Skip to content

Simplify Regex type and rename it to PreventSyncPattern #13031

Simplify Regex type and rename it to PreventSyncPattern

Simplify Regex type and rename it to PreventSyncPattern #13031

Workflow file for this run

name: CodeQL
on:
workflow_dispatch:
push:
branches:
- master
pull_request:
# The branches below must be a subset of the branches above
branches:
- master
schedule:
# Every Wednesday at 04:20
- cron: 20 4 * * 3
# We set `concurrency` to prevent having this workflow being run on code that is not up-to-date on a PR (a user make multiple push in a quick manner).
# But on the main branch, we don't want that behavior.
# Having the workflow run on each merge commit is something we would like, that could help us where a regression was made and missed by previous checks.
#
# For that we use `head_ref` that is only defined on `pull-request` and fallback to `run_id` (this is a counter, so it's value is unique between workflow call).
concurrency:
group: codeql-${{ github.workflow }}-${{ github.head_ref || github.run_id }}
cancel-in-progress: true
permissions:
contents: read
security-events: write
jobs:
python-analyze:
name: 🐍 Python static code Analysis
runs-on: ubuntu-22.04
env:
poetry-version: 1.5.1
steps:
- name: Checkout repository
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # pin v4.2.2
timeout-minutes: 5
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # pin v3.0.2
id: changes
with:
filters: .github/filters/codeql.yml
- name: Check modified path that require `python-analysis` to run
id: should-run-python-analysis
# We want the job to run when:
# - modifying python code
# - in the merge queue
# - on the main branch
if: >-
steps.changes.outputs.python-analyze == 'true'
|| contains(github.ref, 'gh-readonly-queue')
|| github.ref == 'refs/heads/master'
run: echo "run=true" >> $GITHUB_OUTPUT
shell: bash
# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
if: steps.should-run-python-analysis.outputs.run == 'true'
uses: github/codeql-action/init@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # pin v3.27.5
with:
languages: python
setup-python-dependencies: false
# If you wish to specify custom queries, you can do so here or in a config file.
# By default, queries listed here will override any specified in a config file.
# Prefix the list here with "+" to use these queries and those in the config file.
# Details on CodeQL's query packs refer to : https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
# queries: security-extended,security-and-quality
- uses: ./.github/actions/setup-python-poetry
if: steps.should-run-python-analysis.outputs.run == 'true'
id: setup-python
with:
poetry-version: ${{ env.poetry-version }}
project-path: ./server
- name: Install python deps
if: steps.should-run-python-analysis.outputs.run == 'true'
run: |
poetry install
poetry run sh -c 'echo "CODEQL_PYTHON=$(which python)"' >> $GITHUB_ENV
working-directory: server
env:
POETRY_LIBPARSEC_BUILD_STRATEGY: no_build
- name: Perform CodeQL Analysis
if: steps.should-run-python-analysis.outputs.run == 'true'
uses: github/codeql-action/analyze@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # pin v3.27.5
with:
category: /language:python
# Disabled till we fix Android with Vite
# see issue: #4395
# java-analyze:
# name: ☕ Java static code Analysis
# runs-on: ubuntu-22.04
# env:
# NDK_VERSION: 23.2.8568313
# SDK_VERSION: 30.0.3
# steps:
# - name: Checkout repository
# uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # pin v4.2.2
# timeout-minutes: 5
# - uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # pin v3.0.2
# id: changes
# with:
# filters: .github/filters/codeql.yml
# - name: Check modified path that require `java-analysis` to run
# id: should-run-java-analysis
# if: >-
# steps.changes.outputs.java-analyze == 'true'
# || contains(github.ref, 'gh-readonly-queue')
# || github.ref == 'refs/heads/master'
# run: echo "run=true" >> $GITHUB_OUTPUT
# shell: bash
# - name: Add android cmdline tools to path
# if: steps.should-run-java-analysis.outputs.run == 'true'
# run: echo "$ANDROID_HOME/cmdline-tools/latest/bin" > $GITHUB_PATH
# - name: Install dependencies for Android
# if: steps.should-run-java-analysis.outputs.run == 'true'
# run: sdkmanager --install "ndk;${{ env.NDK_VERSION }}" "build-tools;${{ env.SDK_VERSION }}"
# - name: Install dependencies for ionic project
# if: steps.should-run-java-analysis.outputs.run == 'true'
# run: npm clean-install
# working-directory: client
# - name: Build ionic for Android
# if: steps.should-run-java-analysis.outputs.run == 'true'
# run: |
# npm run android:copy:release
# working-directory: client
# env:
# GRADLE_LIBPARSEC_BUILD_STRATEGY: no_build
# # Initializes the CodeQL tools for scanning.
# - name: Initialize CodeQL
# if: steps.should-run-java-analysis.outputs.run == 'true'
# uses: github/codeql-action/init@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # pin v3.27.5
# with:
# languages: java
# # If you wish to specify custom queries, you can do so here or in a config file.
# # By default, queries listed here will override any specified in a config file.
# # Prefix the list here with "+" to use these queries and those in the config file.
# # Details on CodeQL's query packs refer to : https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
# # queries: security-extended,security-and-quality
# - name: Autobuild android
# if: steps.should-run-java-analysis.outputs.run == 'true'
# uses: github/codeql-action/autobuild@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # pin v3.27.5
# with:
# working-directory: client/android
# env:
# GRADLE_LIBPARSEC_BUILD_STRATEGY: no_build
# - name: Perform CodeQL Analysis
# if: steps.should-run-java-analysis.outputs.run == 'true'
# uses: github/codeql-action/analyze@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # pin v3.27.5
# with:
# category: /language:java
javascript-analyze:
name: 🌐 Javascript static code Analysis
runs-on: ubuntu-22.04
steps:
- name: Checkout repository
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # pin v4.2.2
timeout-minutes: 5
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # pin v3.0.2
id: changes
with:
filters: .github/filters/codeql.yml
- name: Check modified path that require `javascript-analysis` to run
id: should-run-js-analysis
if: >-
steps.changes.outputs.js-analyze == 'true'
|| contains(github.ref, 'gh-readonly-queue')
|| github.ref == 'refs/heads/master'
run: echo "run=true" >> $GITHUB_OUTPUT
shell: bash
# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
if: steps.should-run-js-analysis.outputs.run == 'true'
uses: github/codeql-action/init@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # pin v3.27.5
with:
languages: typescript
- name: Install dependencies for ionic project
if: steps.should-run-js-analysis.outputs.run == 'true'
run: npm clean-install
working-directory: client
- name: Autobuild for typescript
if: steps.should-run-js-analysis.outputs.run == 'true'
uses: github/codeql-action/autobuild@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # pin v3.27.5
with:
working-directory: client
- name: Perform CodeQL Analysis
if: steps.should-run-js-analysis.outputs.run == 'true'
uses: github/codeql-action/analyze@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # pin v3.27.5
with:
category: /language:typescript