Skip to content

Bump font_awesome_flutter from 10.7.0 to 10.8.0 #30

Bump font_awesome_flutter from 10.7.0 to 10.8.0

Bump font_awesome_flutter from 10.7.0 to 10.8.0 #30

Workflow file for this run

# A copy-paste Github Actions config to run dart-analyze and report the artifact to DeepSource
name: Scan with dart-analyze
on:
# Note that both `push` and `pull_request` triggers should be present for GitHub to consistently present dart-analyze
# SARIF reports.
push:
branches: [main]
pull_request:
jobs:
scan:
runs-on: ubuntu-latest
permissions:
contents: read # for actions/checkout to fetch code
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status
steps:
- name: Code Checkout
uses: actions/checkout@v4
with:
ref: ${{ github.event.pull_request.head.sha }}
- name: Cache
uses: actions/cache@v4
with:
path: ~/.pub-cache
key: ${{ runner.os }}-pub-${{ hashFiles('**/pubspec.lock') }}
restore-keys: ${{ runner.os }}-pub-
- name: Setup Dart
uses: dart-lang/setup-dart@v1
- name: Run Dart Analyze
run: dart analyze > dart_analyze.txt || true
- name: Dart Analyze to SARIF
uses: advanced-security/dart-analyzer-sarif@main
with:
input: dart_analyze.txt
output: dart_analyze.sarif
- name: Upload SARIF report to DeepSource
run: |
# Install the CLI
curl https://deepsource.io/cli | sh
# Send the report to DeepSource
./bin/deepsource report --analyzer dart-analyze --analyzer-type community --value-file ./dart_analyze.sarif
env:
DEEPSOURCE_DSN: ${{ secrets.DEEPSOURCE_DSN }}