codeql-analysis.yml 2.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475
  1. # For most projects, this workflow file will not need changing; you simply need
  2. # to commit it to your repository.
  3. #
  4. # You may wish to alter this file to override the set of languages analyzed,
  5. # or to provide custom queries or build logic.
  6. #
  7. # ******** NOTE ********
  8. # We have attempted to detect the languages in your repository. Please check
  9. # the `language` matrix defined below to confirm you have the correct set of
  10. # supported CodeQL languages.
  11. #
  12. name: "CodeQL"
  13. on:
  14. push:
  15. branches: [ master ]
  16. pull_request:
  17. # The branches below must be a subset of the branches above
  18. branches: [ master ]
  19. schedule:
  20. - cron: '36 3 * * 0'
  21. jobs:
  22. analyze:
  23. name: Analyze
  24. concurrency:
  25. group: codeql-${{ github.ref }}
  26. cancel-in-progress: true
  27. runs-on: ubuntu-latest
  28. permissions:
  29. actions: read
  30. contents: read
  31. security-events: write
  32. strategy:
  33. fail-fast: false
  34. matrix:
  35. language: [ 'go' ]
  36. # CodeQL supports [ 'cpp', 'csharp', 'go', 'java', 'javascript', 'python', 'ruby' ]
  37. # Learn more about CodeQL language support at https://aka.ms/codeql-docs/language-support
  38. steps:
  39. - name: Checkout repository
  40. uses: actions/checkout@v3
  41. # Initializes the CodeQL tools for scanning.
  42. - name: Initialize CodeQL
  43. uses: github/codeql-action/init@v2
  44. with:
  45. languages: ${{ matrix.language }}
  46. # If you wish to specify custom queries, you can do so here or in a config file.
  47. # By default, queries listed here will override any specified in a config file.
  48. # Prefix the list here with "+" to use these queries and those in the config file.
  49. # Details on CodeQL's query packs refer to : https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
  50. # queries: security-extended,security-and-quality
  51. # Autobuild attempts to build any compiled languages (C/C++, C#, or Java).
  52. # If this step fails, then you should remove it and run the build manually (see below)
  53. - name: Autobuild
  54. uses: github/codeql-action/autobuild@v2
  55. # ℹ️ Command-line programs to run using the OS shell.
  56. # 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
  57. # If the Autobuild fails above, remove it and uncomment the following three lines.
  58. # modify them (or add more) to build your code if your project, please refer to the EXAMPLE below for guidance.
  59. # - run: |
  60. # echo "Run, Build Application using script"
  61. # ./location_of_script_within_repo/buildscript.sh
  62. - name: Perform CodeQL Analysis
  63. uses: github/codeql-action/analyze@v2