Skip to content

Commit 025e34d

Browse files
committed
Ruby: Simplify imports
1 parent ab6287a commit 025e34d

File tree

3 files changed

+9
-16
lines changed

3 files changed

+9
-16
lines changed

ruby/ql/lib/codeql/ruby/security/IncompleteMultiCharacterSanitizationQuery.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ private import codeql.ruby.security.IncompleteMultiCharacterSanitization
1212
* `dangerous` which matches a dangerous string beginning with `prefix`, in
1313
* attempt to avoid a vulnerability of kind `kind`.
1414
*/
15-
predicate hasResult(
15+
query predicate problems(
1616
StringSubstitutionCall replace, EmptyReplaceRegExpTerm dangerous, string prefix, string kind
1717
) {
1818
exists(EmptyReplaceRegExpTerm regexp |

ruby/ql/src/queries/security/cwe-116/IncompleteMultiCharacterSanitization.ql

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -13,15 +13,11 @@
1313
* external/cwe/cwe-116
1414
*/
1515

16-
import ruby
17-
import codeql.ruby.frameworks.core.String
1816
import codeql.ruby.DataFlow
19-
import codeql.ruby.security.IncompleteMultiCharacterSanitizationQuery
20-
import codeql.ruby.security.IncompleteMultiCharacterSanitizationSpecific as Specific
17+
import codeql.ruby.security.IncompleteMultiCharacterSanitizationQuery as Query
18+
import codeql.ruby.regexp.RegExpTreeView
2119

22-
from
23-
StringSubstitutionCall replace, Specific::EmptyReplaceRegExpTerm dangerous, string prefix,
24-
string kind
25-
where hasResult(replace, dangerous, prefix, kind)
20+
from DataFlow::Node replace, RegExpTerm dangerous, string prefix, string kind
21+
where Query::problems(replace, dangerous, prefix, kind)
2622
select replace, "This string may still contain $@, which may cause a " + kind + " vulnerability.",
2723
dangerous, prefix

ruby/ql/test/query-tests/security/cwe-116/IncompleteMultiCharacterSanitization/IncompleteMultiCharacterSanitization.ql

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,9 @@
33
*/
44

55
import ruby
6+
import codeql.ruby.regexp.RegExpTreeView as RETV
7+
import codeql.ruby.DataFlow
68
import codeql.ruby.security.IncompleteMultiCharacterSanitizationQuery as Query
7-
import codeql.ruby.security.IncompleteMultiCharacterSanitizationSpecific as Specific
8-
import codeql.ruby.frameworks.core.String
99
import TestUtilities.InlineExpectationsTest
1010

1111
class Test extends InlineExpectationsTest {
@@ -20,15 +20,12 @@ class Test extends InlineExpectationsTest {
2020
}
2121

2222
predicate hasResult(Location location, string element, string value) {
23-
exists(
24-
StringSubstitutionCall replace, Specific::EmptyReplaceRegExpTerm dangerous, string prefix,
25-
string kind
26-
|
23+
exists(DataFlow::Node replace, RETV::RegExpTerm dangerous, string prefix, string kind |
2724
replace.getLocation() = location and
2825
element = replace.toString() and
2926
value = shortKind(kind)
3027
|
31-
Query::hasResult(replace, dangerous, prefix, kind)
28+
Query::problems(replace, dangerous, prefix, kind)
3229
)
3330
}
3431

0 commit comments

Comments
 (0)