Merge pull request #2113 from github/update-v3.24.0-2db032717 · github/codeql-action@e8893c5 (original) (raw)
87 files changed
lines changed
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -4,6 +4,10 @@ See the [releases page](https://github.com/github/codeql-action/releases) for th | ||
4 | 4 | |
5 | 5 | Note that the only difference between `v2` and `v3` of the CodeQL Action is the node version they support, with `v3` running on node 20 while we continue to release `v2` to support running on node 16. For example `3.22.11` was the first `v3` release and is functionally identical to `2.22.11`. This approach ensures an easy way to track exactly which features are included in different versions, indicated by the minor and patch version numbers. |
6 | 6 | |
7 | +## 3.24.0 - 02 Feb 2024 | |
8 | + | |
9 | +- CodeQL Python analysis will no longer install dependencies on GitHub Enterprise Server, as is already the case for GitHub.com. See [release notes for 3.23.0](#3230---08-jan-2024) for more details. [#2106](https://github.com/github/codeql-action/pull/2106) | |
10 | + | |
7 | 11 | ## 3.23.2 - 26 Jan 2024 |
8 | 12 | |
9 | 13 | - On Linux, the maximum possible value for the `--threads` option now respects the CPU count as specified in `cgroup` files to more accurately reflect the number of available cores when running in containers. [#2083](https://github.com/github/codeql-action/pull/2083) |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -16,6 +16,19 @@ We recommend using default setup to configure CodeQL analysis for your repositor | ||
16 | 16 | |
17 | 17 | You can also configure advanced setup for a repository to find security vulnerabilities in your code using a highly customizable code scanning configuration. For more information, see "[Configuring advanced setup for code scanning](https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/configuring-advanced-setup-for-code-scanning)" and "[Customizing your advanced setup for code scanning](https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning)." |
18 | 18 | |
19 | +## Supported versions of the CodeQL Action | |
20 | + | |
21 | +The following versions of the CodeQL Action are currently supported: | |
22 | + | |
23 | +- v3 (latest) | |
24 | +- v2 (deprecated, support will end on December 5th, 2024) | |
25 | + | |
26 | +The only difference between CodeQL Action v2 and v3 is the version of Node.js on which they run. CodeQL Action v3 runs on Node 20, while CodeQL Action v2 runs on Node 16. | |
27 | + | |
28 | +To provide the best experience to customers using older versions of GitHub Enterprise Server, we will continue to release CodeQL Action v2 so that these customers can continue to run the latest version of CodeQL as long as their version of GitHub Enterprise Server is supported. For example CodeQL Action v3.22.11 was the first release of CodeQL Action v3 and is functionally identical to v2.22.11. This approach provides an easy way to track exactly which features are included in different versions by looking at the minor and patch version numbers. | |
29 | + | |
30 | +For more information, see ["Code scanning: deprecation of CodeQL Action v2."](https://github.blog/changelog/2024-01-12-code-scanning-deprecation-of-codeql-action-v2/). | |
31 | + | |
19 | 32 | ## Troubleshooting |
20 | 33 | |
21 | 34 | Read about [troubleshooting code scanning](https://docs.github.com/en/code-security/code-scanning/troubleshooting-code-scanning). |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -52,10 +52,10 @@ inputs: | ||
52 | 52 | # If changing this, make sure to update workflow.ts accordingly. |
53 | 53 | default: ${{ github.workspace }} |
54 | 54 | ref: |
55 | -description: "The ref where results will be uploaded. If not provided, the Action will use the GITHUB_REF environment variable. If provided, the sha input must be provided as well. This input is not available in pull requests from forks." | |
55 | +description: "The ref where results will be uploaded. If not provided, the Action will use the GITHUB_REF environment variable. If provided, the sha input must be provided as well. This input is ignored for pull requests from forks." | |
56 | 56 | required: false |
57 | 57 | sha: |
58 | -description: "The sha of the HEAD of the ref where results will be uploaded. If not provided, the Action will use the GITHUB_SHA environment variable. If provided, the ref input must be provided as well. This input is not available in pull requests from forks." | |
58 | +description: "The sha of the HEAD of the ref where results will be uploaded. If not provided, the Action will use the GITHUB_SHA environment variable. If provided, the ref input must be provided as well. This input is ignored for pull requests from forks." | |
59 | 59 | required: false |
60 | 60 | category: |
61 | 61 | description: String used by Code Scanning for matching the analyses |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -10,6 +10,23 @@ inputs: | ||
10 | 10 | description: | |
11 | 11 | A comma-separated value of the languages to be analysed e.g. python,javascript |
12 | 12 | required: false |
13 | +build-mode: | |
14 | +description: >- | |
15 | + [Experimental, for internal testing only] The build mode that will be used to analyze the language. | |
16 | + This input is only available in single-language analyses. | |
17 | + | |
18 | + Available build modes will differ based on the language being analyzed. One of: | |
19 | + | |
20 | + - none: The database will be created without building the source code. | |
21 | + Available for all interpreted languages and some compiled languages. | |
22 | + - autobuild: The database will be created by attempting to automatically build the source code. | |
23 | + To use this build mode, ensure that your workflow calls the `autobuild` action | |
24 | + between the `init` and `analyze` steps. | |
25 | + Available for all compiled languages. | |
26 | + - manual: The database will be created by building the source code using a manually specified | |
27 | + build command. To use this build mode, specify manual build steps in your workflow | |
28 | + between the `init` and `analyze` steps. Available for all compiled languages. | |
29 | + required: false | |
13 | 30 | token: |
14 | 31 | description: GitHub token to use for authenticating with this instance of GitHub. To download custom packs from multiple registries, use the registries input. |
15 | 32 | default: ${{ github.token }} |