Skip to content

add zizmor static analyzer #2691

add zizmor static analyzer

add zizmor static analyzer #2691

Workflow file for this run

name: CodeQL
permissions: {}
on:
push:
branches: [master]
pull_request:
branches: [master]
schedule:
- cron: '0 0 * * 4'
env:
DEVELOCITY_ACCESS_KEY: ${{ secrets.DEVELOCITY_ACCESS_KEY }}
JAVA_VERSION: 21
jobs:
analyze:
name: Analyze
runs-on: ubuntu-latest
permissions:
actions: read
contents: read
pull-requests: read
security-events: write
strategy:
fail-fast: false
matrix:
language: [ actions, java ]
steps:
- name: Harden Runner
uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
with:
disable-sudo: true
egress-policy: block
allowed-endpoints: >
api.adoptium.net:443
api.github.com:443
caffeine.gradle-enterprise.cloud:443
downloads.gradle.org:443
downloads.gradle-dn.com:443
github.com:443
jcenter.bintray.com:443
objects.githubusercontent.com:443
plugins.gradle.org:443
plugins-artifacts.gradle.org:443
repo.maven.apache.org:443
repo1.maven.org:443
uploads.github.com:443
services.gradle.org:443
- name: Checkout
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
with:
persist-credentials: false
- name: Setup Gradle
uses: ./.github/actions/run-gradle
if: ${{ matrix.language == 'java' }}
with:
java: ${{ env.JAVA_VERSION }}
cache-encryption-key: ${{ secrets.GRADLE_ENCRYPTION_KEY }}
- name: Initialize CodeQL (Actions)
uses: github/codeql-action/init@f6091c0113d1dcf9b98e269ee48e8a7e51b7bdd4 # v3.28.5
if: ${{ matrix.language == 'actions' }}
with:
languages: actions
dependency-caching: true
- name: Initialize CodeQL (Java)
uses: github/codeql-action/init@f6091c0113d1dcf9b98e269ee48e8a7e51b7bdd4 # v3.28.5
if: ${{ matrix.language == 'java' }}
with:
queries: >
+java-code-scanning,
security-extended,
security-and-quality,
security-experimental
languages: java-kotlin
dependency-caching: true
packs: >
+githubsecuritylab/codeql-java-queries,
githubsecuritylab/codeql-java-extensions,
githubsecuritylab/codeql-java-library-sources,
githubsecuritylab/codeql-java-queries:suites/java-local.qls
config: |
threat-models: local
- name: Autobuild
uses: github/codeql-action/autobuild@f6091c0113d1dcf9b98e269ee48e8a7e51b7bdd4 # v3.28.5
- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@f6091c0113d1dcf9b98e269ee48e8a7e51b7bdd4 # v3.28.5