| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394 |
- # This workflow uses actions that are not certified by GitHub.
- # They are provided by a third-party and are governed by
- # separate terms of service, privacy policy, and support
- # documentation.
- # This workflow checks out code, performs a Codacy security scan
- # and integrates the results with the
- # GitHub Advanced Security code scanning feature. For more information on
- # the Codacy security scan action usage and parameters, see
- # https://github.com/codacy/codacy-analysis-cli-action.
- # For more information on Codacy Analysis CLI in general, see
- # https://github.com/codacy/codacy-analysis-cli.
- name: Codacy Security Scan
- on:
- push:
- branches: [ "master" ]
- pull_request:
- # The branches below must be a subset of the branches above
- branches: [ "master" ]
- permissions:
- contents: read
- jobs:
- codacy-security-scan:
- permissions:
- contents: read # for actions/checkout to fetch code
- security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
- actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status
- name: Codacy Security Scan
- runs-on: ubuntu-latest
- steps:
- # Checkout the repository to the GitHub Actions runner
- - name: Checkout code
- uses: actions/checkout@v3
- # Execute Codacy Analysis CLI and generate a SARIF output with the security issues identified during the analysis
- - name: Run Codacy Analysis CLI
- uses: codacy/codacy-analysis-cli-action@master
- with:
- # Check https://github.com/codacy/codacy-analysis-cli#project-token to get your project token from your Codacy repository
- # You can also omit the token and run the tools that support default configurations
- project-token: ${{ secrets.CODACY_PROJECT_TOKEN }}
- verbose: true
- output: results.sarif
- format: sarif
- # Adjust severity of non-security issues
- gh-code-scanning-compat: true
- # Force 0 exit code to allow SARIF file generation
- # This will handover control about PR rejection to the GitHub side
- max-allowed-issues: 2147483647
- # Upload the SARIF file generated in the previous step
- - name: Upload SARIF results file
- uses: github/codeql-action/upload-sarif@v2
- with:
- sarif_file: results.sarif
- codacy-coverage-reporter:
- runs-on: ubuntu-latest
- name: codacy-coverage-reporter
- steps:
- - uses: actions/checkout@v3
- - name: Install gtest
- run: |
- mkdir build && cd build
- git clone -b release-1.11.0 --depth=1 https://github.com/google/googletest.git googletest
- cd googletest && mkdir gtest_build && cd gtest_build
- sudo cmake .. && sudo make
- sudo make install
- - name: Install LCOV
- run: |
- sudo apt-get install lcov
- - name: Compile
- if: ${{ success() }}
- shell: bash
- run: |
- gcc --version
- cd build
- cmake -DASAN=ON -DCOVERAGE=ON -DSTRICT_ERROR=ON ..
- make
- - name: Run Testcase
- run: |
- build/bin/Cbox-test
- lcov --directory build --capture --output-file build/test.info
- - name: Run codacy-coverage-reporter
- uses: codacy/codacy-coverage-reporter-action@v1
- with:
- project-token: ${{ secrets.CODACY_PROJECT_TOKEN }}
- coverage-reports: 'build/test.info'
- # or a comma-separated list for multiple reports
- # coverage-reports: <PATH_TO_REPORT>, <PATH_TO_REPORT>
|