From 195752fe75e96573f51a09cb251bf96bf3598291 Mon Sep 17 00:00:00 2001 From: Username Date: Sun, 18 Jan 2026 10:23:31 +0100 Subject: [PATCH] ci: fix test file references and hardcoded paths - Remove non-existent test_mime_detection.py from unit tests - Use relative paths in security tests for container compatibility --- .gitea/workflows/ci.yml | 2 +- tests/security/cli_security_audit.py | 8 ++++---- tests/security/profiled_server.py | 3 ++- 3 files changed, 7 insertions(+), 6 deletions(-) diff --git a/.gitea/workflows/ci.yml b/.gitea/workflows/ci.yml index c89fed2..65a6e11 100644 --- a/.gitea/workflows/ci.yml +++ b/.gitea/workflows/ci.yml @@ -117,7 +117,7 @@ jobs: - name: Run unit tests run: | - pytest tests/test_api.py tests/test_database.py tests/test_mime_detection.py \ + pytest tests/test_api.py tests/test_database.py \ tests/test_paste_*.py tests/test_metrics.py tests/test_pki.py \ -v --tb=short diff --git a/tests/security/cli_security_audit.py b/tests/security/cli_security_audit.py index 5583981..9a5bef1 100644 --- a/tests/security/cli_security_audit.py +++ b/tests/security/cli_security_audit.py @@ -8,7 +8,7 @@ import tempfile from pathlib import Path # Load fpaste as a module by exec -fpaste_path = Path("/home/user/git/flaskpaste/fpaste") +fpaste_path = Path(__file__).parent.parent.parent / "fpaste" fpaste_globals = {"__name__": "fpaste", "__file__": str(fpaste_path)} exec(compile(fpaste_path.read_text(), fpaste_path, "exec"), fpaste_globals) # noqa: S102 @@ -105,7 +105,7 @@ def test_subprocess_safety(): print("=" * 50) # Read fpaste source and check for dangerous patterns - fpaste_src = Path("/home/user/git/flaskpaste/fpaste") + fpaste_src = Path(__file__).parent.parent.parent / "fpaste" content = fpaste_src.read_text() issues = [] @@ -190,7 +190,7 @@ def test_key_file_permissions(): print("=" * 50) # Check the source code for chmod calls - fpaste_src = Path("/home/user/git/flaskpaste/fpaste") + fpaste_src = Path(__file__).parent.parent.parent / "fpaste" content = fpaste_src.read_text() # Find all chmod(0o600) calls for key files @@ -239,7 +239,7 @@ def test_symlink_attacks(): print(" RECOMMENDATION: Check for symlinks before write, or use O_NOFOLLOW") # Check if the code verifies paths before writing - fpaste_src = Path("/home/user/git/flaskpaste/fpaste") + fpaste_src = Path(__file__).parent.parent.parent / "fpaste" content = fpaste_src.read_text() if "is_symlink()" in content or "O_NOFOLLOW" in content: diff --git a/tests/security/profiled_server.py b/tests/security/profiled_server.py index 65cc25f..346577e 100644 --- a/tests/security/profiled_server.py +++ b/tests/security/profiled_server.py @@ -7,8 +7,9 @@ import io import pstats import signal import sys +from pathlib import Path -sys.path.insert(0, "/home/user/git/flaskpaste") +sys.path.insert(0, str(Path(__file__).parent.parent.parent)) from app import create_app