|  | 
|  | 1 | +// <copyright company="Datadog"> | 
|  | 2 | +// Unless explicitly stated otherwise all files in this repository are licensed under the Apache 2 License. | 
|  | 3 | +// This product includes software developed at Datadog (https://www.datadoghq.com/). Copyright 2017 Datadog, Inc. | 
|  | 4 | +// </copyright> | 
|  | 5 | +// <auto-generated/> | 
|  | 6 | + | 
|  | 7 | +#nullable enable | 
|  | 8 | + | 
|  | 9 | +// This file is auto-generated from supported-configurations.json and supported-configurations-docs.yaml | 
|  | 10 | +// Do not edit this file directly. The source generator will regenerate it on build. | 
|  | 11 | +// NOTE: If you remove keys/products from the JSON, run 'dotnet clean' and remove old generated files. | 
|  | 12 | +namespace Datadog.Trace.Configuration; | 
|  | 13 | + | 
|  | 14 | +internal static partial class ConfigurationKeys2 | 
|  | 15 | +{ | 
|  | 16 | +    internal static class AppSec | 
|  | 17 | +    { | 
|  | 18 | +        /// <summary> | 
|  | 19 | +        /// When ASM is enabled, collects in spans endpoints apis schemas analyzed by the waf, default value is true. | 
|  | 20 | +        /// </summary> | 
|  | 21 | +        public const string ApiSecurityEnabled = "DD_API_SECURITY_ENABLED"; | 
|  | 22 | + | 
|  | 23 | +        /// <summary> | 
|  | 24 | +        /// with a default value of true, it allows a customer to disable the collection of endpoints for API Security. | 
|  | 25 | +        /// </summary> | 
|  | 26 | +        public const string ApiSecurityEndpointCollectionEnabled = "DD_API_SECURITY_ENDPOINT_COLLECTION_ENABLED"; | 
|  | 27 | + | 
|  | 28 | +        /// <summary> | 
|  | 29 | +        /// with a default value of 300, it defines the maximum number of endpoints to be collected (serialized) for API Security. | 
|  | 30 | +        /// </summary> | 
|  | 31 | +        public const string ApiSecurityEndpointCollectionMessageLimit = "DD_API_SECURITY_ENDPOINT_COLLECTION_MESSAGE_LIMIT"; | 
|  | 32 | + | 
|  | 33 | +        /// <summary> | 
|  | 34 | +        /// Enables the parsing of the response body in the API Security module. Defaults to true | 
|  | 35 | +        /// </summary> | 
|  | 36 | +        public const string ApiSecurityParseResponseBody = "DD_API_SECURITY_PARSE_RESPONSE_BODY"; | 
|  | 37 | + | 
|  | 38 | +        /// <summary> | 
|  | 39 | +        /// Api security sample delay in seconds , should be a float. Set to 0 for testing purposes. default value of 30. | 
|  | 40 | +        /// </summary> | 
|  | 41 | +        public const string ApiSecuritySampleDelay = "DD_API_SECURITY_SAMPLE_DELAY"; | 
|  | 42 | + | 
|  | 43 | +        /// <summary> | 
|  | 44 | +        /// Automatic instrumentation of user event mode. Values can be ident, disabled, anon. | 
|  | 45 | +        /// </summary> | 
|  | 46 | +        public const string UserEventsAutoInstrumentationMode = "DD_APPSEC_AUTO_USER_INSTRUMENTATION_MODE"; | 
|  | 47 | + | 
|  | 48 | +        /// <summary> | 
|  | 49 | +        /// Deprecate. Automatic tracking of user events mode. Values can be disabled, safe or extended. | 
|  | 50 | +        /// This config is in the process of being deprecated. Please use DD_APPSEC_AUTO_USER_INSTRUMENTATION_MODE | 
|  | 51 | +        /// instead. | 
|  | 52 | +        /// Values will be automatically translated: | 
|  | 53 | +        /// disabled = disabled | 
|  | 54 | +        /// safe = anon | 
|  | 55 | +        /// extended = ident | 
|  | 56 | +        /// </summary> | 
|  | 57 | +        public const string UserEventsAutomatedTracking = "DD_APPSEC_AUTOMATED_USER_EVENTS_TRACKING"; | 
|  | 58 | + | 
|  | 59 | +        /// <summary> | 
|  | 60 | +        /// Configuration key for enabling or disabling the AppSec. | 
|  | 61 | +        /// Default is value is false (disabled). | 
|  | 62 | +        /// </summary> | 
|  | 63 | +        public const string Enabled = "DD_APPSEC_ENABLED"; | 
|  | 64 | + | 
|  | 65 | +        /// <summary> | 
|  | 66 | +        /// Comma separated keys indicating the optional custom headers the user wants to send. | 
|  | 67 | +        /// Default is value is null. | 
|  | 68 | +        /// </summary> | 
|  | 69 | +        public const string ExtraHeaders = "DD_APPSEC_EXTRA_HEADERS"; | 
|  | 70 | + | 
|  | 71 | +        /// <summary> | 
|  | 72 | +        /// Blocking response template for HTML content. This template is used in combination with the status code to craft and send a response upon blocking the request. | 
|  | 73 | +        /// </summary> | 
|  | 74 | +        public const string HtmlBlockedTemplate = "DD_APPSEC_HTTP_BLOCKED_TEMPLATE_HTML"; | 
|  | 75 | + | 
|  | 76 | +        /// <summary> | 
|  | 77 | +        /// Blocking response template for Json content. This template is used in combination with the status code to craft and send a response upon blocking the request. | 
|  | 78 | +        /// </summary> | 
|  | 79 | +        public const string JsonBlockedTemplate = "DD_APPSEC_HTTP_BLOCKED_TEMPLATE_JSON"; | 
|  | 80 | + | 
|  | 81 | +        /// <summary> | 
|  | 82 | +        /// Configuration key indicating the optional name of the custom header to take into account for the ip address. | 
|  | 83 | +        /// Default is value is null (do not override). | 
|  | 84 | +        /// </summary> | 
|  | 85 | +        public const string CustomIpHeader = "DD_APPSEC_IPHEADER"; | 
|  | 86 | + | 
|  | 87 | +        /// <summary> | 
|  | 88 | +        /// Specifies if the AppSec traces should be explicitly kept or dropped. | 
|  | 89 | +        /// Default is true, to keep all traces, false means drop all traces (by setting AutoReject as sampling priority). | 
|  | 90 | +        /// For internal testing only. | 
|  | 91 | +        /// </summary> | 
|  | 92 | +        public const string KeepTraces = "DD_APPSEC_KEEP_TRACES"; | 
|  | 93 | + | 
|  | 94 | +        /// <summary> | 
|  | 95 | +        /// with a default value of 32, defines the maximum depth of a stack trace to be reported due to RASP events. O for unlimited. | 
|  | 96 | +        /// </summary> | 
|  | 97 | +        public const string MaxStackTraceDepth = "DD_APPSEC_MAX_STACK_TRACE_DEPTH"; | 
|  | 98 | + | 
|  | 99 | +        /// <summary> | 
|  | 100 | +        /// with a default value of 75, defines the percentage of frames taken from the top of the stack when trimming. Min 0, Max 100 | 
|  | 101 | +        /// </summary> | 
|  | 102 | +        public const string MaxStackTraceDepthTopPercent = "DD_APPSEC_MAX_STACK_TRACE_DEPTH_TOP_PERCENT"; | 
|  | 103 | + | 
|  | 104 | +        /// <summary> | 
|  | 105 | +        /// with a default value of 2, defines the maximum number of stack traces to be reported due to RASP events. 0 for unlimited. | 
|  | 106 | +        /// </summary> | 
|  | 107 | +        public const string MaxStackTraces = "DD_APPSEC_MAX_STACK_TRACES"; | 
|  | 108 | + | 
|  | 109 | +        /// <summary> | 
|  | 110 | +        /// The regex that will be used to obfuscate possible sensitive data in keys that are highlighted WAF as potentially malicious | 
|  | 111 | +        /// </summary> | 
|  | 112 | +        public const string ObfuscationParameterKeyRegex = "DD_APPSEC_OBFUSCATION_PARAMETER_KEY_REGEXP"; | 
|  | 113 | + | 
|  | 114 | +        /// <summary> | 
|  | 115 | +        /// The regex that will be used to obfuscate possible sensitive data in values that are highlighted WAF as potentially malicious | 
|  | 116 | +        /// </summary> | 
|  | 117 | +        public const string ObfuscationParameterValueRegex = "DD_APPSEC_OBFUSCATION_PARAMETER_VALUE_REGEXP"; | 
|  | 118 | + | 
|  | 119 | +        /// <summary> | 
|  | 120 | +        /// default value to true. Set to false to disable exploit prevention. | 
|  | 121 | +        /// </summary> | 
|  | 122 | +        public const string RaspEnabled = "DD_APPSEC_RASP_ENABLED"; | 
|  | 123 | + | 
|  | 124 | +        /// <summary> | 
|  | 125 | +        /// Override the default rules file provided. Must be a path to a valid JSON rules file. | 
|  | 126 | +        /// Default is value is null (do not override). | 
|  | 127 | +        /// </summary> | 
|  | 128 | +        public const string Rules = "DD_APPSEC_RULES"; | 
|  | 129 | + | 
|  | 130 | +        /// <summary> | 
|  | 131 | +        /// Activate SCA (Software Composition Analysis), used in the backend | 
|  | 132 | +        /// </summary> | 
|  | 133 | +        public const string ScaEnabled = "DD_APPSEC_SCA_ENABLED"; | 
|  | 134 | + | 
|  | 135 | +        /// <summary> | 
|  | 136 | +        /// with a default value of true, it allows a customer to disable the generation of stack traces, for any ASM-specific purpose such as RASP. | 
|  | 137 | +        /// </summary> | 
|  | 138 | +        public const string StackTraceEnabled = "DD_APPSEC_STACK_TRACE_ENABLED"; | 
|  | 139 | + | 
|  | 140 | +        /// <summary> | 
|  | 141 | +        /// Limits the amount of AppSec traces sent per second with an integer value, strictly positive. | 
|  | 142 | +        /// </summary> | 
|  | 143 | +        public const string TraceRateLimit = "DD_APPSEC_TRACE_RATE_LIMIT"; | 
|  | 144 | + | 
|  | 145 | +        /// <summary> | 
|  | 146 | +        /// Activate debug logs for the WAF | 
|  | 147 | +        /// </summary> | 
|  | 148 | +        public const string WafDebugEnabled = "DD_APPSEC_WAF_DEBUG"; | 
|  | 149 | + | 
|  | 150 | +        /// <summary> | 
|  | 151 | +        /// WAF timeout in microseconds of each WAF execution (the timeout value passed to ddwaf_run). | 
|  | 152 | +        /// </summary> | 
|  | 153 | +        public const string WafTimeout = "DD_APPSEC_WAF_TIMEOUT"; | 
|  | 154 | + | 
|  | 155 | +        /// <summary> | 
|  | 156 | +        /// Use new unsafe encoder for the waf | 
|  | 157 | +        /// </summary> | 
|  | 158 | +        public const string UseUnsafeEncoder = "DD_EXPERIMENTAL_APPSEC_USE_UNSAFE_ENCODER"; | 
|  | 159 | +    } | 
|  | 160 | +} | 
0 commit comments