1.0.1
This commit is contained in:
parent
dd58b7729e
commit
340c05bf7d
4 changed files with 7 additions and 5 deletions
4
index.js
4
index.js
|
|
@ -1,4 +1,5 @@
|
|||
require('dotenv').config();
|
||||
|
||||
const axios = require('axios');
|
||||
const PAYLOAD = require('./scripts/payload.js');
|
||||
const generateComment = require('./scripts/generateComment.js');
|
||||
|
|
@ -7,6 +8,7 @@ const headers = require('./scripts/headers.js');
|
|||
const { logToCSV, readReportedIPs, wasImageRequestLogged } = require('./scripts/csv.js');
|
||||
const formatDelay = require('./scripts/formatDelay.js');
|
||||
const log = require('./scripts/log.js');
|
||||
const { version } = require('./package.json');
|
||||
|
||||
const MAIN_DELAY = process.env.NODE_ENV === 'production'
|
||||
? 3 * 60 * 60 * 1000
|
||||
|
|
@ -96,7 +98,7 @@ const reportIP = async (event, url, country, cycleErrorCounts) => {
|
|||
let cycleId = 1;
|
||||
|
||||
while (true) {
|
||||
log('info', '===================== New Reporting Cycle =====================');
|
||||
log('info', `===================== New Reporting Cycle (v${version}) =====================`);
|
||||
|
||||
const blockedIPEvents = await fetchBlockedIPs();
|
||||
if (!blockedIPEvents) {
|
||||
|
|
|
|||
4
package-lock.json
generated
4
package-lock.json
generated
|
|
@ -1,12 +1,12 @@
|
|||
{
|
||||
"name": "cf-waf-abuseipdb",
|
||||
"version": "1.0.0",
|
||||
"version": "1.0.1",
|
||||
"lockfileVersion": 3,
|
||||
"requires": true,
|
||||
"packages": {
|
||||
"": {
|
||||
"name": "cf-waf-abuseipdb",
|
||||
"version": "1.0.0",
|
||||
"version": "1.0.1",
|
||||
"license": "MIT",
|
||||
"dependencies": {
|
||||
"axios": "^1.7.5",
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
{
|
||||
"name": "cf-waf-abuseipdb",
|
||||
"version": "1.0.0",
|
||||
"version": "1.0.1",
|
||||
"description": "A Node.js project that enables automatic reporting of incidents detected by Cloudflare WAF to the AbuseIPDB database.",
|
||||
"keywords": [
|
||||
"abuseipdb",
|
||||
|
|
|
|||
|
|
@ -3,7 +3,7 @@ const query = `query ListFirewallEvents($zoneTag: string, $filter: FirewallEvent
|
|||
zones(filter: { zoneTag: $zoneTag }) {
|
||||
firewallEventsAdaptive(
|
||||
filter: $filter,
|
||||
limit: 800,
|
||||
limit: 1000,
|
||||
orderBy: [datetime_DESC]
|
||||
) {
|
||||
action
|
||||
|
|
|
|||
Loading…
Add table
Reference in a new issue