Skip to content

ci(github-action): update github/codeql-action action to v3.27.3 #822

ci(github-action): update github/codeql-action action to v3.27.3

ci(github-action): update github/codeql-action action to v3.27.3 #822

Workflow file for this run

# For most projects, this workflow file will not need changing; you simply need
# to commit it to your repository.
#
# You may wish to alter this file to override the set of languages analyzed,
# or to provide custom queries or build logic.
#
# ******** NOTE ********
# We have attempted to detect the languages in your repository. Please check
# the `language` matrix defined below to confirm you have the correct set of
# supported CodeQL languages.
#
name: "CodeQL"
on:
push:
branches: [ "main" ]
pull_request:
# The branches below must be a subset of the branches above
branches: [ "main" ]
schedule:
- cron: '28 20 * * 1'
env:
DOTNET_GENERATE_ASPNET_CERTIFICATE: false
DOTNET_NOLOGO: true
DOTNET_SKIP_FIRST_TIME_EXPERIENCE: true
DOTNET_CLI_TELEMETRY_OPTOUT: true
permissions:
contents: read
jobs:
analyze:
name: Analyze
runs-on: ubuntu-latest
timeout-minutes: ${{ (matrix.language == 'swift' && 120) || 360 }}
permissions:
actions: read
contents: read
security-events: write
strategy:
fail-fast: false
matrix:
# Learn more about CodeQL language support at https://aka.ms/codeql-docs/language-support
language: [ 'csharp', 'javascript-typescript' ]
steps:
- name: πŸ›‘οΈ Harden Runner
uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
with:
disable-sudo: true
egress-policy: block
allowed-endpoints: >
aka.ms:443
api.github.com:443
api.nuget.org:443
dotnetcli.azureedge.net:443
github.com:443
objects.githubusercontent.com:443
registry.npmjs.org:443
uploads.github.com:443
- name: πŸ›’ Checkout repository
uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1
with:
fetch-depth: 0
- name: 🧰 Setup .NET
uses: actions/setup-dotnet@6bd8b7f7774af54e05809fcc5431931b3eb1ddee # v4.0.1
with:
dotnet-version: |
6.x
8.x
global-json-file: global.json
if: matrix.language == 'csharp'
- name: πŸ—ƒοΈ Setup NuGet cache
uses: actions/cache@3624ceb22c1c5a301c8db4169662070a689d9ea8 # v4.1.1
with:
path: ~/.nuget/packages
key: ${{ runner.os }}-nuget-${{ hashFiles('**/packages.lock.json') }}
restore-keys: ${{ runner.os }}-nuget-
if: matrix.language == 'csharp'
- name: 🧰 Setup Node
uses: actions/setup-node@0a44ba7841725637a19e28fa30b79a866c81b0a6 # v4.0.4
with:
node-version: 20
cache: npm
cache-dependency-path: docs/package-lock.json
if: matrix.language == 'javascript-typescript'
# Initializes the CodeQL tools for scanning.
- name: πŸ› οΈ Initialize CodeQL
uses: github/codeql-action/init@9278e421667d5d90a2839487a482448c4ec7df4d # v3.27.2
with:
languages: ${{ matrix.language }}
# If you wish to specify custom queries, you can do so here or in a config file.
# By default, queries listed here will override any specified in a config file.
# Prefix the list here with "+" to use these queries and those in the config file.
# For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
# queries: security-extended,security-and-quality
- name: πŸ“₯ Restore dependencies
run: dotnet restore --locked-mode
if: matrix.language == 'csharp'
- name: πŸ—οΈ Build
run: dotnet build --no-restore -c Release
if: matrix.language == 'csharp'
- name: πŸ“₯ Install dependencies
run: npm ci
working-directory: docs
if: matrix.language == 'javascript-typescript'
- name: πŸ—οΈ Build with VitePress
run: npm run docs:build
working-directory: docs
if: matrix.language == 'javascript-typescript'
- name: πŸ” Perform CodeQL Analysis
uses: github/codeql-action/analyze@9278e421667d5d90a2839487a482448c4ec7df4d # v3.27.2
with:
category: "/language:${{matrix.language}}"