Skip to content

feat(apache::vhost): refactor ModSecurity configuration handling #722

feat(apache::vhost): refactor ModSecurity configuration handling

feat(apache::vhost): refactor ModSecurity configuration handling #722

Triggered via pull request April 3, 2026 21:53
@bovy89bovy89
synchronize #2627
bovy89:main
Status Failure
Total duration 14m 54s
Artifacts

ci.yml

on: pull_request
Spec  /  Setup Test Matrix
9s
Spec / Setup Test Matrix
Matrix: Spec / spec
Acceptance  /  Setup Test Matrix
Acceptance / Setup Test Matrix
Matrix: Acceptance / acceptance
Waiting for pending jobs
Fit to window
Zoom out
Zoom in

Annotations

10 errors and 3 warnings
Spec / Spec tests (Puppet: ~> 8.0, Ruby Ver: 3.2): spec/defines/vhost_spec.rb#L1450
apache::vhost os-independent items on ubuntu-18.04-x86_64 modsec_anomaly_threshold is expected to contain Concat::Fragment[rspec.example.com-security] with content =~ / ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ /x Failure/Error: expect(subject).to contain_concat__fragment('rspec.example.com-security').with( content: %r{ ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ expected that the catalogue would contain Concat::Fragment[rspec.example.com-security] with content set to / ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ /x but it is set to "<IfModule mod_security2.c>\n SecRuleEngine On\n SecAction \\\n \"id:900110,\\\n phase:1,\\\n nolog,\\\n pass,\\\n t:none,\\\n setvar:tx.inbound_anomaly_score_threshold=10000,\\\n setvar:tx.outbound_anomaly_score_threshold=10000\"\n</IfModule>\n" Diff: @@ -1,10 +1,11 @@ -(?x-mi: - ^\s+SecAction\ \\\n - \s+"id:900110,\\\n - \s+phase:1,\\\n - \s+nolog,\\\n - \s+pass,\\\n - \s+t:none,\\\n - \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n - \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ - ) +<IfModule mod_security2.c> + SecRuleEngine On + SecAction \ + "id:900110,\ + phase:1,\ + nolog,\ + pass,\ + t:none,\ + setvar:tx.inbound_anomaly_score_threshold=10000,\ + setvar:tx.outbound_anomaly_score_threshold=10000" +</IfModule>
Spec / Spec tests (Puppet: ~> 8.0, Ruby Ver: 3.2): spec/defines/vhost_spec.rb#L1450
apache::vhost os-independent items on sles-15-x86_64 modsec_anomaly_threshold is expected to contain Concat::Fragment[rspec.example.com-security] with content =~ / ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ /x Failure/Error: expect(subject).to contain_concat__fragment('rspec.example.com-security').with( content: %r{ ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ expected that the catalogue would contain Concat::Fragment[rspec.example.com-security] with content set to / ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ /x but it is set to "<IfModule mod_security2.c>\n SecRuleEngine On\n SecAction \\\n \"id:900110,\\\n phase:1,\\\n nolog,\\\n pass,\\\n t:none,\\\n setvar:tx.inbound_anomaly_score_threshold=10000,\\\n setvar:tx.outbound_anomaly_score_threshold=10000\"\n</IfModule>\n" Diff: @@ -1,10 +1,11 @@ -(?x-mi: - ^\s+SecAction\ \\\n - \s+"id:900110,\\\n - \s+phase:1,\\\n - \s+nolog,\\\n - \s+pass,\\\n - \s+t:none,\\\n - \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n - \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ - ) +<IfModule mod_security2.c> + SecRuleEngine On + SecAction \ + "id:900110,\ + phase:1,\ + nolog,\ + pass,\ + t:none,\ + setvar:tx.inbound_anomaly_score_threshold=10000,\ + setvar:tx.outbound_anomaly_score_threshold=10000" +</IfModule>
Spec / Spec tests (Puppet: ~> 8.0, Ruby Ver: 3.2): spec/defines/vhost_spec.rb#L1450
apache::vhost os-independent items on sles-12-x86_64 modsec_anomaly_threshold is expected to contain Concat::Fragment[rspec.example.com-security] with content =~ / ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ /x Failure/Error: expect(subject).to contain_concat__fragment('rspec.example.com-security').with( content: %r{ ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ expected that the catalogue would contain Concat::Fragment[rspec.example.com-security] with content set to / ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ /x but it is set to "<IfModule mod_security2.c>\n SecRuleEngine On\n SecAction \\\n \"id:900110,\\\n phase:1,\\\n nolog,\\\n pass,\\\n t:none,\\\n setvar:tx.inbound_anomaly_score_threshold=10000,\\\n setvar:tx.outbound_anomaly_score_threshold=10000\"\n</IfModule>\n" Diff: @@ -1,10 +1,11 @@ -(?x-mi: - ^\s+SecAction\ \\\n - \s+"id:900110,\\\n - \s+phase:1,\\\n - \s+nolog,\\\n - \s+pass,\\\n - \s+t:none,\\\n - \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n - \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ - ) +<IfModule mod_security2.c> + SecRuleEngine On + SecAction \ + "id:900110,\ + phase:1,\ + nolog,\ + pass,\ + t:none,\ + setvar:tx.inbound_anomaly_score_threshold=10000,\ + setvar:tx.outbound_anomaly_score_threshold=10000" +</IfModule>
Spec / Spec tests (Puppet: ~> 8.0, Ruby Ver: 3.2): spec/defines/vhost_spec.rb#L1450
apache::vhost os-independent items on debian-13-x86_64 modsec_anomaly_threshold is expected to contain Concat::Fragment[rspec.example.com-security] with content =~ / ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ /x Failure/Error: expect(subject).to contain_concat__fragment('rspec.example.com-security').with( content: %r{ ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ expected that the catalogue would contain Concat::Fragment[rspec.example.com-security] with content set to / ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ /x but it is set to "<IfModule mod_security2.c>\n SecRuleEngine On\n SecAction \\\n \"id:900110,\\\n phase:1,\\\n nolog,\\\n pass,\\\n t:none,\\\n setvar:tx.inbound_anomaly_score_threshold=10000,\\\n setvar:tx.outbound_anomaly_score_threshold=10000\"\n</IfModule>\n" Diff: @@ -1,10 +1,11 @@ -(?x-mi: - ^\s+SecAction\ \\\n - \s+"id:900110,\\\n - \s+phase:1,\\\n - \s+nolog,\\\n - \s+pass,\\\n - \s+t:none,\\\n - \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n - \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ - ) +<IfModule mod_security2.c> + SecRuleEngine On + SecAction \ + "id:900110,\ + phase:1,\ + nolog,\ + pass,\ + t:none,\ + setvar:tx.inbound_anomaly_score_threshold=10000,\ + setvar:tx.outbound_anomaly_score_threshold=10000" +</IfModule>
Spec / Spec tests (Puppet: ~> 8.0, Ruby Ver: 3.2): spec/defines/vhost_spec.rb#L1450
apache::vhost os-independent items on debian-12-x86_64 modsec_anomaly_threshold is expected to contain Concat::Fragment[rspec.example.com-security] with content =~ / ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ /x Failure/Error: expect(subject).to contain_concat__fragment('rspec.example.com-security').with( content: %r{ ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ expected that the catalogue would contain Concat::Fragment[rspec.example.com-security] with content set to / ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ /x but it is set to "<IfModule mod_security2.c>\n SecRuleEngine On\n SecAction \\\n \"id:900110,\\\n phase:1,\\\n nolog,\\\n pass,\\\n t:none,\\\n setvar:tx.inbound_anomaly_score_threshold=10000,\\\n setvar:tx.outbound_anomaly_score_threshold=10000\"\n</IfModule>\n" Diff: @@ -1,10 +1,11 @@ -(?x-mi: - ^\s+SecAction\ \\\n - \s+"id:900110,\\\n - \s+phase:1,\\\n - \s+nolog,\\\n - \s+pass,\\\n - \s+t:none,\\\n - \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n - \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ - ) +<IfModule mod_security2.c> + SecRuleEngine On + SecAction \ + "id:900110,\ + phase:1,\ + nolog,\ + pass,\ + t:none,\ + setvar:tx.inbound_anomaly_score_threshold=10000,\ + setvar:tx.outbound_anomaly_score_threshold=10000" +</IfModule>
Spec / Spec tests (Puppet: ~> 8.0, Ruby Ver: 3.2): spec/defines/vhost_spec.rb#L1450
apache::vhost os-independent items on debian-11-x86_64 modsec_anomaly_threshold is expected to contain Concat::Fragment[rspec.example.com-security] with content =~ / ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ /x Failure/Error: expect(subject).to contain_concat__fragment('rspec.example.com-security').with( content: %r{ ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ expected that the catalogue would contain Concat::Fragment[rspec.example.com-security] with content set to / ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ /x but it is set to "<IfModule mod_security2.c>\n SecRuleEngine On\n SecAction \\\n \"id:900110,\\\n phase:1,\\\n nolog,\\\n pass,\\\n t:none,\\\n setvar:tx.inbound_anomaly_score_threshold=10000,\\\n setvar:tx.outbound_anomaly_score_threshold=10000\"\n</IfModule>\n" Diff: @@ -1,10 +1,11 @@ -(?x-mi: - ^\s+SecAction\ \\\n - \s+"id:900110,\\\n - \s+phase:1,\\\n - \s+nolog,\\\n - \s+pass,\\\n - \s+t:none,\\\n - \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n - \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ - ) +<IfModule mod_security2.c> + SecRuleEngine On + SecAction \ + "id:900110,\ + phase:1,\ + nolog,\ + pass,\ + t:none,\ + setvar:tx.inbound_anomaly_score_threshold=10000,\ + setvar:tx.outbound_anomaly_score_threshold=10000" +</IfModule>
Spec / Spec tests (Puppet: ~> 8.0, Ruby Ver: 3.2): spec/defines/vhost_spec.rb#L1450
apache::vhost os-independent items on scientific-7-x86_64 modsec_anomaly_threshold is expected to contain Concat::Fragment[rspec.example.com-security] with content =~ / ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ /x Failure/Error: expect(subject).to contain_concat__fragment('rspec.example.com-security').with( content: %r{ ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ expected that the catalogue would contain Concat::Fragment[rspec.example.com-security] with content set to / ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ /x but it is set to "<IfModule mod_security2.c>\n SecRuleEngine On\n SecAction \\\n \"id:900110,\\\n phase:1,\\\n nolog,\\\n pass,\\\n t:none,\\\n setvar:tx.inbound_anomaly_score_threshold=10000,\\\n setvar:tx.outbound_anomaly_score_threshold=10000\"\n</IfModule>\n" Diff: @@ -1,10 +1,11 @@ -(?x-mi: - ^\s+SecAction\ \\\n - \s+"id:900110,\\\n - \s+phase:1,\\\n - \s+nolog,\\\n - \s+pass,\\\n - \s+t:none,\\\n - \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n - \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ - ) +<IfModule mod_security2.c> + SecRuleEngine On + SecAction \ + "id:900110,\ + phase:1,\ + nolog,\ + pass,\ + t:none,\ + setvar:tx.inbound_anomaly_score_threshold=10000,\ + setvar:tx.outbound_anomaly_score_threshold=10000" +</IfModule>
Spec / Spec tests (Puppet: ~> 8.0, Ruby Ver: 3.2): spec/defines/vhost_spec.rb#L1450
apache::vhost os-independent items on oraclelinux-7-x86_64 modsec_anomaly_threshold is expected to contain Concat::Fragment[rspec.example.com-security] with content =~ / ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ /x Failure/Error: expect(subject).to contain_concat__fragment('rspec.example.com-security').with( content: %r{ ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ expected that the catalogue would contain Concat::Fragment[rspec.example.com-security] with content set to / ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ /x but it is set to "<IfModule mod_security2.c>\n SecRuleEngine On\n SecAction \\\n \"id:900110,\\\n phase:1,\\\n nolog,\\\n pass,\\\n t:none,\\\n setvar:tx.inbound_anomaly_score_threshold=10000,\\\n setvar:tx.outbound_anomaly_score_threshold=10000\"\n</IfModule>\n" Diff: @@ -1,10 +1,11 @@ -(?x-mi: - ^\s+SecAction\ \\\n - \s+"id:900110,\\\n - \s+phase:1,\\\n - \s+nolog,\\\n - \s+pass,\\\n - \s+t:none,\\\n - \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n - \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ - ) +<IfModule mod_security2.c> + SecRuleEngine On + SecAction \ + "id:900110,\ + phase:1,\ + nolog,\ + pass,\ + t:none,\ + setvar:tx.inbound_anomaly_score_threshold=10000,\ + setvar:tx.outbound_anomaly_score_threshold=10000" +</IfModule>
Spec / Spec tests (Puppet: ~> 8.0, Ruby Ver: 3.2): spec/defines/vhost_spec.rb#L1450
apache::vhost os-independent items on redhat-9-x86_64 modsec_anomaly_threshold is expected to contain Concat::Fragment[rspec.example.com-security] with content =~ / ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ /x Failure/Error: expect(subject).to contain_concat__fragment('rspec.example.com-security').with( content: %r{ ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ expected that the catalogue would contain Concat::Fragment[rspec.example.com-security] with content set to / ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ /x but it is set to "<IfModule mod_security2.c>\n SecRuleEngine On\n SecAction \\\n \"id:900110,\\\n phase:1,\\\n nolog,\\\n pass,\\\n t:none,\\\n setvar:tx.inbound_anomaly_score_threshold=10000,\\\n setvar:tx.outbound_anomaly_score_threshold=10000\"\n</IfModule>\n" Diff: @@ -1,10 +1,11 @@ -(?x-mi: - ^\s+SecAction\ \\\n - \s+"id:900110,\\\n - \s+phase:1,\\\n - \s+nolog,\\\n - \s+pass,\\\n - \s+t:none,\\\n - \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n - \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ - ) +<IfModule mod_security2.c> + SecRuleEngine On + SecAction \ + "id:900110,\ + phase:1,\ + nolog,\ + pass,\ + t:none,\ + setvar:tx.inbound_anomaly_score_threshold=10000,\ + setvar:tx.outbound_anomaly_score_threshold=10000" +</IfModule>
Spec / Spec tests (Puppet: ~> 8.0, Ruby Ver: 3.2): spec/defines/vhost_spec.rb#L1450
apache::vhost os-independent items on redhat-8-x86_64 modsec_anomaly_threshold is expected to contain Concat::Fragment[rspec.example.com-security] with content =~ / ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ /x Failure/Error: expect(subject).to contain_concat__fragment('rspec.example.com-security').with( content: %r{ ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ expected that the catalogue would contain Concat::Fragment[rspec.example.com-security] with content set to / ^\s+SecAction\ \\\n \s+"id:900110,\\\n \s+phase:1,\\\n \s+nolog,\\\n \s+pass,\\\n \s+t:none,\\\n \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ /x but it is set to "<IfModule mod_security2.c>\n SecRuleEngine On\n SecAction \\\n \"id:900110,\\\n phase:1,\\\n nolog,\\\n pass,\\\n t:none,\\\n setvar:tx.inbound_anomaly_score_threshold=10000,\\\n setvar:tx.outbound_anomaly_score_threshold=10000\"\n</IfModule>\n" Diff: @@ -1,10 +1,11 @@ -(?x-mi: - ^\s+SecAction\ \\\n - \s+"id:900110,\\\n - \s+phase:1,\\\n - \s+nolog,\\\n - \s+pass,\\\n - \s+t:none,\\\n - \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n - \s+setvar:tx.outbound_anomaly_score_threshold=10000"$ - ) +<IfModule mod_security2.c> + SecRuleEngine On + SecAction \ + "id:900110,\ + phase:1,\ + nolog,\ + pass,\ + t:none,\ + setvar:tx.inbound_anomaly_score_threshold=10000,\ + setvar:tx.outbound_anomaly_score_threshold=10000" +</IfModule>
Spec / Setup Test Matrix
Node.js 20 actions are deprecated. The following actions are running on Node.js 20 and may not work as expected: actions/checkout@v4. Actions will be forced to run with Node.js 24 by default starting June 2nd, 2026. Node.js 20 will be removed from the runner on September 16th, 2026. Please check if updated versions of these actions are available that support Node.js 24. To opt into Node.js 24 now, set the FORCE_JAVASCRIPT_ACTIONS_TO_NODE24=true environment variable on the runner or in your workflow file. Once Node.js 24 becomes the default, you can temporarily opt out by setting ACTIONS_ALLOW_USE_UNSECURE_NODE_VERSION=true. For more information see: https://github.blog/changelog/2025-09-19-deprecation-of-node-20-on-github-actions-runners/
Spec / Setup Test Matrix
Debian-13 no provisioner found
Spec / Spec tests (Puppet: ~> 8.0, Ruby Ver: 3.2)
Node.js 20 actions are deprecated. The following actions are running on Node.js 20 and may not work as expected: actions/checkout@v4. Actions will be forced to run with Node.js 24 by default starting June 2nd, 2026. Node.js 20 will be removed from the runner on September 16th, 2026. Please check if updated versions of these actions are available that support Node.js 24. To opt into Node.js 24 now, set the FORCE_JAVASCRIPT_ACTIONS_TO_NODE24=true environment variable on the runner or in your workflow file. Once Node.js 24 becomes the default, you can temporarily opt out by setting ACTIONS_ALLOW_USE_UNSECURE_NODE_VERSION=true. For more information see: https://github.blog/changelog/2025-09-19-deprecation-of-node-20-on-github-actions-runners/