fix not enough general CVE Severity/Severity error fallback #4085
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Test | |
on: | |
push: | |
branches: | |
- master | |
pull_request: | |
merge_group: | |
jobs: | |
tests: | |
runs-on: ubuntu-latest | |
container: | |
# Docker-in-docker is not really necessary but helps the network | |
# communication between the runner and the services, and also makes | |
# it much simpler to transition from GitLab to GitHub as we use the | |
# same image and dependencies / setup as before, it should probably | |
# be revisited in the not-so-distant future | |
image: quay.io/fedora/fedora:latest | |
credentials: | |
username: ${{ secrets.QUAY_REGISTRY_USERNAME }} | |
password: ${{ secrets.QUAY_REGISTRY_TOKEN }} | |
services: | |
postgres: | |
image: registry.redhat.io/rhel8/postgresql-13:1 | |
env: | |
POSTGRESQL_ADMIN_PASSWORD: test | |
options: >- | |
--health-cmd pg_isready | |
--health-interval 10s | |
--health-timeout 5s | |
--health-retries 5 | |
credentials: | |
username: ${{ secrets.RH_REGISTRY_USERNAME }} | |
password: ${{ secrets.RH_REGISTRY_TOKEN }} | |
testldap: | |
image: quay.io/prodsecdev/openldap:2.5.7-debian-10-r57 | |
env: | |
LDAP_ROOT: dc=redhat,dc=com | |
LDAP_ADMIN_USERNAME: admin | |
LDAP_ADMIN_PASSWORD: adminpassword | |
credentials: | |
username: ${{ secrets.QUAY_REGISTRY_USERNAME }} | |
password: ${{ secrets.QUAY_REGISTRY_TOKEN }} | |
redis: | |
image: redis | |
steps: | |
- uses: actions/checkout@v4 | |
# This step is required in order to install python-ldap | |
# see https://github.com/python-ldap/python-ldap/issues/432 | |
- name: Fix installing python-ldap | |
run: echo "INPUT ( libldap.so )" > /usr/lib64/libldap_r.so | |
- name: Install required packages | |
run: > | |
dnf install -y | |
asciidoc | |
asciidoctor | |
bandit | |
cpio | |
dnf-plugins-core | |
enchant | |
findutils | |
gcc | |
git | |
krb5-devel | |
krb5-server | |
krb5-workstation | |
libcap-devel | |
make | |
openldap-clients | |
openldap-devel | |
openssh | |
openssh-clients | |
openssl-devel | |
postgresql-contrib | |
postgresql-devel | |
python-srpm-macros | |
python3-devel | |
python3-pycodestyle | |
python3-pylint | |
python3-pytest | |
python3-pytest-cov | |
python3.9 | |
python36 | |
python38 | |
redhat-rpm-config | |
rpm-build | |
rpmlint | |
rsync | |
tox | |
wget | |
which | |
- name: Setup PostgreSQL service | |
run: psql -f etc/pg/local-dev-app-user.sql postgres://postgres:test@postgres:5432/ | |
- name: Setup LDAP service | |
run: ldapadd -c -H "ldap://testldap:1389" -x -D "cn=admin,dc=redhat,dc=com" -w "adminpassword" -f etc/openldap/local-export.ldif || true | |
- name: Run OSIDB tests | |
env: | |
ET_URL: ${{ secrets.ET_URL }} | |
PRODUCT_DEF_URL: ${{ secrets.PRODUCT_DEF_URL }} | |
PS_CONSTANTS_URL: ${{ secrets.PS_CONSTANTS_URL }} | |
HTTPS_TASKMAN_PROXY: ${{ secrets.HTTPS_TASKMAN_PROXY }} | |
JIRA_TASKMAN_URL: ${{ secrets.JIRA_TASKMAN_URL }} | |
JIRA_TASKMAN_PROJECT_KEY: ${{ secrets.JIRA_TASKMAN_PROJECT_KEY }} | |
run: tox -e ci-osidb |