Release preparation for version 2.8.2

This commit is contained in:
github-actions[bot]
2022-02-24 14:57:08 +00:00
parent 83aaeca751
commit 20fe22c8c8
62 changed files with 195 additions and 86 deletions

View File

@@ -1,5 +1,12 @@
## 0.0.10
### New Features
* Added a `isStructuredBinding` predicate to the `Variable` class which holds when the variable is declared as part of a structured binding declaration.
## 0.0.9
## 0.0.8
### Deprecated APIs

View File

@@ -1,4 +1,5 @@
---
category: feature
---
## 0.0.10
### New Features
* Added a `isStructuredBinding` predicate to the `Variable` class which holds when the variable is declared as part of a structured binding declaration.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.0.9
lastReleaseVersion: 0.0.10

View File

@@ -1,5 +1,5 @@
name: codeql/cpp-all
version: 0.0.10-dev
version: 0.0.10
groups: cpp
dbscheme: semmlecode.cpp.dbscheme
extractor: cpp

View File

@@ -1,3 +1,9 @@
## 0.0.10
### Deprecated Queries
* The `CodeDuplication.Copy`, `CodeDuplication.DuplicateBlock`, and `CodeDuplication.SimilarBlock` classes have been deprecated.
## 0.0.9
### New Queries

View File

@@ -1,4 +1,5 @@
---
category: deprecated
---
## 0.0.10
### Deprecated Queries
* The `CodeDuplication.Copy`, `CodeDuplication.DuplicateBlock`, and `CodeDuplication.SimilarBlock` classes have been deprecated.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.0.9
lastReleaseVersion: 0.0.10

View File

@@ -1,5 +1,5 @@
name: codeql/cpp-queries
version: 0.0.10-dev
version: 0.0.10
groups:
- cpp
- queries

View File

@@ -1,3 +1,5 @@
## 1.0.4
## 1.0.3
## 1.0.2

View File

@@ -0,0 +1 @@
## 1.0.4

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.0.3
lastReleaseVersion: 1.0.4

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-solorigate-all
version: 1.0.4-dev
version: 1.0.4
groups:
- csharp
- solorigate

View File

@@ -1,3 +1,5 @@
## 1.0.4
## 1.0.3
## 1.0.2

View File

@@ -0,0 +1 @@
## 1.0.4

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.0.3
lastReleaseVersion: 1.0.4

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-solorigate-queries
version: 1.0.4-dev
version: 1.0.4
groups:
- csharp
- solorigate

View File

@@ -1,3 +1,5 @@
## 0.0.10
## 0.0.9
### Major Analysis Improvements

View File

@@ -0,0 +1 @@
## 0.0.10

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.0.9
lastReleaseVersion: 0.0.10

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-all
version: 0.0.10-dev
version: 0.0.10
groups: csharp
dbscheme: semmlecode.csharp.dbscheme
extractor: csharp

View File

@@ -1,3 +1,10 @@
## 0.0.10
### Query Metadata Changes
The precision of hardcoded credentials queries (`cs/hardcoded-credentials` and
`cs/hardcoded-connection-string-credentials`) have been downgraded to medium.
## 0.0.9
## 0.0.8

View File

@@ -1,5 +1,6 @@
---
category: queryMetadata
---
## 0.0.10
### Query Metadata Changes
The precision of hardcoded credentials queries (`cs/hardcoded-credentials` and
`cs/hardcoded-connection-string-credentials`) have been downgraded to medium.
`cs/hardcoded-connection-string-credentials`) have been downgraded to medium.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.0.9
lastReleaseVersion: 0.0.10

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-queries
version: 0.0.10-dev
version: 0.0.10
groups:
- csharp
- queries

View File

@@ -1,3 +1,9 @@
## 0.0.10
### New Features
* Added predicates `ClassOrInterface.getAPermittedSubtype` and `isSealed` exposing information about sealed classes.
## 0.0.9
## 0.0.8

View File

@@ -1,4 +1,5 @@
---
category: feature
---
## 0.0.10
### New Features
* Added predicates `ClassOrInterface.getAPermittedSubtype` and `isSealed` exposing information about sealed classes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.0.9
lastReleaseVersion: 0.0.10

View File

@@ -1,5 +1,5 @@
name: codeql/java-all
version: 0.0.10-dev
version: 0.0.10
groups: java
dbscheme: config/semmlecode.dbscheme
extractor: java

View File

@@ -1,3 +1,20 @@
## 0.0.10
### Breaking Changes
* Add more classes to Netty request/response splitting. Change identification to `java/netty-http-request-or-response-splitting`.
Identify request splitting differently from response splitting in query results.
Support addional classes:
* `io.netty.handler.codec.http.CombinedHttpHeaders`
* `io.netty.handler.codec.http.DefaultHttpRequest`
* `io.netty.handler.codec.http.DefaultFullHttpRequest`
### New Queries
* A new query titled "Local information disclosure in a temporary directory" (`java/local-temp-file-or-directory-information-disclosure`) has been added.
This query finds uses of APIs that leak potentially sensitive information to other local users via the system temporary directory.
This query was originally [submitted as query by @JLLeitschuh](https://github.com/github/codeql/pull/4388).
## 0.0.9
### New Queries

View File

@@ -1,9 +0,0 @@
---
category: breaking
---
* Add more classes to Netty request/response splitting. Change identification to `java/netty-http-request-or-response-splitting`.
Identify request splitting differently from response splitting in query results.
Support addional classes:
* `io.netty.handler.codec.http.CombinedHttpHeaders`
* `io.netty.handler.codec.http.DefaultHttpRequest`
* `io.netty.handler.codec.http.DefaultFullHttpRequest`

View File

@@ -1,6 +0,0 @@
---
category: newQuery
---
* A new query titled "Local information disclosure in a temporary directory" (`java/local-temp-file-or-directory-information-disclosure`) has been added.
This query finds uses of APIs that leak potentially sensitive information to other local users via the system temporary directory.
This query was originally [submitted as query by @JLLeitschuh](https://github.com/github/codeql/pull/4388).

View File

@@ -0,0 +1,16 @@
## 0.0.10
### Breaking Changes
* Add more classes to Netty request/response splitting. Change identification to `java/netty-http-request-or-response-splitting`.
Identify request splitting differently from response splitting in query results.
Support addional classes:
* `io.netty.handler.codec.http.CombinedHttpHeaders`
* `io.netty.handler.codec.http.DefaultHttpRequest`
* `io.netty.handler.codec.http.DefaultFullHttpRequest`
### New Queries
* A new query titled "Local information disclosure in a temporary directory" (`java/local-temp-file-or-directory-information-disclosure`) has been added.
This query finds uses of APIs that leak potentially sensitive information to other local users via the system temporary directory.
This query was originally [submitted as query by @JLLeitschuh](https://github.com/github/codeql/pull/4388).

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.0.9
lastReleaseVersion: 0.0.10

View File

@@ -1,5 +1,5 @@
name: codeql/java-queries
version: 0.0.10-dev
version: 0.0.10
groups:
- java
- queries

View File

@@ -1,3 +1,5 @@
## 0.0.11
## 0.0.10
## 0.0.9

View File

@@ -0,0 +1 @@
## 0.0.11

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.0.10
lastReleaseVersion: 0.0.11

View File

@@ -1,5 +1,5 @@
name: codeql/javascript-all
version: 0.0.11-dev
version: 0.0.11
groups: javascript
dbscheme: semmlecode.javascript.dbscheme
extractor: javascript

View File

@@ -1,3 +1,25 @@
## 0.0.11
### New Queries
* A new query, `js/functionality-from-untrusted-source`, has been added to the query suite. It finds DOM elements
that load functionality from untrusted sources, like `script` or `iframe` elements using `http` links.
The query is run by default.
### Query Metadata Changes
* The `js/request-forgery` query previously flagged both server-side and client-side request forgery,
but these are now handled by two different queries:
* `js/request-forgery` is now specific to server-side request forgery. Its precision has been raised to
`high` and is now shown by default (it was previously in the `security-extended` suite).
* `js/client-side-request-forgery` is specific to client-side request forgery. This is technically a new query
but simply flags a subset of what the old query did.
This has precision `medium` and is part of the `security-extended` suite.
### Minor Analysis Improvements
* Added dataflow through the [`snapdragon`](https://npmjs.com/package/snapdragon) library.
## 0.0.10
### New Queries

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* Added dataflow through the [`snapdragon`](https://npmjs.com/package/snapdragon) library.

View File

@@ -1,6 +0,0 @@
---
category: newQuery
---
* A new query, `js/functionality-from-untrusted-source`, has been added to the query suite. It finds DOM elements
that load functionality from untrusted sources, like `script` or `iframe` elements using `http` links.
The query is run by default.

View File

@@ -1,6 +1,13 @@
---
category: queryMetadata
---
## 0.0.11
### New Queries
* A new query, `js/functionality-from-untrusted-source`, has been added to the query suite. It finds DOM elements
that load functionality from untrusted sources, like `script` or `iframe` elements using `http` links.
The query is run by default.
### Query Metadata Changes
* The `js/request-forgery` query previously flagged both server-side and client-side request forgery,
but these are now handled by two different queries:
* `js/request-forgery` is now specific to server-side request forgery. Its precision has been raised to
@@ -8,3 +15,7 @@ category: queryMetadata
* `js/client-side-request-forgery` is specific to client-side request forgery. This is technically a new query
but simply flags a subset of what the old query did.
This has precision `medium` and is part of the `security-extended` suite.
### Minor Analysis Improvements
* Added dataflow through the [`snapdragon`](https://npmjs.com/package/snapdragon) library.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.0.10
lastReleaseVersion: 0.0.11

View File

@@ -1,5 +1,5 @@
name: codeql/javascript-queries
version: 0.0.11-dev
version: 0.0.11
groups:
- javascript
- queries

View File

@@ -1,3 +1,9 @@
## 0.0.10
### Deprecated APIs
* The old points-to based modeling has been deprecated. Use the new type-tracking/API-graphs based modeling instead.
## 0.0.9
## 0.0.8

View File

@@ -1,4 +1,5 @@
---
category: deprecated
---
## 0.0.10
### Deprecated APIs
* The old points-to based modeling has been deprecated. Use the new type-tracking/API-graphs based modeling instead.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.0.9
lastReleaseVersion: 0.0.10

View File

@@ -1,5 +1,5 @@
name: codeql/python-all
version: 0.0.10-dev
version: 0.0.10
groups: python
dbscheme: semmlecode.python.dbscheme
extractor: python

View File

@@ -1,3 +1,10 @@
## 0.0.10
### New Queries
* The query "LDAP query built from user-controlled sources" (`py/ldap-injection`) has been promoted from experimental to the main query pack. Its results will now appear by default. This query was originally [submitted as an experimental query by @jorgectf](https://github.com/github/codeql/pull/5443).
* The query "Log Injection" (`py/log-injection`) has been promoted from experimental to the main query pack. Its results will now appear when `security-extended` is used. This query was originally [submitted as an experimental query by @haby0](https://github.com/github/codeql/pull/6182).
## 0.0.9
### Bug Fixes

View File

@@ -1,4 +0,0 @@
---
category: newQuery
---
* The query "Log Injection" (`py/log-injection`) has been promoted from experimental to the main query pack. Its results will now appear when `security-extended` is used. This query was originally [submitted as an experimental query by @haby0](https://github.com/github/codeql/pull/6182).

View File

@@ -1,4 +0,0 @@
---
category: newQuery
---
* The query "LDAP query built from user-controlled sources" (`py/ldap-injection`) has been promoted from experimental to the main query pack. Its results will now appear by default. This query was originally [submitted as an experimental query by @jorgectf](https://github.com/github/codeql/pull/5443).

View File

@@ -0,0 +1,6 @@
## 0.0.10
### New Queries
* The query "LDAP query built from user-controlled sources" (`py/ldap-injection`) has been promoted from experimental to the main query pack. Its results will now appear by default. This query was originally [submitted as an experimental query by @jorgectf](https://github.com/github/codeql/pull/5443).
* The query "Log Injection" (`py/log-injection`) has been promoted from experimental to the main query pack. Its results will now appear when `security-extended` is used. This query was originally [submitted as an experimental query by @haby0](https://github.com/github/codeql/pull/6182).

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.0.9
lastReleaseVersion: 0.0.10

View File

@@ -1,5 +1,5 @@
name: codeql/python-queries
version: 0.0.10-dev
version: 0.0.10
groups:
- python
- queries

View File

@@ -1,3 +1,9 @@
## 0.0.10
### Minor Analysis Improvements
* Added `FileSystemWriteAccess` concept to model data written to the filesystem.
## 0.0.9
## 0.0.8

View File

@@ -1,4 +1,5 @@
---
category: minorAnalysis
---
## 0.0.10
### Minor Analysis Improvements
* Added `FileSystemWriteAccess` concept to model data written to the filesystem.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.0.9
lastReleaseVersion: 0.0.10

View File

@@ -1,5 +1,5 @@
name: codeql/ruby-all
version: 0.0.10-dev
version: 0.0.10
groups: ruby
extractor: ruby
dbscheme: ruby.dbscheme

View File

@@ -1,3 +1,9 @@
## 0.0.10
### New Queries
* Added a new query, `rb/clear-text-logging-sensitive-data`. The query finds cases where sensitive information, such as user credentials, are logged as cleartext.
## 0.0.9
## 0.0.8

View File

@@ -1,4 +1,5 @@
---
category: newQuery
---
## 0.0.10
### New Queries
* Added a new query, `rb/clear-text-logging-sensitive-data`. The query finds cases where sensitive information, such as user credentials, are logged as cleartext.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.0.9
lastReleaseVersion: 0.0.10

View File

@@ -1,5 +1,5 @@
name: codeql/ruby-queries
version: 0.0.10-dev
version: 0.0.10
groups:
- ruby
- queries