Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 4 additions & 4 deletions .github/workflows/ci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -37,16 +37,16 @@ jobs:
pip install black flake8 mypy bandit safety

- name: Code formatting check (Black)
run: black --check --diff src/ tests/
run: black --check --diff archive/v1/src/ archive/v1/tests/

- name: Linting (Flake8)
run: flake8 src/ tests/ --max-line-length=88 --extend-ignore=E203,W503
run: flake8 archive/v1/src/ archive/v1/tests/ --max-line-length=88 --extend-ignore=E203,W503

- name: Type checking (MyPy)
run: mypy src/ --ignore-missing-imports
run: mypy archive/v1/src/ --ignore-missing-imports

- name: Security scan (Bandit)
run: bandit -r src/ -f json -o bandit-report.json
run: bandit -r archive/v1/src/ -f json -o bandit-report.json
continue-on-error: true

- name: Dependency vulnerability scan (Safety)
Expand Down
6 changes: 3 additions & 3 deletions .github/workflows/security-scan.yml
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ jobs:

- name: Run Bandit security scan
run: |
bandit -r src/ -f sarif -o bandit-results.sarif
bandit -r archive/v1/src/ -f sarif -o bandit-results.sarif
continue-on-error: true

- name: Upload Bandit results to GitHub Security
Expand All @@ -66,7 +66,7 @@ jobs:

- name: Generate Semgrep SARIF
run: |
semgrep --config=p/security-audit --config=p/secrets --config=p/python --sarif --output=semgrep.sarif src/
semgrep --config=p/security-audit --config=p/secrets --config=p/python --sarif --output=semgrep.sarif archive/v1/src/
continue-on-error: true

- name: Upload Semgrep results to GitHub Security
Expand Down Expand Up @@ -356,7 +356,7 @@ jobs:
- name: Check for security headers in code
run: |
# Check for security-related configurations
grep -r "X-Frame-Options\|X-Content-Type-Options\|X-XSS-Protection\|Content-Security-Policy" src/ || echo "⚠️ Consider adding security headers"
grep -r "X-Frame-Options\|X-Content-Type-Options\|X-XSS-Protection\|Content-Security-Policy" archive/v1/src/ || echo "⚠️ Consider adding security headers"

- name: Validate Kubernetes security contexts
run: |
Expand Down
1 change: 1 addition & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,7 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
saturation, hyperfine spectroscopy, or pulsed protocols become required.

### Fixed
- Fixed: CI Black/flake8/mypy/bandit/semgrep checks pointed at the old `src/` and `tests/` paths. Updated to `archive/v1/src/` and `archive/v1/tests/` to match the v1 → archive/v1 reorganization. Restores green CI on main and all open PRs.
- **Ghost skeletons in live UI with multi-node ESP32 setups** (#420, ADR-082) —
`tracker_bridge::tracker_to_person_detections` documented itself as filtering
to `is_alive()` tracks but in fact passed every non-Terminated track to the
Expand Down
Loading