-
Notifications
You must be signed in to change notification settings - Fork 6
49 lines (41 loc) · 1.44 KB
/
codeql-analysis.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
name: "PR: CodeQL security scan"
on:
# When changes are pushed to special branches
# Branch `develop` and `domain-*` are handled by continuous-integration.yml, which calls this workflow
push:
branches: [main]
schedule:
- cron: 31 6 * * 5
# Allow manual triggering
workflow_dispatch:
# Trigger when called by another GitHub Action
workflow_call:
jobs:
analyze:
name: Analyze
runs-on: ubuntu-latest
concurrency: ${{ github.workflow }}-${{ matrix.language }}-${{ github.ref }}
permissions:
actions: read
contents: read
security-events: write
strategy:
fail-fast: false
matrix:
language:
- java
- python
- ruby
steps:
- name: "Checkout source code"
uses: actions/checkout@v4
- name: Set up VRO build env
uses: ./.github/actions/setup-vro
# Run a build in case it results in new files being generated but don't test since that is done in a different workflow.
# https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/customizing-code-scanning#configuring-code-scanning-for-compiled-languages
- name: Build VRO without testing
run: ./gradlew build -x test -x check
- name: Run Code Scanning
uses: department-of-veterans-affairs/codeql-tools/codeql-analysis@main
with:
language: ${{ matrix.language }}