Skip to content

feat: CSE-based bootstrapping with bootstrapping client mode (#527) #594

feat: CSE-based bootstrapping with bootstrapping client mode (#527)

feat: CSE-based bootstrapping with bootstrapping client mode (#527) #594

name: "CodeQL"
on:
push:
branches: [main]
schedule:
- cron: '0 12 * * *'
permissions:
contents: read
jobs:
analyze:
if: github.repository == 'Azure/karpenter-provider-azure'
name: Analyze
runs-on: ubuntu-latest
permissions:
actions: read
contents: read
security-events: write
strategy:
fail-fast: false
matrix:
language: [ 'go' ]
steps:
- name: Harden Runner
uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
with:
disable-telemetry: true
egress-policy: block
allowed-endpoints: >
api.github.com:443
dc.services.visualstudio.com:443
github.com:443
login.microsoftonline.com:443
objects.githubusercontent.com:443
proxy.golang.org:443
raw.githubusercontent.com:443
storage.googleapis.com:443
sum.golang.org:443
uploads.github.com:443
vuln.go.dev:443
- uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1
- uses: ./.github/actions/install-deps
- run: make vulncheck
- uses: github/codeql-action/init@f779452ac5af1c261dce0346a8f964149f49322b # v3.26.13
with:
languages: ${{ matrix.language }}
- uses: github/codeql-action/autobuild@f779452ac5af1c261dce0346a8f964149f49322b # v3.26.13
- uses: github/codeql-action/analyze@f779452ac5af1c261dce0346a8f964149f49322b # v3.26.13