Skip to content

Add free-floating and resizable keyboard mode #1

Add free-floating and resizable keyboard mode

Add free-floating and resizable keyboard mode #1

Workflow file for this run

name: CI
on:
push:
branches: [ main, develop ]
tags-ignore:
- '**' # Don't run on tag pushes - release.yml handles those
pull_request:
branches: [ main, develop ]
# Required for security scan SARIF upload
permissions:
contents: read
security-events: write
jobs:
build:
name: Build and Test
runs-on: ubuntu-latest
steps:
- name: Checkout code
uses: actions/checkout@v4
- name: Set up JDK 17
uses: actions/setup-java@v4
with:
java-version: '17'
distribution: 'temurin'
cache: gradle
- name: Grant execute permission for gradlew
run: chmod +x gradlew
- name: Build with Gradle
run: ./gradlew assembleDebug --stacktrace
- name: Run unit tests
run: ./gradlew testDebugUnitTest --stacktrace
- name: Upload test results
uses: actions/upload-artifact@v4
if: always()
with:
name: test-results
path: |
build/reports/tests/
build/test-results/
retention-days: 7
- name: Run lint checks
run: ./gradlew lint --stacktrace
continue-on-error: true
- name: Upload build artifacts
uses: actions/upload-artifact@v4
if: success()
with:
name: apk-debug
path: build/outputs/apk/debug/*.apk
retention-days: 7
- name: Upload lint results
uses: actions/upload-artifact@v4
if: always()
with:
name: lint-results
path: build/reports/lint-results*.xml
retention-days: 7
code-quality:
name: Code Quality Checks
runs-on: ubuntu-latest
steps:
- name: Checkout code
uses: actions/checkout@v4
- name: Set up JDK 17
uses: actions/setup-java@v4
with:
java-version: '17'
distribution: 'temurin'
cache: gradle
- name: Grant execute permission for gradlew
run: chmod +x gradlew
- name: Check code formatting
run: ./gradlew ktlintCheck --stacktrace
continue-on-error: true
- name: Dependency analysis
run: ./gradlew dependencies --stacktrace
continue-on-error: true
security:
name: Security Scan
runs-on: ubuntu-latest
steps:
- name: Checkout code
uses: actions/checkout@v4
- name: Run security scan
uses: aquasecurity/trivy-action@0.28.0
with:
scan-type: 'fs'
scan-ref: '.'
format: 'sarif'
output: 'trivy-results.sarif'
continue-on-error: true
- name: Upload security results
uses: github/codeql-action/upload-sarif@v3
if: always()
with:
sarif_file: 'trivy-results.sarif'