[doc] [visualforce] Adjust externalInfoUrl properties to new site - Part 9
Note: I also took the chance to fix tab damage
This commit is contained in:
@ -1,36 +1,43 @@
|
||||
<?xml version="1.0"?>
|
||||
|
||||
<ruleset name="Basic VF" xmlns="http://pmd.sourceforge.net/ruleset/2.0.0"
|
||||
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
||||
xsi:schemaLocation="http://pmd.sourceforge.net/ruleset/2.0.0 http://pmd.sourceforge.net/ruleset_2_0_0.xsd">
|
||||
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
||||
xsi:schemaLocation="http://pmd.sourceforge.net/ruleset/2.0.0 http://pmd.sourceforge.net/ruleset_2_0_0.xsd">
|
||||
|
||||
<description>Rules concerning basic VF guidelines.</description>
|
||||
<description>
|
||||
Rules concerning basic VF guidelines.
|
||||
</description>
|
||||
|
||||
<rule name="VfUnescapeEl" since="5.6.0"
|
||||
message="Avoid unescaped user controlled content in EL"
|
||||
class="net.sourceforge.pmd.lang.vf.rule.security.VfUnescapeElRule"
|
||||
externalInfoUrl="${pmd.website.baseurl}/rules/vf/security.html#VfUnescapeElRule">
|
||||
<description><![CDATA[Avoid unescaped user controlled content in EL as it results in XSS. ]]>
|
||||
</description>
|
||||
<priority>3</priority>
|
||||
<example>
|
||||
<![CDATA[
|
||||
<rule name="VfUnescapeEl"
|
||||
since="5.6.0"
|
||||
message="Avoid unescaped user controlled content in EL"
|
||||
class="net.sourceforge.pmd.lang.vf.rule.security.VfUnescapeElRule"
|
||||
externalInfoUrl="${pmd.website.baseurl}/pmd_rules_vf_security.html#vfunescapeel">
|
||||
<description>
|
||||
Avoid unescaped user controlled content in EL as it results in XSS.
|
||||
</description>
|
||||
<priority>3</priority>
|
||||
<example>
|
||||
<![CDATA[
|
||||
<apex:outputText value="Potential XSS is {! here }" escape="false" />
|
||||
]]>
|
||||
</example>
|
||||
</rule>
|
||||
]]>
|
||||
</example>
|
||||
</rule>
|
||||
|
||||
<rule name="VfCsrf" since="5.6.0" message="Avoid calling VF action upon page load"
|
||||
class="net.sourceforge.pmd.lang.vf.rule.security.VfCsrfRule"
|
||||
externalInfoUrl="${pmd.website.baseurl}/rules/vf/security.html#VfCsrfRule">
|
||||
<description><![CDATA[Avoid calling VF action upon page load as the action becomes vulnerable to CSRF. ]]>
|
||||
</description>
|
||||
<priority>3</priority>
|
||||
<example>
|
||||
<![CDATA[
|
||||
<apex:page controller="AcRestActionsController" action="{!csrfInitMethod}" >
|
||||
]]>
|
||||
</example>
|
||||
</rule>
|
||||
<rule name="VfCsrf"
|
||||
since="5.6.0"
|
||||
message="Avoid calling VF action upon page load"
|
||||
class="net.sourceforge.pmd.lang.vf.rule.security.VfCsrfRule"
|
||||
externalInfoUrl="${pmd.website.baseurl}/pmd_rules_vf_security.html#vfcsrf">
|
||||
<description>
|
||||
Avoid calling VF action upon page load as the action becomes vulnerable to CSRF.
|
||||
</description>
|
||||
<priority>3</priority>
|
||||
<example>
|
||||
<![CDATA[
|
||||
<apex:page controller="AcRestActionsController" action="{!csrfInitMethod}" >
|
||||
]]>
|
||||
</example>
|
||||
</rule>
|
||||
|
||||
</ruleset>
|
||||
|
@ -0,0 +1,11 @@
|
||||
/**
|
||||
* BSD-style license; for more info see http://pmd.sourceforge.net/license.html
|
||||
*/
|
||||
|
||||
package net.sourceforge.pmd.lang.vf;
|
||||
|
||||
import net.sourceforge.pmd.AbstractRuleSetFactoryTest;
|
||||
|
||||
public class RuleSetFactoryTest extends AbstractRuleSetFactoryTest {
|
||||
// no additional tests
|
||||
}
|
Reference in New Issue
Block a user