diff --git a/.github/workflows/codeql-analysis.yml b/.github/workflows/codeql-analysis.yml new file mode 100644 index 0000000000..e2a31a4a04 --- /dev/null +++ b/.github/workflows/codeql-analysis.yml @@ -0,0 +1,40 @@ +#name: "CodeQL" +# +#on: +# push: +# branches: [main] +# pull_request: +# branches: [main] +# schedule: +# - cron: '0 21 * * 0' +# +#jobs: +# analyze: +# name: Analyze +# runs-on: ubuntu-latest +# +# strategy: +# fail-fast: false +# matrix: +# # Override automatic language detection by changing the below list +# # Supported options are ['csharp', 'cpp', 'go', 'java', 'javascript', 'python'] +# language: ['javascript'] +# # Learn more... +# # https://docs.github.com/en/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#overriding-automatic-language-detection +# +# steps: +# - name: Checkout repository +# uses: actions/checkout@v2 +# +# # Initializes the CodeQL tools for scanning. +# - name: Initialize CodeQL +# uses: github/codeql-action/init@v1 +# with: +# languages: ${{ matrix.language }} +# # If you wish to specify custom queries, you can do so here or in a config file. +# # By default, queries listed here will override any specified in a config file. +# # Prefix the list here with "+" to use these queries and those in the config file. +# # queries: ./path/to/local/query, your-org/your-repo/queries@main +# +# - name: Perform CodeQL Analysis +# uses: github/codeql-action/analyze@v1 diff --git a/.github/workflows/test.yml b/.github/workflows/test.yml index 214edaefa8..2fc1fb0c25 100644 --- a/.github/workflows/test.yml +++ b/.github/workflows/test.yml @@ -16,3 +16,9 @@ jobs: run: npm run lint - name: Run tests run: npm run test + - name: Report Coverage + if: ${{ github.event_name == 'pull_request' }} + uses: romeovs/lcov-reporter-action@v0.2.11 + with: + github-token: ${{ secrets.GITHUB_TOKEN }} + lcov-file: ./coverage/lcov.info \ No newline at end of file