Skip to content

CodeQL Analysis

CodeQL Analysis #2296

name: "CodeQL Analysis"
on:
push:
paths:
- "examples/java/**"
- ".github/workflows/examples-java-codeql-analysis.yml"
pull_request:
paths:
- "examples/java/**"
- ".github/workflows/examples-java-codeql-analysis.yml"
schedule:
- cron: '36 12 * * 0'
permissions:
contents: read
jobs:
analyze:
name: Analyze
runs-on: ubuntu-latest
defaults:
run:
working-directory: examples/java
permissions:
actions: read
contents: read
security-events: write
strategy:
fail-fast: false
steps:
- name: Checkout repository
uses: actions/checkout@ac593985615ec2ede58e132d2e21d2b1cbd6127c
- name: Set up JDK 17
uses: actions/setup-java@1df8dbefe2a8cbc99770194893dd902763bee34b
with:
java-version: '17'
distribution: 'temurin'
- name: Initialize CodeQL
uses: github/codeql-action/init@b2c19fb9a2a485599ccf4ed5d65527d94bc57226
with:
languages: 'java'
- name: Build project
run: ./gradlew clean build
- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@b2c19fb9a2a485599ccf4ed5d65527d94bc57226