Refactoring on the operators parsers (2/2)

This is the first step towards remove the memory leaks in the parser
This commit is contained in:
Felipe Zimmerle
2017-01-04 15:30:45 -03:00
committed by Felipe Zimmerle
parent 9cda4c0be0
commit 59114dd598
49 changed files with 550 additions and 240 deletions

View File

@@ -38,7 +38,7 @@
"version_min":300000,
"title":"Testing skip action 2/3",
"expected":{
"parser_error": "Rules error. File: action-skip.json. Line: 2. Column: 61. invalid character s"
"parser_error": "Rules error. File: action-skip.json. Line: 2. Column: 62. invalid character s"
},
"client":{
"ip":"200.249.12.31",

View File

@@ -31,7 +31,7 @@
]
},
"expected":{
"debug_log":"Executing operator \"@contains\" with param \"config_example2\" against ARGS."
"debug_log":"Executing operator \"Contains\" with param \"config_example2\" against ARGS."
},
"rules":[
"SecRuleEngine On",
@@ -71,7 +71,7 @@
]
},
"expected":{
"debug_log":"Executing operator \"@contains\" with param \"config_example\" against ARGS."
"debug_log":"Executing operator \"Contains\" with param \"config_example\" against ARGS."
},
"rules":[
"SecRuleEngine On",
@@ -111,7 +111,7 @@
]
},
"expected":{
"debug_log":"Executing operator \"@contains\" with param \"config_example2\" against ARGS."
"debug_log":"Executing operator \"Contains\" with param \"config_example2\" against ARGS."
},
"rules":[
"SecRuleEngine On",
@@ -151,7 +151,7 @@
]
},
"expected":{
"debug_log":"Executing operator \"@contains\" with param \"test\" against ARGS."
"debug_log":"Executing operator \"Contains\" with param \"test\" against ARGS."
},
"rules":[
"SecRuleEngine On",
@@ -191,7 +191,7 @@
]
},
"expected":{
"debug_log":"Executing operator \"@contains\" with param \"config_example2\" against ARGS."
"debug_log":"Executing operator \"Contains\" with param \"config_example2\" against ARGS."
},
"rules":[
"SecRuleEngine On",
@@ -232,7 +232,7 @@
]
},
"expected":{
"debug_log":"Executing operator \"@contains\" with param \"test\" against ARGS."
"debug_log":"Executing operator \"Contains\" with param \"test\" against ARGS."
},
"rules":[
"SecRuleEngine On",

View File

@@ -31,7 +31,7 @@
]
},
"expected":{
"debug_log":"Executing operator \"@pmfromfile\" with param \"https://www.modsecurity.org/modsecurity-regression-test.txt\" against REQUEST_FILENAME"
"debug_log":"Executing operator \"PmFromFile\" with param \"https://www.modsecurity.org/modsecurity-regression-test.txt\" against REQUEST_FILENAME"
},
"rules":[
"SecRuleEngine On",
@@ -84,7 +84,7 @@
]
},
"expected":{
"debug_log":"Executing operator \"@contains\" with param \"somethingelse\" against ARGS."
"debug_log":"Executing operator \"Contains\" with param \"somethingelse\" against ARGS."
},
"rules":[
"SecRuleEngine On",

View File

@@ -6,7 +6,7 @@
"title":"Testing action :: SecRule directives should be case insensitive",
"expected":{
"audit_log":"",
"debug_log":"Executing operator \"@contains\" with param \"PHPSESSID\" against REQUEST_HEADERS.",
"debug_log":"Executing operator \"Contains\" with param \"PHPSESSID\" against REQUEST_HEADERS.",
"error_log":""
},
"rules":[

View File

@@ -36,7 +36,7 @@
]
},
"expected":{
"debug_log":"Executing operator \"@rx"
"debug_log":"Executing operator \"Rx"
},
"rules":[
"SecRuleEngine On",