Skip to content

Commit e7f8567

Browse files
committed
Java: Fix tests and make modules private
1 parent 2288eab commit e7f8567

File tree

4 files changed

+7
-10
lines changed

4 files changed

+7
-10
lines changed

java/ql/lib/semmle/code/java/security/RequestForgeryConfig.qll

+1-1
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ deprecated class RequestForgeryConfiguration extends TaintTracking::Configuratio
3535
/**
3636
* A taint-tracking configuration characterising request-forgery risks.
3737
*/
38-
module RequestForgeryConfiguration implements DataFlow::ConfigSig {
38+
private module RequestForgeryConfiguration implements DataFlow::ConfigSig {
3939
predicate isSource(DataFlow::Node source) {
4040
source instanceof RemoteFlowSource and
4141
// Exclude results of remote HTTP requests: fetching something else based on that result

java/ql/lib/semmle/code/java/security/SensitiveLoggingQuery.qll

+1-1
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ deprecated class SensitiveLoggerConfiguration extends TaintTracking::Configurati
4949
}
5050

5151
/** A data-flow configuration for identifying potentially-sensitive data flowing to a log output. */
52-
module SensitiveLoggerConfiguration implements DataFlow::ConfigSig {
52+
private module SensitiveLoggerConfiguration implements DataFlow::ConfigSig {
5353
predicate isSource(DataFlow::Node source) { source.asExpr() instanceof CredentialExpr }
5454

5555
predicate isSink(DataFlow::Node sink) { sinkNode(sink, "logging") }

java/ql/test/query-tests/security/CWE-532/SensitiveLogInfo.ql

+3-7
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,10 @@ import java
22
import TestUtilities.InlineFlowTest
33
import semmle.code.java.security.SensitiveLoggingQuery
44

5-
class EnableLegacy extends EnableLegacyConfiguration {
6-
EnableLegacy() { exists(this) }
7-
}
8-
95
class HasFlowTest extends InlineFlowTest {
10-
override DataFlow::Configuration getTaintFlowConfig() {
11-
result instanceof SensitiveLoggerConfiguration
6+
override predicate hasTaintFlow(DataFlow::Node src, DataFlow::Node sink) {
7+
SensitiveLoggerFlow::hasFlow(src, sink)
128
}
139

14-
override DataFlow::Configuration getValueFlowConfig() { none() }
10+
override predicate hasValueFlow(DataFlow::Node src, DataFlow::Node sink) { none() }
1511
}

java/ql/test/query-tests/security/CWE-918/RequestForgery.ql

+2-1
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,8 @@ class HasFlowTest extends InlineExpectationsTest {
99

1010
override predicate hasActualResult(Location location, string element, string tag, string value) {
1111
tag = "SSRF" and
12-
exists(RequestForgeryConfiguration conf, DataFlow::Node sink | conf.hasFlowTo(sink) |
12+
exists(DataFlow::Node sink |
13+
RequestForgeryFlow::hasFlowTo(sink) and
1314
sink.getLocation() = location and
1415
element = sink.toString() and
1516
value = ""

0 commit comments

Comments
 (0)