Report on pull requests #93
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Report on pull requests | |
on: | |
workflow_run: | |
workflows: [CI] | |
types: | |
- completed | |
jobs: | |
report: | |
name: Report | |
runs-on: ubuntu-latest | |
if: github.event.workflow_run.event == 'pull_request' | |
env: | |
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} | |
steps: | |
- name: 'Checkout' | |
uses: actions/checkout@v4 | |
with: | |
submodules: recursive | |
- name: 'Download build artifacts' | |
if: always() | |
uses: dawidd6/action-download-artifact@v6 # download artifacts | |
with: | |
name: build-artifact | |
run_id: ${{ github.event.workflow_run.id }} | |
- name: 'Download check artifacts' | |
if: always() | |
uses: dawidd6/action-download-artifact@v6 # download artifacts | |
with: | |
name: check-artifact | |
run_id: ${{ github.event.workflow_run.id }} | |
- name: 'Download test artifacts' | |
if: always() | |
uses: dawidd6/action-download-artifact@v6 # download artifacts | |
with: | |
name: test-artifact | |
run_id: ${{ github.event.workflow_run.id }} | |
- name: 'Logscan ensure logscan is executable' | |
if: always() | |
run: 'chmod +x .github/logscan.sh' | |
- name: 'Logscan TypeCheck Src' | |
if: always() | |
id: logscan_src | |
run: '.github/logscan.sh reports/typecheck.log' | |
- name: 'Logscan TypeCheck Examples' | |
if: always() | |
id: logscan_examples | |
run: '.github/logscan.sh reports/typecheck-examples.log' | |
- name: 'Logscan TypeCheck Tests' | |
if: always() | |
id: logscan_tests | |
run: '.github/logscan.sh reports/typecheck-tests.log' | |
- name: 'TypeCheck Src' | |
if: always() | |
uses: LouisBrunner/[email protected] | |
with: | |
token: ${{ secrets.GITHUB_TOKEN }} | |
name: Typecheck Src | |
conclusion: ${{steps.logscan_src.conclusion}} | |
sha: ${{ github.event.workflow_run.head_sha }} | |
output: | | |
{"summary":"${{ steps.logscan_src.outputs.summary }}"} | |
- name: 'TypeCheck Examples' | |
if: always() | |
uses: LouisBrunner/[email protected] | |
with: | |
token: ${{ secrets.GITHUB_TOKEN }} | |
name: Typecheck Examples | |
conclusion: ${{steps.logscan_examples.conclusion}} | |
sha: ${{ github.event.workflow_run.head_sha }} | |
output: | | |
{"summary":"${{ steps.logscan_examples.outputs.summary }}"} | |
- name: 'TypeCheck Tests' | |
if: always() | |
uses: LouisBrunner/[email protected] | |
with: | |
token: ${{ secrets.GITHUB_TOKEN }} | |
name: Typecheck Tests | |
conclusion: ${{steps.logscan_tests.conclusion}} | |
sha: ${{ github.event.workflow_run.head_sha }} | |
output: | | |
{"summary":"${{ steps.logscan_tests.outputs.summary }}"} | |
- name: 'Analyze Src Code Linting Results' | |
if: always() | |
id: eslint_src | |
uses: ataylorme/eslint-annotate-action@v2 | |
with: | |
report-json: "reports/eslint-src.json" | |
- name: 'Analyze Examples Code Linting Results' | |
if: always() | |
id: eslint_examples | |
uses: ataylorme/eslint-annotate-action@v2 | |
with: | |
report-json: "reports/eslint-examples.json" | |
- name: 'Analyze Tests Code Linting Results' | |
if: always() | |
id: eslint_tests | |
uses: ataylorme/eslint-annotate-action@v2 | |
with: | |
report-json: "reports/eslint-tests.json" | |
- name: 'Report Eslint Src' | |
if: always() | |
uses: LouisBrunner/[email protected] | |
with: | |
token: ${{ secrets.GITHUB_TOKEN }} | |
name: 'Eslint Src' | |
conclusion: ${{steps.eslint_src.conclusion}} | |
sha: ${{ github.event.workflow_run.head_sha }} | |
output: | | |
{"summary":"${{ steps.eslint_src.outputs.summary }}"} | |
- name: 'Report Eslint Examples' | |
if: always() | |
uses: LouisBrunner/[email protected] | |
with: | |
token: ${{ secrets.GITHUB_TOKEN }} | |
name: 'Eslint Examples' | |
conclusion: ${{steps.eslint_examples.conclusion}} | |
sha: ${{ github.event.workflow_run.head_sha }} | |
output: | | |
{"summary":"${{ steps.eslint_examples.outputs.summary }}"} | |
- name: 'Report Eslint Tests' | |
if: always() | |
uses: LouisBrunner/[email protected] | |
with: | |
token: ${{ secrets.GITHUB_TOKEN }} | |
name: 'Eslint Tests' | |
conclusion: ${{steps.eslint_tests.conclusion}} | |
sha: ${{ github.event.workflow_run.head_sha }} | |
output: | | |
{"summary":"${{ steps.eslint_tests.outputs.summary }}"} | |
- name: 'Upload coverage reports to Codecov' | |
if: always() | |
uses: codecov/codecov-action@v3 | |
with: | |
directory: ./coverage/ | |
override_pr: ${{ github.event.workflow_run.pull_requests[0].number }} | |
override_commit: ${{ github.event.workflow_run.head_sha }} | |
# - name: 'Report playwright test results' | |
# uses: daun/playwright-report-summary@v2 | |
# with: | |
# report-file: playwright-report.json | |
# env: | |
# GITHUB_SHA: ${{ github.event.workflow_run.head_sha }} | |
# GITHUB_EVENT_NAME: ${{ github.event.workflow_run.event }} | |