Skip to content

migrate symantec_icdx#611

Merged
TalShafir1 merged 5 commits intomainfrom
migrate-symantec_icdx-integration
Mar 24, 2026
Merged

migrate symantec_icdx#611
TalShafir1 merged 5 commits intomainfrom
migrate-symantec_icdx-integration

Conversation

@haggit-eliyahu
Copy link
Copy Markdown
Contributor

No description provided.

@haggit-eliyahu haggit-eliyahu requested a review from a team as a code owner March 10, 2026 16:32
@github-actions
Copy link
Copy Markdown

Marketplace Validation Failed

Click to view the full report

Validation Report

🧩 Integrations
Pre-Build Stage

symantec_icdx

Validation Name Details
⚠️ Integration Version Bump New integration project.toml and release_note.yaml version must be initialize to 1.0

@gemini-code-assist
Copy link
Copy Markdown
Contributor

Summary of Changes

Hello, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

This pull request introduces the Symantec Integrated Cyber Defense Exchange (ICDX) integration, enabling seamless interaction with Symantec's security event data. It provides actions for retrieving individual events and querying events within a time window, alongside a dedicated connector for automated event ingestion and case creation. The integration is set up with Python 3.11, ensuring compatibility and leveraging recent language features.

Highlights

  • New Integration: Introduced the Symantec ICDX integration, providing capabilities to interact with Symantec's Integrated Cyber Defense Exchange.
  • Core Functionality: Implemented actions to retrieve specific events by UUID, fetch events within a specified time frame (minutes back) with optional query and field filtering, and a connectivity test (Ping).
  • Event Connector: Added a connector to automatically fetch and process Symantec ICDX events, converting them into case information for security operations.
  • Python 3.11 Support: Configured the integration to use Python 3.11, aligning with modern Python environments.

🧠 New Feature in Public Preview: You can now enable Memory to help Gemini Code Assist learn from your team's feedback. This makes future code reviews more consistent and personalized to your project's style. Click here to enable Memory in your admin console.

Changelog
  • content/response_integrations/google/symantec_icdx/.python-version
    • Added Python version specification.
  • content/response_integrations/google/symantec_icdx/init.py
    • Added Python package initialization file.
  • content/response_integrations/google/symantec_icdx/actions/GetEvent.py
    • Added Python script for the 'Get Event' action.
  • content/response_integrations/google/symantec_icdx/actions/GetEvent.yaml
    • Added YAML definition for the 'Get Event' action.
  • content/response_integrations/google/symantec_icdx/actions/GetEventsMinutesBack.py
    • Added Python script for the 'Get Events Minutes Back' action.
  • content/response_integrations/google/symantec_icdx/actions/GetEventsMinutesBack.yaml
    • Added YAML definition for the 'Get Events Minutes Back' action.
  • content/response_integrations/google/symantec_icdx/actions/Ping.py
    • Added Python script for the 'Ping' action.
  • content/response_integrations/google/symantec_icdx/actions/Ping.yaml
    • Added YAML definition for the 'Ping' action.
  • content/response_integrations/google/symantec_icdx/actions/init.py
    • Added Python package initialization file.
  • content/response_integrations/google/symantec_icdx/connectors/SymantecICDXQueryConnector.py
    • Added Python script for the Symantec ICDX query connector.
  • content/response_integrations/google/symantec_icdx/connectors/SymantecICDXQueryConnector.yaml
    • Added YAML definition for the Symantec ICDX query connector.
  • content/response_integrations/google/symantec_icdx/connectors/init.py
    • Added Python package initialization file.
  • content/response_integrations/google/symantec_icdx/core/SymantecICDXManager.py
    • Added Python class for managing Symantec ICDX API interactions.
  • content/response_integrations/google/symantec_icdx/core/init.py
    • Added Python package initialization file.
  • content/response_integrations/google/symantec_icdx/definition.yaml
    • Added YAML definition for the Symantec ICDX integration.
  • content/response_integrations/google/symantec_icdx/pyproject.toml
    • Added project configuration file for SymantecICDX.
  • content/response_integrations/google/symantec_icdx/release_notes.yaml
    • Added release notes for the SymantecICDX integration.
  • content/response_integrations/google/symantec_icdx/resources/logo.svg
    • Added SVG logo for the integration.
  • content/response_integrations/google/symantec_icdx/tests/init.py
    • Added Python package initialization file for tests.
  • content/response_integrations/google/symantec_icdx/tests/common.py
    • Added common utilities for integration tests.
  • content/response_integrations/google/symantec_icdx/tests/config.json
    • Added configuration file for integration tests.
  • content/response_integrations/google/symantec_icdx/tests/conftest.py
    • Added pytest configuration file for integration tests.
  • content/response_integrations/google/symantec_icdx/tests/test_defaults/init.py
    • Added Python package initialization file for default tests.
  • content/response_integrations/google/symantec_icdx/tests/test_defaults/test_imports.py
    • Added default import test for the integration.
Activity
  • No explicit activity has been recorded for this pull request yet.
Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point by creating a comment using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands on the current page.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in pull request comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for GitHub and other Google products, sign up here.

You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

@github-actions
Copy link
Copy Markdown

Marketplace Validation Failed

Click to view the full report

Validation Report

🧩 Integrations
Pre-Build Stage

symantec_icdx

Validation Name Details
⚠️ Integration Version Bump New integration project.toml and release_note.yaml version must be initialize to 1.0

Copy link
Copy Markdown
Contributor

@gemini-code-assist gemini-code-assist Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request aims to migrate the Symantec ICDX integration, updating it to use Python 3.11 and a newer SDK structure. However, a security audit identified two medium-severity issues in the core manager class: a significant logic bug in the pagination implementation that could lead to crashes and missed security alerts, and an insecure default for SSL verification, posing a Man-in-the-Middle risk. Additionally, the current implementation has several issues, including multiple style guide violations (e.g., lack of mandatory unit tests, missing JSON example files, missing type annotations), a critical runtime bug in SymantecICDXManager due to an incorrectly scoped function, and opportunities to remove legacy Python 2 code patterns.

:return: {CaseInfo} The newly created case
"""
self.logger.info(
f"Creating Case for Alert {str(alert.get('message')).encode('utf-8')}, UUID: {str(alert.get('uuid')).encode('utf-8')}"
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

high

Calling .encode('utf-8') on a string within an f-string for logging is a pattern from Python 2 that is incorrect in Python 3. This will result in a bytestring representation (e.g., b'...') in your logs. Please remove the .encode('utf-8') calls to log the string values directly.

Suggested change
f"Creating Case for Alert {str(alert.get('message')).encode('utf-8')}, UUID: {str(alert.get('uuid')).encode('utf-8')}"
f"Creating Case for Alert {alert.get('message')}, UUID: {alert.get('uuid')}"

Comment on lines +1 to +23
# Copyright 2026 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.

from __future__ import annotations

from integration_testing.default_tests.import_test import import_all_integration_modules

from .. import common


def test_imports() -> None:
import_all_integration_modules(common.INTEGRATION_PATH)
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

high

The style guide mandates that all new features and integrations must include corresponding unit tests. The current test suite only verifies that modules can be imported. This is insufficient for ensuring production stability. Please add comprehensive unit tests for the actions and manager logic, mocking any external network calls. Refer to the "Golden Tests" mentioned in the style guide for examples of expected test structure and coverage.

References
  1. All new features, bug fixes, or integrations added to content/response_integrations/** must include corresponding unit tests to ensure production stability. (link)

)

if events:
siemplify.result.add_result_json(events)
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

medium

According to the style guide, if an action returns a JSON result using add_result_json, a corresponding JSON example file must exist in the integration's resources/ directory. Please add a GetEventsMinutesBack_json_example.json file and update the result_example_path in GetEventsMinutesBack.yaml accordingly.

References
  1. If a JSON result is detected (e.g., via calls to result.add_result_json(...)), a corresponding JSON example file must exist in the integration's resources/ directory. (link)

event_data = icdx_manager.get_event(event_uuid)

if event_data:
siemplify.result.add_result_json(event_data)
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

medium

According to the style guide, if an action returns a JSON result using add_result_json, a corresponding JSON example file must exist in the integration's resources/ directory. Please add a GetEvent_json_example.json file and update the result_example_path in GetEvent.yaml accordingly.

References
  1. If a JSON result is detected (e.g., via calls to result.add_result_json(...)), a corresponding JSON example file must exist in the integration's resources/ directory. (link)



@output_handler
def main():
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

medium

Per the style guide, all function parameters and return types must be annotated. Please add a return type hint to the main function.

Suggested change
def main():
def main() -> None:
References
  1. All function parameters and return types must be annotated. (link)



@output_handler
def main():
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

medium

Per the style guide, all function parameters and return types must be annotated. Please add a return type hint to the main function.

Suggested change
def main():
def main() -> None:
References
  1. All function parameters and return types must be annotated. (link)

for alert_id, timestamp in list(existing_ids.items()):
if (
timestamp
> arrow.utcnow().shift(hours=-IDS_HOURS_LIMIT).timestamp
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

medium

The .timestamp property on arrow objects is deprecated. Please use the timestamp() method instead to ensure future compatibility.

Suggested change
> arrow.utcnow().shift(hours=-IDS_HOURS_LIMIT).timestamp
> arrow.utcnow().shift(hours=-IDS_HOURS_LIMIT).timestamp()

filtered_alerts = []

for alert in alerts:
if alert.get("uuid") not in list(existing_ids.keys()):
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

medium

The list() call here is unnecessary and inefficient. In Python 3, you can check for key existence directly on the dictionary, which is more performant.

Suggested change
if alert.get("uuid") not in list(existing_ids.keys()):
if alert.get("uuid") not in existing_ids:


# Read already existing alerts ids
existing_ids = symantec_icdx_connector.read_ids(
os.path.join(connector_scope.run_folder, IDS_FILE)
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

medium

The style guide (line 37) explicitly forbids using os.path.join. Please refactor this and other file operations in this file to use pathlib as mandated by the style guide (line 35). For example, this line could be pathlib.Path(connector_scope.run_folder) / IDS_FILE after importing pathlib.

References
  1. Do not use raw string concatenation or os.path.join for file system operations. Always use pathlib.Path. (link)



class SymantecICDXManager:
def __init__(self, api_root, api_key, verify_ssl=False):
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

security-medium medium

The __init__ method defaults verify_ssl to False, which is an insecure default. This makes the integration vulnerable to Man-in-the-Middle (MitM) attacks by not verifying SSL certificates. It is highly recommended to default verify_ssl to True for security. Additionally, per the style guide, all function parameters and return types must be annotated.

Suggested change
def __init__(self, api_root, api_key, verify_ssl=False):
def __init__(self, api_root: str, api_key: str, verify_ssl: bool = True) -> None:

@github-actions
Copy link
Copy Markdown

Marketplace Validation Failed

Click to view the full report

Validation Report

🧩 Integrations
Pre-Build Stage

symantec_icdx

Validation Name Details
⚠️ Integration Version Bump New integration project.toml and release_note.yaml version must be initialize to 1.0

2 similar comments
@github-actions
Copy link
Copy Markdown

Marketplace Validation Failed

Click to view the full report

Validation Report

🧩 Integrations
Pre-Build Stage

symantec_icdx

Validation Name Details
⚠️ Integration Version Bump New integration project.toml and release_note.yaml version must be initialize to 1.0

@github-actions
Copy link
Copy Markdown

Marketplace Validation Failed

Click to view the full report

Validation Report

🧩 Integrations
Pre-Build Stage

symantec_icdx

Validation Name Details
⚠️ Integration Version Bump New integration project.toml and release_note.yaml version must be initialize to 1.0

@github-actions
Copy link
Copy Markdown

Marketplace Validation Failed

Click to view the full report

Validation Report

🧩 Integrations
Pre-Build Stage

symantec_icdx

Validation Name Details
⚠️ Integration Version Bump New integration project.toml and release_note.yaml version must be initialize to 1.0

@haggit-eliyahu haggit-eliyahu force-pushed the migrate-symantec_icdx-integration branch from 316a12f to 239f69a Compare March 18, 2026 09:36
@github-actions
Copy link
Copy Markdown

Marketplace Validation Failed

Click to view the full report

Validation Report

🧩 Integrations
Pre-Build Stage

symantec_icdx

Validation Name Details
⚠️ Integration Version Bump New integration project.toml and release_note.yaml version must be initialize to 1.0

5 similar comments
@github-actions
Copy link
Copy Markdown

Marketplace Validation Failed

Click to view the full report

Validation Report

🧩 Integrations
Pre-Build Stage

symantec_icdx

Validation Name Details
⚠️ Integration Version Bump New integration project.toml and release_note.yaml version must be initialize to 1.0

@github-actions
Copy link
Copy Markdown

Marketplace Validation Failed

Click to view the full report

Validation Report

🧩 Integrations
Pre-Build Stage

symantec_icdx

Validation Name Details
⚠️ Integration Version Bump New integration project.toml and release_note.yaml version must be initialize to 1.0

@github-actions
Copy link
Copy Markdown

Marketplace Validation Failed

Click to view the full report

Validation Report

🧩 Integrations
Pre-Build Stage

symantec_icdx

Validation Name Details
⚠️ Integration Version Bump New integration project.toml and release_note.yaml version must be initialize to 1.0

@github-actions
Copy link
Copy Markdown

Marketplace Validation Failed

Click to view the full report

Validation Report

🧩 Integrations
Pre-Build Stage

symantec_icdx

Validation Name Details
⚠️ Integration Version Bump New integration project.toml and release_note.yaml version must be initialize to 1.0

@github-actions
Copy link
Copy Markdown

Marketplace Validation Failed

Click to view the full report

Validation Report

🧩 Integrations
Pre-Build Stage

symantec_icdx

Validation Name Details
⚠️ Integration Version Bump New integration project.toml and release_note.yaml version must be initialize to 1.0

@haggit-eliyahu haggit-eliyahu force-pushed the migrate-symantec_icdx-integration branch from f0102d7 to 239f69a Compare March 18, 2026 17:08
@github-actions
Copy link
Copy Markdown

Marketplace Validation Failed

Click to view the full report

Validation Report

🧩 Integrations
Pre-Build Stage

symantec_icdx

Validation Name Details
⚠️ Integration Version Bump New integration project.toml and release_note.yaml version must be initialize to 1.0

2 similar comments
@github-actions
Copy link
Copy Markdown

Marketplace Validation Failed

Click to view the full report

Validation Report

🧩 Integrations
Pre-Build Stage

symantec_icdx

Validation Name Details
⚠️ Integration Version Bump New integration project.toml and release_note.yaml version must be initialize to 1.0

@github-actions
Copy link
Copy Markdown

Marketplace Validation Failed

Click to view the full report

Validation Report

🧩 Integrations
Pre-Build Stage

symantec_icdx

Validation Name Details
⚠️ Integration Version Bump New integration project.toml and release_note.yaml version must be initialize to 1.0

@github-actions
Copy link
Copy Markdown

Marketplace Validation Failed

Click to view the full report

Validation Report

🧩 Integrations
Pre-Build Stage

symantec_icdx

Validation Name Details
⚠️ Integration Version Bump New integration project.toml and release_note.yaml version must be initialize to 1.0

@haggit-eliyahu haggit-eliyahu force-pushed the migrate-symantec_icdx-integration branch from 9659013 to 29a8076 Compare March 22, 2026 08:15
@github-actions
Copy link
Copy Markdown

Marketplace Validation Failed

Click to view the full report

Validation Report

🧩 Integrations
Pre-Build Stage

symantec_icdx

Validation Name Details
⚠️ Integration Version Bump New integration project.toml and release_note.yaml version must be initialize to 1.0

@github-actions
Copy link
Copy Markdown

Marketplace Validation Failed

Click to view the full report

Validation Report

🧩 Integrations
Pre-Build Stage

symantec_icdx

Validation Name Details
⚠️ Integration Version Bump New integration project.toml and release_note.yaml version must be initialize to 1.0

1 similar comment
@github-actions
Copy link
Copy Markdown

Marketplace Validation Failed

Click to view the full report

Validation Report

🧩 Integrations
Pre-Build Stage

symantec_icdx

Validation Name Details
⚠️ Integration Version Bump New integration project.toml and release_note.yaml version must be initialize to 1.0

@haggit-eliyahu haggit-eliyahu force-pushed the migrate-symantec_icdx-integration branch from eb901fd to 1470995 Compare March 22, 2026 15:22
@github-actions
Copy link
Copy Markdown

Marketplace Validation Failed

Click to view the full report

Validation Report

🧩 Integrations
Pre-Build Stage

symantec_icdx

Validation Name Details
⚠️ Integration Version Bump New integration project.toml and release_note.yaml version must be initialize to 1.0

1 similar comment
@github-actions
Copy link
Copy Markdown

Marketplace Validation Failed

Click to view the full report

Validation Report

🧩 Integrations
Pre-Build Stage

symantec_icdx

Validation Name Details
⚠️ Integration Version Bump New integration project.toml and release_note.yaml version must be initialize to 1.0

@github-actions
Copy link
Copy Markdown

Marketplace Validation Failed

Click to view the full report

Validation Report

🧩 Integrations
Pre-Build Stage

symantec_icdx

Validation Name Details
⚠️ Integration Version Bump New integration project.toml and release_note.yaml version must be initialize to 1.0

@github-actions
Copy link
Copy Markdown

Marketplace Validation Failed

Click to view the full report

Validation Report

🧩 Integrations
Pre-Build Stage

symantec_icdx

Validation Name Details
⚠️ Integration Version Bump New integration project.toml and release_note.yaml version must be initialize to 1.0

@github-actions
Copy link
Copy Markdown

Marketplace Validation Failed

Click to view the full report

Validation Report

🧩 Integrations
Pre-Build Stage

symantec_icdx

Validation Name Details
⚠️ Integration Version Bump New integration project.toml and release_note.yaml version must be initialize to 1.0

1 similar comment
@github-actions
Copy link
Copy Markdown

Marketplace Validation Failed

Click to view the full report

Validation Report

🧩 Integrations
Pre-Build Stage

symantec_icdx

Validation Name Details
⚠️ Integration Version Bump New integration project.toml and release_note.yaml version must be initialize to 1.0

@TalShafir1 TalShafir1 merged commit 4341181 into main Mar 24, 2026
62 of 64 checks passed
@TalShafir1 TalShafir1 deleted the migrate-symantec_icdx-integration branch March 24, 2026 13:56
sedovolosiy pushed a commit that referenced this pull request Mar 25, 2026
* migrate symantec_icdx

* use develop version

* update integration metadata

---------

Co-authored-by: Tal Shafir <94114984+TalShafir1@users.noreply.github.com>
KrishnaSharma06 added a commit that referenced this pull request Mar 25, 2026
… Feature: Add Signal Sciences Response Integration (#619)

* [Buganizer ID - 490287141] Added new integration Signal Sciences.

* working with tests

* added core to tests

* updated tests

* refactoring datamodels

* datamodel refactoring for Signal Sciences

* add docstring comments

* RN update

* widgets updated

* update widgets

* updated icon for widget

* docs: Improve descriptions for Signal Sciences actions and integration parameters.

* Updated publich_time to current

* add btach1 to ruf axcluded (#646)

* [b/495661530] Added parsers contribution guidelines (#645)

* Added parsers documentation

* Resolved comments

* Updated Timestamp Logic in BaseSyncJob (#623)

* Updated Timestamp Logic in BaseSyncJob

* Updated Timestamp Logic in BaseSyncJob

* pagination logic applied in get_email_template

* fixed the linter issue

---------

Co-authored-by: Arabindaksha-Mishra <arabindaksha@google.com>
Co-authored-by: Himshikhar <himshikhar@google.com>
Co-authored-by: KrishnaSharma06 <kantkrishna@google.com>

* migrate symantec_icdx (#611)

* migrate symantec_icdx

* use develop version

* update integration metadata

---------

Co-authored-by: Tal Shafir <94114984+TalShafir1@users.noreply.github.com>

* add ticket number to google integration's rn files (#647)

* Updated tipcommon in pyproject.toml

* removed README.md

* updated uv.lock

---------

Co-authored-by: haggit-eliyahu <101981405+haggit-eliyahu@users.noreply.github.com>
Co-authored-by: prasoonbirla-google <prasoonbirla@google.com>
Co-authored-by: Sahithya1357 <marthasahithya@google.com>
Co-authored-by: Arabindaksha-Mishra <arabindaksha@google.com>
Co-authored-by: Himshikhar <himshikhar@google.com>
Co-authored-by: KrishnaSharma06 <kantkrishna@google.com>
Co-authored-by: Tal Shafir <94114984+TalShafir1@users.noreply.github.com>
Arabindaksha-Mishra pushed a commit that referenced this pull request Mar 25, 2026
… Feature: Add Signal Sciences Response Integration (#619)

* [Buganizer ID - 490287141] Added new integration Signal Sciences.

* working with tests

* added core to tests

* updated tests

* refactoring datamodels

* datamodel refactoring for Signal Sciences

* add docstring comments

* RN update

* widgets updated

* update widgets

* updated icon for widget

* docs: Improve descriptions for Signal Sciences actions and integration parameters.

* Updated publich_time to current

* add btach1 to ruf axcluded (#646)

* [b/495661530] Added parsers contribution guidelines (#645)

* Added parsers documentation

* Resolved comments

* Updated Timestamp Logic in BaseSyncJob (#623)

* Updated Timestamp Logic in BaseSyncJob

* Updated Timestamp Logic in BaseSyncJob

* pagination logic applied in get_email_template

* fixed the linter issue

---------

Co-authored-by: Arabindaksha-Mishra <arabindaksha@google.com>
Co-authored-by: Himshikhar <himshikhar@google.com>
Co-authored-by: KrishnaSharma06 <kantkrishna@google.com>

* migrate symantec_icdx (#611)

* migrate symantec_icdx

* use develop version

* update integration metadata

---------

Co-authored-by: Tal Shafir <94114984+TalShafir1@users.noreply.github.com>

* add ticket number to google integration's rn files (#647)

* Updated tipcommon in pyproject.toml

* removed README.md

* updated uv.lock

---------

Co-authored-by: haggit-eliyahu <101981405+haggit-eliyahu@users.noreply.github.com>
Co-authored-by: prasoonbirla-google <prasoonbirla@google.com>
Co-authored-by: Sahithya1357 <marthasahithya@google.com>
Co-authored-by: Arabindaksha-Mishra <arabindaksha@google.com>
Co-authored-by: Himshikhar <himshikhar@google.com>
Co-authored-by: KrishnaSharma06 <kantkrishna@google.com>
Co-authored-by: Tal Shafir <94114984+TalShafir1@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants