diff --git a/test/fetch/headers.js b/test/fetch/headers.js index 1f9196c4697..19beb98bdba 100644 --- a/test/fetch/headers.js +++ b/test/fetch/headers.js @@ -677,7 +677,6 @@ tap.test('headers that might cause a ReDoS', (t) => { t.end() }) - tap.test('Headers.prototype.getSetCookie', (t) => { t.test('Mutating the returned list does not affect the set-cookie list', (t) => { const h = new Headers([ @@ -694,4 +693,4 @@ tap.test('Headers.prototype.getSetCookie', (t) => { }) t.end() -}) \ No newline at end of file +}) diff --git a/test/headers-crlf.js b/test/headers-crlf.js index fa90eaadd11..b24fd391491 100644 --- a/test/headers-crlf.js +++ b/test/headers-crlf.js @@ -3,7 +3,6 @@ const { test } = require('tap') const { Client } = require('..') const { createServer } = require('http') -const EE = require('events') test('CRLF Injection in Nodejs ‘undici’ via host', (t) => { t.plan(1) @@ -17,7 +16,7 @@ test('CRLF Injection in Nodejs ‘undici’ via host', (t) => { const client = new Client(`http://localhost:${server.address().port}`) t.teardown(client.close.bind(client)) - const unsanitizedContentTypeInput = '12 \r\n\r\naaa:aaa' + const unsanitizedContentTypeInput = '12 \r\n\r\naaa:aaa' try { const { body } = await client.request({ @@ -25,7 +24,7 @@ test('CRLF Injection in Nodejs ‘undici’ via host', (t) => { method: 'POST', headers: { 'content-type': 'application/json', - 'host': unsanitizedContentTypeInput + host: unsanitizedContentTypeInput }, body: 'asd' })