diff --git a/appsec/tests/extension/push_params_redirect.phpt b/appsec/tests/extension/push_params_redirect_01.phpt similarity index 100% rename from appsec/tests/extension/push_params_redirect.phpt rename to appsec/tests/extension/push_params_redirect_01.phpt diff --git a/appsec/tests/extension/push_params_redirect_02.phpt b/appsec/tests/extension/push_params_redirect_02.phpt new file mode 100644 index 00000000000..e169294abf4 --- /dev/null +++ b/appsec/tests/extension/push_params_redirect_02.phpt @@ -0,0 +1,42 @@ +--TEST-- +Push address gets blocked +--INI-- +extension=ddtrace.so +datadog.appsec.enabled=1 +--FILE-- + '303', 'location' => 'https://datadoghq.com']]], []])), +]); +rinit(); + +class SomeIntegration { + public function init() + { + DDTrace\install_hook("ltrim", self::hooked_function(), null); + } + + private static function hooked_function() + { + return static function (DDTrace\HookData $hook) { + push_address("server.request.path_params", ["some" => "params", "more" => "parameters"]); + var_dump("This should be executed"); + }; + } +} + +$integration = new SomeIntegration(); +$integration->init(); +var_dump(ltrim(" Calling wrapped function")); +var_dump("THIS SHOULD NOT GET IN THE OUTPUT"); +?> +--EXPECTHEADERS-- +Status: 303 See Other +Content-type: text/html; charset=UTF-8 +--EXPECTF--