advanced-security / codeql-extractor-iac

CodeQL Extractor, Library, and Queries for Infrastructure as Code
MIT License
40 stars 5 forks source link

build(deps): bump the extractor group across 1 directory with 2 updates #150

Closed dependabot[bot] closed 2 months ago

dependabot[bot] commented 3 months ago

Bumps the extractor group with 2 updates in the / directory: flate2 and clap.

Updates flate2 from 1.0.31 to 1.0.33

Release notes

Sourced from flate2's releases.

1.0.33 - fix minimal manifest versions

What's Changed

New Contributors

Full Changelog: https://github.com/rust-lang/flate2-rs/compare/1.0.32...1.0.33

1.0.32 - turn panic into error

What's Changed

Fix

Other

New Contributors

Full Changelog: https://github.com/rust-lang/flate2-rs/compare/1.0.31...1.0.32

Changelog

Sourced from flate2's changelog.

Changelog

All notable changes to this project will be documented in this file.

The format is based on Keep a Changelog, and this project adheres to Semantic Versioning.

Commits
  • 50852c6 Merge pull request #425 from NobodyXu/patch-1
  • a2df1db bump tested MSRV to 1.63
  • 66c6907 bump patch level for new release that builds with -Zminimal-versions
  • a5d38e8 increase minimal versions of libz-ng-sys and libz-sys to their latest rel...
  • 80fc1e5 Do not check msrv for feature zlib-rs
  • b332bac Run msrv with different features
  • f51da32 Run msrv CI on windows and macos
  • 387b9c6 Fix msrv: Run msrv checks with minimal versions
  • 367ec74 Merge pull request #423 from crazymerlyn/memerror
  • 6084e47 Bump version
  • Additional commits viewable in compare view


Updates clap from 4.5.15 to 4.5.16

Release notes

Sourced from clap's releases.

v4.5.16

[4.5.16] - 2024-08-15

Fixes

  • (derive) Improve error messages when derive feature is missing
Changelog

Sourced from clap's changelog.

[4.5.16] - 2024-08-15

Fixes

  • (derive) Improve error messages when derive feature is missing
Commits


Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore major version` will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself) - `@dependabot ignore minor version` will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself) - `@dependabot ignore ` will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself) - `@dependabot unignore ` will remove all of the ignore conditions of the specified dependency - `@dependabot unignore ` will remove the ignore condition of the specified dependency and ignore conditions
github-actions[bot] commented 3 months ago

Dependency Review

✅ No vulnerabilities or license issues or OpenSSF Scorecard issues found.

OpenSSF Scorecard

PackageVersionScoreDetails
cargo/adler2 2.0.0 UnknownUnknown
cargo/clap 4.5.16 :green_circle: 5.8
Details
CheckScoreReason
Code-Review:warning: 1Found 2/18 approved changesets -- score normalized to 1
Maintained:green_circle: 1030 commit(s) and 23 issue activity found in the last 90 days -- score normalized to 10
CII-Best-Practices:warning: 0no effort to earn an OpenSSF best practices badge detected
License:green_circle: 10license file detected
Branch-Protection:warning: -1internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration
Signed-Releases:warning: -1no releases found
Dangerous-Workflow:green_circle: 10no dangerous workflow patterns detected
Packaging:warning: -1packaging workflow not detected
Token-Permissions:green_circle: 10GitHub workflow tokens follow principle of least privilege
Binary-Artifacts:green_circle: 10no binaries found in the repo
Security-Policy:warning: 0security policy file not detected
Pinned-Dependencies:warning: 0dependency not pinned by hash detected -- score normalized to 0
Fuzzing:warning: 0project is not fuzzed
SAST:warning: 0SAST tool is not run on all commits -- score normalized to 0
Vulnerabilities:green_circle: 82 existing vulnerabilities detected
cargo/flate2 1.0.33 :green_circle: 7.2
Details
CheckScoreReason
Code-Review:green_circle: 10all changesets reviewed
Maintained:green_circle: 1027 commit(s) and 3 issue activity found in the last 90 days -- score normalized to 10
CII-Best-Practices:warning: 0no effort to earn an OpenSSF best practices badge detected
License:green_circle: 10license file detected
Signed-Releases:warning: -1no releases found
Branch-Protection:warning: -1internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration
Dangerous-Workflow:green_circle: 10no dangerous workflow patterns detected
Binary-Artifacts:green_circle: 10no binaries found in the repo
Packaging:warning: -1packaging workflow not detected
Token-Permissions:warning: 0detected GitHub workflow tokens with excessive permissions
Pinned-Dependencies:warning: 0dependency not pinned by hash detected -- score normalized to 0
Fuzzing:green_circle: 10project is fuzzed
Vulnerabilities:green_circle: 100 existing vulnerabilities detected
Security-Policy:green_circle: 10security policy file detected
SAST:warning: 0SAST tool is not run on all commits -- score normalized to 0
cargo/miniz_oxide 0.8.0 :green_circle: 4.9
Details
CheckScoreReason
Maintained:green_circle: 68 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 6
Code-Review:green_circle: 3Found 9/30 approved changesets -- score normalized to 3
CII-Best-Practices:warning: 0no effort to earn an OpenSSF best practices badge detected
License:green_circle: 10license file detected
Signed-Releases:warning: -1no releases found
Packaging:warning: -1packaging workflow not detected
Token-Permissions:warning: 0detected GitHub workflow tokens with excessive permissions
Dangerous-Workflow:green_circle: 10no dangerous workflow patterns detected
Branch-Protection:warning: 0branch protection not enabled on development/release branches
Binary-Artifacts:green_circle: 10no binaries found in the repo
Security-Policy:warning: 0security policy file not detected
Vulnerabilities:green_circle: 100 existing vulnerabilities detected
Pinned-Dependencies:warning: 0dependency not pinned by hash detected -- score normalized to 0
Fuzzing:green_circle: 10project is fuzzed
SAST:warning: 0SAST tool is not run on all commits -- score normalized to 0

Scanned Manifest Files

Cargo.lock
  • adler2@2.0.0
  • clap@4.5.16
  • flate2@1.0.33
  • miniz_oxide@0.8.0
  • adler@1.0.2
  • clap@4.5.15
  • flate2@1.0.31
  • miniz_oxide@0.7.1
dependabot[bot] commented 2 months ago

Looks like these dependencies are updatable in another way, so this is no longer needed.