mirror of
https://github.com/owasp-modsecurity/ModSecurity.git
synced 2025-08-14 05:45:59 +03:00
Refactoring on the Rule class
This commit is contained in:
parent
74841779f8
commit
554251bade
@ -38,6 +38,12 @@ class Variables;
|
|||||||
}
|
}
|
||||||
namespace actions {
|
namespace actions {
|
||||||
class Action;
|
class Action;
|
||||||
|
class Severity;
|
||||||
|
class LogData;
|
||||||
|
class Msg;
|
||||||
|
class Rev;
|
||||||
|
class SetVar;
|
||||||
|
class Tag;
|
||||||
}
|
}
|
||||||
namespace operators {
|
namespace operators {
|
||||||
class Operator;
|
class Operator;
|
||||||
@ -55,15 +61,31 @@ class Rule {
|
|||||||
|
|
||||||
virtual bool evaluate(Transaction *transaction,
|
virtual bool evaluate(Transaction *transaction,
|
||||||
std::shared_ptr<RuleMessage> rm);
|
std::shared_ptr<RuleMessage> rm);
|
||||||
bool evaluateActions(Transaction *transaction);
|
|
||||||
std::vector<std::unique_ptr<VariableValue>>
|
void organizeActions(std::vector<actions::Action *> *actions);
|
||||||
getFinalVars(Transaction *trasn);
|
void cleanUpActions();
|
||||||
|
void executeAction(Transaction *trans,
|
||||||
|
bool containsBlock, std::shared_ptr<RuleMessage> ruleMessage,
|
||||||
|
actions::Action *a, bool context);
|
||||||
|
|
||||||
|
inline void executeTransformation(actions::Action *a,
|
||||||
|
std::shared_ptr<std::string> *value,
|
||||||
|
Transaction *trans,
|
||||||
|
std::list<std::pair<std::shared_ptr<std::string>,
|
||||||
|
std::shared_ptr<std::string>>> *ret,
|
||||||
|
std::string *path,
|
||||||
|
int *nth);
|
||||||
|
|
||||||
|
void getVariablesExceptions(Transaction *t,
|
||||||
|
Variables::Variables *exclusion, Variables::Variables *addition);
|
||||||
|
inline void getFinalVars(Variables::Variables *vars,
|
||||||
|
Variables::Variables *eclusion, Transaction *trans);
|
||||||
void executeActionsAfterFullMatch(Transaction *trasn,
|
void executeActionsAfterFullMatch(Transaction *trasn,
|
||||||
bool containsDisruptive, std::shared_ptr<RuleMessage> ruleMessage);
|
bool containsDisruptive, std::shared_ptr<RuleMessage> ruleMessage);
|
||||||
|
|
||||||
std::list<std::pair<std::shared_ptr<std::string>,
|
std::list<std::pair<std::shared_ptr<std::string>,
|
||||||
std::shared_ptr<std::string>>> executeDefaultTransformations(
|
std::shared_ptr<std::string>>> executeDefaultTransformations(
|
||||||
Transaction *trasn, const std::string &value, bool multiMatch);
|
Transaction *trasn, const std::string &value);
|
||||||
|
|
||||||
bool executeOperatorAt(Transaction *trasn, std::string key,
|
bool executeOperatorAt(Transaction *trasn, std::string key,
|
||||||
std::string value, std::shared_ptr<RuleMessage> rm);
|
std::string value, std::shared_ptr<RuleMessage> rm);
|
||||||
@ -72,14 +94,12 @@ class Rule {
|
|||||||
void updateMatchedVars(Transaction *trasn, std::string key,
|
void updateMatchedVars(Transaction *trasn, std::string key,
|
||||||
std::string value);
|
std::string value);
|
||||||
void cleanMatchedVars(Transaction *trasn);
|
void cleanMatchedVars(Transaction *trasn);
|
||||||
void updateRulesVariable(Transaction *trasn);
|
void updateRulesVariable(Transaction *trasn, std::shared_ptr<RuleMessage> rm);
|
||||||
|
|
||||||
//std::vector<std::string> getActionNames();
|
|
||||||
std::vector<actions::Action *> getActionsByName(const std::string& name,
|
std::vector<actions::Action *> getActionsByName(const std::string& name,
|
||||||
Transaction *t);
|
Transaction *t);
|
||||||
bool containsTag(const std::string& name, Transaction *t);
|
bool containsTag(const std::string& name, Transaction *t);
|
||||||
bool containsMsg(const std::string& name, Transaction *t);
|
bool containsMsg(const std::string& name, Transaction *t);
|
||||||
bool containsStaticDisruptiveAction();
|
|
||||||
|
|
||||||
int refCountDecreaseAndCheck() {
|
int refCountDecreaseAndCheck() {
|
||||||
m_referenceCount--;
|
m_referenceCount--;
|
||||||
@ -95,26 +115,48 @@ class Rule {
|
|||||||
m_referenceCount++;
|
m_referenceCount++;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
void executeTransformations(
|
||||||
|
actions::Action *a,
|
||||||
|
std::shared_ptr<std::string> newValue,
|
||||||
|
std::shared_ptr<std::string> value,
|
||||||
|
Transaction *trans,
|
||||||
|
std::list<std::pair<std::shared_ptr<std::string>,
|
||||||
|
std::shared_ptr<std::string>>> *ret,
|
||||||
|
std::shared_ptr<std::string> transStr,
|
||||||
|
int nth);
|
||||||
|
|
||||||
int m_accuracy;
|
|
||||||
std::vector<actions::Action *> m_actionsConf;
|
|
||||||
std::vector<actions::Action *> m_actionsRuntimePos;
|
std::vector<actions::Action *> m_actionsRuntimePos;
|
||||||
std::vector<actions::Action *> m_actionsRuntimePre;
|
std::vector<actions::Action *> m_actionsRuntimePre;
|
||||||
bool m_chained;
|
bool m_chained;
|
||||||
Rule *m_chainedRule;
|
Rule *m_chainedRule;
|
||||||
std::string m_fileName;
|
std::string m_fileName;
|
||||||
int m_lineNumber;
|
int m_lineNumber;
|
||||||
std::string m_logData;
|
|
||||||
std::string m_marker;
|
std::string m_marker;
|
||||||
int m_maturity;
|
|
||||||
operators::Operator *m_op;
|
operators::Operator *m_op;
|
||||||
int m_phase;
|
|
||||||
std::string m_rev;
|
|
||||||
int64_t m_ruleId;
|
|
||||||
bool m_secMarker;
|
bool m_secMarker;
|
||||||
modsecurity::Variables::Variables *m_variables;
|
modsecurity::Variables::Variables *m_variables;
|
||||||
std::string m_ver;
|
|
||||||
|
|
||||||
|
|
||||||
|
int64_t m_ruleId;
|
||||||
|
std::string m_rev;
|
||||||
|
// msg ?
|
||||||
|
std::string m_ver;
|
||||||
|
//std::string m_logData;
|
||||||
|
|
||||||
|
//if (child->severity != NOT_SET) merged->severity = child->severity;
|
||||||
|
int m_accuracy;
|
||||||
|
int m_maturity;
|
||||||
|
int m_phase;
|
||||||
|
|
||||||
|
bool m_containsStaticDisruptiveAction;
|
||||||
|
bool m_containsCaptureAction;
|
||||||
|
bool m_containsMultiMatchAction;
|
||||||
|
bool m_containsStaticBlockAction;
|
||||||
|
actions::Severity *m_severity;
|
||||||
|
actions::LogData *m_logData;
|
||||||
|
actions::Msg *m_msg;
|
||||||
|
std::vector<actions::SetVar *> m_actionsSetVar;
|
||||||
|
std::vector<actions::Tag *> m_actionsTag;
|
||||||
private:
|
private:
|
||||||
bool m_unconditional;
|
bool m_unconditional;
|
||||||
int m_referenceCount;
|
int m_referenceCount;
|
||||||
|
@ -40,8 +40,7 @@ bool DetectSQLi::evaluate(Transaction *t, Rule *rule,
|
|||||||
"fingerprint '" + std::string(fingerprint) + "' at: '" +
|
"fingerprint '" + std::string(fingerprint) + "' at: '" +
|
||||||
input + "'");
|
input + "'");
|
||||||
#endif
|
#endif
|
||||||
if (rule && t
|
if (rule && t && rule->m_containsCaptureAction) {
|
||||||
&& rule->getActionsByName("capture", t).size() > 0) {
|
|
||||||
t->m_collections.m_tx_collection->storeOrUpdateFirst(
|
t->m_collections.m_tx_collection->storeOrUpdateFirst(
|
||||||
"0", std::string(fingerprint));
|
"0", std::string(fingerprint));
|
||||||
#ifndef NO_LOGS
|
#ifndef NO_LOGS
|
||||||
|
@ -36,8 +36,7 @@ bool DetectXSS::evaluate(Transaction *t, Rule *rule,
|
|||||||
#ifndef NO_LOGS
|
#ifndef NO_LOGS
|
||||||
t->debug(5, "detected XSS using libinjection.");
|
t->debug(5, "detected XSS using libinjection.");
|
||||||
#endif
|
#endif
|
||||||
if (rule && t
|
if (rule && t && rule->m_containsCaptureAction) {
|
||||||
&& rule->getActionsByName("capture", t).size() > 0) {
|
|
||||||
t->m_collections.m_tx_collection->storeOrUpdateFirst(
|
t->m_collections.m_tx_collection->storeOrUpdateFirst(
|
||||||
"0", std::string(input));
|
"0", std::string(input));
|
||||||
#ifndef NO_LOGS
|
#ifndef NO_LOGS
|
||||||
|
@ -96,8 +96,6 @@ bool Pm::evaluate(Transaction *transaction, Rule *rule,
|
|||||||
#ifdef MODSEC_MUTEX_ON_PM
|
#ifdef MODSEC_MUTEX_ON_PM
|
||||||
pthread_mutex_unlock(&m_lock);
|
pthread_mutex_unlock(&m_lock);
|
||||||
#endif
|
#endif
|
||||||
bool capture = rule && rule->getActionsByName("capture",
|
|
||||||
transaction).size() > 0;
|
|
||||||
|
|
||||||
if (rc > 0 && transaction) {
|
if (rc > 0 && transaction) {
|
||||||
std::string match_(match);
|
std::string match_(match);
|
||||||
@ -105,7 +103,7 @@ bool Pm::evaluate(Transaction *transaction, Rule *rule,
|
|||||||
transaction->m_matched.push_back(match_);
|
transaction->m_matched.push_back(match_);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (capture && transaction && rc) {
|
if (rule && rule->m_containsCaptureAction && transaction && rc) {
|
||||||
transaction->m_collections.m_tx_collection->storeOrUpdateFirst("0",
|
transaction->m_collections.m_tx_collection->storeOrUpdateFirst("0",
|
||||||
std::string(match));
|
std::string(match));
|
||||||
#ifndef NO_LOGS
|
#ifndef NO_LOGS
|
||||||
|
@ -222,8 +222,7 @@ bool Rbl::evaluate(Transaction *t, Rule *rule,
|
|||||||
furtherInfo(sin, ipStr, t);
|
furtherInfo(sin, ipStr, t);
|
||||||
|
|
||||||
freeaddrinfo(info);
|
freeaddrinfo(info);
|
||||||
if (rule && t
|
if (rule && t && rule->m_containsCaptureAction) {
|
||||||
&& rule->getActionsByName("capture", t).size() > 0) {
|
|
||||||
t->m_collections.m_tx_collection->storeOrUpdateFirst(
|
t->m_collections.m_tx_collection->storeOrUpdateFirst(
|
||||||
"0", std::string(ipStr));
|
"0", std::string(ipStr));
|
||||||
#ifndef NO_LOGS
|
#ifndef NO_LOGS
|
||||||
|
@ -54,8 +54,7 @@ bool Rx::evaluate(Transaction *transaction, Rule *rule,
|
|||||||
}
|
}
|
||||||
|
|
||||||
matches = re->searchAll(input);
|
matches = re->searchAll(input);
|
||||||
if (rule && rule->getActionsByName("capture",
|
if (rule && rule->m_containsCaptureAction && transaction) {
|
||||||
transaction).size() > 0 && transaction) {
|
|
||||||
int i = 0;
|
int i = 0;
|
||||||
matches.reverse();
|
matches.reverse();
|
||||||
for (const SMatch& a : matches) {
|
for (const SMatch& a : matches) {
|
||||||
|
@ -142,8 +142,7 @@ bool VerifyCC::evaluate(Transaction *t, Rule *rule,
|
|||||||
is_cc = luhnVerify(match.c_str(), match.size());
|
is_cc = luhnVerify(match.c_str(), match.size());
|
||||||
if (is_cc) {
|
if (is_cc) {
|
||||||
if (t) {
|
if (t) {
|
||||||
if (rule && t
|
if (rule && t && rule->m_containsCaptureAction) {
|
||||||
&& rule->getActionsByName("capture", t).size() > 0) {
|
|
||||||
t->m_collections.m_tx_collection->storeOrUpdateFirst(
|
t->m_collections.m_tx_collection->storeOrUpdateFirst(
|
||||||
"0", std::string(match));
|
"0", std::string(match));
|
||||||
#ifndef NO_LOGS
|
#ifndef NO_LOGS
|
||||||
|
@ -133,8 +133,7 @@ bool VerifyCPF::evaluate(Transaction *t, Rule *rule,
|
|||||||
is_cpf = verify(i.match.c_str(), i.match.size());
|
is_cpf = verify(i.match.c_str(), i.match.size());
|
||||||
if (is_cpf) {
|
if (is_cpf) {
|
||||||
logOffset(ruleMessage, i.m_offset, i.m_length);
|
logOffset(ruleMessage, i.m_offset, i.m_length);
|
||||||
if (rule && t
|
if (rule && t && rule->m_containsCaptureAction) {
|
||||||
&& rule->getActionsByName("capture", t).size() > 0) {
|
|
||||||
t->m_collections.m_tx_collection->storeOrUpdateFirst(
|
t->m_collections.m_tx_collection->storeOrUpdateFirst(
|
||||||
"0", std::string(i.match));
|
"0", std::string(i.match));
|
||||||
#ifndef NO_LOGS
|
#ifndef NO_LOGS
|
||||||
|
@ -124,8 +124,7 @@ bool VerifySSN::evaluate(Transaction *t, Rule *rule,
|
|||||||
is_ssn = verify(i.match.c_str(), i.match.size());
|
is_ssn = verify(i.match.c_str(), i.match.size());
|
||||||
if (is_ssn) {
|
if (is_ssn) {
|
||||||
logOffset(ruleMessage, i.m_offset, i.m_length);
|
logOffset(ruleMessage, i.m_offset, i.m_length);
|
||||||
if (rule && t
|
if (rule && t && rule->m_containsCaptureAction) {
|
||||||
&& rule->getActionsByName("capture", t).size() > 0) {
|
|
||||||
t->m_collections.m_tx_collection->storeOrUpdateFirst(
|
t->m_collections.m_tx_collection->storeOrUpdateFirst(
|
||||||
"0", std::string(i.match));
|
"0", std::string(i.match));
|
||||||
#ifndef NO_LOGS
|
#ifndef NO_LOGS
|
||||||
|
@ -81,7 +81,7 @@ int Driver::addSecRule(Rule *rule) {
|
|||||||
if (lastRule->m_chainedRule == NULL) {
|
if (lastRule->m_chainedRule == NULL) {
|
||||||
rule->m_phase = lastRule->m_phase;
|
rule->m_phase = lastRule->m_phase;
|
||||||
lastRule->m_chainedRule = rule;
|
lastRule->m_chainedRule = rule;
|
||||||
if (rule->containsStaticDisruptiveAction()) {
|
if (rule->m_containsStaticDisruptiveAction) {
|
||||||
m_parserError << "Disruptive actions can only be specified by";
|
m_parserError << "Disruptive actions can only be specified by";
|
||||||
m_parserError << " chain starter rules.";
|
m_parserError << " chain starter rules.";
|
||||||
return false;
|
return false;
|
||||||
@ -94,7 +94,7 @@ int Driver::addSecRule(Rule *rule) {
|
|||||||
}
|
}
|
||||||
if (a->m_chained && a->m_chainedRule == NULL) {
|
if (a->m_chained && a->m_chainedRule == NULL) {
|
||||||
a->m_chainedRule = rule;
|
a->m_chainedRule = rule;
|
||||||
if (a->containsStaticDisruptiveAction()) {
|
if (a->m_containsStaticDisruptiveAction) {
|
||||||
m_parserError << "Disruptive actions can only be ";
|
m_parserError << "Disruptive actions can only be ";
|
||||||
m_parserError << "specified by chain starter rules.";
|
m_parserError << "specified by chain starter rules.";
|
||||||
return false;
|
return false;
|
||||||
|
965
src/rule.cc
965
src/rule.cc
File diff suppressed because it is too large
Load Diff
@ -605,6 +605,16 @@ class VariableRegex : public Variable {
|
|||||||
|
|
||||||
class Variables : public std::vector<Variable *> {
|
class Variables : public std::vector<Variable *> {
|
||||||
public:
|
public:
|
||||||
|
bool contains(Variable *v) {
|
||||||
|
return std::find_if(begin(), end(),
|
||||||
|
[v](Variable *m) -> bool { return *v == *m; }) != end();
|
||||||
|
};
|
||||||
|
bool contains(const std::string &v) {
|
||||||
|
return std::find_if(begin(), end(),
|
||||||
|
[v](Variable *m) -> bool {
|
||||||
|
return v == *m->m_fullName.get();
|
||||||
|
}) != end();
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
||||||
|
@ -4,7 +4,7 @@
|
|||||||
"version_min":300000,
|
"version_min":300000,
|
||||||
"title":"Testing CtlRuleRemoveTargetById (1)",
|
"title":"Testing CtlRuleRemoveTargetById (1)",
|
||||||
"expected":{
|
"expected":{
|
||||||
"debug_log": "Variable: ARGS:pwd was excluded by ruleRemoveTargetById..."
|
"http_code": 200
|
||||||
},
|
},
|
||||||
"client":{
|
"client":{
|
||||||
"ip":"200.249.12.31",
|
"ip":"200.249.12.31",
|
||||||
@ -27,8 +27,9 @@
|
|||||||
"port":80
|
"port":80
|
||||||
},
|
},
|
||||||
"rules":[
|
"rules":[
|
||||||
|
"SecRuleEngine On",
|
||||||
"SecRule REQUEST_FILENAME \"@endsWith /wp-login.php\" \"id:9002100,phase:2,t:none,nolog,pass,ctl:ruleRemoveTargetById=1;ARGS:pwd\"",
|
"SecRule REQUEST_FILENAME \"@endsWith /wp-login.php\" \"id:9002100,phase:2,t:none,nolog,pass,ctl:ruleRemoveTargetById=1;ARGS:pwd\"",
|
||||||
"SecRule ARGS \"@contais whe\" \"id:1,phase:3,t:none,nolog,pass,tag:'CRS'\""
|
"SecRule ARGS \"@contains lhebs\" \"id:1,phase:3,t:none,status:202,block,deny,tag:'CRS'\""
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
@ -68,7 +69,7 @@
|
|||||||
"version_min":300000,
|
"version_min":300000,
|
||||||
"title":"Testing CtlRuleRemoveTargetById (3)",
|
"title":"Testing CtlRuleRemoveTargetById (3)",
|
||||||
"expected":{
|
"expected":{
|
||||||
"debug_log": "Variable: ARGS was excluded by ruleRemoveTargetById..."
|
"http_code": 200
|
||||||
},
|
},
|
||||||
"client":{
|
"client":{
|
||||||
"ip":"200.249.12.31",
|
"ip":"200.249.12.31",
|
||||||
@ -92,7 +93,7 @@
|
|||||||
},
|
},
|
||||||
"rules":[
|
"rules":[
|
||||||
"SecRule REQUEST_FILENAME \"@endsWith /wp-login.php\" \"id:9002100,phase:2,t:none,nolog,pass,ctl:ruleRemoveTargetById=1;ARGS\"",
|
"SecRule REQUEST_FILENAME \"@endsWith /wp-login.php\" \"id:9002100,phase:2,t:none,nolog,pass,ctl:ruleRemoveTargetById=1;ARGS\"",
|
||||||
"SecRule ARGS \"@contais whe\" \"id:1,phase:3,t:none,nolog,pass,tag:'CRS'\""
|
"SecRule ARGS \"@contains lhebs\" \"id:1,phase:3,t:none,status:202,block,deny,tag:'CRS'\""
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -4,7 +4,7 @@
|
|||||||
"version_min":300000,
|
"version_min":300000,
|
||||||
"title":"Testing CtlRuleRemoteTargetByTag (1)",
|
"title":"Testing CtlRuleRemoteTargetByTag (1)",
|
||||||
"expected":{
|
"expected":{
|
||||||
"debug_log": "Variable: ARGS:pwd was excluded by ruleRemoteTargetByTag..."
|
"http_code": 200
|
||||||
},
|
},
|
||||||
"client":{
|
"client":{
|
||||||
"ip":"200.249.12.31",
|
"ip":"200.249.12.31",
|
||||||
@ -27,8 +27,9 @@
|
|||||||
"port":80
|
"port":80
|
||||||
},
|
},
|
||||||
"rules":[
|
"rules":[
|
||||||
|
"SecRuleEngine On",
|
||||||
"SecRule REQUEST_FILENAME \"@endsWith /wp-login.php\" \"id:9002100,phase:2,t:none,nolog,pass,ctl:ruleRemoveTargetByTag=CRS;ARGS:pwd\"",
|
"SecRule REQUEST_FILENAME \"@endsWith /wp-login.php\" \"id:9002100,phase:2,t:none,nolog,pass,ctl:ruleRemoveTargetByTag=CRS;ARGS:pwd\"",
|
||||||
"SecRule ARGS \"@contais whe\" \"id:1,phase:3,t:none,nolog,pass,tag:'CRS'\""
|
"SecRule ARGS \"@contains lhebs\" \"id:1,phase:3,t:none,nolog,pass,tag:'CRS',deny\""
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -31,11 +31,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"expected":{
|
"expected":{
|
||||||
"debug_log":"ARGS:key is part of the exclusion list \\(from update by ID\\), skipping"
|
"http_code": 200
|
||||||
},
|
},
|
||||||
"rules":[
|
"rules":[
|
||||||
"SecRuleUpdateTargetById 1 !ARGS",
|
"SecRuleUpdateTargetById 1 !ARGS",
|
||||||
"SecRule ARGS \"@contains test\" \"id:1,pass,t:trim,tag:'test'\""
|
"SecRule ARGS \"@contains value\" \"id:1,pass,t:trim,tag:'test',deny\""
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -31,11 +31,12 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"expected":{
|
"expected":{
|
||||||
"debug_log":"ARGS:key is part of the exclusion list \\(from update by msg\\), skipping"
|
"http_code": 200
|
||||||
},
|
},
|
||||||
"rules":[
|
"rules":[
|
||||||
|
"SecRuleEngine On",
|
||||||
"SecRuleUpdateTargetByMsg test !ARGS",
|
"SecRuleUpdateTargetByMsg test !ARGS",
|
||||||
"SecRule ARGS \"@contains test\" \"id:1,pass,t:trim,msg:'test'\""
|
"SecRule ARGS \"@contains value\" \"id:1,pass,t:trim,msg:'test',deny\""
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -31,11 +31,12 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"expected":{
|
"expected":{
|
||||||
"debug_log":"ARGS:key is part of the exclusion list \\(from update by tag\\), skipping"
|
"http_code": 200
|
||||||
},
|
},
|
||||||
"rules":[
|
"rules":[
|
||||||
|
"SecRuleEngine On",
|
||||||
"SecRuleUpdateTargetByTag test !ARGS",
|
"SecRuleUpdateTargetByTag test !ARGS",
|
||||||
"SecRule ARGS \"@contains test\" \"id:1,pass,t:trim,tag:'test'\""
|
"SecRule ARGS \"@contains value\" \"id:1,pass,t:trim,tag:'test',deny\""
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
Loading…
x
Reference in New Issue
Block a user