File: test_bandit_handler.vader

package info (click to toggle)
vim-ale 4.0.0-2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 8,764 kB
  • sloc: sh: 499; python: 311; perl: 31; makefile: 4; xml: 4; javascript: 1
file content (42 lines) | stat: -rw-r--r-- 1,402 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
Before:
  runtime ale_linters/python/bandit.vim

After:
  call ale#linter#Reset()

Execute(The bandit handler for Python should parse input correctly):
  AssertEqual
  \ [
  \   {
  \     'bufnr': 0,
  \     'lnum': 2,
  \     'code': 'B404',
  \     'type': 'I',
  \     'text': 'Consider possible security implications associated with subprocess module.',
  \   },
  \   {
  \     'bufnr': 0,
  \     'lnum': 4,
  \     'code': 'B305',
  \     'type': 'W',
  \     'text': 'Use of insecure cipher mode cryptography.hazmat.primitives.ciphers.modes.ECB.',
  \   },
  \   {
  \     'bufnr': 0,
  \     'lnum': 6,
  \     'code': 'B609',
  \     'type': 'E',
  \     'text': 'Possible wildcard injection in call: subprocess.Popen',
  \   },
  \ ],
  \ ale_linters#python#bandit#Handle(0, [
  \   '[main]  INFO    profile include tests: None',
  \   '[main]  INFO    profile exclude tests: None',
  \   '[main]  INFO    cli include tests: None',
  \   '[main]  INFO    cli exclude tests: None',
  \   '[main]  INFO    running on Python 3.7.2',
  \   '[node_visitor]  INFO    Unable to find qualified name for module: <stdin>',
  \   '2:B404:LOW:Consider possible security implications associated with subprocess module.',
  \   '4:B305:MEDIUM:Use of insecure cipher mode cryptography.hazmat.primitives.ciphers.modes.ECB.',
  \   '6:B609:HIGH:Possible wildcard injection in call: subprocess.Popen',
  \ ])