|
6 | 6 | - main |
7 | 7 | - release-* |
8 | 8 | pull_request: |
9 | | - # The branches below must be a subset of the branches above |
10 | 9 | branches: |
11 | 10 | - main |
12 | 11 | - release-* |
|
38 | 37 | build-mode: autobuild |
39 | 38 | - language: javascript-typescript |
40 | 39 | build-mode: none |
41 | | - # CodeQL supports the following values keywords for 'language': 'c-cpp', 'csharp', 'go', 'java-kotlin', 'javascript-typescript', 'python', 'ruby', 'swift' |
42 | | - # Use `c-cpp` to analyze code written in C, C++ or both |
43 | | - # Use 'java-kotlin' to analyze code written in Java, Kotlin or both |
44 | | - # Use 'javascript-typescript' to analyze code written in JavaScript, TypeScript or both |
45 | | - # To learn more about changing the languages that are analyzed or customizing the build mode for your analysis, |
46 | | - # see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning. |
47 | | - # If you are analyzing a compiled language, you can modify the 'build-mode' for that language to customize how |
48 | | - # your codebase is analyzed, see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/codeql-code-scanning-for-compiled-languages. |
| 40 | + |
49 | 41 | steps: |
50 | 42 | - name: Checkout repository |
51 | 43 | uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 |
|
56 | 48 | with: |
57 | 49 | languages: ${{ matrix.language }} |
58 | 50 | build-mode: ${{ matrix.build-mode }} |
59 | | - # If you wish to specify custom queries, you can do so here or in a config file. |
60 | | - # By default, queries listed here will override any specified in a config file. |
61 | | - # Prefix the list here with "+" to use these queries and those in the config file. |
62 | | - |
63 | | - # For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs |
64 | | - # queries: security-extended,security-and-quality |
| 51 | + queries: security-and-quality |
65 | 52 |
|
66 | 53 | - name: Perform CodeQL Analysis |
67 | 54 | uses: github/codeql-action/analyze@662472033e021d55d94146f66f6058822b0b39fd # v3.27.0 |
|
0 commit comments