feat(appsec): support for inserting blocking IDs to blocking templates#7923
feat(appsec): support for inserting blocking IDs to blocking templates#7923
Conversation
Overall package sizeSelf size: 5.48 MB Dependency sizes| name | version | self size | total size | |------|---------|-----------|------------| | import-in-the-middle | 3.0.1 | 82.56 kB | 817.39 kB | | dc-polyfill | 0.1.10 | 26.73 kB | 26.73 kB |🤖 This report was automatically generated by heaviest-objects-in-the-universe |
|
✨ Fix all issues with BitsAI or with Cursor
|
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## master #7923 +/- ##
=======================================
Coverage 73.83% 73.83%
=======================================
Files 773 773
Lines 35983 35989 +6
=======================================
+ Hits 26567 26572 +5
- Misses 9416 9417 +1
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
|
LGTM but note that if a custom template contains |
|
It's a limitation I took into account. Sure there are use cases for having multiple times the thing included, but doing so would make the "compilation" optimization way slower, so I decided one occurence was enough. Wdyt ? |
What does this PR do?
This updates the appsec blocking templates to include
[security_response_id]. And update blocking code to replace this string by a random UUID provided by the WAF.Motivation
Easier to track stuff.
ST PR: DataDog/system-tests#6720