diff --git a/cloudwatchevents/guardduty/deploy.sh b/cloudwatchevents/guardduty/deploy.sh index be889db..9e3060b 100755 --- a/cloudwatchevents/guardduty/deploy.sh +++ b/cloudwatchevents/guardduty/deploy.sh @@ -10,7 +10,7 @@ else AWS_REGION="us-east-2" fi -version="1.0.6" +version="1.0.8" echo "Creating package.yaml" sam package --template-file template.yaml --s3-bucket $SAM_S3_BUCKET --output-template-file packaged.yaml --s3-prefix "GuardDuty/v"$version --region $AWS_REGION --profile $AWS_PROFILE diff --git a/cloudwatchevents/guardduty/packaged.yaml b/cloudwatchevents/guardduty/packaged.yaml index ce86ff8..454bb04 100644 --- a/cloudwatchevents/guardduty/packaged.yaml +++ b/cloudwatchevents/guardduty/packaged.yaml @@ -23,9 +23,9 @@ Metadata: - cloudwatchevents - guardduty Name: sumologic-guardduty-events-processor - LicenseUrl: s3://appdevstore/GuardDuty/v1.0.6/6092dd6c323e33634657102f570628e0 - ReadmeUrl: s3://appdevstore/GuardDuty/v1.0.6/9d217c45b3ababadef584aee27d4d607 - SemanticVersion: 1.0.6 + LicenseUrl: s3://appdevstore/GuardDuty/v1.0.8/6092dd6c323e33634657102f570628e0 + ReadmeUrl: s3://appdevstore/GuardDuty/v1.0.8/9d217c45b3ababadef584aee27d4d607 + SemanticVersion: 1.0.8 SourceCodeUrl: https://github.com/SumoLogic/sumologic-aws-lambda/tree/main/cloudwatchevents/guardduty SpdxLicenseId: Apache-2.0 Parameters: @@ -35,9 +35,9 @@ Resources: CloudWatchEventFunction: Type: AWS::Serverless::Function Properties: - CodeUri: s3://appdevstore/GuardDuty/v1.0.6/22b7b226ca9ec3b9dbb28b94c0e5f824 + CodeUri: s3://appdevstore/GuardDuty/v1.0.8/206761f9f3de8df84e85a86641f534df Handler: cloudwatchevents.handler - Runtime: nodejs22.x + Runtime: nodejs24.x Environment: Variables: SUMO_ENDPOINT: diff --git a/cloudwatchevents/guardduty/template.yaml b/cloudwatchevents/guardduty/template.yaml index 984f60c..3b5ecd0 100644 --- a/cloudwatchevents/guardduty/template.yaml +++ b/cloudwatchevents/guardduty/template.yaml @@ -23,7 +23,7 @@ Metadata: Name: sumologic-guardduty-events-processor LicenseUrl: ../LICENSE ReadmeUrl: ./README.md - SemanticVersion: 1.0.6 + SemanticVersion: 1.0.8 SourceCodeUrl: https://github.com/SumoLogic/sumologic-aws-lambda/tree/main/cloudwatchevents/guardduty SpdxLicenseId: Apache-2.0 @@ -38,7 +38,7 @@ Resources: Properties: CodeUri: ../src/ Handler: cloudwatchevents.handler - Runtime: nodejs22.x + Runtime: nodejs24.x Environment: Variables: SUMO_ENDPOINT: !Ref SumoEndpointUrl diff --git a/cloudwatchevents/guarddutybenchmark/deploy.sh b/cloudwatchevents/guarddutybenchmark/deploy.sh index 519eb98..578707f 100755 --- a/cloudwatchevents/guarddutybenchmark/deploy.sh +++ b/cloudwatchevents/guarddutybenchmark/deploy.sh @@ -11,7 +11,7 @@ else AWS_REGION="us-east-2" fi -version="1.0.20" +version="1.0.23" echo "Creating package.yaml" sam package --template-file template_v2.yaml --s3-bucket $SAM_S3_BUCKET --output-template-file packaged.yaml --s3-prefix "guarddutybenchmark/v"$version --region $AWS_REGION --profile $AWS_PROFILE diff --git a/cloudwatchevents/guarddutybenchmark/packaged.yaml b/cloudwatchevents/guarddutybenchmark/packaged.yaml index 6cec36f..9e5038a 100644 --- a/cloudwatchevents/guarddutybenchmark/packaged.yaml +++ b/cloudwatchevents/guarddutybenchmark/packaged.yaml @@ -53,9 +53,9 @@ Metadata: - benchmark - guardduty Name: sumologic-guardduty-benchmark - LicenseUrl: s3://appdevstore/guarddutybenchmark/v1.0.20/6092dd6c323e33634657102f570628e0 - ReadmeUrl: s3://appdevstore/guarddutybenchmark/v1.0.20/cab012d7fb7887671b751e6f5c0d2062 - SemanticVersion: 1.0.20 + LicenseUrl: s3://appdevstore/guarddutybenchmark/v/6092dd6c323e33634657102f570628e0 + ReadmeUrl: s3://appdevstore/guarddutybenchmark/v/cab012d7fb7887671b751e6f5c0d2062 + SemanticVersion: 1.0.23 SourceCodeUrl: https://github.com/SumoLogic/sumologic-aws-lambda/tree/main/cloudwatchevents/guarddutybenchmark SpdxLicenseId: Apache-2.0 Parameters: @@ -99,7 +99,7 @@ Parameters: Resources: CloudWatchEventFunction: Properties: - CodeUri: s3://appdevstore/guarddutybenchmark/v1.0.20/22b7b226ca9ec3b9dbb28b94c0e5f824 + CodeUri: s3://appdevstore/guarddutybenchmark/v/206761f9f3de8df84e85a86641f534df Environment: Variables: SUMO_ENDPOINT: @@ -114,7 +114,7 @@ Resources: - aws.guardduty Type: CloudWatchEvent Handler: cloudwatchevents.handler - Runtime: nodejs22.x + Runtime: nodejs24.x Type: AWS::Serverless::Function Metadata: SamResourceId: CloudWatchEventFunction @@ -123,7 +123,7 @@ Resources: Properties: Location: ApplicationId: arn:aws:serverlessrepo:us-east-1:956882708938:applications/sumologic-app-utils - SemanticVersion: 2.0.21 + SemanticVersion: 2.0.23 Metadata: SamResourceId: SumoAppUtils SumoHostedCollector: diff --git a/cloudwatchevents/guarddutybenchmark/template_v2.yaml b/cloudwatchevents/guarddutybenchmark/template_v2.yaml index e294a71..f381a8d 100644 --- a/cloudwatchevents/guarddutybenchmark/template_v2.yaml +++ b/cloudwatchevents/guarddutybenchmark/template_v2.yaml @@ -56,7 +56,7 @@ Metadata: Name: sumologic-guardduty-benchmark LicenseUrl: ../LICENSE ReadmeUrl: ./README.md - SemanticVersion: 1.0.20 + SemanticVersion: 1.0.23 SourceCodeUrl: https://github.com/SumoLogic/sumologic-aws-lambda/tree/main/cloudwatchevents/guarddutybenchmark SpdxLicenseId: Apache-2.0 @@ -113,7 +113,7 @@ Resources: - aws.guardduty Type: CloudWatchEvent Handler: cloudwatchevents.handler - Runtime: nodejs22.x + Runtime: nodejs24.x Type: AWS::Serverless::Function SumoAppUtils: @@ -121,7 +121,7 @@ Resources: Properties: Location: ApplicationId: arn:aws:serverlessrepo:us-east-1:956882708938:applications/sumologic-app-utils - SemanticVersion: 2.0.21 + SemanticVersion: 2.0.23 SumoHostedCollector: Type: Custom::Collector diff --git a/cloudwatchevents/src/cloudwatchevents.js b/cloudwatchevents/src/cloudwatchevents.js index 7a0b615..885ed9d 100644 --- a/cloudwatchevents/src/cloudwatchevents.js +++ b/cloudwatchevents/src/cloudwatchevents.js @@ -24,7 +24,6 @@ var numOfRetries = process.env.NUMBER_OF_RETRIES || 3; // the number of retries var https = require('https'); var zlib = require('zlib'); -var url = require('url'); Promise.retryMax = function(fn,retry,interval,fnParams) { return fn.apply(this,fnParams).catch( err => { @@ -49,59 +48,49 @@ function exponentialBackoff(seed) { } } -function postToSumo(callback, messages) { - var messagesTotal = Object.keys(messages).length; +function httpSend(options, headers, data) { + return new Promise( (resolve,reject) => { + var curOptions = Object.assign({}, options); + curOptions.headers = headers; + var req = https.request(curOptions, function (res) { + var body = ''; + res.setEncoding('utf8'); + res.on('data', function (chunk) { + body += chunk; + }); + res.on('end', function () { + if (res.statusCode == 200) { + resolve(body); + } else { + reject({'error':'HTTP Return code ' + res.statusCode,'res':res}); + } + }); + }); + req.on('error', function (e) { + reject({'error':e,'res':null}); + }); + for (var i = 0; i < data.length; i++) { + req.write(JSON.stringify(data[i]) + '\n'); + } + console.log("sending to Sumo...") + req.end(); + }); +} + +async function postToSumo(messages) { var messagesSent = 0; var messageErrors = []; - var urlObject = url.parse(SumoURL); + var urlObject = new URL(SumoURL); var options = { 'hostname': urlObject.hostname, - 'path': urlObject.pathname, + 'path': urlObject.pathname + urlObject.search, 'method': 'POST' }; - var finalizeContext = function () { - var total = messagesSent + messageErrors.length; - if (total == messagesTotal) { - console.log('messagesSent: ' + messagesSent + ' messagesErrors: ' + messageErrors.length); - if (messageErrors.length > 0) { - callback('errors: ' + messageErrors); - } else { - callback(null, "Success"); - } - } - }; - - function httpSend(options, headers, data) { - return new Promise( (resolve,reject) => { - var curOptions = options; - curOptions.headers = headers; - var req = https.request(curOptions, function (res) { - var body = ''; - res.setEncoding('utf8'); - res.on('data', function (chunk) { - body += chunk; // don't really do anything with body - }); - res.on('end', function () { - if (res.statusCode == 200) { - resolve(body); - } else { - reject({'error':'HTTP Return code ' + res.statusCode,'res':res}); - } - }); - }); - req.on('error', function (e) { - reject({'error':e,'res':null}); - }); - for (var i = 0; i < data.length; i++) { - req.write(JSON.stringify(data[i]) + '\n'); - } - console.log("sending to Sumo...") - req.end(); - }); - } - Object.keys(messages).forEach(function (key, index) { + var keys = Object.keys(messages); + for (var i = 0; i < keys.length; i++) { + var key = keys[i]; var headerArray = key.split(':'); var headers = { 'X-Sumo-Name': headerArray[0], @@ -109,33 +98,40 @@ function postToSumo(callback, messages) { 'X-Sumo-Host': headerArray[2], 'X-Sumo-Client': 'cloudwatchevents-aws-lambda' }; - Promise.retryMax(httpSend, numOfRetries, retryInterval, [options, headers, messages[key]]).then((body)=> { + try { + await Promise.retryMax(httpSend, numOfRetries, retryInterval, [options, headers, messages[key]]); messagesSent++; - finalizeContext() - }).catch((e) => { + } catch (e) { messageErrors.push(e.error); - finalizeContext(); - }); - }); + } + } + + console.log('messagesSent: ' + messagesSent + ' messagesErrors: ' + messageErrors.length); + if (messageErrors.length > 0) { + throw new Error('errors: ' + messageErrors); + } + return "Success"; } -exports.handler = function (event, context, callback) { +exports.handler = async function (event, context) { - // Used to hold chunks of messages to post to SumoLogic var messageList = {}; var final_event; - // Validate URL has been set - var urlObject = url.parse(SumoURL); - if (urlObject.protocol != 'https:' || urlObject.host === null || urlObject.path === null) { - callback('Invalid SUMO_ENDPOINT environment variable: ' + SumoURL); + var urlObject; + try { + urlObject = new URL(SumoURL); + } catch (e) { + throw new Error('Invalid SUMO_ENDPOINT environment variable: ' + SumoURL); + } + if (urlObject.protocol !== 'https:' || !urlObject.hostname || !urlObject.pathname) { + throw new Error('Invalid SUMO_ENDPOINT environment variable: ' + SumoURL); } - //console.log(event); if ((event.source==="aws.guardduty") || (removeOuterFields)) { final_event =event.detail; } else { final_event = event; } messageList[sourceNameOverride+':'+sourceCategoryOverride+':'+sourceHostOverride]=[final_event]; - postToSumo(callback, messageList); + return await postToSumo(messageList); }; diff --git a/cloudwatchevents/test/requirements.txt b/cloudwatchevents/test/requirements.txt index 749893e..8a9bcbf 100644 --- a/cloudwatchevents/test/requirements.txt +++ b/cloudwatchevents/test/requirements.txt @@ -1,3 +1,3 @@ -requests==2.32.5 -boto3==1.36.11 +requests==2.33.0 +boto3==1.43.6 sumologic-sdk==0.1.17 \ No newline at end of file diff --git a/cloudwatchevents/test/test-guardduty-benchmark.py b/cloudwatchevents/test/test-guardduty-benchmark.py index 85050df..6d91700 100644 --- a/cloudwatchevents/test/test-guardduty-benchmark.py +++ b/cloudwatchevents/test/test-guardduty-benchmark.py @@ -8,6 +8,7 @@ import unittest import boto3 +import requests from sumologic import SumoLogic TIMEFORMAT = '%Y-%m-%dT%H:%M:%S' @@ -154,10 +155,9 @@ def delete_source(self, collector_id, source): def fetch_logs(self): raw_messages = [] - # fetch Last 10 Minutes logs - # Get the current time + # Search with a wide window to avoid missing logs during retries to_time = datetime.datetime.now() - from_time = to_time - datetime.timedelta(minutes=self.delay+2) + from_time = to_time - datetime.timedelta(minutes=self.delay+15) from_time = from_time.strftime(TIMEFORMAT) to_time = to_time.strftime(TIMEFORMAT) print("Fetching records") @@ -192,7 +192,11 @@ def fetch_logs(self): def fetch_logs_with_retry(self, retries=6, delay=60): for attempt in range(1, retries + 1): - result = self.fetch_logs() + try: + result = self.fetch_logs() + except requests.exceptions.ConnectionError as e: + print(f"Connection error on attempt {attempt}: {e}") + result = [] if len(result) >= 3: return result else: @@ -202,7 +206,6 @@ def fetch_logs_with_retry(self, retries=6, delay=60): return result else: print(f"Retrying in {delay} seconds...") - self.delay += 1 time.sleep(delay) # Validate the specific findings generated @@ -356,6 +359,7 @@ def test_guard_duty_benchmark(self): self.cf.create_stack(self.parameters) print("Testing Stack Creation.") self.assertTrue(self.cf.stack_exists()) + time.sleep(120) # Generate some specific sample findings print("Generating sample GuardDuty findings.") self.guard_duty.create_sample_findings(DetectorId=self.detector_id, FindingTypes=self.finding_types) @@ -442,6 +446,7 @@ def test_guard_duty(self): self.cf.create_stack(self.parameters) print("Testing Stack Creation.") self.assertTrue(self.cf.stack_exists()) + time.sleep(120) # Generate some specific sample findings print("Generating sample GuardDuty findings.") self.guard_duty.create_sample_findings(DetectorId=self.detector_id, FindingTypes=self.finding_types) @@ -499,6 +504,7 @@ def test_cloudwatch_event(self): self.cf.create_stack(self.parameters) print("Testing Stack Creation.") self.assertTrue(self.cf.stack_exists()) + time.sleep(120) # Generate some specific sample findings print("Generating sample CloudWatch Events.") self.guard_duty.create_sample_findings(DetectorId=self.detector_id, FindingTypes=self.finding_types) diff --git a/cloudwatchlogs-with-dlq/requirements.txt b/cloudwatchlogs-with-dlq/requirements.txt index c08ca11..4c5aa03 100644 --- a/cloudwatchlogs-with-dlq/requirements.txt +++ b/cloudwatchlogs-with-dlq/requirements.txt @@ -1,2 +1,2 @@ -requests==2.32.5 -boto3==1.36.11 +requests==2.33.0 +boto3==1.43.6 diff --git a/loggroup-lambda-connector/test/requirements.txt b/loggroup-lambda-connector/test/requirements.txt index f5ffcb8..ce479a3 100644 --- a/loggroup-lambda-connector/test/requirements.txt +++ b/loggroup-lambda-connector/test/requirements.txt @@ -1,3 +1,3 @@ -requests>=2.32.4 -boto3==1.36.11 +requests==2.33.0 +boto3==1.43.6 cfn-flip>=1.3.0 diff --git a/securityhub-collector/sam/packaged.yaml b/securityhub-collector/sam/packaged.yaml index 924864d..2647ec0 100755 --- a/securityhub-collector/sam/packaged.yaml +++ b/securityhub-collector/sam/packaged.yaml @@ -22,9 +22,9 @@ Metadata: - cloudwatchevents - securityhub Name: sumologic-securityhub-collector - LicenseUrl: s3://appdevstore/SecurityHubCollector/v1.0.11/6092dd6c323e33634657102f570628e0 - ReadmeUrl: s3://appdevstore/SecurityHubCollector/v1.0.11/3edeb049c0e4202e9588e43b957090ed - SemanticVersion: 1.0.11 + LicenseUrl: s3://appdevstore/SecurityHubCollector/v1.0.13/6092dd6c323e33634657102f570628e0 + ReadmeUrl: s3://appdevstore/SecurityHubCollector/v1.0.13/3edeb049c0e4202e9588e43b957090ed + SemanticVersion: 1.0.13 SourceCodeUrl: https://github.com/SumoLogic/sumologic-aws-lambda/tree/master/securityhub-collector SpdxLicenseId: Apache-2.0 Parameters: @@ -35,8 +35,8 @@ Resources: Type: AWS::Serverless::Function Properties: Handler: securityhub_collector.lambda_handler - Runtime: python3.13 - CodeUri: s3://appdevstore/SecurityHubCollector/v1.0.11/3c2bc2da7576810682419519fdc578bb + Runtime: python3.14 + CodeUri: s3://appdevstore/SecurityHubCollector/v1.0.13/3c2bc2da7576810682419519fdc578bb MemorySize: 128 Timeout: 300 Policies: diff --git a/securityhub-collector/sam/requirements.txt b/securityhub-collector/sam/requirements.txt index ea9cc41..6432051 100644 --- a/securityhub-collector/sam/requirements.txt +++ b/securityhub-collector/sam/requirements.txt @@ -1 +1 @@ -boto3==1.36.11 +boto3==1.43.6 diff --git a/securityhub-collector/sam/sam_package.sh b/securityhub-collector/sam/sam_package.sh index f8bdfdf..9a7f7f9 100755 --- a/securityhub-collector/sam/sam_package.sh +++ b/securityhub-collector/sam/sam_package.sh @@ -10,7 +10,7 @@ else AWS_REGION="us-east-2" fi -version="1.0.11" +version="1.0.13" echo "Creating package.yaml" sam package --template-file template.yaml --s3-bucket $SAM_S3_BUCKET --output-template-file packaged.yaml --s3-prefix "SecurityHubCollector/v"$version --region $AWS_REGION --profile $AWS_PROFILE diff --git a/securityhub-collector/sam/template.yaml b/securityhub-collector/sam/template.yaml index 6ad2173..d0c7eab 100755 --- a/securityhub-collector/sam/template.yaml +++ b/securityhub-collector/sam/template.yaml @@ -21,7 +21,7 @@ Metadata: Name: sumologic-securityhub-collector LicenseUrl: ../LICENSE ReadmeUrl: ../README.md - SemanticVersion: 1.0.11 + SemanticVersion: 1.0.13 SourceCodeUrl: https://github.com/SumoLogic/sumologic-aws-lambda/tree/master/securityhub-collector SpdxLicenseId: Apache-2.0 @@ -35,7 +35,7 @@ Resources: Type: 'AWS::Serverless::Function' Properties: Handler: securityhub_collector.lambda_handler - Runtime: python3.13 + Runtime: python3.14 CodeUri: ../src/ MemorySize: 128 Timeout: 300 diff --git a/securityhub-forwarder/sam/packaged.yaml b/securityhub-forwarder/sam/packaged.yaml index 8920ed3..43e9b86 100755 --- a/securityhub-forwarder/sam/packaged.yaml +++ b/securityhub-forwarder/sam/packaged.yaml @@ -19,9 +19,9 @@ Metadata: - cloudwatchevents - securityhub Name: sumologic-securityhub-forwarder - LicenseUrl: s3://appdevstore/SecurityHubForwarder/v1.0.12/6092dd6c323e33634657102f570628e0 - ReadmeUrl: s3://appdevstore/SecurityHubForwarder/v1.0.12/56f774fe371f787c17ec137a47c93138 - SemanticVersion: 1.0.12 + LicenseUrl: s3://appdevstore/SecurityHubForwarder/v1.0.14/6092dd6c323e33634657102f570628e0 + ReadmeUrl: s3://appdevstore/SecurityHubForwarder/v1.0.14/56f774fe371f787c17ec137a47c93138 + SemanticVersion: 1.0.14 SourceCodeUrl: https://github.com/SumoLogic/sumologic-aws-lambda/tree/master/securityhub-forwarder SpdxLicenseId: Apache-2.0 Resources: @@ -67,8 +67,8 @@ Resources: Type: AWS::Serverless::Function Properties: Handler: securityhub_forwarder.lambda_handler - Runtime: python3.13 - CodeUri: s3://appdevstore/SecurityHubForwarder/v1.0.12/c344c0895451a1baae2f6a64ff9aa774 + Runtime: python3.14 + CodeUri: s3://appdevstore/SecurityHubForwarder/v1.0.14/8dc0ba1407c47048e12562ab64b6cc11 MemorySize: 128 Timeout: 300 Policies: diff --git a/securityhub-forwarder/sam/requirements.txt b/securityhub-forwarder/sam/requirements.txt index ea9cc41..6432051 100644 --- a/securityhub-forwarder/sam/requirements.txt +++ b/securityhub-forwarder/sam/requirements.txt @@ -1 +1 @@ -boto3==1.36.11 +boto3==1.43.6 diff --git a/securityhub-forwarder/sam/sam_package.sh b/securityhub-forwarder/sam/sam_package.sh index c2b402b..9ced4af 100755 --- a/securityhub-forwarder/sam/sam_package.sh +++ b/securityhub-forwarder/sam/sam_package.sh @@ -10,7 +10,7 @@ else SAM_S3_BUCKET="cf-templates-5d0x5unchag-us-east-2" AWS_REGION="us-east-2" fi -version="1.0.12" +version="1.0.14" echo "Creating package.yaml" sam package --template-file template.yaml --s3-bucket $SAM_S3_BUCKET --output-template-file packaged.yaml --s3-prefix "SecurityHubForwarder/v"$version --region $AWS_REGION --profile $AWS_PROFILE diff --git a/securityhub-forwarder/sam/template.yaml b/securityhub-forwarder/sam/template.yaml index f47173d..c85cea1 100755 --- a/securityhub-forwarder/sam/template.yaml +++ b/securityhub-forwarder/sam/template.yaml @@ -16,7 +16,7 @@ Metadata: Name: sumologic-securityhub-forwarder LicenseUrl: ../LICENSE ReadmeUrl: ../README.md - SemanticVersion: 1.0.12 + SemanticVersion: 1.0.14 SourceCodeUrl: https://github.com/SumoLogic/sumologic-aws-lambda/tree/master/securityhub-forwarder SpdxLicenseId: Apache-2.0 @@ -62,7 +62,7 @@ Resources: Type: 'AWS::Serverless::Function' Properties: Handler: securityhub_forwarder.lambda_handler - Runtime: python3.13 + Runtime: python3.14 CodeUri: ../src/ MemorySize: 128 Timeout: 300 diff --git a/securityhub-org/sumologic-securityhub-collector-awsorg/sam/packaged.yaml b/securityhub-org/sumologic-securityhub-collector-awsorg/sam/packaged.yaml index 6b33b55..f92f1e4 100644 --- a/securityhub-org/sumologic-securityhub-collector-awsorg/sam/packaged.yaml +++ b/securityhub-org/sumologic-securityhub-collector-awsorg/sam/packaged.yaml @@ -21,9 +21,9 @@ Metadata: - cloudwatchevents - securityhub Name: sumologic-securityhub-connector-aws-org - LicenseUrl: s3://appdevstore/SecurityHubCollectorAWSOrg/v1.0.8/6092dd6c323e33634657102f570628e0 - ReadmeUrl: s3://appdevstore/SecurityHubCollectorAWSOrg/v1.0.8/eb911876461845db8f3113dbace6d454 - SemanticVersion: 1.0.8 + LicenseUrl: s3://appdevstore/SecurityHubCollectorAWSOrg/v1.0.10/6092dd6c323e33634657102f570628e0 + ReadmeUrl: s3://appdevstore/SecurityHubCollectorAWSOrg/v1.0.10/eb911876461845db8f3113dbace6d454 + SemanticVersion: 1.0.10 SourceCodeUrl: https://github.com/SumoLogic/sumologic-aws-lambda/tree/main/securityhub-org/sumologic-securityhub-collector-awsorg/src SpdxLicenseId: Apache-2.0 Parameters: @@ -42,8 +42,8 @@ Resources: Type: AWS::Serverless::Function Properties: Handler: securityhub_collector_org.lambda_handler - Runtime: python3.13 - CodeUri: s3://appdevstore/SecurityHubCollectorAWSOrg/v1.0.8/72d8a9923335d52f948cbd3f99d8b91d + Runtime: python3.14 + CodeUri: s3://appdevstore/SecurityHubCollectorAWSOrg/v1.0.10/72d8a9923335d52f948cbd3f99d8b91d MemorySize: 128 Timeout: 300 Environment: diff --git a/securityhub-org/sumologic-securityhub-collector-awsorg/sam/requirements.txt b/securityhub-org/sumologic-securityhub-collector-awsorg/sam/requirements.txt index 8eb3760..74babf2 100644 --- a/securityhub-org/sumologic-securityhub-collector-awsorg/sam/requirements.txt +++ b/securityhub-org/sumologic-securityhub-collector-awsorg/sam/requirements.txt @@ -1,2 +1,2 @@ # boto3==1.27.1 -requests==2.32.5 +requests==2.33.0 diff --git a/securityhub-org/sumologic-securityhub-collector-awsorg/sam/sam_package.sh b/securityhub-org/sumologic-securityhub-collector-awsorg/sam/sam_package.sh index 4998cb1..40ad049 100755 --- a/securityhub-org/sumologic-securityhub-collector-awsorg/sam/sam_package.sh +++ b/securityhub-org/sumologic-securityhub-collector-awsorg/sam/sam_package.sh @@ -10,7 +10,7 @@ else AWS_REGION="us-east-1" fi -version="1.0.8" +version="1.0.10" echo "Creating package.yaml" sam package --template-file template.yaml --s3-bucket $SAM_S3_BUCKET --output-template-file packaged.yaml --s3-prefix "SecurityHubCollectorAWSOrg/v"$version --region $AWS_REGION --profile $AWS_PROFILE diff --git a/securityhub-org/sumologic-securityhub-collector-awsorg/sam/template.yaml b/securityhub-org/sumologic-securityhub-collector-awsorg/sam/template.yaml index 68a50de..b782733 100644 --- a/securityhub-org/sumologic-securityhub-collector-awsorg/sam/template.yaml +++ b/securityhub-org/sumologic-securityhub-collector-awsorg/sam/template.yaml @@ -20,7 +20,7 @@ Metadata: Name: sumologic-securityhub-connector-aws-org LicenseUrl: ../LICENSE ReadmeUrl: ../README.md - SemanticVersion: 1.0.8 + SemanticVersion: 1.0.10 SourceCodeUrl: https://github.com/SumoLogic/sumologic-aws-lambda/tree/main/securityhub-org/sumologic-securityhub-collector-awsorg/src SpdxLicenseId: Apache-2.0 @@ -41,7 +41,7 @@ Resources: Type: 'AWS::Serverless::Function' Properties: Handler: securityhub_collector_org.lambda_handler - Runtime: python3.13 + Runtime: python3.14 CodeUri: ../src/src.zip MemorySize: 128 Timeout: 300