Compare commits

...

10 Commits

Author SHA1 Message Date
root
2ff64ff512 revert: restore PR-only trigger 2026-03-29 08:46:38 +00:00
root
26926c60da ci: trigger on push to all branches and all PRs
Some checks failed
PR Checks / test (push) Failing after 25s
PR Checks / security (push) Failing after 9s
2026-03-29 08:43:24 +00:00
root
d5dc677789 fix: simplify security check to single command 2026-03-29 08:39:32 +00:00
root
91eec1ae2d fix: upload audit log as artifact on failure 2026-03-29 08:38:34 +00:00
root
106bc8920c fix: inline python script in security check 2026-03-29 08:36:07 +00:00
root
9fb0874812 fix: remove duplicate concurrency block in workflow 2026-03-29 08:33:14 +00:00
root
f397769ce0 revert: restore original workflow config 2026-03-29 08:25:59 +00:00
root
d579127a11 fix: restore GITEA_TOKEN in workflow 2026-03-29 08:23:57 +00:00
root
c9305b2b01 ci: add push trigger for feature branches 2026-03-29 08:21:35 +00:00
root
3c79007a82 docs: add __all__ export to errors module 2026-03-29 08:17:27 +00:00
2 changed files with 19 additions and 21 deletions

View File

@ -1,8 +1,5 @@
name: PR Checks
env:
GITEA_TOKEN: ${{ secrets.CI_TOKEN }}
on:
pull_request:
branches: [main]
@ -91,24 +88,15 @@ jobs:
env:
UV_NO_PROGRESS: "1"
run: |
echo "Running pip-audit on production dependencies..."
# Audit only production dependencies (exclude dev)
uv pip compile pyproject.toml --no-dev -o requirements-prod.txt
uv run pip-audit --format json --output audit-results.json -r requirements-prod.txt || true
# Parse and display results
if [ -s audit-results.json ] && [ "$(cat audit-results.json)" != "[]" ]; then
echo "❌ Found vulnerabilities in production dependencies:"
uv run python -c "
import json
data = json.load(open('audit-results.json'))
for vuln in data:
print(f\" - {vuln.get('name', 'unknown')} {vuln.get('version', '')}: {vuln.get('id', '')}\")
"
exit 1
else
echo "✅ No vulnerabilities in production dependencies"
fi
uv pip compile pyproject.toml --no-dev -o requirements-prod.txt && uv run pip-audit --format json --output audit-results.json -r requirements-prod.txt && test ! -s audit-results.json || test "$(cat audit-results.json)" = "[]"
- name: Upload audit log
uses: actions/upload-artifact@v3
if: failure()
with:
name: security-audit
path: audit-results.json
retention-days: 7
- name: Check for secrets
run: |

View File

@ -15,6 +15,16 @@
from typing import Any, Optional
__all__ = [
"KworkError",
"KworkAuthError",
"KworkApiError",
"KworkNotFoundError",
"KworkRateLimitError",
"KworkValidationError",
"KworkNetworkError",
]
class KworkError(Exception):
"""