|
1 | | -# For most projects, this workflow file will not need changing; you simply need |
2 | | -# to commit it to your repository. |
3 | | -# |
4 | | -# You may wish to alter this file to override the set of languages analyzed, |
5 | | -# or to provide custom queries or build logic. |
6 | | -# |
7 | | -# ******** NOTE ******** |
8 | | -# We have attempted to detect the languages in your repository. Please check |
9 | | -# the `language` matrix defined below to confirm you have the correct set of |
10 | | -# supported CodeQL languages. |
11 | | -# |
12 | 1 | name: "CodeQL Advanced" |
13 | 2 |
|
14 | 3 | on: |
15 | | - push: # run if we update the workflow |
| 4 | + push: |
| 5 | + pull_request: |
16 | 6 | workflow_dispatch: |
17 | 7 | schedule: |
18 | | - - cron: '39 13 * * 4' |
| 8 | + # https://docs.github.com/en/actions/writing-workflows/choosing-when-your-workflow-runs/events-that-trigger-workflows#schedule |
| 9 | + - cron: '0 5 * * *' |
19 | 10 |
|
20 | 11 | jobs: |
21 | | - analyze: |
22 | | - name: Analyze (${{ matrix.language }}) |
23 | | - # Runner size impacts CodeQL analysis time. To learn more, please see: |
24 | | - # - https://gh.io/recommended-hardware-resources-for-running-codeql |
25 | | - # - https://gh.io/supported-runners-and-hardware-resources |
26 | | - # - https://gh.io/using-larger-runners (GitHub.com only) |
27 | | - # Consider using larger runners or machines with greater resources for possible analysis time improvements. |
28 | | - runs-on: ubuntu-latest |
29 | | - permissions: |
30 | | - # required for all workflows |
31 | | - security-events: write |
32 | | - |
33 | | - # required to fetch internal or private CodeQL packs |
34 | | - packages: read |
35 | | - |
36 | | - # only required for workflows in private repositories |
37 | | - actions: read |
38 | | - contents: read |
39 | | - |
40 | | - strategy: |
41 | | - fail-fast: false |
42 | | - matrix: |
43 | | - include: |
44 | | - - language: actions |
45 | | - build-mode: none |
46 | | - # CodeQL supports the following values keywords for 'language': 'actions', 'c-cpp', 'csharp', 'go', 'java-kotlin', 'javascript-typescript', 'python', 'ruby', 'swift' |
47 | | - # Use `c-cpp` to analyze code written in C, C++ or both |
48 | | - # Use 'java-kotlin' to analyze code written in Java, Kotlin or both |
49 | | - # Use 'javascript-typescript' to analyze code written in JavaScript, TypeScript or both |
50 | | - # To learn more about changing the languages that are analyzed or customizing the build mode for your analysis, |
51 | | - # see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning. |
52 | | - # If you are analyzing a compiled language, you can modify the 'build-mode' for that language to customize how |
53 | | - # your codebase is analyzed, see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/codeql-code-scanning-for-compiled-languages |
54 | | - steps: |
55 | | - - name: Checkout repository |
56 | | - uses: actions/checkout@v4 |
57 | | - |
58 | | - # Add any setup steps before running the `github/codeql-action/init` action. |
59 | | - # This includes steps like installing compilers or runtimes (`actions/setup-node` |
60 | | - # or others). This is typically only required for manual builds. |
61 | | - # - name: Setup runtime (example) |
62 | | - # uses: actions/setup-example@v1 |
63 | | - |
64 | | - # Initializes the CodeQL tools for scanning. |
65 | | - - name: Initialize CodeQL |
66 | | - uses: github/codeql-action/init@v3 |
67 | | - with: |
68 | | - languages: ${{ matrix.language }} |
69 | | - build-mode: ${{ matrix.build-mode }} |
70 | | - # If you wish to specify custom queries, you can do so here or in a config file. |
71 | | - # By default, queries listed here will override any specified in a config file. |
72 | | - # Prefix the list here with "+" to use these queries and those in the config file. |
73 | | - |
74 | | - # For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs |
75 | | - queries: security-extended,security-and-quality |
76 | | - |
77 | | - - name: Perform CodeQL Analysis |
78 | | - uses: github/codeql-action/analyze@v3 |
79 | | - with: |
80 | | - category: "/language:${{matrix.language}}" |
| 12 | + codeql-analysis-call: |
| 13 | + uses: spring-io/github-actions/.github/workflows/codeql-analysis.yml@1 |
0 commit comments