OSDN Git Service

Resolves: Add continuous code security and quality analysis (#844)
authorSvetoslav Zlatkov <62066501+szlatkow@users.noreply.github.com>
Fri, 25 Jun 2021 12:20:24 +0000 (15:20 +0300)
committerGitHub <noreply@github.com>
Fri, 25 Jun 2021 12:20:24 +0000 (21:20 +0900)
* add minimal CodeQL

* add minimal CodeQL using project's build instructions

* building with project's instructions

* test build with minimal CodeQL

* run pipeline on windows os.

* minimal CodeQL test with autobuild on windows

* add minimal CodeQL with project's build instructions

* add CodeQL with security-and-quality queries

* run on ubuntu and add pwsh to build step

* change building platform to windows

* change the runner platform to ubuntu

* change the build platform to windows

* Update codeql-analysis.yml

Co-authored-by: aleks-ivanov <aleksandar.ivanov@singlet.dev>
Co-authored-by: Aleksandar Ivanov <74899441+aleks-ivanov@users.noreply.github.com>
.github/workflows/codeql-analysis.yml [new file with mode: 0644]

diff --git a/.github/workflows/codeql-analysis.yml b/.github/workflows/codeql-analysis.yml
new file mode 100644 (file)
index 0000000..53149c2
--- /dev/null
@@ -0,0 +1,35 @@
+name: CodeQL Analysis
+
+on:
+  push:
+  pull_request:
+  schedule:
+    - cron: '0 8 * * *'
+
+jobs:
+  analyze:
+    name: Analyze
+    runs-on: windows-latest
+    steps:
+      - name: Checkout repository
+        id: checkout_repo
+        uses: actions/checkout@v2
+
+      - name: Initialize CodeQL
+        id: init_codeql
+        uses: github/codeql-action/init@v1
+        with:
+          queries: security-and-quality
+
+      - name: Build project
+        id: build_project
+        shell: pwsh
+        run: |
+          .\DownloadDeps.cmd
+          .\BuildAll.vs2019.cmd x64 -ci
+
+      - name: Perform CodeQL Analysis
+        id: analyze_codeql
+        uses: github/codeql-action/analyze@v1
+
+# Built with ❤ by [Pipeline Foundation](https://pipeline.foundation)