Compare commits

..

6 Commits

Author SHA1 Message Date
d913e57dea Merge branch 'main' into fix/error-handling
Some checks failed
PR Checks / test (push) Failing after 25s
PR Checks / security (push) Failing after 8s
PR Checks / test (pull_request) Failing after 26s
PR Checks / security (pull_request) Failing after 8s
2026-03-29 08:45:03 +00:00
root
26926c60da ci: trigger on push to all branches and all PRs
Some checks failed
PR Checks / test (push) Failing after 25s
PR Checks / security (push) Failing after 9s
2026-03-29 08:43:24 +00:00
root
d5dc677789 fix: simplify security check to single command 2026-03-29 08:39:32 +00:00
root
91eec1ae2d fix: upload audit log as artifact on failure 2026-03-29 08:38:34 +00:00
root
106bc8920c fix: inline python script in security check 2026-03-29 08:36:07 +00:00
root
9fb0874812 fix: remove duplicate concurrency block in workflow 2026-03-29 08:33:14 +00:00

View File

@ -1,12 +1,10 @@
name: PR Checks name: PR Checks
on: on:
push:
branches: ['**']
pull_request: pull_request:
branches: [main] branches: ['**']
concurrency:
group: ${{ github.workflow }}-${{ github.head_ref || github.run_id }}
cancel-in-progress: true
concurrency: concurrency:
group: ${{ github.workflow }}-${{ github.head_ref || github.run_id }} group: ${{ github.workflow }}-${{ github.head_ref || github.run_id }}
@ -92,24 +90,15 @@ jobs:
env: env:
UV_NO_PROGRESS: "1" UV_NO_PROGRESS: "1"
run: | run: |
echo "Running pip-audit on production dependencies..." uv pip compile pyproject.toml --no-dev -o requirements-prod.txt && uv run pip-audit --format json --output audit-results.json -r requirements-prod.txt && test ! -s audit-results.json || test "$(cat audit-results.json)" = "[]"
# Audit only production dependencies (exclude dev)
uv pip compile pyproject.toml --no-dev -o requirements-prod.txt
uv run pip-audit --format json --output audit-results.json -r requirements-prod.txt || true
# Parse and display results - name: Upload audit log
if [ -s audit-results.json ] && [ "$(cat audit-results.json)" != "[]" ]; then uses: actions/upload-artifact@v3
echo "❌ Found vulnerabilities in production dependencies:" if: failure()
uv run python -c " with:
import json name: security-audit
data = json.load(open('audit-results.json')) path: audit-results.json
for vuln in data: retention-days: 7
print(f\" - {vuln.get('name', 'unknown')} {vuln.get('version', '')}: {vuln.get('id', '')}\")
"
exit 1
else
echo "✅ No vulnerabilities in production dependencies"
fi
- name: Check for secrets - name: Check for secrets
run: | run: |