Skip to content

fix: custom exceptions fwk/vs/core https://learn.microsoft.com/en-gb/… #153

fix: custom exceptions fwk/vs/core https://learn.microsoft.com/en-gb/…

fix: custom exceptions fwk/vs/core https://learn.microsoft.com/en-gb/… #153

name: CodeQL Scan
on:
workflow_dispatch:
push:
branches:
- main
paths-ignore:
- '**.md'
- 'docs/**'
- '.github/**'
- 'assets/*'
- 'examples/*'
- 'dists/*'
pull_request:
# The branches below must be a subset of the branches above
branches:
- main
paths-ignore:
- '**.md'
- 'docs/**'
- '.github/**'
- 'assets/*'
- 'examples/*'
- 'dists/*'
schedule:
- cron: '25 4 * * 2'
env:
DOTNET_NOLOGO: true
DOTNET_GENERATE_ASPNET_CERTIFICATE: false
DOTNET_SKIP_FIRST_TIME_EXPERIENCE: true
jobs:
analyze:
name: Analyze
runs-on: ubuntu-24.04
permissions:
actions: read
contents: read
security-events: write
strategy:
fail-fast: false
matrix:
language: [ 'csharp' ]
# CodeQL supports [ 'cpp', 'csharp', 'go', 'java', 'javascript', 'python', 'ruby' ]
# Learn more about CodeQL language support at https://git.io/codeql-language-support
steps:
- name: Harden Runner
uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
with:
egress-policy: audit
- name: 'Checkout repository'
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
with:
fetch-depth: 0 # avoid shallow clone so nbgv can do its work.
- name: 'Setup .NET SDK'
uses: actions/setup-dotnet@87b7050bc53ea08284295505d98d2aa94301e852 # v4.2.0
with:
dotnet-version: 9.0.x
# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@48ab28a6f5dbc2a99bf1e0131198dd8f1df78169 # v3.28.0
with:
languages: ${{ matrix.language }}
# We can't use autobuild because we want to restrict the build to just src folder solutions
# and avoid triggering deterministic builds and git commit based versioning
# (as GitHub workflows shallow clone by default, and that breaks the versioning.)
- run: dotnet build --configuration CodeQL /p:UseSharedCompilation=false /t:rebuild
- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@48ab28a6f5dbc2a99bf1e0131198dd8f1df78169 # v3.28.0