Skip to content

Commit daf19a2

Browse files
authored
Merge pull request #16496 from github/felicitymay/sphinx-config
Stop building the CodeQL for VS Code docs now they've been migrated
2 parents ad1188b + b32fb1d commit daf19a2

21 files changed

+63
-65
lines changed

docs/codeql/codeql-language-guides/analyzing-data-flow-in-cpp-new.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -408,7 +408,7 @@ Exercise 4
408408
Further reading
409409
---------------
410410

411-
- ":ref:`Exploring data flow with path queries <exploring-data-flow-with-path-queries>`"
411+
- `Exploring data flow with path queries <https://docs.github.com/en/code-security/codeql-for-vs-code/getting-started-with-codeql-for-vs-code/exploring-data-flow-with-path-queries>`__ in the GitHub documentation.
412412

413413

414414
.. include:: ../reusables/cpp-further-reading.rst

docs/codeql/codeql-language-guides/analyzing-data-flow-in-cpp.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -380,7 +380,7 @@ Exercise 4
380380
Further reading
381381
---------------
382382

383-
- ":ref:`Exploring data flow with path queries <exploring-data-flow-with-path-queries>`"
383+
- `Exploring data flow with path queries <https://docs.github.com/en/code-security/codeql-for-vs-code/getting-started-with-codeql-for-vs-code/exploring-data-flow-with-path-queries>`__ in the GitHub documentation.
384384

385385

386386
.. include:: ../reusables/cpp-further-reading.rst

docs/codeql/codeql-language-guides/analyzing-data-flow-in-csharp.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -541,7 +541,7 @@ This can be adapted from the ``SystemUriFlow`` class:
541541
Further reading
542542
---------------
543543

544-
- ":ref:`Exploring data flow with path queries <exploring-data-flow-with-path-queries>`"
544+
- `Exploring data flow with path queries <https://docs.github.com/en/code-security/codeql-for-vs-code/getting-started-with-codeql-for-vs-code/exploring-data-flow-with-path-queries>`__ in the GitHub documentation.
545545

546546

547547
.. include:: ../reusables/csharp-further-reading.rst

docs/codeql/codeql-language-guides/analyzing-data-flow-in-java.rst

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
Analyzing data flow in Java and Kotlin
44
======================================
55

6-
You can use CodeQL to track the flow of data through a Java/Kotlin program to its use.
6+
You can use CodeQL to track the flow of data through a Java/Kotlin program to its use.
77

88
.. include:: ../reusables/kotlin-beta-note.rst
99

@@ -171,7 +171,7 @@ Global data flow tracks data flow throughout the entire program, and is therefor
171171
.. pull-quote:: Note
172172

173173
.. include:: ../reusables/path-problem.rst
174-
174+
175175
Using global data flow
176176
~~~~~~~~~~~~~~~~~~~~~~
177177

@@ -362,7 +362,7 @@ Exercise 4
362362
Further reading
363363
---------------
364364

365-
- ":ref:`Exploring data flow with path queries <exploring-data-flow-with-path-queries>`"
365+
- `Exploring data flow with path queries <https://docs.github.com/en/code-security/codeql-for-vs-code/getting-started-with-codeql-for-vs-code/exploring-data-flow-with-path-queries>`__ in the GitHub documentation.
366366

367367

368368
.. include:: ../reusables/java-further-reading.rst

docs/codeql/codeql-language-guides/analyzing-data-flow-in-javascript-and-typescript.rst

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ For a more general introduction to modeling data flow, see ":ref:`About data flo
1616
Data flow nodes
1717
---------------
1818

19-
Both local and global data flow, as well as taint tracking, work on a representation of the program known as the :ref:`data flow graph <data-flow-graph>`.
19+
Both local and global data flow, as well as taint tracking, work on a representation of the program known as the :ref:`data flow graph <data-flow-graph>`.
2020
Nodes on the data flow flow graph may also correspond to nodes on the abstract syntax tree, but they are not the same.
2121
While AST nodes belong to class ``ASTNode`` and its subclasses, data flow nodes belong to class ``DataFlow::Node`` and its subclasses:
2222

@@ -557,8 +557,8 @@ Exercise 4
557557
Further reading
558558
---------------
559559
560-
- ":ref:`Exploring data flow with path queries <exploring-data-flow-with-path-queries>`"
560+
- `Exploring data flow with path queries <https://docs.github.com/en/code-security/codeql-for-vs-code/getting-started-with-codeql-for-vs-code/exploring-data-flow-with-path-queries>`__ in the GitHub documentation.
561561
562562
563563
.. include:: ../reusables/java-further-reading.rst
564-
.. include:: ../reusables/codeql-ref-tools-further-reading.rst
564+
.. include:: ../reusables/codeql-ref-tools-further-reading.rst

docs/codeql/codeql-language-guides/analyzing-data-flow-in-python.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -359,7 +359,7 @@ This data flow configuration tracks data flow from environment variables to open
359359
Further reading
360360
---------------
361361

362-
- ":ref:`Exploring data flow with path queries <exploring-data-flow-with-path-queries>`"
362+
- `Exploring data flow with path queries <https://docs.github.com/en/code-security/codeql-for-vs-code/getting-started-with-codeql-for-vs-code/exploring-data-flow-with-path-queries>`__ in the GitHub documentation.
363363

364364

365365
.. include:: ../reusables/python-further-reading.rst

docs/codeql/codeql-language-guides/analyzing-data-flow-in-ruby.rst

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ This query finds the filename argument passed in each call to ``File.open``:
111111
112112
import codeql.ruby.DataFlow
113113
import codeql.ruby.ApiGraphs
114-
114+
115115
from DataFlow::CallNode call
116116
where call = API::getTopLevelMember("File").getAMethodCall("open")
117117
select call.getArgument(0)
@@ -126,7 +126,7 @@ So we use local data flow to find all expressions that flow into the argument:
126126
127127
import codeql.ruby.DataFlow
128128
import codeql.ruby.ApiGraphs
129-
129+
130130
from DataFlow::CallNode call, DataFlow::ExprNode expr
131131
where
132132
call = API::getTopLevelMember("File").getAMethodCall("open") and
@@ -143,7 +143,7 @@ We can update the query to specify that ``expr`` is an instance of a ``LocalSour
143143
144144
import codeql.ruby.DataFlow
145145
import codeql.ruby.ApiGraphs
146-
146+
147147
from DataFlow::CallNode call, DataFlow::ExprNode expr
148148
where
149149
call = API::getTopLevelMember("File").getAMethodCall("open") and
@@ -158,7 +158,7 @@ That would allow us to use the member predicate ``flowsTo`` on ``LocalSourceNode
158158
159159
import codeql.ruby.DataFlow
160160
import codeql.ruby.ApiGraphs
161-
161+
162162
from DataFlow::CallNode call, DataFlow::ExprNode expr
163163
where
164164
call = API::getTopLevelMember("File").getAMethodCall("open") and
@@ -171,7 +171,7 @@ As an alternative, we can ask more directly that ``expr`` is a local source of t
171171
172172
import codeql.ruby.DataFlow
173173
import codeql.ruby.ApiGraphs
174-
174+
175175
from DataFlow::CallNode call, DataFlow::ExprNode expr
176176
where
177177
call = API::getTopLevelMember("File").getAMethodCall("open") and
@@ -190,7 +190,7 @@ This query finds instances where a parameter is used as the name when opening a
190190
191191
import codeql.ruby.DataFlow
192192
import codeql.ruby.ApiGraphs
193-
193+
194194
from DataFlow::CallNode call, DataFlow::ParameterNode p
195195
where
196196
call = API::getTopLevelMember("File").getAMethodCall("open") and
@@ -206,7 +206,7 @@ This query finds calls to ``File.open`` where the file name is derived from a pa
206206
import codeql.ruby.DataFlow
207207
import codeql.ruby.TaintTracking
208208
import codeql.ruby.ApiGraphs
209-
209+
210210
from DataFlow::CallNode call, DataFlow::ParameterNode p
211211
where
212212
call = API::getTopLevelMember("File").getAMethodCall("open") and
@@ -327,17 +327,17 @@ The following global taint-tracking query finds path arguments in filesystem acc
327327
import codeql.ruby.TaintTracking
328328
import codeql.ruby.Concepts
329329
import codeql.ruby.dataflow.RemoteFlowSources
330-
330+
331331
module RemoteToFileConfiguration implements DataFlow::ConfigSig {
332332
predicate isSource(DataFlow::Node source) { source instanceof RemoteFlowSource }
333-
333+
334334
predicate isSink(DataFlow::Node sink) {
335335
sink = any(FileSystemAccess fa).getAPathArgument()
336336
}
337337
}
338338
339339
module RemoteToFileFlow = TaintTracking::Global<RemoteToFileConfiguration>;
340-
340+
341341
from DataFlow::Node input, DataFlow::Node fileAccess
342342
where RemoteToFileFlow::flow(input, fileAccess)
343343
select fileAccess, "This file access uses data from $@.", input, "user-controllable input."
@@ -352,7 +352,7 @@ The following global data-flow query finds calls to ``File.open`` where the file
352352
import codeql.ruby.DataFlow
353353
import codeql.ruby.controlflow.CfgNodes
354354
import codeql.ruby.ApiGraphs
355-
355+
356356
module EnvironmentToFileConfiguration implements DataFlow::ConfigSig {
357357
predicate isSource(DataFlow::Node source) {
358358
exists(ExprNodes::ConstantReadAccessCfgNode env |
@@ -367,7 +367,7 @@ The following global data-flow query finds calls to ``File.open`` where the file
367367
}
368368
369369
module EnvironmentToFileFlow = DataFlow::Global<EnvironmentToFileConfiguration>;
370-
370+
371371
from DataFlow::Node environment, DataFlow::Node fileOpen
372372
where EnvironmentToFileFlow::flow(environment, fileOpen)
373373
select fileOpen, "This call to 'File.open' uses data from $@.", environment,
@@ -376,7 +376,7 @@ The following global data-flow query finds calls to ``File.open`` where the file
376376
Further reading
377377
---------------
378378

379-
- ":ref:`Exploring data flow with path queries <exploring-data-flow-with-path-queries>`"
379+
- `Exploring data flow with path queries <https://docs.github.com/en/code-security/codeql-for-vs-code/getting-started-with-codeql-for-vs-code/exploring-data-flow-with-path-queries>`__ in the GitHub documentation.
380380

381381

382382
.. include:: ../reusables/ruby-further-reading.rst

docs/codeql/codeql-language-guides/analyzing-data-flow-in-swift.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ The ``Node`` class has a number of useful subclasses, such as ``ExprNode`` for e
3434
Expr asExpr() { ... }
3535
3636
/**
37-
* Gets the control flow node that corresponds to this data flow node.
37+
* Gets the control flow node that corresponds to this data flow node.
3838
*/
3939
ControlFlowNode getCfgNode() { ... }
4040
@@ -284,7 +284,7 @@ The following global taint-tracking query finds places where a value from a remo
284284
Further reading
285285
---------------
286286

287-
- ":ref:`Exploring data flow with path queries <exploring-data-flow-with-path-queries>`"
287+
- `Exploring data flow with path queries <https://docs.github.com/en/code-security/codeql-for-vs-code/getting-started-with-codeql-for-vs-code/exploring-data-flow-with-path-queries>`__ in the GitHub documentation.
288288

289289

290290
.. include:: ../reusables/swift-further-reading.rst

docs/codeql/codeql-language-guides/customizing-library-models-for-java-and-kotlin.rst

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,8 @@ This article contains reference material about how to define custom models for s
1616

1717
The best way to create your own models is using the CodeQL model editor in the CodeQL extension for Visual Studio Code. The model editor automatically guides you through the process of defining models, displaying the properties you need to define and the options available. You can save the resulting models as data extension files in CodeQL model packs and use them without worrying about the syntax.
1818

19-
For more information, see ":ref:`Using the CodeQL model editor <using-the-codeql-model-editor>`."
19+
For more information, see `Using the CodeQL model editor <https://docs.github.com/en/code-security/codeql-for-vs-code/using-the-advanced-functionality-of-the-codeql-for-vs-code-extension/using-the-codeql-model-editor>`__ in the GitHub documentation.
20+
2021

2122
About data extensions
2223
---------------------

docs/codeql/codeql-language-guides/data-flow-cheat-sheet-for-javascript.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -254,8 +254,8 @@ Troubleshooting
254254
Further reading
255255
---------------
256256

257-
- ":ref:`Exploring data flow with path queries <exploring-data-flow-with-path-queries>`"
257+
- `Exploring data flow with path queries <https://docs.github.com/en/code-security/codeql-for-vs-code/getting-started-with-codeql-for-vs-code/exploring-data-flow-with-path-queries>`__ in the GitHub documentation.
258258

259259

260260
.. include:: ../reusables/javascript-further-reading.rst
261-
.. include:: ../reusables/codeql-ref-tools-further-reading.rst
261+
.. include:: ../reusables/codeql-ref-tools-further-reading.rst

0 commit comments

Comments
 (0)