Skip to content

CodeQL Scan

CodeQL Scan #446

name: CodeQL Scan
on:
push:
branches:
- main
paths-ignore:
- CHANGES.rst
- Makefile
- pyproject.toml
- requirements_upstream.txt
- tox.ini
- xclim/__init__.py
- docs/**.ipynb
- docs/**.py
- docs/**.rst
- .github/**.yml
- .pre-commit-config.yaml
schedule:
- cron: '30 23 * * 5'
permissions: # added using https://github.com/step-security/secure-repo
actions: read
jobs:
analyze:
name: Analyze
runs-on: ubuntu-latest
permissions:
actions: read
contents: read
security-events: write
strategy:
fail-fast: false
matrix:
language:
- 'python'
steps:
- name: Harden Runner
uses: step-security/harden-runner@63c24ba6bd7ba022e95695ff85de572c04a18142 # v2.7.0
with:
disable-sudo: true
egress-policy: block
allowed-endpoints: >
api.github.com:443
files.pythonhosted.org:443
github.com:443
objects.githubusercontent.com:443
pypi.org:443
uploads.github.com:443
- name: Checkout repository
uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@1245696032ecf7d39f87d54daa406e22ddf769a8
with:
languages: ${{ matrix.language }}
- name: Autobuild
uses: github/codeql-action/autobuild@1245696032ecf7d39f87d54daa406e22ddf769a8
- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@1245696032ecf7d39f87d54daa406e22ddf769a8