Use WaitForLocalNodeReady in gateway main #874
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- | |
name: Reporting | |
on: | |
push: | |
branches: | |
- release-0.18 | |
- release-* | |
permissions: {} | |
jobs: | |
unit-coverage: | |
name: Go Unit Test Coverage | |
if: github.repository_owner == 'submariner-io' | |
runs-on: ubuntu-latest | |
steps: | |
- name: Check out the repository | |
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 | |
with: | |
fetch-depth: 0 | |
- name: Run Go unit tests | |
run: make unit | |
- name: Run SonarScan, upload Go test results and coverage | |
uses: sonarsource/sonarcloud-github-action@383f7e52eae3ab0510c3cb0e7d9d150bbaeab838 | |
env: | |
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} | |
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }} | |
variant-analysis: | |
name: Variant Analysis | |
runs-on: ubuntu-latest | |
permissions: | |
security-events: write | |
steps: | |
- name: Check out the repository | |
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 | |
- name: Initialize CodeQL | |
uses: github/codeql-action/init@662472033e021d55d94146f66f6058822b0b39fd | |
with: | |
languages: go | |
- name: Run CodeQL variant analysis | |
uses: github/codeql-action/analyze@662472033e021d55d94146f66f6058822b0b39fd | |
- name: Show CodeQL scan SARIF report | |
if: always() | |
run: cat ../results/go.sarif | |
vulnerability-scan: | |
name: Vulnerability Scanning | |
if: github.repository_owner == 'submariner-io' | |
runs-on: ubuntu-latest | |
permissions: | |
security-events: write | |
steps: | |
- name: Check out the repository | |
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 | |
- name: Run Anchore vulnerability scanner | |
uses: anchore/scan-action@5ed195cc06065322983cae4bb31e2a751feb86fd | |
id: scan | |
with: | |
path: "." | |
fail-build: false | |
- name: Show Anchore scan SARIF report | |
run: cat ${{ steps.scan.outputs.sarif }} | |
- name: Upload Anchore scan SARIF report | |
uses: github/codeql-action/upload-sarif@662472033e021d55d94146f66f6058822b0b39fd | |
with: | |
sarif_file: ${{ steps.scan.outputs.sarif }} |