diff --git a/.gitea/workflows/pr-check.yml b/.gitea/workflows/pr-check.yml index 4cd6a71..bb9c905 100644 --- a/.gitea/workflows/pr-check.yml +++ b/.gitea/workflows/pr-check.yml @@ -91,21 +91,23 @@ jobs: env: UV_NO_PROGRESS: "1" run: | - echo "Running pip-audit..." - uv run pip-audit --format json --output audit-results.json || true + echo "Running pip-audit on production dependencies..." + # Audit only production dependencies (exclude dev) + uv pip compile pyproject.toml --no-dev -o requirements-prod.txt + uv run pip-audit --format json --output audit-results.json -r requirements-prod.txt || true # Parse and display results if [ -s audit-results.json ] && [ "$(cat audit-results.json)" != "[]" ]; then - echo "⚠️ Found vulnerabilities (dev dependencies only):" + echo "❌ Found vulnerabilities in production dependencies:" uv run python -c " import json data = json.load(open('audit-results.json')) for vuln in data: print(f\" - {vuln.get('name', 'unknown')} {vuln.get('version', '')}: {vuln.get('id', '')}\") -print('Note: These are dev dependencies, not shipped with the package.') " + exit 1 else - echo "✅ No vulnerabilities found" + echo "✅ No vulnerabilities in production dependencies" fi - name: Check for secrets diff --git a/pyproject.toml b/pyproject.toml index 23964f3..5d57981 100644 --- a/pyproject.toml +++ b/pyproject.toml @@ -37,9 +37,6 @@ dev = [ "ruff>=0.3.0", "python-semantic-release>=9.0.0", "pip-audit>=2.7.0", - # Pinned to avoid vulnerabilities - "black>=24.3.0", - "requests>=2.33.0", ] [project.urls]