codeql-analysis.yml 1.2 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950
  1. name: "Code scanning - action"
  2. on:
  3. push:
  4. branches: [master, ]
  5. pull_request:
  6. # The branches below must be a subset of the branches above
  7. branches: [master]
  8. schedule:
  9. - cron: '0 22 * * 5'
  10. permissions:
  11. contents: read # to fetch code (actions/checkout)
  12. jobs:
  13. CodeQL-Build:
  14. permissions:
  15. contents: read # to fetch code (actions/checkout)
  16. security-events: write # to upload SARIF results (github/codeql-action/analyze)
  17. runs-on: ubuntu-latest
  18. steps:
  19. - name: Checkout repository
  20. uses: actions/checkout@v3
  21. with:
  22. # We must fetch at least the immediate parents so that if this is
  23. # a pull request then we can checkout the head.
  24. fetch-depth: 2
  25. - name: Install Go
  26. uses: actions/setup-go@v3
  27. with:
  28. go-version-file: go.mod
  29. # Initializes the CodeQL tools for scanning.
  30. - name: Initialize CodeQL
  31. uses: github/codeql-action/init@v2
  32. with:
  33. languages: python, c
  34. setup-python-dependencies: false
  35. - name: Build kitty
  36. run: python3 .github/workflows/ci.py build
  37. - name: Perform CodeQL Analysis
  38. uses: github/codeql-action/analyze@v2