Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Set sensitive values as secret - Part 4 #9129

Merged
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
5 changes: 5 additions & 0 deletions packages/ti_anomali/changelog.yml
@@ -1,4 +1,9 @@
# newer versions go on top
- version: "1.20.0"
changes:
- description: Set sensitive values as secret.
type: enhancement
link: https://github.com/elastic/integrations/pull/9129
- version: "1.19.2"
changes:
- description: Changed owners
Expand Down
3 changes: 2 additions & 1 deletion packages/ti_anomali/data_stream/threatstream/manifest.yml
Expand Up @@ -36,12 +36,13 @@ streams:
show_user: false
default: application/x-ndjson
- name: secret
type: text
type: password
title: HMAC secret key
description: Secret key to authenticate requests from the SDK.
multi: false
required: false
show_user: true
secret: true
- name: ssl
type: yaml
title: TLS
Expand Down
6 changes: 3 additions & 3 deletions packages/ti_anomali/manifest.yml
@@ -1,13 +1,13 @@
name: ti_anomali
title: Anomali
version: "1.19.2"
version: "1.20.0"
description: Ingest threat intelligence indicators from Anomali with Elastic Agent.
type: integration
format_version: 3.0.0
format_version: 3.0.2
categories: ["security", "threat_intel"]
conditions:
kibana:
version: ^8.8.0
version: ^8.12.0
icons:
- src: /img/anomali.svg
title: Anomali
Expand Down
5 changes: 5 additions & 0 deletions packages/ti_cif3/changelog.yml
@@ -1,4 +1,9 @@
# newer versions go on top
- version: "1.11.0"
changes:
- description: Set sensitive values as secret.
type: enhancement
link: https://github.com/elastic/integrations/pull/9129
- version: "1.10.1"
changes:
- description: Changed owners
Expand Down
7 changes: 4 additions & 3 deletions packages/ti_cif3/manifest.yml
@@ -1,15 +1,15 @@
format_version: "3.0.0"
format_version: "3.0.2"
name: ti_cif3
title: "Collective Intelligence Framework v3"
version: "1.10.1"
version: "1.11.0"
description: "Ingest threat indicators from a Collective Intelligence Framework v3 instance with Elastic Agent."
type: integration
categories:
- security
- threat_intel
conditions:
kibana:
version: "^8.7.1"
version: "^8.12.0"
icons:
- src: /img/csg_logo_big.svg
title: csirtgadgets logo
Expand Down Expand Up @@ -38,6 +38,7 @@ policy_templates:
required: true
show_user: true
description: The CIFv3 API read token
secret: true
owner:
github: elastic/security-service-integrations
type: community
5 changes: 5 additions & 0 deletions packages/ti_cybersixgill/changelog.yml
@@ -1,4 +1,9 @@
# newer versions go on top
- version: "1.26.0"
changes:
- description: Set sensitive values as secret.
type: enhancement
link: https://github.com/elastic/integrations/pull/9129
- version: "1.25.1"
changes:
- description: Changed owners
Expand Down
1 change: 1 addition & 0 deletions packages/ti_cybersixgill/data_stream/threat/manifest.yml
Expand Up @@ -15,6 +15,7 @@ streams:
multi: false
required: true
show_user: true
secret: true
- name: enable_request_tracer
type: bool
title: Enable request tracing
Expand Down
6 changes: 3 additions & 3 deletions packages/ti_cybersixgill/manifest.yml
@@ -1,13 +1,13 @@
name: ti_cybersixgill
title: Cybersixgill
version: "1.25.1"
version: "1.26.0"
description: Ingest threat intelligence indicators from Cybersixgill with Elastic Agent.
type: integration
format_version: "3.0.0"
format_version: "3.0.2"
categories: ["security", "threat_intel"]
conditions:
kibana:
version: ^8.7.1
version: ^8.12.0
policy_templates:
- name: cybersixgill
title: Cybersixgill Threat Intel
Expand Down
5 changes: 5 additions & 0 deletions packages/ti_maltiverse/changelog.yml
@@ -1,3 +1,8 @@
- version: "1.1.0"
changes:
- description: Set sensitive values as secret.
type: enhancement
link: https://github.com/elastic/integrations/pull/9129
- version: "1.0.1"
changes:
- description: Changed owners
Expand Down
3 changes: 2 additions & 1 deletion packages/ti_maltiverse/data_stream/indicator/manifest.yml
Expand Up @@ -7,11 +7,12 @@ streams:
description: Fetches thread intelligence feeds from Maltiverse API
vars:
- name: api_token
type: text
type: password
title: API Token
description: Maltiverse API Token
multi: false
required: true
secret: true
- name: feed
type: text
title: Feed
Expand Down
6 changes: 3 additions & 3 deletions packages/ti_maltiverse/manifest.yml
@@ -1,13 +1,13 @@
name: ti_maltiverse
title: Maltiverse
version: "1.0.1"
version: "1.1.0"
description: Ingest threat intelligence indicators from Maltiverse feeds with Elastic Agent
type: integration
format_version: 3.0.0
format_version: 3.0.2
categories: ["security", "threat_intel"]
conditions:
kibana:
version: ^8.8.0
version: ^8.12.0
icons:
- src: /img/logo-maltiverse.svg
title: Maltiverse
Expand Down
5 changes: 5 additions & 0 deletions packages/ti_mandiant_advantage/changelog.yml
@@ -1,4 +1,9 @@
# newer versions go on top
- version: "1.1.0"
changes:
- description: Set sensitive values as secret.
type: enhancement
link: https://github.com/elastic/integrations/pull/9129
- version: "1.0.1"
changes:
- description: Changed owners
Expand Down
Expand Up @@ -13,13 +13,15 @@ streams:
multi: false
required: true
show_user: true
secret: false
- name: mati_api_key_secret
type: password
title: Threat Intelligence API Key Secret
description: Key Secret for the Threat Intelligence API.
multi: false
required: true
show_user: true
secret: true
- name: interval
type: text
title: Interval
Expand Down
6 changes: 3 additions & 3 deletions packages/ti_mandiant_advantage/manifest.yml
@@ -1,7 +1,7 @@
format_version: 3.0.0
format_version: 3.0.2
name: ti_mandiant_advantage
title: "Mandiant Advantage"
version: 1.0.1
version: 1.1.0
source:
license: "Elastic-2.0"
description: "Collect Threat Intelligence from products within the Mandiant Advantage platform."
Expand All @@ -11,7 +11,7 @@ categories:
- security
conditions:
kibana:
version: "^8.6.2"
version: "^8.12.0"
elastic:
subscription: basic
screenshots:
Expand Down
5 changes: 5 additions & 0 deletions packages/ti_misp/changelog.yml
@@ -1,4 +1,9 @@
# newer versions go on top
- version: "1.32.0"
changes:
- description: Set sensitive values as secret.
type: enhancement
link: https://github.com/elastic/integrations/pull/9129
- version: "1.31.0"
changes:
- description: Pagination fixes
Expand Down
1 change: 1 addition & 0 deletions packages/ti_misp/data_stream/threat/manifest.yml
Expand Up @@ -18,6 +18,7 @@ streams:
required: true
show_user: true
description: The API token used to access the MISP instance.
secret: true
- name: initial_interval
type: text
title: Initial interval
Expand Down
Expand Up @@ -18,6 +18,7 @@ streams:
required: true
show_user: true
description: The API token used to access the MISP instance.
secret: true
- name: limit
type: text
title: Attributes Limit
Expand Down
6 changes: 3 additions & 3 deletions packages/ti_misp/manifest.yml
@@ -1,13 +1,13 @@
name: ti_misp
title: MISP
version: "1.31.0"
version: "1.32.0"
description: Ingest threat intelligence indicators from MISP platform with Elastic Agent.
type: integration
format_version: "3.0.0"
format_version: "3.0.2"
categories: ["security", "threat_intel"]
conditions:
kibana:
version: ^8.11.0
version: ^8.12.0
icons:
- src: /img/misp.svg
title: MISP
Expand Down
5 changes: 5 additions & 0 deletions packages/ti_opencti/changelog.yml
@@ -1,4 +1,9 @@
# newer versions go on top
- version: "2.1.0"
changes:
- description: Set sensitive values as secret.
type: enhancement
link: https://github.com/elastic/integrations/pull/9129
- version: "2.0.0"
changes:
- description: Update for OpenCTI v5.12.24 GraphQL schema change
Expand Down
7 changes: 4 additions & 3 deletions packages/ti_opencti/manifest.yml
@@ -1,7 +1,7 @@
format_version: "3.0.0"
format_version: "3.0.2"
name: ti_opencti
title: OpenCTI
version: "2.0.0"
version: "2.1.0"
description: "Ingest threat intelligence indicators from OpenCTI with Elastic Agent."
type: integration
source:
Expand All @@ -11,7 +11,7 @@ categories:
- threat_intel
conditions:
kibana:
version: "^8.10.1"
version: "^8.12.0"
screenshots:
- src: /img/screenshot1.png
title: "Dashboard: OpenCTI Overview"
Expand Down Expand Up @@ -57,6 +57,7 @@ policy_templates:
multi: false
required: false
show_user: true
secret: true
- name: oauth2
type: yaml
title: OAuth2 Configuration
Expand Down
5 changes: 5 additions & 0 deletions packages/ti_otx/changelog.yml
@@ -1,4 +1,9 @@
# newer versions go on top
- version: "1.24.0"
changes:
- description: Set sensitive values as secret.
type: enhancement
link: https://github.com/elastic/integrations/pull/9129
- version: "1.23.2"
changes:
- description: Changed owners
Expand Down
Expand Up @@ -24,12 +24,13 @@ streams:
show_user: true
default: 5m
- name: api_key
type: text
type: password
title: API Key
multi: false
required: true
show_user: true
description: The Alienvault OTX API Key
secret: true
- name: first_interval
type: text
title: First Interval
Expand Down
3 changes: 2 additions & 1 deletion packages/ti_otx/data_stream/threat/manifest.yml
Expand Up @@ -42,12 +42,13 @@ streams:
show_user: true
default: 5m
- name: api_token
type: text
type: password
title: API Token
multi: false
required: true
show_user: true
description: The Alienvault OTX API token
secret: true
- name: first_interval
type: text
title: First Interval
Expand Down
6 changes: 3 additions & 3 deletions packages/ti_otx/manifest.yml
@@ -1,13 +1,13 @@
name: ti_otx
title: AlienVault OTX
version: "1.23.2"
version: "1.24.0"
description: Ingest threat intelligence indicators from AlienVault Open Threat Exchange (OTX) with Elastic Agent.
type: integration
format_version: "3.0.0"
format_version: "3.0.2"
categories: ["security", "threat_intel"]
conditions:
kibana:
version: ^8.10.3
version: ^8.12.0
icons:
- src: /img/otx.svg
title: Alienvault OTX
Expand Down
5 changes: 5 additions & 0 deletions packages/ti_rapid7_threat_command/changelog.yml
@@ -1,4 +1,9 @@
# newer versions go on top
- version: "1.15.0"
changes:
- description: Set sensitive values as secret.
type: enhancement
link: https://github.com/elastic/integrations/pull/9129
- version: "1.14.1"
changes:
- description: Changed owners
Expand Down
7 changes: 4 additions & 3 deletions packages/ti_rapid7_threat_command/manifest.yml
@@ -1,14 +1,14 @@
format_version: 3.0.0
format_version: 3.0.2
name: ti_rapid7_threat_command
title: Rapid7 Threat Command
# The version must be updated manually in the transform.yml files and transform APIs mentioned in README.
version: "1.14.1"
version: "1.15.0"
description: Collect threat intelligence from Threat Command API with Elastic Agent.
type: integration
categories: ["security", "threat_intel"]
conditions:
kibana:
version: ^8.7.1
version: ^8.12.0
elastic:
capabilities:
- security
Expand Down Expand Up @@ -96,6 +96,7 @@ policy_templates:
multi: false
required: true
show_user: true
secret: true
- name: proxy_url
type: text
title: Proxy URL
Expand Down
5 changes: 5 additions & 0 deletions packages/ti_recordedfuture/changelog.yml
@@ -1,4 +1,9 @@
# newer versions go on top
- version: "1.22.0"
changes:
- description: Set sensitive values as secret.
type: enhancement
link: https://github.com/elastic/integrations/pull/9129
- version: "1.21.0"
changes:
- description: Make `threat.indicator.url.full` available for rule detections.
Expand Down
Expand Up @@ -87,12 +87,13 @@ streams:
required: true
show_user: true
- name: api_token
type: text
type: password
title: API Token
description: Recorded Future API Token (RF_TOKEN).
multi: false
required: true
show_user: true
secret: true
- name: custom_url
type: url
title: Custom URL
Expand Down