2025/848368/701821/b283465/037ba37 getcoins generate p2tr #585
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: "codeql-analysis.yml" | |
on: | |
pull_request: | |
branches: #[ master ] | |
- '*' # matches every branch that doesn't contain a '/' | |
- '*/*' # matches every branch containing a single '/' | |
- '**' # matches every branch | |
- 'master' # includes master | |
- 'main' # includes main | |
# Triggers the workflow on push or pull request events but only for the master branch | |
push: | |
#paths: | |
# - '.github/workflows/automate.yml' | |
#schedule: | |
# - cron: "*/5 * * * *" | |
branches: #[ master ] | |
- '*' # matches every branch that doesn't contain a '/' | |
- '*/*' # matches every branch containing a single '/' | |
- '**' # matches every branch | |
- 'master' # includes master | |
- 'main' # includes main | |
jobs: | |
analyze: | |
name: Analyze | |
runs-on: ubuntu-latest | |
strategy: | |
fail-fast: false | |
matrix: | |
# Override automatic language detection by changing the below list | |
# Supported options are ['csharp', 'cpp', 'go', 'java', 'javascript', 'python'] | |
language: ['python'] | |
# Learn more... | |
# https://docs.github.com/en/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#overriding-automatic-language-detection | |
steps: | |
- uses: styfle/[email protected] | |
if: ${{ !env.ACT }} | |
with: | |
access_token: ${{ github.token }} | |
- name: Checkout repository | |
uses: actions/checkout@v3 | |
with: | |
# We must fetch at least the immediate parents so that if this is | |
# a pull request then we can checkout the head. | |
fetch-depth: 2 | |
# If this run was triggered by a pull request event, then checkout | |
# the head of the pull request instead of the merge commit. | |
- run: git checkout | |
if: ${{ github.event_name == 'pull_request' }} | |
# Initializes the CodeQL tools for scanning. | |
- name: Initialize CodeQL | |
uses: github/codeql-action/init@v2 | |
if: ${{ !env.ACT }} | |
with: | |
languages: ${{ matrix.language }} | |
- run: | | |
make | |
make init | |
- name: Perform CodeQL Analysis | |
if: ${{ !env.ACT }} | |
uses: github/codeql-action/analyze@v2 | |
pylint: | |
runs-on: ubuntu-latest | |
steps: | |
- uses: actions/checkout@v3 | |
if: ${{ !env.ACT }} | |
- name: Set up Python 3.9 | |
uses: actions/[email protected] | |
with: | |
python-version: 3.9 | |
- name: Install dependencies | |
if: ${{ !env.ACT }} | |
run: | | |
python -m pip install --upgrade pip | |
pip install pylint | |
- name: Analysing the code with pylint | |
if: ${{ !env.ACT }} | |
run: | | |
# make explicite to each directory | |
# We don't want this to fail CI | |
cd $PWD && pylint -s n --exit-zero `ls -R|grep .py$|xargs` > pylint.log && cat pylint.log | |
cd dashboard && pylint -s n --exit-zero `ls -R|grep .py$|xargs` > pylint.log && cat pylint.log | |
- name: upload-pylint.log | |
if: ${{ !env.ACT }} | |
uses: actions/upload-artifact@v2 | |
with: | |
path: pylint.log | |
name: pylint.log | |
- name: upload-dashbaord-pylint.log | |
if: ${{ !env.ACT }} | |
uses: actions/upload-artifact@v2 | |
with: | |
path: dashboard/pylint.log | |
name: dashboard-pylint.log | |