Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OSOE-759: Fixing YAML lint warnings #385

Merged
merged 11 commits into from
Jul 7, 2024
189 changes: 94 additions & 95 deletions Lombiq.Tests.UI.Samples/Tests/CustomZapAutomationFrameworkPlan.yml
Original file line number Diff line number Diff line change
@@ -1,104 +1,103 @@
---
env:
contexts:
- name: "Default Context"
urls:
- "<start URL>"
excludePaths: []
authentication:
parameters: {}
verification:
method: "response"
pollFrequency: 60
pollUnits: "requests"
sessionManagement:
method: "cookie"
parameters: {}
technology:
exclude:
- "C"
- "IBM DB2"
- "PHP"
- "CouchDB"
- "Oracle"
- "JSP/Servlet"
- "Firebird"
- "HypersonicSQL"
- "SAP MaxDB"
- "Ruby"
- "Microsoft Access"
- "Java"
- "Tomcat"
- "Sybase"
- "Python"
- name: Default Context
urls:
- <start URL>
excludePaths: []
authentication:
parameters: {}
verification:
method: response
pollFrequency: 60
pollUnits: requests
sessionManagement:
method: cookie
parameters: {}
technology:
exclude:
- C
- IBM DB2
- PHP
- CouchDB
- Oracle
- JSP/Servlet
- Firebird
- HypersonicSQL
- SAP MaxDB
- Ruby
- Microsoft Access
- Java
- Tomcat
- Sybase
- Python
parameters:
failOnError: true
failOnWarning: false
progressToStdout: true
vars: {}
jobs:
- parameters:
scanOnlyInScope: true
enableTags: false
disableAllRules: false
rules:
# This is required for <script> blocks which OC uses extensively. The rule may be removed when OC starts to provide
# cryptographic nonce for these script blocks (see https://github.com/OrchardCMS/OrchardCore/issues/13389).
- id: 10055
name: "script-src includes unsafe-inline"
threshold: "off"
name: "passiveScan-config"
type: "passiveScan-config"
- parameters: {}
name: "spider"
type: "spider"
- parameters: {}
name: "passiveScan-wait"
type: "passiveScan-wait"
- parameters:
reportDir: "/zap/wrk/reports"
template: "modern"
theme: "corporate"
reportTitle: "ZAP Scanning Report"
reportDescription: ""
risks:
- "low"
- "medium"
- "high"
confidences:
- "low"
- "medium"
- "high"
- "confirmed"
sections:
- "passingrules"
- "instancecount"
- "alertdetails"
- "alertcount"
- "params"
- "chart"
- "statistics"
name: "report"
type: "report"
- parameters:
template: "sarif-json"
reportDir: "/zap/wrk/reports"
reportFile: ""
reportTitle: "ZAP Scanning Report"
reportDescription: ""
displayReport: false
risks:
- "info"
- "low"
- "medium"
- "high"
confidences:
- "falsepositive"
- "low"
- "medium"
- "high"
- "confirmed"
sites: []
name: "sarifReport"
type: "report"

- parameters:
scanOnlyInScope: true
enableTags: false
disableAllRules: false
rules:
# This is required for <script> blocks which OC uses extensively. The rule may be removed when OC starts to provide
# cryptographic nonce for these script blocks (see https://github.com/OrchardCMS/OrchardCore/issues/13389).
- id: 10055
name: script-src includes unsafe-inline
threshold: 'off'
name: passiveScan-config
type: passiveScan-config
- parameters: {}
name: spider
type: spider
- parameters: {}
name: passiveScan-wait
type: passiveScan-wait
- parameters:
reportDir: /zap/wrk/reports
template: modern
theme: corporate
reportTitle: ZAP Scanning Report
reportDescription: ''
risks:
- low
- medium
- high
confidences:
- low
- medium
- high
- confirmed
sections:
- passingrules
- instancecount
- alertdetails
- alertcount
- params
- chart
- statistics
name: report
type: report
- parameters:
template: sarif-json
reportDir: /zap/wrk/reports
reportFile: ''
reportTitle: ZAP Scanning Report
reportDescription: ''
displayReport: false
risks:
- info
- low
- medium
- high
confidences:
- falsepositive
- low
- medium
- high
- confirmed
sites: []
name: sarifReport
type: report
Original file line number Diff line number Diff line change
@@ -1,25 +1,25 @@
- parameters:
action: "add"
type: "active"
engine: "ECMAScript : Graal.js"
name: "displayRuleRuntimes"
target: ""
inline: "var extAscan = control.getExtensionLoader().getExtension(\n org.zaproxy.zap.extension.ascan.ExtensionActiveScan.NAME);\n\
action: add
type: active
engine: 'ECMAScript : Graal.js'
name: displayRuleRuntimes
target: ''
inline: var extAscan = control.getExtensionLoader().getExtension(\n org.zaproxy.zap.extension.ascan.ExtensionActiveScan.NAME);\n\
\nif (extAscan != null) {\n var lastScan = extAscan.getLastScan();\n if (lastScan\
\ != null) {\n var hps = lastScan.getHostProcesses().toArray();\n for\
\ (var i=0; i < hps.length; i++) {\n var hp = hps[i];\n var plugins\
\ = hp.getCompleted().toArray();\n for (var j=0; j < plugins.length; j++)\
\ {\n var plugin = plugins[j];\n var timeTaken = plugin.getTimeFinished().getTime()\n\
\ - plugin.getTimeStarted().getTime();\n print(plugin.getName()\
\ + \"\\t\" + timeTaken);\n }\n }\n }\n}\n"
name: "script"
type: "script"
\ + \\\t\ + timeTaken);\n }\n }\n }\n}\n
name: script
type: script
- parameters:
action: "run"
type: "standalone"
engine: ""
name: "displayRuleRuntimes"
target: ""
inline: ""
name: "script"
type: "script"
action: run
type: standalone
engine: ''
name: displayRuleRuntimes
target: ''
inline: ''
name: script
type: script
Original file line number Diff line number Diff line change
@@ -1,12 +1,12 @@
parameters:
user: ""
user: ''
requests:
- url: ""
name: ""
method: ""
httpVersion: ""
headers: []
data: ""
responseCode: 200
name: "requestor"
type: "requestor"
- url: ''
name: ''
method: ''
httpVersion: ''
headers: []
data: ''
responseCode: 200
name: requestor
type: requestor
Original file line number Diff line number Diff line change
Expand Up @@ -4,5 +4,5 @@ parameters:
numberOfBrowsers: 64
inScopeOnly: true
runOnlyIfModern: true
name: "spiderAjax"
type: "spiderAjax"
name: spiderAjax
type: spiderAjax
Loading