@@ -2,7 +2,7 @@ name: "CodeQL"
2
2
3
3
on :
4
4
push :
5
- branches : [develop]
5
+ branches : [develop, v2 ]
6
6
7
7
jobs :
8
8
analyze :
@@ -14,23 +14,23 @@ jobs:
14
14
matrix :
15
15
# Override automatic language detection by changing the below list
16
16
# Supported options are ['csharp', 'cpp', 'go', 'java', 'javascript', 'python']
17
- language : [' python' ]
17
+ language : [" python" ]
18
18
# Learn more...
19
19
# https://docs.github.com/en/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#overriding-automatic-language-detection
20
20
21
21
steps :
22
- - name : Checkout repository
23
- uses : actions/checkout@v3
22
+ - name : Checkout repository
23
+ uses : actions/checkout@v3
24
24
25
- # Initializes the CodeQL tools for scanning.
26
- - name : Initialize CodeQL
27
- uses : github/codeql-action/init@v2
28
- with :
29
- languages : ${{ matrix.language }}
30
- # If you wish to specify custom queries, you can do so here or in a config file.
31
- # By default, queries listed here will override any specified in a config file.
32
- # Prefix the list here with "+" to use these queries and those in the config file.
33
- # queries: ./path/to/local/query, your-org/your-repo/queries@main
25
+ # Initializes the CodeQL tools for scanning.
26
+ - name : Initialize CodeQL
27
+ uses : github/codeql-action/init@v2
28
+ with :
29
+ languages : ${{ matrix.language }}
30
+ # If you wish to specify custom queries, you can do so here or in a config file.
31
+ # By default, queries listed here will override any specified in a config file.
32
+ # Prefix the list here with "+" to use these queries and those in the config file.
33
+ # queries: ./path/to/local/query, your-org/your-repo/queries@main
34
34
35
- - name : Perform CodeQL Analysis
36
- uses : github/codeql-action/analyze@v2
35
+ - name : Perform CodeQL Analysis
36
+ uses : github/codeql-action/analyze@v2
0 commit comments