Bump sigstore/cosign-installer from 9becc617647dfa20ae7b1151972e9b3a2c338a2b to 7a59e5acc8f2930fee8c2ed75a4f2faae6c329ce #434
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: CodeQL Scan | |
on: | |
push: | |
branches: [ "master" ] | |
paths-ignore: | |
- '**/*.md' | |
- '**/*.gitignore' | |
- '**/*.gitattributes' | |
pull_request: | |
branches: [ "master" ] | |
workflow_dispatch: | |
schedule: | |
- cron: '41 6 * * 5' | |
permissions: # added using https://github.com/step-security/secure-workflows | |
contents: read | |
env: | |
DOTNET_NOLOGO: true # Disable the .NET logo in the console output | |
DOTNET_SKIP_FIRST_TIME_EXPERIENCE: true # Disable the .NET first time experience to skip caching NuGet packages and speed up the build | |
DOTNET_CLI_TELEMETRY_OPTOUT: true # Disable sending .NET CLI telemetry to Microsoft | |
jobs: | |
analyze: | |
name: Analyze | |
runs-on: ubuntu-latest | |
permissions: | |
actions: read | |
contents: read | |
security-events: write | |
strategy: | |
fail-fast: false | |
matrix: | |
language: [ 'csharp' ] | |
steps: | |
- name: Harden Runner | |
uses: step-security/harden-runner@ebacdc22ef6c2cfb85ee5ded8f2e640f4c776dd5 | |
with: | |
egress-policy: block | |
allowed-endpoints: > | |
api.github.com:443 | |
api.nuget.org:443 | |
dotnetbuilds.azureedge.net:443 | |
dotnetcli.azureedge.net:443 | |
dotnetcli.blob.core.windows.net:443 | |
github.com:443 | |
uploads.github.com:443 | |
- name: Checkout repository | |
uses: actions/checkout@93ea575cb5d8a053eaa0ac8fa3b40d7e05a33cc8 | |
- name: Initialize CodeQL | |
uses: github/codeql-action/init@cc7986c02bac29104a72998e67239bb5ee2ee110 | |
with: | |
languages: ${{ matrix.language }} | |
# queries: security-extended,security-and-quality # https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs | |
- name: Setup .Net | |
uses: actions/setup-dotnet@607fce577a46308457984d59e4954e075820f10a | |
with: | |
dotnet-version: 6.0.x | |
- name: Restore Dependencies | |
run: dotnet restore src/EditRelease.sln | |
- name: Build EditRelease | |
run: dotnet build src/EditRelease.sln --configuration Release --no-restore /p:UseSharedCompilation=false | |
- name: Perform CodeQL Analysis | |
uses: github/codeql-action/analyze@cc7986c02bac29104a72998e67239bb5ee2ee110 |