Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ci: update CI workflow to use uv #82

Open
wants to merge 14 commits into
base: main
Choose a base branch
from

Conversation

devin-ai-integration[bot]
Copy link
Contributor

Update CI workflow to use uv

This PR updates the CI workflow to use uv instead of Poetry for dependency management.

Changes

  • Replace Poetry installation with uv in CI workflow
  • Update dependency installation steps to use uv pip install
  • Keep all existing checks (black, isort, flake8, pytest)

Testing

✅ Successfully tested:

  • Virtual environment creation with uv venv
  • Dependency installation with uv pip install
  • All required packages installed correctly

Link to Devin run: https://app.devin.ai/sessions/2430149b78eb49f6bff9c52e97afdb17
Requested by: [email protected]

devin-ai-integration bot and others added 2 commits February 7, 2025 03:11
Co-authored-by: Devin AI <158243242+devin-ai-integration[bot]@users.noreply.github.com>
Co-authored-by: [email protected] <[email protected]>

Co-Authored-By: [email protected] <[email protected]>
@devin-ai-integration devin-ai-integration bot requested review from a team as code owners February 7, 2025 03:12
Copy link
Contributor Author

🤖 Devin AI Engineer

I'll be helping with this pull request! Here's what you should know:

✅ I will automatically:

  • Address comments on this PR. Add "(aside)" to your comment to have me ignore it.
  • Look at CI failures and help fix them

Note: I can only respond to comments from users who have write access to this repository.

⚙️ Control Options:

  • Disable automatic comment and CI monitoring

README.md Outdated
Example output:

```
Finding: aws_secret="AKIAIMNOJVGFDXXXE4OA"
Copy link

@semgrep-code-assistant-ws semgrep-code-assistant-ws bot Feb 7, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

AWS Access Key ID Value detected. This is a sensitive credential and should not be hardcoded here. Instead, read this value from an environment variable or keep it in a separate, private file.

🧼 Fixed in commit 58a2422 🧼

urllib3==1.26.19 ; python_version >= "3.11.dev0" and python_version < "3.12.dev0"
uvicorn[standard]==0.21.1 ; python_version >= "3.11.dev0" and python_version < "3.12.dev0"
uvloop==0.17.0 ; (sys_platform != "win32" and sys_platform != "cygwin") and platform_python_implementation != "PyPy" and python_version >= "3.11.dev0" and python_version < "3.12.dev0"
virtualenv==20.23.1 ; python_version >= "3.11.dev0" and python_version < "3.12.dev0"

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Risk: Affected versions of virtualenv are vulnerable to Improper Neutralization of Special Elements used in a Command ('Command Injection') / Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'). virtualenv allows command injection through the activation scripts for a virtual environment. Magic template strings are not quoted correctly when replacing.

Fix: Upgrade this library to at least version 20.26.6 at llm-gateway/requirements.dev.txt:70.

Reference(s): GHSA-rqc4-2hc7-8c8v, CVE-2024-53899

💬 To ignore this, reply with:
/fp <comment> for false positive
/ar <comment> for acceptable risk
/other <comment> for all other reasons
Alternatively, triage in Semgrep AppSec Platform to ignore the finding created by ssc-9be743e1-05bf-d877-55ed-816b77b3322e.

README.md Outdated
```
Finding: aws_secret="AKIAIMNOJVGFDXXXE4OA"
RuleID: aws-access-token
Secret AKIAIMNOJVGFDXXXE4OA
Copy link

@semgrep-code-assistant-ws semgrep-code-assistant-ws bot Feb 7, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

AWS Access Key ID Value detected. This is a sensitive credential and should not be hardcoded here. Instead, read this value from an environment variable or keep it in a separate, private file.

🧹 Fixed in commit 58a2422 🧹

README.md Outdated
--- a/checks_test.go
+++ b/checks_test.go
@@ -28,0 +37,1 @@
+ "aws_secret= \"AKIAIMNOJVGFDXXXE4OA\"": true,
Copy link

@semgrep-code-assistant-ws semgrep-code-assistant-ws bot Feb 7, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

AWS Access Key ID Value detected. This is a sensitive credential and should not be hardcoded here. Instead, read this value from an environment variable or keep it in a separate, private file.

Fixed in commit 58a2422

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

0 participants