Add support for resource syncer to use a shared informer #81
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- | |
name: Reporting | |
on: | |
push: | |
branches: | |
- devel | |
- release-* | |
permissions: {} | |
jobs: | |
unit-coverage: | |
name: Go Unit Test Coverage | |
if: github.repository_owner == 'submariner-io' | |
runs-on: ubuntu-latest | |
steps: | |
- name: Check out the repository | |
uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 | |
with: | |
fetch-depth: 0 | |
- name: Run Go unit tests | |
run: make unit | |
- name: Run SonarScan, upload Go test results and coverage | |
uses: sonarsource/sonarcloud-github-action@49e6cd3b187936a73b8280d59ffd9da69df63ec9 | |
env: | |
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} | |
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }} | |
vulnerability-scan: | |
name: Vulnerability Scanning | |
if: github.repository_owner == 'submariner-io' | |
runs-on: ubuntu-latest | |
permissions: | |
security-events: write | |
steps: | |
- name: Check out the repository | |
uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 | |
- name: Run Anchore vulnerability scanner | |
uses: anchore/scan-action@3343887d815d7b07465f6fdcd395bd66508d486a | |
id: scan | |
with: | |
path: "." | |
fail-build: false | |
- name: Show Anchore scan SARIF report | |
run: cat ${{ steps.scan.outputs.sarif }} | |
- name: Upload Anchore scan SARIF report | |
uses: github/codeql-action/upload-sarif@1b1aada464948af03b950897e5eb522f92603cc2 | |
with: | |
sarif_file: ${{ steps.scan.outputs.sarif }} |