-
Notifications
You must be signed in to change notification settings - Fork 0
48 lines (43 loc) · 1.33 KB
/
sonarscan.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
name: SonarCloud Analysis
on:
push:
branches:
- master
pull_request:
branches:
- master
workflow_dispatch:
permissions:
contents: read
env:
SONARSCANNER: 'true'
jobs:
build:
name: SonarCloud Scan
runs-on: ubuntu-latest
if: |
github.event_name != 'pull_request' ||
github.event.pull_request.head.repo.full_name == github.event.pull_request.base.repo.full_name
steps:
- name: Harden Runner
uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
with:
disable-sudo: true
egress-policy: block
allowed-endpoints: >
api.github.com:443
binaries.sonarsource.com:443
github.com:443
npm.pkg.github.com:443
objects.githubusercontent.com:443
registry.npmjs.org:443
api.sonarcloud.io:443
analysis-sensorcache-eu-central-1-prod.s3.amazonaws.com:443
sc-cleancode-sensorcache-eu-central-1-prod.s3.amazonaws.com:443
scanner.sonarcloud.io:443
sonarcloud.io:443
- name: Run SonarCloud analysis
uses: myrotvorets/composite-actions/node-sonarscan@27ab3af18ca12ee3e44e50e015ee74acd199d0dc
with:
sonar-token: ${{ secrets.SONAR_TOKEN }}
test-script: 'test:sonarqube'