From a08846ec4719db23ca7ae988aa99e1116c6d15c8 Mon Sep 17 00:00:00 2001 From: pyth0n1c Date: Wed, 8 Nov 2023 13:36:34 -0800 Subject: [PATCH] add some testing --- .github/workflows/contentctl_test.yml | 29 +++++++++++++++++++++++++++ contentctl_test.yml | 20 ++++++++++++++++++ 2 files changed, 49 insertions(+) create mode 100644 .github/workflows/contentctl_test.yml diff --git a/.github/workflows/contentctl_test.yml b/.github/workflows/contentctl_test.yml new file mode 100644 index 0000000000..7c8fb8c2d0 --- /dev/null +++ b/.github/workflows/contentctl_test.yml @@ -0,0 +1,29 @@ +name: Initial contentctl test workflow + +# Trigger the workflow on pull request +on: + push: + pull_request: + types: [opened, reopened] + +jobs: + contentctl_test: + name: run contentctl test + runs-on: ubuntu-latest + steps: + - uses: actions/setup-python@v4 + with: + python-version: '3.9' #Available versions here - https://github.com/actions/python-versions/releases easy to change/make a matrix/use pypy + architecture: 'x64' # optional x64 or x86. Defaults to x64 if not specified + + - name: Everything + run: | + git clone https://github.com/splunk/contentctl + cd contentctl + git checkout diff_test_cli_support + git pull + python -m pip install poetry + poetry install + poetry shell + cd .. + contentctl test --mode changes --target_branch develop --test_branch TR_3232_azure_ad diff --git a/contentctl_test.yml b/contentctl_test.yml index 46b843fadc..47dab0f7ad 100644 --- a/contentctl_test.yml +++ b/contentctl_test.yml @@ -18,6 +18,26 @@ apps: splunkbase_path: null environment_path: ENVIRONMENT_PATH_NOT_SET force_local: false +- uid: 3110 + appid: Splunk_TA_linux_sysmon + title: Add-on for Linux Sysmon + description: null + release: 1.0.4 + local_path: null + http_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/Latest/splunk-add-on-for-microsoft-cloud-services_510.tgz + splunkbase_path: null + environment_path: ENVIRONMENT_PATH_NOT_SET + force_local: false +- uid: 4055 + appid: Splunk_TA_linux_sysmon + title: Add-on for Linux Sysmon + description: null + release: 1.0.4 + local_path: null + http_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/Latest/splunk-add-on-for-microsoft-office-365_430.tgz + splunkbase_path: null + environment_path: ENVIRONMENT_PATH_NOT_SET + force_local: false - uid: 742 appid: Splunk_TA_windows title: Splunk Add-on for Microsoft Windows