Merge branch 'main' into database-checkpoint-relayerid #23
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Copyright (C) 2023, Ava Labs, Inc. All rights reserved. | |
# See the file LICENSE for licensing terms. | |
name: Snyk Golang | |
on: | |
push: | |
branches-ignore: | |
- "dependabot/**" | |
pull_request: | |
branches: | |
- "dependabot/**" | |
jobs: | |
golang-snyk: | |
runs-on: ubuntu-22.04 | |
steps: | |
- name: Checkout repository | |
uses: actions/checkout@v4 | |
with: | |
submodules: recursive | |
- name: Run Snyk | |
uses: snyk/actions/golang@master | |
continue-on-error: true # To make sure that SARIF upload gets called | |
env: | |
SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }} | |
with: | |
args: --sarif-file-output=snyk.sarif --all-projects --detection-depth=4 | |
# Replace any "undefined" security severity values with 0. The undefined value is used in the case | |
# of license-related findings, which do not do not indicate a security vulnerability. | |
# See https://github.com/github/codeql-action/issues/2187 for more context. | |
- name: Post-process sarif output | |
run: | | |
sed -i 's/"security-severity": "undefined"/"security-severity": "0"/g' snyk.sarif | |
- name: Upload result to GitHub Code Scanning | |
uses: github/codeql-action/upload-sarif@v3 | |
with: | |
sarif_file: snyk.sarif |