Skip to content

Commit

Permalink
Merge branch 'avara1986/APPSEC-56531-update_test_suite' into avara198…
Browse files Browse the repository at this point in the history
…6/APPSEC-10657-xss_django
  • Loading branch information
avara1986 committed Jan 30, 2025
2 parents 5138a29 + 09ba611 commit 0658301
Show file tree
Hide file tree
Showing 7 changed files with 7 additions and 6 deletions.
1 change: 1 addition & 0 deletions tests/appsec/iast/taint_sinks/_taint_sinks_utils.py
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@ def get_parametrize(vuln_type, ignore_list=None):
idx = -1
for element in data["suite"]:
if element["description"] in (
"$1 with query parameters or fragment",
"$1 - Tainted range based redaction - multiple ranges",
"Redacted source that needs to be truncated",
"Query with single quoted string literal and null source",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@


@pytest.mark.parametrize(
"evidence_input, sources_expected, vulnerabilities_expected,element",
"evidence_input,sources_expected,vulnerabilities_expected,element",
list(get_parametrize(VULN_CODE_INJECTION, ignore_list=_ignore_list)),
)
def test_code_injection_redaction_suite(
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@


@pytest.mark.parametrize(
"evidence_input, sources_expected, vulnerabilities_expected,element", list(get_parametrize(VULN_CMDI))
"evidence_input,sources_expected,vulnerabilities_expected,element", list(get_parametrize(VULN_CMDI))
)
def test_cmdi_redaction_suite(
evidence_input, sources_expected, vulnerabilities_expected, iast_context_defaults, element
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -92,7 +92,7 @@ def test_common_django_header_injection_redact(header_name, header_value, value_


@pytest.mark.parametrize(
"evidence_input, sources_expected, vulnerabilities_expected,element",
"evidence_input,sources_expected,vulnerabilities_expected,element",
list(get_parametrize(VULN_HEADER_INJECTION)),
)
def test_header_injection_redaction_suite(
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -134,7 +134,7 @@ def test_path_traversal_redact_abs_paths(iast_context_defaults):


@pytest.mark.parametrize(
"evidence_input, sources_expected, vulnerabilities_expected,element",
"evidence_input,sources_expected,vulnerabilities_expected,element",
list(get_parametrize(VULN_PATH_TRAVERSAL)),
)
def test_path_traversal_redaction_suite(
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@


@pytest.mark.parametrize(
"evidence_input, sources_expected, vulnerabilities_expected,element",
"evidence_input,sources_expected,vulnerabilities_expected,element",
list(get_parametrize(VULN_SQL_INJECTION)),
)
def test_sqli_redaction_suite(
Expand Down
2 changes: 1 addition & 1 deletion tests/appsec/iast/taint_sinks/test_ssrf_redacted.py
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@


@pytest.mark.parametrize(
"evidence_input, sources_expected, vulnerabilities_expected,element", list(get_parametrize(VULN_SSRF))
"evidence_input,sources_expected,vulnerabilities_expected,element", list(get_parametrize(VULN_SSRF))
)
def test_ssrf_redaction_suite(
evidence_input, sources_expected, vulnerabilities_expected, iast_context_defaults, element
Expand Down

0 comments on commit 0658301

Please sign in to comment.