Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions .github/workflows/lint-golang.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -70,7 +70,7 @@
elif ${{ inputs.ref != '' }} ; then
echo "trigger by workflow_call"
echo "::set-output name=check::true"
echo "::set-output name=ref::${{ inputs.ref }}"

Check failure on line 73 in .github/workflows/lint-golang.yaml

View check run for this annotation

SonarQubeCloud / SonarCloud Code Analysis

Change this workflow to not use user-controlled data directly in a run block.

See more on https://sonarcloud.io/project/issues?id=weizhoublue_github-action-test&issues=AZr92CD470KUJ9ygCJww&open=AZr92CD470KUJ9ygCJww&pullRequest=661
elif ${{ github.event_name == 'workflow_dispatch' }} ; then
echo "trigger by workflow_dispatch"
echo "::set-output name=check::true"
Expand Down Expand Up @@ -154,11 +154,11 @@
# https://github.com/github/codeql-action
# GitHub's industry-leading semantic code analysis engine, CodeQL, against a repository's source code to find security vulnerabilities
- name: CodeQL Initialize
uses: github/codeql-action/init@v2.1.6
uses: github/codeql-action/init@v4.31.7
with:
languages: go
- name: CodeQL Analysis
uses: github/codeql-action/analyze@v2.1.6
uses: github/codeql-action/analyze@v4.31.7

# https://github.com/praetorian-inc/gokart
# static analysis tool for Go that finds vulnerabilities using the SSA
Expand Down
Loading