>>> anubis: Building testing/anubis 1.19.1-r0 (using abuild 3.15.0-r0) started Mon, 02 Jun 2025 12:04:29 +0000 >>> anubis: Validating /home/buildozer/aports/testing/anubis/APKBUILD... >>> anubis: Analyzing dependencies... >>> anubis: Installing for build: build-base go (1/2) Installing go (1.24.3-r1) (2/2) Installing .makedepends-anubis (20250602.120433) Executing busybox-1.37.0-r18.trigger OK: 536 MiB in 112 packages >>> anubis: Cleaning up srcdir >>> anubis: Cleaning up pkgdir >>> anubis: Cleaning up tmpdir >>> anubis: Fetching https://distfiles.alpinelinux.org/distfiles/edge/anubis-src-vendor-npm-1.19.1.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 >>> anubis: Fetching https://github.com/TecharoHQ/anubis/releases/download/v1.19.1/anubis-src-vendor-npm-1.19.1.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 2 9.9M 2 239k 0 0 293k 0 0:00:34 --:--:-- 0:00:34 293k 100 9.9M 100 9.9M 0 0 8787k 0 0:00:01 0:00:01 --:--:-- 28.5M >>> anubis: Fetching https://distfiles.alpinelinux.org/distfiles/edge/anubis-src-vendor-npm-1.19.1.tar.gz >>> anubis: Checking sha512sums... anubis-src-vendor-npm-1.19.1.tar.gz: OK anubis.initd: OK anubis.confd: OK >>> anubis: Unpacking /var/cache/distfiles/edge/anubis-src-vendor-npm-1.19.1.tar.gz... ? github.com/TecharoHQ/anubis [no test files] ? github.com/TecharoHQ/anubis/cmd/anubis [no test files] ? github.com/TecharoHQ/anubis/cmd/containerbuild [no test files] ? github.com/TecharoHQ/anubis/data [no test files] === RUN TestImpl --- PASS: TestImpl (0.00s) === RUN TestCleanup --- PASS: TestCleanup (0.00s) PASS ok github.com/TecharoHQ/anubis/decaymap 0.101s === RUN TestErrorLogFilter --- PASS: TestErrorLogFilter (0.00s) === RUN TestXForwardedForUpdateIgnoreUnix --- PASS: TestXForwardedForUpdateIgnoreUnix (0.01s) === RUN TestXForwardedForUpdateAddToChain --- PASS: TestXForwardedForUpdateAddToChain (0.01s) === RUN TestComputeXFFHeader === RUN TestComputeXFFHeader/StripPrivate === RUN TestComputeXFFHeader/StripLoopback === RUN TestComputeXFFHeader/StripCGNAT === RUN TestComputeXFFHeader/StripLinkLocalUnicastIPv4 === RUN TestComputeXFFHeader/StripLinkLocalUnicastIPv6 === RUN TestComputeXFFHeader/Flatten === RUN TestComputeXFFHeader/TrimSpaces === RUN TestComputeXFFHeader/invalid-ip-port === RUN TestComputeXFFHeader/invalid-remote-ip === RUN TestComputeXFFHeader/no-xff-dont-panic --- PASS: TestComputeXFFHeader (0.00s) --- PASS: TestComputeXFFHeader/StripPrivate (0.00s) --- PASS: TestComputeXFFHeader/StripLoopback (0.00s) --- PASS: TestComputeXFFHeader/StripCGNAT (0.00s) --- PASS: TestComputeXFFHeader/StripLinkLocalUnicastIPv4 (0.00s) --- PASS: TestComputeXFFHeader/StripLinkLocalUnicastIPv6 (0.00s) --- PASS: TestComputeXFFHeader/Flatten (0.00s) --- PASS: TestComputeXFFHeader/TrimSpaces (0.00s) --- PASS: TestComputeXFFHeader/invalid-ip-port (0.00s) --- PASS: TestComputeXFFHeader/invalid-remote-ip (0.00s) --- PASS: TestComputeXFFHeader/no-xff-dont-panic (0.00s) PASS ok github.com/TecharoHQ/anubis/internal 0.228s === RUN TestReverse4 === RUN TestReverse4/1.2.3.4->4.3.2.1 --- PASS: TestReverse4 (0.00s) --- PASS: TestReverse4/1.2.3.4->4.3.2.1 (0.00s) === RUN TestReverse6 === RUN TestReverse6/1234:5678:9ABC:DEF0:1234:5678:9ABC:DEF0->0.f.e.d.c.b.a.9.8.7.6.5.4.3.2.1.0.f.e.d.c.b.a.9.8.7.6.5.4.3.2.1 --- PASS: TestReverse6 (0.00s) --- PASS: TestReverse6/1234:5678:9ABC:DEF0:1234:5678:9ABC:DEF0->0.f.e.d.c.b.a.9.8.7.6.5.4.3.2.1.0.f.e.d.c.b.a.9.8.7.6.5.4.3.2.1 (0.00s) === RUN TestLookup dnsbl_test.go:60: response: 0 --- PASS: TestLookup (0.20s) PASS ok github.com/TecharoHQ/anubis/internal/dnsbl 0.311s === RUN TestCheckCache --- PASS: TestCheckCache (0.00s) === RUN TestGetOGTags --- PASS: TestGetOGTags (0.01s) === RUN TestGetOGTagsWithHostConsideration === RUN TestGetOGTagsWithHostConsideration/Host_Not_Considered_-_Same_Host === RUN TestGetOGTagsWithHostConsideration/Host_Not_Considered_-_Different_Host === RUN TestGetOGTagsWithHostConsideration/Host_Considered_-_Same_Host === RUN TestGetOGTagsWithHostConsideration/Host_Considered_-_Different_Host --- PASS: TestGetOGTagsWithHostConsideration (0.01s) --- PASS: TestGetOGTagsWithHostConsideration/Host_Not_Considered_-_Same_Host (0.00s) --- PASS: TestGetOGTagsWithHostConsideration/Host_Not_Considered_-_Different_Host (0.00s) --- PASS: TestGetOGTagsWithHostConsideration/Host_Considered_-_Same_Host (0.00s) --- PASS: TestGetOGTagsWithHostConsideration/Host_Considered_-_Different_Host (0.00s) === RUN TestFetchHTMLDocument === RUN TestFetchHTMLDocument/Valid_HTML === RUN TestFetchHTMLDocument/Empty_HTML === RUN TestFetchHTMLDocument/Not_found_error === RUN TestFetchHTMLDocument/Unsupported_Content-Type === RUN TestFetchHTMLDocument/Too_large_content --- PASS: TestFetchHTMLDocument (0.01s) --- PASS: TestFetchHTMLDocument/Valid_HTML (0.00s) --- PASS: TestFetchHTMLDocument/Empty_HTML (0.00s) --- PASS: TestFetchHTMLDocument/Not_found_error (0.00s) --- PASS: TestFetchHTMLDocument/Unsupported_Content-Type (0.00s) --- PASS: TestFetchHTMLDocument/Too_large_content (0.00s) === RUN TestFetchHTMLDocumentInvalidURL --- PASS: TestFetchHTMLDocumentInvalidURL (0.02s) === RUN TestIntegrationGetOGTags === RUN TestIntegrationGetOGTags/Simple_page === RUN TestIntegrationGetOGTags/Complete_page === RUN TestIntegrationGetOGTags/Page_with_no_OG_tags === RUN TestIntegrationGetOGTags/Nonexistent_page --- PASS: TestIntegrationGetOGTags (0.01s) --- PASS: TestIntegrationGetOGTags/Simple_page (0.00s) --- PASS: TestIntegrationGetOGTags/Complete_page (0.00s) --- PASS: TestIntegrationGetOGTags/Page_with_no_OG_tags (0.00s) --- PASS: TestIntegrationGetOGTags/Nonexistent_page (0.00s) === RUN TestNewOGTagCache === RUN TestNewOGTagCache/Basic_initialization === RUN TestNewOGTagCache/Empty_target --- PASS: TestNewOGTagCache (0.00s) --- PASS: TestNewOGTagCache/Basic_initialization (0.00s) --- PASS: TestNewOGTagCache/Empty_target (0.00s) === RUN TestNewOGTagCache_UnixSocket --- PASS: TestNewOGTagCache_UnixSocket (0.00s) === RUN TestGetTarget === RUN TestGetTarget/No_path_or_query === RUN TestGetTarget/With_complex_path === RUN TestGetTarget/With_query_and_path === RUN TestGetTarget/Unix_socket_target === RUN TestGetTarget/Unix_socket_target_with_/// --- PASS: TestGetTarget (0.00s) --- PASS: TestGetTarget/No_path_or_query (0.00s) --- PASS: TestGetTarget/With_complex_path (0.00s) --- PASS: TestGetTarget/With_query_and_path (0.00s) --- PASS: TestGetTarget/Unix_socket_target (0.00s) --- PASS: TestGetTarget/Unix_socket_target_with_/// (0.00s) === RUN TestIntegrationGetOGTags_UnixSocket --- PASS: TestIntegrationGetOGTags_UnixSocket (0.10s) === RUN TestExtractOGTags === RUN TestExtractOGTags/Basic_OG_tags === RUN TestExtractOGTags/OG_tags_with_name_attribute === RUN TestExtractOGTags/No_approved_OG_tags === RUN TestExtractOGTags/Empty_content === RUN TestExtractOGTags/Explicitly_approved_tag --- PASS: TestExtractOGTags (0.00s) --- PASS: TestExtractOGTags/Basic_OG_tags (0.00s) --- PASS: TestExtractOGTags/OG_tags_with_name_attribute (0.00s) --- PASS: TestExtractOGTags/No_approved_OG_tags (0.00s) --- PASS: TestExtractOGTags/Empty_content (0.00s) --- PASS: TestExtractOGTags/Explicitly_approved_tag (0.00s) === RUN TestIsOGMetaTag === RUN TestIsOGMetaTag/Meta_OG_tag === RUN TestIsOGMetaTag/Regular_meta_tag === RUN TestIsOGMetaTag/Not_a_meta_tag --- PASS: TestIsOGMetaTag (0.00s) --- PASS: TestIsOGMetaTag/Meta_OG_tag (0.00s) --- PASS: TestIsOGMetaTag/Regular_meta_tag (0.00s) --- PASS: TestIsOGMetaTag/Not_a_meta_tag (0.00s) === RUN TestExtractMetaTagInfo === RUN TestExtractMetaTagInfo/OG_title_with_property_(approved_by_prefix) === RUN TestExtractMetaTagInfo/OG_description_with_name_(approved_by_prefix) === RUN TestExtractMetaTagInfo/Regular_meta_tag_(name=description,_approved_by_exact_match) === RUN TestExtractMetaTagInfo/Regular_meta_tag_(name=keywords,_not_approved) === RUN TestExtractMetaTagInfo/Twitter_tag_(not_approved_by_default) === RUN TestExtractMetaTagInfo/No_content_(but_approved_property) === RUN TestExtractMetaTagInfo/No_property/name_attribute === RUN TestExtractMetaTagInfo/Explicitly_approved_tag_with_property_attribute --- PASS: TestExtractMetaTagInfo (0.00s) --- PASS: TestExtractMetaTagInfo/OG_title_with_property_(approved_by_prefix) (0.00s) --- PASS: TestExtractMetaTagInfo/OG_description_with_name_(approved_by_prefix) (0.00s) --- PASS: TestExtractMetaTagInfo/Regular_meta_tag_(name=description,_approved_by_exact_match) (0.00s) --- PASS: TestExtractMetaTagInfo/Regular_meta_tag_(name=keywords,_not_approved) (0.00s) --- PASS: TestExtractMetaTagInfo/Twitter_tag_(not_approved_by_default) (0.00s) --- PASS: TestExtractMetaTagInfo/No_content_(but_approved_property) (0.00s) --- PASS: TestExtractMetaTagInfo/No_property/name_attribute (0.00s) --- PASS: TestExtractMetaTagInfo/Explicitly_approved_tag_with_property_attribute (0.00s) PASS ok github.com/TecharoHQ/anubis/internal/ogtags 0.390s === RUN TestPlaywrightBrowser playwright_test.go:222: npx not found in PATH, skipping integration smoke testing: exec: "npx": executable file not found in $PATH --- SKIP: TestPlaywrightBrowser (0.00s) === RUN TestPlaywrightWithBasePrefix playwright_test.go:302: NOTE(Xe)\ these tests require HTTPS support in #364 --- SKIP: TestPlaywrightWithBasePrefix (0.00s) PASS ok github.com/TecharoHQ/anubis/internal/test 0.459s === RUN TestLoadPolicies === RUN TestLoadPolicies/botPolicies.json === RUN TestLoadPolicies/botPolicies.yaml --- PASS: TestLoadPolicies (0.16s) --- PASS: TestLoadPolicies/botPolicies.json (0.10s) --- PASS: TestLoadPolicies/botPolicies.yaml (0.06s) === RUN TestCVE2025_24369 {"time":"2025-06-02T12:05:40.38090602Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T12:05:40.390657423Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"517fd964fef2809ce8b1d299743ec6cd0e0b82c648cc0a00182483e07cf6c0ac","rules":{"algorithm":"fast","difficulty":4,"report_as":4},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:38777/.within.website/x/cmd/anubis/api/make-challenge?redir=%2F -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=517fd964fef2809ce8b1d299743ec6cd0e0b82c648cc0a00182483e07cf6c0ac; Path=/; Expires=Mon, 02 Jun 2025 12:05:40 GMT; SameSite=Lax anubis_test.go:124: requested cookies for http://127.0.0.1:38777/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=09db4df11470d1665636917b42a03c5f7481dae4d71121e87b2875526d875dc8 anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=517fd964fef2809ce8b1d299743ec6cd0e0b82c648cc0a00182483e07cf6c0ac; Path=/; Expires=Mon, 02 Jun 2025 12:05:40 GMT; SameSite=Lax {"time":"2025-06-02T12:05:40.395326835Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T12:05:40.395550094Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":413},"msg":"difficulty check failed","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"response":"09db4df11470d1665636917b42a03c5f7481dae4d71121e87b2875526d875dc8","difficulty":4} anubis_test.go:138: set cookie: http://127.0.0.1:38777/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=09db4df11470d1665636917b42a03c5f7481dae4d71121e87b2875526d875dc8 -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Expires=Mon, 02 Jun 2025 12:04:40 GMT; Max-Age=0; SameSite=Lax anubis_test.go:138: set cookie: http://127.0.0.1:38777/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=09db4df11470d1665636917b42a03c5f7481dae4d71121e87b2875526d875dc8 -> techaro.lol-anubis-auth=; Path=/; Expires=Mon, 02 Jun 2025 12:04:40 GMT; Max-Age=0; SameSite=Lax --- PASS: TestCVE2025_24369 (0.07s) === RUN TestCookieCustomExpiration {"time":"2025-06-02T12:05:40.450560238Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T12:05:40.456298929Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"243d463371b63941382968c86d989d353b83f065671d695bc50b14b447f2e665","rules":{"algorithm":"fast","difficulty":0,"report_as":0},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:32979/.within.website/x/cmd/anubis/api/make-challenge?redir=%2F -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=243d463371b63941382968c86d989d353b83f065671d695bc50b14b447f2e665; Path=/; Expires=Mon, 02 Jun 2025 12:15:40 GMT; SameSite=Lax anubis_test.go:124: requested cookies for http://127.0.0.1:32979/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=30975a3e8db643a562f5cd80ff04f439d6b06e49d7ac003b4914637c86305bb0 anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=243d463371b63941382968c86d989d353b83f065671d695bc50b14b447f2e665; Path=/; Expires=Mon, 02 Jun 2025 12:15:40 GMT; SameSite=Lax {"time":"2025-06-02T12:05:40.458141905Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T12:05:40.458867784Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":437},"msg":"challenge passed, redirecting to app","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:32979/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=30975a3e8db643a562f5cd80ff04f439d6b06e49d7ac003b4914637c86305bb0 -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Expires=Mon, 02 Jun 2025 12:04:40 GMT; Max-Age=0; SameSite=Lax anubis_test.go:138: set cookie: http://127.0.0.1:32979/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=30975a3e8db643a562f5cd80ff04f439d6b06e49d7ac003b4914637c86305bb0 -> techaro.lol-anubis-auth=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6IjI0M2Q0NjMzNzFiNjM5NDEzODI5NjhjODZkOTg5ZDM1M2I4M2YwNjU2NzFkNjk1YmM1MGIxNGI0NDdmMmU2NjUiLCJleHAiOjE3NDg4NjY1NDAsImlhdCI6MTc0ODg2NTk0MCwibmJmIjoxNzQ4ODY1ODgwLCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiMzA5NzVhM2U4ZGI2NDNhNTYyZjVjZDgwZmYwNGY0MzlkNmIwNmU0OWQ3YWMwMDNiNDkxNDYzN2M4NjMwNWJiMCJ9.Kk_AZ_BNVfZ8S4YKy40de7KpzBegX7nIXmkNRFYBLkLshpNsGUFLButwaxTuo7WrW_X2dwOIFCExY0lS1i-gAg; Path=/; Expires=Mon, 02 Jun 2025 12:15:40 GMT; SameSite=Lax anubis_test.go:228: &http.Cookie{Name:"techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work", Value:"", Quoted:false, Path:"/", Domain:"", Expires:time.Date(2025, time.June, 2, 12, 4, 40, 0, time.UTC), RawExpires:"Mon, 02 Jun 2025 12:04:40 GMT", MaxAge:-1, Secure:false, HttpOnly:false, SameSite:2, Partitioned:false, Raw:"techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Expires=Mon, 02 Jun 2025 12:04:40 GMT; Max-Age=0; SameSite=Lax", Unparsed:[]string(nil)} anubis_test.go:228: &http.Cookie{Name:"techaro.lol-anubis-auth", Value:"eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6IjI0M2Q0NjMzNzFiNjM5NDEzODI5NjhjODZkOTg5ZDM1M2I4M2YwNjU2NzFkNjk1YmM1MGIxNGI0NDdmMmU2NjUiLCJleHAiOjE3NDg4NjY1NDAsImlhdCI6MTc0ODg2NTk0MCwibmJmIjoxNzQ4ODY1ODgwLCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiMzA5NzVhM2U4ZGI2NDNhNTYyZjVjZDgwZmYwNGY0MzlkNmIwNmU0OWQ3YWMwMDNiNDkxNDYzN2M4NjMwNWJiMCJ9.Kk_AZ_BNVfZ8S4YKy40de7KpzBegX7nIXmkNRFYBLkLshpNsGUFLButwaxTuo7WrW_X2dwOIFCExY0lS1i-gAg", Quoted:false, Path:"/", Domain:"", Expires:time.Date(2025, time.June, 2, 12, 15, 40, 0, time.UTC), RawExpires:"Mon, 02 Jun 2025 12:15:40 GMT", MaxAge:0, Secure:false, HttpOnly:false, SameSite:2, Partitioned:false, Raw:"techaro.lol-anubis-auth=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6IjI0M2Q0NjMzNzFiNjM5NDEzODI5NjhjODZkOTg5ZDM1M2I4M2YwNjU2NzFkNjk1YmM1MGIxNGI0NDdmMmU2NjUiLCJleHAiOjE3NDg4NjY1NDAsImlhdCI6MTc0ODg2NTk0MCwibmJmIjoxNzQ4ODY1ODgwLCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiMzA5NzVhM2U4ZGI2NDNhNTYyZjVjZDgwZmYwNGY0MzlkNmIwNmU0OWQ3YWMwMDNiNDkxNDYzN2M4NjMwNWJiMCJ9.Kk_AZ_BNVfZ8S4YKy40de7KpzBegX7nIXmkNRFYBLkLshpNsGUFLButwaxTuo7WrW_X2dwOIFCExY0lS1i-gAg; Path=/; Expires=Mon, 02 Jun 2025 12:15:40 GMT; SameSite=Lax", Unparsed:[]string(nil)} --- PASS: TestCookieCustomExpiration (0.06s) === RUN TestCookieSettings {"time":"2025-06-02T12:05:40.511113493Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T12:05:40.513339189Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"9edadf45014c0acac7493564b34cfb3b5fbc4e3767a401a2343fe255b775932e","rules":{"algorithm":"fast","difficulty":0,"report_as":0},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:45371/.within.website/x/cmd/anubis/api/make-challenge?redir=%2F -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=9edadf45014c0acac7493564b34cfb3b5fbc4e3767a401a2343fe255b775932e; Path=/; Domain=127.0.0.1; Expires=Mon, 09 Jun 2025 12:05:40 GMT; SameSite=Lax; Partitioned anubis_test.go:124: requested cookies for http://127.0.0.1:45371/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=78fd180d4b2174318615f0a7b2c2fb6646e1f06023c31115c6d86b761524167e anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=9edadf45014c0acac7493564b34cfb3b5fbc4e3767a401a2343fe255b775932e; Path=/; Domain=127.0.0.1; Expires=Mon, 09 Jun 2025 12:05:40 GMT; SameSite=Lax; Partitioned {"time":"2025-06-02T12:05:40.517457162Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T12:05:40.517999081Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":437},"msg":"challenge passed, redirecting to app","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:45371/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=78fd180d4b2174318615f0a7b2c2fb6646e1f06023c31115c6d86b761524167e -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Domain=127.0.0.1; Expires=Mon, 02 Jun 2025 12:04:40 GMT; Max-Age=0; SameSite=Lax; Partitioned anubis_test.go:138: set cookie: http://127.0.0.1:45371/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=78fd180d4b2174318615f0a7b2c2fb6646e1f06023c31115c6d86b761524167e -> techaro.lol-anubis-auth-for-127.0.0.1=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6IjllZGFkZjQ1MDE0YzBhY2FjNzQ5MzU2NGIzNGNmYjNiNWZiYzRlMzc2N2E0MDFhMjM0M2ZlMjU1Yjc3NTkzMmUiLCJleHAiOjE3NDk0NzA3NDAsImlhdCI6MTc0ODg2NTk0MCwibmJmIjoxNzQ4ODY1ODgwLCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiNzhmZDE4MGQ0YjIxNzQzMTg2MTVmMGE3YjJjMmZiNjY0NmUxZjA2MDIzYzMxMTE1YzZkODZiNzYxNTI0MTY3ZSJ9.JMh1ZpZ1KS2Hc3-XWODpVt7gZozx65bVSfhqPbFcOwJbG6R7NsRRAu1jluFLU4eEijEaD9c62-VxF9pE-jVlCg; Path=/; Domain=127.0.0.1; Expires=Mon, 09 Jun 2025 12:05:40 GMT; SameSite=Lax; Partitioned anubis_test.go:280: &http.Cookie{Name:"techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work", Value:"", Quoted:false, Path:"/", Domain:"127.0.0.1", Expires:time.Date(2025, time.June, 2, 12, 4, 40, 0, time.UTC), RawExpires:"Mon, 02 Jun 2025 12:04:40 GMT", MaxAge:-1, Secure:false, HttpOnly:false, SameSite:2, Partitioned:true, Raw:"techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Domain=127.0.0.1; Expires=Mon, 02 Jun 2025 12:04:40 GMT; Max-Age=0; SameSite=Lax; Partitioned", Unparsed:[]string(nil)} anubis_test.go:280: &http.Cookie{Name:"techaro.lol-anubis-auth-for-127.0.0.1", Value:"eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6IjllZGFkZjQ1MDE0YzBhY2FjNzQ5MzU2NGIzNGNmYjNiNWZiYzRlMzc2N2E0MDFhMjM0M2ZlMjU1Yjc3NTkzMmUiLCJleHAiOjE3NDk0NzA3NDAsImlhdCI6MTc0ODg2NTk0MCwibmJmIjoxNzQ4ODY1ODgwLCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiNzhmZDE4MGQ0YjIxNzQzMTg2MTVmMGE3YjJjMmZiNjY0NmUxZjA2MDIzYzMxMTE1YzZkODZiNzYxNTI0MTY3ZSJ9.JMh1ZpZ1KS2Hc3-XWODpVt7gZozx65bVSfhqPbFcOwJbG6R7NsRRAu1jluFLU4eEijEaD9c62-VxF9pE-jVlCg", Quoted:false, Path:"/", Domain:"127.0.0.1", Expires:time.Date(2025, time.June, 9, 12, 5, 40, 0, time.UTC), RawExpires:"Mon, 09 Jun 2025 12:05:40 GMT", MaxAge:0, Secure:false, HttpOnly:false, SameSite:2, Partitioned:true, Raw:"techaro.lol-anubis-auth-for-127.0.0.1=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6IjllZGFkZjQ1MDE0YzBhY2FjNzQ5MzU2NGIzNGNmYjNiNWZiYzRlMzc2N2E0MDFhMjM0M2ZlMjU1Yjc3NTkzMmUiLCJleHAiOjE3NDk0NzA3NDAsImlhdCI6MTc0ODg2NTk0MCwibmJmIjoxNzQ4ODY1ODgwLCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiNzhmZDE4MGQ0YjIxNzQzMTg2MTVmMGE3YjJjMmZiNjY0NmUxZjA2MDIzYzMxMTE1YzZkODZiNzYxNTI0MTY3ZSJ9.JMh1ZpZ1KS2Hc3-XWODpVt7gZozx65bVSfhqPbFcOwJbG6R7NsRRAu1jluFLU4eEijEaD9c62-VxF9pE-jVlCg; Path=/; Domain=127.0.0.1; Expires=Mon, 09 Jun 2025 12:05:40 GMT; SameSite=Lax; Partitioned", Unparsed:[]string(nil)} --- PASS: TestCookieSettings (0.06s) === RUN TestCheckDefaultDifficultyMatchesPolicy === RUN TestCheckDefaultDifficultyMatchesPolicy/1 {"time":"2025-06-02T12:05:40.574452663Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/2 {"time":"2025-06-02T12:05:40.62789225Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/3 {"time":"2025-06-02T12:05:40.678823161Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/4 {"time":"2025-06-02T12:05:40.732604887Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/5 {"time":"2025-06-02T12:05:40.786703293Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/6 {"time":"2025-06-02T12:05:40.837545325Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/7 {"time":"2025-06-02T12:05:40.887553358Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/8 {"time":"2025-06-02T12:05:40.939972046Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/9 {"time":"2025-06-02T12:05:40.9898258Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} --- PASS: TestCheckDefaultDifficultyMatchesPolicy (0.47s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/1 (0.06s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/2 (0.05s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/3 (0.05s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/4 (0.05s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/5 (0.05s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/6 (0.05s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/7 (0.05s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/8 (0.05s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/9 (0.05s) === RUN TestBasePrefix === RUN TestBasePrefix/no_prefix {"time":"2025-06-02T12:05:41.040849771Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T12:05:41.043388486Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"bf7fda9a9ed76ffe6ceaadf364487b5393e7a39cda3c40a0645b459bb06f26ec","rules":{"algorithm":"fast","difficulty":4,"report_as":4},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:37933/.within.website/x/cmd/anubis/api/make-challenge?redir=%2F -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=bf7fda9a9ed76ffe6ceaadf364487b5393e7a39cda3c40a0645b459bb06f26ec; Path=/; Expires=Mon, 02 Jun 2025 12:05:41 GMT; SameSite=Lax anubis_test.go:124: requested cookies for http://127.0.0.1:37933/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=34404&redir=%2F&response=00006b636141e8ae9c3b4805ef8f73674da4cafae024d5d0bacd9a8b90d32917 anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=bf7fda9a9ed76ffe6ceaadf364487b5393e7a39cda3c40a0645b459bb06f26ec; Path=/; Expires=Mon, 02 Jun 2025 12:05:41 GMT; SameSite=Lax {"time":"2025-06-02T12:05:41.243020399Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T12:05:41.243499038Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":437},"msg":"challenge passed, redirecting to app","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:37933/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=34404&redir=%2F&response=00006b636141e8ae9c3b4805ef8f73674da4cafae024d5d0bacd9a8b90d32917 -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Expires=Mon, 02 Jun 2025 12:04:41 GMT; Max-Age=0; SameSite=Lax anubis_test.go:138: set cookie: http://127.0.0.1:37933/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=34404&redir=%2F&response=00006b636141e8ae9c3b4805ef8f73674da4cafae024d5d0bacd9a8b90d32917 -> techaro.lol-anubis-auth=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6ImJmN2ZkYTlhOWVkNzZmZmU2Y2VhYWRmMzY0NDg3YjUzOTNlN2EzOWNkYTNjNDBhMDY0NWI0NTliYjA2ZjI2ZWMiLCJleHAiOjE3NDg4NjU5NDEsImlhdCI6MTc0ODg2NTk0MSwibmJmIjoxNzQ4ODY1ODgxLCJub25jZSI6IjM0NDA0IiwicG9saWN5UnVsZSI6IjgxYmIzZGM3MzZmNDJjNTk4NjMyZjE4ZDk0NTY3ZmE1OGY0ZjczNzg4NTYwYzRkNjhjODJkMzQ0MWYyNjQ2YjgiLCJyZXNwb25zZSI6IjAwMDA2YjYzNjE0MWU4YWU5YzNiNDgwNWVmOGY3MzY3NGRhNGNhZmFlMDI0ZDVkMGJhY2Q5YThiOTBkMzI5MTcifQ.RjHIEdFuHKLNgBemuGSOVkT_UcHV-R5mdte_yS0QEvbHDO6_nO-rwFKuxT7BptixY_AlnrMXK-_0EPp3GlfLBw; Path=/; Expires=Mon, 02 Jun 2025 12:05:41 GMT; SameSite=Lax === RUN TestBasePrefix/with_prefix {"time":"2025-06-02T12:05:41.29422985Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T12:05:41.29971692Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"33572cee468a5a2d1c11992e3e19f918199529105b7a26072b4d8ef1713be2bf","rules":{"algorithm":"fast","difficulty":4,"report_as":4},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:35671/myapp/.within.website/x/cmd/anubis/api/make-challenge?redir=%2Fmyapp -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=33572cee468a5a2d1c11992e3e19f918199529105b7a26072b4d8ef1713be2bf; Path=/; Expires=Mon, 02 Jun 2025 12:05:41 GMT; SameSite=Lax anubis_test.go:124: requested cookies for http://127.0.0.1:35671/myapp/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=95404&redir=%2F&response=000064cf73ccfc9446b5572705da5e8381742e495fa1f08eb2726f474b78f68e anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=33572cee468a5a2d1c11992e3e19f918199529105b7a26072b4d8ef1713be2bf; Path=/; Expires=Mon, 02 Jun 2025 12:05:41 GMT; SameSite=Lax {"time":"2025-06-02T12:05:41.840304839Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T12:05:41.840846118Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":437},"msg":"challenge passed, redirecting to app","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:35671/myapp/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=95404&redir=%2F&response=000064cf73ccfc9446b5572705da5e8381742e495fa1f08eb2726f474b78f68e -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Expires=Mon, 02 Jun 2025 12:04:41 GMT; Max-Age=0; SameSite=Lax anubis_test.go:138: set cookie: http://127.0.0.1:35671/myapp/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=95404&redir=%2F&response=000064cf73ccfc9446b5572705da5e8381742e495fa1f08eb2726f474b78f68e -> techaro.lol-anubis-auth=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6IjMzNTcyY2VlNDY4YTVhMmQxYzExOTkyZTNlMTlmOTE4MTk5NTI5MTA1YjdhMjYwNzJiNGQ4ZWYxNzEzYmUyYmYiLCJleHAiOjE3NDg4NjU5NDEsImlhdCI6MTc0ODg2NTk0MSwibmJmIjoxNzQ4ODY1ODgxLCJub25jZSI6Ijk1NDA0IiwicG9saWN5UnVsZSI6IjgxYmIzZGM3MzZmNDJjNTk4NjMyZjE4ZDk0NTY3ZmE1OGY0ZjczNzg4NTYwYzRkNjhjODJkMzQ0MWYyNjQ2YjgiLCJyZXNwb25zZSI6IjAwMDA2NGNmNzNjY2ZjOTQ0NmI1NTcyNzA1ZGE1ZTgzODE3NDJlNDk1ZmExZjA4ZWIyNzI2ZjQ3NGI3OGY2OGUifQ.1I6wmbR3hI6BXU1atDUrv2mIMJ8du7mCAZf1-5ama01bt1Lk9He-D9LoqmLNoHpBhMrDTIjHAUtUWRt_L9-yDQ; Path=/myapp/; Expires=Mon, 02 Jun 2025 12:05:41 GMT; SameSite=Lax === RUN TestBasePrefix/with_prefix_and_trailing_slash {"time":"2025-06-02T12:05:41.890814451Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T12:05:41.894087945Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"fdc11af19d249eee3eb9b46d3e039ff8b30a7ed6cf8e92026488af73471d821f","rules":{"algorithm":"fast","difficulty":4,"report_as":4},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:34033/myapp/.within.website/x/cmd/anubis/api/make-challenge?redir=%2Fmyapp%2F -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=fdc11af19d249eee3eb9b46d3e039ff8b30a7ed6cf8e92026488af73471d821f; Path=/; Expires=Mon, 02 Jun 2025 12:05:41 GMT; SameSite=Lax anubis_test.go:124: requested cookies for http://127.0.0.1:34033/myapp/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=225341&redir=%2F&response=00004a7619475f61100ee4021d42b46f523eff040422538ee6f85fcb665323fd anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=fdc11af19d249eee3eb9b46d3e039ff8b30a7ed6cf8e92026488af73471d821f; Path=/; Expires=Mon, 02 Jun 2025 12:05:41 GMT; SameSite=Lax {"time":"2025-06-02T12:05:43.166939109Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T12:05:43.167489248Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":437},"msg":"challenge passed, redirecting to app","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:34033/myapp/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=225341&redir=%2F&response=00004a7619475f61100ee4021d42b46f523eff040422538ee6f85fcb665323fd -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Expires=Mon, 02 Jun 2025 12:04:43 GMT; Max-Age=0; SameSite=Lax anubis_test.go:138: set cookie: http://127.0.0.1:34033/myapp/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=225341&redir=%2F&response=00004a7619475f61100ee4021d42b46f523eff040422538ee6f85fcb665323fd -> techaro.lol-anubis-auth=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6ImZkYzExYWYxOWQyNDllZWUzZWI5YjQ2ZDNlMDM5ZmY4YjMwYTdlZDZjZjhlOTIwMjY0ODhhZjczNDcxZDgyMWYiLCJleHAiOjE3NDg4NjU5NDMsImlhdCI6MTc0ODg2NTk0MywibmJmIjoxNzQ4ODY1ODgzLCJub25jZSI6IjIyNTM0MSIsInBvbGljeVJ1bGUiOiI4MWJiM2RjNzM2ZjQyYzU5ODYzMmYxOGQ5NDU2N2ZhNThmNGY3Mzc4ODU2MGM0ZDY4YzgyZDM0NDFmMjY0NmI4IiwicmVzcG9uc2UiOiIwMDAwNGE3NjE5NDc1ZjYxMTAwZWU0MDIxZDQyYjQ2ZjUyM2VmZjA0MDQyMjUzOGVlNmY4NWZjYjY2NTMyM2ZkIn0.tslSb6T28IJXDSGScxCfPkwu-FY6z4sU1LbEva9UjR7LIJBq78PWypc1jIJRT5VSmKpUwGPh2YAqELPnUtyuBQ; Path=/myapp/; Expires=Mon, 02 Jun 2025 12:05:43 GMT; SameSite=Lax --- PASS: TestBasePrefix (2.18s) --- PASS: TestBasePrefix/no_prefix (0.25s) --- PASS: TestBasePrefix/with_prefix (0.60s) --- PASS: TestBasePrefix/with_prefix_and_trailing_slash (1.33s) === RUN TestCustomStatusCodes {"time":"2025-06-02T12:05:43.169484145Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCustomStatusCodes/DENY {"time":"2025-06-02T12:05:43.171453701Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).checkRules","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":211},"msg":"explicit deny","user_agent":"DENY","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"bot/deny","rule":"DENY"}} {"time":"2025-06-02T12:05:43.171566941Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).checkRules","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":219},"msg":"rule hash","user_agent":"DENY","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"bot/deny","rule":"DENY"},"hash":"6da73dd91361a3d947b37741c05113d61907c7b45cafdb252effa62c2b6c0f7d"} === RUN TestCustomStatusCodes/ALLOW {"time":"2025-06-02T12:05:43.173085419Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).checkRules","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":206},"msg":"allowing traffic to origin (explicit)","user_agent":"ALLOW","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} === NAME TestCustomStatusCodes anubis_test.go:507: ALLOW === RUN TestCustomStatusCodes/CHALLENGE {"time":"2025-06-02T12:05:43.174551916Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).checkRules","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":223},"msg":"challenge requested","user_agent":"CHALLENGE","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"bot/challenge","rule":"CHALLENGE"}} {"time":"2025-06-02T12:05:43.174631556Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).maybeReverseProxy","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":139},"msg":"cookie not found","user_agent":"CHALLENGE","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"bot/challenge","rule":"CHALLENGE"},"path":"/"} --- PASS: TestCustomStatusCodes (0.01s) --- PASS: TestCustomStatusCodes/DENY (0.00s) --- PASS: TestCustomStatusCodes/ALLOW (0.00s) --- PASS: TestCustomStatusCodes/CHALLENGE (0.01s) === RUN TestCloudflareWorkersRule === RUN TestCloudflareWorkersRule/cel {"time":"2025-06-02T12:05:43.181939183Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCloudflareWorkersRule/cel/with-cf-worker-header === RUN TestCloudflareWorkersRule/cel/no-cf-worker-header === RUN TestCloudflareWorkersRule/header {"time":"2025-06-02T12:05:43.18363302Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCloudflareWorkersRule/header/with-cf-worker-header === RUN TestCloudflareWorkersRule/header/no-cf-worker-header --- PASS: TestCloudflareWorkersRule (0.00s) --- PASS: TestCloudflareWorkersRule/cel (0.00s) --- PASS: TestCloudflareWorkersRule/cel/with-cf-worker-header (0.00s) --- PASS: TestCloudflareWorkersRule/cel/no-cf-worker-header (0.00s) --- PASS: TestCloudflareWorkersRule/header (0.00s) --- PASS: TestCloudflareWorkersRule/header/with-cf-worker-header (0.00s) --- PASS: TestCloudflareWorkersRule/header/no-cf-worker-header (0.00s) === RUN TestRuleChange {"time":"2025-06-02T12:05:43.185246377Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T12:05:43.187229494Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"11a863b683aef5ddb1ff2dc7e02b258c48fccb2f7ab8afc9d5f1a3e1c36691f5","rules":{"algorithm":"fast","difficulty":0,"report_as":0},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:42687/.within.website/x/cmd/anubis/api/make-challenge?redir=%2F -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=11a863b683aef5ddb1ff2dc7e02b258c48fccb2f7ab8afc9d5f1a3e1c36691f5; Path=/; Domain=127.0.0.1; Expires=Mon, 02 Jun 2025 12:15:43 GMT; SameSite=Lax anubis_test.go:124: requested cookies for http://127.0.0.1:42687/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=38f75daf65eb2d48ec2e9fcf610cab11af5ea72be117dc62f4d605b001988411 anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=11a863b683aef5ddb1ff2dc7e02b258c48fccb2f7ab8afc9d5f1a3e1c36691f5; Path=/; Domain=127.0.0.1; Expires=Mon, 02 Jun 2025 12:15:43 GMT; SameSite=Lax {"time":"2025-06-02T12:05:43.188632251Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T12:05:43.189085031Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":437},"msg":"challenge passed, redirecting to app","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:42687/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=38f75daf65eb2d48ec2e9fcf610cab11af5ea72be117dc62f4d605b001988411 -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Domain=127.0.0.1; Expires=Mon, 02 Jun 2025 12:04:43 GMT; Max-Age=0; SameSite=Lax anubis_test.go:138: set cookie: http://127.0.0.1:42687/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=38f75daf65eb2d48ec2e9fcf610cab11af5ea72be117dc62f4d605b001988411 -> techaro.lol-anubis-auth-for-127.0.0.1=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6IjExYTg2M2I2ODNhZWY1ZGRiMWZmMmRjN2UwMmIyNThjNDhmY2NiMmY3YWI4YWZjOWQ1ZjFhM2UxYzM2NjkxZjUiLCJleHAiOjE3NDg4NjY1NDMsImlhdCI6MTc0ODg2NTk0MywibmJmIjoxNzQ4ODY1ODgzLCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiMzhmNzVkYWY2NWViMmQ0OGVjMmU5ZmNmNjEwY2FiMTFhZjVlYTcyYmUxMTdkYzYyZjRkNjA1YjAwMTk4ODQxMSJ9.LmsymdVKouGM8uGPqUb3s-cNVrn63OjiMJbcv-nmHO3vlyISQuVgbJT7CCYkw0L_7jPukAt2lPPyTiT-jq7oBA; Path=/; Domain=127.0.0.1; Expires=Mon, 02 Jun 2025 12:15:43 GMT; SameSite=Lax --- PASS: TestRuleChange (0.01s) === RUN TestClearCookie {"time":"2025-06-02T12:05:43.190277469Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} --- PASS: TestClearCookie (0.00s) === RUN TestClearCookieWithDomain {"time":"2025-06-02T12:05:43.191087447Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} --- PASS: TestClearCookieWithDomain (0.00s) PASS ok github.com/TecharoHQ/anubis/lib 3.457s === RUN TestRemoteAddrChecker === RUN TestRemoteAddrChecker/match_ipv4 === RUN TestRemoteAddrChecker/match_ipv6 === RUN TestRemoteAddrChecker/not_match_ipv4 === RUN TestRemoteAddrChecker/not_match_ipv6 === RUN TestRemoteAddrChecker/no_ip_set === RUN TestRemoteAddrChecker/invalid_ip --- PASS: TestRemoteAddrChecker (0.00s) --- PASS: TestRemoteAddrChecker/match_ipv4 (0.00s) --- PASS: TestRemoteAddrChecker/match_ipv6 (0.00s) --- PASS: TestRemoteAddrChecker/not_match_ipv4 (0.00s) --- PASS: TestRemoteAddrChecker/not_match_ipv6 (0.00s) --- PASS: TestRemoteAddrChecker/no_ip_set (0.00s) --- PASS: TestRemoteAddrChecker/invalid_ip (0.00s) === RUN TestHeaderMatchesChecker === RUN TestHeaderMatchesChecker/match === RUN TestHeaderMatchesChecker/not_match === RUN TestHeaderMatchesChecker/not_present === RUN TestHeaderMatchesChecker/invalid_regex --- PASS: TestHeaderMatchesChecker (0.00s) --- PASS: TestHeaderMatchesChecker/match (0.00s) --- PASS: TestHeaderMatchesChecker/not_match (0.00s) --- PASS: TestHeaderMatchesChecker/not_present (0.00s) --- PASS: TestHeaderMatchesChecker/invalid_regex (0.00s) === RUN TestHeaderExistsChecker === RUN TestHeaderExistsChecker/match === RUN TestHeaderExistsChecker/not_match --- PASS: TestHeaderExistsChecker (0.00s) --- PASS: TestHeaderExistsChecker/match (0.00s) --- PASS: TestHeaderExistsChecker/not_match (0.00s) === RUN TestDefaultPolicyMustParse --- PASS: TestDefaultPolicyMustParse (0.11s) === RUN TestGoodConfigs === RUN TestGoodConfigs/allow_everyone.json === RUN TestGoodConfigs/allow_everyone.yaml === RUN TestGoodConfigs/block_cf_workers.json === RUN TestGoodConfigs/block_cf_workers.yaml === RUN TestGoodConfigs/challengemozilla.json === RUN TestGoodConfigs/challengemozilla.yaml === RUN TestGoodConfigs/entropy.yaml === RUN TestGoodConfigs/everything_blocked.json === RUN TestGoodConfigs/everything_blocked.yaml === RUN TestGoodConfigs/git_client.json === RUN TestGoodConfigs/git_client.yaml === RUN TestGoodConfigs/import_filesystem.json === RUN TestGoodConfigs/import_filesystem.yaml === RUN TestGoodConfigs/import_keep_internet_working.json === RUN TestGoodConfigs/import_keep_internet_working.yaml === RUN TestGoodConfigs/old_xesite.json === RUN TestGoodConfigs/status-codes-paranoid.json === RUN TestGoodConfigs/status-codes-paranoid.yaml === RUN TestGoodConfigs/status-codes-rfc.json === RUN TestGoodConfigs/status-codes-rfc.yaml --- PASS: TestGoodConfigs (0.04s) --- PASS: TestGoodConfigs/allow_everyone.json (0.00s) --- PASS: TestGoodConfigs/allow_everyone.yaml (0.00s) --- PASS: TestGoodConfigs/block_cf_workers.json (0.00s) --- PASS: TestGoodConfigs/block_cf_workers.yaml (0.00s) --- PASS: TestGoodConfigs/challengemozilla.json (0.00s) --- PASS: TestGoodConfigs/challengemozilla.yaml (0.00s) --- PASS: TestGoodConfigs/entropy.yaml (0.01s) --- PASS: TestGoodConfigs/everything_blocked.json (0.00s) --- PASS: TestGoodConfigs/everything_blocked.yaml (0.00s) --- PASS: TestGoodConfigs/git_client.json (0.00s) --- PASS: TestGoodConfigs/git_client.yaml (0.00s) --- PASS: TestGoodConfigs/import_filesystem.json (0.00s) --- PASS: TestGoodConfigs/import_filesystem.yaml (0.00s) --- PASS: TestGoodConfigs/import_keep_internet_working.json (0.00s) --- PASS: TestGoodConfigs/import_keep_internet_working.yaml (0.00s) --- PASS: TestGoodConfigs/old_xesite.json (0.00s) --- PASS: TestGoodConfigs/status-codes-paranoid.json (0.00s) --- PASS: TestGoodConfigs/status-codes-paranoid.yaml (0.00s) --- PASS: TestGoodConfigs/status-codes-rfc.json (0.00s) --- PASS: TestGoodConfigs/status-codes-rfc.yaml (0.00s) === RUN TestBadConfigs === RUN TestBadConfigs/badregexes.json policy_test.go:64: config is not valid: config: bot entry for "path-bad" is not valid: config.Bot: invalid path regex error parsing regexp: missing closing ): `a(b` config: bot entry for "user-agent-bad" is not valid: config.Bot: invalid user agent regex error parsing regexp: missing closing ): `a(b` config: bot entry for "headers-bad" is not valid: config.Bot: must set either user_agent_regex, path_regex, headers_regex, or remote_addresses === RUN TestBadConfigs/badregexes.yaml policy_test.go:64: config is not valid: config: bot entry for "path-bad" is not valid: config.Bot: invalid path regex error parsing regexp: missing closing ): `a(b` config: bot entry for "user-agent-bad" is not valid: config.Bot: invalid user agent regex error parsing regexp: missing closing ): `a(b` === RUN TestBadConfigs/import_and_bot.json policy_test.go:64: config is not valid: config.BotOrImport: can't set bot rules and import values at the same time === RUN TestBadConfigs/import_and_bot.yaml policy_test.go:64: config is not valid: config.BotOrImport: can't set bot rules and import values at the same time === RUN TestBadConfigs/import_invalid_file.json policy_test.go:64: config is not valid: config.ImportStatement: invalid source file: (data)/does-not-exist-fake-file.yaml: open does-not-exist-fake-file.yaml: file does not exist === RUN TestBadConfigs/import_invalid_file.yaml policy_test.go:64: config is not valid: config.ImportStatement: invalid source file: (data)/does-not-exist-fake-file.yaml: open does-not-exist-fake-file.yaml: file does not exist === RUN TestBadConfigs/invalid.json policy_test.go:64: config is not valid: config.BotOrImport: rule definition is invalid, you must set either bot rules or an import statement, not both === RUN TestBadConfigs/invalid.yaml policy_test.go:64: config is not valid: config: must define at least one (1) bot rule === RUN TestBadConfigs/multiple_expression_types.json policy_test.go:64: config is not valid: config: bot entry for "multiple-expression-types" is not valid: config: expression block can't contain multiple expression types === RUN TestBadConfigs/multiple_expression_types.yaml policy_test.go:64: config is not valid: config: bot entry for "multiple-expression-types" is not valid: config: expression block can't contain multiple expression types === RUN TestBadConfigs/nobots.json policy_test.go:64: config is not valid: config: must define at least one (1) bot rule === RUN TestBadConfigs/nobots.yaml policy_test.go:64: config is not valid: config: must define at least one (1) bot rule === RUN TestBadConfigs/regex_ends_newline.json policy_test.go:64: config is not valid: config: bot entry for "user-agent-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): user agent regex: "Mozilla\n" config: bot entry for "path-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): path regex: "^/evil/.*$\n" config: bot entry for "headers-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): header CF-Worker regex: ".*\n" === RUN TestBadConfigs/regex_ends_newline.yaml policy_test.go:64: config is not valid: config: bot entry for "user-agent-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): user agent regex: "Mozilla\n" config: bot entry for "path-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): path regex: "^/evil/.*$\n" config: bot entry for "headers-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): header CF-Worker regex: ".*\n" === RUN TestBadConfigs/status-codes-0.json policy_test.go:64: config is not valid: status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestBadConfigs/status-codes-0.yaml policy_test.go:64: config is not valid: status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 --- PASS: TestBadConfigs (0.01s) --- PASS: TestBadConfigs/badregexes.json (0.00s) --- PASS: TestBadConfigs/badregexes.yaml (0.00s) --- PASS: TestBadConfigs/import_and_bot.json (0.00s) --- PASS: TestBadConfigs/import_and_bot.yaml (0.00s) --- PASS: TestBadConfigs/import_invalid_file.json (0.00s) --- PASS: TestBadConfigs/import_invalid_file.yaml (0.00s) --- PASS: TestBadConfigs/invalid.json (0.00s) --- PASS: TestBadConfigs/invalid.yaml (0.00s) --- PASS: TestBadConfigs/multiple_expression_types.json (0.00s) --- PASS: TestBadConfigs/multiple_expression_types.yaml (0.00s) --- PASS: TestBadConfigs/nobots.json (0.00s) --- PASS: TestBadConfigs/nobots.yaml (0.00s) --- PASS: TestBadConfigs/regex_ends_newline.json (0.00s) --- PASS: TestBadConfigs/regex_ends_newline.yaml (0.00s) --- PASS: TestBadConfigs/status-codes-0.json (0.00s) --- PASS: TestBadConfigs/status-codes-0.yaml (0.00s) PASS ok github.com/TecharoHQ/anubis/lib/policy 0.510s === RUN TestBotValid === RUN TestBotValid/simple_user_agent === RUN TestBotValid/simple_path === RUN TestBotValid/no_rule_name === RUN TestBotValid/no_rule_matcher === RUN TestBotValid/both_user-agent_and_path === RUN TestBotValid/unknown_action === RUN TestBotValid/invalid_user_agent_regex === RUN TestBotValid/invalid_path_regex === RUN TestBotValid/invalid_headers_regex === RUN TestBotValid/challenge_difficulty_too_low === RUN TestBotValid/challenge_difficulty_too_high === RUN TestBotValid/challenge_wrong_algorithm === RUN TestBotValid/invalid_cidr_range === RUN TestBotValid/only_filter_by_IP_range === RUN TestBotValid/filter_by_user_agent_and_IP_range === RUN TestBotValid/filter_by_path_and_IP_range --- PASS: TestBotValid (0.01s) --- PASS: TestBotValid/simple_user_agent (0.00s) --- PASS: TestBotValid/simple_path (0.00s) --- PASS: TestBotValid/no_rule_name (0.00s) --- PASS: TestBotValid/no_rule_matcher (0.00s) --- PASS: TestBotValid/both_user-agent_and_path (0.00s) --- PASS: TestBotValid/unknown_action (0.00s) --- PASS: TestBotValid/invalid_user_agent_regex (0.00s) --- PASS: TestBotValid/invalid_path_regex (0.00s) --- PASS: TestBotValid/invalid_headers_regex (0.00s) --- PASS: TestBotValid/challenge_difficulty_too_low (0.00s) --- PASS: TestBotValid/challenge_difficulty_too_high (0.00s) --- PASS: TestBotValid/challenge_wrong_algorithm (0.00s) --- PASS: TestBotValid/invalid_cidr_range (0.00s) --- PASS: TestBotValid/only_filter_by_IP_range (0.00s) --- PASS: TestBotValid/filter_by_user_agent_and_IP_range (0.00s) --- PASS: TestBotValid/filter_by_path_and_IP_range (0.00s) === RUN TestConfigValidKnownGood === RUN TestConfigValidKnownGood/allow_everyone.json === RUN TestConfigValidKnownGood/allow_everyone.yaml === RUN TestConfigValidKnownGood/block_cf_workers.json === RUN TestConfigValidKnownGood/block_cf_workers.yaml === RUN TestConfigValidKnownGood/challengemozilla.json === RUN TestConfigValidKnownGood/challengemozilla.yaml === RUN TestConfigValidKnownGood/entropy.yaml === RUN TestConfigValidKnownGood/everything_blocked.json === RUN TestConfigValidKnownGood/everything_blocked.yaml === RUN TestConfigValidKnownGood/git_client.json === RUN TestConfigValidKnownGood/git_client.yaml === RUN TestConfigValidKnownGood/import_filesystem.json === RUN TestConfigValidKnownGood/import_filesystem.yaml === RUN TestConfigValidKnownGood/import_keep_internet_working.json === RUN TestConfigValidKnownGood/import_keep_internet_working.yaml === RUN TestConfigValidKnownGood/old_xesite.json === RUN TestConfigValidKnownGood/status-codes-paranoid.json === RUN TestConfigValidKnownGood/status-codes-paranoid.yaml === RUN TestConfigValidKnownGood/status-codes-rfc.json === RUN TestConfigValidKnownGood/status-codes-rfc.yaml --- PASS: TestConfigValidKnownGood (0.03s) --- PASS: TestConfigValidKnownGood/allow_everyone.json (0.00s) --- PASS: TestConfigValidKnownGood/allow_everyone.yaml (0.00s) --- PASS: TestConfigValidKnownGood/block_cf_workers.json (0.00s) --- PASS: TestConfigValidKnownGood/block_cf_workers.yaml (0.00s) --- PASS: TestConfigValidKnownGood/challengemozilla.json (0.00s) --- PASS: TestConfigValidKnownGood/challengemozilla.yaml (0.00s) --- PASS: TestConfigValidKnownGood/entropy.yaml (0.00s) --- PASS: TestConfigValidKnownGood/everything_blocked.json (0.00s) --- PASS: TestConfigValidKnownGood/everything_blocked.yaml (0.00s) --- PASS: TestConfigValidKnownGood/git_client.json (0.00s) --- PASS: TestConfigValidKnownGood/git_client.yaml (0.00s) --- PASS: TestConfigValidKnownGood/import_filesystem.json (0.00s) --- PASS: TestConfigValidKnownGood/import_filesystem.yaml (0.00s) --- PASS: TestConfigValidKnownGood/import_keep_internet_working.json (0.00s) --- PASS: TestConfigValidKnownGood/import_keep_internet_working.yaml (0.00s) --- PASS: TestConfigValidKnownGood/old_xesite.json (0.01s) --- PASS: TestConfigValidKnownGood/status-codes-paranoid.json (0.00s) --- PASS: TestConfigValidKnownGood/status-codes-paranoid.yaml (0.00s) --- PASS: TestConfigValidKnownGood/status-codes-rfc.json (0.00s) --- PASS: TestConfigValidKnownGood/status-codes-rfc.yaml (0.00s) === RUN TestImportStatement === RUN TestImportStatement/(data)/apps/allow-api-routes.yaml === RUN TestImportStatement/(data)/apps/bookstack-saml.yaml === RUN TestImportStatement/(data)/apps/gitea-rss-feeds.yaml === RUN TestImportStatement/(data)/apps/qualys-ssl-labs.yml === RUN TestImportStatement/(data)/apps/searx-checker.yml === RUN TestImportStatement/(data)/bots/_deny-pathological.yaml === RUN TestImportStatement/(data)/bots/aggressive-brazilian-scrapers.yaml === RUN TestImportStatement/(data)/bots/ai-catchall.yaml === RUN TestImportStatement/(data)/bots/ai-robots-txt.yaml === RUN TestImportStatement/(data)/bots/cloudflare-workers.yaml === RUN TestImportStatement/(data)/bots/headless-browsers.yaml === RUN TestImportStatement/(data)/bots/irc-bots/archlinux-phrik.yaml === RUN TestImportStatement/(data)/bots/irc-bots/gentoo-chat.yaml === RUN TestImportStatement/(data)/bots/us-ai-scraper.yaml === RUN TestImportStatement/(data)/common/allow-api-like.yaml === RUN TestImportStatement/(data)/common/allow-private-addresses.yaml === RUN TestImportStatement/(data)/common/json-api.yaml === RUN TestImportStatement/(data)/common/keep-internet-working.yaml === RUN TestImportStatement/(data)/common/rfc-violations.yaml === RUN TestImportStatement/(data)/crawlers/_allow-good.yaml === RUN TestImportStatement/(data)/crawlers/ai-search.yaml === RUN TestImportStatement/(data)/crawlers/ai-training.yaml === RUN TestImportStatement/(data)/crawlers/applebot.yaml === RUN TestImportStatement/(data)/crawlers/bingbot.yaml === RUN TestImportStatement/(data)/crawlers/duckduckbot.yaml === RUN TestImportStatement/(data)/crawlers/googlebot.yaml === RUN TestImportStatement/(data)/crawlers/internet-archive.yaml === RUN TestImportStatement/(data)/crawlers/kagibot.yaml === RUN TestImportStatement/(data)/crawlers/marginalia.yaml === RUN TestImportStatement/(data)/crawlers/mojeekbot.yaml === RUN TestImportStatement/(data)/crawlers/openai-gptbot.yaml === RUN TestImportStatement/(data)/crawlers/openai-searchbot.yaml === RUN TestImportStatement/(data)/crawlers/qwantbot.yaml === RUN TestImportStatement/(data)/meta/ai-block-aggressive.yaml === RUN TestImportStatement/(data)/meta/ai-block-moderate.yaml === RUN TestImportStatement/(data)/meta/ai-block-permissive.yaml --- PASS: TestImportStatement (0.06s) --- PASS: TestImportStatement/(data)/apps/allow-api-routes.yaml (0.00s) --- PASS: TestImportStatement/(data)/apps/bookstack-saml.yaml (0.00s) --- PASS: TestImportStatement/(data)/apps/gitea-rss-feeds.yaml (0.01s) --- PASS: TestImportStatement/(data)/apps/qualys-ssl-labs.yml (0.00s) --- PASS: TestImportStatement/(data)/apps/searx-checker.yml (0.00s) --- PASS: TestImportStatement/(data)/bots/_deny-pathological.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/aggressive-brazilian-scrapers.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/ai-catchall.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/ai-robots-txt.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/cloudflare-workers.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/headless-browsers.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/irc-bots/archlinux-phrik.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/irc-bots/gentoo-chat.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/us-ai-scraper.yaml (0.00s) --- PASS: TestImportStatement/(data)/common/allow-api-like.yaml (0.00s) --- PASS: TestImportStatement/(data)/common/allow-private-addresses.yaml (0.00s) --- PASS: TestImportStatement/(data)/common/json-api.yaml (0.00s) --- PASS: TestImportStatement/(data)/common/keep-internet-working.yaml (0.00s) --- PASS: TestImportStatement/(data)/common/rfc-violations.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/_allow-good.yaml (0.01s) --- PASS: TestImportStatement/(data)/crawlers/ai-search.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/ai-training.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/applebot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/bingbot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/duckduckbot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/googlebot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/internet-archive.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/kagibot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/marginalia.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/mojeekbot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/openai-gptbot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/openai-searchbot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/qwantbot.yaml (0.00s) --- PASS: TestImportStatement/(data)/meta/ai-block-aggressive.yaml (0.00s) --- PASS: TestImportStatement/(data)/meta/ai-block-moderate.yaml (0.00s) --- PASS: TestImportStatement/(data)/meta/ai-block-permissive.yaml (0.00s) === RUN TestConfigValidBad === RUN TestConfigValidBad/badregexes.json config_test.go:319: config is not valid: config: bot entry for "path-bad" is not valid: config.Bot: invalid path regex error parsing regexp: missing closing ): `a(b` config: bot entry for "user-agent-bad" is not valid: config.Bot: invalid user agent regex error parsing regexp: missing closing ): `a(b` config: bot entry for "headers-bad" is not valid: config.Bot: must set either user_agent_regex, path_regex, headers_regex, or remote_addresses status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/badregexes.yaml config_test.go:319: config is not valid: config: bot entry for "path-bad" is not valid: config.Bot: invalid path regex error parsing regexp: missing closing ): `a(b` config: bot entry for "user-agent-bad" is not valid: config.Bot: invalid user agent regex error parsing regexp: missing closing ): `a(b` status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/import_and_bot.json config_test.go:319: config is not valid: config.BotOrImport: can't set bot rules and import values at the same time status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/import_and_bot.yaml config_test.go:319: config is not valid: config.BotOrImport: can't set bot rules and import values at the same time status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/import_invalid_file.json config_test.go:319: config is not valid: config.ImportStatement: invalid source file: (data)/does-not-exist-fake-file.yaml: open does-not-exist-fake-file.yaml: file does not exist status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/import_invalid_file.yaml config_test.go:319: config is not valid: config.ImportStatement: invalid source file: (data)/does-not-exist-fake-file.yaml: open does-not-exist-fake-file.yaml: file does not exist status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/invalid.json config_test.go:319: config is not valid: config.BotOrImport: rule definition is invalid, you must set either bot rules or an import statement, not both status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/invalid.yaml config_test.go:319: config is not valid: config: must define at least one (1) bot rule status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/multiple_expression_types.json config_test.go:319: config is not valid: config: bot entry for "multiple-expression-types" is not valid: config: expression block can't contain multiple expression types status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/multiple_expression_types.yaml config_test.go:319: config is not valid: config: bot entry for "multiple-expression-types" is not valid: config: expression block can't contain multiple expression types status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/nobots.json config_test.go:319: config is not valid: config: must define at least one (1) bot rule status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/nobots.yaml config_test.go:319: config is not valid: config: must define at least one (1) bot rule status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/regex_ends_newline.json config_test.go:319: config is not valid: config: bot entry for "user-agent-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): user agent regex: "Mozilla\n" config: bot entry for "path-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): path regex: "^/evil/.*$\n" config: bot entry for "headers-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): header CF-Worker regex: ".*\n" status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/regex_ends_newline.yaml config_test.go:319: config is not valid: config: bot entry for "user-agent-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): user agent regex: "Mozilla\n" config: bot entry for "path-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): path regex: "^/evil/.*$\n" config: bot entry for "headers-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): header CF-Worker regex: ".*\n" status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/status-codes-0.json config_test.go:319: config is not valid: status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/status-codes-0.yaml config_test.go:319: config is not valid: status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 --- PASS: TestConfigValidBad (0.02s) --- PASS: TestConfigValidBad/badregexes.json (0.00s) --- PASS: TestConfigValidBad/badregexes.yaml (0.00s) --- PASS: TestConfigValidBad/import_and_bot.json (0.00s) --- PASS: TestConfigValidBad/import_and_bot.yaml (0.00s) --- PASS: TestConfigValidBad/import_invalid_file.json (0.00s) --- PASS: TestConfigValidBad/import_invalid_file.yaml (0.00s) --- PASS: TestConfigValidBad/invalid.json (0.00s) --- PASS: TestConfigValidBad/invalid.yaml (0.00s) --- PASS: TestConfigValidBad/multiple_expression_types.json (0.00s) --- PASS: TestConfigValidBad/multiple_expression_types.yaml (0.00s) --- PASS: TestConfigValidBad/nobots.json (0.00s) --- PASS: TestConfigValidBad/nobots.yaml (0.00s) --- PASS: TestConfigValidBad/regex_ends_newline.json (0.00s) --- PASS: TestConfigValidBad/regex_ends_newline.yaml (0.00s) --- PASS: TestConfigValidBad/status-codes-0.json (0.00s) --- PASS: TestConfigValidBad/status-codes-0.yaml (0.00s) === RUN TestBotConfigZero --- PASS: TestBotConfigZero (0.00s) === RUN TestExpressionOrListUnmarshal === RUN TestExpressionOrListUnmarshal/simple === RUN TestExpressionOrListUnmarshal/object-and === RUN TestExpressionOrListUnmarshal/object-or === RUN TestExpressionOrListUnmarshal/both-or-and === RUN TestExpressionOrListUnmarshal/expression-empty --- PASS: TestExpressionOrListUnmarshal (0.00s) --- PASS: TestExpressionOrListUnmarshal/simple (0.00s) --- PASS: TestExpressionOrListUnmarshal/object-and (0.00s) --- PASS: TestExpressionOrListUnmarshal/object-or (0.00s) --- PASS: TestExpressionOrListUnmarshal/both-or-and (0.00s) --- PASS: TestExpressionOrListUnmarshal/expression-empty (0.00s) PASS ok github.com/TecharoHQ/anubis/lib/policy/config 0.283s === RUN TestHTTPHeaders === RUN TestHTTPHeaders/contains-existing-header === RUN TestHTTPHeaders/not-contains-missing-header === RUN TestHTTPHeaders/get-existing-header === RUN TestHTTPHeaders/not-get-missing-header --- PASS: TestHTTPHeaders (0.01s) --- PASS: TestHTTPHeaders/contains-existing-header (0.00s) --- PASS: TestHTTPHeaders/not-contains-missing-header (0.00s) --- PASS: TestHTTPHeaders/get-existing-header (0.00s) --- PASS: TestHTTPHeaders/not-get-missing-header (0.00s) === RUN TestJoin === RUN TestJoin/no-clauses === RUN TestJoin/one-clause-identity === RUN TestJoin/multi-clause-and === RUN TestJoin/multi-clause-or === RUN TestJoin/git-user-agent --- PASS: TestJoin (0.05s) --- PASS: TestJoin/no-clauses (0.00s) --- PASS: TestJoin/one-clause-identity (0.02s) --- PASS: TestJoin/multi-clause-and (0.00s) --- PASS: TestJoin/multi-clause-or (0.00s) --- PASS: TestJoin/git-user-agent (0.01s) === RUN TestURLValues === RUN TestURLValues/contains-existing-key === RUN TestURLValues/not-contains-missing-key === RUN TestURLValues/get-existing-key === RUN TestURLValues/not-get-missing-key --- PASS: TestURLValues (0.01s) --- PASS: TestURLValues/contains-existing-key (0.00s) --- PASS: TestURLValues/not-contains-missing-key (0.00s) --- PASS: TestURLValues/get-existing-key (0.00s) --- PASS: TestURLValues/not-get-missing-key (0.00s) PASS ok github.com/TecharoHQ/anubis/lib/policy/expressions 0.377s ? github.com/TecharoHQ/anubis/web [no test files] ? github.com/TecharoHQ/anubis/xess [no test files] >>> anubis: Entering fakeroot... >>> anubis-doc*: Running split function doc... 'usr/share/licenses' -> '/home/buildozer/aports/testing/anubis/pkg/anubis-doc/usr/share/licenses' >>> anubis-doc*: Preparing subpackage anubis-doc... >>> anubis-doc*: Running postcheck for anubis-doc >>> anubis-openrc*: Running split function openrc... 'etc/conf.d' -> '/home/buildozer/aports/testing/anubis/pkg/anubis-openrc/etc/conf.d' 'etc/init.d' -> '/home/buildozer/aports/testing/anubis/pkg/anubis-openrc/etc/init.d' >>> anubis-openrc*: Preparing subpackage anubis-openrc... >>> anubis-openrc*: Running postcheck for anubis-openrc >>> anubis*: Running postcheck for anubis >>> anubis*: Preparing package anubis... >>> anubis*: Stripping binaries >>> anubis-doc*: Scanning shared objects >>> anubis-openrc*: Scanning shared objects >>> anubis*: Scanning shared objects >>> anubis-doc*: Tracing dependencies... >>> anubis-doc*: Package size: 1.0 KB >>> anubis-doc*: Compressing data... >>> anubis-doc*: Create checksum... >>> anubis-doc*: Create anubis-doc-1.19.1-r0.apk >>> anubis-openrc*: Tracing dependencies... >>> anubis-openrc*: Package size: 294.0 B >>> anubis-openrc*: Compressing data... >>> anubis-openrc*: Create checksum... >>> anubis-openrc*: Create anubis-openrc-1.19.1-r0.apk >>> anubis*: Tracing dependencies... so:libc.musl-riscv64.so.1 >>> anubis*: Package size: 15.7 MB >>> anubis*: Compressing data... >>> anubis*: Create checksum... >>> anubis*: Create anubis-1.19.1-r0.apk >>> anubis: Build complete at Mon, 02 Jun 2025 12:05:45 +0000 elapsed time 0h 1m 16s >>> anubis: Cleaning up srcdir >>> anubis: Cleaning up pkgdir >>> anubis: Uninstalling dependencies... (1/2) Purging .makedepends-anubis (20250602.120433) (2/2) Purging go (1.24.3-r1) Executing busybox-1.37.0-r18.trigger OK: 347 MiB in 110 packages >>> anubis: Updating the testing/riscv64 repository index... >>> anubis: Signing the index...