From 2d846d89a65b20f396a656982587a1c80ce268fb Mon Sep 17 00:00:00 2001 From: Jules Villard Date: Tue, 15 Nov 2016 07:50:26 -0800 Subject: [PATCH] [build tests] migrate buck integration test to Makefiles Summary: Only run the buck (and ant) tests if the tools can be found at ./configure-time. Reviewed By: jberdine Differential Revision: D4167586 fbshipit-source-id: e77b736 --- Makefile | 8 +- Makefile.config.in | 2 + configure.ac | 3 + infer/tests/build_systems/buck/Makefile | 29 + infer/tests/build_systems/buck/issues.exp | 187 ++++ .../build_systems/build_integration_tests.py | 30 +- .../expected_outputs/buck_report.json | 937 ------------------ 7 files changed, 236 insertions(+), 960 deletions(-) create mode 100644 infer/tests/build_systems/buck/Makefile create mode 100644 infer/tests/build_systems/buck/issues.exp delete mode 100644 infer/tests/build_systems/expected_outputs/buck_report.json diff --git a/Makefile b/Makefile index 7b5190877..87f93bb35 100644 --- a/Makefile +++ b/Makefile @@ -13,7 +13,13 @@ ifeq ($(IS_FACEBOOK_TREE),yes) include $(ROOT_DIR)/facebook/Makefile.env endif -BUILD_SYSTEMS_TESTS = ant assembly project_root_rel +BUILD_SYSTEMS_TESTS = assembly project_root_rel +ifneq ($(ANT),no) +BUILD_SYSTEMS_TESTS += ant +endif +ifneq ($(BUCK),no) +BUILD_SYSTEMS_TESTS += buck +endif DIRECT_TESTS= ifeq ($(BUILD_C_ANALYZERS),yes) diff --git a/Makefile.config.in b/Makefile.config.in index e0db0ea58..6ac62ac11 100644 --- a/Makefile.config.in +++ b/Makefile.config.in @@ -10,8 +10,10 @@ SHELL = bash PLATFORM = $(shell uname) +ANT = @ANT@ ATDGEN = @ATDGEN@ bindir = @bindir@ +BUCK = @BUCK@ BUILD_C_ANALYZERS = @BUILD_C_ANALYZERS@ BUILD_JAVA_ANALYZERS = @BUILD_JAVA_ANALYZERS@ CC = @CC@ diff --git a/configure.ac b/configure.ac index e0a2ebe79..a9bd4d797 100644 --- a/configure.ac +++ b/configure.ac @@ -274,6 +274,9 @@ else fi AC_SUBST([NCPU]) +# tools that are optional, eg build systems to be run in integration tests +AC_CHECK_TOOL([ANT], [ant], [no]) +AC_CHECK_TOOL([BUCK], [buck], [no]) AC_CONFIG_FILES([ Makefile.config diff --git a/infer/tests/build_systems/buck/Makefile b/infer/tests/build_systems/buck/Makefile new file mode 100644 index 000000000..77dc4fb8c --- /dev/null +++ b/infer/tests/build_systems/buck/Makefile @@ -0,0 +1,29 @@ +# Copyright (c) 2016 - present Facebook, Inc. +# All rights reserved. +# +# This source code is licensed under the BSD style license found in the +# LICENSE file in the root directory of this source tree. An additional grant +# of patent rights can be found in the PATENTS file in the same directory. + +CURDIR = $(shell pwd) + +TESTS_DIR = ../.. +ROOT_DIR = $(TESTS_DIR)/../.. + +ANALYZER = infer +SOURCES = $(wildcard $(TESTS_DIR)/codetoanalyze/java/infer/*.java) +OBJECTS = $(ROOT_DIR)/buck-out/gen/infer/tests/codetoanalyze/java/infer/lib__compile__output/compile.jar +INFERPRINT_OPTIONS = --project-root $(ROOT_DIR) --issues-tests +CLEAN_EXTRAS = $(ROOT_DIR)/buck-out/ $(CURDIR)/buck-out/ + +include $(TESTS_DIR)/java.make +include $(TESTS_DIR)/base.make + +$(JAR_OUTPUT): $(JAVA_SOURCE_FILES) + NO_BUCKD=1 buck build --no-cache //infer/tests/codetoanalyze/java/infer:compile + +infer-out/report.json: $(INFER_BIN) $(JAVA_SOURCE_FILES) + $(call silent_on_success,\ + cd $(ROOT_DIR) && \ + NO_BUCKD=1 $(INFER_BIN) -a $(ANALYZER) --results-dir $(CURDIR)/infer-out -- \ + buck build --no-cache //infer/tests/codetoanalyze/java/infer:compile) diff --git a/infer/tests/build_systems/buck/issues.exp b/infer/tests/build_systems/buck/issues.exp new file mode 100644 index 000000000..262b31fd7 --- /dev/null +++ b/infer/tests/build_systems/buck/issues.exp @@ -0,0 +1,187 @@ +infer/tests/codetoanalyze/java/infer/AnalysisStops.java, void AnalysisStops.fieldReadInCalleeMayCauseFalseNegative(), 3, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/AnalysisStops.java, void AnalysisStops.fieldReadInCalleeWithAngelicObjFieldMayCauseFalseNegative(), 3, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/AnalysisStops.java, void AnalysisStops.skipFunctionInLoopMayCauseFalseNegative(), 5, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/AutoGenerated.java, void AutoGenerated.npe(), 2, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/Builtins.java, void Builtins.doNotBlockError(Object), 3, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java, T CloseableAsResourceExample.sourceOfNullWithResourceLeak(), 1, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java, void CloseableAsResourceExample.failToCloseWithCloseQuietly(), 5, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java, void CloseableAsResourceExample.leakFoundWhenIndirectlyImplementingCloseable(), 1, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java, void CloseableAsResourceExample.notClosingCloseable(), 1, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java, void CloseableAsResourceExample.notClosingWrapper(), 2, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java, void CloseableAsResourceExample.skippedVritualCallDoesNotCloseResourceOnReceiver(), 2, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java, void CloseableAsResourceExample.withException(), 4, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ContextLeaks.java, ContextLeaks$Singleton ContextLeaks$Singleton.getInstance(Context), 4, CONTEXT_LEAK +infer/tests/codetoanalyze/java/infer/ContextLeaks.java, ContextLeaks$Singleton ContextLeaks.singletonLeak(), 1, CONTEXT_LEAK +infer/tests/codetoanalyze/java/infer/ContextLeaks.java, void ContextLeaks.directLeak(), 2, CONTEXT_LEAK +infer/tests/codetoanalyze/java/infer/ContextLeaks.java, void ContextLeaks.indirectLeak(), 4, CONTEXT_LEAK +infer/tests/codetoanalyze/java/infer/ContextLeaks.java, void ContextLeaks.leakAfterInstanceFieldWrite(), 3, CONTEXT_LEAK +infer/tests/codetoanalyze/java/infer/ContextLeaks.java, void ContextLeaks.nonStaticInnerClassLeak(), 2, CONTEXT_LEAK +infer/tests/codetoanalyze/java/infer/CursorLeaks.java, int CursorLeaks.completeDownloadNotClosed(DownloadManager), 8, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/CursorLeaks.java, int CursorLeaks.cursorNotClosed(SQLiteDatabase), 4, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/CursorLeaks.java, int CursorLeaks.getBucketCountNotClosed(), 10, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/CursorLeaks.java, int CursorLeaks.getImageCountHelperNotClosed(String), 13, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/CursorLeaks.java, void CursorLeaks.loadPrefsFromContentProviderNotClosed(), 11, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/CursorLeaks.java, void CursorLeaks.queryUVMLegacyDbNotClosed(), 4, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/DynamicDispatch.java, void DynamicDispatch.dynamicDispatchShouldNotCauseFalseNegativeEasy(), 3, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/DynamicDispatch.java, void DynamicDispatch.interfaceShouldNotCauseFalseNegativeEasy(), 3, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/DynamicDispatch.java, void DynamicDispatch.interfaceShouldNotCauseFalseNegativeHard(DynamicDispatch$Interface), 2, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java, void FilterInputStreamLeaks.bufferedInputStreamNotClosedAfterRead(), 7, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java, void FilterInputStreamLeaks.checkedInputStreamNotClosedAfterRead(), 7, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java, void FilterInputStreamLeaks.cipherInputStreamNotClosedAfterSkip(), 7, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java, void FilterInputStreamLeaks.dataInputStreamNotClosedAfterRead(), 8, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java, void FilterInputStreamLeaks.deflaterInputStreamNotClosedAfterRead(), 7, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java, void FilterInputStreamLeaks.digestInputStreamNotClosedAfterRead(), 8, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java, void FilterInputStreamLeaks.gzipInputStreamNotClosedAfterRead(), 4, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java, void FilterInputStreamLeaks.gzipInputStreamNotClosedAfterRead(), 7, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java, void FilterInputStreamLeaks.inflaterInputStreamNotClosedAfterRead(), 7, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java, void FilterInputStreamLeaks.pushbackInputStreamNotClosedAfterRead(), 7, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java, void FilterOutputStreamLeaks.bufferedOutputStreamNotClosedAfterWrite(), 8, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java, void FilterOutputStreamLeaks.checkedOutputStreamNotClosedAfterWrite(), 8, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java, void FilterOutputStreamLeaks.cipherOutputStreamNotClosedAfterWrite(), 8, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java, void FilterOutputStreamLeaks.dataOutputStreamNotClosedAfterWrite(), 8, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java, void FilterOutputStreamLeaks.deflaterOutputStreamNotClosedAfterWrite(), 8, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java, void FilterOutputStreamLeaks.digestOutputStreamNotClosedAfterWrite(), 8, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java, void FilterOutputStreamLeaks.filterOutputStreamNotClosedAfterWrite(), 8, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java, void FilterOutputStreamLeaks.gzipOutputStreamNotClosedAfterFlush(), 4, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java, void FilterOutputStreamLeaks.gzipOutputStreamNotClosedAfterFlush(), 7, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java, void FilterOutputStreamLeaks.inflaterOutputStreamNotClosedAfterWrite(), 8, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java, void FilterOutputStreamLeaks.printStreamNotClosedAfterWrite(), 6, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/GuardedByExample.java, Object GuardedByExample.byRefTrickyBad(), 5, UNSAFE_GUARDED_BY_ACCESS +infer/tests/codetoanalyze/java/infer/GuardedByExample.java, String GuardedByExample$3.readFromInnerClassBad1(), 2, UNSAFE_GUARDED_BY_ACCESS +infer/tests/codetoanalyze/java/infer/GuardedByExample.java, String GuardedByExample$4.readFromInnerClassBad2(), 1, UNSAFE_GUARDED_BY_ACCESS +infer/tests/codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.readFAfterBlockBad(), 3, UNSAFE_GUARDED_BY_ACCESS +infer/tests/codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.readFBad(), 1, UNSAFE_GUARDED_BY_ACCESS +infer/tests/codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.readFBadButSuppressedOther(), 1, UNSAFE_GUARDED_BY_ACCESS +infer/tests/codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.readFBadWrongAnnotation(), 1, UNSAFE_GUARDED_BY_ACCESS +infer/tests/codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.readFBadWrongLock(), 2, UNSAFE_GUARDED_BY_ACCESS +infer/tests/codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.readHBad(), 2, UNSAFE_GUARDED_BY_ACCESS +infer/tests/codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.readHBadSynchronizedMethodShouldntHelp(), 1, UNSAFE_GUARDED_BY_ACCESS +infer/tests/codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.synchronizedMethodReadBad(), 1, UNSAFE_GUARDED_BY_ACCESS +infer/tests/codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.synchronizedMethodWriteBad(), 1, UNSAFE_GUARDED_BY_ACCESS +infer/tests/codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.synchronizedOnThisBad(), 1, UNSAFE_GUARDED_BY_ACCESS +infer/tests/codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.writeFAfterBlockBad(), 3, UNSAFE_GUARDED_BY_ACCESS +infer/tests/codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.writeFBad(), 1, UNSAFE_GUARDED_BY_ACCESS +infer/tests/codetoanalyze/java/infer/GuardedByExample.java, void GuardedByExample.writeFBadWrongLock(), 2, UNSAFE_GUARDED_BY_ACCESS +infer/tests/codetoanalyze/java/infer/HashMapExample.java, int HashMapExample.getOneIntegerWithoutCheck(), 6, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/HashMapExample.java, void HashMapExample.getTwoIntegersWithOneCheck(Integer,Integer), 11, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/InvokeDynamic.java, int InvokeDynamic.lambda$npeInLambdaBad$1(String,String), 1, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/InvokeDynamic.java, void InvokeDynamic.invokeDynamicThenNpeBad(List), 5, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, String NullPointerExceptions.hashmapNPE(HashMap,Object), 1, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, String NullPointerExceptions.nullTryLock(FileChannel), 2, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, String NullPointerExceptions.testSystemGetPropertyArgument(), 1, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, String NullPointerExceptions.tryLockThrows(FileChannel), 6, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, int NullPointerExceptions.NPEvalueOfFromHashmapBad(HashMap,int), 1, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, int NullPointerExceptions.nullListFiles(String), 3, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, int NullPointerExceptions.nullPointerException(), 2, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, int NullPointerExceptions.nullPointerExceptionInterProc(), 2, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, int NullPointerExceptions.nullPointerExceptionWithExceptionHandling(boolean), 5, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions$$$Class$Name$With$Dollars.npeWithDollars(), 2, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.badCheckShouldCauseNPE(), 1, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.cursorFromContentResolverNPE(String), 9, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.derefNull(), 2, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.derefNullableGetter(), 2, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.derefNullableRet(boolean), 2, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.derefUndefNullableRet(), 2, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.derefUndefNullableRetWrapper(), 1, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.dereferenceAfterLoopOnList(NullPointerExceptions$L), 2, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.dereferenceAfterUnlock1(Lock), 4, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.dereferenceAfterUnlock2(Lock), 6, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.nullPointerExceptionArrayLength(), 2, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.nullPointerExceptionCallArrayReadMethod(), 2, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.nullPointerExceptionFromFailingFileOutputStreamConstructor(), 7, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.nullPointerExceptionFromFaillingResourceConstructor(), 6, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.nullPointerExceptionInArrayLengthLoop(java.lang.Object[]), 3, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.nullPointerExceptionUnlessFrameFails(), 4, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.nullPointerExceptionWithNullArrayParameter(), 1, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.nullPointerExceptionWithNullObjectParameter(), 1, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.nullableFieldNPE(), 1, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.nullableParamNPE(Object), 1, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.optionalNPE(Optional), 1, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.otherSinkWithNeverNullSource(), 3, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.sinkWithNeverNullSource(), 3, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.someNPEAfterResourceLeak(), 2, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.stringConstantEqualsFalseNotNPE_FP(), 10, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.stringVarEqualsFalseNPE(), 5, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java, void NullPointerExceptions.testSystemGetPropertyReturn(), 2, NULL_DEREFERENCE +infer/tests/codetoanalyze/java/infer/ReaderLeaks.java, void ReaderLeaks.bufferedReaderNotClosedAfterRead(), 6, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ReaderLeaks.java, void ReaderLeaks.fileReaderNotClosedAfterRead(), 6, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ReaderLeaks.java, void ReaderLeaks.inputStreamReaderNotClosedAfterRead(), 6, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ReaderLeaks.java, void ReaderLeaks.pipedReaderFalsePositive(), 5, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ReaderLeaks.java, void ReaderLeaks.pipedReaderNotClosedAfterConnect(PipedWriter), 7, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ReaderLeaks.java, void ReaderLeaks.pipedReaderNotClosedAfterConstructedWithWriter(), 8, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ReaderLeaks.java, void ReaderLeaks.pushbackReaderNotClosedAfterRead(), 6, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ReaderLeaks.java, void ReaderLeaks.readerNotClosedAfterRead(), 6, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, String ResourceLeaks.readInstallationFileBad(File), 6, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, boolean ResourceLeaks.jarFileNotClosed(), 3, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, int ResourceLeaks.fileOutputStreamTwoLeaks1(boolean), 3, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, int ResourceLeaks.fileOutputStreamTwoLeaks1(boolean), 6, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, int ResourceLeaks.readConfigNotCloseStream(String), 5, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.activityObtainTypedArrayAndLeak(Activity), 2, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.contextObtainTypedArrayAndLeak(Context), 2, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.copyFileLeak(File,File), 11, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.copyFileLeak(File,File), 11, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.deflaterLeak(), 1, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.fileInputStreamNotClosedAfterRead(), 6, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.fileOutputStreamNotClosed(), 1, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.fileOutputStreamNotClosedAfterWrite(), 7, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.fileOutputStreamOneLeak(), 2, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.fileOutputStreamTwoLeaks2(), 2, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.fileOutputStreamTwoLeaks2(), 5, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.inflaterLeak(), 1, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.jarInputStreamLeak(), 3, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.jarOutputStreamLeak(), 3, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.nestedBad1(), 1, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.nestedBad2(), 1, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.nestedBadJarInputStream(File), 1, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.nestedBadJarOutputStream(), 1, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.objectInputStreamClosedNestedBad(), 3, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.objectInputStreamNotClosedAfterRead(), 3, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.objectInputStreamNotClosedAfterRead(), 6, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.objectOutputStreamClosedNestedBad(), 3, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.objectOutputStreamNotClosedAfterWrite(), 4, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.objectOutputStreamNotClosedAfterWrite(), 7, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.openHttpURLConnectionNotDisconnected(), 7, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.openHttpsURLConnectionNotDisconnected(), 3, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.parseFromInputStreamAndLeak(JsonFactory), 5, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.pipedInputStreamNotClosedAfterRead(PipedOutputStream), 6, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.pipedOutputStreamNotClosedAfterWrite(), 7, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.scannerNotClosed(), 1, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.serverSocketNotClosed(), 12, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.socketNotClosed(), 1, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.themeObtainTypedArrayAndLeak(Resources$Theme), 2, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.twoResources(), 11, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.twoResourcesRandomAccessFile(), 10, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.twoResourcesServerSocket(), 10, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/ResourceLeaks.java, void ResourceLeaks.zipFileLeakExceptionalBranch(), 5, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/TaintExample.java, InputStream TaintExample.socketIgnoreExceptionNoVerify(SSLSocketFactory), 9, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION +infer/tests/codetoanalyze/java/infer/TaintExample.java, InputStream TaintExample.socketNotVerifiedSimple(SSLSocketFactory), 3, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION +infer/tests/codetoanalyze/java/infer/TaintExample.java, InputStream TaintExample.socketVerifiedForgotToCheckRetval(SSLSocketFactory,HostnameVerifier,SSLSession), 7, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION +infer/tests/codetoanalyze/java/infer/TaintExample.java, InputStream TaintExample.taintingShouldNotPreventInference1(SSLSocketFactory), 4, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION +infer/tests/codetoanalyze/java/infer/TaintExample.java, InputStream TaintExample.taintingShouldNotPreventInference2(SSLSocketFactory), 3, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION +infer/tests/codetoanalyze/java/infer/TaintExample.java, Socket TaintExample.callReadInputStreamCauseTaintError(SSLSocketFactory), 3, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION +infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.contentValuesPutWithTaintedString(ContentValues,SharedPreferences,String,String), 2, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION +infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.interprocTaintErrorWithModelMethods1(), 1, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION +infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.interprocTaintErrorWithModelMethods2(), 1, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION +infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.interprocTaintErrorWithModelMethods3(), 1, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION +infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.interprocTaintErrorWithModelMethodsUndefined1(), 1, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION +infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.interprocTaintErrorWithModelMethodsUndefined2(), 1, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION +infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.interprocTaintErrorWithModelMethodsUndefined3(), 1, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION +infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.simpleTaintErrorWithModelMethods(), 2, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION +infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.simpleTaintErrorWithModelMethodsUndefined(), 2, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION +infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.testIntegritySinkAnnotReport(String), 1, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION +infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.testIntegritySourceAnnot(), 1, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION +infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.testIntegritySourceInstanceFieldAnnot(), 2, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION +infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.testIntegritySourceStaticFieldAnnot(), 2, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION +infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.testPrivacySinkAnnot1(), 2, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION +infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.testPrivacySinkAnnot3(), 2, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION +infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.testPrivacySourceAnnot(), 1, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION +infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.testPrivacySourceFieldAnnotPropagation(), 2, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION +infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.testPrivacySourceInstanceFieldAnnot(), 2, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION +infer/tests/codetoanalyze/java/infer/TaintExample.java, void TaintExample.testPrivacySourceStaticFieldAnnot(), 2, TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION +infer/tests/codetoanalyze/java/infer/WriterLeaks.java, void WriterLeaks.bufferedWriterNotClosedAfterWrite(), 7, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/WriterLeaks.java, void WriterLeaks.fileWriterNotClosedAfterWrite(), 6, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/WriterLeaks.java, void WriterLeaks.outputStreamWriterNotClosedAfterWrite(), 6, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/WriterLeaks.java, void WriterLeaks.pipedWriterNotClosedAfterConnect(PipedReader), 7, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/WriterLeaks.java, void WriterLeaks.pipedWriterNotClosedAfterConstructedWithReader(), 8, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/WriterLeaks.java, void WriterLeaks.printWriterNotClosedAfterAppend(), 4, RESOURCE_LEAK +infer/tests/codetoanalyze/java/infer/WriterLeaks.java, void WriterLeaks.writerNotClosedAfterWrite(), 6, RESOURCE_LEAK diff --git a/infer/tests/build_systems/build_integration_tests.py b/infer/tests/build_systems/build_integration_tests.py index b7bc86698..ee62f5b3c 100755 --- a/infer/tests/build_systems/build_integration_tests.py +++ b/infer/tests/build_systems/build_integration_tests.py @@ -14,8 +14,8 @@ # ./build_integration_test.py -- ant gradle # # run no test # ./build_integration_test.py -- -# # run only the buck tests and record the output -# INFER_RECORD_INTEGRATION_TESTS=1 ./build_integration_test.py -- buck +# # run only the waf tests and record the output +# INFER_RECORD_INTEGRATION_TESTS=1 ./build_integration_test.py -- waf from __future__ import absolute_import from __future__ import division @@ -61,7 +61,6 @@ CODETOANALYZE_DIR = os.path.join(SCRIPT_DIR, 'codetoanalyze') EXPECTED_OUTPUTS_DIR = os.path.join(SCRIPT_DIR, 'expected_outputs') ALL_TESTS = [ - 'buck', 'clang_compilation_database', 'cmake', 'componentkit', @@ -156,17 +155,12 @@ def run_analysis(clean_cmds, build_cmds, extra_check, should_fail, env=None): # useful to compare the result of your migrated test with the # issues.exp that this gives you. if False: - inferprint_cmd = [INFERPRINT_BIN, '-q', '--issues-tests', - '-o', temp_out_dir] + extra_args - with tempfile.TemporaryFile( - mode='w', - suffix='.out', - prefix='issues.exp') as analysis_output: - try: - subprocess.check_call(inferprint_cmd, env=env) - except subprocess.CalledProcessError, exn: - if exn.returncode != should_fail: - raise + inferprint_cmd = ( + [INFERPRINT_BIN, '-q', '--issues-tests', 'issues.exp', + '--from-json-report', + os.path.join(temp_out_dir, 'report.json')] + + extra_args) + subprocess.check_call(inferprint_cmd, env=env) json_path = os.path.join(temp_out_dir, REPORT_JSON) found_errors = utils.load_json_from_path(json_path) @@ -356,14 +350,6 @@ class BuildIntegrationTest(unittest.TestCase): report_fname=report_fname, env=env) - def test_buck_integration(self): - target = '//infer/tests/codetoanalyze/java/infer:compile' - test('buck', 'Buck', - ROOT_DIR, - [{'compile': ['buck', 'build', '--no-cache', target]}], - clean_commands=[['buck', 'clean']], - available=lambda: is_tool_available(['buck', '--version'])) - def test_make_integration( self, enabled=None, diff --git a/infer/tests/build_systems/expected_outputs/buck_report.json b/infer/tests/build_systems/expected_outputs/buck_report.json deleted file mode 100644 index 3bda2b043..000000000 --- a/infer/tests/build_systems/expected_outputs/buck_report.json +++ /dev/null @@ -1,937 +0,0 @@ -[ - { - "bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION", - "file": "infer/tests/codetoanalyze/java/infer/TaintExample.java", - "procedure": "Socket TaintExample.callReadInputStreamCauseTaintError(SSLSocketFactory)" - }, - { - "bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION", - "file": "infer/tests/codetoanalyze/java/infer/TaintExample.java", - "procedure": "void TaintExample.contentValuesPutWithTaintedString(ContentValues,SharedPreferences,String,String)" - }, - { - "bug_type": "CONTEXT_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ContextLeaks.java", - "procedure": "void ContextLeaks.directLeak()" - }, - { - "bug_type": "CONTEXT_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ContextLeaks.java", - "procedure": "ContextLeaks$Singleton ContextLeaks$Singleton.getInstance(Context)" - }, - { - "bug_type": "CONTEXT_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ContextLeaks.java", - "procedure": "void ContextLeaks.indirectLeak()" - }, - { - "bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION", - "file": "infer/tests/codetoanalyze/java/infer/TaintExample.java", - "procedure": "void TaintExample.interprocTaintErrorWithModelMethods1()" - }, - { - "bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION", - "file": "infer/tests/codetoanalyze/java/infer/TaintExample.java", - "procedure": "void TaintExample.interprocTaintErrorWithModelMethods2()" - }, - { - "bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION", - "file": "infer/tests/codetoanalyze/java/infer/TaintExample.java", - "procedure": "void TaintExample.interprocTaintErrorWithModelMethods3()" - }, - { - "bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION", - "file": "infer/tests/codetoanalyze/java/infer/TaintExample.java", - "procedure": "void TaintExample.interprocTaintErrorWithModelMethodsUndefined1()" - }, - { - "bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION", - "file": "infer/tests/codetoanalyze/java/infer/TaintExample.java", - "procedure": "void TaintExample.interprocTaintErrorWithModelMethodsUndefined2()" - }, - { - "bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION", - "file": "infer/tests/codetoanalyze/java/infer/TaintExample.java", - "procedure": "void TaintExample.interprocTaintErrorWithModelMethodsUndefined3()" - }, - { - "bug_type": "CONTEXT_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ContextLeaks.java", - "procedure": "void ContextLeaks.leakAfterInstanceFieldWrite()" - }, - { - "bug_type": "CONTEXT_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ContextLeaks.java", - "procedure": "void ContextLeaks.nonStaticInnerClassLeak()" - }, - { - "bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION", - "file": "infer/tests/codetoanalyze/java/infer/TaintExample.java", - "procedure": "void TaintExample.simpleTaintErrorWithModelMethods()" - }, - { - "bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION", - "file": "infer/tests/codetoanalyze/java/infer/TaintExample.java", - "procedure": "void TaintExample.simpleTaintErrorWithModelMethodsUndefined()" - }, - { - "bug_type": "CONTEXT_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ContextLeaks.java", - "procedure": "ContextLeaks$Singleton ContextLeaks.singletonLeak()" - }, - { - "bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION", - "file": "infer/tests/codetoanalyze/java/infer/TaintExample.java", - "procedure": "InputStream TaintExample.socketIgnoreExceptionNoVerify(SSLSocketFactory)" - }, - { - "bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION", - "file": "infer/tests/codetoanalyze/java/infer/TaintExample.java", - "procedure": "InputStream TaintExample.socketNotVerifiedSimple(SSLSocketFactory)" - }, - { - "bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION", - "file": "infer/tests/codetoanalyze/java/infer/TaintExample.java", - "procedure": "InputStream TaintExample.socketVerifiedForgotToCheckRetval(SSLSocketFactory,HostnameVerifier,SSLSession)" - }, - { - "bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION", - "file": "infer/tests/codetoanalyze/java/infer/TaintExample.java", - "procedure": "InputStream TaintExample.taintingShouldNotPreventInference1(SSLSocketFactory)" - }, - { - "bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION", - "file": "infer/tests/codetoanalyze/java/infer/TaintExample.java", - "procedure": "InputStream TaintExample.taintingShouldNotPreventInference2(SSLSocketFactory)" - }, - { - "bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION", - "file": "infer/tests/codetoanalyze/java/infer/TaintExample.java", - "procedure": "void TaintExample.testIntegritySinkAnnotReport(String)" - }, - { - "bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION", - "file": "infer/tests/codetoanalyze/java/infer/TaintExample.java", - "procedure": "void TaintExample.testIntegritySourceAnnot()" - }, - { - "bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION", - "file": "infer/tests/codetoanalyze/java/infer/TaintExample.java", - "procedure": "void TaintExample.testIntegritySourceInstanceFieldAnnot()" - }, - { - "bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION", - "file": "infer/tests/codetoanalyze/java/infer/TaintExample.java", - "procedure": "void TaintExample.testIntegritySourceStaticFieldAnnot()" - }, - { - "bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION", - "file": "infer/tests/codetoanalyze/java/infer/TaintExample.java", - "procedure": "void TaintExample.testPrivacySinkAnnot1()" - }, - { - "bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION", - "file": "infer/tests/codetoanalyze/java/infer/TaintExample.java", - "procedure": "void TaintExample.testPrivacySinkAnnot3()" - }, - { - "bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION", - "file": "infer/tests/codetoanalyze/java/infer/TaintExample.java", - "procedure": "void TaintExample.testPrivacySourceAnnot()" - }, - { - "bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION", - "file": "infer/tests/codetoanalyze/java/infer/TaintExample.java", - "procedure": "void TaintExample.testPrivacySourceFieldAnnotPropagation()" - }, - { - "bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION", - "file": "infer/tests/codetoanalyze/java/infer/TaintExample.java", - "procedure": "void TaintExample.testPrivacySourceInstanceFieldAnnot()" - }, - { - "bug_type": "TAINTED_VALUE_REACHING_SENSITIVE_FUNCTION", - "file": "infer/tests/codetoanalyze/java/infer/TaintExample.java", - "procedure": "void TaintExample.testPrivacySourceStaticFieldAnnot()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "int NullPointerExceptions.NPEvalueOfFromHashmapBad(HashMap,int)" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.activityObtainTypedArrayAndLeak(Activity)" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions.badCheckShouldCauseNPE()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java", - "procedure": "void FilterInputStreamLeaks.bufferedInputStreamNotClosedAfterRead()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java", - "procedure": "void FilterOutputStreamLeaks.bufferedOutputStreamNotClosedAfterWrite()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ReaderLeaks.java", - "procedure": "void ReaderLeaks.bufferedReaderNotClosedAfterRead()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/WriterLeaks.java", - "procedure": "void WriterLeaks.bufferedWriterNotClosedAfterWrite()" - }, - { - "bug_type": "UNSAFE_GUARDED_BY_ACCESS", - "file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java", - "procedure": "Object GuardedByExample.byRefTrickyBad()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java", - "procedure": "void FilterInputStreamLeaks.checkedInputStreamNotClosedAfterRead()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java", - "procedure": "void FilterOutputStreamLeaks.checkedOutputStreamNotClosedAfterWrite()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java", - "procedure": "void FilterInputStreamLeaks.cipherInputStreamNotClosedAfterSkip()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java", - "procedure": "void FilterOutputStreamLeaks.cipherOutputStreamNotClosedAfterWrite()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/CursorLeaks.java", - "procedure": "int CursorLeaks.completeDownloadNotClosed(DownloadManager)" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.contextObtainTypedArrayAndLeak(Context)" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.copyFileLeak(File,File)" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.copyFileLeak(File,File)" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions.cursorFromContentResolverNPE(String)" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/CursorLeaks.java", - "procedure": "int CursorLeaks.cursorNotClosed(SQLiteDatabase)" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java", - "procedure": "void FilterInputStreamLeaks.dataInputStreamNotClosedAfterRead()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java", - "procedure": "void FilterOutputStreamLeaks.dataOutputStreamNotClosedAfterWrite()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java", - "procedure": "void FilterInputStreamLeaks.deflaterInputStreamNotClosedAfterRead()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.deflaterLeak()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java", - "procedure": "void FilterOutputStreamLeaks.deflaterOutputStreamNotClosedAfterWrite()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions.derefNull()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions.derefNullableGetter()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions.derefNullableRet(boolean)" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions.derefUndefNullableRet()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions.derefUndefNullableRetWrapper()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions.dereferenceAfterLoopOnList(NullPointerExceptions$L)" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions.dereferenceAfterUnlock1(Lock)" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions.dereferenceAfterUnlock2(Lock)" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java", - "procedure": "void FilterInputStreamLeaks.digestInputStreamNotClosedAfterRead()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java", - "procedure": "void FilterOutputStreamLeaks.digestOutputStreamNotClosedAfterWrite()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/Builtins.java", - "procedure": "void Builtins.doNotBlockError(Object)" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/DynamicDispatch.java", - "procedure": "void DynamicDispatch.dynamicDispatchShouldNotCauseFalseNegativeEasy()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java", - "procedure": "void CloseableAsResourceExample.failToCloseWithCloseQuietly()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/AnalysisStops.java", - "procedure": "void AnalysisStops.fieldReadInCalleeMayCauseFalseNegative()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/AnalysisStops.java", - "procedure": "void AnalysisStops.fieldReadInCalleeWithAngelicObjFieldMayCauseFalseNegative()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.fileInputStreamNotClosedAfterRead()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.fileOutputStreamNotClosed()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.fileOutputStreamNotClosedAfterWrite()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.fileOutputStreamOneLeak()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "int ResourceLeaks.fileOutputStreamTwoLeaks1(boolean)" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "int ResourceLeaks.fileOutputStreamTwoLeaks1(boolean)" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.fileOutputStreamTwoLeaks2()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.fileOutputStreamTwoLeaks2()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ReaderLeaks.java", - "procedure": "void ReaderLeaks.fileReaderNotClosedAfterRead()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/WriterLeaks.java", - "procedure": "void WriterLeaks.fileWriterNotClosedAfterWrite()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java", - "procedure": "void FilterOutputStreamLeaks.filterOutputStreamNotClosedAfterWrite()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/CursorLeaks.java", - "procedure": "int CursorLeaks.getBucketCountNotClosed()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/CursorLeaks.java", - "procedure": "int CursorLeaks.getImageCountHelperNotClosed(String)" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/HashMapExample.java", - "procedure": "int HashMapExample.getOneIntegerWithoutCheck()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/HashMapExample.java", - "procedure": "void HashMapExample.getTwoIntegersWithOneCheck(Integer,Integer)" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java", - "procedure": "void FilterInputStreamLeaks.gzipInputStreamNotClosedAfterRead()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java", - "procedure": "void FilterInputStreamLeaks.gzipInputStreamNotClosedAfterRead()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java", - "procedure": "void FilterOutputStreamLeaks.gzipOutputStreamNotClosedAfterFlush()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java", - "procedure": "void FilterOutputStreamLeaks.gzipOutputStreamNotClosedAfterFlush()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "String NullPointerExceptions.hashmapNPE(HashMap,Object)" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java", - "procedure": "void FilterInputStreamLeaks.inflaterInputStreamNotClosedAfterRead()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.inflaterLeak()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java", - "procedure": "void FilterOutputStreamLeaks.inflaterOutputStreamNotClosedAfterWrite()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ReaderLeaks.java", - "procedure": "void ReaderLeaks.inputStreamReaderNotClosedAfterRead()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/DynamicDispatch.java", - "procedure": "void DynamicDispatch.interfaceShouldNotCauseFalseNegativeEasy()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/DynamicDispatch.java", - "procedure": "void DynamicDispatch.interfaceShouldNotCauseFalseNegativeHard(DynamicDispatch$Interface)" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/InvokeDynamic.java", - "procedure": "void InvokeDynamic.invokeDynamicThenNpeBad(List)" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "boolean ResourceLeaks.jarFileNotClosed()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.jarInputStreamLeak()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.jarOutputStreamLeak()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/InvokeDynamic.java", - "procedure": "int InvokeDynamic.lambda$npeInLambdaBad$1(String,String)" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java", - "procedure": "void CloseableAsResourceExample.leakFoundWhenIndirectlyImplementingCloseable()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/CursorLeaks.java", - "procedure": "void CursorLeaks.loadPrefsFromContentProviderNotClosed()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.nestedBad1()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.nestedBad2()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.nestedBadJarInputStream(File)" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.nestedBadJarOutputStream()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java", - "procedure": "void CloseableAsResourceExample.notClosingCloseable()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java", - "procedure": "void CloseableAsResourceExample.notClosingWrapper()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/AutoGenerated.java", - "procedure": "void AutoGenerated.npe()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions$$$Class$Name$With$Dollars.npeWithDollars()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "int NullPointerExceptions.nullListFiles(String)" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "int NullPointerExceptions.nullPointerException()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions.nullPointerExceptionArrayLength()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions.nullPointerExceptionCallArrayReadMethod()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions.nullPointerExceptionFromFailingFileOutputStreamConstructor()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions.nullPointerExceptionFromFaillingResourceConstructor()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions.nullPointerExceptionInArrayLengthLoop(java.lang.Object[])" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "int NullPointerExceptions.nullPointerExceptionInterProc()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions.nullPointerExceptionUnlessFrameFails()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "int NullPointerExceptions.nullPointerExceptionWithExceptionHandling(boolean)" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions.nullPointerExceptionWithNullArrayParameter()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions.nullPointerExceptionWithNullObjectParameter()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "String NullPointerExceptions.nullTryLock(FileChannel)" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions.nullableFieldNPE()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions.nullableParamNPE(Object)" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.objectInputStreamClosedNestedBad()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.objectInputStreamNotClosedAfterRead()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.objectInputStreamNotClosedAfterRead()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.objectOutputStreamClosedNestedBad()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.objectOutputStreamNotClosedAfterWrite()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.objectOutputStreamNotClosedAfterWrite()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.openHttpURLConnectionNotDisconnected()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.openHttpsURLConnectionNotDisconnected()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions.optionalNPE(Optional)" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions.otherSinkWithNeverNullSource()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/WriterLeaks.java", - "procedure": "void WriterLeaks.outputStreamWriterNotClosedAfterWrite()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.parseFromInputStreamAndLeak(JsonFactory)" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.pipedInputStreamNotClosedAfterRead(PipedOutputStream)" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.pipedOutputStreamNotClosedAfterWrite()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ReaderLeaks.java", - "procedure": "void ReaderLeaks.pipedReaderFalsePositive()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ReaderLeaks.java", - "procedure": "void ReaderLeaks.pipedReaderNotClosedAfterConnect(PipedWriter)" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ReaderLeaks.java", - "procedure": "void ReaderLeaks.pipedReaderNotClosedAfterConstructedWithWriter()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/WriterLeaks.java", - "procedure": "void WriterLeaks.pipedWriterNotClosedAfterConnect(PipedReader)" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/WriterLeaks.java", - "procedure": "void WriterLeaks.pipedWriterNotClosedAfterConstructedWithReader()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/FilterOutputStreamLeaks.java", - "procedure": "void FilterOutputStreamLeaks.printStreamNotClosedAfterWrite()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/WriterLeaks.java", - "procedure": "void WriterLeaks.printWriterNotClosedAfterAppend()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/FilterInputStreamLeaks.java", - "procedure": "void FilterInputStreamLeaks.pushbackInputStreamNotClosedAfterRead()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ReaderLeaks.java", - "procedure": "void ReaderLeaks.pushbackReaderNotClosedAfterRead()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/CursorLeaks.java", - "procedure": "void CursorLeaks.queryUVMLegacyDbNotClosed()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "int ResourceLeaks.readConfigNotCloseStream(String)" - }, - { - "bug_type": "UNSAFE_GUARDED_BY_ACCESS", - "file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java", - "procedure": "void GuardedByExample.readFAfterBlockBad()" - }, - { - "bug_type": "UNSAFE_GUARDED_BY_ACCESS", - "file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java", - "procedure": "void GuardedByExample.readFBad()" - }, - { - "bug_type": "UNSAFE_GUARDED_BY_ACCESS", - "file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java", - "procedure": "void GuardedByExample.readFBadButSuppressedOther()" - }, - { - "bug_type": "UNSAFE_GUARDED_BY_ACCESS", - "file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java", - "procedure": "void GuardedByExample.readFBadWrongAnnotation()" - }, - { - "bug_type": "UNSAFE_GUARDED_BY_ACCESS", - "file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java", - "procedure": "void GuardedByExample.readFBadWrongLock()" - }, - { - "bug_type": "UNSAFE_GUARDED_BY_ACCESS", - "file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java", - "procedure": "String GuardedByExample$3.readFromInnerClassBad1()" - }, - { - "bug_type": "UNSAFE_GUARDED_BY_ACCESS", - "file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java", - "procedure": "String GuardedByExample$4.readFromInnerClassBad2()" - }, - { - "bug_type": "UNSAFE_GUARDED_BY_ACCESS", - "file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java", - "procedure": "void GuardedByExample.readHBad()" - }, - { - "bug_type": "UNSAFE_GUARDED_BY_ACCESS", - "file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java", - "procedure": "void GuardedByExample.readHBadSynchronizedMethodShouldntHelp()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "String ResourceLeaks.readInstallationFileBad(File)" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ReaderLeaks.java", - "procedure": "void ReaderLeaks.readerNotClosedAfterRead()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.scannerNotClosed()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.serverSocketNotClosed()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions.sinkWithNeverNullSource()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/AnalysisStops.java", - "procedure": "void AnalysisStops.skipFunctionInLoopMayCauseFalseNegative()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java", - "procedure": "void CloseableAsResourceExample.skippedVritualCallDoesNotCloseResourceOnReceiver()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.socketNotClosed()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions.someNPEAfterResourceLeak()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java", - "procedure": "T CloseableAsResourceExample.sourceOfNullWithResourceLeak()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions.stringConstantEqualsFalseNotNPE_FP()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions.stringVarEqualsFalseNPE()" - }, - { - "bug_type": "UNSAFE_GUARDED_BY_ACCESS", - "file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java", - "procedure": "void GuardedByExample.synchronizedMethodReadBad()" - }, - { - "bug_type": "UNSAFE_GUARDED_BY_ACCESS", - "file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java", - "procedure": "void GuardedByExample.synchronizedMethodWriteBad()" - }, - { - "bug_type": "UNSAFE_GUARDED_BY_ACCESS", - "file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java", - "procedure": "void GuardedByExample.synchronizedOnThisBad()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "String NullPointerExceptions.testSystemGetPropertyArgument()" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "void NullPointerExceptions.testSystemGetPropertyReturn()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.themeObtainTypedArrayAndLeak(Resources$Theme)" - }, - { - "bug_type": "NULL_DEREFERENCE", - "file": "infer/tests/codetoanalyze/java/infer/NullPointerExceptions.java", - "procedure": "String NullPointerExceptions.tryLockThrows(FileChannel)" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.twoResources()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.twoResourcesRandomAccessFile()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.twoResourcesServerSocket()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/CloseableAsResourceExample.java", - "procedure": "void CloseableAsResourceExample.withException()" - }, - { - "bug_type": "UNSAFE_GUARDED_BY_ACCESS", - "file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java", - "procedure": "void GuardedByExample.writeFAfterBlockBad()" - }, - { - "bug_type": "UNSAFE_GUARDED_BY_ACCESS", - "file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java", - "procedure": "void GuardedByExample.writeFBad()" - }, - { - "bug_type": "UNSAFE_GUARDED_BY_ACCESS", - "file": "infer/tests/codetoanalyze/java/infer/GuardedByExample.java", - "procedure": "void GuardedByExample.writeFBadWrongLock()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/WriterLeaks.java", - "procedure": "void WriterLeaks.writerNotClosedAfterWrite()" - }, - { - "bug_type": "RESOURCE_LEAK", - "file": "infer/tests/codetoanalyze/java/infer/ResourceLeaks.java", - "procedure": "void ResourceLeaks.zipFileLeakExceptionalBranch()" - } -] \ No newline at end of file