Skip to content

Commit b3e659b

Browse files
committed
This adds a new CodeQL configuration to the riak-ruby-client repository. It ensures that PR's against the master branch are scanned for security using the CodeQL config file in the new repository spreedly/spreedly-codeql.
Risk: (Low) Tracking: SEC-317 This change affects the tests performed with core, not the code of core itself. It was tested in it's own branch during this process to ensure that Code Scanning for Ruby and Javascript were completed.
1 parent bdb241d commit b3e659b

File tree

1 file changed

+40
-0
lines changed

1 file changed

+40
-0
lines changed

.github/workflows/codeql.yml

+40
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
name: "CodeQL"
2+
3+
on:
4+
push:
5+
branches: [ "master" ]
6+
pull_request:
7+
# The branches below must be a subset of the branches above
8+
branches: [ "master" ]
9+
10+
jobs:
11+
analyze:
12+
name: Analyze
13+
runs-on: ubuntu-latest
14+
permissions:
15+
actions: read
16+
contents: read
17+
security-events: write
18+
strategy:
19+
fail-fast: false
20+
matrix:
21+
language: [ 'javascript', 'ruby' ]
22+
# Learn more about CodeQL language support at https://aka.ms/codeql-docs/language-support
23+
24+
steps:
25+
- name: Checkout repository
26+
uses: actions/checkout@v3
27+
28+
# Initializes the CodeQL tools for scanning.
29+
- name: Initialize CodeQL
30+
uses: github/codeql-action/init@v2
31+
with:
32+
languages: ${{ matrix.language }}
33+
# Details on CodeQL's query packs refer to : https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
34+
config-file: spreedly/spreedly-codeql/configuration/default-codeql-config.yml@main
35+
external-repository-token: ${{ secrets.INFRASTRUCTURE_PACKAGE_PAT }}
36+
37+
- name: Perform CodeQL Analysis
38+
uses: github/codeql-action/analyze@v2
39+
with:
40+
category: "/language:${{matrix.language}}"

0 commit comments

Comments
 (0)