1name: CodeQL
2on:
3 push:
4 branches:
5 - releases/v5.x
6 - main
7 pull_request:
8
9 schedule:
10 - cron: '00 5 * * 1'
11
12permissions: {}
13
14jobs:
15 analyze:
16 name: Analyze
17 runs-on: ubuntu-latest
18
19 permissions:
20 actions: read
21 contents: read
22 security-events: write
23
24 strategy:
25 fail-fast: false
26 matrix:
27 language: [ 'go' ]
28
29 steps:
30 - name: Checkout code
31 uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1
32
33 # Initializes the CodeQL tools for scanning.
34 - name: Initialize CodeQL
35 uses: github/codeql-action/init@4c3e5362829f0b0bb62ff5f6c938d7f95574c306 # v2.22.11
36 with:
37 languages: ${{ matrix.language }}
38 # xref: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
39 # xref: https://codeql.github.com/codeql-query-help/go/
40 queries: security-and-quality
41
42 - name: Manual Build
43 run: go build ./...
44
45 - name: Perform CodeQL Analysis
46 uses: github/codeql-action/analyze@4c3e5362829f0b0bb62ff5f6c938d7f95574c306 # v2.22.11
47 with:
48 category: "/language:${{matrix.language}}"