@@ -23,25 +23,8 @@ import (
23
23
func TestE2e (t * testing.T ) {
24
24
conf := coraza .NewWAFConfig ()
25
25
26
- customE2eDirectives := `
27
- SecRuleEngine On
28
- SecRequestBodyAccess On
29
- SecResponseBodyAccess On
30
- SecResponseBodyMimeType application/json
31
- # Custom rule for Coraza config check (ensuring that these configs are used)
32
- SecRule &REQUEST_HEADERS:coraza-e2e "@eq 0" "id:100,phase:1,deny,status:424,log,msg:'Coraza E2E - Missing header'"
33
- # Custom rules for e2e testing
34
- SecRule REQUEST_URI "@streq /admin" "id:101,phase:1,t:lowercase,log,deny"
35
- SecRule REQUEST_BODY "@rx maliciouspayload" "id:102,phase:2,t:lowercase,log,deny"
36
- SecRule RESPONSE_HEADERS:pass "@rx leak" "id:103,phase:3,t:lowercase,log,deny"
37
- SecRule RESPONSE_BODY "@contains responsebodycode" "id:104,phase:4,t:lowercase,log,deny"
38
- # Custom rules mimicking the following CRS rules: 941100, 942100, 913100
39
- SecRule ARGS_NAMES|ARGS "@detectXSS" "id:9411,phase:2,t:none,t:utf8toUnicode,t:urlDecodeUni,t:htmlEntityDecode,t:jsDecode,t:cssDecode,t:removeNulls,log,deny"
40
- SecRule ARGS_NAMES|ARGS "@detectSQLi" "id:9421,phase:2,t:none,t:utf8toUnicode,t:urlDecodeUni,t:removeNulls,multiMatch,log,deny"
41
- SecRule REQUEST_HEADERS:User-Agent "@pm grabber masscan" "id:9131,phase:1,t:none,log,deny"
42
- `
43
26
conf = conf .
44
- WithDirectives (customE2eDirectives )
27
+ WithDirectives (e2e . Directives )
45
28
46
29
waf , err := coraza .NewWAF (conf )
47
30
if err != nil {
0 commit comments