Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: use detached spawn for agent #5

Merged
merged 43 commits into from
Dec 4, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
43 commits
Select commit Hold shift + click to select a range
e48a5d6
feat: use existing agent if available
sgammon Dec 1, 2023
c4776bd
fix: longer test timeout for installation
sgammon Dec 1, 2023
2ba5f87
fix: tool cache defaults, general option logic fixes
sgammon Dec 1, 2023
9f4e507
chore: run formatter
sgammon Dec 1, 2023
ed99c03
chore: rebundle
sgammon Dec 1, 2023
edb0585
test: many fixes, much testing
sgammon Dec 1, 2023
a365acd
test: additional test fixes and enhancements for agent
sgammon Dec 1, 2023
c13cd1b
chore: cleanup ci jobs, add actionlint check
sgammon Dec 2, 2023
40a30fc
chore(ci): cleanup/combine linter actions
sgammon Dec 2, 2023
bb61fb1
chore(ci): further workflow cleanup and fixes
sgammon Dec 2, 2023
a24efab
fix(ci): reference to `check-dist` job
sgammon Dec 2, 2023
d2c28f9
fix(cli): permissions for action linter
sgammon Dec 2, 2023
e5a723b
fix(lint): fixes for actionlint-reported issues
sgammon Dec 2, 2023
2004b87
test: linter fixes, smoke tests, sonar fix
sgammon Dec 2, 2023
d8a7b2f
fix(ci): useless cat flagged by actionlint shellcheck
sgammon Dec 2, 2023
10e5623
fix: action coordinates in readme
sgammon Dec 2, 2023
6d2fd46
fix: next round of launch fixes for agent
sgammon Dec 4, 2023
1f0c5e3
fix: various fixes for new logic
sgammon Dec 4, 2023
06ba21a
chore: rebundle
sgammon Dec 4, 2023
6c28a5c
chore: add http-client/cache dependencies
sgammon Dec 4, 2023
dfc7dc4
feat(cli): current job context as json
sgammon Dec 4, 2023
6e2ef16
feat(cli): use new cli api to resolve version
sgammon Dec 4, 2023
f3146f9
chore: update pnpm lock
sgammon Dec 4, 2023
5903585
chore: rebundle
sgammon Dec 4, 2023
7b1db29
chore: refactor to remove context options
sgammon Dec 4, 2023
440a584
chore: rebundle
sgammon Dec 4, 2023
729d87f
chore: cleanup pr jobs into one workflow
sgammon Dec 4, 2023
cc88fd1
fix: generate uuid for service instance id on linux
sgammon Dec 4, 2023
dcbe633
fix: permissions for codeql nested workflow
sgammon Dec 4, 2023
dae6c64
chore: readme updates, rebundle
sgammon Dec 4, 2023
daf8c74
fix: drop caching of agent config
sgammon Dec 4, 2023
3b5fcf7
chore: add husky/commitlint
sgammon Dec 4, 2023
c08ad98
chore: require DCO via commitlint
sgammon Dec 4, 2023
0bbf61d
fix: husky commit msg needs to be executable
sgammon Dec 4, 2023
25936f8
fix: dual linting via actionlint
sgammon Dec 4, 2023
cc15da1
fix: markdown/code of conduct issues
sgammon Dec 4, 2023
c668693
fix: codestyle in commitlint
sgammon Dec 4, 2023
ddc17c9
chore(ci): test matrix improvements
sgammon Dec 4, 2023
2166eba
fix(ci): matrix changes
sgammon Dec 4, 2023
6242188
fix: enable macos x86
sgammon Dec 4, 2023
c66686d
chore: rebuild bundle
sgammon Dec 4, 2023
bdeee21
fix: drop x86 mac until fixed upstream
sgammon Dec 4, 2023
85bb817
chore: cleanup before `1.0.1` release
sgammon Dec 4, 2023
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
33 changes: 17 additions & 16 deletions .github/CODE_OF_CONDUCT.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,21 +14,21 @@ appearance, race, religion, or sexual identity and orientation.
Examples of behavior that contributes to creating a positive environment
include:

* Using welcoming and inclusive language
* Being respectful of differing viewpoints and experiences
* Gracefully accepting constructive criticism
* Focusing on what is best for the community
* Showing empathy towards other community members
- Using welcoming and inclusive language
- Being respectful of differing viewpoints and experiences
- Gracefully accepting constructive criticism
- Focusing on what is best for the community
- Showing empathy towards other community members

Examples of unacceptable behavior by participants include:

* The use of sexualized language or imagery and unwelcome sexual attention or
- The use of sexualized language or imagery and unwelcome sexual attention or
advances
* Trolling, insulting/derogatory comments, and personal or political attacks
* Public or private harassment
* Publishing others' private information, such as a physical or electronic
- Trolling, insulting/derogatory comments, and personal or political attacks
- Public or private harassment
- Publishing others' private information, such as a physical or electronic
address, without explicit permission
* Other conduct which could reasonably be considered inappropriate in a
- Other conduct which could reasonably be considered inappropriate in a
professional setting

## Our Responsibilities
Expand All @@ -48,14 +48,14 @@ threatening, offensive, or harmful.
This Code of Conduct applies within all project spaces, and it also applies when
an individual is representing the project or its community in public spaces.
Examples of representing a project or community include using an official
project e-mail address, posting via an official social media account, or acting
project email address, posting via an official social media account, or acting
as an appointed representative at an online or offline event. Representation of
a project may be further defined and clarified by project maintainers.

## Enforcement

Instances of abusive, harassing, or otherwise unacceptable behavior may be
reported by contacting the project team at benasher44@gmail.com. All
reported by contacting the project team at apps at elide dot cloud. All
complaints will be reviewed and investigated and will result in a response that
is deemed necessary and appropriate to the circumstances. The project team is
obligated to maintain confidentiality with regard to the reporter of an incident.
Expand All @@ -68,9 +68,10 @@ members of the project's leadership.
## Attribution

This Code of Conduct is adapted from the [Contributor Covenant][homepage], version 1.4,
available at https://www.contributor-covenant.org/version/1/4/code-of-conduct.html
available at [here][covenant].

[homepage]: https://www.contributor-covenant.org
For answers to common questions about this code of conduct, see the [FAQ][faq].

For answers to common questions about this code of conduct, see
https://www.contributor-covenant.org/faq
[homepage]: https://www.contributor-covenant.org
[covenant]: https://www.contributor-covenant.org/version/1/4/code-of-conduct.html
[faq]: https://www.contributor-covenant.org/faq
2 changes: 1 addition & 1 deletion .github/SECURITY.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@

## Security Policy

Please report all security issues to our [central project](https://github.com/elide-dev/elide). Also, see our [Security Policy](https://github.com/elide-dev/elide/security/policy) which is hosted in that repo.
Please report all security issues to our [central project](https://github.com/elide-dev/elide). Also, see our [Security Policy](https://github.com/elide-dev/elide/security/policy) which is hosted in that repository.
9 changes: 9 additions & 0 deletions .github/actionlint.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
self-hosted-runner:
labels:
- macos-13-xlarge

config-variables:
- DEFAULT_RUNNER
- JOB_NAME
- ENVIRONMENT_STAGE

Original file line number Diff line number Diff line change
@@ -1,12 +1,11 @@
name: CodeQL
name: "Check: CodeQL"

on:
workflow_dispatch: {}
workflow_call: {}
push:
branches:
- main
pull_request:
branches:
- main
schedule:
- cron: '31 7 * * 3'

Expand All @@ -32,28 +31,24 @@ jobs:
- TypeScript

steps:
- name: Harden Runner
- name: "Setup: Harden Runner"
uses: step-security/harden-runner@1b05615854632b887b69ae1be8cbefe72d3ae423 # v2.6.0
with:
egress-policy: audit

- name: Checkout
- name: "Setup: Checkout"
id: checkout
uses: actions/checkout@8ade135a41bc03ea155e62e844d188df1ea18608 # v4.1.0

- name: Initialize CodeQL
- name: "Setup: Initialize CodeQL"
id: initialize
uses: github/codeql-action/init@0116bc2df50751f9724a2e35ef1f24d22f90e4e1 # v2.22.3
with:
languages: ${{ matrix.language }}
source-root: src

- name: Autobuild
- name: "Build: Autobuild"
id: autobuild
continue-on-error: true
uses: github/codeql-action/autobuild@0116bc2df50751f9724a2e35ef1f24d22f90e4e1 # v2.22.3

- name: Perform CodeQL Analysis
- name: "Check: Perform CodeQL Analysis"
id: analyze
continue-on-error: true
uses: github/codeql-action/analyze@0116bc2df50751f9724a2e35ef1f24d22f90e4e1 # v2.22.3
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
name: Check Dist
name: "Check: Distribution"

on:
workflow_dispatch: {}
Expand All @@ -17,34 +17,28 @@ jobs:
statuses: write

steps:
- name: Harden Runner
- name: "Setup: Harden Runner"
uses: step-security/harden-runner@1b05615854632b887b69ae1be8cbefe72d3ae423 # v2.6.0
with:
egress-policy: audit

- name: "Setup: Checkout"
id: checkout
uses: actions/checkout@8ade135a41bc03ea155e62e844d188df1ea18608 # v4.1.0

- name: "Setup: PNPM"
uses: pnpm/action-setup@d882d12c64e032187b2edb46d3a0d003b7a43598 # v2.4.0
with:
version: 8.9.0

- name: "Setup: Node"
uses: actions/setup-node@5e21ff4d9bc1a8cf6de233a3057d20ec6b3fb69d # v3.8.1
with:
node-version: 20
cache: pnpm

- name: "Setup: Install Dependencies"
id: install
run: pnpm install && pnpm install -g turbo

- name: "Build: Bundle"
id: build
run: turbo build --token ${{ secrets.BUILDLESS_APIKEY }} --no-daemon --remote-only

- name: "Check: Compare Expected and Actual Directories"
id: diff
run: |
Expand All @@ -53,7 +47,6 @@ jobs:
git diff --ignore-space-at-eol --text dist/
exit 1
fi

- name: "Build: Upload Artifact"
uses: actions/upload-artifact@a8a3f3ad30e3422c9c7b888a15615d19a852ae32 # v3.1.3
if: ${{ failure() && steps.diff.conclusion == 'failure' }}
Expand Down
48 changes: 48 additions & 0 deletions .github/workflows/check.scorecards.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,48 @@
name: "Check: Scorecard"
on:
branch_protection_rule: {}
schedule:
- cron: '20 7 * * 2'
push:
branches: ["main"]

# Declare default permissions as read only.
permissions: read-all

jobs:
analysis:
name: "Check: Scorecard"
runs-on: ubuntu-latest
permissions:
# Needed to upload the results to code-scanning dashboard.
security-events: write
# Needed to publish results and get a badge (see publish_results below).
id-token: write
contents: read
actions: read

steps:
- name: "Setup: Harden Runner"
uses: step-security/harden-runner@1b05615854632b887b69ae1be8cbefe72d3ae423 # v2.6.0
with:
egress-policy: audit
- name: "Setup: Checkout"
uses: actions/checkout@f43a0e5ff2bd294095638e18286ca9a3d1956744 # v3.6.0
with:
persist-credentials: false
- name: "Check: Scorecard Analysis"
uses: ossf/scorecard-action@99c53751e09b9529366343771cc321ec74e9bd3d # v2.0.6
with:
results_file: results.sarif
results_format: sarif
publish_results: true
- name: "Artifacts: Analysis SARIF"
uses: actions/upload-artifact@a8a3f3ad30e3422c9c7b888a15615d19a852ae32 # v3.1.3
with:
name: SARIF file
path: results.sarif
retention-days: 5
- name: "Artifacts: GitHub Advanced Security"
uses: github/codeql-action/upload-sarif@0116bc2df50751f9724a2e35ef1f24d22f90e4e1 # v2.22.3
with:
sarif_file: results.sarif
Loading
Loading