]> git.ipfire.org Git - thirdparty/suricata-update.git/commitdiff
misc: fix escape warnings in re patterns
authorJason Ish <jason.ish@oisf.net>
Thu, 15 Feb 2024 16:50:23 +0000 (10:50 -0600)
committerJason Ish <jason.ish@oisf.net>
Fri, 16 Feb 2024 16:50:01 +0000 (10:50 -0600)
suricata/update/main.py
tests/test_main.py

index 455a3d5ce34cf7dd864fb3026d3c63df39f6ca48..50c22df2f8a4397bad734f42e38f3f87dd8b702d 100644 (file)
@@ -464,7 +464,7 @@ def handle_dataset_files(rule, dep_files):
         dataset_contents = dep_files[source_filename]
 
     content_hash = hashlib.md5(dataset_contents).hexdigest()
-    new_rule = re.sub("(dataset.*?load\s+){}".format(dataset_filename), "\g<1>datasets/{}".format(content_hash), rule.format())
+    new_rule = re.sub(r"(dataset.*?load\s+){}".format(dataset_filename), r"\g<1>datasets/{}".format(content_hash), rule.format())
     dest_filename = os.path.join(config.get_output_dir(), "datasets", content_hash)
     dest_dir = os.path.dirname(dest_filename)
     logger.debug("Copying dataset file {} to {}".format(dataset_filename, dest_filename))
@@ -699,9 +699,9 @@ def resolve_flowbits(rulemap, disabled_rules):
 class ThresholdProcessor:
 
     patterns = [
-        re.compile("\s+(re:\"(.*)\")"),
-        re.compile("\s+(re:(.*?)),.*"),
-        re.compile("\s+(re:(.*))"),
+        re.compile(r"\s+(re:\"(.*)\")"),
+        re.compile(r"\s+(re:(.*?)),.*"),
+        re.compile(r"\s+(re:(.*))"),
     ]
 
     def extract_regex(self, buf):
@@ -1183,7 +1183,7 @@ def _main():
     # Disable rule that are for app-layers that are not enabled.
     if suriconf:
         for key in suriconf.keys():
-            m = re.match("app-layer\.protocols\.([^\.]+)\.enabled", key)
+            m = re.match(r"app-layer\.protocols\.([^\.]+)\.enabled", key)
             if m:
                 proto = m.group(1)
                 if not suriconf.is_true(key, ["detection-only"]):
index 86fa486ad3de336182b12b364ba855ace821e703..919b88b5d7a722f1d0158b64fb4bf4d99496b230 100644 (file)
@@ -127,7 +127,7 @@ class ModifyRuleFilterTestCase(unittest.TestCase):
 
     def test_id_match(self):
         rule0 = suricata.update.rule.parse(self.rule_string)
-        line = '2020757 "\|0d 0a\|" "|ff ff|"'
+        line = r'2020757 "\|0d 0a\|" "|ff ff|"'
         rule_filter = matchers_mod.ModifyRuleFilter.parse(line)
         self.assertTrue(rule_filter != None)
         self.assertTrue(rule_filter.match(rule0))
@@ -138,7 +138,7 @@ class ModifyRuleFilterTestCase(unittest.TestCase):
 
     def test_re_match(self):
         rule0 = suricata.update.rule.parse(self.rule_string)
-        line = 're:classtype:trojan-activity "\|0d 0a\|" "|ff ff|"'
+        line = r're:classtype:trojan-activity "\|0d 0a\|" "|ff ff|"'
         rule_filter = matchers_mod.ModifyRuleFilter.parse(line)
         self.assertTrue(rule_filter != None)
         self.assertTrue(rule_filter.match(rule0))