Skip to content

fix(logging): update log_class to log_group_class in CloudWatch agent… #2180

fix(logging): update log_class to log_group_class in CloudWatch agent…

fix(logging): update log_class to log_group_class in CloudWatch agent… #2180

Workflow file for this run

name: "CodeQL Advanced"
on:
push:
branches: [ "main", "develop", "v1" ]
pull_request:
branches: [ "main", "develop", "v1" ]
paths-ignore:
- '**/*.md'
schedule:
- cron: '25 19 * * 2'
concurrency:
group: ${{ github.workflow }}-${{ github.event_name }}-${{ github.ref }}
cancel-in-progress: true
permissions:
contents: read
jobs:
analyze:
name: Analyze (${{ matrix.language }})
runs-on: ${{ (matrix.language == 'swift' && 'macos-latest') || 'ubuntu-latest' }}
permissions:
security-events: write # required for CodeQL to upload security scan results
strategy:
fail-fast: false
matrix:
language: ['javascript-typescript', 'actions']
steps:
- name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
with:
egress-policy: audit
- name: Checkout repository
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
with:
persist-credentials: false
# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@89a39a4e59826350b863aa6b6252a07ad50cf83e # v4.32.4
with:
languages: ${{ matrix.language }}
build-mode: none
- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@89a39a4e59826350b863aa6b6252a07ad50cf83e # v4.32.4
with:
category: "/language:${{matrix.language}}"