...
1name: "CodeQL"
2
3on:
4 push:
5 branches: [ develop ]
6 pull_request:
7 # The branches below must be a subset of the branches above
8 branches: [ develop ]
9 schedule:
10 - cron: '16 15 * * 4'
11
12jobs:
13 analyze:
14 name: Analyze
15 runs-on: ubuntu-latest
16
17 strategy:
18 fail-fast: false
19 matrix:
20 language: [ 'go' ]
21 # CodeQL supports [ 'cpp', 'csharp', 'go', 'java', 'javascript', 'python' ]
22 # Learn more:
23 # https://docs.github.com/en/free-pro-team@latest/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#changing-the-languages-that-are-analyzed
24
25 steps:
26 - name: Checkout repository
27 uses: actions/checkout@v2
28
29 # Initializes the CodeQL tools for scanning.
30 - name: Initialize CodeQL
31 uses: github/codeql-action/init@v1
32 with:
33 languages: ${{ matrix.language }}
34 # If you wish to specify custom queries, you can do so here or in a config file.
35 # By default, queries listed here will override any specified in a config file.
36 # Prefix the list here with "+" to use these queries and those in the config file.
37 # queries: ./path/to/local/query, your-org/your-repo/queries@main
38
39 # Autobuild attempts to build any compiled languages (C/C++, C#, or Java).
40 # If this step fails, then you should remove it and run the build manually (see below)
41 - name: Autobuild
42 uses: github/codeql-action/autobuild@v1
43
44 - name: Perform CodeQL Analysis
45 uses: github/codeql-action/analyze@v1
View as plain text