File: codeql-actions.yml

package info (click to toggle)
libmongocrypt 1.17.0-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 12,572 kB
  • sloc: ansic: 70,067; python: 4,547; cpp: 615; sh: 460; makefile: 44; awk: 8
file content (50 lines) | stat: -rw-r--r-- 1,495 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
name: "CodeQL GitHub Actions"

on:
  push:
    branches: [ "master"]
    tags: ['*']
  pull_request:
    paths:
      - .github/workflows/*.yml
  workflow_dispatch:
  schedule:
    - cron: '17 10 * * 2'
  workflow_call:
    inputs:
      ref:
        required: true
        type: string

jobs:
  analyze-python:
    name: Analyze GitHub Actions
    if: github.repository_owner == 'mongodb' || github.event_name == 'workflow_dispatch'
    runs-on: "ubuntu-latest"
    timeout-minutes: 360
    permissions:
      # required for all workflows
      security-events: write
      # required to fetch internal or private CodeQL packs
      packages: read
    steps:
    - name: Checkout repository
      uses: actions/checkout@v5
      with:
        fetch-depth: 0
        ref: ${{ inputs.ref }}
        persist-credentials: false

    # Initializes the CodeQL tools for scanning.
    - name: Initialize CodeQL
      uses: github/codeql-action/init@16140ae1a102900babc80a33c44059580f687047 # v4
      with:
        languages: actions
        build-mode: none
        # For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
        queries: security-extended

    - name: Perform CodeQL Analysis
      uses: github/codeql-action/analyze@16140ae1a102900babc80a33c44059580f687047 # v4
      with:
        category: "/language:actions"