From 6764c2751fafee4c2f32d15b487f132eec9179c6 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 28 Jan 2026 03:44:46 +0000 Subject: [PATCH 1/2] chore(deps): update all dependencies --- .github/workflows/publish.yaml | 2 +- .github/workflows/test.yaml | 4 ++-- http-proxy-configurator-operator/requirements.txt | 2 +- http-proxy-policy-operator/requirements.txt | 2 +- http-proxy-policy/requirements.txt | 2 +- squid-forward-proxy-operator/requirements.txt | 2 +- 6 files changed, 7 insertions(+), 7 deletions(-) diff --git a/.github/workflows/publish.yaml b/.github/workflows/publish.yaml index d649352..b901cf9 100644 --- a/.github/workflows/publish.yaml +++ b/.github/workflows/publish.yaml @@ -37,7 +37,7 @@ jobs: id: snapcraft-build uses: snapcore/action-build@v1 - - uses: actions/upload-artifact@v5 + - uses: actions/upload-artifact@v6 with: name: charmed-http-proxy-policy-snap path: "*.snap" diff --git a/.github/workflows/test.yaml b/.github/workflows/test.yaml index 7b3a96b..7af40c1 100644 --- a/.github/workflows/test.yaml +++ b/.github/workflows/test.yaml @@ -40,7 +40,7 @@ jobs: name: HTTP Proxy Policy Tests runs-on: ubuntu-latest steps: - - uses: actions/checkout@v6.0.1 + - uses: actions/checkout@v6.0.2 - uses: actions/setup-python@v6 with: python-version: '3.x' @@ -67,7 +67,7 @@ jobs: id: snapcraft-build uses: snapcore/action-build@v1 - - uses: actions/upload-artifact@v5 + - uses: actions/upload-artifact@v6 with: name: charmed-http-proxy-policy-snap path: "*.snap" diff --git a/http-proxy-configurator-operator/requirements.txt b/http-proxy-configurator-operator/requirements.txt index f157cae..4bcb95f 100644 --- a/http-proxy-configurator-operator/requirements.txt +++ b/http-proxy-configurator-operator/requirements.txt @@ -1,2 +1,2 @@ -ops==3.4.0 +ops==3.5.1 pydantic==2.12.5 diff --git a/http-proxy-policy-operator/requirements.txt b/http-proxy-policy-operator/requirements.txt index 6a9d2c1..b222c13 100644 --- a/http-proxy-policy-operator/requirements.txt +++ b/http-proxy-policy-operator/requirements.txt @@ -1,3 +1,3 @@ -ops==3.4.0 +ops==3.5.1 pydantic==2.12.5 requests==2.32.5 diff --git a/http-proxy-policy/requirements.txt b/http-proxy-policy/requirements.txt index 4417270..b3ce86f 100644 --- a/http-proxy-policy/requirements.txt +++ b/http-proxy-policy/requirements.txt @@ -1,4 +1,4 @@ -django==6.0 +django==6.0.1 djangorestframework==3.16.1 djangorestframework-simplejwt==5.5.1 pydantic==2.12.5 diff --git a/squid-forward-proxy-operator/requirements.txt b/squid-forward-proxy-operator/requirements.txt index f157cae..4bcb95f 100644 --- a/squid-forward-proxy-operator/requirements.txt +++ b/squid-forward-proxy-operator/requirements.txt @@ -1,2 +1,2 @@ -ops==3.4.0 +ops==3.5.1 pydantic==2.12.5 From 3e3abff758b9e3ddb9ddfc915ab0626037fc826a Mon Sep 17 00:00:00 2001 From: Christopher Bartz Date: Thu, 29 Jan 2026 11:34:17 +0100 Subject: [PATCH 2/2] fix: Add nosec comments to test credentials to pass bandit --- .../tests/unit/test_charm.py | 22 +++++++++---------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/http-proxy-policy-operator/tests/unit/test_charm.py b/http-proxy-policy-operator/tests/unit/test_charm.py index 4c1c152..f55a8a1 100644 --- a/http-proxy-policy-operator/tests/unit/test_charm.py +++ b/http-proxy-policy-operator/tests/unit/test_charm.py @@ -121,7 +121,7 @@ def test_reply_requests(mock_policy): "database": "http-proxy-policy", "endpoints": "postgresql.test:5432", "username": "postgres", - "password": "postgres", + "password": "postgres", # nosec }, ) mock_policy.HttpProxyPolicyClient.refresh.return_value = EXAMPLE_EVALUATED_REQUESTS @@ -192,7 +192,7 @@ def test_relay_responses(mock_policy): }, ) mock_policy.HttpProxyPolicyClient.refresh.return_value = [EXAMPLE_EVALUATED_REQUESTS[0]] - backend_secret = ops.testing.Secret(tracked_content={"username": "test", "password": "test"}) + backend_secret = ops.testing.Secret(tracked_content={"username": "test", "password": "test"} # nosec) backend_relation = ops.testing.Relation( endpoint="http-proxy-backend", remote_app_data={ @@ -216,7 +216,7 @@ def test_relay_responses(mock_policy): "database": "http-proxy-policy", "endpoints": "postgresql.test:5432", "username": "postgres", - "password": "postgres", + "password": "postgres", # nosec }, ) state_in = ops.testing.State( @@ -277,7 +277,7 @@ def test_invalid_requests(mock_policy): "database": "http-proxy-policy", "endpoints": "postgresql.test:5432", "username": "postgres", - "password": "postgres", + "password": "postgres", # nosec }, ) backend_relation = ops.testing.Relation( @@ -363,7 +363,7 @@ def test_unsupported_requests(mock_policy): # pylint: disable=unused-argument "database": "http-proxy-policy", "endpoints": "postgresql.test:5432", "username": "postgres", - "password": "postgres", + "password": "postgres", # nosec }, ) backend_relation = ops.testing.Relation( @@ -422,7 +422,7 @@ def test_ignore_duplicate_requests(mock_policy): "database": "http-proxy-policy", "endpoints": "postgresql.test:5432", "username": "postgres", - "password": "postgres", + "password": "postgres", # nosec }, ) backend_relation = ops.testing.Relation( @@ -469,7 +469,7 @@ def test_cleanup_responses(mock_policy): }, ) mock_policy.HttpProxyPolicyClient.refresh.return_value = [EXAMPLE_EVALUATED_REQUESTS[0]] - backend_secret = ops.testing.Secret(tracked_content={"username": "test", "password": "test"}) + backend_secret = ops.testing.Secret(tracked_content={"username": "test", "password": "test"} # nosec) backend_relation = ops.testing.Relation( endpoint="http-proxy-backend", local_app_data={ @@ -504,7 +504,7 @@ def test_cleanup_responses(mock_policy): "database": "http-proxy-policy", "endpoints": "postgresql.test:5432", "username": "postgres", - "password": "postgres", + "password": "postgres", # nosec }, ) state_in = ops.testing.State( @@ -547,7 +547,7 @@ def test_invalid_backend_response(mock_policy): }, ) mock_policy.HttpProxyPolicyClient.refresh.return_value = [EXAMPLE_EVALUATED_REQUESTS[0]] - backend_secret = ops.testing.Secret(tracked_content={"username": "test", "password": "test"}) + backend_secret = ops.testing.Secret(tracked_content={"username": "test", "password": "test"} # nosec) backend_relation = ops.testing.Relation( endpoint="http-proxy-backend", remote_app_data={ @@ -560,7 +560,7 @@ def test_invalid_backend_response(mock_policy): "database": "http-proxy-policy", "endpoints": "postgresql.test:5432", "username": "postgres", - "password": "postgres", + "password": "postgres", # nosec }, ) state_in = ops.testing.State( @@ -611,7 +611,7 @@ def test_missing_backend_relation(mock_policy): "database": "http-proxy-policy", "endpoints": "postgresql.test:5432", "username": "postgres", - "password": "postgres", + "password": "postgres", # nosec }, ) state_in = ops.testing.State(