Merge pull request #4087 from MRoci/master
Define Modsecurity Snippet via ConfigMap
This commit is contained in:
commit
fb025ab501
4 changed files with 54 additions and 0 deletions
|
@ -35,6 +35,7 @@ The following table shows a configuration option's name, type, and the default v
|
||||||
|[enable-access-log-for-default-backend](#enable-access-log-for-default-backend)|bool|"false"|
|
|[enable-access-log-for-default-backend](#enable-access-log-for-default-backend)|bool|"false"|
|
||||||
|[error-log-path](#error-log-path)|string|"/var/log/nginx/error.log"|
|
|[error-log-path](#error-log-path)|string|"/var/log/nginx/error.log"|
|
||||||
|[enable-modsecurity](#enable-modsecurity)|bool|"false"|
|
|[enable-modsecurity](#enable-modsecurity)|bool|"false"|
|
||||||
|
|[modsecurity-snippet](#modsecurity-snippet)|string|""|
|
||||||
|[enable-owasp-modsecurity-crs](#enable-owasp-modsecurity-crs)|bool|"false"|
|
|[enable-owasp-modsecurity-crs](#enable-owasp-modsecurity-crs)|bool|"false"|
|
||||||
|[client-header-buffer-size](#client-header-buffer-size)|string|"1k"|
|
|[client-header-buffer-size](#client-header-buffer-size)|string|"1k"|
|
||||||
|[client-header-timeout](#client-header-timeout)|int|60|
|
|[client-header-timeout](#client-header-timeout)|int|60|
|
||||||
|
@ -221,6 +222,10 @@ Enables the modsecurity module for NGINX. _**default:**_ is disabled
|
||||||
|
|
||||||
Enables the OWASP ModSecurity Core Rule Set (CRS). _**default:**_ is disabled
|
Enables the OWASP ModSecurity Core Rule Set (CRS). _**default:**_ is disabled
|
||||||
|
|
||||||
|
## modsecurity-snippet
|
||||||
|
|
||||||
|
Adds custom rules to modsecurity section of nginx configration
|
||||||
|
|
||||||
## client-header-buffer-size
|
## client-header-buffer-size
|
||||||
|
|
||||||
Allows to configure a custom buffer size for reading client request header.
|
Allows to configure a custom buffer size for reading client request header.
|
||||||
|
|
|
@ -133,6 +133,9 @@ type Configuration struct {
|
||||||
// By default this is disabled
|
// By default this is disabled
|
||||||
EnableOWASPCoreRules bool `json:"enable-owasp-modsecurity-crs"`
|
EnableOWASPCoreRules bool `json:"enable-owasp-modsecurity-crs"`
|
||||||
|
|
||||||
|
// ModSecuritySnippet adds custom rules to modsecurity section of nginx configuration
|
||||||
|
ModsecuritySnippet string `json:"modsecurity-snippet"`
|
||||||
|
|
||||||
// ClientHeaderBufferSize allows to configure a custom buffer
|
// ClientHeaderBufferSize allows to configure a custom buffer
|
||||||
// size for reading client request header
|
// size for reading client request header
|
||||||
// http://nginx.org/en/docs/http/ngx_http_core_module.html#client_header_buffer_size
|
// http://nginx.org/en/docs/http/ngx_http_core_module.html#client_header_buffer_size
|
||||||
|
|
|
@ -143,6 +143,10 @@ http {
|
||||||
|
|
||||||
{{ if $all.Cfg.EnableOWASPCoreRules }}
|
{{ if $all.Cfg.EnableOWASPCoreRules }}
|
||||||
modsecurity_rules_file /etc/nginx/owasp-modsecurity-crs/nginx-modsecurity.conf;
|
modsecurity_rules_file /etc/nginx/owasp-modsecurity-crs/nginx-modsecurity.conf;
|
||||||
|
{{ else if (not (empty $all.Cfg.ModsecuritySnippet)) }}
|
||||||
|
modsecurity_rules '
|
||||||
|
{{ $all.Cfg.ModsecuritySnippet }}
|
||||||
|
';
|
||||||
{{ end }}
|
{{ end }}
|
||||||
|
|
||||||
{{ end }}
|
{{ end }}
|
||||||
|
|
42
test/e2e/settings/modsecurity_snippet.go
Normal file
42
test/e2e/settings/modsecurity_snippet.go
Normal file
|
@ -0,0 +1,42 @@
|
||||||
|
/*
|
||||||
|
Copyright 2018 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package settings
|
||||||
|
|
||||||
|
import (
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
. "github.com/onsi/ginkgo"
|
||||||
|
|
||||||
|
"k8s.io/ingress-nginx/test/e2e/framework"
|
||||||
|
)
|
||||||
|
|
||||||
|
var _ = framework.IngressNginxDescribe("Modsecurity Snippet", func() {
|
||||||
|
f := framework.NewDefaultFramework("modsecurity-snippet")
|
||||||
|
|
||||||
|
It("should add value of modsecurity-snippet setting to nginx config", func() {
|
||||||
|
modsecSnippet := "modsecurity-snippet"
|
||||||
|
expectedComment := "# modsecurity snippet"
|
||||||
|
|
||||||
|
f.UpdateNginxConfigMapData("enable-modsecurity", "true")
|
||||||
|
f.UpdateNginxConfigMapData(modsecSnippet, expectedComment)
|
||||||
|
|
||||||
|
f.WaitForNginxConfiguration(
|
||||||
|
func(cfg string) bool {
|
||||||
|
return strings.Contains(cfg, expectedComment)
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
Loading…
Reference in a new issue