Add a check for vulnerabilities in the Go database #849
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# https://codeql.github.com | |
name: CodeQL | |
on: | |
pull_request: | |
push: | |
branches: | |
- main | |
schedule: | |
- cron: '10 18 * * 2' | |
env: | |
# Use the Go toolchain installed by setup-go | |
# https://github.com/actions/setup-go/issues/457 | |
GOTOOLCHAIN: local | |
jobs: | |
analyze: | |
if: ${{ github.repository == 'CrunchyData/postgres-operator' }} | |
permissions: | |
actions: read | |
contents: read | |
security-events: write | |
runs-on: ubuntu-latest | |
steps: | |
- uses: actions/checkout@v4 | |
- uses: actions/setup-go@v5 | |
with: { go-version: stable } | |
- name: Initialize CodeQL | |
uses: github/codeql-action/init@v3 | |
with: { languages: go } | |
- name: Autobuild | |
# This action calls `make` which runs our "help" target. | |
uses: github/codeql-action/autobuild@v3 | |
- name: Perform CodeQL Analysis | |
uses: github/codeql-action/analyze@v3 |