Skip to content

Make the Runtime roll forward if the user uses this runtime when targeting .NET 9. #718

Make the Runtime roll forward if the user uses this runtime when targeting .NET 9.

Make the Runtime roll forward if the user uses this runtime when targeting .NET 9. #718

Workflow file for this run

# This workflow checks out code, performs a Codacy security scan
# and integrates the results with the
# GitHub Advanced Security code scanning feature. For more information on
# the Codacy security scan action usage and parameters, see
# https://github.com/codacy/codacy-analysis-cli-action.
# For more information on Codacy Analysis CLI in general, see
# https://github.com/codacy/codacy-analysis-cli.
name: Codacy Security Scan
on:
push:
branches: [ main ]
pull_request:
branches: [ main ]
jobs:
codacy-security-scan:
name: Codacy Security Scan
runs-on: ubuntu-latest
env:
DOTNET_SKIP_FIRST_TIME_EXPERIENCE: true
DOTNET_CLI_TELEMETRY_OPTOUT: true
DOTNET_NOLOGO: true
BUILD_RERUN_COUNT: ${{ github.run_attempt }}
steps:
# Checkout the repository to the GitHub Actions runner
- name: Checkout code
uses: actions/checkout@main
- name: Install latest .NET SDK
uses: Elskom/setup-latest-dotnet@main
with:
SDK_VERSION: '8.0.100'
RUNTIME_VERSIONS: ''
- name: Restore and Build
uses: Elskom/build-dotnet@main
with:
RESTORE: false
PACK: false
# Execute Codacy Analysis CLI and generate a SARIF output with the security issues identified during the analysis
- name: Run Codacy Analysis CLI
uses: codacy/codacy-analysis-cli-action@master
with:
api-token: ${{ secrets.CODACY_API_TOKEN }}
verbose: true
output: results.sarif
format: sarif
# Adjust severity of non-security issues
gh-code-scanning-compat: true
# Force 0 exit code to allow SARIF file generation
# This will handover control about PR rejection to the GitHub side
max-allowed-issues: 2147483647
# Upload the SARIF file generated in the previous step
- name: Upload SARIF results file
uses: github/codeql-action/upload-sarif@main
with:
sarif_file: results.sarif