Skip to content

Commit 93d7c5c

Browse files
committed
Remove redundant supertypes
1 parent 1cd0698 commit 93d7c5c

File tree

9 files changed

+12
-12
lines changed

9 files changed

+12
-12
lines changed

go/ql/lib/semmle/go/frameworks/Revel.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@ module Revel {
140140
/**
141141
* A render of a template.
142142
*/
143-
abstract class TemplateRender extends DataFlow::Node, TemplateInstantiation::Range {
143+
abstract class TemplateRender extends TemplateInstantiation::Range {
144144
/** Gets the name of the file that is rendered. */
145145
abstract File getRenderedFile();
146146

go/ql/lib/semmle/go/frameworks/stdlib/NetHttp.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ module NetHttp {
4646
}
4747
}
4848

49-
private class MapWrite extends Http::HeaderWrite::Range, DataFlow::Node {
49+
private class MapWrite extends Http::HeaderWrite::Range {
5050
DataFlow::Node index;
5151
DataFlow::Node rhs;
5252

go/ql/lib/semmle/go/frameworks/stdlib/Regexp.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ module Regexp {
6161
}
6262
}
6363

64-
private class ExternalRegexpMatchFunction extends RegexpMatchFunction::Range, Function {
64+
private class ExternalRegexpMatchFunction extends RegexpMatchFunction::Range {
6565
int patArg;
6666
int strArg;
6767

go/ql/lib/semmle/go/security/CleartextLoggingCustomizations.qll

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ module CleartextLogging {
120120
*
121121
* This is a source since `log.Print(obj)` will often show the fields of `obj`.
122122
*/
123-
private class StructPasswordFieldSource extends DataFlow::Node, Source {
123+
private class StructPasswordFieldSource extends Source {
124124
string name;
125125

126126
StructPasswordFieldSource() {
@@ -137,7 +137,7 @@ module CleartextLogging {
137137
}
138138

139139
/** An access to a variable or property that might contain a password. */
140-
private class ReadPasswordSource extends DataFlow::Node, Source {
140+
private class ReadPasswordSource extends Source {
141141
string name;
142142

143143
ReadPasswordSource() {

go/ql/lib/semmle/go/security/OpenUrlRedirectCustomizations.qll

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,15 +61,15 @@ module OpenUrlRedirect {
6161
/**
6262
* An HTTP redirect, considered as a sink for `Configuration`.
6363
*/
64-
class RedirectSink extends Sink, DataFlow::Node {
64+
class RedirectSink extends Sink {
6565
RedirectSink() { this = any(Http::Redirect redir).getUrl() }
6666
}
6767

6868
/**
6969
* A definition of the HTTP "Location" header, considered as a sink for
7070
* `Configuration`.
7171
*/
72-
class LocationHeaderSink extends Sink, DataFlow::Node {
72+
class LocationHeaderSink extends Sink {
7373
LocationHeaderSink() {
7474
exists(Http::HeaderWrite hw | hw.getHeaderName() = "location" | this = hw.getValue())
7575
}

go/ql/lib/semmle/go/security/UnsafeUnzipSymlinkCustomizations.qll

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,7 @@ module UnsafeUnzipSymlink {
126126
* An argument to a call to `os.Symlink` within a loop that extracts a zip or tar archive,
127127
* taken as a sink for unsafe unzipping of symlinks.
128128
*/
129-
class OsSymlink extends DataFlow::Node, SymlinkSink {
129+
class OsSymlink extends SymlinkSink {
130130
OsSymlink() {
131131
exists(DataFlow::CallNode n | n.asExpr() = getASymlinkCall() |
132132
this = n.getArgument([0, 1]) and
@@ -139,7 +139,7 @@ module UnsafeUnzipSymlink {
139139
* An argument to `path/filepath.EvalSymlinks` or `os.Readlink`, taken as a sink for detecting target
140140
* paths that are likely safe to extract to.
141141
*/
142-
class StdlibSymlinkResolvers extends DataFlow::Node, EvalSymlinksSink {
142+
class StdlibSymlinkResolvers extends EvalSymlinksSink {
143143
StdlibSymlinkResolvers() {
144144
exists(DataFlow::CallNode n |
145145
n.getTarget().hasQualifiedName("path/filepath", "EvalSymlinks")

go/ql/lib/semmle/go/security/Xss.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ module SharedXss {
139139
* A `Template` from `html/template` will HTML-escape data automatically
140140
* and therefore acts as a sanitizer for XSS vulnerabilities.
141141
*/
142-
class HtmlTemplateSanitizer extends Sanitizer, DataFlow::Node {
142+
class HtmlTemplateSanitizer extends Sanitizer {
143143
HtmlTemplateSanitizer() {
144144
exists(Method m, DataFlow::CallNode call | m = call.getCall().getTarget() |
145145
m.hasQualifiedName("html/template", "Template", "ExecuteTemplate") and

go/ql/lib/semmle/go/security/ZipSlipCustomizations.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ module ZipSlip {
3030
/**
3131
* A tar file header, as a source for zip slip.
3232
*/
33-
class TarHeaderSource extends Source, DataFlow::Node {
33+
class TarHeaderSource extends Source {
3434
TarHeaderSource() {
3535
this =
3636
any(DataFlow::MethodCallNode mcn |

go/ql/test/library-tests/semmle/go/frameworks/Encoding/jsoniter.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ class UntrustedFunction extends Function {
99
UntrustedFunction() { this.getName() = ["getUntrustedString", "getUntrustedBytes"] }
1010
}
1111

12-
class RemoteSource extends DataFlow::Node, RemoteFlowSource::Range {
12+
class RemoteSource extends RemoteFlowSource::Range {
1313
RemoteSource() { this = any(UntrustedFunction f).getACall().getResult() }
1414
}
1515

0 commit comments

Comments
 (0)