From 4ea228ee0d6be02589ddc303191af6287166d02a Mon Sep 17 00:00:00 2001 From: Jordan Padams <33492486+jordanpadams@users.noreply.github.com> Date: Mon, 25 Nov 2024 12:41:30 -0800 Subject: [PATCH] Update codeql-analysis.yml --- .github/workflows/codeql-analysis.yml | 76 +++++++++++---------------- 1 file changed, 30 insertions(+), 46 deletions(-) diff --git a/.github/workflows/codeql-analysis.yml b/.github/workflows/codeql-analysis.yml index 59f5bc6..500f28b 100644 --- a/.github/workflows/codeql-analysis.yml +++ b/.github/workflows/codeql-analysis.yml @@ -1,60 +1,45 @@ -# For most projects, this workflow file will not need changing; you simply need -# to commit it to your repository. -# -# You may wish to alter this file to override the set of languages analyzed, -# or to provide custom queries or build logic. -# -# ******** NOTE ******** -# We have attempted to detect the languages in your repository. Please check -# the `language` matrix defined below to confirm you have the correct set of -# supported CodeQL languages. -# name: "CodeQL" on: -# push: -# branches: [ main ] -# pull_request: -# # The branches below must be a subset of the branches above -# branches: [ main ] schedule: - - cron: '0 0 * * 0' + - cron: '44 5 * * 0' + workflow_dispatch: jobs: analyze: name: Analyze runs-on: ubuntu-latest - permissions: - actions: read - contents: read - security-events: write + if: github.actor != 'pdsen-ci' strategy: fail-fast: false matrix: - language: [ 'python' ] - # CodeQL supports [ 'cpp', 'csharp', 'go', 'java', 'javascript', 'python', 'ruby' ] - # Learn more about CodeQL language support at https://git.io/codeql-language-support + # Override automatic language detection by changing the below list + # Supported options are ['csharp', 'cpp', 'go', 'java', 'javascript', 'python'] +# language: ['java', 'python'] + language: ['java'] + # Learn more... + # https://docs.github.com/en/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#overriding-automatic-language-detection steps: - name: Checkout repository - uses: actions/checkout@v3 + uses: actions/checkout@v4 + with: + # We must fetch at least the immediate parents so that if this is + # a pull request then we can checkout the head. + fetch-depth: 2 # Initializes the CodeQL tools for scanning. - name: Initialize CodeQL - uses: github/codeql-action/init@v2 + uses: github/codeql-action/init@v3 with: - languages: ${{ matrix.language }} - queries: security-and-quality, security-extended - # If you wish to specify custom queries, you can do so here or in a config file. - # By default, queries listed here will override any specified in a config file. - # Prefix the list here with "+" to use these queries and those in the config file. - # queries: ./path/to/local/query, your-org/your-repo/queries@main + languages: ${{ matrix.language }} + queries: security-and-quality, security-extended # Autobuild attempts to build any compiled languages (C/C++, C#, or Java). # If this step fails, then you should remove it and run the build manually (see below) - name: Autobuild - uses: github/codeql-action/autobuild@v2 + uses: github/codeql-action/autobuild@v3 # ℹī¸ Command-line programs to run using the OS shell. # 📚 https://git.io/JvXDl @@ -63,33 +48,32 @@ jobs: # and modify them (or add more) to build your code if your project # uses a compiled language - #- run: | - # make bootstrap - # make release +# - run: | +# mvn clean compile site -DskipTests - name: Perform CodeQL Analysis - uses: github/codeql-action/analyze@v2 - + uses: github/codeql-action/analyze@v3 + - run: | pip install nasa-scrub - + results_dir=`realpath ${{ github.workspace }}/../results` sarif_files=`find $results_dir -name '*.sarif'` - + for sarif_file in $sarif_files do output_file="$results_dir/$(basename $sarif_file .sarif).scrub" - + python3 -m scrub.tools.parsers.translate_results $sarif_file $output_file ${{ github.workspace }} scrub done - + python3 -m scrub.tools.parsers.csv_parser $results_dir - + echo "RESULTS_DIR=$results_dir" >> $GITHUB_ENV - - + + - name: Upload CodeQL Artifacts - uses: actions/upload-artifact@v3 + uses: actions/upload-artifact@v4 with: name: codeql-artifacts path: ${{ env.RESULTS_DIR }}