Skip to content

chore: update readme #16

chore: update readme

chore: update readme #16

Workflow file for this run

on:
push:
name: Go Build and Test
jobs:
golangci:
name: golangci
runs-on: ubuntu-latest
steps:
- name: Checkout code
uses: actions/checkout@v4
- name: golangci-lint
uses: golangci/golangci-lint-action@v4
test:
name: Go Test with Coverage
runs-on: ubuntu-latest
steps:
- name: Set up Go
uses: actions/setup-go@v5
with:
go-version: '1.21'
- name: Checkout code
uses: actions/checkout@v4
- name: Install dependencies
run: go mod download
- name: Run Unit tests
run: go test -race -covermode atomic -coverprofile=covprofile ./...
- name: Send coverage
uses: shogo82148/actions-goveralls@v1
with:
path-to-profile: covprofile
build:
name: Build
runs-on: ubuntu-latest
steps:
- name: Set up Go
uses: actions/setup-go@v5
with:
go-version: '1.21'
- name: Checkout code
uses: actions/checkout@v4
- name: go build
run: go build
lint:
name: Lint and fmt
runs-on: ubuntu-latest
steps:
- name: Set up Go
uses: actions/setup-go@v5
with:
go-version: '1.21'
- name: Install golint
run: GO111MODULE=off go get golang.org/x/lint/golint
- name: Checkout code
uses: actions/checkout@v4
- name: run golint and go fmt
run: ./cicd/fmtlint.sh
sca-scan:
name: Trivy Software Composition Analysis
runs-on: ubuntu-latest
steps:
- name: Set up Go
uses: actions/setup-go@v5
with:
go-version: '1.21'
- name: Install golint
run: GO111MODULE=off go get golang.org/x/lint/golint
- name: Checkout code
uses: actions/checkout@v4
- name: Run Trivy vulnerability scanner in repo mode
uses: aquasecurity/trivy-action@master
with:
scan-type: 'fs'
ignore-unfixed: true
format: 'sarif'
output: 'trivy-results.sarif'
severity: 'CRITICAL,HIGH'
- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: 'trivy-results.sarif'