Skip to content

Commit

Permalink
PR: Add workflow to notify vulnerabilities.
Browse files Browse the repository at this point in the history
This action should fail as we use GoLang v1.19 which does have
vulnerabilities, In the following commits the version will be bumped
and then this action should show no vulnerabilities.
  • Loading branch information
shahzadlone committed Jul 22, 2023
1 parent bc8ada9 commit 396dd34
Showing 1 changed file with 55 additions and 0 deletions.
55 changes: 55 additions & 0 deletions .github/workflows/check-vulnerabilities.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,55 @@
# Copyright 2023 Democratized Data Foundation
#
# Use of this software is governed by the Business Source License
# included in the file licenses/BSL.txt.
#
# As of the Change Date specified in that file, in accordance with
# the Business Source License, use of this software will be governed
# by the Apache License, Version 2.0, included in the file
# licenses/APL.txt.

name: Check Vulnerabilities Workflow

on:
pull_request:
branches:
- master
- develop

push:
tags:
- 'v[0-9]+.[0-9]+.[0-9]+'
branches:
- master
- develop

jobs:
check-vulnerabilities:
name: Check vulnerabilities job

runs-on: ubuntu-latest

steps:
- name: Checkout code into the directory
uses: actions/checkout@v3

- name: Setup Go environment explicitly
uses: actions/setup-go@v3
with:
go-version: "1.19"
check-latest: false

- name: Install govulncheck
run: go install golang.org/x/vuln/cmd/govulncheck@latest

- name: Run govulncheck
run: govulncheck ./...

# NOTE: Tried using the official action below but is unreliable.
# - name: Run govulncheck
# uses: golang/govulncheck-action@v1
# with:
# go-version-input: 1.19
# go-package: ./...
# check-latest: true
# cache: false

0 comments on commit 396dd34

Please sign in to comment.