|
1 |
| -# For most projects, this workflow file will not need changing; you simply need |
2 |
| -# to commit it to your repository. |
3 |
| -# |
4 |
| -# You may wish to alter this file to override the set of languages analyzed, |
5 |
| -# or to provide custom queries or build logic. |
6 |
| -# |
7 |
| -# ******** NOTE ******** |
8 |
| -# We have attempted to detect the languages in your repository. Please check |
9 |
| -# the `language` matrix defined below to confirm you have the correct set of |
10 |
| -# supported CodeQL languages. |
11 |
| -# |
12 | 1 | name: "CodeQL Advanced"
|
13 | 2 |
|
14 | 3 | on:
|
15 |
| - push: # run if we update the workflow |
| 4 | + push: |
| 5 | + pull_request: |
16 | 6 | workflow_dispatch:
|
17 | 7 | schedule:
|
18 |
| - - cron: '39 13 * * 4' |
| 8 | + # https://docs.github.com/en/actions/writing-workflows/choosing-when-your-workflow-runs/events-that-trigger-workflows#schedule |
| 9 | + - cron: '0 5 * * *' |
19 | 10 |
|
20 | 11 | jobs:
|
21 |
| - analyze: |
22 |
| - name: Analyze (${{ matrix.language }}) |
23 |
| - # Runner size impacts CodeQL analysis time. To learn more, please see: |
24 |
| - # - https://gh.io/recommended-hardware-resources-for-running-codeql |
25 |
| - # - https://gh.io/supported-runners-and-hardware-resources |
26 |
| - # - https://gh.io/using-larger-runners (GitHub.com only) |
27 |
| - # Consider using larger runners or machines with greater resources for possible analysis time improvements. |
28 |
| - runs-on: ubuntu-latest |
29 |
| - permissions: |
30 |
| - # required for all workflows |
31 |
| - security-events: write |
32 |
| - |
33 |
| - # required to fetch internal or private CodeQL packs |
34 |
| - packages: read |
35 |
| - |
36 |
| - # only required for workflows in private repositories |
37 |
| - actions: read |
38 |
| - contents: read |
39 |
| - |
40 |
| - strategy: |
41 |
| - fail-fast: false |
42 |
| - matrix: |
43 |
| - include: |
44 |
| - - language: actions |
45 |
| - build-mode: none |
46 |
| - # CodeQL supports the following values keywords for 'language': 'actions', 'c-cpp', 'csharp', 'go', 'java-kotlin', 'javascript-typescript', 'python', 'ruby', 'swift' |
47 |
| - # Use `c-cpp` to analyze code written in C, C++ or both |
48 |
| - # Use 'java-kotlin' to analyze code written in Java, Kotlin or both |
49 |
| - # Use 'javascript-typescript' to analyze code written in JavaScript, TypeScript or both |
50 |
| - # To learn more about changing the languages that are analyzed or customizing the build mode for your analysis, |
51 |
| - # see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning. |
52 |
| - # If you are analyzing a compiled language, you can modify the 'build-mode' for that language to customize how |
53 |
| - # your codebase is analyzed, see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/codeql-code-scanning-for-compiled-languages |
54 |
| - steps: |
55 |
| - - name: Checkout repository |
56 |
| - uses: actions/checkout@v4 |
57 |
| - |
58 |
| - # Add any setup steps before running the `github/codeql-action/init` action. |
59 |
| - # This includes steps like installing compilers or runtimes (`actions/setup-node` |
60 |
| - # or others). This is typically only required for manual builds. |
61 |
| - # - name: Setup runtime (example) |
62 |
| - # uses: actions/setup-example@v1 |
63 |
| - |
64 |
| - # Initializes the CodeQL tools for scanning. |
65 |
| - - name: Initialize CodeQL |
66 |
| - uses: github/codeql-action/init@v3 |
67 |
| - with: |
68 |
| - languages: ${{ matrix.language }} |
69 |
| - build-mode: ${{ matrix.build-mode }} |
70 |
| - # If you wish to specify custom queries, you can do so here or in a config file. |
71 |
| - # By default, queries listed here will override any specified in a config file. |
72 |
| - # Prefix the list here with "+" to use these queries and those in the config file. |
73 |
| - |
74 |
| - # For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs |
75 |
| - queries: security-extended,security-and-quality |
76 |
| - |
77 |
| - - name: Perform CodeQL Analysis |
78 |
| - uses: github/codeql-action/analyze@v3 |
79 |
| - with: |
80 |
| - category: "/language:${{matrix.language}}" |
| 12 | + codeql-analysis-call: |
| 13 | + uses: spring-io/github-actions/.github/workflows/codeql-analysis.yml@1 |
0 commit comments