Skip to content

Commit

Permalink
ABC-order variant analysis linting config
Browse files Browse the repository at this point in the history
This job was called vulnerability variant analysis during most of
development. It should have been reordered when the name was shortened.

Relates-to: submariner-io/submariner#1970
Signed-off-by: Daniel Farrell <[email protected]>
  • Loading branch information
dfarrell07 committed Aug 30, 2022
1 parent ee22694 commit 8836f57
Show file tree
Hide file tree
Showing 2 changed files with 38 additions and 38 deletions.
36 changes: 18 additions & 18 deletions .github/workflows/linting.yml
Original file line number Diff line number Diff line change
Expand Up @@ -116,6 +116,24 @@ jobs:
- name: Run packagedoc-lint
run: make packagedoc-lint

variant-analysis:
name: Variant Analysis
runs-on: ubuntu-latest
steps:
- name: Check out the repository
uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
- name: Initialize CodeQL
uses: github/codeql-action/init@2ca79b6fa8d3ec278944088b4aa5f46912db5d63
with:
languages: go
- name: Build code, creating CodeQL database
run: make build
- name: Run CodeQL variant analysis
uses: github/codeql-action/analyze@2ca79b6fa8d3ec278944088b4aa5f46912db5d63
- name: Show CodeQL scan SARIF report
if: always()
run: cat ../results/go.sarif

vulnerability-scan:
name: Vulnerability Scanning
runs-on: ubuntu-latest
Expand All @@ -138,24 +156,6 @@ jobs:
with:
sarif_file: ${{ steps.scan.outputs.sarif }}

variant-analysis:
name: Variant Analysis
runs-on: ubuntu-latest
steps:
- name: Check out the repository
uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
- name: Initialize CodeQL
uses: github/codeql-action/init@2ca79b6fa8d3ec278944088b4aa5f46912db5d63
with:
languages: go
- name: Build code, creating CodeQL database
run: make build
- name: Run CodeQL variant analysis
uses: github/codeql-action/analyze@2ca79b6fa8d3ec278944088b4aa5f46912db5d63
- name: Show CodeQL scan SARIF report
if: always()
run: cat ../results/go.sarif

yaml-lint:
name: YAML
runs-on: ubuntu-latest
Expand Down
40 changes: 20 additions & 20 deletions .github/workflows/report.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,26 @@ on:
permissions: {}

jobs:
variant-analysis:
name: Variant Analysis
runs-on: ubuntu-latest
permissions:
security-events: write
steps:
- name: Check out the repository
uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
- name: Initialize CodeQL
uses: github/codeql-action/init@2ca79b6fa8d3ec278944088b4aa5f46912db5d63
with:
languages: go
- name: Build code, creating CodeQL database
run: make build
- name: Run CodeQL variant analysis
uses: github/codeql-action/analyze@2ca79b6fa8d3ec278944088b4aa5f46912db5d63
- name: Show CodeQL scan SARIF report
if: always()
run: cat ../results/go.sarif

vulnerability-scan:
name: Vulnerability Scanning
if: github.repository_owner == 'submariner-io'
Expand All @@ -31,23 +51,3 @@ jobs:
uses: github/codeql-action/upload-sarif@c7f292ea4f542c473194b33813ccd4c207a6c725
with:
sarif_file: ${{ steps.scan.outputs.sarif }}

variant-analysis:
name: Variant Analysis
runs-on: ubuntu-latest
permissions:
security-events: write
steps:
- name: Check out the repository
uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
- name: Initialize CodeQL
uses: github/codeql-action/init@2ca79b6fa8d3ec278944088b4aa5f46912db5d63
with:
languages: go
- name: Build code, creating CodeQL database
run: make build
- name: Run CodeQL variant analysis
uses: github/codeql-action/analyze@2ca79b6fa8d3ec278944088b4aa5f46912db5d63
- name: Show CodeQL scan SARIF report
if: always()
run: cat ../results/go.sarif

0 comments on commit 8836f57

Please sign in to comment.