Skip to main content

엔터프라이즈에서 코드 스캐닝을 위한 자체 호스팅 러너 구성

엔터프라이즈에서 code scanning을 활성화, 구성 및 비활성화할 수 있습니다. GitHub 호스팅 러너 없이도 가능합니다. Code scanning은 사용자가 코드에서 취약점과 오류를 검사할 수 있도록 합니다.

누가 이 기능을 사용할 수 있나요?

Code scanning은 다음 리포지토리 유형에서 사용할 수 있습니다.

  • GitHub.com에 대한 퍼블릭 리포지토리
  • GitHub Team, GitHub Enterprise Cloud 또는 GitHub Enterprise Server에 대한 조직 소유의 리포지토리로, GitHub Code Security 가 활성화되어 있습니다.

Provisioning a self-hosted runner

참고 항목

GitHub can run code scanning using a GitHub Actions workflow. First, you need to provision one or more self-hosted GitHub Actions runners in your environment. You can provision self-hosted runners at the repository, organization, or enterprise account level. See Self-hosted runners and Adding self-hosted runners.

If you are provisioning a self-hosted runner for CodeQL analysis, your runner must use a CodeQL-supported operating system version and CPU architecture. See the CodeQL system requirements.

If you are using default setup for code scanning, you can assign self-hosted runners with the default code-scanning label, or you can optionally give them custom labels so that individual repositories can use different runners. See Configuring default setup for code scanning.

For information about using default setup for code scanning analysis of compiled languages, see CodeQL code scanning for compiled languages.

You must ensure that Git is in the PATH variable on any self-hosted runners you use to run CodeQL actions.

참고 항목

If you use CodeQL code scanning to analyze code written in Python in your enterprise, you must make sure that your self-hosted runner has Python 3 installed.