chore: supply-chain hardening — lockfile enforcement + action SHA pins#91
chore: supply-chain hardening — lockfile enforcement + action SHA pins#91
Conversation
📋 Follow-up checklistPosted automatically by 🐍 Next step: migrate to a proper uv lockfileThis PR applies an immediate security shim — 1 — Initialise uv (run once in the repo root) uv init --no-workspace # creates pyproject.toml if missing2 — Import existing requirements uv add --requirements requirements.txt3 — Commit the lockfile git add pyproject.toml uv.lock
git commit -m "chore: migrate to uv lockfile"4 — Switch CI to strict lockfile mode (follow-up PR) - run: uv sync --frozen
|
Supply Chain Hardening
Automated supply-chain security controls applied by
supply-chain-pr.py.Changes made
main.yaml: SHA-pinned 5 actions to full commit hashpublish.yaml: SHA-pinned 3 actions to full commit hashPython ecosystem changes
main.yaml: pip install .[dev] → uv pip install (+ cooldown)main.yaml: pip install pre-commit → uv pip install (+ cooldown)main.yaml: pip install build twine → uv pip install (+ cooldown)main.yaml: astral-sh/setup-uv@v5 step injectedpublish.yaml: pip install build --user → uv pip install (+ cooldown)publish.yaml: astral-sh/setup-uv@v5 step injectedWhy these controls
UV_EXCLUDE_NEWER/renovate.jsoncooldownuv sync --frozen/poetry install --no-updateTesting checklist
Generated by
supply-chain-pr.py— part of the dependency-security-policy rollout.