>>> anubis: Building testing/anubis 1.19.1-r0 (using abuild 3.15.0-r0) started Mon, 02 Jun 2025 10:37:04 +0000 >>> anubis: Validating /home/buildozer/aports/testing/anubis/APKBUILD... >>> anubis: Analyzing dependencies... >>> anubis: Installing for build: build-base go (1/2) Installing go (1.24.3-r1) (2/2) Installing .makedepends-anubis (20250602.103706) Executing busybox-1.37.0-r18.trigger OK: 591 MiB in 120 packages >>> anubis: Cleaning up srcdir >>> anubis: Cleaning up pkgdir >>> anubis: Cleaning up tmpdir >>> anubis: Fetching https://distfiles.alpinelinux.org/distfiles/edge/anubis-src-vendor-npm-1.19.1.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 >>> anubis: Fetching https://github.com/TecharoHQ/anubis/releases/download/v1.19.1/anubis-src-vendor-npm-1.19.1.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 9.9M 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 9.9M 100 9.9M 0 0 12.9M 0 --:--:-- --:--:-- --:--:-- 143M >>> anubis: Fetching https://distfiles.alpinelinux.org/distfiles/edge/anubis-src-vendor-npm-1.19.1.tar.gz >>> anubis: Checking sha512sums... anubis-src-vendor-npm-1.19.1.tar.gz: OK anubis.initd: OK anubis.confd: OK >>> anubis: Unpacking /var/cache/distfiles/edge/anubis-src-vendor-npm-1.19.1.tar.gz... ? github.com/TecharoHQ/anubis [no test files] ? github.com/TecharoHQ/anubis/cmd/anubis [no test files] ? github.com/TecharoHQ/anubis/cmd/containerbuild [no test files] ? github.com/TecharoHQ/anubis/data [no test files] === RUN TestImpl --- PASS: TestImpl (0.00s) === RUN TestCleanup --- PASS: TestCleanup (0.00s) PASS ok github.com/TecharoHQ/anubis/decaymap 0.003s === RUN TestErrorLogFilter --- PASS: TestErrorLogFilter (0.00s) === RUN TestXForwardedForUpdateIgnoreUnix --- PASS: TestXForwardedForUpdateIgnoreUnix (0.00s) === RUN TestXForwardedForUpdateAddToChain --- PASS: TestXForwardedForUpdateAddToChain (0.00s) === RUN TestComputeXFFHeader === RUN TestComputeXFFHeader/StripPrivate === RUN TestComputeXFFHeader/StripLoopback === RUN TestComputeXFFHeader/StripCGNAT === RUN TestComputeXFFHeader/StripLinkLocalUnicastIPv4 === RUN TestComputeXFFHeader/StripLinkLocalUnicastIPv6 === RUN TestComputeXFFHeader/Flatten === RUN TestComputeXFFHeader/TrimSpaces === RUN TestComputeXFFHeader/invalid-ip-port === RUN TestComputeXFFHeader/invalid-remote-ip === RUN TestComputeXFFHeader/no-xff-dont-panic --- PASS: TestComputeXFFHeader (0.00s) --- PASS: TestComputeXFFHeader/StripPrivate (0.00s) --- PASS: TestComputeXFFHeader/StripLoopback (0.00s) --- PASS: TestComputeXFFHeader/StripCGNAT (0.00s) --- PASS: TestComputeXFFHeader/StripLinkLocalUnicastIPv4 (0.00s) --- PASS: TestComputeXFFHeader/StripLinkLocalUnicastIPv6 (0.00s) --- PASS: TestComputeXFFHeader/Flatten (0.00s) --- PASS: TestComputeXFFHeader/TrimSpaces (0.00s) --- PASS: TestComputeXFFHeader/invalid-ip-port (0.00s) --- PASS: TestComputeXFFHeader/invalid-remote-ip (0.00s) --- PASS: TestComputeXFFHeader/no-xff-dont-panic (0.00s) PASS ok github.com/TecharoHQ/anubis/internal 0.006s === RUN TestReverse4 === RUN TestReverse4/1.2.3.4->4.3.2.1 --- PASS: TestReverse4 (0.00s) --- PASS: TestReverse4/1.2.3.4->4.3.2.1 (0.00s) === RUN TestReverse6 === RUN TestReverse6/1234:5678:9ABC:DEF0:1234:5678:9ABC:DEF0->0.f.e.d.c.b.a.9.8.7.6.5.4.3.2.1.0.f.e.d.c.b.a.9.8.7.6.5.4.3.2.1 --- PASS: TestReverse6 (0.00s) --- PASS: TestReverse6/1234:5678:9ABC:DEF0:1234:5678:9ABC:DEF0->0.f.e.d.c.b.a.9.8.7.6.5.4.3.2.1.0.f.e.d.c.b.a.9.8.7.6.5.4.3.2.1 (0.00s) === RUN TestLookup dnsbl_test.go:60: response: 0 --- PASS: TestLookup (0.10s) PASS ok github.com/TecharoHQ/anubis/internal/dnsbl 0.108s === RUN TestCheckCache --- PASS: TestCheckCache (0.00s) === RUN TestGetOGTags --- PASS: TestGetOGTags (0.00s) === RUN TestGetOGTagsWithHostConsideration === RUN TestGetOGTagsWithHostConsideration/Host_Not_Considered_-_Same_Host === RUN TestGetOGTagsWithHostConsideration/Host_Not_Considered_-_Different_Host === RUN TestGetOGTagsWithHostConsideration/Host_Considered_-_Same_Host === RUN TestGetOGTagsWithHostConsideration/Host_Considered_-_Different_Host --- PASS: TestGetOGTagsWithHostConsideration (0.00s) --- PASS: TestGetOGTagsWithHostConsideration/Host_Not_Considered_-_Same_Host (0.00s) --- PASS: TestGetOGTagsWithHostConsideration/Host_Not_Considered_-_Different_Host (0.00s) --- PASS: TestGetOGTagsWithHostConsideration/Host_Considered_-_Same_Host (0.00s) --- PASS: TestGetOGTagsWithHostConsideration/Host_Considered_-_Different_Host (0.00s) === RUN TestFetchHTMLDocument === RUN TestFetchHTMLDocument/Valid_HTML === RUN TestFetchHTMLDocument/Empty_HTML === RUN TestFetchHTMLDocument/Not_found_error === RUN TestFetchHTMLDocument/Unsupported_Content-Type === RUN TestFetchHTMLDocument/Too_large_content --- PASS: TestFetchHTMLDocument (0.00s) --- PASS: TestFetchHTMLDocument/Valid_HTML (0.00s) --- PASS: TestFetchHTMLDocument/Empty_HTML (0.00s) --- PASS: TestFetchHTMLDocument/Not_found_error (0.00s) --- PASS: TestFetchHTMLDocument/Unsupported_Content-Type (0.00s) --- PASS: TestFetchHTMLDocument/Too_large_content (0.00s) === RUN TestFetchHTMLDocumentInvalidURL --- PASS: TestFetchHTMLDocumentInvalidURL (0.01s) === RUN TestIntegrationGetOGTags === RUN TestIntegrationGetOGTags/Simple_page === RUN TestIntegrationGetOGTags/Complete_page === RUN TestIntegrationGetOGTags/Page_with_no_OG_tags === RUN TestIntegrationGetOGTags/Nonexistent_page --- PASS: TestIntegrationGetOGTags (0.00s) --- PASS: TestIntegrationGetOGTags/Simple_page (0.00s) --- PASS: TestIntegrationGetOGTags/Complete_page (0.00s) --- PASS: TestIntegrationGetOGTags/Page_with_no_OG_tags (0.00s) --- PASS: TestIntegrationGetOGTags/Nonexistent_page (0.00s) === RUN TestNewOGTagCache === RUN TestNewOGTagCache/Basic_initialization === RUN TestNewOGTagCache/Empty_target --- PASS: TestNewOGTagCache (0.00s) --- PASS: TestNewOGTagCache/Basic_initialization (0.00s) --- PASS: TestNewOGTagCache/Empty_target (0.00s) === RUN TestNewOGTagCache_UnixSocket --- PASS: TestNewOGTagCache_UnixSocket (0.00s) === RUN TestGetTarget === RUN TestGetTarget/No_path_or_query === RUN TestGetTarget/With_complex_path === RUN TestGetTarget/With_query_and_path === RUN TestGetTarget/Unix_socket_target === RUN TestGetTarget/Unix_socket_target_with_/// --- PASS: TestGetTarget (0.00s) --- PASS: TestGetTarget/No_path_or_query (0.00s) --- PASS: TestGetTarget/With_complex_path (0.00s) --- PASS: TestGetTarget/With_query_and_path (0.00s) --- PASS: TestGetTarget/Unix_socket_target (0.00s) --- PASS: TestGetTarget/Unix_socket_target_with_/// (0.00s) === RUN TestIntegrationGetOGTags_UnixSocket --- PASS: TestIntegrationGetOGTags_UnixSocket (0.10s) === RUN TestExtractOGTags === RUN TestExtractOGTags/Basic_OG_tags === RUN TestExtractOGTags/OG_tags_with_name_attribute === RUN TestExtractOGTags/No_approved_OG_tags === RUN TestExtractOGTags/Empty_content === RUN TestExtractOGTags/Explicitly_approved_tag --- PASS: TestExtractOGTags (0.00s) --- PASS: TestExtractOGTags/Basic_OG_tags (0.00s) --- PASS: TestExtractOGTags/OG_tags_with_name_attribute (0.00s) --- PASS: TestExtractOGTags/No_approved_OG_tags (0.00s) --- PASS: TestExtractOGTags/Empty_content (0.00s) --- PASS: TestExtractOGTags/Explicitly_approved_tag (0.00s) === RUN TestIsOGMetaTag === RUN TestIsOGMetaTag/Meta_OG_tag === RUN TestIsOGMetaTag/Regular_meta_tag === RUN TestIsOGMetaTag/Not_a_meta_tag --- PASS: TestIsOGMetaTag (0.00s) --- PASS: TestIsOGMetaTag/Meta_OG_tag (0.00s) --- PASS: TestIsOGMetaTag/Regular_meta_tag (0.00s) --- PASS: TestIsOGMetaTag/Not_a_meta_tag (0.00s) === RUN TestExtractMetaTagInfo === RUN TestExtractMetaTagInfo/OG_title_with_property_(approved_by_prefix) === RUN TestExtractMetaTagInfo/OG_description_with_name_(approved_by_prefix) === RUN TestExtractMetaTagInfo/Regular_meta_tag_(name=description,_approved_by_exact_match) === RUN TestExtractMetaTagInfo/Regular_meta_tag_(name=keywords,_not_approved) === RUN TestExtractMetaTagInfo/Twitter_tag_(not_approved_by_default) === RUN TestExtractMetaTagInfo/No_content_(but_approved_property) === RUN TestExtractMetaTagInfo/No_property/name_attribute === RUN TestExtractMetaTagInfo/Explicitly_approved_tag_with_property_attribute --- PASS: TestExtractMetaTagInfo (0.00s) --- PASS: TestExtractMetaTagInfo/OG_title_with_property_(approved_by_prefix) (0.00s) --- PASS: TestExtractMetaTagInfo/OG_description_with_name_(approved_by_prefix) (0.00s) --- PASS: TestExtractMetaTagInfo/Regular_meta_tag_(name=description,_approved_by_exact_match) (0.00s) --- PASS: TestExtractMetaTagInfo/Regular_meta_tag_(name=keywords,_not_approved) (0.00s) --- PASS: TestExtractMetaTagInfo/Twitter_tag_(not_approved_by_default) (0.00s) --- PASS: TestExtractMetaTagInfo/No_content_(but_approved_property) (0.00s) --- PASS: TestExtractMetaTagInfo/No_property/name_attribute (0.00s) --- PASS: TestExtractMetaTagInfo/Explicitly_approved_tag_with_property_attribute (0.00s) PASS ok github.com/TecharoHQ/anubis/internal/ogtags 0.126s === RUN TestPlaywrightBrowser playwright_test.go:222: npx not found in PATH, skipping integration smoke testing: exec: "npx": executable file not found in $PATH --- SKIP: TestPlaywrightBrowser (0.00s) === RUN TestPlaywrightWithBasePrefix playwright_test.go:302: NOTE(Xe)\ these tests require HTTPS support in #364 --- SKIP: TestPlaywrightWithBasePrefix (0.00s) PASS ok github.com/TecharoHQ/anubis/internal/test 0.012s === RUN TestLoadPolicies === RUN TestLoadPolicies/botPolicies.json === RUN TestLoadPolicies/botPolicies.yaml --- PASS: TestLoadPolicies (0.04s) --- PASS: TestLoadPolicies/botPolicies.json (0.02s) --- PASS: TestLoadPolicies/botPolicies.yaml (0.02s) === RUN TestCVE2025_24369 {"time":"2025-06-02T10:37:25.750714509Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T10:37:25.785912175Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"a10d197109af220dd375f2651281653645a4175fde592b33bba0818f1e4198ba","rules":{"algorithm":"fast","difficulty":4,"report_as":4},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:37305/.within.website/x/cmd/anubis/api/make-challenge?redir=%2F -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=a10d197109af220dd375f2651281653645a4175fde592b33bba0818f1e4198ba; Path=/; Expires=Mon, 02 Jun 2025 10:37:25 GMT; SameSite=Lax anubis_test.go:124: requested cookies for http://127.0.0.1:37305/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=01ab03c7dc7a6162b4a5913ae1434b4eb99e045d1c33e1a042d43be35ff34b8b anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=a10d197109af220dd375f2651281653645a4175fde592b33bba0818f1e4198ba; Path=/; Expires=Mon, 02 Jun 2025 10:37:25 GMT; SameSite=Lax {"time":"2025-06-02T10:37:25.786794186Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T10:37:25.78692584Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":413},"msg":"difficulty check failed","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"response":"01ab03c7dc7a6162b4a5913ae1434b4eb99e045d1c33e1a042d43be35ff34b8b","difficulty":4} anubis_test.go:138: set cookie: http://127.0.0.1:37305/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=01ab03c7dc7a6162b4a5913ae1434b4eb99e045d1c33e1a042d43be35ff34b8b -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Expires=Mon, 02 Jun 2025 10:36:25 GMT; Max-Age=0; SameSite=Lax anubis_test.go:138: set cookie: http://127.0.0.1:37305/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=01ab03c7dc7a6162b4a5913ae1434b4eb99e045d1c33e1a042d43be35ff34b8b -> techaro.lol-anubis-auth=; Path=/; Expires=Mon, 02 Jun 2025 10:36:25 GMT; Max-Age=0; SameSite=Lax --- PASS: TestCVE2025_24369 (0.06s) === RUN TestCookieCustomExpiration {"time":"2025-06-02T10:37:25.811242045Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T10:37:25.812863895Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"d534f6675355833b8397836a854382c97497437a3f22fd1284d43cadf8770c92","rules":{"algorithm":"fast","difficulty":0,"report_as":0},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:43959/.within.website/x/cmd/anubis/api/make-challenge?redir=%2F -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=d534f6675355833b8397836a854382c97497437a3f22fd1284d43cadf8770c92; Path=/; Expires=Mon, 02 Jun 2025 10:47:25 GMT; SameSite=Lax anubis_test.go:124: requested cookies for http://127.0.0.1:43959/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=6fb830ff2b4783e380e731c168c318b287f4e38d04e16bc21aff0e76be340815 anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=d534f6675355833b8397836a854382c97497437a3f22fd1284d43cadf8770c92; Path=/; Expires=Mon, 02 Jun 2025 10:47:25 GMT; SameSite=Lax {"time":"2025-06-02T10:37:25.81343338Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T10:37:25.814292393Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":437},"msg":"challenge passed, redirecting to app","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:43959/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=6fb830ff2b4783e380e731c168c318b287f4e38d04e16bc21aff0e76be340815 -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Expires=Mon, 02 Jun 2025 10:36:25 GMT; Max-Age=0; SameSite=Lax anubis_test.go:138: set cookie: http://127.0.0.1:43959/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=6fb830ff2b4783e380e731c168c318b287f4e38d04e16bc21aff0e76be340815 -> techaro.lol-anubis-auth=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6ImQ1MzRmNjY3NTM1NTgzM2I4Mzk3ODM2YTg1NDM4MmM5NzQ5NzQzN2EzZjIyZmQxMjg0ZDQzY2FkZjg3NzBjOTIiLCJleHAiOjE3NDg4NjEyNDUsImlhdCI6MTc0ODg2MDY0NSwibmJmIjoxNzQ4ODYwNTg1LCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiNmZiODMwZmYyYjQ3ODNlMzgwZTczMWMxNjhjMzE4YjI4N2Y0ZTM4ZDA0ZTE2YmMyMWFmZjBlNzZiZTM0MDgxNSJ9.kSdeNha1OPVTDVyeuyPSmThBipZ2dYMBsvF6_gsllZKmmOSCNZ-c14zwcQuuWsOGAszgbaVBIMGlodQhV36tCA; Path=/; Expires=Mon, 02 Jun 2025 10:47:25 GMT; SameSite=Lax anubis_test.go:228: &http.Cookie{Name:"techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work", Value:"", Quoted:false, Path:"/", Domain:"", Expires:time.Date(2025, time.June, 2, 10, 36, 25, 0, time.UTC), RawExpires:"Mon, 02 Jun 2025 10:36:25 GMT", MaxAge:-1, Secure:false, HttpOnly:false, SameSite:2, Partitioned:false, Raw:"techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Expires=Mon, 02 Jun 2025 10:36:25 GMT; Max-Age=0; SameSite=Lax", Unparsed:[]string(nil)} anubis_test.go:228: &http.Cookie{Name:"techaro.lol-anubis-auth", Value:"eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6ImQ1MzRmNjY3NTM1NTgzM2I4Mzk3ODM2YTg1NDM4MmM5NzQ5NzQzN2EzZjIyZmQxMjg0ZDQzY2FkZjg3NzBjOTIiLCJleHAiOjE3NDg4NjEyNDUsImlhdCI6MTc0ODg2MDY0NSwibmJmIjoxNzQ4ODYwNTg1LCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiNmZiODMwZmYyYjQ3ODNlMzgwZTczMWMxNjhjMzE4YjI4N2Y0ZTM4ZDA0ZTE2YmMyMWFmZjBlNzZiZTM0MDgxNSJ9.kSdeNha1OPVTDVyeuyPSmThBipZ2dYMBsvF6_gsllZKmmOSCNZ-c14zwcQuuWsOGAszgbaVBIMGlodQhV36tCA", Quoted:false, Path:"/", Domain:"", Expires:time.Date(2025, time.June, 2, 10, 47, 25, 0, time.UTC), RawExpires:"Mon, 02 Jun 2025 10:47:25 GMT", MaxAge:0, Secure:false, HttpOnly:false, SameSite:2, Partitioned:false, Raw:"techaro.lol-anubis-auth=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6ImQ1MzRmNjY3NTM1NTgzM2I4Mzk3ODM2YTg1NDM4MmM5NzQ5NzQzN2EzZjIyZmQxMjg0ZDQzY2FkZjg3NzBjOTIiLCJleHAiOjE3NDg4NjEyNDUsImlhdCI6MTc0ODg2MDY0NSwibmJmIjoxNzQ4ODYwNTg1LCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiNmZiODMwZmYyYjQ3ODNlMzgwZTczMWMxNjhjMzE4YjI4N2Y0ZTM4ZDA0ZTE2YmMyMWFmZjBlNzZiZTM0MDgxNSJ9.kSdeNha1OPVTDVyeuyPSmThBipZ2dYMBsvF6_gsllZKmmOSCNZ-c14zwcQuuWsOGAszgbaVBIMGlodQhV36tCA; Path=/; Expires=Mon, 02 Jun 2025 10:47:25 GMT; SameSite=Lax", Unparsed:[]string(nil)} --- PASS: TestCookieCustomExpiration (0.03s) === RUN TestCookieSettings {"time":"2025-06-02T10:37:25.844528531Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T10:37:25.847396996Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"bdebd9120bda5fbc390f3d067312a2f4148aa3e943fab5259e37843dda7c5a52","rules":{"algorithm":"fast","difficulty":0,"report_as":0},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:42381/.within.website/x/cmd/anubis/api/make-challenge?redir=%2F -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=bdebd9120bda5fbc390f3d067312a2f4148aa3e943fab5259e37843dda7c5a52; Path=/; Domain=127.0.0.1; Expires=Mon, 09 Jun 2025 10:37:25 GMT; SameSite=Lax; Partitioned anubis_test.go:124: requested cookies for http://127.0.0.1:42381/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=a63292820224ef8e3796b15e0cb2d8959af0b89a3ffe887b683e00c7ef9beca0 anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=bdebd9120bda5fbc390f3d067312a2f4148aa3e943fab5259e37843dda7c5a52; Path=/; Domain=127.0.0.1; Expires=Mon, 09 Jun 2025 10:37:25 GMT; SameSite=Lax; Partitioned {"time":"2025-06-02T10:37:25.848189514Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T10:37:25.849046371Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":437},"msg":"challenge passed, redirecting to app","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:42381/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=a63292820224ef8e3796b15e0cb2d8959af0b89a3ffe887b683e00c7ef9beca0 -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Domain=127.0.0.1; Expires=Mon, 02 Jun 2025 10:36:25 GMT; Max-Age=0; SameSite=Lax; Partitioned anubis_test.go:138: set cookie: http://127.0.0.1:42381/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=a63292820224ef8e3796b15e0cb2d8959af0b89a3ffe887b683e00c7ef9beca0 -> techaro.lol-anubis-auth-for-127.0.0.1=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6ImJkZWJkOTEyMGJkYTVmYmMzOTBmM2QwNjczMTJhMmY0MTQ4YWEzZTk0M2ZhYjUyNTllMzc4NDNkZGE3YzVhNTIiLCJleHAiOjE3NDk0NjU0NDUsImlhdCI6MTc0ODg2MDY0NSwibmJmIjoxNzQ4ODYwNTg1LCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiYTYzMjkyODIwMjI0ZWY4ZTM3OTZiMTVlMGNiMmQ4OTU5YWYwYjg5YTNmZmU4ODdiNjgzZTAwYzdlZjliZWNhMCJ9.T_69ubeQAGS5V3Gp7NiPQdnlKWWAR-xuLb0ME6JWXpnTA-GMO1aXZfeq7rCh-w-E7aODQ3LSqiY_trPgF40RBg; Path=/; Domain=127.0.0.1; Expires=Mon, 09 Jun 2025 10:37:25 GMT; SameSite=Lax; Partitioned anubis_test.go:280: &http.Cookie{Name:"techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work", Value:"", Quoted:false, Path:"/", Domain:"127.0.0.1", Expires:time.Date(2025, time.June, 2, 10, 36, 25, 0, time.UTC), RawExpires:"Mon, 02 Jun 2025 10:36:25 GMT", MaxAge:-1, Secure:false, HttpOnly:false, SameSite:2, Partitioned:true, Raw:"techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Domain=127.0.0.1; Expires=Mon, 02 Jun 2025 10:36:25 GMT; Max-Age=0; SameSite=Lax; Partitioned", Unparsed:[]string(nil)} anubis_test.go:280: &http.Cookie{Name:"techaro.lol-anubis-auth-for-127.0.0.1", Value:"eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6ImJkZWJkOTEyMGJkYTVmYmMzOTBmM2QwNjczMTJhMmY0MTQ4YWEzZTk0M2ZhYjUyNTllMzc4NDNkZGE3YzVhNTIiLCJleHAiOjE3NDk0NjU0NDUsImlhdCI6MTc0ODg2MDY0NSwibmJmIjoxNzQ4ODYwNTg1LCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiYTYzMjkyODIwMjI0ZWY4ZTM3OTZiMTVlMGNiMmQ4OTU5YWYwYjg5YTNmZmU4ODdiNjgzZTAwYzdlZjliZWNhMCJ9.T_69ubeQAGS5V3Gp7NiPQdnlKWWAR-xuLb0ME6JWXpnTA-GMO1aXZfeq7rCh-w-E7aODQ3LSqiY_trPgF40RBg", Quoted:false, Path:"/", Domain:"127.0.0.1", Expires:time.Date(2025, time.June, 9, 10, 37, 25, 0, time.UTC), RawExpires:"Mon, 09 Jun 2025 10:37:25 GMT", MaxAge:0, Secure:false, HttpOnly:false, SameSite:2, Partitioned:true, Raw:"techaro.lol-anubis-auth-for-127.0.0.1=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6ImJkZWJkOTEyMGJkYTVmYmMzOTBmM2QwNjczMTJhMmY0MTQ4YWEzZTk0M2ZhYjUyNTllMzc4NDNkZGE3YzVhNTIiLCJleHAiOjE3NDk0NjU0NDUsImlhdCI6MTc0ODg2MDY0NSwibmJmIjoxNzQ4ODYwNTg1LCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiYTYzMjkyODIwMjI0ZWY4ZTM3OTZiMTVlMGNiMmQ4OTU5YWYwYjg5YTNmZmU4ODdiNjgzZTAwYzdlZjliZWNhMCJ9.T_69ubeQAGS5V3Gp7NiPQdnlKWWAR-xuLb0ME6JWXpnTA-GMO1aXZfeq7rCh-w-E7aODQ3LSqiY_trPgF40RBg; Path=/; Domain=127.0.0.1; Expires=Mon, 09 Jun 2025 10:37:25 GMT; SameSite=Lax; Partitioned", Unparsed:[]string(nil)} --- PASS: TestCookieSettings (0.03s) === RUN TestCheckDefaultDifficultyMatchesPolicy === RUN TestCheckDefaultDifficultyMatchesPolicy/1 {"time":"2025-06-02T10:37:25.870285254Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/2 {"time":"2025-06-02T10:37:25.905850524Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/3 {"time":"2025-06-02T10:37:25.928085406Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/4 {"time":"2025-06-02T10:37:25.959841177Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/5 {"time":"2025-06-02T10:37:25.991779176Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/6 {"time":"2025-06-02T10:37:26.023506837Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/7 {"time":"2025-06-02T10:37:26.060640198Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/8 {"time":"2025-06-02T10:37:26.097112087Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/9 {"time":"2025-06-02T10:37:26.136263987Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} --- PASS: TestCheckDefaultDifficultyMatchesPolicy (0.29s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/1 (0.02s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/2 (0.04s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/3 (0.02s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/4 (0.03s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/5 (0.03s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/6 (0.03s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/7 (0.04s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/8 (0.04s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/9 (0.04s) === RUN TestBasePrefix === RUN TestBasePrefix/no_prefix {"time":"2025-06-02T10:37:26.175303719Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T10:37:26.178517642Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"1f45d3a66d7887c9c61592886787ab3bf91aad6301fe7ab438a9d799853a78cf","rules":{"algorithm":"fast","difficulty":4,"report_as":4},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:39899/.within.website/x/cmd/anubis/api/make-challenge?redir=%2F -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=1f45d3a66d7887c9c61592886787ab3bf91aad6301fe7ab438a9d799853a78cf; Path=/; Expires=Mon, 02 Jun 2025 10:37:26 GMT; SameSite=Lax anubis_test.go:124: requested cookies for http://127.0.0.1:39899/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=6818&redir=%2F&response=0000c500d5d7e43fcca801f3986adc98f8ecd6a8638b2b80a1f03f1990a1f30a anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=1f45d3a66d7887c9c61592886787ab3bf91aad6301fe7ab438a9d799853a78cf; Path=/; Expires=Mon, 02 Jun 2025 10:37:26 GMT; SameSite=Lax {"time":"2025-06-02T10:37:26.207114921Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T10:37:26.20835407Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":437},"msg":"challenge passed, redirecting to app","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:39899/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=6818&redir=%2F&response=0000c500d5d7e43fcca801f3986adc98f8ecd6a8638b2b80a1f03f1990a1f30a -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Expires=Mon, 02 Jun 2025 10:36:26 GMT; Max-Age=0; SameSite=Lax anubis_test.go:138: set cookie: http://127.0.0.1:39899/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=6818&redir=%2F&response=0000c500d5d7e43fcca801f3986adc98f8ecd6a8638b2b80a1f03f1990a1f30a -> techaro.lol-anubis-auth=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6IjFmNDVkM2E2NmQ3ODg3YzljNjE1OTI4ODY3ODdhYjNiZjkxYWFkNjMwMWZlN2FiNDM4YTlkNzk5ODUzYTc4Y2YiLCJleHAiOjE3NDg4NjA2NDYsImlhdCI6MTc0ODg2MDY0NiwibmJmIjoxNzQ4ODYwNTg2LCJub25jZSI6IjY4MTgiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiMDAwMGM1MDBkNWQ3ZTQzZmNjYTgwMWYzOTg2YWRjOThmOGVjZDZhODYzOGIyYjgwYTFmMDNmMTk5MGExZjMwYSJ9.XC8Wg4ElzO2Ub48H7_bjJVvkfQKxZTpgOAA4Ggv0ch0fPj_hvEb7JepPbmDnToAk5kjkr2Ipx3R6qqOYV25BDg; Path=/; Expires=Mon, 02 Jun 2025 10:37:26 GMT; SameSite=Lax === RUN TestBasePrefix/with_prefix {"time":"2025-06-02T10:37:26.243541184Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T10:37:26.246933233Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"40cb0b3ee7a58a3af8215162cde24427ab796133510c625eb0ac0eb7c8bc949a","rules":{"algorithm":"fast","difficulty":4,"report_as":4},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:39531/myapp/.within.website/x/cmd/anubis/api/make-challenge?redir=%2Fmyapp -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=40cb0b3ee7a58a3af8215162cde24427ab796133510c625eb0ac0eb7c8bc949a; Path=/; Expires=Mon, 02 Jun 2025 10:37:26 GMT; SameSite=Lax anubis_test.go:124: requested cookies for http://127.0.0.1:39531/myapp/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=205831&redir=%2F&response=00002c66214d9218c485757eb9b7aa803c26cd1e03e976a4183d8eca0d692c67 anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=40cb0b3ee7a58a3af8215162cde24427ab796133510c625eb0ac0eb7c8bc949a; Path=/; Expires=Mon, 02 Jun 2025 10:37:26 GMT; SameSite=Lax {"time":"2025-06-02T10:37:27.249539615Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T10:37:27.250793349Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":437},"msg":"challenge passed, redirecting to app","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:39531/myapp/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=205831&redir=%2F&response=00002c66214d9218c485757eb9b7aa803c26cd1e03e976a4183d8eca0d692c67 -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Expires=Mon, 02 Jun 2025 10:36:27 GMT; Max-Age=0; SameSite=Lax anubis_test.go:138: set cookie: http://127.0.0.1:39531/myapp/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=205831&redir=%2F&response=00002c66214d9218c485757eb9b7aa803c26cd1e03e976a4183d8eca0d692c67 -> techaro.lol-anubis-auth=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6IjQwY2IwYjNlZTdhNThhM2FmODIxNTE2MmNkZTI0NDI3YWI3OTYxMzM1MTBjNjI1ZWIwYWMwZWI3YzhiYzk0OWEiLCJleHAiOjE3NDg4NjA2NDcsImlhdCI6MTc0ODg2MDY0NywibmJmIjoxNzQ4ODYwNTg3LCJub25jZSI6IjIwNTgzMSIsInBvbGljeVJ1bGUiOiI4MWJiM2RjNzM2ZjQyYzU5ODYzMmYxOGQ5NDU2N2ZhNThmNGY3Mzc4ODU2MGM0ZDY4YzgyZDM0NDFmMjY0NmI4IiwicmVzcG9uc2UiOiIwMDAwMmM2NjIxNGQ5MjE4YzQ4NTc1N2ViOWI3YWE4MDNjMjZjZDFlMDNlOTc2YTQxODNkOGVjYTBkNjkyYzY3In0.fXxKzPDFxl3TWg0LD8xqnHRB5C18mYlhF2PYFF-s8rmUn82IslymgvJFtce_HSJ5L5oVBUtRbfUPOYdfzpJIDQ; Path=/myapp/; Expires=Mon, 02 Jun 2025 10:37:27 GMT; SameSite=Lax === RUN TestBasePrefix/with_prefix_and_trailing_slash {"time":"2025-06-02T10:37:27.286820577Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T10:37:27.289166986Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"1686b290a845d625bb539f0afdfdde3f01cde95626a1ff73b47b1eb207c4a428","rules":{"algorithm":"fast","difficulty":4,"report_as":4},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:40843/myapp/.within.website/x/cmd/anubis/api/make-challenge?redir=%2Fmyapp%2F -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=1686b290a845d625bb539f0afdfdde3f01cde95626a1ff73b47b1eb207c4a428; Path=/; Expires=Mon, 02 Jun 2025 10:37:27 GMT; SameSite=Lax anubis_test.go:124: requested cookies for http://127.0.0.1:40843/myapp/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=24397&redir=%2F&response=00005dfe4a27487ea48f8d224131e879e913e3dbac9eeeb0b2cb4112cb069e92 anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=1686b290a845d625bb539f0afdfdde3f01cde95626a1ff73b47b1eb207c4a428; Path=/; Expires=Mon, 02 Jun 2025 10:37:27 GMT; SameSite=Lax {"time":"2025-06-02T10:37:27.40347661Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T10:37:27.404129574Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":437},"msg":"challenge passed, redirecting to app","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:40843/myapp/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=24397&redir=%2F&response=00005dfe4a27487ea48f8d224131e879e913e3dbac9eeeb0b2cb4112cb069e92 -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Expires=Mon, 02 Jun 2025 10:36:27 GMT; Max-Age=0; SameSite=Lax anubis_test.go:138: set cookie: http://127.0.0.1:40843/myapp/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=24397&redir=%2F&response=00005dfe4a27487ea48f8d224131e879e913e3dbac9eeeb0b2cb4112cb069e92 -> techaro.lol-anubis-auth=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6IjE2ODZiMjkwYTg0NWQ2MjViYjUzOWYwYWZkZmRkZTNmMDFjZGU5NTYyNmExZmY3M2I0N2IxZWIyMDdjNGE0MjgiLCJleHAiOjE3NDg4NjA2NDcsImlhdCI6MTc0ODg2MDY0NywibmJmIjoxNzQ4ODYwNTg3LCJub25jZSI6IjI0Mzk3IiwicG9saWN5UnVsZSI6IjgxYmIzZGM3MzZmNDJjNTk4NjMyZjE4ZDk0NTY3ZmE1OGY0ZjczNzg4NTYwYzRkNjhjODJkMzQ0MWYyNjQ2YjgiLCJyZXNwb25zZSI6IjAwMDA1ZGZlNGEyNzQ4N2VhNDhmOGQyMjQxMzFlODc5ZTkxM2UzZGJhYzllZWViMGIyY2I0MTEyY2IwNjllOTIifQ.eQ7_zPcl1fV7P2RhEkRerN86LLv83O4Yo_J-gJb4k5WMurmdLlxZEJWsnVP93wsO7rjLh_MUlmhLlT3WOOxHAw; Path=/myapp/; Expires=Mon, 02 Jun 2025 10:37:27 GMT; SameSite=Lax --- PASS: TestBasePrefix (1.27s) --- PASS: TestBasePrefix/no_prefix (0.07s) --- PASS: TestBasePrefix/with_prefix (1.04s) --- PASS: TestBasePrefix/with_prefix_and_trailing_slash (0.15s) === RUN TestCustomStatusCodes {"time":"2025-06-02T10:37:27.455725805Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCustomStatusCodes/CHALLENGE {"time":"2025-06-02T10:37:27.457210785Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).checkRules","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":223},"msg":"challenge requested","user_agent":"CHALLENGE","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"bot/challenge","rule":"CHALLENGE"}} {"time":"2025-06-02T10:37:27.457241193Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).maybeReverseProxy","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":139},"msg":"cookie not found","user_agent":"CHALLENGE","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"bot/challenge","rule":"CHALLENGE"},"path":"/"} === RUN TestCustomStatusCodes/DENY {"time":"2025-06-02T10:37:27.460668252Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).checkRules","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":211},"msg":"explicit deny","user_agent":"DENY","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"bot/deny","rule":"DENY"}} {"time":"2025-06-02T10:37:27.46072001Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).checkRules","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":219},"msg":"rule hash","user_agent":"DENY","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"bot/deny","rule":"DENY"},"hash":"6da73dd91361a3d947b37741c05113d61907c7b45cafdb252effa62c2b6c0f7d"} === RUN TestCustomStatusCodes/ALLOW {"time":"2025-06-02T10:37:27.461265364Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).checkRules","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":206},"msg":"allowing traffic to origin (explicit)","user_agent":"ALLOW","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} === NAME TestCustomStatusCodes anubis_test.go:507: ALLOW --- PASS: TestCustomStatusCodes (0.06s) --- PASS: TestCustomStatusCodes/CHALLENGE (0.00s) --- PASS: TestCustomStatusCodes/DENY (0.00s) --- PASS: TestCustomStatusCodes/ALLOW (0.00s) === RUN TestCloudflareWorkersRule === RUN TestCloudflareWorkersRule/cel {"time":"2025-06-02T10:37:27.462494117Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCloudflareWorkersRule/cel/with-cf-worker-header === RUN TestCloudflareWorkersRule/cel/no-cf-worker-header === RUN TestCloudflareWorkersRule/header {"time":"2025-06-02T10:37:27.463491048Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCloudflareWorkersRule/header/with-cf-worker-header === RUN TestCloudflareWorkersRule/header/no-cf-worker-header --- PASS: TestCloudflareWorkersRule (0.00s) --- PASS: TestCloudflareWorkersRule/cel (0.00s) --- PASS: TestCloudflareWorkersRule/cel/with-cf-worker-header (0.00s) --- PASS: TestCloudflareWorkersRule/cel/no-cf-worker-header (0.00s) --- PASS: TestCloudflareWorkersRule/header (0.00s) --- PASS: TestCloudflareWorkersRule/header/with-cf-worker-header (0.00s) --- PASS: TestCloudflareWorkersRule/header/no-cf-worker-header (0.00s) === RUN TestRuleChange {"time":"2025-06-02T10:37:27.464489067Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T10:37:27.465456157Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"e525d31172e7071a33fe691bf56a1cad767a3c6990fb4d1e276020c18c03b5d8","rules":{"algorithm":"fast","difficulty":0,"report_as":0},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:42831/.within.website/x/cmd/anubis/api/make-challenge?redir=%2F -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=e525d31172e7071a33fe691bf56a1cad767a3c6990fb4d1e276020c18c03b5d8; Path=/; Domain=127.0.0.1; Expires=Mon, 02 Jun 2025 10:47:27 GMT; SameSite=Lax anubis_test.go:124: requested cookies for http://127.0.0.1:42831/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=0c9a54d9cfa31eff31bacbc41aa68ab8ca3864c78819ba56d60010e2fd228399 anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=e525d31172e7071a33fe691bf56a1cad767a3c6990fb4d1e276020c18c03b5d8; Path=/; Domain=127.0.0.1; Expires=Mon, 02 Jun 2025 10:47:27 GMT; SameSite=Lax {"time":"2025-06-02T10:37:27.466058679Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T10:37:27.467235692Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":437},"msg":"challenge passed, redirecting to app","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:42831/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=0c9a54d9cfa31eff31bacbc41aa68ab8ca3864c78819ba56d60010e2fd228399 -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Domain=127.0.0.1; Expires=Mon, 02 Jun 2025 10:36:27 GMT; Max-Age=0; SameSite=Lax anubis_test.go:138: set cookie: http://127.0.0.1:42831/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=0c9a54d9cfa31eff31bacbc41aa68ab8ca3864c78819ba56d60010e2fd228399 -> techaro.lol-anubis-auth-for-127.0.0.1=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6ImU1MjVkMzExNzJlNzA3MWEzM2ZlNjkxYmY1NmExY2FkNzY3YTNjNjk5MGZiNGQxZTI3NjAyMGMxOGMwM2I1ZDgiLCJleHAiOjE3NDg4NjEyNDcsImlhdCI6MTc0ODg2MDY0NywibmJmIjoxNzQ4ODYwNTg3LCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiMGM5YTU0ZDljZmEzMWVmZjMxYmFjYmM0MWFhNjhhYjhjYTM4NjRjNzg4MTliYTU2ZDYwMDEwZTJmZDIyODM5OSJ9.aSWalMzP8GQ-3TQJSvat_C0NbJOWD5PkOfekEsZgcLvqAX0MHuQw-h679H0Q_bONCGzMi0Dweq-nE32RQkhLBA; Path=/; Domain=127.0.0.1; Expires=Mon, 02 Jun 2025 10:47:27 GMT; SameSite=Lax --- PASS: TestRuleChange (0.00s) === RUN TestClearCookie {"time":"2025-06-02T10:37:27.467702501Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} --- PASS: TestClearCookie (0.00s) === RUN TestClearCookieWithDomain {"time":"2025-06-02T10:37:27.468545688Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} --- PASS: TestClearCookieWithDomain (0.00s) PASS ok github.com/TecharoHQ/anubis/lib 1.793s === RUN TestRemoteAddrChecker === RUN TestRemoteAddrChecker/match_ipv4 === RUN TestRemoteAddrChecker/match_ipv6 === RUN TestRemoteAddrChecker/not_match_ipv4 === RUN TestRemoteAddrChecker/not_match_ipv6 === RUN TestRemoteAddrChecker/no_ip_set === RUN TestRemoteAddrChecker/invalid_ip --- PASS: TestRemoteAddrChecker (0.00s) --- PASS: TestRemoteAddrChecker/match_ipv4 (0.00s) --- PASS: TestRemoteAddrChecker/match_ipv6 (0.00s) --- PASS: TestRemoteAddrChecker/not_match_ipv4 (0.00s) --- PASS: TestRemoteAddrChecker/not_match_ipv6 (0.00s) --- PASS: TestRemoteAddrChecker/no_ip_set (0.00s) --- PASS: TestRemoteAddrChecker/invalid_ip (0.00s) === RUN TestHeaderMatchesChecker === RUN TestHeaderMatchesChecker/match === RUN TestHeaderMatchesChecker/not_match === RUN TestHeaderMatchesChecker/not_present === RUN TestHeaderMatchesChecker/invalid_regex --- PASS: TestHeaderMatchesChecker (0.00s) --- PASS: TestHeaderMatchesChecker/match (0.00s) --- PASS: TestHeaderMatchesChecker/not_match (0.00s) --- PASS: TestHeaderMatchesChecker/not_present (0.00s) --- PASS: TestHeaderMatchesChecker/invalid_regex (0.00s) === RUN TestHeaderExistsChecker === RUN TestHeaderExistsChecker/match === RUN TestHeaderExistsChecker/not_match --- PASS: TestHeaderExistsChecker (0.00s) --- PASS: TestHeaderExistsChecker/match (0.00s) --- PASS: TestHeaderExistsChecker/not_match (0.00s) === RUN TestDefaultPolicyMustParse --- PASS: TestDefaultPolicyMustParse (0.02s) === RUN TestGoodConfigs === RUN TestGoodConfigs/allow_everyone.json === RUN TestGoodConfigs/allow_everyone.yaml === RUN TestGoodConfigs/block_cf_workers.json === RUN TestGoodConfigs/block_cf_workers.yaml === RUN TestGoodConfigs/challengemozilla.json === RUN TestGoodConfigs/challengemozilla.yaml === RUN TestGoodConfigs/entropy.yaml === RUN TestGoodConfigs/everything_blocked.json === RUN TestGoodConfigs/everything_blocked.yaml === RUN TestGoodConfigs/git_client.json === RUN TestGoodConfigs/git_client.yaml === RUN TestGoodConfigs/import_filesystem.json === RUN TestGoodConfigs/import_filesystem.yaml === RUN TestGoodConfigs/import_keep_internet_working.json === RUN TestGoodConfigs/import_keep_internet_working.yaml === RUN TestGoodConfigs/old_xesite.json === RUN TestGoodConfigs/status-codes-paranoid.json === RUN TestGoodConfigs/status-codes-paranoid.yaml === RUN TestGoodConfigs/status-codes-rfc.json === RUN TestGoodConfigs/status-codes-rfc.yaml --- PASS: TestGoodConfigs (0.01s) --- PASS: TestGoodConfigs/allow_everyone.json (0.00s) --- PASS: TestGoodConfigs/allow_everyone.yaml (0.00s) --- PASS: TestGoodConfigs/block_cf_workers.json (0.00s) --- PASS: TestGoodConfigs/block_cf_workers.yaml (0.00s) --- PASS: TestGoodConfigs/challengemozilla.json (0.00s) --- PASS: TestGoodConfigs/challengemozilla.yaml (0.00s) --- PASS: TestGoodConfigs/entropy.yaml (0.00s) --- PASS: TestGoodConfigs/everything_blocked.json (0.00s) --- PASS: TestGoodConfigs/everything_blocked.yaml (0.00s) --- PASS: TestGoodConfigs/git_client.json (0.00s) --- PASS: TestGoodConfigs/git_client.yaml (0.00s) --- PASS: TestGoodConfigs/import_filesystem.json (0.00s) --- PASS: TestGoodConfigs/import_filesystem.yaml (0.00s) --- PASS: TestGoodConfigs/import_keep_internet_working.json (0.00s) --- PASS: TestGoodConfigs/import_keep_internet_working.yaml (0.00s) --- PASS: TestGoodConfigs/old_xesite.json (0.00s) --- PASS: TestGoodConfigs/status-codes-paranoid.json (0.00s) --- PASS: TestGoodConfigs/status-codes-paranoid.yaml (0.00s) --- PASS: TestGoodConfigs/status-codes-rfc.json (0.00s) --- PASS: TestGoodConfigs/status-codes-rfc.yaml (0.00s) === RUN TestBadConfigs === RUN TestBadConfigs/badregexes.json policy_test.go:64: config is not valid: config: bot entry for "path-bad" is not valid: config.Bot: invalid path regex error parsing regexp: missing closing ): `a(b` config: bot entry for "user-agent-bad" is not valid: config.Bot: invalid user agent regex error parsing regexp: missing closing ): `a(b` config: bot entry for "headers-bad" is not valid: config.Bot: must set either user_agent_regex, path_regex, headers_regex, or remote_addresses === RUN TestBadConfigs/badregexes.yaml policy_test.go:64: config is not valid: config: bot entry for "path-bad" is not valid: config.Bot: invalid path regex error parsing regexp: missing closing ): `a(b` config: bot entry for "user-agent-bad" is not valid: config.Bot: invalid user agent regex error parsing regexp: missing closing ): `a(b` === RUN TestBadConfigs/import_and_bot.json policy_test.go:64: config is not valid: config.BotOrImport: can't set bot rules and import values at the same time === RUN TestBadConfigs/import_and_bot.yaml policy_test.go:64: config is not valid: config.BotOrImport: can't set bot rules and import values at the same time === RUN TestBadConfigs/import_invalid_file.json policy_test.go:64: config is not valid: config.ImportStatement: invalid source file: (data)/does-not-exist-fake-file.yaml: open does-not-exist-fake-file.yaml: file does not exist === RUN TestBadConfigs/import_invalid_file.yaml policy_test.go:64: config is not valid: config.ImportStatement: invalid source file: (data)/does-not-exist-fake-file.yaml: open does-not-exist-fake-file.yaml: file does not exist === RUN TestBadConfigs/invalid.json policy_test.go:64: config is not valid: config.BotOrImport: rule definition is invalid, you must set either bot rules or an import statement, not both === RUN TestBadConfigs/invalid.yaml policy_test.go:64: config is not valid: config: must define at least one (1) bot rule === RUN TestBadConfigs/multiple_expression_types.json policy_test.go:64: config is not valid: config: bot entry for "multiple-expression-types" is not valid: config: expression block can't contain multiple expression types === RUN TestBadConfigs/multiple_expression_types.yaml policy_test.go:64: config is not valid: config: bot entry for "multiple-expression-types" is not valid: config: expression block can't contain multiple expression types === RUN TestBadConfigs/nobots.json policy_test.go:64: config is not valid: config: must define at least one (1) bot rule === RUN TestBadConfigs/nobots.yaml policy_test.go:64: config is not valid: config: must define at least one (1) bot rule === RUN TestBadConfigs/regex_ends_newline.json policy_test.go:64: config is not valid: config: bot entry for "user-agent-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): user agent regex: "Mozilla\n" config: bot entry for "path-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): path regex: "^/evil/.*$\n" config: bot entry for "headers-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): header CF-Worker regex: ".*\n" === RUN TestBadConfigs/regex_ends_newline.yaml policy_test.go:64: config is not valid: config: bot entry for "user-agent-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): user agent regex: "Mozilla\n" config: bot entry for "path-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): path regex: "^/evil/.*$\n" config: bot entry for "headers-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): header CF-Worker regex: ".*\n" === RUN TestBadConfigs/status-codes-0.json policy_test.go:64: config is not valid: status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestBadConfigs/status-codes-0.yaml policy_test.go:64: config is not valid: status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 --- PASS: TestBadConfigs (0.00s) --- PASS: TestBadConfigs/badregexes.json (0.00s) --- PASS: TestBadConfigs/badregexes.yaml (0.00s) --- PASS: TestBadConfigs/import_and_bot.json (0.00s) --- PASS: TestBadConfigs/import_and_bot.yaml (0.00s) --- PASS: TestBadConfigs/import_invalid_file.json (0.00s) --- PASS: TestBadConfigs/import_invalid_file.yaml (0.00s) --- PASS: TestBadConfigs/invalid.json (0.00s) --- PASS: TestBadConfigs/invalid.yaml (0.00s) --- PASS: TestBadConfigs/multiple_expression_types.json (0.00s) --- PASS: TestBadConfigs/multiple_expression_types.yaml (0.00s) --- PASS: TestBadConfigs/nobots.json (0.00s) --- PASS: TestBadConfigs/nobots.yaml (0.00s) --- PASS: TestBadConfigs/regex_ends_newline.json (0.00s) --- PASS: TestBadConfigs/regex_ends_newline.yaml (0.00s) --- PASS: TestBadConfigs/status-codes-0.json (0.00s) --- PASS: TestBadConfigs/status-codes-0.yaml (0.00s) PASS ok github.com/TecharoHQ/anubis/lib/policy 0.044s === RUN TestBotValid === RUN TestBotValid/simple_user_agent === RUN TestBotValid/simple_path === RUN TestBotValid/no_rule_name === RUN TestBotValid/no_rule_matcher === RUN TestBotValid/both_user-agent_and_path === RUN TestBotValid/unknown_action === RUN TestBotValid/invalid_user_agent_regex === RUN TestBotValid/invalid_path_regex === RUN TestBotValid/invalid_headers_regex === RUN TestBotValid/challenge_difficulty_too_low === RUN TestBotValid/challenge_difficulty_too_high === RUN TestBotValid/challenge_wrong_algorithm === RUN TestBotValid/invalid_cidr_range === RUN TestBotValid/only_filter_by_IP_range === RUN TestBotValid/filter_by_user_agent_and_IP_range === RUN TestBotValid/filter_by_path_and_IP_range --- PASS: TestBotValid (0.00s) --- PASS: TestBotValid/simple_user_agent (0.00s) --- PASS: TestBotValid/simple_path (0.00s) --- PASS: TestBotValid/no_rule_name (0.00s) --- PASS: TestBotValid/no_rule_matcher (0.00s) --- PASS: TestBotValid/both_user-agent_and_path (0.00s) --- PASS: TestBotValid/unknown_action (0.00s) --- PASS: TestBotValid/invalid_user_agent_regex (0.00s) --- PASS: TestBotValid/invalid_path_regex (0.00s) --- PASS: TestBotValid/invalid_headers_regex (0.00s) --- PASS: TestBotValid/challenge_difficulty_too_low (0.00s) --- PASS: TestBotValid/challenge_difficulty_too_high (0.00s) --- PASS: TestBotValid/challenge_wrong_algorithm (0.00s) --- PASS: TestBotValid/invalid_cidr_range (0.00s) --- PASS: TestBotValid/only_filter_by_IP_range (0.00s) --- PASS: TestBotValid/filter_by_user_agent_and_IP_range (0.00s) --- PASS: TestBotValid/filter_by_path_and_IP_range (0.00s) === RUN TestConfigValidKnownGood === RUN TestConfigValidKnownGood/allow_everyone.json === RUN TestConfigValidKnownGood/allow_everyone.yaml === RUN TestConfigValidKnownGood/block_cf_workers.json === RUN TestConfigValidKnownGood/block_cf_workers.yaml === RUN TestConfigValidKnownGood/challengemozilla.json === RUN TestConfigValidKnownGood/challengemozilla.yaml === RUN TestConfigValidKnownGood/entropy.yaml === RUN TestConfigValidKnownGood/everything_blocked.json === RUN TestConfigValidKnownGood/everything_blocked.yaml === RUN TestConfigValidKnownGood/git_client.json === RUN TestConfigValidKnownGood/git_client.yaml === RUN TestConfigValidKnownGood/import_filesystem.json === RUN TestConfigValidKnownGood/import_filesystem.yaml === RUN TestConfigValidKnownGood/import_keep_internet_working.json === RUN TestConfigValidKnownGood/import_keep_internet_working.yaml === RUN TestConfigValidKnownGood/old_xesite.json === RUN TestConfigValidKnownGood/status-codes-paranoid.json === RUN TestConfigValidKnownGood/status-codes-paranoid.yaml === RUN TestConfigValidKnownGood/status-codes-rfc.json === RUN TestConfigValidKnownGood/status-codes-rfc.yaml --- PASS: TestConfigValidKnownGood (0.01s) --- PASS: TestConfigValidKnownGood/allow_everyone.json (0.00s) --- PASS: TestConfigValidKnownGood/allow_everyone.yaml (0.00s) --- PASS: TestConfigValidKnownGood/block_cf_workers.json (0.00s) --- PASS: TestConfigValidKnownGood/block_cf_workers.yaml (0.00s) --- PASS: TestConfigValidKnownGood/challengemozilla.json (0.00s) --- PASS: TestConfigValidKnownGood/challengemozilla.yaml (0.00s) --- PASS: TestConfigValidKnownGood/entropy.yaml (0.00s) --- PASS: TestConfigValidKnownGood/everything_blocked.json (0.00s) --- PASS: TestConfigValidKnownGood/everything_blocked.yaml (0.00s) --- PASS: TestConfigValidKnownGood/git_client.json (0.00s) --- PASS: TestConfigValidKnownGood/git_client.yaml (0.00s) --- PASS: TestConfigValidKnownGood/import_filesystem.json (0.00s) --- PASS: TestConfigValidKnownGood/import_filesystem.yaml (0.00s) --- PASS: TestConfigValidKnownGood/import_keep_internet_working.json (0.00s) --- PASS: TestConfigValidKnownGood/import_keep_internet_working.yaml (0.00s) --- PASS: TestConfigValidKnownGood/old_xesite.json (0.00s) --- PASS: TestConfigValidKnownGood/status-codes-paranoid.json (0.00s) --- PASS: TestConfigValidKnownGood/status-codes-paranoid.yaml (0.00s) --- PASS: TestConfigValidKnownGood/status-codes-rfc.json (0.00s) --- PASS: TestConfigValidKnownGood/status-codes-rfc.yaml (0.00s) === RUN TestImportStatement === RUN TestImportStatement/(data)/apps/allow-api-routes.yaml === RUN TestImportStatement/(data)/apps/bookstack-saml.yaml === RUN TestImportStatement/(data)/apps/gitea-rss-feeds.yaml === RUN TestImportStatement/(data)/apps/qualys-ssl-labs.yml === RUN TestImportStatement/(data)/apps/searx-checker.yml === RUN TestImportStatement/(data)/bots/_deny-pathological.yaml === RUN TestImportStatement/(data)/bots/aggressive-brazilian-scrapers.yaml === RUN TestImportStatement/(data)/bots/ai-catchall.yaml === RUN TestImportStatement/(data)/bots/ai-robots-txt.yaml === RUN TestImportStatement/(data)/bots/cloudflare-workers.yaml === RUN TestImportStatement/(data)/bots/headless-browsers.yaml === RUN TestImportStatement/(data)/bots/irc-bots/archlinux-phrik.yaml === RUN TestImportStatement/(data)/bots/irc-bots/gentoo-chat.yaml === RUN TestImportStatement/(data)/bots/us-ai-scraper.yaml === RUN TestImportStatement/(data)/common/allow-api-like.yaml === RUN TestImportStatement/(data)/common/allow-private-addresses.yaml === RUN TestImportStatement/(data)/common/json-api.yaml === RUN TestImportStatement/(data)/common/keep-internet-working.yaml === RUN TestImportStatement/(data)/common/rfc-violations.yaml === RUN TestImportStatement/(data)/crawlers/_allow-good.yaml === RUN TestImportStatement/(data)/crawlers/ai-search.yaml === RUN TestImportStatement/(data)/crawlers/ai-training.yaml === RUN TestImportStatement/(data)/crawlers/applebot.yaml === RUN TestImportStatement/(data)/crawlers/bingbot.yaml === RUN TestImportStatement/(data)/crawlers/duckduckbot.yaml === RUN TestImportStatement/(data)/crawlers/googlebot.yaml === RUN TestImportStatement/(data)/crawlers/internet-archive.yaml === RUN TestImportStatement/(data)/crawlers/kagibot.yaml === RUN TestImportStatement/(data)/crawlers/marginalia.yaml === RUN TestImportStatement/(data)/crawlers/mojeekbot.yaml === RUN TestImportStatement/(data)/crawlers/openai-gptbot.yaml === RUN TestImportStatement/(data)/crawlers/openai-searchbot.yaml === RUN TestImportStatement/(data)/crawlers/qwantbot.yaml === RUN TestImportStatement/(data)/meta/ai-block-aggressive.yaml === RUN TestImportStatement/(data)/meta/ai-block-moderate.yaml === RUN TestImportStatement/(data)/meta/ai-block-permissive.yaml --- PASS: TestImportStatement (0.02s) --- PASS: TestImportStatement/(data)/apps/allow-api-routes.yaml (0.00s) --- PASS: TestImportStatement/(data)/apps/bookstack-saml.yaml (0.00s) --- PASS: TestImportStatement/(data)/apps/gitea-rss-feeds.yaml (0.00s) --- PASS: TestImportStatement/(data)/apps/qualys-ssl-labs.yml (0.00s) --- PASS: TestImportStatement/(data)/apps/searx-checker.yml (0.00s) --- PASS: TestImportStatement/(data)/bots/_deny-pathological.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/aggressive-brazilian-scrapers.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/ai-catchall.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/ai-robots-txt.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/cloudflare-workers.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/headless-browsers.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/irc-bots/archlinux-phrik.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/irc-bots/gentoo-chat.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/us-ai-scraper.yaml (0.00s) --- PASS: TestImportStatement/(data)/common/allow-api-like.yaml (0.00s) --- PASS: TestImportStatement/(data)/common/allow-private-addresses.yaml (0.00s) --- PASS: TestImportStatement/(data)/common/json-api.yaml (0.00s) --- PASS: TestImportStatement/(data)/common/keep-internet-working.yaml (0.00s) --- PASS: TestImportStatement/(data)/common/rfc-violations.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/_allow-good.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/ai-search.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/ai-training.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/applebot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/bingbot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/duckduckbot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/googlebot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/internet-archive.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/kagibot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/marginalia.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/mojeekbot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/openai-gptbot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/openai-searchbot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/qwantbot.yaml (0.00s) --- PASS: TestImportStatement/(data)/meta/ai-block-aggressive.yaml (0.00s) --- PASS: TestImportStatement/(data)/meta/ai-block-moderate.yaml (0.00s) --- PASS: TestImportStatement/(data)/meta/ai-block-permissive.yaml (0.00s) === RUN TestConfigValidBad === RUN TestConfigValidBad/badregexes.json config_test.go:319: config is not valid: config: bot entry for "path-bad" is not valid: config.Bot: invalid path regex error parsing regexp: missing closing ): `a(b` config: bot entry for "user-agent-bad" is not valid: config.Bot: invalid user agent regex error parsing regexp: missing closing ): `a(b` config: bot entry for "headers-bad" is not valid: config.Bot: must set either user_agent_regex, path_regex, headers_regex, or remote_addresses status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/badregexes.yaml config_test.go:319: config is not valid: config: bot entry for "path-bad" is not valid: config.Bot: invalid path regex error parsing regexp: missing closing ): `a(b` config: bot entry for "user-agent-bad" is not valid: config.Bot: invalid user agent regex error parsing regexp: missing closing ): `a(b` status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/import_and_bot.json config_test.go:319: config is not valid: config.BotOrImport: can't set bot rules and import values at the same time status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/import_and_bot.yaml config_test.go:319: config is not valid: config.BotOrImport: can't set bot rules and import values at the same time status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/import_invalid_file.json config_test.go:319: config is not valid: config.ImportStatement: invalid source file: (data)/does-not-exist-fake-file.yaml: open does-not-exist-fake-file.yaml: file does not exist status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/import_invalid_file.yaml config_test.go:319: config is not valid: config.ImportStatement: invalid source file: (data)/does-not-exist-fake-file.yaml: open does-not-exist-fake-file.yaml: file does not exist status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/invalid.json config_test.go:319: config is not valid: config.BotOrImport: rule definition is invalid, you must set either bot rules or an import statement, not both status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/invalid.yaml config_test.go:319: config is not valid: config: must define at least one (1) bot rule status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/multiple_expression_types.json config_test.go:319: config is not valid: config: bot entry for "multiple-expression-types" is not valid: config: expression block can't contain multiple expression types status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/multiple_expression_types.yaml config_test.go:319: config is not valid: config: bot entry for "multiple-expression-types" is not valid: config: expression block can't contain multiple expression types status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/nobots.json config_test.go:319: config is not valid: config: must define at least one (1) bot rule status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/nobots.yaml config_test.go:319: config is not valid: config: must define at least one (1) bot rule status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/regex_ends_newline.json config_test.go:319: config is not valid: config: bot entry for "user-agent-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): user agent regex: "Mozilla\n" config: bot entry for "path-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): path regex: "^/evil/.*$\n" config: bot entry for "headers-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): header CF-Worker regex: ".*\n" status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/regex_ends_newline.yaml config_test.go:319: config is not valid: config: bot entry for "user-agent-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): user agent regex: "Mozilla\n" config: bot entry for "path-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): path regex: "^/evil/.*$\n" config: bot entry for "headers-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): header CF-Worker regex: ".*\n" status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/status-codes-0.json config_test.go:319: config is not valid: status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/status-codes-0.yaml config_test.go:319: config is not valid: status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 --- PASS: TestConfigValidBad (0.01s) --- PASS: TestConfigValidBad/badregexes.json (0.00s) --- PASS: TestConfigValidBad/badregexes.yaml (0.00s) --- PASS: TestConfigValidBad/import_and_bot.json (0.00s) --- PASS: TestConfigValidBad/import_and_bot.yaml (0.00s) --- PASS: TestConfigValidBad/import_invalid_file.json (0.00s) --- PASS: TestConfigValidBad/import_invalid_file.yaml (0.00s) --- PASS: TestConfigValidBad/invalid.json (0.00s) --- PASS: TestConfigValidBad/invalid.yaml (0.00s) --- PASS: TestConfigValidBad/multiple_expression_types.json (0.00s) --- PASS: TestConfigValidBad/multiple_expression_types.yaml (0.00s) --- PASS: TestConfigValidBad/nobots.json (0.00s) --- PASS: TestConfigValidBad/nobots.yaml (0.00s) --- PASS: TestConfigValidBad/regex_ends_newline.json (0.00s) --- PASS: TestConfigValidBad/regex_ends_newline.yaml (0.00s) --- PASS: TestConfigValidBad/status-codes-0.json (0.00s) --- PASS: TestConfigValidBad/status-codes-0.yaml (0.00s) === RUN TestBotConfigZero --- PASS: TestBotConfigZero (0.00s) === RUN TestExpressionOrListUnmarshal === RUN TestExpressionOrListUnmarshal/simple === RUN TestExpressionOrListUnmarshal/object-and === RUN TestExpressionOrListUnmarshal/object-or === RUN TestExpressionOrListUnmarshal/both-or-and === RUN TestExpressionOrListUnmarshal/expression-empty --- PASS: TestExpressionOrListUnmarshal (0.00s) --- PASS: TestExpressionOrListUnmarshal/simple (0.00s) --- PASS: TestExpressionOrListUnmarshal/object-and (0.00s) --- PASS: TestExpressionOrListUnmarshal/object-or (0.00s) --- PASS: TestExpressionOrListUnmarshal/both-or-and (0.00s) --- PASS: TestExpressionOrListUnmarshal/expression-empty (0.00s) PASS ok github.com/TecharoHQ/anubis/lib/policy/config 0.042s === RUN TestHTTPHeaders === RUN TestHTTPHeaders/contains-existing-header === RUN TestHTTPHeaders/not-contains-missing-header === RUN TestHTTPHeaders/get-existing-header === RUN TestHTTPHeaders/not-get-missing-header --- PASS: TestHTTPHeaders (0.00s) --- PASS: TestHTTPHeaders/contains-existing-header (0.00s) --- PASS: TestHTTPHeaders/not-contains-missing-header (0.00s) --- PASS: TestHTTPHeaders/get-existing-header (0.00s) --- PASS: TestHTTPHeaders/not-get-missing-header (0.00s) === RUN TestJoin === RUN TestJoin/no-clauses === RUN TestJoin/one-clause-identity === RUN TestJoin/multi-clause-and === RUN TestJoin/multi-clause-or === RUN TestJoin/git-user-agent --- PASS: TestJoin (0.01s) --- PASS: TestJoin/no-clauses (0.00s) --- PASS: TestJoin/one-clause-identity (0.00s) --- PASS: TestJoin/multi-clause-and (0.00s) --- PASS: TestJoin/multi-clause-or (0.00s) --- PASS: TestJoin/git-user-agent (0.00s) === RUN TestURLValues === RUN TestURLValues/contains-existing-key === RUN TestURLValues/not-contains-missing-key === RUN TestURLValues/get-existing-key === RUN TestURLValues/not-get-missing-key --- PASS: TestURLValues (0.00s) --- PASS: TestURLValues/contains-existing-key (0.00s) --- PASS: TestURLValues/not-contains-missing-key (0.00s) --- PASS: TestURLValues/get-existing-key (0.00s) --- PASS: TestURLValues/not-get-missing-key (0.00s) PASS ok github.com/TecharoHQ/anubis/lib/policy/expressions 0.015s ? github.com/TecharoHQ/anubis/web [no test files] ? github.com/TecharoHQ/anubis/xess [no test files] >>> anubis: Entering fakeroot... >>> anubis-doc*: Running split function doc... 'usr/share/licenses' -> '/home/buildozer/aports/testing/anubis/pkg/anubis-doc/usr/share/licenses' >>> anubis-doc*: Preparing subpackage anubis-doc... >>> anubis-doc*: Running postcheck for anubis-doc >>> anubis-openrc*: Running split function openrc... 'etc/conf.d' -> '/home/buildozer/aports/testing/anubis/pkg/anubis-openrc/etc/conf.d' 'etc/init.d' -> '/home/buildozer/aports/testing/anubis/pkg/anubis-openrc/etc/init.d' >>> anubis-openrc*: Preparing subpackage anubis-openrc... >>> anubis-openrc*: Running postcheck for anubis-openrc >>> anubis*: Running postcheck for anubis >>> anubis*: Preparing package anubis... >>> anubis*: Stripping binaries >>> anubis-doc*: Scanning shared objects >>> anubis-openrc*: Scanning shared objects >>> anubis*: Scanning shared objects >>> anubis-doc*: Tracing dependencies... >>> anubis-doc*: Package size: 1.0 KB >>> anubis-doc*: Compressing data... >>> anubis-doc*: Create checksum... >>> anubis-doc*: Create anubis-doc-1.19.1-r0.apk >>> anubis-openrc*: Tracing dependencies... >>> anubis-openrc*: Package size: 294.0 B >>> anubis-openrc*: Compressing data... >>> anubis-openrc*: Create checksum... >>> anubis-openrc*: Create anubis-openrc-1.19.1-r0.apk >>> anubis*: Tracing dependencies... so:libc.musl-x86.so.1 >>> anubis*: Package size: 15.2 MB >>> anubis*: Compressing data... >>> anubis*: Create checksum... >>> anubis*: Create anubis-1.19.1-r0.apk >>> anubis: Build complete at Mon, 02 Jun 2025 10:37:28 +0000 elapsed time 0h 0m 24s >>> anubis: Cleaning up srcdir >>> anubis: Cleaning up pkgdir >>> anubis: Uninstalling dependencies... (1/2) Purging .makedepends-anubis (20250602.103706) (2/2) Purging go (1.24.3-r1) Executing busybox-1.37.0-r18.trigger OK: 404 MiB in 118 packages >>> anubis: Updating the testing/x86 repository index... >>> anubis: Signing the index...