|
29 | 29 | ### New Features |
30 | 30 |
|
31 | 31 | - A new extractor option has been added to the Python extractor. |
32 | | - Set the new extractor option `python_executable_name` or the environment variable |
33 | | - `CODEQL_EXTRACTOR_PYTHON_OPTION_PYTHON_EXECUTABLE_NAME` to one of `py`, `python` or `python3` |
34 | | - to override the default Python executable search and selection behavior of the Python extractor. |
35 | | - For example, on Windows machines, the Python extractor will expect to find `py.exe` on the |
36 | | - system `PATH` by default. Setting this extractor option or environment variable allows |
37 | | - overriding this behavior to look for a different name like `python` or `python3`. |
| 32 | + Pass one of `--extractor-option python_executable_name=py` |
| 33 | + or `--extractor-option python_executable_name=python` |
| 34 | + or `--extractor-option python_executable_name=python3` |
| 35 | + to `codeql database create` (or `codeql database trace-command` or, |
| 36 | + for indirect tracing, `codeql database init`) to override the default |
| 37 | + Python executable search and selection behavior of the Python |
| 38 | + extractor. For example, on Windows machines, the Python extractor |
| 39 | + will expect to find `py.exe` on the system `PATH` by default. |
| 40 | + Setting this extractor option or environment variable allows |
| 41 | + overriding this behavior to look for a different name. |
| 42 | + |
38 | 43 | More detail can be found in [the extractor option documentation](https://docs.github.com/en/code-security/codeql-cli/using-the-advanced-functionality-of-the-codeql-cli/extractor-options). |
39 | 44 |
|
40 | 45 | ### Bugs fixed |
|
125 | 130 |
|
126 | 131 | - Fixed an issue where CodeQL would sometimes incorrectly report that no files |
127 | 132 | were scanned when running on Windows. |
128 | | - This affected the human-readable summary produced by `codeql database analyze` |
| 133 | + This affected the human-readable summary produced by `codeql database analyze` |
129 | 134 | and `codeql database interpret-results`, but did not impact the file coverage |
130 | 135 | information produced in the SARIF output and displayed on the tool status page. |
131 | 136 | - When analyzing Swift codebases, CodeQL build tracing will now ignore the |
|
0 commit comments