Skip to content

[WIP] [Workflow Interface] Refactor FLSpec and Runtime to enhance modularity #637

[WIP] [Workflow Interface] Refactor FLSpec and Runtime to enhance modularity

[WIP] [Workflow Interface] Refactor FLSpec and Runtime to enhance modularity #637

Workflow file for this run

name: OpenFL PR Pipeline
on:
pull_request:
types: [opened, synchronize, reopened, ready_for_review]
paths-ignore:
- '**.md'
- 'docs/**'
- '.dockerignore'
- '.gitattributes'
- '.gitignore'
- 'CITATION'
- 'CODEOWNERS'
workflow_dispatch:
concurrency:
group: ${{ github.workflow }}-${{ github.base_ref }}-${{ github.head_ref }}-${{ github.actor }}
cancel-in-progress: true
jobs:
bandit_code_scan:
name: Bandit Code Scan
# DO NOT remove the permissions block. Without this, these permissions are assumed as none in the called workflow and the workflow fails.
permissions:
contents: read # for actions/checkout to fetch code
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status
uses: ./.github/workflows/bandit.yml
check_code_format:
name: Check code format
uses: ./.github/workflows/lint.yml
docker_bench_security:
name: Docker Bench for Security
uses: ./.github/workflows/docker-bench-security.yml
fr_301_watermark_nb_run:
name: Federated Runtime Watermarking E2E
uses: ./.github/workflows/federated_runtime.yml
gandlf_taskrunner:
name: GaNDLF TaskRunner
uses: ./.github/workflows/gandlf.yml
hadolint_security_scan:
name: Hadolint Security Scan
uses: ./.github/workflows/hadolint.yml
pytest_coverage:
name: Pytest and code coverage
uses: ./.github/workflows/pytest_coverage.yml
windows:
name: Windows pytest coverage and workspace runs
uses: ./.github/workflows/windows.yml
task_runner_e2e:
name: TaskRunner E2E
uses: ./.github/workflows/task_runner_basic_e2e.yml
task_runner_e2e_resiliency:
name: TaskRunner E2E Resiliency
uses: ./.github/workflows/task_runner_e2e_resiliency.yml
tr_docker_gramine_direct:
name: TaskRunner (docker/gramine-direct)
uses: ./.github/workflows/tr_docker_gramine_direct.yml
tr_docker_native:
name: TaskRunner (docker/native)
uses: ./.github/workflows/tr_docker_native.yml
trivy_scan:
name: Trivy Scan
# DO NOT remove the permissions block. Without this, these permissions are assumed as none in the called workflow and the workflow fails.
permissions:
contents: read # for actions/checkout to fetch code
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status
uses: ./.github/workflows/trivy.yml
wf_functional_e2e:
name: Workflow Functional E2E
uses: ./.github/workflows/wf_functional_e2e.yml
workflow_interface_101_mnist:
name: Workflow Interface 101 MNIST Notebook
uses: ./.github/workflows/workflow_interface_101_mnist.yml
workflow_interface_tests:
name: Workflow Interface Tests
uses: ./.github/workflows/experimental_workflow_tests.yml