Skip to content

Commit

Permalink
ci: enable advanced security workflows (#10)
Browse files Browse the repository at this point in the history
Uncomments the advanced security workflows.
  • Loading branch information
malandis authored Sep 5, 2024
1 parent 61d045d commit 1343fbb
Show file tree
Hide file tree
Showing 2 changed files with 91 additions and 91 deletions.
138 changes: 69 additions & 69 deletions .github/workflows/codeql.yml
Original file line number Diff line number Diff line change
@@ -1,69 +1,69 @@
## # For most projects, this workflow file will not need changing; you simply need
## # to commit it to your repository.
## #
## # You may wish to alter this file to override the set of languages analyzed,
## # or to provide custom queries or build logic.
## #
## # ******** NOTE ********
## # We have attempted to detect the languages in your repository. Please check
## # the `language` matrix defined below to confirm you have the correct set of
## # supported CodeQL languages.
## #
## name: "CodeQL"
##
## on:
## push:
## branches: [ "main" ]
## pull_request:
## # The branches below must be a subset of the branches above
## branches: [ "main" ]
## schedule:
## - cron: '38 23 * * 2'
##
## jobs:
## analyze:
## name: Analyze
## runs-on: ubuntu-latest
##
## env:
## MOMENTO_API_KEY: ${{ secrets.ALPHA_TEST_AUTH_TOKEN }}
##
## permissions:
## actions: read
## contents: read
## security-events: write
##
## strategy:
## fail-fast: false
## matrix:
## language: [ 'java' ]
##
## steps:
## - uses: actions/checkout@v3
##
## # Initializes the CodeQL tools for scanning.
## - name: Initialize CodeQL
## uses: github/codeql-action/init@v2
## with:
## languages: ${{ matrix.language }}
## # If you wish to specify custom queries, you can do so here or in a config file.
## # By default, queries listed here will override any specified in a config file.
## # Prefix the list here with "+" to use these queries and those in the config file.
##
## # Details on CodeQL's query packs refer to : https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
## # queries: security-extended,security-and-quality
##
##
## - name: Set up JDK 17
## uses: actions/setup-java@v3
## with:
## java-version: 17
## distribution: 'corretto'
##
## - name: Build project
## run: make build
##
## - name: Perform CodeQL Analysis
## uses: github/codeql-action/analyze@v2
## with:
## category: "/language:${{matrix.language}}"
# For most projects, this workflow file will not need changing; you simply need
# to commit it to your repository.
#
# You may wish to alter this file to override the set of languages analyzed,
# or to provide custom queries or build logic.
#
# ******** NOTE ********
# We have attempted to detect the languages in your repository. Please check
# the `language` matrix defined below to confirm you have the correct set of
# supported CodeQL languages.
#
name: "CodeQL"

on:
push:
branches: [ "main" ]
pull_request:
# The branches below must be a subset of the branches above
branches: [ "main" ]
schedule:
- cron: '38 23 * * 2'

jobs:
analyze:
name: Analyze
runs-on: ubuntu-latest

env:
MOMENTO_API_KEY: ${{ secrets.ALPHA_TEST_AUTH_TOKEN }}

permissions:
actions: read
contents: read
security-events: write

strategy:
fail-fast: false
matrix:
language: [ 'java' ]

steps:
- uses: actions/checkout@v3

# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@v2
with:
languages: ${{ matrix.language }}
# If you wish to specify custom queries, you can do so here or in a config file.
# By default, queries listed here will override any specified in a config file.
# Prefix the list here with "+" to use these queries and those in the config file.

# Details on CodeQL's query packs refer to : https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
# queries: security-extended,security-and-quality


- name: Set up JDK 17
uses: actions/setup-java@v3
with:
java-version: 17
distribution: 'corretto'

- name: Build project
run: make build

- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v2
with:
category: "/language:${{matrix.language}}"
44 changes: 22 additions & 22 deletions .github/workflows/dependency-review.yml
Original file line number Diff line number Diff line change
@@ -1,22 +1,22 @@
## # Dependency Review Action
## #
## # This Action will scan dependency manifest files that change as part of a Pull Request, surfacing known-vulnerable
## # versions of the packages declared or updated in the PR. Once installed, if the workflow run is marked as required,
## # PRs introducing known-vulnerable packages will be blocked from merging.
## #
## # Source repository: https://github.com/actions/dependency-review-action
## # Public documentation: https://docs.github.com/en/code-security/supply-chain-security/understanding-your-software-supply-chain/about-dependency-review#dependency-review-enforcement
## name: 'Dependency Review'
## on: [pull_request]
##
## permissions:
## contents: read
##
## jobs:
## dependency-review:
## runs-on: ubuntu-latest
## steps:
## - name: 'Checkout Repository'
## uses: actions/checkout@v3
## - name: 'Dependency Review'
## uses: actions/dependency-review-action@v2
# Dependency Review Action
#
# This Action will scan dependency manifest files that change as part of a Pull Request, surfacing known-vulnerable
# versions of the packages declared or updated in the PR. Once installed, if the workflow run is marked as required,
# PRs introducing known-vulnerable packages will be blocked from merging.
#
# Source repository: https://github.com/actions/dependency-review-action
# Public documentation: https://docs.github.com/en/code-security/supply-chain-security/understanding-your-software-supply-chain/about-dependency-review#dependency-review-enforcement
name: 'Dependency Review'
on: [pull_request]

permissions:
contents: read

jobs:
dependency-review:
runs-on: ubuntu-latest
steps:
- name: 'Checkout Repository'
uses: actions/checkout@v3
- name: 'Dependency Review'
uses: actions/dependency-review-action@v2

0 comments on commit 1343fbb

Please sign in to comment.