From 99a32243dbce548709113b2b6fde3660fc570ba6 Mon Sep 17 00:00:00 2001 From: Jonas Cirotzki Date: Wed, 9 Dec 2020 14:48:24 +0100 Subject: [PATCH 1/2] codeql CI --- .github/workflows/codeql.yml | 61 ++++++++++++++++++++++++++++++++++++ 1 file changed, 61 insertions(+) create mode 100644 .github/workflows/codeql.yml diff --git a/.github/workflows/codeql.yml b/.github/workflows/codeql.yml new file mode 100644 index 00000000000..404e34b8f1a --- /dev/null +++ b/.github/workflows/codeql.yml @@ -0,0 +1,61 @@ +# For most projects, this workflow file will not need changing; you simply need +# to commit it to your repository. +# +# You may wish to alter this file to override the set of languages analyzed, +# or to provide custom queries or build logic. +# +# ******** NOTE ******** +# We have attempted to detect the languages in your repository. Please check +# the `language` matrix defined below to confirm you have the correct set of +# supported CodeQL languages. +# +name: "CodeQL" + +on: + push: + branches: [ development, master ] + pull_request: + # The branches below must be a subset of the branches above + branches: [ development ] + schedule: + - cron: '30 0 * * 1' + +jobs: + analyze: + name: Analyze + runs-on: ubuntu-latest + + strategy: + fail-fast: false + matrix: + language: [ 'java', 'javascript' ] + # CodeQL supports [ 'cpp', 'csharp', 'go', 'java', 'javascript', 'python' ] + # Learn more: + # https://docs.github.com/en/free-pro-team@latest/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#changing-the-languages-that-are-analyzed + + steps: + - name: Checkout repository + uses: actions/checkout@v2 + + # Initializes the CodeQL tools for scanning. + - name: Initialize CodeQL + uses: github/codeql-action/init@v1 + with: + languages: ${{ matrix.language }} + # If you wish to specify custom queries, you can do so here or in a config file. + # By default, queries listed here will override any specified in a config file. + # Prefix the list here with "+" to use these queries and those in the config file. + # queries: ./path/to/local/query, your-org/your-repo/queries@main + + - name: Test with Java 11 + uses: actions/setup-java@v1 + with: + java-version: 1.11 + + - name: Build with Maven + run: | + cd sormas-base + mvn install -B -Dorg.slf4j.simpleLogger.log.org.apache.maven.cli.transfer.Slf4jMavenTransferListener=warn -DskipTests + + - name: Perform CodeQL Analysis + uses: github/codeql-action/analyze@v1 From 43f6241f881d6669866f8f9738dd25a4f70586f6 Mon Sep 17 00:00:00 2001 From: Jonas Cirotzki Date: Thu, 10 Dec 2020 18:36:33 +0100 Subject: [PATCH 2/2] cleanup build --- .github/workflows/codeql.yml | 22 ++++++++++++++++------ 1 file changed, 16 insertions(+), 6 deletions(-) diff --git a/.github/workflows/codeql.yml b/.github/workflows/codeql.yml index 404e34b8f1a..7a9497470d7 100644 --- a/.github/workflows/codeql.yml +++ b/.github/workflows/codeql.yml @@ -9,7 +9,10 @@ # the `language` matrix defined below to confirm you have the correct set of # supported CodeQL languages. # -name: "CodeQL" +name: "CodeQL Security Scanner" + +env: + java: 11 on: push: @@ -47,15 +50,22 @@ jobs: # Prefix the list here with "+" to use these queries and those in the config file. # queries: ./path/to/local/query, your-org/your-repo/queries@main - - name: Test with Java 11 + - name: Set up JDK ${{ env.java }} uses: actions/setup-java@v1 with: - java-version: 1.11 + java-version: ${{ env.java }} + + - name: Cache Maven packages + # FIXME(@JonasCir) #3733 remove '**/*.pom' once serverlib pom is renamed + uses: actions/cache@v2 + with: + path: ~/.m2 + key: ${{ runner.os }}-java-${{ env.java }}-m2-${{ hashFiles('**/pom.xml', '**/*.pom') }} + restore-keys: ${{ runner.os }}-java-${{ env.java }}-m2 - name: Build with Maven - run: | - cd sormas-base - mvn install -B -Dorg.slf4j.simpleLogger.log.org.apache.maven.cli.transfer.Slf4jMavenTransferListener=warn -DskipTests + working-directory: ./sormas-base + run: mvn verify -B -ntp -DSkipTests - name: Perform CodeQL Analysis uses: github/codeql-action/analyze@v1