A GitHub CLI extension for GitHub Code-Scanning!
- Python (version 3.6 or higher)
gh extension install https://github.com/mario-campos/gh-code-scanning
Use the enable
subcommand to "deploy" GitHub Code Scanning with CodeQL, by 1) enabling GitHub Advanced Security and 2) adding a GitHub Actions workflow file to the given repository.
usage: gh code-scanning enable [-h] [-f] [--git-push] [-m MESSAGE] [-b BODY] [-w WORKFLOW_FILE_PATH] [-r REF] repos [repos ...]
positional arguments:
repos
optional arguments:
-h, --help show this help message and exit
-f, --force overwrite existing workflow file.
--git-push do not create PR; push commit to HEAD of default branch.
-m MESSAGE, --message MESSAGE
specify the pull-request/commit message.
-b BODY, --body BODY specify the pull-request body.
-w WORKFLOW, --workflow WORKFLOW_FILE_PATH
specify a custom CodeQL workflow file
-r REF, --ref REF specify the name of the branch to be created
In its most simplest form, gh-code-scanning can setup GitHub Code Scanning with CodeQL on a single repository:
gh code-scanning enable owner/repo
However, with the use of xargs
, we can automate this process for every repository in an organization. For example, the following command will enable all repositories in the organization foo:
gh repo list foo --json nameWithOwner --jq '.[].nameWithOwner' --limit 1000 | xargs gh code-scanning enable
We can take this one step further even, by applying some jq
magic to limit our "deployments" to only some repositories. For example, if you only wanted to enable GitHub Code Scanning with CodeQL on all repositories in the organization foo that have CodeQL "interpreted" languages (javascript
, python
, go
, ruby
) and none of the CodeQL "compiled" languages (java
, csharp
, cpp
), run the following command:
gh repo list foo \
--limit 1000 \
--json nameWithOwner,languages \
--jq '
.[] | (.languages) = [.languages[].node.name] |
select(.languages | all(. != "Java" and . != "C#" and . != "C" and . != "C++")) |
select(.languages | any(. == "JavaScript" or . == "TypeScript" or . == "Python" or . == "Go" or . == "Ruby")) |
.nameWithOwner' \
| xargs gh code-scanning enable
Specifying a custom workflow file
When using a custom workflow file, some parts of the file are required to look a certain way for the enable
command to function. In short, variables prefixed with $
should not be changed. Refer to the codeql-analysis.yml
file in this repository for a complete reference.
on:
push:
branches: $GH_CS_DEFAULT_BRANCH_EXPR
pull_request:
branches: $GH_CS_DEFAULT_BRANCH_EXPR
schedule:
- cron: $GH_CS_SCHEDULE_CRON_EXPR
# ...
strategy:
fail-fast: false
matrix:
language: $GH_CS_MATRIX_LANGUAGE_EXPR
The alerts
subcommand is used to output the set of GitHub Code Scanning alerts of a repository.
usage: gh code-scanning alerts [-h] repos [repos ...]
positional arguments:
repos
optional arguments:
-h, --help show this help message and exit
To list the alerts of a single repository, run the following command:
gh code-scanning alerts owner/repo
With the use of xargs
, it is also possible to list the alerts of all repositories in a GitHub organization. By using gh
to list all of the repositories in an organization, and then passing that list to gh-code-scanning, we can collect the alerts of every repository in an organization by having gh-code-scanning iterate through every repository. For example, the following command will output the alerts of every repository in the organization foo:
gh repo list foo --json nameWithOwner --jq '.[].nameWithOwner' | xargs gh code-scanning alerts
The analyses
subcommand is used to output or delete the GitHub Code Scanning analyses of a repository.
usage: gh code-scanning analyses [-h] [-d] [-r REF] repo
positional arguments:
repo
optional arguments:
-h, --help show this help message and exit
-d, --delete
-r REF, --ref REF
To output a repository's set of analyses, run gh-code-scanning without the delete flag (-d
or --delete
).
gh code-scanning analyses owner/repo
To delete a repository's set of analyses, run gh-code-scanning with the delete flag (-d
or --delete
).
gh code-scanning analyses --delete owner/repo
You can also limit the output or deletion to a particular Git ref (e.g. branch) by specifying the ref name as an argument to the ref flag (-r
or --ref
):
# output analyses of the 'develop' ref
gh code-scanning analyses --ref develop owner/repo
# delete analyses of the 'develop' ref
gh code-scanning analyses --delete --ref develop owner/repo
Check out the wiki for troubleshooting tips!