# Analyzes the code using GitHub's default CodeQL query database. # Identified issues are registered with GitHub's code scanning dashboard. When # a pull request is analyzed, any offending lines are annotated. See # https://codeql.github.com for details. name: CodeQL analysis on: pull_request: push: branches: [ master ] schedule: - cron: '0 4 * * 1' permissions: contents: read jobs: analyze: strategy: matrix: language: [ java, ruby ] permissions: contents: read security-events: write runs-on: ubuntu-22.04 steps: - name: Check out code uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1 with: persist-credentials: false - name: Set up JDK uses: actions/setup-java@387ac29b308b003ca37ba93a6cab5eb57c8f5f93 # v4.0.0 with: java-version: 17.0.8 distribution: temurin cache: maven - name: Initialize CodeQL uses: github/codeql-action/init@012739e5082ff0c22ca6d6ab32e07c36df03c4a4 # v3.22.12 with: languages: ${{ matrix.language }} - name: Perform minimal build if: matrix.language == 'java' run: mvn -T1C clean package -DskipTests -Dverification.skip - name: Perform CodeQL analysis uses: github/codeql-action/analyze@012739e5082ff0c22ca6d6ab32e07c36df03c4a4 # v3.22.12 with: category: /language:${{ matrix.language }}