Skip to content

Commit 4ef3be4

Browse files
Ruff: Add TD007 and N803 (#12002)
* Ruff: Add TD007 and N803 * review
1 parent 44f5518 commit 4ef3be4

File tree

10 files changed

+27
-27
lines changed

10 files changed

+27
-27
lines changed

dojo/tools/nexpose/parser.py

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -101,25 +101,25 @@ def parse_html_type(self, node):
101101

102102
return ret
103103

104-
def parse_tests_type(self, node, vulnsDefinitions):
104+
def parse_tests_type(self, node, vulns_definitions):
105105
"""
106106
Parse XML element of type TestsType
107107
108-
@return vulns A list of vulnerabilities according to vulnsDefinitions
108+
@return vulns A list of vulnerabilities according to vulns_definitions
109109
"""
110110
vulns = []
111111

112112
for tests in node.findall("tests"):
113113
for test in tests.findall("test"):
114-
if test.get("id") in vulnsDefinitions and (
114+
if test.get("id") in vulns_definitions and (
115115
test.get("status")
116116
in {
117117
"vulnerable-exploited",
118118
"vulnerable-version",
119119
"vulnerable-potential",
120120
}
121121
):
122-
vuln = vulnsDefinitions[test.get("id").lower()]
122+
vuln = vulns_definitions[test.get("id").lower()]
123123
for desc in list(test):
124124
if "pluginOutput" in vuln:
125125
vuln[

dojo/tools/ort/parser.py

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -40,12 +40,12 @@ def parse_json(self, json_output):
4040

4141
return tree
4242

43-
def get_items(self, evaluatedModel, test):
43+
def get_items(self, evaluated_model, test):
4444
items = {}
45-
packages = evaluatedModel["packages"]
46-
dependency_trees = evaluatedModel["dependency_trees"]
47-
rule_violations = evaluatedModel["rule_violations"]
48-
licenses = evaluatedModel["licenses"]
45+
packages = evaluated_model["packages"]
46+
dependency_trees = evaluated_model["dependency_trees"]
47+
rule_violations = evaluated_model["rule_violations"]
48+
licenses = evaluated_model["licenses"]
4949
rule_violations_unresolved = get_unresolved_rule_violations(
5050
rule_violations,
5151
)

dojo/tools/sarif/parser.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -219,9 +219,9 @@ def get_snippet(location):
219219
return snippet
220220

221221

222-
def get_codeFlowsDescription(codeFlows):
222+
def get_codeFlowsDescription(code_flows):
223223
description = ""
224-
for codeFlow in codeFlows:
224+
for codeFlow in code_flows:
225225
for threadFlow in codeFlow.get("threadFlows", []):
226226
if "locations" not in threadFlow:
227227
continue

dojo/tools/wizcli_common_parsers/parsers.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -133,10 +133,10 @@ def parse_rule_matches(rule_matches, test):
133133
return findings
134134

135135
@staticmethod
136-
def parse_os_packages(osPackages, test):
136+
def parse_os_packages(os_packages, test):
137137
findings = []
138-
if osPackages:
139-
for osPackage in osPackages:
138+
if os_packages:
139+
for osPackage in os_packages:
140140
pkg_name = osPackage.get("name", "N/A")
141141
pkg_version = osPackage.get("version", "N/A")
142142
vulnerabilities = osPackage.get("vulnerabilities", [])

ruff.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ select = [
3737
"W",
3838
"C90",
3939
"I",
40-
"N804", "N811", "N814", "N818",
40+
"N803", "N804", "N811", "N814", "N818",
4141
"D2", "D3", "D402", "D403", "D405", "D406", "D407", "D408", "D409", "D410", "D411", "D412", "D413", "D414", "D416",
4242
"UP",
4343
"YTT",
@@ -69,7 +69,7 @@ select = [
6969
"INT",
7070
"ARG003", "ARG004", "ARG005",
7171
"PTH2", "PTH10", "PTH11", "PTH120", "PTH121", "PTH122", "PTH124",
72-
"TD001", "TD004", "TD005",
72+
"TD001", "TD004", "TD005", "TD007",
7373
"FIX",
7474
"PD",
7575
"PGH",

unittests/dojo_test_case.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -508,7 +508,7 @@ def get_results_by_id(self, results: list, object_id: int) -> dict | None:
508508
def import_scan_with_params(self, filename, scan_type="ZAP Scan", engagement=1, minimum_severity="Low", *, active=True, verified=False,
509509
push_to_jira=None, endpoint_to_add=None, tags=None, close_old_findings=False, group_by=None, engagement_name=None,
510510
product_name=None, product_type_name=None, auto_create_context=None, expected_http_status_code=201, test_title=None,
511-
scan_date=None, service=None, forceActive=True, forceVerified=True):
511+
scan_date=None, service=None, force_active=True, force_verified=True):
512512

513513
with open(get_unit_tests_path() / filename, encoding="utf-8") as testfile:
514514
payload = {

unittests/test_import_reimport.py

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -366,7 +366,7 @@ def test_import_veracode_reimport_veracode_active_verified_mitigated(self):
366366
logger.debug("reimporting exact same original veracode mitigated xml report again")
367367

368368
import_veracode_many_findings = self.import_scan_with_params(self.veracode_mitigated_findings, scan_type=self.scan_type_veracode,
369-
verified=True, forceActive=True, forceVerified=True)
369+
verified=True, force_active=True, force_verified=True)
370370

371371
test_id = import_veracode_many_findings["test"]
372372

@@ -1808,16 +1808,16 @@ def reimport_scan_ui(self, test, payload):
18081808

18091809
def import_scan_with_params_ui(self, filename, scan_type="ZAP Scan", engagement=1, minimum_severity="Low", *, active=True, verified=False,
18101810
push_to_jira=None, endpoint_to_add=None, tags=None, close_old_findings=False, scan_date=None, service=None,
1811-
forceActive=False, forceVerified=False):
1811+
force_active=False, force_verified=False):
18121812

18131813
activePayload = "not_specified"
1814-
if forceActive:
1814+
if force_active:
18151815
activePayload = "force_to_true"
18161816
elif not active:
18171817
activePayload = "force_to_false"
18181818

18191819
verifiedPayload = "not_specified"
1820-
if forceVerified:
1820+
if force_verified:
18211821
verifiedPayload = "force_to_true"
18221822
elif not verified:
18231823
verifiedPayload = "force_to_false"

unittests/tools/test_checkmarx_cxflow_sast_parser.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,8 @@
77

88
class TestCheckmarxCxflowSast(DojoTestCase):
99

10-
def init(self, reportFilename):
11-
my_file_handle = open(reportFilename, encoding="utf-8")
10+
def init(self, report_filename):
11+
my_file_handle = open(report_filename, encoding="utf-8")
1212
product = Product()
1313
engagement = Engagement()
1414
test = Test()

unittests/tools/test_checkmarx_parser.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,8 @@ class TestCheckmarxParser(DojoTestCase):
1111
# comment out to get full diff with big reports
1212
# maxDiff = None
1313

14-
def init(self, reportFilename):
15-
my_file_handle = open(reportFilename, encoding="utf-8")
14+
def init(self, report_filename):
15+
my_file_handle = open(report_filename, encoding="utf-8")
1616
product = Product()
1717
engagement = Engagement()
1818
test = Test()

unittests/tools/test_sonarqube_parser.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,8 @@ class TestSonarQubeParser(DojoTestCase):
77
# comment out to get full diff with big reports
88
# maxDiff = None
99

10-
def init(self, reportFilename):
11-
my_file_handle = open(reportFilename, encoding="utf-8")
10+
def init(self, report_filename):
11+
my_file_handle = open(report_filename, encoding="utf-8")
1212
product = Product()
1313
engagement = Engagement()
1414
test = Test()

0 commit comments

Comments
 (0)