Skip to content

Commit 62e17c1

Browse files
committed
RST sitedocs for 2.22.0
1 parent 4d681f0 commit 62e17c1

File tree

5 files changed

+88
-5
lines changed

5 files changed

+88
-5
lines changed

docs/codeql/codeql-overview/codeql-changelog/codeql-cli-2.19.4.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,4 +79,4 @@ JavaScript/TypeScript
7979
* Added taint-steps for :code:`Array.prototype.toReversed`.
8080
* Added taint-steps for :code:`Array.prototype.toSorted`.
8181
* Added support for :code:`String.prototype.matchAll`.
82-
* Added taint-steps for :code:`Array.prototype.reverse`.
82+
* Added taint-steps for :code:`Array.prototype.reverse`\

docs/codeql/codeql-overview/codeql-changelog/codeql-cli-2.20.4.rst

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -117,8 +117,8 @@ Java/Kotlin
117117
* Deleted the deprecated :code:`isLValue` and :code:`isRValue` predicates from the :code:`VarAccess` class, use :code:`isVarWrite` and :code:`isVarRead` respectively instead.
118118
* Deleted the deprecated :code:`getRhs` predicate from the :code:`VarWrite` class, use :code:`getASource` instead.
119119
* Deleted the deprecated :code:`LValue` and :code:`RValue` classes, use :code:`VarWrite` and :code:`VarRead` respectively instead.
120-
* Deleted a lot of deprecated classes ending in ``*Access``, use the corresponding ``*Call`` classes instead.
121-
* Deleted a lot of deprecated predicates ending in ``*Access``, use the corresponding ``*Call`` predicates instead.
120+
* Deleted a lot of deprecated classes ending in :code:`*Access`, use the corresponding :code:`*Call` classes instead.
121+
* Deleted a lot of deprecated predicates ending in :code:`*Access`, use the corresponding :code:`*Call` predicates instead.
122122
* Deleted the deprecated :code:`EnvInput` and :code:`DatabaseInput` classes from :code:`FlowSources.qll`, use the threat models feature instead.
123123
* Deleted some deprecated API predicates from :code:`SensitiveApi.qll`, use the Sink classes from that file instead.
124124

@@ -144,7 +144,7 @@ Ruby
144144
* Deleted the deprecated :code:`ModelClass` and :code:`ModelInstance` classes from :code:`ActiveResource.qll`, use :code:`ModelClassNode` and :code:`ModelClassNode.getAnInstanceReference()` instead.
145145
* Deleted the deprecated :code:`Collection` class from :code:`ActiveResource.qll`, use :code:`CollectionSource` instead.
146146
* Deleted the deprecated :code:`ServiceInstantiation` and :code:`ClientInstantiation` classes from :code:`Twirp.qll`.
147-
* Deleted a lot of deprecated dataflow modules from ``*Query.qll`` files.
147+
* Deleted a lot of deprecated dataflow modules from :code:`*Query.qll` files.
148148
* Deleted the old deprecated TypeTracking library.
149149

150150
Swift

docs/codeql/codeql-overview/codeql-changelog/codeql-cli-2.21.0.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -207,5 +207,5 @@ JavaScript/TypeScript
207207

208208
* Intersection :code:`&&`
209209
* Subtraction :code:`--`
210-
* :code:`\\q` quoted string
210+
* :code:`\q` quoted string
211211

Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
.. _codeql-cli-2.22.0:
2+
3+
==========================
4+
CodeQL 2.22.0 (2025-06-11)
5+
==========================
6+
7+
.. contents:: Contents
8+
:depth: 2
9+
:local:
10+
:backlinks: none
11+
12+
This is an overview of changes in the CodeQL CLI and relevant CodeQL query and library packs. For additional updates on changes to the CodeQL code scanning experience, check out the `code scanning section on the GitHub blog <https://github.blog/tag/code-scanning/>`__, `relevant GitHub Changelog updates <https://github.blog/changelog/label/code-scanning/>`__, `changes in the CodeQL extension for Visual Studio Code <https://marketplace.visualstudio.com/items/GitHub.vscode-codeql/changelog>`__, and the `CodeQL Action changelog <https://github.com/github/codeql-action/blob/main/CHANGELOG.md>`__.
13+
14+
Security Coverage
15+
-----------------
16+
17+
CodeQL 2.22.0 runs a total of 450 security queries when configured with the Default suite (covering 165 CWE). The Extended suite enables an additional 128 queries (covering 33 more CWE). 1 security query has been added with this release.
18+
19+
CodeQL CLI
20+
----------
21+
22+
Breaking Changes
23+
~~~~~~~~~~~~~~~~
24+
25+
* A number of breaking changes have been made to the C and C++ CodeQL test environment as used by :code:`codeql test run`\ :
26+
27+
* Options starting with a :code:`/` are no longer supported by
28+
:code:`semmle-extractor-options`. Any option starting with a :code:`/` should be replaced by the equivalent option starting with a :code:`-`, e.g., :code:`/D` should be replaced by :code:`-D`.
29+
* Preprocessor command line options of the form :code:`-D<macro>#<def>` are no longer supported by :code:`semmle-extractor-options`. :code:`-D<macro>=<def>` should be used instead.
30+
* The :code:`/Fp` and :code:`-o` options are no longer supported by
31+
:code:`semmle-extractor-options`. The options should be omitted.
32+
* The :code:`-emit-pch`, :code:`-include-pch`, :code:`/Yc`, and :code:`/Yu` options, and the
33+
:code:`--preinclude` option taking a pre-compiled header as its argument, are no longer supported by :code:`semmle-extractor-options`. Any test that makes use of this should be replaced by a test that invokes the CodeQL CLI with the
34+
:code:`create database` option and that runs the relevant queries on the created database.
35+
36+
Query Packs
37+
-----------
38+
39+
Minor Analysis Improvements
40+
~~~~~~~~~~~~~~~~~~~~~~~~~~~
41+
42+
Python
43+
""""""
44+
45+
* Added SQL injection models from the :code:`pandas` PyPI package.
46+
47+
New Queries
48+
~~~~~~~~~~~
49+
50+
Golang
51+
""""""
52+
53+
* Query (:code:`go/html-template-escaping-bypass-xss`) has been promoted to the main query suite. This query finds potential cross-site scripting (XSS) vulnerabilities when using the :code:`html/template` package, caused by user input being cast to a type which bypasses the HTML autoescaping. It was originally contributed to the experimental query pack by @gagliardetto in `https://github.com/github/codeql-go/pull/493 <https://github.com/github/codeql-go/pull/493>`_.
54+
55+
Language Libraries
56+
------------------
57+
58+
Minor Analysis Improvements
59+
~~~~~~~~~~~~~~~~~~~~~~~~~~~
60+
61+
Golang
62+
""""""
63+
64+
* The first argument of :code:`Client.Query` in :code:`cloud.google.com/go/bigquery` is now recognized as a SQL injection sink.
65+
66+
JavaScript/TypeScript
67+
"""""""""""""""""""""
68+
69+
* Added taint flow through the :code:`URL` constructor from the :code:`url` package, improving the identification of SSRF vulnerabilities.
70+
71+
Swift
72+
"""""
73+
74+
* Updated to allow analysis of Swift 6.1.2.
75+
76+
New Features
77+
~~~~~~~~~~~~
78+
79+
C/C++
80+
"""""
81+
82+
* Added a predicate :code:`getReferencedMember` to :code:`UsingDeclarationEntry`, which yields a member depending on a type template parameter.

docs/codeql/codeql-overview/codeql-changelog/index.rst

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ A list of queries for each suite and language `is available here <https://docs.g
1111
.. toctree::
1212
:maxdepth: 1
1313

14+
codeql-cli-2.22.0
1415
codeql-cli-2.21.4
1516
codeql-cli-2.21.3
1617
codeql-cli-2.21.2

0 commit comments

Comments
 (0)