From 4b5d9681ce60cc8028812cd8db59adeb3c4354ed Mon Sep 17 00:00:00 2001 From: Enrico Joerns Date: Thu, 29 Feb 2024 00:33:30 +0100 Subject: [PATCH] ci/codeql: use filter-sarif to filter meson-private There is a severe number of false-positive in code scanning caused by inspecting meson-internal test files like 'build/meson-private/tmpzb46osmq/testfile.c'. As a workaround, use the 'filter-sarif' action to filter out these results before uploading the SARIF (Static Analysis Results Interchange Format). This PR was inspired by https://github.com/rauc/rauc/pull/1346 and the example from https://github.com/advanced-security/filter-sarif. Signed-off-by: Enrico Joerns [Emil: port from rauc, use checksums for actions] Signed-off-by: Emil Velikov Link: https://github.com/kmod-project/kmod/pull/249 Signed-off-by: Lucas De Marchi --- .github/workflows/codeql.yml | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/.github/workflows/codeql.yml b/.github/workflows/codeql.yml index 9f5a9dc6..299c8d04 100644 --- a/.github/workflows/codeql.yml +++ b/.github/workflows/codeql.yml @@ -70,3 +70,19 @@ jobs: uses: github/codeql-action/analyze@4f3212b61783c3c68e8309a0f18a699764811cda # v3.27.1 with: category: "/language:cpp" + upload: false + output: sarif-results + + - name: Filter out meson-internal test files + uses: advanced-security/filter-sarif@f3b8118a9349d88f7b1c0c488476411145b6270d # v1.0.1 + with: + patterns: | + -build/meson-private/**/testfile.c + input: sarif-results/cpp.sarif + output: sarif-results/cpp.sarif + + - name: Upload CodeQL results to code scanning + uses: github/codeql-action/upload-sarif@4f3212b61783c3c68e8309a0f18a699764811cda # v3.27.1 + with: + sarif_file: sarif-results/cpp.sarif + category: "/language:cpp" -- 2.47.3