gha-workflows/.gitea/workflows/ci-python-poetry.yml

71 lines
1.9 KiB
YAML
Raw Normal View History

name: Python w/ Poetry CI
on:
workflow_call:
inputs:
python-version:
type: string
default: "3.11"
description: "Version of Python to use for testing environment"
secrets:
SONAR_TOKEN:
required: true
SNYK_TOKEN:
required: true
env:
PATH: ${{ env.PATH }}:/root/.poetry/bin
jobs:
ci:
runs-on: ubuntu-latest
steps:
- name: Check out repository code
2025-01-12 18:23:24 +00:00
uses: actions/checkout@v4.2.2
with:
fetch-depth: 0
- name: Setup Python
uses: actions/setup-python@v5
with:
2025-01-12 18:23:24 +00:00
python-version: "${{ inputs.python-version }}"
- name: Setup Poetry
2025-01-02 13:10:52 +00:00
uses: abatilo/actions-poetry@v4
2025-01-12 18:23:24 +00:00
- name: Setup virtual environment
run: |
poetry config virtualenvs.create true --local
poetry config virtualenvs.in-project true --local
2025-01-12 18:23:24 +00:00
- uses: actions/cache@v4
name: Define cache for dependencies
with:
path: ./.venv
key: venv-${{ hashFiles('poetry.lock') }}
restore-keys: venv-${{ hashFiles('poetry.lock') }}
- name: Install dependencies
run: poetry install
- name: Lint
run: poetry run pylint --fail-under=8 --recursive=yes --output-format=parseable --output=lintreport.txt .
- name: Unit Test
run: |
poetry run coverage run -m pytest -v --junitxml=testresults.xml
poetry run coverage xml
sed -i 's@${{ github.workspace }}@/github/workspace@g' coverage.xml
- name: SonarQube Cloud Scan
uses: SonarSource/sonarqube-scan-action@v4.2.1
env:
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}
- name: Snyk Vulnerability Scan
2025-01-12 18:23:24 +00:00
uses: snyk/actions/python@master
continue-on-error: true # Sometimes vulns aren't immediately fixable
env:
SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }}
with:
2025-01-12 18:23:24 +00:00
args: test --all-projects