Skip to content

Commit 9c479a6

Browse files
Aryamanz29claude
andcommitted
chore: upgrade Python dependencies and GitHub Actions to latest versions
Python dependencies (pyproject.toml + uv.lock): - pydantic: 2.12.4 -> 2.12.5 - pytz: 2025.2 -> 2026.1.post1 - httpx-retries: 0.4.5 -> 0.4.6 - mypy: 1.18.0 -> 1.19.0 - ruff: 0.14.5 -> 0.15.5 - types-setuptools: 80.9.0 -> 81.0.0.20260209 - types-Authlib: 1.6.5 -> 1.6.7.20260208 - filelock: 3.20.3 -> 3.25.0 (Python >=3.10) - virtualenv: 20.36.1 -> 21.1.0 - pytest-sugar: 1.0.0 -> 1.1.1 - furo: 2025.9.25 -> 2025.12.19 Skipped (Python 3.9 constraint): pytest 9.x, vcrpy 8.x, sphinx 8.x, tenacity 9.1.4, pre-commit 4.4+, pytest-asyncio 1.3, networkx 3.3+ GitHub Actions: - astral-sh/setup-uv: v6 -> v7 - aquasecurity/trivy-action: 0.33.1 -> 0.34.2 - docker/build-push-action: v6 -> v7 - docker/login-action: v3 -> v4 - docker/setup-buildx-action: v3 -> v4 - ruff pre-commit rev: v0.12.8 -> v0.15.5 Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
1 parent de441ba commit 9c479a6

15 files changed

Lines changed: 1642 additions & 994 deletions

.github/workflows/pyatlan-chainguard.yaml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -48,24 +48,24 @@ jobs:
4848
fetch-depth: 0 # Need full history for commit hash
4949

5050
- name: Set up Docker Buildx
51-
uses: docker/setup-buildx-action@v3
51+
uses: docker/setup-buildx-action@v4
5252

5353
- name: Log in to GitHub Container Registry
54-
uses: docker/login-action@v3
54+
uses: docker/login-action@v4
5555
with:
5656
registry: ghcr.io
5757
username: ${{ github.actor }}
5858
password: ${{ secrets.GITHUB_TOKEN }}
5959

6060
- name: Log in to Atlan Harbor Registry
61-
uses: docker/login-action@v3
61+
uses: docker/login-action@v4
6262
with:
6363
registry: registry.atlan.com
6464
username: ${{ secrets.HARBOR_USERNAME }}
6565
password: ${{ secrets.HARBOR_PASSWORD }}
6666

6767
- name: Log in to Chainguard Container Registry
68-
uses: docker/login-action@v3
68+
uses: docker/login-action@v4
6969
with:
7070
registry: cgr.dev
7171
username: ${{ secrets.CHAINGUARD_USERNAME }}
@@ -172,7 +172,7 @@ jobs:
172172
echo "Generated image tag: ghcr.io/atlanhq/pyatlan-chainguard-base:$IMAGE_TAG"
173173
174174
- name: Build and push Docker image
175-
uses: docker/build-push-action@v6
175+
uses: docker/build-push-action@v7
176176
with:
177177
context: .
178178
file: ./Dockerfile

.github/workflows/pyatlan-docs.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ jobs:
2121
python-version: "3.12"
2222

2323
- name: Install uv
24-
uses: astral-sh/setup-uv@v6
24+
uses: astral-sh/setup-uv@v7
2525

2626
- name: Install dependencies
2727
run: uv sync --group docs

.github/workflows/pyatlan-pr.yaml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ jobs:
6767
python-version: ${{ matrix.python-version }}
6868

6969
- name: Install uv
70-
uses: astral-sh/setup-uv@v6
70+
uses: astral-sh/setup-uv@v7
7171

7272
- uses: pypa/gh-action-pip-audit@v1.1.0
7373
with:
@@ -161,7 +161,7 @@ jobs:
161161
python-version: ${{ matrix.python-version }}
162162

163163
- name: Install uv
164-
uses: astral-sh/setup-uv@v6
164+
uses: astral-sh/setup-uv@v7
165165

166166
- name: Install dependencies
167167
run: uv sync --group dev
@@ -223,7 +223,7 @@ jobs:
223223
python-version: "3.9"
224224

225225
- name: Install uv
226-
uses: astral-sh/setup-uv@v6
226+
uses: astral-sh/setup-uv@v7
227227

228228
- name: Install dependencies
229229
run: uv sync --group dev
@@ -265,7 +265,7 @@ jobs:
265265
python-version: "3.9"
266266

267267
- name: Install uv
268-
uses: astral-sh/setup-uv@v6
268+
uses: astral-sh/setup-uv@v7
269269

270270
- name: Install dependencies
271271
run: uv sync --group dev
@@ -304,7 +304,7 @@ jobs:
304304
python-version: ${{ matrix.python-version }}
305305

306306
- name: Install uv
307-
uses: astral-sh/setup-uv@v6
307+
uses: astral-sh/setup-uv@v7
308308

309309
- name: Install dependencies
310310
run: uv sync --group dev
@@ -381,7 +381,7 @@ jobs:
381381
python-version: "3.11"
382382

383383
- name: Install uv
384-
uses: astral-sh/setup-uv@v6
384+
uses: astral-sh/setup-uv@v7
385385

386386
- name: Install dependencies
387387
run: uv sync --group dev
@@ -417,7 +417,7 @@ jobs:
417417
python-version: "3.11"
418418

419419
- name: Install uv
420-
uses: astral-sh/setup-uv@v6
420+
uses: astral-sh/setup-uv@v7
421421

422422
- name: Install dependencies
423423
run: uv sync --group dev

.github/workflows/pyatlan-publish.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ jobs:
2828
with:
2929
python-version: '3.9'
3030
- name: Install uv
31-
uses: astral-sh/setup-uv@v6
31+
uses: astral-sh/setup-uv@v7
3232
- name: Install dependencies
3333
run: uv sync --group dev
3434
- name: check tag

.github/workflows/pyatlan-scheduled-scan.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -20,17 +20,17 @@ jobs:
2020
uses: actions/checkout@v4
2121

2222
- name: Set up Docker Buildx
23-
uses: docker/setup-buildx-action@v3
23+
uses: docker/setup-buildx-action@v4
2424

2525
- name: Log in to container registry
26-
uses: docker/login-action@v3
26+
uses: docker/login-action@v4
2727
with:
2828
registry: cgr.dev
2929
username: ${{ secrets.CHAINGUARD_USERNAME }}
3030
password: ${{ secrets.CHAINGUARD_PASSWORD }}
3131

3232
- name: Build image
33-
uses: docker/build-push-action@v6
33+
uses: docker/build-push-action@v7
3434
with:
3535
context: '.'
3636
file: './Dockerfile'
@@ -41,7 +41,7 @@ jobs:
4141
# ── Image scan ──
4242

4343
- name: Trivy image scan (JSON)
44-
uses: aquasecurity/trivy-action@0.33.1
44+
uses: aquasecurity/trivy-action@0.34.2
4545
with:
4646
image-ref: 'pyatlan:trivy-scan'
4747
scanners: 'vuln'
@@ -56,7 +56,7 @@ jobs:
5656
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
5757

5858
- name: Trivy image scan (table)
59-
uses: aquasecurity/trivy-action@0.33.1
59+
uses: aquasecurity/trivy-action@0.34.2
6060
with:
6161
image-ref: 'pyatlan:trivy-scan'
6262
scanners: 'vuln'
@@ -73,7 +73,7 @@ jobs:
7373
# ── Dependency scan ──
7474

7575
- name: Trivy dependency scan (JSON)
76-
uses: aquasecurity/trivy-action@0.33.1
76+
uses: aquasecurity/trivy-action@0.34.2
7777
with:
7878
scan-type: fs
7979
input: 'uv.lock'
@@ -88,7 +88,7 @@ jobs:
8888
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
8989

9090
- name: Trivy dependency scan (table)
91-
uses: aquasecurity/trivy-action@0.33.1
91+
uses: aquasecurity/trivy-action@0.34.2
9292
with:
9393
scan-type: fs
9494
input: 'uv.lock'

.github/workflows/pyatlan-test-cron.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ jobs:
2121
python-version: ${{ matrix.python-version }}
2222

2323
- name: Install uv
24-
uses: astral-sh/setup-uv@v6
24+
uses: astral-sh/setup-uv@v7
2525

2626
- name: Install dependencies
2727
run: uv sync --group dev

.github/workflows/scheduled-trivy-scan.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -20,17 +20,17 @@ jobs:
2020
uses: actions/checkout@v4
2121

2222
- name: Set up Docker Buildx
23-
uses: docker/setup-buildx-action@v3
23+
uses: docker/setup-buildx-action@v4
2424

2525
- name: Log in to container registry
26-
uses: docker/login-action@v3
26+
uses: docker/login-action@v4
2727
with:
2828
registry: cgr.dev
2929
username: ${{ secrets.CHAINGUARD_USERNAME }}
3030
password: ${{ secrets.CHAINGUARD_PASSWORD }}
3131

3232
- name: Build image
33-
uses: docker/build-push-action@v6
33+
uses: docker/build-push-action@v7
3434
with:
3535
context: '.'
3636
file: './Dockerfile'
@@ -41,7 +41,7 @@ jobs:
4141
# ── Image scan ──
4242

4343
- name: Trivy image scan (JSON)
44-
uses: aquasecurity/trivy-action@0.33.1
44+
uses: aquasecurity/trivy-action@0.34.2
4545
with:
4646
image-ref: 'pyatlan:trivy-scan'
4747
scanners: 'vuln'
@@ -56,7 +56,7 @@ jobs:
5656
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
5757

5858
- name: Trivy image scan (table)
59-
uses: aquasecurity/trivy-action@0.33.1
59+
uses: aquasecurity/trivy-action@0.34.2
6060
with:
6161
image-ref: 'pyatlan:trivy-scan'
6262
scanners: 'vuln'
@@ -73,7 +73,7 @@ jobs:
7373
# ── Dependency scan ──
7474

7575
- name: Trivy dependency scan (JSON)
76-
uses: aquasecurity/trivy-action@0.33.1
76+
uses: aquasecurity/trivy-action@0.34.2
7777
with:
7878
scan-type: fs
7979
input: 'uv.lock'
@@ -88,7 +88,7 @@ jobs:
8888
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
8989

9090
- name: Trivy dependency scan (table)
91-
uses: aquasecurity/trivy-action@0.33.1
91+
uses: aquasecurity/trivy-action@0.34.2
9292
with:
9393
scan-type: fs
9494
input: 'uv.lock'

.github/workflows/trivy.yml

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -22,17 +22,17 @@ jobs:
2222
uses: actions/checkout@v4
2323

2424
- name: Set up Docker Buildx
25-
uses: docker/setup-buildx-action@v3
25+
uses: docker/setup-buildx-action@v4
2626

2727
- name: Log in to Chainguard Container Registry
28-
uses: docker/login-action@v3
28+
uses: docker/login-action@v4
2929
with:
3030
registry: cgr.dev
3131
username: ${{ secrets.CHAINGUARD_USERNAME }}
3232
password: ${{ secrets.CHAINGUARD_PASSWORD }}
3333

3434
- name: Build image
35-
uses: docker/build-push-action@v6
35+
uses: docker/build-push-action@v7
3636
with:
3737
context: .
3838
file: ./Dockerfile
@@ -41,7 +41,7 @@ jobs:
4141
tags: pyatlan-trivy:latest
4242

4343
- name: Trivy image scan (table)
44-
uses: aquasecurity/trivy-action@0.33.1
44+
uses: aquasecurity/trivy-action@0.34.2
4545
with:
4646
image-ref: pyatlan-trivy:latest
4747
scanners: 'vuln'
@@ -67,7 +67,7 @@ jobs:
6767
fi
6868
6969
- name: Trivy image scan (SARIF)
70-
uses: aquasecurity/trivy-action@0.33.1
70+
uses: aquasecurity/trivy-action@0.34.2
7171
with:
7272
image-ref: pyatlan-trivy:latest
7373
scanners: 'vuln'
@@ -82,7 +82,7 @@ jobs:
8282
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
8383

8484
- name: Trivy dependency scan (uv.lock, table)
85-
uses: aquasecurity/trivy-action@0.33.1
85+
uses: aquasecurity/trivy-action@0.34.2
8686
with:
8787
scan-type: fs
8888
scan-ref: uv.lock
@@ -108,7 +108,7 @@ jobs:
108108
fi
109109
110110
- name: Trivy dependency scan (uv.lock, SARIF)
111-
uses: aquasecurity/trivy-action@0.33.1
111+
uses: aquasecurity/trivy-action@0.34.2
112112
with:
113113
scan-type: fs
114114
scan-ref: uv.lock
@@ -163,7 +163,7 @@ jobs:
163163
} >> "$GITHUB_STEP_SUMMARY"
164164
165165
- name: Fail on High/Critical vulnerabilities (image)
166-
uses: aquasecurity/trivy-action@0.33.1
166+
uses: aquasecurity/trivy-action@0.34.2
167167
with:
168168
image-ref: pyatlan-trivy:latest
169169
scanners: 'vuln'
@@ -177,7 +177,7 @@ jobs:
177177
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
178178

179179
- name: Fail on High/Critical vulnerabilities (uv.lock)
180-
uses: aquasecurity/trivy-action@0.33.1
180+
uses: aquasecurity/trivy-action@0.34.2
181181
with:
182182
scan-type: fs
183183
scan-ref: uv.lock

.pre-commit-config.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ repos:
1111

1212
# Use uv to run formatting and QA tools
1313
- repo: https://github.com/astral-sh/ruff-pre-commit
14-
rev: v0.12.8
14+
rev: v0.15.5
1515
hooks:
1616
- id: ruff
1717
- id: ruff

pyatlan/client/atlan.py

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -601,9 +601,11 @@ def _call_api_internal(
601601
_stream_lines=response_data[
602602
"lines"
603603
], # Store lines for event processing
604-
json=lambda: json.loads(response_data["text"])
605-
if response_data["text"]
606-
else {},
604+
json=lambda: (
605+
json.loads(response_data["text"])
606+
if response_data["text"]
607+
else {}
608+
),
607609
)
608610
else:
609611
response = self._session.request(

0 commit comments

Comments
 (0)