advanced-security / codeql-extractor-iac

CodeQL Extractor, Library, and Queries for Infrastructure as Code
MIT License
38 stars 5 forks source link

build(deps): bump the extractor group across 1 directory with 2 updates #140

Closed dependabot[bot] closed 4 months ago

dependabot[bot] commented 4 months ago

Bumps the extractor group with 2 updates in the / directory: flate2 and tree-sitter.

Updates flate2 from 1.0.28 to 1.0.30

Release notes

Sourced from flate2's releases.

1.0.29 - with new zlib-rs feature (~zlib-ng in Rust)

With the new zlib-rs feature, a new backend is enabled that brings in a SIMD-accelerated Rust implementation.

What's Changed

New Contributors

Full Changelog: https://github.com/rust-lang/flate2-rs/compare/1.0.28...1.0.29

Commits
  • d3bea90 Merge pull request #405 from Byron/fix-CI
  • 5048843 Merge pull request #407 from striezel-stash/actions-checkout-v4
  • 42c86ce Merge pull request #406 from striezel-stash/fix-some-typos
  • f7b99e9 Update actions/checkout in GitHub Actions workflows to v4
  • 563f1c4 Fix typos
  • 1126a4a prepare bugfix release to make docs work again
  • bc1b3e9 CI verifies that docs can be built (#404)
  • 5ce4154 fix CI by assuring builds work with --all-features enabled (#404)
  • 9a25bc0 Merge pull request #403 from folkertdev/bump-version-zlib-rs
  • e9c87c0 zlib-rs support version bump
  • Additional commits viewable in compare view


Updates tree-sitter from 0.22.5 to 0.22.6

Release notes

Sourced from tree-sitter's releases.

v0.22.6

[0.22.6] — 2024-05-05

Features

Bug Fixes

Documentation

Refactor

Build System and CI

Changelog

Sourced from tree-sitter's changelog.

[0.22.6] — 2024-05-05

Features

Bug Fixes

Documentation

Refactor

Build System and CI

Commits
  • b40f342 0.22.6
  • 577d333 feat(cli): add test listing and allow users to parse a specific test number
  • 33045ee fix(test): allow newlines in between test name and attribute
  • 1e219ff fix(cli): properly account for multi-grammar repos when using docker to build...
  • 572cdaa ci: fix address sanitizer step
  • 6bfdae0 docs: mention build command variables
  • a2d2da3 fix(cli): keep default cc flags in build
  • 90ba525 fix(highlight): correct signature of ts_highlighter_add_language
  • 67a0439 test: temporarily disable php test
  • 3a42c27 ci: add nightly rustfmt to workflow
  • Additional commits viewable in compare view


Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore major version` will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself) - `@dependabot ignore minor version` will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself) - `@dependabot ignore ` will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself) - `@dependabot unignore ` will remove all of the ignore conditions of the specified dependency - `@dependabot unignore ` will remove the ignore condition of the specified dependency and ignore conditions
dependabot[bot] commented 4 months ago

This pull request was built based on a group rule. Closing it will not ignore any of these versions in future pull requests.

To ignore these dependencies, configure ignore rules in dependabot.yml

github-actions[bot] commented 4 months ago

Dependency Review

✅ No vulnerabilities or license issues or OpenSSF Scorecard issues found.

OpenSSF Scorecard

PackageVersionScoreDetails
cargo/cc 1.0.96 :green_circle: 6.2
Details
CheckScoreReason
Code-Review:green_circle: 4Found 12/27 approved changesets -- score normalized to 4
Maintained:green_circle: 1030 commit(s) and 26 issue activity found in the last 90 days -- score normalized to 10
CII-Best-Practices:warning: 0no effort to earn an OpenSSF best practices badge detected
License:green_circle: 10license file detected
Branch-Protection:warning: -1internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration
Dangerous-Workflow:green_circle: 10no dangerous workflow patterns detected
Binary-Artifacts:green_circle: 10no binaries found in the repo
Token-Permissions:warning: 0detected GitHub workflow tokens with excessive permissions
Signed-Releases:warning: -1no releases found
Fuzzing:warning: 0project is not fuzzed
Vulnerabilities:green_circle: 100 existing vulnerabilities detected
Packaging:green_circle: 10packaging workflow detected
Security-Policy:green_circle: 10security policy file detected
SAST:warning: 0SAST tool is not run on all commits -- score normalized to 0
Pinned-Dependencies:warning: 0dependency not pinned by hash detected -- score normalized to 0
cargo/flate2 1.0.30 :green_circle: 7.2
Details
CheckScoreReason
Maintained:green_circle: 1018 commit(s) and 5 issue activity found in the last 90 days -- score normalized to 10
Code-Review:green_circle: 10all changesets reviewed
CII-Best-Practices:warning: 0no effort to earn an OpenSSF best practices badge detected
License:green_circle: 10license file detected
Signed-Releases:warning: -1no releases found
Packaging:warning: -1packaging workflow not detected
Binary-Artifacts:green_circle: 10no binaries found in the repo
Dangerous-Workflow:green_circle: 10no dangerous workflow patterns detected
Token-Permissions:warning: 0detected GitHub workflow tokens with excessive permissions
Branch-Protection:warning: -1internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration
Fuzzing:green_circle: 10project is fuzzed
Vulnerabilities:green_circle: 100 existing vulnerabilities detected
Security-Policy:green_circle: 10security policy file detected
SAST:warning: 0SAST tool is not run on all commits -- score normalized to 0
Pinned-Dependencies:warning: 0dependency not pinned by hash detected -- score normalized to 0
cargo/tree-sitter 0.22.6 :green_circle: 4.3
Details
CheckScoreReason
Maintained:green_circle: 1030 commit(s) and 16 issue activity found in the last 90 days -- score normalized to 10
Code-Review:green_circle: 3Found 7/22 approved changesets -- score normalized to 3
CII-Best-Practices:warning: 0no effort to earn an OpenSSF best practices badge detected
License:green_circle: 10license file detected
Signed-Releases:warning: 0Project has not signed or included provenance with any releases.
Dangerous-Workflow:green_circle: 10no dangerous workflow patterns detected
Token-Permissions:warning: 0detected GitHub workflow tokens with excessive permissions
Binary-Artifacts:green_circle: 10no binaries found in the repo
Branch-Protection:warning: 0branch protection not enabled on development/release branches
Fuzzing:warning: 0project is not fuzzed
Packaging:green_circle: 10packaging workflow detected
Security-Policy:warning: 0security policy file not detected
SAST:warning: 0SAST tool is not run on all commits -- score normalized to 0
Vulnerabilities:green_circle: 73 existing vulnerabilities detected
Pinned-Dependencies:warning: 0dependency not pinned by hash detected -- score normalized to 0
cargo/cc 1.0.94 :green_circle: 6.2
Details
CheckScoreReason
Code-Review:green_circle: 4Found 12/27 approved changesets -- score normalized to 4
Maintained:green_circle: 1030 commit(s) and 26 issue activity found in the last 90 days -- score normalized to 10
CII-Best-Practices:warning: 0no effort to earn an OpenSSF best practices badge detected
License:green_circle: 10license file detected
Branch-Protection:warning: -1internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration
Dangerous-Workflow:green_circle: 10no dangerous workflow patterns detected
Binary-Artifacts:green_circle: 10no binaries found in the repo
Token-Permissions:warning: 0detected GitHub workflow tokens with excessive permissions
Signed-Releases:warning: -1no releases found
Fuzzing:warning: 0project is not fuzzed
Vulnerabilities:green_circle: 100 existing vulnerabilities detected
Packaging:green_circle: 10packaging workflow detected
Security-Policy:green_circle: 10security policy file detected
SAST:warning: 0SAST tool is not run on all commits -- score normalized to 0
Pinned-Dependencies:warning: 0dependency not pinned by hash detected -- score normalized to 0
cargo/flate2 1.0.28 :green_circle: 7.2
Details
CheckScoreReason
Maintained:green_circle: 1018 commit(s) and 5 issue activity found in the last 90 days -- score normalized to 10
Code-Review:green_circle: 10all changesets reviewed
CII-Best-Practices:warning: 0no effort to earn an OpenSSF best practices badge detected
License:green_circle: 10license file detected
Signed-Releases:warning: -1no releases found
Packaging:warning: -1packaging workflow not detected
Binary-Artifacts:green_circle: 10no binaries found in the repo
Dangerous-Workflow:green_circle: 10no dangerous workflow patterns detected
Token-Permissions:warning: 0detected GitHub workflow tokens with excessive permissions
Branch-Protection:warning: -1internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration
Fuzzing:green_circle: 10project is fuzzed
Vulnerabilities:green_circle: 100 existing vulnerabilities detected
Security-Policy:green_circle: 10security policy file detected
SAST:warning: 0SAST tool is not run on all commits -- score normalized to 0
Pinned-Dependencies:warning: 0dependency not pinned by hash detected -- score normalized to 0
cargo/tree-sitter 0.22.5 :green_circle: 4.3
Details
CheckScoreReason
Maintained:green_circle: 1030 commit(s) and 16 issue activity found in the last 90 days -- score normalized to 10
Code-Review:green_circle: 3Found 7/22 approved changesets -- score normalized to 3
CII-Best-Practices:warning: 0no effort to earn an OpenSSF best practices badge detected
License:green_circle: 10license file detected
Signed-Releases:warning: 0Project has not signed or included provenance with any releases.
Dangerous-Workflow:green_circle: 10no dangerous workflow patterns detected
Token-Permissions:warning: 0detected GitHub workflow tokens with excessive permissions
Binary-Artifacts:green_circle: 10no binaries found in the repo
Branch-Protection:warning: 0branch protection not enabled on development/release branches
Fuzzing:warning: 0project is not fuzzed
Packaging:green_circle: 10packaging workflow detected
Security-Policy:warning: 0security policy file not detected
SAST:warning: 0SAST tool is not run on all commits -- score normalized to 0
Vulnerabilities:green_circle: 73 existing vulnerabilities detected
Pinned-Dependencies:warning: 0dependency not pinned by hash detected -- score normalized to 0

Scanned Manifest Files

Cargo.lock
  • cc@1.0.96
  • flate2@1.0.30
  • tree-sitter@0.22.6
  • cc@1.0.94
  • flate2@1.0.28
  • tree-sitter@0.22.5
dependabot[bot] commented 4 months ago

This pull request was built based on a group rule. Closing it will not ignore any of these versions in future pull requests.

To ignore these dependencies, configure ignore rules in dependabot.yml

dependabot[bot] commented 4 months ago

This pull request was built based on a group rule. Closing it will not ignore any of these versions in future pull requests.

To ignore these dependencies, configure ignore rules in dependabot.yml