Skip to content

Commit 1582472

Browse files
authored
Merge pull request #9 from splunk-soar-connectors/next
Merging next to main for release 2.1.7
2 parents 57383a9 + 4d1f1a4 commit 1582472

File tree

6 files changed

+38
-8
lines changed

6 files changed

+38
-8
lines changed

LICENSE

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -186,7 +186,7 @@
186186
same "printed page" as the copyright notice for easier
187187
identification within third-party archives.
188188

189-
Copyright 2018-2022 Splunk Inc.
189+
Copyright (c) 2018-2022 Splunk Inc.
190190

191191
Licensed under the Apache License, Version 2.0 (the "License");
192192
you may not use this file except in compliance with the License.
@@ -198,4 +198,4 @@
198198
distributed under the License is distributed on an "AS IS" BASIS,
199199
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
200200
See the License for the specific language governing permissions and
201-
limitations under the License.
201+
limitations under the License.

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
# Symantec Data Loss Prevention
33

44
Publisher: Splunk
5-
Connector Version: 2\.1\.2
5+
Connector Version: 2\.1\.7
66
Product Vendor: Symantec
77
Product Name: Symantec DLP
88
Product Version Supported (regex): "\.\*"
99
Minimum Product Version: 5\.0\.0
1010

1111
This app supports incident update and incident ingestion from Symantec Data Loss Prevention installation
1212

13-
[comment]: # " File: readme.md"
13+
[comment]: # " File: README.md"
1414
[comment]: # " Copyright (c) 2018-2022 Splunk Inc."
1515
[comment]: # ""
1616
[comment]: # "Licensed under the Apache License, Version 2.0 (the 'License');"

release_notes/2.1.7.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
**Symantec Data Loss Prevention Release Notes - Published by Splunk January 19, 2022**
2+
3+
4+
**Version 2.1.7 - Released January 19, 2022**
5+
6+
* Changed the hashing algorithm to SHA256 when running in FIPS mode [PAPP-20325]

release_notes/release_notes.html

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,9 @@
1-
<b>Symantec Data Loss Prevention Release Notes - Published by Splunk January 11, 2022</b>
1+
<b>Symantec Data Loss Prevention Release Notes - Published by Splunk January 19, 2022</b>
22
<br><br>
3+
<b>Version 2.1.7 - Released January 19, 2022</b>
4+
<ul>
5+
<li>Changed the hashing algorithm to SHA256 when running in FIPS mode [PAPP-20325]</li>
6+
</ul>
37
<b>Version 2.1.5 - Released January 11, 2022</b>
48
<ul>
59
<li>Added 'get incident' and 'list incidents' actions [PAPP-7011]</li>

symantecdlp.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@
55
"publisher": "Splunk",
66
"type": "endpoint",
77
"main_module": "symantecdlp_connector.py",
8-
"app_version": "2.1.5",
9-
"utctime_updated": "2022-01-11T06:11:56.000000Z",
8+
"app_version": "2.1.7",
9+
"utctime_updated": "2022-01-19T22:24:40.000000Z",
1010
"package_name": "phantom_symantecdlp",
1111
"product_vendor": "Symantec",
1212
"product_name": "Symantec DLP",

symantecdlp_connector.py

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -629,6 +629,19 @@ def _set_sdi(self, default_id, input_dict):
629629

630630
return phantom.APP_SUCCESS
631631

632+
def _get_fips_enabled(self):
633+
try:
634+
from phantom_common.install_info import is_fips_enabled
635+
except ImportError:
636+
return False
637+
638+
fips_enabled = is_fips_enabled()
639+
if fips_enabled:
640+
self.debug_print('FIPS is enabled')
641+
else:
642+
self.debug_print('FIPS is not enabled')
643+
return fips_enabled
644+
632645
def _create_dict_hash(self, input_dict):
633646

634647
input_dict_str = None
@@ -645,7 +658,14 @@ def _create_dict_hash(self, input_dict):
645658
if isinstance(input_dict_str, str):
646659
input_dict_str = input_dict_str.encode('utf-8')
647660

648-
return hashlib.sha256(input_dict_str).hexdigest()
661+
fips_enabled = self._get_fips_enabled()
662+
# if fips is not enabled, we should continue with our existing md5 usage for generating hashes
663+
# to not impact existing customers
664+
if not fips_enabled:
665+
dict_hash = hashlib.md5(input_dict_str)
666+
else:
667+
dict_hash = hashlib.sha256(input_dict_str)
668+
return dict_hash.hexdigest()
649669

650670
def _parse_results(self, action_result, param, results):
651671

0 commit comments

Comments
 (0)