Skip to content

Commit a327802

Browse files
authored
Merge pull request github#10801 from jsoref/spelling-ruby
Spelling ruby
2 parents 5948126 + d94ebe9 commit a327802

File tree

38 files changed

+59
-59
lines changed

38 files changed

+59
-59
lines changed

csharp/ql/lib/semmle/code/csharp/controlflow/internal/ControlFlowGraphImplShared.qll

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -885,7 +885,7 @@ module TestOutput {
885885
/**
886886
* Gets a string used to resolve ties in node and edge ordering.
887887
*/
888-
string getOrderDisambuigation() { result = "" }
888+
string getOrderDisambiguation() { result = "" }
889889
}
890890

891891
query predicate nodes(RelevantNode n, string attr, string val) {
@@ -900,7 +900,7 @@ module TestOutput {
900900
order by
901901
l.getFile().getBaseName(), l.getFile().getAbsolutePath(), l.getStartLine(),
902902
l.getStartColumn(), l.getEndLine(), l.getEndColumn(), p.toString(),
903-
p.getOrderDisambuigation()
903+
p.getOrderDisambiguation()
904904
)
905905
).toString()
906906
}
@@ -923,7 +923,7 @@ module TestOutput {
923923
order by
924924
l.getFile().getBaseName(), l.getFile().getAbsolutePath(), l.getStartLine(),
925925
l.getStartColumn(), l.getEndLine(), l.getEndColumn(), t.toString(), s.toString(),
926-
s.getOrderDisambuigation()
926+
s.getOrderDisambiguation()
927927
)
928928
).toString()
929929
}

java/ql/lib/semmle/code/java/security/regexp/ExponentialBackTracking.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -202,7 +202,7 @@ private predicate isFork(State q, InputSymbol s1, InputSymbol s2, State r1, Stat
202202
//
203203
// We additionally require that the there exists another InfiniteRepetitionQuantifier `mid` on the path from `q` to itself.
204204
// This is done to avoid flagging regular expressions such as `/(a?)*b/` - that only has polynomial runtime, and is detected by `js/polynomial-redos`.
205-
// The below code is therefore a heuritic, that only flags regular expressions such as `/(a*)*b/`,
205+
// The below code is therefore a heuristic, that only flags regular expressions such as `/(a*)*b/`,
206206
// and does not flag regular expressions such as `/(a?b?)c/`, but the latter pattern is not used frequently.
207207
r1 = r2 and
208208
q1 = q2 and

java/ql/lib/semmle/code/java/security/regexp/SuperlinearBackTracking.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ class StateTuple extends TStateTuple {
7676
StateTuple() { this = MkStateTuple(q1, q2, q3) }
7777

7878
/**
79-
* Gest a string repesentation of this tuple.
79+
* Gest a string representation of this tuple.
8080
*/
8181
string toString() { result = "(" + q1 + ", " + q2 + ", " + q3 + ")" }
8282

javascript/ql/lib/semmle/javascript/security/BadTagFilterQuery.qll

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/**
2-
* Provides precicates for reasoning about bad tag filter vulnerabilities.
2+
* Provides predicates for reasoning about bad tag filter vulnerabilities.
33
*/
44

55
import regexp.RegexpMatching
@@ -65,7 +65,7 @@ predicate isBadRegexpFilter(HtmlMatchingRegExp regexp, string msg) {
6565
regexp.matches("<!-- foo --!>") and
6666
exists(int a, int b | a != b |
6767
regexp.fillsCaptureGroup("<!-- foo -->", a) and
68-
// <!-- foo --> might be ambigously parsed (matching both capture groups), and that is ok here.
68+
// <!-- foo --> might be ambiguously parsed (matching both capture groups), and that is ok here.
6969
regexp.fillsCaptureGroup("<!-- foo --!>", b) and
7070
not regexp.fillsCaptureGroup("<!-- foo --!>", a) and
7171
msg =

javascript/ql/lib/semmle/javascript/security/regexp/ExponentialBackTracking.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -202,7 +202,7 @@ private predicate isFork(State q, InputSymbol s1, InputSymbol s2, State r1, Stat
202202
//
203203
// We additionally require that the there exists another InfiniteRepetitionQuantifier `mid` on the path from `q` to itself.
204204
// This is done to avoid flagging regular expressions such as `/(a?)*b/` - that only has polynomial runtime, and is detected by `js/polynomial-redos`.
205-
// The below code is therefore a heuritic, that only flags regular expressions such as `/(a*)*b/`,
205+
// The below code is therefore a heuristic, that only flags regular expressions such as `/(a*)*b/`,
206206
// and does not flag regular expressions such as `/(a?b?)c/`, but the latter pattern is not used frequently.
207207
r1 = r2 and
208208
q1 = q2 and

javascript/ql/lib/semmle/javascript/security/regexp/RegexpMatching.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/**
2-
* Provides precicates for reasoning about which strings are matched by a regular expression,
2+
* Provides predicates for reasoning about which strings are matched by a regular expression,
33
* and for testing which capture groups are filled when a particular regexp matches a string.
44
*/
55

javascript/ql/lib/semmle/javascript/security/regexp/SuperlinearBackTracking.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ class StateTuple extends TStateTuple {
7676
StateTuple() { this = MkStateTuple(q1, q2, q3) }
7777

7878
/**
79-
* Gest a string repesentation of this tuple.
79+
* Gest a string representation of this tuple.
8080
*/
8181
string toString() { result = "(" + q1 + ", " + q2 + ", " + q3 + ")" }
8282

python/ql/lib/semmle/python/security/BadTagFilterQuery.qll

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/**
2-
* Provides precicates for reasoning about bad tag filter vulnerabilities.
2+
* Provides predicates for reasoning about bad tag filter vulnerabilities.
33
*/
44

55
import regexp.RegexpMatching
@@ -65,7 +65,7 @@ predicate isBadRegexpFilter(HtmlMatchingRegExp regexp, string msg) {
6565
regexp.matches("<!-- foo --!>") and
6666
exists(int a, int b | a != b |
6767
regexp.fillsCaptureGroup("<!-- foo -->", a) and
68-
// <!-- foo --> might be ambigously parsed (matching both capture groups), and that is ok here.
68+
// <!-- foo --> might be ambiguously parsed (matching both capture groups), and that is ok here.
6969
regexp.fillsCaptureGroup("<!-- foo --!>", b) and
7070
not regexp.fillsCaptureGroup("<!-- foo --!>", a) and
7171
msg =

python/ql/lib/semmle/python/security/regexp/ExponentialBackTracking.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -202,7 +202,7 @@ private predicate isFork(State q, InputSymbol s1, InputSymbol s2, State r1, Stat
202202
//
203203
// We additionally require that the there exists another InfiniteRepetitionQuantifier `mid` on the path from `q` to itself.
204204
// This is done to avoid flagging regular expressions such as `/(a?)*b/` - that only has polynomial runtime, and is detected by `js/polynomial-redos`.
205-
// The below code is therefore a heuritic, that only flags regular expressions such as `/(a*)*b/`,
205+
// The below code is therefore a heuristic, that only flags regular expressions such as `/(a*)*b/`,
206206
// and does not flag regular expressions such as `/(a?b?)c/`, but the latter pattern is not used frequently.
207207
r1 = r2 and
208208
q1 = q2 and

python/ql/lib/semmle/python/security/regexp/RegexpMatching.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/**
2-
* Provides precicates for reasoning about which strings are matched by a regular expression,
2+
* Provides predicates for reasoning about which strings are matched by a regular expression,
33
* and for testing which capture groups are filled when a particular regexp matches a string.
44
*/
55

0 commit comments

Comments
 (0)