diff --git a/.github/workflows/codacy.yml b/.github/workflows/codacy.yml deleted file mode 100644 index 2d1e406..0000000 --- a/.github/workflows/codacy.yml +++ /dev/null @@ -1,60 +0,0 @@ -# This workflow uses actions that are not certified by GitHub. -# They are provided by a third-party and are governed by -# separate terms of service, privacy policy, and support -# documentation. - -# This workflow checks out code, performs a Codacy security scan -# and integrates the results with the -# GitHub Advanced Security code scanning feature. For more information on -# the Codacy security scan action usage and parameters, see -# https://github.com/codacy/codacy-analysis-cli-action. -# For more information on Codacy Analysis CLI in general, see -# https://github.com/codacy/codacy-analysis-cli. - -name: Codacy Security Scan - -on: - push: - branches: [ "main" ] - pull_request: - # The branches below must be a subset of the branches above - branches: [ "main" ] - schedule: - - cron: '15 8 * * 2' - -permissions: - contents: read - -jobs: - codacy-security-scan: - permissions: - contents: read # for actions/checkout to fetch code - security-events: write # for github/codeql-action/upload-sarif to upload SARIF results - name: Codacy Security Scan - runs-on: ubuntu-latest - steps: - # Checkout the repository to the GitHub Actions runner - - name: Checkout code - uses: actions/checkout@v3 - - # Execute Codacy Analysis CLI and generate a SARIF output with the security issues identified during the analysis - - name: Run Codacy Analysis CLI - uses: codacy/codacy-analysis-cli-action@d840f886c4bd4edc059706d09c6a1586111c540b - with: - # Check https://github.com/codacy/codacy-analysis-cli#project-token to get your project token from your Codacy repository - # You can also omit the token and run the tools that support default configurations - project-token: ${{ secrets.CODACY_PROJECT_TOKEN }} - verbose: true - output: results.sarif - format: sarif - # Adjust severity of non-security issues - gh-code-scanning-compat: true - # Force 0 exit code to allow SARIF file generation - # This will handover control about PR rejection to the GitHub side - max-allowed-issues: 2147483647 - - # Upload the SARIF file generated in the previous step - - name: Upload SARIF results file - uses: github/codeql-action/upload-sarif@v2 - with: - sarif_file: results.sarif diff --git a/README.md b/README.md deleted file mode 100644 index 150fbb8..0000000 --- a/README.md +++ /dev/null @@ -1,29 +0,0 @@ -# 实验二 Activity 的应用实践之登录注册设计 - -## 一、实验目的 - -1. 了解各种布局的特点。 -2. 掌握 Intent 的作用。 -3. 掌握各种常见组件的使用 -4. 掌握适配器和 ArrayList 的作用。 - -## 二、实验仪器 - -计算机 一台 -Android Studio - -## 三、实验内容 - -1. 设计一个登录注册 APP。 -2. 具备登录和注册功能。 -3. 自行扩展其他功能。 - -## 四、实验总结 - -1. 说明 APP 整体设计概念,是否有加入自己的应用想法。 -2. 记录出现的调试问题并说明解决的方法。 - -## 五、预习要求 - -1. 了解本次实验中使用的各组件的应用方法。 -2. 了解 Intent 的使用。