You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This adds a new CodeQL configuration to the riak-ruby-client repository. It ensures that PR's against the master branch are scanned for security using the CodeQL config file in the new repository spreedly/spreedly-codeql.
Risk: (Low)
Tracking: SEC-317
This change affects the tests performed with core, not the code of core itself. It was tested in it's own branch during this process to ensure that Code Scanning for Ruby and Javascript were completed.
# The branches below must be a subset of the branches above
8
+
branches: [ "master" ]
9
+
10
+
jobs:
11
+
analyze:
12
+
name: Analyze
13
+
runs-on: ubuntu-latest
14
+
permissions:
15
+
actions: read
16
+
contents: read
17
+
security-events: write
18
+
strategy:
19
+
fail-fast: false
20
+
matrix:
21
+
language: [ 'javascript', 'ruby' ]
22
+
# Learn more about CodeQL language support at https://aka.ms/codeql-docs/language-support
23
+
24
+
steps:
25
+
- name: Checkout repository
26
+
uses: actions/checkout@v3
27
+
28
+
# Initializes the CodeQL tools for scanning.
29
+
- name: Initialize CodeQL
30
+
uses: github/codeql-action/init@v2
31
+
with:
32
+
languages: ${{ matrix.language }}
33
+
# Details on CodeQL's query packs refer to : https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
0 commit comments