From e624195da07754529eba6d5f6ec3e09634958f75 Mon Sep 17 00:00:00 2001 From: Simon Thulbourn Date: Thu, 16 Oct 2025 12:02:43 +0000 Subject: [PATCH] chore: use approved sample names and addresses --- .../test_aws_encryption_sdk.py | 42 +++++++++---------- .../test_erase_data_masking.py | 6 +-- .../required_dependencies/test_api_gateway.py | 2 +- .../_boto3/test_feature_flags.py | 28 ++++++------- .../_boto3/test_schema_validation.py | 2 +- .../unit/parser/_pydantic/test_vpc_lattice.py | 6 +-- 6 files changed, 43 insertions(+), 43 deletions(-) diff --git a/tests/functional/data_masking/_aws_encryption_sdk/test_aws_encryption_sdk.py b/tests/functional/data_masking/_aws_encryption_sdk/test_aws_encryption_sdk.py index 039e302bf93..f964d113553 100644 --- a/tests/functional/data_masking/_aws_encryption_sdk/test_aws_encryption_sdk.py +++ b/tests/functional/data_masking/_aws_encryption_sdk/test_aws_encryption_sdk.py @@ -351,25 +351,25 @@ def test_encrypt_with_complex_dict(data_masker): # GIVEN the data type is a json representation of a dictionary with a list inside data = json.dumps( { - "name": "Leandro", + "name": "Pat", "operation": "non sensitive", "card_number": "1000 4444 333 2222", "address": [ { - "postcode": 81847, - "street": "38986 Joanne Stravenue", + "postcode": 10001, + "street": "123 Any Street, Any Town", "country": "United States", "timezone": "America/La_Paz", }, { - "postcode": 94400, - "street": "623 Kraig Mall", + "postcode": 10000, + "street": "100 Main Street", "country": "United States", "timezone": "America/Mazatlan", }, { - "postcode": 94480, - "street": "123 Kraig Mall", + "postcode": 10001, + "street": "123 Any Street, Any Town", "country": "United States", "timezone": "America/Mazatlan", }, @@ -389,25 +389,25 @@ def test_encrypt_with_slice(data_masker): # GIVEN the data type is a json representation of a dictionary with a list inside data = json.dumps( { - "name": "Leandro", + "name": "Pat", "operation": "non sensitive", "card_number": "1000 4444 333 2222", "address": [ { - "postcode": 81847, - "street": "38986 Joanne Stravenue", + "postcode": 10001, + "street": "123 Any Street, Any Town", "country": "United States", "timezone": "America/La_Paz", }, { - "postcode": 94400, - "street": "623 Kraig Mall", + "postcode": 10000, + "street": "100 Main Street", "country": "United States", "timezone": "America/Mazatlan", }, { - "postcode": 94480, - "street": "123 Kraig Mall", + "postcode": 10001, + "street": "123 Any Street, Any Town", "country": "United States", "timezone": "America/Mazatlan", }, @@ -427,25 +427,25 @@ def test_encrypt_with_complex_search(data_masker): # GIVEN the data type is a json representation of a dictionary with a list inside data = json.dumps( { - "name": "Leandro", + "name": "Pat", "operation": "non sensitive", "card_number": "1000 4444 333 2222", "address": [ { - "postcode": 81847, - "street": "38986 Joanne Stravenue", + "postcode": 10001, + "street": "123 Any Street, Any Town", "country": "United States", "timezone": "America/La_Paz", }, { - "postcode": 94400, - "street": "623 Kraig Mall", + "postcode": 10000, + "street": "100 Main Street", "country": "United States", "timezone": "America/Mazatlan", }, { - "postcode": 94480, - "street": "123 Kraig Mall", + "postcode": 10001, + "street": "123 Any Street, Any Town", "country": "United States", "timezone": "America/Mazatlan", }, diff --git a/tests/functional/data_masking/required_dependencies/test_erase_data_masking.py b/tests/functional/data_masking/required_dependencies/test_erase_data_masking.py index 6aac48927da..cf91166bdcf 100644 --- a/tests/functional/data_masking/required_dependencies/test_erase_data_masking.py +++ b/tests/functional/data_masking/required_dependencies/test_erase_data_masking.py @@ -375,7 +375,7 @@ def test_erase_dictionary_with_masking_rules(data_masker): def test_erase_dictionary_with_masking_rules_with_list(data_masker): # GIVEN a dictionary with nested sensitive data - data = {"user": {"name": ["leandro", "powertools"]}} + data = {"user": {"name": ["Pat", "powertools"]}} # AND masking rules for specific fields masking_rules = {"user.name": {"custom_mask": "NO-NAME"}} @@ -393,7 +393,7 @@ def test_erase_dictionary_with_masking_rules_with_list(data_masker): def test_erase_list_with_custom_mask(data_masker): # GIVEN a dictionary with nested sensitive data - data = {"user": {"name": ["leandro", "powertools"]}} + data = {"user": {"name": ["Pat", "powertools"]}} # WHEN erase is called with masking rules result = data_masker.erase(data, fields=["user.name"], dynamic_mask=True) @@ -401,7 +401,7 @@ def test_erase_list_with_custom_mask(data_masker): # THEN only the specified fields should be masked assert result == { "user": { - "name": ["*******", "**********"], + "name": ["***", "**********"], }, } diff --git a/tests/functional/event_handler/required_dependencies/test_api_gateway.py b/tests/functional/event_handler/required_dependencies/test_api_gateway.py index 8b1222fb92d..e5ed7b7cb78 100644 --- a/tests/functional/event_handler/required_dependencies/test_api_gateway.py +++ b/tests/functional/event_handler/required_dependencies/test_api_gateway.py @@ -1335,7 +1335,7 @@ def test_api_gateway_app_with_strip_prefix_and_route_prefix(): app = ApiGatewayResolver(strip_prefixes=["/v1"]) router = Router() - event = {"httpMethod": "GET", "path": "/v1/users/leandro", "resource": "/users"} + event = {"httpMethod": "GET", "path": "/v1/users/pat", "resource": "/users"} @router.get("") def base(user_id: str): diff --git a/tests/functional/feature_flags/_boto3/test_feature_flags.py b/tests/functional/feature_flags/_boto3/test_feature_flags.py index 0a41f04c1f1..a4d271aba57 100644 --- a/tests/functional/feature_flags/_boto3/test_feature_flags.py +++ b/tests/functional/feature_flags/_boto3/test_feature_flags.py @@ -1459,7 +1459,7 @@ def test_flags_any_in_value_match(mocker, config): { "action": RuleAction.ANY_IN_VALUE.value, "key": "tenant_id", - "value": ["Łukasz", "Gerald", "Leandro", "Heitor"], + "value": ["Akua", "John", "Maria", "Pat"], }, ], }, @@ -1470,7 +1470,7 @@ def test_flags_any_in_value_match(mocker, config): feature_flags = init_feature_flags(mocker, mocked_app_config_schema, config) toggle = feature_flags.evaluate( name="my_feature", - context={"tenant_id": ["Gerald"]}, + context={"tenant_id": ["Akua"]}, default=False, ) assert toggle == expected_value @@ -1488,7 +1488,7 @@ def test_flags_any_in_value_no_match(mocker, config): { "action": RuleAction.ANY_IN_VALUE.value, "key": "tenant_id", - "value": ["Łukasz", "Gerald", "Leandro", "Heitor"], + "value": ["Akua", "John", "Maria", "Pat"], }, ], }, @@ -1499,7 +1499,7 @@ def test_flags_any_in_value_no_match(mocker, config): feature_flags = init_feature_flags(mocker, mocked_app_config_schema, config) toggle = feature_flags.evaluate( name="my_feature", - context={"tenant_id": ["Simon"]}, + context={"tenant_id": ["Kwesi"]}, default=False, ) assert toggle == expected_value @@ -1517,7 +1517,7 @@ def test_flags_all_in_value_match(mocker, config): { "action": RuleAction.ALL_IN_VALUE.value, "key": "tenant_id", - "value": ["Łukasz", "Gerald", "Leandro", "Heitor"], + "value": ["Akua", "John", "Maria", "Pat"], }, ], }, @@ -1528,7 +1528,7 @@ def test_flags_all_in_value_match(mocker, config): feature_flags = init_feature_flags(mocker, mocked_app_config_schema, config) toggle = feature_flags.evaluate( name="my_feature", - context={"tenant_id": ["Gerald"]}, + context={"tenant_id": ["Akua"]}, default=False, ) @@ -1547,7 +1547,7 @@ def test_flags_all_in_value_no_match(mocker, config): { "action": RuleAction.ALL_IN_VALUE.value, "key": "tenant_id", - "value": ["Łukasz", "Gerald", "Leandro", "Heitor"], + "value": ["Akua", "John", "Maria", "Pat"], }, ], }, @@ -1558,7 +1558,7 @@ def test_flags_all_in_value_no_match(mocker, config): feature_flags = init_feature_flags(mocker, mocked_app_config_schema, config) toggle = feature_flags.evaluate( name="my_feature", - context={"tenant_id": ["Gerald", "Simon"]}, + context={"tenant_id": ["Akua", "Mary"]}, default=False, ) @@ -1577,7 +1577,7 @@ def test_flags_none_in_value_match(mocker, config): { "action": RuleAction.NONE_IN_VALUE.value, "key": "tenant_id", - "value": ["Łukasz", "Gerald", "Leandro", "Heitor"], + "value": ["Akua", "John", "Maria", "Pat"], }, ], }, @@ -1588,7 +1588,7 @@ def test_flags_none_in_value_match(mocker, config): feature_flags = init_feature_flags(mocker, mocked_app_config_schema, config) toggle = feature_flags.evaluate( name="my_feature", - context={"tenant_id": ["Rubao"]}, + context={"tenant_id": ["Mary"]}, default=False, ) @@ -1607,7 +1607,7 @@ def test_flags_none_in_value_no_match(mocker, config): { "action": RuleAction.NONE_IN_VALUE.value, "key": "tenant_id", - "value": ["Łukasz", "Gerald", "Leandro", "Heitor"], + "value": ["Akua", "John", "Maria", "Pat"], }, ], }, @@ -1618,7 +1618,7 @@ def test_flags_none_in_value_no_match(mocker, config): feature_flags = init_feature_flags(mocker, mocked_app_config_schema, config) toggle = feature_flags.evaluate( name="my_feature", - context={"tenant_id": ["Heitor"]}, + context={"tenant_id": ["Pat"]}, default=False, ) @@ -1646,7 +1646,7 @@ def test_intersection_non_list_value(mocker, config, intersection_action): { "action": intersection_action, "key": "tenant_id", - "value": ["Łukasz", "Gerald", "Leandro", "Heitor"], + "value": ["Akua", "John", "Maria", "Pat"], }, ], }, @@ -1680,7 +1680,7 @@ def test_exception_handler(mocker, config): { "action": RuleAction.ANY_IN_VALUE.value, "key": "tenant_id", - "value": ["Łukasz", "Gerald", "Leandro", "Heitor"], + "value": ["Akua", "John", "Maria", "Pat"], }, ], }, diff --git a/tests/functional/feature_flags/_boto3/test_schema_validation.py b/tests/functional/feature_flags/_boto3/test_schema_validation.py index b7bf8392ada..afc7130505e 100644 --- a/tests/functional/feature_flags/_boto3/test_schema_validation.py +++ b/tests/functional/feature_flags/_boto3/test_schema_validation.py @@ -1047,7 +1047,7 @@ def test_validate_all_in_value_condition_invalid_value(): # GIVEN a schema with a ANY_IN_VALUE action with non-list value condition = { CONDITION_ACTION: RuleAction.ALL_IN_VALUE.value, - CONDITION_VALUE: "Leandro", + CONDITION_VALUE: "Pat", } rule_name = "non-list value for ALL_IN_VALUE" diff --git a/tests/unit/parser/_pydantic/test_vpc_lattice.py b/tests/unit/parser/_pydantic/test_vpc_lattice.py index 0ffd919e4db..bfd60c36f01 100644 --- a/tests/unit/parser/_pydantic/test_vpc_lattice.py +++ b/tests/unit/parser/_pydantic/test_vpc_lattice.py @@ -8,15 +8,15 @@ def test_vpc_lattice_event_with_envelope(): raw_event = load_event("vpcLatticeEvent.json") - raw_event["body"] = '{"username": "Leandro", "name": "Damascena"}' + raw_event["body"] = '{"username": "Akua", "name": "Mansa"}' parsed_event: MyVpcLatticeBusiness = parse( event=raw_event, model=MyVpcLatticeBusiness, envelope=envelopes.VpcLatticeEnvelope, ) - assert parsed_event.username == "Leandro" - assert parsed_event.name == "Damascena" + assert parsed_event.username == "Akua" + assert parsed_event.name == "Mansa" def test_vpc_lattice_event():