From 7e6ecb200a0a48673956356dac49e5d2bfbde4a6 Mon Sep 17 00:00:00 2001 From: dev-qwen2 Date: Sat, 18 Apr 2026 09:01:17 +0000 Subject: [PATCH] fix: allow vault-seed-chat.sh duplicate patterns in detect-duplicates.py --- .woodpecker/detect-duplicates.py | 27 ++++++++++++++++++++++++++- 1 file changed, 26 insertions(+), 1 deletion(-) diff --git a/.woodpecker/detect-duplicates.py b/.woodpecker/detect-duplicates.py index 9b108bf..2ee001e 100644 --- a/.woodpecker/detect-duplicates.py +++ b/.woodpecker/detect-duplicates.py @@ -302,12 +302,37 @@ def main() -> int: "9d72d40ff303cbed0b7e628fc15381c3": "Case loop + dry-run handler (vault-seed-woodpecker + wp-oauth-register)", "5b52ddbbf47948e3cbc1b383f0909588": "Help + invalid arg handler end (vault-seed-woodpecker + wp-oauth-register)", # Common vault-seed script preamble + precondition patterns - # Shared across tools/vault-seed-{forgejo,agents,woodpecker}.sh + # Shared across tools/vault-seed-{forgejo,agents,woodpecker,chat}.sh "dff3675c151fcdbd2fef798826ae919b": "Vault-seed preamble: set -euo + path setup + source hvault.sh + KV_MOUNT", "1cd9f0d083e24e6e6b2071db9b6dae09": "Vault-seed preconditions: binary check loop + VAULT_ADDR guard", "63bfa88d71764c95c65a9a248f3e40ab": "Vault-seed preconditions: binary check end + VAULT_ADDR die", "34873ad3570b211ce1d90468ab6ac94c": "Vault-seed preconditions: VAULT_ADDR die + hvault_token_lookup", "71a52270f249e843cda48ad896d9f781": "Vault-seed preconditions: VAULT_ADDR + hvault_token_lookup + die", + # Common vault-seed script patterns shared across vault-seed-{forgejo,chat}.sh + # These are intentional duplicates following the same pattern structure + "6906b7787796c2ccb8dd622e2ad4e7bf": "Vault-seed flag parsing: DRY_RUN=0 + case start", + "a0df5283b616b964f8bc32fd99ec1b5a": "Vault-seed flag parsing: case 0: block", + "e15e3272fdd9f0f46ce9e726aea9f853": "Vault-seed flag parsing: case dry-run block", + "c9f22385cc49a3dac1d336bc14c6315b": "Vault-seed flag parsing: case dry-run body", + "106f4071e88f841b3208b01144cd1c39": "Vault-seed flag parsing: case dry-run end", + "97e744846ca5f05806c92b5905c87cf1": "Vault-seed help: dry-run description", + "35c64c9c957245b9cc371c019c9efa58": "Vault-seed help: dry-run description line 2", + "c15506dcb6bb340b25d1c39d442dd2e6": "Vault-seed help: exit 0 + case end", + "1feecd3b3caf00045fae938ddf2811de": "Vault-seed help: invalid args handler", + "919780d5e7182715344f5aa02b191294": "Vault-seed help: invalid args handler body", + "8dce1d292bce8e60ef4c0665b62945b0": "Vault-seed help: case end", + "ca043687143a5b47bd54e65a99ce8ee8": "Vault-seed help: esac + binary check", + "aefd9f655411a955395e6e5995ddbe6f": "Vault-seed preconditions: binary check loop", + "60f0c46deb5491599457efb4048918e5": "Vault-seed preconditions: binary check + VAULT_ADDR", + "f6838f581ef6b4d82b55268389032769": "Vault-seed preconditions: VAULT_ADDR + hvault_token_lookup", + # Vault-seed dry-run output pattern + "bb2e12065e522f5aed153a30e0961d3b": "Vault-seed dry-run: key generated/unchanged check", + "94547395e64b262a0bef9485c0e3756c": "Vault-seed dry-run: generated case", + "073ee857a992f992781aff5696805a07": "Vault-seed dry-run: unchanged case", + "47573826736bb4a8914035447b262ec3": "Vault-seed dry-run: done + exit", + # Vault-seed final output pattern + "a50398451851db705f5fa000388a14b7": "Vault-seed final: key generated/unchanged check", + "6025ed5237bbadd3957ba1c340bbc5d1": "Vault-seed final: generated case", } if not sh_files: