Skip to content

Bump trillian-opensource-ci/db_server from c5195ff to 6f9942d in /config/trillian/mysql #3292

Bump trillian-opensource-ci/db_server from c5195ff to 6f9942d in /config/trillian/mysql

Bump trillian-opensource-ci/db_server from c5195ff to 6f9942d in /config/trillian/mysql #3292

Workflow file for this run

name: "CodeQL"
on:
push:
branches:
- main
pull_request:
branches:
- main
schedule:
- cron: '32 8 * * 2'
jobs:
analyze:
name: Analyze
runs-on: ubuntu-latest
permissions:
actions: read
contents: read
security-events: write
strategy:
fail-fast: false
matrix:
language:
- 'go'
steps:
- name: Checkout repository
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- name: Filter paths
uses: dorny/paths-filter@v3
id: changes
with:
filters: |
gocode:
- 'pkg/**'
- 'cmd/**'
- uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32 # v5.0.2
with:
go-version-file: 'go.mod'
# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
if: steps.changes.outputs.gocode == 'true'
uses: github/codeql-action/init@294a9d92911152fe08befb9ec03e240add280cb3 # v3.26.8
with:
languages: '${{ matrix.language }}'
- name: Build
if: steps.changes.outputs.gocode == 'true'
run: |
make build
- name: Perform CodeQL Analysis
if: steps.changes.outputs.gocode == 'true'
uses: github/codeql-action/analyze@294a9d92911152fe08befb9ec03e240add280cb3 # v3.26.8