-
Notifications
You must be signed in to change notification settings - Fork 707
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create codeql-analysis.yml #5234
Conversation
Signed-off-by: Antonio Gámez, PhD <agamez@vmware.com>
✅ Deploy Preview for kubeapps-dev canceled.
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Awesome, thanks!
There are two issues with this PR:
|
Signed-off-by: Antonio Gamez Diaz <agamez@vmware.com>
Signed-off-by: Antonio Gamez Diaz <agamez@vmware.com>
Signed-off-by: Antonio Gamez Diaz <agamez@vmware.com>
Signed-off-by: Antonio Gamez Diaz <agamez@vmware.com>
cmd/kubeapps-apis/plugins/helm/packages/v1alpha1/utils/postgresql_utils.go
Fixed
Show fixed
Hide fixed
cmd/kubeapps-apis/plugins/helm/packages/v1alpha1/utils/postgresql_utils.go
Fixed
Show fixed
Hide fixed
Signed-off-by: Antonio Gamez Diaz <agamez@vmware.com>
Signed-off-by: Antonio Gamez Diaz <agamez@vmware.com>
Signed-off-by: Antonio Gamez Diaz <agamez@vmware.com> Conflicts: cmd/kubeops/Dockerfile
Signed-off-by: Antonio Gamez Diaz <agamez@vmware.com>
Signed-off-by: Antonio Gamez Diaz <agamez@vmware.com> Conflicts: cmd/apprepository-controller/Dockerfile cmd/asset-syncer/Dockerfile cmd/kubeapps-apis/Dockerfile
log.Infof("+helm AddPackageRepository '%s' pointing to '%s'", request.GetName(), request.GetUrl()) | ||
repoName := request.GetName() | ||
repoUrl := request.GetUrl() | ||
log.Infof("+helm AddPackageRepository '%s' pointing to '%s'", repoName, repoUrl) |
Check failure
Code scanning / CodeQL
Clear-text logging of sensitive information
log.Infof("+helm AddPackageRepository '%s' pointing to '%s'", request.GetName(), request.GetUrl()) | ||
repoName := request.GetName() | ||
repoUrl := request.GetUrl() | ||
log.Infof("+helm AddPackageRepository '%s' pointing to '%s'", repoName, repoUrl) |
Check failure
Code scanning / CodeQL
Clear-text logging of sensitive information
Signed-off-by: Antonio Gamez Diaz <agamez@vmware.com>
Description of the change
While having a look at the repo settings, I noticed we didn't enable the CodeQL built-in support that GitHub offers for analyzing the code quality. This PR is the result of clicking on "enable" and adding a couple of copyright lines + customizing the cron, but otherwise it's the default config.
See an example of an alert below:
Benefits
Periodic report of the code quality status directly in Github
Possible drawbacks
More noise, but we can always allowlist any alert if think so
Applicable issues
Additional information
The results are stored in the "security" section of the github repo.