diff --git a/.github/workflows/codeql-analysis.yml b/.github/workflows/codeql-analysis.yml index 3424461..a3111bd 100644 --- a/.github/workflows/codeql-analysis.yml +++ b/.github/workflows/codeql-analysis.yml @@ -9,13 +9,13 @@ # the `language` matrix defined below to confirm you have the correct set of # supported CodeQL languages. # -name: "CodeQL" +name: 'CodeQL' defaults: run: working-directory: ./client on: schedule: - - cron: "19 3 * * 5" + - cron: '19 3 * * 5' jobs: analyze: @@ -29,7 +29,7 @@ jobs: strategy: fail-fast: false matrix: - language: ["java", "javascript"] + language: ['java', 'javascript'] # CodeQL supports [ 'cpp', 'csharp', 'go', 'java', 'javascript', 'python' ] # Learn more: # https://docs.github.com/en/free-pro-team@latest/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#changing-the-languages-that-are-analyzed @@ -37,12 +37,11 @@ jobs: steps: - name: Checkout repository uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 - + - uses: actions/setup-java@dded0888837ed1f317902acf8a20df0ad188d165 # v5.0.0 with: distribution: 'temurin' - java-version: 17 - + java-version: 21 # Initializes the CodeQL tools for scanning. - name: Initialize CodeQL @@ -55,13 +54,13 @@ jobs: # queries: ./path/to/local/query, your-org/your-repo/queries@main - name: Build with Maven - run: mvn -B -Pm2 clean verify --file pom.xml + run: mvn -B clean verify --file pom.xml working-directory: server - name: Build Client with yarn uses: actions/setup-node@a0853c24544627f65ddf259abe73b1d18a591444 # v5.0.0 with: - node-version: "20" + node-version: '22' - run: yarn install # ℹ️ Command-line programs to run using the OS shell. diff --git a/Jenkinsfile b/Jenkinsfile index 1127617..8125f2b 100644 --- a/Jenkinsfile +++ b/Jenkinsfile @@ -60,7 +60,7 @@ pipeline { YARN_CACHE_FOLDER = "${env.WORKSPACE}/yarn-cache" SPAWN_WRAP_SHIM_ROOT = "${env.WORKSPACE}" EMAIL_TO= "glsp-build@eclipse.org" - MAVEN_VERSION = "3.9.12" + MAVEN_VERSION = "3.9.14" }