-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Accept command line arguments instead of environment variables #396
Comments
Thank you for writing this down. I'll have a look and implement argument parsing. |
I took a quick look at the Upd: |
The The logic you are proposing seems like it could work the same way. I'll try to create a draft by Friday. |
By the way, it is nice to see someone so passionate about the Differential ShellCheck project. I'm just curious what is your motivation :) If you are a user who wants to implement some specific features or you just like the idea of running Differential ShellCheck scans. |
We usually used Jenkins for linting but upon the growth of our team we found out that it was not convenient for all the members and that's why could not be enforced to be used. We started looking into actions and wanted to implement a whitelisted list of files that should not take part in the quality gates. But then I found out there is the differential-shellcheck (and the fedora-copr/vcs-diff-lint-action) action that fully exceeded our linting expectations and integrated flawlessly with the GH pull requests. I have also heard questions on whether it works with other hosting platforms or could be used as hooks, others find the differential linting cool and exciting too :) I used to contribute to projects I use when I hit a bug or would like to use a feature. But I find differential linting super useful so I would like to contribute as much as I can. |
I was thinking about refactoring action.yaml a little so it's more compatible with an executable
|
Both differential-shellcheck and vcs-diff-lint-action internally use
This is nice, thank you for sharing. :-)
This is great. I appreciate your contribution and your suggestions they are very valuable. I'm trying to be as responsive as possible, but sometimes it could take me a few days to reply to PRs or Issues since I also have other responsibilities in Red Hat, and this is my sort of personal project. |
I haven't tested your suggestion yet, but it certainly seems possible. I'm just afraid that this might break something since the logic in |
Type of issue
Feature Request
Description
Relates to #179
For local use cli args should be accepted.
Describe the solution you'd like
I think index.sh should handle all the scm parameters, pass other
-*
parameters to shellcheck, and the rest are filenames after--
-pre-commit
passes file names to the hook. If the file names are not passed - scan all the files based on INPUT_TRIGGERING_EVENT, BASE and HEAD. I think INPUT_TRIGGERING_EVENT should remain an env variable for the actions only, and manual should be the default mode for local use.The text was updated successfully, but these errors were encountered: