Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

[v6] backend: add git transport backend #1466

[v6] backend: add git transport backend

[v6] backend: add git transport backend #1466

Workflow file for this run

name: CodeQL
on:
push:
branches:
- releases/v5.x
- main
pull_request:
schedule:
- cron: '00 5 * * 1'
permissions: {}
jobs:
analyze:
name: Analyze
runs-on: ubuntu-latest
permissions:
actions: read
contents: read
security-events: write
strategy:
fail-fast: false
matrix:
language: [ 'go' ]
steps:
- name: Checkout code
uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1
# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@e7c0c9d71b7bd108fd12e06b56fc58d3d154164d # v2.22.11
with:
languages: ${{ matrix.language }}
# xref: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
# xref: https://codeql.github.com/codeql-query-help/go/
queries: security-and-quality
- name: Manual Build
run: go build ./...
- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@e7c0c9d71b7bd108fd12e06b56fc58d3d154164d # v2.22.11
with:
category: "/language:${{matrix.language}}"
Morty Proxy This is a proxified and sanitized view of the page, visit original site.