diff --git a/README.md b/README.md index 6dd2af0..8215e13 100644 --- a/README.md +++ b/README.md @@ -4,6 +4,7 @@ ![CI](https://github.com/scanoss/code-scan-action/actions/workflows/ci.yml/badge.svg) [![Check dist/](https://github.com/scanoss/code-scan-action/actions/workflows/check-dist.yml/badge.svg)](https://github.com/scanoss/scanoss-code-scan-step/actions/workflows/check-dist.yml) [![CodeQL](https://github.com/scanoss/code-scan-action/actions/workflows/codeql-analysis.yml/badge.svg)](https://github.com/scanoss/scanoss-code-scan-step/actions/workflows/codeql-analysis.yml) +![Coverage](./badges/coverage.svg) The SCANOSS Code Scan Action enhances your software development process by automatically scanning your code for security vulnerabilities and license compliance with configurable policies. @@ -43,7 +44,7 @@ jobs: - name: Run SCANOSS Code Scan id: scanoss-code-scan-step - uses: scanoss/code-scan-action@main + uses: scanoss/code-scan-action@v0 ``` For example workflow runs, check out our @@ -117,7 +118,7 @@ jobs: - name: Run SCANOSS Code Scan id: scanoss-code-scan-step - uses: scanoss/code-scan-action@main + uses: scanoss/code-scan-action@v0 with: policies: copyleft, undeclared #NOTE: undeclared policy requires a sbom.json in the project root dependencies.enabled: true diff --git a/__tests__/main.test.ts b/__tests__/main.test.ts index fc88eeb..c1df51e 100644 --- a/__tests__/main.test.ts +++ b/__tests__/main.test.ts @@ -16,8 +16,8 @@ const runMock = jest.spyOn(main, 'run'); let debugMock: jest.SpyInstance; let errorMock: jest.SpyInstance; let getInputMock: jest.SpyInstance; -let setFailedMock: jest.SpyInstance; -let setOutputMock: jest.SpyInstance; +// let setFailedMock: jest.SpyInstance; +// let setOutputMock: jest.SpyInstance; describe('action', () => { beforeEach(() => { @@ -26,8 +26,8 @@ describe('action', () => { debugMock = jest.spyOn(core, 'debug').mockImplementation(); errorMock = jest.spyOn(core, 'error').mockImplementation(); getInputMock = jest.spyOn(core, 'getInput').mockImplementation(); - setFailedMock = jest.spyOn(core, 'setFailed').mockImplementation(); - setOutputMock = jest.spyOn(core, 'setOutput').mockImplementation(); + // setFailedMock = jest.spyOn(core, 'setFailed').mockImplementation(); + // setOutputMock = jest.spyOn(core, 'setOutput').mockImplementation(); }); it('SCANOSS Scan Action started', async () => { diff --git a/__tests__/undeclared-policy-check.test.ts b/__tests__/undeclared-policy-check.test.ts index 6a10353..eaf613f 100644 --- a/__tests__/undeclared-policy-check.test.ts +++ b/__tests__/undeclared-policy-check.test.ts @@ -24,14 +24,14 @@ describe('UndeclaredPolicyCheck', () => { }); it('should pass the policy check when undeclared components are not found', async () => { - jest.spyOn(sbomUtils, 'parseSBOM').mockImplementation(async _ => Promise.resolve(sbomMock[1])); + jest.spyOn(sbomUtils, 'parseSBOM').mockImplementation(async () => Promise.resolve(sbomMock[1])); await undeclaredPolicyCheck.run(scannerResults); expect(undeclaredPolicyCheck.conclusion).toEqual(CONCLUSION.Success); }); it('should fail the policy check when undeclared components are found', async () => { - jest.spyOn(sbomUtils, 'parseSBOM').mockImplementation(async _ => Promise.resolve(sbomMock[0])); + jest.spyOn(sbomUtils, 'parseSBOM').mockImplementation(async () => Promise.resolve(sbomMock[0])); await undeclaredPolicyCheck.run(scannerResults); expect(undeclaredPolicyCheck.conclusion).toEqual(CONCLUSION.Neutral); diff --git a/badges/coverage.svg b/badges/coverage.svg index 5bb55be..c7c87dc 100644 --- a/badges/coverage.svg +++ b/badges/coverage.svg @@ -1 +1 @@ -Coverage: 100%Coverage100% \ No newline at end of file +Coverage: 81.01%Coverage81.01% \ No newline at end of file diff --git a/dist/index.js b/dist/index.js index 96d3972..f975b2e 100644 --- a/dist/index.js +++ b/dist/index.js @@ -126145,7 +126145,7 @@ class PolicyCheck { async finish(summary, text) { core.debug(`Finish policy check: ${this.checkName}. (conclusion=${this._conclusion})`); this._status = STATUS.FINISHED; - const result = await this.octokit.rest.checks.update({ + await this.octokit.rest.checks.update({ owner: github_1.context.repo.owner, repo: github_1.context.repo.repo, check_run_id: this.checkRunId, diff --git a/src/policies/policy-check.ts b/src/policies/policy-check.ts index 8bf2c4b..deac98e 100644 --- a/src/policies/policy-check.ts +++ b/src/policies/policy-check.ts @@ -121,7 +121,7 @@ export abstract class PolicyCheck { core.debug(`Finish policy check: ${this.checkName}. (conclusion=${this._conclusion})`); this._status = STATUS.FINISHED; - const result = await this.octokit.rest.checks.update({ + await this.octokit.rest.checks.update({ owner: context.repo.owner, repo: context.repo.repo, check_run_id: this.checkRunId,