Skip to content

Commit e7f10ec

Browse files
committed
[SOAR-18090] Trendmicro Deep Security - Snyk Vulnerabilities and SDK Bump (#2923)
* snyk and sdk - trendmicro * removing requests * adding timeout
1 parent 32116a6 commit e7f10ec

File tree

30 files changed

+356
-287
lines changed

30 files changed

+356
-287
lines changed
Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,31 @@
11
{
2-
"spec": "87df02f543c20dbd826f7b2f50c1a40a",
3-
"manifest": "a2b7ef210c31ec64898d6dbeba7c56fe",
4-
"setup": "f8c03ed81b7496550e9ac4b44ca81bbc",
2+
"spec": "c24b11137bc6c86ba10296dd19d2a409",
3+
"manifest": "a87fb2d79f552a29d4b6d6e698fa52eb",
4+
"setup": "139cf33ec232a2888bb62b92b08ed651",
55
"schemas": [
66
{
77
"identifier": "deploy_rules/schema.py",
8-
"hash": "8674123f170310085c72627eb16cb103"
8+
"hash": "ac52aeab22921a006441d8cd14819b7b"
99
},
1010
{
1111
"identifier": "get_rule_details/schema.py",
12-
"hash": "0eb15d3e0354f05e7d24fa53a5c48888"
12+
"hash": "12022e88fc85aa2aa0ba67c553ba3728"
1313
},
1414
{
1515
"identifier": "list_rules/schema.py",
16-
"hash": "234d239b2226033398e195fe476e255b"
16+
"hash": "ec8407791e5814ec61d60b2e3129b7d3"
1717
},
1818
{
1919
"identifier": "search_computers/schema.py",
20-
"hash": "dbbbb50f7f5c3fe3fb2a5ad1bff0558b"
20+
"hash": "1c12b4aac599e5d8cb1f3382a17e5282"
2121
},
2222
{
2323
"identifier": "search_rules/schema.py",
24-
"hash": "cadb6a7fecb480b49bab55a55f48382f"
24+
"hash": "701bc13aee0460e1579ee0dba473f94f"
2525
},
2626
{
2727
"identifier": "connection/schema.py",
28-
"hash": "39722fd7c5ae424e3941b7a534a713df"
28+
"hash": "c9dca0c588f6c8129395f5db3f96fa28"
2929
}
3030
]
3131
}

plugins/trendmicro_deepsecurity/Dockerfile

Lines changed: 5 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,17 @@
1-
FROM komand/python-3-37-slim-plugin
2-
# Refer to the following documentation for available SDK parent images: https://docs.rapid7.com/insightconnect/sdk-guide/#sdk-guide
1+
FROM --platform=linux/amd64 rapid7/insightconnect-python-3-slim-plugin:6.1.4
32

43
LABEL organization=rapid7
54
LABEL sdk=python
65

7-
# Add any custom package dependencies here
8-
# NOTE: Add pip packages to requirements.txt
9-
10-
# End package dependencies
11-
12-
# Add source code
136
WORKDIR /python/src
7+
148
ADD ./plugin.spec.yaml /plugin.spec.yaml
15-
ADD . /python/src
9+
ADD ./requirements.txt /python/src/requirements.txt
1610

17-
# Install pip dependencies
1811
RUN if [ -f requirements.txt ]; then pip install -r requirements.txt; fi
1912

20-
# Install plugin
13+
ADD . /python/src
14+
2115
RUN python setup.py build && python setup.py install
2216

2317
# User to run plugin code. The two supported users are: root, nobody

plugins/trendmicro_deepsecurity/bin/icon_trendmicro_deepsecurity

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
#!/usr/bin/env python
2-
# GENERATED BY KOMAND SDK - DO NOT EDIT
2+
# GENERATED BY INSIGHT-PLUGIN - DO NOT EDIT
33
import os
44
import json
55
from sys import argv
66

77
Name = "Trend Micro Deep Security"
88
Vendor = "rapid7"
9-
Version = "2.2.2"
9+
Version = "2.2.3"
1010
Description = "Utilize the Deep Security IPS engine to protect against vulnerabilities without installing a patch (virtual patching)"
1111

1212

@@ -22,10 +22,10 @@ def main():
2222
from gevent import monkey
2323
monkey.patch_all()
2424

25-
import komand
26-
from icon_trendmicro_deepsecurity import connection, actions, triggers
25+
import insightconnect_plugin_runtime
26+
from icon_trendmicro_deepsecurity import connection, actions, triggers, tasks
2727

28-
class ICONTrendmicroDeepsecurity(komand.Plugin):
28+
class ICONTrendmicroDeepsecurity(insightconnect_plugin_runtime.Plugin):
2929
def __init__(self):
3030
super(self.__class__, self).__init__(
3131
name=Name,
@@ -34,19 +34,19 @@ def main():
3434
description=Description,
3535
connection=connection.Connection()
3636
)
37+
self.add_action(actions.SearchRules())
38+
3739
self.add_action(actions.DeployRules())
38-
39-
self.add_action(actions.GetRuleDetails())
40-
40+
4141
self.add_action(actions.ListRules())
42-
42+
43+
self.add_action(actions.GetRuleDetails())
44+
4345
self.add_action(actions.SearchComputers())
44-
45-
self.add_action(actions.SearchRules())
46-
46+
4747

4848
"""Run plugin"""
49-
cli = komand.CLI(ICONTrendmicroDeepsecurity())
49+
cli = insightconnect_plugin_runtime.CLI(ICONTrendmicroDeepsecurity())
5050
cli.run()
5151

5252

0 commit comments

Comments
 (0)