-
Notifications
You must be signed in to change notification settings - Fork 10
PR: Branch Merge #171
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
PR: Branch Merge #171
Changes from all commits
9bb5e38
4649bb2
27119b2
17aca78
b0f9339
f7ea187
7dd9d09
bae2f85
62ff7f8
13f8ac1
a20304f
52f164b
7e9240c
5528af8
50c5814
4779f5a
856ff42
47e135a
f81fb62
be9d039
e0ef1ab
4b70844
562b086
561d2aa
74e025b
036aaf0
1cc4371
240ae69
b027460
4ce64bd
4dcbc0c
70a3bad
75ad10a
ce19de5
fc076b1
aa989a8
4dd97e2
3ab4971
771309d
103499b
decd42c
c4627de
26c5fa6
e30aca8
13f4f92
439f35e
a9b5ddc
be7cf91
5756794
12a3d21
c52753a
5171ab5
615e7c6
c795109
359a9d4
46bb8f0
b9e5a26
54ac161
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,6 @@ | ||
| version: 2 | ||
| updates: | ||
| - package-ecosystem: github-actions | ||
| directory: / | ||
| schedule: | ||
| interval: daily |
| Original file line number | Diff line number | Diff line change | ||||
|---|---|---|---|---|---|---|
|
|
@@ -19,13 +19,18 @@ jobs: | |||||
| version-number: | ||||||
| runs-on: ubuntu-latest | ||||||
| steps: | ||||||
| - name: Harden the runner (Audit all outbound calls) | ||||||
| uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2 | ||||||
| with: | ||||||
| egress-policy: audit | ||||||
|
|
||||||
| - name: Checkout repository | ||||||
| uses: actions/checkout@v4 | ||||||
| uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2 | ||||||
|
Comment on lines
21
to
+28
|
||||||
| with: | ||||||
| fetch-depth: 0 # Need full history for git versioning | ||||||
|
|
||||||
| - name: Set up Python | ||||||
| uses: actions/setup-python@v5 | ||||||
| uses: actions/setup-python@a309ff8b426b58ec0e2a45f0f869d46889d02405 # v6.2.0 | ||||||
| with: | ||||||
| python-version: '3.11' | ||||||
|
|
||||||
|
|
@@ -51,8 +56,13 @@ jobs: | |||||
| outputs: | ||||||
| python-sdk: ${{ steps.check_python_sdk.outputs.changed }} | ||||||
| steps: | ||||||
| - name: Harden the runner (Audit all outbound calls) | ||||||
| uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2 | ||||||
| with: | ||||||
| egress-policy: audit | ||||||
|
|
||||||
Git-Hub-Chris marked this conversation as resolved.
Show resolved
Hide resolved
|
||||||
| - name: Checkout repository | ||||||
| uses: actions/checkout@v4 | ||||||
| uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2 | ||||||
| with: | ||||||
|
Comment on lines
58
to
66
|
||||||
| fetch-depth: 0 | ||||||
|
|
||||||
|
|
@@ -91,11 +101,16 @@ jobs: | |||||
| python-version: ['3.11', '3.12'] | ||||||
|
|
||||||
| steps: | ||||||
| - name: Harden the runner (Audit all outbound calls) | ||||||
| uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2 | ||||||
| with: | ||||||
| egress-policy: audit | ||||||
|
|
||||||
Git-Hub-Chris marked this conversation as resolved.
Show resolved
Hide resolved
|
||||||
| - name: Checkout repository | ||||||
| uses: actions/checkout@v4 | ||||||
| uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2 | ||||||
|
Comment on lines
103
to
+110
|
||||||
|
|
||||||
| - name: Install the latest version of uv and set the python version | ||||||
| uses: astral-sh/setup-uv@v6 | ||||||
| uses: astral-sh/setup-uv@eac588ad8def6316056a12d4907a9d4d84ff7a3b # v7.3.0 | ||||||
| with: | ||||||
| version: '0.6.x' | ||||||
| python-version: ${{ matrix.python-version }} | ||||||
|
|
@@ -129,15 +144,15 @@ jobs: | |||||
|
|
||||||
| - name: Run integration tests | ||||||
| # Only run integration tests if secrets are available | ||||||
Git-Hub-Chris marked this conversation as resolved.
Show resolved
Hide resolved
|
||||||
| if: ${{ vars.RUN_INTEGRATION_TESTS == 'true' }} | ||||||
| if: github.event_name == 'push' && secrets.AZURE_OPENAI_API_KEY != '' && vars.AZURE_OPENAI_ENDPOINT != '' && vars.AZURE_OPENAI_DEPLOYMENT != '' && vars.AZURE_OPENAI_API_VERSION != '' | ||||||
|
||||||
| if: github.event_name == 'push' && secrets.AZURE_OPENAI_API_KEY != '' && vars.AZURE_OPENAI_ENDPOINT != '' && vars.AZURE_OPENAI_DEPLOYMENT != '' && vars.AZURE_OPENAI_API_VERSION != '' | |
| if: github.event_name == 'push' && secrets.AZURE_OPENAI_API_KEY && vars.AZURE_OPENAI_ENDPOINT && vars.AZURE_OPENAI_DEPLOYMENT && vars.AZURE_OPENAI_API_VERSION |
Git-Hub-Chris marked this conversation as resolved.
Show resolved
Hide resolved
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,78 @@ | ||
| # For most projects, this workflow file will not need changing; you simply need | ||
| # to commit it to your repository. | ||
| # | ||
| # You may wish to alter this file to override the set of languages analyzed, | ||
| # or to provide custom queries or build logic. | ||
| # | ||
| # ******** NOTE ******** | ||
| # We have attempted to detect the languages in your repository. Please check | ||
| # the `language` matrix defined below to confirm you have the correct set of | ||
| # supported CodeQL languages. | ||
| # | ||
| name: "CodeQL" | ||
|
|
||
| on: | ||
| push: | ||
| branches: ["main"] | ||
| pull_request: | ||
| # The branches below must be a subset of the branches above | ||
| branches: ["main"] | ||
| schedule: | ||
| - cron: "0 0 * * 1" | ||
|
|
||
| permissions: | ||
| contents: read | ||
|
|
||
| jobs: | ||
| analyze: | ||
| name: Analyze | ||
| runs-on: ubuntu-latest | ||
| permissions: | ||
| actions: read | ||
| contents: read | ||
| security-events: write | ||
|
|
||
| strategy: | ||
| fail-fast: false | ||
| matrix: | ||
| language: ["python"] | ||
| # CodeQL supports [ $supported-codeql-languages ] | ||
| # Learn more about CodeQL language support at https://aka.ms/codeql-docs/language-support | ||
|
|
||
| steps: | ||
| - name: Harden the runner (Audit all outbound calls) | ||
| uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2 | ||
| with: | ||
| egress-policy: audit | ||
|
|
||
| - name: Checkout repository | ||
| uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2 | ||
|
|
||
| # Initializes the CodeQL tools for scanning. | ||
| - name: Initialize CodeQL | ||
| uses: github/codeql-action/init@9e907b5e64f6b83e7804b09294d44122997950d6 # v4.32.3 | ||
| with: | ||
| languages: ${{ matrix.language }} | ||
| # If you wish to specify custom queries, you can do so here or in a config file. | ||
| # By default, queries listed here will override any specified in a config file. | ||
| # Prefix the list here with "+" to use these queries and those in the config file. | ||
|
|
||
| # Autobuild attempts to build any compiled languages (C/C++, C#, or Java). | ||
| # If this step fails, then you should remove it and run the build manually (see below) | ||
| - name: Autobuild | ||
| uses: github/codeql-action/autobuild@9e907b5e64f6b83e7804b09294d44122997950d6 # v4.32.3 | ||
|
|
||
| # ℹ️ Command-line programs to run using the OS shell. | ||
| # 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun | ||
|
|
||
| # If the Autobuild fails above, remove it and uncomment the following three lines. | ||
| # modify them (or add more) to build your code if your project, please refer to the EXAMPLE below for guidance. | ||
|
|
||
| # - run: | | ||
| # echo "Run, Build Application using script" | ||
| # ./location_of_script_within_repo/buildscript.sh | ||
|
|
||
| - name: Perform CodeQL Analysis | ||
| uses: github/codeql-action/analyze@9e907b5e64f6b83e7804b09294d44122997950d6 # v4.32.3 | ||
| with: | ||
| category: "/language:${{matrix.language}}" |
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,24 +1,24 @@ | ||
| # Dependency Review - blocks PRs that introduce known-vulnerable dependencies | ||
| name: Dependency Review | ||
| on: | ||
| pull_request: | ||
| branches: [main] | ||
| permissions: | ||
| contents: read | ||
| pull-requests: write | ||
| jobs: | ||
| dependency-review: | ||
| runs-on: ubuntu-latest | ||
| steps: | ||
| - name: Checkout repository | ||
| uses: actions/checkout@v4 | ||
| - name: Dependency Review | ||
| uses: actions/dependency-review-action@v4 | ||
| with: | ||
| fail-on-severity: high | ||
| comment-summary-in-pr: always | ||
| deny-licenses: GPL-3.0-only, AGPL-3.0-only | ||
| # Dependency Review - blocks PRs that introduce known-vulnerable dependencies | ||
| name: Dependency Review | ||
|
|
||
| on: | ||
| pull_request: | ||
| branches: [main] | ||
|
|
||
| permissions: | ||
| contents: read | ||
| pull-requests: write | ||
|
|
||
| jobs: | ||
| dependency-review: | ||
| runs-on: ubuntu-latest | ||
| steps: | ||
| - name: Checkout repository | ||
| uses: actions/checkout@v6 | ||
|
|
||
| - name: Dependency Review | ||
| uses: actions/dependency-review-action@v4 | ||
| with: | ||
| fail-on-severity: high | ||
| comment-summary-in-pr: always | ||
| deny-licenses: GPL-3.0-only, AGPL-3.0-only |
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,81 @@ | ||
| # This workflow uses actions that are not certified by GitHub. They are provided | ||
| # by a third-party and are governed by separate terms of service, privacy | ||
| # policy, and support documentation. | ||
|
|
||
| name: Scorecard supply-chain security | ||
| on: | ||
| # For Branch-Protection check. Only the default branch is supported. See | ||
| # https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection | ||
| branch_protection_rule: | ||
| # To guarantee Maintained check is occasionally updated. See | ||
| # https://github.com/ossf/scorecard/blob/main/docs/checks.md#maintained | ||
| schedule: | ||
| - cron: '20 7 * * 2' | ||
| push: | ||
| branches: ["main"] | ||
|
|
||
| # Declare default permissions as read only. | ||
| permissions: read-all | ||
|
|
||
| jobs: | ||
| analysis: | ||
| name: Scorecard analysis | ||
| runs-on: ubuntu-latest | ||
| permissions: | ||
| # Needed to upload the results to code-scanning dashboard. | ||
| security-events: write | ||
| # Needed to publish results and get a badge (see publish_results below). | ||
| id-token: write | ||
| contents: read | ||
| actions: read | ||
| # To allow GraphQL ListCommits to work | ||
| issues: read | ||
| pull-requests: read | ||
| # To detect SAST tools | ||
| checks: read | ||
|
|
||
| steps: | ||
| - name: Harden the runner (Audit all outbound calls) | ||
| uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2 | ||
| with: | ||
| egress-policy: audit | ||
|
|
||
| - name: "Checkout code" | ||
| uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2 | ||
| with: | ||
| persist-credentials: false | ||
|
|
||
| - name: "Run analysis" | ||
| uses: ossf/scorecard-action@4eaacf0543bb3f2c246792bd56e8cdeffafb205a # v2.4.3 | ||
| with: | ||
| results_file: results.sarif | ||
| results_format: sarif | ||
| # (Optional) "write" PAT token. Uncomment the `repo_token` line below if: | ||
| # - you want to enable the Branch-Protection check on a *public* repository, or | ||
| # - you are installing Scorecards on a *private* repository | ||
| # To create the PAT, follow the steps in https://github.com/ossf/scorecard-action#authentication-with-pat. | ||
| # repo_token: ${{ secrets.SCORECARD_TOKEN }} | ||
|
|
||
| # Public repositories: | ||
| # - Publish results to OpenSSF REST API for easy access by consumers | ||
| # - Allows the repository to include the Scorecard badge. | ||
| # - See https://github.com/ossf/scorecard-action#publishing-results. | ||
| # For private repositories: | ||
| # - `publish_results` will always be set to `false`, regardless | ||
| # of the value entered here. | ||
| publish_results: true | ||
|
|
||
| # Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF | ||
| # format to the repository Actions tab. | ||
| - name: "Upload artifact" | ||
| uses: actions/upload-artifact@b7c566a772e6b6bfb58ed0dc250532a479d7789f # v6.0.0 | ||
| with: | ||
| name: SARIF file | ||
| path: results.sarif | ||
| retention-days: 5 | ||
|
|
||
| # Upload the results to GitHub's code scanning dashboard. | ||
| - name: "Upload to code-scanning" | ||
| uses: github/codeql-action/upload-sarif@9e907b5e64f6b83e7804b09294d44122997950d6 # v4.32.3 | ||
| with: | ||
| sarif_file: results.sarif |
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,35 +1,35 @@ | ||
| # Pre-commit hooks for Agent365-python | ||
| # Install: pip install pre-commit && pre-commit install | ||
| # Run manually: pre-commit run --all-files | ||
| repos: | ||
| # Gitleaks - detect secrets in code | ||
| - repo: https://github.com/gitleaks/gitleaks | ||
| rev: v8.18.4 | ||
| hooks: | ||
| - id: gitleaks | ||
| # Whitespace fixes | ||
| - repo: https://github.com/pre-commit/pre-commit-hooks | ||
| rev: v4.6.0 | ||
| hooks: | ||
| - id: trailing-whitespace | ||
| args: [--markdown-linebreak-ext=md] | ||
| - id: end-of-file-fixer | ||
| - id: mixed-line-ending | ||
| args: [--fix=lf] | ||
| - id: check-merge-conflict | ||
| - id: check-yaml | ||
| args: [--allow-multiple-documents] | ||
| - id: check-json | ||
| - id: check-toml | ||
| - id: check-ast | ||
| # Python specific - using Ruff (matches CI settings) | ||
| - repo: https://github.com/astral-sh/ruff-pre-commit | ||
| rev: v0.4.4 | ||
| hooks: | ||
| - id: ruff | ||
| args: [--fix, --line-length=100] | ||
| - id: ruff-format | ||
| args: [--line-length=100] | ||
| # Pre-commit hooks for Agent365-python | ||
| # Install: pip install pre-commit && pre-commit install | ||
| # Run manually: pre-commit run --all-files | ||
|
|
||
| repos: | ||
| # Gitleaks - detect secrets in code | ||
| - repo: https://github.com/gitleaks/gitleaks | ||
| rev: v8.18.4 | ||
| hooks: | ||
| - id: gitleaks | ||
|
|
||
| # Whitespace fixes | ||
| - repo: https://github.com/pre-commit/pre-commit-hooks | ||
| rev: v4.6.0 | ||
| hooks: | ||
| - id: trailing-whitespace | ||
| args: [--markdown-linebreak-ext=md] | ||
| - id: end-of-file-fixer | ||
| - id: mixed-line-ending | ||
| args: [--fix=lf] | ||
| - id: check-merge-conflict | ||
| - id: check-yaml | ||
| args: [--allow-multiple-documents] | ||
| - id: check-json | ||
| - id: check-toml | ||
| - id: check-ast | ||
|
|
||
| # Python specific - using Ruff (matches CI settings) | ||
| - repo: https://github.com/astral-sh/ruff-pre-commit | ||
| rev: v0.4.4 | ||
| hooks: | ||
| - id: ruff | ||
| args: [--fix, --line-length=100] | ||
| - id: ruff-format | ||
| args: [--line-length=100] |
Uh oh!
There was an error while loading. Please reload this page.