github.com/KEINOS/go-countline@v1.1.0/.github/workflows/codeQL-analysis.yaml (about)

     1  # Security vulnerability scanning using CodeQL, the semantic code analysis engine.
     2  # See:
     3  #   https://github.com/github/codeql-action
     4  #   https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-the-codeql-workflow-for-compiled-languages#go
     5  name: "CodeQL"
     6  
     7  on:
     8    workflow_dispatch:
     9    push:
    10    schedule:
    11      # Runs at 00:00 on Friday.
    12      # See: https://crontab.guru/
    13      - cron: '0 0 * * FRI'
    14  
    15  jobs:
    16    analyze:
    17      name: Analyze
    18      runs-on: ubuntu-latest
    19      permissions:
    20        security-events: write
    21  
    22      steps:
    23      - name: Checkout repository
    24        uses: actions/checkout@v3
    25  
    26      # Initializes the CodeQL tools for scanning.
    27      - name: Initialize CodeQL
    28        uses: github/codeql-action/init@v2
    29        with:
    30          languages: go
    31  
    32      # Autobuild attempts to build any compiled languages (C/C++, C#, Go, or Java).
    33      - name: Autobuild
    34        uses: github/codeql-action/autobuild@v2
    35  
    36      - name: Perform CodeQL Analysis
    37        uses: github/codeql-action/analyze@v2