Skip to content

ci: security check for py-api client #1

ci: security check for py-api client

ci: security check for py-api client #1

Workflow file for this run

name: Python-api QA (Security & Style)
# Trigger the workflow on every push
on: [push]
jobs:
quality-assurance:
runs-on: ubuntu-latest
steps:
- name: Checkout code
uses: actions/checkout@v4
- name: Set up Python
uses: actions/setup-python@v4
with:
python-version: '3.9'
- name: Install dependencies
run: |
# Upgrade pip and install security/linting tools
python -m pip install --upgrade pip
pip install bandit detect-secrets flake8 flake8-json ruff
- name: Run Bandit (Security Scan)
# Scan the mergin folder for vulnerabilities, excluding the test directory
run: bandit -r ./mergin/ -ll --exclude ./mergin/test
- name: Run Detect Secrets
# Scan the plugin directory for hardcoded secrets/credentials
run: detect-secrets scan ./mergin/ --all-files
- name: Run Ruff (Linting)
# Excluding mergin/test
run: ruff check ./mergin/ --line-length 120 --exclude mergin/test
- name: Run Flake8 (Style Check)
# Style enforcement using MerginMaps standards
# Ignoring E501 (line length) and W503 (operator line breaks)
run: |
flake8 ./mergin/ --max-line-length=120 --ignore=E501,W503 --exclude=test