|
1 |
| -# For most projects, this workflow file will not need changing; you simply need |
2 |
| -# to commit it to your repository. |
3 |
| -# |
4 |
| -# You may wish to alter this file to override the set of languages analyzed, |
5 |
| -# or to provide custom queries or build logic. |
6 |
| -# |
7 |
| -# ******** NOTE ******** |
8 |
| -# We have attempted to detect the languages in your repository. Please check |
9 |
| -# the `language` matrix defined below to confirm you have the correct set of |
10 |
| -# supported CodeQL languages. |
11 |
| -# |
12 |
| -name: "CodeQL" |
| 1 | +# Define the name of the workflow |
| 2 | +name: "CodeQL-Advanced" |
13 | 3 |
|
| 4 | +# Define when the workflow should be triggered (on push to a specific branch and pull requests to the master branch) |
14 | 5 | on:
|
15 | 6 | push:
|
16 | 7 | branches: [ "main" ]
|
17 | 8 | pull_request:
|
18 | 9 | branches: [ "main" ]
|
19 |
| - schedule: |
20 |
| - - cron: '38 20 * * 1' |
21 | 10 |
|
| 11 | +# Define the jobs that will be executed as part of the workflow |
22 | 12 | jobs:
|
23 | 13 | analyze:
|
24 |
| - name: Analyze (${{ matrix.language }}) |
25 |
| - # Runner size impacts CodeQL analysis time. To learn more, please see: |
26 |
| - # - https://gh.io/recommended-hardware-resources-for-running-codeql |
27 |
| - # - https://gh.io/supported-runners-and-hardware-resources |
28 |
| - # - https://gh.io/using-larger-runners (GitHub.com only) |
29 |
| - # Consider using larger runners or machines with greater resources for possible analysis time improvements. |
30 |
| - runs-on: ${{ (matrix.language == 'swift' && 'macos-latest') || 'ubuntu-latest' }} |
| 14 | + name: Analyze |
| 15 | + runs-on: |
| 16 | + group: ncats-onprem-internal-runners |
31 | 17 | timeout-minutes: ${{ (matrix.language == 'swift' && 120) || 360 }}
|
32 | 18 | permissions:
|
33 |
| - # required for all workflows |
34 | 19 | security-events: write
|
35 |
| - |
36 |
| - # required to fetch internal or private CodeQL packs |
37 |
| - packages: read |
38 |
| - |
39 |
| - # only required for workflows in private repositories |
40 | 20 | actions: read
|
41 | 21 | contents: read
|
42 | 22 |
|
| 23 | + # Define the matrix strategy for parallel runs with different languages |
43 | 24 | strategy:
|
44 | 25 | fail-fast: false
|
45 | 26 | matrix:
|
46 |
| - include: |
47 |
| - # CodeQL supports the following values keywords for 'language': 'c-cpp', 'csharp', 'go', 'java-kotlin', 'javascript-typescript', 'python', 'ruby', 'swift' |
48 |
| - # Use `c-cpp` to analyze code written in C, C++ or both |
49 |
| - # Use 'java-kotlin' to analyze code written in Java, Kotlin or both |
50 |
| - # Use 'javascript-typescript' to analyze code written in JavaScript, TypeScript or both |
51 |
| - # To learn more about changing the languages that are analyzed or customizing the build mode for your analysis, |
52 |
| - # see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning. |
53 |
| - # If you are analyzing a compiled language, you can modify the 'build-mode' for that language to customize how |
54 |
| - # your codebase is analyzed, see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/codeql-code-scanning-for-compiled-languages |
| 27 | + language: [ 'javascript-typescript' ] |
| 28 | + |
55 | 29 | steps:
|
| 30 | + # Step 1: Checkout repository |
56 | 31 | - name: Checkout repository
|
57 | 32 | uses: actions/checkout@v4
|
58 | 33 |
|
59 |
| - # Initializes the CodeQL tools for scanning. |
| 34 | + # Step 2: Initialize CodeQL for scanning |
60 | 35 | - name: Initialize CodeQL
|
61 | 36 | uses: github/codeql-action/init@v3
|
62 | 37 | with:
|
63 | 38 | languages: ${{ matrix.language }}
|
64 |
| - build-mode: ${{ matrix.build-mode }} |
65 |
| - # If you wish to specify custom queries, you can do so here or in a config file. |
66 |
| - # By default, queries listed here will override any specified in a config file. |
67 |
| - # Prefix the list here with "+" to use these queries and those in the config file. |
68 |
| - |
69 |
| - # For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs |
70 |
| - # queries: security-extended,security-and-quality |
71 |
| - |
72 |
| - # If the analyze step fails for one of the languages you are analyzing with |
73 |
| - # "We were unable to automatically build your code", modify the matrix above |
74 |
| - # to set the build mode to "manual" for that language. Then modify this step |
75 |
| - # to build your code. |
76 |
| - # ℹ️ Command-line programs to run using the OS shell. |
77 |
| - # 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun |
78 |
| - - if: matrix.build-mode == 'manual' |
79 |
| - shell: bash |
80 |
| - run: | |
81 |
| - echo 'If you are using a "manual" build mode for one or more of the' \ |
82 |
| - 'languages you are analyzing, replace this with the commands to build' \ |
83 |
| - 'your code, for example:' |
84 |
| - echo ' make bootstrap' |
85 |
| - echo ' make release' |
86 |
| - exit 1 |
| 39 | + |
| 40 | + # Step 3: Autobuild the code. |
| 41 | + - name: Autobuild |
| 42 | + uses: github/codeql-action/autobuild@v3 |
87 | 43 |
|
| 44 | + # Step 4: Analyzes the code using CodeQL, with the analysis category based on the matrix language. |
88 | 45 | - name: Perform CodeQL Analysis
|
89 | 46 | uses: github/codeql-action/analyze@v3
|
90 | 47 | with:
|
91 | 48 | category: "/language:${{matrix.language}}"
|
| 49 | + |
| 50 | + # Step 5: Generate Security Report |
| 51 | + - name: Generate Security Report |
| 52 | + uses: rsdmike/github-security-report-action@v3.0.4 |
| 53 | + with: |
| 54 | + token: ${{ secrets.GITHUB_TOKEN }} |
| 55 | + |
| 56 | + # Step 6: Uploads artifacts (PDF reports) generated during the workflow to download. |
| 57 | + - name: Upload Artifacts |
| 58 | + uses: actions/upload-artifact@v4 |
| 59 | + with: |
| 60 | + name: reports |
| 61 | + path: ./*.pdf |
0 commit comments