Skip to content

CodeQL

CodeQL #86

name: "CodeQL"
on:
pull_request:
schedule:
- cron: '26 23 * * 2'
permissions: # added using https://github.com/step-security/secure-workflows
contents: read
jobs:
analyze:
permissions:
actions: read # for github/codeql-action/init to get workflow details
contents: read # for actions/checkout to fetch code
security-events: write # for github/codeql-action/autobuild to send a status report
name: Analyze
runs-on: ubuntu-latest
strategy:
fail-fast: false
matrix:
language: [ 'javascript' ]
steps:
- name: Harden Runner
uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7
with:
disable-sudo: true
egress-policy: block
allowed-endpoints: >
api.github.com:443
github.com:443
54.185.253.63:443
- name: Checkout repository
uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871
- name: Initialize CodeQL
uses: github/codeql-action/init@c36620d31ac7c881962c3d9dd939c40ec9434f2b
with:
languages: ${{ matrix.language }}
- name: Autobuild
uses: github/codeql-action/autobuild@c36620d31ac7c881962c3d9dd939c40ec9434f2b
- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@c36620d31ac7c881962c3d9dd939c40ec9434f2b
#qodana:
# permissions:
# actions: read # for github/codeql-action/init to get workflow details
# contents: read # for actions/checkout to fetch code
# security-events: write # for github/codeql-action/autobuild to send a status report
#
# name: Qodana
# runs-on: ubuntu-latest
#
# steps:
# - name: Harden Runner
# uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7
# with:
# disable-sudo: true
# egress-policy: block
# allowed-endpoints: >
# api.qodana.cloud:443
# github.com:443
# objects.githubusercontent.com:443
# prod.fus.aws.intellij.net:443
# production.cloudflare.docker.com:443
# qc-results-prod.s3.eu-west-1.amazonaws.com:443
# raw.githubusercontent.com:443
# registry-1.docker.io:443
# auth.docker.io:443
# registry.npmjs.org:443
# resources.jetbrains.com:443
# schemastore.org:443
#
# - name: Checkout repository
# uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871
#
# - name: 'Qodana Scan'
# uses: JetBrains/qodana-action@61b94e7e3a716dcb9e2030cfd79cd46149d56c26
# env:
# QODANA_TOKEN: ${{ secrets.QODANA_TOKEN }}
#
# - uses: github/codeql-action/upload-sarif@67a35a08586135a9573f4327e904ecbf517a882d
# with:
# sarif_file: ${{ runner.temp }}/qodana/results/qodana.sarif.json