custom SecRules not honored #146
Replies: 1 comment
-
|
I reproduced this locally and it works as expected on the current I added an E2E regression that enables global WAF, creates a proxy host with WAF set to The test verifies:
I ran: npx playwright test tests/e2e/functional/waf-custom-path-rule.spec.ts --config tests/playwright.config.tsResult: Commit: So CPM is honoring that rule in the test stack. If it is not working in your deployment, it is likely environment-specific or Vaultwarden-specific rather than a generic CPM merge bug. Things to double-check on your side:
If you want, open a follow-up with your generated Caddy config for that host and I can help compare it against the passing test setup. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Using custom WAF SecRules does not block access to certain paths. Seems like the Rules are not honored - if the syntax is correct.
Using:
in the proxy hosts WAF settings (set to merge with global) does not block access to the path (vaultwarden admin page).
WAF is enabled globally and working (generating reports and blocking).
Could someone help me out here? Tried using caddy custom pre-handlers, but can not get them to work either for blocking (403 response) access to paths.
Thank you!
Beta Was this translation helpful? Give feedback.
All reactions