Skip to content

Run Gosec

Run Gosec #363

Workflow file for this run

name: Run Gosec
on:
pull_request:
merge_group:
push:
branches:
- master
- release/**
jobs:
Gosec:
runs-on: ubuntu-latest
permissions:
actions: read
contents: read
security-events: write
env:
GO111MODULE: on
steps:
- uses: actions/checkout@v3
- id: changed-files
uses: tj-actions/changed-files@v35
with:
files: |
**/*.go
go.mod
go.sum
- name: Run Gosec Security Scanner
uses: informalsystems/gosec@master
with:
# we let the report trigger content trigger a failure using the GitHub Security features.
args: '-no-fail -fmt sarif -out results.sarif ./...'
if: steps.changed-files.outputs.any_changed == 'true'
- name: Upload SARIF file
uses: github/codeql-action/upload-sarif@v2
with:
# Path to SARIF file relative to the root of the repository
sarif_file: results.sarif
if: steps.changed-files.outputs.any_changed == 'true'