codeql-code-scanning.yml 1.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445
  1. name: "CodeQL"
  2. on:
  3. push:
  4. branches: [ "dev" ]
  5. pull_request:
  6. # The branches below must be a subset of the branches above
  7. branches: [ "dev" ]
  8. schedule:
  9. - cron: '29 23 * * 0'
  10. workflow_dispatch:
  11. jobs:
  12. analyze:
  13. name: Analyze
  14. runs-on: ubuntu-latest
  15. permissions:
  16. actions: read
  17. contents: read
  18. security-events: write
  19. strategy:
  20. fail-fast: false
  21. matrix:
  22. language: [ 'javascript' ]
  23. steps:
  24. - name: Checkout repository
  25. uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4
  26. # Initializes the CodeQL tools for scanning.
  27. - name: Initialize CodeQL
  28. uses: github/codeql-action/init@294a9d92911152fe08befb9ec03e240add280cb3 # v3
  29. with:
  30. languages: ${{ matrix.language }}
  31. config-file: ./.github/codeql-config.yml
  32. queries: security-and-quality
  33. - name: Autobuild
  34. uses: github/codeql-action/autobuild@294a9d92911152fe08befb9ec03e240add280cb3 # v3
  35. - name: Perform CodeQL Analysis
  36. uses: github/codeql-action/analyze@294a9d92911152fe08befb9ec03e240add280cb3 # v3
  37. with:
  38. category: "/language:${{matrix.language}}"