Release preparation for version 2.20.2

This commit is contained in:
github-actions[bot]
2025-01-20 14:44:12 +00:00
committed by Chris Smowton
parent 3e5707154a
commit a0512a50f2
178 changed files with 479 additions and 211 deletions

View File

@@ -1,3 +1,15 @@
## 6.1.0
### New Features
* The Java and Kotlin extractors now support `CODEQL_PATH_TRANSFORMER`. `SEMMLE_PATH_TRANSFORMER` is still supported, but deprecated.
### Minor Analysis Improvements
* `JavacTool`-based compiler interception no longer requires an `--add-opens` directive when `FileObject.toUri` is accessible.
* `JavacTool`-based compiler interception no longer throws an exception visible to the program using `JavacTool` on failure to extract a file path from a passed `JavaFileObject`.
* `JavacTool`-based compiler interception now supports files that don't simply wrap a `file://` URL, such as a source file inside a JAR, or an in-memory file, but which do implement `getCharContent`.
## 6.0.0
### Breaking Changes

View File

@@ -1,5 +0,0 @@
---
category: feature
---
* The Java and Kotlin extractors now support `CODEQL_PATH_TRANSFORMER`. `SEMMLE_PATH_TRANSFORMER` is still supported, but deprecated.

View File

@@ -1,6 +1,11 @@
---
category: minorAnalysis
---
## 6.1.0
### New Features
* The Java and Kotlin extractors now support `CODEQL_PATH_TRANSFORMER`. `SEMMLE_PATH_TRANSFORMER` is still supported, but deprecated.
### Minor Analysis Improvements
* `JavacTool`-based compiler interception no longer requires an `--add-opens` directive when `FileObject.toUri` is accessible.
* `JavacTool`-based compiler interception no longer throws an exception visible to the program using `JavacTool` on failure to extract a file path from a passed `JavaFileObject`.
* `JavacTool`-based compiler interception now supports files that don't simply wrap a `file://` URL, such as a source file inside a JAR, or an in-memory file, but which do implement `getCharContent`.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 6.0.0
lastReleaseVersion: 6.1.0

View File

@@ -1,5 +1,5 @@
name: codeql/java-all
version: 6.0.1-dev
version: 6.1.0
groups: java
dbscheme: config/semmlecode.dbscheme
extractor: java

View File

@@ -1,3 +1,10 @@
## 1.1.12
### Bug Fixes
* Classes that define a `writeReplace` method are no longer flagged by the `java/missing-no-arg-constructor-on-serializable` query on the assumption they are unlikely to be deserialized using the default algorithm.
* The query "Use of a broken or risky cryptographic algorithm" (`java/weak-cryptographic-algorithm`) now gives the reason why the cryptographic algorithm is considered weak.
## 1.1.11
No user-facing changes.

View File

@@ -1,4 +0,0 @@
---
category: fix
---
* The query "Use of a broken or risky cryptographic algorithm" (`java/weak-cryptographic-algorithm`) now gives the reason why the cryptographic algorithm is considered weak.

View File

@@ -1,4 +1,6 @@
---
category: fix
---
## 1.1.12
### Bug Fixes
* Classes that define a `writeReplace` method are no longer flagged by the `java/missing-no-arg-constructor-on-serializable` query on the assumption they are unlikely to be deserialized using the default algorithm.
* The query "Use of a broken or risky cryptographic algorithm" (`java/weak-cryptographic-algorithm`) now gives the reason why the cryptographic algorithm is considered weak.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.1.11
lastReleaseVersion: 1.1.12

View File

@@ -1,5 +1,5 @@
name: codeql/java-queries
version: 1.1.12-dev
version: 1.1.12
groups:
- java
- queries