github.com/ronaksoft/rony@v0.16.26-0.20230807065236-1743dbfe6959/.github/workflows/codacy-analysis.yml (about) 1 # This workflow checks out code, performs a Codacy security scan 2 # and integrates the results with the 3 # GitHub Advanced Security code scanning feature. For more information on 4 # the Codacy security scan action usage and parameters, see 5 # https://github.com/codacy/codacy-analysis-cli-action. 6 # For more information on Codacy Analysis CLI in general, see 7 # https://github.com/codacy/codacy-analysis-cli. 8 9 name: Codacy Security Scan 10 11 on: 12 push: 13 tags: [ v* ] 14 schedule: 15 - cron: '26 11 * * 4' 16 17 jobs: 18 codacy-security-scan: 19 name: Codacy Security Scan 20 runs-on: ubuntu-latest 21 steps: 22 # Checkout the repository to the GitHub Actions runner 23 - name: Checkout code 24 uses: actions/checkout@v2 25 26 # Execute Codacy Analysis CLI and generate a SARIF output with the security issues identified during the analysis 27 - name: Run Codacy Analysis CLI 28 uses: codacy/codacy-analysis-cli-action@1.1.0 29 with: 30 # Check https://github.com/codacy/codacy-analysis-cli#project-token to get your project token from your Codacy repository 31 # You can also omit the token and run the tools that support default configurations 32 project-token: ${{ secrets.CODACY_PROJECT_TOKEN }} 33 verbose: true 34 output: results.sarif 35 format: sarif 36 # Adjust severity of non-security issues 37 gh-code-scanning-compat: true 38 # Force 0 exit code to allow SARIF file generation 39 # This will handover control about PR rejection to the GitHub side 40 max-allowed-issues: 2147483647 41 42 # Upload the SARIF file generated in the previous step 43 - name: Upload SARIF results file 44 uses: github/codeql-action/upload-sarif@v1 45 with: 46 sarif_file: results.sarif