Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TESTING: Check install pack by pack #36564

Draft
wants to merge 22 commits into
base: master
Choose a base branch
from
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
22 commits
Select commit Hold shift + click to select a range
09ec9cd
checking configuration
DinaMeylakh Sep 30, 2024
e6453b5
checking configuration
DinaMeylakh Sep 30, 2024
2ab22cb
checking configuration
DinaMeylakh Sep 30, 2024
615fd9c
checking configuration
DinaMeylakh Sep 30, 2024
43cf0fc
checking configuration
DinaMeylakh Sep 30, 2024
922b24e
Merge branch 'master' into check_install_pack_by_pack
DinaMeylakh Oct 7, 2024
296574a
testing after failure mechanism for bulk packs is inside
DinaMeylakh Oct 7, 2024
809ef50
Merge branch 'master' into check_install_pack_by_pack
DinaMeylakh Oct 7, 2024
1e012b4
ruined some modeling rules
DinaMeylakh Oct 7, 2024
a18191f
Merge branch 'master' into check_install_pack_by_pack
DinaMeylakh Oct 7, 2024
607b8b1
reverted hard coded failure
DinaMeylakh Oct 14, 2024
f7a246b
Merge branch 'master' into check_install_pack_by_pack
DinaMeylakh Oct 14, 2024
0c8ef06
added more fails
DinaMeylakh Oct 14, 2024
137530d
testing fixed script
DinaMeylakh Oct 14, 2024
34879c0
Merge branch 'master' into check_install_pack_by_pack
DinaMeylakh Oct 14, 2024
2d42d7a
testing fixed script
DinaMeylakh Oct 14, 2024
6f5e5f3
Merge branch 'master' into check_install_pack_by_pack
DinaMeylakh Oct 14, 2024
2b2c199
Merge branch 'master' into check_install_pack_by_pack
DinaMeylakh Oct 14, 2024
000eca3
more testing
DinaMeylakh Oct 14, 2024
ce06893
Merge branch 'master' into check_install_pack_by_pack
DinaMeylakh Oct 14, 2024
ab45760
revert
DinaMeylakh Oct 15, 2024
36d4665
Merge branch 'master' into check_install_pack_by_pack
DinaMeylakh Oct 21, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions .gitlab/ci/.gitlab-ci.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
variables:

Check failure on line 1 in .gitlab/ci/.gitlab-ci.yml

View workflow job for this annotation

GitHub Actions / protect-infra-files

Protected file modified

This file should not be changed in master. If you are sure it's necessary, ask for a force merge and explain the rationale.
CURRENT_BRANCH_NAME: $INFRA_BRANCH
CURRENT_BRANCH_NAME: "install_packs_one_by_one_on_failure"

include:
- file: "/.gitlab/ci/content-ci/ci/.gitlab-ci.yml"
ref: $INFRA_BRANCH
ref: "install_packs_one_by_one_on_failure"
project: "${CI_PROJECT_NAMESPACE}/infra"
Original file line number Diff line number Diff line change
@@ -1,4 +1,5 @@
[MODEL: dataset="aws_guardduty_raw"]
TESTING BAD MODELING RULE
alter // init aliases for root level & common objects for supporting both camelCase and PascalCase field naming convention extractions
finding_resource = coalesce(Resource, resource),
finding_service = coalesce(Service, service)
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,5 @@
[MODEL: dataset="abnormal_security_email_protection_raw"]
BAD MODELING RULE
alter
attachmentNames = arraystring(json_extract_scalar_array(attachmentNames, "$"), ","),
ccEmails = json_extract_scalar_array(ccEmails, "$"),
Expand Down
3 changes: 2 additions & 1 deletion Packs/Akamai_SIEM/ModelingRules/Akamai_WAF/Akamai_WAF.xif
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,8 @@
Reference: https://techdocs.akamai.com/siem-integration/reference/get-configid
Swagger: https://github.com/akamai/akamai-apis/blob/main/apis/siem/v1/openapi.json
*/
alter // pre-modeling extractions
alter // pre-modeling extractions
BAD MODELING RULE
client_ip = attackData -> clientIP,
client_platform = httpMessage -> requestHeaders.sec_ch_ua_platform,
host = httpMessage -> host,
Expand Down
3 changes: 2 additions & 1 deletion Packs/Alexa/Integrations/AlexaV2/AlexaV2.py
Original file line number Diff line number Diff line change
Expand Up @@ -93,7 +93,7 @@ def test_module(client: Client) -> str:

Return: 'ok' if test passed, anything else will fail the test.
"""

raise Exception(f"TESTING AAA")
try:
client.alexa_rank('google.com')
return 'ok'
Expand Down Expand Up @@ -151,6 +151,7 @@ def main() -> None:
verify_certificate = not params.get('insecure', False)
proxy = params.get('proxy', False)
demisto.debug(f'Command being called is {demisto.command()}')
demisto.debug(f"adding for tests")
try:
suspicious_domain_threshold = arg_to_number(params.get('suspicious_domain_threshold', None),
required=False,
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,7 @@ alter
xdm.source.host.device_id = arraystring(deviceIds -> [], ";"),
xdm.network.session_id = arraystring(arraymap(connectionIds -> [], trim("@element", "\"")), ";"),
xdm.network.rule = to_string(policyId);
TESTING BAD MODELING RULE

[MODEL: dataset=armis_security_activities_raw]
alter // extract the device name from the activity title, according to the activity type
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,5 @@
[MODEL: dataset=msft_azure_raw, model=Endpoint]
FAILED MODELING RULE
filter category in (
"AdvancedHunting-DeviceEvents", "AdvancedHunting-DeviceRegistryEvents",
"AdvancedHunting-DeviceProcessEvents", "AdvancedHunting-DeviceImageLoadEvents")
Expand Down
2 changes: 1 addition & 1 deletion Packs/FireEyeCM/Integrations/FireEyeCM/FireEyeCM.yml
Original file line number Diff line number Diff line change
Expand Up @@ -559,4 +559,4 @@ script:
dockerimage: demisto/python3:3.11.9.110419
fromversion: 5.5.0
tests:
- FireEye Central Management - Test
- FireEye Central Management - Test
1 change: 1 addition & 0 deletions Packs/FireEyeEX/Integrations/FireEyeEX/FireEyeEX.py
Original file line number Diff line number Diff line change
Expand Up @@ -542,6 +542,7 @@ def fetch_incidents(client: Client, last_run: dict, first_fetch: str, max_fetch:


def main() -> None:
raise Exception("TESTING AAABBB")
params = demisto.params()
username = params.get('credentials').get('identifier')
password = params.get('credentials').get('password')
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,4 +21,5 @@ alter type = json_extract_scalar(events, "$.0.type"),
xdm.source.user.identifier = actor_profileId,
xdm.target.resource.type = kind,
xdm.observer.vendor = _vendor,
xdm.observer.product = _product;
xdm.observer.product = _product;
TESTING BAD MODELING RULE
Original file line number Diff line number Diff line change
Expand Up @@ -2319,6 +2319,7 @@ def process_main(): # pragma: no cover

def main(): # pragma: no cover
try:
raise Exception("TESTING AAABBB")
handle_proxy()
# When running big queries, like 'ews-search-mailbox' the memory might not freed by the garbage
# collector. `separate_process` flag will run the integration on a separate process that will prevent
Expand Down
1 change: 1 addition & 0 deletions Packs/ServiceNow/Integrations/ServiceNow/ServiceNow.py
Original file line number Diff line number Diff line change
Expand Up @@ -1465,6 +1465,7 @@ def fetch_incidents():


def test_module():
raise Exception(f"TESTING AAA")
# Validate fetch_time parameter is valid (if not, parse_date_range will raise the error message)
parse_date_range(FETCH_TIME, '%Y-%m-%d %H:%M:%S')

Expand Down
1 change: 1 addition & 0 deletions Packs/Slack/Integrations/SlackV3/SlackV3.py
Original file line number Diff line number Diff line change
Expand Up @@ -130,6 +130,7 @@
"""
Sends a test message to the dedicated slack channel.
"""
raise Exception(f"TESING AAAAAA")

Check failure on line 133 in Packs/Slack/Integrations/SlackV3/SlackV3.py

View workflow job for this annotation

GitHub Actions / pre-commit / pre-commit

Ruff (F541)

Packs/Slack/Integrations/SlackV3/SlackV3.py:133:21: F541 f-string without any placeholders
if not DEDICATED_CHANNEL and len(CUSTOM_PERMITTED_NOTIFICATION_TYPES) > 0:
return_error(
"When 'Types of Notifications to Send' is populated, a dedicated channel is required.")
Expand Down
2 changes: 1 addition & 1 deletion Packs/TOPdesk/Integrations/TOPdesk/TOPdesk.py
Original file line number Diff line number Diff line change
Expand Up @@ -1558,7 +1558,7 @@

Returns 'ok' on success and an error message otherwise.
"""

raise Exception(f"TESTTT AAAA")

Check failure on line 1561 in Packs/TOPdesk/Integrations/TOPdesk/TOPdesk.py

View workflow job for this annotation

GitHub Actions / pre-commit / pre-commit

Ruff (F541)

Packs/TOPdesk/Integrations/TOPdesk/TOPdesk.py:1561:21: F541 f-string without any placeholders
try:
if demisto_params.get('isFetch'):
fetch_incidents(client=client,
Expand Down
Loading