Skip to content

Commit 86dba57

Browse files
committed
CodeQL query file introduced
1 parent ddf6c77 commit 86dba57

File tree

2 files changed

+10
-9
lines changed

2 files changed

+10
-9
lines changed

.github/workflows/codeql-filters.yml

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
query-filters:
2+
# The application uses non-browser clients. Yes, there is swagger interface,
3+
# but is's used only for testing/tuning.
4+
#
5+
# From https://docs.spring.io/spring-security/reference/features/exploits/csrf.html
6+
# "If you are creating a service that is used only by non-browser clients,
7+
# you likely want to disable CSRF protection."
8+
- exclude: java/spring-disabled-csrf-protection
9+

.github/workflows/codeql.yml

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -20,15 +20,6 @@ on:
2020
schedule:
2121
- cron: '28 3 * * 1'
2222

23-
query-filters:
24-
# The application uses non-browser clients. Yes, there is swagger interface,
25-
# but is's used only for testing/tuning.
26-
#
27-
# From https://docs.spring.io/spring-security/reference/features/exploits/csrf.html
28-
# "If you are creating a service that is used only by non-browser clients,
29-
# you likely want to disable CSRF protection."
30-
- exclude: java/spring-disabled-csrf-protection
31-
3223
jobs:
3324
analyze:
3425
name: Analyze
@@ -77,6 +68,7 @@ jobs:
7768

7869
# For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
7970
# queries: security-extended,security-and-quality
71+
config-file: .github/workflows/codeql-filters.yml
8072

8173

8274
# Autobuild attempts to build any compiled languages (C/C++, C#, Go, Java, or Swift).

0 commit comments

Comments
 (0)