Release preparation for version 2.23.2

This commit is contained in:
github-actions[bot]
2025-09-29 10:28:45 +00:00
parent 9dfd87c284
commit d2130a589b
171 changed files with 409 additions and 127 deletions

View File

@@ -1,3 +1,12 @@
## 0.1.17
### New Features
* The models-as-data format for sources now supports access paths of the form
`Argument[i].Parameter[j]`. This denotes that the source passes tainted data to
the `j`th parameter of its `i`th argument (which must be a function or a
closure).
## 0.1.16
### Minor Analysis Improvements

View File

@@ -1,7 +1,8 @@
---
category: feature
---
## 0.1.17
### New Features
* The models-as-data format for sources now supports access paths of the form
`Argument[i].Parameter[j]`. This denotes that the source passes tainted data to
the `j`th parameter of its `i`th argument (which must be a function or a
closure).
closure).

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.1.16
lastReleaseVersion: 0.1.17

View File

@@ -1,5 +1,5 @@
name: codeql/rust-all
version: 0.1.17-dev
version: 0.1.17
groups: rust
extractor: rust
dbscheme: rust.dbscheme

View File

@@ -1,3 +1,9 @@
## 0.1.17
### New Queries
* Added a new query, `rust/non-https-url`, for detecting the use of non-HTTPS URLs that can be intercepted by third parties.
## 0.1.16
### New Queries

View File

@@ -1,4 +0,0 @@
---
category: newQuery
---
* Added a new query, `rust/non-https-url`, for detecting the use of non-HTTPS URLs that can be intercepted by third parties.

View File

@@ -0,0 +1,5 @@
## 0.1.17
### New Queries
* Added a new query, `rust/non-https-url`, for detecting the use of non-HTTPS URLs that can be intercepted by third parties.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.1.16
lastReleaseVersion: 0.1.17

View File

@@ -1,5 +1,5 @@
name: codeql/rust-queries
version: 0.1.17-dev
version: 0.1.17
groups:
- rust
- queries