Skip to main content

Configuration des exécuteurs auto-hébergés pour l’analyse de code dans votre entreprise

Vous pouvez activer, configurer et désactiver code scanning pour votre entreprise sans GitHub runners hébergés. Code scanning permet aux utilisateurs d’analyser le code à la recherche de vulnérabilités et d’erreurs.

Qui peut utiliser cette fonctionnalité ?

Code scanning is available for the following repository types:

  • Public repositories on GitHub.com
  • Organization-owned repositories on GitHub Team, GitHub Enterprise Cloud, or GitHub Enterprise Server, with GitHub Code Security enabled.

Provisioning a self-hosted runner

Remarque

GitHub can run code scanning using a GitHub Actions workflow. First, you need to provision one or more self-hosted GitHub Actions runners in your environment. You can provision self-hosted runners at the repository, organization, or enterprise account level. See Self-hosted runners and Adding self-hosted runners.

If you are provisioning a self-hosted runner for CodeQL analysis, your runner must use a CodeQL-supported operating system version and CPU architecture. See the CodeQL system requirements.

If you are using default setup for code scanning, you can assign self-hosted runners with the default code-scanning label, or you can optionally give them custom labels so that individual repositories can use different runners. See Configuring default setup for code scanning.

For information about using default setup for code scanning analysis of compiled languages, see CodeQL code scanning for compiled languages.

You must ensure that Git is in the PATH variable on any self-hosted runners you use to run CodeQL actions.

Remarque

If you use CodeQL code scanning to analyze code written in Python in your enterprise, you must make sure that your self-hosted runner has Python 3 installed.