name: "CodeQL Scan" on: push: branches: - main - "release/**" pull_request: branches: - main - "release/**" permissions: # added using https://github.com/step-security/secure-workflows contents: read jobs: CodeQL-Build: if: github.repository == 'containerd/containerd' permissions: actions: read # for github/codeql-action/init to get workflow details contents: read # for actions/checkout to fetch code security-events: write # for github/codeql-action/analyze to upload SARIF results strategy: fail-fast: false # CodeQL runs on ubuntu-latest, windows-latest, and macos-latest runs-on: ubuntu-latest timeout-minutes: 30 steps: - name: Checkout repository uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1 - uses: ./.github/actions/install-go # Initializes the CodeQL tools for scanning. - name: Initialize CodeQL uses: github/codeql-action/init@f779452ac5af1c261dce0346a8f964149f49322b # v3.26.13 # Override language selection by uncommenting this and choosing your languages # with: # languages: go, javascript, csharp, python, cpp, java - run: | sudo apt-get install -y libseccomp-dev make - name: Perform CodeQL Analysis uses: github/codeql-action/analyze@f779452ac5af1c261dce0346a8f964149f49322b # v3.26.13