You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
elif app['appid'] == "PALO_ALTO_NETWORKS_ADD_ON_FOR_SPLUNK" and APP_ID == "Splunk_TA_paloalto_networks":
488
+
if app['appid'] == APP_ID or APP_ID in app['hardcoded_path'] or GITHUB_REPOSITORY in app['hardcoded_path'] or app["title"] == APP_LABEL or (app['appid'] == "PALO_ALTO_NETWORKS_ADD_ON_FOR_SPLUNK" and APP_ID == "Splunk_TA_paloalto_networks"):
# Write the modified data to the contentctl.yml file
@@ -506,14 +502,11 @@ jobs:
506
502
for root, dirs, files in os.walk(base_dir):
507
503
for file in files:
508
504
file_path = os.path.join(root, file)
509
-
510
505
try:
511
-
with open(file_path, "r") as file:
512
-
file_content = yaml.safe_load(file)
506
+
with open(file_path, "r") as yaml_file:
507
+
file_content = yaml.safe_load(yaml_file)
513
508
if "deprecated" not in file_path and (file_content["tests"][0]["attack_data"][0]["sourcetype"] in sourcetypes or file_content["tests"][0]["attack_data"][0]["source"] in sourcetypes):
0 commit comments