-
Notifications
You must be signed in to change notification settings - Fork 21
56 lines (49 loc) · 1.82 KB
/
code-scanning-v4.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
# This workflow is inherited from our internal .github repo at https://github.com/lifeomic/.github/blob/master/workflow-templates/code-scanning-2021-06-08.yml
# Setting up this workflow on the repository will perform a static scan for security issues using GitHub Code Scanning.
# Any findings for a repository can be found under the `Security` tab -> `Code Scanning Alerts`
name: "CodeQL"
on:
push:
branches: [master]
paths-ignore:
- test
- tests
- '**/test'
- '**/tests'
- '**/*.test.js'
- '**/*.test.ts'
pull_request:
branches: [master]
paths-ignore:
- test
- tests
- '**/test'
- '**/tests'
- '**/*.test.js'
- '**/*.test.ts'
jobs:
analyze:
if: ${{ !contains(github.head_ref, 'dependabot') }}
name: Analyze
runs-on: ubuntu-latest
strategy:
fail-fast: false
steps:
- name: Checkout repository
uses: actions/checkout@v2
with:
# We must fetch at least the immediate parents so that if this is
# a pull request then we can checkout the head.
fetch-depth: 2
# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@v1
with:
config-file: lifeomic/.github/config-files/codeql-config.yml@master # uses our config file from the lifeomic/.github repo
queries: +security-extended # This will run all queries at https://github.com/github/codeql/:language/ql/src/codeql-suites/:language-security-extended.qls
# Autobuild attempts to build any compiled languages (C/C++, C#, or Java).
# If this step fails, it should be removed and replaced with custom build steps.
- name: Autobuild
uses: github/codeql-action/autobuild@v1
- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v1