diff --git a/Packs/AHA/TestPlaybooks/AHA_TestPlaybook.yml b/Packs/AHA/TestPlaybooks/AHA_TestPlaybook.yml index 36a17a78c3c2..19ab66f05827 100644 --- a/Packs/AHA/TestPlaybooks/AHA_TestPlaybook.yml +++ b/Packs/AHA/TestPlaybooks/AHA_TestPlaybook.yml @@ -1,7 +1,7 @@ -id: 73d65261-a8d2-45d0-8a62-000edfdace6b +id: AHA_TestPlaybook version: 16 vcShouldKeepItemLegacyProdMachine: false -name: AHA +name: AHA_TestPlaybook starttaskid: "0" tasks: "0": diff --git a/TestPlaybooks/NonCircleTests/playbook-AWS-CloudTrail_Test_.yml b/Packs/AWS-CloudTrail/TestPlaybooks/playbook-AWS-CloudTrail_Test_.yml similarity index 99% rename from TestPlaybooks/NonCircleTests/playbook-AWS-CloudTrail_Test_.yml rename to Packs/AWS-CloudTrail/TestPlaybooks/playbook-AWS-CloudTrail_Test_.yml index 43d31bee1fc0..867a548137a6 100644 --- a/TestPlaybooks/NonCircleTests/playbook-AWS-CloudTrail_Test_.yml +++ b/Packs/AWS-CloudTrail/TestPlaybooks/playbook-AWS-CloudTrail_Test_.yml @@ -1,4 +1,4 @@ -id: 3da2e31b-f114-4d7f-8702-117f3b498de9 +id: AWS - CloudTrail Test Playbook version: -1 fromversion: 5.0.0 name: AWS - CloudTrail Test Playbook diff --git a/Packs/AnsibleAlibabaCloud/TestPlaybooks/Test-AlibabaCloud.yml b/Packs/AnsibleAlibabaCloud/TestPlaybooks/Test-AlibabaCloud.yml index 86ae41f6d048..1e40df5b73f6 100644 --- a/Packs/AnsibleAlibabaCloud/TestPlaybooks/Test-AlibabaCloud.yml +++ b/Packs/AnsibleAlibabaCloud/TestPlaybooks/Test-AlibabaCloud.yml @@ -1,4 +1,4 @@ -id: a60ae34e-7a00-4a06-81ca-2ca6ea1d58ba +id: Test-AlibabaCloud version: -1 vcShouldKeepItemLegacyProdMachine: false name: Test-AlibabaCloud diff --git a/Packs/AnsibleHetznerCloud/TestPlaybooks/Test-AnsibleHCloud.yml b/Packs/AnsibleHetznerCloud/TestPlaybooks/Test-AnsibleHCloud.yml index 591f7a52e5de..526d04762532 100644 --- a/Packs/AnsibleHetznerCloud/TestPlaybooks/Test-AnsibleHCloud.yml +++ b/Packs/AnsibleHetznerCloud/TestPlaybooks/Test-AnsibleHCloud.yml @@ -1,4 +1,4 @@ -id: 7d8ac1af-2d1e-4ed9-875c-d3257d2c6830 +id: Test-AnsibleHCloud version: -1 vcShouldKeepItemLegacyProdMachine: false name: Test-AnsibleHCloud diff --git a/Packs/CarbonBlackProtect/TestPlaybooks/playbook-CbP-PlayBook.yml b/Packs/CarbonBlackProtect/TestPlaybooks/playbook-CbP-PlayBook.yml index c3dc5b69ee09..411c709ec28b 100644 --- a/Packs/CarbonBlackProtect/TestPlaybooks/playbook-CbP-PlayBook.yml +++ b/Packs/CarbonBlackProtect/TestPlaybooks/playbook-CbP-PlayBook.yml @@ -1,4 +1,4 @@ -id: 67b0f25f-b061-4468-8613-43ab13147173 +id: CbP-PlayBook version: -1 name: CbP-PlayBook starttaskid: "0" diff --git a/Packs/CommonScripts/ReleaseNotes/1_14_10.md b/Packs/CommonScripts/ReleaseNotes/1_14_10.md new file mode 100644 index 000000000000..3da36782d020 --- /dev/null +++ b/Packs/CommonScripts/ReleaseNotes/1_14_10.md @@ -0,0 +1,6 @@ + +#### Scripts + +##### GridFieldSetup + +Updated the Docker image to: *demisto/python3:3.10.13.89009*. diff --git a/Packs/CommonScripts/Scripts/GridFieldSetup/GridFieldSetup.py b/Packs/CommonScripts/Scripts/GridFieldSetup/GridFieldSetup.py index bed84542bccb..eb873a1cb4da 100644 --- a/Packs/CommonScripts/Scripts/GridFieldSetup/GridFieldSetup.py +++ b/Packs/CommonScripts/Scripts/GridFieldSetup/GridFieldSetup.py @@ -2,10 +2,7 @@ from CommonServerPython import * # noqa: F401 -from typing import Dict, List - - -def grid_field_setup(keys: List[str], vals: Dict, res_list: List) -> List[str]: +def grid_field_setup(keys: list[str], vals: dict, res_list: list) -> list[str]: """Returns a list of dictionaries based on the key/values provided. :type keys: ``str`` :type vals: ``dict`` @@ -29,7 +26,7 @@ def grid_field_setup(keys: List[str], vals: Dict, res_list: List) -> List[str]: ''' COMMAND FUNCTION ''' -def grid_field_setup_command(args: Dict[str, str]) -> CommandResults: +def grid_field_setup_command(args: dict[str, str]) -> CommandResults: keys = argToList(args.pop('keys', [])) overwrite = args.pop('overwrite', False) gridfield = args.pop('gridfield', None) diff --git a/Packs/CommonScripts/Scripts/GridFieldSetup/GridFieldSetup.yml b/Packs/CommonScripts/Scripts/GridFieldSetup/GridFieldSetup.yml index c80eb5186523..63087160bd54 100644 --- a/Packs/CommonScripts/Scripts/GridFieldSetup/GridFieldSetup.yml +++ b/Packs/CommonScripts/Scripts/GridFieldSetup/GridFieldSetup.yml @@ -39,7 +39,7 @@ comment: |- commonfields: id: GridFieldSetup version: -1 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.10.13.89009 enabled: true name: GridFieldSetup runas: DBotWeakRole @@ -51,4 +51,4 @@ tags: type: python fromversion: 6.5.0 tests: -- GridFieldSetup_test +- No tests diff --git a/Packs/CommonScripts/pack_metadata.json b/Packs/CommonScripts/pack_metadata.json index 7047495fdc95..85ae98efa764 100644 --- a/Packs/CommonScripts/pack_metadata.json +++ b/Packs/CommonScripts/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Common Scripts", "description": "Frequently used scripts pack.", "support": "xsoar", - "currentVersion": "1.14.9", + "currentVersion": "1.14.10", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/JoeSecurity/Integrations/JoeSecurityV2/JoeSecurityV2.yml b/Packs/JoeSecurity/Integrations/JoeSecurityV2/JoeSecurityV2.yml index c07733a65421..b881d3ba2b9a 100644 --- a/Packs/JoeSecurity/Integrations/JoeSecurityV2/JoeSecurityV2.yml +++ b/Packs/JoeSecurity/Integrations/JoeSecurityV2/JoeSecurityV2.yml @@ -1262,7 +1262,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/vendors-sdk:1.0.0.87491 + dockerimage: demisto/vendors-sdk:1.0.0.89427 fromversion: 6.8.0 tests: -- testplaybook- JoeSecuirtyV2 +- testplaybook-JoeSecuirtyV2 diff --git a/Packs/JoeSecurity/ReleaseNotes/1_1_20.md b/Packs/JoeSecurity/ReleaseNotes/1_1_20.md new file mode 100644 index 000000000000..a17d7731db35 --- /dev/null +++ b/Packs/JoeSecurity/ReleaseNotes/1_1_20.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Joe Security v2 + +Updated the Docker image to: *demisto/vendors-sdk:1.0.0.89427*. diff --git a/Packs/JoeSecurity/TestPlaybooks/testplaybook-_JoeSecuirtyV2.yml b/Packs/JoeSecurity/TestPlaybooks/testplaybook-_JoeSecuirtyV2.yml index 23c1556d8cec..ac476e2e7b04 100644 --- a/Packs/JoeSecurity/TestPlaybooks/testplaybook-_JoeSecuirtyV2.yml +++ b/Packs/JoeSecurity/TestPlaybooks/testplaybook-_JoeSecuirtyV2.yml @@ -1,7 +1,7 @@ -id: 07c5b111-3824-46cf-8ce8-6d0d5603ee21 +id: testplaybook-JoeSecuirtyV2 version: 41 vcShouldKeepItemLegacyProdMachine: false -name: testplaybook- JoeSecuirtyV2 +name: testplaybook-JoeSecuirtyV2 starttaskid: "0" tasks: "0": diff --git a/Packs/JoeSecurity/pack_metadata.json b/Packs/JoeSecurity/pack_metadata.json index db23e7186b37..bd4fb0b40299 100644 --- a/Packs/JoeSecurity/pack_metadata.json +++ b/Packs/JoeSecurity/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Joe Security", "description": "Sandbox Cloud", "support": "xsoar", - "currentVersion": "1.1.19", + "currentVersion": "1.1.20", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Whois/TestPlaybooks/Sanity_Test_-_Playbbok_with_Unmockable_integration_whois.yml b/Packs/Whois/TestPlaybooks/Sanity_Test_-_Playbbok_with_Unmockable_integration_whois.yml index df3abf13554c..866d8addb3ca 100644 --- a/Packs/Whois/TestPlaybooks/Sanity_Test_-_Playbbok_with_Unmockable_integration_whois.yml +++ b/Packs/Whois/TestPlaybooks/Sanity_Test_-_Playbbok_with_Unmockable_integration_whois.yml @@ -108,4 +108,4 @@ view: |- inputs: [] outputs: [] fromversion: 6.5.0 -description: Sanity Test - playbook with Unmockable integration +description: Sanity Test - Playbook with Unmockable Whois Integration diff --git a/Tests/conf.json b/Tests/conf.json index 6a7398e777c2..cd920690b9b5 100644 --- a/Tests/conf.json +++ b/Tests/conf.json @@ -94,7 +94,7 @@ }, { "integrations": "Microsoft Defender Advanced Threat Protection", - "playbookID": " Test Playbook - MDE - Retrieve File", + "playbookID": "Test Playbook - MDE - Retrieve File", "instance_names": "microsoft_defender_atp_dev" }, { @@ -115,15 +115,15 @@ }, { "integrations": "Cortex XDR - IR", - "playbookID": "Test_Playbook_-_Cortex_XDR_-_Endpoint_Investigation" + "playbookID": "Test Playbook - Cortex XDR - Endpoint Investigation" }, { "integrations": "Cortex XDR - IR", - "playbookID": "Test_Playbook-Cortex_XDR_Malware_-_Incident Enrichment" + "playbookID": "Test Playbook - Cortex XDR Malware - Incident Enrichment" }, { "integrations": "Cortex XDR - IR", - "playbookID": "Test_Playbook_-_Cortex_XDR_-_Retrieve_File_by_sha256" + "playbookID": "Test Playbook - Cortex XDR - Retrieve File by sha256" }, { "integrations": "Twitter v2", @@ -270,7 +270,7 @@ }, { "integrations": "GSuiteAdmin", - "playbookID": "GSuiteAdmin-MobileDevices-Test", + "playbookID": "playbook-GSuiteAdmin-MobileDevices-Test", "fromversion": "5.5.0" }, { @@ -521,8 +521,7 @@ }, { "integrations": [ - "Syslog Sender", - "syslog" + "Syslog Sender" ], "playbookID": "Test Syslog", "fromversion": "5.5.0", @@ -812,11 +811,6 @@ "playbookID": "Sanity Test - Playbook with no integration", "fromversion": "5.0.0" }, - { - "integrations": "Gmail", - "playbookID": "Sanity Test - Playbook with Unmockable Integration", - "fromversion": "5.0.0" - }, { "integrations": "Whois", "playbookID": "Sanity Test - Playbook with Unmockable Whois Integration", @@ -828,17 +822,6 @@ "fromversion": "5.0.0", "timeout": 400 }, - { - "integrations": "HelloWorldPremium", - "playbookID": "HelloWorldPremium_Scan-Test", - "fromversion": "5.0.0", - "timeout": 400 - }, - { - "integrations": "HelloWorldPremium", - "playbookID": "HelloWorldPremium-Test", - "fromversion": "5.0.0" - }, { "integrations": "ThreatQ v2", "playbookID": "ThreatQ - Test", @@ -1074,17 +1057,13 @@ "playbookID": "hashicorp_test", "fromversion": "5.0.0" }, - { - "integrations": "AWS - Athena - Beta", - "playbookID": "Beta-Athena-Test" - }, { "integrations": "BeyondTrust Password Safe", "playbookID": "BeyondTrust-Test" }, { "integrations": "Dell Secureworks", - "playbookID": "secureworks_test" + "playbookID": "SecureWorks" }, { "integrations": "ServiceNow v2", @@ -1456,7 +1435,7 @@ }, { "integrations": "Threat Grid", - "playbookID": "ThreatGrid_Test", + "playbookID": "ThreatGridTest", "timeout": 600 }, { @@ -1679,12 +1658,6 @@ "playbookID": "Test IP Indicator Fields", "fromversion": "5.0.0" }, - { - "playbookID": "TestDedupIncidentsPlaybook" - }, - { - "playbookID": "TestDedupIncidentsByName" - }, { "integrations": "McAfee Advanced Threat Defense", "playbookID": "Test Playbook McAfee ATD", @@ -1858,7 +1831,7 @@ "playbookID": "SymantecEndpointProtection_Test" }, { - "integrations": "carbonblackprotection", + "integrations": "CarbonBlackProtectionV2", "playbookID": "search_endpoints_by_hash_-_carbon_black_protection_-_test", "timeout": 500 }, @@ -1883,10 +1856,6 @@ { "playbookID": "ExposeIncidentOwner-Test" }, - { - "integrations": "google", - "playbookID": "GsuiteTest" - }, { "integrations": "OpenPhish", "playbookID": "OpenPhish Test Playbook" @@ -3041,11 +3010,7 @@ }, { "integrations": "AWS - CloudTrail", - "playbookID": "3da2e31b-f114-4d7f-8702-117f3b498de9" - }, - { - "integrations": "carbonblackprotection", - "playbookID": "67b0f25f-b061-4468-8613-43ab13147173" + "playbookID": "AWS - CloudTrail Test Playbook" }, { "integrations": "DomainTools", @@ -4031,7 +3996,11 @@ "is_mockable": false }, { - "playbookID": "Export Indicators Performance Test", + "integrations": "CarbonBlackProtectionV2", + "playbookID": "CbP-PlayBook" + }, + { + "playbookID": "EDL Indicator Performance Test", "instance_names": "eis_auto", "integrations": [ "ExportIndicators", @@ -4216,10 +4185,10 @@ ] }, { - "playbookID": "Darktrace Test Playbook", + "playbookID": "TestMBsPlaybook", "fromversion": "6.0.0", "integrations": [ - "Darktrace" + "DarktraceMBs" ] }, { @@ -4327,7 +4296,7 @@ ] }, { - "playbookID": "a60ae34e-7a00-4a06-81ca-2ca6ea1d58ba", + "playbookID": "Test-AnsibleHCloud", "fromversion": "6.0.0", "integrations": [ "AnsibleAlibabaCloud" @@ -4663,7 +4632,7 @@ "fromversion": "5.0.0" }, { - "playbookID": "7d8ac1af-2d1e-4ed9-875c-d3257d2c6830", + "playbookID": "Test-AnsibleHCloud", "fromversion": "6.0.0", "integrations": [ "AnsibleHCloud" @@ -4718,7 +4687,7 @@ "playbookID": "Test Playbook TrendMicroDDA", "fromversion": "5.0.0", "integrations": [ - "Trend Micro Deep Discovery Analyzer Beta" + "Trend Micro Deep Discovery Analyzer" ] }, { @@ -5423,10 +5392,6 @@ "playbookID": "McAfee ePO v2 Test", "memory_threshold": 100 }, - { - "playbookID": "Dedup - Generic v3", - "fromversion": "5.5.0" - }, { "playbookID": "DBotPredictURLPhishing_test", "integrations": [ @@ -5482,7 +5447,7 @@ }, { "integrations": "CloudflareWAF", - "playbookID": "playbook-TestCloudflareWAFPlaybook_Test", + "playbookID": "TestCloudflareWAFPlaybook", "fromversion": "6.2.0" }, { @@ -5549,12 +5514,9 @@ }, { "integrations": "Secneurx Analysis", - "playbookID": "Detonate URL - SecneurX Anlaysis - Test", + "playbookID": "Detonate URL - SecneurX Analysis - Test", "fromversion": "6.2.0" }, - { - "playbookID": "GridFieldSetup_test" - }, { "playbookID": "TestGetArrayElements" }, @@ -5579,15 +5541,15 @@ { "integrations": "JoeSecurityV2", "fromversion": "6.2.0", - "playbookID": "testplaybook- JoeSecuirtyV2" + "playbookID": "testplaybook-JoeSecuirtyV2" }, { - "integrations": "FortinetFortiwebVM", + "integrations": "fortiweb_vm", "playbookID": "playbook-FortiwebVM_V1_Test", "fromversion": "6.2.0" }, { - "integrations": "FortinetFortiwebVM", + "integrations": "fortiweb_vm", "playbookID": "playbook-FortiwebVM_V2_Test", "fromversion": "6.2.0" }, @@ -5673,13 +5635,13 @@ "playbookID": "Test - Netcraft" }, { - "integrations": "Fortimail", - "playbookID": "playbook-Fortimail_Test" + "integrations": "fortimail", + "playbookID": "Fortimail" }, { "integrations": "Zimperium v2", "playbookID": "Zimperiumv2-TestPlaybook" - }, + }, { "integrations": "AWS-SNS-Listener", "playbookID": "AWS SNS Listener - Test", @@ -5691,7 +5653,7 @@ "test-threatConnectv3": "No instance - Instance issues", "generic-sql-mssql-encrypted-connection": "Instance issues", "RSANetWitnessv115-Test": "mocking error CIAC-7576", - "CiscoWSAv2": "No instance - developed by Qmasters", + "playbook-CiscoWSA_Test": "No instance - developed by Qmasters", "DatadogCloudSIEM": "No instance - developed by Login soft", "RegPathReputationBasicLists_test": "The D2 pack is deprecated", "CirclIntegrationTest": "No instance", @@ -5710,7 +5672,6 @@ "MAR - Endpoint data collection test": "Issue CIAC-4521", "Tidy - Test": "Will run it manually.", "Protectwise-Test": "Issue CRTX-86776", - "TestDedupIncidentsPlaybook": "Issue 24344", "Endpoint data collection test": "Uses a deprecated playbook called Endpoint data collection", "Prisma_Access_Egress_IP_Feed-Test": "unskip after we will get Prisma Access instance - Issue 27112", "Prisma_Access-Test": "unskip after we will get Prisma Access instance - Issue 27112", @@ -5720,17 +5681,17 @@ "NetWitness Endpoint Test": "Issue 19878", "InfoArmorVigilanteATITest": "Test issue 17358", "ArcSight Logger test": "Issue 19117", - "3da2e31b-f114-4d7f-8702-117f3b498de9": "Issue 19837", + "AWS - CloudTrail Test Playbook": "Issue 19837", "d66e5f86-e045-403f-819e-5058aa603c32": "pr 3220", "IntSights Mssp Test": "Issue #16351", - "fd93f620-9a2d-4fb6-85d1-151a6a72e46d": "Issue 19854", + "AWS - SQS Test Playbook": "Issue 19854", "Test Playbook TrendMicroDDA": "Issue 16501", "ssdeepreputationtest": "Issue #20953", "C2sec-Test": "Issue #21633", "ThreatConnect v2 - Test": "Issue 26782", "Email Address Enrichment - Generic v2.1 - Test": "Issue 26785", "Tanium v2 - Test": "Issue 26822", - "Fidelis Elevate Network": "Issue 26453", + "Fidelis-Test": "Issue 26453", "Cortex XDR - IOC - Test": "Issue 37957", "PAN-OS Query Logs For Indicators Test": "Issue 28753", "TCPUtils-Test": "Issue 29677", @@ -5768,8 +5729,7 @@ "get_original_email_-_ews-_test": "Issue 27571", "Trend Micro Deep Security - Test": "outsourced", "Microsoft Teams - Test": "Issue 38263", - "EWS Extension: Powershell Online V2 Test": "Issue 39008", - "O365 - EWS - Extension - Test": "Issue 39008", + "playbook-O365-EWS-Extension-Powershell-Online-V2-Test": "Issue 39008", "Majestic Million Test Playbook": "Issue 30931", "iDefense_v2_Test": "Issue 40126", "Feed iDefense Test": "Issue 34035", @@ -5795,7 +5755,7 @@ "cisco-ise-test-playbook": "Issue 44351", "GuardiCoreV2-Test": "Issue 43822", "ExtractAttackPattern-Test": "Issue 44095", - "playbook-EWS_O365_Extension_test": "Issue 25605", + "playbook-EWS_O365_Extension_test": "Issue 25605, Issue 39008", "Cherwell - test": "Issue 26780", "Cherwell Example Scripts - test": "Issue 27107", "Endpoint Malware Investigation - Generic - Test": "Issue 44779", @@ -5832,7 +5792,7 @@ "Carbon Black Enterprise Protection V2 Test": "No credentials", "TruSTAR v2-Test": "No credentials", "Archer v2 - Test": "Test doesn't pass in the builds because of the creds, but creds seems ok, need to debug further", - "AD v2 - debug-mode": "No credentials", + "AD v2 - debug-mode - Test": "No credentials", "Google-KMS-test": "No instance", "hashicorp_test": "No instance", "Google BigQuery Test": "No instance", @@ -5947,7 +5907,7 @@ "AlienVault USM Anywhere": "No instance - Issue #18273", "Dell Secureworks": "No instance", "Service Manager": "No instance - Expired license", - "carbonblackprotection": "No instance - License expired", + "CarbonBlackProtectionV2": "No instance - License expired", "icebrg": "No instance - Issue 14312 - CIAC-2006", "Freshdesk": "No instance - Trial account expired", "Kafka V2": "No instance - Can not connect to instance from remote", @@ -5956,7 +5916,7 @@ "Remedy AR": "No instance - getting 'Not Found' in test button", "Salesforce": "No instance - Issue 15901 - CIAC-1976", "ANYRUN": "No instance", - "SecneurX Analysis": "No Instance", + "Secneurx Analysis": "No Instance", "Snowflake": "No instance - Looks like account expired, needs looking into", "Cisco Spark": "No instance - Issue 18940 - CIAC-1902", "Phish.AI": "No instance - Issue 17291", @@ -5977,7 +5937,7 @@ "CiscoAMP": "No instance & Depreceated, replaced by AMPV2", "AMPv2": "No instance - developed by Qmasters", "Cisco Umbrella Reporting": "No instance - developed by Login-Soft", - "FortinetFortiwebVM": "No instance - developed by Qmasters", + "fortiweb_vm": "No instance - developed by Qmasters", "_comment2": "~~~ UNSTABLE ~~~", "ThreatConnect v2": "unstable instance", "_comment3": "~~~ QUOTA ISSUES ~~~", @@ -5992,8 +5952,6 @@ "Forescout": "Can only be run from within PANW network. Look in keeper for - Demisto in the LAB", "ForescoutEyeInspect": "No instance - developed by Qmasters", "FortiManager": "Can only be run within PANW network", - "HelloWorldSimple": "This is just an example integration - no need for test", - "TestHelloWorldPlaybook": "This is just an example integration - no need for test", "AttackIQFireDrill": "License issues #29774 - CIAC-1502", "LogRhythm": "The integration is deprecated", "Threat Grid": "No instance & Depreceated, replaced by ThreatGridv2", @@ -6003,7 +5961,9 @@ "SecurityAndComplianceV2": "Can only be authenticated via MFA and requires user interaction to configure.", "ThreatExchange v2": "No instance", "PhishLabs IOC EIR": "No instance, CRTX-91214", - "Fortimail": "No instance" + "fortimail": "No instance", + "JoeSecurityV2": "CIAC-9872", + "Aha": "No instance" }, "nightly_packs": [ "CommonScripts", @@ -6112,9 +6072,7 @@ "ProtectWise": "Nightly - Checking", "google-vault": "Nightly - Checking", "Forcepoint": "Nightly - Checking", - "palo_alto_firewall": "Need to check test module", "Signal Sciences WAF": "error with certificate", - "google": "'unsecure' parameter not working", "EWS Mail Sender": "Inconsistent test (playback fails, record succeeds)", "ReversingLabs Titanium Cloud": "No Unsecure checkbox. proxy trying to connect when disabled.", "Recorded Future": "might be dynamic test", @@ -6145,7 +6103,6 @@ "G Suite Security Alert Center": "googleclient sdk has time based challenge exchange", "GoogleDrive": "googleclient sdk has time based challenge exchange", "Syslog Sender": "syslog", - "syslog": "syslog", "MongoDB Log": "Our instance not using SSL", "MongoDB Key Value Store": "Our instance not using SSL", "Zoom": "Uses dynamic token", @@ -6221,13 +6178,9 @@ "Whois", "abuse.ch SSL Blacklist Feed", "ipinfo", - "ipinfo_v2", - "syslog" - ], - "private_tests": [ - "HelloWorldPremium_Scan-Test", - "HelloWorldPremium-Test" + "ipinfo_v2" ], + "private_tests": [], "docker_thresholds": { "_comment": "Add here docker images which are specific to an integration and require a non-default threshold (such as rasterize or ews). That way there is no need to define this multiple times. You can specify full image name with version or without.", "images": {