Delete semgrep-scan.yml
This commit is contained in:
parent
e24b249110
commit
c0d7810ad3
|
@ -1,56 +0,0 @@
|
|||
# Flexible static application security testing based on various rulesets depending on
|
||||
# various parameters such as language, dockerfile, etc.
|
||||
name: Semgrep Scanner
|
||||
|
||||
# Controls when the workflow will run
|
||||
on:
|
||||
# Triggers the workflow on push or pull request events subject to branch selected
|
||||
push:
|
||||
branches:
|
||||
- main
|
||||
|
||||
pull_request:
|
||||
branches:
|
||||
- main
|
||||
|
||||
jobs:
|
||||
semgrep:
|
||||
name: Semgrep Scan
|
||||
runs-on: ubuntu-latest
|
||||
# Set permissions to allow writing security events
|
||||
permissions:
|
||||
security-events: write
|
||||
# Skip any PR created by dependabot to avoid permission issues
|
||||
if: (github.actor != 'dependabot[bot]')
|
||||
steps:
|
||||
# Fetch project source
|
||||
- uses: actions/checkout@v2
|
||||
|
||||
- uses: returntocorp/semgrep-action@v1
|
||||
with:
|
||||
config: >- # more at semgrep.dev/explore
|
||||
p/secrets
|
||||
p/eslint-plugin-security
|
||||
|
||||
# Instead of `config:`, use rules set in Semgrep App.
|
||||
# Get your token from semgrep.dev/manage/settings.
|
||||
# publishToken: ${{ secrets.SEMGREP_APP_TOKEN }}
|
||||
|
||||
# Never fail the build due to findings on pushes.
|
||||
# Instead, just collect findings for semgrep.dev/manage/findings
|
||||
# auditOn: push
|
||||
|
||||
# Upload findings to GitHub Advanced Security Dashboard [step 1/2]
|
||||
generateSarif: "1"
|
||||
|
||||
# Change job timeout (default is 1800 seconds; set to 0 to disable)
|
||||
# env:
|
||||
# SEMGREP_TIMEOUT: 300
|
||||
|
||||
# Upload findings to GitHub Advanced Security Dashboard [step 2/2]
|
||||
- name: Upload SARIF file for GitHub Advanced Security Dashboard
|
||||
uses: github/codeql-action/upload-sarif@v1
|
||||
if: always()
|
||||
with:
|
||||
sarif_file: semgrep.sarif
|
||||
|
Loading…
Reference in New Issue