2
0

codeql-analysis.yml 928 B

1234567891011121314151617181920212223242526272829303132333435
  1. name: 'CodeQL'
  2. on:
  3. schedule:
  4. - cron: '0 8 * * 3'
  5. permissions:
  6. contents: read # to fetch code (actions/checkout)
  7. jobs:
  8. analyze:
  9. permissions:
  10. contents: read # to fetch code (actions/checkout)
  11. security-events: write # to upload SARIF results (github/codeql-action/analyze)
  12. name: Analyze
  13. runs-on: ubuntu-latest
  14. strategy:
  15. fail-fast: false
  16. matrix:
  17. # https://docs.github.com/en/free-pro-team@latest/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#changing-the-languages-that-are-analyzed
  18. language: ['javascript', 'python']
  19. steps:
  20. - name: Checkout repository
  21. uses: actions/checkout@v2
  22. - name: Initialize CodeQL
  23. uses: github/codeql-action/init@v1
  24. with:
  25. languages: ${{ matrix.language }}
  26. - name: Perform CodeQL Analysis
  27. uses: github/codeql-action/analyze@v1