[go: nahoru, domu]

Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

paths-ignore doesn't seem to work #1583

Open
huangminchn opened this issue Mar 16, 2023 · 2 comments
Open

paths-ignore doesn't seem to work #1583

huangminchn opened this issue Mar 16, 2023 · 2 comments

Comments

@huangminchn
Copy link
huangminchn commented Mar 16, 2023

Hi team,

I added a customized config file to ask for ignoring 3 files: linkedin/venice@3ee4b75
but it appears that CodeQL still scans them and reports; am I doing anything wrong here? Any help will be highly appreciated!

Thanks!

@smowton
Copy link
Contributor
smowton commented Mar 16, 2023

I'm afraid that setting only takes effect for languages that scan for all files in your repository (JavaScript, Python, Ruby (see https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/customizing-code-scanning#specifying-directories-to-scan)). Java analysis works by following along with your build process, so if you want to exclude particular files from analysis you need to specify a build process that does not build those files.

@aibaars
Copy link
Collaborator
aibaars commented Mar 20, 2023

Another approach is to use the advanced-security/filter-sarif Action to filter out results before reporting them.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants