@@ -593,9 +593,10 @@ Validator.HtmlValidationAction=throw
593593# org.owasp.esapi.reference.DefaultEncoder.encodeForSQL
594594# org.owasp.esapi.ESAPI.accessController [FUTURE]
595595#
596- # The format is a comma-separated list of fully,Qualified.ClassNames.methodName
596+ # The format is a comma-separated list of fully.Qualified.ClassName.methodName;
597+ # all class names must begin with "org.owasp.esapi.".
597598#
598- # Note to ESAPI Devs: There is presently no way to specific which specific
599+ # Note to ESAPI Devs: There is presently NO WAY to specific which specific
599600# method to indicate here when the method name alone,
600601# absent from its signature, is ambiguous, so it is
601602# best to avoid those if at all possible!
@@ -605,7 +606,9 @@ Validator.HtmlValidationAction=throw
605606# which has 4 interfaces so currently, there's no way to
606607# specify a specific one.
607608#
608- ESAPI.enableLegCannonModeAndGetMyAssFired.methodNames =org.owasp.esapi.reference.DefaultEncoder.encodeForSQL
609+ # We need this there for our existing JUnit tests for encodeForSQL. Use an
610+ # alternate ESAPI property config filen name for testing this aspect out.
611+ ESAPI.dangerouslyAllowUnsafeMethods.methodNames =org.owasp.esapi.reference.DefaultEncoder.encodeForSQL
609612
610613# Normally you would put some text here (that will be logged) that provides some
611614# justification as to why you have enabled these functions. This can be
0 commit comments