codeql.yml 1.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354
  1. name: "CodeQL"
  2. on:
  3. push:
  4. branches: [ "master" ]
  5. pull_request:
  6. # The branches below must be a subset of the branches above
  7. branches: [ "master" ]
  8. schedule:
  9. - cron: '22 11 * * 1'
  10. jobs:
  11. analyze:
  12. name: Analyze
  13. runs-on: ubuntu-latest
  14. permissions:
  15. actions: read
  16. contents: read
  17. security-events: write
  18. strategy:
  19. fail-fast: false
  20. matrix:
  21. language: [ 'java' ]
  22. steps:
  23. # Checkout
  24. - name: Checkout repository
  25. uses: actions/checkout@v3
  26. # Initializes the CodeQL tools for scanning.
  27. - name: Initialize CodeQL
  28. uses: github/codeql-action/init@v2
  29. with:
  30. languages: ${{ matrix.language }}
  31. # If you wish to specify custom queries, you can do so here or in a config file.
  32. # By default, queries listed here will override any specified in a config file.
  33. # Prefix the list here with "+" to use these queries and those in the config file.
  34. # Details on CodeQL's query packs refer to : https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
  35. # queries: security-extended,security-and-quality
  36. # ℹ️ Command-line programs to run using the OS shell.
  37. # 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
  38. # Compile
  39. - run: ant -buildfile build.xml compile
  40. - name: Perform CodeQL Analysis
  41. uses: github/codeql-action/analyze@v2
  42. with:
  43. category: "/language:${{matrix.language}}"