Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Build(deps): Bump github/codeql-action from 2.21.5 to 2.21.8 #100

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Sep 21, 2023

Bumps github/codeql-action from 2.21.5 to 2.21.8.

Changelog

Sourced from github/codeql-action's changelog.

2.21.8 - 19 Sep 2023

  • Add a deprecation warning for customers using CodeQL version 2.10.4 and earlier. These versions of CodeQL were discontinued on 12 September 2023 alongside GitHub Enterprise Server 3.6, and will be unsupported by the next minor release of the CodeQL Action. #1884
    • If you are using one of these versions, please update to CodeQL CLI version 2.10.5 or later. For instance, if you have specified a custom version of the CLI using the 'tools' input to the 'init' Action, you can remove this input to use the default version.
    • Alternatively, if you want to continue using a version of the CodeQL CLI between 2.9.5 and 2.10.4, you can replace github/codeql-action/*@v2 by github/codeql-action/*@v2.21.7 in your code scanning workflow to ensure you continue using this version of the CodeQL Action.
  • Enable the following language aliases when using CodeQL 2.14.4 and later: c-cpp for C/C++ analysis, java-kotlin for Java/Kotlin analysis, and javascript-typescript for JavaScript/TypeScript analysis. #1883

2.21.7 - 14 Sep 2023

  • Update default CodeQL bundle version to 2.14.5. #1882

2.21.6 - 13 Sep 2023

  • Better error message when there is a failure to determine the merge base of the code to analysis. #1860
  • Improve the calculation of default amount of RAM used for query execution on GitHub Enterprise Server. This now reduces in proportion to the runner's total memory to better account for system memory usage, helping to avoid out-of-memory failures on larger runners. This feature is already available to GitHub.com users. #1866
  • Enable improved file coverage information for GitHub Enterprise Server users. This feature is already available to GitHub.com users. #1867
  • Update default CodeQL bundle version to 2.14.4. #1873
Commits
  • 6a28655 Merge pull request #1893 from github/update-v2.21.8-dd1128f4f
  • 2ca983a Update changelog for v2.21.8
  • dd1128f Bump the npm group with 11 updates (#1892)
  • f3a128e Merge pull request #1891 from github/henrymercer/fix-cgroup-limits
  • 6846be0 Address review comments
  • 0e74cd1 Handle cgroup file containing MAX_INT on ubuntu-20.04
  • 379f89d Log cgroup RAM limits
  • 253d9cf Matrix CodeQL CI job over all runner images
  • 4254f3a Merge pull request #1888 from github/henrymercer/constrained-ram
  • 9bfb9ba Handle files that exist but whose contents are not integers
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [github/codeql-action](https://github.com/github/codeql-action) from 2.21.5 to 2.21.8.
- [Release notes](https://github.com/github/codeql-action/releases)
- [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md)
- [Commits](github/codeql-action@v2.21.5...v2.21.8)

---
updated-dependencies:
- dependency-name: github/codeql-action
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Sep 21, 2023
@dependabot dependabot bot force-pushed the dependabot/github_actions/develop/github/codeql-action-2.21.8 branch from 358b8d3 to 9ea0792 Compare September 21, 2023 10:07
@dependabot dependabot bot added the github_actions Pull requests that update GitHub Actions code label Sep 21, 2023
@@ -189,7 +189,7 @@
snyk.sarif

- name: Upload results to GitHub Security
uses: github/codeql-action/[email protected].5
uses: github/codeql-action/[email protected].8

Check warning

Code scanning / Semgrep

Semgrep Finding: yaml.github-actions.security.third-party-action-not-pinned-to-commit-sha.third-party-action-not-pinned-to-commit-sha Warning

An action sourced from a third-party repository on GitHub is not pinned to a full length commit SHA. Pinning an action to a full length commit SHA is currently the only way to use an action as an immutable release. Pinning to a particular SHA helps mitigate the risk of a bad actor adding a backdoor to the action's repository, as they would need to generate a SHA-1 collision for a valid Git object payload.
@@ -441,7 +441,7 @@
*.sarif

- name: Upload results to GitHub Security
uses: github/codeql-action/[email protected].5
uses: github/codeql-action/[email protected].8

Check warning

Code scanning / Semgrep

Semgrep Finding: yaml.github-actions.security.third-party-action-not-pinned-to-commit-sha.third-party-action-not-pinned-to-commit-sha Warning

An action sourced from a third-party repository on GitHub is not pinned to a full length commit SHA. Pinning an action to a full length commit SHA is currently the only way to use an action as an immutable release. Pinning to a particular SHA helps mitigate the risk of a bad actor adding a backdoor to the action's repository, as they would need to generate a SHA-1 collision for a valid Git object payload.
@@ -641,7 +641,7 @@
${{ steps.tag.outputs.tag }}

- name: Upload results to GitHub Security
uses: github/codeql-action/[email protected].5
uses: github/codeql-action/[email protected].8

Check warning

Code scanning / Semgrep

Semgrep Finding: yaml.github-actions.security.third-party-action-not-pinned-to-commit-sha.third-party-action-not-pinned-to-commit-sha Warning

An action sourced from a third-party repository on GitHub is not pinned to a full length commit SHA. Pinning an action to a full length commit SHA is currently the only way to use an action as an immutable release. Pinning to a particular SHA helps mitigate the risk of a bad actor adding a backdoor to the action's repository, as they would need to generate a SHA-1 collision for a valid Git object payload.
@@ -662,7 +662,7 @@
run: semgrep ci --sarif --output=semgrep.sarif

- name: Upload results to GitHub Security
uses: github/codeql-action/[email protected].5
uses: github/codeql-action/[email protected].8

Check warning

Code scanning / Semgrep

Semgrep Finding: yaml.github-actions.security.third-party-action-not-pinned-to-commit-sha.third-party-action-not-pinned-to-commit-sha Warning

An action sourced from a third-party repository on GitHub is not pinned to a full length commit SHA. Pinning an action to a full length commit SHA is currently the only way to use an action as an immutable release. Pinning to a particular SHA helps mitigate the risk of a bad actor adding a backdoor to the action's repository, as they would need to generate a SHA-1 collision for a valid Git object payload.
@dependabot @github
Copy link
Contributor Author

dependabot bot commented on behalf of github Sep 28, 2023

Superseded by #104.

@dependabot dependabot bot closed this Sep 28, 2023
@dependabot dependabot bot deleted the dependabot/github_actions/develop/github/codeql-action-2.21.8 branch September 28, 2023 09:38
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file github_actions Pull requests that update GitHub Actions code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants