github.com/ronaksoft/rony@v0.16.26-0.20230807065236-1743dbfe6959/.github/workflows/codacy-analysis.yml (about)

     1  # This workflow checks out code, performs a Codacy security scan
     2  # and integrates the results with the
     3  # GitHub Advanced Security code scanning feature.  For more information on
     4  # the Codacy security scan action usage and parameters, see
     5  # https://github.com/codacy/codacy-analysis-cli-action.
     6  # For more information on Codacy Analysis CLI in general, see
     7  # https://github.com/codacy/codacy-analysis-cli.
     8  
     9  name: Codacy Security Scan
    10  
    11  on:
    12    push:
    13      tags: [ v* ]
    14    schedule:
    15      - cron: '26 11 * * 4'
    16  
    17  jobs:
    18    codacy-security-scan:
    19      name: Codacy Security Scan
    20      runs-on: ubuntu-latest
    21      steps:
    22        # Checkout the repository to the GitHub Actions runner
    23        - name: Checkout code
    24          uses: actions/checkout@v2
    25  
    26        # Execute Codacy Analysis CLI and generate a SARIF output with the security issues identified during the analysis
    27        - name: Run Codacy Analysis CLI
    28          uses: codacy/codacy-analysis-cli-action@1.1.0
    29          with:
    30            # Check https://github.com/codacy/codacy-analysis-cli#project-token to get your project token from your Codacy repository
    31            # You can also omit the token and run the tools that support default configurations
    32            project-token: ${{ secrets.CODACY_PROJECT_TOKEN }}
    33            verbose: true
    34            output: results.sarif
    35            format: sarif
    36            # Adjust severity of non-security issues
    37            gh-code-scanning-compat: true
    38            # Force 0 exit code to allow SARIF file generation
    39            # This will handover control about PR rejection to the GitHub side
    40            max-allowed-issues: 2147483647
    41  
    42        # Upload the SARIF file generated in the previous step
    43        - name: Upload SARIF results file
    44          uses: github/codeql-action/upload-sarif@v1
    45          with:
    46            sarif_file: results.sarif