mirror of
https://github.com/github/codeql.git
synced 2026-04-29 10:45:15 +02:00
JS: Remove uses of old inline expectation test library
This commit is contained in:
@@ -1,9 +0,0 @@
|
||||
import javascript
|
||||
import semmle.javascript.security.dataflow.TaintedPathQuery
|
||||
deprecated import utils.test.ConsistencyChecking
|
||||
|
||||
deprecated class TaintedPathConsistency extends ConsistencyConfiguration {
|
||||
TaintedPathConsistency() { this = "TaintedPathConsistency" }
|
||||
|
||||
override DataFlow::Node getAnAlert() { TaintedPathFlow::flowTo(result) }
|
||||
}
|
||||
@@ -1,3 +0,0 @@
|
||||
import javascript
|
||||
import semmle.javascript.security.dataflow.TemplateObjectInjectionQuery
|
||||
deprecated import utils.test.ConsistencyChecking
|
||||
@@ -1,23 +0,0 @@
|
||||
import javascript
|
||||
deprecated import utils.test.ConsistencyChecking
|
||||
import semmle.javascript.security.dataflow.CommandInjectionQuery as CommandInjection
|
||||
import semmle.javascript.security.dataflow.IndirectCommandInjectionQuery as IndirectCommandInjection
|
||||
import semmle.javascript.security.dataflow.ShellCommandInjectionFromEnvironmentQuery as ShellCommandInjectionFromEnvironment
|
||||
import semmle.javascript.security.dataflow.UnsafeShellCommandConstructionQuery as UnsafeShellCommandConstruction
|
||||
import semmle.javascript.security.dataflow.SecondOrderCommandInjectionQuery as SecondOrderCommandInjectionQuery
|
||||
|
||||
deprecated class CommandInjectionConsistency extends ConsistencyConfiguration {
|
||||
CommandInjectionConsistency() { this = "ComandInjection" }
|
||||
|
||||
override File getAFile() { not result.getBaseName() = "uselesscat.js" }
|
||||
}
|
||||
|
||||
import semmle.javascript.security.UselessUseOfCat
|
||||
|
||||
deprecated class UselessCatConsistency extends ConsistencyConfiguration {
|
||||
UselessCatConsistency() { this = "Cat" }
|
||||
|
||||
override DataFlow::Node getAnAlert() { result instanceof UselessCat }
|
||||
|
||||
override File getAFile() { result.getBaseName() = "uselesscat.js" }
|
||||
}
|
||||
@@ -1,9 +0,0 @@
|
||||
import javascript
|
||||
deprecated import utils.test.ConsistencyChecking
|
||||
import semmle.javascript.security.dataflow.DomBasedXssQuery
|
||||
|
||||
deprecated class ConsistencyConfig extends ConsistencyConfiguration {
|
||||
ConsistencyConfig() { this = "ConsistencyConfig" }
|
||||
|
||||
override DataFlow::Node getAnAlert() { DomBasedXssFlow::flow(_, result) }
|
||||
}
|
||||
@@ -1,3 +0,0 @@
|
||||
import javascript
|
||||
deprecated import utils.test.ConsistencyChecking
|
||||
import semmle.javascript.security.dataflow.ExceptionXssQuery as ExceptionXss
|
||||
@@ -1,3 +0,0 @@
|
||||
import javascript
|
||||
deprecated import utils.test.ConsistencyChecking
|
||||
import semmle.javascript.security.dataflow.ReflectedXssQuery as ReflectedXss
|
||||
@@ -1,3 +0,0 @@
|
||||
import javascript
|
||||
deprecated import utils.test.ConsistencyChecking
|
||||
import semmle.javascript.security.dataflow.StoredXssQuery as StoredXss
|
||||
@@ -1,3 +0,0 @@
|
||||
import javascript
|
||||
deprecated import utils.test.ConsistencyChecking
|
||||
import semmle.javascript.security.dataflow.UnsafeHtmlConstructionQuery as UnsafeHtmlConstruction
|
||||
@@ -1,3 +0,0 @@
|
||||
import javascript
|
||||
deprecated import utils.test.ConsistencyChecking
|
||||
import semmle.javascript.security.dataflow.UnsafeJQueryPluginQuery as UnsafeJqueryPlugin
|
||||
@@ -1,14 +0,0 @@
|
||||
import javascript
|
||||
deprecated import utils.test.ConsistencyChecking
|
||||
import semmle.javascript.security.dataflow.XssThroughDomQuery
|
||||
|
||||
deprecated class ConsistencyConfig extends ConsistencyConfiguration {
|
||||
ConsistencyConfig() { this = "ConsistencyConfig" }
|
||||
|
||||
override DataFlow::Node getAnAlert() {
|
||||
exists(DataFlow::Node source |
|
||||
XssThroughDomFlow::flow(source, result) and
|
||||
not isIgnoredSourceSinkPair(source, result)
|
||||
)
|
||||
}
|
||||
}
|
||||
@@ -1,4 +0,0 @@
|
||||
import javascript
|
||||
deprecated import utils.test.ConsistencyChecking
|
||||
import semmle.javascript.security.dataflow.SqlInjectionQuery as SqlInjection
|
||||
import semmle.javascript.security.dataflow.NosqlInjectionQuery as NosqlInjection
|
||||
@@ -1,3 +0,0 @@
|
||||
import javascript
|
||||
import semmle.javascript.security.dataflow.UnsafeDeserializationQuery
|
||||
deprecated import utils.test.ConsistencyChecking
|
||||
@@ -1,9 +0,0 @@
|
||||
import javascript
|
||||
import semmle.javascript.security.dataflow.ClientSideUrlRedirectQuery
|
||||
import utils.test.ConsistencyChecking
|
||||
|
||||
deprecated class ClientSideUrlRedirectConsistency extends ConsistencyConfiguration {
|
||||
ClientSideUrlRedirectConsistency() { this = "ClientSideUrlRedirectConsistency" }
|
||||
|
||||
override DataFlow::Node getAnAlert() { ClientSideUrlRedirectFlow::flowTo(result) }
|
||||
}
|
||||
@@ -1,3 +0,0 @@
|
||||
import javascript
|
||||
import semmle.javascript.security.dataflow.ResourceExhaustionQuery
|
||||
deprecated import utils.test.ConsistencyChecking
|
||||
@@ -1 +0,0 @@
|
||||
| lib.js:70 | expected an alert, but found none | NOT OK | Config |
|
||||
@@ -1,16 +0,0 @@
|
||||
import javascript
|
||||
deprecated import utils.test.ConsistencyChecking
|
||||
import semmle.javascript.security.dataflow.PrototypePollutingAssignmentQuery
|
||||
|
||||
deprecated class Config extends ConsistencyConfiguration {
|
||||
Config() { this = "Config" }
|
||||
|
||||
override File getAFile() { any() }
|
||||
|
||||
override DataFlow::Node getAnAlert() {
|
||||
exists(DataFlow::Node source |
|
||||
PrototypePollutingAssignmentFlow::flow(source, result) and
|
||||
not isIgnoredLibraryFlow(source, result)
|
||||
)
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user