Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
21 commits
Select commit Hold shift + click to select a range
479da30
Update dependency agno to >=2.6.7
renovate[bot] May 17, 2026
b38832d
Merge branch 'main' into renovate/agno-2.x
mergify[bot] May 17, 2026
695b010
Merge branch 'main' into renovate/agno-2.x
mergify[bot] May 17, 2026
9f647f0
Merge branch 'main' into renovate/agno-2.x
mergify[bot] May 18, 2026
b3610d3
Merge branch 'main' into renovate/agno-2.x
mergify[bot] May 18, 2026
6641d8e
Merge branch 'main' into renovate/agno-2.x
mergify[bot] May 19, 2026
10de1b3
Merge branch 'main' into renovate/agno-2.x
mergify[bot] May 20, 2026
f93be35
Merge branch 'main' into renovate/agno-2.x
mergify[bot] May 20, 2026
0f70dcf
Merge branch 'main' into renovate/agno-2.x
mergify[bot] May 21, 2026
1276067
Merge branch 'main' into renovate/agno-2.x
mergify[bot] May 21, 2026
4220123
Merge branch 'main' into renovate/agno-2.x
mergify[bot] May 21, 2026
b160892
Merge branch 'main' into renovate/agno-2.x
mergify[bot] May 22, 2026
a7c255a
Merge branch 'main' into renovate/agno-2.x
mergify[bot] May 22, 2026
509cd0f
Merge branch 'main' into renovate/agno-2.x
mergify[bot] May 22, 2026
04be4f5
Merge branch 'main' into renovate/agno-2.x
mergify[bot] May 22, 2026
9cf2ccf
Merge branch 'main' into renovate/agno-2.x
mergify[bot] May 22, 2026
cb52daa
Update docker/metadata-action action to v6.1.0
renovate[bot] May 22, 2026
8be57e1
Update github/codeql-action action to v4.36.0
renovate[bot] May 22, 2026
53a5054
Merge of #1859
mergify[bot] May 22, 2026
5ec4eb4
Merge of #1948
mergify[bot] May 22, 2026
2b08b88
Merge of #1949
mergify[bot] May 22, 2026
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 4 additions & 4 deletions .github/workflows/.docker.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -86,7 +86,7 @@
uses: docker/setup-buildx-action@4d04d5d9486b7bd6fa91e7baf45bbb4f8b9deedd # v4.0.0
- name: Docker meta
id: meta
uses: docker/metadata-action@030e881283bb7a6894de51c315a6bfe6a94e05cf # v6.0.0
uses: docker/metadata-action@80c7e94dd9b9319bd5eb7a0e0fe9291e23a2a2e9 # v6.1.0
with:
images: ${{ inputs.registry }}/${{ github.repository }}
tags: |
Expand Down Expand Up @@ -126,7 +126,7 @@
enable-url-completion: true
- name: Export tag for Testing and Scanning
id: tag
run: echo "TAG=$(echo "${{ steps.meta.outputs.tags }}" | tail -n 1)" >> $GITHUB_OUTPUT

Check failure on line 129 in .github/workflows/.docker.yaml

View workflow job for this annotation

GitHub Actions / Lint / ActionLint

shellcheck reported issue in this script: SC2086:info:1:68: Double quote to prevent globbing and word splitting
docker_scout:
name: Docker Scout CVEs
needs: build_image
Expand Down Expand Up @@ -189,7 +189,7 @@
cache-db: true
- name: upload Anchore scan SARIF report
if: success() || failure()
uses: github/codeql-action/upload-sarif@9e0d7b8d25671d64c341c19c0152d693099fb5ba # v4.35.5
uses: github/codeql-action/upload-sarif@7211b7c8077ea37d8641b6271f6a365a22a5fbfa # v4.36.0
with:
sarif_file: ${{ steps.scan.outputs.sarif }}
trivy:
Expand All @@ -212,7 +212,7 @@
scanners: vuln,secret,misconfig,license
- name: Upload Trivy scan results to GitHub Security tab
if: success() || failure()
uses: github/codeql-action/upload-sarif@9e0d7b8d25671d64c341c19c0152d693099fb5ba # v4.35.5
uses: github/codeql-action/upload-sarif@7211b7c8077ea37d8641b6271f6a365a22a5fbfa # v4.36.0
with:
sarif_file: trivy-results-image.sarif
dockle:
Expand All @@ -233,7 +233,7 @@
ignore: CIS-DI-0006
- name: upload Dockle scan SARIF report
if: success() || failure()
uses: github/codeql-action/upload-sarif@9e0d7b8d25671d64c341c19c0152d693099fb5ba # v4.35.5
uses: github/codeql-action/upload-sarif@7211b7c8077ea37d8641b6271f6a365a22a5fbfa # v4.36.0
with:
sarif_file: dockle.sarif
api_test:
Expand Down
8 changes: 4 additions & 4 deletions .github/workflows/.lint.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@
repo: trufflesecurity/trufflehog
cache: enable
- name: Git Secret Scanning
run: >-

Check failure on line 53 in .github/workflows/.lint.yaml

View workflow job for this annotation

GitHub Actions / Lint / ActionLint

"github.head_ref" is potentially untrusted. avoid using it directly in inline scripts. instead, pass it through an environment variable. see https://docs.github.com/en/actions/reference/security/secure-use#good-practices-for-mitigating-script-injection-attacks for more details
trufflehog git ${{github.event.repository.html_url}} --branch=${{github.head_ref || github.ref_name}}
--fail --github-actions --results=verified,unknown --log-level=4 --no-update
pre-commit:
Expand Down Expand Up @@ -149,7 +149,7 @@
${{matrix.output == 'sarif' && '--output-file ruff.sarif' || ''}}
- name: upload Ruff scan SARIF report
if: matrix.output == 'sarif' && ( success() || failure() )
uses: github/codeql-action/upload-sarif@9e0d7b8d25671d64c341c19c0152d693099fb5ba # v4.35.5
uses: github/codeql-action/upload-sarif@7211b7c8077ea37d8641b6271f6a365a22a5fbfa # v4.36.0
with:
sarif_file: ruff.sarif
- name: Commit and push applied Ruff fixes
Expand Down Expand Up @@ -226,7 +226,7 @@
cache-db: true
- name: upload Anchore scan SARIF report
if: success() || failure()
uses: github/codeql-action/upload-sarif@9e0d7b8d25671d64c341c19c0152d693099fb5ba # v4.35.5
uses: github/codeql-action/upload-sarif@7211b7c8077ea37d8641b6271f6a365a22a5fbfa # v4.36.0
with:
sarif_file: ${{ steps.scan.outputs.sarif }}
trivy:
Expand Down Expand Up @@ -269,7 +269,7 @@
scanners: vuln,secret,misconfig
- name: Upload Trivy scan results to GitHub Security tab
if: matrix.scan-type != 'fs' && ( success() || failure() )
uses: github/codeql-action/upload-sarif@9e0d7b8d25671d64c341c19c0152d693099fb5ba # v4.35.5
uses: github/codeql-action/upload-sarif@7211b7c8077ea37d8641b6271f6a365a22a5fbfa # v4.36.0
with:
sarif_file: ${{ matrix.output }}
category: ${{ matrix.scan-type }}
Expand Down Expand Up @@ -337,7 +337,7 @@
output-file: hadolint.sarif
- name: upload Hadolint scan SARIF report
if: success() || failure()
uses: github/codeql-action/upload-sarif@9e0d7b8d25671d64c341c19c0152d693099fb5ba # v4.35.5
uses: github/codeql-action/upload-sarif@7211b7c8077ea37d8641b6271f6a365a22a5fbfa # v4.36.0
with:
sarif_file: hadolint.sarif
actionlint:
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/daily-malicious-code-scan.lock.yml

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion pyproject.toml
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ authors = [
{ email = "mohamed.hisham.abdelzaher@gmail.com", name = "Mohamed Hisham Abdelzaher" },
]
dependencies = [
"agno[google,qdrant]>=2.6.6",
"agno[google,qdrant]>=2.6.7",
"ddgs>=9.14.4",
"fastembed>=0.8.0",
"gradio[mcp]>=6.14.0",
Expand Down
8 changes: 4 additions & 4 deletions uv.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Loading