You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .github/workflows/codeql.yml
+6-6Lines changed: 6 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -54,10 +54,14 @@ jobs:
54
54
# If you are analyzing a compiled language, you can modify the 'build-mode' for that language to customize how
55
55
# your codebase is analyzed, see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/codeql-code-scanning-for-compiled-languages
56
56
steps:
57
+
- name: Checkout THIS repository to ROOT
58
+
uses: actions/checkout@v4
59
+
57
60
- name: Checkout repository
58
61
uses: actions/checkout@v4
59
62
with:
60
63
repository: testing-felickz/hello-py # a different git repo is cloned into the root dir of this runner
64
+
path: abc/def/ghi
61
65
62
66
# Add any setup steps before running the `github/codeql-action/init` action.
63
67
# This includes steps like installing compilers or runtimes (`actions/setup-node`
@@ -71,12 +75,8 @@ jobs:
71
75
with:
72
76
languages: ${{ matrix.language }}
73
77
build-mode: ${{ matrix.build-mode }}
74
-
# If you wish to specify custom queries, you can do so here or in a config file.
75
-
# By default, queries listed here will override any specified in a config file.
76
-
# Prefix the list here with "+" to use these queries and those in the config file.
77
-
78
-
# For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
79
-
# queries: security-extended,security-and-quality
78
+
#scan the code in this folder + report vulnerable code paths relative to this, not the root
0 commit comments