Skip to content

build(deps): Bump golang.org/x/mod from 0.22.0 to 0.23.0 #153

build(deps): Bump golang.org/x/mod from 0.22.0 to 0.23.0

build(deps): Bump golang.org/x/mod from 0.22.0 to 0.23.0 #153

Workflow file for this run

name: "CodeQL"
on:
push:
branches: ["main"]
pull_request:
branches: ["main"]
paths:
- '.github/workflows/codeql.yml'
- 'cmd/**'
- 'pkg/**'
- 'testdata/**'
- 'go.mod'
- 'go.sum'
- 'makefile'
- '!**/*.md'
permissions:
contents: read
concurrency:
group: ${{ github.workflow }}-${{ github.ref }}
cancel-in-progress: true
jobs:
analyze:
name: Analyze
runs-on: ubuntu-latest
permissions:
actions: read
contents: read
security-events: write
strategy:
fail-fast: false
matrix:
language: ["go"]
# CodeQL supports [ $supported-codeql-languages ]
# Learn more about CodeQL language support at https://aka.ms/codeql-docs/language-support
steps:
- name: Harden Runner
uses: step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
with:
egress-policy: audit
- name: Checkout repository
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@dd746615b3b9d728a6a37ca2045b68ca76d4841a # v3.28.8
with:
languages: ${{ matrix.language }}
queries: security-and-quality
- name: Build executables
run: |
go build -o cpackget ./cmd
- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@dd746615b3b9d728a6a37ca2045b68ca76d4841a # v3.28.8
with:
category: "/language:${{matrix.language}}"