Skip to content

Bump github/codeql-action from 3.28.17 to 3.29.5 #175

Bump github/codeql-action from 3.28.17 to 3.29.5

Bump github/codeql-action from 3.28.17 to 3.29.5 #175

Workflow file for this run

name: Build
on:
push:
branches:
- main
pull_request:
permissions:
contents: read
jobs:
build:
permissions:
contents: read # for actions/checkout to fetch code
pull-requests: read # for SonarSource/sonarcloud-github-action to determine which PR to decorate
name: Build
strategy:
matrix:
python-version: [ "3.11", "3.12", "3.13" ]
runs-on: ubuntu-latest
steps:
- name: Harden Runner
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
with:
egress-policy: audit
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
with:
fetch-depth: 0 # Shallow clones should be disabled for a better relevancy of analysis
- name: Set up Python ${{ matrix.python-version }}
uses: actions/setup-python@a26af69be951a213d495a4c3e4e4022e16d87065 # v5.6.0
with:
python-version: ${{ matrix.python-version }}
- name: Set poetry
uses: abatilo/actions-poetry@0dd19c9498c3dc8728967849d0d2eae428a8a3d8 # v4
with:
poetry-version: '2.1.2'
- name: Setup environment
run: poetry install
- name: Run Tests
run: |
poetry run pytest --cov blitzortung --cov-report xml --cov-report term --junitxml=junit.xml tests
- name: Build
run: |
poetry build
- name: SonarCloud Scan
if: matrix.python-version == '3.12'
uses: SonarSource/sonarqube-scan-action@v5.1.0
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} # Needed to get PR information, if any
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}