feat(repo): migrate to Gitea #300

Merged
luke merged 12 commits from gitea into main 2025-01-17 00:30:02 +01:00
Showing only changes of commit e5538af7a4 - Show all commits

View File

@ -7,6 +7,9 @@ on:
- synchronize - synchronize
- reopened - reopened
env:
PATH: ${{ env.PATH }}:/root/.poetry/bin
jobs: jobs:
validate_pr_title: validate_pr_title:
uses: https://git.tainton.uk/actions/gha-workflows/.gitea/workflows/conventional-commit.yml@main uses: https://git.tainton.uk/actions/gha-workflows/.gitea/workflows/conventional-commit.yml@main
@ -14,9 +17,63 @@ jobs:
commit_message: ${{ gitea.event.pull_request.title }} commit_message: ${{ gitea.event.pull_request.title }}
ci: ci:
uses: https://git.tainton.uk/actions/gha-workflows/.gitea/workflows/ci-python-poetry-with-docker.yml@main runs-on: ubuntu-latest
steps:
- name: Check out repository code
uses: actions/checkout@v4.2.2
with: with:
python-version: 3.13 fetch-depth: 0
secrets:
- uses: hadolint/hadolint-action@v3.1.0
with:
dockerfile: Dockerfile
output-file: hadolint.out
format: sonarqube
no-fail: true
- name: Setup Python
uses: actions/setup-python@v5
with:
python-version: 3.11
- name: Setup Poetry
uses: abatilo/actions-poetry@v4
- name: Setup virtual environment
run: |
poetry config virtualenvs.create true --local
poetry config virtualenvs.in-project true --local
- uses: actions/cache@v4
name: Define cache for dependencies
with:
path: ./.venv
key: venv-${{ hashFiles('poetry.lock') }}
restore-keys: venv-${{ hashFiles('poetry.lock') }}
- name: Install dependencies
run: poetry install
- name: Lint
run: |
poetry run pylint --fail-under=8 --recursive=yes --output-format=parseable --output=lintreport.txt .
cat lintreport.txt
- name: Unit Test
run: |
poetry run coverage run -m pytest -v --junitxml=testresults.xml
poetry run coverage xml
sed -i 's@${{ gitea.workspace }}@/github/workspace@g' coverage.xml
- name: SonarQube Cloud Scan
uses: SonarSource/sonarqube-scan-action@v4.2.1
env:
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }} SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}
- name: Snyk Vulnerability Scan
uses: snyk/actions/python@master
continue-on-error: true # Sometimes vulns aren't immediately fixable
env:
SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }} SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }}
with:
args: test --all-projects