Release preparation for version 2.17.1

This commit is contained in:
github-actions[bot]
2024-04-15 17:34:47 +00:00
parent feeaef14be
commit 9bfe4ea90a
143 changed files with 349 additions and 104 deletions

View File

@@ -1,3 +1,7 @@
## 0.8.14
No user-facing changes.
## 0.8.13
### Minor Analysis Improvements

View File

@@ -0,0 +1,3 @@
## 0.8.14
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.8.13
lastReleaseVersion: 0.8.14

View File

@@ -1,5 +1,5 @@
name: codeql/ruby-all
version: 0.8.14-dev
version: 0.8.14
groups: ruby
extractor: ruby
dbscheme: ruby.dbscheme

View File

@@ -1,3 +1,10 @@
## 0.8.14
### New Queries
* Added a new query, `rb/insecure-mass-assignment`, for finding instances of mass assignment operations accepting arbitrary parameters from remote user input.
* Added a new query, `rb/csrf-protection-not-enabled`, to detect cases where Cross-Site Request Forgery protection is not enabled in Ruby on Rails controllers.
## 0.8.13
No user-facing changes.

View File

@@ -1,4 +0,0 @@
---
category: newQuery
---
* Added a new query, `rb/csrf-protection-not-enabled`, to detect cases where Cross-Site Request Forgery protection is not enabled in Ruby on Rails controllers.

View File

@@ -1,4 +0,0 @@
---
category: newQuery
---
* Added a new query, `rb/insecure-mass-assignment`, for finding instances of mass assignment operations accepting arbitrary parameters from remote user input.

View File

@@ -0,0 +1,6 @@
## 0.8.14
### New Queries
* Added a new query, `rb/insecure-mass-assignment`, for finding instances of mass assignment operations accepting arbitrary parameters from remote user input.
* Added a new query, `rb/csrf-protection-not-enabled`, to detect cases where Cross-Site Request Forgery protection is not enabled in Ruby on Rails controllers.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.8.13
lastReleaseVersion: 0.8.14

View File

@@ -1,5 +1,5 @@
name: codeql/ruby-queries
version: 0.8.14-dev
version: 0.8.14
groups:
- ruby
- queries