name: CI w/ Poetry and Docker on: pull_request: types: [opened, synchronize, reopened] paths-ignore: - "README.md" - "LICENSE.md" - ".gitignore" - "renovate.json" - ".gitea/CODEOWNERS" - ".archive" jobs: ci: runs-on: ubuntu-latest steps: - name: Check out repository code uses: actions/checkout@v4.2.2 with: fetch-depth: 0 - name: Run Hadolint uses: hadolint/hadolint-action@v3.1.0 with: dockerfile: Dockerfile output-file: hadolint.out format: sonarqube no-fail: true - name: Setup Python uses: actions/setup-python@v5 with: python-version: "${{ vars.PYTHON_VERSION }}" - name: Ensure pipx is in PATH run: | pipx ensurepath export PATH=$PATH:/root/.local/bin - name: Setup Poetry uses: abatilo/actions-poetry@v4 # - name: Setup Poetry # run: | # pipx install poetry # echo $PIPX_BIN_DIR >> $GITEA_PATH - name: Setup virtual environment run: | source $HOME/.profile poetry config virtualenvs.create true --local poetry config virtualenvs.in-project true --local - uses: actions/cache@v4.2.0 name: Define cache for dependencies with: path: ./.venv key: venv-${{ hashFiles('poetry.lock') }} restore-keys: venv-${{ hashFiles('poetry.lock') }} - name: Install dependencies run: | source $HOME/.profile poetry install - name: Lint run: | source $HOME/.profile poetry run pylint --fail-under=8 --recursive=yes --output-format=parseable --output=lintreport.txt . cat lintreport.txt - name: Unit Test run: | source $HOME/.profile poetry run coverage run -m pytest -v --junitxml=testresults.xml poetry run coverage xml sed -i 's@${{ gitea.workspace }}@/github/workspace@g' coverage.xml - name: SonarQube Cloud Scan uses: SonarSource/sonarqube-scan-action@v4.2.1 env: SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }} - name: Snyk Vulnerability Scan uses: snyk/actions/python-3.10@master continue-on-error: true # To make sure that SARIF upload gets called env: SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }} with: args: --sarif-file-output=snyk.sarif --all-projects