Skip to content

Commit 2ff28dc

Browse files
Adding Code Scanner Semgrep.yml workflow file
1 parent 78dd2d9 commit 2ff28dc

File tree

1 file changed

+48
-0
lines changed

1 file changed

+48
-0
lines changed

.github/workflows/Semgrep.yml

+48
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
# Name of this GitHub Actions workflow.
2+
name: Semgrep
3+
4+
on:
5+
# Scan changed files in PRs (diff-aware scanning):
6+
# The branches below must be a subset of the branches above
7+
pull_request:
8+
branches: ["master", "main"]
9+
push:
10+
branches: ["master", "main"]
11+
schedule:
12+
- cron: '0 6 * * *'
13+
14+
15+
permissions:
16+
contents: read
17+
18+
jobs:
19+
semgrep:
20+
# User definable name of this GitHub Actions job.
21+
permissions:
22+
contents: read # for actions/checkout to fetch code
23+
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
24+
name: semgrep/ci
25+
# If you are self-hosting, change the following `runs-on` value:
26+
runs-on: ubuntu-latest
27+
28+
container:
29+
# A Docker image with Semgrep installed. Do not change this.
30+
image: returntocorp/semgrep
31+
32+
# Skip any PR created by dependabot to avoid permission issues:
33+
if: (github.actor != 'dependabot[bot]')
34+
35+
steps:
36+
# Fetch project source with GitHub Actions Checkout.
37+
- uses: actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3
38+
# Run the "semgrep ci" command on the command line of the docker image.
39+
- run: semgrep ci --sarif --output=semgrep.sarif
40+
env:
41+
# Add the rules that Semgrep uses by setting the SEMGREP_RULES environment variable.
42+
SEMGREP_RULES: p/default # more at semgrep.dev/explore
43+
44+
- name: Upload SARIF file for GitHub Advanced Security Dashboard
45+
uses: github/codeql-action/upload-sarif@6c089f53dd51dc3fc7e599c3cb5356453a52ca9e # v2.20.0
46+
with:
47+
sarif_file: semgrep.sarif
48+
if: always()

0 commit comments

Comments
 (0)