|
6 | 6 | - main
|
7 | 7 | - release-*
|
8 | 8 | pull_request:
|
9 |
| - # The branches below must be a subset of the branches above |
10 | 9 | branches:
|
11 | 10 | - main
|
12 | 11 | - release-*
|
|
38 | 37 | build-mode: autobuild
|
39 | 38 | - language: javascript-typescript
|
40 | 39 | build-mode: none
|
41 |
| - # CodeQL supports the following values keywords for 'language': 'c-cpp', 'csharp', 'go', 'java-kotlin', 'javascript-typescript', 'python', 'ruby', 'swift' |
42 |
| - # Use `c-cpp` to analyze code written in C, C++ or both |
43 |
| - # Use 'java-kotlin' to analyze code written in Java, Kotlin or both |
44 |
| - # Use 'javascript-typescript' to analyze code written in JavaScript, TypeScript or both |
45 |
| - # To learn more about changing the languages that are analyzed or customizing the build mode for your analysis, |
46 |
| - # see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning. |
47 |
| - # If you are analyzing a compiled language, you can modify the 'build-mode' for that language to customize how |
48 |
| - # your codebase is analyzed, see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/codeql-code-scanning-for-compiled-languages. |
| 40 | + |
49 | 41 | steps:
|
50 | 42 | - name: Checkout repository
|
51 | 43 | uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
|
56 | 48 | with:
|
57 | 49 | languages: ${{ matrix.language }}
|
58 | 50 | build-mode: ${{ matrix.build-mode }}
|
59 |
| - # If you wish to specify custom queries, you can do so here or in a config file. |
60 |
| - # By default, queries listed here will override any specified in a config file. |
61 |
| - # Prefix the list here with "+" to use these queries and those in the config file. |
62 |
| - |
63 |
| - # For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs |
64 |
| - # queries: security-extended,security-and-quality |
| 51 | + queries: security-and-quality |
65 | 52 |
|
66 | 53 | - name: Perform CodeQL Analysis
|
67 | 54 | uses: github/codeql-action/analyze@662472033e021d55d94146f66f6058822b0b39fd # v3.27.0
|
|
0 commit comments