Starcraft team GHA Workflows
Some of these automations are provided as Reusable workflows.
For these workflows, you can embed them in a workflow you run at the job
level.
Examples are provided below.
The lint workflow installs and runs the relevant linters for the repository. It expects the following
make
targets:
setup-lint
: Installs relevant linters (only needs to work on Ubuntu)lint
: Runs relevant linters
An example workflow:
name: QA
on:
push:
branches:
- "main"
- "feature/*"
- "hotfix/*"
- "release/*"
- "renovate/*"
pull_request:
jobs:
lint:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: lengau/starflow/lint@work/CRAFT-3602/test-workflows
The policy check workflow checks that contributions to the project follow both Canonical corporate policy and team policy. It checks:
- That the user has signed the Canonical CLA
- That commits follow Starcraft team standards using Conventional Commits
An example workflow that uses this reusable workflow:
name: Check policy
on:
pull_request:
jobs:
policy:
uses: canonical/starflow/.github/workflows/policy.yaml@main
The Python security scanner workflow uses several tools (trivy, osv-scanner) to scan a Python project for security issues. It does the following:
- Creates a wheel of the project.
- Exports a
uv.lock
file (if present in the project) as two requirements files: a.requirements.txt
with no extras b.requirements-all.txt
with all available extras
If there are any existing requirements*.txt
files in your project, it will scan those
below too.
With Trivy, it:
- Scans the requirements files
- Scans the wheel file(s)
- Scans the project directory
- Installs each combination of (requirements, wheel) in a virtual environment and scans that environment.
With OSV-scanner it:
- Scans the requirements files
- Scans the project directory
An example workflow for your own Python project that will use this workflow:
name: Security scan
on:
pull_request:
push:
branches:
- main
- hotfix/*
jobs:
python-scans:
name: Scan Python project
uses: canonical/starflow/.github/workflows/scan-python.yaml@main
with:
# Additional packages to install on the Ubuntu runners for building
packages: python-apt-dev cargo
# Additional arguments to `find` when finding requirements files.
# This example ignores 'requirements-noble.txt'
requirements-find-args: "! -name requirements-noble.txt"
# Additional arguments to pass to osv-scanner.
# This example adds configuration from your project.
osv-extra-args: "--config=source/osv-scanner.toml"
# Use the standard extra args and ignore spread tests
trivy-extra-args: '--severity HIGH,CRITICAL --ignore-unfixed --skip-dirs "tests/spread/**"'
The Go security scanner workflow uses several tools (trivy, osv-scanner) to scan a Go project for security issues.
An example workflow for your own Go project that will use this workflow:
name: Security scan
on:
pull_request:
push:
branches:
- main
- hotfix/*
jobs:
go-scans:
name: Scan Go project
uses: canonical/starflow/.github/workflows/scan-golang.yaml@main
with:
# Additional packages to install on the Ubuntu runners for building
packages: protoc-gen-go-1-3
# Additional arguments to pass to osv-scanner.
# This example adds configuration from your project.
osv-extra-args: "--config=.osv-scanner.toml"
# Use the standard extra args and ignore spread tests
trivy-extra-args: '--skip-dirs "tests/spread/**"'
The Python test runner workflow uses GitHub workflows and uv
to run Python tests in
several forms. It:
- Runs fast tests across multiple platforms and Python versions.
- Runs all tests on Ubuntu with the oldest supported python version and uv resolution
set to
lowest
. - Runs slow tests across their own set of platforms and Python versions.
- Uploads test coverage for tests as artefacts.
In order to do so, it expects the following make
targets:
setup-tests
: Configures the system, installing any other necessary tools.test-coverage
: Runs tests with test coverage. Fast and slow tests will use thePYTEST_ADDOPTS
environment variable to run with or without theslow
mark.
Because we use the snaps of codespell, ruff and shellcheck frequently, this workflow installs those as well as uv.
An example workflow:
name: Test Python
on:
pull_request:
jobs:
test:
uses: canonical/starflow/.github/workflows/test-python.yaml@main