Skip to content

Conversation

@fatalbanana
Copy link
Member

@fatalbanana fatalbanana commented Sep 14, 2025

Creates new patch revisions when fixes become available (most likely via the base image).

  • FIXME: check base image + dependencies instead of plain base image

 - Generate a proper image for comparison
 - Put workflow parameters in their proper location
@fatalbanana
Copy link
Member Author

Should be done but I'm waiting to see it working on my fork yet ...

@fatalbanana fatalbanana marked this pull request as ready for review September 22, 2025 12:53
@fatalbanana fatalbanana requested a review from Copilot October 19, 2025 12:51
Copy link

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR implements an automated security-driven rebuild system for release images. When vulnerabilities are detected in the current release image, the workflow automatically tests if rebuilding would resolve them, and if so, creates a new patch version tag to trigger a release.

Key changes:

  • Replaces simple vulnerability scanning with an automated remediation workflow that rebuilds and re-tags images when fixes are available
  • Adds workflow dispatch trigger to release workflow for programmatic triggering
  • Introduces a reusable action for bumping patch version tags

Reviewed Changes

Copilot reviewed 3 out of 3 changed files in this pull request and generated 3 comments.

File Description
.github/workflows/security.yml Transforms from passive scanning to active rebuild workflow with vulnerability comparison logic
.github/workflows/release.yml Adds workflow_dispatch trigger to enable programmatic release initiation
.github/actions/bump_tag/action.yml New composite action that increments patch version and triggers release workflow

Tip: Customize your code reviews with copilot-instructions.md. Create the file or learn how to get started.

shell: bash
working-directory: ${{ github.workspace }}
env:
GH_TOKEN: ${{ github.token }}
Copy link

Copilot AI Oct 19, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The github.token should be explicitly passed as an input to this composite action rather than being implicitly available. Composite actions don't automatically inherit secrets/tokens from the caller's context. This will likely fail with a permissions error when the action attempts to use gh CLI commands.

Copilot uses AI. Check for mistakes.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant