mirror of
https://github.com/github/codeql.git
synced 2026-05-03 04:39:29 +02:00
Ruby: drop SanitizerIn from ClearTextLoggingQuery
This commit is contained in:
@@ -37,11 +37,6 @@ module CleartextLogging {
|
||||
*/
|
||||
abstract class Sanitizer extends DataFlow::Node { }
|
||||
|
||||
/**
|
||||
* A node that receives sanitized sensitive information.
|
||||
*/
|
||||
abstract class SanitizerIn extends DataFlow::Node { }
|
||||
|
||||
/**
|
||||
* Holds if `re` may be a regular expression that can be used to sanitize
|
||||
* sensitive data with a call to `sub`.
|
||||
@@ -83,7 +78,7 @@ module CleartextLogging {
|
||||
* Logger.new(STDOUT).info password
|
||||
* ```
|
||||
*/
|
||||
private class MaskingReplacerSanitizedNode extends SanitizerIn {
|
||||
private class MaskingReplacerSanitizedNode extends Sanitizer {
|
||||
MaskingReplacerSanitizedNode() {
|
||||
exists(Ssa::Definition def |
|
||||
exists(MaskingReplacerSanitizer maskCall |
|
||||
|
||||
@@ -28,10 +28,6 @@ class Configuration extends TaintTracking::Configuration {
|
||||
node instanceof CleartextLogging::Sanitizer
|
||||
}
|
||||
|
||||
override predicate isSanitizerIn(DataFlow::Node node) {
|
||||
node instanceof CleartextLogging::SanitizerIn
|
||||
}
|
||||
|
||||
override predicate isAdditionalTaintStep(DataFlow::Node nodeFrom, DataFlow::Node nodeTo) {
|
||||
CleartextLogging::isAdditionalTaintStep(nodeFrom, nodeTo)
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user