Revert "Release preparation for version 2.18.1"

This commit is contained in:
Chuan-kai Lin
2024-07-22 13:22:49 -07:00
committed by GitHub
parent 81ab2025a1
commit 23320b6e5e
155 changed files with 145 additions and 406 deletions

View File

@@ -1,11 +1,3 @@
## 1.3.0
### New Features
* Models-as-data alert provenance information has been extended to the C/C++ language. Any qltests that include the edges relation in their output (for example, `.qlref`s that reference path-problem queries) will need to be have their expected output updated accordingly.
* Added subclasses of `BuiltInOperations` for `__builtin_has_attribute`, `__builtin_is_corresponding_member`, `__builtin_is_pointer_interconvertible_with_class`, `__is_assignable_no_precondition_check`, `__is_bounded_array`, `__is_convertible`, `__is_corresponding_member`, `__is_nothrow_convertible`, `__is_pointer_interconvertible_with_class`, `__is_referenceable`, `__is_same_as`, `__is_trivially_copy_assignable`, `__is_unbounded_array`, `__is_valid_winrt_type`, `_is_win_class`, `__is_win_interface`, `__reference_binds_to_temporary`, `__reference_constructs_from_temporary`, and `__reference_converts_from_temporary`.
* The class `NewArrayExpr` adds a predicate `getArraySize()` to allow a more convenient way to access the static size of the array when the extent is missing.
## 1.2.0
### New Features

View File

@@ -0,0 +1,4 @@
---
category: feature
---
* The class `NewArrayExpr` adds a predicate `getArraySize()` to allow a more convenient way to access the static size of the array when the extent is missing.

View File

@@ -1,7 +1,4 @@
## 1.3.0
### New Features
* Models-as-data alert provenance information has been extended to the C/C++ language. Any qltests that include the edges relation in their output (for example, `.qlref`s that reference path-problem queries) will need to be have their expected output updated accordingly.
---
category: feature
---
* Added subclasses of `BuiltInOperations` for `__builtin_has_attribute`, `__builtin_is_corresponding_member`, `__builtin_is_pointer_interconvertible_with_class`, `__is_assignable_no_precondition_check`, `__is_bounded_array`, `__is_convertible`, `__is_corresponding_member`, `__is_nothrow_convertible`, `__is_pointer_interconvertible_with_class`, `__is_referenceable`, `__is_same_as`, `__is_trivially_copy_assignable`, `__is_unbounded_array`, `__is_valid_winrt_type`, `_is_win_class`, `__is_win_interface`, `__reference_binds_to_temporary`, `__reference_constructs_from_temporary`, and `__reference_converts_from_temporary`.
* The class `NewArrayExpr` adds a predicate `getArraySize()` to allow a more convenient way to access the static size of the array when the extent is missing.

View File

@@ -0,0 +1,4 @@
---
category: feature
---
* Models-as-data alert provenance information has been extended to the C/C++ language. Any qltests that include the edges relation in their output (for example, `.qlref`s that reference path-problem queries) will need to be have their expected output updated accordingly.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.3.0
lastReleaseVersion: 1.2.0

View File

@@ -1,5 +1,5 @@
name: codeql/cpp-all
version: 1.3.0
version: 1.2.1-dev
groups: cpp
dbscheme: semmlecode.cpp.dbscheme
extractor: cpp

View File

@@ -1,14 +1,3 @@
## 1.1.0
### Query Metadata Changes
* The precision of `cpp/iterator-to-expired-container` ("Iterator to expired container") has been increased to `high`. As a result, it will be run by default as part of the Code Scanning suite.
* The precision of `cpp/unsafe-strncat` ("Potentially unsafe call to strncat") has been increased to `high`. As a result, it will be run by default as part of the Code Scanning suite.
### Minor Analysis Improvements
* The `cpp/unsigned-difference-expression-compared-zero` ("Unsigned difference expression compared to zero") query now produces fewer false positives.
## 1.0.3
No user-facing changes.

View File

@@ -0,0 +1,4 @@
---
category: queryMetadata
---
* The precision of `cpp/unsafe-strncat` ("Potentially unsafe call to strncat") has been increased to `high`. As a result, it will be run by default as part of the Code Scanning suite.

View File

@@ -0,0 +1,4 @@
---
category: queryMetadata
---
* The precision of `cpp/iterator-to-expired-container` ("Iterator to expired container") has been increased to `high`. As a result, it will be run by default as part of the Code Scanning suite.

View File

@@ -0,0 +1,4 @@
---
category: minorAnalysis
---
* The `cpp/unsigned-difference-expression-compared-zero` ("Unsigned difference expression compared to zero") query now produces fewer false positives.

View File

@@ -1,10 +0,0 @@
## 1.1.0
### Query Metadata Changes
* The precision of `cpp/iterator-to-expired-container` ("Iterator to expired container") has been increased to `high`. As a result, it will be run by default as part of the Code Scanning suite.
* The precision of `cpp/unsafe-strncat` ("Potentially unsafe call to strncat") has been increased to `high`. As a result, it will be run by default as part of the Code Scanning suite.
### Minor Analysis Improvements
* The `cpp/unsigned-difference-expression-compared-zero` ("Unsigned difference expression compared to zero") query now produces fewer false positives.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.1.0
lastReleaseVersion: 1.0.3

View File

@@ -1,5 +1,5 @@
name: codeql/cpp-queries
version: 1.1.0
version: 1.0.4-dev
groups:
- cpp
- queries

View File

@@ -1,7 +1,3 @@
## 1.7.21
No user-facing changes.
## 1.7.20
No user-facing changes.

View File

@@ -1,3 +0,0 @@
## 1.7.21
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.7.21
lastReleaseVersion: 1.7.20

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-solorigate-all
version: 1.7.21
version: 1.7.21-dev
groups:
- csharp
- solorigate

View File

@@ -1,7 +1,3 @@
## 1.7.21
No user-facing changes.
## 1.7.20
No user-facing changes.

View File

@@ -1,3 +0,0 @@
## 1.7.21
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.7.21
lastReleaseVersion: 1.7.20

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-solorigate-queries
version: 1.7.21
version: 1.7.21-dev
groups:
- csharp
- solorigate

View File

@@ -1,7 +1,3 @@
## 1.0.4
No user-facing changes.
## 1.0.3
No user-facing changes.

View File

@@ -1,3 +0,0 @@
## 1.0.4
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.0.4
lastReleaseVersion: 1.0.3

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-all
version: 1.0.4
version: 1.0.4-dev
groups: csharp
dbscheme: semmlecode.csharp.dbscheme
extractor: csharp

View File

@@ -1,7 +1,3 @@
## 1.0.4
No user-facing changes.
## 1.0.3
No user-facing changes.

View File

@@ -1,3 +0,0 @@
## 1.0.4
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.0.4
lastReleaseVersion: 1.0.3

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-queries
version: 1.0.4
version: 1.0.4-dev
groups:
- csharp
- queries

View File

@@ -1,7 +1,3 @@
## 1.0.4
No user-facing changes.
## 1.0.3
No user-facing changes.

View File

@@ -1,3 +0,0 @@
## 1.0.4
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.0.4
lastReleaseVersion: 1.0.3

View File

@@ -1,5 +1,5 @@
name: codeql-go-consistency-queries
version: 1.0.4
version: 1.0.4-dev
groups:
- go
- queries

View File

@@ -1,9 +1,3 @@
## 1.1.3
### Minor Analysis Improvements
* There was a bug which meant that the built-in function `clear` was considered as a sanitizer in some cases when it shouldn't have been. This has now been fixed, which may lead to more alerts.
## 1.1.2
### Minor Analysis Improvements

View File

@@ -1,5 +1,4 @@
## 1.1.3
### Minor Analysis Improvements
---
category: minorAnalysis
---
* There was a bug which meant that the built-in function `clear` was considered as a sanitizer in some cases when it shouldn't have been. This has now been fixed, which may lead to more alerts.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.1.3
lastReleaseVersion: 1.1.2

View File

@@ -1,5 +1,5 @@
name: codeql/go-all
version: 1.1.3
version: 1.1.3-dev
groups: go
dbscheme: go.dbscheme
extractor: go

View File

@@ -1,7 +1,3 @@
## 1.0.4
No user-facing changes.
## 1.0.3
No user-facing changes.

View File

@@ -1,3 +0,0 @@
## 1.0.4
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.0.4
lastReleaseVersion: 1.0.3

View File

@@ -1,5 +1,5 @@
name: codeql/go-queries
version: 1.0.4
version: 1.0.4-dev
groups:
- go
- queries

View File

@@ -1,7 +1,3 @@
## 1.0.4
No user-facing changes.
## 1.0.3
No user-facing changes.

View File

@@ -1,3 +0,0 @@
## 1.0.4
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.0.4
lastReleaseVersion: 1.0.3

View File

@@ -1,5 +1,5 @@
name: codeql/java-automodel-queries
version: 1.0.4
version: 1.0.4-dev
groups:
- java
- automodel

View File

@@ -1,24 +1,3 @@
## 2.0.0
### Breaking Changes
* The Java extractor no longer supports the `SEMMLE_DIST` legacy environment variable.
### Deprecated APIs
* The predicate `isAndroid` from the module `semmle.code.java.security.AndroidCertificatePinningQuery` has been deprecated. Use `semmle.code.java.frameworks.android.Android::inAndroidApplication(File)` instead.
### New Features
* Kotlin support is now out of beta, and generally available
* Kotlin versions up to 2.0.2*x* are now supported.
### Minor Analysis Improvements
* Added a path-injection sink for `hudson.FilePath.exists()`.
* Added summary models for `org.apache.commons.io.IOUtils.toByteArray`.
* Java build-mode `none` analyses now only report a warning on the CodeQL status page when there are significant analysis problems-- defined as 5% of expressions lacking a type, or 5% of call targets being unknown. Other messages reported on the status page are downgraded from warnings to notes and so are less prominent, but are still available for review.
## 1.1.2
### Minor Analysis Improvements

View File

@@ -0,0 +1,4 @@
---
category: deprecated
---
* The predicate `isAndroid` from the module `semmle.code.java.security.AndroidCertificatePinningQuery` has been deprecated. Use `semmle.code.java.frameworks.android.Android::inAndroidApplication(File)` instead.

View File

@@ -0,0 +1,4 @@
---
category: feature
---
* Kotlin versions up to 2.0.2\ *x* are now supported.

View File

@@ -0,0 +1,4 @@
---
category: minorAnalysis
---
* Java build-mode `none` analyses now only report a warning on the CodeQL status page when there are significant analysis problems-- defined as 5% of expressions lacking a type, or 5% of call targets being unknown. Other messages reported on the status page are downgraded from warnings to notes and so are less prominent, but are still available for review.

View File

@@ -0,0 +1,4 @@
---
category: breaking
---
* The Java extractor no longer supports the `SEMMLE_DIST` legacy environment variable.

View File

@@ -0,0 +1,4 @@
---
category: minorAnalysis
---
* Added a path-injection sink for `hudson.FilePath.exists()`.

View File

@@ -0,0 +1,4 @@
---
category: feature
---
* Kotlin support is now out of beta, and generally available

View File

@@ -0,0 +1,4 @@
---
category: minorAnalysis
---
* Added summary models for `org.apache.commons.io.IOUtils.toByteArray`.

View File

@@ -1,20 +0,0 @@
## 2.0.0
### Breaking Changes
* The Java extractor no longer supports the `SEMMLE_DIST` legacy environment variable.
### Deprecated APIs
* The predicate `isAndroid` from the module `semmle.code.java.security.AndroidCertificatePinningQuery` has been deprecated. Use `semmle.code.java.frameworks.android.Android::inAndroidApplication(File)` instead.
### New Features
* Kotlin support is now out of beta, and generally available
* Kotlin versions up to 2.0.2*x* are now supported.
### Minor Analysis Improvements
* Added a path-injection sink for `hudson.FilePath.exists()`.
* Added summary models for `org.apache.commons.io.IOUtils.toByteArray`.
* Java build-mode `none` analyses now only report a warning on the CodeQL status page when there are significant analysis problems-- defined as 5% of expressions lacking a type, or 5% of call targets being unknown. Other messages reported on the status page are downgraded from warnings to notes and so are less prominent, but are still available for review.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 2.0.0
lastReleaseVersion: 1.1.2

View File

@@ -1,5 +1,5 @@
name: codeql/java-all
version: 2.0.0
version: 1.1.3-dev
groups: java
dbscheme: config/semmlecode.dbscheme
extractor: java

View File

@@ -1,9 +1,3 @@
## 1.1.1
### Minor Analysis Improvements
* The heuristic to enable certain Android queries has been improved. Now it ignores Android Manifests which don't define an activity, content provider or service. We also only consider files which are under a folder containing such an Android Manifest for these queries. This should remove some false positive alerts.
## 1.1.0
### Major Analysis Improvements

View File

@@ -1,5 +1,4 @@
## 1.1.1
### Minor Analysis Improvements
---
category: minorAnalysis
---
* The heuristic to enable certain Android queries has been improved. Now it ignores Android Manifests which don't define an activity, content provider or service. We also only consider files which are under a folder containing such an Android Manifest for these queries. This should remove some false positive alerts.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.1.1
lastReleaseVersion: 1.1.0

View File

@@ -1,5 +1,5 @@
name: codeql/java-queries
version: 1.1.1
version: 1.1.1-dev
groups:
- java
- queries

View File

@@ -1,7 +1,3 @@
## 1.1.1
No user-facing changes.
## 1.1.0
### Major Analysis Improvements

View File

@@ -1,3 +0,0 @@
## 1.1.1
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.1.1
lastReleaseVersion: 1.1.0

View File

@@ -1,5 +1,5 @@
name: codeql/javascript-all
version: 1.1.1
version: 1.1.1-dev
groups: javascript
dbscheme: semmlecode.javascript.dbscheme
extractor: javascript

View File

@@ -1,17 +1,3 @@
## 1.1.0
### New Queries
* Added a new query, `js/insecure-helmet-configuration`, to detect instances where Helmet middleware is configured with important security features disabled.
### Minor Analysis Improvements
* Added a new query, `js/functionality-from-untrusted-domain`, which detects uses in HTML and JavaScript scripts from untrusted domains, including the `polyfill.io` content delivery network
* it can be extended to detect other compromised scripts using user-provided data extensions of the `untrustedDomain` predicate, which takes one string argument with the domain to warn on (and will warn on any subdomains too).
* Modified existing query, `js/functionality-from-untrusted-source`, to allow adding this new query, but reusing the same logic
* Added the ability to use data extensions to require SRI on CDN hostnames using the `isCdnDomainWithCheckingRequired` predicate, which takes one string argument of the full hostname to require SRI for.
* Created a new library, `semmle.javascript.security.FunctionalityFromUntrustedSource`, to support both queries.
## 1.0.3
### Minor Analysis Improvements

View File

@@ -0,0 +1,4 @@
---
category: newQuery
---
* Added a new query, `js/insecure-helmet-configuration`, to detect instances where Helmet middleware is configured with important security features disabled.

View File

@@ -1,11 +1,6 @@
## 1.1.0
### New Queries
* Added a new query, `js/insecure-helmet-configuration`, to detect instances where Helmet middleware is configured with important security features disabled.
### Minor Analysis Improvements
---
category: minorAnalysis
---
* Added a new query, `js/functionality-from-untrusted-domain`, which detects uses in HTML and JavaScript scripts from untrusted domains, including the `polyfill.io` content delivery network
* it can be extended to detect other compromised scripts using user-provided data extensions of the `untrustedDomain` predicate, which takes one string argument with the domain to warn on (and will warn on any subdomains too).
* Modified existing query, `js/functionality-from-untrusted-source`, to allow adding this new query, but reusing the same logic

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.1.0
lastReleaseVersion: 1.0.3

View File

@@ -1,5 +1,5 @@
name: codeql/javascript-queries
version: 1.1.0
version: 1.0.4-dev
groups:
- javascript
- queries

View File

@@ -1,7 +1,3 @@
## 1.0.4
No user-facing changes.
## 1.0.3
No user-facing changes.

View File

@@ -1,3 +0,0 @@
## 1.0.4
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.0.4
lastReleaseVersion: 1.0.3

View File

@@ -1,4 +1,4 @@
name: codeql/suite-helpers
version: 1.0.4
version: 1.0.4-dev
groups: shared
warnOnImplicitThis: true

View File

@@ -1,9 +1,3 @@
## 1.0.4
### Minor Analysis Improvements
* Additional modelling to detect direct writes to the `Set-Cookie` header has been added for several web frameworks.
## 1.0.3
### Minor Analysis Improvements

View File

@@ -0,0 +1,4 @@
---
category: minorAnalysis
---
* Additional modelling has been added to detect cookie writes from direct writes to the `Set-Cookie` header have been added for several web frameworks.

View File

@@ -1,5 +0,0 @@
## 1.0.4
### Minor Analysis Improvements
* Additional modelling to detect direct writes to the `Set-Cookie` header has been added for several web frameworks.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.0.4
lastReleaseVersion: 1.0.3

View File

@@ -1,5 +1,5 @@
name: codeql/python-all
version: 1.0.4
version: 1.0.4-dev
groups: python
dbscheme: semmlecode.python.dbscheme
extractor: python

View File

@@ -1,7 +1,3 @@
## 1.0.4
No user-facing changes.
## 1.0.3
### Minor Analysis Improvements

View File

@@ -1,3 +0,0 @@
## 1.0.4
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.0.4
lastReleaseVersion: 1.0.3

View File

@@ -1,5 +1,5 @@
name: codeql/python-queries
version: 1.0.4
version: 1.0.4-dev
groups:
- python
- queries

View File

@@ -1,7 +1,3 @@
## 1.0.4
No user-facing changes.
## 1.0.3
### Minor Analysis Improvements

View File

@@ -1,3 +0,0 @@
## 1.0.4
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.0.4
lastReleaseVersion: 1.0.3

View File

@@ -1,5 +1,5 @@
name: codeql/ruby-all
version: 1.0.4
version: 1.0.4-dev
groups: ruby
extractor: ruby
dbscheme: ruby.dbscheme

View File

@@ -1,7 +1,3 @@
## 1.0.4
No user-facing changes.
## 1.0.3
No user-facing changes.

View File

@@ -1,3 +0,0 @@
## 1.0.4
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.0.4
lastReleaseVersion: 1.0.3

View File

@@ -1,5 +1,5 @@
name: codeql/ruby-queries
version: 1.0.4
version: 1.0.4-dev
groups:
- ruby
- queries

View File

@@ -1,7 +1,3 @@
## 1.0.4
No user-facing changes.
## 1.0.3
No user-facing changes.

View File

@@ -1,3 +0,0 @@
## 1.0.4
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.0.4
lastReleaseVersion: 1.0.3

View File

@@ -1,5 +1,5 @@
name: codeql/controlflow
version: 1.0.4
version: 1.0.4-dev
groups: shared
library: true
dependencies:

View File

@@ -1,7 +1,3 @@
## 1.0.4
No user-facing changes.
## 1.0.3
No user-facing changes.

View File

@@ -1,3 +0,0 @@
## 1.0.4
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.0.4
lastReleaseVersion: 1.0.3

View File

@@ -1,5 +1,5 @@
name: codeql/dataflow
version: 1.0.4
version: 1.0.4-dev
groups: shared
library: true
dependencies:

View File

@@ -1,7 +1,3 @@
## 1.0.4
No user-facing changes.
## 1.0.3
No user-facing changes.

View File

@@ -1,3 +0,0 @@
## 1.0.4
No user-facing changes.

Some files were not shown because too many files have changed in this diff Show More