@@ -103,19 +103,19 @@ describe('unvalidated-redirect-analyzer', () => {
103
103
it ( 'should not report headers other than Location' , ( ) => {
104
104
unvalidatedRedirectAnalyzer . analyze ( 'X-test' , NOT_TAINTED_LOCATION )
105
105
106
- expect ( report ) . to . not . have . been . called
106
+ expect ( report ) . not . to . be . called
107
107
} )
108
108
109
109
it ( 'should not report Location header with non string values' , ( ) => {
110
110
unvalidatedRedirectAnalyzer . analyze ( 'X-test' , [ TAINTED_LOCATION ] )
111
111
112
- expect ( report ) . to . not . have . been . called
112
+ expect ( report ) . not . to . be . called
113
113
} )
114
114
115
115
it ( 'should not report Location header with not tainted string value' , ( ) => {
116
116
unvalidatedRedirectAnalyzer . analyze ( 'Location' , NOT_TAINTED_LOCATION )
117
117
118
- expect ( report ) . to . not . have . been . called
118
+ expect ( report ) . not . to . be . called
119
119
} )
120
120
121
121
it ( 'should report Location header with tainted string value' , ( ) => {
@@ -127,25 +127,25 @@ describe('unvalidated-redirect-analyzer', () => {
127
127
it ( 'should not report if tainted origin is referer header exclusively' , ( ) => {
128
128
unvalidatedRedirectAnalyzer . analyze ( 'Location' , TAINTED_HEADER_REFERER_ONLY )
129
129
130
- expect ( report ) . to . not . be . called
130
+ expect ( report ) . not . to . be . called
131
131
} )
132
132
133
133
it ( 'should not report if tainted origin is path param exclusively' , ( ) => {
134
134
unvalidatedRedirectAnalyzer . analyze ( 'Location' , TAINTED_PATH_PARAMS_ONLY )
135
135
136
- expect ( report ) . to . not . be . called
136
+ expect ( report ) . not . to . be . called
137
137
} )
138
138
139
139
it ( 'should not report if tainted origin is url exclusively' , ( ) => {
140
140
unvalidatedRedirectAnalyzer . analyze ( 'Location' , TAINTED_URL_ONLY )
141
141
142
- expect ( report ) . to . not . be . called
142
+ expect ( report ) . not . to . be . called
143
143
} )
144
144
145
145
it ( 'should not report if all tainted origin are safe' , ( ) => {
146
146
unvalidatedRedirectAnalyzer . analyze ( 'Location' , TAINTED_SAFE_RANGES )
147
147
148
- expect ( report ) . to . not . be . called
148
+ expect ( report ) . not . to . be . called
149
149
} )
150
150
151
151
it ( 'should report if tainted origin contains referer header among others' , ( ) => {
0 commit comments