Skip to content

Commit

Permalink
create and publish the docuemntation pages
Browse files Browse the repository at this point in the history
See #31

@edwardtheharris - [email protected]

Xander Harris

Changelog: changed
  • Loading branch information
edwardtheharris committed Mar 13, 2024
1 parent c26bd91 commit 9e4d75a
Show file tree
Hide file tree
Showing 3 changed files with 213 additions and 0 deletions.
84 changes: 84 additions & 0 deletions .github/workflows/bandit.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,84 @@
###
# ```{rubric} Bandit
# ```
# ---
# This workflow uses actions that are not certified by GitHub.
# They are provided by a third-party and are governed by
# separate terms of service, privacy policy, and support
# documentation.
#
# Bandit is a security linter designed to find common security issues in Python code.
# This action will run Bandit on your codebase.
# The results of the scan will be found under the Security tab of your repository.
#
# [bandit-scan](https://github.com/marketplace/actions/bandit-scan) is ISC
# licensed, by abirismyname
# [bandit](https://pypi.org/project/bandit/) is Apache v2.0 licensed, by PyCQA
#
# ```{literalinclude} .github/workflows/bandit.yml
# :language: yaml
# :start-at: "name: Bandit\n"
# :end-before: "###\n"
# ```
name: Bandit
permissions:
contents: read
on:
push:
branches: [ "main" ]
pull_request:
###
# The branches below must be a subset of the branches above
branches: [ "main" ]
schedule:
- cron: '32 4 * * 4'
###
# ```{rubric} Bandit Jobs
# ```
# ---
# Define the jobs necessary for a useful bandit run.
#
# ```{literalinclude} .github/workflows/bandit.yml
# :language: yaml
# :start-at: "jobs:\n"
# ```
jobs:
bandit:
permissions:
###
# for actions/checkout to fetch code
contents: read
###
# for github/codeql-action/upload-sarif to upload SARIF results
security-events: write
###
# only required for a private repository by
# github/codeql-action/upload-sarif to get the Action run status
actions: read
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@main
- name: Bandit Scan
uses: shundor/python-bandit-scan@main
###
# optional arguments
with:
###
# exit with 0, even with results found
exit_zero: true # optional, default is DEFAULT
###
# File or directory to run bandit on
# path: # optional, default is .
# Report only issues of a given severity level or higher. Can be LOW, MEDIUM or HIGH. Default is UNDEFINED (everything)
# level: # optional, default is UNDEFINED
# Report only issues of a given confidence level or higher. Can be LOW, MEDIUM or HIGH. Default is UNDEFINED (everything)
# confidence: # optional, default is UNDEFINED
# comma-separated list of paths (glob patterns supported) to exclude from scan (note that these are in addition to the excluded paths provided in the config file) (default: .svn,CVS,.bzr,.hg,.git,__pycache__,.tox,.eggs,*.egg)
# excluded_paths: # optional, default is DEFAULT
# comma-separated list of test IDs to skip
# skips: # optional, default is DEFAULT
# path to a .bandit file that supplies command line arguments
# ini_path: # optional, default is DEFAULT
# Github token of the repository (automatically created by Github)
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} # Needed to get PR information.

42 changes: 42 additions & 0 deletions .github/workflows/coveralls.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,42 @@
on: ["push", "pull_request"]
name: Test Coveralls
jobs:
build:
name: Build
runs-on: ubuntu-latest
strategy:
matrix:
python-version: ["3.8", "3.9", "3.10", "3.11", "3.12"]
steps:
- uses: actions/checkout@main
- name: Setup Python
uses: actions/setup-python@main
with:
python-version: ${{ matrix.python-version }}
- name: git config
run: |
git config user.username edwardtheharris
git config user.name 'Xander Harris'
git config user.email '[email protected]'
git checkout -b 123-feature-branch-test
- name: Install Dependencies
run: |
pip3 install -U pip pipenv
pipenv requirements --dev > reqs
pip3 install -r reqs
pytest --cov
- name: Coveralls
uses: coverallsapp/github-action@v2
with:
parallel: true
flag-name: run-${{ matrix.python-version }}

finish:
needs: build
runs-on: ubuntu-latest
steps:
- name: Close parallel build
uses: coverallsapp/github-action@v1
with:
parallel-finished: true
carryforward: "run-3.8,run-3.9,run-3.10,run-3.11,run-3.12"
87 changes: 87 additions & 0 deletions .github/workflows/ossar.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,87 @@
###
# ```{rubric} OSSAR
# ```
# ---
# This workflow uses actions that are not certified by GitHub.
# They are provided by a third-party and are governed by
# separate terms of service, privacy policy, and support
# documentation.
#
# This workflow integrates a collection of open source static analysis tools
# with GitHub code scanning. For documentation, or to provide feedback, visit
# https://github.com/github/ossar-action
#
# ```{literalinclude} .github/workflows/ossar.yml
# :language: yaml
# :start-at: "name: OSSAR\n"
# :end-before: "###\n"
# ```
name: OSSAR
permissions:
contents: read
on:
push:
branches: [ "main" ]
pull_request:
###
# The branches below must be a subset of the branches above
branches: [ "main" ]
schedule:
- cron: '43 10 * * 4'
###
# ```{rubric} OSSAR Jobs
# ```
# ---
# Define the jobs necessary for a useful ossar run.
#
# ```{literalinclude} .github/workflows/ossar.yml
# :language: yaml
# :start-at: "jobs:\n"
# ```
jobs:
OSSAR-Scan:
###
# OSSAR runs on windows-latest.
# ubuntu-latest and macos-latest support coming soon
permissions:
###
# for actions/checkout to fetch code
contents: read
###
# for github/codeql-action/upload-sarif to upload SARIF results
security-events: write
###
# only required for a private repository by
# github/codeql-action/upload-sarif to get the Action run status
actions: read
runs-on: windows-latest
steps:
- name: Checkout repository
uses: actions/checkout@main
###
# Ensure a compatible version of dotnet is installed.
# The [Microsoft Security Code Analysis CLI](https://aka.ms/mscadocs)
# is built with dotnet v3.1.201.
# A version greater than or equal to v3.1.201 of dotnet must be installed
# on the agent in order to run this action.
# GitHub hosted runners already have a compatible version of dotnet
# installed and this step may be skipped.
# For self-hosted runners, ensure dotnet version 3.1.201 or later is
# installed by including this action:
# ```{code-block} yaml
# - name: Install .NET
# uses: actions/setup-dotnet@v2
# with:
# dotnet-version: '3.1.x'
# ```
#
# Run open source static analysis tools
- name: Run OSSAR
uses: github/ossar-action@main
id: ossar
###
# Upload results to the Security tab
- name: Upload OSSAR results
uses: github/codeql-action/upload-sarif@main
with:
sarif_file: ${{ steps.ossar.outputs.sarifFile }}

0 comments on commit 9e4d75a

Please sign in to comment.