Skip to content

Commit

Permalink
Linux build (#787)
Browse files Browse the repository at this point in the history
* Add Linux and mac. remove VsDevCmd.bat

* Bld

* Src

* .NET Core 3.1 runtime

* Fix indent

* 6.0.x

* 3.1.x + 6.0.x

* Src/Plugins

* 7.0.x

* 3.1 -> 7.0 -> 6.0

* sdk

* 3.1 -> 6.0 -> 7.0

* "Inputs\"
ThisAssembly.Location, "..", "..", "..", "..", "..", ".."

* @"..\..\..",

* TestTraits.WindowsOnly

* format only

* 1

* `

* 2

* 3

* 4

* 5

* `

* 1

* 2

* 3

* `

* enable Linux

* e:\repros @$"c:\{Guid.NewGuid()}.json"

* SharedStrings.txt

* override ProductRootDirectory

* PluginDirectory, scripts\BuildAndTest.ps1

* Path.DirectorySeparatorChar

* "." + Path.DirectorySeparatorChar
@".\TestData\"

* try PostgreSqlCredentialsValidator_DebugFingerprint

* SearchSkimmer_DetectsFilePatternOnly

* SecurePlaintextSecrets_EndToEndFunctionalTests UseSecureApi_EndToEndFunctionalTests

* AZC101,102,SEC105,102,103

* [Trait(TestTraits.WindowsOnly, "true")]
public class Regex2Tests

* try always IronRE2

* AnalyzeCommand_RedactSensitiveData

* return new SearchSkimmer(
                engine: engine ?? RE2Regex.Instance,
                engine: engine ?? IronRE2Regex.Instance,

* Fix SpamAnalyzer.Analyze and RegexEngine = RegexEngine.IronRE2

* RE2Regex.Instance

* AnalyzeCommand_SniffRegex

* [Trait("WindowsOnly", "true")]
    public class HttpAnalyzeFunctionTests

* ProgramTests
PostgreSqlCredentialsValidator_DebugFingerprint

* AnalyzeCommand_SniffRegex
AnalyzeCommand_ShouldProduceResultsForTargetsInFileSizeRange
AnalyzeCommand_FailureLevelShouldBeDefaultUnlessDynamicallyValidated

* install Microsoft.NET.Test.Sdk for Cli

* revert

* remove xunit

* AzureDevOpsConfiguration_EndToEndFunctionalTests

* revert AzureDevOpsConfiguration_EndToEndFunctionalTests

* @"C:\"

* AnalyzeCommand_FailureLevelShouldBeDefaultUnlessDynamicallyValidated

* revert AnalyzeCommand_FailureLevelShouldBeDefaultUnlessDynamicallyValidated

* temp disable
AnalyzeCommand_AnalyzeFromContext_TimesOutMultithreaded
AnalyzeCommand_AnalyzeFromContext_TimesOutSinglethreaded

* bld

* disable AnalyzeCommand_AnalyzeFromContext_CancelledExternallySinglethreaded

* disable AnalyzeCommand_AnalyzeFromContext_CancelledExternallyMultithreaded

* fix disable AnalyzeCommand_AnalyzeFromContext_CancelledExternallyMultithreaded

* src

* rebase SEC103_002.ASCIIArmoredFile_fake.sarif for ReviewPotentiallySensitiveFiles_EndToEndFunctionalTests

* .gitmodules Src

* Src/RE2.Native/re2

* local build ok

* no path

* revert Src/RE2.Native/re2

* Remove submodules

* add back sub module

* remove sub module

* add back

* trigger

* trigger 2

* --init --recursive

* delete

* add back

* Move 1

* Move 2

* remove Retrieving RE2 submodule... and Retrieving Sarif-Sdk submodule...

* Write-Information $RepoRoot
    ls

* Move file

* filePath: ./Scripts/BuildAndTest.ps1

* rename scripts

* \Targets\

* Targets

* remove "WindowsOnly"

* Add back .sarif folder

* revert git ignore

* Add Release History

* Targets

* remove log

* remove
# Reset the path from Sarif.Sdk back to SarifPatternMatcher.
    $RepoRoot = $(Resolve-Path $PSScriptRoot\..).Path

* add back $RepoRoot

* PostgreSqlCredentialsValidator_DebugFingerprint

* PostgreSqlCredentialsValidator_DebugFingerprint enable

* revert

* del SEC101_028.PlaintextPassword.ps1

* Add SEC101_028.PlaintextPassword.ps1

* manual change SEC101_028.PlaintextPassword.ps1

* remove ref

* remove (Skip = "Random fails.")

* //DotNetRegex.Instance,

* RegexEngine.RE2 : RegexEngine.IronRE2
  • Loading branch information
shaopeng-gh committed Aug 1, 2023
1 parent 377220b commit 79a6b56
Show file tree
Hide file tree
Showing 446 changed files with 242 additions and 175 deletions.
4 changes: 2 additions & 2 deletions .gitmodules
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
[submodule "Src/RE2.Native/re2"]
path = Src/RE2.Native/re2
path = src/RE2.Native/re2
url = https://github.com/google/re2.git
[submodule "Src/sarif-sdk"]
path = Src/sarif-sdk
path = src/sarif-sdk
url = https://github.com/microsoft/sarif-sdk
4 changes: 2 additions & 2 deletions CONTRIBUTING.md
Original file line number Diff line number Diff line change
Expand Up @@ -50,8 +50,8 @@ To build the solution you can:

* Use Visual Studio:

1. Open the solution `Src\RE2.Native.sln` and build.
2. Open the solution `Src\SarifPatternMatcher.sln` and build.
1. Open the solution `src\RE2.Native.sln` and build.
2. Open the solution `src\SarifPatternMatcher.sln` and build.

## Troubleshooting First Commit
If you are having trouble with your first commit or push to the GitHub, first please confirm with your repository admin to ensure you have write permissions.
Expand Down
3 changes: 3 additions & 0 deletions ReleaseHistory.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,9 @@
- UER => Eliminate unhandled exceptions in rule.
- UEE => Eliminate unhandled exceptions in engine.

## UNRELEASED
- NEW: Add Linux And macOS build pipeline, Rename folder `Src` to `src`, `Scripts` to `scripts`, `Targets` to `targets`. [#787](https://github.com/microsoft/sarif-pattern-matcher/pull/787)

## v4.6.0 7/27/2023
- DEP: Update SARIF SDK submodule from [7e8def7 to dd3741f(https://github.com/microsoft/sarif-sdk/compare/7e8def7..dd3741f). [Full SARIF SDK release history](https://github.com/microsoft/sarif-sdk/blob/dd3741f/ReleaseHistory.md).
- DEP: Upgrade `Microsoft.Security.Utilities` from 6.2.1 to 6.5.0. [#788](https://github.com/microsoft/sarif-pattern-matcher/pull/788)
Expand Down
1 change: 0 additions & 1 deletion Src/RE2.Native/re2
Submodule re2 deleted from cd026c
65 changes: 36 additions & 29 deletions azure-pipelines.yml
Original file line number Diff line number Diff line change
@@ -1,37 +1,44 @@
pr:
- 'main'
- "main"

pool:
vmImage: 'windows-2022'
jobs:
- job: NET_pipeline
strategy:
matrix:
linux:
imageName: "ubuntu-20.04"
mac:
imageName: "macOS-latest"
windows:
imageName: "windows-latest"
maxParallel: 4

steps:
- task: UseDotNet@2
displayName: .NET Core 3.1 sdk
inputs:
version: "3.1.x"
packageType: sdk
pool:
vmImage: $(imageName)

- task: UseDotNet@2
displayName: .NET Core 6.0 sdk
inputs:
version: "6.0.x"
packageType: sdk
steps:
- task: UseDotNet@2
displayName: .NET Core 3.1 sdk
inputs:
version: "3.1.x"
packageType: sdk

- task: BatchScript@1
displayName: 'Run VsDevCmd.bat'
inputs:
filename: 'C:\Program Files\Microsoft Visual Studio\2022\Enterprise\Common7\Tools\VsDevCmd.bat'
modifyEnvironment: true
- task: UseDotNet@2
displayName: .NET Core 6.0 sdk
inputs:
version: "6.0.x"
packageType: sdk

- task: BatchScript@1
displayName: 'Run BuildAndTest.cmd'
inputs:
filename: 'BuildAndTest.cmd'
arguments: '-Configuration Release -EnableCoverage'
- task: PowerShell@2
displayName: Build and Test
inputs:
targetType: filePath
filePath: ./scripts/BuildAndTest.ps1
arguments: "-Configuration Release -EnableCoverage"

- task: PublishTestResults@2
inputs:
testRunner: VSTest
testResultsFiles: '**/*.trx'
- task: PublishTestResults@2
inputs:
testRunner: VSTest
testResultsFiles: "**/*.trx"

- task: ComponentGovernanceComponentDetection@0
- task: ComponentGovernanceComponentDetection@0
6 changes: 3 additions & 3 deletions docs/CreatingPlugins.md
Original file line number Diff line number Diff line change
Expand Up @@ -115,6 +115,6 @@ The `targets` file contains all the instructions to move files during installati

For examples, check the public repository:

- [txt file](https://github.com/microsoft/sarif-pattern-matcher/blob/main/Src/Plugins/Security/Security.SharedStrings.txt)
- [json file](https://github.com/microsoft/sarif-pattern-matcher/blob/main/Src/Plugins/Security/SEC101.SecurePlaintextSecrets.json)
- [targets file](https://github.com/microsoft/sarif-pattern-matcher/blob/main/Src/Plugins/Security/build/Sarif.PatternMatcher.Security.targets)
- [txt file](https://github.com/microsoft/sarif-pattern-matcher/blob/main/src/Plugins/Security/Security.SharedStrings.txt)
- [json file](https://github.com/microsoft/sarif-pattern-matcher/blob/main/src/Plugins/Security/SEC101.SecurePlaintextSecrets.json)
- [targets file](https://github.com/microsoft/sarif-pattern-matcher/blob/main/src/Plugins/Security/build/Sarif.PatternMatcher.Security.targets)
31 changes: 14 additions & 17 deletions Scripts/BuildAndTest.ps1 → scripts/BuildAndTest.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -38,6 +38,7 @@ param(
Set-StrictMode -Version Latest
$ErrorActionPreference = "Stop"
$InformationPreference = "Continue"
$NonWindowsOptions = @{}

$ScriptName = $([io.Path]::GetFileNameWithoutExtension($PSCommandPath))
$RepoRoot = $(Resolve-Path $PSScriptRoot\..).Path
Expand All @@ -48,32 +49,26 @@ function Exit-WithFailureMessage($scriptName, $message) {
exit 1
}

if (-not (Test-Path "$RepoRoot\Src\RE2.Native\re2\re2")) {
Write-Information "Retrieving RE2 submodule..."
git submodule init
git submodule update
}

if (-not (Test-Path "$RepoRoot\Src\Sarif-Sdk")) {
Write-Information "Retrieving Sarif-Sdk submodule..."
git submodule init
git submodule update
}
Write-Information "Retrieving submodules..."
git submodule update --init --recursive

If (Test-Path "..\bld") {
Write-Information "Deleting old build..."
rd /s /q ..\bld
Remove-Item -Path ..\bld -Recurse -Force -Confirm:$false
}

if (-not $NoBuild) {
Write-Information "Building Sarif.Sdk"
& $RepoRoot\Src\sarif-sdk\BuildAndTest.cmd -NoBuild -NoTest -NoPublish -NoSigningDirectory -NoPackage -NoFormat
& $RepoRoot\src\sarif-sdk\scripts\BuildAndTest.ps1 -NoBuild -NoTest -NoPublish -NoSigningDirectory -NoPackage -NoFormat
if ($LASTEXITCODE -ne 0) {
Exit-WithFailureMessage $ScriptName "Build of sarif.sdk failed."
}
}

# Reset the path from Sarif.Sdk back to SarifPatternMatcher.
$RepoRoot = $(Resolve-Path $PSScriptRoot\..).Path

Write-Information "Building SarifPatternMatcher.sln (dotnet)..."
dotnet build $RepoRoot\Src\SarifPatternMatcher.sln -c $Configuration -p:Deterministic=true
dotnet build $RepoRoot\src\SarifPatternMatcher.sln -c $Configuration -p:Deterministic=true
if ($LASTEXITCODE -ne 0) {
Exit-WithFailureMessage $ScriptName "Build of SarifPatternMatcher failed."
}
Expand All @@ -86,8 +81,10 @@ if (-not $NoTest) {
if (-not $EnableCoverage) {
$CodeCoverageCommand = ""
}

dotnet test $RepoRoot\Src\SarifPatternMatcher.sln -c $Configuration --logger trx --no-build $CodeCoverageCommand --settings $RepoRoot\Src\SarifPatternMatcher.runsettings /p:IncludeTestAssembly=false
if (-not $ENV:OS) {
$NonWindowsOptions = @{ "-filter" = "WindowsOnly!=true" }
}
dotnet test $RepoRoot\src\SarifPatternMatcher.sln -c $Configuration --logger trx --no-build $CodeCoverageCommand --settings $RepoRoot\src\SarifPatternMatcher.runsettings /p:IncludeTestAssembly=false @NonWindowsOptions

if ($LASTEXITCODE -ne 0) {
Exit-WithFailureMessage $ScriptName "Test of SarifPatternMatcher failed."
Expand Down
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
<Project Sdk="Microsoft.NET.Sdk">

<Import Project="$(MSBuildThisFileDirectory)..\..\..\Targets\build.common.props" />
<Import Project="$(MSBuildThisFileDirectory)..\..\..\Targets\build.product.props" />
<Import Project="$(MSBuildThisFileDirectory)..\..\..\Targets\build.plugins.props" />
<Import Project="$(MSBuildThisFileDirectory)..\..\..\targets\build.common.props" />
<Import Project="$(MSBuildThisFileDirectory)..\..\..\targets\build.product.props" />
<Import Project="$(MSBuildThisFileDirectory)..\..\..\targets\build.plugins.props" />

<PropertyGroup Label="AssemblyAttributes">
<TargetFrameworks>netstandard2.1;net472</TargetFrameworks>
Expand Down
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
<Project Sdk="Microsoft.NET.Sdk">

<Import Project="$(MSBuildThisFileDirectory)..\..\..\Targets\build.common.props" />
<Import Project="$(MSBuildThisFileDirectory)..\..\..\Targets\build.product.props" />
<Import Project="$(MSBuildThisFileDirectory)..\..\..\Targets\build.plugins.props" />
<Import Project="$(MSBuildThisFileDirectory)..\..\..\targets\build.common.props" />
<Import Project="$(MSBuildThisFileDirectory)..\..\..\targets\build.product.props" />
<Import Project="$(MSBuildThisFileDirectory)..\..\..\targets\build.plugins.props" />

<PropertyGroup Label="AssemblyAttributes">
<TargetFrameworks>netstandard2.0;net472</TargetFrameworks>
Expand Down
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
<Project Sdk="Microsoft.NET.Sdk">

<Import Project="$(MSBuildThisFileDirectory)..\..\..\Targets\build.common.props" />
<Import Project="$(MSBuildThisFileDirectory)..\..\..\Targets\build.product.props" />
<Import Project="$(MSBuildThisFileDirectory)..\..\..\Targets\build.plugins.props" />
<Import Project="$(MSBuildThisFileDirectory)..\..\..\targets\build.common.props" />
<Import Project="$(MSBuildThisFileDirectory)..\..\..\targets\build.product.props" />
<Import Project="$(MSBuildThisFileDirectory)..\..\..\targets\build.plugins.props" />

<PropertyGroup Label="AssemblyAttributes">
<TargetFrameworks>netstandard2.1;net472</TargetFrameworks>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,7 @@ public BuildDefinitionSecurityTests(ITestOutputHelper outputHelper) : base(outpu
protected override string TypeUnderTest => "BuildDefinitionSecurity";

[Fact]
[Trait(TestTraits.WindowsOnly, "true")]
public void AzureDevOpsConfiguration_EndToEndFunctionalTests()
=> RunAllTests();
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,7 @@ public ServiceConnectionSecurityTests(ITestOutputHelper outputHelper) : base(out
protected override string TypeUnderTest => "ServiceConnectionSecurity";

[Fact]
[Trait(TestTraits.WindowsOnly, "true")]
public void AzureDevOpsConfiguration_EndToEndFunctionalTests()
=> RunAllTests();
}
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
<Project Sdk="Microsoft.NET.Sdk">

<Import Project="$(MSBuildThisFileDirectory)..\..\..\Targets\build.app.props" />
<Import Project="$(MSBuildThisFileDirectory)..\..\..\Targets\build.test.props" />
<Import Project="$(MSBuildThisFileDirectory)..\..\..\targets\build.app.props" />
<Import Project="$(MSBuildThisFileDirectory)..\..\..\targets\build.test.props" />

<PropertyGroup Label="AssemblyAttributes">
<RootNamespace>$(RootNamespaceBase).Sarif.PatternMatcher.Plugins.AzureDevOpsConfiguration</RootNamespace>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,7 @@ public UpdateSalToCurrentVersionTests(ITestOutputHelper outputHelper) : base(out
protected override string TypeUnderTest => "UpdateSalToCurrentVersion";

[Fact]
[Trait(TestTraits.WindowsOnly, "true")]
public void UpdateSalToCurrentVersion_EndToEndFunctionalTests()
=> RunAllTests();
}
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
<Project Sdk="Microsoft.NET.Sdk">

<Import Project="$(MSBuildThisFileDirectory)..\..\..\Targets\build.app.props" />
<Import Project="$(MSBuildThisFileDirectory)..\..\..\Targets\build.test.props" />
<Import Project="$(MSBuildThisFileDirectory)..\..\..\targets\build.app.props" />
<Import Project="$(MSBuildThisFileDirectory)..\..\..\targets\build.test.props" />

<PropertyGroup Label="AssemblyAttributes">
<RootNamespace>$(RootNamespaceBase).Sarif.PatternMatcher.Plugins.SalModernization</RootNamespace>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -58,6 +58,8 @@ protected EndToEndTests(ITestOutputHelper outputHelper) : base(outputHelper)

protected override string TestLogResourceNameRoot => $"Microsoft.CodeAnalysis.Sarif.PatternMatcher.Plugins.Security.TestData.{TypeUnderTest}";

protected override string ProductRootDirectory => Path.Combine(ThisAssembly.Location, "..", "..", "..", "..", "..", "..");

protected override string TestBinaryTestDataDirectory => Path.Combine(ProductRootDirectory, "src", "Plugins", TestBinaryName, "TestData");

protected override string ProductTestDataDirectory => Path.Combine(TestBinaryTestDataDirectory, TypeUnderTest);
Expand Down Expand Up @@ -132,7 +134,7 @@ protected override string ConstructTestOutputFromInputResource(string inputResou

string filePath = Path.Combine(
ProductTestDataDirectory,
@"Inputs\",
"Inputs",
parameter as string);

IFileSystem fileSystem = FileSystem.Instance;
Expand Down Expand Up @@ -187,11 +189,11 @@ protected override string ConstructTestOutputFromInputResource(string inputResou

SarifLog sarifLog = JsonConvert.DeserializeObject<SarifLog>(sb.ToString());

string pluginRoot = Path.GetDirectoryName(DefinitionsPath) + @"\";
string pluginRoot = PluginDirectory + Path.DirectorySeparatorChar;
var rebaseUriVisitor = new RebaseUriVisitor("EXTENSION_ROOT", new Uri(pluginRoot));
rebaseUriVisitor.Visit(sarifLog);

string sourceRoot = GitHelper.Default.GetTopLevel(Path.GetDirectoryName(filePath)) + @"\";
string sourceRoot = ProductRootDirectory;
rebaseUriVisitor = new RebaseUriVisitor("SRC_ROOT", new Uri(sourceRoot));
rebaseUriVisitor.Visit(sarifLog);

Expand All @@ -207,7 +209,9 @@ protected override string ConstructTestOutputFromInputResource(string inputResou
private string GetPluginDirectory()
{
string result = Path.Combine(ThisAssembly.Location,
@"..\..\..",
"..",
"..",
"..",
PluginName,
Framework);

Expand All @@ -218,7 +222,7 @@ protected void RunAllTests()
{
Directory.Exists(ProductTestDataDirectory).Should().BeTrue();

string testsDirectory = Path.Combine(ProductTestDataDirectory, @"Inputs\");
string testsDirectory = Path.Combine(ProductTestDataDirectory, "Inputs");

var inputFiles = new List<string>();
var expectedOutputResourceMap = new Dictionary<string, string>();
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,7 @@ public SecurePlaintextSecretsTests(ITestOutputHelper outputHelper) : base(output
protected override string TypeUnderTest => "SecurePlaintextSecrets";

[Fact]
[Trait(TestTraits.WindowsOnly, "true")]
public void SecurePlaintextSecrets_EndToEndFunctionalTests()
=> RunAllTests();

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,7 @@ public ReviewPotentiallySensitiveDataTests(ITestOutputHelper outputHelper) : bas
protected override string TypeUnderTest => "ReviewPotentiallySensitiveData";

[Fact]
[Trait(TestTraits.WindowsOnly, "true")]
public void ReviewPotentiallySensitiveData_EndToEndFunctionalTests()
=> RunAllTests();
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,7 @@ public ReviewPotentiallySensitiveFilesTests(ITestOutputHelper outputHelper) : ba
protected override string TypeUnderTest => "ReviewPotentiallySensitiveFiles";

[Fact]
[Trait(TestTraits.WindowsOnly, "true")]
public void ReviewPotentiallySensitiveFiles_EndToEndFunctionalTests()
=> RunAllTests();
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,7 @@ public UseSecureApiTests(ITestOutputHelper outputHelper) : base(outputHelper)
protected override string TypeUnderTest => "UseSecureApi";

[Fact]
[Trait(TestTraits.WindowsOnly, "true")]
public void UseSecureApi_EndToEndFunctionalTests()
=> RunAllTests();
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -35,6 +35,7 @@ public void PostgreSqlCredentialsValidator_Test()
}

[Fact]
[Trait(TestTraits.WindowsOnly, "true")]
public void PostgreSqlCredentialsValidator_DebugFingerprint()
{
string fingerprintText = "[host=place.location.com][id=database][secret=password]";
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -74,13 +74,13 @@
}
],
"fingerprints": {
"secretHashSha256/v0": "cd2099a31af74edb52f9e10e620289f310c43b5f3dcdb41ad30b8a0b2a4e14c6",
"secretHashSha256/v0": "731584c0c360c3be368abcdb3a5cce5fb3261b432a9f6c306a5688d79016b37e",
"assetFingerprint/v0": "{}",
"validationFingerprintHashSha256/v0": "3091100e5f9225c2bf47cc2be58c2f19d305e63417d7e0205cfec5788b2c6138",
"secretFingerprint/v0": "{\"secret\":\"BE81853AB9435115A64B36C2A3E51B7561ED1DB28B44F945A095D78C751B1238\"}",
"validationFingerprint/v0": "{\"secret\":\"BE81853AB9435115A64B36C2A3E51B7561ED1DB28B44F945A095D78C751B1238\"}"
"validationFingerprintHashSha256/v0": "9221567fa17f88a25b9698caf2aea86196195f9285f32ed9d0b4638fb3acbbae",
"secretFingerprint/v0": "{\"secret\":\"6CD48BC899D27E776A861E5E99BD074C79E252ED75AE27A56E573A430576B093\"}",
"validationFingerprint/v0": "{\"secret\":\"6CD48BC899D27E776A861E5E99BD074C79E252ED75AE27A56E573A430576B093\"}"
},
"rank": 54.24
"rank": 53.72
}
],
"columnKind": "utf16CodeUnits"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
Volume in drive E is DATADRIVE1
Volume Serial Number is 1235-2302

Directory of E:\src\spam\Src\Plugins\Tests.Security\TestData\ReviewPotentiallySensitiveFiles\Inputs
Directory of E:\src\spam\src\Plugins\Tests.Security\TestData\ReviewPotentiallySensitiveFiles\Inputs

12/17/2020 11:40 AM <DIR> .
12/17/2020 11:40 AM <DIR> ..
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -15,4 +15,4 @@ ConvertTo-SecureString -String '6ood137777' -AsPlainText -Force)) #Set-TargetRe
# These should not be matched
ConvertTo-SecureString -String "$($redisResourceName).redis.cache.windows.net:6380,password=$($redisKey),ssl=True,abortConnect=False" -AsPlainText -Force .\Add-KeyVaultSecret.ps1 ` -KeyVaultName $KeyVaultName ` -SecretName ($secretName) ` -SecretValue $redisConnectionString ` -SecretExpiry $Secre
ConvertTo-SecureString -String '$(adminPassword)' -AsPlainText -Force) -adminUsername $(adminUserName)", } }, { "enabled": true, "continueOnError": true, "timeoutInMinutes": 0, "task": { "id": "some-guid", "versionSpec": "1.*", "definitionType""
ConvertTo-SecureString -String "$(Password)" -AsPlainText -Force))) -TestResultsFile (Join-Path "$(System.DefaultWorkingDirectory)" "TestResults.xml") -test "unittests"' - task: PublishTestResults@2   displayName: 'Publish Test Results'   inputs:     testResultsFormat: XUnit     testResultsFiles: TestResults.xml - task: PublishBu
ConvertTo-SecureString -String "$(Password)" -AsPlainText -Force))) -TestResultsFile (Join-Path "$(System.DefaultWorkingDirectory)" "TestResults.xml") -test "unittests"' - task: PublishTestResults@2 displayName: 'Publish Test Results' inputs: testResultsFormat: XUnit testResultsFiles: TestResults.xml - task: PublishBu
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
<Project Sdk="Microsoft.NET.Sdk">

<Import Project="$(MSBuildThisFileDirectory)..\..\..\Targets\build.app.props" />
<Import Project="$(MSBuildThisFileDirectory)..\..\..\Targets\build.test.props" />
<Import Project="$(MSBuildThisFileDirectory)..\..\..\targets\build.app.props" />
<Import Project="$(MSBuildThisFileDirectory)..\..\..\targets\build.test.props" />

<PropertyGroup Label="AssemblyAttributes">
<RootNamespace>$(RootNamespaceBase).Sarif.PatternMatcher.Plugins.Security</RootNamespace>
Expand Down
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
Loading

0 comments on commit 79a6b56

Please sign in to comment.