Skip to content

Commit d9d4560

Browse files
2 parents bf94984 + 7dfe147 commit d9d4560

File tree

13 files changed

+1147
-531
lines changed

13 files changed

+1147
-531
lines changed

NOTICE

Lines changed: 941 additions & 339 deletions
Large diffs are not rendered by default.

docker-compose-ci.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -88,6 +88,7 @@ services:
8888
- SPLUNK_HEC_TOKEN=${SPLUNK_HEC_TOKEN}
8989
- SPLUNK_START_ARGS=--accept-license
9090
- TEST_SC4S_ACTIVATE_EXAMPLES=yes
91+
- SPLUNK_GENERAL_TERMS=--accept-sgt-current-at-splunk-com
9192
volumes:
9293
results:
9394
external: false

docker-compose.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,7 @@ services:
8080
- SPLUNK_START_ARGS=--accept-license
8181
- SPLUNK_HEC_TOKEN=${SPLUNK_HEC_TOKEN}
8282
- TEST_SC4S_ACTIVATE_EXAMPLES=yes
83+
- SPLUNK_GENERAL_TERMS=--accept-sgt-current-at-splunk-com
8384

8485
uf:
8586
build:
@@ -104,4 +105,4 @@ services:
104105

105106
volumes:
106107
splunk-sc4s-var:
107-
external: false
108+
external: false

poetry.lock

Lines changed: 140 additions & 159 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

pyproject.toml

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616

1717
[tool.poetry]
1818
name = "pytest-splunk-addon"
19-
version = "6.0.0"
19+
version = "6.1.0-beta.1"
2020
description = "A Dynamic test tool for Splunk Apps and Add-ons"
2121
authors = ["Splunk <[email protected]>"]
2222
license = "APACHE-2.0"
@@ -36,18 +36,20 @@ python = "^3.7"
3636
pytest = ">5.4.0,<8"
3737
splunk-sdk = ">=1.6"
3838
requests = "^2.31.0"
39-
jsonschema = "^v4.17.3"
39+
jsonschema = "^4.17.3"
4040
pytest-xdist = "^3.5.0"
4141
filelock = "^3.0"
4242
pytest-ordering = "~0.6"
43-
junitparser = "^2.2.0"
43+
junitparser = "^4.0.0"
4444
addonfactory-splunk-conf-parser-lib = "*"
4545
defusedxml = "^0.7.1"
46-
Faker = "^18.0.0"
47-
xmltodict = "^0.13.0"
46+
Faker = "^18.12.0"
47+
xmltodict = "^0.14.0"
4848
xmlschema = "^2.5.1"
4949
splunksplwrapper = "^1.1.1"
5050
urllib3 = "<2"
51+
certifi = "^2024.7.4"
52+
zipp = "^3.6.0"
5153

5254
[tool.poetry.group.dev.dependencies]
5355
pytest-cov = "^4"

pytest_splunk_addon/CIM_Models/datamodel_definition.py

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2399,4 +2399,5 @@
23992399
# No fields changes between v6.0.0 and v6.0.2
24002400
datamodels["6.0.1"] = datamodels["6.0.0"]
24012401
datamodels["6.0.2"] = datamodels["6.0.0"]
2402-
datamodels["latest"] = datamodels["6.0.2"]
2402+
datamodels["6.1.0"] = datamodels["6.0.2"]
2403+
datamodels["latest"] = datamodels["6.1.0"]

pytest_splunk_addon/__init__.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,4 +18,4 @@
1818

1919
__author__ = """Splunk Inc."""
2020
__email__ = "[email protected]"
21-
__version__ = "6.0.0"
21+
__version__ = "6.1.0-beta.1"

pytest_splunk_addon/data_models/Authentication.json

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -107,6 +107,16 @@
107107
"validity": "if(action in ['success', 'failure'], action, null())",
108108
"comment": "The human-readable message associated with the authentication action (success or failure)."
109109
},
110+
{
111+
"name": "reason_id",
112+
"type": "optional",
113+
"comment": "The reason why logon failed. For example \\'0xC0000234\\'."
114+
},
115+
{
116+
"name": "process",
117+
"type": "optional",
118+
"comment": "Full path and the name of the executable for the process that attempted the logon. For example, it is a \\\"Process Name\\\" in Windows such as `C:\\\\Windows\\\\System32\\\\svchost.exe`."
119+
},
110120
{
111121
"name": "src_user",
112122
"condition": "src_user=* tag=privileged",
@@ -118,6 +128,7 @@
118128
"type": "optional",
119129
"comment": "The account that manages the user that initiated the request. The account represents the organization, a Cloud customer, or a Cloud account."
120130
}
131+
121132
],
122133
"child_dataset": [
123134
{

pytest_splunk_addon/data_models/Endpoint.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -351,6 +351,11 @@
351351
"name": "vendor_product",
352352
"type": "required",
353353
"comment": "The vendor and product name of the Endpoint solution that reported the event, such as Carbon Black Cb Response. This field can be automatically populated by vendor and product fields in your data."
354+
},
355+
{
356+
"name": "image",
357+
"type": "optional",
358+
"comment": "The binary file path or name that is tied to a process ID (PID) in events like process creation or termination."
354359
}
355360
],
356361
"child_dataset": [],
@@ -469,6 +474,11 @@
469474
"name": "vendor_product",
470475
"type": "required",
471476
"comment": "The vendor and product name of the Endpoint solution that reported the event, such as Carbon Black Cb Response. This field can be automatically populated by vendor and product fields in your data."
477+
},
478+
{
479+
"name": "image",
480+
"type": "optional",
481+
"comment": "The binary file path or name that is tied to a process ID (PID) in events like process creation or termination."
472482
}
473483
],
474484
"child_dataset": [],

pytest_splunk_addon/data_models/Network_Traffic.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -198,7 +198,12 @@
198198
{
199199
"name": "rule",
200200
"type": "optional",
201-
"comment": "The rule which defines the action that was taken in the network event. Note: This is a string value. Use rule_id for rule fields that are integer data types. The rule_id field is optional, so it is not included in the data model"
201+
"comment": "The rule which defines the action that was taken in the network event. Note: This is a string value. Use rule_id for rule fields that are integer data types."
202+
},
203+
{
204+
"name": "rule_id",
205+
"type": "optional",
206+
"comment": "The vendor-specific unique identifier of the rule. Examples: 0x00011f0000011f00, 0x00011f00-syn_flood."
202207
},
203208
{
204209
"name": "session_id",

0 commit comments

Comments
 (0)