Skip to content

Commit 2e912ee

Browse files
committed
rename LDAP to Ldap
1 parent c1ab49f commit 2e912ee

File tree

4 files changed

+9
-9
lines changed

4 files changed

+9
-9
lines changed

javascript/ql/lib/javascript.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ import semmle.javascript.frameworks.History
9999
import semmle.javascript.frameworks.Immutable
100100
import semmle.javascript.frameworks.Knex
101101
import semmle.javascript.frameworks.LazyCache
102-
import semmle.javascript.frameworks.LDAPjs
102+
import semmle.javascript.frameworks.LdapJS
103103
import semmle.javascript.frameworks.LodashUnderscore
104104
import semmle.javascript.frameworks.Logging
105105
import semmle.javascript.frameworks.HttpFrameworks

javascript/ql/lib/semmle/javascript/frameworks/LDAPjs.qll renamed to javascript/ql/lib/semmle/javascript/frameworks/LdapJS.qll

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ import javascript
77
/**
88
* A module providing sinks and sanitizers for LDAP injection.
99
*/
10-
module LDAPjs {
10+
module LdapJS {
1111
/** Gets a reference to the ldapjs library. */
1212
API::Node ldapjs() { result = API::moduleImport("ldapjs") }
1313

@@ -43,7 +43,7 @@ module LDAPjs {
4343
abstract DataFlow::Node getOutput();
4444
}
4545

46-
/** A call to the ldap utility method "parseFilter". */
46+
/** A call to the LDAPjs utility method "parseFilter". */
4747
private class ParseFilter extends TaintPreservingLdapFilterStep, API::CallNode {
4848
ParseFilter() { this = ldapjs().getMember("parseFilter").getACall() }
4949

javascript/ql/lib/semmle/javascript/security/dataflow/SqlInjectionCustomizations.qll

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -48,13 +48,13 @@ module SqlInjection {
4848
class LdapJSSink extends Sink {
4949
LdapJSSink() {
5050
// A distinguished name (DN) used in a call to the client API.
51-
this = any(LDAPjs::ClientCall call).getArgument(0)
51+
this = any(LdapJS::ClientCall call).getArgument(0)
5252
or
5353
// A search options object, which contains a filter and a baseDN.
54-
this = any(LDAPjs::SearchOptions opt).getARhs()
54+
this = any(LdapJS::SearchOptions opt).getARhs()
5555
or
5656
// A call to "parseDN", which parses a DN from a string.
57-
this = LDAPjs::ldapjs().getMember("parseDN").getACall().getArgument(0)
57+
this = LdapJS::ldapjs().getMember("parseDN").getACall().getArgument(0)
5858
}
5959
}
6060

@@ -64,9 +64,9 @@ module SqlInjection {
6464
* A chain of replace calls that replaces all unsafe chars for ldap injection.
6565
* For simplicity it's used as a sanitizer for all of `js/sql-injection`.
6666
*/
67-
class LDAPStringSanitizer extends Sanitizer,
67+
class LdapStringSanitizer extends Sanitizer,
6868
IncompleteBlacklistSanitizer::StringReplaceCallSequence {
69-
LDAPStringSanitizer() {
69+
LdapStringSanitizer() {
7070
forall(string char | char = ["*", "(", ")", "\\", "/"] |
7171
this.getAMember().getAReplacedString() = char
7272
)

javascript/ql/lib/semmle/javascript/security/dataflow/SqlInjectionQuery.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ class Configuration extends TaintTracking::Configuration {
2626
}
2727

2828
override predicate isAdditionalTaintStep(DataFlow::Node pred, DataFlow::Node succ) {
29-
exists(LDAPjs::TaintPreservingLdapFilterStep filter |
29+
exists(LdapJS::TaintPreservingLdapFilterStep filter |
3030
pred = filter.getInput() and
3131
succ = filter.getOutput()
3232
)

0 commit comments

Comments
 (0)