Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

build(deps): bump github/codeql-action from 3.26.5 to 3.26.6 #435

Closed

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Sep 2, 2024

Bumps github/codeql-action from 3.26.5 to 3.26.6.

Changelog

Sourced from github/codeql-action's changelog.

CodeQL Action Changelog

See the releases page for the relevant changes to the CodeQL CLI and language packs.

Note that the only difference between v2 and v3 of the CodeQL Action is the node version they support, with v3 running on node 20 while we continue to release v2 to support running on node 16. For example 3.22.11 was the first v3 release and is functionally identical to 2.22.11. This approach ensures an easy way to track exactly which features are included in different versions, indicated by the minor and patch version numbers.

[UNRELEASED]

No user facing changes.

3.26.6 - 29 Aug 2024

  • Update default CodeQL bundle version to 2.18.3. #2449

3.26.5 - 23 Aug 2024

  • Fix an issue where the csrutil system call used for telemetry would fail on MacOS ARM machines with System Integrity Protection disabled. #2441

3.26.4 - 21 Aug 2024

  • Deprecation: The add-snippets input on the analyze Action is deprecated and will be removed in the first release in August 2025. #2436
  • Fix an issue where the disk usage system call used for telemetry would fail on MacOS ARM machines with System Integrity Protection disabled, and then surface a warning. The system call is now disabled for these machines. #2434

3.26.3 - 19 Aug 2024

  • Fix an issue where the CodeQL Action could not write diagnostic messages on Windows. This issue did not impact analysis quality. #2430

3.26.2 - 14 Aug 2024

  • Update default CodeQL bundle version to 2.18.2. #2417

3.26.1 - 13 Aug 2024

No user facing changes.

3.26.0 - 06 Aug 2024

  • Deprecation: Swift analysis on Ubuntu runner images is no longer supported. Please migrate to a macOS runner if this affects you. #2403
  • Bump the minimum CodeQL bundle version to 2.13.5. #2408

3.25.15 - 26 Jul 2024

  • Update default CodeQL bundle version to 2.18.1. #2385

3.25.14 - 25 Jul 2024

  • Experimental: add a new start-proxy action which starts the same HTTP proxy as used by github/dependabot-action. Do not use this in production as it is part of an internal experiment and subject to change at any time. #2376

3.25.13 - 19 Jul 2024

... (truncated)

Commits
  • 4dd1613 Merge pull request #2452 from github/update-v3.26.6-7233ec5e6
  • dd9dd2d Update changelog for v3.26.6
  • 7233ec5 Merge pull request #2449 from github/update-bundle/codeql-bundle-v2.18.3
  • a32c44d Add changelog note
  • 2966897 Update default bundle to codeql-bundle-v2.18.3
  • b8efe4d Merge pull request #2435 from github/update-supported-enterprise-server-versions
  • ab408a8 Merge branch 'main' into update-supported-enterprise-server-versions
  • 864b979 Merge pull request #2443 from github/dbartol/config-file-telemetry
  • d36c7aa Merge pull request #2448 from github/dependabot/npm_and_yarn/npm-09b7c43f6b
  • b3bf514 Update checked-in dependencies
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [github/codeql-action](https://github.com/github/codeql-action) from 3.26.5 to 3.26.6.
- [Release notes](https://github.com/github/codeql-action/releases)
- [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md)
- [Commits](github/codeql-action@2c779ab...4dd1613)

---
updated-dependencies:
- dependency-name: github/codeql-action
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Sep 2, 2024
@@ -25,11 +25,11 @@ jobs:
check-latest: true

- name: Initialize CodeQL
uses: github/codeql-action/init@2c779ab0d087cd7fe7b826087247c2c81f27bfa6 # v3
uses: github/codeql-action/init@4dd16135b69a43b6c8efb853346f8437d92d3c93 # v3
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@mythi I'd welcome the v3 here as well to avoid changing it all the time, what do you think?

Copy link
Contributor

@mythi mythi Sep 2, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm proposing we move away from tags to sha:s for added security. "all the time" is tunable in Dependabot settings: it's no weekly but it can be monthly of course as well.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The question is whether we are checking the changes in those GH actions before updating them. TBH I have not reviewed the history between 2c77 and 4dd1 as I do trust codeql-action organization.

We can either be paranoiac but then we need strict guidelines to update the dependencies (basically audit or at least review all the to-be-updated actions) but without such guidelines I don't see much sense in the additional overhead.

In the real-life I'd go with something in the middle meaning we can identify organizations we trust and use tags there (like action/checkout) and start using hashes for those we don't trust and add a comment reminding us to review that action code (or at least history) before updating and mention it's for security reasons. Would that work for you?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do you see problems using it like this? The frequency of the PRs is a separate topic. Dependabot prepares easy to review Changelog and Commits lists in the PR cover letter so checking the changes is easy. The automation takes care of the updates so I don't see a huge difference between a tag vs a sha.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If we accommodate the shas with simple comment reminding reviewers to check the GH action log then I'm fine with using shas. Although I'd only do that where needed as every change needs to be reviewed by 2 people, CI needs to be performed (even though it won't test the change as we run on pull_request_target) so yes, it takes time.

Anyway I'm only speaking from my point of view and I'm not maintaining any self-provisioned runners so I think this question should be raised among those who take care of them.

Copy link
Contributor

@mythi mythi Sep 5, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah I am not really convinced by the benefits of using hashes.

I've moved to use them in a few places. Not because of being paranoid but mainly because it's considered a good security practice. That practice is also checked by tools like OpenSSF Scorecard so if our repos are benchmarked using that common tooling, it shows we are "compliant".

After all, the automation takes care of the updates and we get them on a regular basis (like this PR). If the weekly cadence is too high, we can make it monthly.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

One thing I haven't found in docs (maybe I'm blind) is whether by choosing hashes dependabot will offer the latest main, latest tagged or latest tagged of the version that was previously tagged sha? Or if it uses the comment next to it as "stream" guidance?

Als I'd really like to know what is expected of us during the review. Should it be just yeah, dependabot, merge this or let's check the changelog or review the commit log or look at the git diff of that action and look for potential threats. If we decide we have different needs for different actions then I'd like the "non-default" review policy to be stated in comment, something like:

# Use `git diff` to check changes on this GH action to prevent security issues
uses: github/codeql-action/init@4dd16135b69a43b6c8efb853346f8437d92d3c93 # v3

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

latest tagged or latest tagged of the version that was previously tagged sha?

I don't know what the latter means. My experience is it picks up the sha corresponding to the latest tag. The Actions tab has logs, maybe that helps.

I'd really like to know what is expected of us during the review

this is separate from the sha conversation. I'm usually reading the changelog added in the cover letter.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks, I got the same impression (latest tagged sha).

It's actually important to know what is expected of us to be reviewed. Without that discussion there is no guideline to merge this PR (I know we merged the other PRs already but here we already have some people to discuss it with, which is why I'd like to finish this discussion first).

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, that's ok. I don't have any other review guideline suggestions to add. Most of coco repos have had dependabot enabled and it's been working well. Here we probably want to enable it for Go dependencies too.

Copy link
Contributor Author

dependabot bot commented on behalf of github Sep 14, 2024

Superseded by #443.

@dependabot dependabot bot closed this Sep 14, 2024
@dependabot dependabot bot deleted the dependabot/github_actions/github/codeql-action-3.26.6 branch September 14, 2024 00:59
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants