Python Github Action Workflow Templates
This template repository contains recommended github action workflows for Python based applications.
What Workflows are included?
- CodeQL Analysis
- CodeQL Report
- Python Build
- Docker Build/Publish -docker-build
- Prerequistes/Configuration Required
- Trivy Container Scan
- Dependabot Configuration
- Semantic Pull Request
- Description
codeql-analysis.yml
CodeQL Analysis - Description
Used for static code analysis. See https://codeql.github.com/ for more information.
codeql-report.yml
CodeQL Report - Prerequistes/Configuration Required
- A Github Secret called
SECURITY_TOKEN
populated with a Github PAT is required with scopes ofpublic_repo
andsecurity_events
.
Description
Used for automatically uploading CodeQL Analysis to Github Artifacts. Useful for providing evidence of scans.
python.yml
Python Build - Description
This is the main file for Python builds. This is a matrixed build, meaning it will simultaneously run the steps on multiple versions of Python. For example 3.7,3.8,3.9,3.10,3.11 of Python. We do this to ensure compability with the Python versions.
The build includes the following tasks:
- Linting with Ruff
- Running Unit Tests
- Uploading Test Results
- Uploading Code Coverage results using codecov.io
docker-build.yml
Docker Build/Publish -Prerequistes/Configuration Required
The following files must be available in your repository:
Dockerfile
- contains the instructions for building the Docker imagedocker-compose.yml
(optional) - if you are using docker-compose for multi-container Docker applications You should also have your container registry username and password stored as GitHub Secrets asDOCKER_USERNAME
andDOCKER_PASSWORD
. This allows the GitHub Actions to push the Docker image to your container repository.
Ensure the registry of your choice and the app name is specified in the defaults:
...
inputs:
docker_registry:
description: 'Registry URL'
required: true
default: 'docker.io/username' # update to your private registry
image_name:
description: 'Name you wish to use on the docker image (ex. myapp). This will be tagged with :latest, and the git sha'
required: true
default: 'app' # update to your app name
Description
This workflow builds a Docker image from the Dockerfile in your repository, and then pushes that image to a specified container registry.
The build and publish includes the following tasks:
- Building the Docker image
- Logging in to DockerHub
- Tagging the Docker image with the commit hash and 'latest' tag
- Pushing the Docker image to DockerHub
trivy-scan.yml
Trivy Container Scan - Prerequistes/Configuration Required
Ensure a Dockerfile
is available to build and provide to trivvy.
Description
Trivy is a comprehensive open-source vulnerability scanner for containers. It detects vulnerabilities in OS packages (Alpine, RHEL, CentOS, etc.) and application dependencies (NPM, pip, etc.). This GitHub Actions workflow uses Trivy to scan your Docker image for any known vulnerabilities and provides a report which can be viewed directly in the GitHub Actions interface.
dependabot.yml
Dependabot Configuration - Prerequistes/Configuration Required
No specific configuration is required for this workflow to run. However, you need to ensure that your project has a valid package.json file, as Dependabot relies on it to check for outdated dependencies. Optionally, you may change the schedule as needed from daily to something else.
Description
Dependabot is a tool that checks your project dependencies for any known security vulnerabilities or updates. It can automatically create pull requests to update your dependencies to the latest versions. This GitHub Actions workflow configures Dependabot for your Python project. It is highly recommended to keep your dependencies up to date not just to benefit from the latest features and improvements, but also to avoid potential security risks associated with outdated packages.
The Dependabot Configuration includes the following tasks:
- Daily check for outdated packages
- Automatic pull request creation for outdated packages
- Optional automatic merge for minor and patch updates of packages
- Security advisories notifications for packages.
semantic.yml
Semantic Pull Request - Prerequistes/Configuration Required
The following files must be available in your repository:
commitlint.config.js
- configuration file for CommitLint which contains the rules for commit messages. You can customize the list of allowed scopes in the scope-enum
rule:
'scope-enum': [
2,
'always',
[] // add scopes here to enforce when scope is provided (ex. ['core','api','startup'])
]
Description
The Semantic Pull Request workflow enforces a set of standards as defined by conventional commits for all pull requests and commit messages in your repository. It helps ensure that your project maintains a consistent and clean commit history. The standards are documented here https://www.conventionalcommits.org/en/v1.0.0/
This GitHub Actions workflow is triggered whenever a pull request is opened, edited, reopened, or synchronized. It uses the CommitLint tool to validate the commit messages and pull request title against the rules defined in your commitlint.config.js file.