From 6c8316730c90da5c8eadbadadb6bd18e9ca0b69c Mon Sep 17 00:00:00 2001 From: soulteary Date: Tue, 10 Jan 2023 00:01:39 +0800 Subject: [PATCH] chore: add scan.yml --- .github/workflows/scan.yml | 34 ++++++++++++++++++++++++++++++++++ 1 file changed, 34 insertions(+) create mode 100644 .github/workflows/scan.yml diff --git a/.github/workflows/scan.yml b/.github/workflows/scan.yml new file mode 100644 index 0000000..d1c4744 --- /dev/null +++ b/.github/workflows/scan.yml @@ -0,0 +1,34 @@ +name: "Security Scan" + +# Run workflow each time code is pushed to your repository and on a schedule. +# The scheduled workflow runs every at 00:00 on Sunday UTC time. +on: + workflow_dispatch: + push: + branches: + - main + paths: + - 'internal/**' + - '*.go' + pull_request: + branches: + - main + schedule: + - cron: '0 0 * * 0' + +jobs: + scan: + runs-on: ubuntu-latest + steps: + - name: Check out code into the Go module directory + uses: actions/checkout@v2 + - name: Security Scan + uses: securego/gosec@master + with: + # we let the report trigger content trigger a failure using the GitHub Security features. + args: '-no-fail -fmt sarif -out results.sarif ./...' + - name: Upload SARIF file + uses: github/codeql-action/upload-sarif@v2 + with: + # Path to SARIF file relative to the root of the repository + sarif_file: results.sarif \ No newline at end of file