Initial draft of Gitea-oriented actions
This commit is contained in:
85
.gitea/workflows/ci-python-poetry-with-docker.yml
Normal file
85
.gitea/workflows/ci-python-poetry-with-docker.yml
Normal file
@ -0,0 +1,85 @@
|
||||
name: Python w/ Poetry + Docker CI
|
||||
on:
|
||||
workflow_call:
|
||||
inputs:
|
||||
python-version:
|
||||
type: string
|
||||
default: "3.11"
|
||||
description: "Version of Python to use for testing environment"
|
||||
secrets:
|
||||
SONAR_TOKEN:
|
||||
required: true
|
||||
SNYK_TOKEN:
|
||||
required: true
|
||||
|
||||
env:
|
||||
PATH: ${{ env.PATH }}:/root/.poetry/bin
|
||||
|
||||
jobs:
|
||||
ci:
|
||||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
- name: Set python-version
|
||||
id: python-version
|
||||
run: |
|
||||
PYTHON_VERSION=${{ inputs.python-version }}
|
||||
echo "value=${PYTHON_VERSION:-"3.11"}" >> $GITEA_OUTPUT
|
||||
|
||||
- name: Check out repository code
|
||||
uses: actions/checkout@v4.1.7
|
||||
with:
|
||||
fetch-depth: 0
|
||||
|
||||
- uses: hadolint/hadolint-action@v3.1.0
|
||||
with:
|
||||
dockerfile: Dockerfile
|
||||
output-file: hadolint.out
|
||||
format: sonarqube
|
||||
no-fail: true
|
||||
|
||||
- name: Setup Python
|
||||
uses: actions/setup-python@v5
|
||||
with:
|
||||
python-version: "${{ steps.python-version.outputs.value }}"
|
||||
|
||||
- name: Setup Poetry
|
||||
uses: abatilo/actions-poetry@v4
|
||||
|
||||
- name: Setup virtual environment
|
||||
run: |
|
||||
poetry config virtualenvs.create true --local
|
||||
poetry config virtualenvs.in-project true --local
|
||||
|
||||
- uses: actions/cache@v3
|
||||
name: Define cache for dependencies
|
||||
with:
|
||||
path: ./.venv
|
||||
key: venv-${{ hashFiles('poetry.lock') }}
|
||||
restore-keys: venv-${{ hashFiles('poetry.lock') }}
|
||||
|
||||
- name: Install dependencies
|
||||
run: poetry install
|
||||
|
||||
- name: Lint
|
||||
run: |
|
||||
poetry run pylint --fail-under=8 --recursive=yes --output-format=parseable --output=lintreport.txt .
|
||||
cat lintreport.txt
|
||||
|
||||
- name: Unit Test
|
||||
run: |
|
||||
poetry run coverage run -m pytest -v --junitxml=testresults.xml
|
||||
poetry run coverage xml
|
||||
sed -i 's@${{ gitea.workspace }}@/github/workspace@g' coverage.xml
|
||||
|
||||
- name: SonarQube Cloud Scan
|
||||
uses: SonarSource/sonarqube-scan-action@v4.2.1
|
||||
env:
|
||||
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}
|
||||
|
||||
- name: Snyk Vulnerability Scan
|
||||
uses: snyk/actions/python-3.10@master
|
||||
continue-on-error: true # To make sure that SARIF upload gets called
|
||||
env:
|
||||
SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }}
|
||||
with:
|
||||
args: --sarif-file-output=snyk.sarif --all-projects
|
Reference in New Issue
Block a user