This file is indexed.

/usr/share/augeas/lenses/dist/tests/test_splunk.aug is in augeas-lenses 1.10.1-2.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
(**
 *
 * This module is used to test the Splunk module for valid extractions.
 * Written by Tim Brigham.
 * This file is licensed under the LGPLv2+, like the rest of Augeas.
 **)

module Test_splunk =

(** inputs.conf **)

   let inputs = "[default]
host = splunk-node-1.example.com
enable_autocomplete_login = False
_meta = metakey::metaval foo::bar

[udp://514]
connection_host = none
source = test
sourcetype = syslog

"
test Splunk.lns get inputs =
  { "target" = "default"
      { "host" = "splunk-node-1.example.com" }
      { "enable_autocomplete_login" = "False" }
      { "_meta" = "metakey::metaval foo::bar" }
  {}}
  { "target" = "udp://514"
      { "connection_host" = "none" }
      { "source" = "test" }
      { "sourcetype" = "syslog" }
  {}}


(** web.conf **)
   let web = "[settings]
enableSplunkWebSSL = 1
enable_autocomplete_login = False
"


test Splunk.lns get web =
  { "target" = "settings"
      { "enableSplunkWebSSL" = "1" }
      { "enable_autocomplete_login" = "False" }
      }



(** props.conf **)

   let props = "[splunkd_stdout]
PREFIX_SOURCETYPE = False
SHOULD_LINEMERGE = False
is_valid = False
maxDist = 99

"

test Splunk.lns get props =
  {
    "target" = "splunkd_stdout"
             { "PREFIX_SOURCETYPE" = "False" }
             { "SHOULD_LINEMERGE" = "False" }
             { "is_valid" = "False" }
             { "maxDist" = "99" }
             {}}

(** tenants.conf **)
   let tenants = "[tenant:default]
whitelist.0 = *
"

test Splunk.lns get tenants =
  { "target" = "tenant:default"
     { "whitelist.0" = "*" }
  }



  let server = "[license]
active_group = Free
master_uri = https://myserver.mydomain.com:8089

[general]
serverName = splunk-node-1
trustedIP = 127.0.0.1
guid = XXXXXXX-XXXXXXX-XXXXXXX-XXXXXXX-XXXXXXXXXXXXX

[sslConfig]
sslKeysfilePassword = $1$XX2X4XX6XXXXXXXXX

"

test Splunk.lns get server =
    { "target" = "license"
        { "active_group" = "Free" }
        { "master_uri" = "https://myserver.mydomain.com:8089" }
        {}}
    { "target" = "general"
      { "serverName" = "splunk-node-1" }
      { "trustedIP" = "127.0.0.1" }
      { "guid" = "XXXXXXX-XXXXXXX-XXXXXXX-XXXXXXX-XXXXXXXXXXXXX" }
      {}}
    { "target" = "sslConfig"
      { "sslKeysfilePassword" = "$1$XX2X4XX6XXXXXXXXX" }
      {}}


(* test anonymous attributes *)
let anon = "
# master
serverName = splunk-node-1

# slave
serverName = splunk-node-2

[general]
serverName = splunk-node-3

"

test Splunk.lns get anon =
  { ".anon"
    {  }
    { "#comment" = "master" }
    { "serverName" = "splunk-node-1" }
    {  }
    { "#comment" = "slave" }
    { "serverName" = "splunk-node-2" }
    {  }
  }
  { "target" = "general"
    { "serverName" = "splunk-node-3" }
    {  }
  }


(* test empty value entry *)

let override = "
[general]
# normal entry
foo = bar
# override entry
foo =
"

test Splunk.lns get override =
  { ".anon"
    {  }
  }
  { "target" = "general"
    { "#comment" = "normal entry" }
    { "foo" = "bar" }
    { "#comment" = "override entry" }
    { "foo" }
  }