Merge pull request #10376 from hvitved/ruby/no-ast-by-default

Ruby: Do not expose AST layer through `ruby.qll`
This commit is contained in:
Tom Hvitved
2022-09-21 13:15:30 +02:00
committed by GitHub
178 changed files with 192 additions and 184 deletions

View File

@@ -10,7 +10,7 @@
* - should `Foo.new` point to `Foo#initialize`?
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.ast.internal.Module
import codeql.ruby.dataflow.SSA

View File

@@ -5,7 +5,7 @@
* @id rb/diagnostics/extraction-errors
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.Diagnostics
/** Gets the SARIF severity to associate an error. */

View File

@@ -6,7 +6,7 @@
* @id rb/diagnostics/successfully-extracted-files
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.Diagnostics
from File f

View File

@@ -6,7 +6,7 @@
* @id rb/lines-per-file
*/
import ruby
import codeql.ruby.AST
from RubyFile f, int n
where n = f.getNumberOfLines()

View File

@@ -7,7 +7,7 @@
* @id rb/lines-of-code-in-files
*/
import ruby
import codeql.ruby.AST
from RubyFile f, int n
where n = f.getNumberOfLinesOfCode()

View File

@@ -6,7 +6,7 @@
* @id rb/lines-of-comments-in-files
*/
import ruby
import codeql.ruby.AST
from RubyFile f, int n
where n = f.getNumberOfLinesOfComments()

View File

@@ -15,7 +15,7 @@
* external/cwe/cwe-099
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.security.PathInjectionQuery
import codeql.ruby.DataFlow
import DataFlow::PathGraph

View File

@@ -13,7 +13,7 @@
* external/cwe/cwe-088
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.security.CommandInjectionQuery
import DataFlow::PathGraph

View File

@@ -14,7 +14,7 @@
* external/cwe/cwe-073
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.ApiGraphs
import codeql.ruby.frameworks.core.Kernel::Kernel
import codeql.ruby.TaintTracking

View File

@@ -13,7 +13,7 @@
* external/cwe/cwe-116
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.security.ReflectedXSSQuery
import DataFlow::PathGraph

View File

@@ -12,7 +12,7 @@
* external/cwe/cwe-116
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.security.StoredXSSQuery
import DataFlow::PathGraph

View File

@@ -11,7 +11,7 @@
* external/cwe/cwe-089
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.Concepts
import codeql.ruby.DataFlow
import codeql.ruby.dataflow.BarrierGuards

View File

@@ -14,7 +14,7 @@
* external/cwe/cwe-116
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.security.CodeInjectionQuery
import DataFlow::PathGraph

View File

@@ -14,7 +14,7 @@
* external/cwe/cwe-116
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.DataFlow
import codeql.ruby.controlflow.CfgNodes
import codeql.ruby.frameworks.core.String

View File

@@ -11,7 +11,7 @@
* external/cwe/cwe-117
*/
import ruby
import codeql.ruby.AST
import DataFlow::PathGraph
import codeql.ruby.security.LogInjectionQuery

View File

@@ -15,7 +15,7 @@
* external/cwe/cwe-400
*/
import ruby
import codeql.ruby.AST
import DataFlow::PathGraph
import codeql.ruby.DataFlow
import codeql.ruby.security.regexp.RegExpInjectionQuery

View File

@@ -10,7 +10,7 @@
* external/cwe/cwe-134
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.DataFlow
import codeql.ruby.security.TaintedFormatStringQuery
import DataFlow::PathGraph

View File

@@ -11,7 +11,7 @@
* external/cwe/cwe-295
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.Concepts
import codeql.ruby.DataFlow

View File

@@ -14,7 +14,7 @@
* external/cwe/cwe-829
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.security.InsecureDependencyQuery
from Expr url, string msg

View File

@@ -13,7 +13,7 @@
* external/cwe/cwe-532
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.security.CleartextLoggingQuery
import codeql.ruby.DataFlow
import DataFlow::PathGraph

View File

@@ -13,7 +13,7 @@
* external/cwe/cwe-532
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.security.CleartextStorageQuery
import codeql.ruby.security.CleartextStorageCustomizations::CleartextStorage
import codeql.ruby.DataFlow

View File

@@ -10,7 +10,7 @@
* external/cwe/cwe-327
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.Concepts
from Cryptography::CryptographicOperation operation, string msgPrefix

View File

@@ -11,7 +11,7 @@
* external/cwe/cwe-352
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.Concepts
from CsrfProtectionSetting s

View File

@@ -11,7 +11,7 @@
* external/cwe/cwe-502
*/
import ruby
import codeql.ruby.AST
import DataFlow::PathGraph
import codeql.ruby.DataFlow
import codeql.ruby.security.UnsafeDeserializationQuery

View File

@@ -12,7 +12,7 @@
* @precision high
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.security.UrlRedirectQuery
import codeql.ruby.DataFlow::DataFlow::PathGraph

View File

@@ -13,7 +13,7 @@
* external/cwe/cwe-827
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.dataflow.RemoteFlowSources
import codeql.ruby.TaintTracking
import codeql.ruby.Concepts

View File

@@ -11,7 +11,7 @@
* @precision high
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.Concepts
import codeql.ruby.Frameworks

View File

@@ -10,7 +10,7 @@
* @precision low
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.Concepts
import codeql.ruby.DataFlow
import DataFlow::PathGraph

View File

@@ -12,7 +12,7 @@
* external/cwe/cwe-798
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.DataFlow
import DataFlow::PathGraph
import codeql.ruby.TaintTracking

View File

@@ -11,7 +11,7 @@
* external/cwe/cwe-829
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.DataFlow
import codeql.ruby.security.InsecureDownloadQuery
import DataFlow::PathGraph

View File

@@ -11,7 +11,7 @@
* external/cwe/cwe-434
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.DataFlow
import codeql.ruby.DataFlow::DataFlow::PathGraph
import codeql.ruby.security.HttpToFileAccessQuery

View File

@@ -10,7 +10,7 @@
* external/cwe/cwe-918
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.DataFlow
import codeql.ruby.security.ServerSideRequestForgeryQuery
import DataFlow::PathGraph

View File

@@ -10,6 +10,6 @@
* lines-of-code
*/
import ruby
import codeql.ruby.AST
select sum(RubyFile f | exists(f.getRelativePath()) | f.getNumberOfLinesOfCode())

View File

@@ -8,7 +8,7 @@
* @tags summary
*/
import ruby
import codeql.ruby.AST
select sum(RubyFile f |
f.fromSource() and

View File

@@ -7,7 +7,7 @@
* @tags summary
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.Diagnostics
select count(File f |

View File

@@ -7,7 +7,7 @@
* @tags summary
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.Diagnostics
select count(File f |

View File

@@ -10,7 +10,7 @@
* @precision low
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.dataflow.SSA
class RelevantLocalVariableWriteAccess extends LocalVariableWriteAccess {

View File

@@ -10,7 +10,7 @@
* @precision low
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.dataflow.SSA
class RelevantLocalVariableReadAccess extends LocalVariableReadAccess {

View File

@@ -10,7 +10,7 @@
* @precision low
*/
import ruby
import codeql.ruby.AST
import codeql.ruby.dataflow.SSA
class RelevantParameterVariable extends LocalVariable {