Merge pull request #17968 from michaelnebel/java/movetestutils

Move test utilities to the query pack.
This commit is contained in:
Michael Nebel
2024-12-16 13:41:30 +01:00
committed by GitHub
667 changed files with 623 additions and 623 deletions

View File

@@ -4,7 +4,7 @@
* Example for a test.ql:
* ```ql
* import swift
* import TestUtilities.InlineFlowTest
* import utils.test.InlineFlowTest
* import DefaultFlowTest
* import PathGraph
*
@@ -39,7 +39,7 @@
import codeql.swift.dataflow.DataFlow
import codeql.swift.dataflow.ExternalFlow
import codeql.swift.dataflow.TaintTracking
import TestUtilities.InlineExpectationsTest
import utils.test.InlineExpectationsTest
private predicate defaultSource(DataFlow::Node source) {
source

View File

@@ -1,2 +1,2 @@
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import DefaultFlowTest

View File

@@ -1,4 +1,4 @@
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import FlowConfig
string customTaintFlowTag() { result = "flow" }

View File

@@ -1,5 +1,5 @@
import swift
import TestUtilities.InlineExpectationsTest
import utils.test.InlineExpectationsTest
import FlowConfig
import codeql.swift.dataflow.TaintTracking
import codeql.swift.dataflow.DataFlow

View File

@@ -1,4 +1,4 @@
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
import Taint
string customTaintFlowTag() { result = "tainted" }

View File

@@ -1,4 +1,4 @@
import TestUtilities.InlineFlowTest
import utils.test.InlineFlowTest
string customTaintFlowTag() { result = "tainted" }

View File

@@ -3,7 +3,7 @@ import codeql.swift.regex.Regex
private import codeql.swift.regex.internal.ParseRegex
private import codeql.swift.regex.RegexTreeView::RegexTreeView as TreeView
import codeql.regex.nfa.ExponentialBackTracking::Make<TreeView>
import TestUtilities.InlineExpectationsTest
import utils.test.InlineExpectationsTest
bindingset[s]
string quote(string s) { if s.matches("% %") then result = "\"" + s + "\"" else result = s }

View File

@@ -2,7 +2,7 @@ import swift
import codeql.swift.dataflow.DataFlow
import codeql.swift.dataflow.FlowSources
import codeql.swift.security.PathInjectionQuery
import TestUtilities.InlineExpectationsTest
import utils.test.InlineExpectationsTest
module PathInjectionTest implements TestSig {
string getARelevantTag() { result = "hasPathInjection" }

View File

@@ -1,2 +1,2 @@
query: queries/Security/CWE-094/UnsafeJsEval.ql
postprocess: TestUtilities/InlineExpectationsTestQuery.ql
postprocess: utils/test/InlineExpectationsTestQuery.ql

View File

@@ -1,7 +1,7 @@
import swift
import codeql.swift.dataflow.DataFlow
import codeql.swift.security.CleartextLoggingQuery
import TestUtilities.InlineExpectationsTest
import utils.test.InlineExpectationsTest
module CleartextLogging implements TestSig {
string getARelevantTag() { result = "hasCleartextLogging" }

View File

@@ -1,7 +1,7 @@
import swift
import codeql.swift.dataflow.FlowSources
import codeql.swift.security.XXEQuery
import TestUtilities.InlineExpectationsTest
import utils.test.InlineExpectationsTest
class TestRemoteSource extends RemoteFlowSource {
TestRemoteSource() { this.asExpr().(ApplyExpr).getStaticTarget().getName().matches("source%") }

View File

@@ -1,7 +1,7 @@
import swift
import codeql.swift.dataflow.DataFlow
import codeql.swift.security.PredicateInjectionQuery
import TestUtilities.InlineExpectationsTest
import utils.test.InlineExpectationsTest
module PredicateInjectionTest implements TestSig {
string getARelevantTag() { result = "hasPredicateInjection" }