Skip to content

Commit d0b7ffd

Browse files
committed
Python/Ruby/Swift: Rename references.
1 parent 72415c7 commit d0b7ffd

File tree

5 files changed

+8
-8
lines changed

5 files changed

+8
-8
lines changed

python/ql/src/Security/CWE-327/FluentApiModel.qll

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ module InsecureContextConfiguration2 implements DataFlow::StateConfigSig {
112112
}
113113
}
114114

115-
private module InsecureContextFlow = DataFlow::MakeWithState<InsecureContextConfiguration2>;
115+
private module InsecureContextFlow = DataFlow::GlobalWithState<InsecureContextConfiguration2>;
116116

117117
/**
118118
* Holds if `conectionCreation` marks the creation of a connection based on the contex
@@ -127,7 +127,7 @@ predicate unsafe_connection_creation_with_context(
127127
) {
128128
// Connection created from a context allowing `insecure_version`.
129129
exists(InsecureContextFlow::PathNode src, InsecureContextFlow::PathNode sink |
130-
InsecureContextFlow::hasFlowPath(src, sink) and
130+
InsecureContextFlow::flowPath(src, sink) and
131131
src.getNode() = contextOrigin and
132132
sink.getNode() = connectionCreation and
133133
sink.getState().allowsInsecureVersion(insecure_version) and

ruby/ql/lib/codeql/ruby/security/StoredXSSQuery.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ module StoredXss {
5656
}
5757
}
5858

59-
import TaintTracking::Make<Config>
59+
import TaintTracking::Global<Config>
6060
}
6161

6262
/** DEPRECATED: Alias for StoredXss */

ruby/ql/lib/codeql/ruby/security/XSS.qll

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -304,7 +304,7 @@ private module OrmTracking {
304304
}
305305
}
306306

307-
import DataFlow::Make<Config>
307+
import DataFlow::Global<Config>
308308
}
309309

310310
/** Provides default sources, sinks and sanitizers for detecting stored cross-site scripting (XSS) vulnerabilities. */
@@ -336,7 +336,7 @@ module StoredXss {
336336
private class OrmFieldAsSource extends Source instanceof DataFlow::CallNode {
337337
OrmFieldAsSource() {
338338
exists(DataFlow::CallNode subSrc |
339-
OrmTracking::hasFlow(subSrc, this.getReceiver()) and
339+
OrmTracking::flow(subSrc, this.getReceiver()) and
340340
subSrc.(OrmInstantiation).methodCallMayAccessField(this.getMethodName())
341341
)
342342
}

ruby/ql/src/queries/security/cwe-079/StoredXSS.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,6 @@ import codeql.ruby.security.StoredXSSQuery
1717
import StoredXss::PathGraph
1818

1919
from StoredXss::PathNode source, StoredXss::PathNode sink
20-
where StoredXss::hasFlowPath(source, sink)
20+
where StoredXss::flowPath(source, sink)
2121
select sink.getNode(), source, sink, "Stored cross-site scripting vulnerability due to $@.",
2222
source.getNode(), "stored value"

swift/ql/src/queries/Summary/SummaryStats.ql

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,12 +21,12 @@ module TaintReachConfig implements DataFlow::ConfigSig {
2121
predicate isSink(DataFlow::Node node) { any() }
2222
}
2323

24-
module TaintReachFlow = TaintTracking::Make<TaintReachConfig>;
24+
module TaintReachFlow = TaintTracking::Global<TaintReachConfig>;
2525

2626
/**
2727
* Gets the total number of dataflow nodes that taint reaches (from any source).
2828
*/
29-
int taintedNodesCount() { result = count(DataFlow::Node n | TaintReachFlow::hasFlowTo(n)) }
29+
int taintedNodesCount() { result = count(DataFlow::Node n | TaintReachFlow::flowTo(n)) }
3030

3131
/**
3232
* Gets the proportion of dataflow nodes that taint reaches (from any source),

0 commit comments

Comments
 (0)