32 lines
1.4 KiB
Bash
32 lines
1.4 KiB
Bash
#!/usr/bin/env bash
|
|
set -euo pipefail
|
|
|
|
TARGET_DIR="${1:-.}"
|
|
OUTPUT_DIR="${2:-tests/reports/agents}"
|
|
mkdir -p "$OUTPUT_DIR"
|
|
SUMMARY_FILE="$OUTPUT_DIR/dependances_agent.md"
|
|
source "$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)/common.sh" || true
|
|
|
|
echo "# Agent Dépendances" > "$SUMMARY_FILE"
|
|
echo >> "$SUMMARY_FILE"
|
|
|
|
echo "- Vérifier régulièrement les dépendances (audit sécurité, mises à jour stables)." >> "$SUMMARY_FILE"
|
|
pushd "$TARGET_DIR" >/dev/null
|
|
if [[ "$SCOPE" == "changed" ]]; then
|
|
relevant=(package.json package-lock.json pnpm-lock.yaml yarn.lock requirements.txt pyproject.toml Cargo.toml go.mod .gitea/workflows/ci.yml)
|
|
any=0; for p in "${relevant[@]}"; do if [[ -e "$p" ]] && is_path_changed "$p"; then any=1; break; fi; done
|
|
if [[ $any -eq 0 ]]; then echo "- Aucun changement dépendances/CI (SCOPE=changed)." >> "$SUMMARY_FILE"; echo "Rapport: $SUMMARY_FILE"; popd >/dev/null; exit 0; fi
|
|
fi
|
|
if grep -q "security-audit" .gitea/workflows/ci.yml 2>/dev/null; then
|
|
echo "- Job CI security-audit détecté." >> "$SUMMARY_FILE"
|
|
fi
|
|
|
|
PROMPT=$(cat <<'EOF'
|
|
Établis une politique de dépendances: ajout automatique si justifié, vérification des dernières versions stables, documentation des impacts (ARCHITECTURE, CONFIGURATION, CHANGELOG), et rollback.
|
|
EOF
|
|
)
|
|
scripts/agents/ai_prompt.sh "$PROMPT" >> "$SUMMARY_FILE" || true
|
|
|
|
echo "Rapport: $SUMMARY_FILE"
|
|
popd >/dev/null
|