summaryrefslogtreecommitdiff
path: root/test/handler/test_bandit_handler.vader
blob: a2793a4622fae6f1eb032dcc9f00205c7a866ae0 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
Before:
  runtime ale_linters/python/bandit.vim

After:
  call ale#linter#Reset()

Execute(The bandit handler for Python should parse input correctly):
  AssertEqual
  \ [
  \   {
  \     'bufnr': 0,
  \     'lnum': 2,
  \     'code': 'B404',
  \     'type': 'I',
  \     'text': 'Consider possible security implications associated with subprocess module.',
  \   },
  \   {
  \     'bufnr': 0,
  \     'lnum': 4,
  \     'code': 'B305',
  \     'type': 'W',
  \     'text': 'Use of insecure cipher mode cryptography.hazmat.primitives.ciphers.modes.ECB.',
  \   },
  \   {
  \     'bufnr': 0,
  \     'lnum': 6,
  \     'code': 'B609',
  \     'type': 'E',
  \     'text': 'Possible wildcard injection in call: subprocess.Popen',
  \   },
  \ ],
  \ ale_linters#python#bandit#Handle(0, [
  \   '[main]  INFO    profile include tests: None',
  \   '[main]  INFO    profile exclude tests: None',
  \   '[main]  INFO    cli include tests: None',
  \   '[main]  INFO    cli exclude tests: None',
  \   '[main]  INFO    running on Python 3.7.2',
  \   '[node_visitor]  INFO    Unable to find qualified name for module: <stdin>',
  \   '2:B404:LOW:Consider possible security implications associated with subprocess module.',
  \   '4:B305:MEDIUM:Use of insecure cipher mode cryptography.hazmat.primitives.ciphers.modes.ECB.',
  \   '6:B609:HIGH:Possible wildcard injection in call: subprocess.Popen',
  \ ])