intelops / genval

Simplifies configuration management for a wide range of tools, including Dockerfile, Kubernetes manifests, and other infrastructure files.
Apache License 2.0
6 stars 5 forks source link

Upgrade: Bump github/codeql-action from 3.26.7 to 3.26.11 #172

Closed dependabot[bot] closed 2 weeks ago

dependabot[bot] commented 3 weeks ago

Bumps github/codeql-action from 3.26.7 to 3.26.11.

Changelog

Sourced from github/codeql-action's changelog.

CodeQL Action Changelog

See the releases page for the relevant changes to the CodeQL CLI and language packs.

Note that the only difference between v2 and v3 of the CodeQL Action is the node version they support, with v3 running on node 20 while we continue to release v2 to support running on node 16. For example 3.22.11 was the first v3 release and is functionally identical to 2.22.11. This approach ensures an easy way to track exactly which features are included in different versions, indicated by the minor and patch version numbers.

[UNRELEASED]

  • Upcoming breaking change: Add a deprecation warning for customers using CodeQL version 2.14.5 and earlier. These versions of CodeQL were discontinued on 24 September 2024 alongside GitHub Enterprise Server 3.10, and will be unsupported by CodeQL Action versions 3.27.0 and later and versions 2.27.0 and later. #2520

    • If you are using one of these versions, please update to CodeQL CLI version 2.14.6 or later. For instance, if you have specified a custom version of the CLI using the 'tools' input to the 'init' Action, you can remove this input to use the default version.

    • Alternatively, if you want to continue using a version of the CodeQL CLI between 2.13.5 and 2.14.5, you can replace github/codeql-action/*@v3 by github/codeql-action/*@v3.26.11 and github/codeql-action/*@v2 by github/codeql-action/*@v2.26.11 in your code scanning workflow to ensure you continue using this version of the CodeQL Action.

3.26.11 - 03 Oct 2024

  • Upcoming breaking change: Add support for using actions/download-artifact@v4 to programmatically consume CodeQL Action debug artifacts.

    Starting November 30, 2024, GitHub.com customers will no longer be able to use actions/download-artifact@v3. Therefore, to avoid breakage, customers who programmatically download the CodeQL Action debug artifacts should set the CODEQL_ACTION_ARTIFACT_V4_UPGRADE environment variable to true and bump actions/download-artifact@v3 to actions/download-artifact@v4 in their workflows. The CodeQL Action will enable this behavior by default in early November and workflows that have not yet bumped to actions/download-artifact@v3 to actions/download-artifact@v4 will begin failing then.

    This change is currently unavailable for GitHub Enterprise Server customers, as actions/upload-artifact@v4 and actions/download-artifact@v4 are not yet compatible with GHES.

  • Update default CodeQL bundle version to 2.19.1. #2519

3.26.10 - 30 Sep 2024

  • We are rolling out a feature in September/October 2024 that sets up CodeQL using a bundle compressed with Zstandard. Our aim is to improve the performance of setting up CodeQL. #2502

3.26.9 - 24 Sep 2024

No user facing changes.

3.26.8 - 19 Sep 2024

  • Update default CodeQL bundle version to 2.19.0. #2483

3.26.7 - 13 Sep 2024

  • Update default CodeQL bundle version to 2.18.4. #2471

3.26.6 - 29 Aug 2024

  • Update default CodeQL bundle version to 2.18.3. #2449

3.26.5 - 23 Aug 2024

  • Fix an issue where the csrutil system call used for telemetry would fail on MacOS ARM machines with System Integrity Protection disabled. #2441

3.26.4 - 21 Aug 2024

  • Deprecation: The add-snippets input on the analyze Action is deprecated and will be removed in the first release in August 2025. #2436

... (truncated)

Commits
  • 6db8d63 Merge pull request #2522 from github/update-v3.26.11-8aba5f2c4
  • 389647f Update changelog for v3.26.11
  • 8aba5f2 Merge pull request #2516 from github/aeisenberg/dependabot-exclude
  • ecac2c6 Exclupde eslint-plugin-import updates from dependabot
  • e85017e Merge pull request #2514 from github/henrymercer/zstd-better-failure-logging
  • a60db1d Add notice for dependency upgrade timeline (#2513)
  • 28db28f Improve clean up if extraction fails
  • 3da852e Capture stderr from extracting .tar.zst
  • c4d433c Merge pull request #2510 from github/dependabot/npm_and_yarn/npm-13baf58ce8
  • 2f6cf48 Undo eslint-plugin-import bump
  • Additional commits viewable in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
dryrunsecurity[bot] commented 3 weeks ago

DryRun Security Summary

The provided code change updates the version of the github/codeql-action/upload-sarif action in a GitHub Actions workflow file, which is used to upload the results of the Trivy vulnerability scanner to the GitHub Security tab, and the rest of the workflow file performs standard security-related tasks.

Expand for full summary
**Summary:** The provided code change is related to a GitHub Actions workflow file that sets up a continuous integration (CI) pipeline for a project. The key change in this pull request is an update to the version of the `github/codeql-action/upload-sarif` action, which is used to upload the results of the Trivy vulnerability scanner to the GitHub Security tab. The rest of the workflow file performs standard security-related tasks, such as running tests, linting the code, performing static code analysis, and scanning the codebase for vulnerabilities using the Trivy tool. From an application security perspective, the changes in this pull request do not introduce any significant security risks or concerns. The updates are focused on improving the overall security posture of the project through standard security practices, which is a positive step. While the changes are not particularly noteworthy from a security standpoint, it's important to ensure that the dependencies and tools used in the CI pipeline are kept up-to-date to maintain the project's security integrity. **Files Changed:** - `.github/workflows/ci.yaml`: This file sets up the continuous integration (CI) pipeline for the project. The key change in this pull request is an update to the version of the `github/codeql-action/upload-sarif` action, which is used to upload the results of the Trivy vulnerability scanner to the GitHub Security tab. The rest of the workflow file performs standard security-related tasks, such as running tests, linting the code, performing static code analysis, and scanning the codebase for vulnerabilities using the Trivy tool.

Code Analysis

We ran 9 analyzers against 1 file and 0 analyzers had findings. 9 analyzers had no findings.

Riskiness

:green_circle: Risk threshold not exceeded.

View PR in the DryRun Dashboard.

dryrunsecurity[bot] commented 3 weeks ago

DryRun Security Summary

The provided code change updates the version of the github/codeql-action/upload-sarif action in a GitHub Actions workflow file, which is used to upload the results of the Trivy vulnerability scanner to the GitHub Security tab, as part of a continuous integration (CI) pipeline that performs various security-related tasks.

Expand for full summary
**Summary:** The provided code change is related to a GitHub Actions workflow file that sets up a continuous integration (CI) pipeline for a project. The key change in this pull request is an update to the version of the `github/codeql-action/upload-sarif` action, which is used to upload the results of the Trivy vulnerability scanner to the GitHub Security tab. The rest of the workflow file performs standard security-related tasks, such as running tests, linting the code, performing static code analysis, and scanning the codebase for vulnerabilities using the Trivy tool. From an application security perspective, the changes in this pull request do not introduce any significant security risks or concerns. The updates are focused on improving the overall security posture of the project through standard security practices, which is a positive step. While the changes are not particularly noteworthy from a security standpoint, it's important to ensure that the dependencies and tools used in the CI pipeline are kept up-to-date to maintain the project's security integrity. **Files Changed:** - `.github/workflows/ci.yaml`: This file sets up the continuous integration (CI) pipeline for the project. The key change in this pull request is an update to the version of the `github/codeql-action/upload-sarif` action, which is used to upload the results of the Trivy vulnerability scanner to the GitHub Security tab. The rest of the workflow file performs standard security-related tasks, such as running tests, linting the code, performing static code analysis, and scanning the codebase for vulnerabilities using the Trivy tool.

Code Analysis

We ran 9 analyzers against 1 file and 0 analyzers had findings. 9 analyzers had no findings.

Riskiness

:green_circle: Risk threshold not exceeded.

View PR in the DryRun Dashboard.

dependabot[bot] commented 2 weeks ago

Superseded by #177.