Actions for running CodeQL analysis
Перейти к файлу
Simon Engledew 8d18e347a7
Merge pull request #319 from github/simon-engledew/lint-workspace
Validate the codeql-action workspace for common errors
2020-11-26 16:36:46 +00:00
.github Merge branch 'main' into skip-integration-tests-prs-from-forks 2020-11-20 12:18:45 +00:00
.vscode
analyze Fix typos in Action config files 2020-11-20 11:11:17 +01:00
autobuild rename the action entrypoint files 2020-08-24 15:15:26 +01:00
init Update init/action.yml 2020-11-13 12:51:25 +00:00
lib Merge branch 'main' into simon-engledew/lint-workspace 2020-11-26 15:22:22 +00:00
node_modules Ensure unqualified program names are present on `PATH` before executing them. 2020-11-18 22:20:13 +00:00
python-setup Make sure a Python 2 pip is installed 2020-11-20 16:48:43 +01:00
queries Add a query to detect binary planting vulnerabilities. 2020-11-20 11:34:33 +00:00
runner Convert rest of the actions 2020-08-26 16:20:36 +01:00
src Merge branch 'main' into simon-engledew/lint-workspace 2020-11-26 15:22:22 +00:00
tests/multi-language-repo add more integration tests for the runner 2020-09-08 18:32:52 +01:00
upload-sarif Fix typos in Action config files 2020-11-20 11:11:17 +01:00
.editorconfig
.eslintignore Adding ESLint config and required dev dependencies 2020-09-14 10:32:24 +01:00
.eslintrc.json Update ESLint configuration 2020-11-25 22:44:45 +01:00
.gitattributes
.gitignore rename CLI to runner 2020-08-25 17:44:30 +01:00
CODE_OF_CONDUCT.md
CONTRIBUTING.md Fix invalid API call when running locally 2020-11-04 09:58:09 +00:00
LICENSE
README.md Change suggested workflow to analyse merge commit 2020-11-10 12:10:07 +00:00
package-lock.json Ensure unqualified program names are present on `PATH` before executing them. 2020-11-18 22:20:13 +00:00
package.json Revert an accidental change to make testing quicker 2020-11-24 14:28:08 +00:00
tsconfig.json

README.md

CodeQL Action

This action runs GitHub's industry-leading static analysis engine, CodeQL, against a repository's source code to find security vulnerabilities. It then automatically uploads the results to GitHub so they can be displayed in the repository's security tab. CodeQL runs an extensible set of queries, which have been developed by the community and the GitHub Security Lab to find common vulnerabilities in your code.

License

This project is released under the MIT License.

The underlying CodeQL CLI, used in this action, is licensed under the GitHub CodeQL Terms and Conditions. As such, this action may be used on open source projects hosted on GitHub, and on private repositories that are owned by an organisation with GitHub Advanced Security enabled.

Usage

This is a short walkthrough, but for more information read configuring code scanning.

To get code scanning results from CodeQL analysis on your repo you can use the following workflow as a template:


name: "Code Scanning - Action"

on:
  push:
  pull_request:
  schedule:
    #        ┌───────────── minute (0 - 59)
    #        │  ┌───────────── hour (0 - 23)
    #        │  │ ┌───────────── day of the month (1 - 31)
    #        │  │ │ ┌───────────── month (1 - 12 or JAN-DEC)
    #        │  │ │ │ ┌───────────── day of the week (0 - 6 or SUN-SAT)
    #        │  │ │ │ │
    #        │  │ │ │ │
    #        │  │ │ │ │
    #        *  * * * *
    - cron: '30 1 * * 0'

jobs:
  CodeQL-Build:
    # CodeQL runs on ubuntu-latest, windows-latest, and macos-latest
    runs-on: ubuntu-latest

    steps:
      - name: Checkout repository
        uses: actions/checkout@v2

      # Initializes the CodeQL tools for scanning.
      - name: Initialize CodeQL
        uses: github/codeql-action/init@v1
        # Override language selection by uncommenting this and choosing your languages
        # with:
        #   languages: go, javascript, csharp, python, cpp, java

      # Autobuild attempts to build any compiled languages (C/C++, C#, or Java).
      # If this step fails, then you should remove it and run the build manually (see below).
      - name: Autobuild
        uses: github/codeql-action/autobuild@v1

      #  Command-line programs to run using the OS shell.
      # 📚 https://git.io/JvXDl

      # ✏️ If the Autobuild fails above, remove it and uncomment the following
      #    three lines and modify them (or add more) to build your code if your
      #    project uses a compiled language

      #- run: |
      #   make bootstrap
      #   make release

      - name: Perform CodeQL Analysis
        uses: github/codeql-action/analyze@v1

If you prefer to integrate this within an existing CI workflow, it should end up looking something like this:

- name: Initialize CodeQL
  uses: github/codeql-action/init@v1
  with:
    languages: go, javascript

# Here is where you build your code
- run: |
  make bootstrap
  make release  

- name: Perform CodeQL Analysis
  uses: github/codeql-action/analyze@v1

Configuration file

Use the config-file parameter of the init action to enable the configuration file. The value of config-file is the path to the configuration file you want to use. This example loads the configuration file ./.github/codeql/codeql-config.yml.

- uses: github/codeql-action/init@v1
  with:
    config-file: ./.github/codeql/codeql-config.yml

The configuration file must be located within the local repository. For information on how to write a configuration file, see "Using a custom configuration file."

If you only want to customise the queries used, you can specify them in your workflow instead of creating a config file, using the queries property of the init action:

- uses: github/codeql-action/init@v1
  with:
    queries: <local-or-remote-query>,<another-query>

By default, this will override any queries specified in a config file. If you wish to use both sets of queries, prefix the list of queries in the workflow with +:

- uses: github/codeql-action/init@v1
  with:
    queries: +<local-or-remote-query>,<another-query>

Troubleshooting

Read about troubleshooting code scanning.