diff --git a/.github/workflows/codacy.yml b/.github/workflows/codacy.yml index 72952cf5..f1bd768b 100644 --- a/.github/workflows/codacy.yml +++ b/.github/workflows/codacy.yml @@ -11,9 +11,9 @@ # For more information on Codacy Analysis CLI in general, see # https://github.com/codacy/codacy-analysis-cli. -name: Codacy Security Scan +#name: Codacy Security Scan -on: +#on: push: branches: [ "develop" ] pull_request: @@ -22,40 +22,40 @@ on: schedule: - cron: '15 18 * * 4' -permissions: - contents: read +#permissions: +# contents: read -jobs: - codacy-security-scan: - permissions: - contents: read # for actions/checkout to fetch code - security-events: write # for github/codeql-action/upload-sarif to upload SARIF results - actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status - name: Codacy Security Scan - runs-on: ubuntu-latest - steps: +#jobs: + #codacy-security-scan: + # permissions: + # contents: read # for actions/checkout to fetch code + # security-events: write # for github/codeql-action/upload-sarif to upload SARIF results + # actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status + # name: Codacy Security Scan + # runs-on: ubuntu-latest + # steps: # Checkout the repository to the GitHub Actions runner - - name: Checkout code - uses: actions/checkout@v3 + # - name: Checkout code + # uses: actions/checkout@v3 # Execute Codacy Analysis CLI and generate a SARIF output with the security issues identified during the analysis - - name: Run Codacy Analysis CLI - uses: codacy/codacy-analysis-cli-action@d840f886c4bd4edc059706d09c6a1586111c540b + # - name: Run Codacy Analysis CLI + # uses: codacy/codacy-analysis-cli-action@d840f886c4bd4edc059706d09c6a1586111c540b with: # Check https://github.com/codacy/codacy-analysis-cli#project-token to get your project token from your Codacy repository # You can also omit the token and run the tools that support default configurations project-token: ${{ secrets.CODACY_PROJECT_TOKEN }} - verbose: true - output: results.sarif - format: sarif + # verbose: true + # output: results.sarif + # format: sarif # Adjust severity of non-security issues - gh-code-scanning-compat: true + # gh-code-scanning-compat: true # Force 0 exit code to allow SARIF file generation # This will handover control about PR rejection to the GitHub side - max-allowed-issues: 2147483647 + # max-allowed-issues: 2147483647 # Upload the SARIF file generated in the previous step - - name: Upload SARIF results file - uses: github/codeql-action/upload-sarif@v2 - with: - sarif_file: results.sarif + # - name: Upload SARIF results file + # uses: github/codeql-action/upload-sarif@v2 + # with: + # sarif_file: results.sarif