Skip to content

Conversation

@dependabot
Copy link

@dependabot dependabot bot commented on behalf of github Oct 27, 2025

Bumps github/codeql-action from 3 to 4.

Release notes

Sourced from github/codeql-action's releases.

v3.31.0

CodeQL Action Changelog

See the releases page for the relevant changes to the CodeQL CLI and language packs.

3.31.0 - 24 Oct 2025

  • Bump minimum CodeQL bundle version to 2.17.6. #3223
  • When SARIF files are uploaded by the analyze or upload-sarif actions, the CodeQL Action automatically performs post-processing steps to prepare the data for the upload. Previously, these post-processing steps were only performed before an upload took place. We are now changing this so that the post-processing steps will always be performed, even when the SARIF files are not uploaded. This does not change anything for the upload-sarif action. For analyze, this may affect Advanced Setup for CodeQL users who specify a value other than always for the upload input. #3222

See the full CHANGELOG.md for more information.

v3.30.9

CodeQL Action Changelog

See the releases page for the relevant changes to the CodeQL CLI and language packs.

3.30.9 - 17 Oct 2025

  • Update default CodeQL bundle version to 2.23.3. #3205
  • Experimental: A new setup-codeql action has been added which is similar to init, except it only installs the CodeQL CLI and does not initialize a database. Do not use this in production as it is part of an internal experiment and subject to change at any time. #3204

See the full CHANGELOG.md for more information.

v3.30.8

CodeQL Action Changelog

See the releases page for the relevant changes to the CodeQL CLI and language packs.

3.30.8 - 10 Oct 2025

No user facing changes.

See the full CHANGELOG.md for more information.

v3.30.7

CodeQL Action Changelog

See the releases page for the relevant changes to the CodeQL CLI and language packs.

3.30.7 - 06 Oct 2025

No user facing changes.

See the full CHANGELOG.md for more information.

v3.30.6

CodeQL Action Changelog

See the releases page for the relevant changes to the CodeQL CLI and language packs.

... (truncated)

Changelog

Sourced from github/codeql-action's changelog.

4.31.0 - 24 Oct 2025

  • Bump minimum CodeQL bundle version to 2.17.6. #3223
  • When SARIF files are uploaded by the analyze or upload-sarif actions, the CodeQL Action automatically performs post-processing steps to prepare the data for the upload. Previously, these post-processing steps were only performed before an upload took place. We are now changing this so that the post-processing steps will always be performed, even when the SARIF files are not uploaded. This does not change anything for the upload-sarif action. For analyze, this may affect Advanced Setup for CodeQL users who specify a value other than always for the upload input. #3222

4.30.9 - 17 Oct 2025

  • Update default CodeQL bundle version to 2.23.3. #3205
  • Experimental: A new setup-codeql action has been added which is similar to init, except it only installs the CodeQL CLI and does not initialize a database. Do not use this in production as it is part of an internal experiment and subject to change at any time. #3204

4.30.8 - 10 Oct 2025

No user facing changes.

4.30.7 - 06 Oct 2025

  • [v4+ only] The CodeQL Action now runs on Node.js v24. #3169

3.30.6 - 02 Oct 2025

  • Update default CodeQL bundle version to 2.23.2. #3168

3.30.5 - 26 Sep 2025

  • We fixed a bug that was introduced in 3.30.4 with upload-sarif which resulted in files without a .sarif extension not getting uploaded. #3160

3.30.4 - 25 Sep 2025

  • We have improved the CodeQL Action's ability to validate that the workflow it is used in does not use different versions of the CodeQL Action for different workflow steps. Mixing different versions of the CodeQL Action in the same workflow is unsupported and can lead to unpredictable results. A warning will now be emitted from the codeql-action/init step if different versions of the CodeQL Action are detected in the workflow file. Additionally, an error will now be thrown by the other CodeQL Action steps if they load a configuration file that was generated by a different version of the codeql-action/init step. #3099 and #3100
  • We added support for reducing the size of dependency caches for Java analyses, which will reduce cache usage and speed up workflows. This will be enabled automatically at a later time. #3107
  • You can now run the latest CodeQL nightly bundle by passing tools: nightly to the init action. In general, the nightly bundle is unstable and we only recommend running it when directed by GitHub staff. #3130
  • Update default CodeQL bundle version to 2.23.1. #3118

3.30.3 - 10 Sep 2025

No user facing changes.

3.30.2 - 09 Sep 2025

  • Fixed a bug which could cause language autodetection to fail. #3084
  • Experimental: The quality-queries input that was added in 3.29.2 as part of an internal experiment is now deprecated and will be removed in an upcoming version of the CodeQL Action. It has been superseded by a new analysis-kinds input, which is part of the same internal experiment. Do not use this in production as it is subject to change at any time. #3064

3.30.1 - 05 Sep 2025

  • Update default CodeQL bundle version to 2.23.0. #3077

3.30.0 - 01 Sep 2025

  • Reduce the size of the CodeQL Action, speeding up workflows by approximately 4 seconds. #3054

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [github/codeql-action](https://github.com/github/codeql-action) from 3 to 4.
- [Release notes](https://github.com/github/codeql-action/releases)
- [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md)
- [Commits](github/codeql-action@v3...v4)

---
updated-dependencies:
- dependency-name: github/codeql-action
  dependency-version: '4'
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot @github
Copy link
Author

dependabot bot commented on behalf of github Oct 27, 2025

Labels

The following labels could not be found: dependencies, github-actions, security. Please create them before Dependabot can add them to a pull request.

Please fix the above issues or remove invalid values from dependabot.yml.

@github-actions
Copy link

🧪 Test & Build Summary

🏗️ Build Status

  • ✅ Build completed successfully
  • 📦 NuGet packages restored
  • 🐳 Docker image built and tested

🧪 Test Results

  • ✅ All tests executed
  • 📊 Test artifacts generated
  • 📋 Results available in workflow artifacts

🔒 Security Scanning

  • 🔍 Vulnerability scanning (NuGet packages)
  • 🛡️ CodeQL static analysis
  • 🔐 Secret detection with TruffleHog
  • � Filesystem security scanning with Trivy
  • 📋 OWASP dependency check
  • 🎯 SAST analysis with Semgrep
  • 📊 Security reports available in artifacts

📦 Available Artifacts

  • 📊 Test results (TRX format)
  • 📈 Code coverage reports (Cobertura XML)
  • 🔒 Security scan results (SARIF format)
  • 🛡️ Vulnerability reports (JSON/XML)
  • 📋 Security audit logs

Generated by Setlist Studio CI/CD Pipeline 🎵

@github-actions
Copy link

Code Coverage

Package Line Rate Branch Rate Complexity Health
SetlistStudio.Web 81% 79% 1659
SetlistStudio.Core 93% 91% 752
SetlistStudio.Infrastructure 87% 88% 606
SetlistStudio.Web 81% 79% 1659
SetlistStudio.Core 93% 91% 752
SetlistStudio.Infrastructure 87% 88% 606
Summary 84% (14568 / 17374) 84% (4068 / 4836) 6034

Minimum allowed line rate is 80%

@github-actions
Copy link

🚀 Preview Deployment Ready

Preview URL: https://preview-pr-59.setlist-studio.dev

Branch: dependabot/github_actions/github/codeql-action-4
Commit: a11799910f183eb1ed32fb2408c30a199657b2c1


Deployment updated automatically on each push

@github-actions
Copy link

🛡️ Security Scan Summary

Scan Date: Mon Oct 27 07:16:05 UTC 2025
Commit: a117999

🔍 Scan Results

Tool Status Details
TruffleHog ✅ Secure No secrets detected
.NET Vulnerability Scan ✅ Secure No vulnerable packages detected
CodeQL ✅ Secure No vulnerabilities detected in local analysis
Semgrep SAST ✅ Secure No security issues detected
Trivy Filesystem ✅ Secure No filesystem vulnerabilities detected
OWASP Dependency Check ✅ Secure No dependency vulnerabilities detected
OWASP ZAP Dynamic Scan ✅ Secure No critical/high issues detected
Security Configuration ✅ Secure All security configurations validated

⚠️ CRITICAL: CodeQL Security Analysis

IMPORTANT: This summary may show CodeQL as 'secure' even if issues exist.
ALWAYS check the GitHub Security Tab for CodeQL findings.
High/Critical CodeQL issues MUST be resolved before merge, regardless of this summary.

📋 Recommendations

  • PRIORITY: Check GitHub Security tab for CodeQL findings
  • Fix all high/critical CodeQL issues before merge
  • Review all findings in the Security tab
  • Update vulnerable dependencies promptly
  • Follow secure coding practices from copilot-instructions.md
  • Regular security reviews and updates

Security scan generated by Setlist Studio CI/CD Pipeline 🔒

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants