intelops / genval

Simplifies configuration management for a wide range of tools, including Dockerfile, Kubernetes manifests, and other infrastructure files.
Apache License 2.0
6 stars 5 forks source link

Upgrade: Bump github/codeql-action from 3.26.6 to 3.26.7 #160

Closed dependabot[bot] closed 1 month ago

dependabot[bot] commented 1 month ago

Bumps github/codeql-action from 3.26.6 to 3.26.7.

Changelog

Sourced from github/codeql-action's changelog.

CodeQL Action Changelog

See the releases page for the relevant changes to the CodeQL CLI and language packs.

Note that the only difference between v2 and v3 of the CodeQL Action is the node version they support, with v3 running on node 20 while we continue to release v2 to support running on node 16. For example 3.22.11 was the first v3 release and is functionally identical to 2.22.11. This approach ensures an easy way to track exactly which features are included in different versions, indicated by the minor and patch version numbers.

[UNRELEASED]

No user facing changes.

3.26.7 - 13 Sep 2024

  • Update default CodeQL bundle version to 2.18.4. #2471

3.26.6 - 29 Aug 2024

  • Update default CodeQL bundle version to 2.18.3. #2449

3.26.5 - 23 Aug 2024

  • Fix an issue where the csrutil system call used for telemetry would fail on MacOS ARM machines with System Integrity Protection disabled. #2441

3.26.4 - 21 Aug 2024

  • Deprecation: The add-snippets input on the analyze Action is deprecated and will be removed in the first release in August 2025. #2436
  • Fix an issue where the disk usage system call used for telemetry would fail on MacOS ARM machines with System Integrity Protection disabled, and then surface a warning. The system call is now disabled for these machines. #2434

3.26.3 - 19 Aug 2024

  • Fix an issue where the CodeQL Action could not write diagnostic messages on Windows. This issue did not impact analysis quality. #2430

3.26.2 - 14 Aug 2024

  • Update default CodeQL bundle version to 2.18.2. #2417

3.26.1 - 13 Aug 2024

No user facing changes.

3.26.0 - 06 Aug 2024

  • Deprecation: Swift analysis on Ubuntu runner images is no longer supported. Please migrate to a macOS runner if this affects you. #2403
  • Bump the minimum CodeQL bundle version to 2.13.5. #2408

3.25.15 - 26 Jul 2024

  • Update default CodeQL bundle version to 2.18.1. #2385

3.25.14 - 25 Jul 2024

... (truncated)

Commits
  • 8214744 Merge pull request #2478 from github/update-v3.26.7-4a01ec798
  • a3b3e07 Update changelog for v3.26.7
  • 4a01ec7 Merge pull request #2474 from github/aeisenberg/always-upload-eslint-sarif
  • 762dbae Merge pull request #2471 from github/update-bundle/codeql-bundle-v2.18.4
  • 0d0f998 Always upload eslint.sarif
  • e817992 Merge pull request #2469 from github/aeisenberg/upload-eslint-sarif
  • 49021ad Merge pull request #2472 from rvermeulen/rvermeulen/update-release-branch-authz
  • 56b8418 Ignore suppressed alerts
  • f824adb Merge branch 'main' into rvermeulen/update-release-branch-authz
  • 8d9ed0b Add changelog note
  • Additional commits viewable in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
dryrunsecurity[bot] commented 1 month ago

DryRun Security Summary

The pull request updates the GitHub Actions workflow configuration to enhance the security posture of the project by updating the version of the github/codeql-action/upload-sarif action and ensuring that the Trivy vulnerability scanning results are properly uploaded to the GitHub Security tab in SARIF format.

Expand for full summary
**Summary:** The code changes in this pull request are focused on updating the GitHub Actions workflow configuration file `.github/workflows/ci.yaml`. The key changes include updating the version of the `github/codeql-action/upload-sarif` action used in the workflow and ensuring that the Trivy vulnerability scanning results are properly uploaded to the GitHub Security tab. From an application security perspective, these changes are positive steps towards improving the security posture of the project. The inclusion of Trivy vulnerability scanning and the upload of SARIF-formatted scan results to the GitHub Security tab allow for better visibility and monitoring of potential security issues. While version updates can sometimes introduce changes or new features, the changes in this pull request appear to be focused on enhancing the security practices without introducing any obvious security concerns. **Files Changed:** - `.github/workflows/ci.yaml`: This file contains the GitHub Actions workflow configuration. The changes in this pull request update the version of the `github/codeql-action/upload-sarif` action used in the workflow and ensure that the Trivy vulnerability scanning results are properly uploaded to the GitHub Security tab in SARIF format. These changes are aimed at improving the security posture of the project by enabling better visibility and monitoring of potential vulnerabilities.

Code Analysis

We ran 9 analyzers against 1 file and 0 analyzers had findings. 9 analyzers had no findings.

Riskiness

:green_circle: Risk threshold not exceeded.

View PR in the DryRun Dashboard.