Skip to content

Commit c6ce8e0

Browse files
authored
cancel codeql.yml
1 parent e1013eb commit c6ce8e0

File tree

1 file changed

+107
-107
lines changed

1 file changed

+107
-107
lines changed

.github/workflows/codeql.yml

+107-107
Original file line numberDiff line numberDiff line change
@@ -1,122 +1,122 @@
1-
# For most projects, this workflow file will not need changing; you simply need
2-
# to commit it to your repository.
3-
#
4-
# You may wish to alter this file to override the set of languages analyzed,
5-
# or to provide custom queries or build logic.
6-
#
7-
# ******** NOTE ********
8-
# We have attempted to detect the languages in your repository. Please check
9-
# the `language` matrix defined below to confirm you have the correct set of
10-
# supported CodeQL languages.
11-
#
12-
name: "CodeQL"
1+
# # For most projects, this workflow file will not need changing; you simply need
2+
# # to commit it to your repository.
3+
# #
4+
# # You may wish to alter this file to override the set of languages analyzed,
5+
# # or to provide custom queries or build logic.
6+
# #
7+
# # ******** NOTE ********
8+
# # We have attempted to detect the languages in your repository. Please check
9+
# # the `language` matrix defined below to confirm you have the correct set of
10+
# # supported CodeQL languages.
11+
# #
12+
# name: "CodeQL"
1313

14-
on:
15-
# push:
16-
# branches: [ "main", "master" ]
17-
schedule:
18-
- cron: '0 0 * * *'
19-
pull_request:
20-
branches: '*'
14+
# on:
15+
# # push:
16+
# # branches: [ "main", "master" ]
17+
# schedule:
18+
# - cron: '0 0 * * *'
19+
# pull_request:
20+
# branches: '*'
2121

22-
jobs:
23-
analyze:
24-
name: Analyze
25-
# Runner size impacts CodeQL analysis time. To learn more, please see:
26-
# - https://gh.io/recommended-hardware-resources-for-running-codeql
27-
# - https://gh.io/supported-runners-and-hardware-resources
28-
# - https://gh.io/using-larger-runners
29-
# Consider using larger runners for possible analysis time improvements.
30-
runs-on: ${{ (matrix.language == 'swift' && 'macos-latest') || 'ubuntu-20.04' }}
31-
timeout-minutes: ${{ (matrix.language == 'swift' && 120) || 360 }}
32-
permissions:
33-
actions: read
34-
contents: read
35-
security-events: write
22+
# jobs:
23+
# analyze:
24+
# name: Analyze
25+
# # Runner size impacts CodeQL analysis time. To learn more, please see:
26+
# # - https://gh.io/recommended-hardware-resources-for-running-codeql
27+
# # - https://gh.io/supported-runners-and-hardware-resources
28+
# # - https://gh.io/using-larger-runners
29+
# # Consider using larger runners for possible analysis time improvements.
30+
# runs-on: ${{ (matrix.language == 'swift' && 'macos-latest') || 'ubuntu-20.04' }}
31+
# timeout-minutes: ${{ (matrix.language == 'swift' && 120) || 360 }}
32+
# permissions:
33+
# actions: read
34+
# contents: read
35+
# security-events: write
3636

37-
strategy:
38-
fail-fast: false
39-
matrix:
40-
language: [ 'cpp' ]
41-
# CodeQL supports [ 'cpp', 'csharp', 'go', 'java', 'javascript', 'python', 'ruby', 'swift' ]
42-
# Use only 'java' to analyze code written in Java, Kotlin or both
43-
# Use only 'javascript' to analyze code written in JavaScript, TypeScript or both
44-
# Learn more about CodeQL language support at https://aka.ms/codeql-docs/language-support
37+
# strategy:
38+
# fail-fast: false
39+
# matrix:
40+
# language: [ 'cpp' ]
41+
# # CodeQL supports [ 'cpp', 'csharp', 'go', 'java', 'javascript', 'python', 'ruby', 'swift' ]
42+
# # Use only 'java' to analyze code written in Java, Kotlin or both
43+
# # Use only 'javascript' to analyze code written in JavaScript, TypeScript or both
44+
# # Learn more about CodeQL language support at https://aka.ms/codeql-docs/language-support
4545

46-
steps:
47-
- name: Checkout repository
48-
uses: actions/checkout@v3
49-
with:
50-
submodules: recursive
46+
# steps:
47+
# - name: Checkout repository
48+
# uses: actions/checkout@v3
49+
# with:
50+
# submodules: recursive
5151

52-
# Initializes the CodeQL tools for scanning.
53-
- name: Initialize CodeQL
54-
uses: github/codeql-action/init@v2
55-
with:
56-
languages: ${{ matrix.language }}
57-
# If you wish to specify custom queries, you can do so here or in a config file.
58-
# By default, queries listed here will override any specified in a config file.
59-
# Prefix the list here with "+" to use these queries and those in the config file.
52+
# # Initializes the CodeQL tools for scanning.
53+
# - name: Initialize CodeQL
54+
# uses: github/codeql-action/init@v2
55+
# with:
56+
# languages: ${{ matrix.language }}
57+
# # If you wish to specify custom queries, you can do so here or in a config file.
58+
# # By default, queries listed here will override any specified in a config file.
59+
# # Prefix the list here with "+" to use these queries and those in the config file.
6060

61-
# For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
62-
# queries: security-extended,security-and-quality
63-
queries: security-and-quality
61+
# # For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
62+
# # queries: security-extended,security-and-quality
63+
# queries: security-and-quality
6464

6565

66-
# Autobuild attempts to build any compiled languages (C/C++, C#, Go, Java, or Swift).
67-
# If this step fails, then you should remove it and run the build manually (see below)
68-
#- name: Autobuild
69-
# uses: github/codeql-action/autobuild@v2
66+
# # Autobuild attempts to build any compiled languages (C/C++, C#, Go, Java, or Swift).
67+
# # If this step fails, then you should remove it and run the build manually (see below)
68+
# #- name: Autobuild
69+
# # uses: github/codeql-action/autobuild@v2
7070

71-
# ℹ️ Command-line programs to run using the OS shell.
72-
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
71+
# # ℹ️ Command-line programs to run using the OS shell.
72+
# # 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
7373

74-
# If the Autobuild fails above, remove it and uncomment the following three lines.
75-
# modify them (or add more) to build your code if your project, please refer to the EXAMPLE below for guidance.
74+
# # If the Autobuild fails above, remove it and uncomment the following three lines.
75+
# # modify them (or add more) to build your code if your project, please refer to the EXAMPLE below for guidance.
7676

77-
- run: |
78-
cd src
79-
mkdir build && cd build && cmake ../ && make
77+
# - run: |
78+
# cd src
79+
# mkdir build && cd build && cmake ../ && make
8080

81-
- name: Perform CodeQL Analysis
82-
uses: github/codeql-action/analyze@v2
83-
with:
84-
category: "/language:${{matrix.language}}"
85-
upload: false
86-
id: step1
81+
# - name: Perform CodeQL Analysis
82+
# uses: github/codeql-action/analyze@v2
83+
# with:
84+
# category: "/language:${{matrix.language}}"
85+
# upload: false
86+
# id: step1
8787

88-
# Filter out rules with low severity or high false positve rate
89-
# Also filter out warnings in third-party code
90-
- name: Filter out unwanted errors and warnings
91-
uses: advanced-security/filter-sarif@v1
92-
with:
93-
patterns: |
94-
-**:cpp/path-injection
95-
-**:cpp/world-writable-file-creation
96-
-**:cpp/poorly-documented-function
97-
-**:cpp/potentially-dangerous-function
98-
-**:cpp/use-of-goto
99-
-**:cpp/integer-multiplication-cast-to-long
100-
-**:cpp/comparison-with-wider-type
101-
-**:cpp/leap-year/*
102-
-**:cpp/ambiguously-signed-bit-field
103-
-**:cpp/suspicious-pointer-scaling
104-
-**:cpp/suspicious-pointer-scaling-void
105-
-**:cpp/unsigned-comparison-zero
106-
-**/cmake*/Modules/**
107-
input: ${{ steps.step1.outputs.sarif-output }}/cpp.sarif
108-
output: ${{ steps.step1.outputs.sarif-output }}/cpp.sarif
88+
# # Filter out rules with low severity or high false positve rate
89+
# # Also filter out warnings in third-party code
90+
# - name: Filter out unwanted errors and warnings
91+
# uses: advanced-security/filter-sarif@v1
92+
# with:
93+
# patterns: |
94+
# -**:cpp/path-injection
95+
# -**:cpp/world-writable-file-creation
96+
# -**:cpp/poorly-documented-function
97+
# -**:cpp/potentially-dangerous-function
98+
# -**:cpp/use-of-goto
99+
# -**:cpp/integer-multiplication-cast-to-long
100+
# -**:cpp/comparison-with-wider-type
101+
# -**:cpp/leap-year/*
102+
# -**:cpp/ambiguously-signed-bit-field
103+
# -**:cpp/suspicious-pointer-scaling
104+
# -**:cpp/suspicious-pointer-scaling-void
105+
# -**:cpp/unsigned-comparison-zero
106+
# -**/cmake*/Modules/**
107+
# input: ${{ steps.step1.outputs.sarif-output }}/cpp.sarif
108+
# output: ${{ steps.step1.outputs.sarif-output }}/cpp.sarif
109109

110-
- name: Upload CodeQL results to code scanning
111-
uses: github/codeql-action/upload-sarif@v2
112-
with:
113-
sarif_file: ${{ steps.step1.outputs.sarif-output }}
114-
category: "/language:${{matrix.language}}"
110+
# - name: Upload CodeQL results to code scanning
111+
# uses: github/codeql-action/upload-sarif@v2
112+
# with:
113+
# sarif_file: ${{ steps.step1.outputs.sarif-output }}
114+
# category: "/language:${{matrix.language}}"
115115

116-
- name: Upload CodeQL results as an artifact
117-
if: success() || failure()
118-
uses: actions/upload-artifact@v3
119-
with:
120-
name: codeql-results
121-
path: ${{ steps.step1.outputs.sarif-output }}
122-
retention-days: 5
116+
# - name: Upload CodeQL results as an artifact
117+
# if: success() || failure()
118+
# uses: actions/upload-artifact@v3
119+
# with:
120+
# name: codeql-results
121+
# path: ${{ steps.step1.outputs.sarif-output }}
122+
# retention-days: 5

0 commit comments

Comments
 (0)