From 461d2ea2bc188d215dfcc427502488d783630040 Mon Sep 17 00:00:00 2001 From: Peter Lubell-Doughtie Date: Tue, 11 Apr 2023 15:11:11 -0400 Subject: [PATCH] specify code-scanning explicitly --- .github/codeql/codeql-config.yml | 12 ++++++++++++ .github/workflows/codeql.yml | 10 +++------- 2 files changed, 15 insertions(+), 7 deletions(-) create mode 100644 .github/codeql/codeql-config.yml diff --git a/.github/codeql/codeql-config.yml b/.github/codeql/codeql-config.yml new file mode 100644 index 0000000000..ee31ed4ea3 --- /dev/null +++ b/.github/codeql/codeql-config.yml @@ -0,0 +1,12 @@ +name: "OpenSRP config" + +disable-default-queries: true + +packs: + - codeql/java-queries +query-filters: +- exclude: + problem.severity: + - error + - warning + - recommendation diff --git a/.github/workflows/codeql.yml b/.github/workflows/codeql.yml index a36256a7e4..0d4d13f45e 100644 --- a/.github/workflows/codeql.yml +++ b/.github/workflows/codeql.yml @@ -47,15 +47,11 @@ jobs: uses: github/codeql-action/init@v2 with: languages: ${{ matrix.language }} - # If you wish to specify custom queries, you can do so here or in a config file. # By default, queries listed here will override any specified in a config file. # Prefix the list here with "+" to use these queries and those in the config file. - - # Details on CodeQL's query packs refer to : https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs - # queries: security-extended,security-and-quality - - # ℹī¸ Command-line programs to run using the OS shell. - # 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun + # Details on CodeQL's query packs refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs + # queries: code-scanning + config-file: ./.github/codeql/codeql-config.yml - name: Decode & Generate local.properties file run: echo $LOCAL_PROPERTIES | base64 -di > local.properties