Skip to content

Commit

Permalink
create a separate workflow for go analyse
Browse files Browse the repository at this point in the history
  • Loading branch information
eljohnson92 committed Apr 24, 2024
1 parent 3ff0933 commit f58b702
Show file tree
Hide file tree
Showing 2 changed files with 76 additions and 48 deletions.
48 changes: 0 additions & 48 deletions .github/workflows/build_test_ci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -70,54 +70,6 @@ jobs:
token: ${{ secrets.CODECOV_TOKEN }}
slug: linode/cluster-api-provider-linode


go-analyse:
needs: go-build-test
runs-on: ubuntu-latest
steps:
- name: Harden Runner
uses: step-security/harden-runner@v2
with:
disable-sudo: true
egress-policy: block
allowed-endpoints: >
api.github.com:443
github.com:443
proxy.golang.org:443
sum.golang.org:443
objects.githubusercontent.com:443
registry-1.docker.io:443
auth.docker.io:443
production.cloudflare.docker.com:443
vuln.go.dev:443
storage.googleapis.com:443
- uses: actions/checkout@v4

- name: Set up Go
uses: actions/setup-go@v5
with:
go-version-file: 'go.mod'
check-latest: true

- name: Docker cache
uses: ScribeMD/[email protected]
with:
key: docker-${{ runner.os }}-${{ hashFiles('go.sum') }}

- name: Lint
run: make lint

- name: Gosec
run: make gosec

- name: Vulncheck
continue-on-error: true
run: make vulncheck

- name: Nilcheck
run: make nilcheck

e2e-test:
needs: [go-build-test, docker-build]
runs-on: ubuntu-latest
Expand Down
76 changes: 76 additions & 0 deletions .github/workflows/go-analyse.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,76 @@
name: Go Analyse

on:
push:
branches:
- main
pull_request:
branches:
- "*"
workflow_dispatch:

permissions:
contents: read
pull-requests: read

jobs:
check-noop:
runs-on: ubuntu-latest
steps:
- uses: dorny/paths-filter@v3
with:
predicate-quantifier: 'every'
filters: |
src:
- '!**/**.md'
- '!docs/**'
go-analyse:
needs: go-build-test
runs-on: ubuntu-latest
if: ${{ steps.filter.outputs.src == 'true' }}
steps:
- name: Harden Runner
uses: step-security/harden-runner@v2
with:
disable-sudo: true
egress-policy: block
allowed-endpoints: >
api.github.com:443
github.com:443
proxy.golang.org:443
sum.golang.org:443
objects.githubusercontent.com:443
registry-1.docker.io:443
auth.docker.io:443
production.cloudflare.docker.com:443
vuln.go.dev:443
storage.googleapis.com:443
- uses: actions/checkout@v4

- name: Set up Go
uses: actions/setup-go@v5
with:
go-version-file: 'go.mod'
check-latest: true

- name: lint
uses: golangci/golangci-lint-action@v4
with:
version: latest

- name: Nilcheck
run: make nilcheck

- name: Run Gosec Security Scanner
uses: securego/gosec@master
with:
# we let the report trigger content trigger a failure using the GitHub Security features.
args: '-no-fail -fmt sarif -out scan-results.sarif ./...'

- name: Upload SARIF file
uses: github/codeql-action/upload-sarif@v2
with:
# Path to SARIF file relative to the root of the repository
sarif_file: scan-results.sarif

0 comments on commit f58b702

Please sign in to comment.