Skip to content

Commit 7602388

Browse files
authored
Tooling Updates (#1446)
* rename test job to pytest * re-order matrix for easier readabiity of outputs * expose `uv pip install` `--resolution` flag to pytest job matrix * Bump ruff from v0.11.7 to v0.11.9 * change circleci build workflow to docs-build * Only output coverage report to conosle when pytest passes (to avoid having to scroll past it to see failures and errors) * move sshtunnel to requirements * alphabetize requirements * Bump ruff from 0.11.9 to 0.11.13 * update format / harden workflows (not python check) * update python checks workflow * fix matrix installing python 3.1 * Bump ruff from 0.11.13 to 0.12.2 * Update dependency-review.yml * hyphenate requirements.txt * Bump ruff from 0.12.2 to 0.12.9 * Bump bandit from 1.8.3 to 1.8.6 * Bump pre-commit from 4.2 to 4.3 * Bump coverage from 7.9.2 to 7.10.3 * Bump pytest-cov from 6.1.1 to 6.2.1 * Bump pytest-datadir from 1.7.2 to 1.8.0 * Bump testfixtures from 8.3.0 to 9.1.0 * Bump Sphinx from 8.1.3 to 8.2.3 * Allow testfixtures 8.3.0 for python < 3.11 * use sphinx 7 for python < 3.11 * Update coverage.yml * Bump ruff from 0.12.9 to 0.13.0 * avoid over-broad assert raises in test_van --------- Co-authored-by: Wil T <wil.t.me@pm.me>
1 parent e4f0289 commit 7602388

File tree

9 files changed

+392
-309
lines changed

9 files changed

+392
-309
lines changed

.github/workflows/coverage.yml

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,8 +31,12 @@ jobs:
3131
steps:
3232
# DO NOT run actions/checkout here, for security reasons
3333
# For details, refer to https://securitylab.github.com/research/github-actions-preventing-pwn-requests/
34-
- name: Post comment
35-
uses: py-cov-action/python-coverage-comment-action@0544a9c648672334d94ec5dd1add7410b4470ddc # v3.37
34+
- uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0
35+
with:
36+
disable-sudo: false
37+
egress-policy: audit
38+
39+
- uses: py-cov-action/python-coverage-comment-action@0544a9c648672334d94ec5dd1add7410b4470ddc # v3.35
3640
with:
3741
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
38-
GITHUB_PR_RUN_ID: ${{ github.event.workflow_run.id }}
42+
GITHUB_PR_RUN_ID: ${{ github.event.workflow_run.id }}
Lines changed: 20 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,28 +1,27 @@
1-
# Dependency Review Action
2-
#
3-
# This Action will scan dependency manifest files that change as part of a Pull Request,
4-
# surfacing known-vulnerable versions of the packages declared or updated in the PR.
5-
# Once installed, if the workflow run is marked as required,
6-
# PRs introducing known-vulnerable packages will be blocked from merging.
7-
#
8-
# Source repository: https://github.com/actions/dependency-review-action
91
name: Dependency review
102

113
on: [pull_request]
124

13-
permissions:
14-
contents: read
5+
permissions: read-all
156

167
jobs:
17-
dependency-review:
18-
runs-on: ubuntu-latest
19-
steps:
20-
- name: Harden Runner
21-
uses: step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
22-
with:
23-
egress-policy: audit
8+
dependency-review:
9+
name: Dependency review
2410

25-
- name: 'Checkout Repository'
26-
uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
27-
- name: 'Dependency Review'
28-
uses: actions/dependency-review-action@595b5aeba73380359d98a5e087f648dbb0edce1b # v4.7.3
11+
runs-on: ubuntu-latest
12+
13+
steps:
14+
- uses: step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911
15+
with:
16+
disable-sudo: true
17+
egress-policy: block
18+
allowed-endpoints: >
19+
api.github.com:443
20+
api.securityscorecards.dev:443
21+
github.com:443
22+
23+
- uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8
24+
25+
- uses: actions/dependency-review-action@595b5aeba73380359d98a5e087f648dbb0edce1b
26+
with:
27+
allow-ghsas: GHSA-pq67-6m6q-mj2v # urllib3

0 commit comments

Comments
 (0)