Skip to content

Bump golang from 1.22.6 to 1.23.0 in /docker #383

Bump golang from 1.22.6 to 1.23.0 in /docker

Bump golang from 1.22.6 to 1.23.0 in /docker #383

Workflow file for this run

name: Go Build
permissions:
contents: read
on:
push:
branches: ['develop']
pull_request:
branches: ['develop']
paths-ignore:
- '.github/**'
- 'charts/**'
- 'LICENSE'
- 'README.md'
types:
- opened
- ready_for_review
- reopened
- synchronize
jobs:
Setup:
if: github.event.pull_request.draft == false
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- name: Set up Go
uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32 # v5.0.2
with:
go-version: stable
- name: Install Dependencies
run: go mod download
Test:
needs: Setup
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- name: Set up Go
uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32 # v5.0.2
with:
go-version: stable
- name: Test
run: make test
env:
ENVTEST_K8S_VERSION: "1.30"
Build:
needs: Test
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- name: Set up Go
uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32 # v5.0.2
with:
go-version: stable
- name: Build
run: make build
- name: Upload Konfirm
uses: actions/upload-artifact@834a144ee995460fba8ed112a2fc961b36a5ec5a # v4.3.6
with:
name: konfirm
path: bin/konfirm
retention-days: 1
Scan:
needs: Build
runs-on: ubuntu-latest
permissions:
contents: read
security-events: write
actions: read
steps:
- name: Checkout code
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- name: Download Konfirm
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
- name: Scan with Trivy
uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # v0.24.0
with:
scan-type: 'fs'
format: 'sarif'
output: 'trivy-results.sarif'
severity: 'MEDIUM,HIGH,CRITICAL'
- name: Upload scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@0e346f2c4a1b999b44f1ef93fe08bdb83dae63ab # v2.18.1
with:
sarif_file: 'trivy-results.sarif'