Skip to content

Post-release preparation for codeql-cli-2.22.3 #20166

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 4 commits into from
Aug 4, 2025

Conversation

codeql-ci
Copy link
Collaborator

This PR merges back all of the changes from the release of codeql-cli-2.22.3. And it bumps the version version strings in semmle-code in preparation for the next release of 2.22.4.

@cklin cklin marked this pull request as ready for review August 4, 2025 17:30
@cklin cklin requested review from a team as code owners August 4, 2025 17:30
@Copilot Copilot AI review requested due to automatic review settings August 4, 2025 17:30
@cklin cklin requested review from a team as code owners August 4, 2025 17:30
Copy link
Contributor

@Copilot Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR performs post-release preparation for codeql-cli-2.22.3 by merging back changes from the release and bumping version strings for the next release (2.22.4). The changes include updating package versions, release tracking files, and consolidating change notes into changelogs.

  • Version increments across all language packs and shared libraries
  • Creation of release change notes and updating changelogs
  • Removal of pending change note files that were incorporated into the release

Reviewed Changes

Copilot reviewed 172 out of 172 changed files in this pull request and generated 3 comments.

Show a summary per file
File Description
Various qlpack.yml files Version bumps from released to next development versions
Various codeql-pack.release.yml files Updated lastReleaseVersion to track completed releases
Various change-notes/released/*.md files New release notes documenting the changes in each package
Various CHANGELOG.md files Updated with release notes and consolidated change summaries
Various change-notes/*.md files Removed individual change note files that were incorporated into releases


### New Queries

* Added a new query, `rust/hard-coded-cryptographic-value`, for detecting use of hardcoded keys, passwords, salts and initialization vectors.
Copy link
Preview

Copilot AI Aug 4, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There's an inconsistency in the query name. The change note refers to rust/hard-coded-cryptographic-value while the removed change note file mentions rust/hardcoded-crytographic-value (note the missing hyphen and typo 'crytographic'). Ensure the correct query name is used consistently.

Copilot uses AI. Check for mistakes.


### Minor Analysis Improvements

* The "Initialization code not run" query (`cpp/initialization-not-run`) no longer reports an alert on static global variables that have no dereference.
Copy link
Preview

Copilot AI Aug 4, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The grammar should be "that have no dereference" instead of "that has no dereference" to maintain subject-verb agreement with the plural "variables".

Copilot uses AI. Check for mistakes.

@@ -10,7 +16,7 @@

### New Features

* You can now add sinks for the query "Deserialization of user-controlled data" (`java/unsafe-deserialization`) using [data extensions](https://codeql.github.com/docs/codeql-language-guides/customizing-library-models-for-java-and-kotlin/#extensible-predicates-used-to-create-custom-models-in-java-and-kotlin) by extending `sinkModel` and using the kind "unsafe-deserialization". The existing sinks which do not require extra logic to determine if they are unsafe are now defined in this way.
* You can now add sinks for the query "Deserialization of user-controlled data" (`java/unsafe-deserialization`) using [data extensions](https://codeql.github.com/docs/codeql-language-guides/customizing-library-models-for-java-and-kotlin/#extensible-predicates-used-to-create-custom-models-in-java-and-kotlin) by extending `sinkModel` and using the kind "unsafe-deserialization". The existing sinks that do not require extra logic to determine if they are unsafe are now defined in this way.
Copy link
Preview

Copilot AI Aug 4, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

[nitpick] The word "which" has been changed to "that" in this line. While both are grammatically correct, this appears to be a style improvement rather than a correction of an error.

Copilot uses AI. Check for mistakes.

@cklin cklin merged commit e2b8d7b into main Aug 4, 2025
71 checks passed
@cklin cklin deleted the post-release-prep/codeql-cli-2.22.3 branch August 4, 2025 18:38
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants