From e890c4048eef9dcc9f07801efa3963b097afd1b2 Mon Sep 17 00:00:00 2001 From: codacybeta <69454490+codacybeta@users.noreply.github.com> Date: Fri, 18 Sep 2020 22:10:12 +0100 Subject: [PATCH 1/3] Create codacy-security-scan.yml --- .github/workflows/codacy-security-scan.yml | 44 ++++++++++++++++++++++ 1 file changed, 44 insertions(+) create mode 100644 .github/workflows/codacy-security-scan.yml diff --git a/.github/workflows/codacy-security-scan.yml b/.github/workflows/codacy-security-scan.yml new file mode 100644 index 0000000..675bf7d --- /dev/null +++ b/.github/workflows/codacy-security-scan.yml @@ -0,0 +1,44 @@ +# This workflow checks out code, performs a Codacy security scan +# and integrates the results with +# GitHub Advanced Security code scanning feature. For more information on +# the Codacy security scan action usage and parameters, see +# https://github.com/codacy/codacy-analysis-cli/tree/master#github-action. +# For more information on Codacy analysis cli in general, see +# https://github.com/codacy/codacy-analysis-cli. + +name: Codacy Security Scan + +on: + push: + - branches: [master, main] + pull_request: + - branches: [master, main] + +jobs: + codacy-security-scan: + name: Codacy Security Scan + runs-on: ubuntu-latest + steps: + # Checkout the repository to the GitHub Actions runner + - name: Checkout code + uses: actions/checkout@v2 + + # Execute Codacy Analysis CLI and generate a sarif output with the security issues identified during the analysis + - name: Run Codacy Analysis CLI + uses: codacy/codacy-analysis-cli-action@1.0.0 + with: + # Check https://github.com/codacy/codacy-analysis-cli#project-token to get your project token from your Codacy repository + # You can also ommit the token and run with the tools that support default configurations + project-token: ${{ secrets.CODACY_PROJECT_TOKEN }} + verbose: true + output: results.sarif + format: sarif + # Force 0 exit code to allow sarif file generation + # This will pass control about PR rejection to GitHub side + max-allowed-issues: 2147483647 + + # Upload the sarif file generated in the previous step + - name: Upload sarif results file + uses: github/codeql-action/upload-sarif@v1 + with: + sarif_file: results.sarif From 8e2038764401e56c6f0b9348a89de7b02dc6e9f3 Mon Sep 17 00:00:00 2001 From: codacybeta <69454490+codacybeta@users.noreply.github.com> Date: Fri, 18 Sep 2020 22:12:12 +0100 Subject: [PATCH 2/3] Update codacy-security-scan.yml --- .github/workflows/codacy-security-scan.yml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/.github/workflows/codacy-security-scan.yml b/.github/workflows/codacy-security-scan.yml index 675bf7d..555ea03 100644 --- a/.github/workflows/codacy-security-scan.yml +++ b/.github/workflows/codacy-security-scan.yml @@ -10,9 +10,9 @@ name: Codacy Security Scan on: push: - - branches: [master, main] + branches: [ "master", "main" ] pull_request: - - branches: [master, main] + branches: [ "master", "main" ] jobs: codacy-security-scan: From a2fa707ab5bc17d25dd9b308669d8a749207293f Mon Sep 17 00:00:00 2001 From: codacybeta <69454490+codacybeta@users.noreply.github.com> Date: Fri, 18 Sep 2020 22:13:42 +0100 Subject: [PATCH 3/3] Create Cenas.scala --- Cenas.scala | 3 +++ 1 file changed, 3 insertions(+) create mode 100644 Cenas.scala diff --git a/Cenas.scala b/Cenas.scala new file mode 100644 index 0000000..5b8763c --- /dev/null +++ b/Cenas.scala @@ -0,0 +1,3 @@ +object Cenas { + val digestInstance = MessageDigest.getInstance("MD5"); +}