-
Notifications
You must be signed in to change notification settings - Fork 435
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add description #2
Comments
i was looking to do that but i don't have rights, @kevoreilly can you add this? |
Done - thanks for the reminder. |
4 tasks
klingerko
pushed a commit
to EmergingThreats/CAPEv2
that referenced
this issue
Oct 18, 2021
add link to analysis to rule reference
nbargnesi
added a commit
to nbargnesi/CAPEv2
that referenced
this issue
Feb 9, 2023
Ideally key collisions across multiple configs could combine data, so multiple values could be generated across configs. For example, config kevoreilly#1 generates the following: {"cfg1": {"key": "value1"} While config kevoreilly#2 generates: {"cfg1": {"key": "value2"} And their combined config becomes: {"cfg1": {"key": ["value1", "value2"]}} The existing behavior is to let the last config win on key collisions, resulting instead in: {"cfg1": {"key": "value2"}} So reflect that in the new test coverage, and simplify the config update method by forwarding the cape_name.
nbargnesi
added a commit
to nbargnesi/CAPEv2
that referenced
this issue
Feb 9, 2023
Ideally key collisions across multiple configs could combine data, so multiple values could be generated across configs. For example, config kevoreilly#1 generates the following: {"cfg1": {"key": "value1"} While config kevoreilly#2 generates: {"cfg1": {"key": "value2"} And their combined config becomes: {"cfg1": {"key": ["value1", "value2"]}} The existing behavior is to let the last config win on key collisions, resulting instead in: {"cfg1": {"key": "value2"}} So reflect that in the new test coverage, and simplify the config update method by forwarding the cape_name.
doomedraven
pushed a commit
that referenced
this issue
Feb 9, 2023
…ial for data loss (#1357) * add config update test coverage, part 1 These tests are known to pass based on the current implementation of update_cape_configs. * add config update test coverage, part 2 This test is known to fail based on the current implementation of update_cape_configs. * run python-package workflow on all branches * simplify update_cape_configs and update tests Ideally key collisions across multiple configs could combine data, so multiple values could be generated across configs. For example, config #1 generates the following: {"cfg1": {"key": "value1"} While config #2 generates: {"cfg1": {"key": "value2"} And their combined config becomes: {"cfg1": {"key": ["value1", "value2"]}} The existing behavior is to let the last config win on key collisions, resulting instead in: {"cfg1": {"key": "value2"}} So reflect that in the new test coverage, and simplify the config update method by forwarding the cape_name. * log the potential for data loss * less ruff now * Revert "run python-package workflow on all branches" This reverts commit 4868ffa. * link test coverage to #1357 --------- Co-authored-by: Nick Bargnesi
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Could a description for the repo be added? E.g. same like before but changed URL:
Not super-important, but would be nice to add. Thank you!
The text was updated successfully, but these errors were encountered: