Skip to content

Commit

Permalink
18.10.1 - Clear release notes (#2267)
Browse files Browse the repository at this point in the history
* 18.10.1

* 18.10.1 - clear rn

* 18.10.1 - change git hash

* made circleci changes
  • Loading branch information
Itay4 authored and yaakovi committed Oct 17, 2018
1 parent afbc2f9 commit a53d4a6
Show file tree
Hide file tree
Showing 34 changed files with 2 additions and 35 deletions.
4 changes: 2 additions & 2 deletions .circleci/config.yml
Expand Up @@ -4,8 +4,8 @@ jobs:
docker:
- image: circleci/node:9.11
environment:
CONTENT_VERSION: "18.10.0"
GIT_SHA1: "3e41cb6ae5be2505b12055ceb31a043538c49823"
CONTENT_VERSION: "18.10.1"
GIT_SHA1: "ef73b78e1cb1749298a7d419f6d157a5643db33e"
steps:
- checkout
- run:
Expand Down
Expand Up @@ -1822,6 +1822,5 @@ script:
description: Retrieve watchlist in Carbon black Response.
isfetch: true
runonce: false
releaseNotes: "cb-sensor-info sensor is not mandatory any more, user can query by hostname, ip, groupid, sensor"
tests:
- CarbonBlackResponseTest
1 change: 0 additions & 1 deletion Integrations/integration-Centreon.yml
Expand Up @@ -323,6 +323,5 @@ script:
description: Service state
description: All the monitoring information regarding services
runonce: false
releaseNotes: "-"
tests:
- Centreon-Test-Playbook
1 change: 0 additions & 1 deletion Integrations/integration-CrowdStrikeFalconSandbox.yml
Expand Up @@ -1424,7 +1424,6 @@ script:
type: string
description: Submit a file by URL for analysis (Supported only in v2).
runonce: false
releaseNotes: "-"
tests:
- VxStream Test
- detonate_file_-_generic_test
Expand Down
1 change: 0 additions & 1 deletion Integrations/integration-CrowdStrikeHost.yml
Expand Up @@ -935,6 +935,5 @@ script:
type: string
description: Fetch details of a Crowdstrike Detection using the detection ID
runonce: false
releaseNotes: "Added new commands cs-detection-search, cs-detection-details"
tests:
- CrowdStrike Endpoint Enrichment - Test
1 change: 0 additions & 1 deletion Integrations/integration-Cylance_Protect_v2.yml
Expand Up @@ -1580,6 +1580,5 @@ script:
dockerimage: demisto/cylance_protect_v2
isfetch: true
runonce: false
releaseNotes: "fixed proxy settings"
tests:
- Cylance Protect v2 Test
1 change: 0 additions & 1 deletion Integrations/integration-Devo.yml
Expand Up @@ -237,6 +237,5 @@ script:
description: The query results
description: Perform a query.
runonce: false
releaseNotes: "Added Devo integration"
tests:
- devo_test_playbook
1 change: 0 additions & 1 deletion Integrations/integration-EWSMailSender.yml
Expand Up @@ -295,4 +295,3 @@ script:
Should be the same number of elements as attachIDs.
description: Send email via EWS
dockerimage: demisto/py-ews
releaseNotes: "-"
1 change: 0 additions & 1 deletion Integrations/integration-FireEyeHX.yml
Expand Up @@ -2766,6 +2766,5 @@ script:
description: Delete data acquisition.
isfetch: true
runonce: false
releaseNotes: "fix proxy configuration"
tests:
- FireEye HX Test
1 change: 0 additions & 1 deletion Integrations/integration-FireEye_ETP.yml
Expand Up @@ -912,4 +912,3 @@ script:
90 days old are not available.
isfetch: true
runonce: false
releaseNotes: "fix proxy configuration"
1 change: 0 additions & 1 deletion Integrations/integration-ICEBRG.yml
Expand Up @@ -396,6 +396,5 @@ script:
description: Assets of Report UUID
description: Gets impacted assets for a report
isfetch: true
releaseNotes: "-"
tests:
- Icebrg Test
1 change: 0 additions & 1 deletion Integrations/integration-JoeSecurity.yml
Expand Up @@ -979,7 +979,6 @@ script:
description: Download the sample file of an analysis. for security reasons, the
extension will be "dontrun"
runonce: false
releaseNotes: Added url parameter
tests:
- JoeSecurityTestPlaybook
- JoeSecurityTestDetonation
1 change: 0 additions & 1 deletion Integrations/integration-McAfee-ATD.yml
Expand Up @@ -1210,4 +1210,3 @@ script:
type: string
description: Checks the analysis status of up to 100 jobIDs/taskIDs
runonce: false
releaseNotes: "Fix proxy handling"
1 change: 0 additions & 1 deletion Integrations/integration-McAfeeNSM.yml
Expand Up @@ -684,4 +684,3 @@ script:
type: string
description: Get all available attack definitions in NSM
runonce: false
releaseNotes: "Added output types"
1 change: 0 additions & 1 deletion Integrations/integration-Minemeld.yml
Expand Up @@ -346,6 +346,5 @@ script:
type: string
description: Get miner indicators list.
runonce: false
releaseNotes: "Fixed proxy settings"
tests:
- minemeld_test
1 change: 0 additions & 1 deletion Integrations/integration-QRadar.yml
Expand Up @@ -574,4 +574,3 @@ script:
description: Retrieve a note for an offense
isfetch: true
runonce: false
releaseNotes: "-"
1 change: 0 additions & 1 deletion Integrations/integration-RTIR.yml
Expand Up @@ -975,6 +975,5 @@ script:
dockerimage: demisto/rt-ir
isfetch: true
runonce: false
releaseNotes: "Improved fetch incidents implementation and added rtir-add-reply command"
tests:
- RTIR Test
1 change: 0 additions & 1 deletion Integrations/integration-Rapid7_Nexpose.yml
Expand Up @@ -1935,6 +1935,5 @@ script:
description: Starts a scan for specified asset IP addresses and host names.
runonce: false
fromversion: 3.6.0
releaseNotes: "Fix proxy handling"
tests:
- nexpose_test
1 change: 0 additions & 1 deletion Integrations/integration-SCADAfence_CNM.yml
Expand Up @@ -467,4 +467,3 @@ script:
runonce: false
tests:
- SCADAfence_test
releaseNotes: "-"
1 change: 0 additions & 1 deletion Integrations/integration-SecureWorks.yml
Expand Up @@ -1459,4 +1459,3 @@ script:
isfetch: true
runonce: false
fromversion: 3.6.0
releaseNotes: "Added count tickets and get ids commands"
1 change: 0 additions & 1 deletion Integrations/integration-ServiceNow.yml
Expand Up @@ -1819,4 +1819,3 @@ script:
type: string
description: query the cmdb_ci_computer table with a computer code
isfetch: true
releaseNotes: "Fixed outputs"
1 change: 0 additions & 1 deletion Integrations/integration-SymantecEndpointProtection.yml
Expand Up @@ -673,6 +673,5 @@ script:
description: The last-updated date.
description: Retrieves the client content.
hidden: false
releaseNotes: "-"
tests:
- sep_-_test_endpoint_search
1 change: 0 additions & 1 deletion Integrations/integration-SymantecMSS.yml
Expand Up @@ -562,6 +562,5 @@ script:
description: Get a list of incidents
dockerimage: demisto/symantec_mss
isfetch: true
releaseNotes: "Fix proxy handling"
tests:
- SymantecMSSTest
1 change: 0 additions & 1 deletion Integrations/integration-ThreatConnect.yml
Expand Up @@ -691,4 +691,3 @@ script:
dockerimage: demisto/threatconnect-sdk
tests:
- "test-ThreatConnect"
releaseNotes: "-"
1 change: 0 additions & 1 deletion Integrations/integration-VirusTotal-Private_API.yml
Expand Up @@ -1387,6 +1387,5 @@ script:
This call can be used in conjuction with the file searching call in order to
download samples that match a given set of criteria.
runonce: false
releaseNotes: fix output to warroom of vt-private-get-url-report command
tests:
- virusTotalPrivateAPI-test-playbook
1 change: 0 additions & 1 deletion Integrations/integration-VirusTotal.yml
Expand Up @@ -1129,6 +1129,5 @@ script:
description: Datetime token in format YYYYMMDDHHMISS that can be used for paging
description: Private API. Retrieve comments for a given resource
runonce: false
releaseNotes: Handle context data when executing 'file' command with multiple hashes
tests:
- virusTotal-test-playbook
Expand Up @@ -426,7 +426,6 @@ outputs:
- contextPath: DBotScore.Score
description: The actual score
type: number
releaseNotes: Checking File type also in File.Extenstion and ignoreing case
tests:
- VxStream Test
- detonate_file_-_generic_test
1 change: 0 additions & 1 deletion Playbooks/playbook-GenericPolling.yml
Expand Up @@ -226,4 +226,3 @@ inputs:
required: true
description: DT filter for polling IDs
outputs: []
releaseNotes: "-"
1 change: 0 additions & 1 deletion Scripts/script-Base64ListToFile.yml
Expand Up @@ -48,4 +48,3 @@ outputs:
description: EntryID of the file (only in case of report type=json)
scripttarget: 0
runonce: false
releaseNotes: "-"
1 change: 0 additions & 1 deletion Scripts/script-CommonServerPython.yml
Expand Up @@ -1170,6 +1170,5 @@ system: true
scripttarget: 0
dependson: {}
timeout: 0s
releaseNotes: Added urljoin
tests:
- TestPYCommonServer
1 change: 0 additions & 1 deletion Scripts/script-FindSimilarIncidents.yml
Expand Up @@ -383,4 +383,3 @@ outputs:
scripttarget: 0
timeout: 300ns
runonce: false
releaseNotes: "Support all incident keys in one argument"
1 change: 0 additions & 1 deletion Scripts/script-MatchRegex.yml
Expand Up @@ -61,4 +61,3 @@ outputs:
description: List of Regex matches
type: string
scripttarget: 0
releaseNotes: Fixing timeout of script if g flag is omitted and a match is found
1 change: 0 additions & 1 deletion Scripts/script-RunDockerCommand.yml
Expand Up @@ -58,4 +58,3 @@ outputs:
looking at commands like ExtractRegex or create your own follow on automation
script that will parse the results into the format you would like.
scripttarget: 0
releaseNotes: Runs local commands on a docker container of choice
1 change: 0 additions & 1 deletion Scripts/script-TopMaliciousRatioIndicators.yml
Expand Up @@ -71,4 +71,3 @@ args:
defaultValue: "100"
scripttarget: 0
runonce: false
releaseNotes: "add human readable"

0 comments on commit a53d4a6

Please sign in to comment.