Compare commits

..

1 Commits

Author SHA1 Message Date
root
ed052b500d test: CI trigger 2026-03-29 08:22:14 +00:00
3 changed files with 22 additions and 19 deletions

View File

@ -1,5 +1,8 @@
name: PR Checks
env:
GITEA_TOKEN: ${{ secrets.CI_TOKEN }}
on:
pull_request:
branches: [main]
@ -88,15 +91,24 @@ jobs:
env:
UV_NO_PROGRESS: "1"
run: |
uv pip compile pyproject.toml --no-dev -o requirements-prod.txt && uv run pip-audit --format json --output audit-results.json -r requirements-prod.txt && test ! -s audit-results.json || test "$(cat audit-results.json)" = "[]"
- name: Upload audit log
uses: actions/upload-artifact@v3
if: failure()
with:
name: security-audit
path: audit-results.json
retention-days: 7
echo "Running pip-audit on production dependencies..."
# Audit only production dependencies (exclude dev)
uv pip compile pyproject.toml --no-dev -o requirements-prod.txt
uv run pip-audit --format json --output audit-results.json -r requirements-prod.txt || true
# Parse and display results
if [ -s audit-results.json ] && [ "$(cat audit-results.json)" != "[]" ]; then
echo "❌ Found vulnerabilities in production dependencies:"
uv run python -c "
import json
data = json.load(open('audit-results.json'))
for vuln in data:
print(f\" - {vuln.get('name', 'unknown')} {vuln.get('version', '')}: {vuln.get('id', '')}\")
"
exit 1
else
echo "✅ No vulnerabilities in production dependencies"
fi
- name: Check for secrets
run: |

1
.gitignore vendored
View File

@ -38,3 +38,4 @@ Thumbs.db
# Docs build
docs/_build/
# Test CI

View File

@ -15,16 +15,6 @@
from typing import Any, Optional
__all__ = [
"KworkError",
"KworkAuthError",
"KworkApiError",
"KworkNotFoundError",
"KworkRateLimitError",
"KworkValidationError",
"KworkNetworkError",
]
class KworkError(Exception):
"""