Skip to content

Commit 8f30b8b

Browse files
committed
Autoformat.
1 parent f08d2ee commit 8f30b8b

File tree

4 files changed

+7
-14
lines changed

4 files changed

+7
-14
lines changed

cpp/ql/lib/semmle/code/cpp/Specifier.qll

Lines changed: 3 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -31,9 +31,7 @@ class Specifier extends Element, @specifier {
3131
* A C/C++ function specifier: `inline`, `virtual`, or `explicit`.
3232
*/
3333
class FunctionSpecifier extends Specifier {
34-
FunctionSpecifier() {
35-
this.hasName(["inline", "virtual", "explicit"])
36-
}
34+
FunctionSpecifier() { this.hasName(["inline", "virtual", "explicit"]) }
3735

3836
override string getAPrimaryQlClass() { result = "FunctionSpecifier" }
3937
}
@@ -43,9 +41,7 @@ class FunctionSpecifier extends Specifier {
4341
* or `mutable".
4442
*/
4543
class StorageClassSpecifier extends Specifier {
46-
StorageClassSpecifier() {
47-
this.hasName(["auto", "register", "static", "extern", "mutable"])
48-
}
44+
StorageClassSpecifier() { this.hasName(["auto", "register", "static", "extern", "mutable"]) }
4945

5046
override string getAPrimaryQlClass() { result = "StorageClassSpecifier" }
5147
}
@@ -54,9 +50,7 @@ class StorageClassSpecifier extends Specifier {
5450
* A C++ access specifier: `public`, `protected`, or `private`.
5551
*/
5652
class AccessSpecifier extends Specifier {
57-
AccessSpecifier() {
58-
this.hasName(["public", "protected", "private"])
59-
}
53+
AccessSpecifier() { this.hasName(["public", "protected", "private"]) }
6054

6155
/**
6256
* Gets the visibility of a field with access specifier `this` if it is

csharp/ql/lib/semmle/code/csharp/security/dataflow/flowsources/Remote.qll

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,8 @@ class AspNetQueryStringMember extends Member {
4343
* request.
4444
*/
4545
private string getHttpRequestFlowPropertyNames() {
46-
result = ["QueryString", "Headers", "RawUrl", "Url", "Cookies", "Form", "Params", "Path", "PathInfo"]
46+
result =
47+
["QueryString", "Headers", "RawUrl", "Url", "Cookies", "Form", "Params", "Path", "PathInfo"]
4748
}
4849

4950
/** A data flow source of remote user input (ASP.NET query string). */

javascript/ql/lib/semmle/javascript/DynamicPropertyAccess.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ private import semmle.javascript.dataflow.internal.FlowSteps
1414
SourceNode getAnEnumeratedArrayElement(SourceNode array) {
1515
exists(MethodCallNode call, string name |
1616
call = array.getAMethodCall(name) and
17-
(name = ["forEach", "map"]) and
17+
name = ["forEach", "map"] and
1818
result = call.getCallback(0).getParameter(0)
1919
)
2020
or

python/ql/lib/semmle/python/security/injection/Command.qll

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,7 @@ import semmle.python.security.strings.Untrusted
1313
/** Abstract taint sink that is potentially vulnerable to malicious shell commands. */
1414
abstract class CommandSink extends TaintSink { }
1515

16-
private ModuleObject osOrPopenModule() {
17-
result.getName() = ["os", "popen2"]
18-
}
16+
private ModuleObject osOrPopenModule() { result.getName() = ["os", "popen2"] }
1917

2018
private Object makeOsCall() {
2119
exists(string name | result = ModuleObject::named("subprocess").attr(name) |

0 commit comments

Comments
 (0)