contentctl 5.0.1__py3-none-any.whl → 5.0.2__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,23 +1,45 @@
1
- import sys
2
- from dataclasses import dataclass
3
- import pathlib
4
- import json
5
1
  import datetime
6
- import timeit
2
+ import json
3
+ import pathlib
4
+ import sys
7
5
  import time
6
+ import timeit
7
+ from dataclasses import dataclass
8
+ from io import BufferedReader
8
9
 
9
- from requests import Session, post, get
10
+ from requests import Session, get, post
10
11
  from requests.auth import HTTPBasicAuth
11
12
 
12
13
  from contentctl.objects.config import inspect
13
- from contentctl.objects.savedsearches_conf import SavedsearchesConf
14
14
  from contentctl.objects.errors import (
15
- MetadataValidationError,
16
15
  DetectionIDError,
17
16
  DetectionMissingError,
18
- VersionDecrementedError,
17
+ MetadataValidationError,
19
18
  VersionBumpingError,
19
+ VersionDecrementedError,
20
20
  )
21
+ from contentctl.objects.savedsearches_conf import SavedsearchesConf
22
+
23
+ """
24
+ The following list includes all appinspect tags available from:
25
+ https://dev.splunk.com/enterprise/reference/appinspect/appinspecttagreference/
26
+
27
+ This allows contentctl to be as forward-leaning as possible in catching
28
+ any potential issues on the widest variety of stacks.
29
+ """
30
+ INCLUDED_TAGS_LIST = [
31
+ "aarch64_compatibility",
32
+ "ast",
33
+ "cloud",
34
+ "future",
35
+ "manual",
36
+ "packaging_standards",
37
+ "private_app",
38
+ "private_classic",
39
+ "private_victoria",
40
+ "splunk_appinspect",
41
+ ]
42
+ INCLUDED_TAGS_STRING = ",".join(INCLUDED_TAGS_LIST)
21
43
 
22
44
 
23
45
  @dataclass(frozen=True)
@@ -28,7 +50,6 @@ class InspectInputDto:
28
50
  class Inspect:
29
51
  def execute(self, config: inspect) -> str:
30
52
  if config.build_app or config.build_api:
31
- self.inspectAppCLI(config)
32
53
  appinspect_token = self.inspectAppAPI(config)
33
54
 
34
55
  if config.enable_metadata_validation:
@@ -49,10 +70,6 @@ class Inspect:
49
70
  session.auth = HTTPBasicAuth(
50
71
  config.splunk_api_username, config.splunk_api_password
51
72
  )
52
- if config.stack_type not in ["victoria", "classic"]:
53
- raise Exception(
54
- f"stack_type MUST be either 'classic' or 'victoria', NOT '{config.stack_type}'"
55
- )
56
73
 
57
74
  APPINSPECT_API_LOGIN = "https://api.splunk.com/2.0/rest/login/splunk"
58
75
 
@@ -64,10 +81,6 @@ class Inspect:
64
81
  APPINSPECT_API_VALIDATION_REQUEST = (
65
82
  "https://appinspect.splunk.com/v1/app/validate"
66
83
  )
67
- headers = {
68
- "Authorization": f"bearer {authorization_bearer}",
69
- "Cache-Control": "no-cache",
70
- }
71
84
 
72
85
  package_path = config.getPackageFilePath(include_version=False)
73
86
  if not package_path.is_file():
@@ -77,18 +90,43 @@ class Inspect:
77
90
  "trying to 'contentctl deploy_acs' the package BEFORE running 'contentctl build'?"
78
91
  )
79
92
 
80
- files = {
93
+ """
94
+ Some documentation on "files" argument for requests.post exists here:
95
+ https://docs.python-requests.org/en/latest/api/
96
+ The type (None, INCLUDED_TAGS_STRING) is intentional, and the None is important.
97
+ In curl syntax, the request we make below is equivalent to
98
+ curl -X POST \
99
+ -H "Authorization: bearer <TOKEN>" \
100
+ -H "Cache-Control: no-cache" \
101
+ -F "app_package=@<PATH/APP-PACKAGE>" \
102
+ -F "included_tags=cloud" \
103
+ --url "https://appinspect.splunk.com/v1/app/validate"
104
+
105
+ This is confirmed by the great resource:
106
+ https://curlconverter.com/
107
+ """
108
+ data: dict[str, tuple[None, str] | BufferedReader] = {
81
109
  "app_package": open(package_path, "rb"),
82
- "included_tags": (None, "cloud"),
110
+ "included_tags": (
111
+ None,
112
+ INCLUDED_TAGS_STRING,
113
+ ), # tuple with None is intentional here
83
114
  }
84
115
 
85
- res = post(APPINSPECT_API_VALIDATION_REQUEST, headers=headers, files=files)
116
+ headers = {
117
+ "Authorization": f"bearer {authorization_bearer}",
118
+ "Cache-Control": "no-cache",
119
+ }
120
+
121
+ res = post(APPINSPECT_API_VALIDATION_REQUEST, files=data, headers=headers)
86
122
 
87
123
  res.raise_for_status()
88
124
 
89
125
  request_id = res.json().get("request_id", None)
90
- APPINSPECT_API_VALIDATION_STATUS = f"https://appinspect.splunk.com/v1/app/validate/status/{request_id}?included_tags=private_{config.stack_type}"
91
- headers = headers = {"Authorization": f"bearer {authorization_bearer}"}
126
+ APPINSPECT_API_VALIDATION_STATUS = (
127
+ f"https://appinspect.splunk.com/v1/app/validate/status/{request_id}"
128
+ )
129
+
92
130
  startTime = timeit.default_timer()
93
131
  # the first time, wait for 40 seconds. subsequent times, wait for less.
94
132
  # this is because appinspect takes some time to return, so there is no sense
@@ -114,7 +152,9 @@ class Inspect:
114
152
  raise Exception(f"Error - Unknown Appinspect API status '{status}'")
115
153
 
116
154
  # We have finished running appinspect, so get the report
117
- APPINSPECT_API_REPORT = f"https://appinspect.splunk.com/v1/app/report/{request_id}?included_tags=private_{config.stack_type}"
155
+ APPINSPECT_API_REPORT = (
156
+ f"https://appinspect.splunk.com/v1/app/report/{request_id}"
157
+ )
118
158
  # Get human-readable HTML report
119
159
  headers = headers = {
120
160
  "Authorization": f"bearer {authorization_bearer}",
@@ -159,14 +199,14 @@ class Inspect:
159
199
  "\t - https://dev.splunk.com/enterprise/docs/developapps/testvalidate/appinspect/useappinspectclitool/"
160
200
  )
161
201
  from splunk_appinspect.main import (
162
- validate,
163
- MODE_OPTION,
164
202
  APP_PACKAGE_ARGUMENT,
165
- OUTPUT_FILE_OPTION,
166
- LOG_FILE_OPTION,
167
- INCLUDED_TAGS_OPTION,
168
203
  EXCLUDED_TAGS_OPTION,
204
+ INCLUDED_TAGS_OPTION,
205
+ LOG_FILE_OPTION,
206
+ MODE_OPTION,
207
+ OUTPUT_FILE_OPTION,
169
208
  TEST_MODE,
209
+ validate,
170
210
  )
171
211
  except Exception as e:
172
212
  print(e)
contentctl/contentctl.py CHANGED
@@ -1,7 +1,9 @@
1
1
  import pathlib
2
+ import random
2
3
  import sys
3
4
  import traceback
4
5
  import warnings
6
+ from dataclasses import dataclass
5
7
 
6
8
  import tyro
7
9
 
@@ -155,6 +157,35 @@ YOU HAVE BEEN WARNED!
155
157
  """
156
158
 
157
159
 
160
+ def get_random_compliment():
161
+ compliments = [
162
+ "Your detection rules are like a zero-day shield! 🛡️",
163
+ "You catch threats like it's child's play! 🎯",
164
+ "Your correlation rules are pure genius! 🧠",
165
+ "Threat actors fear your detection engineering! ⚔️",
166
+ "You're the SOC's secret weapon! 🦾",
167
+ "Your false positive rate is impressively low! 📊",
168
+ "Malware trembles at your detection logic! 🦠",
169
+ "You're the threat hunter extraordinaire! 🔍",
170
+ "Your MITRE mappings are a work of art! 🎨",
171
+ "APTs have nightmares about your detections! 👻",
172
+ "Your content testing is bulletproof! 🎯",
173
+ "You're the detection engineering MVP! 🏆",
174
+ ]
175
+ return random.choice(compliments)
176
+
177
+
178
+ def recognize_func():
179
+ print(get_random_compliment())
180
+
181
+
182
+ @dataclass
183
+ class RecognizeCommand:
184
+ """Dummy subcommand for 'recognize' with no parameters."""
185
+
186
+ pass
187
+
188
+
158
189
  def main():
159
190
  print(CONTENTCTL_5_WARNING)
160
191
  try:
@@ -210,6 +241,7 @@ def main():
210
241
  "test_servers": test_servers.model_construct(**t.__dict__),
211
242
  "release_notes": release_notes.model_construct(**config_obj),
212
243
  "deploy_acs": deploy_acs.model_construct(**t.__dict__),
244
+ "recognize": RecognizeCommand(),
213
245
  }
214
246
  )
215
247
 
@@ -240,6 +272,8 @@ def main():
240
272
  deploy_acs_func(updated_config)
241
273
  elif type(config) is test or type(config) is test_servers:
242
274
  test_common_func(config)
275
+ elif type(config) is RecognizeCommand:
276
+ recognize_func()
243
277
  else:
244
278
  raise Exception(f"Unknown command line type '{type(config).__name__}'")
245
279
  except FileNotFoundError as e:
@@ -425,7 +425,6 @@ class inspect(build):
425
425
  "enforcement (defaults to the latest release of the app published on Splunkbase)."
426
426
  ),
427
427
  )
428
- stack_type: StackType = Field(description="The type of your Splunk Cloud Stack")
429
428
 
430
429
  @field_validator("enrichments", mode="after")
431
430
  @classmethod
@@ -496,6 +495,9 @@ class new(Config_Base):
496
495
 
497
496
  class deploy_acs(inspect):
498
497
  model_config = ConfigDict(validate_default=False, arbitrary_types_allowed=True)
498
+
499
+ stack_type: StackType = Field(description="The type of your Splunk Cloud Stack")
500
+
499
501
  # ignore linter error
500
502
  splunk_cloud_jwt_token: str = Field(
501
503
  exclude=True,
@@ -1,6 +1,9 @@
1
1
  from __future__ import annotations
2
- from typing import Optional, Any
3
- from pydantic import Field, HttpUrl, model_serializer, BaseModel
2
+
3
+ from typing import Any, Optional
4
+
5
+ from pydantic import BaseModel, Field, HttpUrl, model_serializer
6
+
4
7
  from contentctl.objects.security_content_object import SecurityContentObject
5
8
 
6
9
 
@@ -20,6 +23,7 @@ class DataSource(SecurityContentObject):
20
23
  field_mappings: None | list = None
21
24
  convert_to_log_source: None | list = None
22
25
  example_log: None | str = None
26
+ output_fields: list[str] = []
23
27
 
24
28
  @model_serializer
25
29
  def serialize_model(self):
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.3
2
2
  Name: contentctl
3
- Version: 5.0.1
3
+ Version: 5.0.2
4
4
  Summary: Splunk Content Control Tool
5
5
  License: Apache 2.0
6
6
  Author: STRT
@@ -14,14 +14,14 @@ contentctl/actions/detection_testing/views/DetectionTestingViewFile.py,sha256=G-
14
14
  contentctl/actions/detection_testing/views/DetectionTestingViewWeb.py,sha256=CXV1fByf3J-Jc4D9U6jgWSaUhNzjcMpvEgRMuusF2vU,4740
15
15
  contentctl/actions/doc_gen.py,sha256=P2-RYsJoW-QuhAkSpOQespDLJBC-4Cq3-XGTmadK8Ys,936
16
16
  contentctl/actions/initialize.py,sha256=KaWSbrTaJA4vNSpKc_rwdlaaERnWw_hPlWwsPOA6Gy8,3191
17
- contentctl/actions/inspect.py,sha256=rXnrhDt59-n0Jqh_UZ0tDzpKqiOvkGzlvSypXoarKjU,18322
17
+ contentctl/actions/inspect.py,sha256=zFNbDXY7Bi1xTBHirNyHpH1-2A1n3rsOsRvu8E0xUao,19375
18
18
  contentctl/actions/new_content.py,sha256=xs0QvHzlrf0g-EgdUJTkdDdFaA-uEGmzMTixDt6NcTY,8212
19
19
  contentctl/actions/release_notes.py,sha256=_Rdljg0tPSAFlw34LJ7dUsHLiH8tJTQ6B95X6MvxURo,17023
20
20
  contentctl/actions/reporting.py,sha256=GF32i7sHdc47bw-VWSW-nZ1QBaUl6Ni1JjV5_SOyiAU,1660
21
21
  contentctl/actions/test.py,sha256=GTtvHi1yB5yDm1jPMyuc4WxczOq-O7f2N8LpTmMaWgU,6014
22
22
  contentctl/actions/validate.py,sha256=thnxanLj6mfw5g17C1FrzWlkpyIT_AjnDxv_wyNdspA,5837
23
23
  contentctl/api.py,sha256=6s17vNOW1E1EzQqOCXAa5uWuhwwShu-JkGSgrsOFEMs,6329
24
- contentctl/contentctl.py,sha256=bO7jKOn9oSDQ4YncN9msu1cwyEXGdDTLcCHh8X9dzzY,11185
24
+ contentctl/contentctl.py,sha256=pKtjRHsdTHb505Xjvrdx8v_EGJQ9ZAMfKK4P5N4ge-I,12312
25
25
  contentctl/enrichments/attack_enrichment.py,sha256=68C9xQ8Q3YX-luRdK2hLnwWtRFpheFA2kE4v5GOLGEo,6358
26
26
  contentctl/enrichments/cve_enrichment.py,sha256=TsZ52ef2njt19lPf_VyclY_-5Z5iQ1boVOAxFbjGdSQ,2431
27
27
  contentctl/enrichments/splunk_app_enrichment.py,sha256=Xynxjjkqlw0_RtQ1thGSFwy1I3HdmPAJmNKZezyqniU,3419
@@ -41,11 +41,11 @@ contentctl/objects/base_test.py,sha256=JG6qlr7xe9P71n3CzKOro8_bsmDQGYDfTG9YooHQS
41
41
  contentctl/objects/base_test_result.py,sha256=TYYzTPKWqp9rHTebWoid50uxAp_iALZouril4sFwIcA,5197
42
42
  contentctl/objects/baseline.py,sha256=grzM56KCpROjMnJQIan-fG0LCYfRGA2GHui4FwBwb8A,3172
43
43
  contentctl/objects/baseline_tags.py,sha256=Eomy8y3HV-E6Lym5B5ZZTtsmQJYi6Jd4y8GZpTWGYgQ,1643
44
- contentctl/objects/config.py,sha256=5nK3EkUea-6qUvSzqAxl5UyoLRlldKsh9K8glaBup3I,48603
44
+ contentctl/objects/config.py,sha256=3l8tFVwrBDpAnS7aBgj6to0Kc8_s4bxuZY5Bm5vel8k,48605
45
45
  contentctl/objects/constants.py,sha256=P4K07PX4_pL_n5jmBVn1BxtoFpjvhT8MuHOquhnEkdA,5465
46
46
  contentctl/objects/correlation_search.py,sha256=ab6v-0nbzujhTMpwaXynQiInWpRO1zB5KR4eZLCav_M,45234
47
47
  contentctl/objects/dashboard.py,sha256=qMSP76hkJo7PVsWr19hQW4eYoUqGTcRejaOEjlcA_DY,4198
48
- contentctl/objects/data_source.py,sha256=4u4JaA-Q5xa0gS61yarJuowgy4TrAYE98O2G8o9CQzA,1454
48
+ contentctl/objects/data_source.py,sha256=qt4W14DEwKGO69oLGdJeuYqbWvGkZ6j5Nz0R1RhDQEQ,1491
49
49
  contentctl/objects/deployment.py,sha256=FRsgsX2T1gvA_0A44_sFPr22rsedxXVIhtO7o9F7eZM,2902
50
50
  contentctl/objects/deployment_email.py,sha256=_Sdr_BNjvXECiFonRHLkiOrIQp3slnUaERbptqRbD0Q,206
51
51
  contentctl/objects/deployment_notable.py,sha256=j5AniTRDcw32El5H91qKOXDVZvUYxnIuM4Zzlhrm9cM,258
@@ -161,8 +161,8 @@ contentctl/templates/detections/web/.gitkeep,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRk
161
161
  contentctl/templates/macros/security_content_ctime.yml,sha256=Gg1YNllHVsX_YB716H1SJLWzxXZEfuJlnsgB2fuyoHU,159
162
162
  contentctl/templates/macros/security_content_summariesonly.yml,sha256=9BYUxAl2E4Nwh8K19F3AJS8Ka7ceO6ZDBjFiO3l3LY0,162
163
163
  contentctl/templates/stories/cobalt_strike.yml,sha256=uj8idtDNOAIqpZ9p8usQg6mop1CQkJ5TlB4Q7CJdTIE,3082
164
- contentctl-5.0.1.dist-info/LICENSE.md,sha256=hQWUayRk-pAiOZbZnuy8djmoZkjKBx8MrCFpW-JiOgo,11344
165
- contentctl-5.0.1.dist-info/METADATA,sha256=C2v7yiaeE_BPSiTz4hGC9S6Wa2CbaOhsfmGRIXa0lOI,21539
166
- contentctl-5.0.1.dist-info/WHEEL,sha256=IYZQI976HJqqOpQU6PHkJ8fb3tMNBFjg-Cn-pwAbaFM,88
167
- contentctl-5.0.1.dist-info/entry_points.txt,sha256=5bjZ2NkbQfSwK47uOnA77yCtjgXhvgxnmCQiynRF_-U,57
168
- contentctl-5.0.1.dist-info/RECORD,,
164
+ contentctl-5.0.2.dist-info/LICENSE.md,sha256=hQWUayRk-pAiOZbZnuy8djmoZkjKBx8MrCFpW-JiOgo,11344
165
+ contentctl-5.0.2.dist-info/METADATA,sha256=w4N00eZ7_Rn1nbpEbFDNCtIjij82KcNtZIe6YUflmuo,21539
166
+ contentctl-5.0.2.dist-info/WHEEL,sha256=IYZQI976HJqqOpQU6PHkJ8fb3tMNBFjg-Cn-pwAbaFM,88
167
+ contentctl-5.0.2.dist-info/entry_points.txt,sha256=5bjZ2NkbQfSwK47uOnA77yCtjgXhvgxnmCQiynRF_-U,57
168
+ contentctl-5.0.2.dist-info/RECORD,,