Skip to content

CodeQL security analysis for Java #26

CodeQL security analysis for Java

CodeQL security analysis for Java #26

Workflow file for this run

name: CodeQL security analysis for Java
on:
push:
branches: [ master ]
pull_request:
branches: [ master ]
schedule:
- cron: '42 1 * * 2'
permissions:
contents: read
jobs:
build:
name: compiling and security scanning
runs-on: ubuntu-latest
timeout-minutes: 360
permissions:
actions: read
contents: read
security-events: write
steps:
- name: Checkout repository
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
- name: Set up with Java 23
uses: actions/setup-java@8df1039502a15bceb9433410b1a100fbe190c53b # v4.5.0
with:
distribution: 'temurin'
java-version: 23
cache: 'maven'
- name: Initialize CodeQL for security scanning
uses: github/codeql-action/init@df409f7d9260372bd5f19e5b04e83cb3c43714ae # v3.27.9
with:
languages: 'java-kotlin'
- name: Compile Java source code with Maven
run: mvn -B compile --file pom.xml
# unit tests are not run as part of this workflow, since they are not required for the CodeQL security analysis
- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@df409f7d9260372bd5f19e5b04e83cb3c43714ae # v3.27.9
with:
category: "/language:java-kotlin"