Skip to content

Commit d20f8cc

Browse files
authored
Merge pull request diffblue#287 from diffblue/bugfix/test_failures_do_to_refactoring_utility_functions
!!! IMPORTANT!!! Bugfix: test failures due to refactoring utility functions
2 parents 590402c + 875955c commit d20f8cc

File tree

3 files changed

+6
-3
lines changed

3 files changed

+6
-3
lines changed

regression/end_to_end/interprocedural01/test_interprocedural01.py

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,11 @@
11
import regression.end_to_end.driver as pipeline_executor
22
import os
33
import subprocess
4+
import regression.utils as utils
45

56

67
def test_interprocedural01():
7-
with pipeline_executor.working_dir(os.path.abspath(os.path.dirname(__file__))):
8+
with utils.working_dir(os.path.abspath(os.path.dirname(__file__))):
89
subprocess.call("ant")
910
traces = pipeline_executor.run_security_analyser_pipeline(
1011
os.path.join("dist", "interprocedural01.jar"),

regression/end_to_end/tainted-string-type-concat/test_tainted_string_type_concat.py

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,12 @@
22
import os.path
33
import pytest
44
import subprocess
5+
import regression.utils as utils
56

67

78
@pytest.mark.xfail
89
def test_taint_crossing_substr_and_concatenation():
9-
with pipeline_executor.working_dir(os.path.abspath(os.path.dirname(__file__))):
10+
with utils.working_dir(os.path.abspath(os.path.dirname(__file__))):
1011
subprocess.call("ant")
1112
traces = pipeline_executor.run_security_analyser_pipeline(
1213
"dist/concat.jar",

regression/end_to_end/tainted-string-type/test_tainted_string_type.py

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,11 @@
11
import regression.end_to_end.driver as pipeline_executor
22
import os.path
33
import subprocess
4+
import regression.utils as utils
45

56

67
def test_tainted_string():
7-
with pipeline_executor.working_dir(os.path.abspath(os.path.dirname(__file__))):
8+
with utils.working_dir(os.path.abspath(os.path.dirname(__file__))):
89
subprocess.call("ant")
910
traces = pipeline_executor.run_security_analyser_pipeline(
1011
"dist/test.jar",

0 commit comments

Comments
 (0)