mibo
|
05f865650a
|
[OLINGO-1600] Dependency version updates
|
2023-11-19 22:22:28 +01:00 |
Raupp Pereira
|
5e696bc131
|
upgrade jdk and java ee
|
2023-06-05 19:50:34 +02:00 |
mibo
|
02a114dd33
|
[OLINGO-1589] Fixed CodeQL GH action
|
2022-11-13 08:07:08 +01:00 |
mibo
|
e1c107ef0c
|
[OLINGO-1589] Added GH action for Maven build
|
2022-10-23 17:35:56 +02:00 |
dependabot[bot]
|
9a75d0bf30
|
Bump actions/checkout from 2 to 3
Bumps [actions/checkout](https://github.com/actions/checkout) from 2 to 3.
- [Release notes](https://github.com/actions/checkout/releases)
- [Changelog](https://github.com/actions/checkout/blob/main/CHANGELOG.md)
- [Commits](https://github.com/actions/checkout/compare/v2...v3)
---
updated-dependencies:
- dependency-name: actions/checkout
dependency-type: direct:production
update-type: version-update:semver-major
...
Signed-off-by: dependabot[bot] <support@github.com>
|
2022-10-15 11:50:43 +02:00 |
dependabot[bot]
|
8bd73adc77
|
Bump github/codeql-action from 1 to 2
Bumps [github/codeql-action](https://github.com/github/codeql-action) from 1 to 2.
- [Release notes](https://github.com/github/codeql-action/releases)
- [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md)
- [Commits](https://github.com/github/codeql-action/compare/v1...v2)
---
updated-dependencies:
- dependency-name: github/codeql-action
dependency-type: direct:production
update-type: version-update:semver-major
...
Signed-off-by: dependabot[bot] <support@github.com>
|
2022-10-15 11:50:09 +02:00 |
D067452
|
5ff6482ff0
|
Fixing a typo
|
2022-02-26 08:42:01 +01:00 |
D067452
|
f6a305c464
|
Set up CodeQL scans
GitHub offers code scanning that is based on CodeQL (the same engine that is used in [LGTM.com](https://lgtm.com/)). Shortly, that's a static analysis tool that is able to catch various issues including security ones. Once enabled for pull requests, it would help with catching issues earlier.
The scan may be run via [GitHub Actions](https://docs.github.com/en/code-security/secure-coding/automatically-scanning-your-code-for-vulnerabilities-and-errors/setting-up-code-scanning-for-a-repository#enabling-code-scanning-using-actions) for pull requests. Or, LGTM checks may be enabled, the instructions are [here](https://lgtm.com/help/lgtm/managing-automated-code-review).
This pull request adds a GitHub workflow that runs CodeQL scans for pull requests and the main branch. There results will be available:
- in the "Security" tab for project maintainers
- in each pull request (only new alerts or fixed ones)
|
2022-02-26 08:42:01 +01:00 |