Skip to content

Commit 2f13902

Browse files
authored
Merge pull request #5 from egnyte/release/1.0.6
changes for 1.0.6
2 parents 166f7b5 + 05599d9 commit 2f13902

File tree

5 files changed

+117
-82
lines changed

5 files changed

+117
-82
lines changed

TA-egnyte-connect/app.manifest

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
"id": {
66
"group": null,
77
"name": "TA-egnyte-connect",
8-
"version": "1.0.5"
8+
"version": "1.0.6"
99
},
1010
"author": [
1111
{

TA-egnyte-connect/bin/ta_egnyte_connect/aob_py3/httplib2/__init__.py

Lines changed: 52 additions & 51 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@
1515
"Alex Yu",
1616
]
1717
__license__ = "MIT"
18-
__version__ = "0.19.1"
18+
__version__ = "0.20.4"
1919

2020
import base64
2121
import calendar
@@ -78,7 +78,7 @@ def has_timeout(timeout):
7878
debuglevel = 0
7979

8080
# A request will be tried 'RETRIES' times if it fails at the socket/connection level.
81-
RETRIES = 2
81+
RETRIES = 1
8282

8383

8484
# Open Items:
@@ -151,15 +151,18 @@ def _build_ssl_context(
151151
# source: https://docs.python.org/3/library/ssl.html#ssl.SSLContext.maximum_version
152152
if maximum_version is not None:
153153
if hasattr(context, "maximum_version"):
154-
context.maximum_version = getattr(ssl.TLSVersion, maximum_version)
154+
if isinstance(maximum_version, str):
155+
maximum_version = getattr(ssl.TLSVersion, maximum_version)
156+
context.maximum_version = maximum_version
155157
else:
156158
raise RuntimeError("setting tls_maximum_version requires Python 3.7 and OpenSSL 1.1 or newer")
157159
if minimum_version is not None:
158160
if hasattr(context, "minimum_version"):
159-
context.minimum_version = getattr(ssl.TLSVersion, minimum_version)
161+
if isinstance(minimum_version, str):
162+
minimum_version = getattr(ssl.TLSVersion, minimum_version)
163+
context.minimum_version = minimum_version
160164
else:
161165
raise RuntimeError("setting tls_minimum_version requires Python 3.7 and OpenSSL 1.1 or newer")
162-
163166
# check_hostname requires python 3.4+
164167
# we will perform the equivalent in HTTPSConnectionWithTimeout.connect() by calling ssl.match_hostname
165168
# if check_hostname is not supported.
@@ -180,6 +183,20 @@ def _get_end2end_headers(response):
180183
return [header for header in list(response.keys()) if header not in hopbyhop]
181184

182185

186+
def _errno_from_exception(e):
187+
# socket.error and common wrap in .args
188+
if len(e.args) > 0:
189+
return e.args[0].errno if isinstance(e.args[0], socket.error) else e.errno
190+
191+
# pysocks.ProxyError wraps in .socket_err
192+
# https://github.com/httplib2/httplib2/pull/202
193+
if hasattr(e, "socket_err"):
194+
e_int = e.socket_err
195+
return e_int.args[0].errno if isinstance(e_int.args[0], socket.error) else e_int.errno
196+
197+
return None
198+
199+
183200
URI = re.compile(r"^(([^:/?#]+):)?(//([^/?#]*))?([^?#]*)(\?([^#]*))?(#(.*))?")
184201

185202

@@ -223,7 +240,7 @@ def safename(filename):
223240
filename = filename.decode("utf-8")
224241
else:
225242
filename_bytes = filename.encode("utf-8")
226-
filemd5 = _md5(filename_bytes).hexdigest()
243+
filesha1 = _sha(filename_bytes).hexdigest()
227244
filename = re_url_scheme.sub("", filename)
228245
filename = re_unsafe.sub("", filename)
229246

@@ -234,7 +251,7 @@ def safename(filename):
234251
# Thus max safe filename x = 93 chars. Let it be 90 to make a round sum:
235252
filename = filename[:90]
236253

237-
return ",".join((filename, filemd5))
254+
return ",".join((filename, filesha1))
238255

239256

240257
NORMALIZE_SPACE = re.compile(r"(?:\r\n)?[ \t]+")
@@ -834,10 +851,10 @@ def __init__(
834851
proxy_headers: Additional or modified headers for the proxy connect
835852
request.
836853
"""
837-
if isinstance(proxy_user, bytes):
838-
proxy_user = proxy_user.decode()
839-
if isinstance(proxy_pass, bytes):
840-
proxy_pass = proxy_pass.decode()
854+
if isinstance(proxy_user, str):
855+
proxy_user = proxy_user.encode()
856+
if isinstance(proxy_pass, str):
857+
proxy_pass = proxy_pass.encode()
841858
(
842859
self.proxy_type,
843860
self.proxy_host,
@@ -913,34 +930,14 @@ def proxy_info_from_url(url, method="http", noproxy=None):
913930
"""Construct a ProxyInfo from a URL (such as http_proxy env var)
914931
"""
915932
url = urllib.parse.urlparse(url)
916-
username = None
917-
password = None
918-
port = None
919-
if "@" in url[1]:
920-
ident, host_port = url[1].split("@", 1)
921-
if ":" in ident:
922-
username, password = ident.split(":", 1)
923-
else:
924-
password = ident
925-
else:
926-
host_port = url[1]
927-
if ":" in host_port:
928-
host, port = host_port.split(":", 1)
929-
else:
930-
host = host_port
931-
932-
if port:
933-
port = int(port)
934-
else:
935-
port = dict(https=443, http=80)[method]
936933

937934
proxy_type = 3 # socks.PROXY_TYPE_HTTP
938935
pi = ProxyInfo(
939936
proxy_type=proxy_type,
940-
proxy_host=host,
941-
proxy_port=port,
942-
proxy_user=username or None,
943-
proxy_pass=password or None,
937+
proxy_host=url.hostname,
938+
proxy_port=url.port or dict(https=443, http=80)[method],
939+
proxy_user=url.username or None,
940+
proxy_pass=url.password or None,
944941
proxy_headers=None,
945942
)
946943

@@ -1068,6 +1065,7 @@ def __init__(
10681065
tls_maximum_version=None,
10691066
tls_minimum_version=None,
10701067
key_password=None,
1068+
context=None
10711069
):
10721070

10731071
self.disable_ssl_certificate_validation = disable_ssl_certificate_validation
@@ -1077,15 +1075,16 @@ def __init__(
10771075
if proxy_info and not isinstance(proxy_info, ProxyInfo):
10781076
self.proxy_info = proxy_info("https")
10791077

1080-
context = _build_ssl_context(
1081-
self.disable_ssl_certificate_validation,
1082-
self.ca_certs,
1083-
cert_file,
1084-
key_file,
1085-
maximum_version=tls_maximum_version,
1086-
minimum_version=tls_minimum_version,
1087-
key_password=key_password,
1088-
)
1078+
if context is None:
1079+
context = _build_ssl_context(
1080+
self.disable_ssl_certificate_validation,
1081+
self.ca_certs,
1082+
cert_file,
1083+
key_file,
1084+
maximum_version=tls_maximum_version,
1085+
minimum_version=tls_minimum_version,
1086+
key_password=key_password,
1087+
)
10891088
super(HTTPSConnectionWithTimeout, self).__init__(
10901089
host, port=port, timeout=timeout, context=context,
10911090
)
@@ -1212,6 +1211,7 @@ def __init__(
12121211
disable_ssl_certificate_validation=False,
12131212
tls_maximum_version=None,
12141213
tls_minimum_version=None,
1214+
context=None,
12151215
):
12161216
"""If 'cache' is a string then it is used as a directory name for
12171217
a disk cache. Otherwise it must be an object that supports the
@@ -1238,12 +1238,13 @@ def __init__(
12381238
12391239
tls_maximum_version / tls_minimum_version require Python 3.7+ /
12401240
OpenSSL 1.1.0g+. A value of "TLSv1_3" requires OpenSSL 1.1.1+.
1241-
"""
1241+
"""
12421242
self.proxy_info = proxy_info
12431243
self.ca_certs = ca_certs
12441244
self.disable_ssl_certificate_validation = disable_ssl_certificate_validation
12451245
self.tls_maximum_version = tls_maximum_version
12461246
self.tls_minimum_version = tls_minimum_version
1247+
self.context = context
12471248
# Map domain name to an httplib connection
12481249
self.connections = {}
12491250
# The location of the cache, for now a directory
@@ -1352,7 +1353,7 @@ def _conn_request(self, conn, request_uri, method, body, headers):
13521353
conn.close()
13531354
raise ServerNotFoundError("Unable to find the server at %s" % conn.host)
13541355
except socket.error as e:
1355-
errno_ = e.args[0].errno if isinstance(e.args[0], socket.error) else e.errno
1356+
errno_ = _errno_from_exception(e)
13561357
if errno_ in (errno.ENETUNREACH, errno.EADDRNOTAVAIL) and i < RETRIES:
13571358
continue # retry on potentially transient errors
13581359
raise
@@ -1471,6 +1472,8 @@ def _request(
14711472
old_response["content-location"] = absolute_uri
14721473
redirect_method = method
14731474
if response.status in [302, 303]:
1475+
if 'content-length' in headers:
1476+
del headers['content-length']
14741477
redirect_method = "GET"
14751478
body = None
14761479
(response, content) = self.request(
@@ -1556,6 +1559,7 @@ def request(
15561559
tls_maximum_version=self.tls_maximum_version,
15571560
tls_minimum_version=self.tls_minimum_version,
15581561
key_password=certs[0][2],
1562+
context=self.context,
15591563
)
15601564
else:
15611565
conn = self.connections[conn_key] = connection_type(
@@ -1566,6 +1570,7 @@ def request(
15661570
disable_ssl_certificate_validation=self.disable_ssl_certificate_validation,
15671571
tls_maximum_version=self.tls_maximum_version,
15681572
tls_minimum_version=self.tls_minimum_version,
1573+
context=self.context,
15691574
)
15701575
else:
15711576
conn = self.connections[conn_key] = connection_type(
@@ -1657,12 +1662,8 @@ def request(
16571662
entry_disposition = _entry_disposition(info, headers)
16581663

16591664
if entry_disposition == "FRESH":
1660-
if not cached_value:
1661-
info["status"] = "504"
1662-
content = b""
16631665
response = Response(info)
1664-
if cached_value:
1665-
response.fromcache = True
1666+
response.fromcache = True
16661667
return (response, content)
16671668

16681669
if entry_disposition == "STALE":

TA-egnyte-connect/bin/ta_egnyte_connect/aob_py3/httplib2/auth.py

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,12 @@
55

66
from .error import *
77

8+
9+
try: # pyparsing>=3.0.0
10+
downcaseTokens = pp.common.downcaseTokens
11+
except AttributeError:
12+
downcaseTokens = pp.downcaseTokens
13+
814
UNQUOTE_PAIRS = re.compile(r"\\(.)")
915
unquote = lambda s, l, t: UNQUOTE_PAIRS.sub(r"\1", t[0][1:-1])
1016

@@ -17,7 +23,7 @@
1723
)
1824

1925
quoted_string = pp.dblQuotedString.copy().setName("quoted-string").setParseAction(unquote)
20-
auth_param_name = token.copy().setName("auth-param-name").addParseAction(pp.downcaseTokens)
26+
auth_param_name = token.copy().setName("auth-param-name").addParseAction(downcaseTokens)
2127
auth_param = auth_param_name + pp.Suppress("=") + (quoted_string | token)
2228
params = pp.Dict(pp.delimitedList(pp.Group(auth_param)))
2329

TA-egnyte-connect/bin/ta_egnyte_connect/aob_py3/httplib2/cacerts.txt

Lines changed: 56 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -2138,34 +2138,6 @@ hdVddLHRDiBYmxOlsGOm7XtH/UVVMKTumtTm4ofvmMkyghEpIrwACjFeLQ/Ajulr
21382138
so8uBtjRkcfGEvRM/TAXw8HaOFvjqermobp573PYtlNXLfbQ4ddI
21392139
-----END CERTIFICATE-----
21402140

2141-
# Issuer: O=Digital Signature Trust Co., CN=DST Root CA X3
2142-
# Subject: O=Digital Signature Trust Co., CN=DST Root CA X3
2143-
# Label: "IdenTrust DST Root CA X3"
2144-
# Serial: 44AFB080D6A327BA893039862EF8406B
2145-
# MD5 Fingerprint: 41:03:52:DC:0F:F7:50:1B:16:F0:02:8E:BA:6F:45:C5
2146-
# SHA1 Fingerprint: DA:C9:02:4F:54:D8:F6:DF:94:93:5F:B1:73:26:38:CA:6A:D7:7C:13
2147-
# SHA256 Fingerprint: 06:87:26:03:31:A7:24:03:D9:09:F1:05:E6:9B:CF:0D:32:E1:BD:24:93:FF:C6:D9:20:6D:11:BC:D6:77:07:39
2148-
-----BEGIN CERTIFICATE-----
2149-
MIIDSjCCAjKgAwIBAgIQRK+wgNajJ7qJMDmGLvhAazANBgkqhkiG9w0BAQUFADA/
2150-
MSQwIgYDVQQKExtEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdCBDby4xFzAVBgNVBAMT
2151-
DkRTVCBSb290IENBIFgzMB4XDTAwMDkzMDIxMTIxOVoXDTIxMDkzMDE0MDExNVow
2152-
PzEkMCIGA1UEChMbRGlnaXRhbCBTaWduYXR1cmUgVHJ1c3QgQ28uMRcwFQYDVQQD
2153-
Ew5EU1QgUm9vdCBDQSBYMzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB
2154-
AN+v6ZdQCINXtMxiZfaQguzH0yxrMMpb7NnDfcdAwRgUi+DoM3ZJKuM/IUmTrE4O
2155-
rz5Iy2Xu/NMhD2XSKtkyj4zl93ewEnu1lcCJo6m67XMuegwGMoOifooUMM0RoOEq
2156-
OLl5CjH9UL2AZd+3UWODyOKIYepLYYHsUmu5ouJLGiifSKOeDNoJjj4XLh7dIN9b
2157-
xiqKqy69cK3FCxolkHRyxXtqqzTWMIn/5WgTe1QLyNau7Fqckh49ZLOMxt+/yUFw
2158-
7BZy1SbsOFU5Q9D8/RhcQPGX69Wam40dutolucbY38EVAjqr2m7xPi71XAicPNaD
2159-
aeQQmxkqtilX4+U9m5/wAl0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNV
2160-
HQ8BAf8EBAMCAQYwHQYDVR0OBBYEFMSnsaR7LHH62+FLkHX/xBVghYkQMA0GCSqG
2161-
SIb3DQEBBQUAA4IBAQCjGiybFwBcqR7uKGY3Or+Dxz9LwwmglSBd49lZRNI+DT69
2162-
ikugdB/OEIKcdBodfpga3csTS7MgROSR6cz8faXbauX+5v3gTt23ADq1cEmv8uXr
2163-
AvHRAosZy5Q6XkjEGB5YGV8eAlrwDPGxrancWYaLbumR9YbK+rlmM6pZW87ipxZz
2164-
R8srzJmwN0jP41ZL9c8PDHIyh8bwRLtTcm1D9SZImlJnt1ir/md2cXjbDaJWFBM5
2165-
JDGFoqgCWjBH4d1QB7wCCZAA62RjYJsWvIjJEubSfZGL+T0yjWW06XyxV3bqxbYo
2166-
Ob8VZRzI9neWagqNdwvYkQsEjgfbKbYK7p2CNTUQ
2167-
-----END CERTIFICATE-----
2168-
21692141
# Issuer: CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US
21702142
# Subject: CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US
21712143
# Serial: 33af1e6a711a9a0bb2864b11d09fae5
@@ -2195,3 +2167,59 @@ pLiaWN0bfVKfjllDiIGknibVb63dDcY3fe0Dkhvld1927jyNxF1WW6LZZm6zNTfl
21952167
MrY=
21962168
-----END CERTIFICATE-----
21972169

2170+
# Issuer: /C=US/O=Internet Security Research Group/CN=ISRG Root X1
2171+
# Subject: /C=US/O=Internet Security Research Group/CN=ISRG Root X1
2172+
# Serial: 8210CFB0D240E3594463E0BB63828B00
2173+
# SHA1 Fingerprint: CA:BD:2A:79:A1:07:6A:31:F2:1D:25:36:35:CB:03:9D:43:29:A5:E8
2174+
# SHA256 Fingerprint: 96:BC:EC:06:26:49:76:F3:74:60:77:9A:CF:28:C5:A7:CF:E8:A3:C0:AA:E1:1A:8F:FC:EE:05:C0:BD:DF:08:C6
2175+
-----BEGIN CERTIFICATE-----
2176+
MIIFazCCA1OgAwIBAgIRAIIQz7DSQONZRGPgu2OCiwAwDQYJKoZIhvcNAQELBQAw
2177+
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
2178+
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMTUwNjA0MTEwNDM4
2179+
WhcNMzUwNjA0MTEwNDM4WjBPMQswCQYDVQQGEwJVUzEpMCcGA1UEChMgSW50ZXJu
2180+
ZXQgU2VjdXJpdHkgUmVzZWFyY2ggR3JvdXAxFTATBgNVBAMTDElTUkcgUm9vdCBY
2181+
MTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAK3oJHP0FDfzm54rVygc
2182+
h77ct984kIxuPOZXoHj3dcKi/vVqbvYATyjb3miGbESTtrFj/RQSa78f0uoxmyF+
2183+
0TM8ukj13Xnfs7j/EvEhmkvBioZxaUpmZmyPfjxwv60pIgbz5MDmgK7iS4+3mX6U
2184+
A5/TR5d8mUgjU+g4rk8Kb4Mu0UlXjIB0ttov0DiNewNwIRt18jA8+o+u3dpjq+sW
2185+
T8KOEUt+zwvo/7V3LvSye0rgTBIlDHCNAymg4VMk7BPZ7hm/ELNKjD+Jo2FR3qyH
2186+
B5T0Y3HsLuJvW5iB4YlcNHlsdu87kGJ55tukmi8mxdAQ4Q7e2RCOFvu396j3x+UC
2187+
B5iPNgiV5+I3lg02dZ77DnKxHZu8A/lJBdiB3QW0KtZB6awBdpUKD9jf1b0SHzUv
2188+
KBds0pjBqAlkd25HN7rOrFleaJ1/ctaJxQZBKT5ZPt0m9STJEadao0xAH0ahmbWn
2189+
OlFuhjuefXKnEgV4We0+UXgVCwOPjdAvBbI+e0ocS3MFEvzG6uBQE3xDk3SzynTn
2190+
jh8BCNAw1FtxNrQHusEwMFxIt4I7mKZ9YIqioymCzLq9gwQbooMDQaHWBfEbwrbw
2191+
qHyGO0aoSCqI3Haadr8faqU9GY/rOPNk3sgrDQoo//fb4hVC1CLQJ13hef4Y53CI
2192+
rU7m2Ys6xt0nUW7/vGT1M0NPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNV
2193+
HRMBAf8EBTADAQH/MB0GA1UdDgQWBBR5tFnme7bl5AFzgAiIyBpY9umbbjANBgkq
2194+
hkiG9w0BAQsFAAOCAgEAVR9YqbyyqFDQDLHYGmkgJykIrGF1XIpu+ILlaS/V9lZL
2195+
ubhzEFnTIZd+50xx+7LSYK05qAvqFyFWhfFQDlnrzuBZ6brJFe+GnY+EgPbk6ZGQ
2196+
3BebYhtF8GaV0nxvwuo77x/Py9auJ/GpsMiu/X1+mvoiBOv/2X/qkSsisRcOj/KK
2197+
NFtY2PwByVS5uCbMiogziUwthDyC3+6WVwW6LLv3xLfHTjuCvjHIInNzktHCgKQ5
2198+
ORAzI4JMPJ+GslWYHb4phowim57iaztXOoJwTdwJx4nLCgdNbOhdjsnvzqvHu7Ur
2199+
TkXWStAmzOVyyghqpZXjFaH3pO3JLF+l+/+sKAIuvtd7u+Nxe5AW0wdeRlN8NwdC
2200+
jNPElpzVmbUq4JUagEiuTDkHzsxHpFKVK7q4+63SM1N95R1NbdWhscdCb+ZAJzVc
2201+
oyi3B43njTOQ5yOf+1CceWxG1bQVs5ZufpsMljq4Ui0/1lvh+wjChP4kqKOJ2qxq
2202+
4RgqsahDYVvTH9w7jXbyLeiNdd8XM2w9U/t7y0Ff/9yi0GE44Za4rF2LN9d11TPA
2203+
mRGunUHBcnWEvgJBQl9nJEiU0Zsnvgc/ubhPgXRR4Xq37Z0j4r7g1SgEEzwxA57d
2204+
emyPxgcYxn/eR44/KJ4EBs+lVDR3veyJm+kXQ99b21/+jh5Xos1AnX5iItreGCc=
2205+
-----END CERTIFICATE-----
2206+
2207+
# Issuer: /C=US/O=Internet Security Research Group/CN=ISRG Root X2
2208+
# Subject: /C=US/O=Internet Security Research Group/CN=ISRG Root X2
2209+
# Serial: 41D29DD172EAEEA780C12C6CE92F8752
2210+
# SHA1 Fingerprint: BD:B1:B9:3C:D5:97:8D:45:C6:26:14:55:F8:DB:95:C7:5A:D1:53:AF
2211+
# SHA256 Fingerprint: 69:72:9B:8E:15:A8:6E:FC:17:7A:57:AF:B7:17:1D:FC:64:AD:D2:8C:2F:CA:8C:F1:50:7E:34:45:3C:CB:14:70
2212+
-----BEGIN CERTIFICATE-----
2213+
MIICGzCCAaGgAwIBAgIQQdKd0XLq7qeAwSxs6S+HUjAKBggqhkjOPQQDAzBPMQsw
2214+
CQYDVQQGEwJVUzEpMCcGA1UEChMgSW50ZXJuZXQgU2VjdXJpdHkgUmVzZWFyY2gg
2215+
R3JvdXAxFTATBgNVBAMTDElTUkcgUm9vdCBYMjAeFw0yMDA5MDQwMDAwMDBaFw00
2216+
MDA5MTcxNjAwMDBaME8xCzAJBgNVBAYTAlVTMSkwJwYDVQQKEyBJbnRlcm5ldCBT
2217+
ZWN1cml0eSBSZXNlYXJjaCBHcm91cDEVMBMGA1UEAxMMSVNSRyBSb290IFgyMHYw
2218+
EAYHKoZIzj0CAQYFK4EEACIDYgAEzZvVn4CDCuwJSvMWSj5cz3es3mcFDR0HttwW
2219+
+1qLFNvicWDEukWVEYmO6gbf9yoWHKS5xcUy4APgHoIYOIvXRdgKam7mAHf7AlF9
2220+
ItgKbppbd9/w+kHsOdx1ymgHDB/qo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0T
2221+
AQH/BAUwAwEB/zAdBgNVHQ4EFgQUfEKWrt5LSDv6kviejM9ti6lyN5UwCgYIKoZI
2222+
zj0EAwMDaAAwZQIwe3lORlCEwkSHRhtFcP9Ymd70/aTSVaYgLXTWNLxBo1BfASdW
2223+
tL4ndQavEi51mI38AjEAi/V3bNTIZargCyzuFJ0nN6T5U6VR5CmD1/iQMVtCnwr1
2224+
/q4AaOeMSQ+2b1tbFfLn
2225+
-----END CERTIFICATE-----

TA-egnyte-connect/default/app.conf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ state = enabled
66
build = 1
77

88
[launcher]
9-
version = 1.0.5
9+
version = 1.0.6
1010
author = Egnyte Inc
1111
description = This TA provides interface to ingest events from Egnyte Collaborate into Splunk.
1212

0 commit comments

Comments
 (0)