intelops / genval

Simplifies configuration management for a wide range of tools, including Dockerfile, Kubernetes manifests, and other infrastructure files.
Apache License 2.0
6 stars 5 forks source link

Upgrade: Bump github/codeql-action from 3.26.0 to 3.26.2 #153

Closed dependabot[bot] closed 2 months ago

dependabot[bot] commented 2 months ago

Bumps github/codeql-action from 3.26.0 to 3.26.2.

Changelog

Sourced from github/codeql-action's changelog.

CodeQL Action Changelog

See the releases page for the relevant changes to the CodeQL CLI and language packs.

Note that the only difference between v2 and v3 of the CodeQL Action is the node version they support, with v3 running on node 20 while we continue to release v2 to support running on node 16. For example 3.22.11 was the first v3 release and is functionally identical to 2.22.11. This approach ensures an easy way to track exactly which features are included in different versions, indicated by the minor and patch version numbers.

[UNRELEASED]

No user facing changes.

3.26.2 - 14 Aug 2024

  • Update default CodeQL bundle version to 2.18.2. #2417

3.26.1 - 13 Aug 2024

No user facing changes.

3.26.0 - 06 Aug 2024

  • Deprecation: Swift analysis on Ubuntu runner images is no longer supported. Please migrate to a macOS runner if this affects you. #2403
  • Bump the minimum CodeQL bundle version to 2.13.5. #2408

3.25.15 - 26 Jul 2024

  • Update default CodeQL bundle version to 2.18.1. #2385

3.25.14 - 25 Jul 2024

  • Experimental: add a new start-proxy action which starts the same HTTP proxy as used by github/dependabot-action. Do not use this in production as it is part of an internal experiment and subject to change at any time. #2376

3.25.13 - 19 Jul 2024

  • Add codeql-version to outputs. #2368
  • Add a deprecation warning for customers using CodeQL version 2.13.4 and earlier. These versions of CodeQL were discontinued on 9 July 2024 alongside GitHub Enterprise Server 3.9, and will be unsupported by CodeQL Action versions 3.26.0 and later and versions 2.26.0 and later. #2375
    • If you are using one of these versions, please update to CodeQL CLI version 2.13.5 or later. For instance, if you have specified a custom version of the CLI using the 'tools' input to the 'init' Action, you can remove this input to use the default version.
    • Alternatively, if you want to continue using a version of the CodeQL CLI between 2.12.6 and 2.13.4, you can replace github/codeql-action/*@v3 by github/codeql-action/*@v3.25.13 and github/codeql-action/*@v2 by github/codeql-action/*@v2.25.13 in your code scanning workflow to ensure you continue using this version of the CodeQL Action.

3.25.12 - 12 Jul 2024

  • Improve the reliability and performance of analyzing code when analyzing a compiled language with the autobuild build mode on GitHub Enterprise Server. This feature is already available to GitHub.com users. #2353
  • Update default CodeQL bundle version to 2.18.0. #2364

3.25.11 - 28 Jun 2024

  • Avoid failing the workflow run if there is an error while uploading debug artifacts. #2349
  • Update default CodeQL bundle version to 2.17.6. #2352

3.25.10 - 13 Jun 2024

... (truncated)

Commits
  • 429e197 Merge pull request #2425 from github/update-v3.26.2-a93f8c2fd
  • 9eec338 Update changelog for v3.26.2
  • a93f8c2 Merge pull request #2423 from github/mergeback/v3.26.1-to-main-29d86d22
  • af1f2e8 Address incorrect CHANGELOG.md
  • 2bc3b83 Update checked-in dependencies
  • dd9700c Reapply "Merge pull request #2417 from github/update-bundle/codeql-bundle-v2....
  • ece28a8 Update changelog and version after v3.26.1
  • 29d86d2 Merge pull request #2422 from github/update-v3.26.1-0d5982aa3
  • 5b15b9e Revert "Merge pull request #2417 from github/update-bundle/codeql-bundle-v2.1...
  • 18ac79e Update changelog for v3.26.1
  • Additional commits viewable in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
dryrunsecurity[bot] commented 2 months ago

DryRun Security Summary

The pull request updates the version of the github/codeql-action/upload-sarif action used in the GitHub Actions workflow to improve the integration of the Trivy vulnerability scanner results with the GitHub Security tab.

Expand for full summary
**Summary:** The code change in this pull request is related to the GitHub Actions workflow for a continuous integration (CI) pipeline. The changes involve updating the version of the `github/codeql-action/upload-sarif` action used in the workflow. This action is responsible for uploading the results of the Trivy vulnerability scanner to the GitHub Security tab. From an application security perspective, the changes are positive and demonstrate the team's commitment to maintaining a secure codebase. The CI workflow includes a step that runs the Trivy vulnerability scanner against the repository in "fs" (file system) mode, which helps identify and address potential vulnerabilities. The Trivy scan is configured to only report vulnerabilities with "CRITICAL" or "HIGH" severity, which is a reasonable approach to focus on the most critical issues. The Trivy scan results are saved in the SARIF (Static Analysis Results Interchange Format) format, which allows the results to be easily integrated with other security tools and processes. The updated version of the `github/codeql-action/upload-sarif` action ensures that the security findings are easily accessible within the GitHub platform, enabling developers and security teams to review and address the identified issues. **Files Changed:** - `.github/workflows/ci.yaml`: This file is the configuration file for the CI workflow. The changes update the version of the `github/codeql-action/upload-sarif` action from `eb055d739abdc2e8de2e5f4ba1a8b246daa779aa # v3` to `429e1977040da7a23b6822b13c129cd1ba93dbb2 # v3`. This action is responsible for uploading the results of the Trivy vulnerability scanner to the GitHub Security tab.

Code Analysis

We ran 9 analyzers against 1 file and 0 analyzers had findings. 9 analyzers had no findings.

Riskiness

:green_circle: Risk threshold not exceeded.

View PR in the DryRun Dashboard.