fix(lmeval): auto-inject cluster CA bundle for HTTPS endpoints; allow re-run after spec change #632
Workflow file for this run
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| --- | |
| name: Tier 1 - Gosec security scan | |
| on: | |
| pull_request: | |
| branches: [main, incubation, stable] | |
| jobs: | |
| gosec: | |
| name: Gosec Security Scanner | |
| runs-on: ubuntu-latest | |
| permissions: | |
| contents: read | |
| security-events: write | |
| actions: read | |
| steps: | |
| - name: Checkout code | |
| uses: actions/checkout@v4 | |
| - name: Set up Go | |
| uses: actions/setup-go@v4 | |
| with: | |
| go-version-file: "go.mod" | |
| - name: Run Gosec Security Scanner | |
| uses: securego/gosec@v2.19.0 | |
| with: | |
| args: '-no-fail -fmt sarif -out gosec-results.sarif ./...' | |
| - name: Upload SARIF file to GitHub Security tab | |
| uses: github/codeql-action/upload-sarif@v3 | |
| if: always() | |
| with: | |
| sarif_file: gosec-results.sarif | |
| category: "gosec-security-scan" | |
| - name: Upload Gosec results as artifact | |
| uses: actions/upload-artifact@v4 | |
| if: always() | |
| with: | |
| name: gosec-results | |
| path: gosec-results.sarif |