Merge pull request #2113 from github/update-v3.24.0-2db032717 · github/codeql-action@e8893c5 (original) (raw)

87 files changed

lines changed

Original file line number Diff line number Diff line change
@@ -4,6 +4,10 @@ See the [releases page](https://github.com/github/codeql-action/releases) for th
4 4
5 5 Note that the only difference between `v2` and `v3` of the CodeQL Action is the node version they support, with `v3` running on node 20 while we continue to release `v2` to support running on node 16. For example `3.22.11` was the first `v3` release and is functionally identical to `2.22.11`. This approach ensures an easy way to track exactly which features are included in different versions, indicated by the minor and patch version numbers.
6 6
7 +## 3.24.0 - 02 Feb 2024
8 +
9 +- CodeQL Python analysis will no longer install dependencies on GitHub Enterprise Server, as is already the case for GitHub.com. See [release notes for 3.23.0](#3230---08-jan-2024) for more details. [#2106](https://github.com/github/codeql-action/pull/2106)
10 +
7 11 ## 3.23.2 - 26 Jan 2024
8 12
9 13 - On Linux, the maximum possible value for the `--threads` option now respects the CPU count as specified in `cgroup` files to more accurately reflect the number of available cores when running in containers. [#2083](https://github.com/github/codeql-action/pull/2083)
Original file line number Diff line number Diff line change
@@ -16,6 +16,19 @@ We recommend using default setup to configure CodeQL analysis for your repositor
16 16
17 17 You can also configure advanced setup for a repository to find security vulnerabilities in your code using a highly customizable code scanning configuration. For more information, see "[Configuring advanced setup for code scanning](https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/configuring-advanced-setup-for-code-scanning)" and "[Customizing your advanced setup for code scanning](https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning)."
18 18
19 +## Supported versions of the CodeQL Action
20 +
21 +The following versions of the CodeQL Action are currently supported:
22 +
23 +- v3 (latest)
24 +- v2 (deprecated, support will end on December 5th, 2024)
25 +
26 +The only difference between CodeQL Action v2 and v3 is the version of Node.js on which they run. CodeQL Action v3 runs on Node 20, while CodeQL Action v2 runs on Node 16.
27 +
28 +To provide the best experience to customers using older versions of GitHub Enterprise Server, we will continue to release CodeQL Action v2 so that these customers can continue to run the latest version of CodeQL as long as their version of GitHub Enterprise Server is supported. For example CodeQL Action v3.22.11 was the first release of CodeQL Action v3 and is functionally identical to v2.22.11. This approach provides an easy way to track exactly which features are included in different versions by looking at the minor and patch version numbers.
29 +
30 +For more information, see ["Code scanning: deprecation of CodeQL Action v2."](https://github.blog/changelog/2024-01-12-code-scanning-deprecation-of-codeql-action-v2/).
31 +
19 32 ## Troubleshooting
20 33
21 34 Read about [troubleshooting code scanning](https://docs.github.com/en/code-security/code-scanning/troubleshooting-code-scanning).
Original file line number Diff line number Diff line change
@@ -52,10 +52,10 @@ inputs:
52 52 # If changing this, make sure to update workflow.ts accordingly.
53 53 default: ${{ github.workspace }}
54 54 ref:
55 -description: "The ref where results will be uploaded. If not provided, the Action will use the GITHUB_REF environment variable. If provided, the sha input must be provided as well. This input is not available in pull requests from forks."
55 +description: "The ref where results will be uploaded. If not provided, the Action will use the GITHUB_REF environment variable. If provided, the sha input must be provided as well. This input is ignored for pull requests from forks."
56 56 required: false
57 57 sha:
58 -description: "The sha of the HEAD of the ref where results will be uploaded. If not provided, the Action will use the GITHUB_SHA environment variable. If provided, the ref input must be provided as well. This input is not available in pull requests from forks."
58 +description: "The sha of the HEAD of the ref where results will be uploaded. If not provided, the Action will use the GITHUB_SHA environment variable. If provided, the ref input must be provided as well. This input is ignored for pull requests from forks."
59 59 required: false
60 60 category:
61 61 description: String used by Code Scanning for matching the analyses
Original file line number Diff line number Diff line change
@@ -10,6 +10,23 @@ inputs:
10 10 description: |
11 11 A comma-separated value of the languages to be analysed e.g. python,javascript
12 12 required: false
13 +build-mode:
14 +description: >-
15 + [Experimental, for internal testing only] The build mode that will be used to analyze the language.
16 + This input is only available in single-language analyses.
17 +
18 + Available build modes will differ based on the language being analyzed. One of:
19 +
20 + - none: The database will be created without building the source code.
21 + Available for all interpreted languages and some compiled languages.
22 + - autobuild: The database will be created by attempting to automatically build the source code.
23 + To use this build mode, ensure that your workflow calls the `autobuild` action
24 + between the `init` and `analyze` steps.
25 + Available for all compiled languages.
26 + - manual: The database will be created by building the source code using a manually specified
27 + build command. To use this build mode, specify manual build steps in your workflow
28 + between the `init` and `analyze` steps. Available for all compiled languages.
29 + required: false
13 30 token:
14 31 description: GitHub token to use for authenticating with this instance of GitHub. To download custom packs from multiple registries, use the registries input.
15 32 default: ${{ github.token }}