From fb4eca99591da092a62832432dfa6e8da376a129 Mon Sep 17 00:00:00 2001 From: ale5000 <15793015+ale5000-git@users.noreply.github.com> Date: Tue, 30 Jul 2024 18:49:53 +0200 Subject: [PATCH] Update code-linting.yml --- .github/workflows/code-linting.yml | 56 ------------------------------ 1 file changed, 56 deletions(-) diff --git a/.github/workflows/code-linting.yml b/.github/workflows/code-linting.yml index 383ae4fe..b6978bac 100644 --- a/.github/workflows/code-linting.yml +++ b/.github/workflows/code-linting.yml @@ -34,59 +34,3 @@ jobs: uses: GrantBirki/json-yaml-validate@v3 with: json_exclude_regex: "^\\.vscode/tasks\\.json$" - - codacy: - name: "Codacy" - if: "${{ github.event_name != 'pull_request' && github.repository_owner == 'micro5k' }}" - runs-on: ubuntu-latest - permissions: - security-events: write - - steps: - - name: "Check out code" - uses: actions/checkout@v4 - - name: "Run Codacy analysis" - uses: codacy/codacy-analysis-cli-action@v4 - with: - # Check https://github.com/codacy/codacy-analysis-cli#project-token to get your project token from your Codacy repository - # You can also omit the token and run the tools that support default configurations - # project-token: ${{ secrets.CODACY_PROJECT_TOKEN }} - verbose: true - output: results.sarif - format: sarif - # Adjust severity of non-security issues - gh-code-scanning-compat: true - # Force 0 exit code to allow SARIF file generation - # This will hand over control about PR rejection to the GitHub side - max-allowed-issues: 2147483647 - upload: false - - name: "Upload SARIF results file" - uses: github/codeql-action/upload-sarif@v3 - with: - sarif_file: "results.sarif" - category: "Codacy" - - sonarcloud: - name: "SonarCloud" - if: "${{ github.event_name != 'pull_request' && github.repository_owner == 'micro5k' }}" - runs-on: ubuntu-latest - - steps: - - name: "Check out code" - uses: actions/checkout@v4 - with: - fetch-depth: "0" - - name: "Remove build.gradle" - shell: bash - run: | - # Removing build.gradle... - rm -f build.gradle - - name: "Run SonarCloud scan" - uses: SonarSource/sonarcloud-github-action@v2 - env: - GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} # Needed to get PR information, if any - SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }} - # with: - # args: > - # -Dsonar.exclusions=build.gradle - # -Dsonar.verbose=true