Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion .github/workflows/cd.yml
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,7 @@ jobs:

create-release:
needs: publish
uses: OneSignal/sdk-actions/.github/workflows/github-release.yml@main
uses: OneSignal/sdk-shared/.github/workflows/github-release.yml@main
secrets:
GH_PUSH_TOKEN: ${{ secrets.GH_PUSH_TOKEN }}
with:
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/ci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ jobs:
run: flutter analyze

- name: Setup Clang
uses: OneSignal/sdk-actions/.github/actions/setup-clang@main
uses: OneSignal/sdk-shared/.github/actions/setup-clang@main

- name: Check formatting (dart,java,c)
run: dart run rps format-check
Expand Down
16 changes: 8 additions & 8 deletions .github/workflows/create-release-pr.yml
Original file line number Diff line number Diff line change
Expand Up @@ -49,16 +49,16 @@

jobs:
prep:
uses: OneSignal/sdk-actions/.github/workflows/prep-release.yml@main
uses: OneSignal/sdk-shared/.github/workflows/prep-release.yml@main
secrets:
# Need this cross-repo token (sdk-actions & this repo) to perform changes
# Need this cross-repo token (sdk-shared & this repo) to perform changes
GH_PUSH_TOKEN: ${{ secrets.GH_PUSH_TOKEN }}
with:
# Need target_repo otherwise caller would set github.repository to the caller itself (e.g. sdk-actions)
# Need target_repo otherwise caller would set github.repository to the caller itself (e.g. sdk-shared)
target_repo: OneSignal/OneSignal-Flutter-SDK
version: ${{ inputs.flutter_version }}

update_version:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}
needs: prep
runs-on: macos-latest
outputs:
Expand All @@ -70,13 +70,13 @@
- name: Checkout
uses: actions/checkout@v5
with:
# Need repository otherwise caller would set github.repository to the caller itself (e.g. sdk-actions)
# Need repository otherwise caller would set github.repository to the caller itself (e.g. sdk-shared)
repository: OneSignal/OneSignal-Flutter-SDK
ref: ${{ needs.prep.outputs.release_branch }}
token: ${{ secrets.GH_PUSH_TOKEN || github.token }}

- name: Setup Git User
uses: OneSignal/sdk-actions/.github/actions/setup-git-user@main
uses: OneSignal/sdk-shared/.github/actions/setup-git-user@main

- name: Get current native SDK versions from target branch
id: current_versions
Expand Down Expand Up @@ -176,12 +176,12 @@

create-pr:
needs: [prep, update_version]
uses: OneSignal/sdk-actions/.github/workflows/create-release.yml@main
uses: OneSignal/sdk-shared/.github/workflows/create-release.yml@main
secrets:
# Need this cross-repo token (sdk-actions & this repo) to perform changes
# Need this cross-repo token (sdk-shared & this repo) to perform changes
GH_PUSH_TOKEN: ${{ secrets.GH_PUSH_TOKEN }}
with:
# Need target_repo otherwise caller would set github.repository to the caller itself (e.g. sdk-actions)
# Need target_repo otherwise caller would set github.repository to the caller itself (e.g. sdk-shared)
target_repo: OneSignal/OneSignal-Flutter-SDK
release_branch: ${{ needs.prep.outputs.release_branch }}
target_branch: ${{ inputs.target_branch }}
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/lint-pr-title.yml
Original file line number Diff line number Diff line change
Expand Up @@ -7,5 +7,5 @@

jobs:
call:
uses: OneSignal/sdk-actions/.github/workflows/lint-pr-title.yml@main
uses: OneSignal/sdk-shared/.github/workflows/lint-pr-title.yml@main
secrets: inherit

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}