Skip to content

Commit 73df8e4

Browse files
authored
Merge pull request #9832 from erik-krogh/misspellings
Fix lots of misspellings
2 parents 2a9af11 + a5239bc commit 73df8e4

File tree

42 files changed

+55
-53
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

42 files changed

+55
-53
lines changed

.github/workflows/ql-for-ql-build.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,7 @@ jobs:
4040
"${CODEQL}" pack create
4141
cd .codeql/pack/codeql/ql/0.0.0
4242
zip "${PACKZIP}" -r .
43+
rm -rf *
4344
env:
4445
CODEQL: ${{ steps.find-codeql.outputs.codeql-path }}
4546
PACKZIP: ${{ runner.temp }}/query-pack.zip
@@ -117,6 +118,7 @@ jobs:
117118
fi
118119
cd pack
119120
zip -rq ../codeql-ql.zip .
121+
rm -rf *
120122
- uses: actions/upload-artifact@v3
121123
with:
122124
name: codeql-ql-pack

cpp/ql/lib/semmle/code/cpp/controlflow/BasicBlocks.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -231,7 +231,7 @@ class BasicBlock extends ControlFlowNodeBase {
231231
exists(Function f | f.getBlock() = this)
232232
or
233233
exists(TryStmt t, BasicBlock tryblock |
234-
// a `Handler` preceeds the `CatchBlock`, and is always the beginning
234+
// a `Handler` precedes the `CatchBlock`, and is always the beginning
235235
// of a new `BasicBlock` (see `primitive_basic_block_entry_node`).
236236
this.(Handler).getTryStmt() = t and
237237
tryblock.isReachable() and

cpp/ql/lib/semmle/code/cpp/models/implementations/Allocation.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -218,7 +218,7 @@ private class CallAllocationExpr extends AllocationExpr, FunctionCall {
218218
exists(target.getReallocPtrArg()) and
219219
this.getArgument(target.getSizeArg()).getValue().toInt() = 0
220220
) and
221-
// these are modelled directly (and more accurately), avoid duplication
221+
// these are modeled directly (and more accurately), avoid duplication
222222
not exists(NewOrNewArrayExpr new | new.getAllocatorCall() = this)
223223
}
224224

cpp/ql/lib/semmle/code/cpp/security/Overflow.qll

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ VariableAccess varUse(LocalScopeVariable v) { result = v.getAnAccess() }
5050
* Holds if `e` potentially overflows and `use` is an operand of `e` that is not guarded.
5151
*/
5252
predicate missingGuardAgainstOverflow(Operation e, VariableAccess use) {
53-
// Since `e` is guarenteed to be a `BinaryArithmeticOperation`, a `UnaryArithmeticOperation` or
53+
// Since `e` is guaranteed to be a `BinaryArithmeticOperation`, a `UnaryArithmeticOperation` or
5454
// an `AssignArithmeticOperation` by the other constraints in this predicate, we know that
5555
// `convertedExprMightOverflowPositively` will have a result even when `e` is not analyzable
5656
// by `SimpleRangeAnalysis`.
@@ -80,7 +80,7 @@ predicate missingGuardAgainstOverflow(Operation e, VariableAccess use) {
8080
* Holds if `e` potentially underflows and `use` is an operand of `e` that is not guarded.
8181
*/
8282
predicate missingGuardAgainstUnderflow(Operation e, VariableAccess use) {
83-
// Since `e` is guarenteed to be a `BinaryArithmeticOperation`, a `UnaryArithmeticOperation` or
83+
// Since `e` is guaranteed to be a `BinaryArithmeticOperation`, a `UnaryArithmeticOperation` or
8484
// an `AssignArithmeticOperation` by the other constraints in this predicate, we know that
8585
// `convertedExprMightOverflowNegatively` will have a result even when `e` is not analyzable
8686
// by `SimpleRangeAnalysis`.

cpp/ql/src/Likely Bugs/Likely Typos/AssignWhereCompareMeant.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ class BooleanControllingAssignmentInExpr extends BooleanControllingAssignment {
6868
// if((a = b) && use_value(a)) { ... }
6969
// ```
7070
// where the assignment is meant to update the value of `a` before it's used in some other boolean
71-
// subexpression that is guarenteed to be evaluate _after_ the assignment.
71+
// subexpression that is guaranteed to be evaluate _after_ the assignment.
7272
this.isParenthesised() and
7373
exists(LogicalAndExpr parent, Variable var, VariableAccess access |
7474
var = this.getLValue().(VariableAccess).getTarget() and

cpp/ql/src/Likely Bugs/Likely Typos/inconsistentLoopDirection.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ predicate illDefinedDecrForStmt(
5151
(
5252
upperBound(initialCondition) < lowerBound(terminalCondition) and
5353
(
54-
// exclude cases where the loop counter is `unsigned` (where wrapping behaviour can be used deliberately)
54+
// exclude cases where the loop counter is `unsigned` (where wrapping behavior can be used deliberately)
5555
v.getUnspecifiedType().(IntegralType).isSigned() or
5656
initialCondition.getValue().toInt() = 0
5757
)

csharp/ql/lib/semmle/code/csharp/controlflow/internal/ControlFlowGraphImpl.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1288,7 +1288,7 @@ module Statements {
12881288
}
12891289

12901290
final override predicate first(ControlFlowElement first) {
1291-
// Unlike most other statements, `foreach` statements are not modelled in
1291+
// Unlike most other statements, `foreach` statements are not modeled in
12921292
// pre-order, because we use the `foreach` node itself to represent the
12931293
// emptiness test that determines whether to execute the loop body
12941294
first(this.getIterableExpr(), first)

csharp/ql/lib/semmle/code/csharp/dataflow/internal/TaintTrackingPrivate.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ private module Cached {
149149
// Taint members
150150
readStep(nodeFrom, any(TaintedMember m).(FieldOrProperty).getContent(), nodeTo)
151151
or
152-
// Although flow through collections is modelled precisely using stores/reads, we still
152+
// Although flow through collections is modeled precisely using stores/reads, we still
153153
// allow flow out of a _tainted_ collection. This is needed in order to support taint-
154154
// tracking configurations where the source is a collection
155155
readStep(nodeFrom, TElementContent(), nodeTo)

go/ql/lib/semmle/go/Expr.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1671,7 +1671,7 @@ class MulExpr extends @mulexpr, ArithmeticBinaryExpr {
16711671
}
16721672

16731673
/**
1674-
* A divison or quotient expression using `/`.
1674+
* A division or quotient expression using `/`.
16751675
*
16761676
* Examples:
16771677
*

go/ql/lib/semmle/go/dataflow/FlowSummary.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/**
2-
* Provides classes and predicates for definining flow summaries.
2+
* Provides classes and predicates for defining flow summaries.
33
*/
44

55
import go

go/ql/lib/semmle/go/dataflow/internal/DataFlowImplCommon.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -280,7 +280,7 @@ cached
280280
private module Cached {
281281
/**
282282
* If needed, call this predicate from `DataFlowImplSpecific.qll` in order to
283-
* force a stage-dependency on the `DataFlowImplCommon.qll` stage and therby
283+
* force a stage-dependency on the `DataFlowImplCommon.qll` stage and thereby
284284
* collapsing the two stages.
285285
*/
286286
cached

go/ql/lib/semmle/go/dataflow/internal/DataFlowPrivate.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ predicate jumpStep(Node n1, Node n2) {
110110
* value of `node1`.
111111
*/
112112
predicate storeStep(Node node1, Content c, Node node2) {
113-
// a write `(*p).f = rhs` is modelled as two store steps: `rhs` is flows into field `f` of `(*p)`,
113+
// a write `(*p).f = rhs` is modeled as two store steps: `rhs` is flows into field `f` of `(*p)`,
114114
// which in turn flows into the pointer content of `p`
115115
exists(Write w, Field f, DataFlow::Node base, DataFlow::Node rhs | w.writesField(base, f, rhs) |
116116
node1 = rhs and

go/ql/lib/semmle/go/dataflow/internal/DataFlowUtil.qll

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -269,7 +269,7 @@ module BarrierGuard<guardChecksSig/3 guardChecks> {
269269
}
270270

271271
/**
272-
* Holds if `guard` markes a point in the control-flow graph where this node
272+
* Holds if `guard` marks a point in the control-flow graph where this node
273273
* is known to validate `nd`, which is represented by `ap`.
274274
*
275275
* This predicate exists to enforce a good join order in `getAGuardedNode`.
@@ -280,7 +280,7 @@ module BarrierGuard<guardChecksSig/3 guardChecks> {
280280
}
281281

282282
/**
283-
* Holds if `guard` markes a point in the control-flow graph where this node
283+
* Holds if `guard` marks a point in the control-flow graph where this node
284284
* is known to validate `nd`.
285285
*/
286286
private predicate guards(Node g, ControlFlow::ConditionGuardNode guard, Node nd) {

go/ql/lib/semmle/go/frameworks/stdlib/NetHttp.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ module NetHttp {
149149
)
150150
or
151151
exists(TaintTracking::FunctionModel model |
152-
// A modelled function conveying taint from some input to the response writer,
152+
// A modeled function conveying taint from some input to the response writer,
153153
// e.g. `io.Copy(responseWriter, someTaintedReader)`
154154
model.taintStep(this, responseWriter) and
155155
responseWriter.getType().implements("net/http", "ResponseWriter")

go/ql/lib/semmle/go/security/ExternalAPIs.qll

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ class ExternalAPIDataNode extends DataFlow::Node {
6565
this = call.getReceiver() and
6666
i = -1
6767
) and
68-
// Not defined in the code that is being analysed
68+
// Not defined in the code that is being analyzed
6969
not exists(call.getACallee().getBody()) and
7070
// Not a function pointer, unless it's declared at package scope
7171
not isProbableLocalFunctionPointer(call) and
@@ -124,7 +124,7 @@ Package getAPackageWithFunctionModels() {
124124
Package getAPackageWithModels() {
125125
result = getAPackageWithFunctionModels()
126126
or
127-
// An incomplete list of packages which have been modelled but do not have any function models
127+
// An incomplete list of packages which have been modeled but do not have any function models
128128
result.getPath() in [
129129
Logrus::packagePath(), GolangOrgXNetWebsocket::packagePath(), GorillaWebsocket::packagePath()
130130
]

go/ql/lib/semmle/go/security/IncorrectIntegerConversionLib.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ class ConversionWithoutBoundsCheckConfig extends TaintTracking::Configuration {
9898
) and
9999
// `effectiveBitSize` could be any value between 0 and 64, but we
100100
// can round it up to the nearest size of an integer type without
101-
// changing behaviour.
101+
// changing behavior.
102102
sourceBitSize = min(int b | b in [0, 8, 16, 32, 64] and b >= effectiveBitSize)
103103
)
104104
}

go/ql/lib/semmle/go/security/Xss.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ module SharedXss {
1414
/**
1515
* Gets the kind of vulnerability to report in the alert message.
1616
*
17-
* Defaults to `Cross-site scripting`, but may be overriden for sinks
17+
* Defaults to `Cross-site scripting`, but may be overridden for sinks
1818
* that do not allow script injection, but injection of other undesirable HTML elements.
1919
*/
2020
string getVulnerabilityKind() { result = "Cross-site scripting" }

go/ql/src/experimental/CWE-807/SensitiveConditionBypass.ql

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,9 @@ from
2020
where
2121
// there should be a flow between source and the operand sink
2222
config.hasFlowPath(source, operand) and
23-
// both the operand should belong to the same comparision expression
23+
// both the operand should belong to the same comparison expression
2424
operand.getNode().asExpr() = comp.getAnOperand() and
25-
// get the ConditionGuardNode corresponding to the comparision expr.
25+
// get the ConditionGuardNode corresponding to the comparison expr.
2626
guard.getCondition() = comp and
2727
// the sink `sensitiveSink` should be sensitive,
2828
isSensitive(sensitiveSink, classification) and

java/ql/lib/semmle/code/java/frameworks/android/Intent.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -283,7 +283,7 @@ private class IntentBundleFlowSteps extends SummaryModelCsv {
283283
"android.os;Bundle;true;putStringArrayList;;;Argument[1];Argument[-1].MapValue;value;manual",
284284
"android.os;Bundle;true;readFromParcel;;;Argument[0];Argument[-1].MapKey;taint;manual",
285285
"android.os;Bundle;true;readFromParcel;;;Argument[0];Argument[-1].MapValue;taint;manual",
286-
// currently only the Extras part of the intent and the data field are fully modelled
286+
// currently only the Extras part of the intent and the data field are fully modeled
287287
"android.content;Intent;false;Intent;(Intent);;Argument[0].SyntheticField[android.content.Intent.extras].MapKey;Argument[-1].SyntheticField[android.content.Intent.extras].MapKey;value;manual",
288288
"android.content;Intent;false;Intent;(Intent);;Argument[0].SyntheticField[android.content.Intent.extras].MapValue;Argument[-1].SyntheticField[android.content.Intent.extras].MapValue;value;manual",
289289
"android.content;Intent;false;Intent;(String,Uri);;Argument[1];Argument[-1].SyntheticField[android.content.Intent.data];value;manual",

java/ql/lib/semmle/code/java/frameworks/guava/Cache.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ private class GuavaBaseCsv extends SummaryModelCsv {
1313
// lambda flow from Argument[1] not implemented
1414
"com.google.common.cache;Cache;true;get;(Object,Callable);;Argument[-1].MapValue;ReturnValue;value;manual",
1515
"com.google.common.cache;Cache;true;getIfPresent;(Object);;Argument[-1].MapValue;ReturnValue;value;manual",
16-
// the true flow to MapKey of ReturnValue for getAllPresent is the intersection of the these inputs, but intersections cannot be modelled fully accurately.
16+
// the true flow to MapKey of ReturnValue for getAllPresent is the intersection of the these inputs, but intersections cannot be modeled fully accurately.
1717
"com.google.common.cache;Cache;true;getAllPresent;(Iterable);;Argument[-1].MapKey;ReturnValue.MapKey;value;manual",
1818
"com.google.common.cache;Cache;true;getAllPresent;(Iterable);;Argument[0].Element;ReturnValue.MapKey;value;manual",
1919
"com.google.common.cache;Cache;true;getAllPresent;(Iterable);;Argument[-1].MapValue;ReturnValue.MapValue;value;manual",

java/ql/lib/semmle/code/java/frameworks/guava/Collections.qll

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,8 @@ private class GuavaCollectCsv extends SummaryModelCsv {
1313
row =
1414
[
1515
//"package;type;overrides;name;signature;ext;inputspec;outputspec;kind",
16-
// Methods depending on lambda flow are not currently modelled
17-
// Methods depending on stronger aliasing properties than we support are also not modelled.
16+
// Methods depending on lambda flow are not currently modeled
17+
// Methods depending on stronger aliasing properties than we support are also not modeled.
1818
"com.google.common.collect;ArrayListMultimap;true;create;(Multimap);;Argument[0].MapKey;ReturnValue.MapKey;value;manual",
1919
"com.google.common.collect;ArrayListMultimap;true;create;(Multimap);;Argument[0].MapValue;ReturnValue.MapValue;value;manual",
2020
"com.google.common.collect;ArrayTable;true;create;(Iterable,Iterable);;Argument[0].Element;ReturnValue.SyntheticField[com.google.common.collect.Table.rowKey];value;manual",

java/ql/lib/semmle/code/java/frameworks/spring/SpringHttp.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -160,7 +160,7 @@ private class SpringXssSink extends XSS::XssSink {
160160
|
161161
// If a Spring request mapping method is either annotated with @ResponseBody (or equivalent),
162162
// or returns a HttpEntity or sub-type, then the return value of the method is converted into
163-
// a HTTP reponse using a HttpMessageConverter implementation. The implementation is chosen
163+
// a HTTP response using a HttpMessageConverter implementation. The implementation is chosen
164164
// based on the return type of the method, and the Accept header of the request.
165165
//
166166
// By default, the only message converter which produces a response which is vulnerable to

java/ql/lib/semmle/code/java/regex/RegexTreeView.qll

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ private import semmle.code.java.regex.regex
66
/**
77
* An element containing a regular expression term, that is, either
88
* a string literal (parsed as a regular expression; the root of the parse tree)
9-
* or another regular expression term (a decendent of the root).
9+
* or another regular expression term (a descendant of the root).
1010
*
1111
* For sequences and alternations, we require at least two children.
1212
* Otherwise, we wish to represent the term differently.
@@ -52,7 +52,7 @@ private newtype TRegExpParent =
5252
/**
5353
* An element containing a regular expression term, that is, either
5454
* a string literal (parsed as a regular expression; the root of the parse tree)
55-
* or another regular expression term (a decendent of the root).
55+
* or another regular expression term (a descendant of the root).
5656
*/
5757
class RegExpParent extends TRegExpParent {
5858
/** Gets a textual representation of this element. */

java/ql/lib/semmle/code/java/regex/regex.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ abstract class RegexString extends StringLiteral {
6262

6363
/**
6464
* Helper predicate for `quote`.
65-
* Holds if the char at `pos` is the one-based `index`th occurence of a quote delimiter (`\Q` or `\E`)
65+
* Holds if the char at `pos` is the one-based `index`th occurrence of a quote delimiter (`\Q` or `\E`)
6666
* Result is `true` for `\Q` and `false` for `\E`.
6767
*/
6868
private boolean quoteDelimiter(int index, int pos) {

javascript/ql/experimental/adaptivethreatmodeling/test/endpoint_large_scale/FilteredTruePositives.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
*
44
* This test checks several components of the endpoint filters for each query to see whether they
55
* filter out any known sinks. It explicitly does not check the endpoint filtering step that's based
6-
* on whether the endpoint is an argument to a modelled function, since this necessarily filters out
6+
* on whether the endpoint is an argument to a modeled function, since this necessarily filters out
77
* all known sinks. However, we can test all the other filtering steps against the set of known
88
* sinks.
99
*

javascript/ql/lib/semmle/javascript/PrintAst.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ private predicate isNotNeeded(Locatable el) {
3636
el.getLocation().getStartLine() = 0 and
3737
el.getLocation().getStartColumn() = 0
3838
or
39-
// relaxing aggresive type inference.
39+
// relaxing aggressive type inference.
4040
none()
4141
}
4242

javascript/ql/lib/semmle/javascript/Routing.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -245,7 +245,7 @@ module Routing {
245245
*/
246246
pragma[inline]
247247
private predicate isGuardedByNodeInternal(Node guard) {
248-
// Look for a common ancestor `fork` whose child leading to `guard` ("base1") preceeds
248+
// Look for a common ancestor `fork` whose child leading to `guard` ("base1") precedes
249249
// the child leading to `this` ("base2").
250250
//
251251
// Schematically:

javascript/ql/lib/semmle/javascript/frameworks/XmlParsers.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -198,7 +198,7 @@ module XML {
198198
override predicate resolvesEntities(XML::EntityKind kind) { kind = InternalEntity() }
199199

200200
// The result is an XMLDocument (https://developer.mozilla.org/en-US/docs/Web/API/XMLDocument).
201-
// The API of the XMLDocument is not modelled.
201+
// The API of the XMLDocument is not modeled.
202202
override DataFlow::Node getAResult() { result.asExpr() = this }
203203
}
204204

javascript/ql/src/Declarations/UnreachableMethodOverloads.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ private MethodSignature getMethodSignatureWithFingerprint(
111111
* Holds if the two method signatures are overloads of each other and have the same parameter types.
112112
*/
113113
predicate signaturesMatch(MethodSignature method, MethodSignature other) {
114-
// the intial search for another overload in a single call for better join-order.
114+
// the initial search for another overload in a single call for better join-order.
115115
other =
116116
getMethodSignatureWithFingerprint(method.getDeclaringType(), method.getName(),
117117
method.getBody().getNumParameter(), getKind(method)) and

python/ql/lib/semmle/python/Files.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ class File extends Container, @file {
2121

2222
/** Whether this file is a source code file. */
2323
predicate fromSource() {
24-
/* If we start to analyse .pyc files, then this will have to change. */
24+
/* If we start to analyze .pyc files, then this will have to change. */
2525
any()
2626
}
2727

python/ql/lib/semmle/python/dataflow/new/internal/DataFlowUtil.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ deprecated Node importNode(string name) {
7171
// ```
7272
//
7373
// Where `foo_module_tracker` is a type tracker that tracks references to the `foo` module.
74-
// Because named imports are modelled as `AttrRead`s, the statement `from foo import bar as baz`
74+
// Because named imports are modeled as `AttrRead`s, the statement `from foo import bar as baz`
7575
// is interpreted as if it was an assignment `baz = foo.bar`, which means `baz` gets tracked as a
7676
// reference to `foo.bar`, as desired.
7777
exists(ImportExpr imp_expr |

python/ql/lib/semmle/python/frameworks/internal/SubclassFinder.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ private module NotExposed {
4242
// Implementation below
4343
// ---------------------------------------------------------------------------
4444
//
45-
// We are looking to find all subclassed of the already modelled classes, and ideally
45+
// We are looking to find all subclassed of the already modeled classes, and ideally
4646
// we would identify an `API::Node` for each (then `toString` would give the API
4747
// path).
4848
//

python/ql/src/Security/CWE-020-ExternalAPIs/ExternalAPIs.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ private import semmle.python.objects.ObjectInternal
3535
// functionality into `BuiltinFunctionValue` and `BuiltinMethodValue`, but will
3636
// probably require some more work: for this query, it's totally ok to use
3737
// `builtins.open` for the code `open(f)`, but well, it requires a bit of thinking to
38-
// figure out if that is desireable in general. I simply skipped a corner here!
38+
// figure out if that is desirable in general. I simply skipped a corner here!
3939
// 4. TaintTrackingPrivate: Nothing else gives us access to `defaultAdditionalTaintStep` :(
4040
/**
4141
* A callable that is considered a "safe" external API from a security perspective.

ql/ql/src/codeql_ql/ast/Ast.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ class AstNode extends TAstNode {
2323

2424
/** Gets the location of the AST node. */
2525
cached
26-
Location getLocation() { result = this.getFullLocation() } // overriden in some subclasses
26+
Location getLocation() { result = this.getFullLocation() } // overridden in some subclasses
2727

2828
/** Gets the location that spans the entire AST node. */
2929
cached

ql/ql/src/codeql_ql/ast/internal/AstNodes.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -233,7 +233,7 @@ module AstConsistency {
233233
not exists(node.getParent()) and
234234
not node.getLocation().getStartColumn() = 1 and // startcolumn = 1 <=> top level in file <=> fine to have no parent
235235
exists(node.toString()) and // <- there are a few parse errors in "global-data-flow-java-1.ql", this way we filter them out.
236-
not node instanceof YAML::YAMLNode and // parents for YAML doens't work
236+
not node instanceof YAML::YAMLNode and // parents for YAML doesn't work
237237
not (node instanceof QLDoc and node.getLocation().getFile().getExtension() = "dbscheme") // qldoc in dbschemes are not hooked up
238238
}
239239

0 commit comments

Comments
 (0)