|
1 | 1 | # @summary |
2 | 2 | # Installs and configures `mod_security`. |
3 | | -# |
| 3 | +# |
4 | 4 | # @param version |
5 | 5 | # Manage mod_security or mod_security2 |
6 | 6 | # |
7 | 7 | # @param logroot |
8 | 8 | # Configures the location of audit and debug logs. |
9 | | -# |
| 9 | +# |
10 | 10 | # @param crs_package |
11 | 11 | # Name of package that installs CRS rules. |
12 | | -# |
| 12 | +# |
13 | 13 | # @param activated_rules |
14 | 14 | # An array of rules from the modsec_crs_path or absolute to activate via symlinks. |
15 | 15 | # |
16 | 16 | # @param custom_rules |
17 | | -# |
| 17 | +# |
18 | 18 | # @param custom_rules_set |
19 | 19 | # |
20 | 20 | # @param modsec_dir |
21 | 21 | # Defines the path where Puppet installs the modsec configuration and activated rules links. |
22 | | -# |
| 22 | +# |
23 | 23 | # @param modsec_secruleengine |
24 | 24 | # Configures the rules engine. |
25 | | -# |
| 25 | +# |
26 | 26 | # @param audit_log_relevant_status |
27 | 27 | # Configures which response status code is to be considered relevant for the purpose of audit logging. |
28 | | -# |
| 28 | +# |
29 | 29 | # @param audit_log_parts |
30 | 30 | # Defines which parts of each transaction are going to be recorded in the audit log. Each part is assigned a single letter; when a |
31 | 31 | # letter appears in the list then the equivalent part will be recorded. |
32 | | -# |
| 32 | +# |
33 | 33 | # @param audit_log_type |
34 | 34 | # Defines the type of audit logging mechanism to be used. |
35 | | -# |
| 35 | +# |
36 | 36 | # @param audit_log_storage_dir |
37 | 37 | # Defines the directory where concurrent audit log entries are to be stored. This directive is only needed when concurrent audit logging is used. |
38 | | -# |
| 38 | +# |
| 39 | +# @param debug_log_level |
| 40 | +# Defines the level of debug logging mechanism to be used. Values can be set from 0 to 9, with 9 being the maximum version of information logged. |
| 41 | +# |
39 | 42 | # @param secpcrematchlimit |
40 | 43 | # Sets the match limit in the PCRE library. |
41 | | -# |
| 44 | +# |
42 | 45 | # @param secpcrematchlimitrecursion |
43 | 46 | # Sets the match limit recursion in the PCRE library. |
44 | | -# |
| 47 | +# |
45 | 48 | # @param allowed_methods |
46 | 49 | # A space-separated list of allowed HTTP methods. |
47 | | -# |
| 50 | +# |
48 | 51 | # @param content_types |
49 | 52 | # A list of one or more allowed MIME types. |
50 | | -# |
| 53 | +# |
51 | 54 | # @param restricted_extensions |
52 | 55 | # A space-sparated list of prohibited file extensions. |
53 | | -# |
| 56 | +# |
54 | 57 | # @param restricted_headers |
55 | 58 | # A list of restricted headers separated by slashes and spaces. |
56 | | -# |
| 59 | +# |
57 | 60 | # @param secdefaultaction |
58 | 61 | # Defines the default list of actions, which will be inherited by the rules in the same configuration context. |
59 | | -# |
| 62 | +# |
60 | 63 | # @param inbound_anomaly_threshold |
61 | 64 | # Sets the scoring threshold level of the inbound blocking rules for the Collaborative Detection Mode in the OWASP ModSecurity Core Rule Set. |
62 | | -# |
| 65 | +# |
63 | 66 | # @param outbound_anomaly_threshold |
64 | 67 | # Sets the scoring threshold level of the outbound blocking rules for the Collaborative Detection Mode in the OWASP ModSecurity Core Rule Set. |
65 | | -# |
| 68 | +# |
66 | 69 | # @param critical_anomaly_score |
67 | 70 | # Sets the Anomaly Score for rules assigned with a critical severity. |
68 | | -# |
| 71 | +# |
69 | 72 | # @param error_anomaly_score |
70 | 73 | # Sets the Anomaly Score for rules assigned with a error severity. |
71 | | -# |
| 74 | +# |
72 | 75 | # @param warning_anomaly_score |
73 | 76 | # Sets the Anomaly Score for rules assigned with a warning severity. |
74 | | -# |
| 77 | +# |
75 | 78 | # @param notice_anomaly_score |
76 | 79 | # Sets the Anomaly Score for rules assigned with a notice severity. |
77 | | -# |
| 80 | +# |
78 | 81 | # @param paranoia_level |
79 | 82 | # Sets the paranoia level in the OWASP ModSecurity Core Rule Set. |
80 | | -# |
| 83 | +# |
81 | 84 | # @param executing_paranoia_level |
82 | 85 | # Sets the executing paranoia level in the OWASP ModSecurity Core Rule Set. |
83 | 86 | # The default is equal to, and cannot be lower than, $paranoia_level. |
84 | | -# |
| 87 | +# |
85 | 88 | # @param secrequestmaxnumargs |
86 | 89 | # Sets the maximum number of arguments in the request. |
87 | | -# |
| 90 | +# |
88 | 91 | # @param secrequestbodylimit |
89 | 92 | # Sets the maximum request body size ModSecurity will accept for buffering. |
90 | | -# |
| 93 | +# |
91 | 94 | # @param secrequestbodynofileslimit |
92 | | -# Configures the maximum request body size ModSecurity will accept for buffering, excluding the size of any files being transported |
| 95 | +# Configures the maximum request body size ModSecurity will accept for buffering, excluding the size of any files being transported |
93 | 96 | # in the request. |
94 | | -# |
| 97 | +# |
95 | 98 | # @param secrequestbodyinmemorylimit |
96 | 99 | # Configures the maximum request body size that ModSecurity will store in memory. |
97 | | -# |
| 100 | +# |
98 | 101 | # @param secrequestbodyaccess |
99 | 102 | # Toggle SecRequestBodyAccess On or Off |
100 | | -# |
| 103 | +# |
101 | 104 | # @param secrequestbodylimitaction |
102 | 105 | # Controls what happens once a request body limit, configured with |
103 | 106 | # SecRequestBodyLimit, is encountered |
104 | | -# |
| 107 | +# |
105 | 108 | # @param secresponsebodyaccess |
106 | 109 | # Toggle SecResponseBodyAccess On or Off |
107 | 110 | # |
108 | 111 | # @param secresponsebodylimitaction |
109 | 112 | # Controls what happens once a response body limit, configured with |
110 | | -# SecResponseBodyLimitAction, is encountered. |
111 | | -# |
| 113 | +# SecResponseBodyLimitAction, is encountered. |
| 114 | +# |
112 | 115 | # @param manage_security_crs |
113 | | -# Toggles whether to manage ModSecurity Core Rule Set |
| 116 | +# Toggles whether to manage ModSecurity Core Rule Set |
114 | 117 | # |
115 | 118 | # @param enable_dos_protection |
116 | 119 | # Toggles the optional OWASP ModSecurity Core Rule Set DOS protection rule |
|
144 | 147 | String $audit_log_parts = $apache::params::modsec_audit_log_parts, |
145 | 148 | String $audit_log_type = $apache::params::modsec_audit_log_type, |
146 | 149 | Optional[Stdlib::Absolutepath] $audit_log_storage_dir = undef, |
| 150 | + Integer[0,9] $debug_log_level = 0, |
147 | 151 | Integer $secpcrematchlimit = $apache::params::secpcrematchlimit, |
148 | 152 | Integer $secpcrematchlimitrecursion = $apache::params::secpcrematchlimitrecursion, |
149 | 153 | String $allowed_methods = 'GET HEAD POST OPTIONS', |
|
231 | 235 | # - $audit_log_parts |
232 | 236 | # - $audit_log_type |
233 | 237 | # - $audit_log_storage_dir |
| 238 | + # - $debug_log_level |
234 | 239 | # - secpcrematchlimit |
235 | 240 | # - secpcrematchlimitrecursion |
236 | 241 | # - secrequestbodylimit |
|
257 | 262 | 'audit_log_parts' => $audit_log_parts, |
258 | 263 | 'audit_log_type' => $audit_log_type, |
259 | 264 | 'audit_log_storage_dir' => $audit_log_storage_dir, |
| 265 | + 'debug_log_level' => $debug_log_level, |
260 | 266 | 'logroot' => $logroot, |
261 | 267 | } |
262 | 268 |
|
|
0 commit comments