chore: cleanup IT tests (#2040)
This commit is contained in:
@ -38,44 +38,44 @@ public class SqlInjectionLessonIntegrationTest extends IntegrationTest {
|
||||
Map<String, Object> params = new HashMap<>();
|
||||
params.clear();
|
||||
params.put("query", sql_2);
|
||||
checkAssignment(url("SqlInjection/attack2"), params, true);
|
||||
checkAssignment(webGoatUrlConfig.url("SqlInjection/attack2"), params, true);
|
||||
|
||||
params.clear();
|
||||
params.put("query", sql_3);
|
||||
checkAssignment(url("SqlInjection/attack3"), params, true);
|
||||
checkAssignment(webGoatUrlConfig.url("SqlInjection/attack3"), params, true);
|
||||
|
||||
params.clear();
|
||||
params.put("query", sql_4_add);
|
||||
checkAssignment(url("SqlInjection/attack4"), params, true);
|
||||
checkAssignment(webGoatUrlConfig.url("SqlInjection/attack4"), params, true);
|
||||
|
||||
params.clear();
|
||||
params.put("query", sql_5);
|
||||
checkAssignment(url("SqlInjection/attack5"), params, true);
|
||||
checkAssignment(webGoatUrlConfig.url("SqlInjection/attack5"), params, true);
|
||||
|
||||
params.clear();
|
||||
params.put("operator", sql_9_operator);
|
||||
params.put("account", sql_9_account);
|
||||
params.put("injection", sql_9_injection);
|
||||
checkAssignment(url("SqlInjection/assignment5a"), params, true);
|
||||
checkAssignment(webGoatUrlConfig.url("SqlInjection/assignment5a"), params, true);
|
||||
|
||||
params.clear();
|
||||
params.put("login_count", sql_10_login_count);
|
||||
params.put("userid", sql_10_userid);
|
||||
checkAssignment(url("SqlInjection/assignment5b"), params, true);
|
||||
checkAssignment(webGoatUrlConfig.url("SqlInjection/assignment5b"), params, true);
|
||||
|
||||
params.clear();
|
||||
params.put("name", sql_11_a);
|
||||
params.put("auth_tan", sql_11_b);
|
||||
checkAssignment(url("SqlInjection/attack8"), params, true);
|
||||
checkAssignment(webGoatUrlConfig.url("SqlInjection/attack8"), params, true);
|
||||
|
||||
params.clear();
|
||||
params.put("name", sql_12_a);
|
||||
params.put("auth_tan", sql_12_b);
|
||||
checkAssignment(url("SqlInjection/attack9"), params, true);
|
||||
checkAssignment(webGoatUrlConfig.url("SqlInjection/attack9"), params, true);
|
||||
|
||||
params.clear();
|
||||
params.put("action_string", sql_13);
|
||||
checkAssignment(url("SqlInjection/attack10"), params, true);
|
||||
checkAssignment(webGoatUrlConfig.url("SqlInjection/attack10"), params, true);
|
||||
|
||||
checkResults("SqlInjection");
|
||||
}
|
||||
|
Reference in New Issue
Block a user