mirror of
https://github.com/github/codeql.git
synced 2026-04-26 09:15:12 +02:00
Javascript: Update all test util paths to point to the new location.
This commit is contained in:
@@ -1,3 +1,3 @@
|
||||
import javascript
|
||||
import semmle.javascript.security.dataflow.TaintedPathQuery
|
||||
import testUtilities.ConsistencyChecking
|
||||
import utils.test.ConsistencyChecking
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
import javascript
|
||||
import semmle.javascript.security.dataflow.TemplateObjectInjectionQuery
|
||||
import testUtilities.ConsistencyChecking
|
||||
import utils.test.ConsistencyChecking
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
import javascript
|
||||
import testUtilities.ConsistencyChecking
|
||||
import utils.test.ConsistencyChecking
|
||||
import semmle.javascript.security.dataflow.CommandInjectionQuery as CommandInjection
|
||||
import semmle.javascript.security.dataflow.IndirectCommandInjectionQuery as IndirectCommandInjection
|
||||
import semmle.javascript.security.dataflow.ShellCommandInjectionFromEnvironmentQuery as ShellCommandInjectionFromEnvironment
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
import javascript
|
||||
import testUtilities.ConsistencyChecking
|
||||
import utils.test.ConsistencyChecking
|
||||
import semmle.javascript.security.dataflow.DomBasedXssQuery as DomXss
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
import javascript
|
||||
import testUtilities.ConsistencyChecking
|
||||
import utils.test.ConsistencyChecking
|
||||
import semmle.javascript.security.dataflow.ExceptionXssQuery as ExceptionXss
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
import javascript
|
||||
import testUtilities.ConsistencyChecking
|
||||
import utils.test.ConsistencyChecking
|
||||
import semmle.javascript.security.dataflow.ReflectedXssQuery as ReflectedXss
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
import javascript
|
||||
import testUtilities.ConsistencyChecking
|
||||
import utils.test.ConsistencyChecking
|
||||
import semmle.javascript.security.dataflow.StoredXssQuery as StoredXss
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
import javascript
|
||||
import testUtilities.ConsistencyChecking
|
||||
import utils.test.ConsistencyChecking
|
||||
import semmle.javascript.security.dataflow.UnsafeHtmlConstructionQuery as UnsafeHtmlConstruction
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
import javascript
|
||||
import testUtilities.ConsistencyChecking
|
||||
import utils.test.ConsistencyChecking
|
||||
import semmle.javascript.security.dataflow.UnsafeJQueryPluginQuery as UnsafeJqueryPlugin
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
import javascript
|
||||
import testUtilities.ConsistencyChecking
|
||||
import utils.test.ConsistencyChecking
|
||||
import semmle.javascript.security.dataflow.XssThroughDomQuery as ThroughDomXss
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
import javascript
|
||||
import testUtilities.ConsistencyChecking
|
||||
import utils.test.ConsistencyChecking
|
||||
import semmle.javascript.security.dataflow.SqlInjectionQuery as SqlInjection
|
||||
import semmle.javascript.security.dataflow.NosqlInjectionQuery as NosqlInjection
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
import javascript
|
||||
import semmle.javascript.security.dataflow.UnsafeDeserializationQuery
|
||||
import testUtilities.ConsistencyChecking
|
||||
import utils.test.ConsistencyChecking
|
||||
|
||||
@@ -1,2 +1,2 @@
|
||||
query: Security/CWE-611/Xxe.ql
|
||||
postprocess: testUtilities/InlineExpectationsTestQuery.ql
|
||||
postprocess: utils/test/InlineExpectationsTestQuery.ql
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
import javascript
|
||||
import semmle.javascript.security.dataflow.ResourceExhaustionQuery
|
||||
import testUtilities.ConsistencyChecking
|
||||
import utils.test.ConsistencyChecking
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
import javascript
|
||||
import testUtilities.ConsistencyChecking
|
||||
import utils.test.ConsistencyChecking
|
||||
import semmle.javascript.security.dataflow.PrototypePollutingAssignmentQuery
|
||||
|
||||
class Config extends ConsistencyConfiguration, Configuration {
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
import javascript
|
||||
import semmle.javascript.security.dataflow.RequestForgeryQuery as RequestForgery
|
||||
import semmle.javascript.security.dataflow.ClientSideRequestForgeryQuery as ClientSideRequestForgery
|
||||
import testUtilities.ConsistencyChecking
|
||||
import utils.test.ConsistencyChecking
|
||||
|
||||
query predicate resultInWrongFile(DataFlow::Node node) {
|
||||
exists(DataFlow::Configuration cfg, string filePattern |
|
||||
|
||||
Reference in New Issue
Block a user