1
0
mirror of https://github.com/pi-hole/pi-hole synced 2025-07-21 14:38:09 +00:00

Switch to Differential ShellCheck

Signed-off-by: Christian König <github@yubiuser.dev>
This commit is contained in:
Christian König 2025-04-07 11:47:40 +02:00
parent 23fc53c618
commit 135b0cce14
No known key found for this signature in database

View File

@ -16,9 +16,13 @@ jobs:
smoke-tests: smoke-tests:
if: github.event.pull_request.draft == false if: github.event.pull_request.draft == false
runs-on: ubuntu-latest runs-on: ubuntu-latest
permissions:
security-events: write # required by Differential ShellCheck
steps: steps:
- name: Checkout repository - name: Checkout repository
uses: actions/checkout@v4.2.2 uses: actions/checkout@v4.2.2
with:
fetch-depth: 0 # Differential ShellCheck requires full git history
- name: Check scripts in repository are executable - name: Check scripts in repository are executable
run: | run: |
@ -28,14 +32,17 @@ jobs:
# If FAIL is 1 then we fail. # If FAIL is 1 then we fail.
[[ $FAIL == 1 ]] && exit 1 || echo "Scripts are executable!" [[ $FAIL == 1 ]] && exit 1 || echo "Scripts are executable!"
- name: Run shellcheck - name: Differential ShellCheck
uses: ludeeus/action-shellcheck@master uses: redhat-plumbers-in-action/differential-shellcheck@v5
with: with:
check_together: 'yes' token: ${{ secrets.GITHUB_TOKEN }}
format: tty
severity: warning - if: ${{ runner.debug == '1' && !cancelled() }}
env: name: Upload artifact with ShellCheck defects in SARIF format
SHELLCHECK_OPTS: -x # Enable shellcheck -x option (follow external sources) uses: actions/upload-artifact@v4
with:
name: Differential ShellCheck SARIF
path: ${{ steps.ShellCheck.outputs.sarif }}
- name: Spell-Checking - name: Spell-Checking
uses: codespell-project/actions-codespell@master uses: codespell-project/actions-codespell@master