forked from libreswan/libreswan
-
Notifications
You must be signed in to change notification settings - Fork 0
46 lines (39 loc) · 1.62 KB
/
semgrep.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
# Name of this GitHub Actions workflow.
name: Semgrep
on:
# Scan changed files in PRs (diff-aware scanning):
pull_request: {}
# Scan mainline branches and report all findings:
push:
branches: ["master", "main"]
# Schedule the CI job (this method uses cron syntax):
schedule:
- cron: "20 17 * * *" # Sets Semgrep to scan every day at 17:20 UTC.
# It is recommended to change the schedule to a random time.
# Enable manual trigger of the action. Useful for debugging purposes
workflow_dispatch:
jobs:
semgrep:
# User definable name of this GitHub Actions job.
name: Scan
# If you are self-hosting, change the following `runs-on` value:
runs-on: ubuntu-latest
permissions:
# required for all workflows
security-events: write
container:
# A Docker image with Semgrep installed. Do not change this.
image: returntocorp/semgrep
# Skip any PR created by dependabot to avoid permission issues:
if: (github.actor != 'dependabot[bot]')
steps:
# Fetch project source with GitHub Actions Checkout.
- uses: actions/checkout@v3
# Run the "semgrep ci" command on the command line of the docker image.
- run: semgrep ci --sarif --output=semgrep.sarif --config auto --exclude-rule c.lang.security.insecure-use-memset.insecure-use-memset --exclude testing/
- name: Upload SARIF file for GitHub Advanced Security Dashboard
# pinning to full commit hash from tagged version v2.20.4
uses: github/codeql-action/upload-sarif@489225d82a57396c6f426a40e66d461b16b3461d
with:
sarif_file: semgrep.sarif
if: always()