Skip to content

feat(ci): rename build.yaml to pr.yaml, add zizmor and PR validation#722

Merged
Teebor-Choka merged 14 commits intomainfrom
kauki/feat/ci/migrate-to-shared-workflows
Mar 31, 2026
Merged

feat(ci): rename build.yaml to pr.yaml, add zizmor and PR validation#722
Teebor-Choka merged 14 commits intomainfrom
kauki/feat/ci/migrate-to-shared-workflows

Conversation

@Teebor-Choka
Copy link
Copy Markdown
Contributor

@Teebor-Choka Teebor-Choka commented Mar 30, 2026

Rename build.yaml to pr.yaml, add PR title validation, labeling, and zizmor scanning. Pin unpinned actions to SHA.

🤖 Generated with Claude Code

Summary by CodeRabbit

  • New Features

    • Adds automated security checks via Zizmor on PRs.
    • Adds automatic PR labeling for toolchain and dependency changes.
    • Implements semantic pull request title validation.
  • Chores

    • Reworks CI workflows and build pipeline (consolidation and new PR-triggered flows).
    • Adds a new developer CI shell for local CI-related tooling.

- Rename build.yaml to pr.yaml with inline validate-pr-title and label jobs
- Pin actions/checkout to SHA (v6.0.2)
- Add checks-zizmor.yaml thin caller for shared zizmor workflow
- Add .github/labeler.yml for Node.js project labels
- Add .#ci devShell with zizmor to flake.nix

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
@Teebor-Choka Teebor-Choka self-assigned this Mar 30, 2026
@github-advanced-security
Copy link
Copy Markdown

You are seeing this message because GitHub Code Scanning has recently been set up for this repository, or this pull request contains the workflow file for the Code Scanning tool.

What Enabling Code Scanning Means:

  • The 'Security' tab will display more code scanning analysis results (e.g., for the default branch).
  • Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results.
  • You will be able to see the analysis results for the pull request's branch on this overview once the scans have completed and the checks have passed.

For more information about GitHub Code Scanning, check out the documentation.

Comment thread .github/workflows/pr.yaml Fixed
Comment thread .github/workflows/pr.yaml Fixed
Comment thread .github/workflows/pr.yaml Fixed
Comment thread .github/workflows/pr.yaml Fixed
Comment thread .github/workflows/pr.yaml Fixed
Comment thread .github/workflows/pr.yaml Fixed
@coderabbitai
Copy link
Copy Markdown

coderabbitai bot commented Mar 30, 2026

Warning

Rate limit exceeded

@Teebor-Choka has exceeded the limit for the number of commits that can be reviewed per hour. Please wait 9 minutes and 20 seconds before requesting another review.

Your organization is not enrolled in usage-based pricing. Contact your admin to enable usage-based pricing to continue reviews beyond the rate limit, or try again in 9 minutes and 20 seconds.

⌛ How to resolve this issue?

After the wait time has elapsed, a review can be triggered using the @coderabbitai review command as a PR comment. Alternatively, push new commits to this PR.

We recommend that you space out your commits to avoid hitting the rate limit.

🚦 How do rate limits work?

CodeRabbit enforces hourly rate limits for each developer per organization.

Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout.

Please see our FAQ for further information.

ℹ️ Review info
⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: dc63440f-c1e1-4e08-9ce7-2de3d0427586

📥 Commits

Reviewing files that changed from the base of the PR and between 88f02b5 and 3ecf594.

📒 Files selected for processing (2)
  • .github/workflows/checks-zizmor.yaml
  • .github/workflows/pr.yaml
📝 Walkthrough

Walkthrough

Adds two new GitHub workflows (pr.yaml, checks-zizmor.yaml), removes the legacy build.yaml, adds .github/labeler.yml, and exposes a new Nix flake dev shell devShells.ci in flake.nix.

Changes

Cohort / File(s) Summary
Workflows
.github/workflows/build.yaml, .github/workflows/pr.yaml, .github/workflows/checks-zizmor.yaml
Removed legacy build.yaml. Added pr.yaml (PR-title validation, labeling, Node build matrix, Docker build via external reusable workflow) and checks-zizmor.yaml (invokes external Zizmor reusable checks). Review reusable-workflow inputs, concurrency, permissions, runner selection, and secrets forwarding.
Labeler configuration
.github/labeler.yml
New labeler rules: toolchain for flake.*, *.nix, .github/**; dependencies for yarn.lock and package.json.
Nix flake
flake.nix
Added devShells.ci via pkgs.mkShell with nativeBuildInputs = [ pkgs.zizmor ] (new Nix dev shell output).

Sequence Diagram(s)

sequenceDiagram
  participant Dev as Developer
  participant GH as GitHub
  participant Actions as GitHub Actions
  participant Reusable as External Reusable Workflow
  participant Secrets as Secret Providers

  Dev->>GH: Open / update PR
  GH->>Actions: Trigger `pr.yaml` (PR events)
  Actions->>Actions: validate-pr-title, apply labels
  Actions->>Actions: run Node build matrix (self-hosted runners)
  Actions->>Reusable: invoke reusable Docker build workflow (source_branch, matrix, inputs)
  Secrets->>Reusable: provide CACHIX / GCP secrets via workflow inputs
  GH->>Actions: If `.github/**` changed -> trigger `checks-zizmor.yaml`
  Actions->>Reusable: invoke Zizmor reusable checks (with CACHIX token)
  Actions-->>GH: Report statuses / labels back to PR
Loading

Estimated code review effort

🎯 3 (Moderate) | ⏱️ ~25 minutes

🚥 Pre-merge checks | ✅ 3
✅ Passed checks (3 passed)
Check name Status Explanation
Description Check ✅ Passed Check skipped - CodeRabbit’s high-level summary is enabled.
Title check ✅ Passed The title directly aligns with the main changes: renaming build.yaml to pr.yaml, adding zizmor workflow, and implementing PR validation.
Docstring Coverage ✅ Passed No functions found in the changed files to evaluate docstring coverage. Skipping docstring coverage check.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Commit unit tests in branch kauki/feat/ci/migrate-to-shared-workflows

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

@github-actions
Copy link
Copy Markdown

github-actions bot commented Mar 30, 2026

🔎 Trivy Security Report

Target Package Installed Severity CVE
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) curl 7.74.0-1.3+deb11u7 CRITICAL CVE-2023-38545
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) curl 7.74.0-1.3+deb11u7 HIGH CVE-2023-27533
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) curl 7.74.0-1.3+deb11u7 HIGH CVE-2023-27534
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) curl 7.74.0-1.3+deb11u7 HIGH CVE-2024-2398
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) e2fsprogs 1.46.2-2 HIGH CVE-2022-1304
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) gpgv 2.2.27-2+deb11u2 HIGH CVE-2025-68973
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libc-bin 2.31-13+deb11u6 HIGH CVE-2023-4911
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libc-bin 2.31-13+deb11u6 HIGH CVE-2024-2961
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libc-bin 2.31-13+deb11u6 HIGH CVE-2024-33599
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libc-bin 2.31-13+deb11u6 HIGH CVE-2025-4802
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libc6 2.31-13+deb11u6 HIGH CVE-2023-4911
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libc6 2.31-13+deb11u6 HIGH CVE-2024-2961
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libc6 2.31-13+deb11u6 HIGH CVE-2024-33599
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libc6 2.31-13+deb11u6 HIGH CVE-2025-4802
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libcom-err2 1.46.2-2 HIGH CVE-2022-1304
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libcurl4 7.74.0-1.3+deb11u7 CRITICAL CVE-2023-38545
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libcurl4 7.74.0-1.3+deb11u7 HIGH CVE-2023-27533
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libcurl4 7.74.0-1.3+deb11u7 HIGH CVE-2023-27534
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libcurl4 7.74.0-1.3+deb11u7 HIGH CVE-2024-2398
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libexpat1 2.2.10-2+deb11u5 CRITICAL CVE-2024-45491
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libexpat1 2.2.10-2+deb11u5 CRITICAL CVE-2024-45492
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libexpat1 2.2.10-2+deb11u5 HIGH CVE-2023-52425
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libexpat1 2.2.10-2+deb11u5 HIGH CVE-2024-45490
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libext2fs2 1.46.2-2 HIGH CVE-2022-1304
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libfreetype6 2.10.4+dfsg-1+deb11u1 HIGH CVE-2025-27363
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libgd3 2.3.0-2 HIGH CVE-2021-40145
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libgnutls30 3.7.1-5+deb11u3 HIGH CVE-2024-0553
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libgnutls30 3.7.1-5+deb11u3 HIGH CVE-2024-0567
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libgnutls30 3.7.1-5+deb11u3 HIGH CVE-2025-32988
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libgnutls30 3.7.1-5+deb11u3 HIGH CVE-2025-32990
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libgssapi-krb5-2 1.18.3-6+deb11u3 CRITICAL CVE-2024-37371
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libgssapi-krb5-2 1.18.3-6+deb11u3 HIGH CVE-2024-37370
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libicu67 67.1-7 HIGH CVE-2025-5222
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libk5crypto3 1.18.3-6+deb11u3 CRITICAL CVE-2024-37371
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libk5crypto3 1.18.3-6+deb11u3 HIGH CVE-2024-37370
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libkrb5-3 1.18.3-6+deb11u3 CRITICAL CVE-2024-37371
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libkrb5-3 1.18.3-6+deb11u3 HIGH CVE-2024-37370
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libkrb5support0 1.18.3-6+deb11u3 CRITICAL CVE-2024-37371
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libkrb5support0 1.18.3-6+deb11u3 HIGH CVE-2024-37370
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libnghttp2-14 1.43.0-1 HIGH CVE-2023-44487
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libpam-modules 1.4.0-9+deb11u1 HIGH CVE-2025-6020
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libpam-modules-bin 1.4.0-9+deb11u1 HIGH CVE-2025-6020
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libpam-runtime 1.4.0-9+deb11u1 HIGH CVE-2025-6020
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libpam0g 1.4.0-9+deb11u1 HIGH CVE-2025-6020
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libpng16-16 1.6.37-3 HIGH CVE-2025-64720
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libpng16-16 1.6.37-3 HIGH CVE-2025-65018
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libpng16-16 1.6.37-3 HIGH CVE-2025-66293
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libpng16-16 1.6.37-3 HIGH CVE-2026-22695
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libpng16-16 1.6.37-3 HIGH CVE-2026-22801
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libpng16-16 1.6.37-3 HIGH CVE-2026-25646
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libss2 1.46.2-2 HIGH CVE-2022-1304
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libssh2-1 1.9.0-2 HIGH CVE-2020-22218
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libssl1.1 1.1.1n-0+deb11u5 HIGH CVE-2025-69419
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libssl1.1 1.1.1n-0+deb11u5 HIGH CVE-2025-69421
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libsystemd0 247.3-7+deb11u4 HIGH CVE-2023-50387
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libsystemd0 247.3-7+deb11u4 HIGH CVE-2023-50868
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libtiff5 4.2.0-1+deb11u4 HIGH CVE-2023-52356
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libtiff5 4.2.0-1+deb11u4 HIGH CVE-2024-7006
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libtiff5 4.2.0-1+deb11u4 HIGH CVE-2025-9900
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libtinfo6 6.2+20201114-2+deb11u1 HIGH CVE-2023-29491
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libudev1 247.3-7+deb11u4 HIGH CVE-2023-50387
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libudev1 247.3-7+deb11u4 HIGH CVE-2023-50868
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libx11-6 2:1.7.2-1+deb11u1 HIGH CVE-2023-43787
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libx11-data 2:1.7.2-1+deb11u1 HIGH CVE-2023-43787
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libxml2 2.9.10+dfsg-6.7+deb11u4 CRITICAL CVE-2024-56171
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libxml2 2.9.10+dfsg-6.7+deb11u4 CRITICAL CVE-2025-49794
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libxml2 2.9.10+dfsg-6.7+deb11u4 CRITICAL CVE-2025-49796
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libxml2 2.9.10+dfsg-6.7+deb11u4 HIGH CVE-2022-2309
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libxml2 2.9.10+dfsg-6.7+deb11u4 HIGH CVE-2022-49043
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libxml2 2.9.10+dfsg-6.7+deb11u4 HIGH CVE-2024-25062
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libxml2 2.9.10+dfsg-6.7+deb11u4 HIGH CVE-2025-24928
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libxml2 2.9.10+dfsg-6.7+deb11u4 HIGH CVE-2025-27113
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libxml2 2.9.10+dfsg-6.7+deb11u4 HIGH CVE-2025-32414
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libxml2 2.9.10+dfsg-6.7+deb11u4 HIGH CVE-2025-32415
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libxml2 2.9.10+dfsg-6.7+deb11u4 HIGH CVE-2025-6021
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libxslt1.1 1.1.34-4+deb11u1 HIGH CVE-2024-55549
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libxslt1.1 1.1.34-4+deb11u1 HIGH CVE-2025-24855
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) libxslt1.1 1.1.34-4+deb11u1 HIGH CVE-2025-7424
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) logsave 1.46.2-2 HIGH CVE-2022-1304
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) ncurses-base 6.2+20201114-2+deb11u1 HIGH CVE-2023-29491
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) ncurses-bin 6.2+20201114-2+deb11u1 HIGH CVE-2023-29491
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) openssl 1.1.1n-0+deb11u5 HIGH CVE-2025-69419
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) openssl 1.1.1n-0+deb11u5 HIGH CVE-2025-69421
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) perl-base 5.32.1-4+deb11u2 HIGH CVE-2020-16156
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) perl-base 5.32.1-4+deb11u2 HIGH CVE-2023-31484
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.6-commit.3ecf594-linux-amd64 (debian 11.7) perl-base 5.32.1-4+deb11u2 HIGH CVE-2023-47038

Copy link
Copy Markdown

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🧹 Nitpick comments (1)
.github/labeler.yml (1)

1-11: LGTM!

The labeler configuration appropriately categorizes:

  • toolchain: Nix and CI configuration changes
  • dependencies: Package manager files

Minor consistency note: Line 6 (.github/**) is unquoted while other patterns are quoted. While YAML accepts both, consistent quoting improves readability.

Optional: consistent quoting
 toolchain:
   - changed-files:
       - any-glob-to-any-file:
           - "flake.*"
           - "*.nix"
-          - .github/**
+          - ".github/**"
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In @.github/labeler.yml around lines 1 - 11, The .github/** glob in the labeler
config is unquoted while other patterns are quoted; update the labeler.yml so
the pattern under the toolchain section (currently .github/**) is quoted ("
.github/** " without spaces) to match the quoting style used for "flake.*" and
"*.nix", ensuring consistent YAML style for the toolchain and dependencies
entries.
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Inline comments:
In @.github/workflows/pr.yaml:
- Around line 74-99: The build job is missing the security hardening present in
the label job; update the build job (job name "build") to add an explicit
permissions block with least privilege, add the "harden-runner" step (same
action and inputs used in the label job) before any steps that use credentials,
and modify the "Checkout repository" step (the actions/checkout usage) to
include persist-credentials: false so the runner does not expose GITHUB_TOKEN;
ensure ordering matches the label job (harden-runner runs early) and that the
permissions scope is restrictive.

---

Nitpick comments:
In @.github/labeler.yml:
- Around line 1-11: The .github/** glob in the labeler config is unquoted while
other patterns are quoted; update the labeler.yml so the pattern under the
toolchain section (currently .github/**) is quoted (" .github/** " without
spaces) to match the quoting style used for "flake.*" and "*.nix", ensuring
consistent YAML style for the toolchain and dependencies entries.
🪄 Autofix (Beta)

Fix all unresolved CodeRabbit comments on this PR:

  • Push a commit to this branch (recommended)
  • Create a new PR with the fixes

ℹ️ Review info
⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: ddd90296-d6fd-4b88-82a6-017054951fb9

📥 Commits

Reviewing files that changed from the base of the PR and between f18d36b and d4eacff.

📒 Files selected for processing (5)
  • .github/labeler.yml
  • .github/workflows/build.yaml
  • .github/workflows/checks-zizmor.yaml
  • .github/workflows/pr.yaml
  • flake.nix
💤 Files with no reviewable changes (1)
  • .github/workflows/build.yaml

Comment thread .github/workflows/pr.yaml
@Teebor-Choka Teebor-Choka requested a review from a team March 30, 2026 14:58
Copy link
Copy Markdown

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

♻️ Duplicate comments (3)
.github/workflows/pr.yaml (3)

104-104: ⚠️ Potential issue | 🟠 Major

Pin reusable workflow reference to a commit SHA.

Line 104 uses @build-docker-v1 (mutable). Reusable workflows should also be SHA-pinned for integrity and reproducibility.

Suggested patch
-    uses: hoprnet/hopr-workflows/.github/workflows/build-docker.yaml@build-docker-v1
+    uses: hoprnet/hopr-workflows/.github/workflows/build-docker.yaml@<FULL_COMMIT_SHA>
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In @.github/workflows/pr.yaml at line 104, Replace the mutable reusable workflow
ref "hoprnet/hopr-workflows/.github/workflows/build-docker.yaml@build-docker-v1"
with a SHA-pinned reference (e.g., "...@<commit-sha>"); update the uses line so
the reusable workflow is referenced by its exact commit SHA to ensure
immutability and reproducible CI runs.

87-87: ⚠️ Potential issue | 🟠 Major

Pin setup-node-js action reference to a commit SHA.

Line 87 uses a mutable tag (@setup-node-js-v1). Please pin to an immutable commit SHA to prevent supply-chain drift.

Suggested patch
-      - name: Setup Node.js
-        uses: hoprnet/hopr-workflows/actions/setup-node-js@setup-node-js-v1
+      - name: Setup Node.js
+        uses: hoprnet/hopr-workflows/actions/setup-node-js@<FULL_COMMIT_SHA>
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In @.github/workflows/pr.yaml at line 87, The workflow uses a mutable tag for
the setup-node-js action ("uses:
hoprnet/hopr-workflows/actions/setup-node-js@setup-node-js-v1"); replace that
tag with the action's immutable commit SHA (e.g., @<commit-sha>) to pin the
dependency, updating the "uses" entry in the workflow where setup-node-js is
referenced (and any other occurrences) so the action is fixed to a specific
commit SHA.

76-84: ⚠️ Potential issue | 🟠 Major

Harden the build job to match the security baseline used elsewhere.

Line 76-84 regresses security posture versus the label job: no explicit permissions, no runner hardening, and checkout still persists credentials.

Suggested patch
   build:
     name: Build
     runs-on: self-hosted-hoprnet-small
+    permissions:
+      contents: read
     strategy:
       matrix:
         node-version: [22.x, 24.x]
     steps:
+      - name: Harden Runner
+        uses: step-security/harden-runner@fa2e9d605c4eeb9fcad4c99c224cee0c6c7f3594 # v2.16.0
+        with:
+          disable-sudo: true
+          egress-policy: audit
       - name: Checkout repository
         uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
+        with:
+          persist-credentials: false
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In @.github/workflows/pr.yaml around lines 76 - 84, The build job currently
lacks explicit permissions and runner hardening and uses actions/checkout that
leaves credentials persisted; update the build job (the "build" matrix job and
its "Checkout repository" step that uses actions/checkout@de0fac2e...) to match
the security baseline used by the label job: add an explicit permissions block
(minimum required, e.g., contents: read and any specific scopes your workflow
needs), harden the runner by disabling credential persistence on checkout (set
persist-credentials: false in the Checkout repository step) and apply the same
runner-hardening defaults you use elsewhere (the same permission/profile and any
runner-level hardening settings from the label job).
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Duplicate comments:
In @.github/workflows/pr.yaml:
- Line 104: Replace the mutable reusable workflow ref
"hoprnet/hopr-workflows/.github/workflows/build-docker.yaml@build-docker-v1"
with a SHA-pinned reference (e.g., "...@<commit-sha>"); update the uses line so
the reusable workflow is referenced by its exact commit SHA to ensure
immutability and reproducible CI runs.
- Line 87: The workflow uses a mutable tag for the setup-node-js action ("uses:
hoprnet/hopr-workflows/actions/setup-node-js@setup-node-js-v1"); replace that
tag with the action's immutable commit SHA (e.g., @<commit-sha>) to pin the
dependency, updating the "uses" entry in the workflow where setup-node-js is
referenced (and any other occurrences) so the action is fixed to a specific
commit SHA.
- Around line 76-84: The build job currently lacks explicit permissions and
runner hardening and uses actions/checkout that leaves credentials persisted;
update the build job (the "build" matrix job and its "Checkout repository" step
that uses actions/checkout@de0fac2e...) to match the security baseline used by
the label job: add an explicit permissions block (minimum required, e.g.,
contents: read and any specific scopes your workflow needs), harden the runner
by disabling credential persistence on checkout (set persist-credentials: false
in the Checkout repository step) and apply the same runner-hardening defaults
you use elsewhere (the same permission/profile and any runner-level hardening
settings from the label job).

ℹ️ Review info
⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: 2c0c8a2c-8d4a-4790-8896-cb7dc0b15d8b

📥 Commits

Reviewing files that changed from the base of the PR and between d4eacff and 2004baa.

📒 Files selected for processing (3)
  • .github/labeler.yml
  • .github/workflows/checks-zizmor.yaml
  • .github/workflows/pr.yaml
✅ Files skipped from review due to trivial changes (1)
  • .github/workflows/checks-zizmor.yaml
🚧 Files skipped from review as they are similar to previous changes (1)
  • .github/labeler.yml

Comment thread .github/workflows/checks-zizmor.yaml Fixed
@Teebor-Choka Teebor-Choka merged commit 19edb2a into main Mar 31, 2026
12 checks passed
@Teebor-Choka Teebor-Choka deleted the kauki/feat/ci/migrate-to-shared-workflows branch March 31, 2026 09:46
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants