Advanced Security CodeQL Scan #576
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: 'Advanced Security CodeQL Scan' | |
on: | |
push: | |
branches: ['master'] | |
pull_request: | |
branches: ['master'] | |
schedule: | |
- cron: '43 11 * * 5' | |
jobs: | |
analyze: | |
name: Analyze | |
# Runner size impacts CodeQL analysis time. To learn more, please see: | |
# - https://gh.io/recommended-hardware-resources-for-running-codeql | |
# - https://gh.io/supported-runners-and-hardware-resources | |
# - https://gh.io/using-larger-runners | |
# Consider using larger runners for possible analysis time improvements. | |
runs-on: 'ubuntu-latest' | |
timeout-minutes: 30 | |
permissions: | |
security-events: write | |
actions: read | |
contents: read | |
strategy: | |
fail-fast: false | |
matrix: | |
language: ['javascript-typescript'] | |
steps: | |
- name: Checkout repository | |
uses: actions/checkout@v4 | |
continue-on-error: true | |
with: | |
ref: ${{ github.sha }} | |
# Initializes the CodeQL tools for scanning. | |
- name: Initialize CodeQL | |
uses: github/codeql-action/init@v3 | |
continue-on-error: true | |
with: | |
languages: ${{ matrix.language }} | |
# For more details on CodeQL's query packs, refer to: | |
# https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs | |
queries: security-extended,security-and-quality | |
# Autobuild attempts to build any compiled languages (C/C++, C#, Go, Java, or Swift). | |
- name: Autobuild | |
uses: github/codeql-action/autobuild@v3 | |
continue-on-error: true | |
- name: Perform CodeQL Analysis | |
uses: github/codeql-action/analyze@v3 | |
continue-on-error: true | |
with: | |
category: '/language:${{matrix.language}}' |