Release preparation for version 2.19.1

This commit is contained in:
github-actions[bot]
2024-09-30 17:59:48 +00:00
parent 70b4ecf0a5
commit 455c8c5953
154 changed files with 412 additions and 156 deletions

View File

@@ -1,3 +1,7 @@
## 2.0.1
No user-facing changes.
## 2.0.0
### Breaking Changes

View File

@@ -0,0 +1,3 @@
## 2.0.1
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 2.0.0
lastReleaseVersion: 2.0.1

View File

@@ -1,5 +1,5 @@
name: codeql/cpp-all
version: 2.0.1-dev
version: 2.0.1
groups: cpp
dbscheme: semmlecode.cpp.dbscheme
extractor: cpp

View File

@@ -1,9 +1,15 @@
## 1.2.4
### Minor Analysis Improvements
* Fixed false positives in the `cpp/wrong-number-format-arguments` ("Too few arguments to formatting function") query when the formatting function has been declared implicitly.
## 1.2.3
### Minor Analysis Improvements
* Removed false positives caused by buffer accesses in unreachable code.
* Removed false positives caused by inconsistent type checking.
* Removed false positives caused by buffer accesses in unreachable code
* Removed false positives caused by inconsistent type checking
* Add modeling of C functions that don't throw, thereby increasing the precision of the `cpp/incorrect-allocation-error-handling` ("Incorrect allocation-error handling") query. The query now produces additional true positives.
## 1.2.2

View File

@@ -1,4 +1,5 @@
---
category: minorAnalysis
---
## 1.2.4
### Minor Analysis Improvements
* Fixed false positives in the `cpp/wrong-number-format-arguments` ("Too few arguments to formatting function") query when the formatting function has been declared implicitly.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.2.3
lastReleaseVersion: 1.2.4

View File

@@ -1,5 +1,5 @@
name: codeql/cpp-queries
version: 1.2.4-dev
version: 1.2.4
groups:
- cpp
- queries

View File

@@ -1,3 +1,7 @@
## 1.7.26
No user-facing changes.
## 1.7.25
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.7.26
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.7.25
lastReleaseVersion: 1.7.26

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-solorigate-all
version: 1.7.26-dev
version: 1.7.26
groups:
- csharp
- solorigate

View File

@@ -1,3 +1,7 @@
## 1.7.26
No user-facing changes.
## 1.7.25
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.7.26
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.7.25
lastReleaseVersion: 1.7.26

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-solorigate-queries
version: 1.7.26-dev
version: 1.7.26
groups:
- csharp
- solorigate

View File

@@ -1,3 +1,19 @@
## 3.0.0
### Breaking Changes
* C#: Add support for MaD directly on properties and indexers using *attributes*. Using `Attribute.Getter` or `Attribute.Setter` in the model `ext` field applies the model to the getter or setter for properties and indexers. Prior to this change `Attribute` models unintentionally worked for property setters (if the property is decorated with the matching attribute). That is, a model that uses the `Attribute` feature directly on a property for a property setter needs to be changed to `Attribute.Setter`.
* C#: Remove all CIL tables and related QL library functionality.
### Deprecated APIs
* The class `ThreatModelFlowSource` has been renamed to `ActiveThreatModelSource` to more clearly reflect it only contains the currently active threat model sources. `ThreatModelFlowSource` has been marked as deprecated.
### Minor Analysis Improvements
* `DataFlow::Node` instances are no longer created for library methods and fields that are not callable (either statically or dynamically) or otherwise referred to from source code. This may affect third-party queries that use these nodes to identify library methods or fields that are present in DLL files where those methods or fields are unreferenced. If this presents a problem, consider using `Callable` and other non-dataflow classes to identify such library entities.
* C#: Add extractor support for attributes on indexers.
## 2.0.0
### Breaking Changes

View File

@@ -1,4 +0,0 @@
---
category: deprecated
---
* The class `ThreatModelFlowSource` has been renamed to `ActiveThreatModelSource` to more clearly reflect it only contains the currently active threat model sources. `ThreatModelFlowSource` has been marked as deprecated.

View File

@@ -1,4 +0,0 @@
---
category: breaking
---
* C#: Add support for MaD directly on properties and indexers using *attributes*. Using `Attribute.Getter` or `Attribute.Setter` in the model `ext` field applies the model to the getter or setter for properties and indexers. Prior to this change `Attribute` models unintentionally worked for property setters (if the property is decorated with the matching attribute). That is, a model that uses the `Attribute` feature directly on a property for a property setter needs to be changed to `Attribute.Setter`.

View File

@@ -1,4 +0,0 @@
---
category: breaking
---
* C#: Remove all CIL tables and related QL library functionality.

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* C#: Add extractor support for attributes on indexers.

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* `DataFlow::Node` instances are no longer created for library methods and fields that are not callable (either statically or dynamically) or otherwise referred to from source code. This may affect third-party queries that use these nodes to identify library methods or fields that are present in DLL files where those methods or fields are unreferenced. If this presents a problem, consider using `Callable` and other non-dataflow classes to identify such library entities.

View File

@@ -0,0 +1,15 @@
## 3.0.0
### Breaking Changes
* C#: Add support for MaD directly on properties and indexers using *attributes*. Using `Attribute.Getter` or `Attribute.Setter` in the model `ext` field applies the model to the getter or setter for properties and indexers. Prior to this change `Attribute` models unintentionally worked for property setters (if the property is decorated with the matching attribute). That is, a model that uses the `Attribute` feature directly on a property for a property setter needs to be changed to `Attribute.Setter`.
* C#: Remove all CIL tables and related QL library functionality.
### Deprecated APIs
* The class `ThreatModelFlowSource` has been renamed to `ActiveThreatModelSource` to more clearly reflect it only contains the currently active threat model sources. `ThreatModelFlowSource` has been marked as deprecated.
### Minor Analysis Improvements
* `DataFlow::Node` instances are no longer created for library methods and fields that are not callable (either statically or dynamically) or otherwise referred to from source code. This may affect third-party queries that use these nodes to identify library methods or fields that are present in DLL files where those methods or fields are unreferenced. If this presents a problem, consider using `Callable` and other non-dataflow classes to identify such library entities.
* C#: Add extractor support for attributes on indexers.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 2.0.0
lastReleaseVersion: 3.0.0

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-all
version: 2.0.1-dev
version: 3.0.0
groups: csharp
dbscheme: semmlecode.csharp.dbscheme
extractor: csharp

View File

@@ -1,3 +1,9 @@
## 1.0.9
### Minor Analysis Improvements
* C#: The indexer and `Add` method on `System.Web.UI.AttributeCollection` is no longer considered an HTML sink.
## 1.0.8
No user-facing changes.

View File

@@ -1,4 +1,5 @@
---
category: minorAnalysis
---
## 1.0.9
### Minor Analysis Improvements
* C#: The indexer and `Add` method on `System.Web.UI.AttributeCollection` is no longer considered an HTML sink.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.0.8
lastReleaseVersion: 1.0.9

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-queries
version: 1.0.9-dev
version: 1.0.9
groups:
- csharp
- queries

View File

@@ -1,3 +1,7 @@
## 1.0.9
No user-facing changes.
## 1.0.8
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.0.9
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.0.8
lastReleaseVersion: 1.0.9

View File

@@ -1,5 +1,5 @@
name: codeql-go-consistency-queries
version: 1.0.9-dev
version: 1.0.9
groups:
- go
- queries

View File

@@ -1,3 +1,13 @@
## 2.1.0
### Deprecated APIs
* The class `ThreatModelFlowSource` has been renamed to `ActiveThreatModelSource` to more clearly reflect it only contains the currently active threat model sources. `ThreatModelFlowSource` has been marked as deprecated.
### Minor Analysis Improvements
* A method in the method set of an embedded field of a struct should not be promoted to the method set of the struct if the struct has a method with the same name. This was not being enforced, which meant that there were two methods with the same qualified name, and models were sometimes being applied when they shouldn't have been. This has now been fixed.
## 2.0.0
### Breaking Changes
@@ -9,13 +19,13 @@
* When a function or type has more than one anonymous type parameters, they were mistakenly being treated as the same type parameter. This has now been fixed.
* Local source models for reading and parsing environment variables have been added for the following libraries:
* `os`
* `syscall`
* `github.com/caarlos0/env`
* `github.com/gobuffalo/envy`
* `github.com/hashicorp/go-envparse`
* `github.com/joho/godotenv`
* `github.com/kelseyhightower/envconfig`
* os
* syscall
* github.com/caarlos0/env
* github.com/gobuffalo/envy
* github.com/hashicorp/go-envparse
* github.com/joho/godotenv
* github.com/kelseyhightower/envconfig
* Local source models have been added for the APIs which open files in the `io/fs`, `io/ioutil` and `os` packages in the Go standard library. You can optionally include threat models as appropriate when using the CodeQL CLI and in GitHub code scanning. For more information, see [Analyzing your code with CodeQL queries](https://docs.github.com/code-security/codeql-cli/getting-started-with-the-codeql-cli/analyzing-your-code-with-codeql-queries#including-model-packs-to-add-potential-sources-of-tainted-data>) and [Customizing your advanced setup for code scanning](https://docs.github.com/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning#extending-codeql-coverage-with-threat-models).
### Bug Fixes

View File

@@ -1,4 +0,0 @@
---
category: deprecated
---
* The class `ThreatModelFlowSource` has been renamed to `ActiveThreatModelSource` to more clearly reflect it only contains the currently active threat model sources. `ThreatModelFlowSource` has been marked as deprecated.

View File

@@ -1,4 +1,9 @@
---
category: minorAnalysis
---
## 2.1.0
### Deprecated APIs
* The class `ThreatModelFlowSource` has been renamed to `ActiveThreatModelSource` to more clearly reflect it only contains the currently active threat model sources. `ThreatModelFlowSource` has been marked as deprecated.
### Minor Analysis Improvements
* A method in the method set of an embedded field of a struct should not be promoted to the method set of the struct if the struct has a method with the same name. This was not being enforced, which meant that there were two methods with the same qualified name, and models were sometimes being applied when they shouldn't have been. This has now been fixed.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 2.0.0
lastReleaseVersion: 2.1.0

View File

@@ -1,5 +1,5 @@
name: codeql/go-all
version: 2.0.1-dev
version: 2.1.0
groups: go
dbscheme: go.dbscheme
extractor: go

View File

@@ -1,3 +1,9 @@
## 1.1.0
### Query Metadata Changes
* The precision of the `go/incorrect-integer-conversion-query` query was decreased from `very-high` to `high`, since there is at least one known class of false positives involving dynamic bounds checking.
## 1.0.8
No user-facing changes.

View File

@@ -1,4 +1,5 @@
---
category: queryMetadata
---
## 1.1.0
### Query Metadata Changes
* The precision of the `go/incorrect-integer-conversion-query` query was decreased from `very-high` to `high`, since there is at least one known class of false positives involving dynamic bounds checking.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.0.8
lastReleaseVersion: 1.1.0

View File

@@ -1,5 +1,5 @@
name: codeql/go-queries
version: 1.0.9-dev
version: 1.1.0
groups:
- go
- queries

View File

@@ -1,3 +1,7 @@
## 1.0.9
No user-facing changes.
## 1.0.8
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.0.9
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.0.8
lastReleaseVersion: 1.0.9

View File

@@ -1,5 +1,5 @@
name: codeql/java-automodel-queries
version: 1.0.9-dev
version: 1.0.9
groups:
- java
- automodel

View File

@@ -1,3 +1,17 @@
## 4.1.0
### Deprecated APIs
* The `Field.getSourceDeclaration()` predicate has been deprecated. The result was always the original field, so calls to it can simply be removed.
* The `Field.isSourceDeclaration()` predicate has been deprecated. It always holds.
* The `RefType.nestedName()` predicate has been deprecated, and `RefType.getNestedName()` added to replace it.
* The class `ThreatModelFlowSource` has been renamed to `ActiveThreatModelSource` to more clearly reflect it only contains the currently active threat model sources. `ThreatModelFlowSource` has been marked as deprecated.
### New Features
* The Java extractor and QL libraries now support Java 23.
* Kotlin versions up to 2.1.0\ *x* are now supported.
## 4.0.0
### Breaking Changes
@@ -13,7 +27,7 @@
### Major Analysis Improvements
* When a method exists as source code, we will no longer use a models-as-data (MaD) model of that method. This primarily affects query results when the analysis includes generated models for the source code being analysed.
* A generated (Models as Data) summary model is no longer used, if there exists a source code alternative. This primarily affects the analysis, when the analysis includes generated models for the source code being analysed.
## 3.0.2

View File

@@ -1,4 +0,0 @@
---
category: deprecated
---
* The class `ThreatModelFlowSource` has been renamed to `ActiveThreatModelSource` to more clearly reflect it only contains the currently active threat model sources. `ThreatModelFlowSource` has been marked as deprecated.

View File

@@ -1,4 +0,0 @@
---
category: deprecated
---
* The `RefType.nestedName()` predicate has been deprecated, and `RefType.getNestedName()` added to replace it.

View File

@@ -1,5 +0,0 @@
---
category: deprecated
---
* The `Field.getSourceDeclaration()` predicate has been deprecated. The result was always the original field, so calls to it can simply be removed.
* The `Field.isSourceDeclaration()` predicate has been deprecated. It always holds.

View File

@@ -1,4 +0,0 @@
---
category: feature
---
* Kotlin versions up to 2.1.0\ *x* are now supported.

View File

@@ -1,4 +0,0 @@
---
category: feature
---
* The Java extractor and QL libraries now support Java 23.

View File

@@ -0,0 +1,13 @@
## 4.1.0
### Deprecated APIs
* The `Field.getSourceDeclaration()` predicate has been deprecated. The result was always the original field, so calls to it can simply be removed.
* The `Field.isSourceDeclaration()` predicate has been deprecated. It always holds.
* The `RefType.nestedName()` predicate has been deprecated, and `RefType.getNestedName()` added to replace it.
* The class `ThreatModelFlowSource` has been renamed to `ActiveThreatModelSource` to more clearly reflect it only contains the currently active threat model sources. `ThreatModelFlowSource` has been marked as deprecated.
### New Features
* The Java extractor and QL libraries now support Java 23.
* Kotlin versions up to 2.1.0\ *x* are now supported.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 4.0.0
lastReleaseVersion: 4.1.0

View File

@@ -1,5 +1,5 @@
name: codeql/java-all
version: 4.0.1-dev
version: 4.1.0
groups: java
dbscheme: config/semmlecode.dbscheme
extractor: java

View File

@@ -1,3 +1,9 @@
## 1.1.6
### Minor Analysis Improvements
* Added taint summary model for `org.springframework.core.io.InputStreamSource#getInputStream()`.
## 1.1.5
No user-facing changes.

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* Added taint summary model for `org.springframework.core.io.InputStreamSource#getInputStream()`.

View File

@@ -0,0 +1,5 @@
## 1.1.6
### Minor Analysis Improvements
* Added taint summary model for `org.springframework.core.io.InputStreamSource#getInputStream()`.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.1.5
lastReleaseVersion: 1.1.6

View File

@@ -1,5 +1,5 @@
name: codeql/java-queries
version: 1.1.6-dev
version: 1.1.6
groups:
- java
- queries

View File

@@ -1,3 +1,7 @@
## 2.0.1
No user-facing changes.
## 2.0.0
### Breaking Changes

View File

@@ -0,0 +1,3 @@
## 2.0.1
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 2.0.0
lastReleaseVersion: 2.0.1

View File

@@ -1,5 +1,5 @@
name: codeql/javascript-all
version: 2.0.1-dev
version: 2.0.1
groups: javascript
dbscheme: semmlecode.javascript.dbscheme
extractor: javascript

View File

@@ -1,8 +1,12 @@
## 1.2.1
No user-facing changes.
## 1.2.0
### Major Analysis Improvements
- Added a new query (`js/actions/actions-artifact-leak`) to detect GitHub Actions artifacts that may leak the `GITHUB_TOKEN` token.
- Added a new query (`js/actions/actions-artifact-leak`) to detect GitHub Actions artifacts that may leak the GITHUB_TOKEN token.
## 1.1.3

View File

@@ -0,0 +1,3 @@
## 1.2.1
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.2.0
lastReleaseVersion: 1.2.1

View File

@@ -1,5 +1,5 @@
name: codeql/javascript-queries
version: 1.2.1-dev
version: 1.2.1
groups:
- javascript
- queries

View File

@@ -1,3 +1,7 @@
## 1.0.9
No user-facing changes.
## 1.0.8
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.0.9
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.0.8
lastReleaseVersion: 1.0.9

View File

@@ -1,4 +1,4 @@
name: codeql/suite-helpers
version: 1.0.9-dev
version: 1.0.9
groups: shared
warnOnImplicitThis: true

View File

@@ -1,3 +1,13 @@
## 2.1.0
### New Features
* Added support for custom threat-models, which can be used in most of our taint-tracking queries, see our [documentation](https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning#extending-codeql-coverage-with-threat-models) for more details.
### Minor Analysis Improvements
* The common sanitizer guard `StringConstCompareBarrier` has been renamed to `ConstCompareBarrier` and expanded to cover comparisons with other constant values such as `None`. This may result in fewer false positive results for several queries.
## 2.0.0
### Breaking Changes

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* The common sanitizer guard `StringConstCompareBarrier` has been renamed to `ConstCompareBarrier` and expanded to cover comparisons with other constant values such as `None`. This may result in fewer false positive results for several queries.

View File

@@ -1,4 +1,9 @@
---
category: feature
---
## 2.1.0
### New Features
* Added support for custom threat-models, which can be used in most of our taint-tracking queries, see our [documentation](https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning#extending-codeql-coverage-with-threat-models) for more details.
### Minor Analysis Improvements
* The common sanitizer guard `StringConstCompareBarrier` has been renamed to `ConstCompareBarrier` and expanded to cover comparisons with other constant values such as `None`. This may result in fewer false positive results for several queries.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 2.0.0
lastReleaseVersion: 2.1.0

View File

@@ -1,5 +1,5 @@
name: codeql/python-all
version: 2.0.1-dev
version: 2.1.0
groups: python
dbscheme: semmlecode.python.dbscheme
extractor: python

View File

@@ -1,3 +1,9 @@
## 1.3.0
### New Queries
* The `py/cors-misconfiguration-with-credentials` query, which finds insecure CORS middleware configurations.
## 1.2.2
### Minor Analysis Improvements

View File

@@ -1,4 +0,0 @@
---
category: newQuery
---
* The `py/cors-misconfiguration-with-credentials` query, which finds insecure CORS middleware configurations.

View File

@@ -0,0 +1,5 @@
## 1.3.0
### New Queries
* The `py/cors-misconfiguration-with-credentials` query, which finds insecure CORS middleware configurations.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.2.2
lastReleaseVersion: 1.3.0

View File

@@ -1,5 +1,5 @@
name: codeql/python-queries
version: 1.2.3-dev
version: 1.3.0
groups:
- python
- queries

View File

@@ -1,3 +1,7 @@
## 2.0.1
No user-facing changes.
## 2.0.0
### Breaking Changes

View File

@@ -0,0 +1,3 @@
## 2.0.1
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 2.0.0
lastReleaseVersion: 2.0.1

View File

@@ -1,5 +1,5 @@
name: codeql/ruby-all
version: 2.0.1-dev
version: 2.0.1
groups: ruby
extractor: ruby
dbscheme: ruby.dbscheme

View File

@@ -1,3 +1,7 @@
## 1.1.4
No user-facing changes.
## 1.1.3
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.1.4
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.1.3
lastReleaseVersion: 1.1.4

View File

@@ -1,5 +1,5 @@
name: codeql/ruby-queries
version: 1.1.4-dev
version: 1.1.4
groups:
- ruby
- queries

View File

@@ -1,3 +1,7 @@
## 1.0.9
No user-facing changes.
## 1.0.8
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.0.9
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.0.8
lastReleaseVersion: 1.0.9

View File

@@ -1,5 +1,5 @@
name: codeql/controlflow
version: 1.0.9-dev
version: 1.0.9
groups: shared
library: true
dependencies:

View File

@@ -1,3 +1,7 @@
## 1.1.3
No user-facing changes.
## 1.1.2
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.1.3
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.1.2
lastReleaseVersion: 1.1.3

View File

@@ -1,5 +1,5 @@
name: codeql/dataflow
version: 1.1.3-dev
version: 1.1.3
groups: shared
library: true
dependencies:

View File

@@ -1,3 +1,7 @@
## 1.0.9
No user-facing changes.
## 1.0.8
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.0.9
No user-facing changes.

Some files were not shown because too many files have changed in this diff Show More