Skip to content

feat: split out backends and migrations into own repo #4

feat: split out backends and migrations into own repo

feat: split out backends and migrations into own repo #4

Workflow file for this run

name: Analysis
on:
push:
branches: [main]
pull_request:
types: [opened, reopened, synchronize, ready_for_review]
schedule:
- cron: "0 12 * * 0" # 4 AM PST = 12 PM UDT, runs sundays
workflow_dispatch:
concurrency:
group: ${{ github.workflow }}-${{ github.ref }}
cancel-in-progress: true
jobs:
CodeQL:
name: CodeQL
if: github.event_name != 'pull_request' || !github.event.pull_request.draft
runs-on: ubuntu-22.04
strategy:
matrix:
language: [go, java, javascript, python]
include:
- language: go
working-directory: backend-go
build: |
sed -i '/^toolchain .*$/d' go.mod
go install github.com/swaggo/swag/cmd/swag@latest
CGO_ENABLED=0 GOOS=linux go build -v
- language: "java"
working-directory: backend-java
build: ./mvnw package -DskipTests
- language: "javascript"
- language: "python"
steps:
- uses: actions/checkout@v4
- uses: github/codeql-action/init@v2
with:
languages: ${{ matrix.language }}
- name: Autobuild
if: ${{ ! matrix.build }}
uses: github/codeql-action/autobuild@v2
- uses: actions/setup-java@v3
if: ${{ matrix.build && matrix.language == 'java' }}
with:
distribution: "temurin"
java-version: "17"
- uses: actions/cache@v3
if: ${{ matrix.build && matrix.language == 'java' }}
with:
path: ~/.m2/repository
key: ${{ runner.os }}-maven-${{ hashFiles('**/pom.xml') }}
restore-keys: |
${{ runner.os }}-maven-
- name: Build
if: ${{ matrix.build }}
run: ${{ matrix.build }}
working-directory: ${{ matrix.working-directory }}
- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v2
with:
category: "/language:${{matrix.language}}"
# https://github.com/marketplace/actions/aqua-security-trivy
trivy:
name: Trivy Security Scan
if: github.event_name != 'pull_request' || !github.event.pull_request.draft
runs-on: ubuntu-22.04
steps:
- uses: actions/checkout@v4
- name: Run Trivy vulnerability scanner in repo mode
uses: aquasecurity/trivy-action@0.12.0
with:
format: "sarif"
output: "trivy-results.sarif"
ignore-unfixed: true
scan-type: "fs"
scanners: "vuln,secret,config"
severity: "CRITICAL,HIGH"
- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v2
with:
sarif_file: "trivy-results.sarif"