India"}, + "IO": {"name": "British Indian Ocean Territory"}, + "IE": {"name": "Ireland"}, + "IR": {"name": "Iran, Islamic Republic of"}, + "IQ": {"name": "Iraq"}, + "IS": {"name": "Iceland"}, + "IL": {"name": "Israel"}, + "IT": {"name": "Italy"}, + "JM": {"name": "Jamaica"}, + "JE": {"name": "Jersey"}, + "JO": {"name": "Jordan"}, + "JP": {"name": "Japan"}, + "KZ": {"name": "Kazakhstan"}, + "KE": {"name": "Kenya"}, + "KG": {"name": "Kyrgyzstan"}, + "KH": {"name": "Cambodia"}, + "KI": {"name": "Kiribati"}, + "KN": {"name": "Saint Kitts and Nevis"}, + "KR": {"name": "Korea, Republic of"}, + "KW": {"name": "Kuwait"}, + "LA": {"name": "Lao People's Democratic Republic"}, + "LB": {"name": "Lebanon"}, + "LR": {"name": "Liberia"}, + "LY": {"name": "Libya"}, + "LC": {"name": "Saint Lucia"}, + "LI": {"name": "Liechtenstein"}, + "LK": {"name": "Sri Lanka"}, + "LS": {"name": "Lesotho"}, + "LT": {"name": "Lithuania"}, + "LU": {"name": "Luxembourg"}, + "LV": {"name": "Latvia"}, + "MO": {"name": "Macao"}, + "MF": {"name": "Saint Martin (French part)"}, + "MA": {"name": "Morocco"}, + "MC": {"name": "Monaco"}, + "MD": {"name": "Moldova, Republic of"}, + "MG": {"name": "Madagascar"}, + "MV": {"name": "Maldives"}, + "MX": {"name": "Mexico"}, + "MH": {"name": "Marshall Islands"}, + "MK": {"name": "North Macedonia"}, + "ML": {"name": "Mali"}, + "MT": {"name": "Malta"}, + "MM": {"name": "Myanmar"}, + "ME": {"name": "Montenegro"}, + "MN": {"name": "Mongolia"}, + "MP": {"name": "Northern Mariana Islands"}, + "MZ": {"name": "Mozambique"}, + "MR": {"name": "Mauritania"}, + "MS": {"name": "Montserrat"}, + "MQ": {"name": "Martinique"}, + "MU": {"name": "Mauritius"}, + "MW": {"name": "Malawi"}, + "MY": {"name": "Malaysia"}, + "YT": {"name": "Mayotte"}, + "NA": {"name": "Namibia"}, + "NC": {"name": "New Caledonia"}, + "NE": {"name": "Niger"}, + "NF": {"name": "Norfolk Island"}, + "NG": {"name": "Nigeria"}, + "NI": {"name": "Nicaragua"}, + "NU": {"name": "Niue"}, + "NL": {"name": "Netherlands"}, + "NO": {"name": "Norway"}, + "NP": {"name": "Nepal"}, + "NR": {"name": "Nauru"}, + "NZ": {"name": "New Zealand"}, + "OM": {"name": "Oman"}, + "PK": {"name": "Pakistan"}, + "PA": {"name": "Panama"}, + "PN": {"name": "Pitcairn"}, + "PE": {"name": "Peru"}, + "PH": {"name": "Philippines"}, + "PW": {"name": "Palau"}, + "PG": {"name": "Papua New Guinea"}, + "PL": {"name": "Poland"}, + "PR": {"name": "Puerto Rico"}, + "KP": {"name": "Korea, Democratic People's Republic of"}, + "PT": {"name": "Portugal"}, + "PY": {"name": "Paraguay"}, + "PS": {"name": "Palestine, State of"}, + "PF": {"name": "French Polynesia"}, + "QA": {"name": "Qatar"}, + "RE": {"name": "Réunion"}, + "RO": {"name": "Romania"}, + "RU": {"name": "Russian Federation"}, + "RW": {"name": "Rwanda"}, + "SA": {"name": "Saudi Arabia"}, + "SD": {"name": "Sudan"}, + "SN": {"name": "Senegal"}, + "SG": {"name": "Singapore"}, + "GS": {"name": "South Georgia and the South Sandwich Islands"}, + "SH": {"name": "Saint Helena, Ascension and Tristan da Cunha"}, + "SJ": {"name": "Svalbard and Jan Mayen"}, + "SB": {"name": "Solomon Islands"}, + "SL": {"name": "Sierra Leone"}, + "SV": {"name": "El Salvador"}, + "SM": {"name": "San Marino"}, + "SO": {"name": "Somalia"}, + "PM": {"name": "Saint Pierre and Miquelon"}, + "RS": {"name": "Serbia"}, + "SS": {"name": "South Sudan"}, + "ST": {"name": "Sao Tome and Principe"}, + "SR": {"name": "Suriname"}, + "SK": {"name": "Slovakia"}, + "SI": {"name": "Slovenia"}, + "SE": {"name": "Sweden"}, + "SZ": {"name": "Eswatini"}, + "SX": {"name": "Sint Maarten (Dutch part)"}, + "SC": {"name": "Seychelles"}, + "SY": {"name": "Syrian Arab Republic"}, + "TC": {"name": "Turks and Caicos Islands"}, + "TD": {"name": "Chad"}, + "TG": {"name": "Togo"}, + "TH": {"name": "Thailand"}, + "TJ": {"name": "Tajikistan"}, + "TK": {"name": "Tokelau"}, + "TM": {"name": "Turkmenistan"}, + "TL": {"name": "Timor-Leste"}, + "TO": {"name": "Tonga"}, + "TT": {"name": "Trinidad and Tobago"}, + "TN": {"name": "Tunisia"}, + "TR": {"name": "Turkey"}, + "TV": {"name": "Tuvalu"}, + "TW": {"name": "Taiwan, Province of China"}, + "TZ": {"name": "Tanzania, United Republic of"}, + "UG": {"name": "Uganda"}, + "UA": {"name": "Ukraine"}, + "UM": {"name": "United States Minor Outlying Islands"}, + "UY": {"name": "Uruguay"}, + "US": {"name": "United States"}, + "UZ": {"name": "Uzbekistan"}, + "VA": {"name": "Holy See (Vatican City State)"}, + "VC": {"name": "Saint Vincent and the Grenadines"}, + "VE": {"name": "Venezuela, Bolivarian Republic of"}, + "VG": {"name": "Virgin Islands, British"}, + "VI": {"name": "Virgin Islands, U.S."}, + "VN": {"name": "Viet Nam"}, + "VU": {"name": "Vanuatu"}, + "WF": {"name": "Wallis and Futuna"}, + "WS": {"name": "Samoa"}, + "YE": {"name": "Yemen"}, + "ZA": {"name": "South Africa"}, + "ZM": {"name": "Zambia"}, + "ZW": {"name": "Zimbabwe"}, +} # ISO 3166-1-derived mapping (end) diff --git a/Packs/FeedCyrenThreatInDepth/Scripts/CyrenCountryLookup/CyrenCountryLookup.yml b/Packs/FeedCyrenThreatInDepth/Scripts/CyrenCountryLookup/CyrenCountryLookup.yml index 97c07ad8548c..490adb70cadd 100644 --- a/Packs/FeedCyrenThreatInDepth/Scripts/CyrenCountryLookup/CyrenCountryLookup.yml +++ b/Packs/FeedCyrenThreatInDepth/Scripts/CyrenCountryLookup/CyrenCountryLookup.yml @@ -6,7 +6,7 @@ comment: Translates a country code provided by Cyren products to a full country commonfields: id: CyrenCountryLookup version: -1 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: CyrenCountryLookup script: '-' diff --git a/Packs/FeedCyrenThreatInDepth/Scripts/CyrenCountryLookup/CyrenCountryLookup_test.py b/Packs/FeedCyrenThreatInDepth/Scripts/CyrenCountryLookup/CyrenCountryLookup_test.py index 89767081785e..8728cafbed8a 100644 --- a/Packs/FeedCyrenThreatInDepth/Scripts/CyrenCountryLookup/CyrenCountryLookup_test.py +++ b/Packs/FeedCyrenThreatInDepth/Scripts/CyrenCountryLookup/CyrenCountryLookup_test.py @@ -16,15 +16,15 @@ def test_lookup(value, expected): """ from CyrenCountryLookup import lookup - assert lookup(dict(value=value)) == expected + assert lookup({"value": value}) == expected @pytest.mark.parametrize("args", [ - dict(), - dict(value=None), - dict(value=""), - dict(value=9), - dict(value=[]), + {}, + {"value": None}, + {"value": ""}, + {"value": 9}, + {"value": []}, ]) def test_lookup_error(args): """ diff --git a/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRandomHunt/CyrenThreatInDepthRandomHunt.py b/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRandomHunt/CyrenThreatInDepthRandomHunt.py index 36606bbba8af..13aec63be999 100644 --- a/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRandomHunt/CyrenThreatInDepthRandomHunt.py +++ b/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRandomHunt/CyrenThreatInDepthRandomHunt.py @@ -48,7 +48,7 @@ def create_random_hunt_incident(args): query = " ".join(query_parts) random_page = randrange(10) + 1 - res = demisto.executeCommand("findIndicators", dict(query=query, size=1, page=random_page)) + res = demisto.executeCommand("findIndicators", {"query": query, "size": 1, "page": random_page}) if isError(res[0]): raise DemistoException(f"Could not find any indicators: {res}") @@ -56,14 +56,14 @@ def create_random_hunt_incident(args): if not any(indicators): return simple_result(f"Could not find any indicators for \"{query}\"!") - incident = dict(name="Cyren Threat InDepth Threat Hunt", - type=incident_type, - details=yaml.dump(indicators[0])) + incident = {"name": "Cyren Threat InDepth Threat Hunt", + "type": incident_type, + "details": yaml.dump(indicators[0])} if assignee: incident["owner"] = assignee else: - res = demisto.executeCommand("getUsers", dict(current=True)) + res = demisto.executeCommand("getUsers", {"current": True}) if not isError(res[0]): current_user = res[0]["Contents"][0] current_user_id = current_user.get("id") @@ -74,10 +74,10 @@ def create_random_hunt_incident(args): raise DemistoException(f"Could not create new incident: {res}") created_incident = res[0] - id = created_incident.get("EntryContext", dict()).get("CreatedIncidentID") + id = created_incident.get("EntryContext", {}).get("CreatedIncidentID") data = f"Successfully created incident {incident['name']}.\n" \ f"Click here to investigate: [{id}](#/incident/{id})." - res = demisto.executeCommand("investigate", dict(id=id)) + res = demisto.executeCommand("investigate", {"id": id}) if isError(res[0]): data = data + "\n(An investigation has not been started.)" diff --git a/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRandomHunt/CyrenThreatInDepthRandomHunt.yml b/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRandomHunt/CyrenThreatInDepthRandomHunt.yml index 3526db9f0b0d..d546eb3cca57 100644 --- a/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRandomHunt/CyrenThreatInDepthRandomHunt.yml +++ b/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRandomHunt/CyrenThreatInDepthRandomHunt.yml @@ -12,18 +12,21 @@ args: name: incident_type - description: Specify the user you want to assign the new incident (optional, default is current user) name: assignee -comment: |- - This script will take a random Cyren Threat InDepth feed indicator and its relationships and create a threat hunting incident for you. +comment: 'This script will take a random Cyren Threat InDepth feed indicator and its relationships and create a threat hunting incident for you. + The main query parameters for the resulting, internal indicator query are: + 1. Seen for the first time by the feed source within the last 7 days. + 2. No investigation on it yet. - 3. Must have relationships to other indicators. + + 3. Must have relationships to other indicators.' commonfields: id: CyrenThreatInDepthRandomHunt version: -1 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: CyrenThreatInDepthRandomHunt script: '-' diff --git a/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRandomHunt/CyrenThreatInDepthRandomHunt_test.py b/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRandomHunt/CyrenThreatInDepthRandomHunt_test.py index 08462335162d..66643a7a484d 100644 --- a/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRandomHunt/CyrenThreatInDepthRandomHunt_test.py +++ b/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRandomHunt/CyrenThreatInDepthRandomHunt_test.py @@ -70,40 +70,41 @@ def inner(command, args=None): "Contents": [{}], } ] + return None return inner @pytest.mark.parametrize("args, expected_incident", [ ( - dict(), - dict(name="Cyren Threat InDepth Threat Hunt", type="Hunt", - details="indicator_type: URL\nvalue: http://google.de\n", owner="admin") + {}, + {"name": "Cyren Threat InDepth Threat Hunt", "type": "Hunt", + "details": "indicator_type: URL\nvalue: http://google.de\n", "owner": "admin"} ), ( - dict(assignee="other.user"), - dict(name="Cyren Threat InDepth Threat Hunt", type="Hunt", - details="indicator_type: URL\nvalue: http://google.de\n", owner="other.user") + {"assignee": "other.user"}, + {"name": "Cyren Threat InDepth Threat Hunt", "type": "Hunt", + "details": "indicator_type: URL\nvalue: http://google.de\n", "owner": "other.user"} ), ( - dict(assignee="other.user", incident_type="My Type"), - dict(name="Cyren Threat InDepth Threat Hunt", type="My Type", - details="indicator_type: URL\nvalue: http://google.de\n", owner="other.user") + {"assignee": "other.user", "incident_type": "My Type"}, + {"name": "Cyren Threat InDepth Threat Hunt", "type": "My Type", + "details": "indicator_type: URL\nvalue: http://google.de\n", "owner": "other.user"} ), ( - dict(indicator_type="ip_reputation"), - dict(name="Cyren Threat InDepth Threat Hunt", type="Hunt", - details="indicator_type: URL\nvalue: http://google.de\n", owner="admin") + {"indicator_type": "ip_reputation"}, + {"name": "Cyren Threat InDepth Threat Hunt", "type": "Hunt", + "details": "indicator_type: URL\nvalue: http://google.de\n", "owner": "admin"} ), ( - dict(incident_type="My Type"), - dict(name="Cyren Threat InDepth Threat Hunt", type="My Type", - details="indicator_type: URL\nvalue: http://google.de\n", owner="admin") + {"incident_type": "My Type"}, + {"name": "Cyren Threat InDepth Threat Hunt", "type": "My Type", + "details": "indicator_type: URL\nvalue: http://google.de\n", "owner": "admin"} ), ( - dict(indicator_type="ip_reputation", incident_type="My Type"), - dict(name="Cyren Threat InDepth Threat Hunt", type="My Type", - details="indicator_type: URL\nvalue: http://google.de\n", owner="admin") + {"indicator_type": "ip_reputation", "incident_type": "My Type"}, + {"name": "Cyren Threat InDepth Threat Hunt", "type": "My Type", + "details": "indicator_type: URL\nvalue: http://google.de\n", "owner": "admin"} ), ]) def test_create_random_hunt_incident(mocker, args, expected_incident): @@ -132,7 +133,7 @@ def test_create_random_hunt_incident_find_indicators_error(mocker): mocker.patch.object(demisto, "executeCommand", side_effect=executeCommand(find_indicators_error=True)) with pytest.raises(DemistoException): - create_random_hunt_incident(dict()) + create_random_hunt_incident({}) def test_create_random_hunt_incident_find_indicators_empty(mocker): @@ -144,7 +145,7 @@ def test_create_random_hunt_incident_find_indicators_empty(mocker): from CyrenThreatInDepthRandomHunt import create_random_hunt_incident mocker.patch.object(demisto, "executeCommand", side_effect=executeCommand(find_indicators_result=FIND_INDICATORS_EMPTY)) - result = create_random_hunt_incident(dict()) + result = create_random_hunt_incident({}) assert "Could not find any indicators for " in result.readable_output @@ -158,7 +159,7 @@ def test_create_random_hunt_incident_get_current_user_error(mocker): from CyrenThreatInDepthRandomHunt import create_random_hunt_incident mocker.patch.object(demisto, "executeCommand", side_effect=executeCommand(get_users_error=True)) - result = create_random_hunt_incident(dict()) + result = create_random_hunt_incident({}) assert result.readable_output == ("Successfully created incident Cyren Threat InDepth Threat Hunt.\n" "Click here to investigate: [1234](#/incident/1234).") @@ -175,7 +176,7 @@ def test_create_random_hunt_incident_create_new_incident_error(mocker): mocker.patch.object(demisto, "executeCommand", side_effect=executeCommand(create_new_incident_error=True)) with pytest.raises(DemistoException): - create_random_hunt_incident(dict()) + create_random_hunt_incident({}) def test_create_random_hunt_incident_investigate_error(mocker): @@ -187,7 +188,7 @@ def test_create_random_hunt_incident_investigate_error(mocker): from CyrenThreatInDepthRandomHunt import create_random_hunt_incident mocker.patch.object(demisto, "executeCommand", side_effect=executeCommand(investigate_error=True)) - result = create_random_hunt_incident(dict()) + result = create_random_hunt_incident({}) assert result.readable_output == ("Successfully created incident Cyren Threat InDepth Threat Hunt.\n" "Click here to investigate: [1234](#/incident/1234).\n" diff --git a/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRelatedWidget/CyrenThreatInDepthRelatedWidget.py b/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRelatedWidget/CyrenThreatInDepthRelatedWidget.py index 6f194dac8ed9..3780072150fa 100644 --- a/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRelatedWidget/CyrenThreatInDepthRelatedWidget.py +++ b/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRelatedWidget/CyrenThreatInDepthRelatedWidget.py @@ -8,7 +8,7 @@ def cyren_feed_relationship(args) -> CommandResults: if not indicator: raise ValueError("Please provide 'indicator' argument!") - result = demisto.executeCommand("CyrenThreatInDepthRenderRelated", dict(indicator=json.dumps(indicator))) + result = demisto.executeCommand("CyrenThreatInDepthRenderRelated", {"indicator": json.dumps(indicator)}) if is_error(result[0]): raise ValueError(f"Failed to render related: {str(get_error(result))}") diff --git a/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRelatedWidget/CyrenThreatInDepthRelatedWidget.yml b/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRelatedWidget/CyrenThreatInDepthRelatedWidget.yml index 6dd66cda20f6..928ea32c36a1 100644 --- a/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRelatedWidget/CyrenThreatInDepthRelatedWidget.yml +++ b/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRelatedWidget/CyrenThreatInDepthRelatedWidget.yml @@ -10,5 +10,5 @@ tags: - dynamic-indicator-section timeout: '0' type: python -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 fromversion: 6.0.0 diff --git a/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRelatedWidget/CyrenThreatInDepthRelatedWidget_test.py b/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRelatedWidget/CyrenThreatInDepthRelatedWidget_test.py index a8edeb1d8274..7e69a5af5520 100644 --- a/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRelatedWidget/CyrenThreatInDepthRelatedWidget_test.py +++ b/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRelatedWidget/CyrenThreatInDepthRelatedWidget_test.py @@ -24,6 +24,7 @@ def inner(command, args=None): if error: return ERROR return result + return None return inner @@ -37,10 +38,10 @@ def test_cyren_feed_relationship_normal(mocker): from CyrenThreatInDepthRelatedWidget import cyren_feed_relationship mocker.patch.object(demisto, "executeCommand", side_effect=executeCommand()) - args = dict(indicator=dict(some="value")) + args = {"indicator": {"some": "value"}} result = cyren_feed_relationship(args) - demisto.executeCommand.assert_any_call("CyrenThreatInDepthRenderRelated", dict(indicator="{\"some\": \"value\"}")) + demisto.executeCommand.assert_any_call("CyrenThreatInDepthRenderRelated", {"indicator": "{\"some\": \"value\"}"}) assert result.readable_output == "tha output!" @@ -54,7 +55,7 @@ def test_cyren_feed_relationship_no_indicator(mocker): mocker.patch.object(demisto, "executeCommand", side_effect=executeCommand()) with pytest.raises(ValueError): - cyren_feed_relationship(dict()) + cyren_feed_relationship({}) def test_cyren_feed_relationship_error_response(mocker): @@ -66,7 +67,7 @@ def test_cyren_feed_relationship_error_response(mocker): from CyrenThreatInDepthRelatedWidget import cyren_feed_relationship mocker.patch.object(demisto, "executeCommand", side_effect=executeCommand(error=True)) - args = dict(indicator=dict(some="value")) + args = {"indicator": {"some": "value"}} with pytest.raises(ValueError): cyren_feed_relationship(args) diff --git a/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRelatedWidgetQuick/CyrenThreatInDepthRelatedWidgetQuick.py b/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRelatedWidgetQuick/CyrenThreatInDepthRelatedWidgetQuick.py index 6584d7fbbb66..d91f1dbd3aba 100644 --- a/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRelatedWidgetQuick/CyrenThreatInDepthRelatedWidgetQuick.py +++ b/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRelatedWidgetQuick/CyrenThreatInDepthRelatedWidgetQuick.py @@ -10,8 +10,8 @@ def cyren_feed_relationship(args) -> CommandResults: if not indicator: raise ValueError("Please provide 'indicator' argument!") - result = demisto.executeCommand("CyrenThreatInDepthRenderRelated", dict(indicator=json.dumps(indicator), - columns="Indicator Type,Value")) + result = demisto.executeCommand("CyrenThreatInDepthRenderRelated", {"indicator": json.dumps(indicator), + "columns": "Indicator Type,Value"}) if is_error(result[0]): raise ValueError(f"Failed to render related: {str(get_error(result))}") diff --git a/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRelatedWidgetQuick/CyrenThreatInDepthRelatedWidgetQuick.yml b/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRelatedWidgetQuick/CyrenThreatInDepthRelatedWidgetQuick.yml index e1a50106216b..2744983a9785 100644 --- a/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRelatedWidgetQuick/CyrenThreatInDepthRelatedWidgetQuick.yml +++ b/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRelatedWidgetQuick/CyrenThreatInDepthRelatedWidgetQuick.yml @@ -10,5 +10,5 @@ tags: - dynamic-indicator-section timeout: '0' type: python -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 fromversion: 6.0.0 diff --git a/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRelatedWidgetQuick/CyrenThreatInDepthRelatedWidgetQuick_test.py b/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRelatedWidgetQuick/CyrenThreatInDepthRelatedWidgetQuick_test.py index 65f2eb7ed46f..de65a62ad3b6 100644 --- a/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRelatedWidgetQuick/CyrenThreatInDepthRelatedWidgetQuick_test.py +++ b/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRelatedWidgetQuick/CyrenThreatInDepthRelatedWidgetQuick_test.py @@ -24,6 +24,7 @@ def inner(command, args=None): if error: return ERROR return result + return None return inner @@ -37,12 +38,12 @@ def test_cyren_feed_relationship_normal(mocker): from CyrenThreatInDepthRelatedWidgetQuick import cyren_feed_relationship mocker.patch.object(demisto, "executeCommand", side_effect=executeCommand()) - args = dict(indicator=dict(some="value")) + args = {"indicator": {"some": "value"}} result = cyren_feed_relationship(args) demisto.executeCommand.assert_any_call("CyrenThreatInDepthRenderRelated", - dict(indicator="{\"some\": \"value\"}", - columns="Indicator Type,Value")) + {"indicator": "{\"some\": \"value\"}", + "columns": "Indicator Type,Value"}) assert result.readable_output == "tha output!" @@ -56,7 +57,7 @@ def test_cyren_feed_relationship_no_indicator(mocker): mocker.patch.object(demisto, "executeCommand", side_effect=executeCommand()) with pytest.raises(ValueError): - cyren_feed_relationship(dict()) + cyren_feed_relationship({}) def test_cyren_feed_relationship_error_response(mocker): @@ -68,7 +69,7 @@ def test_cyren_feed_relationship_error_response(mocker): from CyrenThreatInDepthRelatedWidgetQuick import cyren_feed_relationship mocker.patch.object(demisto, "executeCommand", side_effect=executeCommand(error=True)) - args = dict(indicator=dict(some="value")) + args = {"indicator": {"some": "value"}} with pytest.raises(ValueError): cyren_feed_relationship(args) diff --git a/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRenderRelated/CyrenThreatInDepthRenderRelated.yml b/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRenderRelated/CyrenThreatInDepthRenderRelated.yml index 29a933a5e283..de94f3e572b7 100644 --- a/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRenderRelated/CyrenThreatInDepthRenderRelated.yml +++ b/Packs/FeedCyrenThreatInDepth/Scripts/CyrenThreatInDepthRenderRelated/CyrenThreatInDepthRenderRelated.yml @@ -10,7 +10,7 @@ tags: - cyren timeout: '0' type: python -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 fromversion: 6.0.0 args: - description: The indicator that holds the relationships. As JSON representation. diff --git a/Packs/FeedCyrenThreatInDepth/pack_metadata.json b/Packs/FeedCyrenThreatInDepth/pack_metadata.json index ce755e00b2f8..172652047c43 100644 --- a/Packs/FeedCyrenThreatInDepth/pack_metadata.json +++ b/Packs/FeedCyrenThreatInDepth/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cyren Threat InDepth Threat Intelligence", "description": "Threat InDepth's actionable and contextualized intelligence helps enterprises improve their threat detection and response by providing unprecedented visibility into new email-borne security threats faster than other security vendors.", "support": "community", - "currentVersion": "1.5.24", + "currentVersion": "1.5.25", "author": "Cyren", "url": "", "email": "", diff --git a/Packs/FeedTalos/Integrations/FeedTalos/FeedTalos.yml b/Packs/FeedTalos/Integrations/FeedTalos/FeedTalos.yml index e222cd3e0f30..4c7bcfc7c21d 100644 --- a/Packs/FeedTalos/Integrations/FeedTalos/FeedTalos.yml +++ b/Packs/FeedTalos/Integrations/FeedTalos/FeedTalos.yml @@ -8,7 +8,7 @@ description: Use the Talos Feed integration to get indicators from the feed. configuration: - display: Fetch indicators name: feed - defaultvalue: "true" + defaultvalue: 'true' type: 8 required: false - display: Talos Endpoint URL @@ -50,7 +50,7 @@ configuration: - WHITE type: 15 required: false -- display: "" +- display: '' name: feedExpirationPolicy defaultvalue: suddenDeath type: 17 @@ -60,14 +60,14 @@ configuration: - indicatorType - suddenDeath required: false -- display: "" +- display: '' name: feedExpirationInterval - defaultvalue: "20160" + defaultvalue: '20160' type: 1 required: false - display: Feed Fetch Interval name: feedFetchInterval - defaultvalue: "30" + defaultvalue: '30' type: 19 required: false - display: Tags @@ -77,7 +77,7 @@ configuration: required: false - display: Bypass exclusion list name: feedBypassExclusionList - defaultvalue: "true" + defaultvalue: 'true' type: 8 additionalinfo: When selected, the exclusion list is ignored for indicators from this feed. This means that if an indicator from this feed is on the exclusion list, the indicator might still be added to the system. required: false @@ -97,9 +97,9 @@ script: arguments: - name: limit description: The maximum number of results to return. The default value is 10. - defaultValue: "10" + defaultValue: '10' description: Gets indicators from the feed. - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 feed: true subtype: python3 fromversion: 5.5.0 diff --git a/Packs/FeedTalos/ReleaseNotes/1_0_7.md b/Packs/FeedTalos/ReleaseNotes/1_0_7.md new file mode 100644 index 000000000000..c4a5986564c2 --- /dev/null +++ b/Packs/FeedTalos/ReleaseNotes/1_0_7.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Talos Feed + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/FeedTalos/pack_metadata.json b/Packs/FeedTalos/pack_metadata.json index 3cfb59c2b32d..dd9f611affcf 100644 --- a/Packs/FeedTalos/pack_metadata.json +++ b/Packs/FeedTalos/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Talos Feed", "description": "Talos Threat Intelligence IPv4 Feed", "support": "community", - "currentVersion": "1.0.6", + "currentVersion": "1.0.7", "author": "Guillermo Serrano", "url": "", "email": "", diff --git a/Packs/FortiAuthenticator/Integrations/FortiAuthenticator/FortiAuthenticator.yml b/Packs/FortiAuthenticator/Integrations/FortiAuthenticator/FortiAuthenticator.yml index 177b7afdee01..f9effe1e549f 100644 --- a/Packs/FortiAuthenticator/Integrations/FortiAuthenticator/FortiAuthenticator.yml +++ b/Packs/FortiAuthenticator/Integrations/FortiAuthenticator/FortiAuthenticator.yml @@ -46,7 +46,7 @@ script: - arguments: - auto: PREDEFINED defaultValue: 'true' - description: "Define user's active status: false = Disabled, true = enabled" + description: 'Define user''s active status: false = Disabled, true = enabled' name: active predefined: - 'true' @@ -66,7 +66,7 @@ script: description: The username that is defined in the User Information on FortiAuthenticator. name: fortiauthenticator-update-user description: Update the active status for specific user by email - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 runonce: false script: '' subtype: python3 diff --git a/Packs/FortiAuthenticator/ReleaseNotes/1_0_7.md b/Packs/FortiAuthenticator/ReleaseNotes/1_0_7.md new file mode 100644 index 000000000000..09fc96e31eed --- /dev/null +++ b/Packs/FortiAuthenticator/ReleaseNotes/1_0_7.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### FortiAuthenticator + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/FortiAuthenticator/pack_metadata.json b/Packs/FortiAuthenticator/pack_metadata.json index e932b65219fd..3b587bacdb36 100644 --- a/Packs/FortiAuthenticator/pack_metadata.json +++ b/Packs/FortiAuthenticator/pack_metadata.json @@ -2,7 +2,7 @@ "name": "FortiAuthenticator", "description": "Manage user configuration on FortiAuthenticator.", "support": "community", - "currentVersion": "1.0.6", + "currentVersion": "1.0.7", "author": "Jason Lo", "url": "", "email": "", diff --git a/Packs/FullHunt/Integrations/FullHunt/FullHunt.yml b/Packs/FullHunt/Integrations/FullHunt/FullHunt.yml index 57c2178ba976..52766a51d8d3 100644 --- a/Packs/FullHunt/Integrations/FullHunt/FullHunt.yml +++ b/Packs/FullHunt/Integrations/FullHunt/FullHunt.yml @@ -9,7 +9,7 @@ configuration: required: true section: Connect type: 0 -- display: "" +- display: '' displaypassword: API Key hiddenusername: true name: credentials @@ -23,7 +23,7 @@ configuration: type: 8 required: false - advanced: true - defaultvalue: "false" + defaultvalue: 'false' display: Use system proxy settings name: proxy section: Connect @@ -258,7 +258,7 @@ script: - contextPath: FullHunt.Subdomain.status description: HTTP status code type: number - dockerimage: demisto/python3:3.10.12.65389 + dockerimage: demisto/python3:3.10.14.100715 script: '' subtype: python3 type: python diff --git a/Packs/FullHunt/ReleaseNotes/1_0_4.md b/Packs/FullHunt/ReleaseNotes/1_0_4.md new file mode 100644 index 000000000000..53a939521777 --- /dev/null +++ b/Packs/FullHunt/ReleaseNotes/1_0_4.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### FullHunt + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/FullHunt/pack_metadata.json b/Packs/FullHunt/pack_metadata.json index f501a18372ac..13d73fb2a210 100644 --- a/Packs/FullHunt/pack_metadata.json +++ b/Packs/FullHunt/pack_metadata.json @@ -2,7 +2,7 @@ "name": "FullHunt", "description": "Integration with FullHunt, the attack surface database of the internet.\nFullHunt enables companies to discover all of their attack surfaces, monitor them for exposure, and continuously scan them for the latest security vulnerabilities.", "support": "community", - "currentVersion": "1.0.3", + "currentVersion": "1.0.4", "author": "@sam0x90", "url": "https://fullhunt.io/", "email": "", diff --git a/Packs/GigamonThreatINSIGHT/Integrations/GigamonThreatINSIGHT/GigamonThreatINSIGHT.yml b/Packs/GigamonThreatINSIGHT/Integrations/GigamonThreatINSIGHT/GigamonThreatINSIGHT.yml index 23c462539e61..2b7157fed0a4 100644 --- a/Packs/GigamonThreatINSIGHT/Integrations/GigamonThreatINSIGHT/GigamonThreatINSIGHT.yml +++ b/Packs/GigamonThreatINSIGHT/Integrations/GigamonThreatINSIGHT/GigamonThreatINSIGHT.yml @@ -318,13 +318,13 @@ script: - name: insight-get-telemetry-network arguments: - name: account_code - description: 'Account code to filter by.' + description: Account code to filter by. - name: interval auto: PREDEFINED predefined: - day - month_to_day - description: 'The interval to filter by (day, month_to_day).' + description: The interval to filter by (day, month_to_day). - name: latest_each_month description: "latest_each_month\tNo\tNo\tFilters out all but the latest day and month_to_date for each month." - name: sort_order @@ -332,16 +332,16 @@ script: predefined: - asc - desc - description: 'Sorts by account code first, then timestamp. asc or desc. The default is desc.' + description: Sorts by account code first, then timestamp. asc or desc. The default is desc. - name: limit description: 'The maximum number of records to return, default: 100, max: 1000.' defaultValue: '1000' - name: offset description: 'The number of records to skip past. Default: 0.' - name: start_date - description: 'Start date to filter by.' + description: Start date to filter by. - name: end_date - description: 'End date to filter by.' + description: End date to filter by. outputs: - contextPath: Insight.Telemetry.NetworkUsage.account_code description: The account code for the network usage. @@ -531,7 +531,7 @@ script: - status - device_ip - indicator_count - description: 'Field to sort by (first_seen, last_seen, status, device_ip, indicator_count).' + description: Field to sort by (first_seen, last_seen, status, device_ip, indicator_count). - name: sort_order auto: PREDEFINED predefined: @@ -891,8 +891,7 @@ script: - x509:san_ip.ip description: List of event fields to check for impacted devices description: Create a new detection rule. - - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 isfetch: true subtype: python3 fromversion: 6.5.0 diff --git a/Packs/GigamonThreatINSIGHT/ReleaseNotes/1_0_4.md b/Packs/GigamonThreatINSIGHT/ReleaseNotes/1_0_4.md new file mode 100644 index 000000000000..6b124fb621fb --- /dev/null +++ b/Packs/GigamonThreatINSIGHT/ReleaseNotes/1_0_4.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Gigamon ThreatINSIGHT + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/GigamonThreatINSIGHT/pack_metadata.json b/Packs/GigamonThreatINSIGHT/pack_metadata.json index 95828083ed7b..2015eb6026ba 100644 --- a/Packs/GigamonThreatINSIGHT/pack_metadata.json +++ b/Packs/GigamonThreatINSIGHT/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Gigamon ThreatINSIGHT", "description": "Gigamon ThreatINSIGHT allows a fast detection and effective response to active threats.", "support": "community", - "currentVersion": "1.0.3", + "currentVersion": "1.0.4", "author": "Gigamon", "url": "https://www.gigamon.com/products/detect-respond/gigamon-threatinsight.html", "email": "apps@gigamon.com", diff --git a/Packs/GoogleDorking/Integrations/GoogleDorking/GoogleDorking.yml b/Packs/GoogleDorking/Integrations/GoogleDorking/GoogleDorking.yml index 6faf49b01e5b..97dcdea21237 100644 --- a/Packs/GoogleDorking/Integrations/GoogleDorking/GoogleDorking.yml +++ b/Packs/GoogleDorking/Integrations/GoogleDorking/GoogleDorking.yml @@ -76,7 +76,7 @@ configuration: required: false - display: Maximum number of incidents per fetch name: max_fetch - defaultvalue: "100" + defaultvalue: '100' type: 0 required: false - display: First fetch time @@ -93,7 +93,7 @@ configuration: required: false - display: Incidents Fetch Interval name: incidentFetchInterval - defaultvalue: "60" + defaultvalue: '60' type: 19 required: false script: @@ -153,7 +153,7 @@ script: - name: urls description: Provide a single or comma separated list of sites from which to perform the search on. description: Use the google search engine to search a query. - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 isfetch: true subtype: python3 fromversion: 6.2.0 diff --git a/Packs/GoogleDorking/ReleaseNotes/1_0_4.md b/Packs/GoogleDorking/ReleaseNotes/1_0_4.md new file mode 100644 index 000000000000..8cbf8bf4643f --- /dev/null +++ b/Packs/GoogleDorking/ReleaseNotes/1_0_4.md @@ -0,0 +1,12 @@ + +#### Integrations + +##### Google Dorking + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. + +#### Scripts + +##### ExtractUsernames + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/GoogleDorking/Scripts/ExtractUsernames/ExtractUsernames.yml b/Packs/GoogleDorking/Scripts/ExtractUsernames/ExtractUsernames.yml index 89a43f210cd1..73b5d8810e32 100644 --- a/Packs/GoogleDorking/Scripts/ExtractUsernames/ExtractUsernames.yml +++ b/Packs/GoogleDorking/Scripts/ExtractUsernames/ExtractUsernames.yml @@ -20,7 +20,7 @@ outputs: type: string scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole fromversion: 6.2.0 tests: diff --git a/Packs/GoogleDorking/pack_metadata.json b/Packs/GoogleDorking/pack_metadata.json index 26dd81f94ef2..9a29cda31ad6 100644 --- a/Packs/GoogleDorking/pack_metadata.json +++ b/Packs/GoogleDorking/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Google Dorking", "description": "Automate the process of google dorking searches in order to detect leaked data.", "support": "community", - "currentVersion": "1.0.3", + "currentVersion": "1.0.4", "author": "David Baumstien", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Graylog/Integrations/Graylog/Graylog.yml b/Packs/Graylog/Integrations/Graylog/Graylog.yml index f1ebb00c3764..326e436fb838 100644 --- a/Packs/Graylog/Integrations/Graylog/Graylog.yml +++ b/Packs/Graylog/Integrations/Graylog/Graylog.yml @@ -102,10 +102,10 @@ script: description: Query (Lucene syntax) - name: range description: Relative timeframe to search in. Default 300s - defaultValue: "300" + defaultValue: '300' - name: limit description: Maximum number of messages to return. Default 20 - defaultValue: "20" + defaultValue: '20' - name: offset description: offset (integer) - name: filter @@ -117,8 +117,8 @@ script: - name: decorate auto: PREDEFINED predefined: - - "true" - - "false" + - 'true' + - 'false' description: Run decorators on search result (default True) outputs: - contextPath: Graylog.Search @@ -143,7 +143,7 @@ script: description: how many per page (integer) - name: timerange description: Relative timerange to search in seconds - defaultValue: "300" + defaultValue: '300' - name: sort_by description: how to sort outputs: @@ -164,7 +164,7 @@ script: description: Search for messages using an absolute timerange, specified as from/to with format yyyy-MM-ddTHH:mm:ss.SSSZ (e.g. 2014-01-23T15:34:49.000Z) or yyyy-MM-dd HH:mm:ss. - name: limit description: Maximum number of messages to return. - defaultValue: "20" + defaultValue: '20' - name: offset description: Offset - name: filter @@ -180,15 +180,15 @@ script: - name: decorate auto: PREDEFINED predefined: - - "true" - - "false" + - 'true' + - 'false' description: Run decorators on search result outputs: - contextPath: Graylog.SearchAbsolute description: Search results of Absolute search type: String description: Search with absolute times - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 isfetch: true subtype: python3 fromversion: 5.0.0 diff --git a/Packs/Graylog/ReleaseNotes/1_0_7.md b/Packs/Graylog/ReleaseNotes/1_0_7.md new file mode 100644 index 000000000000..68358050f104 --- /dev/null +++ b/Packs/Graylog/ReleaseNotes/1_0_7.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Graylog + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/Graylog/pack_metadata.json b/Packs/Graylog/pack_metadata.json index 8517f741a70a..eb3a563ff158 100644 --- a/Packs/Graylog/pack_metadata.json +++ b/Packs/Graylog/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Graylog", "description": "Integration with Graylog", "support": "community", - "currentVersion": "1.0.6", + "currentVersion": "1.0.7", "author": "Harri Ruuttila", "url": "https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/bd-p/Cortex_XSOAR_Discussions", "email": "", diff --git a/Packs/HealthCheck/ReleaseNotes/2_1_1.md b/Packs/HealthCheck/ReleaseNotes/2_1_1.md new file mode 100644 index 000000000000..57857bcc8127 --- /dev/null +++ b/Packs/HealthCheck/ReleaseNotes/2_1_1.md @@ -0,0 +1,54 @@ + +#### Scripts + +##### HealthCheckReadConf + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### HealthCheckReadTemeletryLog + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### HealthCheckNumberOfPartitions + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### HealthCheckUnpack + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### HealthCheckPanicLog + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### HealthCheckNumberOfLargeIncidents + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### HealthCheckServerLog + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### HealthCheckNumberOfLargeIOIncidents + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### HealthCheckGetLargestInputsAndOutputsInIncidents + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### HealthCheckOutdatedPacks + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### HealthCheckNumberOfEngines + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### HealthCheckFileSystem + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### HealthCheckDockerLog + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### HealthCheckReadVC + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### HealthCheckLicenseData + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### HealthCheckExportSummary + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### HealthCheckPacksInstalled + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/HealthCheck/Scripts/HealthCheckDockerLog/HealthCheckDockerLog.yml b/Packs/HealthCheck/Scripts/HealthCheckDockerLog/HealthCheckDockerLog.yml index 311937e059d8..1e00a20ac1e7 100644 --- a/Packs/HealthCheck/Scripts/HealthCheckDockerLog/HealthCheckDockerLog.yml +++ b/Packs/HealthCheck/Scripts/HealthCheckDockerLog/HealthCheckDockerLog.yml @@ -7,7 +7,7 @@ comment: Read docker log file commonfields: id: HealthCheckDockerLog version: -1 -dockerimage: demisto/python3:3.10.4.29342 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: HealthCheckDockerLog runas: DBotWeakRole diff --git a/Packs/HealthCheck/Scripts/HealthCheckExportSummary/HealthCheckExportSummary.yml b/Packs/HealthCheck/Scripts/HealthCheckExportSummary/HealthCheckExportSummary.yml index 5a471133afb5..b7811b00d5e6 100644 --- a/Packs/HealthCheck/Scripts/HealthCheckExportSummary/HealthCheckExportSummary.yml +++ b/Packs/HealthCheck/Scripts/HealthCheckExportSummary/HealthCheckExportSummary.yml @@ -2,7 +2,7 @@ comment: Export all Incident, Context and Widget data into Json format output. commonfields: id: HealthCheckExportSummary version: -1 -dockerimage: demisto/python3:3.10.4.29342 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: HealthCheckExportSummary runas: DBotWeakRole diff --git a/Packs/HealthCheck/Scripts/HealthCheckFileSystem/HealthCheckFileSystem.yml b/Packs/HealthCheck/Scripts/HealthCheckFileSystem/HealthCheckFileSystem.yml index 83902aabcfb1..6c9a3878d6ff 100644 --- a/Packs/HealthCheck/Scripts/HealthCheckFileSystem/HealthCheckFileSystem.yml +++ b/Packs/HealthCheck/Scripts/HealthCheckFileSystem/HealthCheckFileSystem.yml @@ -10,7 +10,7 @@ comment: read and parse filesystem.log commonfields: id: HealthCheckFileSystem version: -1 -dockerimage: demisto/python3:3.10.4.29342 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: HealthCheckFileSystem runas: DBotWeakRole diff --git a/Packs/HealthCheck/Scripts/HealthCheckGetLargestInputsAndOutputsInIncidents/HealthCheckGetLargestInputsAndOutputsInIncidents.yml b/Packs/HealthCheck/Scripts/HealthCheckGetLargestInputsAndOutputsInIncidents/HealthCheckGetLargestInputsAndOutputsInIncidents.yml index 309a57c4a17a..f66709b073d3 100644 --- a/Packs/HealthCheck/Scripts/HealthCheckGetLargestInputsAndOutputsInIncidents/HealthCheckGetLargestInputsAndOutputsInIncidents.yml +++ b/Packs/HealthCheck/Scripts/HealthCheckGetLargestInputsAndOutputsInIncidents/HealthCheckGetLargestInputsAndOutputsInIncidents.yml @@ -12,7 +12,7 @@ comment: Returns inputs and outputs larger than 1 MB from all Cortex XSOAR inves commonfields: id: HealthCheckGetLargestInputsAndOutputsInIncidents version: -1 -dockerimage: demisto/python3:3.10.4.29342 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: HealthCheckGetLargestInputsAndOutputsInIncidents runas: DBotWeakRole diff --git a/Packs/HealthCheck/Scripts/HealthCheckLicenseData/HealthCheckLicenseData.yml b/Packs/HealthCheck/Scripts/HealthCheckLicenseData/HealthCheckLicenseData.yml index 3cdad394c618..46bb59f72c16 100644 --- a/Packs/HealthCheck/Scripts/HealthCheckLicenseData/HealthCheckLicenseData.yml +++ b/Packs/HealthCheck/Scripts/HealthCheckLicenseData/HealthCheckLicenseData.yml @@ -7,7 +7,7 @@ comment: Read the license_data.log file extracted from the log bundle commonfields: id: HealthCheckLicenseData version: -1 -dockerimage: demisto/python3:3.10.8.37753 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: HealthCheckLicenseData outputs: diff --git a/Packs/HealthCheck/Scripts/HealthCheckNumberOfEngines/HealthCheckNumberOfEngines.yml b/Packs/HealthCheck/Scripts/HealthCheckNumberOfEngines/HealthCheckNumberOfEngines.yml index c43078f4cb2b..701a433d4cbf 100644 --- a/Packs/HealthCheck/Scripts/HealthCheckNumberOfEngines/HealthCheckNumberOfEngines.yml +++ b/Packs/HealthCheck/Scripts/HealthCheckNumberOfEngines/HealthCheckNumberOfEngines.yml @@ -2,7 +2,7 @@ comment: Presenting Number of engines commonfields: id: HealthCheckNumberOfEngines version: -1 -dockerimage: demisto/python3:3.10.4.29342 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: HealthCheckNumberOfEngines runas: DBotWeakRole diff --git a/Packs/HealthCheck/Scripts/HealthCheckNumberOfLargeIOIncidents/HealthCheckNumberOfLargeIOIncidents.yml b/Packs/HealthCheck/Scripts/HealthCheckNumberOfLargeIOIncidents/HealthCheckNumberOfLargeIOIncidents.yml index 130fa5a33d8a..595d1a63e082 100644 --- a/Packs/HealthCheck/Scripts/HealthCheckNumberOfLargeIOIncidents/HealthCheckNumberOfLargeIOIncidents.yml +++ b/Packs/HealthCheck/Scripts/HealthCheckNumberOfLargeIOIncidents/HealthCheckNumberOfLargeIOIncidents.yml @@ -2,7 +2,7 @@ comment: Widget Script to present the number of incidents with large input and o commonfields: id: HealthCheckNumberOfLargeIOIncidents version: -1 -dockerimage: demisto/python3:3.10.11.58677 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: HealthCheckNumberOfLargeIOIncidents runas: DBotWeakRole diff --git a/Packs/HealthCheck/Scripts/HealthCheckNumberOfLargeIncidents/HealthCheckNumberOfLargeIncidents.yml b/Packs/HealthCheck/Scripts/HealthCheckNumberOfLargeIncidents/HealthCheckNumberOfLargeIncidents.yml index e054c83b8a95..de22908a6ac0 100644 --- a/Packs/HealthCheck/Scripts/HealthCheckNumberOfLargeIncidents/HealthCheckNumberOfLargeIncidents.yml +++ b/Packs/HealthCheck/Scripts/HealthCheckNumberOfLargeIncidents/HealthCheckNumberOfLargeIncidents.yml @@ -2,7 +2,7 @@ comment: Widget Script to present the number of large incidents commonfields: id: HealthCheckNumberOfLargeIncidents version: -1 -dockerimage: demisto/python3:3.10.11.58677 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: HealthCheckNumberOfLargeIncidents runas: DBotWeakRole diff --git a/Packs/HealthCheck/Scripts/HealthCheckNumberOfPartitions/HealthCheckNumberOfPartitions.yml b/Packs/HealthCheck/Scripts/HealthCheckNumberOfPartitions/HealthCheckNumberOfPartitions.yml index 2b0465068c85..65a7f222a41e 100644 --- a/Packs/HealthCheck/Scripts/HealthCheckNumberOfPartitions/HealthCheckNumberOfPartitions.yml +++ b/Packs/HealthCheck/Scripts/HealthCheckNumberOfPartitions/HealthCheckNumberOfPartitions.yml @@ -2,7 +2,7 @@ comment: Widget Script to present the number of BoltDB partitions commonfields: id: HealthCheckNumberOfPartitions version: -1 -dockerimage: demisto/python3:3.10.4.29342 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: HealthCheckNumberOfPartitions runas: DBotWeakRole diff --git a/Packs/HealthCheck/Scripts/HealthCheckOutdatedPacks/HealthCheckOutdatedPacks.yml b/Packs/HealthCheck/Scripts/HealthCheckOutdatedPacks/HealthCheckOutdatedPacks.yml index f31871cce929..afea158dacb3 100644 --- a/Packs/HealthCheck/Scripts/HealthCheckOutdatedPacks/HealthCheckOutdatedPacks.yml +++ b/Packs/HealthCheck/Scripts/HealthCheckOutdatedPacks/HealthCheckOutdatedPacks.yml @@ -2,7 +2,7 @@ comment: Presenting Outdated Packs commonfields: id: HealthCheckOutdatedPacks version: -1 -dockerimage: demisto/python3:3.10.4.29342 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: HealthCheckOutdatedPacks runas: DBotWeakRole diff --git a/Packs/HealthCheck/Scripts/HealthCheckPacksInstalled/HealthCheckPacksInstalled.yml b/Packs/HealthCheck/Scripts/HealthCheckPacksInstalled/HealthCheckPacksInstalled.yml index 4ddfc7ce4c46..aa102641f4a7 100644 --- a/Packs/HealthCheck/Scripts/HealthCheckPacksInstalled/HealthCheckPacksInstalled.yml +++ b/Packs/HealthCheck/Scripts/HealthCheckPacksInstalled/HealthCheckPacksInstalled.yml @@ -2,7 +2,7 @@ comment: Presenting numbers of packs installed commonfields: id: HealthCheckPacksInstalled version: -1 -dockerimage: demisto/python3:3.10.4.29342 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: HealthCheckPacksInstalled runas: DBotWeakRole diff --git a/Packs/HealthCheck/Scripts/HealthCheckPanicLog/HealthCheckPanicLog.yml b/Packs/HealthCheck/Scripts/HealthCheckPanicLog/HealthCheckPanicLog.yml index 825b51210576..2d3051b429df 100644 --- a/Packs/HealthCheck/Scripts/HealthCheckPanicLog/HealthCheckPanicLog.yml +++ b/Packs/HealthCheck/Scripts/HealthCheckPanicLog/HealthCheckPanicLog.yml @@ -6,7 +6,7 @@ comment: Read panic log file line by line and display warnings, fatal errors and commonfields: id: HealthCheckPanicLog version: -1 -dockerimage: demisto/python3:3.10.8.37753 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: HealthCheckPanicLog runas: DBotWeakRole diff --git a/Packs/HealthCheck/Scripts/HealthCheckReadConf/HealthCheckReadConf.yml b/Packs/HealthCheck/Scripts/HealthCheckReadConf/HealthCheckReadConf.yml index 97f7214027ea..22d6dcfcf94a 100644 --- a/Packs/HealthCheck/Scripts/HealthCheckReadConf/HealthCheckReadConf.yml +++ b/Packs/HealthCheck/Scripts/HealthCheckReadConf/HealthCheckReadConf.yml @@ -7,7 +7,7 @@ comment: Read the license_data.log file extracted from the log bundle commonfields: id: HealthCheckReadConf version: -1 -dockerimage: demisto/python3:3.10.4.29342 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: HealthCheckReadConf outputs: diff --git a/Packs/HealthCheck/Scripts/HealthCheckReadTemeletryLog/HealthCheckReadTemeletryLog.yml b/Packs/HealthCheck/Scripts/HealthCheckReadTemeletryLog/HealthCheckReadTemeletryLog.yml index 998976dee14c..4a151d9edbd8 100644 --- a/Packs/HealthCheck/Scripts/HealthCheckReadTemeletryLog/HealthCheckReadTemeletryLog.yml +++ b/Packs/HealthCheck/Scripts/HealthCheckReadTemeletryLog/HealthCheckReadTemeletryLog.yml @@ -5,7 +5,7 @@ comment: Read Telemtry log commonfields: id: HealthCheckReadTemeletryLog version: -1 -dockerimage: demisto/python3:3.10.4.29342 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: HealthCheckReadTemeletryLog runas: DBotWeakRole diff --git a/Packs/HealthCheck/Scripts/HealthCheckReadVC/HealthCheckReadVC.yml b/Packs/HealthCheck/Scripts/HealthCheckReadVC/HealthCheckReadVC.yml index 16a23ee05948..0401c3d837c3 100644 --- a/Packs/HealthCheck/Scripts/HealthCheckReadVC/HealthCheckReadVC.yml +++ b/Packs/HealthCheck/Scripts/HealthCheckReadVC/HealthCheckReadVC.yml @@ -7,7 +7,7 @@ comment: Read the version_control.log file extracted from the log bundle commonfields: id: HealthCheckReadVC version: -1 -dockerimage: demisto/python3:3.10.4.29342 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: HealthCheckReadVC outputs: diff --git a/Packs/HealthCheck/Scripts/HealthCheckServerLog/HealthCheckServerLog.yml b/Packs/HealthCheck/Scripts/HealthCheckServerLog/HealthCheckServerLog.yml index cf6036506f0f..e3c20e021424 100644 --- a/Packs/HealthCheck/Scripts/HealthCheckServerLog/HealthCheckServerLog.yml +++ b/Packs/HealthCheck/Scripts/HealthCheckServerLog/HealthCheckServerLog.yml @@ -6,7 +6,7 @@ comment: Read server log file line by line and display warnings, fatal errors an commonfields: id: HealthCheckServerLog version: -1 -dockerimage: demisto/python3:3.10.9.46032 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: HealthCheckServerLog runas: DBotWeakRole diff --git a/Packs/HealthCheck/Scripts/HealthCheckUnpack/HealthCheckUnpack.yml b/Packs/HealthCheck/Scripts/HealthCheckUnpack/HealthCheckUnpack.yml index 2b31c62d55d2..0dcd70b29513 100644 --- a/Packs/HealthCheck/Scripts/HealthCheckUnpack/HealthCheckUnpack.yml +++ b/Packs/HealthCheck/Scripts/HealthCheckUnpack/HealthCheckUnpack.yml @@ -6,13 +6,13 @@ comment: "Extract files from log bundle - supports tar.gz & tar \n\nhandle unsup commonfields: id: HealthCheckUnpack version: -1 -dockerimage: demisto/python3:3.10.4.29342 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: HealthCheckUnpack outputs: -- contextPath: "no" +- contextPath: 'no' description: file type is not supported. -- contextPath: "yes" +- contextPath: 'yes' description: file type is supported. runas: DBotWeakRole script: '' diff --git a/Packs/HealthCheck/pack_metadata.json b/Packs/HealthCheck/pack_metadata.json index 7d1ca2bf278a..bebe023e51f6 100644 --- a/Packs/HealthCheck/pack_metadata.json +++ b/Packs/HealthCheck/pack_metadata.json @@ -2,7 +2,7 @@ "name": "System Diagnostics and Health Check", "description": "CS Health Check", "support": "community", - "currentVersion": "2.1.0", + "currentVersion": "2.1.1", "author": "Cortex XSOAR Customer Success", "url": "https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/bd-p/Cortex_XSOAR_Discussions", "email": "", diff --git a/Packs/HelloWorld/Integrations/FeedHelloWorld/FeedHelloWorld.yml b/Packs/HelloWorld/Integrations/FeedHelloWorld/FeedHelloWorld.yml index 0865a4d0b9ec..252eb7033c24 100644 --- a/Packs/HelloWorld/Integrations/FeedHelloWorld/FeedHelloWorld.yml +++ b/Packs/HelloWorld/Integrations/FeedHelloWorld/FeedHelloWorld.yml @@ -100,13 +100,13 @@ script: name: limit description: Gets indicators from the feed. name: helloworld-get-indicators - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 feed: true runonce: false script: '-' subtype: python3 type: python fromversion: 5.5.0 -description: 'This is the Feed Hello World integration for getting started with your feed integration.' +description: This is the Feed Hello World integration for getting started with your feed integration. tests: - No tests (auto formatted) diff --git a/Packs/HelloWorld/ReleaseNotes/3_0_12.md b/Packs/HelloWorld/ReleaseNotes/3_0_12.md new file mode 100644 index 000000000000..2a8ba57fb28d --- /dev/null +++ b/Packs/HelloWorld/ReleaseNotes/3_0_12.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### HelloWorld Feed + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/HelloWorld/pack_metadata.json b/Packs/HelloWorld/pack_metadata.json index ac87dc25fb95..98bd86e8faff 100644 --- a/Packs/HelloWorld/pack_metadata.json +++ b/Packs/HelloWorld/pack_metadata.json @@ -2,7 +2,7 @@ "name": "HelloWorld", "description": "This is the Hello World integration for getting started.", "support": "community", - "currentVersion": "3.0.11", + "currentVersion": "3.0.12", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/IP-API/Integrations/IPAPI/IPAPI.yml b/Packs/IP-API/Integrations/IPAPI/IPAPI.yml index ebb3a0c5811d..539a02f0cef2 100644 --- a/Packs/IP-API/Integrations/IPAPI/IPAPI.yml +++ b/Packs/IP-API/Integrations/IPAPI/IPAPI.yml @@ -4,7 +4,7 @@ commonfields: version: -1 configuration: - additionalinfo: Use of HTTPS requires an API key - defaultvalue: "false" + defaultvalue: 'false' display: Use HTTPS to communicate with the API name: https type: 8 @@ -15,17 +15,17 @@ configuration: type: 4 required: false - additionalinfo: See https://members.ip-api.com/docs/json for details - defaultvalue: "536608767" + defaultvalue: '536608767' display: Fields to return name: fields required: true type: 0 -- defaultvalue: "false" +- defaultvalue: 'false' display: Use system proxy settings name: proxy type: 8 required: false -- defaultvalue: "false" +- defaultvalue: 'false' display: Trust any certificate (not secure) name: insecure type: 8 @@ -59,10 +59,12 @@ configuration: display: '' type: 1 required: false -description: | - This integration will enrich IP addresses from IP-API with data about the geolocation, as well as a determination of the IP address being associated with a mobile device, hosting or proxy. Revers DNS is also returned. +description: 'This integration will enrich IP addresses from IP-API with data about the geolocation, as well as a determination of the IP address being associated with a mobile device, hosting or proxy. Revers DNS is also returned. + This service is available for free (with a throttle) - or paid. + + ' display: IP-API name: IP-API script: @@ -172,8 +174,7 @@ script: - contextPath: DBotScore.Reliability description: Reliability of the source providing the intelligence data. type: String - - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 runonce: false script: '' subtype: python3 diff --git a/Packs/IP-API/ReleaseNotes/1_0_4.md b/Packs/IP-API/ReleaseNotes/1_0_4.md new file mode 100644 index 000000000000..bed9b32f5aba --- /dev/null +++ b/Packs/IP-API/ReleaseNotes/1_0_4.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### IP-API + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/IP-API/pack_metadata.json b/Packs/IP-API/pack_metadata.json index 6319915a8020..05866773c277 100644 --- a/Packs/IP-API/pack_metadata.json +++ b/Packs/IP-API/pack_metadata.json @@ -2,7 +2,7 @@ "name": "IP-API", "description": "Integrate with the IP-API.com IP enrichment service.", "support": "community", - "currentVersion": "1.0.3", + "currentVersion": "1.0.4", "author": "Michael Wareman", "url": "", "email": "", diff --git a/Packs/Ja3er/Integrations/Ja3er/Ja3er.yml b/Packs/Ja3er/Integrations/Ja3er/Ja3er.yml index 1d988fa76827..71044c670587 100644 --- a/Packs/Ja3er/Integrations/Ja3er/Ja3er.yml +++ b/Packs/Ja3er/Integrations/Ja3er/Ja3er.yml @@ -21,15 +21,15 @@ script: name: ja3-search outputs: - contextPath: JA3.Count - description: 'Number of times seen' + description: Number of times seen type: Number - contextPath: JA3.Last_seen - description: 'Last seen date' + description: Last seen date type: Date - contextPath: JA3.User-Agent - description: 'User-Agent' + description: User-Agent type: String - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 runonce: false script: '' subtype: python3 diff --git a/Packs/Ja3er/ReleaseNotes/1_0_4.md b/Packs/Ja3er/ReleaseNotes/1_0_4.md new file mode 100644 index 000000000000..edc52a9467a9 --- /dev/null +++ b/Packs/Ja3er/ReleaseNotes/1_0_4.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Ja3er + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/Ja3er/pack_metadata.json b/Packs/Ja3er/pack_metadata.json index 6050b91cd5ae..7f77b7a69fca 100644 --- a/Packs/Ja3er/pack_metadata.json +++ b/Packs/Ja3er/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Ja3er", "description": "Query for hashes of JA3 fingerprints", "support": "community", - "currentVersion": "1.0.3", + "currentVersion": "1.0.4", "author": "Matt Houston", "url": "", "email": "", @@ -20,4 +20,4 @@ "xsoar", "marketplacev2" ] -} +} \ No newline at end of file diff --git a/Packs/LINENotify/Integrations/LINENotify/LINENotify.yml b/Packs/LINENotify/Integrations/LINENotify/LINENotify.yml index 919cc59b6835..05dd78b3c032 100644 --- a/Packs/LINENotify/Integrations/LINENotify/LINENotify.yml +++ b/Packs/LINENotify/Integrations/LINENotify/LINENotify.yml @@ -18,7 +18,7 @@ script: required: true description: Send message/notification to LINE Group name: line-send-message - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 runonce: false script: '-' subtype: python3 diff --git a/Packs/LINENotify/ReleaseNotes/1_0_4.md b/Packs/LINENotify/ReleaseNotes/1_0_4.md new file mode 100644 index 000000000000..517ad90bce9d --- /dev/null +++ b/Packs/LINENotify/ReleaseNotes/1_0_4.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### LINENotify + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/LINENotify/pack_metadata.json b/Packs/LINENotify/pack_metadata.json index 8f79fd7b8e3c..89f7b9f94072 100644 --- a/Packs/LINENotify/pack_metadata.json +++ b/Packs/LINENotify/pack_metadata.json @@ -2,7 +2,7 @@ "name": "LINENotify", "description": "LINE API Integration is used for sending a message to LINE Group.", "support": "community", - "currentVersion": "1.0.3", + "currentVersion": "1.0.4", "author": "nicholashsiao", "url": "", "email": "", diff --git a/Packs/MS-ISAC/Integrations/MSISAC/MSISAC.yml b/Packs/MS-ISAC/Integrations/MSISAC/MSISAC.yml index 82bb2693cde0..43266c6a0781 100644 --- a/Packs/MS-ISAC/Integrations/MSISAC/MSISAC.yml +++ b/Packs/MS-ISAC/Integrations/MSISAC/MSISAC.yml @@ -125,7 +125,7 @@ script: - contextPath: MSISAC.Event.Stream.event_type description: The type of event submitted from MS-ISAC - arguments: - - defaultValue: "1" + - defaultValue: '1' description: The number of days worth of events to return. Must be one or greater name: days required: true @@ -176,7 +176,7 @@ script: - contextPath: MSISAC.RetrievedEvents.severity description: The severity assigned to the MS-ISAC alert type: string - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 runonce: false script: '' subtype: python3 diff --git a/Packs/MS-ISAC/ReleaseNotes/1_0_2.md b/Packs/MS-ISAC/ReleaseNotes/1_0_2.md new file mode 100644 index 000000000000..72ed018d4105 --- /dev/null +++ b/Packs/MS-ISAC/ReleaseNotes/1_0_2.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### MS-ISAC + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/MS-ISAC/pack_metadata.json b/Packs/MS-ISAC/pack_metadata.json index 9838258db5a9..6a070a04f3f2 100644 --- a/Packs/MS-ISAC/pack_metadata.json +++ b/Packs/MS-ISAC/pack_metadata.json @@ -2,7 +2,7 @@ "name": "MS-ISAC", "description": "This content pack's purpose is to integrate with the MS-ISAC private API to fetch MS-ISAC events and alert details. ", "support": "community", - "currentVersion": "1.0.1", + "currentVersion": "1.0.2", "author": "North Dakota Information Technology Department", "url": "", "email": "", @@ -13,8 +13,7 @@ "tags": [], "useCases": [], "keywords": [], - "githubUser": [ - ], + "githubUser": [], "marketplaces": [ "xsoar", "marketplacev2" diff --git a/Packs/MicroFocusSMAX/Integrations/MicroFocusSMAX/MicroFocusSMAX.yml b/Packs/MicroFocusSMAX/Integrations/MicroFocusSMAX/MicroFocusSMAX.yml index 0d67ea88195e..459c11703d61 100644 --- a/Packs/MicroFocusSMAX/Integrations/MicroFocusSMAX/MicroFocusSMAX.yml +++ b/Packs/MicroFocusSMAX/Integrations/MicroFocusSMAX/MicroFocusSMAX.yml @@ -343,7 +343,7 @@ script: - contextPath: MicroFocus.SMAX.Entities.properties.completion_status description: Query result status type: String - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 isfetch: true runonce: false script: '-' diff --git a/Packs/MicroFocusSMAX/ReleaseNotes/1_0_3.md b/Packs/MicroFocusSMAX/ReleaseNotes/1_0_3.md new file mode 100644 index 000000000000..0d2021d8208f --- /dev/null +++ b/Packs/MicroFocusSMAX/ReleaseNotes/1_0_3.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### MicroFocus SMAX + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/MicroFocusSMAX/pack_metadata.json b/Packs/MicroFocusSMAX/pack_metadata.json index e76ca6853560..2ce867a6cda5 100644 --- a/Packs/MicroFocusSMAX/pack_metadata.json +++ b/Packs/MicroFocusSMAX/pack_metadata.json @@ -2,7 +2,7 @@ "name": "MicroFocus SMAX", "description": "You can use this pack to fetch SMAX incidents/requests and automate different sort of actions", "support": "community", - "currentVersion": "1.0.2", + "currentVersion": "1.0.3", "author": "Ayman Mahmoud", "url": "", "email": "amahmoud@paloaltonetworks.com", diff --git a/Packs/MinervaLabsAntiEvasionPlatform/Integrations/MinervaLabsAntiEvasionPlatform/MinervaLabsAntiEvasionPlatform.yml b/Packs/MinervaLabsAntiEvasionPlatform/Integrations/MinervaLabsAntiEvasionPlatform/MinervaLabsAntiEvasionPlatform.yml index ac5f3d7fd0b6..087c16cd0fcf 100644 --- a/Packs/MinervaLabsAntiEvasionPlatform/Integrations/MinervaLabsAntiEvasionPlatform/MinervaLabsAntiEvasionPlatform.yml +++ b/Packs/MinervaLabsAntiEvasionPlatform/Integrations/MinervaLabsAntiEvasionPlatform/MinervaLabsAntiEvasionPlatform.yml @@ -8,12 +8,12 @@ description: Minerva eliminates the endpoint security gap while empowering compa configuration: - display: Minerva Management Console URL name: url - defaultvalue: "" + defaultvalue: '' type: 0 required: true - display: Username name: credentials - defaultvalue: "" + defaultvalue: '' type: 9 required: true - display: Trust any certificate (not secure) @@ -90,10 +90,10 @@ script: - name: isMonitorOnly auto: PREDEFINED predefined: - - "True" - - "False" + - 'True' + - 'False' description: isMonitorOnly - defaultValue: "False" + defaultValue: 'False' outputs: - contextPath: Minerva.Vaccine.Name description: Name of the mutex vaccination. @@ -314,7 +314,7 @@ script: description: Moves all the events from Archive state to New event state. isfetch: true runonce: false - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 tests: - No tests fromversion: 5.0.0 diff --git a/Packs/MinervaLabsAntiEvasionPlatform/ReleaseNotes/1_0_10.md b/Packs/MinervaLabsAntiEvasionPlatform/ReleaseNotes/1_0_10.md new file mode 100644 index 000000000000..46f587823906 --- /dev/null +++ b/Packs/MinervaLabsAntiEvasionPlatform/ReleaseNotes/1_0_10.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Minerva Labs Anti-Evasion Platform + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/MinervaLabsAntiEvasionPlatform/pack_metadata.json b/Packs/MinervaLabsAntiEvasionPlatform/pack_metadata.json index 0997322ad3fc..5d0d30bb4b7e 100644 --- a/Packs/MinervaLabsAntiEvasionPlatform/pack_metadata.json +++ b/Packs/MinervaLabsAntiEvasionPlatform/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Minerva Labs Anti-Evasion Platform", "description": "Minerva eliminates the endpoint security gap while empowering companies to embrace technology fearlessly.", "support": "community", - "currentVersion": "1.0.9", + "currentVersion": "1.0.10", "author": "Minerva Labs", "url": "https://minerva-labs.com/support", "email": "Support@minerva-labs.com", diff --git a/Packs/MitreCaldera/Integrations/MitreCaldera/MitreCaldera.yml b/Packs/MitreCaldera/Integrations/MitreCaldera/MitreCaldera.yml index 75af4808a379..a076d3fa82b5 100644 --- a/Packs/MitreCaldera/Integrations/MitreCaldera/MitreCaldera.yml +++ b/Packs/MitreCaldera/Integrations/MitreCaldera/MitreCaldera.yml @@ -32,7 +32,7 @@ script: script: '' type: python subtype: python3 - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 commands: - name: caldera-create-fact description: Create a Fact diff --git a/Packs/MitreCaldera/ReleaseNotes/1_0_5.md b/Packs/MitreCaldera/ReleaseNotes/1_0_5.md new file mode 100644 index 000000000000..0a3a44d9b078 --- /dev/null +++ b/Packs/MitreCaldera/ReleaseNotes/1_0_5.md @@ -0,0 +1,39 @@ + +#### Integrations + +##### MitreCaldera + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. + +#### Scripts + +##### CalderaStartOperation + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### CalderaPopulateAgents + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### CalderaPopulateObjectiveIDField + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### CalderaGetOperationReport + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### CalderaOperationPostProcessing + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### CalderaReadOnlyFields + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### CalderaPopulateAdversaryIDField + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### CalderaPopulateSourceIDField + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### CalderaPopulateEventLogs + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### CalderaPopulatePlannerIDField + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/MitreCaldera/Scripts/CalderaGetOperationReport/CalderaGetOperationReport.yml b/Packs/MitreCaldera/Scripts/CalderaGetOperationReport/CalderaGetOperationReport.yml index ce5e59ef1059..809f540dc323 100644 --- a/Packs/MitreCaldera/Scripts/CalderaGetOperationReport/CalderaGetOperationReport.yml +++ b/Packs/MitreCaldera/Scripts/CalderaGetOperationReport/CalderaGetOperationReport.yml @@ -13,7 +13,7 @@ tags: enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole fromversion: 6.2.0 tests: diff --git a/Packs/MitreCaldera/Scripts/CalderaOperationPostProcessing/CalderaOperationPostProcessing.yml b/Packs/MitreCaldera/Scripts/CalderaOperationPostProcessing/CalderaOperationPostProcessing.yml index 4bb0979315e5..abd7938eb24c 100644 --- a/Packs/MitreCaldera/Scripts/CalderaOperationPostProcessing/CalderaOperationPostProcessing.yml +++ b/Packs/MitreCaldera/Scripts/CalderaOperationPostProcessing/CalderaOperationPostProcessing.yml @@ -9,7 +9,7 @@ tags: enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole fromversion: 6.2.0 comment: Post processing script for MITRE Caldera incidents. diff --git a/Packs/MitreCaldera/Scripts/CalderaPopulateAdversaryIDField/CalderaPopulateAdversaryIDField.yml b/Packs/MitreCaldera/Scripts/CalderaPopulateAdversaryIDField/CalderaPopulateAdversaryIDField.yml index b77ff8e9914c..3e30bc348670 100644 --- a/Packs/MitreCaldera/Scripts/CalderaPopulateAdversaryIDField/CalderaPopulateAdversaryIDField.yml +++ b/Packs/MitreCaldera/Scripts/CalderaPopulateAdversaryIDField/CalderaPopulateAdversaryIDField.yml @@ -13,7 +13,7 @@ tags: enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole fromversion: 6.2.0 tests: diff --git a/Packs/MitreCaldera/Scripts/CalderaPopulateAgents/CalderaPopulateAgents.yml b/Packs/MitreCaldera/Scripts/CalderaPopulateAgents/CalderaPopulateAgents.yml index 7401c54a2e9e..8ecd915fd84f 100644 --- a/Packs/MitreCaldera/Scripts/CalderaPopulateAgents/CalderaPopulateAgents.yml +++ b/Packs/MitreCaldera/Scripts/CalderaPopulateAgents/CalderaPopulateAgents.yml @@ -13,7 +13,7 @@ tags: enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole fromversion: 6.2.0 tests: diff --git a/Packs/MitreCaldera/Scripts/CalderaPopulateEventLogs/CalderaPopulateEventLogs.yml b/Packs/MitreCaldera/Scripts/CalderaPopulateEventLogs/CalderaPopulateEventLogs.yml index 53edce95ebf1..e91c86828f4d 100644 --- a/Packs/MitreCaldera/Scripts/CalderaPopulateEventLogs/CalderaPopulateEventLogs.yml +++ b/Packs/MitreCaldera/Scripts/CalderaPopulateEventLogs/CalderaPopulateEventLogs.yml @@ -13,7 +13,7 @@ tags: enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole fromversion: 6.2.0 tests: diff --git a/Packs/MitreCaldera/Scripts/CalderaPopulateObjectiveIDField/CalderaPopulateObjectiveIDField.yml b/Packs/MitreCaldera/Scripts/CalderaPopulateObjectiveIDField/CalderaPopulateObjectiveIDField.yml index 2629a631f6a1..358f516994f1 100644 --- a/Packs/MitreCaldera/Scripts/CalderaPopulateObjectiveIDField/CalderaPopulateObjectiveIDField.yml +++ b/Packs/MitreCaldera/Scripts/CalderaPopulateObjectiveIDField/CalderaPopulateObjectiveIDField.yml @@ -13,7 +13,7 @@ tags: enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole fromversion: 6.2.0 tests: diff --git a/Packs/MitreCaldera/Scripts/CalderaPopulatePlannerIDField/CalderaPopulatePlannerIDField.yml b/Packs/MitreCaldera/Scripts/CalderaPopulatePlannerIDField/CalderaPopulatePlannerIDField.yml index 39484230b113..ff01f3ae3364 100644 --- a/Packs/MitreCaldera/Scripts/CalderaPopulatePlannerIDField/CalderaPopulatePlannerIDField.yml +++ b/Packs/MitreCaldera/Scripts/CalderaPopulatePlannerIDField/CalderaPopulatePlannerIDField.yml @@ -13,7 +13,7 @@ tags: enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole fromversion: 6.2.0 tests: diff --git a/Packs/MitreCaldera/Scripts/CalderaPopulateSourceIDField/CalderaPopulateSourceIDField.yml b/Packs/MitreCaldera/Scripts/CalderaPopulateSourceIDField/CalderaPopulateSourceIDField.yml index 796b3a1403da..bc52bc716e9f 100644 --- a/Packs/MitreCaldera/Scripts/CalderaPopulateSourceIDField/CalderaPopulateSourceIDField.yml +++ b/Packs/MitreCaldera/Scripts/CalderaPopulateSourceIDField/CalderaPopulateSourceIDField.yml @@ -13,7 +13,7 @@ tags: enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole fromversion: 6.2.0 tests: diff --git a/Packs/MitreCaldera/Scripts/CalderaReadOnlyFields/CalderaReadOnlyFields.yml b/Packs/MitreCaldera/Scripts/CalderaReadOnlyFields/CalderaReadOnlyFields.yml index 20148e422776..c2a730081041 100644 --- a/Packs/MitreCaldera/Scripts/CalderaReadOnlyFields/CalderaReadOnlyFields.yml +++ b/Packs/MitreCaldera/Scripts/CalderaReadOnlyFields/CalderaReadOnlyFields.yml @@ -9,7 +9,7 @@ tags: enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole comment: Prevents specific fields from being set manually. fromversion: 6.2.0 diff --git a/Packs/MitreCaldera/Scripts/CalderaStartOperation/CalderaStartOperation.yml b/Packs/MitreCaldera/Scripts/CalderaStartOperation/CalderaStartOperation.yml index 766e4d424559..5545dd3786c0 100644 --- a/Packs/MitreCaldera/Scripts/CalderaStartOperation/CalderaStartOperation.yml +++ b/Packs/MitreCaldera/Scripts/CalderaStartOperation/CalderaStartOperation.yml @@ -13,7 +13,7 @@ tags: enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole fromversion: 6.2.0 tests: diff --git a/Packs/MitreCaldera/pack_metadata.json b/Packs/MitreCaldera/pack_metadata.json index e0f91c99d50e..1e1073e777be 100644 --- a/Packs/MitreCaldera/pack_metadata.json +++ b/Packs/MitreCaldera/pack_metadata.json @@ -2,7 +2,7 @@ "name": "MITRE Caldera", "description": "Interact with MITRE Caldera via the v2 API.", "support": "community", - "currentVersion": "1.0.4", + "currentVersion": "1.0.5", "author": "Adam Burt", "url": "https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/bd-p/Cortex_XSOAR_Discussions", "email": "", diff --git a/Packs/NCSCCyberAsssessmentFramework/ReleaseNotes/1_1_5.md b/Packs/NCSCCyberAsssessmentFramework/ReleaseNotes/1_1_5.md new file mode 100644 index 000000000000..7c63848d8ce9 --- /dev/null +++ b/Packs/NCSCCyberAsssessmentFramework/ReleaseNotes/1_1_5.md @@ -0,0 +1,42 @@ + +#### Scripts + +##### EntryWidgetNCSCResultsA + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### EntryWidgetNCSCResultsC + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### EntryWidgetNCSCResultsB + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### NCSCReportDetails + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### EntryWidgetNCSCResultsD + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### NCSCReportOverview + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### NCSCCalculateQuestionsScore + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### NCSCFieldProtection + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### NCSCReportDetails_D + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### NCSCReportDetails_B + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### NCSCQuestionPopulate + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### NCSCReportDetails_A + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### NCSCReportDetails_C + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/NCSCCyberAsssessmentFramework/Scripts/EntryWidgetNCSCResultsA/EntryWidgetNCSCResultsA.yml b/Packs/NCSCCyberAsssessmentFramework/Scripts/EntryWidgetNCSCResultsA/EntryWidgetNCSCResultsA.yml index 9a4f4b149a2e..0ba1a95b6cc9 100644 --- a/Packs/NCSCCyberAsssessmentFramework/Scripts/EntryWidgetNCSCResultsA/EntryWidgetNCSCResultsA.yml +++ b/Packs/NCSCCyberAsssessmentFramework/Scripts/EntryWidgetNCSCResultsA/EntryWidgetNCSCResultsA.yml @@ -1,7 +1,7 @@ commonfields: id: EntryWidgetNCSCResultsA version: -1 -dockerimage: demisto/python3:3.9.7.24076 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: EntryWidgetNCSCResultsA runas: DBotWeakRole @@ -14,4 +14,4 @@ type: python fromversion: 6.0.0 tests: - No tests (auto formatted) -comment: 'This script populates results for the dynamic content shown in the incident layout.' +comment: This script populates results for the dynamic content shown in the incident layout. diff --git a/Packs/NCSCCyberAsssessmentFramework/Scripts/EntryWidgetNCSCResultsB/EntryWidgetNCSCResultsB.yml b/Packs/NCSCCyberAsssessmentFramework/Scripts/EntryWidgetNCSCResultsB/EntryWidgetNCSCResultsB.yml index 557564b307a5..7c1a6fb685f6 100644 --- a/Packs/NCSCCyberAsssessmentFramework/Scripts/EntryWidgetNCSCResultsB/EntryWidgetNCSCResultsB.yml +++ b/Packs/NCSCCyberAsssessmentFramework/Scripts/EntryWidgetNCSCResultsB/EntryWidgetNCSCResultsB.yml @@ -1,7 +1,7 @@ commonfields: id: EntryWidgetNCSCResultsB version: -1 -dockerimage: demisto/python3:3.9.7.24076 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: EntryWidgetNCSCResultsB runas: DBotWeakRole @@ -14,4 +14,4 @@ type: python fromversion: 6.0.0 tests: - No tests (auto formatted) -comment: 'This script populates results for the dynamic content shown in the incident layout.' +comment: This script populates results for the dynamic content shown in the incident layout. diff --git a/Packs/NCSCCyberAsssessmentFramework/Scripts/EntryWidgetNCSCResultsC/EntryWidgetNCSCResultsC.yml b/Packs/NCSCCyberAsssessmentFramework/Scripts/EntryWidgetNCSCResultsC/EntryWidgetNCSCResultsC.yml index a60ff419593c..6b01c6ad0893 100644 --- a/Packs/NCSCCyberAsssessmentFramework/Scripts/EntryWidgetNCSCResultsC/EntryWidgetNCSCResultsC.yml +++ b/Packs/NCSCCyberAsssessmentFramework/Scripts/EntryWidgetNCSCResultsC/EntryWidgetNCSCResultsC.yml @@ -1,7 +1,7 @@ commonfields: id: EntryWidgetNCSCResultsC version: -1 -dockerimage: demisto/python3:3.9.7.24076 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: EntryWidgetNCSCResultsC runas: DBotWeakRole @@ -14,4 +14,4 @@ type: python fromversion: 6.0.0 tests: - No tests (auto formatted) -comment: 'This script populates results for the dynamic content shown in the incident layout.' +comment: This script populates results for the dynamic content shown in the incident layout. diff --git a/Packs/NCSCCyberAsssessmentFramework/Scripts/EntryWidgetNCSCResultsD/EntryWidgetNCSCResultsD.yml b/Packs/NCSCCyberAsssessmentFramework/Scripts/EntryWidgetNCSCResultsD/EntryWidgetNCSCResultsD.yml index 4e7f3cb5aaf8..e256bdc6b6d6 100644 --- a/Packs/NCSCCyberAsssessmentFramework/Scripts/EntryWidgetNCSCResultsD/EntryWidgetNCSCResultsD.yml +++ b/Packs/NCSCCyberAsssessmentFramework/Scripts/EntryWidgetNCSCResultsD/EntryWidgetNCSCResultsD.yml @@ -1,7 +1,7 @@ commonfields: id: EntryWidgetNCSCResultsD version: -1 -dockerimage: demisto/python3:3.9.7.24076 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: EntryWidgetNCSCResultsD runas: DBotWeakRole @@ -14,4 +14,4 @@ type: python fromversion: 6.0.0 tests: - No tests (auto formatted) -comment: 'This script populates results for the dynamic content shown in the incident layout.' +comment: This script populates results for the dynamic content shown in the incident layout. diff --git a/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCCalculateQuestionsScore/NCSCCalculateQuestionsScore.yml b/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCCalculateQuestionsScore/NCSCCalculateQuestionsScore.yml index 3631a421dddf..fcb7d0916000 100644 --- a/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCCalculateQuestionsScore/NCSCCalculateQuestionsScore.yml +++ b/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCCalculateQuestionsScore/NCSCCalculateQuestionsScore.yml @@ -8,7 +8,7 @@ args: commonfields: id: NCSCCalculateQuestionsScore version: -1 -dockerimage: demisto/python3:3.9.7.24076 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: NCSCCalculateQuestionsScore outputs: @@ -32,4 +32,4 @@ type: python fromversion: 6.0.0 tests: - No tests (auto formatted) -comment: 'This script calculates the score based on the question and answer responses.' +comment: This script calculates the score based on the question and answer responses. diff --git a/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCFieldProtection/NCSCFieldProtection.yml b/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCFieldProtection/NCSCFieldProtection.yml index ba88c5de0097..2abd9e2ef906 100644 --- a/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCFieldProtection/NCSCFieldProtection.yml +++ b/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCFieldProtection/NCSCFieldProtection.yml @@ -1,7 +1,7 @@ commonfields: id: NCSCFieldProtection version: -1 -dockerimage: demisto/python3:3.9.7.24076 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: NCSCFieldProtection runas: DBotWeakRole @@ -14,4 +14,4 @@ type: python fromversion: 6.0.0 tests: - No tests (auto formatted) -comment: 'This script protects the fields associated with the assessment from accidental modification.' +comment: This script protects the fields associated with the assessment from accidental modification. diff --git a/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCQuestionPopulate/NCSCQuestionPopulate.yml b/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCQuestionPopulate/NCSCQuestionPopulate.yml index 6a8ad346ca0d..ddcc60baace7 100644 --- a/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCQuestionPopulate/NCSCQuestionPopulate.yml +++ b/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCQuestionPopulate/NCSCQuestionPopulate.yml @@ -9,7 +9,7 @@ comment: Populate a list named "NCSC CAF Assessment" with a list of the NCSC Que enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.9.7.24076 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole fromversion: 5.0.0 tests: diff --git a/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCReportDetails/NCSCReportDetails.yml b/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCReportDetails/NCSCReportDetails.yml index 26608c0f54e7..44fbba4252c0 100644 --- a/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCReportDetails/NCSCReportDetails.yml +++ b/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCReportDetails/NCSCReportDetails.yml @@ -1,13 +1,15 @@ -comment: |- - This script generates the report details used in the final report. +comment: 'This script generates the report details used in the final report. + This automation runs using the default Limited User role, unless you explicitly change the permissions. + For more information, see the section about permissions here: - https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.10/Cortex-XSOAR-Administrator-Guide/Automations + + https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.10/Cortex-XSOAR-Administrator-Guide/Automations' commonfields: id: NCSCReportDetails version: -1 -dockerimage: demisto/python3:3.10.10.48392 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: NCSCReportDetails script: '' diff --git a/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCReportDetailsA/NCSCReportDetailsA.yml b/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCReportDetailsA/NCSCReportDetailsA.yml index c6c676792941..96ea732be21b 100644 --- a/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCReportDetailsA/NCSCReportDetailsA.yml +++ b/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCReportDetailsA/NCSCReportDetailsA.yml @@ -1,13 +1,15 @@ -comment: |- - This script generates the report details for the individual CAF Section. +comment: 'This script generates the report details for the individual CAF Section. + This automation runs using the default Limited User role, unless you explicitly change the permissions. + For more information, see the section about permissions here: - https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.10/Cortex-XSOAR-Administrator-Guide/Automations + + https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.10/Cortex-XSOAR-Administrator-Guide/Automations' commonfields: id: NCSCReportDetails_A version: -1 -dockerimage: demisto/python3:3.10.10.48392 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: NCSCReportDetails_A script: '' diff --git a/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCReportDetailsB/NCSCReportDetailsB.yml b/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCReportDetailsB/NCSCReportDetailsB.yml index 422e6b57cf75..6051769b551f 100644 --- a/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCReportDetailsB/NCSCReportDetailsB.yml +++ b/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCReportDetailsB/NCSCReportDetailsB.yml @@ -1,13 +1,15 @@ -comment: |- - This script generates the report details for the individual CAF Section. +comment: 'This script generates the report details for the individual CAF Section. + This automation runs using the default Limited User role, unless you explicitly change the permissions. + For more information, see the section about permissions here: - https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.10/Cortex-XSOAR-Administrator-Guide/Automations + + https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.10/Cortex-XSOAR-Administrator-Guide/Automations' commonfields: id: NCSCReportDetails_B version: -1 -dockerimage: demisto/python3:3.10.10.48392 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: NCSCReportDetails_B script: '' diff --git a/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCReportDetailsC/NCSCReportDetailsC.yml b/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCReportDetailsC/NCSCReportDetailsC.yml index 80e17a031e36..fe8fdd941cd5 100644 --- a/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCReportDetailsC/NCSCReportDetailsC.yml +++ b/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCReportDetailsC/NCSCReportDetailsC.yml @@ -1,13 +1,15 @@ -comment: |- - This script generates the report details for the individual CAF Section. +comment: 'This script generates the report details for the individual CAF Section. + This automation runs using the default Limited User role, unless you explicitly change the permissions. + For more information, see the section about permissions here: - https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.10/Cortex-XSOAR-Administrator-Guide/Automations + + https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.10/Cortex-XSOAR-Administrator-Guide/Automations' commonfields: id: NCSCReportDetails_C version: -1 -dockerimage: demisto/python3:3.10.10.48392 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: NCSCReportDetails_C script: '' diff --git a/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCReportDetailsD/NCSCReportDetailsD.yml b/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCReportDetailsD/NCSCReportDetailsD.yml index 0231adbb0a9e..ab9b7e0c8d9a 100644 --- a/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCReportDetailsD/NCSCReportDetailsD.yml +++ b/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCReportDetailsD/NCSCReportDetailsD.yml @@ -1,13 +1,15 @@ -comment: |- - This script generates the report details for the individual CAF Section. +comment: 'This script generates the report details for the individual CAF Section. + This automation runs using the default Limited User role, unless you explicitly change the permissions. + For more information, see the section about permissions here: - https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.10/Cortex-XSOAR-Administrator-Guide/Automations + + https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.10/Cortex-XSOAR-Administrator-Guide/Automations' commonfields: id: NCSCReportDetails_D version: -1 -dockerimage: demisto/python3:3.10.10.48392 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: NCSCReportDetails_D script: '' diff --git a/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCReportOverview/NCSCReportOverview.yml b/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCReportOverview/NCSCReportOverview.yml index a9605c14a25d..ca09961c8e18 100644 --- a/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCReportOverview/NCSCReportOverview.yml +++ b/Packs/NCSCCyberAsssessmentFramework/Scripts/NCSCReportOverview/NCSCReportOverview.yml @@ -1,13 +1,15 @@ -comment: |- - This script generates the report details for the individual CAF Section. +comment: 'This script generates the report details for the individual CAF Section. + This automation runs using the default Limited User role, unless you explicitly change the permissions. + For more information, see the section about permissions here: - https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.10/Cortex-XSOAR-Administrator-Guide/Automations + + https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.10/Cortex-XSOAR-Administrator-Guide/Automations' commonfields: id: NCSCReportOverview version: -1 -dockerimage: demisto/python3:3.10.10.48392 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: NCSCReportOverview script: '' diff --git a/Packs/NCSCCyberAsssessmentFramework/pack_metadata.json b/Packs/NCSCCyberAsssessmentFramework/pack_metadata.json index 60fb25b4db06..948ea09acf19 100644 --- a/Packs/NCSCCyberAsssessmentFramework/pack_metadata.json +++ b/Packs/NCSCCyberAsssessmentFramework/pack_metadata.json @@ -2,7 +2,7 @@ "name": "NCSC Cyber Asssessment Framework", "description": "This pack contains an incident type and relevant fields to initiate a self-assessment against the National Cyber Security Centre's Cyber Assessment Framework.\n\nAll assessment questions are sent via e-mail and the responses also sent via e-mail. The assessments can also be answered within the Cortex XSOAR platform.", "support": "community", - "currentVersion": "1.1.4", + "currentVersion": "1.1.5", "author": "Adam Burt", "url": "", "email": "", diff --git a/Packs/NTT_Cyber_Threat_Sensor/Integrations/NTT_Cyber_Threat_Sensor/NTT_Cyber_Threat_Sensor.yml b/Packs/NTT_Cyber_Threat_Sensor/Integrations/NTT_Cyber_Threat_Sensor/NTT_Cyber_Threat_Sensor.yml index 76f0b545cb71..4ca93bba0b76 100644 --- a/Packs/NTT_Cyber_Threat_Sensor/Integrations/NTT_Cyber_Threat_Sensor/NTT_Cyber_Threat_Sensor.yml +++ b/Packs/NTT_Cyber_Threat_Sensor/Integrations/NTT_Cyber_Threat_Sensor/NTT_Cyber_Threat_Sensor.yml @@ -8,7 +8,7 @@ description: Retrieve alerts and recommendations from NTT CTS configuration: - display: 'The API key for accessing CTS over AWS ' name: APIKEY - defaultvalue: "" + defaultvalue: '' type: 4 required: true - display: Tenant identification. UUID formatted string @@ -28,7 +28,7 @@ configuration: required: true - display: The unique key for accessing the alerts and active response recommendations name: SOARTOKEN - defaultvalue: "" + defaultvalue: '' type: 4 required: true - display: Fetch incidents @@ -115,7 +115,7 @@ script: type: boolean description: Collecting blobs, most commonly pcap from an incident execution: true - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 isfetch: true subtype: python3 fromversion: 5.0.0 diff --git a/Packs/NTT_Cyber_Threat_Sensor/ReleaseNotes/1_0_7.md b/Packs/NTT_Cyber_Threat_Sensor/ReleaseNotes/1_0_7.md new file mode 100644 index 000000000000..8773fcde2f34 --- /dev/null +++ b/Packs/NTT_Cyber_Threat_Sensor/ReleaseNotes/1_0_7.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### NTT Cyber Threat Sensor + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/NTT_Cyber_Threat_Sensor/pack_metadata.json b/Packs/NTT_Cyber_Threat_Sensor/pack_metadata.json index 88bb95c61ad6..a3a14968725e 100644 --- a/Packs/NTT_Cyber_Threat_Sensor/pack_metadata.json +++ b/Packs/NTT_Cyber_Threat_Sensor/pack_metadata.json @@ -2,7 +2,7 @@ "name": "NTT Cyber Threat Sensor", "description": "NTT Cyber Threat Sensor integration", "support": "community", - "currentVersion": "1.0.6", + "currentVersion": "1.0.7", "author": "NTT Ltd.", "url": "https://www.global.ntt", "email": "servicedesk@global.ntt", diff --git a/Packs/Nexthink/Integrations/Nexthink/Nexthink.yml b/Packs/Nexthink/Integrations/Nexthink/Nexthink.yml index 541220839f4e..c997d3176b7d 100644 --- a/Packs/Nexthink/Integrations/Nexthink/Nexthink.yml +++ b/Packs/Nexthink/Integrations/Nexthink/Nexthink.yml @@ -121,7 +121,7 @@ script: - contextPath: Nexthink.Endpoint.MACAddress description: Endpoint MAC address. type: string - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 runonce: false script: '' subtype: python3 diff --git a/Packs/Nexthink/ReleaseNotes/1_0_4.md b/Packs/Nexthink/ReleaseNotes/1_0_4.md new file mode 100644 index 000000000000..6e44cd60f9e7 --- /dev/null +++ b/Packs/Nexthink/ReleaseNotes/1_0_4.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Nexthink + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/Nexthink/pack_metadata.json b/Packs/Nexthink/pack_metadata.json index 5147babb3019..b582adb58349 100644 --- a/Packs/Nexthink/pack_metadata.json +++ b/Packs/Nexthink/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Nexthink", "description": "Nexthink helps IT teams deliver on the promise of the modern digital workplace.", "support": "community", - "currentVersion": "1.0.3", + "currentVersion": "1.0.4", "author": "Farrukh Ahmed", "url": "", "email": "", diff --git a/Packs/OpenSourceVulnerabilities/Integrations/OSV/OSV.yml b/Packs/OpenSourceVulnerabilities/Integrations/OSV/OSV.yml index 6119b7ee3bb8..5432a3433f7a 100644 --- a/Packs/OpenSourceVulnerabilities/Integrations/OSV/OSV.yml +++ b/Packs/OpenSourceVulnerabilities/Integrations/OSV/OSV.yml @@ -146,7 +146,7 @@ script: - contextPath: OSV.VulnerabilityList.vulns.references.url description: Reference URL for more details. type: string - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 script: '' subtype: python3 type: python diff --git a/Packs/OpenSourceVulnerabilities/ReleaseNotes/1_0_2.md b/Packs/OpenSourceVulnerabilities/ReleaseNotes/1_0_2.md new file mode 100644 index 000000000000..62bdf58a1899 --- /dev/null +++ b/Packs/OpenSourceVulnerabilities/ReleaseNotes/1_0_2.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### OSV + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/OpenSourceVulnerabilities/pack_metadata.json b/Packs/OpenSourceVulnerabilities/pack_metadata.json index ab8cd2204903..5f9a7707cecf 100644 --- a/Packs/OpenSourceVulnerabilities/pack_metadata.json +++ b/Packs/OpenSourceVulnerabilities/pack_metadata.json @@ -2,7 +2,7 @@ "name": "OpenSourceVulnerabilities", "description": "OSV (Open Source Vulnerability) is a vulnerability database for open source projects. For each vulnerability, it perform bisects to figure out the exact commit that introduces the bug, as well the exact commit that fixes it. This is cross referenced against upstream repositories to figure out the affected tags and commit ranges", "support": "community", - "currentVersion": "1.0.1", + "currentVersion": "1.0.2", "author": "Anil Agrawal", "url": "https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/bd-p/Cortex_XSOAR_Discussions", "email": "", diff --git a/Packs/OracleCloudInfrastructureFeed/Integrations/OracleCloudInfrastructureFeed/OracleCloudInfrastructureFeed.yml b/Packs/OracleCloudInfrastructureFeed/Integrations/OracleCloudInfrastructureFeed/OracleCloudInfrastructureFeed.yml index b2d37548bf04..927fbcae4b1a 100644 --- a/Packs/OracleCloudInfrastructureFeed/Integrations/OracleCloudInfrastructureFeed/OracleCloudInfrastructureFeed.yml +++ b/Packs/OracleCloudInfrastructureFeed/Integrations/OracleCloudInfrastructureFeed/OracleCloudInfrastructureFeed.yml @@ -3,7 +3,7 @@ commonfields: id: Oracle Cloud Infrastructure Feed version: -1 configuration: -- defaultvalue: "true" +- defaultvalue: 'true' display: Fetch indicators name: feed type: 8 @@ -47,13 +47,13 @@ configuration: - WHITE type: 15 required: false -- defaultvalue: "30" +- defaultvalue: '30' display: Feed Fetch Interval name: feedFetchInterval type: 19 required: false - additionalinfo: When selected, the exclusion list is ignored for indicators from this feed. This means that if an indicator from this feed is on the exclusion list, the indicator might still be added to the system. - defaultvalue: "true" + defaultvalue: 'true' display: Bypass exclusion list name: feedBypassExclusionList type: 8 @@ -66,7 +66,7 @@ configuration: name: proxy type: 8 required: false -- display: "" +- display: '' name: feedExpirationPolicy options: - never @@ -75,7 +75,7 @@ configuration: - suddenDeath type: 17 required: false -- display: "" +- display: '' name: feedExpirationInterval type: 1 required: false @@ -84,25 +84,25 @@ configuration: name: feedTags type: 0 required: false -- defaultvalue: "false" +- defaultvalue: 'false' display: Create relationships name: create_relationships type: 8 required: false -description: |- - Oracle Cloud Infrastructure Feed (OCI Feed) - This feed provides information about public IP address ranges for services that are deployed in Oracle Cloud Infrastructure. +description: 'Oracle Cloud Infrastructure Feed (OCI Feed) + + This feed provides information about public IP address ranges for services that are deployed in Oracle Cloud Infrastructure.' display: Oracle Cloud Infrastructure Feed name: Oracle Cloud Infrastructure Feed script: commands: - arguments: - - defaultValue: "10" + - defaultValue: '10' description: The maximum number of results to return. name: limit description: Gets indicators from the feed. name: oci-get-indicators - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 feed: true script: '' subtype: python3 diff --git a/Packs/OracleCloudInfrastructureFeed/ReleaseNotes/1_0_1.md b/Packs/OracleCloudInfrastructureFeed/ReleaseNotes/1_0_1.md new file mode 100644 index 000000000000..26252621b596 --- /dev/null +++ b/Packs/OracleCloudInfrastructureFeed/ReleaseNotes/1_0_1.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Oracle Cloud Infrastructure Feed + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/OracleCloudInfrastructureFeed/pack_metadata.json b/Packs/OracleCloudInfrastructureFeed/pack_metadata.json index 6e1fcb71fdc0..be1efbe17f34 100644 --- a/Packs/OracleCloudInfrastructureFeed/pack_metadata.json +++ b/Packs/OracleCloudInfrastructureFeed/pack_metadata.json @@ -2,13 +2,13 @@ "name": "Oracle Cloud Infrastructure Feed", "description": "This feed provides information about public IP address ranges for services that are deployed in Oracle Cloud Infrastructure.\nSee additional information in this link:\nhttps://docs.oracle.com/en-us/iaas/Content/General/Concepts/addressranges.htm", "support": "community", - "currentVersion": "1.0.0", + "currentVersion": "1.0.1", "author": "Rod Gonzalez", "url": "", "email": "", "created": "2023-06-22T18:59:06Z", "categories": [ - "Cloud Services" + "Cloud Services" ], "tags": [], "useCases": [], diff --git a/Packs/PANOSPolicyOptimizer/ReleaseNotes/1_1_28.md b/Packs/PANOSPolicyOptimizer/ReleaseNotes/1_1_28.md new file mode 100644 index 000000000000..f11f4ca75551 --- /dev/null +++ b/Packs/PANOSPolicyOptimizer/ReleaseNotes/1_1_28.md @@ -0,0 +1,12 @@ + +#### Scripts + +##### EntryWidgetPortBasedRules + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### EntryWidgetUnusedApplications + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### EntryWidgetUnusedRules + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/PANOSPolicyOptimizer/Scripts/EntryWidgetPortBasedRules/EntryWidgetPortBasedRules.yml b/Packs/PANOSPolicyOptimizer/Scripts/EntryWidgetPortBasedRules/EntryWidgetPortBasedRules.yml index ef87ecb9b512..5c10d0db0787 100644 --- a/Packs/PANOSPolicyOptimizer/Scripts/EntryWidgetPortBasedRules/EntryWidgetPortBasedRules.yml +++ b/Packs/PANOSPolicyOptimizer/Scripts/EntryWidgetPortBasedRules/EntryWidgetPortBasedRules.yml @@ -2,7 +2,7 @@ comment: Entry widget that returns the number of port based rules found by PAN-O commonfields: id: EntryWidgetPortBasedRules version: -1 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: EntryWidgetPortBasedRules runas: DBotWeakRole diff --git a/Packs/PANOSPolicyOptimizer/Scripts/EntryWidgetUnusedApplications/EntryWidgetUnusedApplications.yml b/Packs/PANOSPolicyOptimizer/Scripts/EntryWidgetUnusedApplications/EntryWidgetUnusedApplications.yml index 141b8eac9108..d97093b34c62 100644 --- a/Packs/PANOSPolicyOptimizer/Scripts/EntryWidgetUnusedApplications/EntryWidgetUnusedApplications.yml +++ b/Packs/PANOSPolicyOptimizer/Scripts/EntryWidgetUnusedApplications/EntryWidgetUnusedApplications.yml @@ -2,7 +2,7 @@ comment: Entry widget that returns the number of rules with unused applications commonfields: id: EntryWidgetUnusedApplications version: -1 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: EntryWidgetUnusedApplications runas: DBotWeakRole diff --git a/Packs/PANOSPolicyOptimizer/Scripts/EntryWidgetUnusedRules/EntryWidgetUnusedRules.yml b/Packs/PANOSPolicyOptimizer/Scripts/EntryWidgetUnusedRules/EntryWidgetUnusedRules.yml index dabe4b4ec485..b84fdfef0b53 100644 --- a/Packs/PANOSPolicyOptimizer/Scripts/EntryWidgetUnusedRules/EntryWidgetUnusedRules.yml +++ b/Packs/PANOSPolicyOptimizer/Scripts/EntryWidgetUnusedRules/EntryWidgetUnusedRules.yml @@ -2,7 +2,7 @@ comment: Entry widget that returns the number of unused rules found by PAN-OS po commonfields: id: EntryWidgetUnusedRules version: -1 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: EntryWidgetUnusedRules runas: DBotWeakRole diff --git a/Packs/PANOSPolicyOptimizer/pack_metadata.json b/Packs/PANOSPolicyOptimizer/pack_metadata.json index 0115c32f9991..f15501889ab3 100644 --- a/Packs/PANOSPolicyOptimizer/pack_metadata.json +++ b/Packs/PANOSPolicyOptimizer/pack_metadata.json @@ -2,7 +2,7 @@ "name": "PAN-OS Policy Optimizer (beta)", "description": "This integration introduces Policy Optimizer and DAG features that are not available through the regular PAN API", "support": "community", - "currentVersion": "1.1.27", + "currentVersion": "1.1.28", "author": "Maciej Drobniuch and Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/PANOStoCDLMonitoring/ReleaseNotes/1_0_15.md b/Packs/PANOStoCDLMonitoring/ReleaseNotes/1_0_15.md new file mode 100644 index 000000000000..110999ac7c35 --- /dev/null +++ b/Packs/PANOStoCDLMonitoring/ReleaseNotes/1_0_15.md @@ -0,0 +1,6 @@ + +#### Scripts + +##### PANOStoCortexDataLakeMonitoring + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/PANOStoCDLMonitoring/Scripts/PANOStoCortexDataLakeMonitoring/PANOStoCortexDataLakeMonitoring.yml b/Packs/PANOStoCDLMonitoring/Scripts/PANOStoCortexDataLakeMonitoring/PANOStoCortexDataLakeMonitoring.yml index 818680c7d584..6afa97b39f7a 100644 --- a/Packs/PANOStoCDLMonitoring/Scripts/PANOStoCortexDataLakeMonitoring/PANOStoCortexDataLakeMonitoring.yml +++ b/Packs/PANOStoCDLMonitoring/Scripts/PANOStoCortexDataLakeMonitoring/PANOStoCortexDataLakeMonitoring.yml @@ -7,7 +7,9 @@ args: name: fw_serials - description: PAN-OS integration instance name to retrieve Firewalls serials list. name: pan_os_integration_instance_name -comment: "Verify that all firewalls successfully pushed logs to the Cortex Data Lake for the last 12 hours. It's an easy way to do monitoring of the FW connection to CDL.\nYou can use either a manual list of FW serials or a Panorama integration to get the list of equipment to monitor. " +comment: 'Verify that all firewalls successfully pushed logs to the Cortex Data Lake for the last 12 hours. It''s an easy way to do monitoring of the FW connection to CDL. + + You can use either a manual list of FW serials or a Panorama integration to get the list of equipment to monitor. ' dependson: must: - pan-os @@ -27,7 +29,7 @@ tags: - XDR type: python subtype: python3 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 fromversion: 6.0.0 tests: - No tests (auto formatted) diff --git a/Packs/PANOStoCDLMonitoring/pack_metadata.json b/Packs/PANOStoCDLMonitoring/pack_metadata.json index daae061c05ae..6ab479760274 100644 --- a/Packs/PANOStoCDLMonitoring/pack_metadata.json +++ b/Packs/PANOStoCDLMonitoring/pack_metadata.json @@ -2,7 +2,7 @@ "name": "PAN-OS to Strata Logging Service Monitoring", "description": "Monitor the PAN-OS FW log upload to the Strata Logging Service in a reoccurring job. The key pre-requisite is the configuration of the Strata Logging Service integration.", "support": "community", - "currentVersion": "1.0.14", + "currentVersion": "1.0.15", "fromversion": "6.0.0", "author": "Brice RENAUD", "url": "", diff --git a/Packs/PassiveTotal/ReleaseNotes/2_1_16.md b/Packs/PassiveTotal/ReleaseNotes/2_1_16.md new file mode 100644 index 000000000000..c729eab5377a --- /dev/null +++ b/Packs/PassiveTotal/ReleaseNotes/2_1_16.md @@ -0,0 +1,51 @@ + +#### Scripts + +##### RiskIQPassiveTotalTrackersScript + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### RiskIQPassiveTotalSSLForSubjectEmailWidgetScript + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### RiskIQPassiveTotalPDNSScript + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### RiskIQPassiveTotalSSLForIssuerEmailWidgetScript + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### RiskIQPassiveTotalPDNSWidgetScript + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### RiskIQPassiveTotalHostPairsParentsWidgetScript + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### RiskIQPassiveTotalWhoisScript + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### RiskIQPassiveTotalSSLScript + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### RiskIQPassiveTotalHostPairsChildrenWidgetScript + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### RiskIQPassiveTotalHostPairChildrenScript + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### RiskIQPassiveTotalHostPairParentsScript + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### RiskIQPassiveTotalSSLWidgetScript + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### RiskIQPassiveTotalTrackersWidgetScript + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### RiskIQPassiveTotalComponentsScript + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### RiskIQPassiveTotalWhoisWidgetScript + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### RiskIQPassiveTotalComponentsWidgetScript + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalComponentsScript/RiskIQPassiveTotalComponentsScript.yml b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalComponentsScript/RiskIQPassiveTotalComponentsScript.yml index a3a24f9b7c07..d3690cb983d2 100644 --- a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalComponentsScript/RiskIQPassiveTotalComponentsScript.yml +++ b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalComponentsScript/RiskIQPassiveTotalComponentsScript.yml @@ -15,7 +15,7 @@ tags: - enhancement timeout: '0' type: python -dockerimage: demisto/python3:3.9.7.24076 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole dependson: must: diff --git a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalComponentsWidgetScript/RiskIQPassiveTotalComponentsWidgetScript.yml b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalComponentsWidgetScript/RiskIQPassiveTotalComponentsWidgetScript.yml index 21eed530fa05..65e262d9ad1b 100644 --- a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalComponentsWidgetScript/RiskIQPassiveTotalComponentsWidgetScript.yml +++ b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalComponentsWidgetScript/RiskIQPassiveTotalComponentsWidgetScript.yml @@ -13,7 +13,7 @@ tags: - dynamic-indicator-section timeout: 300ns type: python -dockerimage: demisto/python3:3.9.7.24076 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole tests: - No tests (auto formatted) diff --git a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalHostPairChildrenScript/RiskIQPassiveTotalHostPairChildrenScript.yml b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalHostPairChildrenScript/RiskIQPassiveTotalHostPairChildrenScript.yml index f34a331f8311..f1e659e4d6c6 100644 --- a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalHostPairChildrenScript/RiskIQPassiveTotalHostPairChildrenScript.yml +++ b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalHostPairChildrenScript/RiskIQPassiveTotalHostPairChildrenScript.yml @@ -18,7 +18,7 @@ subtype: python3 dependson: must: - '|||pt-get-host-pairs' -dockerimage: demisto/python3:3.9.7.24076 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole fromversion: 5.0.0 tests: diff --git a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalHostPairParentsScript/RiskIQPassiveTotalHostPairParentsScript.yml b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalHostPairParentsScript/RiskIQPassiveTotalHostPairParentsScript.yml index fc9030749b34..154db2cdc57c 100644 --- a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalHostPairParentsScript/RiskIQPassiveTotalHostPairParentsScript.yml +++ b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalHostPairParentsScript/RiskIQPassiveTotalHostPairParentsScript.yml @@ -18,7 +18,7 @@ subtype: python3 dependson: must: - '|||pt-get-host-pairs' -dockerimage: demisto/python3:3.9.7.24076 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole fromversion: 5.0.0 tests: diff --git a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalHostPairsChildrenWidgetScript/RiskIQPassiveTotalHostPairsChildrenWidgetScript.yml b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalHostPairsChildrenWidgetScript/RiskIQPassiveTotalHostPairsChildrenWidgetScript.yml index 04d941005f3f..89c803dfb02d 100644 --- a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalHostPairsChildrenWidgetScript/RiskIQPassiveTotalHostPairsChildrenWidgetScript.yml +++ b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalHostPairsChildrenWidgetScript/RiskIQPassiveTotalHostPairsChildrenWidgetScript.yml @@ -13,7 +13,7 @@ tags: - dynamic-indicator-section timeout: 300ns type: python -dockerimage: demisto/python3:3.9.7.24076 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole tests: - No tests (auto formatted) diff --git a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalHostPairsParentsWidgetScript/RiskIQPassiveTotalHostPairsParentsWidgetScript.yml b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalHostPairsParentsWidgetScript/RiskIQPassiveTotalHostPairsParentsWidgetScript.yml index 00752d010a8c..f5e37213e685 100644 --- a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalHostPairsParentsWidgetScript/RiskIQPassiveTotalHostPairsParentsWidgetScript.yml +++ b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalHostPairsParentsWidgetScript/RiskIQPassiveTotalHostPairsParentsWidgetScript.yml @@ -13,7 +13,7 @@ tags: - dynamic-indicator-section timeout: 300ns type: python -dockerimage: demisto/python3:3.9.7.24076 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole tests: - No tests (auto formatted) diff --git a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalPDNSScript/RiskIQPassiveTotalPDNSScript.yml b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalPDNSScript/RiskIQPassiveTotalPDNSScript.yml index 55e892444814..0ad064a550a9 100644 --- a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalPDNSScript/RiskIQPassiveTotalPDNSScript.yml +++ b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalPDNSScript/RiskIQPassiveTotalPDNSScript.yml @@ -20,4 +20,4 @@ type: python fromversion: 5.0.0 tests: - No tests (auto formatted) -dockerimage: demisto/python3:3.9.7.24076 +dockerimage: demisto/python3:3.10.14.100715 diff --git a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalPDNSWidgetScript/RiskIQPassiveTotalPDNSWidgetScript.yml b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalPDNSWidgetScript/RiskIQPassiveTotalPDNSWidgetScript.yml index 30142c4c2ef2..bf29da031a22 100644 --- a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalPDNSWidgetScript/RiskIQPassiveTotalPDNSWidgetScript.yml +++ b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalPDNSWidgetScript/RiskIQPassiveTotalPDNSWidgetScript.yml @@ -13,7 +13,7 @@ tags: - dynamic-indicator-section timeout: 300ns type: python -dockerimage: demisto/python3:3.9.7.24076 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole tests: - No tests (auto formatted) diff --git a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalSSLForIssuerEmailWidgetScript/RiskIQPassiveTotalSSLForIssuerEmailWidgetScript.yml b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalSSLForIssuerEmailWidgetScript/RiskIQPassiveTotalSSLForIssuerEmailWidgetScript.yml index 6e83718ade9f..3ffe9dd0307e 100644 --- a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalSSLForIssuerEmailWidgetScript/RiskIQPassiveTotalSSLForIssuerEmailWidgetScript.yml +++ b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalSSLForIssuerEmailWidgetScript/RiskIQPassiveTotalSSLForIssuerEmailWidgetScript.yml @@ -13,7 +13,7 @@ tags: - dynamic-indicator-section timeout: 300ns type: python -dockerimage: demisto/python3:3.9.7.24076 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole tests: - No tests (auto formatted) diff --git a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalSSLForSubjectEmailWidgetScript/RiskIQPassiveTotalSSLForSubjectEmailWidgetScript.yml b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalSSLForSubjectEmailWidgetScript/RiskIQPassiveTotalSSLForSubjectEmailWidgetScript.yml index 4423fabea7b3..ec79e90352ec 100644 --- a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalSSLForSubjectEmailWidgetScript/RiskIQPassiveTotalSSLForSubjectEmailWidgetScript.yml +++ b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalSSLForSubjectEmailWidgetScript/RiskIQPassiveTotalSSLForSubjectEmailWidgetScript.yml @@ -13,7 +13,7 @@ tags: - dynamic-indicator-section timeout: 300ns type: python -dockerimage: demisto/python3:3.9.7.24076 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole tests: - No tests (auto formatted) diff --git a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalSSLScript/RiskIQPassiveTotalSSLScript.yml b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalSSLScript/RiskIQPassiveTotalSSLScript.yml index 045fc55700a9..fa3d6da45120 100644 --- a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalSSLScript/RiskIQPassiveTotalSSLScript.yml +++ b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalSSLScript/RiskIQPassiveTotalSSLScript.yml @@ -18,7 +18,7 @@ subtype: python3 dependson: must: - '|||pt-ssl-cert-search' -dockerimage: demisto/python3:3.9.7.24076 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole fromversion: 5.0.0 tests: diff --git a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalSSLWidgetScript/RiskIQPassiveTotalSSLWidgetScript.yml b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalSSLWidgetScript/RiskIQPassiveTotalSSLWidgetScript.yml index 9cd7e0b6ff64..1f76f75be8ba 100644 --- a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalSSLWidgetScript/RiskIQPassiveTotalSSLWidgetScript.yml +++ b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalSSLWidgetScript/RiskIQPassiveTotalSSLWidgetScript.yml @@ -13,7 +13,7 @@ tags: - dynamic-indicator-section timeout: 300ns type: python -dockerimage: demisto/python3:3.9.7.24076 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole tests: - No tests (auto formatted) diff --git a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalTrackersScript/RiskIQPassiveTotalTrackersScript.yml b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalTrackersScript/RiskIQPassiveTotalTrackersScript.yml index e358f8443904..62b5a157e434 100644 --- a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalTrackersScript/RiskIQPassiveTotalTrackersScript.yml +++ b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalTrackersScript/RiskIQPassiveTotalTrackersScript.yml @@ -22,4 +22,4 @@ runas: DBotWeakRole fromversion: 5.0.0 tests: - No tests (auto formatted) -dockerimage: demisto/python3:3.9.7.24076 +dockerimage: demisto/python3:3.10.14.100715 diff --git a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalTrackersWidgetScript/RiskIQPassiveTotalTrackersWidgetScript.yml b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalTrackersWidgetScript/RiskIQPassiveTotalTrackersWidgetScript.yml index 675e3af04787..76bafac44d6a 100644 --- a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalTrackersWidgetScript/RiskIQPassiveTotalTrackersWidgetScript.yml +++ b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalTrackersWidgetScript/RiskIQPassiveTotalTrackersWidgetScript.yml @@ -13,7 +13,7 @@ tags: - dynamic-indicator-section timeout: 300ns type: python -dockerimage: demisto/python3:3.9.7.24076 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole tests: - No tests (auto formatted) diff --git a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalWhoisScript/RiskIQPassiveTotalWhoisScript.yml b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalWhoisScript/RiskIQPassiveTotalWhoisScript.yml index 43eea907a03d..10c399de766c 100644 --- a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalWhoisScript/RiskIQPassiveTotalWhoisScript.yml +++ b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalWhoisScript/RiskIQPassiveTotalWhoisScript.yml @@ -18,7 +18,7 @@ tags: - enhancement timeout: '0' type: python -dockerimage: demisto/python3:3.9.7.24076 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole tests: - No tests (auto formatted) diff --git a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalWhoisWidgetScript/RiskIQPassiveTotalWhoisWidgetScript.yml b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalWhoisWidgetScript/RiskIQPassiveTotalWhoisWidgetScript.yml index 0af24b5d4156..cbebbfc3ffe9 100644 --- a/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalWhoisWidgetScript/RiskIQPassiveTotalWhoisWidgetScript.yml +++ b/Packs/PassiveTotal/Scripts/RiskIQPassiveTotalWhoisWidgetScript/RiskIQPassiveTotalWhoisWidgetScript.yml @@ -13,7 +13,7 @@ tags: - dynamic-indicator-section timeout: 300ns type: python -dockerimage: demisto/python3:3.9.7.24076 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole tests: - No tests (auto formatted) diff --git a/Packs/PassiveTotal/pack_metadata.json b/Packs/PassiveTotal/pack_metadata.json index c9282c84ce15..0b52ad60e5b5 100644 --- a/Packs/PassiveTotal/pack_metadata.json +++ b/Packs/PassiveTotal/pack_metadata.json @@ -2,7 +2,7 @@ "name": "PassiveTotal", "description": "Analyze and understand threat infrastructure from a variety of sources–passive DNS, active DNS, WHOIS, SSL certificates and more–without devoting resources to time-intensive manual threat research and analysis", "support": "community", - "currentVersion": "2.1.15", + "currentVersion": "2.1.16", "author": "RiskIQ", "url": "https://www.riskiq.com/resources/support/", "email": "paloaltonetworks@riskiq.net", diff --git a/Packs/PostmarkSpamcheck/Integrations/PostmarkSpamcheck/PostmarkSpamcheck.yml b/Packs/PostmarkSpamcheck/Integrations/PostmarkSpamcheck/PostmarkSpamcheck.yml index fbccb4333072..228244e6da42 100644 --- a/Packs/PostmarkSpamcheck/Integrations/PostmarkSpamcheck/PostmarkSpamcheck.yml +++ b/Packs/PostmarkSpamcheck/Integrations/PostmarkSpamcheck/PostmarkSpamcheck.yml @@ -6,7 +6,7 @@ display: Postmark Spamcheck category: Messaging and Conferencing description: Postmark's spam API, Spamcheck, is a RESTfull interface to the Spam filter tool SpamAssassin. configuration: -- display: 'URL' +- display: URL name: base_url defaultvalue: https://spamcheck.postmarkapp.com type: 0 @@ -14,13 +14,13 @@ configuration: additionalinfo: Postmark Spamcheck API URL - display: Trust any certificate (not secure) name: insecure - defaultvalue: "false" + defaultvalue: 'false' type: 8 - additionalinfo: When ‘trust any certificate’ is selected, the integration ignores TLS/SSL certificate validation errors. Used to test connection issues or connect to a server without a valid certificate. + additionalinfo: "When 'trust any certificate' is selected, the integration ignores TLS/SSL certificate validation errors. Used to test connection issues or connect to a server without a valid certificate." required: false - display: Use system proxy settings name: proxy - defaultvalue: "false" + defaultvalue: 'false' type: 8 additionalinfo: Runs the integration instance using the proxy server (HTTP or HTTPS) that you defined in the server configuration. required: false @@ -36,8 +36,8 @@ script: - name: short auto: PREDEFINED predefined: - - "True" - - "False" + - 'True' + - 'False' description: Only return spam score outputs: - contextPath: Postmark.Spamcheck.score @@ -49,7 +49,7 @@ script: - contextPath: Postmark.Spamcheck.report description: Detailed SpamAssassin report description: Check the spamscore of your email message - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 subtype: python3 fromversion: 6.0.0 tests: diff --git a/Packs/PostmarkSpamcheck/ReleaseNotes/1_0_3.md b/Packs/PostmarkSpamcheck/ReleaseNotes/1_0_3.md new file mode 100644 index 000000000000..b7f4ad71c808 --- /dev/null +++ b/Packs/PostmarkSpamcheck/ReleaseNotes/1_0_3.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Postmark Spamcheck + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/PostmarkSpamcheck/pack_metadata.json b/Packs/PostmarkSpamcheck/pack_metadata.json index d7f05a1427d7..8791503e577b 100644 --- a/Packs/PostmarkSpamcheck/pack_metadata.json +++ b/Packs/PostmarkSpamcheck/pack_metadata.json @@ -1,8 +1,8 @@ { "name": "Postmark Spamcheck", - "description": "Postmark\u2019s spam API, Spamcheck, is a RESTfull interface to the Spam filter tool SpamAssassin.", + "description": "Postmark’s spam API, Spamcheck, is a RESTfull interface to the Spam filter tool SpamAssassin.", "support": "community", - "currentVersion": "1.0.2", + "currentVersion": "1.0.3", "author": "NVISO", "url": "https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/bd-p/Cortex_XSOAR_Discussions", "email": "", diff --git a/Packs/Pulsedive/Integrations/Pulsedive/Pulsedive.yml b/Packs/Pulsedive/Integrations/Pulsedive/Pulsedive.yml index 99b0b2f1f2de..5d9814ca7981 100644 --- a/Packs/Pulsedive/Integrations/Pulsedive/Pulsedive.yml +++ b/Packs/Pulsedive/Integrations/Pulsedive/Pulsedive.yml @@ -445,7 +445,7 @@ script: - contextPath: URL.DATA description: The URL. type: String - dockerimage: demisto/python3:3.10.12.65389 + dockerimage: demisto/python3:3.10.14.100715 script: '' subtype: python3 type: python diff --git a/Packs/Pulsedive/ReleaseNotes/1_6_6.md b/Packs/Pulsedive/ReleaseNotes/1_6_6.md new file mode 100644 index 000000000000..f597311a7f4e --- /dev/null +++ b/Packs/Pulsedive/ReleaseNotes/1_6_6.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Pulsedive + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/Pulsedive/pack_metadata.json b/Packs/Pulsedive/pack_metadata.json index b405c7bffa0b..ae5875439af5 100644 --- a/Packs/Pulsedive/pack_metadata.json +++ b/Packs/Pulsedive/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Pulsedive", "description": "Leverage Pulsedive threat intelligence in Cortex XSOAR to enrich any domain, URL, or IP. Retrieve risk scores and factors, investigate contextual data, pivot on any data point, and investigate potential threats.", "support": "community", - "currentVersion": "1.6.5", + "currentVersion": "1.6.6", "author": "Konrad Zacharias", "url": "https://pulsedive.com", "email": "support@pulsedive.com ", diff --git a/Packs/QRCodeReader/Integrations/QRCodeReaderGoqrMe/QRCodeReaderGoqrMe.yml b/Packs/QRCodeReader/Integrations/QRCodeReaderGoqrMe/QRCodeReaderGoqrMe.yml index c53086e8ac93..0b8ec372d78d 100644 --- a/Packs/QRCodeReader/Integrations/QRCodeReaderGoqrMe/QRCodeReaderGoqrMe.yml +++ b/Packs/QRCodeReader/Integrations/QRCodeReaderGoqrMe/QRCodeReaderGoqrMe.yml @@ -3,7 +3,7 @@ commonfields: id: QR Code Reader - goqr.me version: -1 configuration: -- defaultvalue: "false" +- defaultvalue: 'false' display: Trust any certificate (not secure) name: insecure type: 8 @@ -26,7 +26,7 @@ script: description: Errors reading QR code - contextPath: GoQRCodeData.seq description: sequence numbers read from code - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 runonce: false script: '' subtype: python3 diff --git a/Packs/QRCodeReader/ReleaseNotes/1_0_6.md b/Packs/QRCodeReader/ReleaseNotes/1_0_6.md new file mode 100644 index 000000000000..13c4d3837fc9 --- /dev/null +++ b/Packs/QRCodeReader/ReleaseNotes/1_0_6.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### QR Code Reader - goqr.me + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/QRCodeReader/pack_metadata.json b/Packs/QRCodeReader/pack_metadata.json index 0baee697ac13..7cc3f74c1e2d 100644 --- a/Packs/QRCodeReader/pack_metadata.json +++ b/Packs/QRCodeReader/pack_metadata.json @@ -2,7 +2,7 @@ "name": "QR Code Reader", "description": "Pack contains an integration with api.qrserver.com to read QR codes from uploaded image files.", "support": "community", - "currentVersion": "1.0.5", + "currentVersion": "1.0.6", "author": "vibhuabharadwaj", "url": "", "email": "", diff --git a/Packs/Rapid7InsightVMCloud/Integrations/Rapid7InsightVMCloud/Rapid7InsightVMCloud.yml b/Packs/Rapid7InsightVMCloud/Integrations/Rapid7InsightVMCloud/Rapid7InsightVMCloud.yml index f0a87de4540c..7384645dad37 100644 --- a/Packs/Rapid7InsightVMCloud/Integrations/Rapid7InsightVMCloud/Rapid7InsightVMCloud.yml +++ b/Packs/Rapid7InsightVMCloud/Integrations/Rapid7InsightVMCloud/Rapid7InsightVMCloud.yml @@ -7,7 +7,7 @@ configuration: name: credentials required: true type: 9 -- defaultvalue: "false" +- defaultvalue: 'false' display: Trust any certificate (not secure) name: insecure type: 8 @@ -39,10 +39,10 @@ script: description: Retrieves the scan with the specified identifier. name: insightvm-cloud-get-scan - arguments: - - defaultValue: "0" + - defaultValue: '0' description: The index of the page to retrieve. name: page - - defaultValue: "10" + - defaultValue: '10' description: The number of records per page to retrieve. name: size description: Retrieves a page of scan engines. @@ -54,28 +54,28 @@ script: - description: Search criteria for filtering assets returned. name: hostname required: true - - defaultValue: "0" + - defaultValue: '0' description: The index of the page (zero-based) to retrieve. name: page - - defaultValue: "10" + - defaultValue: '10' description: The number of records per page to retrieve. name: size description: Returns the inventory, assessment, and summary details for a page of assets. name: insightvm-cloud-search-assets - arguments: - - defaultValue: "0" + - defaultValue: '0' description: The index of the page (zero-based) to retrieve. name: page - - defaultValue: "10" + - defaultValue: '10' description: The number of records per page to retrieve. name: size description: Returns the details for sites. name: insightvm-cloud-last-sites - arguments: - - defaultValue: "0" + - defaultValue: '0' description: The index of the page to retrieve. name: page - - defaultValue: "10" + - defaultValue: '10' description: The number of records per page to retrieve name: size - description: Query by which to search for vulnerabilities. @@ -97,7 +97,7 @@ script: required: true description: Stops the scan with the specified identifier. name: insightvm-cloud-stop-scan - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 runonce: false script: '' subtype: python3 diff --git a/Packs/Rapid7InsightVMCloud/ReleaseNotes/1_0_2.md b/Packs/Rapid7InsightVMCloud/ReleaseNotes/1_0_2.md new file mode 100644 index 000000000000..48cf42bf3168 --- /dev/null +++ b/Packs/Rapid7InsightVMCloud/ReleaseNotes/1_0_2.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Rapid7 InsightVM Cloud + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/Rapid7InsightVMCloud/pack_metadata.json b/Packs/Rapid7InsightVMCloud/pack_metadata.json index f403f3c75db7..fa0564225fb8 100644 --- a/Packs/Rapid7InsightVMCloud/pack_metadata.json +++ b/Packs/Rapid7InsightVMCloud/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Rapid7 InsightVM Cloud", "description": "Insight VM is a Vulnerability Management Tool which Scan your Network, Eliminate Vulnerabilities, Track and Communicate progress. ", "support": "community", - "currentVersion": "1.0.1", + "currentVersion": "1.0.2", "author": "thimanshu474", "url": "", "email": "", diff --git a/Packs/SSLCertificates/ReleaseNotes/1_0_2.md b/Packs/SSLCertificates/ReleaseNotes/1_0_2.md new file mode 100644 index 000000000000..920c8dc3e08d --- /dev/null +++ b/Packs/SSLCertificates/ReleaseNotes/1_0_2.md @@ -0,0 +1,6 @@ + +#### Scripts + +##### SSLVerifierV2_ParseOutput + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/SSLCertificates/Scripts/SSLVerifierV2ParseOutput/SSLVerifierV2ParseOutput.yml b/Packs/SSLCertificates/Scripts/SSLVerifierV2ParseOutput/SSLVerifierV2ParseOutput.yml index c9fb8a3b8b69..f6620782987a 100644 --- a/Packs/SSLCertificates/Scripts/SSLVerifierV2ParseOutput/SSLVerifierV2ParseOutput.yml +++ b/Packs/SSLCertificates/Scripts/SSLVerifierV2ParseOutput/SSLVerifierV2ParseOutput.yml @@ -15,18 +15,18 @@ args: - all type: textArea - auto: PREDEFINED - defaultValue: "True" + defaultValue: 'True' description: 'Output the resulting tables to the war room? Default: true' name: OutputToWarRoom predefined: - - "True" - - "False" + - 'True' + - 'False' type: unknown comment: "Parses the output from the !SSLVerifierV2 automation into a markdown table and separate context key . \n\nThis automation uses the SSLVerifierV2 key by default, but a custom context key can be specified in the event extend-context is used with the SSLVerifierV2 automation. \n\nOption to specify whether to output certificates with an expiring, warning, or good status (or all at once). \n\nOption to specify whether or not to output the generated tables to the war room. \n\n" commonfields: id: SSLVerifierV2_ParseOutput version: -1 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: SSLVerifierV2_ParseOutput outputs: diff --git a/Packs/SSLCertificates/pack_metadata.json b/Packs/SSLCertificates/pack_metadata.json index 11fba65cfe84..959b271b1e61 100644 --- a/Packs/SSLCertificates/pack_metadata.json +++ b/Packs/SSLCertificates/pack_metadata.json @@ -2,12 +2,14 @@ "name": "SSL Certificates", "description": "SSL Certificate Content Pack for performing SSL Certificate validation.", "support": "community", - "currentVersion": "1.0.1", + "currentVersion": "1.0.2", "author": "Josh Levine", "url": "", "email": "", "created": "2023-02-01T17:39:08Z", - "categories": ["Utilities"], + "categories": [ + "Utilities" + ], "tags": [], "useCases": [], "keywords": [], @@ -18,4 +20,4 @@ "githubUser": [ "TerminalFin" ] -} +} \ No newline at end of file diff --git a/Packs/SalesforceIndicators/Integrations/SalesforceIndicators/SalesforceIndicators.yml b/Packs/SalesforceIndicators/Integrations/SalesforceIndicators/SalesforceIndicators.yml index dfbcdfa7e3e8..d5b4466f5ff6 100644 --- a/Packs/SalesforceIndicators/Integrations/SalesforceIndicators/SalesforceIndicators.yml +++ b/Packs/SalesforceIndicators/Integrations/SalesforceIndicators/SalesforceIndicators.yml @@ -97,7 +97,7 @@ configuration: name: key_field required: true type: 0 -- additionalinfo: "The SOQL filter to use (example: Id = '123' AND Name = 'Test')" +- additionalinfo: 'The SOQL filter to use (example: Id = ''123'' AND Name = ''Test'')' display: Filter name: filter type: 12 @@ -141,7 +141,7 @@ script: - arguments: [] name: salesforce-get-indicators description: Executes the fetch-indicators command - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 feed: true script: '' subtype: python3 diff --git a/Packs/SalesforceIndicators/ReleaseNotes/1_0_10.md b/Packs/SalesforceIndicators/ReleaseNotes/1_0_10.md new file mode 100644 index 000000000000..85791a300a35 --- /dev/null +++ b/Packs/SalesforceIndicators/ReleaseNotes/1_0_10.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Salesforce Indicators + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/SalesforceIndicators/pack_metadata.json b/Packs/SalesforceIndicators/pack_metadata.json index 8f58ca5fa2af..d5a737cc086e 100644 --- a/Packs/SalesforceIndicators/pack_metadata.json +++ b/Packs/SalesforceIndicators/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Salesforce Indicators", "description": "This pack contains 1 integration.\n\nThe Salesforce Indicator Integration allows you to pull in Salesforce objects as indicators.", "support": "community", - "currentVersion": "1.0.9", + "currentVersion": "1.0.10", "author": "Adam Burt", "url": "", "email": "", diff --git a/Packs/SalesforceV2/Integrations/SalesforceV2/SalesforceV2.yml b/Packs/SalesforceV2/Integrations/SalesforceV2/SalesforceV2.yml index 118cba740fb2..aed9f2a21180 100644 --- a/Packs/SalesforceV2/Integrations/SalesforceV2/SalesforceV2.yml +++ b/Packs/SalesforceV2/Integrations/SalesforceV2/SalesforceV2.yml @@ -37,7 +37,7 @@ configuration: - comments type: 15 required: false -- additionalinfo: "E.g.: OwnerId='0056s000000wGoWAAX'" +- additionalinfo: 'E.g.: OwnerId=''0056s000000wGoWAAX''' display: Define a query to determine which objects to fetch. name: condition type: 0 @@ -1083,7 +1083,7 @@ script: name: caseNumber description: Retrieve a case file by file ID. name: salesforce-get-case-file-by-id - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 isfetch: true ismappable: true isremotesyncin: true diff --git a/Packs/SalesforceV2/ReleaseNotes/1_0_5.md b/Packs/SalesforceV2/ReleaseNotes/1_0_5.md new file mode 100644 index 000000000000..3d6e45ac17b6 --- /dev/null +++ b/Packs/SalesforceV2/ReleaseNotes/1_0_5.md @@ -0,0 +1,15 @@ + +#### Integrations + +##### Salesforce v2 + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. + +#### Scripts + +##### SalesforceCaseStatusPicklist + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### SalesforceCaseStatus + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/SalesforceV2/Scripts/SalesforceCaseStatus/SalesforceCaseStatus.yml b/Packs/SalesforceV2/Scripts/SalesforceCaseStatus/SalesforceCaseStatus.yml index 4eb2068f9cc9..0009857a60b3 100644 --- a/Packs/SalesforceV2/Scripts/SalesforceCaseStatus/SalesforceCaseStatus.yml +++ b/Packs/SalesforceV2/Scripts/SalesforceCaseStatus/SalesforceCaseStatus.yml @@ -1,12 +1,13 @@ -comment: | - Populates the value of the Salesforce status field and displays it in a layout widget. +comment: 'Populates the value of the Salesforce status field and displays it in a layout widget. + + ' commonfields: id: SalesforceCaseStatus version: -1 contentitemexportablefields: contentitemfields: - fromServerVersion: "" -dockerimage: demisto/python3:3.10.12.63474 + fromServerVersion: '' +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: SalesforceCaseStatus runas: DBotWeakRole diff --git a/Packs/SalesforceV2/Scripts/SalesforceCaseStatusPicklist/SalesforceCaseStatusPicklist.yml b/Packs/SalesforceV2/Scripts/SalesforceCaseStatusPicklist/SalesforceCaseStatusPicklist.yml index 42e5e2739260..36ccb51f0544 100644 --- a/Packs/SalesforceV2/Scripts/SalesforceCaseStatusPicklist/SalesforceCaseStatusPicklist.yml +++ b/Packs/SalesforceV2/Scripts/SalesforceCaseStatusPicklist/SalesforceCaseStatusPicklist.yml @@ -1,11 +1,11 @@ -comment: 'Retrieves and displays the case status values from Salesforce.' +comment: Retrieves and displays the case status values from Salesforce. commonfields: id: SalesforceCaseStatusPicklist version: -1 contentitemexportablefields: contentitemfields: - fromServerVersion: "" -dockerimage: demisto/python3:3.10.12.63474 + fromServerVersion: '' +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: SalesforceCaseStatusPicklist runas: DBotWeakRole diff --git a/Packs/SalesforceV2/pack_metadata.json b/Packs/SalesforceV2/pack_metadata.json index 053e3ee78895..adc6bd1d1c59 100644 --- a/Packs/SalesforceV2/pack_metadata.json +++ b/Packs/SalesforceV2/pack_metadata.json @@ -2,7 +2,7 @@ "name": "SalesforceV2", "description": "CRM Services", "support": "community", - "currentVersion": "1.0.4", + "currentVersion": "1.0.5", "author": "Silviu-Mihail Dascalu", "url": "", "email": "sdascalu@paloaltonetworks.com", diff --git a/Packs/SecurityTrails/Integrations/SecurityTrails/SecurityTrails.yml b/Packs/SecurityTrails/Integrations/SecurityTrails/SecurityTrails.yml index ea7898eb651a..0dff92ae6601 100644 --- a/Packs/SecurityTrails/Integrations/SecurityTrails/SecurityTrails.yml +++ b/Packs/SecurityTrails/Integrations/SecurityTrails/SecurityTrails.yml @@ -60,12 +60,12 @@ script: name: hostname required: true - auto: PREDEFINED - defaultValue: "true" + defaultValue: 'true' description: Only return children subdomains name: children_only predefined: - - "true" - - "false" + - 'true' + - 'false' description: Returns child and sibling subdomains for a given hostname. name: securitytrails-get-subdomains outputs: @@ -531,21 +531,21 @@ script: type: string - arguments: - auto: PREDEFINED - defaultValue: "false" + defaultValue: 'false' description: Resolves any A records and additionally returns IP addresses. name: include_ips predefined: - - "false" - - "true" + - 'false' + - 'true' - description: The page of the returned results, starting at 1. A page returns 100 results. name: page - auto: PREDEFINED - defaultValue: "false" + defaultValue: 'false' description: Request scrolling. Only supported when query is used and not filter. See the Scrolling API endpoint. name: scroll predefined: - - "false" - - "true" + - 'false' + - 'true' - description: The DSL query you want to run (https://docs.securitytrails.com/docs/how-to-use-the-dsl). name: query - description: JSON dicitonary of filter terms (https://docs.securitytrails.com/reference#domain-search). Can not be used together with query. @@ -643,7 +643,7 @@ script: description: Associated Domain Count type: number - arguments: - - defaultValue: "1" + - defaultValue: '1' description: The page of the returned results, starting at 1. A page returns 100 results. name: page - description: The DSL query you want to run (https://docs.securitytrails.com/docs/how-to-use-the-dsl). @@ -730,7 +730,7 @@ script: - description: IP Address name: ipaddress required: true - - defaultValue: "1" + - defaultValue: '1' description: The page of the returned results, starting at 1. A page returns 100 results. name: page description: Fetch user agents seen during the last 30 days for a specific IPv4 address. It shows devices with egressing traffic based on large scale web server logs. The number of results is not limited. @@ -866,7 +866,7 @@ script: description: The phone number of the registrant. type: String - contextPath: Domain.WHOIS.Registrar.Name - description: "The name of the registrar, for example: `GoDaddy`" + description: 'The name of the registrar, for example: `GoDaddy`' type: String - contextPath: Domain.WHOIS.Registrar.Email description: The email address of the contact. @@ -899,16 +899,16 @@ script: - name: sql description: 'The SQL query to execute (example: SELECT attribute FROM table WHERE condition = "value")' required: true - defaultValue: "" + defaultValue: '' predefined: - - "" + - '' - name: timeout description: Read timeout for calls (default is 20 seconds) - defaultValue: "20" + defaultValue: '20' predefined: - - "" + - '' name: securitytrails-sql-query - description: "Queries the SecurityTrails SQL endpoint. The SecurityTrails SQL API provides a powerful SQL-like query interface to data via certain API endpoints. For a full reference of properties and operators please check the following link: https://securitytrails.com/reference/sql" + description: 'Queries the SecurityTrails SQL endpoint. The SecurityTrails SQL API provides a powerful SQL-like query interface to data via certain API endpoints. For a full reference of properties and operators please check the following link: https://securitytrails.com/reference/sql' outputs: - contextPath: Securitytrails.SQL.total description: The total number of hits discovered @@ -929,14 +929,14 @@ script: - name: id description: The ID to use to retrieve the next page of results required: true - defaultValue: "" + defaultValue: '' predefined: - - "" + - '' - name: timeout description: Read timeout for calls (default is 20 seconds) - defaultValue: "20" + defaultValue: '20' predefined: - - "" + - '' name: securitytrails-sql-get-next description: Retrieves the next page of results returned from a SQL query where the results exceeded the last page. outputs: @@ -951,7 +951,7 @@ script: - contextPath: Securitytrails.SQL.query description: The original query used type: string - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 runonce: false script: '' subtype: python3 diff --git a/Packs/SecurityTrails/ReleaseNotes/1_1_7.md b/Packs/SecurityTrails/ReleaseNotes/1_1_7.md new file mode 100644 index 000000000000..a8ada8b69571 --- /dev/null +++ b/Packs/SecurityTrails/ReleaseNotes/1_1_7.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### SecurityTrails + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/SecurityTrails/pack_metadata.json b/Packs/SecurityTrails/pack_metadata.json index 602bfede7ecb..b2befd079d20 100644 --- a/Packs/SecurityTrails/pack_metadata.json +++ b/Packs/SecurityTrails/pack_metadata.json @@ -2,7 +2,7 @@ "name": "SecurityTrails", "description": "Integration for the SecurityTrails platform.", "support": "community", - "currentVersion": "1.1.6", + "currentVersion": "1.1.7", "author": "Adam Burt", "url": "", "email": "", diff --git a/Packs/ShiftManagement-AssignToNextShift/ReleaseNotes/1_1_5.md b/Packs/ShiftManagement-AssignToNextShift/ReleaseNotes/1_1_5.md new file mode 100644 index 000000000000..498b3bb76c52 --- /dev/null +++ b/Packs/ShiftManagement-AssignToNextShift/ReleaseNotes/1_1_5.md @@ -0,0 +1,6 @@ + +#### Scripts + +##### AssignToNextShift + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/ShiftManagement-AssignToNextShift/Scripts/AssignToNextShift/AssignToNextShift.yml b/Packs/ShiftManagement-AssignToNextShift/Scripts/AssignToNextShift/AssignToNextShift.yml index e7e8209fcda3..26739d705220 100644 --- a/Packs/ShiftManagement-AssignToNextShift/Scripts/AssignToNextShift/AssignToNextShift.yml +++ b/Packs/ShiftManagement-AssignToNextShift/Scripts/AssignToNextShift/AssignToNextShift.yml @@ -2,18 +2,22 @@ args: - description: The Incident IDs to reassign, can be a comma separated list (e.g. 1,2,3,4) name: incident_id required: true -comment: |- - Randomly assigns the incidents to users on call (requires shift management) and users on call. +comment: 'Randomly assigns the incidents to users on call (requires shift management) and users on call. + https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.10/Cortex-XSOAR-Administrator-Guide/Shift-Management#idf554fd0f-f93b-40cd-9111-1393bf25ac6e + Incident Ids should be passed in as a comma separated list. + This automation runs using the default Limited User role, unless you explicitly change the permissions. + For more information, see the section about permissions here: - https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.10/Cortex-XSOAR-Administrator-Guide/Automations + + https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.10/Cortex-XSOAR-Administrator-Guide/Automations' commonfields: id: AssignToNextShift version: -1 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: AssignToNextShift script: '' diff --git a/Packs/ShiftManagement-AssignToNextShift/pack_metadata.json b/Packs/ShiftManagement-AssignToNextShift/pack_metadata.json index 98d3689f03e4..1796b3b99583 100644 --- a/Packs/ShiftManagement-AssignToNextShift/pack_metadata.json +++ b/Packs/ShiftManagement-AssignToNextShift/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Shift Management - Assign to Next Shift", "description": "Automation & Playbook to assign active Incidents to the next group of users on call. ", "support": "community", - "currentVersion": "1.1.4", + "currentVersion": "1.1.5", "author": "beauchompers", "url": "", "email": "", diff --git a/Packs/SimpleDebugger/ReleaseNotes/1_0_2.md b/Packs/SimpleDebugger/ReleaseNotes/1_0_2.md new file mode 100644 index 000000000000..a601f6308ed9 --- /dev/null +++ b/Packs/SimpleDebugger/ReleaseNotes/1_0_2.md @@ -0,0 +1,6 @@ + +#### Scripts + +##### SimpleDebugger + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/SimpleDebugger/Scripts/SimpleDebugger/SimpleDebugger.yml b/Packs/SimpleDebugger/Scripts/SimpleDebugger/SimpleDebugger.yml index 12bb2cf5be28..56a6265336db 100644 --- a/Packs/SimpleDebugger/Scripts/SimpleDebugger/SimpleDebugger.yml +++ b/Packs/SimpleDebugger/Scripts/SimpleDebugger/SimpleDebugger.yml @@ -4,8 +4,8 @@ commonfields: version: -1 contentitemexportablefields: contentitemfields: - fromServerVersion: "" -dockerimage: demisto/python3:3.10.10.48392 + fromServerVersion: '' +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: SimpleDebugger runas: DBotWeakRole diff --git a/Packs/SimpleDebugger/pack_metadata.json b/Packs/SimpleDebugger/pack_metadata.json index 2e2c58c8981b..ee1e496bf87e 100644 --- a/Packs/SimpleDebugger/pack_metadata.json +++ b/Packs/SimpleDebugger/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Simple Debugger", "description": "This content pack provides a simple debugger for debugging custom python automations in XSOAR. You can visually trace code execution, set breakpoints, step through the code, display local variables, and profile execution times of python functions.", "support": "community", - "currentVersion": "1.0.1", + "currentVersion": "1.0.2", "author": "rurhrlaub", "url": "", "email": "", @@ -19,4 +19,4 @@ "githubUser": [ "rurhrlaub" ] -} +} \ No newline at end of file diff --git a/Packs/SnortIPBlocklist/Integrations/FeedSnortIPBlocklist/FeedSnortIPBlocklist.yml b/Packs/SnortIPBlocklist/Integrations/FeedSnortIPBlocklist/FeedSnortIPBlocklist.yml index a6358b1cae9a..2968ec1d3cd9 100644 --- a/Packs/SnortIPBlocklist/Integrations/FeedSnortIPBlocklist/FeedSnortIPBlocklist.yml +++ b/Packs/SnortIPBlocklist/Integrations/FeedSnortIPBlocklist/FeedSnortIPBlocklist.yml @@ -3,7 +3,7 @@ commonfields: id: Snort IP Blocklist Feed version: -1 configuration: -- defaultvalue: "true" +- defaultvalue: 'true' display: Fetch indicators name: feed type: 8 @@ -47,13 +47,13 @@ configuration: - WHITE type: 15 required: false -- defaultvalue: "480" +- defaultvalue: '480' display: Feed Fetch Interval name: feedFetchInterval type: 19 required: false - additionalinfo: When selected, the exclusion list is ignored for indicators from this feed. This means that if an indicator from this feed is on the exclusion list, the indicator might still be added to the system. - defaultvalue: "true" + defaultvalue: 'true' display: Bypass exclusion list name: feedBypassExclusionList type: 8 @@ -66,7 +66,7 @@ configuration: name: proxy type: 8 required: false -- display: "" +- display: '' name: feedExpirationPolicy options: - never @@ -75,7 +75,7 @@ configuration: - suddenDeath type: 17 required: false -- display: "" +- display: '' name: feedExpirationInterval type: 1 required: false @@ -91,12 +91,12 @@ name: Snort IP Blocklist Feed script: commands: - arguments: - - defaultValue: "10" + - defaultValue: '10' description: The maximum number of IP indicators to return. name: limit description: Gets indicators from the feed. name: snort-get-ip-blocklist-indicators - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 feed: true script: '' subtype: python3 diff --git a/Packs/SnortIPBlocklist/ReleaseNotes/1_0_2.md b/Packs/SnortIPBlocklist/ReleaseNotes/1_0_2.md new file mode 100644 index 000000000000..07af4712237e --- /dev/null +++ b/Packs/SnortIPBlocklist/ReleaseNotes/1_0_2.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Snort IP Blocklist Feed + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/SnortIPBlocklist/pack_metadata.json b/Packs/SnortIPBlocklist/pack_metadata.json index ba2943b7ab37..68b6155f97bf 100644 --- a/Packs/SnortIPBlocklist/pack_metadata.json +++ b/Packs/SnortIPBlocklist/pack_metadata.json @@ -2,18 +2,22 @@ "name": "Snort IP Blocklist Feed", "description": "Snort IP Blocklist feed from https://www.snort.org/", "support": "community", - "currentVersion": "1.0.1", + "currentVersion": "1.0.2", "author": "Vibhu A Bharadwaj", "url": "", "email": "vbharadwaj@paloaltonetworks.com", "created": "2022-09-01T21:49:03Z", - "categories": ["Data Enrichment & Threat Intelligence"], + "categories": [ + "Data Enrichment & Threat Intelligence" + ], "tags": [ "Free Feed", "Plug & Fetch" ], "useCases": [], - "keywords": ["Feed"], + "keywords": [ + "Feed" + ], "marketplaces": [ "xsoar", "marketplacev2" @@ -21,4 +25,4 @@ "githubUser": [ "vibhuabharadwaj" ] -} +} \ No newline at end of file diff --git a/Packs/SpyCloud/Integrations/SpyCloud/SpyCloud.yml b/Packs/SpyCloud/Integrations/SpyCloud/SpyCloud.yml index 2d780e2bdf48..3120fce4f737 100644 --- a/Packs/SpyCloud/Integrations/SpyCloud/SpyCloud.yml +++ b/Packs/SpyCloud/Integrations/SpyCloud/SpyCloud.yml @@ -219,7 +219,7 @@ script: - contextPath: SpyCloud.Watchlist.domain description: The domain involved of the watchlist (if that type is selected) type: String - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 runonce: false script: '' subtype: python3 diff --git a/Packs/SpyCloud/ReleaseNotes/1_0_4.md b/Packs/SpyCloud/ReleaseNotes/1_0_4.md new file mode 100644 index 000000000000..48e36274a382 --- /dev/null +++ b/Packs/SpyCloud/ReleaseNotes/1_0_4.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### SpyCloud + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/SpyCloud/pack_metadata.json b/Packs/SpyCloud/pack_metadata.json index 2cc8a2857d29..17aa292cde18 100644 --- a/Packs/SpyCloud/pack_metadata.json +++ b/Packs/SpyCloud/pack_metadata.json @@ -2,7 +2,7 @@ "name": "SpyCloud", "description": "Integration for retrieving data from the SpyCloud ATO API", "support": "community", - "currentVersion": "1.0.3", + "currentVersion": "1.0.4", "author": "Niels Heijmans", "url": "", "email": "", diff --git a/Packs/StarterPack/Integrations/BaseIntegration/BaseIntegration.yml b/Packs/StarterPack/Integrations/BaseIntegration/BaseIntegration.yml index f7455a2baadc..2af0cb63cf77 100644 --- a/Packs/StarterPack/Integrations/BaseIntegration/BaseIntegration.yml +++ b/Packs/StarterPack/Integrations/BaseIntegration/BaseIntegration.yml @@ -23,7 +23,7 @@ configuration: type: 8 required: false description: '[Enter a comprehensive, yet concise, description of what the integration does, what use cases it is designed for, etc.]' -display: 'Starter Base Integration - Name the integration as it will appear in the XSOAR UI' +display: Starter Base Integration - Name the integration as it will appear in the XSOAR UI name: BaseIntegration script: commands: @@ -41,7 +41,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 fromversion: 5.0.0 tests: - No tests (auto formatted) diff --git a/Packs/StarterPack/ReleaseNotes/1_0_13.md b/Packs/StarterPack/ReleaseNotes/1_0_13.md new file mode 100644 index 000000000000..c01f922a6b4f --- /dev/null +++ b/Packs/StarterPack/ReleaseNotes/1_0_13.md @@ -0,0 +1,12 @@ + +#### Integrations + +##### Starter Base Integration - Name the integration as it will appear in the XSOAR UI + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. + +#### Scripts + +##### BaseScript + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/StarterPack/Scripts/BaseScript/BaseScript.yml b/Packs/StarterPack/Scripts/BaseScript/BaseScript.yml index 26be0019b1ee..93f767a3e39f 100644 --- a/Packs/StarterPack/Scripts/BaseScript/BaseScript.yml +++ b/Packs/StarterPack/Scripts/BaseScript/BaseScript.yml @@ -17,5 +17,5 @@ tags: timeout: '0' type: python subtype: python3 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 fromversion: 5.0.0 diff --git a/Packs/StarterPack/pack_metadata.json b/Packs/StarterPack/pack_metadata.json index e1c357dbe48d..593af69b6462 100644 --- a/Packs/StarterPack/pack_metadata.json +++ b/Packs/StarterPack/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Starter Pack", "description": "Starter Pack for learning how to build new content in Cortex XSOAR", "support": "community", - "currentVersion": "1.0.12", + "currentVersion": "1.0.13", "author": "Cortex XSOAR", "url": "https://put_your_support_url_here", "email": "put_your_support_email@here", @@ -10,7 +10,9 @@ "categories": [ "Utilities" ], - "tags": ["Core"], + "tags": [ + "Core" + ], "useCases": [], "keywords": [], "marketplaces": [ diff --git a/Packs/TeamManagement/ReleaseNotes/1_0_3.md b/Packs/TeamManagement/ReleaseNotes/1_0_3.md new file mode 100644 index 000000000000..21bf1904431b --- /dev/null +++ b/Packs/TeamManagement/ReleaseNotes/1_0_3.md @@ -0,0 +1,6 @@ + +#### Scripts + +##### EnumerateRoles + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/TeamManagement/Scripts/EnumerateRoles/EnumerateRoles.yml b/Packs/TeamManagement/Scripts/EnumerateRoles/EnumerateRoles.yml index 864a2c213236..45b7f7e066d4 100644 --- a/Packs/TeamManagement/Scripts/EnumerateRoles/EnumerateRoles.yml +++ b/Packs/TeamManagement/Scripts/EnumerateRoles/EnumerateRoles.yml @@ -6,7 +6,7 @@ comment: The script will enumerate any provided role names and output the list o commonfields: id: EnumerateRoles version: -1 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: EnumerateRoles outputs: diff --git a/Packs/TeamManagement/pack_metadata.json b/Packs/TeamManagement/pack_metadata.json index 62dca8b25254..82c9535d939d 100644 --- a/Packs/TeamManagement/pack_metadata.json +++ b/Packs/TeamManagement/pack_metadata.json @@ -2,12 +2,14 @@ "name": "Team Management", "description": "This pack contains playbooks and automation scripts to help with the management of team members within an incident. It's current features include:\n\n- Ability to add team members to an incident based on username or role\n", "support": "community", - "currentVersion": "1.0.2", + "currentVersion": "1.0.3", "author": "Adam Burt", "url": "", "email": "", "created": "2021-06-09T12:29:39Z", - "categories": ["Data Enrichment & Threat Intelligence"], + "categories": [ + "Data Enrichment & Threat Intelligence" + ], "tags": [], "useCases": [], "keywords": [], diff --git a/Packs/ThousandEyes/Integrations/ThousandEyes/ThousandEyes.yml b/Packs/ThousandEyes/Integrations/ThousandEyes/ThousandEyes.yml index aa79c88613dd..0ce4b624ce39 100644 --- a/Packs/ThousandEyes/Integrations/ThousandEyes/ThousandEyes.yml +++ b/Packs/ThousandEyes/Integrations/ThousandEyes/ThousandEyes.yml @@ -1,13 +1,13 @@ category: Vulnerability Management commonfields: - id: 'ThousandEyes' + id: ThousandEyes version: -1 configuration: - display: Base API URL name: base_url required: true type: 0 -- display: "API Token" +- display: API Token name: credentials required: true hiddenusername: true @@ -16,7 +16,7 @@ configuration: name: isFetch type: 8 required: false -- defaultvalue: "1" +- defaultvalue: '1' display: Incidents Fetch Interval name: incidentFetchInterval type: 19 @@ -48,9 +48,9 @@ configuration: - CRITICAL type: 15 required: false -description: This Integration is used to to fetch-incidents via “Active alerts”, get alert details via “Alert details”, and get the “Agent list”. -display: 'ThousandEyes' -name: 'ThousandEyes' +description: 'This Integration is used to to fetch-incidents via "Active alerts", get alert details via "Alert details", and get the "Agent list".' +display: ThousandEyes +name: ThousandEyes script: commands: - arguments: @@ -149,7 +149,7 @@ script: required: true description: Fetches a given agent. name: thousandeyes-get-agent - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 isFetchSamples: true isfetch: true script: '' diff --git a/Packs/ThousandEyes/ReleaseNotes/1_0_2.md b/Packs/ThousandEyes/ReleaseNotes/1_0_2.md new file mode 100644 index 000000000000..b51a61d3a30c --- /dev/null +++ b/Packs/ThousandEyes/ReleaseNotes/1_0_2.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### ThousandEyes + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/ThousandEyes/pack_metadata.json b/Packs/ThousandEyes/pack_metadata.json index 3a523d09010e..34e9fa052838 100644 --- a/Packs/ThousandEyes/pack_metadata.json +++ b/Packs/ThousandEyes/pack_metadata.json @@ -2,12 +2,14 @@ "name": "ThousandEyes", "description": "This pack is used to to fetch-incidents, get alerts details and to get agent list", "support": "community", - "currentVersion": "1.0.1", + "currentVersion": "1.0.2", "author": "masquerad3r", "url": "", "email": "masquerad3r@gmail.com", "created": "2022-07-21T11:23:11Z", - "categories": ["Network Security"], + "categories": [ + "Network Security" + ], "tags": [], "useCases": [], "keywords": [], @@ -18,4 +20,4 @@ "xsoar", "marketplacev2" ] -} +} \ No newline at end of file diff --git a/Packs/Trello/Integrations/Trello/Trello.yml b/Packs/Trello/Integrations/Trello/Trello.yml index 97292109c6cb..5bb93039fcde 100644 --- a/Packs/Trello/Integrations/Trello/Trello.yml +++ b/Packs/Trello/Integrations/Trello/Trello.yml @@ -328,7 +328,7 @@ script: - contextPath: Trello.Cards.Labels.id description: Label ID type: Unknown - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 isfetch: true runonce: false script: '-' diff --git a/Packs/Trello/ReleaseNotes/1_0_10.md b/Packs/Trello/ReleaseNotes/1_0_10.md new file mode 100644 index 000000000000..c728f3cc654c --- /dev/null +++ b/Packs/Trello/ReleaseNotes/1_0_10.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Trello + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/Trello/pack_metadata.json b/Packs/Trello/pack_metadata.json index 125a461f6615..adb8776a199c 100644 --- a/Packs/Trello/pack_metadata.json +++ b/Packs/Trello/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Trello", "description": "Trello is a card-based activity tracker. Use this content pack to organize and prioritize your personal and work life using boards, lists, cards and so on.", "support": "community", - "currentVersion": "1.0.9", + "currentVersion": "1.0.10", "author": "Adam Baumeister", "url": "", "email": "", diff --git a/Packs/TwitterIOCHunter-FullDailyFeed/Integrations/TwitterIOCHunterFullDailyFeed/TwitterIOCHunterFullDailyFeed.yml b/Packs/TwitterIOCHunter-FullDailyFeed/Integrations/TwitterIOCHunterFullDailyFeed/TwitterIOCHunterFullDailyFeed.yml index 09616252bd1d..6031b72d5b12 100644 --- a/Packs/TwitterIOCHunter-FullDailyFeed/Integrations/TwitterIOCHunterFullDailyFeed/TwitterIOCHunterFullDailyFeed.yml +++ b/Packs/TwitterIOCHunter-FullDailyFeed/Integrations/TwitterIOCHunterFullDailyFeed/TwitterIOCHunterFullDailyFeed.yml @@ -102,7 +102,7 @@ script: - arguments: [] description: Get Indicators from TwitterIOCHunter name: twitteriochunter-get-indicators - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 feed: true isFetchSamples: true script: '' diff --git a/Packs/TwitterIOCHunter-FullDailyFeed/ReleaseNotes/1_0_6.md b/Packs/TwitterIOCHunter-FullDailyFeed/ReleaseNotes/1_0_6.md new file mode 100644 index 000000000000..4a3eac499a87 --- /dev/null +++ b/Packs/TwitterIOCHunter-FullDailyFeed/ReleaseNotes/1_0_6.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### TwitterIOCHunter Feed + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/TwitterIOCHunter-FullDailyFeed/pack_metadata.json b/Packs/TwitterIOCHunter-FullDailyFeed/pack_metadata.json index d19ac99ee8c9..994fadbe07bf 100644 --- a/Packs/TwitterIOCHunter-FullDailyFeed/pack_metadata.json +++ b/Packs/TwitterIOCHunter-FullDailyFeed/pack_metadata.json @@ -2,12 +2,14 @@ "name": "TwitterIOCHunter - Full Daily Feed", "description": "Implements the Twitter IOC project daily full feed as indicator feed into XSOAR. http://tweettioc.com/feed/api", "support": "community", - "currentVersion": "1.0.5", + "currentVersion": "1.0.6", "author": "Harri Ruuttila", "url": "", "email": "", "created": "2021-05-25T19:02:59Z", - "categories": ["Data Enrichment & Threat Intelligence"], + "categories": [ + "Data Enrichment & Threat Intelligence" + ], "tags": [ "Threat Intelligence Management", "Getting Started" @@ -21,4 +23,4 @@ "xsoar", "marketplacev2" ] -} +} \ No newline at end of file diff --git a/Packs/USTA/Integrations/USTA/USTA.yml b/Packs/USTA/Integrations/USTA/USTA.yml index 17337efd737c..8a27a4038040 100644 --- a/Packs/USTA/Integrations/USTA/USTA.yml +++ b/Packs/USTA/Integrations/USTA/USTA.yml @@ -23,7 +23,7 @@ configuration: name: proxy type: 8 required: false -description: "USTA is an Cyber Intelligence Platform that responds directly and effectively to today's complex cyber threats. " +description: 'USTA is an Cyber Intelligence Platform that responds directly and effectively to today''s complex cyber threats. ' display: USTA name: USTA script: @@ -251,7 +251,7 @@ script: - contextPath: Usta.CloseIncident.id description: If the incident is closed, returns the id value that was closed. name: usta-close-incident - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 runonce: false script: '' subtype: python3 diff --git a/Packs/USTA/ReleaseNotes/1_0_5.md b/Packs/USTA/ReleaseNotes/1_0_5.md new file mode 100644 index 000000000000..abccc608c9ca --- /dev/null +++ b/Packs/USTA/ReleaseNotes/1_0_5.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### USTA + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/USTA/pack_metadata.json b/Packs/USTA/pack_metadata.json index 7fb7a00507f8..c10cd26e3b69 100644 --- a/Packs/USTA/pack_metadata.json +++ b/Packs/USTA/pack_metadata.json @@ -2,7 +2,7 @@ "name": "USTA", "description": "USTA is developed and operated by PRODAFT. Continuously growing since 2012, USTA is one of the first cyber intelligence platforms ever developed. Featuring a unique synergy of threat intelligence, fraud intelligence and brand protection modules; USTA responds directly and effectively to today's complex cyber threats. \nToday, USTA is one of the most widely used threat-intel solutions of critical infrastructures. ", "support": "community", - "currentVersion": "1.0.4", + "currentVersion": "1.0.5", "author": "Murat Ozfidan", "url": "", "email": "", diff --git a/Packs/UltraMSG/Integrations/UltraMSG/UltraMSG.yml b/Packs/UltraMSG/Integrations/UltraMSG/UltraMSG.yml index bd517c07c6d9..2c673cb6e19a 100644 --- a/Packs/UltraMSG/Integrations/UltraMSG/UltraMSG.yml +++ b/Packs/UltraMSG/Integrations/UltraMSG/UltraMSG.yml @@ -3,12 +3,12 @@ commonfields: id: UltraMSG version: -1 configuration: -- additionalinfo: "When creating an instance, you'll get a token Example: ty37deadbeef37xx" +- additionalinfo: 'When creating an instance, you''ll get a token Example: ty37deadbeef37xx' display: Token name: token required: true type: 4 -- additionalinfo: "When creating an instance, you'll get an instance id. Example: instance12345" +- additionalinfo: 'When creating an instance, you''ll get an instance id. Example: instance12345' display: Instance name: instance required: true @@ -27,7 +27,7 @@ script: required: true description: Send WhatsApp Message name: send-whatsapp - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 runonce: false script: '' subtype: python3 diff --git a/Packs/UltraMSG/ReleaseNotes/1_0_2.md b/Packs/UltraMSG/ReleaseNotes/1_0_2.md new file mode 100644 index 000000000000..64202eb3c79e --- /dev/null +++ b/Packs/UltraMSG/ReleaseNotes/1_0_2.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### UltraMSG + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/UltraMSG/pack_metadata.json b/Packs/UltraMSG/pack_metadata.json index 6f599e1fda80..8edbaee373da 100644 --- a/Packs/UltraMSG/pack_metadata.json +++ b/Packs/UltraMSG/pack_metadata.json @@ -2,12 +2,14 @@ "name": "UltraMSG", "description": "UltraMSG Integration.\nSend Whatsapp to Single Person Or Groups.\n", "support": "community", - "currentVersion": "1.0.1", + "currentVersion": "1.0.2", "author": "Bar Halifa-Levi Trustnet", "url": "", "email": "", "created": "2022-09-11T07:10:34Z", - "categories": ["Utilities"], + "categories": [ + "Utilities" + ], "tags": [], "useCases": [], "keywords": [], @@ -18,4 +20,4 @@ "githubUser": [ "BarHalifa" ] -} +} \ No newline at end of file diff --git a/Packs/UnisysStealth/Integrations/UnisysStealth/UnisysStealth.yml b/Packs/UnisysStealth/Integrations/UnisysStealth/UnisysStealth.yml index fddcf5236b09..79528b0a5188 100644 --- a/Packs/UnisysStealth/Integrations/UnisysStealth/UnisysStealth.yml +++ b/Packs/UnisysStealth/Integrations/UnisysStealth/UnisysStealth.yml @@ -71,7 +71,7 @@ script: name: user description: This is the command which will un-isolate an endpoint and user from Stealth Network name: stealth-unisolate-machine-and-user - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 runonce: false script: '' subtype: python3 diff --git a/Packs/UnisysStealth/ReleaseNotes/1_0_4.md b/Packs/UnisysStealth/ReleaseNotes/1_0_4.md new file mode 100644 index 000000000000..3f3ad2657704 --- /dev/null +++ b/Packs/UnisysStealth/ReleaseNotes/1_0_4.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Unisys Stealth + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/UnisysStealth/pack_metadata.json b/Packs/UnisysStealth/pack_metadata.json index 2a522272dc45..fc425cdd6858 100644 --- a/Packs/UnisysStealth/pack_metadata.json +++ b/Packs/UnisysStealth/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Unisys Stealth", "description": "This integration is intended to aid companies in integrating with the Stealth EcoAPI service. Using the included commands, security teams can trigger dynamically isolation of users or endpoints from the rest of the Stealth network.", "support": "community", - "currentVersion": "1.0.3", + "currentVersion": "1.0.4", "author": "Unisys", "url": "", "email": "", diff --git a/Packs/UpdateEntriesBySearch/ReleaseNotes/1_0_4.md b/Packs/UpdateEntriesBySearch/ReleaseNotes/1_0_4.md new file mode 100644 index 000000000000..55aed55b40c2 --- /dev/null +++ b/Packs/UpdateEntriesBySearch/ReleaseNotes/1_0_4.md @@ -0,0 +1,12 @@ + +#### Scripts + +##### MarkAsEvidenceBySearch + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### SetTagsBySearch + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### MarkAsNoteBySearch + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/UpdateEntriesBySearch/Scripts/MarkAsEvidenceBySearch/MarkAsEvidenceBySearch.yml b/Packs/UpdateEntriesBySearch/Scripts/MarkAsEvidenceBySearch/MarkAsEvidenceBySearch.yml index abf720364557..68991a7327d0 100644 --- a/Packs/UpdateEntriesBySearch/Scripts/MarkAsEvidenceBySearch/MarkAsEvidenceBySearch.yml +++ b/Packs/UpdateEntriesBySearch/Scripts/MarkAsEvidenceBySearch/MarkAsEvidenceBySearch.yml @@ -80,17 +80,17 @@ args: - name: case_insensitive auto: PREDEFINED predefined: - - "true" - - "false" + - 'true' + - 'false' description: true if the pattern is matched in case-insensitive, false otherwise - defaultValue: "false" + defaultValue: 'false' - name: dry_run auto: PREDEFINED predefined: - - "true" - - "false" + - 'true' + - 'false' description: true if it only search the entries and doesn't update, false otherwise - defaultValue: "false" + defaultValue: 'false' - name: summary auto: PREDEFINED predefined: @@ -101,7 +101,7 @@ args: defaultValue: basic scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.9.7.24076 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole fromversion: 6.0.0 tests: diff --git a/Packs/UpdateEntriesBySearch/Scripts/MarkAsNoteBySearch/MarkAsNoteBySearch.yml b/Packs/UpdateEntriesBySearch/Scripts/MarkAsNoteBySearch/MarkAsNoteBySearch.yml index 9fda35cfd69c..2ffb55e2eaca 100644 --- a/Packs/UpdateEntriesBySearch/Scripts/MarkAsNoteBySearch/MarkAsNoteBySearch.yml +++ b/Packs/UpdateEntriesBySearch/Scripts/MarkAsNoteBySearch/MarkAsNoteBySearch.yml @@ -14,10 +14,10 @@ args: - name: mark auto: PREDEFINED predefined: - - "true" - - "false" + - 'true' + - 'false' description: false if you un-mark entries as note, otherwise mark entries. - defaultValue: "true" + defaultValue: 'true' - name: filter_categories auto: PREDEFINED predefined: @@ -83,17 +83,17 @@ args: - name: case_insensitive auto: PREDEFINED predefined: - - "true" - - "false" + - 'true' + - 'false' description: true if the pattern is matched in case-insensitive, false otherwise - defaultValue: "false" + defaultValue: 'false' - name: dry_run auto: PREDEFINED predefined: - - "true" - - "false" + - 'true' + - 'false' description: true if it only search the entries and doesn't update, false otherwise - defaultValue: "false" + defaultValue: 'false' - name: summary auto: PREDEFINED predefined: @@ -104,7 +104,7 @@ args: defaultValue: basic scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.9.7.24076 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole fromversion: 6.0.0 tests: diff --git a/Packs/UpdateEntriesBySearch/Scripts/SetTagsBySearch/SetTagsBySearch.yml b/Packs/UpdateEntriesBySearch/Scripts/SetTagsBySearch/SetTagsBySearch.yml index c561d69e1ee4..450c5ef55501 100644 --- a/Packs/UpdateEntriesBySearch/Scripts/SetTagsBySearch/SetTagsBySearch.yml +++ b/Packs/UpdateEntriesBySearch/Scripts/SetTagsBySearch/SetTagsBySearch.yml @@ -3,7 +3,7 @@ commonfields: version: -1 contentitemexportablefields: contentitemfields: - fromServerVersion: "" + fromServerVersion: '' name: SetTagsBySearch script: '' type: python @@ -96,17 +96,17 @@ args: - name: case_insensitive auto: PREDEFINED predefined: - - "true" - - "false" + - 'true' + - 'false' description: true if the pattern is matched in case-insensitive, false otherwise. - defaultValue: "false" + defaultValue: 'false' - name: dry_run auto: PREDEFINED predefined: - - "true" - - "false" + - 'true' + - 'false' description: true if it only search the entries and doesn't update, false otherwise. - defaultValue: "false" + defaultValue: 'false' - name: summary auto: PREDEFINED predefined: @@ -117,7 +117,7 @@ args: defaultValue: basic scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.9.7.24076 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole fromversion: 6.0.0 tests: diff --git a/Packs/UpdateEntriesBySearch/pack_metadata.json b/Packs/UpdateEntriesBySearch/pack_metadata.json index 56fe9206b2df..86ca5721a074 100644 --- a/Packs/UpdateEntriesBySearch/pack_metadata.json +++ b/Packs/UpdateEntriesBySearch/pack_metadata.json @@ -2,12 +2,14 @@ "name": "UpdateEntriesBySearch", "description": "Update WarRoom entries with setting tags, mark as note or mark as evidence by search with a pattern", "support": "community", - "currentVersion": "1.0.3", + "currentVersion": "1.0.4", "author": "Masahiko Inoue", "url": "", "email": "", "created": "2021-02-13T07:03:03Z", - "categories": ["Utilities"], + "categories": [ + "Utilities" + ], "tags": [], "useCases": [], "keywords": [], diff --git a/Packs/Use_Case_Builder/ReleaseNotes/1_0_7.md b/Packs/Use_Case_Builder/ReleaseNotes/1_0_7.md new file mode 100644 index 000000000000..0343154d83ac --- /dev/null +++ b/Packs/Use_Case_Builder/ReleaseNotes/1_0_7.md @@ -0,0 +1,24 @@ + +#### Scripts + +##### UseCaseDevelopmentTimers + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### CreateUseCaseStepsList + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### GettingStartedWithXSOAR + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### CreateXSOARIncidentFlowList + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### StopUseCaseDevelopmentTimer + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### DeleteAndExcludeIndicators + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### PlaybookAutoGeneratorDynamicSectionMessage + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/Use_Case_Builder/Scripts/CreateUseCaseStepsList/CreateUseCaseStepsList.yml b/Packs/Use_Case_Builder/Scripts/CreateUseCaseStepsList/CreateUseCaseStepsList.yml index 810806325cdc..092f290631a6 100644 --- a/Packs/Use_Case_Builder/Scripts/CreateUseCaseStepsList/CreateUseCaseStepsList.yml +++ b/Packs/Use_Case_Builder/Scripts/CreateUseCaseStepsList/CreateUseCaseStepsList.yml @@ -3,9 +3,9 @@ commonfields: version: -1 contentitemexportablefields: contentitemfields: - fromServerVersion: "" + fromServerVersion: '' comment: '' -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: CreateUseCaseStepsList runas: DBotWeakRole diff --git a/Packs/Use_Case_Builder/Scripts/CreateXSOARIncidentFlowList/CreateXSOARIncidentFlowList.yml b/Packs/Use_Case_Builder/Scripts/CreateXSOARIncidentFlowList/CreateXSOARIncidentFlowList.yml index 039b8f0b4a14..1b532f3b7e07 100644 --- a/Packs/Use_Case_Builder/Scripts/CreateXSOARIncidentFlowList/CreateXSOARIncidentFlowList.yml +++ b/Packs/Use_Case_Builder/Scripts/CreateXSOARIncidentFlowList/CreateXSOARIncidentFlowList.yml @@ -3,9 +3,9 @@ commonfields: version: -1 contentitemexportablefields: contentitemfields: - fromServerVersion: "" + fromServerVersion: '' comment: '' -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: CreateXSOARIncidentFlowList runas: DBotWeakRole diff --git a/Packs/Use_Case_Builder/Scripts/DeleteAndExcludeIndicators/DeleteAndExcludeIndicators.yml b/Packs/Use_Case_Builder/Scripts/DeleteAndExcludeIndicators/DeleteAndExcludeIndicators.yml index db1a5ec0b1b9..7591212d23dc 100644 --- a/Packs/Use_Case_Builder/Scripts/DeleteAndExcludeIndicators/DeleteAndExcludeIndicators.yml +++ b/Packs/Use_Case_Builder/Scripts/DeleteAndExcludeIndicators/DeleteAndExcludeIndicators.yml @@ -6,7 +6,7 @@ args: commonfields: id: DeleteAndExcludeIndicators version: -1 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true comment: '' name: DeleteAndExcludeIndicators diff --git a/Packs/Use_Case_Builder/Scripts/GettingStartedWithXSOAR/GettingStartedWithXSOAR.yml b/Packs/Use_Case_Builder/Scripts/GettingStartedWithXSOAR/GettingStartedWithXSOAR.yml index dac0787bb253..1b1f0d3c7332 100644 --- a/Packs/Use_Case_Builder/Scripts/GettingStartedWithXSOAR/GettingStartedWithXSOAR.yml +++ b/Packs/Use_Case_Builder/Scripts/GettingStartedWithXSOAR/GettingStartedWithXSOAR.yml @@ -3,9 +3,9 @@ commonfields: version: -1 contentitemexportablefields: contentitemfields: - fromServerVersion: "" + fromServerVersion: '' comment: '' -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: GettingStartedWithXSOAR runas: DBotWeakRole diff --git a/Packs/Use_Case_Builder/Scripts/PlaybookAutoGeneratorDynamicSectionMessage/PlaybookAutoGeneratorDynamicSectionMessage.yml b/Packs/Use_Case_Builder/Scripts/PlaybookAutoGeneratorDynamicSectionMessage/PlaybookAutoGeneratorDynamicSectionMessage.yml index 3b6db5859e97..9d224eb3808e 100644 --- a/Packs/Use_Case_Builder/Scripts/PlaybookAutoGeneratorDynamicSectionMessage/PlaybookAutoGeneratorDynamicSectionMessage.yml +++ b/Packs/Use_Case_Builder/Scripts/PlaybookAutoGeneratorDynamicSectionMessage/PlaybookAutoGeneratorDynamicSectionMessage.yml @@ -3,9 +3,9 @@ commonfields: version: -1 contentitemexportablefields: contentitemfields: - fromServerVersion: "" + fromServerVersion: '' comment: '' -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: PlaybookAutoGeneratorDynamicSectionMessage runas: DBotWeakRole diff --git a/Packs/Use_Case_Builder/Scripts/StopUseCaseDevelopmentTimer/StopUseCaseDevelopmentTimer.yml b/Packs/Use_Case_Builder/Scripts/StopUseCaseDevelopmentTimer/StopUseCaseDevelopmentTimer.yml index 5a762a330564..d52fa4ed3f11 100644 --- a/Packs/Use_Case_Builder/Scripts/StopUseCaseDevelopmentTimer/StopUseCaseDevelopmentTimer.yml +++ b/Packs/Use_Case_Builder/Scripts/StopUseCaseDevelopmentTimer/StopUseCaseDevelopmentTimer.yml @@ -2,7 +2,7 @@ commonfields: id: StopUseCaseDevelopmentTimer version: -1 comment: '' -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: StopUseCaseDevelopmentTimer runas: DBotWeakRole diff --git a/Packs/Use_Case_Builder/Scripts/UseCaseDevelopmentTimers/UseCaseDevelopmentTimers.yml b/Packs/Use_Case_Builder/Scripts/UseCaseDevelopmentTimers/UseCaseDevelopmentTimers.yml index a181aec7439f..3c6f35cc75b6 100644 --- a/Packs/Use_Case_Builder/Scripts/UseCaseDevelopmentTimers/UseCaseDevelopmentTimers.yml +++ b/Packs/Use_Case_Builder/Scripts/UseCaseDevelopmentTimers/UseCaseDevelopmentTimers.yml @@ -2,7 +2,7 @@ commonfields: id: UseCaseDevelopmentTimers version: -1 comment: '' -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: UseCaseDevelopmentTimers runas: DBotWeakRole diff --git a/Packs/Use_Case_Builder/pack_metadata.json b/Packs/Use_Case_Builder/pack_metadata.json index 22ebb22edbb7..aaa5a7f34c2e 100644 --- a/Packs/Use_Case_Builder/pack_metadata.json +++ b/Packs/Use_Case_Builder/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Use Case Builder", "description": "To streamline the Use Case Design process and provide tools to help you get into production faster!", "support": "community", - "currentVersion": "1.0.6", + "currentVersion": "1.0.7", "author": "Joe Cosgrove", "url": "https://www.paloaltonetworks.com/cortex", "email": "jcosgrove@paloaltonetworks.com", diff --git a/Packs/VerifyIPv4Indicator/ReleaseNotes/1_0_3.md b/Packs/VerifyIPv4Indicator/ReleaseNotes/1_0_3.md new file mode 100644 index 000000000000..8ce97793d561 --- /dev/null +++ b/Packs/VerifyIPv4Indicator/ReleaseNotes/1_0_3.md @@ -0,0 +1,6 @@ + +#### Scripts + +##### VerifyIPv4Indicator + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/VerifyIPv4Indicator/Scripts/VerifyIPv4Indicator/VerifyIPv4Indicator.yml b/Packs/VerifyIPv4Indicator/Scripts/VerifyIPv4Indicator/VerifyIPv4Indicator.yml index 290d956affbd..5f8a71f3741a 100644 --- a/Packs/VerifyIPv4Indicator/Scripts/VerifyIPv4Indicator/VerifyIPv4Indicator.yml +++ b/Packs/VerifyIPv4Indicator/Scripts/VerifyIPv4Indicator/VerifyIPv4Indicator.yml @@ -1,9 +1,9 @@ args: - default: true - description: 'The IPv4 to vriefy.' + description: The IPv4 to vriefy. isArray: true name: input -comment: 'Verify that the address is a valid IPv4 address.' +comment: Verify that the address is a valid IPv4 address. commonfields: id: VerifyIPv4Indicator version: -1 @@ -15,7 +15,7 @@ tags: timeout: '0' type: python subtype: python3 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 fromversion: 5.5.0 tests: - No test diff --git a/Packs/VerifyIPv4Indicator/pack_metadata.json b/Packs/VerifyIPv4Indicator/pack_metadata.json index 58e68c1a65b6..cc24b60a3340 100644 --- a/Packs/VerifyIPv4Indicator/pack_metadata.json +++ b/Packs/VerifyIPv4Indicator/pack_metadata.json @@ -2,11 +2,13 @@ "name": "VerifyIPv4Indicator", "description": "Script to verify if the input or list of inputs is IPv4 address.", "support": "community", - "currentVersion": "1.0.2", + "currentVersion": "1.0.3", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", - "categories": ["Utilities"], + "categories": [ + "Utilities" + ], "tags": [], "useCases": [], "keywords": [], diff --git a/Packs/Viper/Integrations/Viper/Viper.yml b/Packs/Viper/Integrations/Viper/Viper.yml index c65c568461fa..56b69c5291fa 100644 --- a/Packs/Viper/Integrations/Viper/Viper.yml +++ b/Packs/Viper/Integrations/Viper/Viper.yml @@ -41,7 +41,7 @@ script: required: true description: Search for sample with file hash name: viper-search - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 runonce: false script: '' subtype: python3 diff --git a/Packs/Viper/ReleaseNotes/1_0_4.md b/Packs/Viper/ReleaseNotes/1_0_4.md new file mode 100644 index 000000000000..54d3cb9a9bfc --- /dev/null +++ b/Packs/Viper/ReleaseNotes/1_0_4.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Viper + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/Viper/pack_metadata.json b/Packs/Viper/pack_metadata.json index af171fe24832..fd319cf831f8 100644 --- a/Packs/Viper/pack_metadata.json +++ b/Packs/Viper/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Viper", "description": "Viper is a binary analysis and management framework. The integration provides the capabilities to search in the framework und to download samples.", "support": "community", - "currentVersion": "1.0.3", + "currentVersion": "1.0.4", "author": "DACHSER SE", "url": "", "email": "", @@ -10,7 +10,9 @@ "categories": [ "Forensics & Malware Analysis" ], - "tags": ["Forensics"], + "tags": [ + "Forensics" + ], "useCases": [], "keywords": [], "marketplaces": [ diff --git a/Packs/WolkenITSM/Integrations/WolkenITSM/WolkenITSM.yml b/Packs/WolkenITSM/Integrations/WolkenITSM/WolkenITSM.yml index 87ff21cefb59..aa5f95790805 100644 --- a/Packs/WolkenITSM/Integrations/WolkenITSM/WolkenITSM.yml +++ b/Packs/WolkenITSM/Integrations/WolkenITSM/WolkenITSM.yml @@ -53,10 +53,10 @@ script: name: wolken-add-internal-notes outputs: - contextPath: Wolken.UpdateIncidents.status - description: "" + description: '' type: String - contextPath: Wolken.UpdateIncidents.message - description: "" + description: '' type: String - arguments: - description: Pass Subject of the Incident @@ -109,32 +109,32 @@ script: name: wolken-create-incident-requestv1 outputs: - contextPath: Wolken.CreateIncidents.status - description: "" + description: '' type: String - contextPath: Wolken.CreateIncidents.message - description: "" + description: '' type: String - contextPath: Wolken.CreateIncidents.data.requestId - description: "" + description: '' type: String - arguments: [] description: Use to get access token and save it in integration context . Refresh Token saved in integration context will be used to create new access token after expiration. name: wolken-get-access-token outputs: - contextPath: Wolken.Token.access_token - description: "" + description: '' type: String - contextPath: Wolken.Token.token_type - description: "" + description: '' type: String - contextPath: Wolken.Token.refresh_token - description: "" + description: '' type: String - contextPath: Wolken.Token.expires_in - description: "" + description: '' type: Number - contextPath: Wolken.Token.scope - description: "" + description: '' type: String - arguments: - description: Pass Incident Id required for searching @@ -144,7 +144,7 @@ script: name: wolken-get-incident-by-id outputs: - contextPath: Wolken.GetIncidents.status - description: "" + description: '' type: String - arguments: - description: Pass Incident Id @@ -160,10 +160,10 @@ script: name: wolken-post-api-v1-incidents-add-attachments outputs: - contextPath: Wolken.UpdateIncidents.status - description: "" + description: '' type: String - contextPath: Wolken.UpdateIncidents.message - description: "" + description: '' type: String - arguments: - description: pass incidentId @@ -176,10 +176,10 @@ script: name: wolken-post-api-v1-incidents-add-outbound-notes outputs: - contextPath: Wolken.UpdateIncidents.status - description: "" + description: '' type: String - contextPath: Wolken.UpdateIncidents.message - description: "" + description: '' type: String - arguments: - description: Pass Incident Id @@ -198,10 +198,10 @@ script: name: wolken-post-api-v1-incidents-by-incident-id outputs: - contextPath: Wolken.UpdateIncidents.status - description: "" + description: '' type: String - contextPath: Wolken.UpdateIncidents.message - description: "" + description: '' type: String - arguments: - description: Pass Incident Id @@ -229,10 +229,10 @@ script: name: wolken-post-api-v1-incidents-close outputs: - contextPath: Wolken.UpdateIncidents.status - description: "" + description: '' type: String - contextPath: Wolken.UpdateIncidents.message - description: "" + description: '' type: String - arguments: - description: Pass Incident Id @@ -245,10 +245,10 @@ script: name: wolken-put-api-v1-incidents-cancel outputs: - contextPath: Wolken.UpdateIncidents.status - description: "" + description: '' type: String - contextPath: Wolken.UpdateIncidents.message - description: "" + description: '' type: String - arguments: - description: Pass limit @@ -291,9 +291,9 @@ script: name: wolken-search-incidents-by-params outputs: - contextPath: Wolken.GetIncidents.status - description: "" + description: '' type: String - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 runonce: false script: '' subtype: python3 diff --git a/Packs/WolkenITSM/ReleaseNotes/1_0_2.md b/Packs/WolkenITSM/ReleaseNotes/1_0_2.md new file mode 100644 index 000000000000..56f808d8b253 --- /dev/null +++ b/Packs/WolkenITSM/ReleaseNotes/1_0_2.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Wolken ITSM + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/WolkenITSM/pack_metadata.json b/Packs/WolkenITSM/pack_metadata.json index 719b91a42bd8..e08d131cfa34 100644 --- a/Packs/WolkenITSM/pack_metadata.json +++ b/Packs/WolkenITSM/pack_metadata.json @@ -2,12 +2,14 @@ "name": "Wolken ITSM", "description": "Use The Wolken IT Service Management (ITSM) solution to modernize the way you manage and deliver services to your users.This is case management. Cortex XSOAR interfaces with Wolken ITSM to help streamline security-related service management and IT operations.", "support": "community", - "currentVersion": "1.0.1", + "currentVersion": "1.0.2", "author": "Shubham Agarwal", "url": "", "email": "", "created": "2022-02-13T11:18:49Z", - "categories": ["Case Management"], + "categories": [ + "Case Management" + ], "tags": [], "useCases": [], "keywords": [], @@ -18,4 +20,4 @@ "xsoar", "marketplacev2" ] -} +} \ No newline at end of file diff --git a/Packs/Wordpress/Integrations/Wordpress/Wordpress.yml b/Packs/Wordpress/Integrations/Wordpress/Wordpress.yml index 292f5998d0f4..2459161b3f42 100644 --- a/Packs/Wordpress/Integrations/Wordpress/Wordpress.yml +++ b/Packs/Wordpress/Integrations/Wordpress/Wordpress.yml @@ -1779,7 +1779,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 fromversion: 6.2.0 tests: - No tests (auto formatted) diff --git a/Packs/Wordpress/ReleaseNotes/1_0_2.md b/Packs/Wordpress/ReleaseNotes/1_0_2.md new file mode 100644 index 000000000000..0f25980b8ada --- /dev/null +++ b/Packs/Wordpress/ReleaseNotes/1_0_2.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Wordpress + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/Wordpress/pack_metadata.json b/Packs/Wordpress/pack_metadata.json index d0299e213b5c..cf24a5b81b13 100644 --- a/Packs/Wordpress/pack_metadata.json +++ b/Packs/Wordpress/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Wordpress", "description": "The WordPress REST API provides an interface for applications to interact with your WordPress site.", "support": "community", - "currentVersion": "1.0.1", + "currentVersion": "1.0.2", "author": "Adam Burt", "url": "https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/bd-p/Cortex_XSOAR_Discussions", "email": "", diff --git a/Packs/XSOARContentUpdateNotifications/ReleaseNotes/1_0_8.md b/Packs/XSOARContentUpdateNotifications/ReleaseNotes/1_0_8.md new file mode 100644 index 000000000000..0bdb5b5bb0d5 --- /dev/null +++ b/Packs/XSOARContentUpdateNotifications/ReleaseNotes/1_0_8.md @@ -0,0 +1,12 @@ + +#### Scripts + +##### GetLatestReleaseNotes + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### CollectPacksData + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### FormatContentData + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/XSOARContentUpdateNotifications/Scripts/CollectPacksData/CollectPacksData.yml b/Packs/XSOARContentUpdateNotifications/Scripts/CollectPacksData/CollectPacksData.yml index 864d8a4c43d0..e30970b09e3e 100644 --- a/Packs/XSOARContentUpdateNotifications/Scripts/CollectPacksData/CollectPacksData.yml +++ b/Packs/XSOARContentUpdateNotifications/Scripts/CollectPacksData/CollectPacksData.yml @@ -9,7 +9,7 @@ tags: [] enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole fromversion: 6.0.0 tests: diff --git a/Packs/XSOARContentUpdateNotifications/Scripts/FormatContentData/FormatContentData.yml b/Packs/XSOARContentUpdateNotifications/Scripts/FormatContentData/FormatContentData.yml index fe087488d904..d993392a4d7d 100644 --- a/Packs/XSOARContentUpdateNotifications/Scripts/FormatContentData/FormatContentData.yml +++ b/Packs/XSOARContentUpdateNotifications/Scripts/FormatContentData/FormatContentData.yml @@ -5,7 +5,7 @@ args: commonfields: id: FormatContentData version: -1 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: FormatContentData runas: DBotWeakRole diff --git a/Packs/XSOARContentUpdateNotifications/Scripts/GetLatestReleaseNotes/GetLatestReleaseNotes.yml b/Packs/XSOARContentUpdateNotifications/Scripts/GetLatestReleaseNotes/GetLatestReleaseNotes.yml index 8cdd87b1ba6e..fe0142599c16 100644 --- a/Packs/XSOARContentUpdateNotifications/Scripts/GetLatestReleaseNotes/GetLatestReleaseNotes.yml +++ b/Packs/XSOARContentUpdateNotifications/Scripts/GetLatestReleaseNotes/GetLatestReleaseNotes.yml @@ -15,7 +15,7 @@ args: description: The content data path from the context, for example "${ContentData}". scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 runas: DBotWeakRole fromversion: 6.0.0 tests: diff --git a/Packs/XSOARContentUpdateNotifications/pack_metadata.json b/Packs/XSOARContentUpdateNotifications/pack_metadata.json index 60be8ac68354..4dfee27111e6 100644 --- a/Packs/XSOARContentUpdateNotifications/pack_metadata.json +++ b/Packs/XSOARContentUpdateNotifications/pack_metadata.json @@ -2,7 +2,7 @@ "name": "XSOAR Content Update Notifications", "description": "This pack will check for any available content updates for existing packs and send an e-mail or Slack message to users to inform them of the updates.", "support": "community", - "currentVersion": "1.0.7", + "currentVersion": "1.0.8", "author": "Adam Burt and XSOAR Labs", "url": "", "email": "", diff --git a/Packs/XSOAR_EDL_Checker/ReleaseNotes/1_1_1.md b/Packs/XSOAR_EDL_Checker/ReleaseNotes/1_1_1.md new file mode 100644 index 000000000000..638c791c747c --- /dev/null +++ b/Packs/XSOAR_EDL_Checker/ReleaseNotes/1_1_1.md @@ -0,0 +1,6 @@ + +#### Scripts + +##### XSOARAllEDLCheckerAutomation + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/XSOAR_EDL_Checker/Scripts/XSOARAllEDLCheckerAutomation/XSOARAllEDLCheckerAutomation.yml b/Packs/XSOAR_EDL_Checker/Scripts/XSOARAllEDLCheckerAutomation/XSOARAllEDLCheckerAutomation.yml index c722915aac77..a1e1b18ea6f0 100644 --- a/Packs/XSOAR_EDL_Checker/Scripts/XSOARAllEDLCheckerAutomation/XSOARAllEDLCheckerAutomation.yml +++ b/Packs/XSOAR_EDL_Checker/Scripts/XSOARAllEDLCheckerAutomation/XSOARAllEDLCheckerAutomation.yml @@ -5,7 +5,7 @@ commonfields: dependson: must: - XSOAR EDL Checker|||xsoaredlchecker-get-edl -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: XSOARAllEDLCheckerAutomation outputs: diff --git a/Packs/XSOAR_EDL_Checker/pack_metadata.json b/Packs/XSOAR_EDL_Checker/pack_metadata.json index cdfd028159fd..2b1050707484 100644 --- a/Packs/XSOAR_EDL_Checker/pack_metadata.json +++ b/Packs/XSOAR_EDL_Checker/pack_metadata.json @@ -2,7 +2,7 @@ "name": "XSOAR EDL Checker", "description": "Checks EDLs hosted by the XSOAR server to ensure they are functioning.", "support": "community", - "currentVersion": "1.1.0", + "currentVersion": "1.1.1", "author": "Mike Beauchamp", "url": "https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/bd-p/Cortex_XSOAR_Discussions", "email": "", diff --git a/Packs/XsoarWebserver/ReleaseNotes/1_0_3.md b/Packs/XsoarWebserver/ReleaseNotes/1_0_3.md new file mode 100644 index 000000000000..0222e2feedeb --- /dev/null +++ b/Packs/XsoarWebserver/ReleaseNotes/1_0_3.md @@ -0,0 +1,12 @@ + +#### Scripts + +##### xsoar-ws-poll-status + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### xsoar-ws-parse-context + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. +##### EmailSLABreach + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/XsoarWebserver/Scripts/EmailSLABreach/EmailSLABreach.yml b/Packs/XsoarWebserver/Scripts/EmailSLABreach/EmailSLABreach.yml index 102420a847b2..2227d7fecf92 100644 --- a/Packs/XsoarWebserver/Scripts/EmailSLABreach/EmailSLABreach.yml +++ b/Packs/XsoarWebserver/Scripts/EmailSLABreach/EmailSLABreach.yml @@ -4,7 +4,7 @@ commonfields: version: -1 contentitemexportablefields: contentitemfields: {} -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: EmailSLABreach runas: DBotWeakRole diff --git a/Packs/XsoarWebserver/Scripts/XsoarWsParseContext/XsoarWsParseContext.yml b/Packs/XsoarWebserver/Scripts/XsoarWsParseContext/XsoarWsParseContext.yml index 1f97727581fc..c45c174c674b 100644 --- a/Packs/XsoarWebserver/Scripts/XsoarWsParseContext/XsoarWsParseContext.yml +++ b/Packs/XsoarWebserver/Scripts/XsoarWsParseContext/XsoarWsParseContext.yml @@ -14,7 +14,7 @@ commonfields: version: -1 contentitemexportablefields: contentitemfields: {} -dockerimage: demisto/python3:3.10.12.63474 +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: xsoar-ws-parse-context runas: DBotWeakRole diff --git a/Packs/XsoarWebserver/Scripts/XsoarWsPollStatus/XsoarWsPollStatus.yml b/Packs/XsoarWebserver/Scripts/XsoarWsPollStatus/XsoarWsPollStatus.yml index f469bfde44f9..1c8e117db424 100644 --- a/Packs/XsoarWebserver/Scripts/XsoarWsPollStatus/XsoarWsPollStatus.yml +++ b/Packs/XsoarWebserver/Scripts/XsoarWsPollStatus/XsoarWsPollStatus.yml @@ -2,19 +2,19 @@ args: - description: webserver action uuid name: uuid required: true -- defaultValue: "30" +- defaultValue: '30' description: Time between 2 polls name: timebetweenruns -comment: |- - Companion automation to XSOAR-Web-Server that polls a certain UUID for user response. - The automation returns a scheduledcommand if the user has not responded to the action url +comment: 'Companion automation to XSOAR-Web-Server that polls a certain UUID for user response. + + The automation returns a scheduledcommand if the user has not responded to the action url' commonfields: id: xsoar-ws-poll-status version: -1 contentitemexportablefields: contentitemfields: - fromServerVersion: "" -dockerimage: demisto/python3:3.10.12.63474 + fromServerVersion: '' +dockerimage: demisto/python3:3.10.14.100715 enabled: true name: xsoar-ws-poll-status outputs: diff --git a/Packs/XsoarWebserver/pack_metadata.json b/Packs/XsoarWebserver/pack_metadata.json index b3c54117f8b3..0597af77393f 100644 --- a/Packs/XsoarWebserver/pack_metadata.json +++ b/Packs/XsoarWebserver/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Xsoar-web-server", "description": "Contains a minimal webserver and an automation that can be used to generate predictable URLs that can be inserted into emails and the responses can be tracked. Also contains a test playbook meant to be a POC.", "support": "community", - "currentVersion": "1.0.2", + "currentVersion": "1.0.3", "author": "Arun Narayanan", "url": "https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/bd-p/Cortex_XSOAR_Discussions", "email": "", diff --git a/Packs/Xsoar_Utils/Integrations/XsoarUtils/XsoarUtils.yml b/Packs/Xsoar_Utils/Integrations/XsoarUtils/XsoarUtils.yml index fc6731d53869..e27b08834413 100644 --- a/Packs/Xsoar_Utils/Integrations/XsoarUtils/XsoarUtils.yml +++ b/Packs/Xsoar_Utils/Integrations/XsoarUtils/XsoarUtils.yml @@ -16,20 +16,23 @@ configuration: required: true type: 0 - additionalinfo: Check this to ignore certificate signature - defaultvalue: "false" + defaultvalue: 'false' display: Trust any certificate (not secure) name: insecure type: 8 required: false -description: |- - This is a wrapper on top of XSOAR API. Can be used to implement commands that call the XSOAR API in the background. This is mostly to avoid constructing raw json strings while calling the demisto rest api integration. +description: 'This is a wrapper on top of XSOAR API. Can be used to implement commands that call the XSOAR API in the background. This is mostly to avoid constructing raw json strings while calling the demisto rest api integration. + The first implemented command can be used to create an entry on any investigation; playground by default. An example use-case could be debugging a pre-process script. (Call demisto.execute_command("xsoar-create-entry",{arguments}) + The idea is to use the same code to test from a local machine. - python3 Xsoar_Utils.py xsoar-create-entry '{"data":"# testapi4","inv_id":"122c7bff-feae-4177-867e-37e2096cd7d9"}' - Read the code to understand more. + python3 Xsoar_Utils.py xsoar-create-entry ''{"data":"# testapi4","inv_id":"122c7bff-feae-4177-867e-37e2096cd7d9"}'' + + + Read the code to understand more.' display: Xsoar_Utils name: Xsoar_Utils script: @@ -41,7 +44,7 @@ script: name: inv_id description: Creates an entry into an investigation warroom or by default on the playground. name: xsoar-create-entry - dockerimage: demisto/python3:3.10.12.63474 + dockerimage: demisto/python3:3.10.14.100715 runonce: false script: '' subtype: python3 diff --git a/Packs/Xsoar_Utils/ReleaseNotes/1_0_2.md b/Packs/Xsoar_Utils/ReleaseNotes/1_0_2.md new file mode 100644 index 000000000000..b1057bc11ed0 --- /dev/null +++ b/Packs/Xsoar_Utils/ReleaseNotes/1_0_2.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Xsoar_Utils + +- Updated the Docker image to: *demisto/python3:3.10.14.100715*. diff --git a/Packs/Xsoar_Utils/pack_metadata.json b/Packs/Xsoar_Utils/pack_metadata.json index d11e17e27284..4819d6d3910b 100644 --- a/Packs/Xsoar_Utils/pack_metadata.json +++ b/Packs/Xsoar_Utils/pack_metadata.json @@ -2,12 +2,14 @@ "name": "Xsoar_Utils", "description": "This is a wrapper on top of XSOAR API. Can be used to implement commands that call the XSOAR API in the background.", "support": "community", - "currentVersion": "1.0.1", + "currentVersion": "1.0.2", "author": "Arun Narayanan", "url": "", "email": "", "created": "2022-01-19T09:04:15Z", - "categories": ["Utilities"], + "categories": [ + "Utilities" + ], "tags": [], "useCases": [], "keywords": [], @@ -18,4 +20,4 @@ "xsoar", "marketplacev2" ] -} +} \ No newline at end of file