Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit 39c909b

Browse files
author
egberts
committed
2 parents b03cd3c + 9df61ee commit 39c909b

File tree

2 files changed

+61
-1
lines changed

2 files changed

+61
-1
lines changed

‎.github/workflows/codacy.yml‎

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
# This workflow uses actions that are not certified by GitHub.
2+
# They are provided by a third-party and are governed by
3+
# separate terms of service, privacy policy, and support
4+
# documentation.
5+
6+
# This workflow checks out code, performs a Codacy security scan
7+
# and integrates the results with the
8+
# GitHub Advanced Security code scanning feature. For more information on
9+
# the Codacy security scan action usage and parameters, see
10+
# https://github.com/codacy/codacy-analysis-cli-action.
11+
# For more information on Codacy Analysis CLI in general, see
12+
# https://github.com/codacy/codacy-analysis-cli.
13+
14+
name: Codacy Security Scan
15+
16+
on:
17+
push:
18+
branches: [ master ]
19+
pull_request:
20+
# The branches below must be a subset of the branches above
21+
branches: [ master ]
22+
schedule:
23+
- cron: '34 1 * * 4'
24+
25+
permissions:
26+
contents: read
27+
28+
jobs:
29+
codacy-security-scan:
30+
permissions:
31+
contents: read # for actions/checkout to fetch code
32+
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
33+
name: Codacy Security Scan
34+
runs-on: ubuntu-latest
35+
steps:
36+
# Checkout the repository to the GitHub Actions runner
37+
- name: Checkout code
38+
uses: actions/checkout@v2
39+
40+
# Execute Codacy Analysis CLI and generate a SARIF output with the security issues identified during the analysis
41+
- name: Run Codacy Analysis CLI
42+
uses: codacy/codacy-analysis-cli-action@d840f886c4bd4edc059706d09c6a1586111c540b
43+
with:
44+
# Check https://github.com/codacy/codacy-analysis-cli#project-token to get your project token from your Codacy repository
45+
# You can also omit the token and run the tools that support default configurations
46+
project-token: ${{ secrets.CODACY_PROJECT_TOKEN }}
47+
verbose: true
48+
output: results.sarif
49+
format: sarif
50+
# Adjust severity of non-security issues
51+
gh-code-scanning-compat: true
52+
# Force 0 exit code to allow SARIF file generation
53+
# This will handover control about PR rejection to the GitHub side
54+
max-allowed-issues: 2147483647
55+
56+
# Upload the SARIF file generated in the previous step
57+
- name: Upload SARIF results file
58+
uses: github/codeql-action/upload-sarif@v1
59+
with:
60+
sarif_file: results.sarif

‎README.md‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -248,6 +248,6 @@ assert_keyvalue_get([Gateway]Hidden_DNS_Master2=): failed # // inside RHS double
248248
actual : '"78.78.78.78//" // inline '/' '/' RHS double-quote'
249249
```
250250

251-
251+
Oh, please disregard the `failed` at the last line for I have filed [`Issue 1`](https://github.com/egberts/bash-ini-file/issues/1).
252252

253253

0 commit comments

Comments
(0)

AltStyle によって変換されたページ (->オリジナル) /