Skip to content

Commit 773afdb

Browse files
Merge branch 'main' into new-rule-potential-lfi-request
2 parents 886d451 + 634de61 commit 773afdb

19 files changed

+1459
-448
lines changed

detection_rules/schemas/definitions.py

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,9 @@ def validator_wrapper(value: Any) -> Any:
7676
CONDITION_VERSION_PATTERN = re.compile(rf"^\^{_version}$")
7777
VERSION_PATTERN = f"^{_version}$"
7878
MINOR_SEMVER = re.compile(r"^\d+\.\d+$")
79-
FROM_SOURCES_REGEX = re.compile(r"^\s*FROM\s+(?P<sources>.+?)\s*(?:\||\bmetadata\b|//|$)", re.IGNORECASE | re.MULTILINE)
79+
FROM_SOURCES_REGEX = re.compile(
80+
r"^\s*FROM\s+(?P<sources>(?:.+?(?:,\s*)?\n?)+?)\s*(?:\||\bmetadata\b|//|$)", re.IGNORECASE | re.MULTILINE
81+
)
8082
BRANCH_PATTERN = f"{VERSION_PATTERN}|^master$"
8183
ELASTICSEARCH_EQL_FEATURES = {
8284
"allow_negation": (Version.parse("8.9.0"), None),

pyproject.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
[project]
22
name = "detection_rules"
3-
version = "1.5.17"
3+
version = "1.5.18"
44
description = "Detection Rules is the home for rules used by Elastic Security. This repository is used for the development, maintenance, testing, validation, and release of rules for Elastic Security’s Detection Engine."
55
readme = "README.md"
66
requires-python = ">=3.12"

rules/integrations/aws/credential_access_aws_iam_assume_role_brute_force.toml

Lines changed: 0 additions & 105 deletions
This file was deleted.

0 commit comments

Comments
 (0)