Revert "Release preparation for version 2.16.4"

This commit is contained in:
Angela P Wen 2024-03-05 08:53:33 -08:00 коммит произвёл GitHub
Родитель eaef544a26
Коммит 967963a653
Не найден ключ, соответствующий данной подписи
Идентификатор ключа GPG: B5690EEEBB952194
150 изменённых файлов: 168 добавлений и 394 удалений

Просмотреть файл

@ -1,9 +1,3 @@
## 0.12.7
### Minor Analysis Improvements
* Added destructors for named objects to the intermediate representation.
## 0.12.6
### New Features

Просмотреть файл

@ -1,5 +1,4 @@
## 0.12.7
### Minor Analysis Improvements
* Added destructors for named objects to the intermediate representation.
---
category: minorAnalysis
---
* Added destructors for named objects to the intermediate representation.

Просмотреть файл

@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.12.7
lastReleaseVersion: 0.12.6

Просмотреть файл

@ -1,5 +1,5 @@
name: codeql/cpp-all
version: 0.12.7
version: 0.12.7-dev
groups: cpp
dbscheme: semmlecode.cpp.dbscheme
extractor: cpp

Просмотреть файл

@ -1,10 +1,3 @@
## 0.9.6
### Minor Analysis Improvements
* The "non-constant format string" query (`cpp/non-constant-format`) has been converted to a `path-problem` query.
* The new C/C++ dataflow and taint-tracking libraries (`semmle.code.cpp.dataflow.new.DataFlow` and `semmle.code.cpp.dataflow.new.TaintTracking`) now implicitly assume that dataflow and taint modelled via `DataFlowFunction` and `TaintFunction` always fully overwrite their buffers and thus act as flow barriers. As a result, many dataflow and taint-tracking queries now produce fewer false positives. To remove this assumption and go back to the previous behavior for a given model, one can override the new `isPartialWrite` predicate.
## 0.9.5
### Minor Analysis Improvements

Просмотреть файл

@ -1,6 +1,4 @@
## 0.9.6
### Minor Analysis Improvements
* The "non-constant format string" query (`cpp/non-constant-format`) has been converted to a `path-problem` query.
---
category: minorAnalysis
---
* The new C/C++ dataflow and taint-tracking libraries (`semmle.code.cpp.dataflow.new.DataFlow` and `semmle.code.cpp.dataflow.new.TaintTracking`) now implicitly assume that dataflow and taint modelled via `DataFlowFunction` and `TaintFunction` always fully overwrite their buffers and thus act as flow barriers. As a result, many dataflow and taint-tracking queries now produce fewer false positives. To remove this assumption and go back to the previous behavior for a given model, one can override the new `isPartialWrite` predicate.

Просмотреть файл

@ -0,0 +1,4 @@
---
category: minorAnalysis
---
* The "non-constant format string" query (`cpp/non-constant-format`) has been converted to a `path-problem` query.

Просмотреть файл

@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.9.6
lastReleaseVersion: 0.9.5

Просмотреть файл

@ -1,5 +1,5 @@
name: codeql/cpp-queries
version: 0.9.6
version: 0.9.6-dev
groups:
- cpp
- queries

Просмотреть файл

@ -1,7 +1,3 @@
## 1.7.10
No user-facing changes.
## 1.7.9
No user-facing changes.

Просмотреть файл

@ -1,3 +0,0 @@
## 1.7.10
No user-facing changes.

Просмотреть файл

@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.7.10
lastReleaseVersion: 1.7.9

Просмотреть файл

@ -1,5 +1,5 @@
name: codeql/csharp-solorigate-all
version: 1.7.10
version: 1.7.10-dev
groups:
- csharp
- solorigate

Просмотреть файл

@ -1,7 +1,3 @@
## 1.7.10
No user-facing changes.
## 1.7.9
No user-facing changes.

Просмотреть файл

@ -1,3 +0,0 @@
## 1.7.10
No user-facing changes.

Просмотреть файл

@ -1,2 +1,2 @@
---
lastReleaseVersion: 1.7.10
lastReleaseVersion: 1.7.9

Просмотреть файл

@ -1,5 +1,5 @@
name: codeql/csharp-solorigate-queries
version: 1.7.10
version: 1.7.10-dev
groups:
- csharp
- solorigate

Просмотреть файл

@ -1,17 +1,3 @@
## 0.8.10
### Major Analysis Improvements
* Improved support for flow through captured variables that properly adheres to inter-procedural control flow.
* We no longer make use of CodeQL database stats, which may affect join-orders in custom queries. It is therefore recommended to test performance of custom queries after upgrading to this version.
### Minor Analysis Improvements
* C# 12: Add QL library support (`ExperimentalAttribute`) for the experimental attribute.
* C# 12: Add extractor and QL library support for `ref readonly` parameters.
* C#: The table `expr_compiler_generated` has been deleted and its content has been added to `compiler_generated`.
* Data flow via get only properties like `public object Obj { get; }` is now captured by the data flow library.
## 0.8.9
### Minor Analysis Improvements

Просмотреть файл

@ -0,0 +1,4 @@
---
category: minorAnalysis
---
* Data flow via get only properties like `public object Obj { get; }` is now captured by the data flow library.

Просмотреть файл

@ -0,0 +1,4 @@
---
category: majorAnalysis
---
* We no longer make use of CodeQL database stats, which may affect join-orders in custom queries. It is therefore recommended to test performance of custom queries after upgrading to this version.

Просмотреть файл

@ -0,0 +1,4 @@
---
category: minorAnalysis
---
* C#: The table `expr_compiler_generated` has been deleted and its content has been added to `compiler_generated`.

Просмотреть файл

@ -0,0 +1,4 @@
---
category: majorAnalysis
---
* Improved support for flow through captured variables that properly adheres to inter-procedural control flow.

Просмотреть файл

@ -0,0 +1,4 @@
---
category: minorAnalysis
---
* C# 12: Add QL library support (`ExperimentalAttribute`) for the experimental attribute.

Просмотреть файл

@ -0,0 +1,4 @@
---
category: minorAnalysis
---
* C# 12: Add extractor and QL library support for `ref readonly` parameters.

Просмотреть файл

@ -1,13 +0,0 @@
## 0.8.10
### Major Analysis Improvements
* Improved support for flow through captured variables that properly adheres to inter-procedural control flow.
* We no longer make use of CodeQL database stats, which may affect join-orders in custom queries. It is therefore recommended to test performance of custom queries after upgrading to this version.
### Minor Analysis Improvements
* C# 12: Add QL library support (`ExperimentalAttribute`) for the experimental attribute.
* C# 12: Add extractor and QL library support for `ref readonly` parameters.
* C#: The table `expr_compiler_generated` has been deleted and its content has been added to `compiler_generated`.
* Data flow via get only properties like `public object Obj { get; }` is now captured by the data flow library.

Просмотреть файл

@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.8.10
lastReleaseVersion: 0.8.9

Просмотреть файл

@ -1,5 +1,5 @@
name: codeql/csharp-all
version: 0.8.10
version: 0.8.10-dev
groups: csharp
dbscheme: semmlecode.csharp.dbscheme
extractor: csharp

Просмотреть файл

@ -1,9 +1,3 @@
## 0.8.10
### Minor Analysis Improvements
* Most data flow queries that track flow from *remote* flow sources now use the current *threat model* configuration instead. This doesn't lead to any changes in the produced alerts (as the default configuration is *remote* flow sources) unless the threat model configuration is changed. The changed queries are `cs/code-injection`, `cs/command-line-injection`, `cs/user-controlled-bypass`, `cs/count-untrusted-data-external-api`, `cs/untrusted-data-to-external-api`, `cs/ldap-injection`, `cs/log-forging`, `cs/xml/missing-validation`, `cs/redos`, `cs/regex-injection`, `cs/resource-injection`, `cs/sql-injection`, `cs/path-injection`, `cs/unsafe-deserialization-untrusted-input`, `cs/web/unvalidated-url-redirection`, `cs/xml/insecure-dtd-handling`, `cs/xml/xpath-injection`, `cs/web/xss`, and `cs/uncontrolled-format-string`.
## 0.8.9
### Minor Analysis Improvements

Просмотреть файл

@ -1,5 +1,4 @@
## 0.8.10
### Minor Analysis Improvements
* Most data flow queries that track flow from *remote* flow sources now use the current *threat model* configuration instead. This doesn't lead to any changes in the produced alerts (as the default configuration is *remote* flow sources) unless the threat model configuration is changed. The changed queries are `cs/code-injection`, `cs/command-line-injection`, `cs/user-controlled-bypass`, `cs/count-untrusted-data-external-api`, `cs/untrusted-data-to-external-api`, `cs/ldap-injection`, `cs/log-forging`, `cs/xml/missing-validation`, `cs/redos`, `cs/regex-injection`, `cs/resource-injection`, `cs/sql-injection`, `cs/path-injection`, `cs/unsafe-deserialization-untrusted-input`, `cs/web/unvalidated-url-redirection`, `cs/xml/insecure-dtd-handling`, `cs/xml/xpath-injection`, `cs/web/xss`, and `cs/uncontrolled-format-string`.
---
category: minorAnalysis
---
* Most data flow queries that track flow from *remote* flow sources now use the current *threat model* configuration instead. This doesn't lead to any changes in the produced alerts (as the default configuration is *remote* flow sources) unless the threat model configuration is changed. The changed queries are `cs/code-injection`, `cs/command-line-injection`, `cs/user-controlled-bypass`, `cs/count-untrusted-data-external-api`, `cs/untrusted-data-to-external-api`, `cs/ldap-injection`, `cs/log-forging`, `cs/xml/missing-validation`, `cs/redos`, `cs/regex-injection`, `cs/resource-injection`, `cs/sql-injection`, `cs/path-injection`, `cs/unsafe-deserialization-untrusted-input`, `cs/web/unvalidated-url-redirection`, `cs/xml/insecure-dtd-handling`, `cs/xml/xpath-injection`, `cs/web/xss`, and `cs/uncontrolled-format-string`.

Просмотреть файл

@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.8.10
lastReleaseVersion: 0.8.9

Просмотреть файл

@ -1,5 +1,5 @@
name: codeql/csharp-queries
version: 0.8.10
version: 0.8.10-dev
groups:
- csharp
- queries

Просмотреть файл

@ -1,7 +1,3 @@
## 0.0.9
No user-facing changes.
## 0.0.8
No user-facing changes.

Просмотреть файл

@ -1,3 +0,0 @@
## 0.0.9
No user-facing changes.

Просмотреть файл

@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.0.9
lastReleaseVersion: 0.0.8

Просмотреть файл

@ -1,5 +1,5 @@
name: codeql-go-consistency-queries
version: 0.0.9
version: 0.0.9-dev
groups:
- go
- queries

Просмотреть файл

@ -1,14 +1,3 @@
## 0.7.10
### Major Analysis Improvements
* We have significantly improved the Go autobuilder to understand a greater range of project layouts, which allows Go source files to be analysed that could previously not be processed.
* Go 1.22 has been included in the range of supported Go versions.
### Bug Fixes
* Fixed dataflow out of a `map` using a `range` statement.
## 0.7.9
No user-facing changes.

Просмотреть файл

@ -0,0 +1,4 @@
---
category: fix
---
* Fixed dataflow out of a `map` using a `range` statement.

Просмотреть файл

@ -1,10 +1,5 @@
## 0.7.10
### Major Analysis Improvements
---
category: majorAnalysis
---
* We have significantly improved the Go autobuilder to understand a greater range of project layouts, which allows Go source files to be analysed that could previously not be processed.
* Go 1.22 has been included in the range of supported Go versions.
### Bug Fixes
* Fixed dataflow out of a `map` using a `range` statement.

Просмотреть файл

@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.7.10
lastReleaseVersion: 0.7.9

Просмотреть файл

@ -1,5 +1,5 @@
name: codeql/go-all
version: 0.7.10
version: 0.7.10-dev
groups: go
dbscheme: go.dbscheme
extractor: go

Просмотреть файл

@ -1,7 +1,3 @@
## 0.7.10
No user-facing changes.
## 0.7.9
### New Queries

Просмотреть файл

@ -1,3 +0,0 @@
## 0.7.10
No user-facing changes.

Просмотреть файл

@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.7.10
lastReleaseVersion: 0.7.9

Просмотреть файл

@ -1,5 +1,5 @@
name: codeql/go-queries
version: 0.7.10
version: 0.7.10-dev
groups:
- go
- queries

Просмотреть файл

@ -1,7 +1,3 @@
## 0.0.17
No user-facing changes.
## 0.0.16
No user-facing changes.

Просмотреть файл

@ -1,3 +0,0 @@
## 0.0.17
No user-facing changes.

Просмотреть файл

@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.0.17
lastReleaseVersion: 0.0.16

Просмотреть файл

@ -1,5 +1,5 @@
name: codeql/java-automodel-queries
version: 0.0.17
version: 0.0.17-dev
groups:
- java
- automodel

Просмотреть файл

@ -1,14 +1,3 @@
## 0.8.10
### Minor Analysis Improvements
* Java expressions with erroneous types (e.g. the result of a call whose callee couldn't be resolved during extraction) are now given a CodeQL `ErrorType` more often.
### Bug Fixes
* Fixed the Java autobuilder overriding the version of Maven used by a project when the Maven wrapper `mvnw` is in use and the `maven-wrapper.jar` file is not present in the repository.
* Some flow steps related to `android.text.Editable.toString` that were accidentally disabled have been re-enabled.
## 0.8.9
### Deprecated APIs

Просмотреть файл

@ -0,0 +1,4 @@
---
category: fix
---
* Some flow steps related to `android.text.Editable.toString` that were accidentally disabled have been re-enabled.

Просмотреть файл

@ -0,0 +1,4 @@
---
category: minorAnalysis
---
* Java expressions with erroneous types (e.g. the result of a call whose callee couldn't be resolved during extraction) are now given a CodeQL `ErrorType` more often.

Просмотреть файл

@ -0,0 +1,4 @@
---
category: fix
---
* Fixed the Java autobuilder overriding the version of Maven used by a project when the Maven wrapper `mvnw` is in use and the `maven-wrapper.jar` file is not present in the repository.

Просмотреть файл

@ -1,10 +0,0 @@
## 0.8.10
### Minor Analysis Improvements
* Java expressions with erroneous types (e.g. the result of a call whose callee couldn't be resolved during extraction) are now given a CodeQL `ErrorType` more often.
### Bug Fixes
* Fixed the Java autobuilder overriding the version of Maven used by a project when the Maven wrapper `mvnw` is in use and the `maven-wrapper.jar` file is not present in the repository.
* Some flow steps related to `android.text.Editable.toString` that were accidentally disabled have been re-enabled.

Просмотреть файл

@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.8.10
lastReleaseVersion: 0.8.9

Просмотреть файл

@ -1,5 +1,5 @@
name: codeql/java-all
version: 0.8.10
version: 0.8.10-dev
groups: java
dbscheme: config/semmlecode.dbscheme
extractor: java

Просмотреть файл

@ -1,13 +1,3 @@
## 0.8.10
### New Queries
* Added a new query `java/android/insecure-local-key-gen` for finding instances of keys generated for biometric authentication in an insecure way.
### Minor Analysis Improvements
* To reduce the number of false positives in the query "Insertion of sensitive information into log files" (`java/sensitive-log`), variables with names that contain "null" (case-insensitively) are no longer considered sources of sensitive information.
## 0.8.9
### New Queries

Просмотреть файл

@ -0,0 +1,4 @@
---
category: newQuery
---
* Added a new query `java/android/insecure-local-key-gen` for finding instances of keys generated for biometric authentication in an insecure way.

Просмотреть файл

@ -1,9 +1,4 @@
## 0.8.10
### New Queries
* Added a new query `java/android/insecure-local-key-gen` for finding instances of keys generated for biometric authentication in an insecure way.
### Minor Analysis Improvements
---
category: minorAnalysis
---
* To reduce the number of false positives in the query "Insertion of sensitive information into log files" (`java/sensitive-log`), variables with names that contain "null" (case-insensitively) are no longer considered sources of sensitive information.

Просмотреть файл

@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.8.10
lastReleaseVersion: 0.8.9

Просмотреть файл

@ -1,5 +1,5 @@
name: codeql/java-queries
version: 0.8.10
version: 0.8.10-dev
groups:
- java
- queries

Просмотреть файл

@ -1,7 +1,3 @@
## 0.8.10
No user-facing changes.
## 0.8.9
### Minor Analysis Improvements

Просмотреть файл

@ -1,3 +0,0 @@
## 0.8.10
No user-facing changes.

Просмотреть файл

@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.8.10
lastReleaseVersion: 0.8.9

Просмотреть файл

@ -1,5 +1,5 @@
name: codeql/javascript-all
version: 0.8.10
version: 0.8.10-dev
groups: javascript
dbscheme: semmlecode.javascript.dbscheme
extractor: javascript

Просмотреть файл

@ -1,7 +1,3 @@
## 0.8.10
No user-facing changes.
## 0.8.9
### Bug Fixes

Просмотреть файл

@ -1,3 +0,0 @@
## 0.8.10
No user-facing changes.

Просмотреть файл

@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.8.10
lastReleaseVersion: 0.8.9

Просмотреть файл

@ -1,5 +1,5 @@
name: codeql/javascript-queries
version: 0.8.10
version: 0.8.10-dev
groups:
- javascript
- queries

Просмотреть файл

@ -1,7 +1,3 @@
## 0.7.10
No user-facing changes.
## 0.7.9
No user-facing changes.

Просмотреть файл

@ -1,3 +0,0 @@
## 0.7.10
No user-facing changes.

Просмотреть файл

@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.7.10
lastReleaseVersion: 0.7.9

Просмотреть файл

@ -1,4 +1,4 @@
name: codeql/suite-helpers
version: 0.7.10
version: 0.7.10-dev
groups: shared
warnOnImplicitThis: true

Просмотреть файл

@ -1,10 +1,3 @@
## 0.11.10
### Minor Analysis Improvements
* Fixed missing flow for dictionary updates (`d[<key>] = ...`) when `<key>` is a string constant not used in dictionary literals or as name of keyword-argument.
* Fixed flow for iterable unpacking (`a,b = my_tuple`) when it occurs on top-level (module) scope.
## 0.11.9
### Minor Analysis Improvements

Просмотреть файл

@ -0,0 +1,4 @@
---
category: minorAnalysis
---
* Fixed flow for iterable unpacking (`a,b = my_tuple`) when it occurs on top-level (module) scope.

Просмотреть файл

@ -1,6 +1,4 @@
## 0.11.10
### Minor Analysis Improvements
---
category: minorAnalysis
---
* Fixed missing flow for dictionary updates (`d[<key>] = ...`) when `<key>` is a string constant not used in dictionary literals or as name of keyword-argument.
* Fixed flow for iterable unpacking (`a,b = my_tuple`) when it occurs on top-level (module) scope.

Просмотреть файл

@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.11.10
lastReleaseVersion: 0.11.9

Просмотреть файл

@ -1,5 +1,5 @@
name: codeql/python-all
version: 0.11.10
version: 0.11.10-dev
groups: python
dbscheme: semmlecode.python.dbscheme
extractor: python

Просмотреть файл

@ -1,9 +1,3 @@
## 0.9.10
### New Queries
* The query `py/nosql-injection` for finding NoSQL injection vulnerabilities is now part of the default security suite.
## 0.9.9
No user-facing changes.

Просмотреть файл

@ -1,5 +1,4 @@
## 0.9.10
### New Queries
---
category: newQuery
---
* The query `py/nosql-injection` for finding NoSQL injection vulnerabilities is now part of the default security suite.

Просмотреть файл

@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.9.10
lastReleaseVersion: 0.9.9

Просмотреть файл

@ -1,5 +1,5 @@
name: codeql/python-queries
version: 0.9.10
version: 0.9.10-dev
groups:
- python
- queries

Просмотреть файл

@ -1,12 +1,3 @@
## 0.8.10
### Minor Analysis Improvements
* Calls to `I18n.translate` as well as Rails helper translate methods now propagate taint from their keyword arguments. The Rails translate methods are also recognized as XSS sanitizers when using keys marked as html safe.
* Calls to `Arel::Nodes::SqlLiteral.new` are now modeled as instances of the `SqlConstruction` concept, as well as propagating taint from their argument.
* Additional arguments beyond the first of calls to the `ActiveRecord` methods `select`, `reselect`, `order`, `reorder`, `joins`, `group`, and `pluck` are now recognized as sql injection sinks.
* Calls to several methods of `ActiveRecord::Connection`, such as `ActiveRecord::Connection#exec_query`, are now recognized as SQL executions, including those via subclasses.
## 0.8.9
### Minor Analysis Improvements

Просмотреть файл

@ -0,0 +1,4 @@
---
category: minorAnalysis
---
* Calls to several methods of `ActiveRecord::Connection`, such as `ActiveRecord::Connection#exec_query`, are now recognized as SQL executions, including those via subclasses.

Просмотреть файл

@ -0,0 +1,4 @@
---
category: minorAnalysis
---
* Additional arguments beyond the first of calls to the `ActiveRecord` methods `select`, `reselect`, `order`, `reorder`, `joins`, `group`, and `pluck` are now recognized as sql injection sinks.

Просмотреть файл

@ -0,0 +1,4 @@
---
category: minorAnalysis
---
* Calls to `Arel::Nodes::SqlLiteral.new` are now modeled as instances of the `SqlConstruction` concept, as well as propagating taint from their argument.

Просмотреть файл

@ -0,0 +1,4 @@
---
category: minorAnalysis
---
* Calls to `I18n.translate` as well as Rails helper translate methods now propagate taint from their keyword arguments. The Rails translate methods are also recognized as XSS sanitizers when using keys marked as html safe.

Просмотреть файл

@ -1,8 +0,0 @@
## 0.8.10
### Minor Analysis Improvements
* Calls to `I18n.translate` as well as Rails helper translate methods now propagate taint from their keyword arguments. The Rails translate methods are also recognized as XSS sanitizers when using keys marked as html safe.
* Calls to `Arel::Nodes::SqlLiteral.new` are now modeled as instances of the `SqlConstruction` concept, as well as propagating taint from their argument.
* Additional arguments beyond the first of calls to the `ActiveRecord` methods `select`, `reselect`, `order`, `reorder`, `joins`, `group`, and `pluck` are now recognized as sql injection sinks.
* Calls to several methods of `ActiveRecord::Connection`, such as `ActiveRecord::Connection#exec_query`, are now recognized as SQL executions, including those via subclasses.

Просмотреть файл

@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.8.10
lastReleaseVersion: 0.8.9

Просмотреть файл

@ -1,5 +1,5 @@
name: codeql/ruby-all
version: 0.8.10
version: 0.8.10-dev
groups: ruby
extractor: ruby
dbscheme: ruby.dbscheme

Просмотреть файл

@ -1,10 +1,3 @@
## 0.8.10
### Minor Analysis Improvements
* Calls to `Object#method`, `Object#public_method` and `Object#singleton_method` with untrusted data are now recognised as sinks for code injection.
* Added additional request sources for Ruby on Rails.
## 0.8.9
No user-facing changes.

Просмотреть файл

@ -0,0 +1,4 @@
---
category: minorAnalysis
---
* Added additional request sources for Ruby on Rails.

Просмотреть файл

@ -1,6 +1,4 @@
## 0.8.10
### Minor Analysis Improvements
* Calls to `Object#method`, `Object#public_method` and `Object#singleton_method` with untrusted data are now recognised as sinks for code injection.
* Added additional request sources for Ruby on Rails.
---
category: minorAnalysis
---
* Calls to `Object#method`, `Object#public_method` and `Object#singleton_method` with untrusted data are now recognised as sinks for code injection.

Просмотреть файл

@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.8.10
lastReleaseVersion: 0.8.9

Просмотреть файл

@ -1,5 +1,5 @@
name: codeql/ruby-queries
version: 0.8.10
version: 0.8.10-dev
groups:
- ruby
- queries

Просмотреть файл

@ -1,7 +1,3 @@
## 0.1.10
No user-facing changes.
## 0.1.9
No user-facing changes.

Просмотреть файл

@ -1,3 +0,0 @@
## 0.1.10
No user-facing changes.

Просмотреть файл

@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.1.10
lastReleaseVersion: 0.1.9

Просмотреть файл

@ -1,5 +1,5 @@
name: codeql/controlflow
version: 0.1.10
version: 0.1.10-dev
groups: shared
library: true
dependencies:

Просмотреть файл

@ -1,7 +1,3 @@
## 0.2.1
No user-facing changes.
## 0.2.0
### Breaking Changes

Просмотреть файл

@ -1,3 +0,0 @@
## 0.2.1
No user-facing changes.

Некоторые файлы не были показаны из-за слишком большого количества измененных файлов Показать больше