We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent e0626c4 commit 9b0328cCopy full SHA for 9b0328c
library/vulnerabilities/sql-injection/detectSQLInjection.test.ts
@@ -361,3 +361,11 @@ function isNotSqlInjection(
361
);
362
}
363
364
+
365
+t.test("get human readable name", async () => {
366
+ t.same(new SQLDialectGeneric().getHumanReadableName(), "Generic");
367
+ t.same(new SQLDialectMySQL().getHumanReadableName(), "MySQL");
368
+ t.same(new SQLDialectPostgres().getHumanReadableName(), "PostgreSQL");
369
+ t.same(new SQLDialectSQLite().getHumanReadableName(), "SQLite");
370
+ t.same(new SQLDialectClickHouse().getHumanReadableName(), "ClickHouse");
371
+});
0 commit comments