Skip to content
Draft
Show file tree
Hide file tree
Changes from 23 commits
Commits
Show all changes
26 commits
Select commit Hold shift + click to select a range
db0d220
Remove usage of shadow plugin from all modules but cli
serpro69 Aug 27, 2025
a6fd8b2
Merge integration tests with unit tests
serpro69 Aug 27, 2025
106d21f
Update contributing guidelines, remove docs_old orchid documentation …
serpro69 Aug 27, 2025
95926d6
Change kotlin jvm plugin to multiplatform
serpro69 Aug 27, 2025
2e3a7da
Rename main/test sources to jvmMain/jvmTest
serpro69 Aug 27, 2025
f25a584
Fix build job
serpro69 Aug 27, 2025
ef4f882
Add jvm-conventions plugin
serpro69 Aug 30, 2025
bb030f6
Update pub-conventions
serpro69 Sep 4, 2025
6cb0f91
Rename all modules
serpro69 Sep 9, 2025
4637234
Clean up buildsrc utils
serpro69 Sep 10, 2025
4250f65
Fix release config
serpro69 Sep 10, 2025
b64bc2e
Update release logic
serpro69 Sep 10, 2025
66dad3b
Fix bom module publishing config
serpro69 Sep 11, 2025
2a49a44
Remove publish plugin and fix task dep in root build
serpro69 Sep 11, 2025
d397c4b
Fix build setting prefix
serpro69 Sep 11, 2025
785bd82
Change hwo subprojects are added to bom
serpro69 Sep 11, 2025
854c1aa
Dump api
serpro69 Sep 11, 2025
4c26c1f
Clean up dependencies in conventions plugins
serpro69 Sep 11, 2025
7d46a6c
Update pr and master workflows
serpro69 Sep 11, 2025
3a01d26
Fix docs snippets paths
serpro69 Sep 12, 2025
55cbf59
Fix cli jvm target and test config
serpro69 Sep 12, 2025
56cd35a
Fix link in contrib guide
serpro69 Sep 12, 2025
b5f03fc
Remove old java 8 references since we use min. java11
serpro69 Sep 12, 2025
800db09
Resolve comments from Copilot review, improve some tests
serpro69 Sep 13, 2025
b998a2a
Get rid of redundant suppress annotation
serpro69 Oct 16, 2025
2bed698
Init claude with task-master and serena mcp
serpro69 Oct 31, 2025
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
1 change: 1 addition & 0 deletions .github/.java-version
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
21
93 changes: 0 additions & 93 deletions .github/workflows/build.yml

This file was deleted.

108 changes: 56 additions & 52 deletions .github/workflows/codeql.yml
Original file line number Diff line number Diff line change
@@ -1,3 +1,4 @@
---
# For most projects, this workflow file will not need changing; you simply need
# to commit it to your repository.
#
Expand All @@ -12,10 +13,13 @@
name: "CodeQL"

on:
push:
branches: [ "master" ]
pull_request:
branches: [ "master" ]
branches: ["master"]
merge_group:

concurrency:
group: "${{ github.workflow }} @ ${{ github.event.pull_request.head.label || github.head_ref || github.ref }}"
cancel-in-progress: true

jobs:
analyze:
Expand All @@ -39,58 +43,58 @@ jobs:
fail-fast: false
matrix:
include:
- language: java-kotlin
build-mode: autobuild
# CodeQL supports the following values keywords for 'language': 'c-cpp', 'csharp', 'go', 'java-kotlin', 'javascript-typescript', 'python', 'ruby', 'swift'
# Use `c-cpp` to analyze code written in C, C++ or both
# Use 'java-kotlin' to analyze code written in Java, Kotlin or both
# Use 'javascript-typescript' to analyze code written in JavaScript, TypeScript or both
# To learn more about changing the languages that are analyzed or customizing the build mode for your analysis,
# see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning.
# If you are analyzing a compiled language, you can modify the 'build-mode' for that language to customize how
# your codebase is analyzed, see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/codeql-code-scanning-for-compiled-languages
- language: java-kotlin
build-mode: autobuild
# CodeQL supports the following values keywords for 'language': 'c-cpp', 'csharp', 'go', 'java-kotlin', 'javascript-typescript', 'python', 'ruby', 'swift'
# Use `c-cpp` to analyze code written in C, C++ or both
# Use 'java-kotlin' to analyze code written in Java, Kotlin or both
# Use 'javascript-typescript' to analyze code written in JavaScript, TypeScript or both
# To learn more about changing the languages that are analyzed or customizing the build mode for your analysis,
# see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning.
# If you are analyzing a compiled language, you can modify the 'build-mode' for that language to customize how
# your codebase is analyzed, see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/codeql-code-scanning-for-compiled-languages
steps:
- name: Checkout repository
uses: actions/checkout@v4
- name: Checkout repository
uses: actions/checkout@v4

# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@v3
with:
languages: ${{ matrix.language }}
build-mode: ${{ matrix.build-mode }}
# If you wish to specify custom queries, you can do so here or in a config file.
# By default, queries listed here will override any specified in a config file.
# Prefix the list here with "+" to use these queries and those in the config file.
# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@v3
with:
languages: ${{ matrix.language }}
build-mode: ${{ matrix.build-mode }}
# If you wish to specify custom queries, you can do so here or in a config file.
# By default, queries listed here will override any specified in a config file.
# Prefix the list here with "+" to use these queries and those in the config file.

# For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
# queries: security-extended,security-and-quality
# For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
# queries: security-extended,security-and-quality

# If the analyze step fails for one of the languages you are analyzing with
# "We were unable to automatically build your code", modify the matrix above
# to set the build mode to "manual" for that language. Then modify this step
# to build your code.
# ℹ️ Command-line programs to run using the OS shell.
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
- if: matrix.build-mode == 'manual'
run: |
echo 'If you are using a "manual" build mode for one or more of the' \
'languages you are analyzing, replace this with the commands to build' \
'your code, for example:'
echo ' make bootstrap'
echo ' make release'
exit 1
# If the analyze step fails for one of the languages you are analyzing with
# "We were unable to automatically build your code", modify the matrix above
# to set the build mode to "manual" for that language. Then modify this step
# to build your code.
# ℹ️ Command-line programs to run using the OS shell.
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
- if: matrix.build-mode == 'manual'
run: |
echo 'If you are using a "manual" build mode for one or more of the' \
'languages you are analyzing, replace this with the commands to build' \
'your code, for example:'
echo ' make bootstrap'
echo ' make release'
exit 1

# In codeql-cli 2.17.6, they're recognising the configuration in the root build.gradle.kts file to compile against Java 8.
# The best way to override this is to use a setup-java step to install the JDK version that your project requires.
# Ref: https://github.com/github/codeql-action/issues/2360#issuecomment-2199969007
- name: Set up JDK
uses: actions/setup-java@v4
with:
java-version: 17
distribution: 'temurin'
# In codeql-cli 2.17.6, they're recognising the configuration in the root build.gradle.kts file to compile against Java 8.
# The best way to override this is to use a setup-java step to install the JDK version that your project requires.
# Ref: https://github.com/github/codeql-action/issues/2360#issuecomment-2199969007
- name: Set up JDK
uses: actions/setup-java@v4
with:
java-version: 17
distribution: 'temurin'

- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v3
with:
category: "/language:${{matrix.language}}"
- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v3
with:
category: "/language:${{matrix.language}}"
2 changes: 1 addition & 1 deletion .github/workflows/docs.yml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
name: Deploy Docs
name: docs

on:
workflow_dispatch:
Expand Down
49 changes: 49 additions & 0 deletions .github/workflows/master.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,49 @@
---
name: master

on:
push:
paths-ignore:
- 'docs/**'
- '*.md'
branches:
- master

concurrency:
group: '${{ github.workflow }}'
# don't leave snapshot builds in a half-done state
cancel-in-progress: false

jobs:
validate-api:
name: Validate API
if: github.repository == 'serpro69/kotlin-faker'
uses: ./.github/workflows/run_gradle.yml
secrets: inherit
with:
runs-on: ubuntu-latest
ref: ${{ inputs.ref }}
task: apiCheck

build-primary:
needs: validate-api
strategy:
matrix:
include:
# KMP
- os: ubuntu-latest
args: -P"kotlinFaker_enabledPublicationNamePrefixes=KotlinMultiplatform"
# JVM
- os: ubuntu-latest
args: -P"kotlinFaker_enabledPublicationNamePrefixes=jvm"
uses: ./.github/workflows/run_gradle.yml
secrets: inherit
with:
ref: ${{ inputs.ref }}
task: >
-P"kotlinFaker_enableKotlinJs=true"
-P"kotlinFaker_enableKotlinNative=true"
${{ matrix.args }}
--no-configuration-cache
check publishToAppropriateCentralRepository
runs-on: ${{ matrix.os }}
Loading
Loading