Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ruff format content files (3) #38974

Closed
wants to merge 25 commits into from

Conversation

content-bot
Copy link
Collaborator

Metadata and documentation improvements.

Copy link

github-actions bot commented Mar 9, 2025

Your contributed Armorblox pack has been modified on files:

Packs/Armorblox/Integrations/Armorblox/Armorblox_test.py
Packs/Armorblox/Integrations/Armorblox/Armorblox.py
Packs/Armorblox/ReleaseNotes/1_0_37.md
Packs/Armorblox/pack_metadata.json
Please review the changes here

Copy link

github-actions bot commented Mar 9, 2025

Coverage

Coverage Report
FileStmtsMissCoverMissing
Packs/AHA/Integrations/AHA
   AHA.py1511689%166–168, 170, 198–199, 217–218, 250–251, 253, 256, 258, 261, 263–264
Packs/Armorblox/Integrations/Armorblox
   Armorblox.py95792%35, 116, 145, 148, 161–163
Packs/AtlassianConfluenceCloud/Integrations/AtlassianConfluenceCloud
   AtlassianConfluenceCloud.py4791896%149–150, 155, 204–206, 213, 226–228, 283, 661, 773, 835, 913, 1282–1284
Packs/AzureStorageContainer/Integrations/AzureStorageContainer
   AzureStorageContainer.py3163389%75, 165–166, 316–319, 321, 344, 351–352, 523, 530–531, 607–609, 611, 613, 617, 727–728, 889, 946–949, 1084–1086, 1088–1089, 1093
Packs/BitwardenPasswordManager/Integrations/BitwardenPasswordManager
   BitwardenPasswordManager.py114496%79–80, 92, 120
Packs/CiscoWSA/Integrations/CiscoWSAV2
   CiscoWSAV2.py3542991%58, 1090, 1160, 1320–1321, 1350, 1491, 1497–1498, 1526, 1529, 1572–1573, 1575–1577, 1579–1580, 1582, 1584, 1604–1605, 1613–1616, 1618, 1620–1621
Packs/CyberArkEPM/Integrations/CyberArkEPMEventCollector
   CyberArkEPMEventCollector.py133794%51, 124, 253–255, 362–363
Packs/CyberArkIdentity/Integrations/CyberArkIdentityEventCollector
   CyberArkIdentityEventCollector.py78692%129, 147, 206–207, 228–229
Packs/Cyberwatch/Integrations/Cyberwatch
   Cyberwatch.py163696%580–581, 675, 796, 864, 976
Packs/FeedBambenekConsulting/Integrations/FeedBambenekConsulting
   FeedBambenekConsulting.py110100% 
Packs/FeedCyjax/Integrations/FeedCyjax
   FeedCyjax.py210995%48, 51, 70, 161, 285, 451, 546–548
Packs/FeedUnit42v2/Integrations/FeedUnit42v2
   FeedUnit42v2.py3374088%60, 71–80, 82–87, 89, 91–92, 94–95, 114, 169, 189, 208, 232, 282–283, 321, 374, 418, 477, 535, 610–611, 616, 625, 628, 761
Packs/Flashpoint/Integrations/Ignite
   Ignite.py10254395%220, 280, 298–304, 380, 545, 548, 640, 835, 1073–1074, 1115, 1274, 1356, 1656, 1894–1899, 1901, 2071, 2077–2078, 2086, 2124–2125, 2430–2433, 2443, 2455, 2460–2461, 2464, 2468
Packs/GoogleCloudSCC/Integrations/GoogleCloudSCC
   GoogleCloudSCC.py5926089%230–235, 237–242, 244, 247–252, 332–333, 483, 485, 493–494, 504–506, 555–556, 594–595, 604–605, 614, 617, 719, 728, 731, 804, 914, 1115–1117, 1210, 1225, 1239, 1265, 1280–1281, 1301, 1478, 1481, 1577–1578, 1580–1581, 1586–1588
Packs/Impartner/Integrations/Impartner
   Impartner.py43490%29–30, 33–34
Packs/IronscalesEventCollector/Integrations/IronscalesEventCollector
   IronscalesEventCollector.py851088%130, 246–250, 252–253, 259–260
Packs/MicrosoftGraphAPI/Integrations/MicrosoftGraphAPI
   MicrosoftGraphAPI.py47295%109–110
Packs/Oletools/Scripts/OletoolsScript
   OletoolsScript.py1341092%19, 47–48, 56–58, 82, 114, 144, 163
Packs/ProactiveThreatHunting/Scripts/HuntingFromIndicatorLayout
   HuntingFromIndicatorLayout.py80100% 
Packs/ProofpointThreatProtection/Integrations/ProofpointThreatProtection
   ProofpointThreatProtection.py1101388%33, 145–146, 220, 222, 224–226, 228–229, 231, 233–234
Packs/SecureWorks/Integrations/TaegisXDRv2
   TaegisXDRv2.py4693692%123, 131–132, 847, 1009–1011, 1035, 1741–1742, 1757–1758, 1760, 1785–1789, 1791–1793, 1795, 1797, 1805, 1807–1809, 1811–1812, 1821–1824, 1826–1828
Packs/SecurityIntelligenceServicesFeed/Integrations/SecurityIntelligenceServicesFeed
   SecurityIntelligenceServicesFeed.py2302089%84–86, 89–90, 93–94, 96, 98, 100, 109, 127–134, 136, 149, 152, 154, 169, 174, 196–201, 203–204, 208, 225–226, 228, 230–231, 233, 235, 237, 239–242, 244, 251–254, 256–257, 259–260, 262–263, 269, 278–282, 285, 293–298, 301, 310–314, 317, 325–330, 333, 340–345, 348, 360–362, 364–366, 371–373, 375–377, 379–380, 382–383, 385–388, 391, 400–406, 409, 427–430, 432–433, 436, 439, 443, 449–450, 459–465, 467–468, 470–474, 477–478, 500–501, 503, 507–508, 516–517, 519–525, 536, 539–540, 545–546, 555–558, 561, 564, 567–569, 572–573, 575–576, 585, 591, 596–602, 604, 606–607, 610, 613–614, 616, 618–619, 621–622, 624, 633–634, 636, 638–639, 641–643
Packs/SophosCentral/Integrations/SophosCentral
   SophosCentral.py12665595%118, 120, 122, 124, 128, 137, 212, 246, 1698–1699, 1702, 1818–1826, 1832, 1846–1847, 1895–1896, 1899, 1934–1935, 1938–1939, 1947, 1982–1983, 1986–1987, 1995, 2026–2027, 2031, 2035–2036, 2265–2266, 2438–2439, 2621–2622, 2794–2795, 4131–4132, 4211, 4355–4356, 4381
Packs/Venafi/Integrations/VenafiV2
   VenafiV2.py75692%168–172, 174
Packs/cisco-meraki/Integrations/CiscoMerakiv2
   CiscoMerakiv2.py8106092%383, 499, 571, 962, 1103, 1585, 1656, 1658–1660, 1662, 1677, 1860, 2289–2294, 2296–2297, 2299, 2301, 2447, 2449–2450, 2452, 2458, 2581, 3094–3095, 3097, 3103, 3110, 3275, 3389, 3717, 3831–3833, 3835–3838, 3840–3841, 3843–3844, 3846, 3848, 3882–3883, 3890–3893, 3895, 3897, 3899–3900
TOTAL733568290% 

Tests Skipped Failures Errors Time
519 1 💤 0 ❌ 1 🔥 58.423s ⏱️

get_mock = requests_mock.get(MANAGED_IDENTITIES_TOKEN_URL, json=mock_token)
requests_mock.get(re.compile('blob.core.windows.net/.*'))
requests_mock.get(re.compile("blob.core.windows.net/.*"))

Check failure

Code scanning / CodeQL

Incomplete regular expression for hostnames High

This regular expression has an unescaped '.' before 'windows.net/', so it might match more hosts than expected.

Copilot Autofix AI about 17 hours ago

To fix the problem, we need to escape the . characters in the regular expression to ensure they match literal dots in the hostname. This will prevent unintended matches and ensure that only the correct hostnames are matched.

  • Update the regular expression on line 602 to escape the . characters.
  • The corrected regular expression should be blob\.core\.windows\.net/.*.
Suggested changeset 1
Packs/AzureStorageContainer/Integrations/AzureStorageContainer/AzureStorageContainer_test.py

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/Packs/AzureStorageContainer/Integrations/AzureStorageContainer/AzureStorageContainer_test.py b/Packs/AzureStorageContainer/Integrations/AzureStorageContainer/AzureStorageContainer_test.py
--- a/Packs/AzureStorageContainer/Integrations/AzureStorageContainer/AzureStorageContainer_test.py
+++ b/Packs/AzureStorageContainer/Integrations/AzureStorageContainer/AzureStorageContainer_test.py
@@ -601,3 +601,3 @@
     get_mock = requests_mock.get(MANAGED_IDENTITIES_TOKEN_URL, json=mock_token)
-    requests_mock.get(re.compile("blob.core.windows.net/.*"))
+    requests_mock.get(re.compile(r"blob\.core\.windows\.net/.*"))
 
EOF
@@ -601,3 +601,3 @@
get_mock = requests_mock.get(MANAGED_IDENTITIES_TOKEN_URL, json=mock_token)
requests_mock.get(re.compile("blob.core.windows.net/.*"))
requests_mock.get(re.compile(r"blob\.core\.windows\.net/.*"))

Copilot is powered by AI and may make mistakes. Always verify output.
Positive Feedback
Negative Feedback

Provide additional feedback

Please help us improve GitHub Copilot by sharing more details about this comment.

Please select one or more of the options
@content-bot
Copy link
Collaborator Author

The following errors were thrown as a part of this pr: ST111, DO106, RM110, DS104.
The following errors can be ignored: RM110.
The following errors cannot be ignored: ST111, DO106, DS104.
The following errors don't run as part of the nightly flow and therefore can be force merged: ST111, DO106, DS104.
######################################################################################################
Note that the following errors cannot be force merged and therefore must be handled: RM110.
######################################################################################################

@merit-maita merit-maita deleted the packwise/ruff_format-0309T2134-3 branch March 10, 2025 12:04
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants