|
1 | 1 | # @summary
|
2 | 2 | # Installs and configures `mod_security`.
|
3 |
| -# |
| 3 | +# |
4 | 4 | # @param version
|
5 | 5 | # Manage mod_security or mod_security2
|
6 | 6 | #
|
7 | 7 | # @param logroot
|
8 | 8 | # Configures the location of audit and debug logs.
|
9 |
| -# |
| 9 | +# |
10 | 10 | # @param crs_package
|
11 | 11 | # Name of package that installs CRS rules.
|
12 |
| -# |
| 12 | +# |
13 | 13 | # @param activated_rules
|
14 | 14 | # An array of rules from the modsec_crs_path or absolute to activate via symlinks.
|
15 | 15 | #
|
16 | 16 | # @param custom_rules
|
17 |
| -# |
| 17 | +# |
18 | 18 | # @param custom_rules_set
|
19 | 19 | #
|
20 | 20 | # @param modsec_dir
|
21 | 21 | # Defines the path where Puppet installs the modsec configuration and activated rules links.
|
22 |
| -# |
| 22 | +# |
23 | 23 | # @param modsec_secruleengine
|
24 | 24 | # Configures the rules engine.
|
25 |
| -# |
| 25 | +# |
26 | 26 | # @param audit_log_relevant_status
|
27 | 27 | # Configures which response status code is to be considered relevant for the purpose of audit logging.
|
28 |
| -# |
| 28 | +# |
29 | 29 | # @param audit_log_parts
|
30 | 30 | # Defines which parts of each transaction are going to be recorded in the audit log. Each part is assigned a single letter; when a
|
31 | 31 | # letter appears in the list then the equivalent part will be recorded.
|
32 |
| -# |
| 32 | +# |
33 | 33 | # @param audit_log_type
|
34 | 34 | # Defines the type of audit logging mechanism to be used.
|
35 |
| -# |
| 35 | +# |
36 | 36 | # @param audit_log_storage_dir
|
37 | 37 | # Defines the directory where concurrent audit log entries are to be stored. This directive is only needed when concurrent audit logging is used.
|
38 |
| -# |
| 38 | +# |
| 39 | +# @param debug_log_level |
| 40 | +# Defines the level of debug logging mechanism to be used. Values can be set from 0 to 9, with 9 being the maximum version of information logged. |
| 41 | +# |
39 | 42 | # @param secpcrematchlimit
|
40 | 43 | # Sets the match limit in the PCRE library.
|
41 |
| -# |
| 44 | +# |
42 | 45 | # @param secpcrematchlimitrecursion
|
43 | 46 | # Sets the match limit recursion in the PCRE library.
|
44 |
| -# |
| 47 | +# |
45 | 48 | # @param allowed_methods
|
46 | 49 | # A space-separated list of allowed HTTP methods.
|
47 |
| -# |
| 50 | +# |
48 | 51 | # @param content_types
|
49 | 52 | # A list of one or more allowed MIME types.
|
50 |
| -# |
| 53 | +# |
51 | 54 | # @param restricted_extensions
|
52 | 55 | # A space-sparated list of prohibited file extensions.
|
53 |
| -# |
| 56 | +# |
54 | 57 | # @param restricted_headers
|
55 | 58 | # A list of restricted headers separated by slashes and spaces.
|
56 |
| -# |
| 59 | +# |
57 | 60 | # @param secdefaultaction
|
58 | 61 | # Defines the default list of actions, which will be inherited by the rules in the same configuration context.
|
59 |
| -# |
| 62 | +# |
60 | 63 | # @param inbound_anomaly_threshold
|
61 | 64 | # Sets the scoring threshold level of the inbound blocking rules for the Collaborative Detection Mode in the OWASP ModSecurity Core Rule Set.
|
62 |
| -# |
| 65 | +# |
63 | 66 | # @param outbound_anomaly_threshold
|
64 | 67 | # Sets the scoring threshold level of the outbound blocking rules for the Collaborative Detection Mode in the OWASP ModSecurity Core Rule Set.
|
65 |
| -# |
| 68 | +# |
66 | 69 | # @param critical_anomaly_score
|
67 | 70 | # Sets the Anomaly Score for rules assigned with a critical severity.
|
68 |
| -# |
| 71 | +# |
69 | 72 | # @param error_anomaly_score
|
70 | 73 | # Sets the Anomaly Score for rules assigned with a error severity.
|
71 |
| -# |
| 74 | +# |
72 | 75 | # @param warning_anomaly_score
|
73 | 76 | # Sets the Anomaly Score for rules assigned with a warning severity.
|
74 |
| -# |
| 77 | +# |
75 | 78 | # @param notice_anomaly_score
|
76 | 79 | # Sets the Anomaly Score for rules assigned with a notice severity.
|
77 |
| -# |
| 80 | +# |
78 | 81 | # @param paranoia_level
|
79 | 82 | # Sets the paranoia level in the OWASP ModSecurity Core Rule Set.
|
80 |
| -# |
| 83 | +# |
81 | 84 | # @param executing_paranoia_level
|
82 | 85 | # Sets the executing paranoia level in the OWASP ModSecurity Core Rule Set.
|
83 | 86 | # The default is equal to, and cannot be lower than, $paranoia_level.
|
84 |
| -# |
| 87 | +# |
85 | 88 | # @param secrequestmaxnumargs
|
86 | 89 | # Sets the maximum number of arguments in the request.
|
87 |
| -# |
| 90 | +# |
88 | 91 | # @param secrequestbodylimit
|
89 | 92 | # Sets the maximum request body size ModSecurity will accept for buffering.
|
90 |
| -# |
| 93 | +# |
91 | 94 | # @param secrequestbodynofileslimit
|
92 |
| -# Configures the maximum request body size ModSecurity will accept for buffering, excluding the size of any files being transported |
| 95 | +# Configures the maximum request body size ModSecurity will accept for buffering, excluding the size of any files being transported |
93 | 96 | # in the request.
|
94 |
| -# |
| 97 | +# |
95 | 98 | # @param secrequestbodyinmemorylimit
|
96 | 99 | # Configures the maximum request body size that ModSecurity will store in memory.
|
97 |
| -# |
| 100 | +# |
98 | 101 | # @param secrequestbodyaccess
|
99 | 102 | # Toggle SecRequestBodyAccess On or Off
|
100 |
| -# |
| 103 | +# |
101 | 104 | # @param secrequestbodylimitaction
|
102 | 105 | # Controls what happens once a request body limit, configured with
|
103 | 106 | # SecRequestBodyLimit, is encountered
|
104 |
| -# |
| 107 | +# |
105 | 108 | # @param secresponsebodyaccess
|
106 | 109 | # Toggle SecResponseBodyAccess On or Off
|
107 | 110 | #
|
108 | 111 | # @param secresponsebodylimitaction
|
109 | 112 | # Controls what happens once a response body limit, configured with
|
110 |
| -# SecResponseBodyLimitAction, is encountered. |
111 |
| -# |
| 113 | +# SecResponseBodyLimitAction, is encountered. |
| 114 | +# |
112 | 115 | # @param manage_security_crs
|
113 |
| -# Toggles whether to manage ModSecurity Core Rule Set |
| 116 | +# Toggles whether to manage ModSecurity Core Rule Set |
114 | 117 | #
|
115 | 118 | # @param enable_dos_protection
|
116 | 119 | # Toggles the optional OWASP ModSecurity Core Rule Set DOS protection rule
|
|
144 | 147 | String $audit_log_parts = $apache::params::modsec_audit_log_parts,
|
145 | 148 | String $audit_log_type = $apache::params::modsec_audit_log_type,
|
146 | 149 | Optional[Stdlib::Absolutepath] $audit_log_storage_dir = undef,
|
| 150 | + Integer[0,9] $debug_log_level = 0, |
147 | 151 | Integer $secpcrematchlimit = $apache::params::secpcrematchlimit,
|
148 | 152 | Integer $secpcrematchlimitrecursion = $apache::params::secpcrematchlimitrecursion,
|
149 | 153 | String $allowed_methods = 'GET HEAD POST OPTIONS',
|
|
231 | 235 | # - $audit_log_parts
|
232 | 236 | # - $audit_log_type
|
233 | 237 | # - $audit_log_storage_dir
|
| 238 | + # - $debug_log_level |
234 | 239 | # - secpcrematchlimit
|
235 | 240 | # - secpcrematchlimitrecursion
|
236 | 241 | # - secrequestbodylimit
|
|
257 | 262 | 'audit_log_parts' => $audit_log_parts,
|
258 | 263 | 'audit_log_type' => $audit_log_type,
|
259 | 264 | 'audit_log_storage_dir' => $audit_log_storage_dir,
|
| 265 | + 'debug_log_level' => $debug_log_level, |
260 | 266 | 'logroot' => $logroot,
|
261 | 267 | }
|
262 | 268 |
|
|
0 commit comments