mirror of
https://github.com/github/codeql.git
synced 2026-04-23 15:55:18 +02:00
Release preparation for version 2.20.2
This commit is contained in:
committed by
Chris Smowton
parent
3e5707154a
commit
a0512a50f2
@@ -1,3 +1,10 @@
|
||||
## 1.1.12
|
||||
|
||||
### Bug Fixes
|
||||
|
||||
* Classes that define a `writeReplace` method are no longer flagged by the `java/missing-no-arg-constructor-on-serializable` query on the assumption they are unlikely to be deserialized using the default algorithm.
|
||||
* The query "Use of a broken or risky cryptographic algorithm" (`java/weak-cryptographic-algorithm`) now gives the reason why the cryptographic algorithm is considered weak.
|
||||
|
||||
## 1.1.11
|
||||
|
||||
No user-facing changes.
|
||||
|
||||
@@ -1,4 +0,0 @@
|
||||
---
|
||||
category: fix
|
||||
---
|
||||
* The query "Use of a broken or risky cryptographic algorithm" (`java/weak-cryptographic-algorithm`) now gives the reason why the cryptographic algorithm is considered weak.
|
||||
@@ -1,4 +1,6 @@
|
||||
---
|
||||
category: fix
|
||||
---
|
||||
## 1.1.12
|
||||
|
||||
### Bug Fixes
|
||||
|
||||
* Classes that define a `writeReplace` method are no longer flagged by the `java/missing-no-arg-constructor-on-serializable` query on the assumption they are unlikely to be deserialized using the default algorithm.
|
||||
* The query "Use of a broken or risky cryptographic algorithm" (`java/weak-cryptographic-algorithm`) now gives the reason why the cryptographic algorithm is considered weak.
|
||||
@@ -1,2 +1,2 @@
|
||||
---
|
||||
lastReleaseVersion: 1.1.11
|
||||
lastReleaseVersion: 1.1.12
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
name: codeql/java-queries
|
||||
version: 1.1.12-dev
|
||||
version: 1.1.12
|
||||
groups:
|
||||
- java
|
||||
- queries
|
||||
|
||||
Reference in New Issue
Block a user