From 14c3686619dd9f59ca1fca65991158f06f1d2683 Mon Sep 17 00:00:00 2001 From: bitterpanda Date: Tue, 14 Apr 2026 13:34:00 +0200 Subject: [PATCH 1/2] rename an outbound request to an oubtound connection for qa tests --- .../outbound_blocking/BlockedOutboundException.java | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/agent_api/src/main/java/dev/aikido/agent_api/vulnerabilities/outbound_blocking/BlockedOutboundException.java b/agent_api/src/main/java/dev/aikido/agent_api/vulnerabilities/outbound_blocking/BlockedOutboundException.java index da55cb32..f7bd1ed6 100644 --- a/agent_api/src/main/java/dev/aikido/agent_api/vulnerabilities/outbound_blocking/BlockedOutboundException.java +++ b/agent_api/src/main/java/dev/aikido/agent_api/vulnerabilities/outbound_blocking/BlockedOutboundException.java @@ -8,7 +8,7 @@ public BlockedOutboundException(String msg) { } public static BlockedOutboundException get() { - String defaultMsg = generateDefaultMessage("an outbound request"); + String defaultMsg = generateDefaultMessage("an outbound connection"); return new BlockedOutboundException(defaultMsg); } } From d37d7a7c905cd4456f10e2a2a6539506782e8c8d Mon Sep 17 00:00:00 2001 From: bitterpanda Date: Tue, 14 Apr 2026 13:34:58 +0200 Subject: [PATCH 2/2] rename not in allowlist -> not allowed for qa tests --- .../java/dev/aikido/agent_api/storage/ServiceConfiguration.java | 2 +- agent_api/src/test/java/collectors/WebRequestCollectorTest.java | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/agent_api/src/main/java/dev/aikido/agent_api/storage/ServiceConfiguration.java b/agent_api/src/main/java/dev/aikido/agent_api/storage/ServiceConfiguration.java index 095d52a6..681d2525 100644 --- a/agent_api/src/main/java/dev/aikido/agent_api/storage/ServiceConfiguration.java +++ b/agent_api/src/main/java/dev/aikido/agent_api/storage/ServiceConfiguration.java @@ -97,7 +97,7 @@ public BlockedResult isIpBlocked(String ip) { // Check for allowed ip addresses (i.e. only one country is allowed to visit the site) // Always allow access from private IP addresses (those include local IP addresses) if (!isPrivateIp(ip) && !firewallLists.matchesAllowedIps(ip)) { - return new BlockedResult(true, "not in allowlist"); + return new BlockedResult(true, "not allowed"); } // Check for monitored IP addresses diff --git a/agent_api/src/test/java/collectors/WebRequestCollectorTest.java b/agent_api/src/test/java/collectors/WebRequestCollectorTest.java index f54f06c7..62d60ae0 100644 --- a/agent_api/src/test/java/collectors/WebRequestCollectorTest.java +++ b/agent_api/src/test/java/collectors/WebRequestCollectorTest.java @@ -157,7 +157,7 @@ void testReport_ipNotAllowedUsingLists() { contextObject.setIp("4.4.4.4"); response = WebRequestCollector.report(contextObject); assertNotNull(response); - assertEquals("Your IP address is blocked. Reason: not in allowlist (Your IP: 4.4.4.4)", response.msg()); + assertEquals("Your IP address is blocked. Reason: not allowed (Your IP: 4.4.4.4)", response.msg()); assertEquals(403, response.status()); }