Release preparation for version 2.20.5

This commit is contained in:
github-actions[bot]
2025-02-17 16:55:54 +00:00
parent 7fa41c438f
commit 6f4562f3bd
163 changed files with 450 additions and 159 deletions

View File

@@ -1,3 +1,9 @@
## 0.4.3
### New Features
* The "Unpinned tag for a non-immutable Action in workflow" query (`actions/unpinned-tag`) now supports expanding the trusted action owner list using data extensions (`extensible: trustedActionsOwnerDataModel`). If you trust an Action publisher, you can include the owner name/organization in a model pack to add it to the allow list for this query. This addition will prevent security alerts when using unpinned tags for Actions published by that owner. For more information on creating a model pack, see [Creating a CodeQL Model Pack](https://docs.github.com/en/code-security/codeql-cli/using-the-advanced-functionality-of-the-codeql-cli/creating-and-working-with-codeql-packs#creating-a-codeql-model-pack).
## 0.4.2 ## 0.4.2
### Bug Fixes ### Bug Fixes

View File

@@ -1,4 +1,5 @@
--- ## 0.4.3
category: feature
--- ### New Features
* The "Unpinned tag for a non-immutable Action in workflow" query (`actions/unpinned-tag`) now supports expanding the trusted action owner list using data extensions (`extensible: trustedActionsOwnerDataModel`). If you trust an Action publisher, you can include the owner name/organization in a model pack to add it to the allow list for this query. This addition will prevent security alerts when using unpinned tags for Actions published by that owner. For more information on creating a model pack, see [Creating a CodeQL Model Pack](https://docs.github.com/en/code-security/codeql-cli/using-the-advanced-functionality-of-the-codeql-cli/creating-and-working-with-codeql-packs#creating-a-codeql-model-pack).
* The "Unpinned tag for a non-immutable Action in workflow" query (`actions/unpinned-tag`) now supports expanding the trusted action owner list using data extensions (`extensible: trustedActionsOwnerDataModel`). If you trust an Action publisher, you can include the owner name/organization in a model pack to add it to the allow list for this query. This addition will prevent security alerts when using unpinned tags for Actions published by that owner. For more information on creating a model pack, see [Creating a CodeQL Model Pack](https://docs.github.com/en/code-security/codeql-cli/using-the-advanced-functionality-of-the-codeql-cli/creating-and-working-with-codeql-packs#creating-a-codeql-model-pack).

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 0.4.2 lastReleaseVersion: 0.4.3

View File

@@ -1,5 +1,5 @@
name: codeql/actions-all name: codeql/actions-all
version: 0.4.3-dev version: 0.4.3
library: true library: true
warnOnImplicitThis: true warnOnImplicitThis: true
dependencies: dependencies:

View File

@@ -1,3 +1,29 @@
## 0.5.0
### Breaking Changes
* The following queries have been removed from the `code-scanning` and `security-extended` suites.
Any existing alerts for these queries will be closed automatically.
* `actions/if-expression-always-true/critical`
* `actions/if-expression-always-true/high`
* `actions/unnecessary-use-of-advanced-config`
* The following query has been moved from the `code-scanning` suite to the `security-extended`
suite. Any existing alerts for this query will be closed automatically unless the analysis is
configured to use the `security-extended` suite.
* `actions/unpinned-tag`
* The following queries have been added to the `security-extended` suite.
* `actions/unversioned-immutable-action`
* `actions/envpath-injection/medium`
* `actions/envvar-injection/medium`
* `actions/code-injection/medium`
* `actions/artifact-poisoning/medium`
* `actions/untrusted-checkout/medium`
### Minor Analysis Improvements
* Fixed false positives in the query `actions/unpinned-tag` (CWE-829), which will no longer flag uses of Docker-based GitHub actions pinned by the container's SHA256 digest.
## 0.4.2 ## 0.4.2
No user-facing changes. No user-facing changes.

View File

@@ -1,5 +0,0 @@
---
category: minorAnalysis
---
* Fixed false positives in the query `actions/unpinned-tag` (CWE-829), which will no longer flag uses of Docker-based GitHub actions pinned by the container's SHA256 digest.

View File

@@ -1,6 +1,7 @@
--- ## 0.5.0
category: breaking
--- ### Breaking Changes
* The following queries have been removed from the `code-scanning` and `security-extended` suites. * The following queries have been removed from the `code-scanning` and `security-extended` suites.
Any existing alerts for these queries will be closed automatically. Any existing alerts for these queries will be closed automatically.
* `actions/if-expression-always-true/critical` * `actions/if-expression-always-true/critical`
@@ -18,3 +19,7 @@ category: breaking
* `actions/code-injection/medium` * `actions/code-injection/medium`
* `actions/artifact-poisoning/medium` * `actions/artifact-poisoning/medium`
* `actions/untrusted-checkout/medium` * `actions/untrusted-checkout/medium`
### Minor Analysis Improvements
* Fixed false positives in the query `actions/unpinned-tag` (CWE-829), which will no longer flag uses of Docker-based GitHub actions pinned by the container's SHA256 digest.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 0.4.2 lastReleaseVersion: 0.5.0

View File

@@ -1,5 +1,5 @@
name: codeql/actions-queries name: codeql/actions-queries
version: 0.4.3-dev version: 0.5.0
library: false library: false
warnOnImplicitThis: true warnOnImplicitThis: true
groups: [actions, queries] groups: [actions, queries]

View File

@@ -1,3 +1,7 @@
## 4.0.1
No user-facing changes.
## 4.0.0 ## 4.0.0
### Breaking Changes ### Breaking Changes

View File

@@ -0,0 +1,3 @@
## 4.0.1
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 4.0.0 lastReleaseVersion: 4.0.1

View File

@@ -1,5 +1,5 @@
name: codeql/cpp-all name: codeql/cpp-all
version: 4.0.1-dev version: 4.0.1
groups: cpp groups: cpp
dbscheme: semmlecode.cpp.dbscheme dbscheme: semmlecode.cpp.dbscheme
extractor: cpp extractor: cpp

View File

@@ -1,3 +1,7 @@
## 1.3.4
No user-facing changes.
## 1.3.3 ## 1.3.3
### Minor Analysis Improvements ### Minor Analysis Improvements

View File

@@ -0,0 +1,3 @@
## 1.3.4
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 1.3.3 lastReleaseVersion: 1.3.4

View File

@@ -1,5 +1,5 @@
name: codeql/cpp-queries name: codeql/cpp-queries
version: 1.3.4-dev version: 1.3.4
groups: groups:
- cpp - cpp
- queries - queries

View File

@@ -1,3 +1,7 @@
## 1.7.34
No user-facing changes.
## 1.7.33 ## 1.7.33
No user-facing changes. No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.7.34
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 1.7.33 lastReleaseVersion: 1.7.34

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-solorigate-all name: codeql/csharp-solorigate-all
version: 1.7.34-dev version: 1.7.34
groups: groups:
- csharp - csharp
- solorigate - solorigate

View File

@@ -1,3 +1,7 @@
## 1.7.34
No user-facing changes.
## 1.7.33 ## 1.7.33
No user-facing changes. No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.7.34
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 1.7.33 lastReleaseVersion: 1.7.34

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-solorigate-queries name: codeql/csharp-solorigate-queries
version: 1.7.34-dev version: 1.7.34
groups: groups:
- csharp - csharp
- solorigate - solorigate

View File

@@ -1,3 +1,18 @@
## 5.1.0
### Deprecated APIs
* The predicates `immediatelyControls` and `controls` on the `ConditionBlock`
class have been deprecated in favor of the newly added `dominatingEdge`
predicate.
### Minor Analysis Improvements
* Full support for C# 13 / .NET 9. All new language features are now supported by the extractor. QL library and data flow support for the new C# 13 language constructs and generated MaD models for the .NET 9 runtime.
* C# 13: Add generated models for .NET 9.
* The models for `System.Net.Http.HttpRequestMessage` and `System.UriBuilder` have been modified to better model the flow of tainted URIs.
* Blazor `[Parameter]` fields bound to a variable from the route specified in the `@page` directive are now modeled as remote flow sources.
## 5.0.0 ## 5.0.0
### Breaking Changes ### Breaking Changes

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* Blazor `[Parameter]` fields bound to a variable from the route specified in the `@page` directive are now modeled as remote flow sources.

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* The models for `System.Net.Http.HttpRequestMessage` and `System.UriBuilder` have been modified to better model the flow of tainted URIs.

View File

@@ -1,5 +0,0 @@
---
category: minorAnalysis
---
* C# 13: Add generated models for .NET 9.

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* Full support for C# 13 / .NET 9. All new language features are now supported by the extractor. QL library and data flow support for the new C# 13 language constructs and generated MaD models for the .NET 9 runtime.

View File

@@ -0,0 +1,14 @@
## 5.1.0
### Deprecated APIs
* The predicates `immediatelyControls` and `controls` on the `ConditionBlock`
class have been deprecated in favor of the newly added `dominatingEdge`
predicate.
### Minor Analysis Improvements
* Full support for C# 13 / .NET 9. All new language features are now supported by the extractor. QL library and data flow support for the new C# 13 language constructs and generated MaD models for the .NET 9 runtime.
* C# 13: Add generated models for .NET 9.
* The models for `System.Net.Http.HttpRequestMessage` and `System.UriBuilder` have been modified to better model the flow of tainted URIs.
* Blazor `[Parameter]` fields bound to a variable from the route specified in the `@page` directive are now modeled as remote flow sources.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 5.0.0 lastReleaseVersion: 5.1.0

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-all name: codeql/csharp-all
version: 5.0.1-dev version: 5.1.0
groups: csharp groups: csharp
dbscheme: semmlecode.csharp.dbscheme dbscheme: semmlecode.csharp.dbscheme
extractor: csharp extractor: csharp

View File

@@ -1,3 +1,7 @@
## 1.0.17
No user-facing changes.
## 1.0.16 ## 1.0.16
### Minor Analysis Improvements ### Minor Analysis Improvements

View File

@@ -0,0 +1,3 @@
## 1.0.17
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 1.0.16 lastReleaseVersion: 1.0.17

View File

@@ -1,5 +1,5 @@
name: codeql/csharp-queries name: codeql/csharp-queries
version: 1.0.17-dev version: 1.0.17
groups: groups:
- csharp - csharp
- queries - queries

View File

@@ -1,3 +1,7 @@
## 1.0.17
No user-facing changes.
## 1.0.16 ## 1.0.16
No user-facing changes. No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.0.17
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 1.0.16 lastReleaseVersion: 1.0.17

View File

@@ -1,5 +1,5 @@
name: codeql-go-consistency-queries name: codeql-go-consistency-queries
version: 1.0.17-dev version: 1.0.17
groups: groups:
- go - go
- queries - queries

View File

@@ -1,3 +1,16 @@
## 4.1.0
### Deprecated APIs
* The class `NamedType` has been deprecated. Use the new class `DefinedType` instead. This better matches the terminology used in the Go language specification, which was changed in Go 1.9.
* The member predicate `getNamedType` on `GoMicro::ServiceInterfaceType` has been deprecated. Use the new member predicate `getDefinedType` instead.
* The member predicate `getNamedType` on `Twirp::ServiceInterfaceType` has been deprecated. Use the new member predicate `getDefinedType` instead.
### Minor Analysis Improvements
* Taint models have been added for the `weak` package, which was added in Go 1.24.
* Taint models have been added for the interfaces `TextAppender` and `BinaryAppender` in the `encoding` package, which were added in Go 1.24.
## 4.0.0 ## 4.0.0
### Breaking Changes ### Breaking Changes

View File

@@ -1,5 +0,0 @@
---
category: minorAnalysis
---
* Taint models have been added for the `weak` package, which was added in Go 1.24.
* Taint models have been added for the interfaces `TextAppender` and `BinaryAppender` in the `encoding` package, which were added in Go 1.24.

View File

@@ -1,6 +1,12 @@
--- ## 4.1.0
category: deprecated
--- ### Deprecated APIs
* The class `NamedType` has been deprecated. Use the new class `DefinedType` instead. This better matches the terminology used in the Go language specification, which was changed in Go 1.9. * The class `NamedType` has been deprecated. Use the new class `DefinedType` instead. This better matches the terminology used in the Go language specification, which was changed in Go 1.9.
* The member predicate `getNamedType` on `GoMicro::ServiceInterfaceType` has been deprecated. Use the new member predicate `getDefinedType` instead. * The member predicate `getNamedType` on `GoMicro::ServiceInterfaceType` has been deprecated. Use the new member predicate `getDefinedType` instead.
* The member predicate `getNamedType` on `Twirp::ServiceInterfaceType` has been deprecated. Use the new member predicate `getDefinedType` instead. * The member predicate `getNamedType` on `Twirp::ServiceInterfaceType` has been deprecated. Use the new member predicate `getDefinedType` instead.
### Minor Analysis Improvements
* Taint models have been added for the `weak` package, which was added in Go 1.24.
* Taint models have been added for the interfaces `TextAppender` and `BinaryAppender` in the `encoding` package, which were added in Go 1.24.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 4.0.0 lastReleaseVersion: 4.1.0

View File

@@ -1,5 +1,5 @@
name: codeql/go-all name: codeql/go-all
version: 4.0.1-dev version: 4.1.0
groups: go groups: go
dbscheme: go.dbscheme dbscheme: go.dbscheme
extractor: go extractor: go

View File

@@ -1,3 +1,9 @@
## 1.1.8
### Minor Analysis Improvements
* Added [github.com/gorilla/mux.Vars](https://pkg.go.dev/github.com/gorilla/mux#Vars) to path sanitizers (disabled if [github.com/gorilla/mix.Router.SkipClean](https://pkg.go.dev/github.com/gorilla/mux#Router.SkipClean) has been called).
## 1.1.7 ## 1.1.7
No user-facing changes. No user-facing changes.

View File

@@ -1,4 +1,5 @@
--- ## 1.1.8
category: minorAnalysis
--- ### Minor Analysis Improvements
* Added [github.com/gorilla/mux.Vars](https://pkg.go.dev/github.com/gorilla/mux#Vars) to path sanitizers (disabled if [github.com/gorilla/mix.Router.SkipClean](https://pkg.go.dev/github.com/gorilla/mux#Router.SkipClean) has been called).
* Added [github.com/gorilla/mux.Vars](https://pkg.go.dev/github.com/gorilla/mux#Vars) to path sanitizers (disabled if [github.com/gorilla/mix.Router.SkipClean](https://pkg.go.dev/github.com/gorilla/mux#Router.SkipClean) has been called).

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 1.1.7 lastReleaseVersion: 1.1.8

View File

@@ -1,5 +1,5 @@
name: codeql/go-queries name: codeql/go-queries
version: 1.1.8-dev version: 1.1.8
groups: groups:
- go - go
- queries - queries

View File

@@ -1,3 +1,7 @@
## 7.0.1
No user-facing changes.
## 7.0.0 ## 7.0.0
### Breaking Changes ### Breaking Changes

View File

@@ -0,0 +1,3 @@
## 7.0.1
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 7.0.0 lastReleaseVersion: 7.0.1

View File

@@ -1,5 +1,5 @@
name: codeql/java-all name: codeql/java-all
version: 7.0.1-dev version: 7.0.1
groups: java groups: java
dbscheme: config/semmlecode.dbscheme dbscheme: config/semmlecode.dbscheme
extractor: java extractor: java

View File

@@ -1,3 +1,9 @@
## 1.2.0
### New Queries
* Added a new query, `java/csrf-unprotected-request-type`, to detect Cross-Site Request Forgery (CSRF) vulnerabilities due to using HTTP request types that are not default-protected from CSRF.
## 1.1.13 ## 1.1.13
### Minor Analysis Improvements ### Minor Analysis Improvements

View File

@@ -1,4 +1,5 @@
--- ## 1.2.0
category: newQuery
--- ### New Queries
* Added a new query, `java/csrf-unprotected-request-type`, to detect Cross-Site Request Forgery (CSRF) vulnerabilities due to using HTTP request types that are not default-protected from CSRF. * Added a new query, `java/csrf-unprotected-request-type`, to detect Cross-Site Request Forgery (CSRF) vulnerabilities due to using HTTP request types that are not default-protected from CSRF.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 1.1.13 lastReleaseVersion: 1.2.0

View File

@@ -1,5 +1,5 @@
name: codeql/java-queries name: codeql/java-queries
version: 1.1.14-dev version: 1.2.0
groups: groups:
- java - java
- queries - queries

View File

@@ -1,3 +1,9 @@
## 2.4.1
### Minor Analysis Improvements
* Added support for regular expressions using the `v` flag.
## 2.4.0 ## 2.4.0
### Major Analysis Improvements ### Major Analysis Improvements

View File

@@ -1,4 +1,5 @@
--- ## 2.4.1
category: minorAnalysis
--- ### Minor Analysis Improvements
* Added support for regular expressions using the `v` flag. * Added support for regular expressions using the `v` flag.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 2.4.0 lastReleaseVersion: 2.4.1

View File

@@ -1,5 +1,5 @@
name: codeql/javascript-all name: codeql/javascript-all
version: 2.4.1-dev version: 2.4.1
groups: javascript groups: javascript
dbscheme: semmlecode.javascript.dbscheme dbscheme: semmlecode.javascript.dbscheme
extractor: javascript extractor: javascript

View File

@@ -1,3 +1,15 @@
## 1.4.1
### Bug Fixes
* Fixed a recently-introduced bug that prevented taint tracking through `URLSearchParams` objects.
The original behaviour has been restored and taint should once again be tracked through such objects.
* Fixed a rare issue that would occur when a function declaration inside a block statement was referenced before it was declared.
Such code is reliant on legacy web semantics, which is non-standard but nevertheless implemented by most engines.
CodeQL now takes legacy web semantics into account and resolves references to these functions correctly.
* Fixed a bug that would cause parse errors in `.jsx` files in rare cases where the file
contained syntax that was misinterpreted as Flow syntax.
## 1.4.0 ## 1.4.0
### Major Analysis Improvements ### Major Analysis Improvements

View File

@@ -1,5 +0,0 @@
---
category: fix
---
* Fixed a bug that would cause parse errors in `.jsx` files in rare cases where the file
contained syntax that was misinterpreted as Flow syntax.

View File

@@ -1,6 +0,0 @@
---
category: fix
---
* Fixed a rare issue that would occur when a function declaration inside a block statement was referenced before it was declared.
Such code is reliant on legacy web semantics, which is non-standard but nevertheless implemented by most engines.
CodeQL now takes legacy web semantics into account and resolves references to these functions correctly.

View File

@@ -1,5 +0,0 @@
---
category: fix
---
* Fixed a recently-introduced bug that prevented taint tracking through `URLSearchParams` objects.
The original behaviour has been restored and taint should once again be tracked through such objects.

View File

@@ -0,0 +1,11 @@
## 1.4.1
### Bug Fixes
* Fixed a recently-introduced bug that prevented taint tracking through `URLSearchParams` objects.
The original behaviour has been restored and taint should once again be tracked through such objects.
* Fixed a rare issue that would occur when a function declaration inside a block statement was referenced before it was declared.
Such code is reliant on legacy web semantics, which is non-standard but nevertheless implemented by most engines.
CodeQL now takes legacy web semantics into account and resolves references to these functions correctly.
* Fixed a bug that would cause parse errors in `.jsx` files in rare cases where the file
contained syntax that was misinterpreted as Flow syntax.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 1.4.0 lastReleaseVersion: 1.4.1

View File

@@ -1,5 +1,5 @@
name: codeql/javascript-queries name: codeql/javascript-queries
version: 1.4.1-dev version: 1.4.1
groups: groups:
- javascript - javascript
- queries - queries

View File

@@ -1,3 +1,7 @@
## 1.0.17
No user-facing changes.
## 1.0.16 ## 1.0.16
No user-facing changes. No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.0.17
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 1.0.16 lastReleaseVersion: 1.0.17

View File

@@ -1,4 +1,4 @@
name: codeql/suite-helpers name: codeql/suite-helpers
version: 1.0.17-dev version: 1.0.17
groups: shared groups: shared
warnOnImplicitThis: true warnOnImplicitThis: true

View File

@@ -1,3 +1,10 @@
## 4.0.1
### Bug Fixes
- Fixed a bug in the extractor where a comment inside a subscript could sometimes cause the AST to be missing nodes.
- Using the `break` and `continue` keywords outside of a loop, which is a syntax error but is accepted by our parser, would cause the control-flow construction to fail. This is now no longer the case.
## 4.0.0 ## 4.0.0
### Breaking Changes ### Breaking Changes

View File

@@ -1,5 +0,0 @@
---
category: fix
---
- Fixed a bug in the extractor where a comment inside a subscript could sometimes cause the AST to be missing nodes.

View File

@@ -1,5 +1,6 @@
--- ## 4.0.1
category: fix
---
### Bug Fixes
- Fixed a bug in the extractor where a comment inside a subscript could sometimes cause the AST to be missing nodes.
- Using the `break` and `continue` keywords outside of a loop, which is a syntax error but is accepted by our parser, would cause the control-flow construction to fail. This is now no longer the case. - Using the `break` and `continue` keywords outside of a loop, which is a syntax error but is accepted by our parser, would cause the control-flow construction to fail. This is now no longer the case.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 4.0.0 lastReleaseVersion: 4.0.1

View File

@@ -1,5 +1,5 @@
name: codeql/python-all name: codeql/python-all
version: 4.0.1-dev version: 4.0.1
groups: python groups: python
dbscheme: semmlecode.python.dbscheme dbscheme: semmlecode.python.dbscheme
extractor: python extractor: python

View File

@@ -1,3 +1,7 @@
## 1.4.3
No user-facing changes.
## 1.4.2 ## 1.4.2
No user-facing changes. No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.4.3
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 1.4.2 lastReleaseVersion: 1.4.3

View File

@@ -1,5 +1,5 @@
name: codeql/python-queries name: codeql/python-queries
version: 1.4.3-dev version: 1.4.3
groups: groups:
- python - python
- queries - queries

View File

@@ -1,3 +1,11 @@
## 4.1.0
### Deprecated APIs
* The predicates `immediatelyControls` and `controls` on the `ConditionBlock`
class have been deprecated in favor of the newly added `dominatingEdge`
predicate.
## 4.0.0 ## 4.0.0
### Breaking Changes ### Breaking Changes

View File

@@ -1,6 +1,7 @@
--- ## 4.1.0
category: deprecated
--- ### Deprecated APIs
* The predicates `immediatelyControls` and `controls` on the `ConditionBlock` * The predicates `immediatelyControls` and `controls` on the `ConditionBlock`
class have been deprecated in favor of the newly added `dominatingEdge` class have been deprecated in favor of the newly added `dominatingEdge`
predicate. predicate.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 4.0.0 lastReleaseVersion: 4.1.0

View File

@@ -1,5 +1,5 @@
name: codeql/ruby-all name: codeql/ruby-all
version: 4.0.1-dev version: 4.1.0
groups: ruby groups: ruby
extractor: ruby extractor: ruby
dbscheme: ruby.dbscheme dbscheme: ruby.dbscheme

View File

@@ -1,3 +1,7 @@
## 1.1.12
No user-facing changes.
## 1.1.11 ## 1.1.11
No user-facing changes. No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 1.1.12
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 1.1.11 lastReleaseVersion: 1.1.12

View File

@@ -1,5 +1,5 @@
name: codeql/ruby-queries name: codeql/ruby-queries
version: 1.1.12-dev version: 1.1.12
groups: groups:
- ruby - ruby
- queries - queries

View File

@@ -1,3 +1,7 @@
## 0.1.2
No user-facing changes.
## 0.1.1 ## 0.1.1
No user-facing changes. No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 0.1.2
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 0.1.1 lastReleaseVersion: 0.1.2

View File

@@ -1,5 +1,5 @@
name: codeql/rust-all name: codeql/rust-all
version: 0.1.2-dev version: 0.1.2
groups: rust groups: rust
extractor: rust extractor: rust
dbscheme: rust.dbscheme dbscheme: rust.dbscheme

View File

@@ -1,3 +1,7 @@
## 0.1.2
No user-facing changes.
## 0.1.1 ## 0.1.1
No user-facing changes. No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 0.1.2
No user-facing changes.

View File

@@ -1,2 +1,2 @@
--- ---
lastReleaseVersion: 0.1.1 lastReleaseVersion: 0.1.2

View File

@@ -1,5 +1,5 @@
name: codeql/rust-queries name: codeql/rust-queries
version: 0.1.2-dev version: 0.1.2
groups: groups:
- rust - rust
- queries - queries

View File

@@ -1,3 +1,7 @@
## 2.0.1
No user-facing changes.
## 2.0.0 ## 2.0.0
### Breaking Changes ### Breaking Changes

View File

@@ -0,0 +1,3 @@
## 2.0.1
No user-facing changes.

Some files were not shown because too many files have changed in this diff Show More