Socket
Socket
Sign inDemoInstall

@contrast/common

Package Overview
Dependencies
Maintainers
15
Versions
43
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@contrast/common - npm Package Compare versions

Comparing version 1.6.0 to 1.7.0

1

lib/index.d.ts

@@ -36,3 +36,2 @@ import { CommonRulesResultsMap, HardeningResultsMap, ResultMap, SemanticAnalysisResultsMap, ServerFeaturePreliminaryResultsMap } from './types';

'agent.security_logger.syslog.severity_probed': (remoteData: any) => any;
'agent.security_logger.syslog.severity_suspicious': (remoteData: any) => any;
};

@@ -39,0 +38,0 @@ export declare const settingsReaders: {};

24

lib/index.js

@@ -191,12 +191,11 @@ "use strict";

exports.featureReaders = {
'agent.logger.level': (remoteData) => remoteData.features?.logLevel,
'agent.logger.path': (remoteData) => remoteData.features?.logFile,
'agent.security_logger.syslog.enable': (remoteData) => remoteData.features?.defend?.syslog?.syslogEnabled,
'agent.security_logger.syslog.ip': (remoteData) => remoteData.features?.defend?.syslog?.syslogIpAddress,
'agent.security_logger.syslog.port': (remoteData) => remoteData.features?.defend?.syslog?.syslogPortNumber,
'agent.security_logger.syslog.facility': (remoteData) => remoteData.features?.defend?.syslog?.syslogFacilityCode,
'agent.security_logger.syslog.severity_exploited': (remoteData) => remoteData.features?.defend?.syslog?.syslogSeverityExploited,
'agent.security_logger.syslog.severity_blocked': (remoteData) => remoteData.features?.defend?.syslog?.syslogSeverityBlocked,
'agent.security_logger.syslog.severity_probed': (remoteData) => remoteData.features?.defend?.syslog?.syslogSeverityProbed,
'agent.security_logger.syslog.severity_suspicious': (remoteData) => remoteData.features?.defend?.syslog?.syslogSeveritySuspicious,
'agent.logger.level': (remoteData) => remoteData.logger?.level,
'agent.logger.path': (remoteData) => remoteData.logger?.path,
'agent.security_logger.syslog.enable': (remoteData) => remoteData.security_logger?.syslog?.enable,
'agent.security_logger.syslog.ip': (remoteData) => remoteData.security_logger?.syslog?.ip,
'agent.security_logger.syslog.port': (remoteData) => remoteData.security_logger?.syslog?.port,
'agent.security_logger.syslog.facility': (remoteData) => remoteData.security_logger?.syslog?.facility,
'agent.security_logger.syslog.severity_exploited': (remoteData) => remoteData.security_logger?.syslog?.severity_exploited,
'agent.security_logger.syslog.severity_blocked': (remoteData) => remoteData.security_logger?.syslog?.severity_blocked,
'agent.security_logger.syslog.severity_probed': (remoteData) => remoteData.security_logger?.syslog?.severity_probed,
};

@@ -223,7 +222,8 @@ exports.settingsReaders = [

[name]: (remoteData) => {
const remoteSetting = remoteData.settings?.defend?.protectionRules?.find((r) => r.id == ruleId);
const remoteSetting = remoteData?.protect?.rules?.[ruleId];
switch (remoteSetting?.mode) {
case 'OFF': return constants_1.ProtectRuleMode.OFF;
case 'MONITORING': return constants_1.ProtectRuleMode.MONITOR;
case 'BLOCKING': return remoteSetting.blockAtEntry ? constants_1.ProtectRuleMode.BLOCK_AT_PERIMETER : constants_1.ProtectRuleMode.BLOCK;
case 'BLOCKING': return constants_1.ProtectRuleMode.BLOCK;
case 'BLOCK_AT_PERIMETER': return constants_1.ProtectRuleMode.BLOCK_AT_PERIMETER;
}

@@ -230,0 +230,0 @@ }

{
"name": "@contrast/common",
"version": "1.6.0",
"version": "1.7.0",
"description": "Shared constants and utilities for all Contrast Agent modules",

@@ -5,0 +5,0 @@ "license": "UNLICENSED",

@@ -209,12 +209,11 @@ /*

export const featureReaders = {
'agent.logger.level': (remoteData: any) => remoteData.features?.logLevel,
'agent.logger.path': (remoteData: any) => remoteData.features?.logFile,
'agent.security_logger.syslog.enable': (remoteData: any) => remoteData.features?.defend?.syslog?.syslogEnabled,
'agent.security_logger.syslog.ip': (remoteData: any) => remoteData.features?.defend?.syslog?.syslogIpAddress,
'agent.security_logger.syslog.port': (remoteData: any) => remoteData.features?.defend?.syslog?.syslogPortNumber,
'agent.security_logger.syslog.facility': (remoteData: any) => remoteData.features?.defend?.syslog?.syslogFacilityCode,
'agent.security_logger.syslog.severity_exploited': (remoteData: any) => remoteData.features?.defend?.syslog?.syslogSeverityExploited,
'agent.security_logger.syslog.severity_blocked': (remoteData: any) => remoteData.features?.defend?.syslog?.syslogSeverityBlocked,
'agent.security_logger.syslog.severity_probed': (remoteData: any) => remoteData.features?.defend?.syslog?.syslogSeverityProbed,
'agent.security_logger.syslog.severity_suspicious': (remoteData: any) => remoteData.features?.defend?.syslog?.syslogSeveritySuspicious,
'agent.logger.level': (remoteData: any) => remoteData.logger?.level,
'agent.logger.path': (remoteData: any) => remoteData.logger?.path,
'agent.security_logger.syslog.enable': (remoteData: any) => remoteData.security_logger?.syslog?.enable,
'agent.security_logger.syslog.ip': (remoteData: any) => remoteData.security_logger?.syslog?.ip,
'agent.security_logger.syslog.port': (remoteData: any) => remoteData.security_logger?.syslog?.port,
'agent.security_logger.syslog.facility': (remoteData: any) => remoteData.security_logger?.syslog?.facility,
'agent.security_logger.syslog.severity_exploited': (remoteData: any) => remoteData.security_logger?.syslog?.severity_exploited,
'agent.security_logger.syslog.severity_blocked': (remoteData: any) => remoteData.security_logger?.syslog?.severity_blocked,
'agent.security_logger.syslog.severity_probed': (remoteData: any) => remoteData.security_logger?.syslog?.severity_probed,
};

@@ -242,7 +241,8 @@

[name]: (remoteData: any) => {
const remoteSetting = remoteData.settings?.defend?.protectionRules?.find((r: any) => r.id == ruleId);
const remoteSetting = remoteData?.protect?.rules?.[ruleId];
switch (remoteSetting?.mode) {
case 'OFF': return ProtectRuleMode.OFF;
case 'MONITORING': return ProtectRuleMode.MONITOR;
case 'BLOCKING': return remoteSetting.blockAtEntry ? ProtectRuleMode.BLOCK_AT_PERIMETER : ProtectRuleMode.BLOCK;
case 'BLOCKING': return ProtectRuleMode.BLOCK;
case 'BLOCK_AT_PERIMETER': return ProtectRuleMode.BLOCK_AT_PERIMETER;
}

@@ -249,0 +249,0 @@ }

Sorry, the diff of this file is not supported yet

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc