Skip to content

Conversation

IvanGoncharov
Copy link
Member

No description provided.

# the `language` matrix defined below to confirm you have the correct set of
# supported CodeQL languages.
#
name: "CodeQL"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not sure this belongs in graphql-js? There's no description on your diff, @IvanGoncharov, and I'm not always hip on the latest open source tooling, so I'm not totally sure how CodeQL's yml file getting added to the graphql-js repo benefits us.

https://securitylab.github.com/tools/codeql/ => it seems like anyone who wants to use CodeQL can, without defaulting everyone who downloads graphql-js to run it. I may be missing some of the benefits or purpose of CodeQL here, though, or what it's actually doing. Is this essentially just setting up a "code analysis" test, similar to our test coverage tests?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@mjmahone Sorry, I opened this PR through GitHub UI (content is autogenerated), so it wasn't my intention to merge it just to give it a spin.

About why we need it, it is used by various tools to score the security of a particular OSS project, e.g. https://github.com/ossf/scorecard/blob/main/docs/checks.md#sast
Also, it can uncover some real security issues both in our sorce code and GitHub
workflows.

without defaulting everyone who downloads graphql-js to run it.

No, you don't need to install it or run it.
It just runs on CI, so it doesn't affect local workflow.

IvanGoncharov added a commit to IvanGoncharov/graphql-js that referenced this pull request Aug 16, 2022
Motivation: increase security.
Discovered while looking into graphql#3162
IvanGoncharov added a commit to IvanGoncharov/graphql-js that referenced this pull request Aug 16, 2022
Motivation: increase security.
Discovered while looking into graphql#3162
IvanGoncharov added a commit to IvanGoncharov/graphql-js that referenced this pull request Aug 16, 2022
Motivation: codeql are quite popular now, moreover various projects use it
as metric on how secure certain OSS project is. Example: https://github.com/
ossf/scorecard/blob/main/docs/checks.md#sast
Also, it can uncover some real security issues both in our sorce code and GitHub
workflows.

So I don't see a lot of harm by enabling it, we can always ignore certain files
or disable it completely.

Fixes graphql#3162
IvanGoncharov added a commit to IvanGoncharov/graphql-js that referenced this pull request Aug 16, 2022
Motivation: codeql are quite popular now, moreover various projects use it
as metric on how secure certain OSS project is. Example: https://github.com/
ossf/scorecard/blob/main/docs/checks.md#sast
Also, it can uncover some real security issues both in our sorce code and GitHub
workflows.

So I don't see a lot of harm by enabling it, we can always ignore certain files
or disable it completely.

Fixes graphql#3162
IvanGoncharov added a commit to IvanGoncharov/graphql-js that referenced this pull request Aug 16, 2022
Motivation: codeql are quite popular now, moreover various projects use it
as metric on how secure certain OSS project is. Example: https://github.com/
ossf/scorecard/blob/main/docs/checks.md#sast
Also, it can uncover some real security issues both in our sorce code and GitHub
workflows.

So I don't see a lot of harm by enabling it, we can always ignore certain files
or disable it completely.

Fixes graphql#3162
IvanGoncharov added a commit to IvanGoncharov/graphql-js that referenced this pull request Aug 16, 2022
Motivation: codeql are quite popular now, moreover various projects use it
as metric on how secure certain OSS project is. Example: https://github.com/
ossf/scorecard/blob/main/docs/checks.md#sast
Also, it can uncover some real security issues both in our sorce code and GitHub
workflows.

So I don't see a lot of harm by enabling it, we can always ignore certain files
or disable it completely.

Fixes graphql#3162
IvanGoncharov added a commit to IvanGoncharov/graphql-js that referenced this pull request Aug 16, 2022
Motivation: codeql are quite popular now, moreover various projects use it
as metric on how secure certain OSS project is. Example: https://github.com/
ossf/scorecard/blob/main/docs/checks.md#sast
Also, it can uncover some real security issues both in our sorce code and GitHub
workflows.

So I don't see a lot of harm by enabling it, we can always ignore certain files
or disable it completely.

Fixes graphql#3162
IvanGoncharov added a commit to IvanGoncharov/graphql-js that referenced this pull request Aug 17, 2022
Motivation: codeql are quite popular now, moreover various projects use it
as metric on how secure certain OSS project is. Example: https://github.com/
ossf/scorecard/blob/main/docs/checks.md#sast
Also, it can uncover some real security issues both in our sorce code and GitHub
workflows.

So I don't see a lot of harm by enabling it, we can always ignore certain files
or disable it completely.

Fixes graphql#3162
IvanGoncharov added a commit to IvanGoncharov/graphql-js that referenced this pull request Aug 18, 2022
Motivation: codeql are quite popular now, moreover various projects use it
as metric on how secure certain OSS project is. Example: https://github.com/
ossf/scorecard/blob/main/docs/checks.md#sast
Also, it can uncover some real security issues both in our sorce code and GitHub
workflows.

So I don't see a lot of harm by enabling it, we can always ignore certain files
or disable it completely.

Fixes graphql#3162
IvanGoncharov added a commit to IvanGoncharov/graphql-js that referenced this pull request Aug 29, 2022
Motivation: codeql are quite popular now, moreover various projects use it
as metric on how secure certain OSS project is. Example: https://github.com/
ossf/scorecard/blob/main/docs/checks.md#sast
Also, it can uncover some real security issues both in our sorce code and GitHub
workflows.

So I don't see a lot of harm by enabling it, we can always ignore certain files
or disable it completely.

Fixes graphql#3162
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants