diff --git a/.github/workflows/codacy.yml b/.github/workflows/codacy.yml deleted file mode 100644 index 84afee0..0000000 --- a/.github/workflows/codacy.yml +++ /dev/null @@ -1,49 +0,0 @@ -# This workflow uses actions not certified by GitHub. They are provided by a -# third-party and governed by separate terms of service, privacy policy, and -# support documentation. This workflow checks out code, performs a Codacy -# security scan, and integrates the results with GitHub Advanced Security code -# scanning feature. For more info on the Codacy Security Scan action usage and -# parameters, see: https://github.com/codacy/codacy-analysis-cli-action. -# For more info on Codacy Analysis CLI in general, see: -# https://github.com/codacy/codacy-analysis-cli. - -name: Codacy Security Scan - -on: - push: - branches: [ "master" ] - pull_request: - branches: [ "master" ] - schedule: - - cron: '0 21 * * 5' # Runs at 21:00, only on Friday - -jobs: - codacy-security-scan: - permissions: - actions: read - contents: read - security-events: write - name: Codacy Security Scan - runs-on: ubuntu-latest - steps: - - name: Checkout code - uses: actions/checkout@main - - - name: Run Codacy Analysis CLI - uses: codacy/codacy-analysis-cli-action@master - with: - project-token: ${{ secrets.CODACY_PROJECT_TOKEN }} - verbose: true - output: results.sarif - format: sarif - # Adjust severity of non-security issues - gh-code-scanning-compat: true - # Force 0 exit code to allow SARIF file generation - # This will hand over control about PR rejection to the GitHub side - max-allowed-issues: 2147483647 - - # Upload the SARIF file generated in the previous step - - name: Upload SARIF results file - uses: github/codeql-action/upload-sarif@main - with: - sarif_file: results.sarif diff --git a/assets/images/Structure.svg b/assets/images/Structure.svg index 5d60969..4969bec 100644 --- a/assets/images/Structure.svg +++ b/assets/images/Structure.svg @@ -1 +1 @@ - \ No newline at end of file + \ No newline at end of file