You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .github/workflows/codeql-advanced-security.yml
+115Lines changed: 115 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -84,3 +84,118 @@ jobs:
84
84
uses: github/codeql-action/analyze@v3
85
85
with:
86
86
category: "/language:${{matrix.language}}"
87
+
88
+
analyze2:
89
+
name: Analyze (${{ matrix.language }})
90
+
runs-on: 'ubuntu-latest'
91
+
permissions:
92
+
# required for all workflows
93
+
security-events: write
94
+
95
+
# required to fetch internal or private CodeQL packs
96
+
packages: read
97
+
98
+
# only required for workflows in private repositories
99
+
actions: read
100
+
contents: read
101
+
102
+
strategy:
103
+
fail-fast: false
104
+
matrix:
105
+
include:
106
+
- language: java-kotlin
107
+
build-mode: autobuild
108
+
steps:
109
+
- name: Checkout repository
110
+
uses: actions/checkout@v4
111
+
112
+
# Add any setup steps before running the `github/codeql-action/init` action.
113
+
# This includes steps like installing compilers or runtimes (`actions/setup-node`
114
+
# or others). This is typically only required for manual builds.
115
+
# - name: Setup runtime (example)
116
+
# uses: actions/setup-example@v1
117
+
118
+
# Initializes the CodeQL tools for scanning.
119
+
- name: Initialize CodeQL
120
+
uses: github/codeql-action/init@v3
121
+
with:
122
+
languages: ${{ matrix.language }}
123
+
build-mode: ${{ matrix.build-mode }}
124
+
# If you wish to specify custom queries, you can do so here or in a config file.
125
+
# By default, queries listed here will override any specified in a config file.
126
+
# Prefix the list here with "+" to use these queries and those in the config file.
127
+
128
+
# For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
# required to fetch internal or private CodeQL packs
154
+
packages: read
155
+
156
+
# only required for workflows in private repositories
157
+
actions: read
158
+
contents: read
159
+
160
+
strategy:
161
+
fail-fast: false
162
+
matrix:
163
+
include:
164
+
- language: swift
165
+
build-mode: autobuild
166
+
steps:
167
+
- name: Checkout repository
168
+
uses: actions/checkout@v4
169
+
170
+
# Add any setup steps before running the `github/codeql-action/init` action.
171
+
# This includes steps like installing compilers or runtimes (`actions/setup-node`
172
+
# or others). This is typically only required for manual builds.
173
+
# - name: Setup runtime (example)
174
+
# uses: actions/setup-example@v1
175
+
176
+
# Initializes the CodeQL tools for scanning.
177
+
- name: Initialize CodeQL
178
+
uses: github/codeql-action/init@v3
179
+
with:
180
+
languages: ${{ matrix.language }}
181
+
build-mode: ${{ matrix.build-mode }}
182
+
# If you wish to specify custom queries, you can do so here or in a config file.
183
+
# By default, queries listed here will override any specified in a config file.
184
+
# Prefix the list here with "+" to use these queries and those in the config file.
185
+
186
+
# For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
0 commit comments