Skip to content

Commit

Permalink
ABC-order variant analysis linting config
Browse files Browse the repository at this point in the history
This job was called vulnerability variant analysis during most of
development. It should have been reordered when the name was shortened.

https://codeql.github.com/docs/codeql-overview/about-codeql/

Relates-to: submariner-io/submariner#1970
Signed-off-by: Daniel Farrell <[email protected]>
  • Loading branch information
dfarrell07 committed Sep 26, 2022
1 parent 0e70fdc commit 99d4dfc
Show file tree
Hide file tree
Showing 2 changed files with 38 additions and 38 deletions.
36 changes: 18 additions & 18 deletions .github/workflows/linting.yml
Original file line number Diff line number Diff line change
Expand Up @@ -125,6 +125,24 @@ jobs:
- name: Run shellcheck
run: make shellcheck

variant-analysis:
name: Variant Analysis
runs-on: ubuntu-latest
steps:
- name: Check out the repository
uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
- name: Initialize CodeQL
uses: github/codeql-action/init@86f3159a697a097a813ad9bfa0002412d97690a4
with:
languages: go
- name: Build code, creating CodeQL database
run: make build
- name: Run CodeQL variant analysis
uses: github/codeql-action/analyze@86f3159a697a097a813ad9bfa0002412d97690a4
- name: Show CodeQL scan SARIF report
if: always()
run: cat ../results/go.sarif

vulnerability-scan:
name: Vulnerability Scanning
runs-on: ubuntu-latest
Expand All @@ -147,24 +165,6 @@ jobs:
with:
sarif_file: ${{ steps.scan.outputs.sarif }}

variant-analysis:
name: Variant Analysis
runs-on: ubuntu-latest
steps:
- name: Check out the repository
uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
- name: Initialize CodeQL
uses: github/codeql-action/init@86f3159a697a097a813ad9bfa0002412d97690a4
with:
languages: go
- name: Build code, creating CodeQL database
run: make build
- name: Run CodeQL variant analysis
uses: github/codeql-action/analyze@86f3159a697a097a813ad9bfa0002412d97690a4
- name: Show CodeQL scan SARIF report
if: always()
run: cat ../results/go.sarif

yaml-lint:
name: YAML
runs-on: ubuntu-latest
Expand Down
40 changes: 20 additions & 20 deletions .github/workflows/report.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,26 @@ on:
permissions: {}

jobs:
variant-analysis:
name: Variant Analysis
runs-on: ubuntu-latest
permissions:
security-events: write
steps:
- name: Check out the repository
uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
- name: Initialize CodeQL
uses: github/codeql-action/init@86f3159a697a097a813ad9bfa0002412d97690a4
with:
languages: go
- name: Build code, creating CodeQL database
run: make build
- name: Run CodeQL variant analysis
uses: github/codeql-action/analyze@86f3159a697a097a813ad9bfa0002412d97690a4
- name: Show CodeQL scan SARIF report
if: always()
run: cat ../results/go.sarif

vulnerability-scan:
name: Vulnerability Scanning
if: github.repository_owner == 'submariner-io'
Expand All @@ -31,23 +51,3 @@ jobs:
uses: github/codeql-action/upload-sarif@86f3159a697a097a813ad9bfa0002412d97690a4
with:
sarif_file: ${{ steps.scan.outputs.sarif }}

variant-analysis:
name: Variant Analysis
runs-on: ubuntu-latest
permissions:
security-events: write
steps:
- name: Check out the repository
uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
- name: Initialize CodeQL
uses: github/codeql-action/init@86f3159a697a097a813ad9bfa0002412d97690a4
with:
languages: go
- name: Build code, creating CodeQL database
run: make build
- name: Run CodeQL variant analysis
uses: github/codeql-action/analyze@86f3159a697a097a813ad9bfa0002412d97690a4
- name: Show CodeQL scan SARIF report
if: always()
run: cat ../results/go.sarif

0 comments on commit 99d4dfc

Please sign in to comment.