GitLab CI template for Python
This project implements a GitLab CI/CD template to build, test and analyse your Python projects.
Usage
This template can be used both as a CI/CD component
or using the legacy include:project
syntax.
Use as a CI/CD component
Add the following to your gitlab-ci.yml
:
include:
# 1: include the component
- component: gitlab.com/to-be-continuous/python/gitlab-ci-python@6.8.1
# 2: set/override component inputs
inputs:
image: registry.hub.docker.com/library/python:3.10
pytest-enabled: true
Use as a CI/CD template (legacy)
Add the following to your gitlab-ci.yml
:
include:
# 1: include the template
- project: 'to-be-continuous/python'
ref: '6.8.1'
file: '/templates/gitlab-ci-python.yml'
variables:
# 2: set/override template variables
PYTHON_IMAGE: registry.hub.docker.com/library/python:3.10
PYTEST_ENABLED: "true"
Global configuration
The Python template uses some global configuration used throughout all jobs.
Input / Variable | Description | Default value |
---|---|---|
image / PYTHON_IMAGE
|
The Docker image used to run Python ⚠️ set the version required by your project |
registry.hub.docker.com/library/python:3 |
project-dir / PYTHON_PROJECT_DIR
|
Python project root directory | . |
build-system / PYTHON_BUILD_SYSTEM
|
Python build-system to use to install dependencies, build and package the project (see below) |
auto (auto-detect) |
PIP_INDEX_URL |
Python repository url | none |
PIP_EXTRA_INDEX_URL |
Extra Python repository url | none |
pip-opts / PIP_OPTS
|
pip extra options | none |
extra-deps / PYTHON_EXTRA_DEPS
|
Python extra sets of dependencies to install For Setuptools or Poetry only |
none |
reqs-file / PYTHON_REQS_FILE
|
Main requirements file (relative to $PYTHON_PROJECT_DIR )For Requirements Files build-system only |
requirements.txt |
extra-reqs-files / PYTHON_EXTRA_REQS_FILES
|
Extra dev requirements file(s) to install (relative to $PYTHON_PROJECT_DIR )
|
requirements-dev.txt |
The cache policy also makes the necessary to manage pip cache (not to download Python dependencies over and over again).
Multi build-system support
The Python template supports the most popular dependency management & build systems.
By default it tries to auto-detect the build system used by the project (based on the presence of pyproject.toml
and/or setup.py
and/or requirements.txt
), but the build system might also be set explicitly using the
$PYTHON_BUILD_SYSTEM
variable:
Value | Build System (scope) |
---|---|
none (default) or auto
|
The template tries to auto-detect the actual build system |
setuptools |
Setuptools (dependencies, build & packaging) |
poetry |
Poetry (dependencies, build, test & packaging) |
pipenv |
Pipenv (dependencies only) |
reqfile |
Requirements Files (dependencies only) |
⚠️ You can explicitly set the build tool version by setting $PYTHON_BUILD_SYSTEM
variable including a version identification. For example PYTHON_BUILD_SYSTEM="poetry==1.1.15"
Jobs
py-package
job
This job allows building your Python project distribution packages.
It is bound to the build
stage, it is disabled by default and can be enabled by setting $PYTHON_PACKAGE_ENABLED
to true
.
Lint jobs
py-lint
job
This job is disabled by default and performs code analysis based on pylint Python lib.
It is activated by setting $PYLINT_ENABLED
to true
.
It is bound to the build
stage, and uses the following variables:
Input / Variable | Description | Default value |
---|---|---|
pylint-args / PYLINT_ARGS
|
Additional pylint CLI options | none |
pylint-files / PYLINT_FILES
|
Files or directories to analyse | none (by default analyses all found python source files) |
In addition to a textual report in the console, this job produces the following reports, kept for one day:
Report | Format | Usage |
---|---|---|
$PYTHON_PROJECT_DIR/reports/py-lint.codeclimate.json |
Code Climate | GitLab integration |
$PYTHON_PROJECT_DIR/reports/py-lint.parseable.txt |
parseable | SonarQube integration |
Test jobs
The Python template features four alternative test jobs:
-
py-unittest
that performs tests based on unittest Python lib, - or
py-pytest
that performs tests based on pytest Python lib, - or
py-nosetest
that performs tests based on nose Python lib, - or
py-compile
that performs byte code generation to check syntax if not tests are available.
py-unittest
job
This job is disabled by default and performs tests based on unittest Python lib.
It is activated by setting $UNITTEST_ENABLED
to true
.
In order to produce JUnit test reports, the tests are executed with the xmlrunner module.
It is bound to the build
stage, and uses the following variables:
Input / Variable | Description | Default value |
---|---|---|
unittest-args / UNITTEST_ARGS
|
Additional xmlrunner/unittest CLI options | none |
ℹ️ use a .coveragerc
file at the root of your Python project to control the coverage settings.
Example:
[run]
# enables branch coverage
branch = True
# list of directories/packages to cover
source =
module_1
module_2
In addition to a textual report in the console, this job produces the following reports, kept for one day:
Report | Format | Usage |
---|---|---|
$PYTHON_PROJECT_DIR/reports/TEST-*.xml |
xUnit test report(s) | GitLab integration & SonarQube integration |
$PYTHON_PROJECT_DIR/reports/py-coverage.cobertura.xml |
Cobertura XML coverage report | GitLab integration & SonarQube integration |
py-pytest
job
This job is disabled by default and performs tests based on pytest Python lib.
It is activated by setting $PYTEST_ENABLED
to true
.
It is bound to the build
stage, and uses the following variables:
Input / Variable | Description | Default value |
---|---|---|
pytest-args / PYTEST_ARGS
|
Additional pytest or pytest-cov CLI options | none |
ℹ️ use a .coveragerc
file at the root of your Python project to control the coverage settings.
Example:
[run]
# enables branch coverage
branch = True
# list of directories/packages to cover
source =
module_1
module_2
In addition to a textual report in the console, this job produces the following reports, kept for one day:
Report | Format | Usage |
---|---|---|
$PYTHON_PROJECT_DIR/reports/TEST-*.xml |
xUnit test report(s) | GitLab integration & SonarQube integration |
$PYTHON_PROJECT_DIR/reports/py-coverage.cobertura.xml |
Cobertura XML coverage report | GitLab integration & SonarQube integration |
py-nosetests
job
This job is disabled by default and performs tests based on nose Python lib.
It is activated by setting $NOSETESTS_ENABLED
to true
.
It is bound to the build
stage, and uses the following variables:
Input / Variable | Description | Default value |
---|---|---|
nosetests-args / NOSETESTS_ARGS
|
Additional nose CLI options | none |
By default coverage will be run on all the project directories. You can restrict it to your packages by setting the $NOSE_COVER_PACKAGE
variable.
More info
ℹ️ use a .coveragerc
file at the root of your Python project to control the coverage settings.
In addition to a textual report in the console, this job produces the following reports, kept for one day:
Report | Format | Usage |
---|---|---|
$PYTHON_PROJECT_DIR/reports/TEST-*.xml |
xUnit test report(s) | GitLab integration & SonarQube integration |
$PYTHON_PROJECT_DIR/reports/py-coverage.cobertura.xml |
Cobertura XML coverage report | GitLab integration & SonarQube integration |
py-compile
job
This job is a fallback if no unit test has been set up ($UNITTEST_ENABLED
and $PYTEST_ENABLED
and $NOSETEST_ENABLED
are not set), and performs a compileall
.
It is bound to the build
stage, and uses the following variables:
Input / Variable | Description | Default value |
---|---|---|
compile-args / PYTHON_COMPILE_ARGS
|
compileall CLI options |
* |
py-bandit
job (SAST)
This job is disabled by default and performs a Bandit analysis.
It is bound to the test
stage, and uses the following variables:
Input / Variable | Description | Default value |
---|---|---|
bandit-enabled / BANDIT_ENABLED
|
Set to true to enable Bandit analysis |
none (disabled) |
bandit-args / BANDIT_ARGS
|
Additional Bandit CLI options | --recursive . |
In addition to a textual report in the console, this job produces the following reports, kept for one day:
Report | Format | Usage |
---|---|---|
$PYTHON_PROJECT_DIR/reports/py-bandit.bandit.csv |
CSV |
SonarQube integration This report is generated only if SonarQube template is detected |
$PYTHON_PROJECT_DIR/reports/py-bandit.bandit.json |
JSON |
DefectDojo integration This report is generated only if DefectDojo template is detected |
py-trivy
job (dependency check)
This job is disabled by default and performs a dependency check analysis using Trivy.
It is bound to the test
stage, and uses the following variables:
Input / Variable | Description | Default value |
---|---|---|
trivy-enabled / PYTHON_TRIVY_ENABLED
|
Set to true to enable Trivy job |
none (disabled) |
trivy-args / PYTHON_TRIVY_ARGS
|
Additional Trivy CLI options | --vuln-type library |
In addition to a textual report in the console, this job produces the following reports, kept for one day:
Report | Format | Usage |
---|---|---|
$PYTHON_PROJECT_DIR/reports/py-trivy.trivy.json |
JSON |
DefectDojo integration This report is generated only if DefectDojo template is detected |
py-sbom
job
This job generates a SBOM file listing all dependencies using syft.
It is bound to the test
stage, and uses the following variables:
Input / Variable | Description | Default value |
---|---|---|
sbom-disabled / PYTHON_SBOM_DISABLED
|
Set to true to disable this job |
none |
sbom-syft-url / PYTHON_SBOM_SYFT_URL
|
Url to the tar.gz package for linux_amd64 of Syft to use (ex: https://github.com/anchore/syft/releases/download/v0.62.3/syft_0.62.3_linux_amd64.tar.gz )When unset, the latest version will be used |
none |
sbom-name / PYTHON_SBOM_NAME
|
Component name of the emitted SBOM | $CI_PROJECT_PATH/$PYTHON_PROJECT_DIR |
sbom-opts / PYTHON_SBOM_OPTS
|
Options for syft used for SBOM analysis | --override-default-catalogers python-package-cataloger |
In addition to logs in the console, this job produces the following reports, kept for one week:
Report | Format | Usage |
---|---|---|
$PYTHON_PROJECT_DIR/reports/py-sbom.cyclonedx.json |
CycloneDX JSON | Security & Compliance integration |
py-black
job
This job disabled by default and runs black on the repo. It is bound to the build stage.
Input / Variable | Description | Default value |
---|---|---|
black-enabled / PYTHON_BLACK_ENABLED
|
Set to true to enable black job |
none (disabled) |
py-isort
job
This job disabled by default and runs isort on the repo. It is bound to the build stage.
Input / Variable | Description | Default value |
---|---|---|
isort-enabled / PYTHON_ISORT_ENABLED
|
Set to true to enable isort job |
none (disabled) |
py-ruff
job
This job disabled by default and runs Ruff on the repo. It is bound to the build stage.
Input / Variable | Description | Default value |
---|---|---|
ruff-enabled / RUFF_ENABLED
|
Set to true to enable ruff job |
none (disabled) |
ruff-args / RUFF_ARGS
|
Additional Ruff Linter CLI options | none |
ruff-ext-exclude / RUFF_EXT_EXCLUDE
|
Define extend-exclude files | .venv,.cache |
⚠️ Ruff can replace isort, Black, Bandit, Pylint and much more. More info.
SonarQube analysis
If you're using the SonarQube template to analyse your Python code, here is a sample sonar-project.properties
file:
# see: https://docs.sonarqube.org/latest/analyzing-source-code/test-coverage/python-test-coverage/
# set your source directory(ies) here (relative to the sonar-project.properties file)
sonar.sources=.
# exclude unwanted directories and files from being analysed
sonar.exclusions=**/test_*.py
# set your tests directory(ies) here (relative to the sonar-project.properties file)
sonar.tests=.
sonar.test.inclusions=**/test_*.py
# tests report: xUnit format
sonar.python.xunit.reportPath=reports/TEST-*.xml
# coverage report: Cobertura format
sonar.python.coverage.reportPaths=reports/py-coverage.cobertura.xml
# pylint: parseable format (if enabled)
sonar.python.pylint.reportPaths=reports/py-lint.parseable.txt
# Bandit: CSV format (if enabled)
sonar.python.bandit.reportPaths=reports/py-bandit.bandit.csv
More info:
py-release
job
This job is disabled by default and allows to perform a complete release of your Python code:
- increase the Python project version,
- Git commit changes and create a Git tag with the new version number,
- build the Python packages,
- publish the built packages to a PyPI compatible repository (GitLab packages by default).
The Python template supports two packaging systems:
- Poetry: uses Poetry-specific version, build and publish commands.
- Setuptools: uses bump-my-version as version management, build as package builder and Twine to publish.
The release job is bound to the publish
stage, appears only on production and integration branches and uses the following variables:
Input / Variable | Description | Default value |
---|---|---|
release-enabled / PYTHON_RELEASE_ENABLED
|
Set to true to enable the release job |
none (disabled) |
release-next / PYTHON_RELEASE_NEXT
|
The part of the version to increase (one of: major , minor , patch ) |
minor |
semrel-release-disabled / PYTHON_SEMREL_RELEASE_DISABLED
|
Set to true to disable semantic-release integration
|
none (disabled) |
GIT_USERNAME |
Git username for Git push operations (see below) | none |
🔒 GIT_PASSWORD
|
Git password for Git push operations (see below) | none |
🔒 GIT_PRIVATE_KEY
|
SSH key for Git push operations (see below) | none |
release-commit-message / PYTHON_RELEASE_COMMIT_MESSAGE
|
The Git commit message to use on the release commit. This is templated using the Python Format String Syntax. Available in the template context are current_version and new_version. | chore(python-release): {current_version} → {new_version} |
repository-url / PYTHON_REPOSITORY_URL
|
Target PyPI repository to publish packages | GitLab project's PyPI packages repository |
PYTHON_REPOSITORY_USERNAME |
Target PyPI repository username credential | gitlab-ci-token |
🔒 PYTHON_REPOSITORY_PASSWORD
|
Target PyPI repository password credential | $CI_JOB_TOKEN |
Setuptools tip
If you're using a Setuptools configuration, then you will have to write a .bumpversion.toml
or pyproject.toml
file.
Example of .bumpversion.toml
file:
[tool.bumpversion]
current_version = "0.0.0"
Example of pyproject.toml
file:
[project]
name = "project-name"
[build-system]
requires = ["setuptools"]
build-backend = "setuptools.build_meta"
[tool.bumpversion]
current_version = "0.0.0"
[[tool.bumpversion.files]]
filename = "project-name/__init__.py"
semantic-release
integration
If you activate the semantic-release-info
job from the semantic-release
template, the py-release
job will rely on the generated next version info.
Thus, a release will be performed only if a next semantic release is present.
You should disable the semantic-release
job (as it's the py-release
job that will perform the release and so we only need the semantic-release-info
job) by setting SEMREL_RELEASE_DISABLED
to true
.
Finally, the semantic-release integration can be disabled with the PYTHON_SEMREL_RELEASE_DISABLED
variable.
Git authentication
A Python release involves some Git push operations.
You can either use a SSH key or user/password credentials.
Using a SSH key
We recommend you to use a project deploy key with write access to your project.
The key should not have a passphrase (see how to generate a new SSH key pair).
Specify 🔒 $GIT_PRIVATE_KEY
as secret project variable with the private part of the deploy key.
-----BEGIN 0PENSSH PRIVATE KEY-----
blablabla
-----END OPENSSH PRIVATE KEY-----
The template handles both classic variable and file variable.
Using user/password credentials
Simply specify 🔒 $GIT_USERNAME
and 🔒 $GIT_PASSWORD
as secret project variables.
Note that the password should be an access token (preferably a project or group access token) with write_repository
scope and Maintainer
role.
Pip repositories
When depending on Python packages published in GitLab's packages registry, it could be useful to configure a group level Package. But such repository will require an authenticated access.
To do so, simply set the PIP_INDEX_URL
and use the CI job token.
variables:
PIP_INDEX_URL: "${CI_SERVER_PROTOCOL}://gitlab-ci-token:${CI_JOB_TOKEN}@${CI_SERVER_HOST}:${CI_SERVER_PORT}/api/v4/groups/<group-id>/-/packages/pypi/simple"
In a corporate environment, you can be faced to two repositories: the corporate proxy-cache and the project repository.
Simply use both PIP_INDEX_URL
and PIP_EXTRA_INDEX_URL
.
variables:
PIP_INDEX_URL: "https://cache.corp/repository/pypi/simple"
PIP_EXTRA_INDEX_URL: "${CI_SERVER_PROTOCOL}://gitlab-ci-token:${CI_JOB_TOKEN}@${CI_SERVER_HOST}:${CI_SERVER_PORT}/api/v4/groups/<group-id>/-/packages/pypi/simple"
Variants
The Python template can be used in conjunction with template variants to cover specific cases.
Vault variant
This variant allows delegating your secrets management to a Vault server.
Configuration
In order to be able to communicate with the Vault server, the variant requires the additional configuration parameters:
Input / Variable | Description | Default value |
---|---|---|
TBC_VAULT_IMAGE |
The Vault Secrets Provider image to use (can be overridden) | registry.gitlab.com/to-be-continuous/tools/vault-secrets-provider:latest |
vault-base-url / VAULT_BASE_URL
|
The Vault server base API url | none |
vault-oidc-aud / VAULT_OIDC_AUD
|
The aud claim for the JWT |
$CI_SERVER_URL |
🔒 VAULT_ROLE_ID
|
The AppRole RoleID | must be defined |
🔒 VAULT_SECRET_ID
|
The AppRole SecretID | must be defined |
Usage
Then you may retrieve any of your secret(s) from Vault using the following syntax:
@url@http://vault-secrets-provider/api/secrets/{secret_path}?field={field}
With:
Parameter | Description |
---|---|
secret_path (path parameter) |
this is your secret location in the Vault server |
field (query parameter) |
parameter to access a single basic field from the secret JSON payload |
Example
include:
# main component
- component: gitlab.com/to-be-continuous/python/gitlab-ci-python@6.8.1
# Vault variant
- component: gitlab.com/to-be-continuous/python/gitlab-ci-python-vault@6.8.1
inputs:
vault-base-url: "https://vault.acme.host/v1"
# audience claim for JWT
vault-oidc-aud: "https://vault.acme.host"
variables:
# Secrets managed by Vault
GIT_PASSWORD: "@url@http://vault-secrets-provider/api/secrets/b7ecb6ebabc231/git/semantic-release?field=group-access-token"
GIT_PRIVATE_KEY: "@url@http://vault-secrets-provider/api/secrets/b7ecb6ebabc231/git/semantic-release?field=private-key"
PYTHON_REPOSITORY_PASSWORD: "@url@http://vault-secrets-provider/api/secrets/b7ecb6ebabc231/pip-repo/repository?field=password"
# $VAULT_ROLE_ID and $VAULT_SECRET_ID defined as a secret CI/CD variable
Google Cloud variant
This variant allows to use Python Google Clients. The variant follow the recommendation Authenticate for using client libraries with ADC
Detailed article on internal OIDC impersonated with Workload Identify Federation
List of requirements before using this variant for use Python Google Clients:
- You must have a Workload Identity Federation Pool,
- You must have a Service Account with enough permissions to run your python job.
- Optional, you can define
GOOGLE_CLOUD_PROJECT
in template variable to define the default Google project
Configuration
The variant requires the additional configuration parameters:
Input / Variable | Description | Default value |
---|---|---|
gcp-oidc-aud / GCP_OIDC_AUD
|
The aud claim for the JWT token (only required for OIDC authentication)
|
$CI_SERVER_URL |
gcp-oidc-provider / GCP_OIDC_PROVIDER
|
Default Workload Identity Provider associated with GitLab to authenticate with OpenID Connect | none |
gcp-oidc-account / GCP_OIDC_ACCOUNT
|
Default Service Account to which impersonate with OpenID Connect authentication | none |
Example
include:
- component: gitlab.com/to-be-continuous/python/gitlab-ci-python@6.8.1
# 2: set/override component inputs
inputs:
image: registry.hub.docker.com/library/python:3.10
pytest-enabled: true
- component: gitlab.com/to-be-continuous/python/gitlab-ci-python-gcp@6.8.1
inputs:
# common OIDC config for non-prod envs
gcp-oidc-provider: "projects/<gcp_nonprod_proj_id>/locations/global/workloadIdentityPools/<pool_id>/providers/<provider_id>"
gcp-oidc-account: "<name>@$<gcp_nonprod_proj_id>.iam.gserviceaccount.com"