ci: fix warnings reported by yamllint

This commit is contained in:
alexey.lysiuk 2022-07-02 11:01:25 +03:00
parent 558129a734
commit 913b5fa60a
3 changed files with 43 additions and 31 deletions

View file

@ -1,3 +1,4 @@
---
name: Build Targets
on: [push, pull_request]
@ -34,3 +35,4 @@ jobs:
run: |
git status
ls -lR .
...

View file

@ -1,3 +1,4 @@
---
name: Lint Code
on: [push, pull_request]
@ -21,9 +22,16 @@ jobs:
- name: Bandit
run: |
pip3 install bandit
# [B101:assert_used] Use of assert detected. The enclosed code will be removed when compiling to optimised byte code.
# [B310:blacklist] Audit url open for permitted schemes. Allowing use of file:/ or custom schemes is often unexpected.
# [B404:blacklist] Consider possible security implications associated with subprocess module.
# [B603:subprocess_without_shell_equals_true] subprocess call - check for execution of untrusted input.
# [B607:start_process_with_partial_path] Starting a process with a partial executable path
bandit --skip B101,B310,B404,B603,B607 --recursive . --exclude ./deps/vulkan-headers/share/vulkan/registry
# [B101:assert_used] Use of assert detected. The enclosed code will be
# removed when compiling to optimised byte code.
# [B310:blacklist] Audit url open for permitted schemes. Allowing use
# of file:/ or custom schemes is often unexpected.
# [B404:blacklist] Consider possible security implications associated
# with subprocess module.
# [B603:subprocess_without_shell_equals_true] subprocess call - check
# for execution of untrusted input.
# [B607:start_process_with_partial_path] Starting a process with a
# partial executable path
bandit --skip B101,B310,B404,B603,B607 --recursive . --exclude \
./deps/vulkan-headers/share/vulkan/registry
...

View file

@ -1,3 +1,4 @@
---
name: Test Libraries
on: [push, pull_request]
@ -12,3 +13,4 @@ jobs:
- name: Run tests
run: |
./build.py --target=test-deps
...