deps: update actions/upload-pages-artifact action to v3 #16118
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Static Analysis | |
on: | |
pull_request: | |
branches: | |
- main | |
push: | |
branches: | |
- main | |
env: | |
GRADLE_OPTS: -Dorg.gradle.daemon=false | |
jobs: | |
commit-lint: | |
runs-on: ubuntu-22.04 | |
steps: | |
- name: Checkout Repository | |
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4 | |
with: | |
fetch-depth: 0 | |
- name: Check Commit Messages | |
uses: wagoid/commitlint-github-action@7f0a61df502599e1f1f50880aaa7ec1e2c0592f2 # v6 | |
with: | |
configFile: .commitlintrc.yml | |
code-base-checks: | |
runs-on: ubuntu-22.04 | |
steps: | |
- name: Checkout Repository | |
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4 | |
- name: Setup Gradle | |
uses: gradle/actions/setup-gradle@d9c87d481d55275bb5441eef3fe0e46805f9ef70 # v3 | |
with: | |
gradle-home-cache-cleanup: true | |
- name: Check copyrights, license headers, and .gitattributes | |
run: ./gradlew checkCopyrightsInNoticeFile checkLicenseHeaders checkGitAttributes | |
detekt-issues: | |
runs-on: ubuntu-22.04 | |
permissions: | |
# Needed for SARIF scanning upload. | |
security-events: write | |
steps: | |
- name: Checkout Repository | |
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4 | |
- name: Setup Gradle | |
uses: gradle/actions/setup-gradle@d9c87d481d55275bb5441eef3fe0e46805f9ef70 # v3 | |
with: | |
gradle-home-cache-cleanup: true | |
- name: Check for Detekt Issues | |
run: ./gradlew detektAll | |
- name: Upload SARIF File | |
uses: github/codeql-action/upload-sarif@2d790406f505036ef40ecba973cc774a50395aac # v3 | |
if: always() # Upload even if the previous step failed. | |
with: | |
sarif_file: build/reports/detekt/merged.sarif | |
markdown-links: | |
runs-on: ubuntu-22.04 | |
steps: | |
- name: Checkout Repository | |
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4 | |
- name: Check Links | |
uses: gaurav-nelson/github-action-markdown-link-check@5c5dfc0ac2e225883c0e5f03a85311ec2830d368 # v1 | |
with: | |
base-branch: main | |
check-modified-files-only: yes | |
max-depth: 2 | |
use-quiet-mode: yes | |
markdownlint: | |
runs-on: ubuntu-22.04 | |
steps: | |
- name: Checkout Repository | |
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4 | |
with: | |
fetch-depth: 0 | |
- name: Setup Node | |
uses: actions/setup-node@1e60f620b9541d16bece96c5465dc8ee9832be0b # v4 | |
- name: Check for Markdown issues | |
run: | | |
npm install -g [email protected] | |
npx markdownlint-cli2 | |
qodana-scan: | |
if: ${{ github.event_name == 'pull_request' }} | |
runs-on: ubuntu-22.04 | |
permissions: | |
# Needed for SARIF scanning upload. | |
security-events: write | |
steps: | |
- name: Checkout Repository | |
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4 | |
with: | |
fetch-depth: 0 | |
- name: Qodana Scan | |
uses: JetBrains/qodana-action@c96b39a84dea25f2a24b38a3f6e89903306d5e2a # v2024.1.8 | |
with: | |
post-pr-comment: false | |
use-caches: false | |
- name: Upload Code Scanning Results | |
uses: github/codeql-action/upload-sarif@2d790406f505036ef40ecba973cc774a50395aac # v3 | |
with: | |
sarif_file: ${{ runner.temp }}/qodana/results/qodana.sarif.json | |
reuse-tool: | |
runs-on: ubuntu-22.04 | |
steps: | |
- name: Checkout Repository | |
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4 | |
- name: Setup Python | |
uses: actions/setup-python@39cd14951b08e74b54015e9e001cdefcf80e669f # v5 | |
with: | |
python-version: "3.10" | |
cache: pip | |
- name: Check REUSE Compliance | |
run: | | |
pip install --user reuse | |
~/.local/bin/reuse lint |