[CI] Update code scanning config #13
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: "CodeQL Advanced" | |
on: | |
pull_request: | |
branches: [ "main", "development" ] | |
paths-ignore: | |
- 'src/test/**' | |
workflow_dispatch: | |
jobs: | |
analyze: | |
name: Analyze (${{ matrix.language }}) | |
runs-on: 'ubuntu-latest' | |
permissions: | |
security-events: write | |
# required to fetch internal or private CodeQL packs | |
packages: read | |
# only required for workflows in private repositories | |
actions: read | |
contents: read | |
strategy: | |
fail-fast: false | |
matrix: | |
include: | |
- language: java-kotlin | |
build-mode: none # This mode only analyzes Java. Set this to 'autobuild' or 'manual' to analyze Kotlin too. | |
# Use 'java-kotlin' to analyze code written in Java, Kotlin or both | |
# To learn more about changing the languages that are analyzed or customizing the build mode for your analysis, | |
# see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning. | |
# If you are analyzing a compiled language, you can modify the 'build-mode' for that language to customize how | |
# your codebase is analyzed, see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/codeql-code-scanning-for-compiled-languages | |
steps: | |
- name: Checkout repository | |
uses: actions/checkout@v4 | |
# Initializes the CodeQL tools for scanning. | |
- name: Initialize CodeQL | |
uses: github/codeql-action/init@v3 | |
with: | |
languages: ${{ matrix.language }} | |
build-mode: ${{ matrix.build-mode }} | |
config: | | |
queries: security-and-quality | |
paths-ignore: | |
- 'src/test/**' | |
# For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs | |
# queries: security-extended,security-and-quality | |
# If the analyze step fails for one of the languages you are analyzing with | |
# "We were unable to automatically build your code", modify the matrix above | |
# to set the build mode to "manual" for that language. Then modify this step | |
# to build your code. | |
# ℹ️ Command-line programs to run using the OS shell. | |
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun | |
- if: matrix.build-mode == 'manual' | |
shell: bash | |
run: | | |
echo 'If you are using a "manual" build mode for one or more of the' \ | |
'languages you are analyzing, replace this with the commands to build' \ | |
'your code, for example:' | |
echo ' make bootstrap' | |
echo ' make release' | |
exit 1 | |
- name: Perform CodeQL Analysis | |
uses: github/codeql-action/analyze@v3 | |
with: | |
category: "/language:${{matrix.language}}" |