Skip to content

build(deps): bump build.buf.gen:permifyco_permify_protocolbuffers_java from 28.2.0.1.20240916080212.d596bd7e4184 to 28.2.0.1.20240930153438.5bdb051ac145 in /sdk/java/grpc #3575

build(deps): bump build.buf.gen:permifyco_permify_protocolbuffers_java from 28.2.0.1.20240916080212.d596bd7e4184 to 28.2.0.1.20240930153438.5bdb051ac145 in /sdk/java/grpc

build(deps): bump build.buf.gen:permifyco_permify_protocolbuffers_java from 28.2.0.1.20240916080212.d596bd7e4184 to 28.2.0.1.20240930153438.5bdb051ac145 in /sdk/java/grpc #3575

Workflow file for this run

name: "CodeQL"
on:
push:
branches: [ "master" ]
pull_request:
branches: [ "master" ]
schedule:
- cron: '30 18 * * 2'
permissions:
contents: read
jobs:
analyze:
name: Analyze
runs-on: ubuntu-latest
permissions:
actions: read
contents: read
security-events: write
strategy:
fail-fast: false
matrix:
language: [ 'go' ]
steps:
- name: Harden Runner
uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
with:
egress-policy: audit
- name: Checkout repository
uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
- name: Initialize CodeQL
uses: github/codeql-action/init@461ef6c76dfe95d5c364de2f431ddbd31a417628 # v3.26.9
with:
languages: go
- name: Build the project
run: make build
- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@461ef6c76dfe95d5c364de2f431ddbd31a417628 # v3.26.9
with:
category: "/language:go"