Skip to content

Commit 6842b54

Browse files
committed
regen
1 parent 86d227d commit 6842b54

File tree

5 files changed

+1948
-2398
lines changed

5 files changed

+1948
-2398
lines changed

.github/workflows/code-qa.yml

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,18 @@
11
# This workflow will do a clean install of node dependencies, build the source code and run tests across different versions of node
22
# For more information see: https://help.github.com/actions/language-and-framework-guides/using-nodejs-with-github-actions
33

4-
name: Node.js CI
4+
name: Code Quality Assurance
55

66
on:
77
push:
88
branches: [master]
99
pull_request:
1010
branches: [master]
1111

12+
permissions:
13+
contents: read
1214
jobs:
13-
build:
15+
code-quality:
1416
runs-on: ubuntu-latest
1517

1618
strategy:
@@ -20,7 +22,7 @@ jobs:
2022

2123
steps:
2224
- name: Checkout repository
23-
uses: actions/checkout@v4
25+
uses: actions/checkout@v5
2426
- name: Use Node.js ${{ matrix.node-version }}
2527
uses: actions/setup-node@v4
2628
with:

.github/workflows/codeql-analysis.yml

Lines changed: 39 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -9,31 +9,44 @@
99
# the `language` matrix defined below to confirm you have the correct set of
1010
# supported CodeQL languages.
1111
#
12-
name: "CodeQL"
12+
name: 'CodeQL'
1313

1414
on:
1515
push:
16-
branches: [master]
16+
branches: ['master']
1717
pull_request:
18-
# The branches below must be a subset of the branches above
19-
branches: [master]
18+
branches: ['master']
2019

2120
jobs:
2221
analyze:
2322
name: Analyze
24-
runs-on: ubuntu-latest
23+
# Runner size impacts CodeQL analysis time. To learn more, please see:
24+
# - https://gh.io/recommended-hardware-resources-for-running-codeql
25+
# - https://gh.io/supported-runners-and-hardware-resources
26+
# - https://gh.io/using-larger-runners
27+
# Consider using larger runners for possible analysis time improvements.
28+
runs-on: ${{ (matrix.language == 'swift' && 'macos-latest') || 'ubuntu-latest' }}
29+
timeout-minutes: ${{ (matrix.language == 'swift' && 120) || 360 }}
30+
permissions:
31+
# required for all workflows
32+
security-events: write
33+
34+
# only required for workflows in private repositories
35+
actions: read
36+
contents: read
2537

2638
strategy:
2739
fail-fast: false
2840
matrix:
29-
language: ["javascript"]
30-
# CodeQL supports [ 'cpp', 'csharp', 'go', 'java', 'javascript', 'python' ]
31-
# Learn more:
32-
# https://docs.github.com/en/free-pro-team@latest/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#changing-the-languages-that-are-analyzed
41+
language: ['javascript-typescript', 'actions']
42+
# CodeQL supports [ 'c-cpp', 'csharp', 'go', 'java-kotlin', 'javascript-typescript', 'python', 'ruby', 'swift' ]
43+
# Use only 'java-kotlin' to analyze code written in Java, Kotlin or both
44+
# Use only 'javascript-typescript' to analyze code written in JavaScript, TypeScript or both
45+
# Learn more about CodeQL language support at https://aka.ms/codeql-docs/language-support
3346

3447
steps:
3548
- name: Checkout repository
36-
uses: actions/checkout@v4
49+
uses: actions/checkout@v5
3750

3851
# Initializes the CodeQL tools for scanning.
3952
- name: Initialize CodeQL
@@ -43,23 +56,30 @@ jobs:
4356
# If you wish to specify custom queries, you can do so here or in a config file.
4457
# By default, queries listed here will override any specified in a config file.
4558
# Prefix the list here with "+" to use these queries and those in the config file.
46-
# queries: ./path/to/local/query, your-org/your-repo/queries@main
4759

48-
# Autobuild attempts to build any compiled languages (C/C++, C#, or Java).
60+
# For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
61+
# queries: security-extended,security-and-quality
62+
63+
# This workflow runs CodeQL analysis on the codebase to find security vulnerabilities.
64+
# For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
65+
# queries: security-extended,security-and-quality
66+
67+
# Autobuild attempts to build any compiled languages (C/C++, C#, Go, Java, or Swift).
4968
# If this step fails, then you should remove it and run the build manually (see below)
5069
- name: Autobuild
5170
uses: github/codeql-action/autobuild@v3
5271

5372
# ℹ️ Command-line programs to run using the OS shell.
54-
# 📚 https://git.io/JvXDl
73+
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
5574

56-
# ✏️ If the Autobuild fails above, remove it and uncomment the following three lines
57-
# and modify them (or add more) to build your code if your project
58-
# uses a compiled language
75+
# If the Autobuild fails above, remove it and uncomment the following three lines.
76+
# modify them (or add more) to build your code if your project, please refer to the EXAMPLE below for guidance.
5977

60-
#- run: |
61-
# make bootstrap
62-
# make release
78+
# - run: |
79+
# echo "Run, Build Application using script"
80+
# ./location_of_script_within_repo/buildscript.sh
6381

6482
- name: Perform CodeQL Analysis
6583
uses: github/codeql-action/analyze@v3
84+
with:
85+
category: '/language:${{matrix.language}}'

.github/workflows/ossar.yml

Lines changed: 0 additions & 48 deletions
This file was deleted.

0 commit comments

Comments
 (0)