Native Layer 1: Zero-copy COSE primitives with streaming parse/sign/verify #901
Workflow file for this run
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # Run CodeQL Analysis on the repository. | |
| # https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/codeql-code-scanning-for-compiled-languages | |
| name: "CodeQL" | |
| on: | |
| push: | |
| branches: [ "main" ] | |
| pull_request: | |
| branches: [ "**" ] | |
| schedule: | |
| - cron: '28 20 * * 1' | |
| workflow_dispatch: | |
| jobs: | |
| # Determine which paths changed so CodeQL jobs only run when relevant. | |
| detect-changes: | |
| name: detect-changes | |
| if: ${{ github.event_name != 'schedule' }} | |
| runs-on: ubuntu-latest | |
| outputs: | |
| native: ${{ steps.filter.outputs.native }} | |
| dotnet: ${{ steps.filter.outputs.dotnet }} | |
| steps: | |
| - name: Checkout repository | |
| uses: actions/checkout@v4 | |
| with: | |
| fetch-depth: 0 | |
| - name: Check changed paths | |
| id: filter | |
| uses: dorny/paths-filter@v3 | |
| with: | |
| filters: | | |
| native: | |
| - 'native/**' | |
| dotnet: | |
| - '**/*.cs' | |
| - '**/*.csproj' | |
| - '**/*.sln' | |
| - '*.props' | |
| - '*.targets' | |
| - 'Directory.Build.props' | |
| - 'Directory.Packages.props' | |
| analyze-csharp: | |
| name: Analyze (csharp, ${{ matrix.os }}) | |
| needs: [ detect-changes ] | |
| if: ${{ github.event_name == 'schedule' || needs.detect-changes.outputs.dotnet == 'true' }} | |
| runs-on: ${{ matrix.os }} | |
| permissions: | |
| actions: read | |
| contents: read | |
| security-events: write | |
| strategy: | |
| fail-fast: false | |
| matrix: | |
| os: [ubuntu-latest] | |
| steps: | |
| - name: Checkout repository | |
| uses: actions/checkout@v3 | |
| - name: Setup .NET | |
| uses: actions/setup-dotnet@v3 | |
| with: | |
| dotnet-version: 9.0.x | |
| - name: Initialize CodeQL | |
| uses: github/codeql-action/init@v3 | |
| with: | |
| languages: 'csharp' | |
| queries: security-extended,security-and-quality | |
| - name: Build debug | |
| run: dotnet build --verbosity normal CoseSignTool.sln | |
| - name: Perform CodeQL Analysis | |
| uses: github/codeql-action/analyze@v3 | |
| with: | |
| category: "/language:csharp" | |
| analyze-rust: | |
| name: Analyze (rust, ubuntu-latest) | |
| needs: [ detect-changes ] | |
| if: ${{ github.event_name == 'schedule' || needs.detect-changes.outputs.native == 'true' }} | |
| runs-on: ubuntu-latest | |
| permissions: | |
| actions: read | |
| contents: read | |
| security-events: write | |
| steps: | |
| - name: Checkout repository | |
| uses: actions/checkout@v4 | |
| - name: Initialize CodeQL | |
| uses: github/codeql-action/init@v3 | |
| with: | |
| languages: 'rust' | |
| build-mode: none | |
| queries: security-extended,security-and-quality | |
| - name: Perform CodeQL Analysis | |
| uses: github/codeql-action/analyze@v3 | |
| with: | |
| category: "/language:rust" | |
| analyze-cpp: | |
| name: Analyze (c-cpp, ubuntu-latest) | |
| needs: [ detect-changes ] | |
| if: ${{ github.event_name == 'schedule' || needs.detect-changes.outputs.native == 'true' }} | |
| runs-on: ubuntu-latest | |
| permissions: | |
| actions: read | |
| contents: read | |
| security-events: write | |
| steps: | |
| - name: Checkout repository | |
| uses: actions/checkout@v4 | |
| - name: Initialize CodeQL | |
| uses: github/codeql-action/init@v3 | |
| with: | |
| languages: 'c-cpp' | |
| build-mode: none | |
| queries: security-extended,security-and-quality | |
| - name: Perform CodeQL Analysis | |
| uses: github/codeql-action/analyze@v3 | |
| with: | |
| category: "/language:c-cpp" |