@contrast/common
Advanced tools
Comparing version 1.6.0 to 1.7.0
@@ -36,3 +36,2 @@ import { CommonRulesResultsMap, HardeningResultsMap, ResultMap, SemanticAnalysisResultsMap, ServerFeaturePreliminaryResultsMap } from './types'; | ||
'agent.security_logger.syslog.severity_probed': (remoteData: any) => any; | ||
'agent.security_logger.syslog.severity_suspicious': (remoteData: any) => any; | ||
}; | ||
@@ -39,0 +38,0 @@ export declare const settingsReaders: {}; |
@@ -191,12 +191,11 @@ "use strict"; | ||
exports.featureReaders = { | ||
'agent.logger.level': (remoteData) => remoteData.features?.logLevel, | ||
'agent.logger.path': (remoteData) => remoteData.features?.logFile, | ||
'agent.security_logger.syslog.enable': (remoteData) => remoteData.features?.defend?.syslog?.syslogEnabled, | ||
'agent.security_logger.syslog.ip': (remoteData) => remoteData.features?.defend?.syslog?.syslogIpAddress, | ||
'agent.security_logger.syslog.port': (remoteData) => remoteData.features?.defend?.syslog?.syslogPortNumber, | ||
'agent.security_logger.syslog.facility': (remoteData) => remoteData.features?.defend?.syslog?.syslogFacilityCode, | ||
'agent.security_logger.syslog.severity_exploited': (remoteData) => remoteData.features?.defend?.syslog?.syslogSeverityExploited, | ||
'agent.security_logger.syslog.severity_blocked': (remoteData) => remoteData.features?.defend?.syslog?.syslogSeverityBlocked, | ||
'agent.security_logger.syslog.severity_probed': (remoteData) => remoteData.features?.defend?.syslog?.syslogSeverityProbed, | ||
'agent.security_logger.syslog.severity_suspicious': (remoteData) => remoteData.features?.defend?.syslog?.syslogSeveritySuspicious, | ||
'agent.logger.level': (remoteData) => remoteData.logger?.level, | ||
'agent.logger.path': (remoteData) => remoteData.logger?.path, | ||
'agent.security_logger.syslog.enable': (remoteData) => remoteData.security_logger?.syslog?.enable, | ||
'agent.security_logger.syslog.ip': (remoteData) => remoteData.security_logger?.syslog?.ip, | ||
'agent.security_logger.syslog.port': (remoteData) => remoteData.security_logger?.syslog?.port, | ||
'agent.security_logger.syslog.facility': (remoteData) => remoteData.security_logger?.syslog?.facility, | ||
'agent.security_logger.syslog.severity_exploited': (remoteData) => remoteData.security_logger?.syslog?.severity_exploited, | ||
'agent.security_logger.syslog.severity_blocked': (remoteData) => remoteData.security_logger?.syslog?.severity_blocked, | ||
'agent.security_logger.syslog.severity_probed': (remoteData) => remoteData.security_logger?.syslog?.severity_probed, | ||
}; | ||
@@ -223,7 +222,8 @@ exports.settingsReaders = [ | ||
[name]: (remoteData) => { | ||
const remoteSetting = remoteData.settings?.defend?.protectionRules?.find((r) => r.id == ruleId); | ||
const remoteSetting = remoteData?.protect?.rules?.[ruleId]; | ||
switch (remoteSetting?.mode) { | ||
case 'OFF': return constants_1.ProtectRuleMode.OFF; | ||
case 'MONITORING': return constants_1.ProtectRuleMode.MONITOR; | ||
case 'BLOCKING': return remoteSetting.blockAtEntry ? constants_1.ProtectRuleMode.BLOCK_AT_PERIMETER : constants_1.ProtectRuleMode.BLOCK; | ||
case 'BLOCKING': return constants_1.ProtectRuleMode.BLOCK; | ||
case 'BLOCK_AT_PERIMETER': return constants_1.ProtectRuleMode.BLOCK_AT_PERIMETER; | ||
} | ||
@@ -230,0 +230,0 @@ } |
{ | ||
"name": "@contrast/common", | ||
"version": "1.6.0", | ||
"version": "1.7.0", | ||
"description": "Shared constants and utilities for all Contrast Agent modules", | ||
@@ -5,0 +5,0 @@ "license": "UNLICENSED", |
@@ -209,12 +209,11 @@ /* | ||
export const featureReaders = { | ||
'agent.logger.level': (remoteData: any) => remoteData.features?.logLevel, | ||
'agent.logger.path': (remoteData: any) => remoteData.features?.logFile, | ||
'agent.security_logger.syslog.enable': (remoteData: any) => remoteData.features?.defend?.syslog?.syslogEnabled, | ||
'agent.security_logger.syslog.ip': (remoteData: any) => remoteData.features?.defend?.syslog?.syslogIpAddress, | ||
'agent.security_logger.syslog.port': (remoteData: any) => remoteData.features?.defend?.syslog?.syslogPortNumber, | ||
'agent.security_logger.syslog.facility': (remoteData: any) => remoteData.features?.defend?.syslog?.syslogFacilityCode, | ||
'agent.security_logger.syslog.severity_exploited': (remoteData: any) => remoteData.features?.defend?.syslog?.syslogSeverityExploited, | ||
'agent.security_logger.syslog.severity_blocked': (remoteData: any) => remoteData.features?.defend?.syslog?.syslogSeverityBlocked, | ||
'agent.security_logger.syslog.severity_probed': (remoteData: any) => remoteData.features?.defend?.syslog?.syslogSeverityProbed, | ||
'agent.security_logger.syslog.severity_suspicious': (remoteData: any) => remoteData.features?.defend?.syslog?.syslogSeveritySuspicious, | ||
'agent.logger.level': (remoteData: any) => remoteData.logger?.level, | ||
'agent.logger.path': (remoteData: any) => remoteData.logger?.path, | ||
'agent.security_logger.syslog.enable': (remoteData: any) => remoteData.security_logger?.syslog?.enable, | ||
'agent.security_logger.syslog.ip': (remoteData: any) => remoteData.security_logger?.syslog?.ip, | ||
'agent.security_logger.syslog.port': (remoteData: any) => remoteData.security_logger?.syslog?.port, | ||
'agent.security_logger.syslog.facility': (remoteData: any) => remoteData.security_logger?.syslog?.facility, | ||
'agent.security_logger.syslog.severity_exploited': (remoteData: any) => remoteData.security_logger?.syslog?.severity_exploited, | ||
'agent.security_logger.syslog.severity_blocked': (remoteData: any) => remoteData.security_logger?.syslog?.severity_blocked, | ||
'agent.security_logger.syslog.severity_probed': (remoteData: any) => remoteData.security_logger?.syslog?.severity_probed, | ||
}; | ||
@@ -242,7 +241,8 @@ | ||
[name]: (remoteData: any) => { | ||
const remoteSetting = remoteData.settings?.defend?.protectionRules?.find((r: any) => r.id == ruleId); | ||
const remoteSetting = remoteData?.protect?.rules?.[ruleId]; | ||
switch (remoteSetting?.mode) { | ||
case 'OFF': return ProtectRuleMode.OFF; | ||
case 'MONITORING': return ProtectRuleMode.MONITOR; | ||
case 'BLOCKING': return remoteSetting.blockAtEntry ? ProtectRuleMode.BLOCK_AT_PERIMETER : ProtectRuleMode.BLOCK; | ||
case 'BLOCKING': return ProtectRuleMode.BLOCK; | ||
case 'BLOCK_AT_PERIMETER': return ProtectRuleMode.BLOCK_AT_PERIMETER; | ||
} | ||
@@ -249,0 +249,0 @@ } |
Sorry, the diff of this file is not supported yet
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
56935
1116