Skip to content

Commit 4f79fc2

Browse files
[AAP] Update WAF to v1.27.0 (#7330)
## Summary of changes Update WAF to [v1.27](https://github.com/DataDog/libddwaf/releases/tag/1.27.0) ## Reason for change ## Implementation details ## Test coverage ## Other details <!-- Fixes #{issue} --> <!-- ⚠️ Note: Where possible, please obtain 2 approvals prior to merging. Unless CODEOWNERS specifies otherwise, for external teams it is typically best to have one review from a team member, and one review from apm-dotnet. Trivial changes do not require 2 reviews. MergeQueue is NOT enabled in this repository. If you have write access to the repo, the PR has 1-2 approvals (see above), and all of the required checks have passed, you can use the Squash and Merge button to merge the PR. If you don't have write access, or you need help, reach out in the #apm-dotnet channel in Slack. -->
1 parent 50c187c commit 4f79fc2

11 files changed

+11
-11
lines changed

tracer/build/_build/Build.Steps.cs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ partial class Build
6565

6666
AbsolutePath NativeBuildDirectory => RootDirectory / "obj";
6767

68-
const string LibDdwafVersion = "1.26.0";
68+
const string LibDdwafVersion = "1.27.0";
6969

7070
string[] OlderLibDdwafVersions = { "1.3.0", "1.10.0", "1.14.0", "1.16.0", "1.23.0" };
7171

tracer/build/smoke_test_snapshots/smoke_test_snapshots.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@
3939
"type": "web",
4040
"meta": {
4141
"_dd.appsec.event_rules.version": "1.13.3",
42-
"_dd.appsec.waf.version": "1.26.0",
42+
"_dd.appsec.waf.version": "1.27.0",
4343
"_dd.runtime_family": "dotnet",
4444
"_dd.appsec.s.req.params": "H4sIAAAAAAAAA4uuVkrOzyspys/JSS1Ssoq2iNVRSkwuyczPA3NqYwH+CR9jIQAAAA==",
4545
"_dd.appsec.s.res.body": "H4sIAAAAAAAAA4u2iAUA8YntnQMAAAA=",

tracer/build/smoke_test_snapshots/smoke_test_snapshots_2_1.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@
3939
"type": "web",
4040
"meta": {
4141
"_dd.appsec.event_rules.version": "1.13.3",
42-
"_dd.appsec.waf.version": "1.26.0",
42+
"_dd.appsec.waf.version": "1.27.0",
4343
"_dd.runtime_family": "dotnet",
4444
"_dd.appsec.s.res.body": "H4sIAAAAAAAAA4u2iAUA8YntnQMAAAA=",
4545
"_dd.appsec.s.req.headers": "H4sIAAAAAAAAA4WOMQrAIBDA/uKsQ7fiVw6Ho4oVrIp3Q4v491JcLc4JJNAEVzwcMbITGgB2Y2QT0SWht27kwAWrSzzlt7LIaLNXjJ4WCuFVYkhelRpyDfws/NFVwa7S3+SfdmaarXfzAg6PMlH9AAAA",

tracer/test/snapshots/Security.AspNetCore5AsmInitializationSecurityEnabled.TestSecurityInitialization.verified.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@
3535
_dd.appsec.fp.http.network: net-1-1000000000,
3636
_dd.appsec.fp.session: ssn----<SessionFp>,
3737
_dd.appsec.json: {"triggers":[{"rule":{"id":"crs-942-290","name":"Finds basic MongoDB SQL injection attempts","tags":{"category":"attack_attempt","type":"nosql_injection"}},"rule_matches":[{"operator":"match_regex","operator_value":"(?i:(?:\\[?\\$(?:(?:s(?:lic|iz)|wher)e|e(?:lemMatch|xists|q)|n(?:o[rt]|in?|e)|l(?:ike|te?)|t(?:ext|ype)|a(?:ll|nd)|jsonSchema|between|regex|x?or|div|mod)\\]?)\\b)","parameters":[{"address":"server.request.query","highlight":["[$slice"],"key_path":["[$slice]"],"value":"[$slice]"}]}]}]},
38-
_dd.appsec.waf.version: 1.26.0,
38+
_dd.appsec.waf.version: 1.27.0,
3939
_dd.origin: appsec,
4040
_dd.runtime_family: dotnet
4141
},

tracer/test/snapshots/Security.AspNetCore5AsmInitializationSecurityEnabledWithBadRuleset.TestSecurityInitialization.verified.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@
3232
_dd.appsec.event_rules.errors: {"missing key 'name'":["crs-913-110","crs-913-120","crs-920-260"],"missing key 'tags'":["crs-921-110","crs-921-140"]},
3333
_dd.appsec.event_rules.version: 1.3.1,
3434
_dd.appsec.json: {"triggers":[{"rule":{"id":"crs-942-290","name":"Finds basic MongoDB SQL injection attempts","tags":{"category":"attack_attempt","type":"nosql_injection"}},"rule_matches":[{"operator":"match_regex","operator_value":"(?i:(?:\\[\\$(?:ne|eq|lte?|gte?|n?in|mod|all|size|exists|type|slice|x?or|div|like|between|and)\\]))","parameters":[{"address":"server.request.query","highlight":["[$slice]"],"key_path":["[$slice]"],"value":"[$slice]"}]}]}]},
35-
_dd.appsec.waf.version: 1.26.0,
35+
_dd.appsec.waf.version: 1.27.0,
3636
_dd.origin: appsec,
3737
_dd.runtime_family: dotnet
3838
},

tracer/test/snapshots/Security.AspNetMvc5AsmData.Classic.enableSecurity=True.__test=blocking-ips_url=_.verified.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@
4444
runtime-id: Guid_1,
4545
span.kind: server,
4646
_dd.appsec.event_rules.version: 1.13.3,
47-
_dd.appsec.waf.version: 1.26.0,
47+
_dd.appsec.waf.version: 1.27.0,
4848
_dd.runtime_family: dotnet
4949
},
5050
Metrics: {

tracer/test/snapshots/Security.AspNetMvc5AsmData.Integrated.enableSecurity=True.__test=blocking-ips_url=_.verified.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@
4444
runtime-id: Guid_1,
4545
span.kind: server,
4646
_dd.appsec.event_rules.version: 1.13.3,
47-
_dd.appsec.waf.version: 1.26.0,
47+
_dd.appsec.waf.version: 1.27.0,
4848
_dd.runtime_family: dotnet
4949
},
5050
Metrics: {

tracer/test/snapshots/Security.AspNetWebApiAsmData.Classic.enableSecurity=True.__test=blocking-user_url=_api_user.verified.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@
4343
usr.id: user3,
4444
_dd.appsec.event_rules.version: 1.13.3,
4545
_dd.appsec.user.collection_mode: sdk,
46-
_dd.appsec.waf.version: 1.26.0,
46+
_dd.appsec.waf.version: 1.27.0,
4747
_dd.runtime_family: dotnet
4848
},
4949
Metrics: {

tracer/test/snapshots/Security.AspNetWebApiAsmData.Integrated.enableSecurity=True.__test=blocking-ips_url=_api_health.verified.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@
4141
runtime-id: Guid_1,
4242
span.kind: server,
4343
_dd.appsec.event_rules.version: 1.13.3,
44-
_dd.appsec.waf.version: 1.26.0,
44+
_dd.appsec.waf.version: 1.27.0,
4545
_dd.runtime_family: dotnet
4646
},
4747
Metrics: {

tracer/test/snapshots/Security.AspNetWebFormsAsmData.Classic.enableSecurity=True.__test=blocking-user_url=_user.verified.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@
2121
usr.id: user3,
2222
_dd.appsec.event_rules.version: 1.13.3,
2323
_dd.appsec.user.collection_mode: sdk,
24-
_dd.appsec.waf.version: 1.26.0,
24+
_dd.appsec.waf.version: 1.27.0,
2525
_dd.runtime_family: dotnet
2626
},
2727
Metrics: {

0 commit comments

Comments
 (0)