Diff of the two buildlogs: -- --- b1/build.log 2024-04-28 17:45:30.038626158 +0000 +++ b2/build.log 2024-04-28 17:46:26.192232206 +0000 @@ -1,6 +1,6 @@ I: pbuilder: network access will be disabled during build -I: Current time: Sat May 31 12:07:46 -12 2025 -I: pbuilder-time-stamp: 1748736466 +I: Current time: Mon Apr 29 07:45:32 +14 2024 +I: pbuilder-time-stamp: 1714326332 I: Building the build Environment I: extracting base tarball [/var/cache/pbuilder/trixie-reproducible-base.tgz] I: copying local configuration @@ -30,54 +30,86 @@ dpkg-source: info: applying 03-fix-library-path.patch I: Not using root during the build. I: Installing the build-deps -I: user script /srv/workspace/pbuilder/128717/tmp/hooks/D02_print_environment starting +I: user script /srv/workspace/pbuilder/28053/tmp/hooks/D01_modify_environment starting +debug: Running on ionos2-i386. +I: Changing host+domainname to test build reproducibility +I: Adding a custom variable just for the fun of it... +I: Changing /bin/sh to bash +'/bin/sh' -> '/bin/bash' +lrwxrwxrwx 1 root root 9 Apr 28 17:45 /bin/sh -> /bin/bash +I: Setting pbuilder2's login shell to /bin/bash +I: Setting pbuilder2's GECOS to second user,second room,second work-phone,second home-phone,second other +I: user script /srv/workspace/pbuilder/28053/tmp/hooks/D01_modify_environment finished +I: user script /srv/workspace/pbuilder/28053/tmp/hooks/D02_print_environment starting I: set - BUILDDIR='/build/reproducible-path' - BUILDUSERGECOS='first user,first room,first work-phone,first home-phone,first other' - BUILDUSERNAME='pbuilder1' - BUILD_ARCH='i386' - DEBIAN_FRONTEND='noninteractive' - DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all parallel=22 ' - DISTRIBUTION='trixie' - HOME='/root' - HOST_ARCH='i386' + BASH=/bin/sh + BASHOPTS=checkwinsize:cmdhist:complete_fullquote:extquote:force_fignore:globasciiranges:globskipdots:hostcomplete:interactive_comments:patsub_replacement:progcomp:promptvars:sourcepath + BASH_ALIASES=() + BASH_ARGC=() + BASH_ARGV=() + BASH_CMDS=() + BASH_LINENO=([0]="12" [1]="0") + BASH_LOADABLES_PATH=/usr/local/lib/bash:/usr/lib/bash:/opt/local/lib/bash:/usr/pkg/lib/bash:/opt/pkg/lib/bash:. + BASH_SOURCE=([0]="/tmp/hooks/D02_print_environment" [1]="/tmp/hooks/D02_print_environment") + BASH_VERSINFO=([0]="5" [1]="2" [2]="21" [3]="1" [4]="release" [5]="i686-pc-linux-gnu") + BASH_VERSION='5.2.21(1)-release' + BUILDDIR=/build/reproducible-path + BUILDUSERGECOS='second user,second room,second work-phone,second home-phone,second other' + BUILDUSERNAME=pbuilder2 + BUILD_ARCH=i386 + DEBIAN_FRONTEND=noninteractive + DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all parallel=10 ' + DIRSTACK=() + DISTRIBUTION=trixie + EUID=0 + FUNCNAME=([0]="Echo" [1]="main") + GROUPS=() + HOME=/root + HOSTNAME=i-capture-the-hostname + HOSTTYPE=i686 + HOST_ARCH=i386 IFS=' ' - INVOCATION_ID='9e1575ba18c24473a7938a6c7f4f8b81' - LANG='C' - LANGUAGE='en_US:en' - LC_ALL='C' - LD_LIBRARY_PATH='/usr/lib/libeatmydata' - LD_PRELOAD='libeatmydata.so' - MAIL='/var/mail/root' - OPTIND='1' - PATH='/usr/sbin:/usr/bin:/sbin:/bin:/usr/games' - PBCURRENTCOMMANDLINEOPERATION='build' - PBUILDER_OPERATION='build' - PBUILDER_PKGDATADIR='/usr/share/pbuilder' - PBUILDER_PKGLIBDIR='/usr/lib/pbuilder' - PBUILDER_SYSCONFDIR='/etc' - PPID='128717' - PS1='# ' - PS2='> ' + INVOCATION_ID=5b69f07decc14453be1b217fe112cda1 + LANG=C + LANGUAGE=de_CH:de + LC_ALL=C + LD_LIBRARY_PATH=/usr/lib/libeatmydata + LD_PRELOAD=libeatmydata.so + MACHTYPE=i686-pc-linux-gnu + MAIL=/var/mail/root + OPTERR=1 + OPTIND=1 + OSTYPE=linux-gnu + PATH=/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path + PBCURRENTCOMMANDLINEOPERATION=build + PBUILDER_OPERATION=build + PBUILDER_PKGDATADIR=/usr/share/pbuilder + PBUILDER_PKGLIBDIR=/usr/lib/pbuilder + PBUILDER_SYSCONFDIR=/etc + PIPESTATUS=([0]="0") + POSIXLY_CORRECT=y + PPID=28053 PS4='+ ' - PWD='/' - SHELL='/bin/bash' - SHLVL='2' - SUDO_COMMAND='/usr/bin/timeout -k 18.1h 18h /usr/bin/ionice -c 3 /usr/bin/nice /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.Joa7aUW8/pbuilderrc_O8uw --distribution trixie --hookdir /etc/pbuilder/first-build-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/trixie-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.Joa7aUW8/b1 --logfile b1/build.log ruby-secure-headers_6.3.2-2.dsc' - SUDO_GID='112' - SUDO_UID='107' - SUDO_USER='jenkins' - TERM='unknown' - TZ='/usr/share/zoneinfo/Etc/GMT+12' - USER='root' - _='/usr/bin/systemd-run' - http_proxy='http://213.165.73.152:3128' + PWD=/ + SHELL=/bin/bash + SHELLOPTS=braceexpand:errexit:hashall:interactive-comments:posix + SHLVL=3 + SUDO_COMMAND='/usr/bin/timeout -k 24.1h 24h /usr/bin/ionice -c 3 /usr/bin/nice -n 11 /usr/bin/unshare --uts -- /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.Joa7aUW8/pbuilderrc_IKCn --distribution trixie --hookdir /etc/pbuilder/rebuild-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/trixie-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.Joa7aUW8/b2 --logfile b2/build.log ruby-secure-headers_6.3.2-2.dsc' + SUDO_GID=112 + SUDO_UID=107 + SUDO_USER=jenkins + TERM=unknown + TZ=/usr/share/zoneinfo/Etc/GMT-14 + UID=0 + USER=root + _='I: set' + http_proxy=http://46.16.76.132:3128 I: uname -a - Linux ionos6-i386 6.1.0-20-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.85-1 (2024-04-11) x86_64 GNU/Linux + Linux i-capture-the-hostname 6.1.0-20-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.85-1 (2024-04-11) x86_64 GNU/Linux I: ls -l /bin - lrwxrwxrwx 1 root root 7 May 26 17:47 /bin -> usr/bin -I: user script /srv/workspace/pbuilder/128717/tmp/hooks/D02_print_environment finished + lrwxrwxrwx 1 root root 7 Apr 21 07:13 /bin -> usr/bin +I: user script /srv/workspace/pbuilder/28053/tmp/hooks/D02_print_environment finished -> Attempting to satisfy build-dependencies -> Creating pbuilder-satisfydepends-dummy package Package: pbuilder-satisfydepends-dummy @@ -414,7 +446,7 @@ Get: 155 http://deb.debian.org/debian trixie/main i386 ruby-rspec-mocks all 3.13.0c0e0m0s1-2 [81.3 kB] Get: 156 http://deb.debian.org/debian trixie/main i386 ruby-rspec all 3.13.0c0e0m0s1-2 [5184 B] Get: 157 http://deb.debian.org/debian trixie/main i386 ruby-useragent all 0.16.8-1.1 [12.0 kB] -Fetched 52.0 MB in 1s (76.2 MB/s) +Fetched 52.0 MB in 2s (31.0 MB/s) debconf: delaying package configuration, since apt-utils is not installed dpkg: libssl3:i386: dependency problems, but removing anyway as you requested: libkrb5-3:i386 depends on libssl3 (>= 3.0.0). @@ -940,8 +972,8 @@ Setting up tzdata (2024a-3) ... Current default time zone: 'Etc/UTC' -Local time is now: Sun Jun 1 00:08:16 UTC 2025. -Universal Time is now: Sun Jun 1 00:08:16 UTC 2025. +Local time is now: Sun Apr 28 17:46:06 UTC 2024. +Universal Time is now: Sun Apr 28 17:46:06 UTC 2024. Run 'dpkg-reconfigure tzdata' if you wish to change it. Setting up autotools-dev (20220109.1) ... @@ -1083,7 +1115,11 @@ Building tag database... -> Finished parsing the build-deps I: Building the package -I: Running cd /build/reproducible-path/ruby-secure-headers-6.3.2/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-buildpackage -us -uc -b && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-genchanges -S > ../ruby-secure-headers_6.3.2-2_source.changes +I: user script /srv/workspace/pbuilder/28053/tmp/hooks/A99_set_merged_usr starting +Not re-configuring usrmerge for trixie +I: user script /srv/workspace/pbuilder/28053/tmp/hooks/A99_set_merged_usr finished +hostname: Name or service not known +I: Running cd /build/reproducible-path/ruby-secure-headers-6.3.2/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path" HOME="/nonexistent/second-build" dpkg-buildpackage -us -uc -b && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path" HOME="/nonexistent/second-build" dpkg-genchanges -S > ../ruby-secure-headers_6.3.2-2_source.changes dpkg-buildpackage: info: source package ruby-secure-headers dpkg-buildpackage: info: source version 6.3.2-2 dpkg-buildpackage: info: source distribution unstable @@ -1111,7 +1147,7 @@ dh_prep -O--buildsystem=ruby dh_auto_install --destdir=debian/ruby-secure-headers/ -O--buildsystem=ruby dh_ruby --install /build/reproducible-path/ruby-secure-headers-6.3.2/debian/ruby-secure-headers -/usr/bin/ruby3.1 -S gem build --config-file /dev/null --verbose /tmp/d20250531-6593-6eax1l/gemspec +/usr/bin/ruby3.1 -S gem build --config-file /dev/null --verbose /tmp/d20240429-33070-fku9qi/gemspec Failed to load /dev/null because it doesn't contain valid YAML hash WARNING: license value 'Apache Public License 2.0' is invalid. Use a license identifier from http://spdx.org/licenses or 'Nonstandard' for a nonstandard license, @@ -1124,7 +1160,7 @@ Name: secure_headers Version: 6.3.2 File: secure_headers-6.3.2.gem -/usr/bin/ruby3.1 -S gem install --config-file /dev/null --verbose --local --verbose --no-document --ignore-dependencies --install-dir debian/ruby-secure-headers/usr/share/rubygems-integration/all /tmp/d20250531-6593-6eax1l/secure_headers-6.3.2.gem +/usr/bin/ruby3.1 -S gem install --config-file /dev/null --verbose --local --verbose --no-document --ignore-dependencies --install-dir debian/ruby-secure-headers/usr/share/rubygems-integration/all /tmp/d20240429-33070-fku9qi/secure_headers-6.3.2.gem Failed to load /dev/null because it doesn't contain valid YAML hash /build/reproducible-path/ruby-secure-headers-6.3.2/debian/ruby-secure-headers/usr/share/rubygems-integration/all/gems/secure_headers-6.3.2/lib/secure_headers.rb /build/reproducible-path/ruby-secure-headers-6.3.2/debian/ruby-secure-headers/usr/share/rubygems-integration/all/gems/secure_headers-6.3.2/lib/secure_headers/configuration.rb @@ -1181,120 +1217,202 @@ [Coveralls] Set up the SimpleCov formatter. [Coveralls] Using SimpleCov's default settings. -Randomized with seed 27156 +Randomized with seed 58542 -with an invalid configuration - raises an exception when both only and except filters are provided to SameSite configurations - raises an exception when both only and except filters are provided - raises an exception when both lax and strict only filters are provided to SameSite configurations - raises an exception when SameSite none and strict enforcement modes are configured with booleans - raises an exception when SameSite lax and strict enforcement modes are configured with booleans - raises an exception when SameSite lax and none enforcement modes are configured with booleans - raises an exception when both lax and strict only filters are provided to SameSite configurations - raises an exception when not configured with a Hash - raises an exception when configured without a boolean(true or OPT_OUT)/Hash - raises an exception when SameSite is not configured with a Hash - raises an exception when SameSite none and lax enforcement modes are configured with booleans - raises an exception when SameSite lax and strict enforcement modes are configured with booleans - raises an exception when configured with false - raises an exception when SameSite strict and none enforcement modes are configured with booleans - raises an exception when SameSite strict and lax enforcement modes are configured with booleans - -SecureHeaders::XPermittedCrossDomainPolicies - is expected to eq ["X-Permitted-Cross-Domain-Policies", "none"] - is expected to eq ["X-Permitted-Cross-Domain-Policies", "master-only"] - valid configuration values - accepts 'by-ftp-filename' - accepts 'by-content-type' - accepts 'master-only' - accepts nil - accepts 'all' - invlaid configuration values - doesn't accept invalid values - -SecureHeaders::XDownloadOptions - is expected to eq ["X-Download-Options", "noopen"] - is expected to eq ["X-Download-Options", "noopen"] - invalid configuration values - accepts nil - doesn't accept anything besides noopen - accepts noopen +SecureHeaders::XXssProtection + is expected to eq ["X-XSS-Protection", "1; mode=block"] + is expected to eq ["X-XSS-Protection", "1; mode=block; report=https://www.secure.com/reports"] + with invalid configuration + should raise an error when providing a string that is not valid + when using a hash value + should allow string values ('1' or '0' are the only valid strings) + should raise an error if mode != block + should raise an error if an invalid key is supplied + should raise an error if no value key is supplied -SecureHeaders::ExpectCertificateTransparency - is expected to eq "enforce, max-age=1234" - is expected to eq "max-age=1234" - is expected to eq "max-age=1234, report-uri=\"https://report-uri.io/expect-ct\"" - is expected to eq "max-age=1234" - is expected to eq "enforce, max-age=1234, report-uri=\"https://report-uri.io/expect-ct\"" - with an invalid configuration - raises an exception with an invalid enforce value - raises an exception with an invalid max-age - raises an exception when configuration isn't a hash - raises an exception when max-age is not provided +SecureHeaders::ClearSiteData + validate_config! + succeeds for opt-out config + fails for other types of config + succeeds for `true` config + fails for Array of non-String config + succeeds for Array of Strings config + succeeds for empty config + succeeds for `nil` config + make_header_value + returns a string of quoted values that are comma separated + make_header + returns nil with opt-out config + returns nil with nil config + returns nil with empty config + returns all types with `true` config + returns specified types SecureHeaders::Configuration + allows OPT_OUT has an 'noop' override + gives cookies a default config has a default config dup results in a copy of the default config - allows me to be explicit too deprecates the secure_cookies configuration - allows OPT_OUT - gives cookies a default config stores an override + allows me to be explicit too + #override + raises on configuring an existing override + raises when a named append with the given name exists #named_append raises when an override with the given name exists raises on configuring an existing append - #override - raises when a named append with the given name exists - raises on configuring an existing override -SecureHeaders::Middleware - respects overrides - sets the headers - uses named overrides - cookies - flags cookies with a combination of SameSite configurations - disables secure cookies for non-https requests - flags cookies from configuration - sets the secure cookie flag correctly on interleaved http/https requests - cookies - allows opting out of cookie protection with OPT_OUT alone - cookies should not be flagged - does not flags cookies as secure - cookies should be flagged - flags cookies as secure +SecureHeaders::ContentSecurityPolicy + #name + when in enforce mode + is expected to eq "Content-Security-Policy" + when in report-only mode + is expected to eq "Content-Security-Policy-Report-Only" + #value + includes navigate-to + supports strict-dynamic + supports style-src-elem directive + allows style as a require-sri-src + supports strict-dynamic and opting out of the appended 'unsafe-inline' + supports script-src-elem directive + does add a boolean directive if the value is true + removes http/s schemes from hosts + creates maximally strict sandbox policy when passed no sandbox token values + minifies source expressions based on overlapping wildcards + does not add a directive if the value is nil + creates maximally strict sandbox policy when passed true + does not add a boolean directive if the value is false + discards source expressions (besides unsafe-* and non-host source values) when * is present + uses a safe but non-breaking default value + does not remove schemes when :preserve_schemes is true + discards 'none' values if any other source expressions are present + creates sandbox policy when passed valid sandbox token values + does not build directives with a value of OPT_OUT (and bypasses directive requirements) + includes prefetch-src + allows script and style as a require-sri-src + deprecates and escapes semicolons in directive source lists + does not emit a warning when using frame-src + does not add a directive if the value is an empty array (or all nil) + removes nil from source lists + supports style-src-attr directive + deprecates and escapes semicolons in directive source lists + does not remove schemes from report-uri values + supports script-src-attr directive + allows script as a require-sri-src + deduplicates any source expressions -SecureHeaders::ViewHelpers - raises an error when using hashed content without precomputed hashes - raises an error when using previously unknown hashed content with precomputed hashes for a given file - avoids calling content_security_policy_nonce internally - adds known hash values to the corresponding headers when the helper is used - raises an error when using hashed content with precomputed hashes, but none for the given file +SecureHeaders::ReferrerPolicy + is expected to eq ["Referrer-Policy", "no-referrer"] + is expected to eq ["Referrer-Policy", "origin-when-cross-origin"] + is expected to eq ["Referrer-Policy", "origin-when-cross-origin, strict-origin-when-cross-origin"] + valid configuration values + accepts array of policy values + accepts 'origin' + accepts 'unsafe-url' + accepts 'origin-when-cross-origin' + accepts 'no-referrer' + accepts 'no-referrer-when-downgrade' + accepts 'strict-origin-when-cross-origin' + accepts 'same-origin' + accepts nil + accepts 'strict-origin' + invalid configuration values + doesn't accept invalid types + doesn't accept invalid values -SecureHeaders::StrictTransportSecurity - #value - is expected to eq ["Strict-Transport-Security", "max-age=631138519"] - is expected to eq ["Strict-Transport-Security", "max-age=1234; includeSubdomains; preload"] - with an invalid configuration - with a string argument - raises an exception with an invalid format - raises an exception with an invalid max-age - raises an exception if max-age is not supplied +SecureHeaders::XPermittedCrossDomainPolicies + is expected to eq ["X-Permitted-Cross-Domain-Policies", "none"] + is expected to eq ["X-Permitted-Cross-Domain-Policies", "master-only"] + invlaid configuration values + doesn't accept invalid values + valid configuration values + accepts 'master-only' + accepts nil + accepts 'by-ftp-filename' + accepts 'all' + accepts 'by-content-type' SecureHeaders::XContentTypeOptions #value is expected to eq ["X-Content-Type-Options", "nosniff"] is expected to eq ["X-Content-Type-Options", "nosniff"] invalid configuration values - doesn't accept anything besides no-sniff accepts nil + doesn't accept anything besides no-sniff accepts nosniff +SecureHeaders + raises a NotYetConfiguredError if trying to opt-out of unconfigured headers + raises a AlreadyConfiguredError if trying to configure and default has already been set + raises and ArgumentError when referencing an override that has not been set + raises a NotYetConfiguredError if default has not been set + validation + validates your cookies config upon configuration + validates your xdo config upon configuration + raises errors for unknown directives + validates your csp config upon configuration + validates your x_permitted_cross_domain_policies config upon configuration + validates your xfo config upon configuration + validates your x_xss config upon configuration + validates your referrer_policy config upon configuration + validates your hsts config upon configuration + validates your xcto config upon configuration + validates your clear site data config upon configuration + #header_hash_for + does not set the HSTS header if request is over HTTP + Overrides the current default config if default config changes during request + allows you to override opting out + allows you to override X-Frame-Options settings + produces a hash of headers with default config + allows you to opt out of individual headers via API + allows you to opt out entirely + Carries options over when using overrides + content security policy + appends a value to csp directive + Raises an error if csp_report_only is used with `report_only: false` + supports named appends + overrides non-existant directives + overrides individual directives + appends a nonce to a missing script-src value + appends a hash to a missing script-src value + does not support the deprecated `report_only: true` format + appends a nonce to the script-src when used + setting two headers + allows overriding both policies + allows appending to both policies + allows overriding the report only policy + sets identical values when the configs are the same + allows overriding the enforced policy + allows appending to the report only policy + allows appending to the enforced policy + sets different headers when the configs are different + allows you to opt-out of enforced CSP + when inferring which config to modify + updates both headers if both are configured + updates the report only header when configured + updates the enforced header when configured + SecureHeaders::Cookie - prevents duplicate flagging of attributes preserves existing attributes - applies httponly, secure, and samesite by default + prevents duplicate flagging of attributes does not tamper with cookies when using OPT_OUT is used + applies httponly, secure, and samesite by default + SameSite cookies + flags SameSite=Strict when configured with a boolean + flags SameSite=None when configured with a boolean + flags SameSite=Lax + ignores configuration if the cookie is already flagged + flags SameSite=None + flags SameSite=Strict + flags SameSite=Strict when configured with a boolean + does not flag cookies as SameSite=Lax when excluded + samesite: true sets all cookies to samesite=lax + flags properly when both lax and strict are configured + flags SameSite=Lax when configured with a boolean + does not flag cookies as SameSite=None when excluded + does not flag cookies as SameSite=Strict when excluded Secure cookies when configured with a Hash flags cookies as Secure when whitelisted @@ -1305,204 +1423,122 @@ when configured with a boolean flags cookies as HttpOnly when configured with a Hash - flags cookies as HttpOnly when whitelisted does not flag cookies as HttpOnly when excluded - SameSite cookies - does not flag cookies as SameSite=None when excluded - flags SameSite=Strict when configured with a boolean - flags SameSite=None when configured with a boolean - flags properly when both lax and strict are configured - ignores configuration if the cookie is already flagged - flags SameSite=Lax - samesite: true sets all cookies to samesite=lax - flags SameSite=None - does not flag cookies as SameSite=Lax when excluded - flags SameSite=Lax when configured with a boolean - flags SameSite=Strict when configured with a boolean - does not flag cookies as SameSite=Strict when excluded - flags SameSite=Strict + flags cookies as HttpOnly when whitelisted -SecureHeaders::ClearSiteData - make_header - returns all types with `true` config - returns nil with empty config - returns nil with nil config - returns nil with opt-out config - returns specified types - validate_config! - succeeds for `true` config - succeeds for `nil` config - succeeds for empty config - succeeds for Array of Strings config - succeeds for opt-out config - fails for other types of config - fails for Array of non-String config - make_header_value - returns a string of quoted values that are comma separated +with an invalid configuration + raises an exception when both lax and strict only filters are provided to SameSite configurations + raises an exception when SameSite is not configured with a Hash + raises an exception when SameSite strict and none enforcement modes are configured with booleans + raises an exception when SameSite none and strict enforcement modes are configured with booleans + raises an exception when both only and except filters are provided to SameSite configurations + raises an exception when SameSite lax and strict enforcement modes are configured with booleans + raises an exception when configured without a boolean(true or OPT_OUT)/Hash + raises an exception when SameSite lax and strict enforcement modes are configured with booleans + raises an exception when configured with false + raises an exception when SameSite lax and none enforcement modes are configured with booleans + raises an exception when not configured with a Hash + raises an exception when both lax and strict only filters are provided to SameSite configurations + raises an exception when SameSite none and lax enforcement modes are configured with booleans + raises an exception when both only and except filters are provided + raises an exception when SameSite strict and lax enforcement modes are configured with booleans -SecureHeaders::ReferrerPolicy - is expected to eq ["Referrer-Policy", "origin-when-cross-origin, strict-origin-when-cross-origin"] - is expected to eq ["Referrer-Policy", "no-referrer"] - is expected to eq ["Referrer-Policy", "origin-when-cross-origin"] +SecureHeaders::StrictTransportSecurity + #value + is expected to eq ["Strict-Transport-Security", "max-age=631138519"] + is expected to eq ["Strict-Transport-Security", "max-age=1234; includeSubdomains; preload"] + with an invalid configuration + with a string argument + raises an exception with an invalid max-age + raises an exception if max-age is not supplied + raises an exception with an invalid format + +SecureHeaders::XFrameOptions + #value + is expected to eq ["X-Frame-Options", "sameorigin"] + is expected to eq ["X-Frame-Options", "DENY"] + with invalid configuration + does not allow garbage + allows DENY + allows ALLOW-FROM* + allows SAMEORIGIN + +SecureHeaders::ViewHelpers + avoids calling content_security_policy_nonce internally + raises an error when using hashed content without precomputed hashes + raises an error when using hashed content with precomputed hashes, but none for the given file + raises an error when using previously unknown hashed content with precomputed hashes for a given file + adds known hash values to the corresponding headers when the helper is used + +SecureHeaders::XDownloadOptions + is expected to eq ["X-Download-Options", "noopen"] + is expected to eq ["X-Download-Options", "noopen"] invalid configuration values - doesn't accept invalid types - doesn't accept invalid values - valid configuration values - accepts 'unsafe-url' - accepts 'no-referrer-when-downgrade' - accepts array of policy values - accepts 'origin' - accepts 'no-referrer' + doesn't accept anything besides noopen + accepts noopen accepts nil - accepts 'same-origin' - accepts 'strict-origin' - accepts 'origin-when-cross-origin' - accepts 'strict-origin-when-cross-origin' -SecureHeaders::XXssProtection - is expected to eq ["X-XSS-Protection", "1; mode=block; report=https://www.secure.com/reports"] - is expected to eq ["X-XSS-Protection", "1; mode=block"] - with invalid configuration - should raise an error when providing a string that is not valid - when using a hash value - should raise an error if an invalid key is supplied - should allow string values ('1' or '0' are the only valid strings) - should raise an error if mode != block - should raise an error if no value key is supplied +SecureHeaders::Middleware + uses named overrides + respects overrides + sets the headers + cookies + flags cookies from configuration + sets the secure cookie flag correctly on interleaved http/https requests + flags cookies with a combination of SameSite configurations + disables secure cookies for non-https requests + cookies + allows opting out of cookie protection with OPT_OUT alone + cookies should be flagged + flags cookies as secure + cookies should not be flagged + does not flags cookies as secure + +SecureHeaders::ExpectCertificateTransparency + is expected to eq "enforce, max-age=1234, report-uri=\"https://report-uri.io/expect-ct\"" + is expected to eq "enforce, max-age=1234" + is expected to eq "max-age=1234" + is expected to eq "max-age=1234, report-uri=\"https://report-uri.io/expect-ct\"" + is expected to eq "max-age=1234" + with an invalid configuration + raises an exception when configuration isn't a hash + raises an exception with an invalid max-age + raises an exception with an invalid enforce value + raises an exception when max-age is not provided SecureHeaders::PolicyManagement #validate_config! - accepts anything of the form allow-* as a sandbox value - doesn't allow report_only to be set in a non-report-only config + requires a :default_src value + requires all source lists to be an array of strings performs light validation on source lists + rejects anything not of the form type/subtype as a plugin-type value + accepts true as a sandbox policy rejects unknown directives / config - requires :block_all_mixed_content to be a boolean value requires :upgrade_insecure_requests to be a boolean value - rejects anything not of the form type/subtype as a plugin-type value - requires a :default_src value - accepts anything of the form type/subtype as a plugin-type value requires a :script_src value - accepts OPT_OUT as a script-src value - requires all source lists to be an array of strings - accepts all keys + doesn't allow report_only to be set in a non-report-only config requires :preserve_schemes to be a truthy value - rejects anything not of the form allow-* as a sandbox value requires :report_only to be a truthy value - allows report_only to be set in a report-only config - accepts true as a sandbox policy + accepts anything of the form type/subtype as a plugin-type value + accepts all keys + accepts anything of the form allow-* as a sandbox value allows nil values + allows report_only to be set in a report-only config + requires :block_all_mixed_content to be a boolean value + accepts OPT_OUT as a script-src value + rejects anything not of the form allow-* as a sandbox value #combine_policies - overrides the :block_all_mixed_content flag + combines the default-src value with the override if the directive was unconfigured raises an error if appending to a OPT_OUT policy + does not combine the default-src value for directives that don't fall back to default sources combines directives where the original value is nil and the hash is frozen overrides the report_only flag - combines the default-src value with the override if the directive was unconfigured - does not combine the default-src value for directives that don't fall back to default sources - -SecureHeaders::XFrameOptions - #value - is expected to eq ["X-Frame-Options", "sameorigin"] - is expected to eq ["X-Frame-Options", "DENY"] - with invalid configuration - does not allow garbage - allows SAMEORIGIN - allows DENY - allows ALLOW-FROM* - -SecureHeaders - raises a NotYetConfiguredError if trying to opt-out of unconfigured headers - raises a AlreadyConfiguredError if trying to configure and default has already been set - raises a NotYetConfiguredError if default has not been set - raises and ArgumentError when referencing an override that has not been set - #header_hash_for - allows you to override opting out - allows you to opt out of individual headers via API - allows you to opt out entirely - produces a hash of headers with default config - Carries options over when using overrides - allows you to override X-Frame-Options settings - does not set the HSTS header if request is over HTTP - Overrides the current default config if default config changes during request - content security policy - appends a value to csp directive - does not support the deprecated `report_only: true` format - supports named appends - appends a hash to a missing script-src value - appends a nonce to a missing script-src value - Raises an error if csp_report_only is used with `report_only: false` - appends a nonce to the script-src when used - overrides non-existant directives - overrides individual directives - setting two headers - allows overriding the enforced policy - allows overriding both policies - allows overriding the report only policy - allows appending to the report only policy - sets different headers when the configs are different - allows appending to the enforced policy - allows appending to both policies - allows you to opt-out of enforced CSP - sets identical values when the configs are the same - when inferring which config to modify - updates both headers if both are configured - updates the enforced header when configured - updates the report only header when configured - validation - validates your clear site data config upon configuration - validates your xcto config upon configuration - validates your xfo config upon configuration - raises errors for unknown directives - validates your xdo config upon configuration - validates your referrer_policy config upon configuration - validates your csp config upon configuration - validates your x_permitted_cross_domain_policies config upon configuration - validates your x_xss config upon configuration - validates your hsts config upon configuration - validates your cookies config upon configuration - -SecureHeaders::ContentSecurityPolicy - #name - when in report-only mode - is expected to eq "Content-Security-Policy-Report-Only" - when in enforce mode - is expected to eq "Content-Security-Policy" - #value - does not emit a warning when using frame-src - does not add a directive if the value is nil - deprecates and escapes semicolons in directive source lists - deduplicates any source expressions - supports script-src-attr directive - does not remove schemes when :preserve_schemes is true - does not add a boolean directive if the value is false - supports style-src-elem directive - creates maximally strict sandbox policy when passed true - allows script as a require-sri-src - creates maximally strict sandbox policy when passed no sandbox token values - allows style as a require-sri-src - does not add a directive if the value is an empty array (or all nil) - does not remove schemes from report-uri values - removes http/s schemes from hosts - supports strict-dynamic - supports script-src-elem directive - supports strict-dynamic and opting out of the appended 'unsafe-inline' - discards 'none' values if any other source expressions are present - allows script and style as a require-sri-src - includes navigate-to - deprecates and escapes semicolons in directive source lists - creates sandbox policy when passed valid sandbox token values - does add a boolean directive if the value is true - discards source expressions (besides unsafe-* and non-host source values) when * is present - supports style-src-attr directive - does not build directives with a value of OPT_OUT (and bypasses directive requirements) - includes prefetch-src - removes nil from source lists - minifies source expressions based on overlapping wildcards - uses a safe but non-breaking default value + overrides the :block_all_mixed_content flag -Finished in 0.17094 seconds (files took 0.39411 seconds to load) +Finished in 0.19638 seconds (files took 0.54398 seconds to load) 240 examples, 0 failures -Randomized with seed 27156 +Randomized with seed 58542 [Coveralls] Outside the CI environment, not sending data. @@ -1533,12 +1569,14 @@ dpkg-buildpackage: info: binary-only upload (no source included) dpkg-genchanges: info: not including original source code in upload I: copying local configuration +I: user script /srv/workspace/pbuilder/28053/tmp/hooks/B01_cleanup starting +I: user script /srv/workspace/pbuilder/28053/tmp/hooks/B01_cleanup finished I: unmounting dev/ptmx filesystem I: unmounting dev/pts filesystem I: unmounting dev/shm filesystem I: unmounting proc filesystem I: unmounting sys filesystem I: cleaning the build env -I: removing directory /srv/workspace/pbuilder/128717 and its subdirectories -I: Current time: Sat May 31 12:08:29 -12 2025 -I: pbuilder-time-stamp: 1748736509 +I: removing directory /srv/workspace/pbuilder/28053 and its subdirectories +I: Current time: Mon Apr 29 07:46:25 +14 2024 +I: pbuilder-time-stamp: 1714326385