|
6 | 6 | workflows: ["build"] |
7 | 7 | types: |
8 | 8 | - completed |
| 9 | + - success |
9 | 10 |
|
10 | 11 | env: |
11 | 12 | ACCOUNT: ${{ github.repository_owner }} |
|
14 | 15 |
|
15 | 16 | jobs: |
16 | 17 |
|
17 | | - unit-test: |
| 18 | + dummy: |
18 | 19 | runs-on: ubuntu-latest |
19 | | - container: |
20 | | - image: ghcr.io/mapattacker/github-workflow-sample |
21 | | - credentials: |
22 | | - username: $ACCOUNT |
23 | | - password: ${{ secrets.GITHUB_TOKEN }} |
24 | 20 | steps: |
25 | | - - uses: actions/checkout@v3 |
26 | | - - name: run tests |
27 | | - run: pytest --cov=project/ tests/unit_tests/ -v |
28 | | - |
29 | | - |
30 | | - # ----------- SECURITY SCANS ----------- # |
31 | | - |
32 | | - secrets-scan: |
33 | | - runs-on: ubuntu-latest |
34 | | - steps: |
35 | | - - uses: actions/checkout@v3 |
36 | | - with: |
37 | | - fetch-depth: 0 |
38 | | - - name: run secrets scan |
39 | | - uses: gitleaks/gitleaks-action@v2 |
40 | | - env: |
41 | | - GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} |
42 | | - |
43 | | - sast-scan: |
44 | | - runs-on: ubuntu-latest |
45 | | - steps: |
46 | | - - uses: actions/checkout@v3 |
47 | | - - name: run sast scan |
48 | | - uses: AppThreat/sast-scan-action@master |
49 | | - with: |
50 | | - output: reports |
51 | | - type: python |
52 | | - |
53 | | - dependency-scan: |
54 | | - runs-on: ubuntu-latest |
55 | | - container: |
56 | | - image: ghcr.io/mapattacker/github-workflow-sample |
57 | | - credentials: |
58 | | - username: $ACCOUNT |
59 | | - password: ${{ secrets.GITHUB_TOKEN }} |
60 | | - steps: |
61 | | - - name: run dependency scan |
62 | | - run: safety check |
63 | | - |
64 | | - license-scan: |
65 | | - runs-on: ubuntu-latest |
66 | | - container: |
67 | | - image: ghcr.io/mapattacker/github-workflow-sample |
68 | | - credentials: |
69 | | - username: $ACCOUNT |
70 | | - password: ${{ secrets.GITHUB_TOKEN }} |
71 | | - steps: |
72 | | - - name: generate consolidated requirements |
73 | | - run: pip freeze > requirements-all.txt |
74 | | - - name: run license scan |
75 | | - id: license_check_report |
76 | | - uses: pilosus/action-pip-license-checker@v2 |
77 | | - with: |
78 | | - requirements: 'requirements-all.txt' |
79 | | - fail: 'StrongCopyleft,NetworkCopyleft,Other,Error' |
80 | | - - name: Print report |
81 | | - if: ${{ always() }} |
82 | | - run: echo "${{ steps.license_check_report.outputs.report }}" |
83 | | - |
| 21 | + - run: echo "hello" |
0 commit comments