From 1119c3f137380e4d941928e31f0da89f7596bde5 Mon Sep 17 00:00:00 2001 From: Jonhnathan <26856693+w0rk3r@users.noreply.github.com> Date: Thu, 18 Dec 2025 10:56:09 -0300 Subject: [PATCH] [Docs] Fix Docs Unit Test (#5496) * Update docset.yml * Rename README.md to readme.md * Update pyproject.toml --- docs/audit_policies/windows/{README.md => readme.md} | 2 +- docs/docset.yml | 4 ++-- pyproject.toml | 2 +- 3 files changed, 4 insertions(+), 4 deletions(-) rename docs/audit_policies/windows/{README.md => readme.md} (99%) diff --git a/docs/audit_policies/windows/README.md b/docs/audit_policies/windows/readme.md similarity index 99% rename from docs/audit_policies/windows/README.md rename to docs/audit_policies/windows/readme.md index 66e703132..507410bd6 100644 --- a/docs/audit_policies/windows/README.md +++ b/docs/audit_policies/windows/readme.md @@ -49,4 +49,4 @@ For a production-ready and more integrated solution that is designed to work wit * [Sysmon Event IDs 17, 18: Named Pipe Events](sysmon_eventid17_18_pipe_event.md) * [Sysmon Event IDs 19, 20, 21: WMI Events](sysmon_eventid19_20_21_wmi_event.md) * [Sysmon Event ID 22: DNS Query](sysmon_eventid22_dns_query.md) -* [Sysmon Event ID 23: File Delete](sysmon_eventid23_file_delete.md) \ No newline at end of file +* [Sysmon Event ID 23: File Delete](sysmon_eventid23_file_delete.md) diff --git a/docs/docset.yml b/docs/docset.yml index 4a954a464..76b35f827 100644 --- a/docs/docset.yml +++ b/docs/docset.yml @@ -3,7 +3,7 @@ cross_links: - docs-content exclude: - '_*.md' - - 'README.md' + - 'readme.md' extensions: - detection-rules @@ -13,7 +13,7 @@ toc: detection_rules: ['../rules', '../rules_building_block'] - folder: audit_policies/windows children: - - file: README.md + - file: readme.md - file: audit_authorization_policy_change.md - file: audit_computer_account_management.md - file: audit_detailed_file_share.md diff --git a/pyproject.toml b/pyproject.toml index 350f74e65..dc86a2c61 100644 --- a/pyproject.toml +++ b/pyproject.toml @@ -1,6 +1,6 @@ [project] name = "detection_rules" -version = "1.5.23" +version = "1.5.24" description = "Detection Rules is the home for rules used by Elastic Security. This repository is used for the development, maintenance, testing, validation, and release of rules for Elastic Security’s Detection Engine." readme = "README.md" requires-python = ">=3.12"