You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
toJsonValidationErrorMessageBuilder.append("The request body is a JSON array, but one of its elements is not a JSON object.");
131
+
toJsonValidationErrorMessageBuilder.append(String.format("The request body is a JSON array, but one of its elements is not a JSON object: %s. ", object.toString()));
.anyMatch(event -> event.getLevel() == Level.ERROR && event.getFormattedMessage().contains("Secret found in the audit log: request_body."));
164
+
.anyMatch(event -> event.getLevel() == Level.ERROR && event.getFormattedMessage().contains(String.format("Secret found in the audit log: request_body.%s.", UID_SECRET_KEY)));
.anyMatch(event -> event.getLevel() == Level.ERROR && event.getFormattedMessage().contains("Secret found in the audit log: request_body.") && event.getFormattedMessage().contains("SQL injection found in the audit log: request_body."));
195
+
.anyMatch(event -> event.getLevel() == Level.ERROR && event.getFormattedMessage().contains(String.format("Secret found in the audit log: request_body.%s. ", UID_SECRET_KEY)) && event.getFormattedMessage().contains("SQL injection found in the audit log: request_body.weather. "));
199
196
200
197
assertThat(errorLogged).isTrue();
201
198
}
@@ -248,13 +245,13 @@ public void testBodyParamsAsJsonArray() {
.anyMatch(event -> event.getLevel() == Level.ERROR && event.getFormattedMessage().contains("Secret found in the audit log: request_body."));
269
+
.anyMatch(event -> event.getLevel() == Level.ERROR && event.getFormattedMessage().contains(String.format("Secret found in the audit log: request_body.%s", UID_SECRET_KEY)));
.anyMatch(event -> event.getLevel() == Level.ERROR && event.getFormattedMessage().contains("Secret found in the audit log: request_body.") && event.getFormattedMessage().contains("SQL injection found in the audit log: request_body."));
300
+
.anyMatch(event -> event.getLevel() == Level.ERROR && event.getFormattedMessage().contains(String.format("Secret found in the audit log: request_body.%s.", UID_SECRET_KEY)) && event.getFormattedMessage().contains("SQL injection found in the audit log: request_body.weather. "));
307
301
308
302
assertThat(errorLogged).isTrue();
309
303
}
@@ -352,10 +346,10 @@ public void testQueryParams() {
.anyMatch(event -> event.getLevel() == Level.ERROR && event.getFormattedMessage().contains("Secret found in the audit log: query_params."));
366
+
.anyMatch(event -> event.getLevel() == Level.ERROR && event.getFormattedMessage().contains(String.format("Secret found in the audit log: query_params.%s. ", UID_SECRET_KEY)));
374
367
375
368
assertThat(errorLogged).isTrue();
376
369
}
@@ -392,24 +385,23 @@ public void testQueryParamsContainsSQL() {
.anyMatch(event -> event.getLevel() == Level.ERROR && event.getFormattedMessage().contains("SQL injection found in the audit log: query_params."));
391
+
.anyMatch(event -> event.getLevel() == Level.ERROR && event.getFormattedMessage().contains("SQL injection found in the audit log: query_params.weather. "));
.anyMatch(event -> event.getLevel() == Level.ERROR && event.getFormattedMessage().contains("Secret found in the audit log: query_params.") && event.getFormattedMessage().contains("SQL injection found in the audit log: query_params."));
418
+
.anyMatch(event -> event.getLevel() == Level.ERROR && event.getFormattedMessage().contains(String.format("Secret found in the audit log: query_params.%s", UID_SECRET_KEY)) && event.getFormattedMessage().contains("SQL injection found in the audit log: query_params.weather. "));
0 commit comments