From 07a883feeeea63cc23fb5100a0618f29b0a5da9f Mon Sep 17 00:00:00 2001 From: Wojtek Kosior Date: Sat, 15 Jan 2022 12:35:47 +0100 Subject: make blocking rules queryable in pattern tree just as mappings are --- test/unit/test_policy_deciding.py | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) (limited to 'test/unit/test_policy_deciding.py') diff --git a/test/unit/test_policy_deciding.py b/test/unit/test_policy_deciding.py index a360537..88095af 100644 --- a/test/unit/test_policy_deciding.py +++ b/test/unit/test_policy_deciding.py @@ -61,11 +61,11 @@ def test_decide_policy(execute_in_page): policy = execute_in_page( '''{ const tree = pqt.make(); - pqt.register(tree, "http://kno.wn", "allowed", {allow: true}); + pqt.register(tree, "http://kno.wn", "~allow", 1); returnval(decide_policy(tree, "http://kno.wn/", false, "abcd")); }''') assert policy['allow'] == True - assert policy['mapping'] == 'allowed' + assert policy['mapping'] == '~allow' for prop in ('payload', 'nonce', 'csp'): assert prop not in policy @@ -87,11 +87,11 @@ def test_decide_policy(execute_in_page): policy = execute_in_page( '''{ const tree = pqt.make(); - pqt.register(tree, "http://kno.wn", "disallowed", {allow: false}); + pqt.register(tree, "http://kno.wn", "~allow", 0); returnval(decide_policy(tree, "http://kno.wn/", true, "abcd")); }''') assert policy['allow'] == False - assert policy['mapping'] == 'disallowed' + assert policy['mapping'] == '~allow' for prop in ('payload', 'nonce'): assert prop not in policy assert parse_csp(policy['csp']) == { -- cgit v1.2.3