Skip to content
This repository was archived by the owner on Jun 5, 2025. It is now read-only.

Commit 0861a59

Browse files
committed
fixes in tests
1 parent fbd1220 commit 0861a59

File tree

5 files changed

+12
-11
lines changed

5 files changed

+12
-11
lines changed

src/codegate/pipeline/pii/pii.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ def process_results(
8181
pii_value = text[result.start : result.end]
8282

8383
# add to session store
84-
obj = SensitiveData(pii_value, "pii", result.entity_type)
84+
obj = SensitiveData(original=pii_value, service="pii", type=result.entity_type)
8585
uuid_placeholder = self.sensitive_data_manager.store(session_id, obj)
8686
anonymized_text = anonymized_text.replace(pii_value, uuid_placeholder)
8787

src/codegate/pipeline/secrets/secrets.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -194,7 +194,7 @@ def _hide_secret(self, match: Match) -> str:
194194
if not match.type:
195195
raise ValueError("Secret type must be provided")
196196

197-
obj = SensitiveData(match.value, match.service, match.type)
197+
obj = SensitiveData(original=match.value, service=match.service, type=match.type)
198198
uuid_placeholder = self._sensitive_data_manager.store(self._session_id, obj)
199199
logger.debug(
200200
"Stored secret", service=match.service, type=match.type, placeholder=uuid_placeholder

src/codegate/pipeline/sensitive_data/manager.py

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,10 +10,9 @@
1010
class SensitiveData(pydantic.BaseModel):
1111
"""Represents sensitive data with additional metadata."""
1212

13-
def __init__(self, original: str, service: Optional[str], type: Optional[str]):
14-
self.original = original
15-
self.service = service
16-
self.type = type
13+
original: str
14+
service: Optional[str] = None
15+
type: Optional[str] = None
1716

1817

1918
class SensitiveDataManager:

tests/pipeline/secrets/test_secrets.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -186,7 +186,7 @@ def setup_method(self):
186186
async def test_complete_marker_processing(self):
187187
"""Test processing of a complete REDACTED marker"""
188188
# Store a secret
189-
obj = SensitiveData("secret_value", "test_service", "api_key")
189+
obj = SensitiveData(original="secret_value", service="test_service", type="api_key")
190190
encrypted = self.sensitive_data_manager.store(self.session_id, obj)
191191

192192
# Add content with REDACTED marker to buffer
@@ -272,7 +272,7 @@ async def test_no_markers(self):
272272
async def test_wrong_session(self):
273273
"""Test unredaction with wrong session ID"""
274274
# Store secret with one session
275-
obj = SensitiveData("test_service", "api_key", "different_session")
275+
obj = SensitiveData(original="test_service", service="api_key", type="different_session")
276276
encrypted = self.sensitive_data_manager.store("different_session", obj)
277277

278278
# Try to unredact with different session

tests/pipeline/sensitive_data/test_manager.py

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,20 +22,22 @@ def manager(self, mock_session_store):
2222
def test_store_success(self, manager, mock_session_store):
2323
"""Test storing a SensitiveData object successfully."""
2424
session_id = "session-123"
25-
sensitive_data = SensitiveData("secret_value", "AWS", "API_KEY")
25+
sensitive_data = SensitiveData(original="secret_value", service="AWS", type="API_KEY")
2626

2727
# Mock session store behavior
2828
mock_session_store.add_mapping.return_value = "uuid-123"
2929

3030
result = manager.store(session_id, sensitive_data)
3131

3232
# Verify correct function calls
33-
mock_session_store.add_mapping.assert_called_once_with(session_id, sensitive_data.to_json())
33+
mock_session_store.add_mapping.assert_called_once_with(
34+
session_id, sensitive_data.model_dump_json()
35+
)
3436
assert result == "uuid-123"
3537

3638
def test_store_invalid_session_id(self, manager):
3739
"""Test storing data with an invalid session ID (should return None)."""
38-
sensitive_data = SensitiveData("secret_value", "AWS", "API_KEY")
40+
sensitive_data = SensitiveData(original="secret_value", service="AWS", type="API_KEY")
3941
result = manager.store("", sensitive_data) # Empty session ID
4042
assert result is None
4143

0 commit comments

Comments
 (0)