Some checks failed
Architecture Lint / Linter Tests (pull_request) Successful in 10s
PR Checklist / pr-checklist (pull_request) Failing after 1m25s
Smoke Test / smoke (pull_request) Failing after 8s
Validate Config / YAML Lint (pull_request) Failing after 7s
Validate Config / JSON Validate (pull_request) Successful in 7s
Validate Config / Python Syntax & Import Check (pull_request) Failing after 8s
Validate Config / Python Test Suite (pull_request) Has been skipped
Validate Config / Shell Script Lint (pull_request) Failing after 16s
Validate Config / Cron Syntax Check (pull_request) Successful in 6s
Validate Config / Deploy Script Dry Run (pull_request) Successful in 6s
Validate Config / Playbook Schema Validation (pull_request) Successful in 9s
Architecture Lint / Lint Repository (pull_request) Failing after 9s
1. bin/deadman-fallback.py: stripped corrupted line-number prefixes and fixed unterminated string literal 2. fleet/resource_tracker.py: fixed f-string set comprehension (needs parens in Python 3.12) 3. ansible deadman_switch: extracted handlers to handlers/main.yml 4. evaluations/crewai/poc_crew.py: removed hardcoded API key 5. playbooks/fleet-guardrails.yaml: added trailing newline 6. matrix/docker-compose.yml: stripped trailing whitespace 7. smoke.yml: excluded security-detection scripts from secret scan
33 lines
1.2 KiB
YAML
33 lines
1.2 KiB
YAML
name: Smoke Test
|
|
on:
|
|
pull_request:
|
|
push:
|
|
branches: [main]
|
|
jobs:
|
|
smoke:
|
|
runs-on: ubuntu-latest
|
|
steps:
|
|
- uses: actions/checkout@v4
|
|
- uses: actions/setup-python@v5
|
|
with:
|
|
python-version: '3.11'
|
|
- name: Parse check
|
|
run: |
|
|
find . -name '*.yml' -o -name '*.yaml' | grep -v .gitea | xargs -r python3 -c "import sys,yaml; [yaml.safe_load(open(f)) for f in sys.argv[1:]]"
|
|
find . -name '*.json' | xargs -r python3 -m json.tool > /dev/null
|
|
find . -name '*.py' | xargs -r python3 -m py_compile
|
|
find . -name '*.sh' | xargs -r bash -n
|
|
echo "PASS: All files parse"
|
|
- name: Secret scan
|
|
run: |
|
|
if grep -rE 'sk-or-|sk-ant-|ghp_|AKIA' . --include='*.yml' --include='*.py' --include='*.sh' 2>/dev/null \
|
|
| grep -v '.gitea' \
|
|
| grep -v 'banned_provider' \
|
|
| grep -v 'architecture_linter' \
|
|
| grep -v 'agent_guardrails' \
|
|
| grep -v 'test_linter' \
|
|
| grep -v 'secret.scan' \
|
|
| grep -v 'secret-scan' \
|
|
| grep -v 'hermes-sovereign/security'; then exit 1; fi
|
|
echo "PASS: No secrets"
|