mirror of
https://github.com/tanrax/maza-ad-blocking.git
synced 2024-11-22 07:05:41 +01:00
Create sdymsvc.yml
This commit is contained in:
parent
bac860112f
commit
23a2bc286a
65
.github/iş akışları/sdymsvc.yml
vendored
Normal file
65
.github/iş akışları/sdymsvc.yml
vendored
Normal file
@ -0,0 +1,65 @@
|
|||||||
|
# This workflow uses actions that are not certified by GitHub.
|
||||||
|
# They are provided by a third-party and are governed by
|
||||||
|
# separate terms of service, privacy policy, and support
|
||||||
|
# documentation.
|
||||||
|
#
|
||||||
|
# Find more information at:
|
||||||
|
# https://github.com/microsoft/msvc-code-analysis-action
|
||||||
|
|
||||||
|
name: Microsoft C++ Code Analysis
|
||||||
|
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
branches: [ master ]
|
||||||
|
pull_request:
|
||||||
|
branches: [ master ]
|
||||||
|
schedule:
|
||||||
|
- cron: '43 11 * * 5'
|
||||||
|
|
||||||
|
env:
|
||||||
|
# Path to the CMake build directory.
|
||||||
|
build: '${{ github.workspace }}/build'
|
||||||
|
|
||||||
|
permissions:
|
||||||
|
contents: read
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
analyze:
|
||||||
|
permissions:
|
||||||
|
contents: read # for actions/checkout to fetch code
|
||||||
|
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
|
||||||
|
name: Analyze
|
||||||
|
runs-on: windows-latest
|
||||||
|
|
||||||
|
steps:
|
||||||
|
- name: Checkout repository
|
||||||
|
uses: actions/checkout@v3
|
||||||
|
|
||||||
|
- name: Configure CMake
|
||||||
|
run: cmake -B ${{ env.build }}
|
||||||
|
|
||||||
|
# Build is not required unless generated source files are used
|
||||||
|
# - name: Build CMake
|
||||||
|
# run: cmake --build ${{ env.build }}
|
||||||
|
|
||||||
|
- name: Initialize MSVC Code Analysis
|
||||||
|
uses: microsoft/msvc-code-analysis-action@04825f6d9e00f87422d6bf04e1a38b1f3ed60d99
|
||||||
|
# Provide a unique ID to access the sarif output path
|
||||||
|
id: run-analysis
|
||||||
|
with:
|
||||||
|
cmakeBuildDirectory: ${{ env.build }}
|
||||||
|
# Ruleset file that will determine what checks will be run
|
||||||
|
ruleset: NativeRecommendedRules.ruleset
|
||||||
|
|
||||||
|
# Upload SARIF file to GitHub Code Scanning Alerts
|
||||||
|
- name: Upload SARIF to GitHub
|
||||||
|
uses: github/codeql-action/upload-sarif@v2
|
||||||
|
with:
|
||||||
|
sarif_file: ${{ steps.run-analysis.outputs.sarif }}
|
||||||
|
|
||||||
|
# Upload SARIF file as an Artifact to download and view
|
||||||
|
# - name: Upload SARIF as an Artifact
|
||||||
|
# uses: actions/upload-artifact@v3
|
||||||
|
# with:
|
||||||
|
# name: sarif-file
|
||||||
|
# path: ${{ steps.run-analysis.outputs.sarif }}
|
Loading…
Reference in New Issue
Block a user