>>> anubis: Building testing/anubis 1.19.1-r0 (using abuild 3.15.0-r0) started Mon, 02 Jun 2025 10:58:36 +0000 >>> anubis: Validating /home/buildozer/aports/testing/anubis/APKBUILD... >>> anubis: Analyzing dependencies... >>> anubis: Installing for build: build-base go (1/2) Installing go (1.24.3-r1) (2/2) Installing .makedepends-anubis (20250602.105838) Executing busybox-1.37.0-r18.trigger OK: 593 MiB in 108 packages >>> anubis: Cleaning up srcdir >>> anubis: Cleaning up pkgdir >>> anubis: Cleaning up tmpdir >>> anubis: Fetching https://distfiles.alpinelinux.org/distfiles/edge/anubis-src-vendor-npm-1.19.1.tar.gz Connecting to distfiles.alpinelinux.org (172.105.82.32:443) wget: server returned error: HTTP/1.1 404 Not Found >>> anubis: Fetching https://github.com/TecharoHQ/anubis/releases/download/v1.19.1/anubis-src-vendor-npm-1.19.1.tar.gz Connecting to github.com (140.82.121.4:443) Connecting to objects.githubusercontent.com (185.199.111.133:443) saving to '/var/cache/distfiles/edge/anubis-src-vendor-npm-1.19.1.tar.gz.part' anubis-src-vendor-np 100% |********************************| 9.9M 0:00:00 ETA '/var/cache/distfiles/edge/anubis-src-vendor-npm-1.19.1.tar.gz.part' saved >>> anubis: Fetching https://distfiles.alpinelinux.org/distfiles/edge/anubis-src-vendor-npm-1.19.1.tar.gz >>> anubis: Checking sha512sums... anubis-src-vendor-npm-1.19.1.tar.gz: OK anubis.initd: OK anubis.confd: OK >>> anubis: Unpacking /var/cache/distfiles/edge/anubis-src-vendor-npm-1.19.1.tar.gz... ? github.com/TecharoHQ/anubis [no test files] ? github.com/TecharoHQ/anubis/cmd/anubis [no test files] ? github.com/TecharoHQ/anubis/cmd/containerbuild [no test files] ? github.com/TecharoHQ/anubis/data [no test files] === RUN TestImpl --- PASS: TestImpl (0.00s) === RUN TestCleanup --- PASS: TestCleanup (0.00s) PASS ok github.com/TecharoHQ/anubis/decaymap 0.003s === RUN TestErrorLogFilter --- PASS: TestErrorLogFilter (0.00s) === RUN TestXForwardedForUpdateIgnoreUnix --- PASS: TestXForwardedForUpdateIgnoreUnix (0.00s) === RUN TestXForwardedForUpdateAddToChain --- PASS: TestXForwardedForUpdateAddToChain (0.00s) === RUN TestComputeXFFHeader === RUN TestComputeXFFHeader/StripPrivate === RUN TestComputeXFFHeader/StripLoopback === RUN TestComputeXFFHeader/StripCGNAT === RUN TestComputeXFFHeader/StripLinkLocalUnicastIPv4 === RUN TestComputeXFFHeader/StripLinkLocalUnicastIPv6 === RUN TestComputeXFFHeader/Flatten === RUN TestComputeXFFHeader/TrimSpaces === RUN TestComputeXFFHeader/invalid-ip-port === RUN TestComputeXFFHeader/invalid-remote-ip === RUN TestComputeXFFHeader/no-xff-dont-panic --- PASS: TestComputeXFFHeader (0.00s) --- PASS: TestComputeXFFHeader/StripPrivate (0.00s) --- PASS: TestComputeXFFHeader/StripLoopback (0.00s) --- PASS: TestComputeXFFHeader/StripCGNAT (0.00s) --- PASS: TestComputeXFFHeader/StripLinkLocalUnicastIPv4 (0.00s) --- PASS: TestComputeXFFHeader/StripLinkLocalUnicastIPv6 (0.00s) --- PASS: TestComputeXFFHeader/Flatten (0.00s) --- PASS: TestComputeXFFHeader/TrimSpaces (0.00s) --- PASS: TestComputeXFFHeader/invalid-ip-port (0.00s) --- PASS: TestComputeXFFHeader/invalid-remote-ip (0.00s) --- PASS: TestComputeXFFHeader/no-xff-dont-panic (0.00s) PASS ok github.com/TecharoHQ/anubis/internal 0.006s === RUN TestReverse4 === RUN TestReverse4/1.2.3.4->4.3.2.1 --- PASS: TestReverse4 (0.00s) --- PASS: TestReverse4/1.2.3.4->4.3.2.1 (0.00s) === RUN TestReverse6 === RUN TestReverse6/1234:5678:9ABC:DEF0:1234:5678:9ABC:DEF0->0.f.e.d.c.b.a.9.8.7.6.5.4.3.2.1.0.f.e.d.c.b.a.9.8.7.6.5.4.3.2.1 --- PASS: TestReverse6 (0.00s) --- PASS: TestReverse6/1234:5678:9ABC:DEF0:1234:5678:9ABC:DEF0->0.f.e.d.c.b.a.9.8.7.6.5.4.3.2.1.0.f.e.d.c.b.a.9.8.7.6.5.4.3.2.1 (0.00s) === RUN TestLookup dnsbl_test.go:60: response: 0 --- PASS: TestLookup (0.10s) PASS ok github.com/TecharoHQ/anubis/internal/dnsbl 0.103s === RUN TestCheckCache --- PASS: TestCheckCache (0.00s) === RUN TestGetOGTags --- PASS: TestGetOGTags (0.00s) === RUN TestGetOGTagsWithHostConsideration === RUN TestGetOGTagsWithHostConsideration/Host_Not_Considered_-_Same_Host === RUN TestGetOGTagsWithHostConsideration/Host_Not_Considered_-_Different_Host === RUN TestGetOGTagsWithHostConsideration/Host_Considered_-_Same_Host === RUN TestGetOGTagsWithHostConsideration/Host_Considered_-_Different_Host --- PASS: TestGetOGTagsWithHostConsideration (0.00s) --- PASS: TestGetOGTagsWithHostConsideration/Host_Not_Considered_-_Same_Host (0.00s) --- PASS: TestGetOGTagsWithHostConsideration/Host_Not_Considered_-_Different_Host (0.00s) --- PASS: TestGetOGTagsWithHostConsideration/Host_Considered_-_Same_Host (0.00s) --- PASS: TestGetOGTagsWithHostConsideration/Host_Considered_-_Different_Host (0.00s) === RUN TestFetchHTMLDocument === RUN TestFetchHTMLDocument/Valid_HTML === RUN TestFetchHTMLDocument/Empty_HTML === RUN TestFetchHTMLDocument/Not_found_error === RUN TestFetchHTMLDocument/Unsupported_Content-Type === RUN TestFetchHTMLDocument/Too_large_content --- PASS: TestFetchHTMLDocument (0.00s) --- PASS: TestFetchHTMLDocument/Valid_HTML (0.00s) --- PASS: TestFetchHTMLDocument/Empty_HTML (0.00s) --- PASS: TestFetchHTMLDocument/Not_found_error (0.00s) --- PASS: TestFetchHTMLDocument/Unsupported_Content-Type (0.00s) --- PASS: TestFetchHTMLDocument/Too_large_content (0.00s) === RUN TestFetchHTMLDocumentInvalidURL --- PASS: TestFetchHTMLDocumentInvalidURL (0.01s) === RUN TestIntegrationGetOGTags === RUN TestIntegrationGetOGTags/Simple_page === RUN TestIntegrationGetOGTags/Complete_page === RUN TestIntegrationGetOGTags/Page_with_no_OG_tags === RUN TestIntegrationGetOGTags/Nonexistent_page --- PASS: TestIntegrationGetOGTags (0.00s) --- PASS: TestIntegrationGetOGTags/Simple_page (0.00s) --- PASS: TestIntegrationGetOGTags/Complete_page (0.00s) --- PASS: TestIntegrationGetOGTags/Page_with_no_OG_tags (0.00s) --- PASS: TestIntegrationGetOGTags/Nonexistent_page (0.00s) === RUN TestNewOGTagCache === RUN TestNewOGTagCache/Basic_initialization === RUN TestNewOGTagCache/Empty_target --- PASS: TestNewOGTagCache (0.00s) --- PASS: TestNewOGTagCache/Basic_initialization (0.00s) --- PASS: TestNewOGTagCache/Empty_target (0.00s) === RUN TestNewOGTagCache_UnixSocket --- PASS: TestNewOGTagCache_UnixSocket (0.00s) === RUN TestGetTarget === RUN TestGetTarget/No_path_or_query === RUN TestGetTarget/With_complex_path === RUN TestGetTarget/With_query_and_path === RUN TestGetTarget/Unix_socket_target === RUN TestGetTarget/Unix_socket_target_with_/// --- PASS: TestGetTarget (0.00s) --- PASS: TestGetTarget/No_path_or_query (0.00s) --- PASS: TestGetTarget/With_complex_path (0.00s) --- PASS: TestGetTarget/With_query_and_path (0.00s) --- PASS: TestGetTarget/Unix_socket_target (0.00s) --- PASS: TestGetTarget/Unix_socket_target_with_/// (0.00s) === RUN TestIntegrationGetOGTags_UnixSocket --- PASS: TestIntegrationGetOGTags_UnixSocket (0.10s) === RUN TestExtractOGTags === RUN TestExtractOGTags/Basic_OG_tags === RUN TestExtractOGTags/OG_tags_with_name_attribute === RUN TestExtractOGTags/No_approved_OG_tags === RUN TestExtractOGTags/Empty_content === RUN TestExtractOGTags/Explicitly_approved_tag --- PASS: TestExtractOGTags (0.00s) --- PASS: TestExtractOGTags/Basic_OG_tags (0.00s) --- PASS: TestExtractOGTags/OG_tags_with_name_attribute (0.00s) --- PASS: TestExtractOGTags/No_approved_OG_tags (0.00s) --- PASS: TestExtractOGTags/Empty_content (0.00s) --- PASS: TestExtractOGTags/Explicitly_approved_tag (0.00s) === RUN TestIsOGMetaTag === RUN TestIsOGMetaTag/Meta_OG_tag === RUN TestIsOGMetaTag/Regular_meta_tag === RUN TestIsOGMetaTag/Not_a_meta_tag --- PASS: TestIsOGMetaTag (0.00s) --- PASS: TestIsOGMetaTag/Meta_OG_tag (0.00s) --- PASS: TestIsOGMetaTag/Regular_meta_tag (0.00s) --- PASS: TestIsOGMetaTag/Not_a_meta_tag (0.00s) === RUN TestExtractMetaTagInfo === RUN TestExtractMetaTagInfo/OG_title_with_property_(approved_by_prefix) === RUN TestExtractMetaTagInfo/OG_description_with_name_(approved_by_prefix) === RUN TestExtractMetaTagInfo/Regular_meta_tag_(name=description,_approved_by_exact_match) === RUN TestExtractMetaTagInfo/Regular_meta_tag_(name=keywords,_not_approved) === RUN TestExtractMetaTagInfo/Twitter_tag_(not_approved_by_default) === RUN TestExtractMetaTagInfo/No_content_(but_approved_property) === RUN TestExtractMetaTagInfo/No_property/name_attribute === RUN TestExtractMetaTagInfo/Explicitly_approved_tag_with_property_attribute --- PASS: TestExtractMetaTagInfo (0.00s) --- PASS: TestExtractMetaTagInfo/OG_title_with_property_(approved_by_prefix) (0.00s) --- PASS: TestExtractMetaTagInfo/OG_description_with_name_(approved_by_prefix) (0.00s) --- PASS: TestExtractMetaTagInfo/Regular_meta_tag_(name=description,_approved_by_exact_match) (0.00s) --- PASS: TestExtractMetaTagInfo/Regular_meta_tag_(name=keywords,_not_approved) (0.00s) --- PASS: TestExtractMetaTagInfo/Twitter_tag_(not_approved_by_default) (0.00s) --- PASS: TestExtractMetaTagInfo/No_content_(but_approved_property) (0.00s) --- PASS: TestExtractMetaTagInfo/No_property/name_attribute (0.00s) --- PASS: TestExtractMetaTagInfo/Explicitly_approved_tag_with_property_attribute (0.00s) PASS ok github.com/TecharoHQ/anubis/internal/ogtags 0.123s === RUN TestPlaywrightBrowser playwright_test.go:222: npx not found in PATH, skipping integration smoke testing: exec: "npx": executable file not found in $PATH --- SKIP: TestPlaywrightBrowser (0.00s) === RUN TestPlaywrightWithBasePrefix playwright_test.go:302: NOTE(Xe)\ these tests require HTTPS support in #364 --- SKIP: TestPlaywrightWithBasePrefix (0.00s) PASS ok github.com/TecharoHQ/anubis/internal/test 0.013s === RUN TestLoadPolicies === RUN TestLoadPolicies/botPolicies.json === RUN TestLoadPolicies/botPolicies.yaml --- PASS: TestLoadPolicies (0.03s) --- PASS: TestLoadPolicies/botPolicies.json (0.02s) --- PASS: TestLoadPolicies/botPolicies.yaml (0.02s) === RUN TestCVE2025_24369 {"time":"2025-06-02T10:58:52.624720057Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T10:58:52.628577242Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"d20902ae5f87101aabb0a76f17e786d9c88968e14100bd68aab0a42b1b65b183","rules":{"algorithm":"fast","difficulty":4,"report_as":4},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:34083/.within.website/x/cmd/anubis/api/make-challenge?redir=%2F -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=d20902ae5f87101aabb0a76f17e786d9c88968e14100bd68aab0a42b1b65b183; Path=/; Expires=Mon, 02 Jun 2025 10:58:52 GMT; SameSite=Lax anubis_test.go:124: requested cookies for http://127.0.0.1:34083/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=84261945897b158e81a12862b4bb490d0fb64cfbfc73fd2752ea27a681d73778 anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=d20902ae5f87101aabb0a76f17e786d9c88968e14100bd68aab0a42b1b65b183; Path=/; Expires=Mon, 02 Jun 2025 10:58:52 GMT; SameSite=Lax {"time":"2025-06-02T10:58:52.629209402Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T10:58:52.629263616Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":413},"msg":"difficulty check failed","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"response":"84261945897b158e81a12862b4bb490d0fb64cfbfc73fd2752ea27a681d73778","difficulty":4} anubis_test.go:138: set cookie: http://127.0.0.1:34083/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=84261945897b158e81a12862b4bb490d0fb64cfbfc73fd2752ea27a681d73778 -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Expires=Mon, 02 Jun 2025 10:57:52 GMT; Max-Age=0; SameSite=Lax anubis_test.go:138: set cookie: http://127.0.0.1:34083/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=84261945897b158e81a12862b4bb490d0fb64cfbfc73fd2752ea27a681d73778 -> techaro.lol-anubis-auth=; Path=/; Expires=Mon, 02 Jun 2025 10:57:52 GMT; Max-Age=0; SameSite=Lax --- PASS: TestCVE2025_24369 (0.02s) === RUN TestCookieCustomExpiration {"time":"2025-06-02T10:58:52.643029052Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T10:58:52.645999912Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"26dca858d79a78148014d133953f0ee778749b213d61784fb546db75c1a480f2","rules":{"algorithm":"fast","difficulty":0,"report_as":0},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:37003/.within.website/x/cmd/anubis/api/make-challenge?redir=%2F -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=26dca858d79a78148014d133953f0ee778749b213d61784fb546db75c1a480f2; Path=/; Expires=Mon, 02 Jun 2025 11:08:52 GMT; SameSite=Lax anubis_test.go:124: requested cookies for http://127.0.0.1:37003/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=b03b02985d5ee5007a811cb0ff3ae0f3cb99565d11484616ff100e6380aad5ea anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=26dca858d79a78148014d133953f0ee778749b213d61784fb546db75c1a480f2; Path=/; Expires=Mon, 02 Jun 2025 11:08:52 GMT; SameSite=Lax {"time":"2025-06-02T10:58:52.646558794Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T10:58:52.646688773Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":437},"msg":"challenge passed, redirecting to app","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:37003/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=b03b02985d5ee5007a811cb0ff3ae0f3cb99565d11484616ff100e6380aad5ea -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Expires=Mon, 02 Jun 2025 10:57:52 GMT; Max-Age=0; SameSite=Lax anubis_test.go:138: set cookie: http://127.0.0.1:37003/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=b03b02985d5ee5007a811cb0ff3ae0f3cb99565d11484616ff100e6380aad5ea -> techaro.lol-anubis-auth=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6IjI2ZGNhODU4ZDc5YTc4MTQ4MDE0ZDEzMzk1M2YwZWU3Nzg3NDliMjEzZDYxNzg0ZmI1NDZkYjc1YzFhNDgwZjIiLCJleHAiOjE3NDg4NjI1MzIsImlhdCI6MTc0ODg2MTkzMiwibmJmIjoxNzQ4ODYxODcyLCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiYjAzYjAyOTg1ZDVlZTUwMDdhODExY2IwZmYzYWUwZjNjYjk5NTY1ZDExNDg0NjE2ZmYxMDBlNjM4MGFhZDVlYSJ9.C7odl8ygxT5qGfYkK79fm1KteX8g0zEHReGa1ZCFR7sPG5r41lL3SIu3G4RHYSVh7UOzFAE4r-Prkts3qLfsBQ; Path=/; Expires=Mon, 02 Jun 2025 11:08:52 GMT; SameSite=Lax anubis_test.go:228: &http.Cookie{Name:"techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work", Value:"", Quoted:false, Path:"/", Domain:"", Expires:time.Date(2025, time.June, 2, 10, 57, 52, 0, time.UTC), RawExpires:"Mon, 02 Jun 2025 10:57:52 GMT", MaxAge:-1, Secure:false, HttpOnly:false, SameSite:2, Partitioned:false, Raw:"techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Expires=Mon, 02 Jun 2025 10:57:52 GMT; Max-Age=0; SameSite=Lax", Unparsed:[]string(nil)} anubis_test.go:228: &http.Cookie{Name:"techaro.lol-anubis-auth", Value:"eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6IjI2ZGNhODU4ZDc5YTc4MTQ4MDE0ZDEzMzk1M2YwZWU3Nzg3NDliMjEzZDYxNzg0ZmI1NDZkYjc1YzFhNDgwZjIiLCJleHAiOjE3NDg4NjI1MzIsImlhdCI6MTc0ODg2MTkzMiwibmJmIjoxNzQ4ODYxODcyLCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiYjAzYjAyOTg1ZDVlZTUwMDdhODExY2IwZmYzYWUwZjNjYjk5NTY1ZDExNDg0NjE2ZmYxMDBlNjM4MGFhZDVlYSJ9.C7odl8ygxT5qGfYkK79fm1KteX8g0zEHReGa1ZCFR7sPG5r41lL3SIu3G4RHYSVh7UOzFAE4r-Prkts3qLfsBQ", Quoted:false, Path:"/", Domain:"", Expires:time.Date(2025, time.June, 2, 11, 8, 52, 0, time.UTC), RawExpires:"Mon, 02 Jun 2025 11:08:52 GMT", MaxAge:0, Secure:false, HttpOnly:false, SameSite:2, Partitioned:false, Raw:"techaro.lol-anubis-auth=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6IjI2ZGNhODU4ZDc5YTc4MTQ4MDE0ZDEzMzk1M2YwZWU3Nzg3NDliMjEzZDYxNzg0ZmI1NDZkYjc1YzFhNDgwZjIiLCJleHAiOjE3NDg4NjI1MzIsImlhdCI6MTc0ODg2MTkzMiwibmJmIjoxNzQ4ODYxODcyLCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiYjAzYjAyOTg1ZDVlZTUwMDdhODExY2IwZmYzYWUwZjNjYjk5NTY1ZDExNDg0NjE2ZmYxMDBlNjM4MGFhZDVlYSJ9.C7odl8ygxT5qGfYkK79fm1KteX8g0zEHReGa1ZCFR7sPG5r41lL3SIu3G4RHYSVh7UOzFAE4r-Prkts3qLfsBQ; Path=/; Expires=Mon, 02 Jun 2025 11:08:52 GMT; SameSite=Lax", Unparsed:[]string(nil)} --- PASS: TestCookieCustomExpiration (0.02s) === RUN TestCookieSettings {"time":"2025-06-02T10:58:52.659424897Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T10:58:52.660244318Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"c466c78467c02e6b717f97dc90c6280918740b8b6a525dac5275c4027da4e566","rules":{"algorithm":"fast","difficulty":0,"report_as":0},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:42761/.within.website/x/cmd/anubis/api/make-challenge?redir=%2F -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=c466c78467c02e6b717f97dc90c6280918740b8b6a525dac5275c4027da4e566; Path=/; Domain=127.0.0.1; Expires=Mon, 09 Jun 2025 10:58:52 GMT; SameSite=Lax; Partitioned anubis_test.go:124: requested cookies for http://127.0.0.1:42761/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=27f72e947a293d40e94888dd685740e290bacf178eaf131cdd9a8b496f320918 anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=c466c78467c02e6b717f97dc90c6280918740b8b6a525dac5275c4027da4e566; Path=/; Domain=127.0.0.1; Expires=Mon, 09 Jun 2025 10:58:52 GMT; SameSite=Lax; Partitioned {"time":"2025-06-02T10:58:52.66071786Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T10:58:52.660812752Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":437},"msg":"challenge passed, redirecting to app","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:42761/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=27f72e947a293d40e94888dd685740e290bacf178eaf131cdd9a8b496f320918 -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Domain=127.0.0.1; Expires=Mon, 02 Jun 2025 10:57:52 GMT; Max-Age=0; SameSite=Lax; Partitioned anubis_test.go:138: set cookie: http://127.0.0.1:42761/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=27f72e947a293d40e94888dd685740e290bacf178eaf131cdd9a8b496f320918 -> techaro.lol-anubis-auth-for-127.0.0.1=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6ImM0NjZjNzg0NjdjMDJlNmI3MTdmOTdkYzkwYzYyODA5MTg3NDBiOGI2YTUyNWRhYzUyNzVjNDAyN2RhNGU1NjYiLCJleHAiOjE3NDk0NjY3MzIsImlhdCI6MTc0ODg2MTkzMiwibmJmIjoxNzQ4ODYxODcyLCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiMjdmNzJlOTQ3YTI5M2Q0MGU5NDg4OGRkNjg1NzQwZTI5MGJhY2YxNzhlYWYxMzFjZGQ5YThiNDk2ZjMyMDkxOCJ9.9wvkKNvWeIPygWtZ489ESrfUQiLxuHPCCogFwzkUURNKx5iEKU5amN2jEM53vGnH6P5dgEitbEXwKiwDgC2LAw; Path=/; Domain=127.0.0.1; Expires=Mon, 09 Jun 2025 10:58:52 GMT; SameSite=Lax; Partitioned anubis_test.go:280: &http.Cookie{Name:"techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work", Value:"", Quoted:false, Path:"/", Domain:"127.0.0.1", Expires:time.Date(2025, time.June, 2, 10, 57, 52, 0, time.UTC), RawExpires:"Mon, 02 Jun 2025 10:57:52 GMT", MaxAge:-1, Secure:false, HttpOnly:false, SameSite:2, Partitioned:true, Raw:"techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Domain=127.0.0.1; Expires=Mon, 02 Jun 2025 10:57:52 GMT; Max-Age=0; SameSite=Lax; Partitioned", Unparsed:[]string(nil)} anubis_test.go:280: &http.Cookie{Name:"techaro.lol-anubis-auth-for-127.0.0.1", Value:"eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6ImM0NjZjNzg0NjdjMDJlNmI3MTdmOTdkYzkwYzYyODA5MTg3NDBiOGI2YTUyNWRhYzUyNzVjNDAyN2RhNGU1NjYiLCJleHAiOjE3NDk0NjY3MzIsImlhdCI6MTc0ODg2MTkzMiwibmJmIjoxNzQ4ODYxODcyLCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiMjdmNzJlOTQ3YTI5M2Q0MGU5NDg4OGRkNjg1NzQwZTI5MGJhY2YxNzhlYWYxMzFjZGQ5YThiNDk2ZjMyMDkxOCJ9.9wvkKNvWeIPygWtZ489ESrfUQiLxuHPCCogFwzkUURNKx5iEKU5amN2jEM53vGnH6P5dgEitbEXwKiwDgC2LAw", Quoted:false, Path:"/", Domain:"127.0.0.1", Expires:time.Date(2025, time.June, 9, 10, 58, 52, 0, time.UTC), RawExpires:"Mon, 09 Jun 2025 10:58:52 GMT", MaxAge:0, Secure:false, HttpOnly:false, SameSite:2, Partitioned:true, Raw:"techaro.lol-anubis-auth-for-127.0.0.1=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6ImM0NjZjNzg0NjdjMDJlNmI3MTdmOTdkYzkwYzYyODA5MTg3NDBiOGI2YTUyNWRhYzUyNzVjNDAyN2RhNGU1NjYiLCJleHAiOjE3NDk0NjY3MzIsImlhdCI6MTc0ODg2MTkzMiwibmJmIjoxNzQ4ODYxODcyLCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiMjdmNzJlOTQ3YTI5M2Q0MGU5NDg4OGRkNjg1NzQwZTI5MGJhY2YxNzhlYWYxMzFjZGQ5YThiNDk2ZjMyMDkxOCJ9.9wvkKNvWeIPygWtZ489ESrfUQiLxuHPCCogFwzkUURNKx5iEKU5amN2jEM53vGnH6P5dgEitbEXwKiwDgC2LAw; Path=/; Domain=127.0.0.1; Expires=Mon, 09 Jun 2025 10:58:52 GMT; SameSite=Lax; Partitioned", Unparsed:[]string(nil)} --- PASS: TestCookieSettings (0.01s) === RUN TestCheckDefaultDifficultyMatchesPolicy === RUN TestCheckDefaultDifficultyMatchesPolicy/1 {"time":"2025-06-02T10:58:52.676882499Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/2 {"time":"2025-06-02T10:58:52.693709547Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/3 {"time":"2025-06-02T10:58:52.719690943Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/4 {"time":"2025-06-02T10:58:52.747254079Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/5 {"time":"2025-06-02T10:58:52.774266921Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/6 {"time":"2025-06-02T10:58:52.797741881Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/7 {"time":"2025-06-02T10:58:52.824788153Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/8 {"time":"2025-06-02T10:58:52.8519022Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCheckDefaultDifficultyMatchesPolicy/9 {"time":"2025-06-02T10:58:52.878326946Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} --- PASS: TestCheckDefaultDifficultyMatchesPolicy (0.22s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/1 (0.02s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/2 (0.02s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/3 (0.03s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/4 (0.03s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/5 (0.03s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/6 (0.02s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/7 (0.03s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/8 (0.03s) --- PASS: TestCheckDefaultDifficultyMatchesPolicy/9 (0.03s) === RUN TestBasePrefix === RUN TestBasePrefix/no_prefix {"time":"2025-06-02T10:58:52.906102187Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T10:58:52.909031658Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"467ab34b46abc1fb6cf1074be14a18e352e89d736befa6d14424ca149ed0c97d","rules":{"algorithm":"fast","difficulty":4,"report_as":4},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:40721/.within.website/x/cmd/anubis/api/make-challenge?redir=%2F -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=467ab34b46abc1fb6cf1074be14a18e352e89d736befa6d14424ca149ed0c97d; Path=/; Expires=Mon, 02 Jun 2025 10:58:52 GMT; SameSite=Lax anubis_test.go:124: requested cookies for http://127.0.0.1:40721/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=14106&redir=%2F&response=0000460f661db6e4f422bb77ebf6c4674eb877b7c2813b18d57de4e52027c4da anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=467ab34b46abc1fb6cf1074be14a18e352e89d736befa6d14424ca149ed0c97d; Path=/; Expires=Mon, 02 Jun 2025 10:58:52 GMT; SameSite=Lax {"time":"2025-06-02T10:58:52.947026346Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T10:58:52.947272917Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":437},"msg":"challenge passed, redirecting to app","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:40721/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=14106&redir=%2F&response=0000460f661db6e4f422bb77ebf6c4674eb877b7c2813b18d57de4e52027c4da -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Expires=Mon, 02 Jun 2025 10:57:52 GMT; Max-Age=0; SameSite=Lax anubis_test.go:138: set cookie: http://127.0.0.1:40721/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=14106&redir=%2F&response=0000460f661db6e4f422bb77ebf6c4674eb877b7c2813b18d57de4e52027c4da -> techaro.lol-anubis-auth=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6IjQ2N2FiMzRiNDZhYmMxZmI2Y2YxMDc0YmUxNGExOGUzNTJlODlkNzM2YmVmYTZkMTQ0MjRjYTE0OWVkMGM5N2QiLCJleHAiOjE3NDg4NjE5MzIsImlhdCI6MTc0ODg2MTkzMiwibmJmIjoxNzQ4ODYxODcyLCJub25jZSI6IjE0MTA2IiwicG9saWN5UnVsZSI6IjgxYmIzZGM3MzZmNDJjNTk4NjMyZjE4ZDk0NTY3ZmE1OGY0ZjczNzg4NTYwYzRkNjhjODJkMzQ0MWYyNjQ2YjgiLCJyZXNwb25zZSI6IjAwMDA0NjBmNjYxZGI2ZTRmNDIyYmI3N2ViZjZjNDY3NGViODc3YjdjMjgxM2IxOGQ1N2RlNGU1MjAyN2M0ZGEifQ.QNqGsqUCWkJEkS3taYwQN2jpXmLHg543jlJQKeUhBgCvaxEWyM700XBy09ZZ2UCnqA96Z_GiQYkirqRlQA8mBA; Path=/; Expires=Mon, 02 Jun 2025 10:58:52 GMT; SameSite=Lax === RUN TestBasePrefix/with_prefix {"time":"2025-06-02T10:58:52.973972402Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T10:58:52.975091723Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"cf90c07214995e3b9b69f34df685e94c00cbef0571209f16353a6178586c0f8d","rules":{"algorithm":"fast","difficulty":4,"report_as":4},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:39975/myapp/.within.website/x/cmd/anubis/api/make-challenge?redir=%2Fmyapp -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=cf90c07214995e3b9b69f34df685e94c00cbef0571209f16353a6178586c0f8d; Path=/; Expires=Mon, 02 Jun 2025 10:58:52 GMT; SameSite=Lax anubis_test.go:124: requested cookies for http://127.0.0.1:39975/myapp/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=83660&redir=%2F&response=0000dedeef098c38216a1d16e46c84693f0d4ab47167673dc478260698e7db59 anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=cf90c07214995e3b9b69f34df685e94c00cbef0571209f16353a6178586c0f8d; Path=/; Expires=Mon, 02 Jun 2025 10:58:52 GMT; SameSite=Lax {"time":"2025-06-02T10:58:53.184304809Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T10:58:53.184570231Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":437},"msg":"challenge passed, redirecting to app","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:39975/myapp/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=83660&redir=%2F&response=0000dedeef098c38216a1d16e46c84693f0d4ab47167673dc478260698e7db59 -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Expires=Mon, 02 Jun 2025 10:57:53 GMT; Max-Age=0; SameSite=Lax anubis_test.go:138: set cookie: http://127.0.0.1:39975/myapp/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=83660&redir=%2F&response=0000dedeef098c38216a1d16e46c84693f0d4ab47167673dc478260698e7db59 -> techaro.lol-anubis-auth=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6ImNmOTBjMDcyMTQ5OTVlM2I5YjY5ZjM0ZGY2ODVlOTRjMDBjYmVmMDU3MTIwOWYxNjM1M2E2MTc4NTg2YzBmOGQiLCJleHAiOjE3NDg4NjE5MzMsImlhdCI6MTc0ODg2MTkzMywibmJmIjoxNzQ4ODYxODczLCJub25jZSI6IjgzNjYwIiwicG9saWN5UnVsZSI6IjgxYmIzZGM3MzZmNDJjNTk4NjMyZjE4ZDk0NTY3ZmE1OGY0ZjczNzg4NTYwYzRkNjhjODJkMzQ0MWYyNjQ2YjgiLCJyZXNwb25zZSI6IjAwMDBkZWRlZWYwOThjMzgyMTZhMWQxNmU0NmM4NDY5M2YwZDRhYjQ3MTY3NjczZGM0NzgyNjA2OThlN2RiNTkifQ.zuCENuaSONaBABCpW0S77ZeVyk1Igh9PgWhDV-XhZbDDJbcL_HxdcCJwtUWOTOS8nDe7MDdIPAZo0xttXRT5Cg; Path=/myapp/; Expires=Mon, 02 Jun 2025 10:58:53 GMT; SameSite=Lax === RUN TestBasePrefix/with_prefix_and_trailing_slash {"time":"2025-06-02T10:58:53.21171233Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T10:58:53.213002843Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"d396959a755e03a255d533ab333f4a9a79c4165311bad47f4ce7d29f88dabc63","rules":{"algorithm":"fast","difficulty":4,"report_as":4},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:41283/myapp/.within.website/x/cmd/anubis/api/make-challenge?redir=%2Fmyapp%2F -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=d396959a755e03a255d533ab333f4a9a79c4165311bad47f4ce7d29f88dabc63; Path=/; Expires=Mon, 02 Jun 2025 10:58:53 GMT; SameSite=Lax anubis_test.go:124: requested cookies for http://127.0.0.1:41283/myapp/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=26718&redir=%2F&response=0000f8113d7e8b4302ad4f03b00fc84fd7aac2e500cad47bd307cd15b6a7070c anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=d396959a755e03a255d533ab333f4a9a79c4165311bad47f4ce7d29f88dabc63; Path=/; Expires=Mon, 02 Jun 2025 10:58:53 GMT; SameSite=Lax {"time":"2025-06-02T10:58:53.283124358Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T10:58:53.283366533Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":437},"msg":"challenge passed, redirecting to app","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:41283/myapp/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=26718&redir=%2F&response=0000f8113d7e8b4302ad4f03b00fc84fd7aac2e500cad47bd307cd15b6a7070c -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Expires=Mon, 02 Jun 2025 10:57:53 GMT; Max-Age=0; SameSite=Lax anubis_test.go:138: set cookie: http://127.0.0.1:41283/myapp/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=26718&redir=%2F&response=0000f8113d7e8b4302ad4f03b00fc84fd7aac2e500cad47bd307cd15b6a7070c -> techaro.lol-anubis-auth=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6ImQzOTY5NTlhNzU1ZTAzYTI1NWQ1MzNhYjMzM2Y0YTlhNzljNDE2NTMxMWJhZDQ3ZjRjZTdkMjlmODhkYWJjNjMiLCJleHAiOjE3NDg4NjE5MzMsImlhdCI6MTc0ODg2MTkzMywibmJmIjoxNzQ4ODYxODczLCJub25jZSI6IjI2NzE4IiwicG9saWN5UnVsZSI6IjgxYmIzZGM3MzZmNDJjNTk4NjMyZjE4ZDk0NTY3ZmE1OGY0ZjczNzg4NTYwYzRkNjhjODJkMzQ0MWYyNjQ2YjgiLCJyZXNwb25zZSI6IjAwMDBmODExM2Q3ZThiNDMwMmFkNGYwM2IwMGZjODRmZDdhYWMyZTUwMGNhZDQ3YmQzMDdjZDE1YjZhNzA3MGMifQ.qi29NL6pXtPJBQPvAjmjXFlhWzxiSqvpbgQSdmmfEKG2OZmPEB7Z0RS6t0HuJuw4B-MWS45AAbxkjJwX7CKwDg; Path=/myapp/; Expires=Mon, 02 Jun 2025 10:58:53 GMT; SameSite=Lax --- PASS: TestBasePrefix (0.40s) --- PASS: TestBasePrefix/no_prefix (0.07s) --- PASS: TestBasePrefix/with_prefix (0.24s) --- PASS: TestBasePrefix/with_prefix_and_trailing_slash (0.10s) === RUN TestCustomStatusCodes {"time":"2025-06-02T10:58:53.283893516Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCustomStatusCodes/ALLOW {"time":"2025-06-02T10:58:53.28461743Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).checkRules","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":206},"msg":"allowing traffic to origin (explicit)","user_agent":"ALLOW","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} === NAME TestCustomStatusCodes anubis_test.go:507: ALLOW === RUN TestCustomStatusCodes/CHALLENGE {"time":"2025-06-02T10:58:53.285570302Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).checkRules","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":223},"msg":"challenge requested","user_agent":"CHALLENGE","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"bot/challenge","rule":"CHALLENGE"}} {"time":"2025-06-02T10:58:53.285593162Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).maybeReverseProxy","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":139},"msg":"cookie not found","user_agent":"CHALLENGE","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"bot/challenge","rule":"CHALLENGE"},"path":"/"} === RUN TestCustomStatusCodes/DENY {"time":"2025-06-02T10:58:53.288969667Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).checkRules","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":211},"msg":"explicit deny","user_agent":"DENY","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"bot/deny","rule":"DENY"}} {"time":"2025-06-02T10:58:53.289016468Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).checkRules","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":219},"msg":"rule hash","user_agent":"DENY","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"bot/deny","rule":"DENY"},"hash":"6da73dd91361a3d947b37741c05113d61907c7b45cafdb252effa62c2b6c0f7d"} --- PASS: TestCustomStatusCodes (0.01s) --- PASS: TestCustomStatusCodes/ALLOW (0.00s) --- PASS: TestCustomStatusCodes/CHALLENGE (0.00s) --- PASS: TestCustomStatusCodes/DENY (0.00s) === RUN TestCloudflareWorkersRule === RUN TestCloudflareWorkersRule/cel {"time":"2025-06-02T10:58:53.290530841Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCloudflareWorkersRule/cel/with-cf-worker-header === RUN TestCloudflareWorkersRule/cel/no-cf-worker-header === RUN TestCloudflareWorkersRule/header {"time":"2025-06-02T10:58:53.291358713Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} === RUN TestCloudflareWorkersRule/header/with-cf-worker-header === RUN TestCloudflareWorkersRule/header/no-cf-worker-header --- PASS: TestCloudflareWorkersRule (0.00s) --- PASS: TestCloudflareWorkersRule/cel (0.00s) --- PASS: TestCloudflareWorkersRule/cel/with-cf-worker-header (0.00s) --- PASS: TestCloudflareWorkersRule/cel/no-cf-worker-header (0.00s) --- PASS: TestCloudflareWorkersRule/header (0.00s) --- PASS: TestCloudflareWorkersRule/header/with-cf-worker-header (0.00s) --- PASS: TestCloudflareWorkersRule/header/no-cf-worker-header (0.00s) === RUN TestRuleChange {"time":"2025-06-02T10:58:53.292222313Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} {"time":"2025-06-02T10:58:53.293185506Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).MakeChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":310},"msg":"made challenge","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"challenge":"53253625a1ece772bd2d65f1070ab71d3c980f0ae889e0e7e550b1d6708504ea","rules":{"algorithm":"fast","difficulty":0,"report_as":0},"cr":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:45023/.within.website/x/cmd/anubis/api/make-challenge?redir=%2F -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=53253625a1ece772bd2d65f1070ab71d3c980f0ae889e0e7e550b1d6708504ea; Path=/; Domain=127.0.0.1; Expires=Mon, 02 Jun 2025 11:08:53 GMT; SameSite=Lax anubis_test.go:124: requested cookies for http://127.0.0.1:45023/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=5c0ded7d0b167c596f1812839241c53a64eab234d63e3e45412df1a5a7e5bf8f anubis_test.go:127: get cookie: <- techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=53253625a1ece772bd2d65f1070ab71d3c980f0ae889e0e7e550b1d6708504ea; Path=/; Domain=127.0.0.1; Expires=Mon, 02 Jun 2025 11:08:53 GMT; SameSite=Lax {"time":"2025-06-02T10:58:53.293794994Z","level":"INFO","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":367},"msg":"challenge took","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"},"elapsedTime":420} {"time":"2025-06-02T10:58:53.294019738Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.(*Server).PassChallenge","file":"github.com/TecharoHQ/anubis/lib/anubis.go","line":437},"msg":"challenge passed, redirecting to app","user_agent":"Go-http-client/1.1","accept_language":"","priority":"","x-forwarded-for":"","x-real-ip":"127.0.0.1","check_result":{"name":"default/allow","rule":"ALLOW"}} anubis_test.go:138: set cookie: http://127.0.0.1:45023/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=5c0ded7d0b167c596f1812839241c53a64eab234d63e3e45412df1a5a7e5bf8f -> techaro.lol-anubis-cookie-test-if-you-block-this-anubis-wont-work=; Path=/; Domain=127.0.0.1; Expires=Mon, 02 Jun 2025 10:57:53 GMT; Max-Age=0; SameSite=Lax anubis_test.go:138: set cookie: http://127.0.0.1:45023/.within.website/x/cmd/anubis/api/pass-challenge?elapsedTime=420&nonce=0&redir=%2F&response=5c0ded7d0b167c596f1812839241c53a64eab234d63e3e45412df1a5a7e5bf8f -> techaro.lol-anubis-auth-for-127.0.0.1=eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJhY3Rpb24iOiJBTExPVyIsImNoYWxsZW5nZSI6IjUzMjUzNjI1YTFlY2U3NzJiZDJkNjVmMTA3MGFiNzFkM2M5ODBmMGFlODg5ZTBlN2U1NTBiMWQ2NzA4NTA0ZWEiLCJleHAiOjE3NDg4NjI1MzMsImlhdCI6MTc0ODg2MTkzMywibmJmIjoxNzQ4ODYxODczLCJub25jZSI6IjAiLCJwb2xpY3lSdWxlIjoiODFiYjNkYzczNmY0MmM1OTg2MzJmMThkOTQ1NjdmYTU4ZjRmNzM3ODg1NjBjNGQ2OGM4MmQzNDQxZjI2NDZiOCIsInJlc3BvbnNlIjoiNWMwZGVkN2QwYjE2N2M1OTZmMTgxMjgzOTI0MWM1M2E2NGVhYjIzNGQ2M2UzZTQ1NDEyZGYxYTVhN2U1YmY4ZiJ9.ALHGTIb4W7ZoAwElYfkHoFCn1OLtIe8SmZA8CcNQupf7-5VOm3OD2BSjO80HVffcoil2ch5VdB1NZgGcVUVSAA; Path=/; Domain=127.0.0.1; Expires=Mon, 02 Jun 2025 11:08:53 GMT; SameSite=Lax --- PASS: TestRuleChange (0.00s) === RUN TestClearCookie {"time":"2025-06-02T10:58:53.294565326Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} --- PASS: TestClearCookie (0.00s) === RUN TestClearCookieWithDomain {"time":"2025-06-02T10:58:53.294953673Z","level":"DEBUG","source":{"function":"github.com/TecharoHQ/anubis/lib.New","file":"github.com/TecharoHQ/anubis/lib/config.go","line":74},"msg":"opts.PrivateKey not set, generating a new one"} --- PASS: TestClearCookieWithDomain (0.00s) PASS ok github.com/TecharoHQ/anubis/lib 0.735s === RUN TestRemoteAddrChecker === RUN TestRemoteAddrChecker/match_ipv4 === RUN TestRemoteAddrChecker/match_ipv6 === RUN TestRemoteAddrChecker/not_match_ipv4 === RUN TestRemoteAddrChecker/not_match_ipv6 === RUN TestRemoteAddrChecker/no_ip_set === RUN TestRemoteAddrChecker/invalid_ip --- PASS: TestRemoteAddrChecker (0.00s) --- PASS: TestRemoteAddrChecker/match_ipv4 (0.00s) --- PASS: TestRemoteAddrChecker/match_ipv6 (0.00s) --- PASS: TestRemoteAddrChecker/not_match_ipv4 (0.00s) --- PASS: TestRemoteAddrChecker/not_match_ipv6 (0.00s) --- PASS: TestRemoteAddrChecker/no_ip_set (0.00s) --- PASS: TestRemoteAddrChecker/invalid_ip (0.00s) === RUN TestHeaderMatchesChecker === RUN TestHeaderMatchesChecker/match === RUN TestHeaderMatchesChecker/not_match === RUN TestHeaderMatchesChecker/not_present === RUN TestHeaderMatchesChecker/invalid_regex --- PASS: TestHeaderMatchesChecker (0.00s) --- PASS: TestHeaderMatchesChecker/match (0.00s) --- PASS: TestHeaderMatchesChecker/not_match (0.00s) --- PASS: TestHeaderMatchesChecker/not_present (0.00s) --- PASS: TestHeaderMatchesChecker/invalid_regex (0.00s) === RUN TestHeaderExistsChecker === RUN TestHeaderExistsChecker/match === RUN TestHeaderExistsChecker/not_match --- PASS: TestHeaderExistsChecker (0.00s) --- PASS: TestHeaderExistsChecker/match (0.00s) --- PASS: TestHeaderExistsChecker/not_match (0.00s) === RUN TestDefaultPolicyMustParse --- PASS: TestDefaultPolicyMustParse (0.02s) === RUN TestGoodConfigs === RUN TestGoodConfigs/allow_everyone.json === RUN TestGoodConfigs/allow_everyone.yaml === RUN TestGoodConfigs/block_cf_workers.json === RUN TestGoodConfigs/block_cf_workers.yaml === RUN TestGoodConfigs/challengemozilla.json === RUN TestGoodConfigs/challengemozilla.yaml === RUN TestGoodConfigs/entropy.yaml === RUN TestGoodConfigs/everything_blocked.json === RUN TestGoodConfigs/everything_blocked.yaml === RUN TestGoodConfigs/git_client.json === RUN TestGoodConfigs/git_client.yaml === RUN TestGoodConfigs/import_filesystem.json === RUN TestGoodConfigs/import_filesystem.yaml === RUN TestGoodConfigs/import_keep_internet_working.json === RUN TestGoodConfigs/import_keep_internet_working.yaml === RUN TestGoodConfigs/old_xesite.json === RUN TestGoodConfigs/status-codes-paranoid.json === RUN TestGoodConfigs/status-codes-paranoid.yaml === RUN TestGoodConfigs/status-codes-rfc.json === RUN TestGoodConfigs/status-codes-rfc.yaml --- PASS: TestGoodConfigs (0.01s) --- PASS: TestGoodConfigs/allow_everyone.json (0.00s) --- PASS: TestGoodConfigs/allow_everyone.yaml (0.00s) --- PASS: TestGoodConfigs/block_cf_workers.json (0.00s) --- PASS: TestGoodConfigs/block_cf_workers.yaml (0.00s) --- PASS: TestGoodConfigs/challengemozilla.json (0.00s) --- PASS: TestGoodConfigs/challengemozilla.yaml (0.00s) --- PASS: TestGoodConfigs/entropy.yaml (0.00s) --- PASS: TestGoodConfigs/everything_blocked.json (0.00s) --- PASS: TestGoodConfigs/everything_blocked.yaml (0.00s) --- PASS: TestGoodConfigs/git_client.json (0.00s) --- PASS: TestGoodConfigs/git_client.yaml (0.00s) --- PASS: TestGoodConfigs/import_filesystem.json (0.00s) --- PASS: TestGoodConfigs/import_filesystem.yaml (0.00s) --- PASS: TestGoodConfigs/import_keep_internet_working.json (0.00s) --- PASS: TestGoodConfigs/import_keep_internet_working.yaml (0.00s) --- PASS: TestGoodConfigs/old_xesite.json (0.00s) --- PASS: TestGoodConfigs/status-codes-paranoid.json (0.00s) --- PASS: TestGoodConfigs/status-codes-paranoid.yaml (0.00s) --- PASS: TestGoodConfigs/status-codes-rfc.json (0.00s) --- PASS: TestGoodConfigs/status-codes-rfc.yaml (0.00s) === RUN TestBadConfigs === RUN TestBadConfigs/badregexes.json policy_test.go:64: config is not valid: config: bot entry for "path-bad" is not valid: config.Bot: invalid path regex error parsing regexp: missing closing ): `a(b` config: bot entry for "user-agent-bad" is not valid: config.Bot: invalid user agent regex error parsing regexp: missing closing ): `a(b` config: bot entry for "headers-bad" is not valid: config.Bot: must set either user_agent_regex, path_regex, headers_regex, or remote_addresses === RUN TestBadConfigs/badregexes.yaml policy_test.go:64: config is not valid: config: bot entry for "path-bad" is not valid: config.Bot: invalid path regex error parsing regexp: missing closing ): `a(b` config: bot entry for "user-agent-bad" is not valid: config.Bot: invalid user agent regex error parsing regexp: missing closing ): `a(b` === RUN TestBadConfigs/import_and_bot.json policy_test.go:64: config is not valid: config.BotOrImport: can't set bot rules and import values at the same time === RUN TestBadConfigs/import_and_bot.yaml policy_test.go:64: config is not valid: config.BotOrImport: can't set bot rules and import values at the same time === RUN TestBadConfigs/import_invalid_file.json policy_test.go:64: config is not valid: config.ImportStatement: invalid source file: (data)/does-not-exist-fake-file.yaml: open does-not-exist-fake-file.yaml: file does not exist === RUN TestBadConfigs/import_invalid_file.yaml policy_test.go:64: config is not valid: config.ImportStatement: invalid source file: (data)/does-not-exist-fake-file.yaml: open does-not-exist-fake-file.yaml: file does not exist === RUN TestBadConfigs/invalid.json policy_test.go:64: config is not valid: config.BotOrImport: rule definition is invalid, you must set either bot rules or an import statement, not both === RUN TestBadConfigs/invalid.yaml policy_test.go:64: config is not valid: config: must define at least one (1) bot rule === RUN TestBadConfigs/multiple_expression_types.json policy_test.go:64: config is not valid: config: bot entry for "multiple-expression-types" is not valid: config: expression block can't contain multiple expression types === RUN TestBadConfigs/multiple_expression_types.yaml policy_test.go:64: config is not valid: config: bot entry for "multiple-expression-types" is not valid: config: expression block can't contain multiple expression types === RUN TestBadConfigs/nobots.json policy_test.go:64: config is not valid: config: must define at least one (1) bot rule === RUN TestBadConfigs/nobots.yaml policy_test.go:64: config is not valid: config: must define at least one (1) bot rule === RUN TestBadConfigs/regex_ends_newline.json policy_test.go:64: config is not valid: config: bot entry for "user-agent-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): user agent regex: "Mozilla\n" config: bot entry for "path-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): path regex: "^/evil/.*$\n" config: bot entry for "headers-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): header CF-Worker regex: ".*\n" === RUN TestBadConfigs/regex_ends_newline.yaml policy_test.go:64: config is not valid: config: bot entry for "user-agent-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): user agent regex: "Mozilla\n" config: bot entry for "path-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): path regex: "^/evil/.*$\n" config: bot entry for "headers-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): header CF-Worker regex: ".*\n" === RUN TestBadConfigs/status-codes-0.json policy_test.go:64: config is not valid: status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestBadConfigs/status-codes-0.yaml policy_test.go:64: config is not valid: status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 --- PASS: TestBadConfigs (0.00s) --- PASS: TestBadConfigs/badregexes.json (0.00s) --- PASS: TestBadConfigs/badregexes.yaml (0.00s) --- PASS: TestBadConfigs/import_and_bot.json (0.00s) --- PASS: TestBadConfigs/import_and_bot.yaml (0.00s) --- PASS: TestBadConfigs/import_invalid_file.json (0.00s) --- PASS: TestBadConfigs/import_invalid_file.yaml (0.00s) --- PASS: TestBadConfigs/invalid.json (0.00s) --- PASS: TestBadConfigs/invalid.yaml (0.00s) --- PASS: TestBadConfigs/multiple_expression_types.json (0.00s) --- PASS: TestBadConfigs/multiple_expression_types.yaml (0.00s) --- PASS: TestBadConfigs/nobots.json (0.00s) --- PASS: TestBadConfigs/nobots.yaml (0.00s) --- PASS: TestBadConfigs/regex_ends_newline.json (0.00s) --- PASS: TestBadConfigs/regex_ends_newline.yaml (0.00s) --- PASS: TestBadConfigs/status-codes-0.json (0.00s) --- PASS: TestBadConfigs/status-codes-0.yaml (0.00s) PASS ok github.com/TecharoHQ/anubis/lib/policy 0.042s === RUN TestBotValid === RUN TestBotValid/simple_user_agent === RUN TestBotValid/simple_path === RUN TestBotValid/no_rule_name === RUN TestBotValid/no_rule_matcher === RUN TestBotValid/both_user-agent_and_path === RUN TestBotValid/unknown_action === RUN TestBotValid/invalid_user_agent_regex === RUN TestBotValid/invalid_path_regex === RUN TestBotValid/invalid_headers_regex === RUN TestBotValid/challenge_difficulty_too_low === RUN TestBotValid/challenge_difficulty_too_high === RUN TestBotValid/challenge_wrong_algorithm === RUN TestBotValid/invalid_cidr_range === RUN TestBotValid/only_filter_by_IP_range === RUN TestBotValid/filter_by_user_agent_and_IP_range === RUN TestBotValid/filter_by_path_and_IP_range --- PASS: TestBotValid (0.00s) --- PASS: TestBotValid/simple_user_agent (0.00s) --- PASS: TestBotValid/simple_path (0.00s) --- PASS: TestBotValid/no_rule_name (0.00s) --- PASS: TestBotValid/no_rule_matcher (0.00s) --- PASS: TestBotValid/both_user-agent_and_path (0.00s) --- PASS: TestBotValid/unknown_action (0.00s) --- PASS: TestBotValid/invalid_user_agent_regex (0.00s) --- PASS: TestBotValid/invalid_path_regex (0.00s) --- PASS: TestBotValid/invalid_headers_regex (0.00s) --- PASS: TestBotValid/challenge_difficulty_too_low (0.00s) --- PASS: TestBotValid/challenge_difficulty_too_high (0.00s) --- PASS: TestBotValid/challenge_wrong_algorithm (0.00s) --- PASS: TestBotValid/invalid_cidr_range (0.00s) --- PASS: TestBotValid/only_filter_by_IP_range (0.00s) --- PASS: TestBotValid/filter_by_user_agent_and_IP_range (0.00s) --- PASS: TestBotValid/filter_by_path_and_IP_range (0.00s) === RUN TestConfigValidKnownGood === RUN TestConfigValidKnownGood/allow_everyone.json === RUN TestConfigValidKnownGood/allow_everyone.yaml === RUN TestConfigValidKnownGood/block_cf_workers.json === RUN TestConfigValidKnownGood/block_cf_workers.yaml === RUN TestConfigValidKnownGood/challengemozilla.json === RUN TestConfigValidKnownGood/challengemozilla.yaml === RUN TestConfigValidKnownGood/entropy.yaml === RUN TestConfigValidKnownGood/everything_blocked.json === RUN TestConfigValidKnownGood/everything_blocked.yaml === RUN TestConfigValidKnownGood/git_client.json === RUN TestConfigValidKnownGood/git_client.yaml === RUN TestConfigValidKnownGood/import_filesystem.json === RUN TestConfigValidKnownGood/import_filesystem.yaml === RUN TestConfigValidKnownGood/import_keep_internet_working.json === RUN TestConfigValidKnownGood/import_keep_internet_working.yaml === RUN TestConfigValidKnownGood/old_xesite.json === RUN TestConfigValidKnownGood/status-codes-paranoid.json === RUN TestConfigValidKnownGood/status-codes-paranoid.yaml === RUN TestConfigValidKnownGood/status-codes-rfc.json === RUN TestConfigValidKnownGood/status-codes-rfc.yaml --- PASS: TestConfigValidKnownGood (0.01s) --- PASS: TestConfigValidKnownGood/allow_everyone.json (0.00s) --- PASS: TestConfigValidKnownGood/allow_everyone.yaml (0.00s) --- PASS: TestConfigValidKnownGood/block_cf_workers.json (0.00s) --- PASS: TestConfigValidKnownGood/block_cf_workers.yaml (0.00s) --- PASS: TestConfigValidKnownGood/challengemozilla.json (0.00s) --- PASS: TestConfigValidKnownGood/challengemozilla.yaml (0.00s) --- PASS: TestConfigValidKnownGood/entropy.yaml (0.00s) --- PASS: TestConfigValidKnownGood/everything_blocked.json (0.00s) --- PASS: TestConfigValidKnownGood/everything_blocked.yaml (0.00s) --- PASS: TestConfigValidKnownGood/git_client.json (0.00s) --- PASS: TestConfigValidKnownGood/git_client.yaml (0.00s) --- PASS: TestConfigValidKnownGood/import_filesystem.json (0.00s) --- PASS: TestConfigValidKnownGood/import_filesystem.yaml (0.00s) --- PASS: TestConfigValidKnownGood/import_keep_internet_working.json (0.00s) --- PASS: TestConfigValidKnownGood/import_keep_internet_working.yaml (0.00s) --- PASS: TestConfigValidKnownGood/old_xesite.json (0.00s) --- PASS: TestConfigValidKnownGood/status-codes-paranoid.json (0.00s) --- PASS: TestConfigValidKnownGood/status-codes-paranoid.yaml (0.00s) --- PASS: TestConfigValidKnownGood/status-codes-rfc.json (0.00s) --- PASS: TestConfigValidKnownGood/status-codes-rfc.yaml (0.00s) === RUN TestImportStatement === RUN TestImportStatement/(data)/apps/allow-api-routes.yaml === RUN TestImportStatement/(data)/apps/bookstack-saml.yaml === RUN TestImportStatement/(data)/apps/gitea-rss-feeds.yaml === RUN TestImportStatement/(data)/apps/qualys-ssl-labs.yml === RUN TestImportStatement/(data)/apps/searx-checker.yml === RUN TestImportStatement/(data)/bots/_deny-pathological.yaml === RUN TestImportStatement/(data)/bots/aggressive-brazilian-scrapers.yaml === RUN TestImportStatement/(data)/bots/ai-catchall.yaml === RUN TestImportStatement/(data)/bots/ai-robots-txt.yaml === RUN TestImportStatement/(data)/bots/cloudflare-workers.yaml === RUN TestImportStatement/(data)/bots/headless-browsers.yaml === RUN TestImportStatement/(data)/bots/irc-bots/archlinux-phrik.yaml === RUN TestImportStatement/(data)/bots/irc-bots/gentoo-chat.yaml === RUN TestImportStatement/(data)/bots/us-ai-scraper.yaml === RUN TestImportStatement/(data)/common/allow-api-like.yaml === RUN TestImportStatement/(data)/common/allow-private-addresses.yaml === RUN TestImportStatement/(data)/common/json-api.yaml === RUN TestImportStatement/(data)/common/keep-internet-working.yaml === RUN TestImportStatement/(data)/common/rfc-violations.yaml === RUN TestImportStatement/(data)/crawlers/_allow-good.yaml === RUN TestImportStatement/(data)/crawlers/ai-search.yaml === RUN TestImportStatement/(data)/crawlers/ai-training.yaml === RUN TestImportStatement/(data)/crawlers/applebot.yaml === RUN TestImportStatement/(data)/crawlers/bingbot.yaml === RUN TestImportStatement/(data)/crawlers/duckduckbot.yaml === RUN TestImportStatement/(data)/crawlers/googlebot.yaml === RUN TestImportStatement/(data)/crawlers/internet-archive.yaml === RUN TestImportStatement/(data)/crawlers/kagibot.yaml === RUN TestImportStatement/(data)/crawlers/marginalia.yaml === RUN TestImportStatement/(data)/crawlers/mojeekbot.yaml === RUN TestImportStatement/(data)/crawlers/openai-gptbot.yaml === RUN TestImportStatement/(data)/crawlers/openai-searchbot.yaml === RUN TestImportStatement/(data)/crawlers/qwantbot.yaml === RUN TestImportStatement/(data)/meta/ai-block-aggressive.yaml === RUN TestImportStatement/(data)/meta/ai-block-moderate.yaml === RUN TestImportStatement/(data)/meta/ai-block-permissive.yaml --- PASS: TestImportStatement (0.01s) --- PASS: TestImportStatement/(data)/apps/allow-api-routes.yaml (0.00s) --- PASS: TestImportStatement/(data)/apps/bookstack-saml.yaml (0.00s) --- PASS: TestImportStatement/(data)/apps/gitea-rss-feeds.yaml (0.00s) --- PASS: TestImportStatement/(data)/apps/qualys-ssl-labs.yml (0.00s) --- PASS: TestImportStatement/(data)/apps/searx-checker.yml (0.00s) --- PASS: TestImportStatement/(data)/bots/_deny-pathological.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/aggressive-brazilian-scrapers.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/ai-catchall.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/ai-robots-txt.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/cloudflare-workers.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/headless-browsers.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/irc-bots/archlinux-phrik.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/irc-bots/gentoo-chat.yaml (0.00s) --- PASS: TestImportStatement/(data)/bots/us-ai-scraper.yaml (0.00s) --- PASS: TestImportStatement/(data)/common/allow-api-like.yaml (0.00s) --- PASS: TestImportStatement/(data)/common/allow-private-addresses.yaml (0.00s) --- PASS: TestImportStatement/(data)/common/json-api.yaml (0.00s) --- PASS: TestImportStatement/(data)/common/keep-internet-working.yaml (0.00s) --- PASS: TestImportStatement/(data)/common/rfc-violations.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/_allow-good.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/ai-search.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/ai-training.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/applebot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/bingbot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/duckduckbot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/googlebot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/internet-archive.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/kagibot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/marginalia.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/mojeekbot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/openai-gptbot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/openai-searchbot.yaml (0.00s) --- PASS: TestImportStatement/(data)/crawlers/qwantbot.yaml (0.00s) --- PASS: TestImportStatement/(data)/meta/ai-block-aggressive.yaml (0.00s) --- PASS: TestImportStatement/(data)/meta/ai-block-moderate.yaml (0.00s) --- PASS: TestImportStatement/(data)/meta/ai-block-permissive.yaml (0.00s) === RUN TestConfigValidBad === RUN TestConfigValidBad/badregexes.json config_test.go:319: config is not valid: config: bot entry for "path-bad" is not valid: config.Bot: invalid path regex error parsing regexp: missing closing ): `a(b` config: bot entry for "user-agent-bad" is not valid: config.Bot: invalid user agent regex error parsing regexp: missing closing ): `a(b` config: bot entry for "headers-bad" is not valid: config.Bot: must set either user_agent_regex, path_regex, headers_regex, or remote_addresses status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/badregexes.yaml config_test.go:319: config is not valid: config: bot entry for "path-bad" is not valid: config.Bot: invalid path regex error parsing regexp: missing closing ): `a(b` config: bot entry for "user-agent-bad" is not valid: config.Bot: invalid user agent regex error parsing regexp: missing closing ): `a(b` status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/import_and_bot.json config_test.go:319: config is not valid: config.BotOrImport: can't set bot rules and import values at the same time status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/import_and_bot.yaml config_test.go:319: config is not valid: config.BotOrImport: can't set bot rules and import values at the same time status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/import_invalid_file.json config_test.go:319: config is not valid: config.ImportStatement: invalid source file: (data)/does-not-exist-fake-file.yaml: open does-not-exist-fake-file.yaml: file does not exist status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/import_invalid_file.yaml config_test.go:319: config is not valid: config.ImportStatement: invalid source file: (data)/does-not-exist-fake-file.yaml: open does-not-exist-fake-file.yaml: file does not exist status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/invalid.json config_test.go:319: config is not valid: config.BotOrImport: rule definition is invalid, you must set either bot rules or an import statement, not both status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/invalid.yaml config_test.go:319: config is not valid: config: must define at least one (1) bot rule status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/multiple_expression_types.json config_test.go:319: config is not valid: config: bot entry for "multiple-expression-types" is not valid: config: expression block can't contain multiple expression types status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/multiple_expression_types.yaml config_test.go:319: config is not valid: config: bot entry for "multiple-expression-types" is not valid: config: expression block can't contain multiple expression types status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/nobots.json config_test.go:319: config is not valid: config: must define at least one (1) bot rule status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/nobots.yaml config_test.go:319: config is not valid: config: must define at least one (1) bot rule status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/regex_ends_newline.json config_test.go:319: config is not valid: config: bot entry for "user-agent-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): user agent regex: "Mozilla\n" config: bot entry for "path-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): path regex: "^/evil/.*$\n" config: bot entry for "headers-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): header CF-Worker regex: ".*\n" status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/regex_ends_newline.yaml config_test.go:319: config is not valid: config: bot entry for "user-agent-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): user agent regex: "Mozilla\n" config: bot entry for "path-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): path regex: "^/evil/.*$\n" config: bot entry for "headers-ends-newline" is not valid: config.Bot: regular expression ends with newline (try >- instead of > in yaml): header CF-Worker regex: ".*\n" status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/status-codes-0.json config_test.go:319: config is not valid: status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 === RUN TestConfigValidBad/status-codes-0.yaml config_test.go:319: config is not valid: status codes not valid: config.StatusCode: status code not valid, must be between 100 and 599: challenge is 0 config.StatusCode: status code not valid, must be between 100 and 599: deny is 0 --- PASS: TestConfigValidBad (0.00s) --- PASS: TestConfigValidBad/badregexes.json (0.00s) --- PASS: TestConfigValidBad/badregexes.yaml (0.00s) --- PASS: TestConfigValidBad/import_and_bot.json (0.00s) --- PASS: TestConfigValidBad/import_and_bot.yaml (0.00s) --- PASS: TestConfigValidBad/import_invalid_file.json (0.00s) --- PASS: TestConfigValidBad/import_invalid_file.yaml (0.00s) --- PASS: TestConfigValidBad/invalid.json (0.00s) --- PASS: TestConfigValidBad/invalid.yaml (0.00s) --- PASS: TestConfigValidBad/multiple_expression_types.json (0.00s) --- PASS: TestConfigValidBad/multiple_expression_types.yaml (0.00s) --- PASS: TestConfigValidBad/nobots.json (0.00s) --- PASS: TestConfigValidBad/nobots.yaml (0.00s) --- PASS: TestConfigValidBad/regex_ends_newline.json (0.00s) --- PASS: TestConfigValidBad/regex_ends_newline.yaml (0.00s) --- PASS: TestConfigValidBad/status-codes-0.json (0.00s) --- PASS: TestConfigValidBad/status-codes-0.yaml (0.00s) === RUN TestBotConfigZero --- PASS: TestBotConfigZero (0.00s) === RUN TestExpressionOrListUnmarshal === RUN TestExpressionOrListUnmarshal/simple === RUN TestExpressionOrListUnmarshal/object-and === RUN TestExpressionOrListUnmarshal/object-or === RUN TestExpressionOrListUnmarshal/both-or-and === RUN TestExpressionOrListUnmarshal/expression-empty --- PASS: TestExpressionOrListUnmarshal (0.00s) --- PASS: TestExpressionOrListUnmarshal/simple (0.00s) --- PASS: TestExpressionOrListUnmarshal/object-and (0.00s) --- PASS: TestExpressionOrListUnmarshal/object-or (0.00s) --- PASS: TestExpressionOrListUnmarshal/both-or-and (0.00s) --- PASS: TestExpressionOrListUnmarshal/expression-empty (0.00s) PASS ok github.com/TecharoHQ/anubis/lib/policy/config 0.028s === RUN TestHTTPHeaders === RUN TestHTTPHeaders/contains-existing-header === RUN TestHTTPHeaders/not-contains-missing-header === RUN TestHTTPHeaders/get-existing-header === RUN TestHTTPHeaders/not-get-missing-header --- PASS: TestHTTPHeaders (0.00s) --- PASS: TestHTTPHeaders/contains-existing-header (0.00s) --- PASS: TestHTTPHeaders/not-contains-missing-header (0.00s) --- PASS: TestHTTPHeaders/get-existing-header (0.00s) --- PASS: TestHTTPHeaders/not-get-missing-header (0.00s) === RUN TestJoin === RUN TestJoin/no-clauses === RUN TestJoin/one-clause-identity === RUN TestJoin/multi-clause-and === RUN TestJoin/multi-clause-or === RUN TestJoin/git-user-agent --- PASS: TestJoin (0.00s) --- PASS: TestJoin/no-clauses (0.00s) --- PASS: TestJoin/one-clause-identity (0.00s) --- PASS: TestJoin/multi-clause-and (0.00s) --- PASS: TestJoin/multi-clause-or (0.00s) --- PASS: TestJoin/git-user-agent (0.00s) === RUN TestURLValues === RUN TestURLValues/contains-existing-key === RUN TestURLValues/not-contains-missing-key === RUN TestURLValues/get-existing-key === RUN TestURLValues/not-get-missing-key --- PASS: TestURLValues (0.00s) --- PASS: TestURLValues/contains-existing-key (0.00s) --- PASS: TestURLValues/not-contains-missing-key (0.00s) --- PASS: TestURLValues/get-existing-key (0.00s) --- PASS: TestURLValues/not-get-missing-key (0.00s) PASS ok github.com/TecharoHQ/anubis/lib/policy/expressions 0.014s ? github.com/TecharoHQ/anubis/web [no test files] ? github.com/TecharoHQ/anubis/xess [no test files] >>> anubis: Entering fakeroot... >>> anubis-doc*: Running split function doc... 'usr/share/licenses' -> '/home/buildozer/aports/testing/anubis/pkg/anubis-doc/usr/share/licenses' >>> anubis-doc*: Preparing subpackage anubis-doc... >>> anubis-doc*: Running postcheck for anubis-doc >>> anubis-openrc*: Running split function openrc... 'etc/conf.d' -> '/home/buildozer/aports/testing/anubis/pkg/anubis-openrc/etc/conf.d' 'etc/init.d' -> '/home/buildozer/aports/testing/anubis/pkg/anubis-openrc/etc/init.d' >>> anubis-openrc*: Preparing subpackage anubis-openrc... >>> anubis-openrc*: Running postcheck for anubis-openrc >>> anubis*: Running postcheck for anubis >>> anubis*: Preparing package anubis... >>> anubis*: Stripping binaries >>> anubis-doc*: Scanning shared objects >>> anubis-openrc*: Scanning shared objects >>> anubis*: Scanning shared objects >>> anubis-doc*: Tracing dependencies... >>> anubis-doc*: Package size: 1.0 KB >>> anubis-doc*: Compressing data... >>> anubis-doc*: Create checksum... >>> anubis-doc*: Create anubis-doc-1.19.1-r0.apk >>> anubis-openrc*: Tracing dependencies... >>> anubis-openrc*: Package size: 294.0 B >>> anubis-openrc*: Compressing data... >>> anubis-openrc*: Create checksum... >>> anubis-openrc*: Create anubis-openrc-1.19.1-r0.apk >>> anubis*: Tracing dependencies... so:libc.musl-x86_64.so.1 >>> anubis*: Package size: 16.4 MB >>> anubis*: Compressing data... >>> anubis*: Create checksum... >>> anubis*: Create anubis-1.19.1-r0.apk >>> anubis: Build complete at Mon, 02 Jun 2025 10:58:54 +0000 elapsed time 0h 0m 18s >>> anubis: Cleaning up srcdir >>> anubis: Cleaning up pkgdir >>> anubis: Uninstalling dependencies... (1/2) Purging .makedepends-anubis (20250602.105838) (2/2) Purging go (1.24.3-r1) Executing busybox-1.37.0-r18.trigger OK: 400 MiB in 106 packages >>> anubis: Updating the testing/x86_64 repository index... >>> anubis: Signing the index...