Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Post release activities for 2.9.5 package release #2887

Merged
merged 1 commit into from Oct 2, 2019
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
10 changes: 5 additions & 5 deletions .github/ISSUE_TEMPLATE.md
@@ -1,20 +1,20 @@
#### Analyzer package

Example: [Microsoft.CodeAnalysis.FxCopAnalyzers](https://www.nuget.org/packages/Microsoft.CodeAnalysis.FxCopAnalyzers)
[Microsoft.CodeAnalysis.FxCopAnalyzers](https://www.nuget.org/packages/Microsoft.CodeAnalysis.FxCopAnalyzers)

#### Package Version

Example: v2.9.5-beta1.final (Latest)
v2.9.5 (Latest)

#### Diagnostic ID

Example: [CA1716](https://docs.microsoft.com/en-us/visualstudio/code-quality/ca1716-identifiers-should-not-match-keywords)

#### Repro steps

1. One
1. Two
1. Three
1.
2.
3.

#### Expected behavior

Expand Down
1 change: 1 addition & 0 deletions VERSIONING.md
Expand Up @@ -41,3 +41,4 @@ Sr. No. | Release Version | Commit Tag | Commit SHA
21 | 2.9.4-beta1.final (pre-release) | v2.9.4-beta1.final | [3b22a6a](https://github.com/dotnet/roslyn-analyzers/commit/3b22a6a82d450350ab0cf27504adab8d1226b2a8) | Microsoft.CodeAnalysis.Analyzers, Microsoft.CodeAnalysis.FxCopAnalyzers, Microsoft.CodeAnalysis.Metrics, Microsoft.CodeAnalysis.VersionCheckAnalyzer, Microsoft.CodeQuality.Analyzers, Microsoft.NetCore.Analyzers, Microsoft.NetFramework.Analyzers, Roslyn.Diagnostics.Analyzers, Microsoft.CodeAnalysis.PublicApiAnalyzers, Microsoft.CodeAnalysis.BannedApiAnalyzers, Microsoft.CodeAnalysis.FlowAnalysis.Utilities
22 | 2.9.4 | v2.9.4 | [a1a198d](https://github.com/dotnet/roslyn-analyzers/commit/a1a198d1c5d2359e93dd4ab4b1c4f7421512724e) | Microsoft.CodeAnalysis.Analyzers, Microsoft.CodeAnalysis.FxCopAnalyzers, Microsoft.CodeAnalysis.Metrics, Microsoft.CodeAnalysis.VersionCheckAnalyzer, Microsoft.CodeQuality.Analyzers, Microsoft.NetCore.Analyzers, Microsoft.NetFramework.Analyzers, Roslyn.Diagnostics.Analyzers, Microsoft.CodeAnalysis.PublicApiAnalyzers, Microsoft.CodeAnalysis.BannedApiAnalyzers, Microsoft.CodeAnalysis.FlowAnalysis.Utilities
23 | 2.9.5-beta1.final (pre-release) | v2.9.5-beta1.final | [494de6f](https://github.com/dotnet/roslyn-analyzers/commit/494de6f80082746e41d69355535f8dc3bfef494a) | Microsoft.CodeAnalysis.Analyzers, Microsoft.CodeAnalysis.FxCopAnalyzers, Microsoft.CodeAnalysis.Metrics, Microsoft.CodeAnalysis.VersionCheckAnalyzer, Microsoft.CodeQuality.Analyzers, Microsoft.NetCore.Analyzers, Microsoft.NetFramework.Analyzers, Roslyn.Diagnostics.Analyzers, Microsoft.CodeAnalysis.PublicApiAnalyzers, Microsoft.CodeAnalysis.BannedApiAnalyzers
24 | 2.9.5 | v2.9.5 | [6c05175](https://github.com/dotnet/roslyn-analyzers/commit/6c05175f91bf7cc463a1b71e1f6773d4afcaa7a1) | Microsoft.CodeAnalysis.Analyzers, Microsoft.CodeAnalysis.FxCopAnalyzers, Microsoft.CodeAnalysis.Metrics, Microsoft.CodeAnalysis.VersionCheckAnalyzer, Microsoft.CodeQuality.Analyzers, Microsoft.NetCore.Analyzers, Microsoft.NetFramework.Analyzers, Roslyn.Diagnostics.Analyzers, Microsoft.CodeAnalysis.PublicApiAnalyzers, Microsoft.CodeAnalysis.BannedApiAnalyzers, Microsoft.CodeAnalysis.FlowAnalysis.Utilities
6 changes: 3 additions & 3 deletions eng/Versions.props
Expand Up @@ -2,9 +2,9 @@
<PropertyGroup>
<MSBuildAllProjects>$(MSBuildAllProjects);$(MSBuildThisFileFullPath)</MSBuildAllProjects>

<VersionPrefix>2.9.5</VersionPrefix>
<VersionPrefix>2.9.6</VersionPrefix>
<FlowAnalysisUtilitiesVersionPrefix>2.9.7</FlowAnalysisUtilitiesVersionPrefix>
<PreReleaseVersionLabel>beta2</PreReleaseVersionLabel>
<PreReleaseVersionLabel>beta1</PreReleaseVersionLabel>

<!-- Opt-in repo features -->
<UsingToolVSSDK>true</UsingToolVSSDK>
Expand All @@ -21,7 +21,7 @@
<!-- Roslyn -->
<MicrosoftCodeAnalysisVersion>2.9.0</MicrosoftCodeAnalysisVersion>
<MicrosoftNetCompilersVersion>3.3.1-beta3-final</MicrosoftNetCompilersVersion>
<MicrosoftCodeAnalysisFXCopAnalyersVersion>2.9.5-beta1.final</MicrosoftCodeAnalysisFXCopAnalyersVersion>
<MicrosoftCodeAnalysisFXCopAnalyersVersion>2.9.5</MicrosoftCodeAnalysisFXCopAnalyersVersion>
<MicrosoftCodeAnalysisAnalyersVersion>3.0.0-beta2.19218.3+e96bad97</MicrosoftCodeAnalysisAnalyersVersion>
<CodeStyleAnalyersVersion>3.3.0-beta2-19376-02</CodeStyleAnalyersVersion>
<MicrosoftCodeAnalysisTestResourcesProprietaryVersion>2.0.0-pre-20160714</MicrosoftCodeAnalysisTestResourcesProprietaryVersion>
Expand Down
3 changes: 1 addition & 2 deletions src/GenerateAnalyzerRulesets/CodeFixerExtensions.cs
@@ -1,7 +1,6 @@
using System;
using System.Collections.Generic;
using System.Collections.Immutable;
using System.Linq;
using System.Reflection;
using System.Runtime.CompilerServices;
using Microsoft.CodeAnalysis.CodeFixes;
Expand Down Expand Up @@ -73,7 +72,7 @@ private static bool HasImplementation(CodeFixProvider fixer)
if (moveNextMethod != null)
{
MethodBody body = moveNextMethod.GetMethodBody();
int? ilInstructionCount = body?.GetILAsByteArray()?.Count();
int? ilInstructionCount = body?.GetILAsByteArray()?.Length;
return ilInstructionCount != 177;
}

Expand Down
Expand Up @@ -5,7 +5,7 @@
{
"tool": {
"name": "MetaCompilation.Analyzers",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand Down
Expand Up @@ -106,7 +106,7 @@ private void VerifyDiagnostics(string[] sources, string language, DiagnosticAnal
/// <param name="expectedResults">Diagnostic Results that should have appeared in the code</param>
private static void VerifyDiagnosticResults(IEnumerable<Diagnostic> actualResults, DiagnosticAnalyzer analyzer, params DiagnosticResult[] expectedResults)
{
int expectedCount = expectedResults.Count();
int expectedCount = expectedResults.Length;
int actualCount = actualResults.Count();

if (expectedCount != actualCount)
Expand Down
Expand Up @@ -5,7 +5,7 @@
{
"tool": {
"name": "Microsoft.CodeAnalysis.Analyzers",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand Down Expand Up @@ -299,7 +299,7 @@
{
"tool": {
"name": "Microsoft.CodeAnalysis.CSharp.Analyzers",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand Down Expand Up @@ -479,7 +479,7 @@
{
"tool": {
"name": "Microsoft.CodeAnalysis.VisualBasic.Analyzers",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand Down
Expand Up @@ -5,7 +5,7 @@
{
"tool": {
"name": "Microsoft.CodeAnalysis.BannedApiAnalyzers",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand All @@ -14,7 +14,7 @@
{
"tool": {
"name": "Microsoft.CodeAnalysis.CSharp.BannedApiAnalyzers",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand Down Expand Up @@ -76,7 +76,7 @@
{
"tool": {
"name": "Microsoft.CodeAnalysis.VisualBasic.BannedApiAnalyzers",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand Down
Expand Up @@ -192,7 +192,7 @@ Sr. No. | Rule ID | Title | Category | Enabled | CodeFix | Description |
189 | CA5388 | Ensure Sufficient Iteration Count When Using Weak Key Derivation Function | Security | False | False | When deriving cryptographic keys from user-provided inputs such as password, use sufficient iteration count (at least 100k). |
190 | [CA5389](https://docs.microsoft.com/visualstudio/code-quality/ca5389) | Do Not Add Archive Item's Path To The Target File System Path | Security | False | False | When extracting files from an archive and using the archive item's path, check if the path is safe. Archive path can be relative and can lead to file system access outside of the expected file system target path, leading to malicious config changes and remote code execution via lay-and-wait technique. |
191 | CA5390 | Do Not Hard Code Encryption Key | Security | False | False | SymmetricAlgorithm's .Key property, or a method's rgbKey parameter, should never be a hardcoded value. |
192 | CA5391 | Use antiforgery tokens in ASP.NET Core MVC controllers | Security | True | False | Handling a POST, PUT, PATCH, or DELETE request without validating an antiforgery token may be vulnerable to cross-site request forgery attacks. A cross-site request forgery attack can send malicious requests from an authenticated user to your ASP.NET Core MVC controller. |
192 | CA5391 | Use antiforgery tokens in ASP.NET Core MVC controllers | Security | False | False | Handling a POST, PUT, PATCH, or DELETE request without validating an antiforgery token may be vulnerable to cross-site request forgery attacks. A cross-site request forgery attack can send malicious requests from an authenticated user to your ASP.NET Core MVC controller. |
193 | CA5392 | Use DefaultDllImportSearchPaths attribute for P/Invokes | Security | False | False | By default, P/Invokes using DllImportAttribute probe a number of directories, including the current working directory for the library to load. This can be a security issue for certain applications, leading to DLL hijacking. |
194 | CA5393 | Do not use unsafe DllImportSearchPath value | Security | False | False | There could be a malicious DLL in the default DLL search directories. Or, depending on where your application is run from, there could be a malicious DLL in the application's directory. Use a DllImportSearchPath value that specifies an explicit search path instead. The DllImportSearchPath flags that this rule looks for can be configured in .editorconfig. |
195 | CA5394 | Do not use insecure randomness | Security | False | False | {0} is an insecure random number generator. Use cryptographically secure random number generators when randomness is required for security |
Expand Down
Expand Up @@ -5,7 +5,7 @@
{
"tool": {
"name": "Microsoft.CodeAnalysis.VersionCheckAnalyzer",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand All @@ -29,7 +29,7 @@
{
"tool": {
"name": "Microsoft.CodeQuality.Analyzers",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand Down Expand Up @@ -1509,7 +1509,7 @@
{
"tool": {
"name": "Microsoft.CodeQuality.CSharp.Analyzers",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand Down Expand Up @@ -1705,7 +1705,7 @@
{
"tool": {
"name": "Microsoft.CodeQuality.VisualBasic.Analyzers",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand Down Expand Up @@ -1939,7 +1939,7 @@
{
"tool": {
"name": "Microsoft.NetCore.Analyzers",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand Down Expand Up @@ -3627,7 +3627,7 @@
"defaultLevel": "warning",
"properties": {
"category": "Security",
"isEnabledByDefault": true,
"isEnabledByDefault": false,
"typeName": "UseAutoValidateAntiforgeryToken",
"languages": [
"C#",
Expand Down Expand Up @@ -3810,7 +3810,7 @@
{
"tool": {
"name": "Microsoft.NetCore.CSharp.Analyzers",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand Down Expand Up @@ -3960,7 +3960,7 @@
{
"tool": {
"name": "Microsoft.NetCore.VisualBasic.Analyzers",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand Down Expand Up @@ -4110,7 +4110,7 @@
{
"tool": {
"name": "Microsoft.NetFramework.Analyzers",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand Down Expand Up @@ -4193,7 +4193,7 @@
{
"tool": {
"name": "Microsoft.NetFramework.CSharp.Analyzers",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand Down Expand Up @@ -4238,7 +4238,7 @@
{
"tool": {
"name": "Microsoft.NetFramework.VisualBasic.Analyzers",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand Down
Expand Up @@ -5,7 +5,7 @@
{
"tool": {
"name": "Microsoft.CodeAnalysis.VersionCheckAnalyzer",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand Down
Expand Up @@ -5,7 +5,7 @@
{
"tool": {
"name": "Humanizer",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand All @@ -14,7 +14,7 @@
{
"tool": {
"name": "Microsoft.CodeQuality.Analyzers",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand Down Expand Up @@ -1494,7 +1494,7 @@
{
"tool": {
"name": "Microsoft.CodeQuality.CSharp.Analyzers",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand Down Expand Up @@ -1690,7 +1690,7 @@
{
"tool": {
"name": "Microsoft.CodeQuality.VisualBasic.Analyzers",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand Down
Expand Up @@ -99,7 +99,7 @@ Sr. No. | Rule ID | Title | Category | Enabled | CodeFix | Description |
96 | CA5388 | Ensure Sufficient Iteration Count When Using Weak Key Derivation Function | Security | False | False | When deriving cryptographic keys from user-provided inputs such as password, use sufficient iteration count (at least 100k). |
97 | [CA5389](https://docs.microsoft.com/visualstudio/code-quality/ca5389) | Do Not Add Archive Item's Path To The Target File System Path | Security | False | False | When extracting files from an archive and using the archive item's path, check if the path is safe. Archive path can be relative and can lead to file system access outside of the expected file system target path, leading to malicious config changes and remote code execution via lay-and-wait technique. |
98 | CA5390 | Do Not Hard Code Encryption Key | Security | False | False | SymmetricAlgorithm's .Key property, or a method's rgbKey parameter, should never be a hardcoded value. |
99 | CA5391 | Use antiforgery tokens in ASP.NET Core MVC controllers | Security | True | False | Handling a POST, PUT, PATCH, or DELETE request without validating an antiforgery token may be vulnerable to cross-site request forgery attacks. A cross-site request forgery attack can send malicious requests from an authenticated user to your ASP.NET Core MVC controller. |
99 | CA5391 | Use antiforgery tokens in ASP.NET Core MVC controllers | Security | False | False | Handling a POST, PUT, PATCH, or DELETE request without validating an antiforgery token may be vulnerable to cross-site request forgery attacks. A cross-site request forgery attack can send malicious requests from an authenticated user to your ASP.NET Core MVC controller. |
100 | CA5392 | Use DefaultDllImportSearchPaths attribute for P/Invokes | Security | False | False | By default, P/Invokes using DllImportAttribute probe a number of directories, including the current working directory for the library to load. This can be a security issue for certain applications, leading to DLL hijacking. |
101 | CA5393 | Do not use unsafe DllImportSearchPath value | Security | False | False | There could be a malicious DLL in the default DLL search directories. Or, depending on where your application is run from, there could be a malicious DLL in the application's directory. Use a DllImportSearchPath value that specifies an explicit search path instead. The DllImportSearchPath flags that this rule looks for can be configured in .editorconfig. |
102 | CA5394 | Do not use insecure randomness | Security | False | False | {0} is an insecure random number generator. Use cryptographically secure random number generators when randomness is required for security |
Expand Down
Expand Up @@ -5,7 +5,7 @@
{
"tool": {
"name": "Microsoft.NetCore.Analyzers",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand Down Expand Up @@ -1693,7 +1693,7 @@
"defaultLevel": "warning",
"properties": {
"category": "Security",
"isEnabledByDefault": true,
"isEnabledByDefault": false,
"typeName": "UseAutoValidateAntiforgeryToken",
"languages": [
"C#",
Expand Down Expand Up @@ -1876,7 +1876,7 @@
{
"tool": {
"name": "Microsoft.NetCore.CSharp.Analyzers",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand Down Expand Up @@ -2026,7 +2026,7 @@
{
"tool": {
"name": "Microsoft.NetCore.VisualBasic.Analyzers",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand Down
Expand Up @@ -5,7 +5,7 @@
{
"tool": {
"name": "Microsoft.NetFramework.Analyzers",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand Down Expand Up @@ -88,7 +88,7 @@
{
"tool": {
"name": "Microsoft.NetFramework.CSharp.Analyzers",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand Down Expand Up @@ -133,7 +133,7 @@
{
"tool": {
"name": "Microsoft.NetFramework.VisualBasic.Analyzers",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand Down
Expand Up @@ -5,7 +5,7 @@
{
"tool": {
"name": "Microsoft.CodeAnalysis.CSharp.PerformanceSensitiveAnalyzers",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand Down Expand Up @@ -184,7 +184,7 @@
{
"tool": {
"name": "Microsoft.CodeAnalysis.PerformanceSensitiveAnalyzers",
"version": "2.9.5",
"version": "2.9.6",
"language": "en-US"
},
"rules": {
Expand Down