|
8 | 8 | SecRuleEngine On |
9 | 9 | SecDebugLog$ENV{DEBUG_LOG} |
10 | 10 | SecDebugLogLevel9 |
11 | | -SecRule REQUEST_URI"test""phase:1,deny,status:500,id:1" |
12 | | -SecRuleRemoveById1 |
| 11 | +SecRule REQUEST_URI"test""phase:1,deny,status:500,id:101010" |
| 12 | +SecRuleRemoveById101010 |
13 | 13 | ), |
14 | 14 | match_log=> { |
15 | | --error=> [ qr/ModSecurity:/,1 ], |
| 15 | +-error=> [ qr/101010/,1 ], |
16 | 16 | -audit=> [ qr/./,1 ], |
17 | 17 | debug=> [ qr/Starting phase REQUEST_HEADERS\..*This phase consistsof0 rule.*Starting phase RESPONSE_HEADERS\./s,1 ], |
18 | 18 | -debug=> [ qr/Access denied/,1 ], |
|
31 | 31 | SecRuleEngine On |
32 | 32 | SecDebugLog$ENV{DEBUG_LOG} |
33 | 33 | SecDebugLogLevel9 |
34 | | -SecRule REQUEST_URI"test""phase:1,deny,status:500,id:1" |
35 | | -SecRule REQUEST_URI"test""phase:1,deny,status:500,id:2" |
36 | | -SecRule REQUEST_URI"test""phase:1,deny,status:500,id:3" |
37 | | -SecRuleRemoveById123 |
| 34 | +SecRule REQUEST_URI"test""phase:1,deny,status:500,id:101010" |
| 35 | +SecRule REQUEST_URI"test""phase:1,deny,status:500,id:202020" |
| 36 | +SecRule REQUEST_URI"test""phase:1,deny,status:500,id:303030" |
| 37 | +SecRuleRemoveById101010202020303030 |
38 | 38 | ), |
39 | 39 | match_log=> { |
40 | | --error=> [ qr/ModSecurity:/,1 ], |
| 40 | +-error=> [ qr/101010|202020|303030/,1 ], |
41 | 41 | -audit=> [ qr/./,1 ], |
42 | 42 | debug=> [ qr/Starting phase REQUEST_HEADERS\..*This phase consistsof0 rule.*Starting phase RESPONSE_HEADERS\./s,1 ], |
43 | 43 | -debug=> [ qr/Access denied/,1 ], |
|
56 | 56 | SecRuleEngine On |
57 | 57 | SecDebugLog$ENV{DEBUG_LOG} |
58 | 58 | SecDebugLogLevel9 |
59 | | -SecRule REQUEST_URI"test""phase:1,deny,status:500,id:1" |
60 | | -SecRule REQUEST_URI"test""phase:1,deny,status:500,id:2" |
61 | | -SecRule REQUEST_URI"test""phase:1,deny,status:500,id:3" |
62 | | -SecRuleRemoveById1-3 |
| 59 | +SecRule REQUEST_URI"test""phase:1,deny,status:500,id:101010" |
| 60 | +SecRule REQUEST_URI"test""phase:1,deny,status:500,id:202020" |
| 61 | +SecRule REQUEST_URI"test""phase:1,deny,status:500,id:303030" |
| 62 | +SecRuleRemoveById101010-303030 |
63 | 63 | ), |
64 | 64 | match_log=> { |
65 | | --error=> [ qr/ModSecurity:/,1 ], |
| 65 | +-error=> [ qr/101010|202020|303030/,1 ], |
66 | 66 | -audit=> [ qr/./,1 ], |
67 | 67 | debug=> [ qr/Starting phase REQUEST_HEADERS\..*This phase consistsof0 rule.*Starting phase RESPONSE_HEADERS\./s,1 ], |
68 | 68 | -debug=> [ qr/Access denied/,1 ], |
|
81 | 81 | SecRuleEngine On |
82 | 82 | SecDebugLog$ENV{DEBUG_LOG} |
83 | 83 | SecDebugLogLevel9 |
84 | | -SecRule REQUEST_URI"test""phase:1,deny,status:500,id:1" |
85 | | -SecRule REQUEST_URI"test""phase:1,deny,status:500,id:2" |
86 | | -SecRule REQUEST_URI"test""phase:1,deny,status:500,id:3" |
87 | | -SecRule REQUEST_URI"test""phase:1,deny,status:500,id:4" |
88 | | -SecRuleRemoveById12-4 |
| 84 | +SecRule REQUEST_URI"test""phase:1,deny,status:500,id:101010" |
| 85 | +SecRule REQUEST_URI"test""phase:1,deny,status:500,id:202020" |
| 86 | +SecRule REQUEST_URI"test""phase:1,deny,status:500,id:303030" |
| 87 | +SecRule REQUEST_URI"test""phase:1,deny,status:500,id:404040" |
| 88 | +SecRuleRemoveById101010202020-404040 |
89 | 89 | ), |
90 | 90 | match_log=> { |
91 | | --error=> [ qr/ModSecurity:/,1 ], |
| 91 | +-error=> [ qr/101010|202020|303030|404040/,1 ], |
92 | 92 | -audit=> [ qr/./,1 ], |
93 | 93 | debug=> [ qr/Starting phase REQUEST_HEADERS\..*This phase consistsof0 rule.*Starting phase RESPONSE_HEADERS\./s,1 ], |
94 | 94 | -debug=> [ qr/Access denied/,1 ], |
|
109 | 109 | SecRuleEngine On |
110 | 110 | SecDebugLog$ENV{DEBUG_LOG} |
111 | 111 | SecDebugLogLevel9 |
112 | | -SecRule REQUEST_URI"test""phase:1,deny,status:500,id:1,msg:'testing rule',id:500001" |
| 112 | +SecRule REQUEST_URI"test""phase:1,deny,status:500,msg:'testing rule',id:500001" |
113 | 113 | SecRuleRemoveByMsg"testing rule" |
114 | 114 | ), |
115 | 115 | match_log=> { |
116 | | --error=> [ qr/ModSecurity:/,1 ], |
| 116 | +-error=> [ qr/500001/,1 ], |
117 | 117 | -audit=> [ qr/./,1 ], |
118 | 118 | debug=> [ qr/Starting phase REQUEST_HEADERS\..*This phase consistsof0 rule.*Starting phase RESPONSE_HEADERS\./s,1 ], |
119 | 119 | -debug=> [ qr/Access denied/,1 ], |
|
134 | 134 | SecRuleEngine On |
135 | 135 | SecDebugLog$ENV{DEBUG_LOG} |
136 | 136 | SecDebugLogLevel9 |
137 | | -SecRule REQUEST_URI"test""phase:1,deny,status:500,id:1,msg:'testing rule',id:500002" |
138 | | -SecRuleUpdateActionById1"pass,nolog" |
| 137 | +SecRule REQUEST_URI"test""phase:1,deny,status:500,msg:'testing rule',id:500002" |
| 138 | +SecRuleUpdateActionById500002"pass,nolog" |
139 | 139 | ), |
140 | 140 | match_log=> { |
141 | | --error=> [ qr/ModSecurity:/,1 ], |
| 141 | +-error=> [ qr/500002/,1 ], |
142 | 142 | -audit=> [ qr/./,1 ], |
143 | | -debug=> [ qr/id:1,.*,pass,nolog/,1 ], |
| 143 | +debug=> [ qr/id:500002,pass,nolog/,1 ], |
144 | 144 | -debug=> [ qr/Access denied/,1 ], |
145 | 145 | }, |
146 | 146 | match_response=> { |
|
157 | 157 | SecRuleEngine On |
158 | 158 | SecDebugLog$ENV{DEBUG_LOG} |
159 | 159 | SecDebugLogLevel9 |
160 | | -SecRule REQUEST_URI"test""phase:1,deny,status:500,id:1,msg:'testing rule',chain,id:500003" |
161 | | - SecRule ARGS"bar,id:500004" |
162 | | -SecRuleUpdateActionById1"pass,nolog" |
| 160 | +SecRule REQUEST_URI"test""phase:1,deny,status:500,msg:'testing rule',chain,id:500003" |
| 161 | + SecRule ARGS"bar" |
| 162 | +SecRuleUpdateActionById500003"pass,nolog" |
163 | 163 | ), |
164 | 164 | match_log=> { |
165 | | --error=> [ qr/ModSecurity:/,1 ], |
| 165 | +-error=> [ qr/500003/,1 ], |
166 | 166 | -audit=> [ qr/./,1 ], |
167 | | -debug=> [ qr/id:1,.*,pass,nolog/,1 ], |
| 167 | +debug=> [ qr/id:500003,pass,nolog/,1 ], |
168 | 168 | -debug=> [ qr/Access denied/,1 ], |
169 | 169 | }, |
170 | 170 | match_response=> { |
|