mirror of
https://github.com/owasp-modsecurity/ModSecurity.git
synced 2025-09-29 11:16:33 +03:00
Refactoring on the operators parsers (2/2)
This is the first step towards remove the memory leaks in the parser
This commit is contained in:
committed by
Felipe Zimmerle
parent
9cda4c0be0
commit
59114dd598
@@ -38,7 +38,7 @@
|
||||
"version_min":300000,
|
||||
"title":"Testing skip action 2/3",
|
||||
"expected":{
|
||||
"parser_error": "Rules error. File: action-skip.json. Line: 2. Column: 61. invalid character s"
|
||||
"parser_error": "Rules error. File: action-skip.json. Line: 2. Column: 62. invalid character s"
|
||||
},
|
||||
"client":{
|
||||
"ip":"200.249.12.31",
|
||||
|
@@ -31,7 +31,7 @@
|
||||
]
|
||||
},
|
||||
"expected":{
|
||||
"debug_log":"Executing operator \"@contains\" with param \"config_example2\" against ARGS."
|
||||
"debug_log":"Executing operator \"Contains\" with param \"config_example2\" against ARGS."
|
||||
},
|
||||
"rules":[
|
||||
"SecRuleEngine On",
|
||||
@@ -71,7 +71,7 @@
|
||||
]
|
||||
},
|
||||
"expected":{
|
||||
"debug_log":"Executing operator \"@contains\" with param \"config_example\" against ARGS."
|
||||
"debug_log":"Executing operator \"Contains\" with param \"config_example\" against ARGS."
|
||||
},
|
||||
"rules":[
|
||||
"SecRuleEngine On",
|
||||
@@ -111,7 +111,7 @@
|
||||
]
|
||||
},
|
||||
"expected":{
|
||||
"debug_log":"Executing operator \"@contains\" with param \"config_example2\" against ARGS."
|
||||
"debug_log":"Executing operator \"Contains\" with param \"config_example2\" against ARGS."
|
||||
},
|
||||
"rules":[
|
||||
"SecRuleEngine On",
|
||||
@@ -151,7 +151,7 @@
|
||||
]
|
||||
},
|
||||
"expected":{
|
||||
"debug_log":"Executing operator \"@contains\" with param \"test\" against ARGS."
|
||||
"debug_log":"Executing operator \"Contains\" with param \"test\" against ARGS."
|
||||
},
|
||||
"rules":[
|
||||
"SecRuleEngine On",
|
||||
@@ -191,7 +191,7 @@
|
||||
]
|
||||
},
|
||||
"expected":{
|
||||
"debug_log":"Executing operator \"@contains\" with param \"config_example2\" against ARGS."
|
||||
"debug_log":"Executing operator \"Contains\" with param \"config_example2\" against ARGS."
|
||||
},
|
||||
"rules":[
|
||||
"SecRuleEngine On",
|
||||
@@ -232,7 +232,7 @@
|
||||
]
|
||||
},
|
||||
"expected":{
|
||||
"debug_log":"Executing operator \"@contains\" with param \"test\" against ARGS."
|
||||
"debug_log":"Executing operator \"Contains\" with param \"test\" against ARGS."
|
||||
},
|
||||
"rules":[
|
||||
"SecRuleEngine On",
|
||||
|
@@ -31,7 +31,7 @@
|
||||
]
|
||||
},
|
||||
"expected":{
|
||||
"debug_log":"Executing operator \"@pmfromfile\" with param \"https://www.modsecurity.org/modsecurity-regression-test.txt\" against REQUEST_FILENAME"
|
||||
"debug_log":"Executing operator \"PmFromFile\" with param \"https://www.modsecurity.org/modsecurity-regression-test.txt\" against REQUEST_FILENAME"
|
||||
},
|
||||
"rules":[
|
||||
"SecRuleEngine On",
|
||||
@@ -84,7 +84,7 @@
|
||||
]
|
||||
},
|
||||
"expected":{
|
||||
"debug_log":"Executing operator \"@contains\" with param \"somethingelse\" against ARGS."
|
||||
"debug_log":"Executing operator \"Contains\" with param \"somethingelse\" against ARGS."
|
||||
},
|
||||
"rules":[
|
||||
"SecRuleEngine On",
|
||||
|
@@ -6,7 +6,7 @@
|
||||
"title":"Testing action :: SecRule directives should be case insensitive",
|
||||
"expected":{
|
||||
"audit_log":"",
|
||||
"debug_log":"Executing operator \"@contains\" with param \"PHPSESSID\" against REQUEST_HEADERS.",
|
||||
"debug_log":"Executing operator \"Contains\" with param \"PHPSESSID\" against REQUEST_HEADERS.",
|
||||
"error_log":""
|
||||
},
|
||||
"rules":[
|
||||
|
@@ -36,7 +36,7 @@
|
||||
]
|
||||
},
|
||||
"expected":{
|
||||
"debug_log":"Executing operator \"@rx"
|
||||
"debug_log":"Executing operator \"Rx"
|
||||
},
|
||||
"rules":[
|
||||
"SecRuleEngine On",
|
||||
|
Reference in New Issue
Block a user