You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# required to fetch internal or private CodeQL packs
39
-
packages: read
40
-
41
-
# only required for workflows in private repositories
42
31
actions: read
43
32
contents: read
33
+
security-events: write
44
34
45
35
strategy:
46
36
fail-fast: false
47
37
matrix:
48
-
include:
49
-
- language: ruby
50
-
build-mode: none
51
-
# CodeQL supports the following values keywords for 'language': 'c-cpp', 'csharp', 'go', 'java-kotlin', 'javascript-typescript', 'python', 'ruby', 'swift'
52
-
# Use `c-cpp` to analyze code written in C, C++ or both
53
-
# Use 'java-kotlin' to analyze code written in Java, Kotlin or both
54
-
# Use 'javascript-typescript' to analyze code written in JavaScript, TypeScript or both
55
-
# To learn more about changing the languages that are analyzed or customizing the build mode for your analysis,
56
-
# see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning.
57
-
# If you are analyzing a compiled language, you can modify the 'build-mode' for that language to customize how
58
-
# your codebase is analyzed, see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/codeql-code-scanning-for-compiled-languages
38
+
language: ["ruby"]
39
+
# CodeQL supports [ $supported-codeql-languages ]
40
+
# Learn more about CodeQL language support at https://aka.ms/codeql-docs/language-support
# If you wish to specify custom queries, you can do so here or in a config file.
75
-
# By default, queries listed here will override any specified in a config file.
76
-
# Prefix the list here with "+" to use these queries and those in the config file.
65
+
# ℹ️ Command-line programs to run using the OS shell.
66
+
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
77
67
78
-
# For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
79
-
# queries: security-extended,security-and-quality
68
+
# If the Autobuild fails above, remove it and uncomment the following three lines.
69
+
# modify them (or add more) to build your code if your project, please refer to the EXAMPLE below for guidance.
80
70
81
-
# If the analyze step fails for one of the languages you are analyzing with
82
-
# "We were unable to automatically build your code", modify the matrix above
83
-
# to set the build mode to "manual" for that language. Then modify this step
84
-
# to build your code.
85
-
# ℹ️ Command-line programs to run using the OS shell.
86
-
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
87
-
- if: matrix.build-mode == 'manual'
88
-
shell: bash
89
-
run: |
90
-
echo 'If you are using a "manual" build mode for one or more of the' \
91
-
'languages you are analyzing, replace this with the commands to build' \
# Public documentation: https://docs.github.com/en/code-security/supply-chain-security/understanding-your-software-supply-chain/about-dependency-review#dependency-review-enforcement
10
+
name: 'Dependency review'
11
+
on:
12
+
pull_request:
13
+
branches: [ "main", "main*" ]
11
14
15
+
# If using a dependency submission action in this workflow this permission will need to be set to:
0 commit comments