Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Auto Update Docker] AUD-demisto/auto_update_docker_staging_branch_5 #35344

Merged
merged 4 commits into from
Jul 10, 2024
Merged
Show file tree
Hide file tree
Changes from 3 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -9,17 +9,17 @@ description: Use the Cofense Triage integration to ingest reported phishing indi
configuration:
- display: Server URL (e.g., https://192.168.0.1)
name: host
defaultvalue: ""
defaultvalue: ''
type: 0
required: true
- display: User
name: user
defaultvalue: ""
defaultvalue: ''
type: 0
required: true
- display: API Token
name: token
defaultvalue: ""
defaultvalue: ''
type: 4
required: true
- display: Fetch incidents
Expand All @@ -30,7 +30,7 @@ configuration:
name: incidentType
type: 13
required: false
- display: "Mailbox Location"
- display: Mailbox Location
name: mailbox_location
defaultvalue: Processed_Reports
type: 15
Expand All @@ -46,27 +46,27 @@ configuration:
- display: Category ID to fetch
name: category_id
additionalinfo: Corresponds to category IDs defined in Triage. Eg, "1".
defaultvalue: ""
defaultvalue: ''
type: 0
required: false
- display: Match Priority - the highest match priority based on rule hits for the report
name: match_priority
defaultvalue: ""
defaultvalue: ''
type: 0
required: false
- display: 'Tags - CSV list of tags of processed reports by which to filter '
name: tags
defaultvalue: ""
defaultvalue: ''
type: 0
required: false
- display: Maximum number of incidents to fetch each time
name: max_fetch
defaultvalue: "30"
defaultvalue: '30'
type: 0
required: false
- display: Trust any certificate (not secure)
name: insecure
defaultvalue: "false"
defaultvalue: 'false'
type: 8
required: false
- display: Use system proxy settings
Expand Down Expand Up @@ -97,12 +97,12 @@ script:
- name: max_matches
default: true
description: Maximum number of matches to fetch. Default is 30.
defaultValue: "30"
defaultValue: '30'
- name: verbose
auto: PREDEFINED
predefined:
- "true"
- "false"
- 'true'
- 'false'
description: Returns all fields of a report.
outputs:
- contextPath: Cofense.Report.ID
Expand Down Expand Up @@ -152,7 +152,7 @@ script:
type: number
- contextPath: Cofense.Report.Sha256
description: SHA256 hash of the file.
description: 'Runs a query for reports.'
description: Runs a query for reports.
- name: cofense-search-inbox-reports
arguments:
- name: file_hash
Expand All @@ -172,12 +172,12 @@ script:
- name: max_matches
default: true
description: Maximum number of matches to fetch. Default is 30.
defaultValue: "30"
defaultValue: '30'
- name: verbose
auto: PREDEFINED
predefined:
- "true"
- "false"
- 'true'
- 'false'
description: Returns all fields of a report.
outputs:
- contextPath: Cofense.Report.ID
Expand Down Expand Up @@ -227,7 +227,7 @@ script:
type: number
- contextPath: Cofense.Report.Sha256
description: SHA256 hash of the file.
description: 'Runs a query for reports from the `inbox` mailbox.'
description: Runs a query for reports from the `inbox` mailbox.
- name: cofense-get-attachment
arguments:
- name: attachment_id
Expand Down Expand Up @@ -352,11 +352,11 @@ script:
- name: set_white_bg
auto: PREDEFINED
predefined:
- "True"
- "False"
- 'True'
- 'False'
description: Change background to white.
defaultValue: "False"
description: 'Retrieves a report by the report ID number and displays as PNG.'
defaultValue: 'False'
description: Retrieves a report by the report ID number and displays as PNG.
- name: cofense-get-threat-indicators
arguments:
- name: type
Expand All @@ -377,9 +377,9 @@ script:
- Suspicious
- Benign
- name: start_date
description: "designated start date tagged by analyst (format example: YYYY-MM-DD+HH:MM:SS). Default: 6 days ago."
description: 'designated start date tagged by analyst (format example: YYYY-MM-DD+HH:MM:SS). Default: 6 days ago.'
- name: end_date
description: "designated end date from assignment (format example: YYYY-MM-DD+HH:MM:SS). Default: current date."
description: 'designated end date from assignment (format example: YYYY-MM-DD+HH:MM:SS). Default: current date.'
outputs:
- contextPath: Cofense.ThreatIndicators
description: Threat indicator output.
Expand All @@ -402,7 +402,7 @@ script:
description: Value of the threat indicator.
type: string
description: Threat Indicators that are designated by analysts as malicious, suspicious or benign.
dockerimage: demisto/chromium:124.0.6367.93838
dockerimage: demisto/chromium:126.0.6478.102778
isfetch: true
tests:
- No test - partner integration (test pb exists - Cofense Triage Test)
13 changes: 8 additions & 5 deletions Packs/SSLCertificates/Scripts/GenerateCSR/GenerateCSR.yml
Original file line number Diff line number Diff line change
Expand Up @@ -22,17 +22,20 @@ args:
name: locality
type: textArea
- auto: PREDEFINED
defaultValue: "False"
defaultValue: 'False'
description: 'Output CSR text to war room? (Default: False)'
name: OutputToWarRoom
predefined:
- "True"
- "False"
comment: "Generates a certificate signing request for fulfillment by an organization certification authority (CA)\n\nOutput is the request.csr file placed directly into context under a \"File\" object. "
- 'True'
- 'False'
comment: 'Generates a certificate signing request for fulfillment by an organization certification authority (CA)


Output is the request.csr file placed directly into context under a "File" object. '
commonfields:
id: GenerateCSR
version: -1
dockerimage: demisto/ansible-runner:1.0.0.47562
dockerimage: demisto/ansible-runner:1.0.0.102086
enabled: true
name: GenerateCSR
runas: DBotWeakRole
Expand Down
4 changes: 2 additions & 2 deletions Packs/SSLCertificates/Scripts/SSLVerifierV2/SSLVerifierV2.yml
Original file line number Diff line number Diff line change
Expand Up @@ -3,14 +3,14 @@ args:
name: URL
required: true
- default: true
defaultValue: "443"
defaultValue: '443'
description: Port to check
name: Port
comment: Use this automation to check for validity of your SSL certificate and get the time until expiration.
commonfields:
id: SSLVerifierV2
version: -1
dockerimage: demisto/ansible-runner:1.0.0.47562
dockerimage: demisto/ansible-runner:1.0.0.102086
enabled: true
name: SSLVerifierV2
outputs:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ comment: 'Generates the HTML needed for a formatted email to be sent using the o
commonfields:
id: SSLVerifierV2_GenerateEmailBody
version: -1
dockerimage: demisto/ansible-runner:1.0.0.47562
dockerimage: demisto/ansible-runner:1.0.0.102086
enabled: true
name: SSLVerifierV2_GenerateEmailBody
outputs:
Expand Down
Loading