Skip to content
This repository has been archived by the owner on Jan 21, 2024. It is now read-only.

Bump golang.org/x/net from 0.10.0 to 0.17.0 in /src #113

Bump golang.org/x/net from 0.10.0 to 0.17.0 in /src

Bump golang.org/x/net from 0.10.0 to 0.17.0 in /src #113

Workflow file for this run

name: Acceptance
on:
push:
branches: [ "main", "developer" ]
pull_request:
branches: [ "main", "developer" ]
jobs:
codeql-analysis:
name: Analyze
runs-on: ${{'ubuntu-latest' || 'macos-latest' || 'windows-latest' }}
permissions:
actions: read
contents: read
security-events: write
strategy:
fail-fast: false
matrix:
language: [ 'go' ]
steps:
- name: Checkout repository
uses: actions/checkout@v3
- name: Initialize CodeQL
uses: github/codeql-action/init@v2
with:
languages: ${{ matrix.language }}
queries: security-extended,security-and-quality
- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v2
with:
category: "/language:${{matrix.language}}"
codacy-security-scan:
name: Security Scan
runs-on: ${{'ubuntu-latest' || 'macos-latest' || 'windows-latest' }}
permissions:
actions: read
contents: read
security-events: write
strategy:
fail-fast: false
matrix:
language: [ 'go' ]
steps:
- name: Checkout code
uses: actions/checkout@v3
- name: Run Codacy Analysis CLI
uses: codacy/codacy-analysis-cli-action@d840f886c4bd4edc059706d09c6a1586111c540b
with:
project-token: ${{ secrets.CODACY_PROJECT_TOKEN }}
verbose: true
output: results.sarif
format: sarif
gh-code-scanning-compat: true
max-allowed-issues: 2147483647
- name: Upload SARIF results file
uses: github/codeql-action/upload-sarif@v2
with:
sarif_file: results.sarif