diff --git a/index.js b/index.js index 252134a..40cbb07 100644 --- a/index.js +++ b/index.js @@ -1,4 +1,5 @@ require('dotenv').config(); + const axios = require('axios'); const PAYLOAD = require('./scripts/payload.js'); const generateComment = require('./scripts/generateComment.js'); @@ -7,6 +8,7 @@ const headers = require('./scripts/headers.js'); const { logToCSV, readReportedIPs, wasImageRequestLogged } = require('./scripts/csv.js'); const formatDelay = require('./scripts/formatDelay.js'); const log = require('./scripts/log.js'); +const { version } = require('./package.json'); const MAIN_DELAY = process.env.NODE_ENV === 'production' ? 3 * 60 * 60 * 1000 @@ -96,7 +98,7 @@ const reportIP = async (event, url, country, cycleErrorCounts) => { let cycleId = 1; while (true) { - log('info', '===================== New Reporting Cycle ====================='); + log('info', `===================== New Reporting Cycle (v${version}) =====================`); const blockedIPEvents = await fetchBlockedIPs(); if (!blockedIPEvents) { diff --git a/package-lock.json b/package-lock.json index d23b596..fdd02b8 100644 --- a/package-lock.json +++ b/package-lock.json @@ -1,12 +1,12 @@ { "name": "cf-waf-abuseipdb", - "version": "1.0.0", + "version": "1.0.1", "lockfileVersion": 3, "requires": true, "packages": { "": { "name": "cf-waf-abuseipdb", - "version": "1.0.0", + "version": "1.0.1", "license": "MIT", "dependencies": { "axios": "^1.7.5", diff --git a/package.json b/package.json index 07e564d..d82bcaf 100644 --- a/package.json +++ b/package.json @@ -1,6 +1,6 @@ { "name": "cf-waf-abuseipdb", - "version": "1.0.0", + "version": "1.0.1", "description": "A Node.js project that enables automatic reporting of incidents detected by Cloudflare WAF to the AbuseIPDB database.", "keywords": [ "abuseipdb", diff --git a/scripts/payload.js b/scripts/payload.js index f1ec4dd..e8a2521 100644 --- a/scripts/payload.js +++ b/scripts/payload.js @@ -3,7 +3,7 @@ const query = `query ListFirewallEvents($zoneTag: string, $filter: FirewallEvent zones(filter: { zoneTag: $zoneTag }) { firewallEventsAdaptive( filter: $filter, - limit: 800, + limit: 1000, orderBy: [datetime_DESC] ) { action