Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: Try to make CodeQL happy (#20094) #20129

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

jsoref
Copy link
Member

@jsoref jsoref commented Sep 26, 2024

Closes #20094

Checklist:

  • Either (a) I've created an enhancement proposal and discussed it with the community, (b) this is a bug fix, or (c) this does not need to be in the release notes.
  • The title of the PR states what changed and the related issues number (used for the release note).
  • The title of the PR conforms to the Toolchain Guide
  • I've included "Closes [ISSUE #]" or "Fixes [ISSUE #]" in the description to automatically close the associated issue.
  • I've updated both the CLI and UI to expose my feature, or I plan to submit a second PR with them.
  • Does this PR require documentation updates?
  • I've updated documentation as required by this PR.
  • I have signed off all my commits as required by DCO
  • I have written unit and/or e2e tests for my change. PRs without these are unlikely to be merged.
  • My build is green (troubleshooting builds).
  • My new feature complies with the feature status guidelines.
  • I have added a brief description of why this PR is necessary and/or what this PR solves.
  • Optional. My organization is added to USERS.md.
  • Optional. For bug fixes, I've indicated what older releases this fix should be cherry-picked into (this may or may not happen depending on risk/complexity).

@jsoref jsoref requested a review from a team as a code owner September 26, 2024 21:40
Copy link

bunnyshell bot commented Sep 26, 2024

❗ Preview Environment deployment failed on Bunnyshell

See: Environment Details | Pipeline Logs

Available commands (reply to this comment):

  • 🚀 /bns:deploy to redeploy the environment
  • /bns:delete to remove the environment

Copy link

bunnyshell bot commented Sep 26, 2024

✅ Preview Environment created on Bunnyshell but will not be auto-deployed

See: Environment Details

Available commands (reply to this comment):

  • 🚀 /bns:deploy to deploy the environment

@jsoref
Copy link
Member Author

jsoref commented Sep 26, 2024

Before

image

After

image

Note that the other Cleartext thing had been resolved as noise, but I accidentally unresolved the wrong thing when trying to validate this...

Copy link

codecov bot commented Sep 26, 2024

Codecov Report

Attention: Patch coverage is 35.71429% with 9 lines in your changes missing coverage. Please review.

Project coverage is 55.84%. Comparing base (ca91dd9) to head (234d2e2).
Report is 1 commits behind head on master.

Files with missing lines Patch % Lines
...md/argocd/commands/admin/redis_initial_password.go 0.00% 8 Missing ⚠️
common/common.go 83.33% 1 Missing ⚠️
Additional details and impacted files
@@            Coverage Diff             @@
##           master   #20129      +/-   ##
==========================================
- Coverage   55.86%   55.84%   -0.02%     
==========================================
  Files         321      321              
  Lines       44492    44492              
==========================================
- Hits        24854    24848       -6     
- Misses      17072    17074       +2     
- Partials     2566     2570       +4     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

Comment on lines +428 to +429
DefaultRedisInitialCredentials = "argocd-redis"
DefaultRedisInitialCredentialsKey = "auth"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The old var names are so much more clear.... I'd rather try to find some way to get CodeQL to ignore the false positives

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

They don't support annotations. It's just the words. I'm open to anything.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You can mark an item as a false positive in repositories where you have certain permissions, but it has no impact on forks (connected or disconnected), and contributors won't be working from your repository's curated view, they'll work from the blank slate version.

We can file tickets against Code QL – I've filed a bunch. But I don't see how to improve this one. Maybe we can ask them to improve the qhelp – I've done that a couple of times, but I'm not really sure what to say beyond a generic "please think before you file" which is too generic.

@jsoref
Copy link
Member Author

jsoref commented Sep 27, 2024

I should note that I'm submitting this PR under protest. It's stupid that we're considering doing this to work around a silly word list rule in CodeQL, but we've seen enough lousy issues and PRs that it's worth thinking about something like this to avoid more of them.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Consider avoiding CodeQL noise about password / secret fields
2 participants