Skip to content

Commit 37b3b03

Browse files
[AAP] Update waf version to v1.25.1 (#7079)
## Summary of changes Update waf version to [v1.25.1](https://github.com/DataDog/libddwaf/releases/tag/1.25.1) [Jira](https://datadoghq.atlassian.net/browse/APPSEC-57273) ## Reason for change ## Implementation details ## Test coverage ## Other details <!-- Fixes #{issue} --> <!-- ⚠️ Note: where possible, please obtain 2 approvals prior to merging. Unless CODEOWNERS specifies otherwise, for external teams it is typically best to have one review from a team member, and one review from apm-dotnet. Trivial changes do not require 2 reviews. -->
1 parent 55cd002 commit 37b3b03

12 files changed

+12
-12
lines changed

tracer/build/_build/Build.Steps.cs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ partial class Build
6565

6666
AbsolutePath NativeBuildDirectory => RootDirectory / "obj";
6767

68-
const string LibDdwafVersion = "1.25.0";
68+
const string LibDdwafVersion = "1.25.1";
6969

7070
string[] OlderLibDdwafVersions = { "1.3.0", "1.10.0", "1.14.0", "1.16.0", "1.23.0" };
7171

tracer/build/smoke_test_snapshots/smoke_test_iis_snapshots.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@
1919
"http.status_code": "404",
2020
"network.client.ip": "::1",
2121
"http.client_ip": "::1",
22-
"_dd.appsec.waf.version": "1.25.0",
22+
"_dd.appsec.waf.version": "1.25.1",
2323
"_dd.p.dm": "-5",
2424
"_dd.p.tid": "67a4e73b00000000",
2525
"runtime-id": "05dff020-c9cc-4b50-9395-e1fe88603312",

tracer/build/smoke_test_snapshots/smoke_test_snapshots.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@
3939
"type": "web",
4040
"meta": {
4141
"_dd.appsec.event_rules.version": "1.13.3",
42-
"_dd.appsec.waf.version": "1.25.0",
42+
"_dd.appsec.waf.version": "1.25.1",
4343
"_dd.runtime_family": "dotnet",
4444
"_dd.appsec.s.req.params": "H4sIAAAAAAAAA4uuVkrOzyspys/JSS1Ssoq2iNVRSkwuyczPA3NqYwH+CR9jIQAAAA==",
4545
"_dd.appsec.s.res.body": "H4sIAAAAAAAAA4u2iAUA8YntnQMAAAA=",

tracer/build/smoke_test_snapshots/smoke_test_snapshots_2_1.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@
3939
"type": "web",
4040
"meta": {
4141
"_dd.appsec.event_rules.version": "1.13.3",
42-
"_dd.appsec.waf.version": "1.25.0",
42+
"_dd.appsec.waf.version": "1.25.1",
4343
"_dd.runtime_family": "dotnet",
4444
"_dd.appsec.s.res.body": "H4sIAAAAAAAAA4u2iAUA8YntnQMAAAA=",
4545
"_dd.appsec.s.req.headers": "H4sIAAAAAAAAA4WOMQrAIBDA/uKsQ7fiVw6Ho4oVrIp3Q4v491JcLc4JJNAEVzwcMbITGgB2Y2QT0SWht27kwAWrSzzlt7LIaLNXjJ4WCuFVYkhelRpyDfws/NFVwa7S3+SfdmaarXfzAg6PMlH9AAAA",

tracer/test/snapshots/Security.AspNetCore5AsmInitializationSecurityEnabled.TestSecurityInitialization.verified.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@
3535
_dd.appsec.fp.http.network: net-1-1000000000,
3636
_dd.appsec.fp.session: ssn----<SessionFp>,
3737
_dd.appsec.json: {"triggers":[{"rule":{"id":"crs-942-290","name":"Finds basic MongoDB SQL injection attempts","tags":{"category":"attack_attempt","type":"nosql_injection"}},"rule_matches":[{"operator":"match_regex","operator_value":"(?i:(?:\\[?\\$(?:(?:s(?:lic|iz)|wher)e|e(?:lemMatch|xists|q)|n(?:o[rt]|in?|e)|l(?:ike|te?)|t(?:ext|ype)|a(?:ll|nd)|jsonSchema|between|regex|x?or|div|mod)\\]?)\\b)","parameters":[{"address":"server.request.query","highlight":["[$slice"],"key_path":["[$slice]"],"value":"[$slice]"}]}]}]},
38-
_dd.appsec.waf.version: 1.25.0,
38+
_dd.appsec.waf.version: 1.25.1,
3939
_dd.origin: appsec,
4040
_dd.runtime_family: dotnet
4141
},

tracer/test/snapshots/Security.AspNetCore5AsmInitializationSecurityEnabledWithBadRuleset.TestSecurityInitialization.verified.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@
3232
_dd.appsec.event_rules.errors: {"missing key 'name'":["crs-913-110","crs-913-120","crs-920-260"],"missing key 'tags'":["crs-921-110","crs-921-140"]},
3333
_dd.appsec.event_rules.version: 1.3.1,
3434
_dd.appsec.json: {"triggers":[{"rule":{"id":"crs-942-290","name":"Finds basic MongoDB SQL injection attempts","tags":{"category":"attack_attempt","type":"nosql_injection"}},"rule_matches":[{"operator":"match_regex","operator_value":"(?i:(?:\\[\\$(?:ne|eq|lte?|gte?|n?in|mod|all|size|exists|type|slice|x?or|div|like|between|and)\\]))","parameters":[{"address":"server.request.query","highlight":["[$slice]"],"key_path":["[$slice]"],"value":"[$slice]"}]}]}]},
35-
_dd.appsec.waf.version: 1.25.0,
35+
_dd.appsec.waf.version: 1.25.1,
3636
_dd.origin: appsec,
3737
_dd.runtime_family: dotnet
3838
},

tracer/test/snapshots/Security.AspNetMvc5AsmData.Classic.enableSecurity=True.__test=blocking-ips_url=_.verified.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@
4444
runtime-id: Guid_1,
4545
span.kind: server,
4646
_dd.appsec.event_rules.version: 1.13.3,
47-
_dd.appsec.waf.version: 1.25.0,
47+
_dd.appsec.waf.version: 1.25.1,
4848
_dd.runtime_family: dotnet
4949
},
5050
Metrics: {

tracer/test/snapshots/Security.AspNetMvc5AsmData.Integrated.enableSecurity=True.__test=blocking-ips_url=_.verified.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@
4444
runtime-id: Guid_1,
4545
span.kind: server,
4646
_dd.appsec.event_rules.version: 1.13.3,
47-
_dd.appsec.waf.version: 1.25.0,
47+
_dd.appsec.waf.version: 1.25.1,
4848
_dd.runtime_family: dotnet
4949
},
5050
Metrics: {

tracer/test/snapshots/Security.AspNetWebApiAsmData.Classic.enableSecurity=True.__test=blocking-user_url=_api_user.verified.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@
4343
usr.id: user3,
4444
_dd.appsec.event_rules.version: 1.13.3,
4545
_dd.appsec.user.collection_mode: sdk,
46-
_dd.appsec.waf.version: 1.25.0,
46+
_dd.appsec.waf.version: 1.25.1,
4747
_dd.runtime_family: dotnet
4848
},
4949
Metrics: {

tracer/test/snapshots/Security.AspNetWebApiAsmData.Integrated.enableSecurity=True.__test=blocking-ips_url=_api_health.verified.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@
4141
runtime-id: Guid_1,
4242
span.kind: server,
4343
_dd.appsec.event_rules.version: 1.13.3,
44-
_dd.appsec.waf.version: 1.25.0,
44+
_dd.appsec.waf.version: 1.25.1,
4545
_dd.runtime_family: dotnet
4646
},
4747
Metrics: {

tracer/test/snapshots/Security.AspNetWebFormsAsmData.Classic.enableSecurity=True.__test=blocking-user_url=_user.verified.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@
2121
usr.id: user3,
2222
_dd.appsec.event_rules.version: 1.13.3,
2323
_dd.appsec.user.collection_mode: sdk,
24-
_dd.appsec.waf.version: 1.25.0,
24+
_dd.appsec.waf.version: 1.25.1,
2525
_dd.runtime_family: dotnet
2626
},
2727
Metrics: {

tracer/test/snapshots/Security.AspNetWebFormsAsmData.Integrated.enableSecurity=True.__test=blocking-ips_url=_default.aspx.verified.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@
1919
runtime-id: Guid_1,
2020
span.kind: server,
2121
_dd.appsec.event_rules.version: 1.13.3,
22-
_dd.appsec.waf.version: 1.25.0,
22+
_dd.appsec.waf.version: 1.25.1,
2323
_dd.runtime_family: dotnet
2424
},
2525
Metrics: {

0 commit comments

Comments
 (0)