--- # https://github.com/redhat-plumbers-in-action/differential-shellcheck#readme name: Differential ShellCheck on: push: branches: - main pull_request: branches: - main permissions: contents: read jobs: lint: if: github.event.repository.name != 'systemd-security' runs-on: ubuntu-latest permissions: security-events: write steps: - name: Repository checkout uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 with: fetch-depth: 0 - name: Differential ShellCheck uses: redhat-plumbers-in-action/differential-shellcheck@52bab0caa5249d6acd8bcd5bc7a68e69ac9319f9 with: # exclude all `.in` files because they may contain unsupported syntax, and they have to be preprocessed first # TEMPORARY: exclude bash completion files, they would generate too many defects in Code scanning dashboard (600+) # exclude zsh completion files, zsh is not supported by ShellCheck exclude-path: | '**/*.in' 'shell-completion/bash/*' 'shell-completion/zsh/*' token: ${{ secrets.GITHUB_TOKEN }}