-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #9 from splunk-soar-connectors/next
Merging next to main for release 2.2.7
- Loading branch information
Showing
32 changed files
with
353 additions
and
314 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,20 @@ | ||
name: Generate Readme Doc | ||
on: | ||
workflow_dispatch: | ||
push: | ||
paths: | ||
- '*.json' | ||
- 'readme.html' | ||
- 'manual_readme_content.md' | ||
tags-ignore: | ||
- '**' | ||
branches-ignore: | ||
- next | ||
- main | ||
jobs: | ||
generate-doc: | ||
runs-on: ubuntu-latest | ||
steps: | ||
- uses: 'phantomcyber/dev-cicd-tools/github-actions/generate-doc@main' | ||
with: | ||
GITHUB_TOKEN: ${{ secrets.SOAR_APPS_TOKEN }} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,22 @@ | ||
name: Review Release | ||
concurrency: | ||
group: app-release | ||
cancel-in-progress: true | ||
permissions: | ||
contents: read | ||
id-token: write | ||
statuses: write | ||
on: | ||
workflow_dispatch: | ||
inputs: | ||
task_token: | ||
description: 'StepFunction task token' | ||
required: true | ||
|
||
jobs: | ||
review: | ||
uses: 'phantomcyber/dev-cicd-tools/.github/workflows/review-release.yml@main' | ||
with: | ||
task_token: ${{ inputs.task_token }} | ||
secrets: | ||
resume_release_role_arn: ${{ secrets.RESUME_RELEASE_ROLE_ARN }} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,9 +1,13 @@ | ||
name: Start Release | ||
on: workflow_dispatch | ||
on: | ||
workflow_dispatch: | ||
push: | ||
tags: | ||
- '*-beta*' | ||
jobs: | ||
start-release: | ||
runs-on: ubuntu-latest | ||
steps: | ||
- uses: 'phantomcyber/dev-cicd-tools/github-actions/start-release@main' | ||
with: | ||
GITHUB_TOKEN: ${{ secrets.SOAR_APPS_TOKEN }} | ||
GITHUB_TOKEN: ${{ secrets.SOAR_APPS_TOKEN }} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,11 +1,11 @@ | ||
repos: | ||
- repo: https://github.com/phantomcyber/dev-cicd-tools | ||
rev: v1.4 | ||
rev: v1.16 | ||
hooks: | ||
- id: org-hook | ||
- id: package-app-dependencies | ||
- repo: https://github.com/Yelp/detect-secrets | ||
rev: v1.1.0 | ||
rev: v1.4.0 | ||
hooks: | ||
- id: detect-secrets | ||
args: ['--no-verify', '--exclude-files', '^awscloudtrail.json$'] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,26 @@ | ||
[comment]: # " File: README.md" | ||
[comment]: # " Copyright (c) 2018-2021 Splunk Inc." | ||
[comment]: # "" | ||
[comment]: # " SPLUNK CONFIDENTIAL - Use or disclosure of this material in whole or in part" | ||
[comment]: # " without a valid written license from Splunk Inc. is PROHIBITED." | ||
[comment]: # "" | ||
## Asset Configuration | ||
|
||
There are two ways to configure an AWS CloudTrail asset. The first is to configure the | ||
**access_key** , **secret_key** and **region** variables. If it is preferred to use a role and | ||
Phantom is running as an EC2 instance, the **use_role** checkbox can be checked instead. This will | ||
allow the role that is attached to the instance to be used. Please see the [AWS EC2 and IAM | ||
documentation](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html) | ||
for more information. | ||
|
||
## Assumed Role Credentials | ||
|
||
The optional **credentials** action parameter consists of temporary **assumed role** credentials | ||
that will be used to perform the action instead of those that are configured in the **asset** . The | ||
parameter is not designed to be configured manually, but should instead be used in conjunction with | ||
the Phantom AWS Security Token Service app. The output of the **assume_role** action of the STS app | ||
with data path **assume_role\_\<number>:action_result.data.\*.Credentials** consists of a dictionary | ||
containing the **AccessKeyId** , **SecretAccessKey** , **SessionToken** and **Expiration** key/value | ||
pairs. This dictionary can be passed directly into the credentials parameter in any of the following | ||
actions within a playbook. For more information, please see the [AWS Identity and Access Management | ||
documentation](https://docs.aws.amazon.com/iam/index.html) . |
This file was deleted.
Oops, something went wrong.
Oops, something went wrong.