-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
create and publish the docuemntation pages
See #31 @edwardtheharris - [email protected] Xander Harris Changelog: changed
- Loading branch information
1 parent
c26bd91
commit 9e4d75a
Showing
3 changed files
with
213 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,84 @@ | ||
### | ||
# ```{rubric} Bandit | ||
# ``` | ||
# --- | ||
# This workflow uses actions that are not certified by GitHub. | ||
# They are provided by a third-party and are governed by | ||
# separate terms of service, privacy policy, and support | ||
# documentation. | ||
# | ||
# Bandit is a security linter designed to find common security issues in Python code. | ||
# This action will run Bandit on your codebase. | ||
# The results of the scan will be found under the Security tab of your repository. | ||
# | ||
# [bandit-scan](https://github.com/marketplace/actions/bandit-scan) is ISC | ||
# licensed, by abirismyname | ||
# [bandit](https://pypi.org/project/bandit/) is Apache v2.0 licensed, by PyCQA | ||
# | ||
# ```{literalinclude} .github/workflows/bandit.yml | ||
# :language: yaml | ||
# :start-at: "name: Bandit\n" | ||
# :end-before: "###\n" | ||
# ``` | ||
name: Bandit | ||
permissions: | ||
contents: read | ||
on: | ||
push: | ||
branches: [ "main" ] | ||
pull_request: | ||
### | ||
# The branches below must be a subset of the branches above | ||
branches: [ "main" ] | ||
schedule: | ||
- cron: '32 4 * * 4' | ||
### | ||
# ```{rubric} Bandit Jobs | ||
# ``` | ||
# --- | ||
# Define the jobs necessary for a useful bandit run. | ||
# | ||
# ```{literalinclude} .github/workflows/bandit.yml | ||
# :language: yaml | ||
# :start-at: "jobs:\n" | ||
# ``` | ||
jobs: | ||
bandit: | ||
permissions: | ||
### | ||
# for actions/checkout to fetch code | ||
contents: read | ||
### | ||
# for github/codeql-action/upload-sarif to upload SARIF results | ||
security-events: write | ||
### | ||
# only required for a private repository by | ||
# github/codeql-action/upload-sarif to get the Action run status | ||
actions: read | ||
runs-on: ubuntu-latest | ||
steps: | ||
- uses: actions/checkout@main | ||
- name: Bandit Scan | ||
uses: shundor/python-bandit-scan@main | ||
### | ||
# optional arguments | ||
with: | ||
### | ||
# exit with 0, even with results found | ||
exit_zero: true # optional, default is DEFAULT | ||
### | ||
# File or directory to run bandit on | ||
# path: # optional, default is . | ||
# Report only issues of a given severity level or higher. Can be LOW, MEDIUM or HIGH. Default is UNDEFINED (everything) | ||
# level: # optional, default is UNDEFINED | ||
# Report only issues of a given confidence level or higher. Can be LOW, MEDIUM or HIGH. Default is UNDEFINED (everything) | ||
# confidence: # optional, default is UNDEFINED | ||
# comma-separated list of paths (glob patterns supported) to exclude from scan (note that these are in addition to the excluded paths provided in the config file) (default: .svn,CVS,.bzr,.hg,.git,__pycache__,.tox,.eggs,*.egg) | ||
# excluded_paths: # optional, default is DEFAULT | ||
# comma-separated list of test IDs to skip | ||
# skips: # optional, default is DEFAULT | ||
# path to a .bandit file that supplies command line arguments | ||
# ini_path: # optional, default is DEFAULT | ||
# Github token of the repository (automatically created by Github) | ||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} # Needed to get PR information. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,42 @@ | ||
on: ["push", "pull_request"] | ||
name: Test Coveralls | ||
jobs: | ||
build: | ||
name: Build | ||
runs-on: ubuntu-latest | ||
strategy: | ||
matrix: | ||
python-version: ["3.8", "3.9", "3.10", "3.11", "3.12"] | ||
steps: | ||
- uses: actions/checkout@main | ||
- name: Setup Python | ||
uses: actions/setup-python@main | ||
with: | ||
python-version: ${{ matrix.python-version }} | ||
- name: git config | ||
run: | | ||
git config user.username edwardtheharris | ||
git config user.name 'Xander Harris' | ||
git config user.email '[email protected]' | ||
git checkout -b 123-feature-branch-test | ||
- name: Install Dependencies | ||
run: | | ||
pip3 install -U pip pipenv | ||
pipenv requirements --dev > reqs | ||
pip3 install -r reqs | ||
pytest --cov | ||
- name: Coveralls | ||
uses: coverallsapp/github-action@v2 | ||
with: | ||
parallel: true | ||
flag-name: run-${{ matrix.python-version }} | ||
|
||
finish: | ||
needs: build | ||
runs-on: ubuntu-latest | ||
steps: | ||
- name: Close parallel build | ||
uses: coverallsapp/github-action@v1 | ||
with: | ||
parallel-finished: true | ||
carryforward: "run-3.8,run-3.9,run-3.10,run-3.11,run-3.12" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,87 @@ | ||
### | ||
# ```{rubric} OSSAR | ||
# ``` | ||
# --- | ||
# This workflow uses actions that are not certified by GitHub. | ||
# They are provided by a third-party and are governed by | ||
# separate terms of service, privacy policy, and support | ||
# documentation. | ||
# | ||
# This workflow integrates a collection of open source static analysis tools | ||
# with GitHub code scanning. For documentation, or to provide feedback, visit | ||
# https://github.com/github/ossar-action | ||
# | ||
# ```{literalinclude} .github/workflows/ossar.yml | ||
# :language: yaml | ||
# :start-at: "name: OSSAR\n" | ||
# :end-before: "###\n" | ||
# ``` | ||
name: OSSAR | ||
permissions: | ||
contents: read | ||
on: | ||
push: | ||
branches: [ "main" ] | ||
pull_request: | ||
### | ||
# The branches below must be a subset of the branches above | ||
branches: [ "main" ] | ||
schedule: | ||
- cron: '43 10 * * 4' | ||
### | ||
# ```{rubric} OSSAR Jobs | ||
# ``` | ||
# --- | ||
# Define the jobs necessary for a useful ossar run. | ||
# | ||
# ```{literalinclude} .github/workflows/ossar.yml | ||
# :language: yaml | ||
# :start-at: "jobs:\n" | ||
# ``` | ||
jobs: | ||
OSSAR-Scan: | ||
### | ||
# OSSAR runs on windows-latest. | ||
# ubuntu-latest and macos-latest support coming soon | ||
permissions: | ||
### | ||
# for actions/checkout to fetch code | ||
contents: read | ||
### | ||
# for github/codeql-action/upload-sarif to upload SARIF results | ||
security-events: write | ||
### | ||
# only required for a private repository by | ||
# github/codeql-action/upload-sarif to get the Action run status | ||
actions: read | ||
runs-on: windows-latest | ||
steps: | ||
- name: Checkout repository | ||
uses: actions/checkout@main | ||
### | ||
# Ensure a compatible version of dotnet is installed. | ||
# The [Microsoft Security Code Analysis CLI](https://aka.ms/mscadocs) | ||
# is built with dotnet v3.1.201. | ||
# A version greater than or equal to v3.1.201 of dotnet must be installed | ||
# on the agent in order to run this action. | ||
# GitHub hosted runners already have a compatible version of dotnet | ||
# installed and this step may be skipped. | ||
# For self-hosted runners, ensure dotnet version 3.1.201 or later is | ||
# installed by including this action: | ||
# ```{code-block} yaml | ||
# - name: Install .NET | ||
# uses: actions/setup-dotnet@v2 | ||
# with: | ||
# dotnet-version: '3.1.x' | ||
# ``` | ||
# | ||
# Run open source static analysis tools | ||
- name: Run OSSAR | ||
uses: github/ossar-action@main | ||
id: ossar | ||
### | ||
# Upload results to the Security tab | ||
- name: Upload OSSAR results | ||
uses: github/codeql-action/upload-sarif@main | ||
with: | ||
sarif_file: ${{ steps.ossar.outputs.sarifFile }} |