[JAVA]Enable XPASSED test_extended_location_data for some vulnerabilities #4204
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Motivation
The test_extended_location_data tests are reporting XPASS for vulnerabilities where is_expected_location_required=False.
It needs to be enabled for the same versions as the original vulnerability test, since for these vulnerabilities, location is not relevant, and the test only verifies the presence of that vulnerability type.
APPSEC-54879
Changes
Enable Test_XContentSniffing_ExtendedLocation, Test_HstsMissingHeader_ExtendedLocation
TrustBoundaryViolation produce a vulnerability with location so Test_TrustBoundaryViolation_ExtendedLocation is_expected_location_required should be True
Workflow
codeowners
file quickly.🚀 Once your PR is reviewed, you can merge it!
🛟 #apm-shared-testing 🛟
Reviewer checklist
[<language>]
, double-check that only<language>
is impacted by the changebuild-XXX-image
label is present