CodeQL exceptions for interactive bom

This commit is contained in:
GHOSCHT 2022-03-18 22:56:27 +01:00
parent 9466086de0
commit efd71d6989
No known key found for this signature in database
GPG key ID: A35BD466B8871994
2 changed files with 34 additions and 27 deletions

6
.github/codeql/codeql-config.yml vendored Normal file
View file

@ -0,0 +1,6 @@
name: "CodeQL config"
paths-ignore:
- Devices/Module/Hardware/Circuit/bom
- Devices/Control/Hardware/Circuit/bom
- Devices/Console/Hardware/Circuit/bom

View file

@ -13,12 +13,12 @@ name: "CodeQL"
on: on:
push: push:
branches: [ master ] branches: [master]
pull_request: pull_request:
# The branches below must be a subset of the branches above # The branches below must be a subset of the branches above
branches: [ master ] branches: [master]
schedule: schedule:
- cron: '42 21 * * 5' - cron: "42 21 * * 5"
jobs: jobs:
analyze: analyze:
@ -32,36 +32,37 @@ jobs:
strategy: strategy:
fail-fast: false fail-fast: false
matrix: matrix:
language: [ 'cpp', 'javascript', 'python' ] language: ["cpp", "javascript", "python"]
# CodeQL supports [ 'cpp', 'csharp', 'go', 'java', 'javascript', 'python' ] # CodeQL supports [ 'cpp', 'csharp', 'go', 'java', 'javascript', 'python' ]
# Learn more: # Learn more:
# https://docs.github.com/en/free-pro-team@latest/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#changing-the-languages-that-are-analyzed # https://docs.github.com/en/free-pro-team@latest/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#changing-the-languages-that-are-analyzed
steps: steps:
- name: Checkout repository - name: Checkout repository
uses: actions/checkout@v2 uses: actions/checkout@v2
# Initializes the CodeQL tools for scanning. # Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL - name: Initialize CodeQL
uses: github/codeql-action/init@v1 uses: github/codeql-action/init@v1
with: with:
languages: ${{ matrix.language }} languages: ${{ matrix.language }}
# If you wish to specify custom queries, you can do so here or in a config file. config-file: ./.github/codeql/codeql-config.yml
# By default, queries listed here will override any specified in a config file. # If you wish to specify custom queries, you can do so here or in a config file.
# Prefix the list here with "+" to use these queries and those in the config file. # By default, queries listed here will override any specified in a config file.
# queries: ./path/to/local/query, your-org/your-repo/queries@main # Prefix the list here with "+" to use these queries and those in the config file.
# queries: ./path/to/local/query, your-org/your-repo/queries@main
- if: matrix.language == 'javascript' || matrix.language == 'python' - if: matrix.language == 'javascript' || matrix.language == 'python'
name: Autobuild name: Autobuild
uses: github/codeql-action/autobuild@v1 uses: github/codeql-action/autobuild@v1
- if: matrix.language == 'cpp' - if: matrix.language == 'cpp'
name: PlatformIO build name: PlatformIO build
run: | run: |
python -m pip install --upgrade pip python -m pip install --upgrade pip
pip install --upgrade platformio pip install --upgrade platformio
pio run --project-dir "./Devices/Console/Firmware" pio run --project-dir "./Devices/Console/Firmware"
pio run --project-dir "./Devices/Control/Firmware" pio run --project-dir "./Devices/Control/Firmware"
- name: Perform CodeQL Analysis - name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v1 uses: github/codeql-action/analyze@v1