chore: supply-chain hardening — lockfile enforcement + action SHA pins#9
chore: supply-chain hardening — lockfile enforcement + action SHA pins#9
Conversation
📋 Follow-up checklistPosted automatically by 🐍 Next step: migrate to a proper uv lockfileThis PR applies an immediate security shim — 1 — Initialise uv (run once in the repo root) uv init --no-workspace # creates pyproject.toml if missing2 — Import existing requirements uv add --requirements requirements.txt3 — Commit the lockfile git add pyproject.toml uv.lock
git commit -m "chore: migrate to uv lockfile"4 — Switch CI to strict lockfile mode (follow-up PR) - run: uv sync --frozen
|
Supply Chain Hardening
Automated supply-chain security controls applied by
supply-chain-pr.py.Changes made
publish_package.yml: SHA-pinned 3 actions to full commit hashstyle.yml: SHA-pinned 3 actions to full commit hashtest.yml: SHA-pinned 2 actions to full commit hashPython ecosystem changes
publish_package.yml: pip install build → uv pip install (+ cooldown)publish_package.yml: astral-sh/setup-uv@v5 step injectedstyle.yml: pip install pre-commit → uv pip install (+ cooldown)style.yml: astral-sh/setup-uv@v5 step injectedWhy these controls
UV_EXCLUDE_NEWER/renovate.jsoncooldownuv sync --frozen/poetry install --no-updateTesting checklist
Generated by
supply-chain-pr.py— part of the dependency-security-policy rollout.