feat(apache::vhost): refactor ModSecurity configuration handling #722
ci.yml
on: pull_request
Spec
/
Setup Test Matrix
9s
Matrix: Spec / spec
Matrix: Acceptance / acceptance
Waiting for pending jobs
Annotations
10 errors and 3 warnings
|
Spec / Spec tests (Puppet: ~> 8.0, Ruby Ver: 3.2):
spec/defines/vhost_spec.rb#L1450
apache::vhost os-independent items on ubuntu-18.04-x86_64 modsec_anomaly_threshold is expected to contain Concat::Fragment[rspec.example.com-security] with content =~ /
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
/x
Failure/Error:
expect(subject).to contain_concat__fragment('rspec.example.com-security').with(
content: %r{
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
expected that the catalogue would contain Concat::Fragment[rspec.example.com-security] with content set to /
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
/x but it is set to "<IfModule mod_security2.c>\n SecRuleEngine On\n SecAction \\\n \"id:900110,\\\n phase:1,\\\n nolog,\\\n pass,\\\n t:none,\\\n setvar:tx.inbound_anomaly_score_threshold=10000,\\\n setvar:tx.outbound_anomaly_score_threshold=10000\"\n</IfModule>\n"
Diff:
@@ -1,10 +1,11 @@
-(?x-mi:
- ^\s+SecAction\ \\\n
- \s+"id:900110,\\\n
- \s+phase:1,\\\n
- \s+nolog,\\\n
- \s+pass,\\\n
- \s+t:none,\\\n
- \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
- \s+setvar:tx.outbound_anomaly_score_threshold=10000"$
- )
+<IfModule mod_security2.c>
+ SecRuleEngine On
+ SecAction \
+ "id:900110,\
+ phase:1,\
+ nolog,\
+ pass,\
+ t:none,\
+ setvar:tx.inbound_anomaly_score_threshold=10000,\
+ setvar:tx.outbound_anomaly_score_threshold=10000"
+</IfModule>
|
|
Spec / Spec tests (Puppet: ~> 8.0, Ruby Ver: 3.2):
spec/defines/vhost_spec.rb#L1450
apache::vhost os-independent items on sles-15-x86_64 modsec_anomaly_threshold is expected to contain Concat::Fragment[rspec.example.com-security] with content =~ /
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
/x
Failure/Error:
expect(subject).to contain_concat__fragment('rspec.example.com-security').with(
content: %r{
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
expected that the catalogue would contain Concat::Fragment[rspec.example.com-security] with content set to /
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
/x but it is set to "<IfModule mod_security2.c>\n SecRuleEngine On\n SecAction \\\n \"id:900110,\\\n phase:1,\\\n nolog,\\\n pass,\\\n t:none,\\\n setvar:tx.inbound_anomaly_score_threshold=10000,\\\n setvar:tx.outbound_anomaly_score_threshold=10000\"\n</IfModule>\n"
Diff:
@@ -1,10 +1,11 @@
-(?x-mi:
- ^\s+SecAction\ \\\n
- \s+"id:900110,\\\n
- \s+phase:1,\\\n
- \s+nolog,\\\n
- \s+pass,\\\n
- \s+t:none,\\\n
- \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
- \s+setvar:tx.outbound_anomaly_score_threshold=10000"$
- )
+<IfModule mod_security2.c>
+ SecRuleEngine On
+ SecAction \
+ "id:900110,\
+ phase:1,\
+ nolog,\
+ pass,\
+ t:none,\
+ setvar:tx.inbound_anomaly_score_threshold=10000,\
+ setvar:tx.outbound_anomaly_score_threshold=10000"
+</IfModule>
|
|
Spec / Spec tests (Puppet: ~> 8.0, Ruby Ver: 3.2):
spec/defines/vhost_spec.rb#L1450
apache::vhost os-independent items on sles-12-x86_64 modsec_anomaly_threshold is expected to contain Concat::Fragment[rspec.example.com-security] with content =~ /
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
/x
Failure/Error:
expect(subject).to contain_concat__fragment('rspec.example.com-security').with(
content: %r{
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
expected that the catalogue would contain Concat::Fragment[rspec.example.com-security] with content set to /
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
/x but it is set to "<IfModule mod_security2.c>\n SecRuleEngine On\n SecAction \\\n \"id:900110,\\\n phase:1,\\\n nolog,\\\n pass,\\\n t:none,\\\n setvar:tx.inbound_anomaly_score_threshold=10000,\\\n setvar:tx.outbound_anomaly_score_threshold=10000\"\n</IfModule>\n"
Diff:
@@ -1,10 +1,11 @@
-(?x-mi:
- ^\s+SecAction\ \\\n
- \s+"id:900110,\\\n
- \s+phase:1,\\\n
- \s+nolog,\\\n
- \s+pass,\\\n
- \s+t:none,\\\n
- \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
- \s+setvar:tx.outbound_anomaly_score_threshold=10000"$
- )
+<IfModule mod_security2.c>
+ SecRuleEngine On
+ SecAction \
+ "id:900110,\
+ phase:1,\
+ nolog,\
+ pass,\
+ t:none,\
+ setvar:tx.inbound_anomaly_score_threshold=10000,\
+ setvar:tx.outbound_anomaly_score_threshold=10000"
+</IfModule>
|
|
Spec / Spec tests (Puppet: ~> 8.0, Ruby Ver: 3.2):
spec/defines/vhost_spec.rb#L1450
apache::vhost os-independent items on debian-13-x86_64 modsec_anomaly_threshold is expected to contain Concat::Fragment[rspec.example.com-security] with content =~ /
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
/x
Failure/Error:
expect(subject).to contain_concat__fragment('rspec.example.com-security').with(
content: %r{
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
expected that the catalogue would contain Concat::Fragment[rspec.example.com-security] with content set to /
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
/x but it is set to "<IfModule mod_security2.c>\n SecRuleEngine On\n SecAction \\\n \"id:900110,\\\n phase:1,\\\n nolog,\\\n pass,\\\n t:none,\\\n setvar:tx.inbound_anomaly_score_threshold=10000,\\\n setvar:tx.outbound_anomaly_score_threshold=10000\"\n</IfModule>\n"
Diff:
@@ -1,10 +1,11 @@
-(?x-mi:
- ^\s+SecAction\ \\\n
- \s+"id:900110,\\\n
- \s+phase:1,\\\n
- \s+nolog,\\\n
- \s+pass,\\\n
- \s+t:none,\\\n
- \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
- \s+setvar:tx.outbound_anomaly_score_threshold=10000"$
- )
+<IfModule mod_security2.c>
+ SecRuleEngine On
+ SecAction \
+ "id:900110,\
+ phase:1,\
+ nolog,\
+ pass,\
+ t:none,\
+ setvar:tx.inbound_anomaly_score_threshold=10000,\
+ setvar:tx.outbound_anomaly_score_threshold=10000"
+</IfModule>
|
|
Spec / Spec tests (Puppet: ~> 8.0, Ruby Ver: 3.2):
spec/defines/vhost_spec.rb#L1450
apache::vhost os-independent items on debian-12-x86_64 modsec_anomaly_threshold is expected to contain Concat::Fragment[rspec.example.com-security] with content =~ /
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
/x
Failure/Error:
expect(subject).to contain_concat__fragment('rspec.example.com-security').with(
content: %r{
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
expected that the catalogue would contain Concat::Fragment[rspec.example.com-security] with content set to /
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
/x but it is set to "<IfModule mod_security2.c>\n SecRuleEngine On\n SecAction \\\n \"id:900110,\\\n phase:1,\\\n nolog,\\\n pass,\\\n t:none,\\\n setvar:tx.inbound_anomaly_score_threshold=10000,\\\n setvar:tx.outbound_anomaly_score_threshold=10000\"\n</IfModule>\n"
Diff:
@@ -1,10 +1,11 @@
-(?x-mi:
- ^\s+SecAction\ \\\n
- \s+"id:900110,\\\n
- \s+phase:1,\\\n
- \s+nolog,\\\n
- \s+pass,\\\n
- \s+t:none,\\\n
- \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
- \s+setvar:tx.outbound_anomaly_score_threshold=10000"$
- )
+<IfModule mod_security2.c>
+ SecRuleEngine On
+ SecAction \
+ "id:900110,\
+ phase:1,\
+ nolog,\
+ pass,\
+ t:none,\
+ setvar:tx.inbound_anomaly_score_threshold=10000,\
+ setvar:tx.outbound_anomaly_score_threshold=10000"
+</IfModule>
|
|
Spec / Spec tests (Puppet: ~> 8.0, Ruby Ver: 3.2):
spec/defines/vhost_spec.rb#L1450
apache::vhost os-independent items on debian-11-x86_64 modsec_anomaly_threshold is expected to contain Concat::Fragment[rspec.example.com-security] with content =~ /
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
/x
Failure/Error:
expect(subject).to contain_concat__fragment('rspec.example.com-security').with(
content: %r{
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
expected that the catalogue would contain Concat::Fragment[rspec.example.com-security] with content set to /
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
/x but it is set to "<IfModule mod_security2.c>\n SecRuleEngine On\n SecAction \\\n \"id:900110,\\\n phase:1,\\\n nolog,\\\n pass,\\\n t:none,\\\n setvar:tx.inbound_anomaly_score_threshold=10000,\\\n setvar:tx.outbound_anomaly_score_threshold=10000\"\n</IfModule>\n"
Diff:
@@ -1,10 +1,11 @@
-(?x-mi:
- ^\s+SecAction\ \\\n
- \s+"id:900110,\\\n
- \s+phase:1,\\\n
- \s+nolog,\\\n
- \s+pass,\\\n
- \s+t:none,\\\n
- \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
- \s+setvar:tx.outbound_anomaly_score_threshold=10000"$
- )
+<IfModule mod_security2.c>
+ SecRuleEngine On
+ SecAction \
+ "id:900110,\
+ phase:1,\
+ nolog,\
+ pass,\
+ t:none,\
+ setvar:tx.inbound_anomaly_score_threshold=10000,\
+ setvar:tx.outbound_anomaly_score_threshold=10000"
+</IfModule>
|
|
Spec / Spec tests (Puppet: ~> 8.0, Ruby Ver: 3.2):
spec/defines/vhost_spec.rb#L1450
apache::vhost os-independent items on scientific-7-x86_64 modsec_anomaly_threshold is expected to contain Concat::Fragment[rspec.example.com-security] with content =~ /
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
/x
Failure/Error:
expect(subject).to contain_concat__fragment('rspec.example.com-security').with(
content: %r{
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
expected that the catalogue would contain Concat::Fragment[rspec.example.com-security] with content set to /
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
/x but it is set to "<IfModule mod_security2.c>\n SecRuleEngine On\n SecAction \\\n \"id:900110,\\\n phase:1,\\\n nolog,\\\n pass,\\\n t:none,\\\n setvar:tx.inbound_anomaly_score_threshold=10000,\\\n setvar:tx.outbound_anomaly_score_threshold=10000\"\n</IfModule>\n"
Diff:
@@ -1,10 +1,11 @@
-(?x-mi:
- ^\s+SecAction\ \\\n
- \s+"id:900110,\\\n
- \s+phase:1,\\\n
- \s+nolog,\\\n
- \s+pass,\\\n
- \s+t:none,\\\n
- \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
- \s+setvar:tx.outbound_anomaly_score_threshold=10000"$
- )
+<IfModule mod_security2.c>
+ SecRuleEngine On
+ SecAction \
+ "id:900110,\
+ phase:1,\
+ nolog,\
+ pass,\
+ t:none,\
+ setvar:tx.inbound_anomaly_score_threshold=10000,\
+ setvar:tx.outbound_anomaly_score_threshold=10000"
+</IfModule>
|
|
Spec / Spec tests (Puppet: ~> 8.0, Ruby Ver: 3.2):
spec/defines/vhost_spec.rb#L1450
apache::vhost os-independent items on oraclelinux-7-x86_64 modsec_anomaly_threshold is expected to contain Concat::Fragment[rspec.example.com-security] with content =~ /
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
/x
Failure/Error:
expect(subject).to contain_concat__fragment('rspec.example.com-security').with(
content: %r{
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
expected that the catalogue would contain Concat::Fragment[rspec.example.com-security] with content set to /
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
/x but it is set to "<IfModule mod_security2.c>\n SecRuleEngine On\n SecAction \\\n \"id:900110,\\\n phase:1,\\\n nolog,\\\n pass,\\\n t:none,\\\n setvar:tx.inbound_anomaly_score_threshold=10000,\\\n setvar:tx.outbound_anomaly_score_threshold=10000\"\n</IfModule>\n"
Diff:
@@ -1,10 +1,11 @@
-(?x-mi:
- ^\s+SecAction\ \\\n
- \s+"id:900110,\\\n
- \s+phase:1,\\\n
- \s+nolog,\\\n
- \s+pass,\\\n
- \s+t:none,\\\n
- \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
- \s+setvar:tx.outbound_anomaly_score_threshold=10000"$
- )
+<IfModule mod_security2.c>
+ SecRuleEngine On
+ SecAction \
+ "id:900110,\
+ phase:1,\
+ nolog,\
+ pass,\
+ t:none,\
+ setvar:tx.inbound_anomaly_score_threshold=10000,\
+ setvar:tx.outbound_anomaly_score_threshold=10000"
+</IfModule>
|
|
Spec / Spec tests (Puppet: ~> 8.0, Ruby Ver: 3.2):
spec/defines/vhost_spec.rb#L1450
apache::vhost os-independent items on redhat-9-x86_64 modsec_anomaly_threshold is expected to contain Concat::Fragment[rspec.example.com-security] with content =~ /
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
/x
Failure/Error:
expect(subject).to contain_concat__fragment('rspec.example.com-security').with(
content: %r{
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
expected that the catalogue would contain Concat::Fragment[rspec.example.com-security] with content set to /
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
/x but it is set to "<IfModule mod_security2.c>\n SecRuleEngine On\n SecAction \\\n \"id:900110,\\\n phase:1,\\\n nolog,\\\n pass,\\\n t:none,\\\n setvar:tx.inbound_anomaly_score_threshold=10000,\\\n setvar:tx.outbound_anomaly_score_threshold=10000\"\n</IfModule>\n"
Diff:
@@ -1,10 +1,11 @@
-(?x-mi:
- ^\s+SecAction\ \\\n
- \s+"id:900110,\\\n
- \s+phase:1,\\\n
- \s+nolog,\\\n
- \s+pass,\\\n
- \s+t:none,\\\n
- \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
- \s+setvar:tx.outbound_anomaly_score_threshold=10000"$
- )
+<IfModule mod_security2.c>
+ SecRuleEngine On
+ SecAction \
+ "id:900110,\
+ phase:1,\
+ nolog,\
+ pass,\
+ t:none,\
+ setvar:tx.inbound_anomaly_score_threshold=10000,\
+ setvar:tx.outbound_anomaly_score_threshold=10000"
+</IfModule>
|
|
Spec / Spec tests (Puppet: ~> 8.0, Ruby Ver: 3.2):
spec/defines/vhost_spec.rb#L1450
apache::vhost os-independent items on redhat-8-x86_64 modsec_anomaly_threshold is expected to contain Concat::Fragment[rspec.example.com-security] with content =~ /
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
/x
Failure/Error:
expect(subject).to contain_concat__fragment('rspec.example.com-security').with(
content: %r{
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
expected that the catalogue would contain Concat::Fragment[rspec.example.com-security] with content set to /
^\s+SecAction\ \\\n
\s+"id:900110,\\\n
\s+phase:1,\\\n
\s+nolog,\\\n
\s+pass,\\\n
\s+t:none,\\\n
\s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
\s+setvar:tx.outbound_anomaly_score_threshold=10000"$
/x but it is set to "<IfModule mod_security2.c>\n SecRuleEngine On\n SecAction \\\n \"id:900110,\\\n phase:1,\\\n nolog,\\\n pass,\\\n t:none,\\\n setvar:tx.inbound_anomaly_score_threshold=10000,\\\n setvar:tx.outbound_anomaly_score_threshold=10000\"\n</IfModule>\n"
Diff:
@@ -1,10 +1,11 @@
-(?x-mi:
- ^\s+SecAction\ \\\n
- \s+"id:900110,\\\n
- \s+phase:1,\\\n
- \s+nolog,\\\n
- \s+pass,\\\n
- \s+t:none,\\\n
- \s+setvar:tx.inbound_anomaly_score_threshold=10000,\ \\\n
- \s+setvar:tx.outbound_anomaly_score_threshold=10000"$
- )
+<IfModule mod_security2.c>
+ SecRuleEngine On
+ SecAction \
+ "id:900110,\
+ phase:1,\
+ nolog,\
+ pass,\
+ t:none,\
+ setvar:tx.inbound_anomaly_score_threshold=10000,\
+ setvar:tx.outbound_anomaly_score_threshold=10000"
+</IfModule>
|
|
Spec / Setup Test Matrix
Node.js 20 actions are deprecated. The following actions are running on Node.js 20 and may not work as expected: actions/checkout@v4. Actions will be forced to run with Node.js 24 by default starting June 2nd, 2026. Node.js 20 will be removed from the runner on September 16th, 2026. Please check if updated versions of these actions are available that support Node.js 24. To opt into Node.js 24 now, set the FORCE_JAVASCRIPT_ACTIONS_TO_NODE24=true environment variable on the runner or in your workflow file. Once Node.js 24 becomes the default, you can temporarily opt out by setting ACTIONS_ALLOW_USE_UNSECURE_NODE_VERSION=true. For more information see: https://github.blog/changelog/2025-09-19-deprecation-of-node-20-on-github-actions-runners/
|
|
Spec / Setup Test Matrix
Debian-13 no provisioner found
|
|
Spec / Spec tests (Puppet: ~> 8.0, Ruby Ver: 3.2)
Node.js 20 actions are deprecated. The following actions are running on Node.js 20 and may not work as expected: actions/checkout@v4. Actions will be forced to run with Node.js 24 by default starting June 2nd, 2026. Node.js 20 will be removed from the runner on September 16th, 2026. Please check if updated versions of these actions are available that support Node.js 24. To opt into Node.js 24 now, set the FORCE_JAVASCRIPT_ACTIONS_TO_NODE24=true environment variable on the runner or in your workflow file. Once Node.js 24 becomes the default, you can temporarily opt out by setting ACTIONS_ALLOW_USE_UNSECURE_NODE_VERSION=true. For more information see: https://github.blog/changelog/2025-09-19-deprecation-of-node-20-on-github-actions-runners/
|