]>
git.ipfire.org Git - thirdparty/suricata.git/log
Lukas Sismis [Thu, 18 Apr 2024 07:24:50 +0000 (09:24 +0200)]
dpdk: increase timeout for DPDK test runs
Philippe Antoine [Thu, 18 Apr 2024 11:36:34 +0000 (13:36 +0200)]
util/mime: adds safety check
Ticket: 6904
Even if there is no problem, just fortify the function,
so that it is future-proof if the caller does not do the check.
Philippe Antoine [Thu, 18 Apr 2024 09:54:34 +0000 (11:54 +0200)]
detect: use direction-based tx for app-layer logging
When we only have stream matches.
Ticket: 6846
This solves the case where another transaction was created
by parsing data in the other direction, before running the
detection.
Like
1. get data in direction 1
2. acked data: parse it, but do not run detection in dir 1
3. other data in direction 2
4. other data acked : parse it and create new tx,
then run detection for direction 1 with data from first packet
Victor Julien [Thu, 28 Mar 2024 14:47:06 +0000 (15:47 +0100)]
mime: validate that chunk size stays within limit
Victor Julien [Thu, 28 Mar 2024 14:46:34 +0000 (15:46 +0100)]
smtp: minor debug cleanup
Victor Julien [Thu, 28 Mar 2024 14:12:02 +0000 (15:12 +0100)]
streaming/buffer: add validation checks for data chunk sizes
Victor Julien [Thu, 28 Mar 2024 14:09:31 +0000 (15:09 +0100)]
util/file: add validation check for extreme data chunk sizes
Victor Julien [Thu, 28 Mar 2024 12:46:23 +0000 (13:46 +0100)]
streaming/buffer: improve integer handling safety
Unsafe handling of buffer offset and to be inserted data's length
could lead to a integer overflow. This in turn would skip growing
the target buffer, which then would be memcpy'd into, leading to
an out of bounds write.
This issue shouldn't be reachable through any of the consumers of
the API, but to be sure some debug validation checks have been
added.
Bug: #6903.
Philippe Antoine [Wed, 17 Apr 2024 11:39:39 +0000 (13:39 +0200)]
detect/http-server-body: avoid FP on toserver direction
Ticket: 6948
http.response_body keyword did not enforce a direction, and thus
could match on files sent with POST requests
Victor Julien [Tue, 16 Apr 2024 13:07:46 +0000 (15:07 +0200)]
ips: check for livedev.use-for-tracking
For the capture methods that support livedev and IPS,
livedev.use-for-tracking is not supported.
This setting causes major flow tracking issues, as both sides of
a flow would be tracked in different flows.
This patch disables the livedev.use-for-tracking setting if it
is set to true. A warning will be issued.
Ticket: #6726.
Victor Julien [Tue, 16 Apr 2024 16:55:32 +0000 (18:55 +0200)]
capture: block IDS + IPS combination
In general, improve IPS setup error checking.
Ticket: #5588.
Victor Julien [Tue, 16 Apr 2024 13:38:13 +0000 (15:38 +0200)]
capture: improve IDS + IPS check
Improve it for af-packet, dpdk, netmap. Check would not consider
an interface IDS if the `default` section contained a copy-mode
field.
Juliana Fajardini [Wed, 17 Apr 2024 00:29:51 +0000 (21:29 -0300)]
yaml: unify 0 stats counter config option terms
When we added feature #5976 (
72146b969 ), we overlook that we also have
a config stats option for the human-readable stats logs to output
0 counters.
Due to not seeing this before, we now have two different setting names
for basically the same thing, but in different logs:
- zero-valued-counters for EVE
- null-values for stats.log
This ensures we use the same terminology, and change the recently added
one to `null-values`, as this one has been around for longer.
Task #6962
Juliana Fajardini [Tue, 16 Apr 2024 21:31:47 +0000 (18:31 -0300)]
yaml/eve/stats: remove mention exception policy
The stats config for EVE logs have a comment about exception policy
stats counters. This went in with
72146b969c06fb953 , but shouldn't have,
as there are no options there.
Philippe Antoine [Wed, 13 Mar 2024 20:26:05 +0000 (21:26 +0100)]
output/alert: check flag before logging app-layer
Ticket: 6846
Philippe Antoine [Mon, 11 Mar 2024 13:06:50 +0000 (14:06 +0100)]
output: do not use tx id 0 when there is no tx
Ticket: 6846
This led to packet rules logging irrelevant app-layer data
Jeff Lucovsky [Tue, 16 Apr 2024 12:34:42 +0000 (08:34 -0400)]
detect/ipopts: Handle multiple ip options
Issue: 6864
Multiple IP options were not handled properly as the value being OR'd
into the packet's ip option variable were enum values instead of bit
values.
Jeff Lucovsky [Thu, 21 Mar 2024 13:37:26 +0000 (09:37 -0400)]
detect/ipopts: Remove unneeded PCRE logic
Issue: 6864
Reduce complexity by eliminating the PCRE logic and adding a unittest to
validate null/empty string handling
Jeff Lucovsky [Thu, 21 Mar 2024 13:38:57 +0000 (09:38 -0400)]
detect/ipopt: Misc. cleanup
Minor changes to improve readability, remove extraneous include files.
Philippe Antoine [Sat, 6 Jan 2024 22:09:05 +0000 (23:09 +0100)]
websocket: configurable logging of payload in alerts
Philippe Antoine [Fri, 22 Dec 2023 11:01:33 +0000 (12:01 +0100)]
app-layer: websockets protocol support
Ticket: 2695
Philippe Antoine [Sat, 30 Dec 2023 20:36:07 +0000 (21:36 +0100)]
protodetect: run expected probing parser
When there is a protocol change, and a specific protocol is
expected, like WebSeocket, always run it, no matter the port.
Philippe Antoine [Sat, 30 Dec 2023 20:28:50 +0000 (21:28 +0100)]
protodetect: allows not port-based probing parsers
As for WebSocket which is detected only by protocol change.
Philippe Antoine [Sat, 30 Dec 2023 20:21:21 +0000 (21:21 +0100)]
protodetect: remove unused field
port is used in AppLayerProtoDetectProbingParserPort
and not in AppLayerProtoDetectProbingParserElement
Philippe Antoine [Fri, 22 Dec 2023 14:51:33 +0000 (15:51 +0100)]
http2: add settings from newer RFCs
Including the one for websocket over HTTP/2
Philippe Antoine [Fri, 22 Dec 2023 09:05:17 +0000 (10:05 +0100)]
enip: register on default 44818/tcp port
if no config option is found,
as is done for udp
Ticket: 6304
Philippe Antoine [Thu, 21 Mar 2024 08:38:25 +0000 (09:38 +0100)]
conf: avoid quadratic complexity
Ticket: 6878
Follow up on
15649424a76d01eb332d85620ffc4956d4f3d9be
When adding many sequence nodes, either from start or scalar event
We add "sequence nodes" whose name is an integer cf sequence_node_name
and then run ConfNodeLookupChild to see if it had been already set
(from the command line cf comment in the code)
And ConfNodeLookupChild iterates the whole linked list...
1. We add node 1
2. To add node 2, we check if node 1 equals this new node
3. To add node 3, we check if nodes 1, or 2 equals this new node's name
And so on...
This commits avoids these checks ig the list is empty at the beginning
Andreas Herz [Tue, 16 Apr 2024 15:22:20 +0000 (17:22 +0200)]
dataset: cleanup datasets that hit the memcap while loading
Datasets that hit the memcap limit need to be discarded if the memcap is
hit or otherwise the datasets are still loaded with partial data while
the signature is not loaded due to the memcap error.
Ticket: #6678
Victor Julien [Tue, 16 Apr 2024 06:26:40 +0000 (08:26 +0200)]
decode/ppp: fix iplen check int handling
** CID
1596376 : (CONSTANT_EXPRESSION_RESULT)
/src/decode-ppp.c: 64 in DecodePPPCompressedProto()
/src/decode-ppp.c: 55 in DecodePPPCompressedProto()
________________________________________________________________________________________________________
*** CID
1596376 : (CONSTANT_EXPRESSION_RESULT)
/src/decode-ppp.c: 64 in DecodePPPCompressedProto()
58 case 0x57: { /* PPP_IPV6 */
59 if (unlikely(len < (data_offset + IPV6_HEADER_LEN))) {
60 ENGINE_SET_INVALID_EVENT(p, PPPIPV6_PKT_TOO_SMALL);
61 return TM_ECODE_FAILED;
62 }
63 DEBUG_VALIDATE_BUG_ON(len < data_offset);
>>> CID
1596376 : (CONSTANT_EXPRESSION_RESULT)
>>> "65535 /* 32767 * 2 + 1 */ < (uint16_t)(len - data_offset)" is always false regardless of the values of its operands. This occurs as the logical first operand of "?:".
64 uint16_t iplen = MIN(USHRT_MAX, (uint16_t)(len - data_offset));
65 return DecodeIPV6(tv, dtv, p, pkt + data_offset, iplen);
66 }
67 case 0x2f: /* PPP_VJ_UCOMP */
68 if (unlikely(len < (data_offset + IPV4_HEADER_LEN))) {
69 ENGINE_SET_INVALID_EVENT(p, PPPVJU_PKT_TOO_SMALL);
/src/decode-ppp.c: 55 in DecodePPPCompressedProto()
49 case 0x21: { /* PPP_IP */
50 if (unlikely(len < (data_offset + IPV4_HEADER_LEN))) {
51 ENGINE_SET_INVALID_EVENT(p, PPPVJU_PKT_TOO_SMALL);
52 return TM_ECODE_FAILED;
53 }
54 DEBUG_VALIDATE_BUG_ON(len < data_offset);
>>> CID
1596376 : (CONSTANT_EXPRESSION_RESULT)
>>> "65535 /* 32767 * 2 + 1 */ < (uint16_t)(len - data_offset)" is always false regardless of the values of its operands. This occurs as the logical first operand of "?:".
55 uint16_t iplen = MIN(USHRT_MAX, (uint16_t)(len - data_offset));
56 return DecodeIPV4(tv, dtv, p, pkt + data_offset, iplen);
57 }
58 case 0x57: { /* PPP_IPV6 */
59 if (unlikely(len < (data_offset + IPV6_HEADER_LEN))) {
60 ENGINE_SET_INVALID_EVENT(p, PPPIPV6_PKT_TOO_SMALL);
Juliana Fajardini [Sat, 13 Apr 2024 02:12:03 +0000 (23:12 -0300)]
pgsql: check for eol when parsing response
It was brought to my attention by GLongo that Pgsql parser handled eof
diffrently for requests and responses, and apparently there isn't a good
reason for such a difference therefore, apply same logic used for
rs_pgsql_parse_request for checking for eof when parsing a response.
Juliana Fajardini [Sat, 13 Apr 2024 02:10:48 +0000 (23:10 -0300)]
eve/alert: add missing pgsql metadata
Bug #6092
Sascha Steinbiss [Sat, 24 Feb 2024 10:10:47 +0000 (11:10 +0100)]
ja4: implement for TLS and QUIC
Ticket: OISF#6379
Sascha Steinbiss [Fri, 12 Apr 2024 17:54:23 +0000 (19:54 +0200)]
ja3: make feature compile time configurable
Sascha Steinbiss [Sat, 24 Feb 2024 09:34:50 +0000 (10:34 +0100)]
suricata: initialize feature tracking earlier
This gives app layer code a chance to access feature
information.
Jeff Lucovsky [Mon, 15 Apr 2024 14:17:17 +0000 (10:17 -0400)]
flow/inject: Select thread_id by flow flag
Issue: 6957
Rather than selecting the thread_id index by packets traveling to the
server, use the flow flags. If the flow has been reversed, the second
slot is represents the thread id to be used.
Victor Julien [Mon, 15 Apr 2024 10:29:12 +0000 (12:29 +0200)]
decode/ppp: add missing types definitions
Recognize PPP_CCP, PPP_CBCP and PPP_COMP_DGRAM.
Does not implement decoders for these record types, so these
are logged as unsupported types. Was "wrong_type" before.
Victor Julien [Fri, 12 Apr 2024 13:26:46 +0000 (15:26 +0200)]
decode/ppp: clean up ppph pointer use
No users of the pointer anymore, so remove it.
Victor Julien [Fri, 12 Apr 2024 13:19:45 +0000 (15:19 +0200)]
decode/ppp: remove ppph check in favor of flag
As we now support variable size headers, we can't use the old pointer.
Replace with a flag.
Victor Julien [Fri, 12 Apr 2024 10:42:37 +0000 (12:42 +0200)]
decode/ppp: support different header formats
Support compressed proto and optional HDLC header.
Bug: #6942.
Philippe Antoine [Sun, 14 Apr 2024 19:36:17 +0000 (21:36 +0200)]
detect/analyzer: add more details for tcp_mss
Issue: #6355
Philippe Antoine [Sun, 14 Apr 2024 19:34:57 +0000 (21:34 +0200)]
detect/analyzer: create tojson function for generic integers
As will be needed for tcp.mss
Philippe Antoine [Fri, 12 Apr 2024 15:14:01 +0000 (17:14 +0200)]
util: remove unused bloom filter code
Ticket: 4083
Philippe Antoine [Tue, 16 May 2023 09:15:10 +0000 (11:15 +0200)]
src: remove unused headers-exported functions
+ remove double definition of IPPairLock
Ticket: #4083
Jeff Lucovsky [Sun, 24 Mar 2024 12:22:34 +0000 (08:22 -0400)]
stats: Memcap pressure max relocation
This commit moves the memcap pressure/pressure_max stats from the global
stats namespace into the memcap namespace.
With per-thread stats, they will be within the flow-manager's values.
Issue: 6398
Jeff Lucovsky [Wed, 6 Mar 2024 14:36:05 +0000 (09:36 -0500)]
doc: Describe noalert keyword
Issue: 6685
Philippe Antoine [Sun, 14 May 2023 18:03:02 +0000 (20:03 +0200)]
output: generic simple tx json logger
Ticket: 3827
Philippe Antoine [Mon, 5 Jun 2023 06:43:05 +0000 (08:43 +0200)]
output/dns: do not add empty app-layer metadata
Philippe Antoine [Mon, 15 May 2023 07:43:14 +0000 (09:43 +0200)]
output/dnp3: restrict function scope to one file
Victor Julien [Fri, 12 Apr 2024 09:02:13 +0000 (11:02 +0200)]
pcap: support LINKTYPE_IPV6 (229)
This is just another variant of DLT_RAW.
Ticket: #6943.
Victor Julien [Sat, 23 Mar 2024 19:17:54 +0000 (20:17 +0100)]
defrag: fix wrong datalink being logged
Eve's packet_info.linktype should correctly indicated what the `packet`
field contains. Until now it was using DLT_RAW even if Ethernet or other
L2+ headers were present.
This commit records the datalink of the packet creating the first
fragment, which can include the L2+ header data.
Bug: #6887.
Juliana Fajardini [Wed, 3 Apr 2024 01:22:16 +0000 (22:22 -0300)]
eve/stats: allow hiding counters whose valued is 0
Some stats can be quite verbose if logging all zero valued-counters.
This allows users to disable logging such counters. Default is still
true, as that's the expected behavior for the engine.
Task #5976
Lukas Sismis [Tue, 26 Mar 2024 21:17:17 +0000 (22:17 +0100)]
dpdk: support 52 byte long key on ice (E810) cards
Lukas Sismis [Tue, 26 Mar 2024 21:16:29 +0000 (22:16 +0100)]
dpdk: enlarge key length to 52 bytes
Philippe Antoine [Fri, 12 Apr 2024 08:32:46 +0000 (10:32 +0200)]
ci: clean some disk space to run CIFuzz again
Jason Ish [Fri, 12 Apr 2024 04:34:16 +0000 (22:34 -0600)]
cargo: add description and license
Required for publishing to crates.io.
Jason Ish [Fri, 12 Apr 2024 03:29:50 +0000 (21:29 -0600)]
automake/rust: remove path.lib
Remove the path.lib parameter that is substituted into the output
Cargo.toml by autoconf. Instead, as part of the build, "cd" into the
source directory. We already set the Rust target directory to the
external build directory.
This makes the Cargo.toml more generic, and in a format suitable for
publishing to crates.io. It also makes it easier to pull in external
crates without needing to patch up their Cargo.toml, for example, it
might make pulling libhtp-rs easier.
Victor Julien [Fri, 22 Mar 2024 10:53:52 +0000 (11:53 +0100)]
alert/syslog: fetch ipproto once
Victor Julien [Fri, 22 Mar 2024 10:19:47 +0000 (11:19 +0100)]
alert/syslog: stringify addresses outside alert loop
Victor Julien [Fri, 22 Mar 2024 10:17:39 +0000 (11:17 +0100)]
alert/syslog: minor code cleanups
Victor Julien [Fri, 22 Mar 2024 10:11:40 +0000 (11:11 +0100)]
alert/syslog: only hold lock for syslog call
Juliana Fajardini [Mon, 8 Apr 2024 15:30:27 +0000 (12:30 -0300)]
log/stats: allow longer counter names
With the addition of exception policy stats counters, the human readable
version of the sats log was mis-aligned, when counters for per-app-proto
were enabled.
Width change made large enough to accomodate a counter as long as
"app_layer.error.bittorrent-dht.exception_policy.pass_packet" which
could be valid.
Task #5816
Juliana Fajardini [Wed, 3 Apr 2024 01:21:18 +0000 (22:21 -0300)]
yaml: minor wording fix on Suricata package version
Juliana Fajardini [Mon, 1 Apr 2024 21:09:59 +0000 (18:09 -0300)]
yaml: explicitly mention exception policy in conf
While our documentation indicated what were the possible configuration
settings for exception policies, our yaml only explicitly mentioned
exception policy for the master switch. Clearly indicate which config
settings are about exception policies.
Related to
Task #5816
Juliana Fajardini [Thu, 4 Apr 2024 13:58:12 +0000 (10:58 -0300)]
userguide: document exception policy stats
Configuration options and defaults, existing counters etc.
Related to
Task #5816
Juliana Fajardini [Thu, 1 Feb 2024 23:25:33 +0000 (20:25 -0300)]
userguide: highlight exception policy effects
Some exception policies can only be applied to entire flows or
individual packets, for some exception scenarios. Make this easier to
read, in the documentation.
Related to
Task #5816
Juliana Fajardini [Wed, 22 Mar 2023 19:04:50 +0000 (16:04 -0300)]
stream/midstream: add counter for exception policy
Add stats counters for when there is an exception policy applied in case
of a session picked up midstream.
Task #5816
Juliana Fajardini [Tue, 21 Mar 2023 21:15:57 +0000 (18:15 -0300)]
stream/reassemble: add exception policy counters
Add stats counters for exception policies applied in case of memcap hit
during stream reassembly.
Task #5816
Juliana Fajardini [Wed, 22 Mar 2023 15:04:58 +0000 (12:04 -0300)]
stream/tcp: add ssnmemcap exception policy counter
Add stats counters for exception policies applied in case a stream
session memcap is hit.
Task #5816
Juliana Fajardini [Mon, 26 Feb 2024 19:23:14 +0000 (16:23 -0300)]
applayer: add stats counters for exception errors
Add stats counters for exception policy are applied for app-layer errors
Part of
Task #5816
Juliana Fajardini [Thu, 30 Mar 2023 19:53:01 +0000 (16:53 -0300)]
defrag: add exception policy memcap stats counters
Add defrag memcap stats counter.
Task #5816
Juliana Fajardini [Tue, 11 Apr 2023 18:36:48 +0000 (15:36 -0300)]
decode/flow: add exception policy stats counters
We will register stats counters for all policies, even though for now
Suri only uses one possible configuration policy at a time. The idea is
that this could change in the near future, so we want to have this
ready.
Task #5816
Juliana Fajardini [Sun, 11 Feb 2024 21:47:31 +0000 (18:47 -0300)]
exceptions: make types and ToStr fns more accessible
Decode file needed ExceptionPolicy types and exception-policy file
needed Decode types, rendering some works quite difficult to work
around.
ExceptionPolicyToStr is useful for registering exception policy
counters, so make that public.
Part of
Task #5816
Juliana Fajardini [Mon, 26 Feb 2024 19:43:25 +0000 (16:43 -0300)]
schema: apply clang formatting changes
Juliana Fajardini [Wed, 10 Apr 2024 22:09:52 +0000 (19:09 -0300)]
app-layer/htp: clean up unused code in unittests
Remove unit test that was disabled and printf statements that were
replaced but not deleted, both in
48cf0585fb69c9bad71237 .
Juliana Fajardini [Wed, 10 Apr 2024 21:38:14 +0000 (18:38 -0300)]
app-layer: fix minor typo and formatting in LogInfo
Also update copyright years.
Daniel Olatunji [Tue, 30 Jan 2024 17:30:37 +0000 (18:30 +0100)]
detect/analyzer: add more details for tcp_seq
Log the matched Sequence number of a packet
Issue: 6353
Lukas Sismis [Sun, 24 Mar 2024 06:34:50 +0000 (07:34 +0100)]
dpdk: implement DPDK SW tests
Implement Github CI tests to run DPDK Suri with the minimal
configuration to verify that Suricata can start in both IDS
and IPS configuration.
Lukas Sismis [Sat, 23 Mar 2024 22:11:16 +0000 (23:11 +0100)]
dpdk: fix thread slot assignment
Commit
5592ec07 introduced a bug where ptv->slot was
assigned with the current one instead of the next one
in the list. This caused a Suricata crash in the DPDK mode.
Ticket: 6877
Lukas Sismis [Sat, 23 Mar 2024 22:10:41 +0000 (23:10 +0100)]
dpdk: make static variables thread_local
Per a newly obtained knowledge, static variables in functions
are not thread-safe and as a result thread_local attribute was
added.
Lukas Sismis [Thu, 21 Mar 2024 12:52:20 +0000 (13:52 +0100)]
ci: bump up the DPDK versions
jason taylor [Fri, 8 Mar 2024 00:42:27 +0000 (00:42 +0000)]
doc: update http keyword listing order
Ticket: 3025
Signed-off-by: jason taylor <jtfas90@gmail.com>
jason taylor [Tue, 6 Feb 2024 17:27:09 +0000 (17:27 +0000)]
doc: update file.name keyword information
Ticket: 3025
Signed-off-by: jason taylor <jtfas90@gmail.com>
jason taylor [Mon, 5 Feb 2024 22:33:49 +0000 (22:33 +0000)]
doc: update file.data keyword information
Ticket: 3025
Signed-off-by: jason taylor <jtfas90@gmail.com>
jason taylor [Mon, 5 Feb 2024 21:55:48 +0000 (21:55 +0000)]
doc: update http.response_header keyword
Ticket: 3025
Signed-off-by: jason taylor <jtfas90@gmail.com>
jason taylor [Mon, 5 Feb 2024 21:46:59 +0000 (21:46 +0000)]
doc: update http.request_header keyword
Ticket: 3025
Signed-off-by: jason taylor <jtfas90@gmail.com>
jason taylor [Sat, 3 Feb 2024 18:31:49 +0000 (18:31 +0000)]
doc: update http.host http.host.raw keyword
Ticket: 3025
Signed-off-by: jason taylor <jtfas90@gmail.com>
jason taylor [Sat, 3 Feb 2024 16:08:59 +0000 (16:08 +0000)]
doc: update http.location keyword information
Ticket: 3025
Signed-off-by: jason taylor <jtfas90@gmail.com>
jason taylor [Sat, 3 Feb 2024 16:03:23 +0000 (16:03 +0000)]
doc: update http.server keyword information
Ticket: 3025
Signed-off-by: jason taylor <jtfas90@gmail.com>
jason taylor [Sat, 3 Feb 2024 15:58:07 +0000 (15:58 +0000)]
doc: update http.response_body keyword information
Ticket: 3025
Signed-off-by: jason taylor <jtfas90@gmail.com>
jason taylor [Sat, 3 Feb 2024 15:48:25 +0000 (15:48 +0000)]
doc: update http.response_line keyword information
Ticket: 3025
Signed-off-by: jason taylor <jtfas90@gmail.com>
jason taylor [Sat, 3 Feb 2024 15:26:29 +0000 (15:26 +0000)]
doc: update http.stat_msg keyword information
Ticket: 3025
Signed-off-by: jason taylor <jtfas90@gmail.com>
jason taylor [Sat, 3 Feb 2024 15:23:52 +0000 (15:23 +0000)]
doc: update http.stat_code keyword information
Ticket: 3025
Signed-off-by: jason taylor <jtfas90@gmail.com>
jason taylor [Sat, 3 Feb 2024 15:14:24 +0000 (15:14 +0000)]
doc: update http.request_body keyword information
Ticket: 3025
Signed-off-by: jason taylor <jtfas90@gmail.com>
jason taylor [Thu, 1 Feb 2024 22:39:12 +0000 (22:39 +0000)]
doc: update http.header_names keyword information
Ticket: 3025
Signed-off-by: jason taylor <jtfas90@gmail.com>
jason taylor [Wed, 31 Jan 2024 22:48:18 +0000 (22:48 +0000)]
doc: update http.start keyword information
Ticket: 3025
Signed-off-by: jason taylor <jtfas90@gmail.com>
jason taylor [Wed, 31 Jan 2024 22:33:01 +0000 (22:33 +0000)]
doc: update http.referer keyword information
Ticket: 3025
Signed-off-by: jason taylor <jtfas90@gmail.com>
jason taylor [Wed, 31 Jan 2024 20:08:58 +0000 (20:08 +0000)]
doc: update http.content_len keyword information
Ticket: 3025
Signed-off-by: jason taylor <jtfas90@gmail.com>
jason taylor [Wed, 31 Jan 2024 19:47:07 +0000 (19:47 +0000)]
doc: update http.content_type keyword information
Ticket: 3025
Signed-off-by: jason taylor <jtfas90@gmail.com>
jason taylor [Wed, 31 Jan 2024 19:30:51 +0000 (19:30 +0000)]
doc: update http.connection keyword information
Ticket: 3025
Signed-off-by: jason taylor <jtfas90@gmail.com>
jason taylor [Tue, 9 Jan 2024 22:42:15 +0000 (22:42 +0000)]
doc: update http.accept_lang keyword information
Ticket: 3025
Signed-off-by: jason taylor <jtfas90@gmail.com>