Report on pull requests #83
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Report on pull requests | |
on: | |
workflow_run: | |
workflows: [CI] | |
types: | |
- completed | |
jobs: | |
report: | |
name: Report | |
runs-on: ubuntu-latest | |
if: github.event.workflow_run.event == 'pull_request' | |
env: | |
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} | |
steps: | |
- name: 'Checkout' | |
uses: actions/checkout@v4 | |
with: | |
submodules: recursive | |
- name: 'Download build artifacts' | |
if: always() | |
uses: dawidd6/action-download-artifact@v6 # download artifacts | |
with: | |
name: build-artifact | |
run_id: ${{ github.event.workflow_run.id }} | |
- name: 'Download check artifacts' | |
if: always() | |
uses: dawidd6/action-download-artifact@v6 # download artifacts | |
with: | |
name: check-artifact | |
run_id: ${{ github.event.workflow_run.id }} | |
- name: 'Download test artifacts' | |
if: always() | |
uses: dawidd6/action-download-artifact@v6 # download artifacts | |
with: | |
name: test-artifact | |
run_id: ${{ github.event.workflow_run.id }} | |
- name: 'Logscan ensure logscan is executable' | |
if: always() | |
run: 'chmod +x .github/logscan.sh' | |
- name: 'Logscan TypeCheck Src' | |
if: always() | |
id: logscan_src | |
run: '.github/logscan.sh reports/typecheck.log' | |
- name: 'Logscan TypeCheck Examples' | |
if: always() | |
id: logscan_examples | |
run: '.github/logscan.sh reports/typecheck-examples.log' | |
- name: 'Logscan TypeCheck Tests' | |
if: always() | |
id: logscan_tests | |
run: '.github/logscan.sh reports/typecheck-tests.log' | |
- name: 'TypeCheck Src' | |
if: always() | |
uses: LouisBrunner/checks-action@v1.6.1 | |
with: | |
token: ${{ secrets.GITHUB_TOKEN }} | |
name: Typecheck Src | |
conclusion: ${{steps.logscan_src.conclusion}} | |
sha: ${{ github.event.workflow_run.head_sha }} | |
output: | | |
{"summary":"${{ steps.logscan_src.outputs.summary }}"} | |
- name: 'TypeCheck Examples' | |
if: always() | |
uses: LouisBrunner/checks-action@v1.6.1 | |
with: | |
token: ${{ secrets.GITHUB_TOKEN }} | |
name: Typecheck Examples | |
conclusion: ${{steps.logscan_examples.conclusion}} | |
sha: ${{ github.event.workflow_run.head_sha }} | |
output: | | |
{"summary":"${{ steps.logscan_examples.outputs.summary }}"} | |
- name: 'TypeCheck Tests' | |
if: always() | |
uses: LouisBrunner/checks-action@v1.6.1 | |
with: | |
token: ${{ secrets.GITHUB_TOKEN }} | |
name: Typecheck Tests | |
conclusion: ${{steps.logscan_tests.conclusion}} | |
sha: ${{ github.event.workflow_run.head_sha }} | |
output: | | |
{"summary":"${{ steps.logscan_tests.outputs.summary }}"} | |
- name: 'Analyze Src Code Linting Results' | |
if: always() | |
id: eslint_src | |
uses: ataylorme/eslint-annotate-action@v2 | |
with: | |
report-json: "reports/eslint-src.json" | |
- name: 'Analyze Examples Code Linting Results' | |
if: always() | |
id: eslint_examples | |
uses: ataylorme/eslint-annotate-action@v2 | |
with: | |
report-json: "reports/eslint-examples.json" | |
- name: 'Analyze Tests Code Linting Results' | |
if: always() | |
id: eslint_tests | |
uses: ataylorme/eslint-annotate-action@v2 | |
with: | |
report-json: "reports/eslint-tests.json" | |
- name: 'Report Eslint Src' | |
if: always() | |
uses: LouisBrunner/checks-action@v1.6.1 | |
with: | |
token: ${{ secrets.GITHUB_TOKEN }} | |
name: 'Eslint Src' | |
conclusion: ${{steps.eslint_src.conclusion}} | |
sha: ${{ github.event.workflow_run.head_sha }} | |
output: | | |
{"summary":"${{ steps.eslint_src.outputs.summary }}"} | |
- name: 'Report Eslint Examples' | |
if: always() | |
uses: LouisBrunner/checks-action@v1.6.1 | |
with: | |
token: ${{ secrets.GITHUB_TOKEN }} | |
name: 'Eslint Examples' | |
conclusion: ${{steps.eslint_examples.conclusion}} | |
sha: ${{ github.event.workflow_run.head_sha }} | |
output: | | |
{"summary":"${{ steps.eslint_examples.outputs.summary }}"} | |
- name: 'Report Eslint Tests' | |
if: always() | |
uses: LouisBrunner/checks-action@v1.6.1 | |
with: | |
token: ${{ secrets.GITHUB_TOKEN }} | |
name: 'Eslint Tests' | |
conclusion: ${{steps.eslint_tests.conclusion}} | |
sha: ${{ github.event.workflow_run.head_sha }} | |
output: | | |
{"summary":"${{ steps.eslint_tests.outputs.summary }}"} | |
- name: 'Upload coverage reports to Codecov' | |
if: always() | |
uses: codecov/codecov-action@v3 | |
with: | |
directory: ./coverage/ | |
override_pr: ${{ github.event.workflow_run.pull_requests[0].number }} | |
override_commit: ${{ github.event.workflow_run.head_sha }} | |
# - name: 'Report playwright test results' | |
# uses: daun/playwright-report-summary@v2 | |
# with: | |
# report-file: playwright-report.json | |
# env: | |
# GITHUB_SHA: ${{ github.event.workflow_run.head_sha }} | |
# GITHUB_EVENT_NAME: ${{ github.event.workflow_run.event }} | |