fix(ci): re-enable Snyk
Some checks failed
Validate PR Title / validate (pull_request) Successful in 9s
CI / ci (pull_request) Failing after 1m7s

This commit is contained in:
Luke Tainton 2025-05-31 11:16:44 +01:00
parent aa3c5fbf1f
commit aa71f71bfb
Signed by: luke
SSH Key Fingerprint: SHA256:D34npKT7UaiT/7gULqu7EPSLWWVAjTjXf4kKfJ/fQBo
3 changed files with 45 additions and 34 deletions

View File

@ -41,6 +41,9 @@ jobs:
- name: Install dependencies
run: uv sync
- name: Check Import Sorting
run: uv run isort --check app/ tests/
- name: Lint
run: |
uv run pylint --fail-under=8 --recursive=yes --output-format=parseable --output=lintreport.txt app/ tests/
@ -61,32 +64,44 @@ jobs:
# SONAR_HOST_URL: ${{ secrets.SONARQUBE_HOST_URL }}
# SONAR_TOKEN: ${{ secrets.SONARQUBE_TOKEN }}
# - name: Snyk Vulnerability Scan
# uses: snyk/actions/python@master
# continue-on-error: true # Sometimes vulns aren't immediately fixable
# env:
# SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }}
- name: Create requirements.txt for Snyk
run: |
uv pip freeze > requirements.txt
- name: Snyk SAST Scan
uses: snyk/actions/python@master
env:
SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }}
with:
command: snyk
args: code test --exclude=.archive
- name: Snyk Vulnerability Scan
uses: snyk/actions/python@master
continue-on-error: true # Sometimes vulns aren't immediately fixable
env:
SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }}
with:
command: snyk
args: test --all-projects --exclude=.archive
# - name: Trivy Setup
# uses: aquasecurity/setup-trivy@v0.2.0
# with:
# command: snyk
# args: test --all-projects
# cache: true
# version: v0.61.1
- name: Manual Trivy Setup
uses: aquasecurity/setup-trivy@v0.2.0
with:
cache: true
version: v0.61.1
- name: Trivy Vulnerability Scan
uses: aquasecurity/trivy-action@master
with:
skip-setup-trivy: true
scan-type: "fs"
scan-ref: "${{ gitea.workspace }}"
exit-code: "1"
ignore-unfixed: true
format: "table"
severity: "CRITICAL,HIGH,MEDIUM"
scanners: "vuln,secret,misconfig,license"
# - name: Trivy Vulnerability Scan
# uses: aquasecurity/trivy-action@master
# with:
# skip-setup-trivy: true
# scan-type: "fs"
# scan-ref: "${{ gitea.workspace }}"
# exit-code: "1"
# ignore-unfixed: true
# format: "table"
# severity: "CRITICAL,HIGH,MEDIUM"
# scanners: "vuln,secret,misconfig,license"
# - name: Trivy Vulnerability Scan (Docker)
# uses: aquasecurity/trivy-action@master

4
.gitignore vendored
View File

@ -27,6 +27,7 @@ share/python-wheels/
*.egg
MANIFEST
.pdm-build/
requirements*.txt
# PyInstaller
# Usually these files are written by a python script from a template
@ -136,3 +137,6 @@ dmypy.json
# IDE
.vscode
.idea
# Other
.dccache

View File

@ -4,16 +4,8 @@ import logging
from webex_bot.models.command import Command
from webex_bot.models.response import Response, response_from_adaptive_card
from webexpythonsdk.models.cards import (
AdaptiveCard,
Column,
ColumnSet,
Date,
FontSize,
FontWeight,
Text,
TextBlock,
)
from webexpythonsdk.models.cards import (AdaptiveCard, Column, ColumnSet, Date,
FontSize, FontWeight, Text, TextBlock)
from webexpythonsdk.models.cards.actions import Submit
from app.utils.config import config