diff --git a/.github/workflows/linting.yml b/.github/workflows/linting.yml index c6fe253a3..e70e3f15c 100644 --- a/.github/workflows/linting.yml +++ b/.github/workflows/linting.yml @@ -136,6 +136,22 @@ jobs: - name: Run shellcheck run: make shellcheck + variant-analysis: + name: Variant Analysis + runs-on: ubuntu-latest + steps: + - name: Check out the repository + uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b + - name: Initialize CodeQL + uses: github/codeql-action/init@86f3159a697a097a813ad9bfa0002412d97690a4 + with: + languages: go + - name: Run CodeQL variant analysis + uses: github/codeql-action/analyze@86f3159a697a097a813ad9bfa0002412d97690a4 + - name: Show CodeQL scan SARIF report + if: always() + run: cat ../results/go.sarif + vulnerability-scan: name: Vulnerability Scanning runs-on: ubuntu-latest diff --git a/.github/workflows/report.yml b/.github/workflows/report.yml index da6b6f1e1..0b5adb940 100644 --- a/.github/workflows/report.yml +++ b/.github/workflows/report.yml @@ -10,6 +10,24 @@ on: permissions: {} jobs: + variant-analysis: + name: Variant Analysis + runs-on: ubuntu-latest + permissions: + security-events: write + steps: + - name: Check out the repository + uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b + - name: Initialize CodeQL + uses: github/codeql-action/init@86f3159a697a097a813ad9bfa0002412d97690a4 + with: + languages: go + - name: Run CodeQL variant analysis + uses: github/codeql-action/analyze@86f3159a697a097a813ad9bfa0002412d97690a4 + - name: Show CodeQL scan SARIF report + if: always() + run: cat ../results/go.sarif + vulnerability-scan: name: Vulnerability Scanning if: github.repository_owner == 'submariner-io'