>>> anubis: Building testing/anubis 1.19.1-r0 (using abuild 3.15.0-r0) started Mon, 02 Jun 2025 10:37:04 +0000 >>> anubis: Validating /home/buildozer/aports/testing/anubis/APKBUILD... >>> anubis: Analyzing dependencies... >>> anubis: Installing for build: build-base go (1/3) Installing binutils-gold (2.44-r0) (2/3) Installing go (1.24.3-r1) (3/3) Installing .makedepends-anubis (20250602.103705) Executing busybox-1.37.0-r18.trigger OK: 518 MiB in 107 packages >>> anubis: Cleaning up srcdir >>> anubis: Cleaning up pkgdir >>> anubis: Cleaning up tmpdir >>> anubis: Fetching https://distfiles.alpinelinux.org/distfiles/edge/anubis-src-vendor-npm-1.19.1.tar.gz Connecting to distfiles.alpinelinux.org (172.105.82.32:443) wget: server returned error: HTTP/1.1 404 Not Found >>> anubis: Fetching https://github.com/TecharoHQ/anubis/releases/download/v1.19.1/anubis-src-vendor-npm-1.19.1.tar.gz >>> anubis: Fetching https://distfiles.alpinelinux.org/distfiles/edge/anubis-src-vendor-npm-1.19.1.tar.gz >>> anubis: Checking sha512sums... anubis-src-vendor-npm-1.19.1.tar.gz: OK anubis.initd: OK anubis.confd: OK >>> anubis: Unpacking /var/cache/distfiles/edge/anubis-src-vendor-npm-1.19.1.tar.gz... ? github.com/TecharoHQ/anubis [no test files] ? github.com/TecharoHQ/anubis/cmd/anubis [no test files] ? github.com/TecharoHQ/anubis/cmd/containerbuild [no test files] ? github.com/TecharoHQ/anubis/data [no test files] === RUN TestImpl --- PASS: TestImpl (0.00s) === RUN TestCleanup --- PASS: TestCleanup (0.00s) PASS ok github.com/TecharoHQ/anubis/decaymap 0.008s === RUN TestErrorLogFilter --- PASS: TestErrorLogFilter (0.00s) === RUN TestXForwardedForUpdateIgnoreUnix --- PASS: TestXForwardedForUpdateIgnoreUnix (0.00s) === RUN TestXForwardedForUpdateAddToChain --- PASS: TestXForwardedForUpdateAddToChain (0.00s) === RUN TestComputeXFFHeader === RUN TestComputeXFFHeader/StripPrivate === RUN TestComputeXFFHeader/StripLoopback === RUN TestComputeXFFHeader/StripCGNAT === RUN TestComputeXFFHeader/StripLinkLocalUnicastIPv4 === RUN TestComputeXFFHeader/StripLinkLocalUnicastIPv6 === RUN TestComputeXFFHeader/Flatten === RUN TestComputeXFFHeader/TrimSpaces === RUN TestComputeXFFHeader/invalid-ip-port === RUN TestComputeXFFHeader/invalid-remote-ip === RUN TestComputeXFFHeader/no-xff-dont-panic --- PASS: TestComputeXFFHeader (0.00s) --- PASS: TestComputeXFFHeader/StripPrivate (0.00s) --- PASS: TestComputeXFFHeader/StripLoopback (0.00s) --- PASS: TestComputeXFFHeader/StripCGNAT (0.00s) --- PASS: TestComputeXFFHeader/StripLinkLocalUnicastIPv4 (0.00s) --- PASS: TestComputeXFFHeader/StripLinkLocalUnicastIPv6 (0.00s) --- PASS: TestComputeXFFHeader/Flatten (0.00s) --- PASS: TestComputeXFFHeader/TrimSpaces (0.00s) --- PASS: TestComputeXFFHeader/invalid-ip-port (0.00s) --- PASS: TestComputeXFFHeader/invalid-remote-ip (0.00s) --- PASS: TestComputeXFFHeader/no-xff-dont-panic (0.00s) PASS ok github.com/TecharoHQ/anubis/internal 0.044s === RUN TestReverse4 === RUN TestReverse4/1.2.3.4->4.3.2.1 --- PASS: TestReverse4 (0.00s) --- PASS: TestReverse4/1.2.3.4->4.3.2.1 (0.00s) === RUN TestReverse6 === RUN TestReverse6/1234:5678:9ABC:DEF0:1234:5678:9ABC:DEF0->0.f.e.d.c.b.a.9.8.7.6.5.4.3.2.1.0.f.e.d.c.b.a.9.8.7.6.5.4.3.2.1 --- PASS: TestReverse6 (0.00s) --- PASS: TestReverse6/1234:5678:9ABC:DEF0:1234:5678:9ABC:DEF0->0.f.e.d.c.b.a.9.8.7.6.5.4.3.2.1.0.f.e.d.c.b.a.9.8.7.6.5.4.3.2.1 (0.00s) === RUN TestLookup dnsbl_test.go:60: response: 0 --- PASS: TestLookup (0.11s) PASS ok github.com/TecharoHQ/anubis/internal/dnsbl 0.129s === RUN TestCheckCache --- PASS: TestCheckCache (0.00s) === RUN TestGetOGTags --- PASS: TestGetOGTags (0.01s) === RUN TestGetOGTagsWithHostConsideration === RUN TestGetOGTagsWithHostConsideration/Host_Not_Considered_-_Same_Host === RUN TestGetOGTagsWithHostConsideration/Host_Not_Considered_-_Different_Host === RUN TestGetOGTagsWithHostConsideration/Host_Considered_-_Same_Host === RUN TestGetOGTagsWithHostConsideration/Host_Considered_-_Different_Host --- PASS: TestGetOGTagsWithHostConsideration (0.00s) --- PASS: TestGetOGTagsWithHostConsideration/Host_Not_Considered_-_Same_Host (0.00s) --- PASS: TestGetOGTagsWithHostConsideration/Host_Not_Considered_-_Different_Host (0.00s) --- PASS: TestGetOGTagsWithHostConsideration/Host_Considered_-_Same_Host (0.00s) --- PASS: TestGetOGTagsWithHostConsideration/Host_Considered_-_Different_Host (0.00s) === RUN TestFetchHTMLDocument === RUN TestFetchHTMLDocument/Valid_HTML === RUN TestFetchHTMLDocument/Empty_HTML === RUN TestFetchHTMLDocument/Not_found_error === RUN TestFetchHTMLDocument/Unsupported_Content-Type === RUN TestFetchHTMLDocument/Too_large_content --- PASS: TestFetchHTMLDocument (0.00s) --- PASS: TestFetchHTMLDocument/Valid_HTML (0.00s) --- PASS: TestFetchHTMLDocument/Empty_HTML (0.00s) --- PASS: TestFetchHTMLDocument/Not_found_error (0.00s) --- PASS: TestFetchHTMLDocument/Unsupported_Content-Type (0.00s) --- PASS: TestFetchHTMLDocument/Too_large_content (0.00s) === RUN TestFetchHTMLDocumentInvalidURL --- PASS: TestFetchHTMLDocumentInvalidURL (0.02s) === RUN TestIntegrationGetOGTags === RUN TestIntegrationGetOGTags/Simple_page === RUN TestIntegrationGetOGTags/Complete_page === RUN TestIntegrationGetOGTags/Page_with_no_OG_tags === RUN TestIntegrationGetOGTags/Nonexistent_page --- PASS: TestIntegrationGetOGTags (0.00s) --- PASS: TestIntegrationGetOGTags/Simple_page (0.00s) --- PASS: TestIntegrationGetOGTags/Complete_page (0.00s) --- PASS: TestIntegrationGetOGTags/Page_with_no_OG_tags (0.00s) --- PASS: TestIntegrationGetOGTags/Nonexistent_page (0.00s) === RUN TestNewOGTagCache === RUN TestNewOGTagCache/Basic_initialization === RUN TestNewOGTagCache/Empty_target --- PASS: TestNewOGTagCache (0.00s) --- PASS: TestNewOGTagCache/Basic_initialization (0.00s) --- PASS: TestNewOGTagCache/Empty_target (0.00s) === RUN TestNewOGTagCache_UnixSocket --- PASS: TestNewOGTagCache_UnixSocket (0.00s) === RUN TestGetTarget === RUN TestGetTarget/No_path_or_query === RUN TestGetTarget/With_complex_path === RUN TestGetTarget/With_query_and_path === RUN TestGetTarget/Unix_socket_target === RUN TestGetTarget/Unix_socket_target_with_/// --- PASS: TestGetTarget (0.00s) --- PASS: TestGetTarget/No_path_or_query (0.00s) --- PASS: TestGetTarget/With_complex_path (0.00s) --- PASS: TestGetTarget/With_query_and_path (0.00s) --- PASS: TestGetTarget/Unix_socket_target (0.00s) --- PASS: TestGetTarget/Unix_socket_target_with_/// (0.00s) === RUN TestIntegrationGetOGTags_UnixSocket --- PASS: TestIntegrationGetOGTags_UnixSocket (0.10s) === RUN TestExtractOGTags === RUN TestExtractOGTags/Basic_OG_tags === RUN TestExtractOGTags/OG_tags_with_name_attribute === RUN TestExtractOGTags/No_approved_OG_tags === RUN TestExtractOGTags/Empty_content === RUN TestExtractOGTags/Explicitly_approved_tag --- PASS: TestExtractOGTags (0.00s) --- PASS: TestExtractOGTags/Basic_OG_tags (0.00s) --- PASS: TestExtractOGTags/OG_tags_with_name_attribute (0.00s) --- PASS: TestExtractOGTags/No_approved_OG_tags (0.00s) --- PASS: TestExtractOGTags/Empty_content (0.00s) --- PASS: TestExtractOGTags/Explicitly_approved_tag (0.00s) === RUN TestIsOGMetaTag === RUN TestIsOGMetaTag/Meta_OG_tag === RUN TestIsOGMetaTag/Regular_meta_tag === RUN TestIsOGMetaTag/Not_a_meta_tag --- PASS: TestIsOGMetaTag (0.00s) --- PASS: TestIsOGMetaTag/Meta_OG_tag (0.00s) --- PASS: TestIsOGMetaTag/Regular_meta_tag (0.00s) --- PASS: TestIsOGMetaTag/Not_a_meta_tag (0.00s) === RUN TestExtractMetaTagInfo === RUN TestExtractMetaTagInfo/OG_title_with_property_(approved_by_prefix) === RUN TestExtractMetaTagInfo/OG_description_with_name_(approved_by_prefix) === RUN TestExtractMetaTagInfo/Regular_meta_tag_(name=description,_approved_by_exact_match) === RUN TestExtractMetaTagInfo/Regular_meta_tag_(name=keywords,_not_approved) === RUN TestExtractMetaTagInfo/Twitter_tag_(not_approved_by_default) === RUN TestExtractMetaTagInfo/No_content_(but_approved_property) === RUN TestExtractMetaTagInfo/No_property/name_attribute === RUN TestExtractMetaTagInfo/Explicitly_approved_tag_with_property_attribute --- PASS: TestExtractMetaTagInfo (0.00s) --- PASS: TestExtractMetaTagInfo/OG_title_with_property_(approved_by_prefix) (0.00s) --- PASS: TestExtractMetaTagInfo/OG_description_with_name_(approved_by_prefix) (0.00s) --- PASS: TestExtractMetaTagInfo/Regular_meta_tag_(name=description,_approved_by_exact_match) (0.00s) --- PASS: TestExtractMetaTagInfo/Regular_meta_tag_(name=keywords,_not_approved) (0.00s) --- PASS: TestExtractMetaTagInfo/Twitter_tag_(not_approved_by_default) (0.00s) --- PASS: TestExtractMetaTagInfo/No_content_(but_approved_property) (0.00s) --- PASS: TestExtractMetaTagInfo/No_property/name_attribute (0.00s) --- PASS: TestExtractMetaTagInfo/Explicitly_approved_tag_with_property_attribute (0.00s) PASS ok github.com/TecharoHQ/anubis/internal/ogtags 0.149s === RUN TestPlaywrightBrowser playwright_test.go:222: npx not found in PATH, skipping integration smoke testing: exec: "npx": executable file not found in $PATH --- SKIP: TestPlaywrightBrowser (0.00s) === RUN TestPlaywrightWithBasePrefix playwright_test.go:302: NOTE(Xe)\ these tests require HTTPS support in #364 --- SKIP: TestPlaywrightWithBasePrefix (0.00s) PASS ok github.com/TecharoHQ/anubis/internal/test 0.030s === RUN TestLoadPolicies === RUN TestLoadPolicies/botPolicies.json === RUN TestLoadPolicies/botPolicies.yaml --- PASS: TestLoadPolicies (0.04s) --- PASS: TestLoadPolicies/botPolicies.json (0.02s) --- PASS: TestLoadPolicies/botPolicies.yaml (0.02s) === RUN TestCVE2025_24369 {"time":"2025-06-02T10:37:24.396672354Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T10:37:24.418031045Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"9187b40dc1f138fa4c1fec9a6dc612dca5e822ef03c7a2b99bf266fcd63f890c","rules":{"algorithm":"fast","difficulty":4,"report_as":4},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:44307/.within.website/x/cmd/anubis/api/make-challenge?redir=%2F -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=9187b40dc1f138fa4c1fec9a6dc612dca5e822ef03c7a2b99bf266fcd63f890c; Path=/; Expires=Mon, 02 Jun 2025 10:37:24 GMT; SameSite=Lax anubis_test.go:124: requested cookies for http://127.0.0.1:44307/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=ec8fd1c54840b3a676006c43fc6edbc6ceaa1eebc9d32ed68a05128c7ab6879b anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=9187b40dc1f138fa4c1fec9a6dc612dca5e822ef03c7a2b99bf266fcd63f890c; Path=/; Expires=Mon, 02 Jun 2025 10:37:24 GMT; SameSite=Lax {"time":"2025-06-02T10:37:24.420003224Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T10:37:24.420118065Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":413},"msg":"difficulty check failed","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"response":"ec8fd1c54840b3a676006c43fc6edbc6ceaa1eebc9d32ed68a05128c7ab6879b","difficulty":4} anubis_test.go:138: set cookie: http://127.0.0.1:44307/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=ec8fd1c54840b3a676006c43fc6edbc6ceaa1eebc9d32ed68a05128c7ab6879b -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Expires=Mon, 02 Jun 2025 10:36:24 GMT; Max-Age=0; SameSite=Lax anubis_test.go:138: set cookie: http://127.0.0.1:44307/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=ec8fd1c54840b3a676006c43fc6edbc6ceaa1eebc9d32ed68a05128c7ab6879b -> techaro.lol-anubis-auth=; Path=/; Expires=Mon, 02 Jun 2025 10:36:24 GMT; Max-Age=0; SameSite=Lax --- PASS: TestCVE2025_24369 (0.04s) === RUN TestCookieCustomExpiration {"time":"2025-06-02T10:37:24.444379104Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T10:37:24.445387394Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"4eda314f54b35777123fa1cb4873a8563bb126963709afa83c3fc1de1b341c9f","rules":{"algorithm":"fast","difficulty":0,"report_as":0},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:35045/.within.website/x/cmd/anubis/api/make-challenge?redir=%2F -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=4eda314f54b35777123fa1cb4873a8563bb126963709afa83c3fc1de1b341c9f; Path=/; Expires=Mon, 02 Jun 2025 10:47:24 GMT; SameSite=Lax anubis_test.go:124: requested cookies for http://127.0.0.1:35045/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=0b90e4ba2ceba5ba6fe879aac9a1b9908a73a2762d5709cc09cf58e3c1e0bb29 anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=4eda314f54b35777123fa1cb4873a8563bb126963709afa83c3fc1de1b341c9f; Path=/; Expires=Mon, 02 Jun 2025 10:47:24 GMT; SameSite=Lax {"time":"2025-06-02T10:37:24.453966359Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T10:37:24.454494004Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":437},"msg":"challenge passed, redirecting to app","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:35045/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=0b90e4ba2ceba5ba6fe879aac9a1b9908a73a2762d5709cc09cf58e3c1e0bb29 -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Expires=Mon, 02 Jun 2025 10:36:24 GMT; Max-Age=0; SameSite=Lax anubis_test.go:138: set cookie: http://127.0.0.1:35045/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=0b90e4ba2ceba5ba6fe879aac9a1b9908a73a2762d5709cc09cf58e3c1e0bb29 -> techaro.lol-anubis-auth=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6IjRlZGEzMTRmNTRiMzU3NzcxMjNmYTFjYjQ4NzNhODU2M2JiMTI2OTYzNzA5YWZhODNjM2ZjMWRlMWIzNDFjOWYiLCJleHAiOjE3NDg4NjEyNDQsImlhdCI6MTc0ODg2MDY0NCwibmJmIjoxNzQ4ODYwNTg0LCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiMGI5MGU0YmEyY2ViYTViYTZmZTg3OWFhYzlhMWI5OTA4YTczYTI3NjJkNTcwOWNjMDljZjU4ZTNjMWUwYmIyOSJ9.NWk99ZIHdtaC7o-rIO3UNd26F_ZJNwan-5zot1iCkb9FfL41hnBLHAln-00thKvfLR4H3t85mC6oS6qkjpwVDQ; Path=/; Expires=Mon, 02 Jun 2025 10:47:24 GMT; SameSite=Lax anubis_test.go:228: &http.Cookie{Name:"techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work", Value:"", Quoted:false, Path:"/", Domain:"", Expires:time.Date(2025, time.June, 2, 10, 36, 24, 0, time.UTC), RawExpires:"Mon, 02 Jun 2025 10:36:24 GMT", MaxAge:-1, Secure:false, HttpOnly:false, SameSite:2, Partitioned:false, Raw:"techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Expires=Mon, 02 Jun 2025 10:36:24 GMT; Max-Age=0; SameSite=Lax", Unparsed:[]string(nil)} anubis_test.go:228: &http.Cookie{Name:"techaro.lol-anubis-auth", Value:"eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6IjRlZGEzMTRmNTRiMzU3NzcxMjNmYTFjYjQ4NzNhODU2M2JiMTI2OTYzNzA5YWZhODNjM2ZjMWRlMWIzNDFjOWYiLCJleHAiOjE3NDg4NjEyNDQsImlhdCI6MTc0ODg2MDY0NCwibmJmIjoxNzQ4ODYwNTg0LCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiMGI5MGU0YmEyY2ViYTViYTZmZTg3OWFhYzlhMWI5OTA4YTczYTI3NjJkNTcwOWNjMDljZjU4ZTNjMWUwYmIyOSJ9.NWk99ZIHdtaC7o-rIO3UNd26F_ZJNwan-5zot1iCkb9FfL41hnBLHAln-00thKvfLR4H3t85mC6oS6qkjpwVDQ", Quoted:false, Path:"/", Domain:"", Expires:time.Date(2025, time.June, 2, 10, 47, 24, 0, time.UTC), RawExpires:"Mon, 02 Jun 2025 10:47:24 GMT", MaxAge:0, Secure:false, HttpOnly:false, SameSite:2, Partitioned:false, Raw:"techaro.lol-anubis-auth=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6IjRlZGEzMTRmNTRiMzU3NzcxMjNmYTFjYjQ4NzNhODU2M2JiMTI2OTYzNzA5YWZhODNjM2ZjMWRlMWIzNDFjOWYiLCJleHAiOjE3NDg4NjEyNDQsImlhdCI6MTc0ODg2MDY0NCwibmJmIjoxNzQ4ODYwNTg0LCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiMGI5MGU0YmEyY2ViYTViYTZmZTg3OWFhYzlhMWI5OTA4YTczYTI3NjJkNTcwOWNjMDljZjU4ZTNjMWUwYmIyOSJ9.NWk99ZIHdtaC7o-rIO3UNd26F_ZJNwan-5zot1iCkb9FfL41hnBLHAln-00thKvfLR4H3t85mC6oS6qkjpwVDQ; Path=/; Expires=Mon, 02 Jun 2025 10:47:24 GMT; SameSite=Lax", Unparsed:[]string(nil)} --- PASS: TestCookieCustomExpiration (0.03s) === RUN TestCookieSettings {"time":"2025-06-02T10:37:24.475516371Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T10:37:24.477814874Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"e107d9629b0b026c64e1277a169e2409a378ff2684f4e531ca1030f8a6b2b56f","rules":{"algorithm":"fast","difficulty":0,"report_as":0},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:39089/.within.website/x/cmd/anubis/api/make-challenge?redir=%2F -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=e107d9629b0b026c64e1277a169e2409a378ff2684f4e531ca1030f8a6b2b56f; Path=/; Domain=127.0.0.1; Expires=Mon, 09 Jun 2025 10:37:24 GMT; SameSite=Lax; Partitioned anubis_test.go:124: requested cookies for http://127.0.0.1:39089/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=b27eb5995494e414da4e717b73ef64835a5cfb857021c0cfdd040de50deec5f3 anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=e107d9629b0b026c64e1277a169e2409a378ff2684f4e531ca1030f8a6b2b56f; Path=/; Domain=127.0.0.1; Expires=Mon, 09 Jun 2025 10:37:24 GMT; SameSite=Lax; Partitioned {"time":"2025-06-02T10:37:24.47840168Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T10:37:24.478831724Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":437},"msg":"challenge passed, redirecting to app","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:39089/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=b27eb5995494e414da4e717b73ef64835a5cfb857021c0cfdd040de50deec5f3 -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Domain=127.0.0.1; Expires=Mon, 02 Jun 2025 10:36:24 GMT; Max-Age=0; SameSite=Lax; Partitioned anubis_test.go:138: set cookie: http://127.0.0.1:39089/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=b27eb5995494e414da4e717b73ef64835a5cfb857021c0cfdd040de50deec5f3 -> techaro.lol-anubis-auth-for-127.0.0.1=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6ImUxMDdkOTYyOWIwYjAyNmM2NGUxMjc3YTE2OWUyNDA5YTM3OGZmMjY4NGY0ZTUzMWNhMTAzMGY4YTZiMmI1NmYiLCJleHAiOjE3NDk0NjU0NDQsImlhdCI6MTc0ODg2MDY0NCwibmJmIjoxNzQ4ODYwNTg0LCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiYjI3ZWI1OTk1NDk0ZTQxNGRhNGU3MTdiNzNlZjY0ODM1YTVjZmI4NTcwMjFjMGNmZGQwNDBkZTUwZGVlYzVmMyJ9.BfeWk_q2gp4f1ELZlWWv303dmtj8KZR-FhIMphg57F75eyBZDvSyxjUnHt5dfIss8kqgamYNbYjt3Aqi9YpECg; Path=/; Domain=127.0.0.1; Expires=Mon, 09 Jun 2025 10:37:24 GMT; SameSite=Lax; Partitioned anubis_test.go:280: &http.Cookie{Name:"techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work", Value:"", Quoted:false, Path:"/", Domain:"127.0.0.1", Expires:time.Date(2025, time.June, 2, 10, 36, 24, 0, time.UTC), RawExpires:"Mon, 02 Jun 2025 10:36:24 GMT", MaxAge:-1, Secure:false, HttpOnly:false, SameSite:2, Partitioned:true, Raw:"techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Domain=127.0.0.1; Expires=Mon, 02 Jun 2025 10:36:24 GMT; Max-Age=0; SameSite=Lax; Partitioned", Unparsed:[]string(nil)} anubis_test.go:280: &http.Cookie{Name:"techaro.lol-anubis-auth-for-127.0.0.1", Value:"eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6ImUxMDdkOTYyOWIwYjAyNmM2NGUxMjc3YTE2OWUyNDA5YTM3OGZmMjY4NGY0ZTUzMWNhMTAzMGY4YTZiMmI1NmYiLCJleHAiOjE3NDk0NjU0NDQsImlhdCI6MTc0ODg2MDY0NCwibmJmIjoxNzQ4ODYwNTg0LCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiYjI3ZWI1OTk1NDk0ZTQxNGRhNGU3MTdiNzNlZjY0ODM1YTVjZmI4NTcwMjFjMGNmZGQwNDBkZTUwZGVlYzVmMyJ9.BfeWk_q2gp4f1ELZlWWv303dmtj8KZR-FhIMphg57F75eyBZDvSyxjUnHt5dfIss8kqgamYNbYjt3Aqi9YpECg", Quoted:false, Path:"/", Domain:"127.0.0.1", Expires:time.Date(2025, time.June, 9, 10, 37, 24, 0, time.UTC), RawExpires:"Mon, 09 Jun 2025 10:37:24 GMT", MaxAge:0, Secure:false, HttpOnly:false, SameSite:2, Partitioned:true, Raw:"techaro.lol-anubis-auth-for-127.0.0.1=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6ImUxMDdkOTYyOWIwYjAyNmM2NGUxMjc3YTE2OWUyNDA5YTM3OGZmMjY4NGY0ZTUzMWNhMTAzMGY4YTZiMmI1NmYiLCJleHAiOjE3NDk0NjU0NDQsImlhdCI6MTc0ODg2MDY0NCwibmJmIjoxNzQ4ODYwNTg0LCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiYjI3ZWI1OTk1NDk0ZTQxNGRhNGU3MTdiNzNlZjY0ODM1YTVjZmI4NTcwMjFjMGNmZGQwNDBkZTUwZGVlYzVmMyJ9.BfeWk_q2gp4f1ELZlWWv303dmtj8KZR-FhIMphg57F75eyBZDvSyxjUnHt5dfIss8kqgamYNbYjt3Aqi9YpECg; Path=/; Domain=127.0.0.1; Expires=Mon, 09 Jun 2025 10:37:24 GMT; SameSite=Lax; Partitioned", Unparsed:[]string(nil)} --- PASS: TestCookieSettings (0.02s) === RUN TestCheckDefaultDifficultyMatchesPolicy === RUN TestCheckDefaultDifficultyMatchesPolicy/1 {"time":"2025-06-02T10:37:24.496982863Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/2 {"time":"2025-06-02T10:37:24.516657057Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/3 {"time":"2025-06-02T10:37:24.533581544Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/4 {"time":"2025-06-02T10:37:24.551113517Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/5 {"time":"2025-06-02T10:37:24.581350975Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/6 {"time":"2025-06-02T10:37:24.602567544Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/7 {"time":"2025-06-02T10:37:24.627964515Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/8 {"time":"2025-06-02T10:37:24.648528917Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/9 {"time":"2025-06-02T10:37:24.666236252Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} --- PASS: TestCheckDefaultDifficultyMatchesPolicy (0.19s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/1 (0.02s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/2 (0.02s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/3 (0.02s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/4 (0.02s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/5 (0.03s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/6 (0.02s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/7 (0.03s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/8 (0.02s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/9 (0.02s) === RUN TestBasePrefix === RUN TestBasePrefix/no_prefix {"time":"2025-06-02T10:37:24.685505882Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T10:37:24.686575612Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"f6302d5fcef2a834f2020e442c87d1330b203ab1c92f85dda3e7bcc4481f5227","rules":{"algorithm":"fast","difficulty":4,"report_as":4},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:41213/.within.website/x/cmd/anubis/api/make-challenge?redir=%2F -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=f6302d5fcef2a834f2020e442c87d1330b203ab1c92f85dda3e7bcc4481f5227; Path=/; Expires=Mon, 02 Jun 2025 10:37:24 GMT; SameSite=Lax anubis_test.go:124: requested cookies for http://127.0.0.1:41213/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=252823&redir=%2F&response=0000a33d269fe9c416e1b69e7fd1dbb14e56ae1c0896664613711dcbdd31ac29 anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=f6302d5fcef2a834f2020e442c87d1330b203ab1c92f85dda3e7bcc4481f5227; Path=/; Expires=Mon, 02 Jun 2025 10:37:24 GMT; SameSite=Lax {"time":"2025-06-02T10:37:25.260840514Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T10:37:25.261301079Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":437},"msg":"challenge passed, redirecting to app","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:41213/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=252823&redir=%2F&response=0000a33d269fe9c416e1b69e7fd1dbb14e56ae1c0896664613711dcbdd31ac29 -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Expires=Mon, 02 Jun 2025 10:36:25 GMT; Max-Age=0; SameSite=Lax anubis_test.go:138: set cookie: http://127.0.0.1:41213/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=252823&redir=%2F&response=0000a33d269fe9c416e1b69e7fd1dbb14e56ae1c0896664613711dcbdd31ac29 -> techaro.lol-anubis-auth=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6ImY2MzAyZDVmY2VmMmE4MzRmMjAyMGU0NDJjODdkMTMzMGIyMDNhYjFjOTJmODVkZGEzZTdiY2M0NDgxZjUyMjciLCJleHAiOjE3NDg4NjA2NDUsImlhdCI6MTc0ODg2MDY0NSwibmJmIjoxNzQ4ODYwNTg1LCJub25jZSI6IjI1MjgyMyIsInBvbGljeVJ1bGUiOiI4MWJiM2RjNzM2ZjQyYzU5ODYzMmYxOGQ5NDU2N2ZhNThmNGY3Mzc4ODU2MGM0ZDY4YzgyZDM0NDFmMjY0NmI4IiwicmVzcG9uc2UiOiIwMDAwYTMzZDI2OWZlOWM0MTZlMWI2OWU3ZmQxZGJiMTRlNTZhZTFjMDg5NjY2NDYxMzcxMWRjYmRkMzFhYzI5In0.9wLZ428bp_zASnDNPDEvSFOkZN2bYyFMyGqfWidmnMZ3l-l8itgnzFMHso9idyo8iU-ky8laocSgNR80RhALCQ; Path=/; Expires=Mon, 02 Jun 2025 10:37:25 GMT; SameSite=Lax === RUN TestBasePrefix/with_prefix {"time":"2025-06-02T10:37:25.27966186Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T10:37:25.28065255Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"648ebf47bdd0ab37c46ddfbf1ac476aea4e9ff1fce5e3d06591c7e97933d03c8","rules":{"algorithm":"fast","difficulty":4,"report_as":4},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:34465/myapp/.within.website/x/cmd/anubis/api/make-challenge?redir=%2Fmyapp -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=648ebf47bdd0ab37c46ddfbf1ac476aea4e9ff1fce5e3d06591c7e97933d03c8; Path=/; Expires=Mon, 02 Jun 2025 10:37:25 GMT; SameSite=Lax anubis_test.go:124: requested cookies for http://127.0.0.1:34465/myapp/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=33453&redir=%2F&response=0000de1fc744d79996d9a60f78959908a46ea6401c995dc9f874cf574f0ded11 anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=648ebf47bdd0ab37c46ddfbf1ac476aea4e9ff1fce5e3d06591c7e97933d03c8; Path=/; Expires=Mon, 02 Jun 2025 10:37:25 GMT; SameSite=Lax {"time":"2025-06-02T10:37:25.36177515Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T10:37:25.362246834Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":437},"msg":"challenge passed, redirecting to app","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:34465/myapp/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=33453&redir=%2F&response=0000de1fc744d79996d9a60f78959908a46ea6401c995dc9f874cf574f0ded11 -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Expires=Mon, 02 Jun 2025 10:36:25 GMT; Max-Age=0; SameSite=Lax anubis_test.go:138: set cookie: http://127.0.0.1:34465/myapp/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=33453&redir=%2F&response=0000de1fc744d79996d9a60f78959908a46ea6401c995dc9f874cf574f0ded11 -> techaro.lol-anubis-auth=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6IjY0OGViZjQ3YmRkMGFiMzdjNDZkZGZiZjFhYzQ3NmFlYTRlOWZmMWZjZTVlM2QwNjU5MWM3ZTk3OTMzZDAzYzgiLCJleHAiOjE3NDg4NjA2NDUsImlhdCI6MTc0ODg2MDY0NSwibmJmIjoxNzQ4ODYwNTg1LCJub25jZSI6IjMzNDUzIiwicG9saWN5UnVsZSI6IjgxYmIzZGM3MzZmNDJjNTk4NjMyZjE4ZDk0NTY3ZmE1OGY0ZjczNzg4NTYwYzRkNjhjODJkMzQ0MWYyNjQ2YjgiLCJyZXNwb25zZSI6IjAwMDBkZTFmYzc0NGQ3OTk5NmQ5YTYwZjc4OTU5OTA4YTQ2ZWE2NDAxYzk5NWRjOWY4NzRjZjU3NGYwZGVkMTEifQ.WWSAzW_nD2OMp1k1S6bJKzeZO-Adx45XRw22q-BjZVShThYqQHOLFo61LVra7EBflJc82MlcegRf6fA-bhKGDQ; Path=/myapp/; Expires=Mon, 02 Jun 2025 10:37:25 GMT; SameSite=Lax === RUN TestBasePrefix/with_prefix_and_trailing_slash {"time":"2025-06-02T10:37:25.380604535Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T10:37:25.385888827Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"d06c095428d0cff3551cf44a51d6c27926228cee05591a68469db2d167c9e828","rules":{"algorithm":"fast","difficulty":4,"report_as":4},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:36935/myapp/.within.website/x/cmd/anubis/api/make-challenge?redir=%2Fmyapp%2F -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=d06c095428d0cff3551cf44a51d6c27926228cee05591a68469db2d167c9e828; Path=/; Expires=Mon, 02 Jun 2025 10:37:25 GMT; SameSite=Lax anubis_test.go:124: requested cookies for http://127.0.0.1:36935/myapp/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=78253&redir=%2F&response=00000c4178ecd7bc0e99bb32b20a04c506dc7a64474720879f78b2e889ad3bac anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=d06c095428d0cff3551cf44a51d6c27926228cee05591a68469db2d167c9e828; Path=/; Expires=Mon, 02 Jun 2025 10:37:25 GMT; SameSite=Lax {"time":"2025-06-02T10:37:25.561740601Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T10:37:25.562180006Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":437},"msg":"challenge passed, redirecting to app","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:36935/myapp/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=78253&redir=%2F&response=00000c4178ecd7bc0e99bb32b20a04c506dc7a64474720879f78b2e889ad3bac -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Expires=Mon, 02 Jun 2025 10:36:25 GMT; Max-Age=0; SameSite=Lax anubis_test.go:138: set cookie: http://127.0.0.1:36935/myapp/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=78253&redir=%2F&response=00000c4178ecd7bc0e99bb32b20a04c506dc7a64474720879f78b2e889ad3bac -> techaro.lol-anubis-auth=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6ImQwNmMwOTU0MjhkMGNmZjM1NTFjZjQ0YTUxZDZjMjc5MjYyMjhjZWUwNTU5MWE2ODQ2OWRiMmQxNjdjOWU4MjgiLCJleHAiOjE3NDg4NjA2NDUsImlhdCI6MTc0ODg2MDY0NSwibmJmIjoxNzQ4ODYwNTg1LCJub25jZSI6Ijc4MjUzIiwicG9saWN5UnVsZSI6IjgxYmIzZGM3MzZmNDJjNTk4NjMyZjE4ZDk0NTY3ZmE1OGY0ZjczNzg4NTYwYzRkNjhjODJkMzQ0MWYyNjQ2YjgiLCJyZXNwb25zZSI6IjAwMDAwYzQxNzhlY2Q3YmMwZTk5YmIzMmIyMGEwNGM1MDZkYzdhNjQ0NzQ3MjA4NzlmNzhiMmU4ODlhZDNiYWMifQ.eC__FElzyqPHgH20QXQSKr6gr7fvd7SzZgjwqemTnoaFLPBC0gP0L1M-IVgccP_VpqbbUiGWPF7nW11q4UN5CA; Path=/myapp/; Expires=Mon, 02 Jun 2025 10:37:25 GMT; SameSite=Lax --- PASS: TestBasePrefix (0.90s) --- PASS: TestBasePrefix/no_prefix (0.59s) --- PASS: TestBasePrefix/with_prefix (0.10s) --- PASS: TestBasePrefix/with_prefix_and_trailing_slash (0.20s) === RUN TestCustomStatusCodes {"time":"2025-06-02T10:37:25.566373287Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCustomStatusCodes/ALLOW {"time":"2025-06-02T10:37:25.567863422Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).checkRules","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":206},"msg":"allowing traffic to origin (explicit)","user_agent":"ALLOW","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} === NAME TestCustomStatusCodes anubis_test.go:507: ALLOW === RUN TestCustomStatusCodes/CHALLENGE {"time":"2025-06-02T10:37:25.568369467Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).checkRules","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":223},"msg":"challenge requested","user_agent":"CHALLENGE","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"bot/challenge","rule":"CHALLENGE"}} {"time":"2025-06-02T10:37:25.568397427Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).maybeReverseProxy","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":139},"msg":"cookie not found","user_agent":"CHALLENGE","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"bot/challenge","rule":"CHALLENGE"},"path":"/"} === RUN TestCustomStatusCodes/DENY {"time":"2025-06-02T10:37:25.571930662Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).checkRules","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":211},"msg":"explicit deny","user_agent":"DENY","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"bot/deny","rule":"DENY"}} {"time":"2025-06-02T10:37:25.571963302Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).checkRules","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":219},"msg":"rule hash","user_agent":"DENY","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"bot/deny","rule":"DENY"},"hash":"6da73dd91361a3d947b37741c05113d61907c7b45cafdb252effa62c2b6c0f7d"} --- PASS: TestCustomStatusCodes (0.01s) --- PASS: TestCustomStatusCodes/ALLOW (0.00s) --- PASS: TestCustomStatusCodes/CHALLENGE (0.00s) --- PASS: TestCustomStatusCodes/DENY (0.00s) === RUN TestCloudflareWorkersRule === RUN TestCloudflareWorkersRule/cel {"time":"2025-06-02T10:37:25.573029073Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCloudflareWorkersRule/cel/with-cf-worker-header === RUN TestCloudflareWorkersRule/cel/no-cf-worker-header === RUN TestCloudflareWorkersRule/header {"time":"2025-06-02T10:37:25.57375568Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCloudflareWorkersRule/header/with-cf-worker-header === RUN TestCloudflareWorkersRule/header/no-cf-worker-header --- PASS: TestCloudflareWorkersRule (0.00s) --- PASS: TestCloudflareWorkersRule/cel (0.00s) --- PASS: TestCloudflareWorkersRule/cel/with-cf-worker-header (0.00s) --- PASS: TestCloudflareWorkersRule/cel/no-cf-worker-header (0.00s) --- PASS: TestCloudflareWorkersRule/header (0.00s) --- PASS: TestCloudflareWorkersRule/header/with-cf-worker-header (0.00s) --- PASS: TestCloudflareWorkersRule/header/no-cf-worker-header (0.00s) === RUN TestRuleChange {"time":"2025-06-02T10:37:25.574456007Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T10:37:25.575159334Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"4937cfa2a15293371ee236b3c4e313b103224aea5c18dd3a3d682eb296debf6f","rules":{"algorithm":"fast","difficulty":0,"report_as":0},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:34953/.within.website/x/cmd/anubis/api/make-challenge?redir=%2F -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=4937cfa2a15293371ee236b3c4e313b103224aea5c18dd3a3d682eb296debf6f; Path=/; Domain=127.0.0.1; Expires=Mon, 02 Jun 2025 10:47:25 GMT; SameSite=Lax anubis_test.go:124: requested cookies for http://127.0.0.1:34953/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=ba436d4f18dee82b25458abaf879304e29c6da173c05cd6674b41b61c4ff7d2c anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=4937cfa2a15293371ee236b3c4e313b103224aea5c18dd3a3d682eb296debf6f; Path=/; Domain=127.0.0.1; Expires=Mon, 02 Jun 2025 10:47:25 GMT; SameSite=Lax {"time":"2025-06-02T10:37:25.575534857Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T10:37:25.575941581Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":437},"msg":"challenge passed, redirecting to app","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:34953/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=ba436d4f18dee82b25458abaf879304e29c6da173c05cd6674b41b61c4ff7d2c -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Domain=127.0.0.1; Expires=Mon, 02 Jun 2025 10:36:25 GMT; Max-Age=0; SameSite=Lax anubis_test.go:138: set cookie: http://127.0.0.1:34953/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=ba436d4f18dee82b25458abaf879304e29c6da173c05cd6674b41b61c4ff7d2c -> techaro.lol-anubis-auth-for-127.0.0.1=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6IjQ5MzdjZmEyYTE1MjkzMzcxZWUyMzZiM2M0ZTMxM2IxMDMyMjRhZWE1YzE4ZGQzYTNkNjgyZWIyOTZkZWJmNmYiLCJleHAiOjE3NDg4NjEyNDUsImlhdCI6MTc0ODg2MDY0NSwibmJmIjoxNzQ4ODYwNTg1LCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiYmE0MzZkNGYxOGRlZTgyYjI1NDU4YWJhZjg3OTMwNGUyOWM2ZGExNzNjMDVjZDY2NzRiNDFiNjFjNGZmN2QyYyJ9.6wfeauHAFyimeddPUXa1JyWPKVebTG1YIvwJIo2jWEN3sMtibOhqRzNN8PU31PeAigWXvLZ0KBQEjgqtH6nOCg; Path=/; Domain=127.0.0.1; Expires=Mon, 02 Jun 2025 10:47:25 GMT; SameSite=Lax --- PASS: TestRuleChange (0.00s) === RUN TestClearCookie {"time":"2025-06-02T10:37:25.576269224Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} --- PASS: TestClearCookie (0.00s) === RUN TestClearCookieWithDomain {"time":"2025-06-02T10:37:25.576696629Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} --- PASS: TestClearCookieWithDomain (0.00s) PASS ok github.com/TecharoHQ/anubis/lib 1.265s === RUN TestRemoteAddrChecker === RUN TestRemoteAddrChecker/match_ipv4 === RUN TestRemoteAddrChecker/match_ipv6 === RUN TestRemoteAddrChecker/not_match_ipv4 === RUN TestRemoteAddrChecker/not_match_ipv6 === RUN TestRemoteAddrChecker/no_ip_set === RUN TestRemoteAddrChecker/invalid_ip --- PASS: TestRemoteAddrChecker (0.00s) --- PASS: TestRemoteAddrChecker/match_ipv4 (0.00s) --- PASS: TestRemoteAddrChecker/match_ipv6 (0.00s) --- PASS: TestRemoteAddrChecker/not_match_ipv4 (0.00s) --- PASS: TestRemoteAddrChecker/not_match_ipv6 (0.00s) --- PASS: TestRemoteAddrChecker/no_ip_set (0.00s) --- PASS: TestRemoteAddrChecker/invalid_ip (0.00s) === RUN TestHeaderMatchesChecker === RUN TestHeaderMatchesChecker/match === RUN TestHeaderMatchesChecker/not_match === RUN TestHeaderMatchesChecker/not_present === RUN TestHeaderMatchesChecker/invalid_regex --- PASS: TestHeaderMatchesChecker (0.00s) --- PASS: TestHeaderMatchesChecker/match (0.00s) --- PASS: TestHeaderMatchesChecker/not_match (0.00s) --- PASS: TestHeaderMatchesChecker/not_present (0.00s) --- PASS: TestHeaderMatchesChecker/invalid_regex (0.00s) === RUN TestHeaderExistsChecker === RUN TestHeaderExistsChecker/match === RUN TestHeaderExistsChecker/not_match --- PASS: TestHeaderExistsChecker (0.00s) --- PASS: TestHeaderExistsChecker/match (0.00s) --- PASS: TestHeaderExistsChecker/not_match (0.00s) === RUN TestDefaultPolicyMustParse --- PASS: TestDefaultPolicyMustParse (0.02s) === RUN TestGoodConfigs === RUN TestGoodConfigs/allow_everyone.json === RUN TestGoodConfigs/allow_everyone.yaml === RUN TestGoodConfigs/block_cf_workers.json === RUN TestGoodConfigs/block_cf_workers.yaml === RUN TestGoodConfigs/challengemozilla.json === RUN TestGoodConfigs/challengemozilla.yaml === RUN TestGoodConfigs/entropy.yaml === RUN TestGoodConfigs/everything_blocked.json === RUN TestGoodConfigs/everything_blocked.yaml === RUN TestGoodConfigs/git_client.json === RUN TestGoodConfigs/git_client.yaml === RUN TestGoodConfigs/import_filesystem.json === RUN TestGoodConfigs/import_filesystem.yaml === RUN TestGoodConfigs/import_keep_internet_working.json === RUN TestGoodConfigs/import_keep_internet_working.yaml === RUN TestGoodConfigs/old_xesite.json === RUN TestGoodConfigs/status-codes-paranoid.json === RUN TestGoodConfigs/status-codes-paranoid.yaml === RUN TestGoodConfigs/status-codes-rfc.json === RUN TestGoodConfigs/status-codes-rfc.yaml --- PASS: TestGoodConfigs (0.01s) --- PASS: TestGoodConfigs/allow_everyone.json (0.00s) --- PASS: TestGoodConfigs/allow_everyone.yaml (0.00s) --- PASS: TestGoodConfigs/block_cf_workers.json (0.00s) --- PASS: TestGoodConfigs/block_cf_workers.yaml (0.00s) --- PASS: TestGoodConfigs/challengemozilla.json (0.00s) --- PASS: TestGoodConfigs/challengemozilla.yaml (0.00s) --- PASS: TestGoodConfigs/entropy.yaml (0.00s) --- PASS: TestGoodConfigs/everything_blocked.json (0.00s) --- PASS: TestGoodConfigs/everything_blocked.yaml (0.00s) --- PASS: TestGoodConfigs/git_client.json (0.00s) --- PASS: TestGoodConfigs/git_client.yaml (0.00s) --- PASS: TestGoodConfigs/import_filesystem.json (0.00s) --- PASS: TestGoodConfigs/import_filesystem.yaml (0.00s) --- PASS: TestGoodConfigs/import_keep_internet_working.json (0.00s) --- PASS: TestGoodConfigs/import_keep_internet_working.yaml (0.00s) --- PASS: TestGoodConfigs/old_xesite.json (0.00s) --- PASS: TestGoodConfigs/status-codes-paranoid.json (0.00s) --- PASS: TestGoodConfigs/status-codes-paranoid.yaml (0.00s) --- PASS: TestGoodConfigs/status-codes-rfc.json (0.00s) --- PASS: TestGoodConfigs/status-codes-rfc.yaml (0.00s) === RUN TestBadConfigs === RUN TestBadConfigs/badregexes.json policy_test.go:64: config is not valid: config: bot entry for "path-bad" is not valid: config.Bot: invalid path regex error parsing regexp: missing closing ): `a(b` config: bot entry for "user-agent-bad" is not valid: config.Bot: invalid user agent regex error parsing regexp: missing closing ): `a(b` config: bot entry for "headers-bad" is not valid: config.Bot: must set either user_agent_regex, path_regex, headers_regex, or remote_addresses === RUN TestBadConfigs/badregexes.yaml policy_test.go:64: config is not valid: config: bot entry for "path-bad" is not valid: config.Bot: invalid path regex error parsing regexp: missing closing ): `a(b` config: bot entry for "user-agent-bad" is not valid: config.Bot: invalid user agent regex error parsing regexp: missing closing ): `a(b` === RUN TestBadConfigs/import_and_bot.json policy_test.go:64: config is not valid: config.BotOrImport: can't set bot rules and import values at the same time === RUN TestBadConfigs/import_and_bot.yaml policy_test.go:64: config is not valid: config.BotOrImport: can't set bot rules and import values at the same time === RUN TestBadConfigs/import_invalid_file.json policy_test.go:64: config is not valid: config.ImportStatement: invalid source file: (data)/does-not-exist-fake-file.yaml: open does-not-exist-fake-file.yaml: file does not exist === RUN TestBadConfigs/import_invalid_file.yaml policy_test.go:64: config is not valid: config.ImportStatement: invalid source file: (data)/does-not-exist-fake-file.yaml: open does-not-exist-fake-file.yaml: file does not exist === RUN TestBadConfigs/invalid.json policy_test.go:64: config is not valid: config.BotOrImport: rule definition is invalid, you must set either bot rules or an import statement, not both === RUN TestBadConfigs/invalid.yaml policy_test.go:64: config is not valid: config: must define at least one (1) bot rule === RUN TestBadConfigs/multiple_expression_types.json policy_test.go:64: config is not valid: config: bot entry for "multiple-expression-types" is not valid: config: expression block can't contain multiple expression types === RUN TestBadConfigs/multiple_expression_types.yaml policy_test.go:64: config is not valid: config: bot entry for "multiple-expression-types" is not valid: config: expression block can't contain multiple expression types === RUN TestBadConfigs/nobots.json policy_test.go:64: config is not valid: config: must define at least one (1) bot rule === RUN TestBadConfigs/nobots.yaml policy_test.go:64: config is not valid: config: must define at least one (1) bot rule === RUN TestBadConfigs/regex_ends_newline.json policy_test.go:64: config is not valid: config: bot entry for "user-agent-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): user agent regex: "Mozilla\n" config: bot entry for "path-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): path regex: "^/evil/.*$\n" config: bot entry for "headers-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): header CF-Worker regex: ".*\n" === RUN TestBadConfigs/regex_ends_newline.yaml policy_test.go:64: config is not valid: config: bot entry for "user-agent-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): user agent regex: "Mozilla\n" config: bot entry for "path-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): path regex: "^/evil/.*$\n" config: bot entry for "headers-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): header CF-Worker regex: ".*\n" === RUN TestBadConfigs/status-codes-0.json policy_test.go:64: config is not valid: status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestBadConfigs/status-codes-0.yaml policy_test.go:64: config is not valid: status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 --- PASS: TestBadConfigs (0.00s) --- PASS: TestBadConfigs/badregexes.json (0.00s) --- PASS: TestBadConfigs/badregexes.yaml (0.00s) --- PASS: TestBadConfigs/import_and_bot.json (0.00s) --- PASS: TestBadConfigs/import_and_bot.yaml (0.00s) --- PASS: TestBadConfigs/import_invalid_file.json (0.00s) --- PASS: TestBadConfigs/import_invalid_file.yaml (0.00s) --- PASS: TestBadConfigs/invalid.json (0.00s) --- PASS: TestBadConfigs/invalid.yaml (0.00s) --- PASS: TestBadConfigs/multiple_expression_types.json (0.00s) --- PASS: TestBadConfigs/multiple_expression_types.yaml (0.00s) --- PASS: TestBadConfigs/nobots.json (0.00s) --- PASS: TestBadConfigs/nobots.yaml (0.00s) --- PASS: TestBadConfigs/regex_ends_newline.json (0.00s) --- PASS: TestBadConfigs/regex_ends_newline.yaml (0.00s) --- PASS: TestBadConfigs/status-codes-0.json (0.00s) --- PASS: TestBadConfigs/status-codes-0.yaml (0.00s) PASS ok github.com/TecharoHQ/anubis/lib/policy 0.059s === RUN TestBotValid === RUN TestBotValid/simple_user_agent === RUN TestBotValid/simple_path === RUN TestBotValid/no_rule_name === RUN TestBotValid/no_rule_matcher === RUN TestBotValid/both_user-agent_and_path === RUN TestBotValid/unknown_action === RUN TestBotValid/invalid_user_agent_regex === RUN TestBotValid/invalid_path_regex === RUN TestBotValid/invalid_headers_regex === RUN TestBotValid/challenge_difficulty_too_low === RUN TestBotValid/challenge_difficulty_too_high === RUN TestBotValid/challenge_wrong_algorithm === RUN TestBotValid/invalid_cidr_range === RUN TestBotValid/only_filter_by_IP_range === RUN TestBotValid/filter_by_user_agent_and_IP_range === RUN TestBotValid/filter_by_path_and_IP_range --- PASS: TestBotValid (0.00s) --- PASS: TestBotValid/simple_user_agent (0.00s) --- PASS: TestBotValid/simple_path (0.00s) --- PASS: TestBotValid/no_rule_name (0.00s) --- PASS: TestBotValid/no_rule_matcher (0.00s) --- PASS: TestBotValid/both_user-agent_and_path (0.00s) --- PASS: TestBotValid/unknown_action (0.00s) --- PASS: TestBotValid/invalid_user_agent_regex (0.00s) --- PASS: TestBotValid/invalid_path_regex (0.00s) --- PASS: TestBotValid/invalid_headers_regex (0.00s) --- PASS: TestBotValid/challenge_difficulty_too_low (0.00s) --- PASS: TestBotValid/challenge_difficulty_too_high (0.00s) --- PASS: TestBotValid/challenge_wrong_algorithm (0.00s) --- PASS: TestBotValid/invalid_cidr_range (0.00s) --- PASS: TestBotValid/only_filter_by_IP_range (0.00s) --- PASS: TestBotValid/filter_by_user_agent_and_IP_range (0.00s) --- PASS: TestBotValid/filter_by_path_and_IP_range (0.00s) === RUN TestConfigValidKnownGood === RUN TestConfigValidKnownGood/allow_everyone.json === RUN TestConfigValidKnownGood/allow_everyone.yaml === RUN TestConfigValidKnownGood/block_cf_workers.json === RUN TestConfigValidKnownGood/block_cf_workers.yaml === RUN TestConfigValidKnownGood/challengemozilla.json === RUN TestConfigValidKnownGood/challengemozilla.yaml === RUN TestConfigValidKnownGood/entropy.yaml === RUN TestConfigValidKnownGood/everything_blocked.json === RUN TestConfigValidKnownGood/everything_blocked.yaml === RUN TestConfigValidKnownGood/git_client.json === RUN TestConfigValidKnownGood/git_client.yaml === RUN TestConfigValidKnownGood/import_filesystem.json === RUN TestConfigValidKnownGood/import_filesystem.yaml === RUN TestConfigValidKnownGood/import_keep_internet_working.json === RUN TestConfigValidKnownGood/import_keep_internet_working.yaml === RUN TestConfigValidKnownGood/old_xesite.json === RUN TestConfigValidKnownGood/status-codes-paranoid.json === RUN TestConfigValidKnownGood/status-codes-paranoid.yaml === RUN TestConfigValidKnownGood/status-codes-rfc.json === RUN TestConfigValidKnownGood/status-codes-rfc.yaml --- PASS: TestConfigValidKnownGood (0.00s) --- PASS: TestConfigValidKnownGood/allow_everyone.json (0.00s) --- PASS: TestConfigValidKnownGood/allow_everyone.yaml (0.00s) --- PASS: TestConfigValidKnownGood/block_cf_workers.json (0.00s) --- PASS: TestConfigValidKnownGood/block_cf_workers.yaml (0.00s) --- PASS: TestConfigValidKnownGood/challengemozilla.json (0.00s) --- PASS: TestConfigValidKnownGood/challengemozilla.yaml (0.00s) --- PASS: TestConfigValidKnownGood/entropy.yaml (0.00s) --- PASS: TestConfigValidKnownGood/everything_blocked.json (0.00s) --- PASS: TestConfigValidKnownGood/everything_blocked.yaml (0.00s) --- PASS: TestConfigValidKnownGood/git_client.json (0.00s) --- PASS: TestConfigValidKnownGood/git_client.yaml (0.00s) --- PASS: TestConfigValidKnownGood/import_filesystem.json (0.00s) --- PASS: TestConfigValidKnownGood/import_filesystem.yaml (0.00s) --- PASS: TestConfigValidKnownGood/import_keep_internet_working.json (0.00s) --- PASS: TestConfigValidKnownGood/import_keep_internet_working.yaml (0.00s) --- PASS: TestConfigValidKnownGood/old_xesite.json (0.00s) --- PASS: TestConfigValidKnownGood/status-codes-paranoid.json (0.00s) --- PASS: TestConfigValidKnownGood/status-codes-paranoid.yaml (0.00s) --- PASS: TestConfigValidKnownGood/status-codes-rfc.json (0.00s) --- PASS: TestConfigValidKnownGood/status-codes-rfc.yaml (0.00s) === RUN TestImportStatement === RUN TestImportStatement/(data)/apps/allow-api-routes.yaml === RUN TestImportStatement/(data)/apps/bookstack-saml.yaml === RUN TestImportStatement/(data)/apps/gitea-rss-feeds.yaml === RUN TestImportStatement/(data)/apps/qualys-ssl-labs.yml === RUN TestImportStatement/(data)/apps/searx-checker.yml === RUN TestImportStatement/(data)/bots/_deny-pathological.yaml === RUN TestImportStatement/(data)/bots/aggressive-brazilian-scrapers.yaml === RUN TestImportStatement/(data)/bots/ai-catchall.yaml === RUN TestImportStatement/(data)/bots/ai-robots-txt.yaml === RUN TestImportStatement/(data)/bots/cloudflare-workers.yaml === RUN TestImportStatement/(data)/bots/headless-browsers.yaml === RUN TestImportStatement/(data)/bots/irc-bots/archlinux-phrik.yaml === RUN TestImportStatement/(data)/bots/irc-bots/gentoo-chat.yaml === RUN TestImportStatement/(data)/bots/us-ai-scraper.yaml === RUN TestImportStatement/(data)/common/allow-api-like.yaml === RUN TestImportStatement/(data)/common/allow-private-addresses.yaml === RUN TestImportStatement/(data)/common/json-api.yaml === RUN TestImportStatement/(data)/common/keep-internet-working.yaml === RUN TestImportStatement/(data)/common/rfc-violations.yaml === RUN TestImportStatement/(data)/crawlers/_allow-good.yaml === RUN TestImportStatement/(data)/crawlers/ai-search.yaml === RUN TestImportStatement/(data)/crawlers/ai-training.yaml === RUN TestImportStatement/(data)/crawlers/applebot.yaml === RUN TestImportStatement/(data)/crawlers/bingbot.yaml === RUN TestImportStatement/(data)/crawlers/duckduckbot.yaml === RUN TestImportStatement/(data)/crawlers/googlebot.yaml === RUN TestImportStatement/(data)/crawlers/internet-archive.yaml === RUN TestImportStatement/(data)/crawlers/kagibot.yaml === RUN TestImportStatement/(data)/crawlers/marginalia.yaml === RUN TestImportStatement/(data)/crawlers/mojeekbot.yaml === RUN TestImportStatement/(data)/crawlers/openai-gptbot.yaml === RUN TestImportStatement/(data)/crawlers/openai-searchbot.yaml === RUN TestImportStatement/(data)/crawlers/qwantbot.yaml === RUN TestImportStatement/(data)/meta/ai-block-aggressive.yaml === RUN TestImportStatement/(data)/meta/ai-block-moderate.yaml === RUN TestImportStatement/(data)/meta/ai-block-permissive.yaml --- PASS: TestImportStatement (0.01s) --- PASS: TestImportStatement/(data)/apps/allow-api-routes.yaml (0.00s) --- PASS: TestImportStatement/(data)/apps/bookstack-saml.yaml (0.00s) --- PASS: TestImportStatement/(data)/apps/gitea-rss-feeds.yaml (0.00s) --- PASS: TestImportStatement/(data)/apps/qualys-ssl-labs.yml (0.00s) --- PASS: TestImportStatement/(data)/apps/searx-checker.yml (0.00s) --- PASS: TestImportStatement/(data)/bots/_deny-pathological.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/aggressive-brazilian-scrapers.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/ai-catchall.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/ai-robots-txt.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/cloudflare-workers.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/headless-browsers.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/irc-bots/archlinux-phrik.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/irc-bots/gentoo-chat.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/us-ai-scraper.yaml (0.00s) --- PASS: TestImportStatement/(data)/common/allow-api-like.yaml (0.00s) --- PASS: TestImportStatement/(data)/common/allow-private-addresses.yaml (0.00s) --- PASS: TestImportStatement/(data)/common/json-api.yaml (0.00s) --- PASS: TestImportStatement/(data)/common/keep-internet-working.yaml (0.00s) --- PASS: TestImportStatement/(data)/common/rfc-violations.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/_allow-good.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/ai-search.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/ai-training.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/applebot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/bingbot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/duckduckbot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/googlebot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/internet-archive.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/kagibot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/marginalia.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/mojeekbot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/openai-gptbot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/openai-searchbot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/qwantbot.yaml (0.00s) --- PASS: TestImportStatement/(data)/meta/ai-block-aggressive.yaml (0.00s) --- PASS: TestImportStatement/(data)/meta/ai-block-moderate.yaml (0.00s) --- PASS: TestImportStatement/(data)/meta/ai-block-permissive.yaml (0.00s) === RUN TestConfigValidBad === RUN TestConfigValidBad/badregexes.json config_test.go:319: config is not valid: config: bot entry for "path-bad" is not valid: config.Bot: invalid path regex error parsing regexp: missing closing ): `a(b` config: bot entry for "user-agent-bad" is not valid: config.Bot: invalid user agent regex error parsing regexp: missing closing ): `a(b` config: bot entry for "headers-bad" is not valid: config.Bot: must set either user_agent_regex, path_regex, headers_regex, or remote_addresses status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/badregexes.yaml config_test.go:319: config is not valid: config: bot entry for "path-bad" is not valid: config.Bot: invalid path regex error parsing regexp: missing closing ): `a(b` config: bot entry for "user-agent-bad" is not valid: config.Bot: invalid user agent regex error parsing regexp: missing closing ): `a(b` status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/import_and_bot.json config_test.go:319: config is not valid: config.BotOrImport: can't set bot rules and import values at the same time status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/import_and_bot.yaml config_test.go:319: config is not valid: config.BotOrImport: can't set bot rules and import values at the same time status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/import_invalid_file.json config_test.go:319: config is not valid: config.ImportStatement: invalid source file: (data)/does-not-exist-fake-file.yaml: open does-not-exist-fake-file.yaml: file does not exist status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/import_invalid_file.yaml config_test.go:319: config is not valid: config.ImportStatement: invalid source file: (data)/does-not-exist-fake-file.yaml: open does-not-exist-fake-file.yaml: file does not exist status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/invalid.json config_test.go:319: config is not valid: config.BotOrImport: rule definition is invalid, you must set either bot rules or an import statement, not both status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/invalid.yaml config_test.go:319: config is not valid: config: must define at least one (1) bot rule status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/multiple_expression_types.json config_test.go:319: config is not valid: config: bot entry for "multiple-expression-types" is not valid: config: expression block can't contain multiple expression types status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/multiple_expression_types.yaml config_test.go:319: config is not valid: config: bot entry for "multiple-expression-types" is not valid: config: expression block can't contain multiple expression types status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/nobots.json config_test.go:319: config is not valid: config: must define at least one (1) bot rule status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/nobots.yaml config_test.go:319: config is not valid: config: must define at least one (1) bot rule status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/regex_ends_newline.json config_test.go:319: config is not valid: config: bot entry for "user-agent-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): user agent regex: "Mozilla\n" config: bot entry for "path-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): path regex: "^/evil/.*$\n" config: bot entry for "headers-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): header CF-Worker regex: ".*\n" status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/regex_ends_newline.yaml config_test.go:319: config is not valid: config: bot entry for "user-agent-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): user agent regex: "Mozilla\n" config: bot entry for "path-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): path regex: "^/evil/.*$\n" config: bot entry for "headers-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): header CF-Worker regex: ".*\n" status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/status-codes-0.json config_test.go:319: config is not valid: status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/status-codes-0.yaml config_test.go:319: config is not valid: status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 --- PASS: TestConfigValidBad (0.00s) --- PASS: TestConfigValidBad/badregexes.json (0.00s) --- PASS: TestConfigValidBad/badregexes.yaml (0.00s) --- PASS: TestConfigValidBad/import_and_bot.json (0.00s) --- PASS: TestConfigValidBad/import_and_bot.yaml (0.00s) --- PASS: TestConfigValidBad/import_invalid_file.json (0.00s) --- PASS: TestConfigValidBad/import_invalid_file.yaml (0.00s) --- PASS: TestConfigValidBad/invalid.json (0.00s) --- PASS: TestConfigValidBad/invalid.yaml (0.00s) --- PASS: TestConfigValidBad/multiple_expression_types.json (0.00s) --- PASS: TestConfigValidBad/multiple_expression_types.yaml (0.00s) --- PASS: TestConfigValidBad/nobots.json (0.00s) --- PASS: TestConfigValidBad/nobots.yaml (0.00s) --- PASS: TestConfigValidBad/regex_ends_newline.json (0.00s) --- PASS: TestConfigValidBad/regex_ends_newline.yaml (0.00s) --- PASS: TestConfigValidBad/status-codes-0.json (0.00s) --- PASS: TestConfigValidBad/status-codes-0.yaml (0.00s) === RUN TestBotConfigZero --- PASS: TestBotConfigZero (0.00s) === RUN TestExpressionOrListUnmarshal === RUN TestExpressionOrListUnmarshal/simple === RUN TestExpressionOrListUnmarshal/object-and === RUN TestExpressionOrListUnmarshal/object-or === RUN TestExpressionOrListUnmarshal/both-or-and === RUN TestExpressionOrListUnmarshal/expression-empty --- PASS: TestExpressionOrListUnmarshal (0.00s) --- PASS: TestExpressionOrListUnmarshal/simple (0.00s) --- PASS: TestExpressionOrListUnmarshal/object-and (0.00s) --- PASS: TestExpressionOrListUnmarshal/object-or (0.00s) --- PASS: TestExpressionOrListUnmarshal/both-or-and (0.00s) --- PASS: TestExpressionOrListUnmarshal/expression-empty (0.00s) PASS ok github.com/TecharoHQ/anubis/lib/policy/config 0.033s === RUN TestHTTPHeaders === RUN TestHTTPHeaders/contains-existing-header === RUN TestHTTPHeaders/not-contains-missing-header === RUN TestHTTPHeaders/get-existing-header === RUN TestHTTPHeaders/not-get-missing-header --- PASS: TestHTTPHeaders (0.00s) --- PASS: TestHTTPHeaders/contains-existing-header (0.00s) --- PASS: TestHTTPHeaders/not-contains-missing-header (0.00s) --- PASS: TestHTTPHeaders/get-existing-header (0.00s) --- PASS: TestHTTPHeaders/not-get-missing-header (0.00s) === RUN TestJoin === RUN TestJoin/no-clauses === RUN TestJoin/one-clause-identity === RUN TestJoin/multi-clause-and === RUN TestJoin/multi-clause-or === RUN TestJoin/git-user-agent --- PASS: TestJoin (0.01s) --- PASS: TestJoin/no-clauses (0.00s) --- PASS: TestJoin/one-clause-identity (0.00s) --- PASS: TestJoin/multi-clause-and (0.00s) --- PASS: TestJoin/multi-clause-or (0.00s) --- PASS: TestJoin/git-user-agent (0.00s) === RUN TestURLValues === RUN TestURLValues/contains-existing-key === RUN TestURLValues/not-contains-missing-key === RUN TestURLValues/get-existing-key === RUN TestURLValues/not-get-missing-key --- PASS: TestURLValues (0.00s) --- PASS: TestURLValues/contains-existing-key (0.00s) --- PASS: TestURLValues/not-contains-missing-key (0.00s) --- PASS: TestURLValues/get-existing-key (0.00s) --- PASS: TestURLValues/not-get-missing-key (0.00s) PASS ok github.com/TecharoHQ/anubis/lib/policy/expressions 0.029s ? github.com/TecharoHQ/anubis/web [no test files] ? github.com/TecharoHQ/anubis/xess [no test files] >>> anubis: Entering fakeroot... >>> anubis-doc*: Running split function doc... 'usr/share/licenses' -> '/home/buildozer/aports/testing/anubis/pkg/anubis-doc/usr/share/licenses' >>> anubis-doc*: Preparing subpackage anubis-doc... >>> anubis-doc*: Running postcheck for anubis-doc >>> anubis-openrc*: Running split function openrc... 'etc/conf.d' -> '/home/buildozer/aports/testing/anubis/pkg/anubis-openrc/etc/conf.d' 'etc/init.d' -> '/home/buildozer/aports/testing/anubis/pkg/anubis-openrc/etc/init.d' >>> anubis-openrc*: Preparing subpackage anubis-openrc... >>> anubis-openrc*: Running postcheck for anubis-openrc >>> anubis*: Running postcheck for anubis >>> anubis*: Preparing package anubis... >>> anubis*: Stripping binaries >>> anubis-doc*: Scanning shared objects >>> anubis-openrc*: Scanning shared objects >>> anubis*: Scanning shared objects >>> anubis-doc*: Tracing dependencies... >>> anubis-doc*: Package size: 1.0 KB >>> anubis-doc*: Compressing data... >>> anubis-doc*: Create checksum... >>> anubis-doc*: Create anubis-doc-1.19.1-r0.apk >>> anubis-openrc*: Tracing dependencies... >>> anubis-openrc*: Package size: 294.0 B >>> anubis-openrc*: Compressing data... >>> anubis-openrc*: Create checksum... >>> anubis-openrc*: Create anubis-openrc-1.19.1-r0.apk >>> anubis*: Tracing dependencies... so:libc.musl-armhf.so.1 >>> anubis*: Package size: 15.1 MB >>> anubis*: Compressing data... >>> anubis*: Create checksum... >>> anubis*: Create anubis-1.19.1-r0.apk >>> anubis: Build complete at Mon, 02 Jun 2025 10:37:26 +0000 elapsed time 0h 0m 22s >>> anubis: Cleaning up srcdir >>> anubis: Cleaning up pkgdir >>> anubis: Uninstalling dependencies... (1/3) Purging .makedepends-anubis (20250602.103705) (2/3) Purging go (1.24.3-r1) (3/3) Purging binutils-gold (2.44-r0) Executing busybox-1.37.0-r18.trigger OK: 323 MiB in 104 packages >>> anubis: Updating the testing/armhf repository index... >>> anubis: Signing the index...