From b4a15cad90169f0b69b5a1343c6d54698785176d Mon Sep 17 00:00:00 2001 From: 9244264-prog <9244264@stud.kai.edu.ua> Date: Sun, 7 Dec 2025 05:59:16 +0200 Subject: [PATCH 01/13] Update sonarcloud.yml --- .github/workflows/sonarcloud.yml | 74 +++++++++----------------------- 1 file changed, 21 insertions(+), 53 deletions(-) diff --git a/.github/workflows/sonarcloud.yml b/.github/workflows/sonarcloud.yml index e7840696..99f67ae6 100644 --- a/.github/workflows/sonarcloud.yml +++ b/.github/workflows/sonarcloud.yml @@ -1,31 +1,3 @@ -# This workflow uses actions that are not certified by GitHub. -# They are provided by a third-party and are governed by -# separate terms of service, privacy policy, and support -# documentation. - -# This workflow helps you trigger a SonarCloud analysis of your code and populates -# GitHub Code Scanning alerts with the vulnerabilities found. -# Free for open source project. - -# 1. Login to SonarCloud.io using your GitHub account - -# 2. Import your project on SonarCloud -# * Add your GitHub organization first, then add your repository as a new project. -# * Please note that many languages are eligible for automatic analysis, -# which means that the analysis will start automatically without the need to set up GitHub Actions. -# * This behavior can be changed in Administration > Analysis Method. -# -# 3. Follow the SonarCloud in-product tutorial -# * a. Copy/paste the Project Key and the Organization Key into the args parameter below -# (You'll find this information in SonarCloud. Click on "Information" at the bottom left) -# -# * b. Generate a new token and add it to your Github repository's secrets using the name SONAR_TOKEN -# (On SonarCloud, click on your avatar on top-right > My account > Security -# or go directly to https://sonarcloud.io/account/security/) - -# Feel free to take a look at our documentation (https://docs.sonarcloud.io/getting-started/github/) -# or reach out to our community forum if you need some help (https://community.sonarsource.com/c/help/sc/9) - name: SonarCloud analysis on: @@ -36,48 +8,44 @@ on: workflow_dispatch: permissions: - pull-requests: read # allows SonarCloud to decorate PRs with analysis results + pull-requests: read jobs: sonar-check: name: Sonar Check - runs-on: windows-latest # безпечно для будь-яких .NET проектів + runs-on: windows-latest steps: - uses: actions/checkout@v4 - with: { fetch-depth: 0 } + with: + fetch-depth: 0 - uses: actions/setup-dotnet@v4 with: dotnet-version: '8.0.x' - # 1) BEGIN: SonarScanner for .NET + - name: Set up JDK 17 + uses: actions/setup-java@v4 + with: + java-version: 17 + distribution: 'zulu' + - name: SonarScanner Begin + env: + GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} + SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }} + shell: pwsh run: | dotnet tool install --global dotnet-sonarscanner - echo "$env:USERPROFILE\.dotnet\tools" >> $env:GITHUB_PATH - dotnet sonarscanner begin ` - /k:"ppanchen_NetSdrClient" ` - /o:"ppanchen" ` - /d:sonar.token="${{ secrets.SONAR_TOKEN }}" ` - /d:sonar.cs.opencover.reportsPaths="**/coverage.xml" ` - /d:sonar.cpd.cs.minimumTokens=40 ` - /d:sonar.cpd.cs.minimumLines=5 ` - /d:sonar.exclusions=**/bin/**,**/obj/**,**/sonarcloud.yml ` - /d:sonar.qualitygate.wait=true - shell: pwsh - # 2) BUILD & TEST + dotnet sonarscanner begin /k:"9244264-prog_NetSdrClient" /o:"9244264-prog" /d:sonar.token="${{ secrets.SONAR_TOKEN }}" /d:sonar.host.url="https://sonarcloud.io" /d:sonar.cs.opencover.reportsPaths="**/coverage.xml" /d:sonar.qualitygate.wait=true + - name: Restore run: dotnet restore NetSdrClient.sln + - name: Build run: dotnet build NetSdrClient.sln -c Release --no-restore - #- name: Tests with coverage (OpenCover) - # run: | - # dotnet test NetSdrClientAppTests/NetSdrClientAppTests.csproj -c Release --no-build ` - # /p:CollectCoverage=true ` - # /p:CoverletOutput=TestResults/coverage.xml ` - # /p:CoverletOutputFormat=opencover - # shell: pwsh - # 3) END: SonarScanner + - name: SonarScanner End - run: dotnet sonarscanner end /d:sonar.token="${{ secrets.SONAR_TOKEN }}" + env: + SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }} shell: pwsh + run: dotnet sonarscanner end /d:sonar.token="${{ secrets.SONAR_TOKEN }}" From 0e93a2a7213b341cbc94fe13314b53ee59a4d712 Mon Sep 17 00:00:00 2001 From: 9244264-prog <9244264@stud.kai.edu.ua> Date: Sun, 7 Dec 2025 06:01:34 +0200 Subject: [PATCH 02/13] Update sonarcloud.yml --- .github/workflows/sonarcloud.yml | 74 +++++++++++++++++++++++--------- 1 file changed, 53 insertions(+), 21 deletions(-) diff --git a/.github/workflows/sonarcloud.yml b/.github/workflows/sonarcloud.yml index 99f67ae6..9d148eac 100644 --- a/.github/workflows/sonarcloud.yml +++ b/.github/workflows/sonarcloud.yml @@ -1,3 +1,31 @@ +# This workflow uses actions that are not certified by GitHub. +# They are provided by a third-party and are governed by +# separate terms of service, privacy policy, and support +# documentation. + +# This workflow helps you trigger a SonarCloud analysis of your code and populates +# GitHub Code Scanning alerts with the vulnerabilities found. +# Free for open source project. + +# 1. Login to SonarCloud.io using your GitHub account + +# 2. Import your project on SonarCloud +# * Add your GitHub organization first, then add your repository as a new project. +# * Please note that many languages are eligible for automatic analysis, +# which means that the analysis will start automatically without the need to set up GitHub Actions. +# * This behavior can be changed in Administration > Analysis Method. +# +# 3. Follow the SonarCloud in-product tutorial +# * a. Copy/paste the Project Key and the Organization Key into the args parameter below +# (You'll find this information in SonarCloud. Click on "Information" at the bottom left) +# +# * b. Generate a new token and add it to your Github repository's secrets using the name SONAR_TOKEN +# (On SonarCloud, click on your avatar on top-right > My account > Security +# or go directly to https://sonarcloud.io/account/security/) + +# Feel free to take a look at our documentation (https://docs.sonarcloud.io/getting-started/github/) +# or reach out to our community forum if you need some help (https://community.sonarsource.com/c/help/sc/9) + name: SonarCloud analysis on: @@ -8,44 +36,48 @@ on: workflow_dispatch: permissions: - pull-requests: read + pull-requests: read # allows SonarCloud to decorate PRs with analysis results jobs: sonar-check: name: Sonar Check - runs-on: windows-latest + runs-on: windows-latest # безпечно для будь-яких .NET проектів steps: - uses: actions/checkout@v4 - with: - fetch-depth: 0 + with: { fetch-depth: 0 } - uses: actions/setup-dotnet@v4 with: dotnet-version: '8.0.x' - - name: Set up JDK 17 - uses: actions/setup-java@v4 - with: - java-version: 17 - distribution: 'zulu' - + # 1) BEGIN: SonarScanner for .NET - name: SonarScanner Begin - env: - GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} - SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }} - shell: pwsh run: | dotnet tool install --global dotnet-sonarscanner - dotnet sonarscanner begin /k:"9244264-prog_NetSdrClient" /o:"9244264-prog" /d:sonar.token="${{ secrets.SONAR_TOKEN }}" /d:sonar.host.url="https://sonarcloud.io" /d:sonar.cs.opencover.reportsPaths="**/coverage.xml" /d:sonar.qualitygate.wait=true - + echo "$env:USERPROFILE\.dotnet\tools" >> $env:GITHUB_PATH + dotnet sonarscanner begin ` + /d:sonar.projectKey="" ` + /d:sonar.organization="" ` + /d:sonar.token="${{ secrets.SONAR_TOKEN }}" ` + /d:sonar.cs.opencover.reportsPaths="**/coverage.xml" ` + /d:sonar.cpd.cs.minimumTokens=40 ` + /d:sonar.cpd.cs.minimumLines=5 ` + /d:sonar.exclusions=**/bin/**,**/obj/**,**/sonarcloud.yml ` + /d:sonar.qualitygate.wait=true + shell: pwsh + # 2) BUILD & TEST - name: Restore run: dotnet restore NetSdrClient.sln - - name: Build run: dotnet build NetSdrClient.sln -c Release --no-restore - + #- name: Tests with coverage (OpenCover) + # run: | + # dotnet test NetSdrClientAppTests/NetSdrClientAppTests.csproj -c Release --no-build ` + # /p:CollectCoverage=true ` + # /p:CoverletOutput=TestResults/coverage.xml ` + # /p:CoverletOutputFormat=opencover + # shell: pwsh + # 3) END: SonarScanner - name: SonarScanner End - env: - SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }} - shell: pwsh run: dotnet sonarscanner end /d:sonar.token="${{ secrets.SONAR_TOKEN }}" + shell: pwsh From 8de1f9befb90ecdab5b92b2ba7f236af1a70642b Mon Sep 17 00:00:00 2001 From: 9244264-prog <9244264@stud.kai.edu.ua> Date: Sun, 7 Dec 2025 06:24:50 +0200 Subject: [PATCH 03/13] Update sonarcloud.yml --- .github/workflows/sonarcloud.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/sonarcloud.yml b/.github/workflows/sonarcloud.yml index 9d148eac..be5cef70 100644 --- a/.github/workflows/sonarcloud.yml +++ b/.github/workflows/sonarcloud.yml @@ -4,7 +4,7 @@ # documentation. # This workflow helps you trigger a SonarCloud analysis of your code and populates -# GitHub Code Scanning alerts with the vulnerabilities found. + # Free for open source project. # 1. Login to SonarCloud.io using your GitHub account From d764ab46b10b400540f4896df397446716bb47a3 Mon Sep 17 00:00:00 2001 From: 9244264-prog <9244264@stud.kai.edu.ua> Date: Sun, 7 Dec 2025 06:26:01 +0200 Subject: [PATCH 04/13] Update sonarcloud.yml --- .github/workflows/sonarcloud.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/sonarcloud.yml b/.github/workflows/sonarcloud.yml index be5cef70..9d148eac 100644 --- a/.github/workflows/sonarcloud.yml +++ b/.github/workflows/sonarcloud.yml @@ -4,7 +4,7 @@ # documentation. # This workflow helps you trigger a SonarCloud analysis of your code and populates - +# GitHub Code Scanning alerts with the vulnerabilities found. # Free for open source project. # 1. Login to SonarCloud.io using your GitHub account From 98e0db257edf407c212d0b9ed805d4e4b66785f3 Mon Sep 17 00:00:00 2001 From: 9244264-prog <9244264@stud.kai.edu.ua> Date: Sun, 7 Dec 2025 06:56:18 +0200 Subject: [PATCH 05/13] Update sonarcloud.yml --- .github/workflows/sonarcloud.yml | 47 +++++--------------------------- 1 file changed, 7 insertions(+), 40 deletions(-) diff --git a/.github/workflows/sonarcloud.yml b/.github/workflows/sonarcloud.yml index 9d148eac..e372263d 100644 --- a/.github/workflows/sonarcloud.yml +++ b/.github/workflows/sonarcloud.yml @@ -1,31 +1,4 @@ -# This workflow uses actions that are not certified by GitHub. -# They are provided by a third-party and are governed by -# separate terms of service, privacy policy, and support -# documentation. - -# This workflow helps you trigger a SonarCloud analysis of your code and populates -# GitHub Code Scanning alerts with the vulnerabilities found. -# Free for open source project. - -# 1. Login to SonarCloud.io using your GitHub account - -# 2. Import your project on SonarCloud -# * Add your GitHub organization first, then add your repository as a new project. -# * Please note that many languages are eligible for automatic analysis, -# which means that the analysis will start automatically without the need to set up GitHub Actions. -# * This behavior can be changed in Administration > Analysis Method. -# -# 3. Follow the SonarCloud in-product tutorial -# * a. Copy/paste the Project Key and the Organization Key into the args parameter below -# (You'll find this information in SonarCloud. Click on "Information" at the bottom left) -# -# * b. Generate a new token and add it to your Github repository's secrets using the name SONAR_TOKEN -# (On SonarCloud, click on your avatar on top-right > My account > Security -# or go directly to https://sonarcloud.io/account/security/) - -# Feel free to take a look at our documentation (https://docs.sonarcloud.io/getting-started/github/) -# or reach out to our community forum if you need some help (https://community.sonarsource.com/c/help/sc/9) - +# Тут можуть бути коментарі, але далі має бути: name: SonarCloud analysis on: @@ -36,12 +9,11 @@ on: workflow_dispatch: permissions: - pull-requests: read # allows SonarCloud to decorate PRs with analysis results - + pull-requests: read # дозволяє SonarCloud декорувати PR результатами jobs: sonar-check: name: Sonar Check - runs-on: windows-latest # безпечно для будь-яких .NET проектів + runs-on: windows-latest steps: - uses: actions/checkout@v4 with: { fetch-depth: 0 } @@ -56,8 +28,8 @@ jobs: dotnet tool install --global dotnet-sonarscanner echo "$env:USERPROFILE\.dotnet\tools" >> $env:GITHUB_PATH dotnet sonarscanner begin ` - /d:sonar.projectKey="" ` - /d:sonar.organization="" ` + /d:sonar.projectKey="9244264-prog_NetSdrClient" ` # <<< ВСТАВЛЕНО КЛЮЧ ПРОЕКТУ + /d:sonar.organization="9244264-prog" ` # <<< ВСТАВЛЕНО КЛЮЧ ОРГАНІЗАЦІЇ /d:sonar.token="${{ secrets.SONAR_TOKEN }}" ` /d:sonar.cs.opencover.reportsPaths="**/coverage.xml" ` /d:sonar.cpd.cs.minimumTokens=40 ` @@ -65,18 +37,13 @@ jobs: /d:sonar.exclusions=**/bin/**,**/obj/**,**/sonarcloud.yml ` /d:sonar.qualitygate.wait=true shell: pwsh + # 2) BUILD & TEST - name: Restore run: dotnet restore NetSdrClient.sln - name: Build run: dotnet build NetSdrClient.sln -c Release --no-restore - #- name: Tests with coverage (OpenCover) - # run: | - # dotnet test NetSdrClientAppTests/NetSdrClientAppTests.csproj -c Release --no-build ` - # /p:CollectCoverage=true ` - # /p:CoverletOutput=TestResults/coverage.xml ` - # /p:CoverletOutputFormat=opencover - # shell: pwsh + # 3) END: SonarScanner - name: SonarScanner End run: dotnet sonarscanner end /d:sonar.token="${{ secrets.SONAR_TOKEN }}" From 992f9337c7ac0998d69d4c01f6c76df0a2b04134 Mon Sep 17 00:00:00 2001 From: 9244264-prog <9244264@stud.kai.edu.ua> Date: Sun, 7 Dec 2025 07:00:45 +0200 Subject: [PATCH 06/13] Update sonarcloud.yml --- .github/workflows/sonarcloud.yml | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/.github/workflows/sonarcloud.yml b/.github/workflows/sonarcloud.yml index e372263d..7407741f 100644 --- a/.github/workflows/sonarcloud.yml +++ b/.github/workflows/sonarcloud.yml @@ -22,14 +22,15 @@ jobs: with: dotnet-version: '8.0.x' - # 1) BEGIN: SonarScanner for .NET +# 1) BEGIN: SonarScanner for .NET - name: SonarScanner Begin run: | dotnet tool install --global dotnet-sonarscanner echo "$env:USERPROFILE\.dotnet\tools" >> $env:GITHUB_PATH + # У PowerShell зворотна лапка має бути останньою на лінії! dotnet sonarscanner begin ` - /d:sonar.projectKey="9244264-prog_NetSdrClient" ` # <<< ВСТАВЛЕНО КЛЮЧ ПРОЕКТУ - /d:sonar.organization="9244264-prog" ` # <<< ВСТАВЛЕНО КЛЮЧ ОРГАНІЗАЦІЇ + /d:sonar.projectKey="9244264-prog_NetSdrClient" ` + /d:sonar.organization="9244264-prog" ` /d:sonar.token="${{ secrets.SONAR_TOKEN }}" ` /d:sonar.cs.opencover.reportsPaths="**/coverage.xml" ` /d:sonar.cpd.cs.minimumTokens=40 ` From b4ab19b71b5fc50601ffc5437d2a10b71e04db84 Mon Sep 17 00:00:00 2001 From: 9244264-prog <9244264@stud.kai.edu.ua> Date: Sun, 7 Dec 2025 07:15:17 +0200 Subject: [PATCH 07/13] Update sonarcloud.yml --- .github/workflows/sonarcloud.yml | 26 +++++++++++++++----------- 1 file changed, 15 insertions(+), 11 deletions(-) diff --git a/.github/workflows/sonarcloud.yml b/.github/workflows/sonarcloud.yml index 7407741f..0a1518ac 100644 --- a/.github/workflows/sonarcloud.yml +++ b/.github/workflows/sonarcloud.yml @@ -1,4 +1,3 @@ -# Тут можуть бути коментарі, але далі має бути: name: SonarCloud analysis on: @@ -9,11 +8,12 @@ on: workflow_dispatch: permissions: - pull-requests: read # дозволяє SonarCloud декорувати PR результатами + pull-requests: read # allows SonarCloud to decorate PRs with analysis results + jobs: sonar-check: name: Sonar Check - runs-on: windows-latest + runs-on: windows-latest # безпечно для будь-яких .NET проектів steps: - uses: actions/checkout@v4 with: { fetch-depth: 0 } @@ -22,30 +22,34 @@ jobs: with: dotnet-version: '8.0.x' -# 1) BEGIN: SonarScanner for .NET + # 1) BEGIN: SonarScanner for .NET - name: SonarScanner Begin run: | dotnet tool install --global dotnet-sonarscanner echo "$env:USERPROFILE\.dotnet\tools" >> $env:GITHUB_PATH - # У PowerShell зворотна лапка має бути останньою на лінії! dotnet sonarscanner begin ` - /d:sonar.projectKey="9244264-prog_NetSdrClient" ` - /d:sonar.organization="9244264-prog" ` - /d:sonar.token="${{ secrets.SONAR_TOKEN }}" ` + /d:sonar.projectKey="<9244264-prog_NetSdrClient>" ` + /d:sonar.organization="<9244264-prog>" ` + /d:sonar.token="${{ c4ff3c4621a8cb9d68205ad7e39061b910a65c2c }}" ` /d:sonar.cs.opencover.reportsPaths="**/coverage.xml" ` /d:sonar.cpd.cs.minimumTokens=40 ` /d:sonar.cpd.cs.minimumLines=5 ` /d:sonar.exclusions=**/bin/**,**/obj/**,**/sonarcloud.yml ` /d:sonar.qualitygate.wait=true shell: pwsh - # 2) BUILD & TEST - name: Restore run: dotnet restore NetSdrClient.sln - name: Build run: dotnet build NetSdrClient.sln -c Release --no-restore - + #- name: Tests with coverage (OpenCover) + # run: | + # dotnet test NetSdrClientAppTests/NetSdrClientAppTests.csproj -c Release --no-build ` + # /p:CollectCoverage=true ` + # /p:CoverletOutput=TestResults/coverage.xml ` + # /p:CoverletOutputFormat=opencover + # shell: pwsh # 3) END: SonarScanner - name: SonarScanner End - run: dotnet sonarscanner end /d:sonar.token="${{ secrets.SONAR_TOKEN }}" + run: dotnet sonarscanner end /d:sonar.token="${{ c4ff3c4621a8cb9d68205ad7e39061b910a65c2c }}" shell: pwsh From bfc510570ec1da9af60486dc44f4d5229029f8ba Mon Sep 17 00:00:00 2001 From: 9244264-prog <9244264@stud.kai.edu.ua> Date: Sun, 7 Dec 2025 07:19:56 +0200 Subject: [PATCH 08/13] Update sonarcloud.yml --- .github/workflows/sonarcloud.yml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/.github/workflows/sonarcloud.yml b/.github/workflows/sonarcloud.yml index 0a1518ac..cdf18c86 100644 --- a/.github/workflows/sonarcloud.yml +++ b/.github/workflows/sonarcloud.yml @@ -8,8 +8,7 @@ on: workflow_dispatch: permissions: - pull-requests: read # allows SonarCloud to decorate PRs with analysis results - + pull-requests: read jobs: sonar-check: name: Sonar Check From a0c7d2b65b0dc3e460b2896476dbc0b70d66c4bd Mon Sep 17 00:00:00 2001 From: 9244264-prog <9244264@stud.kai.edu.ua> Date: Sun, 7 Dec 2025 07:37:43 +0200 Subject: [PATCH 09/13] Update sonarcloud.yml --- .github/workflows/sonarcloud.yml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/.github/workflows/sonarcloud.yml b/.github/workflows/sonarcloud.yml index cdf18c86..68659584 100644 --- a/.github/workflows/sonarcloud.yml +++ b/.github/workflows/sonarcloud.yml @@ -29,7 +29,7 @@ jobs: dotnet sonarscanner begin ` /d:sonar.projectKey="<9244264-prog_NetSdrClient>" ` /d:sonar.organization="<9244264-prog>" ` - /d:sonar.token="${{ c4ff3c4621a8cb9d68205ad7e39061b910a65c2c }}" ` + /d:sonar.token="${{ 26dafeaaaf706299581d4b796ba3fbb0e936c638 }}" ` /d:sonar.cs.opencover.reportsPaths="**/coverage.xml" ` /d:sonar.cpd.cs.minimumTokens=40 ` /d:sonar.cpd.cs.minimumLines=5 ` @@ -50,5 +50,5 @@ jobs: # shell: pwsh # 3) END: SonarScanner - name: SonarScanner End - run: dotnet sonarscanner end /d:sonar.token="${{ c4ff3c4621a8cb9d68205ad7e39061b910a65c2c }}" + run: dotnet sonarscanner end /d:sonar.token="${{ 26dafeaaaf706299581d4b796ba3fbb0e936c638 }}" shell: pwsh From d2b2c6ead12687c7965b2f5ba9bd8608b618ca0e Mon Sep 17 00:00:00 2001 From: 9244264-prog <9244264@stud.kai.edu.ua> Date: Sun, 7 Dec 2025 08:05:47 +0200 Subject: [PATCH 10/13] Update sonarcloud.yml --- .github/workflows/sonarcloud.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/sonarcloud.yml b/.github/workflows/sonarcloud.yml index 68659584..97246681 100644 --- a/.github/workflows/sonarcloud.yml +++ b/.github/workflows/sonarcloud.yml @@ -12,7 +12,7 @@ permissions: jobs: sonar-check: name: Sonar Check - runs-on: windows-latest # безпечно для будь-яких .NET проектів + runs-on: windows-latest steps: - uses: actions/checkout@v4 with: { fetch-depth: 0 } From ece317c7c5a4b57de6478cbb5138e9e3789b1aba Mon Sep 17 00:00:00 2001 From: 9244264-prog <9244264@stud.kai.edu.ua> Date: Sun, 7 Dec 2025 08:08:04 +0200 Subject: [PATCH 11/13] Update sonarcloud.yml --- .github/workflows/sonarcloud.yml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/.github/workflows/sonarcloud.yml b/.github/workflows/sonarcloud.yml index 97246681..975ab368 100644 --- a/.github/workflows/sonarcloud.yml +++ b/.github/workflows/sonarcloud.yml @@ -29,7 +29,7 @@ jobs: dotnet sonarscanner begin ` /d:sonar.projectKey="<9244264-prog_NetSdrClient>" ` /d:sonar.organization="<9244264-prog>" ` - /d:sonar.token="${{ 26dafeaaaf706299581d4b796ba3fbb0e936c638 }}" ` + /d:sonar.token="${{ rokkk }}" ` /d:sonar.cs.opencover.reportsPaths="**/coverage.xml" ` /d:sonar.cpd.cs.minimumTokens=40 ` /d:sonar.cpd.cs.minimumLines=5 ` @@ -50,5 +50,5 @@ jobs: # shell: pwsh # 3) END: SonarScanner - name: SonarScanner End - run: dotnet sonarscanner end /d:sonar.token="${{ 26dafeaaaf706299581d4b796ba3fbb0e936c638 }}" + run: dotnet sonarscanner end /d:sonar.token="${{ rokkk }}" shell: pwsh From db143a550df669d3195aeba04be857d2ddc4f21c Mon Sep 17 00:00:00 2001 From: 9244264-prog <9244264@stud.kai.edu.ua> Date: Sun, 7 Dec 2025 08:11:40 +0200 Subject: [PATCH 12/13] Update sonarcloud.yml --- .github/workflows/sonarcloud.yml | 37 ++++++++++++++++++++++++++++---- 1 file changed, 33 insertions(+), 4 deletions(-) diff --git a/.github/workflows/sonarcloud.yml b/.github/workflows/sonarcloud.yml index 975ab368..704d3967 100644 --- a/.github/workflows/sonarcloud.yml +++ b/.github/workflows/sonarcloud.yml @@ -1,3 +1,31 @@ +# This workflow uses actions that are not certified by GitHub. +# They are provided by a third-party and are governed by +# separate terms of service, privacy policy, and support +# documentation. + +# This workflow helps you trigger a SonarCloud analysis of your code and populates +# GitHub Code Scanning alerts with the vulnerabilities found. +# Free for open source project. + +# 1. Login to SonarCloud.io using your GitHub account + +# 2. Import your project on SonarCloud +# * Add your GitHub organization first, then add your repository as a new project. +# * Please note that many languages are eligible for automatic analysis, +# which means that the analysis will start automatically without the need to set up GitHub Actions. +# * This behavior can be changed in Administration > Analysis Method. +# +# 3. Follow the SonarCloud in-product tutorial +# * a. Copy/paste the Project Key and the Organization Key into the args parameter below +# (You'll find this information in SonarCloud. Click on "Information" at the bottom left) +# +# * b. Generate a new token and add it to your Github repository's secrets using the name SONAR_TOKEN +# (On SonarCloud, click on your avatar on top-right > My account > Security +# or go directly to https://sonarcloud.io/account/security/) + +# Feel free to take a look at our documentation (https://docs.sonarcloud.io/getting-started/github/) +# or reach out to our community forum if you need some help (https://community.sonarsource.com/c/help/sc/9) + name: SonarCloud analysis on: @@ -8,11 +36,12 @@ on: workflow_dispatch: permissions: - pull-requests: read + pull-requests: read # allows SonarCloud to decorate PRs with analysis results + jobs: sonar-check: name: Sonar Check - runs-on: windows-latest + runs-on: windows-latest # безпечно для будь-яких .NET проектів steps: - uses: actions/checkout@v4 with: { fetch-depth: 0 } @@ -29,7 +58,7 @@ jobs: dotnet sonarscanner begin ` /d:sonar.projectKey="<9244264-prog_NetSdrClient>" ` /d:sonar.organization="<9244264-prog>" ` - /d:sonar.token="${{ rokkk }}" ` + /d:sonar.token="${{ROKKK}}" ` /d:sonar.cs.opencover.reportsPaths="**/coverage.xml" ` /d:sonar.cpd.cs.minimumTokens=40 ` /d:sonar.cpd.cs.minimumLines=5 ` @@ -50,5 +79,5 @@ jobs: # shell: pwsh # 3) END: SonarScanner - name: SonarScanner End - run: dotnet sonarscanner end /d:sonar.token="${{ rokkk }}" + run: dotnet sonarscanner end /d:sonar.token="${{ROKKK}}" shell: pwsh From e28cd78b7aa654aae9ea2ef7d71e0b0e73272f53 Mon Sep 17 00:00:00 2001 From: 9244264-prog <9244264@stud.kai.edu.ua> Date: Sun, 7 Dec 2025 21:11:14 +0200 Subject: [PATCH 13/13] Update sonarcloud.yml --- .github/workflows/sonarcloud.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/sonarcloud.yml b/.github/workflows/sonarcloud.yml index 704d3967..9bbc3c34 100644 --- a/.github/workflows/sonarcloud.yml +++ b/.github/workflows/sonarcloud.yml @@ -7,7 +7,7 @@ # GitHub Code Scanning alerts with the vulnerabilities found. # Free for open source project. -# 1. Login to SonarCloud.io using your GitHub account +# 1. Login to SonarCloud.io using your GitHub accoun # 2. Import your project on SonarCloud # * Add your GitHub organization first, then add your repository as a new project.