Skip to content

Conversation

@Sangyoon98
Copy link
Member

No description provided.

Sangyoon98 and others added 30 commits September 29, 2025 19:08
#1 [SETTING] 프로젝트 구조 설정
Feat/#5 Navigation Bar 추가 및 Route 정리, 앱 아이콘 추가, 스트링 리소스 설정
Dev브랜치를 업데이트합니다
Refac/#8 화면 변경사항 수정
[FEAT] 로그인 기능 구현
Comment on lines +12 to +14
uses: 33-Auto/.github/.github/workflows/reusable-assign-issue-creator.yml@main
# 이 워크플로우는 secrets를 전달할 필요가 없지만, 필요 시 아래와 같이 전달합니다.
# secrets: inherit No newline at end of file

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}

Copilot Autofix

AI 3 months ago

To fix the problem, add an explicit permissions key to the job or workflow. Since this workflow delegates all responsibility to a reusable workflow, and there are no steps defined here that would require write access, it is safest to set the permissions to read-all for this job. This can be achieved by adding either permissions: read-all at the job level (call-reusable-workflow:) or at the root of the workflow. Since there is only one job, setting it at the job level is clear and follows best practice.

Add the following block:

permissions: read-all

under the call-reusable-workflow: job (that is, on line 12 or 13, properly indented).

No imports, method definitions, or other structural changes are required—just a single YAML key.

Suggested changeset 1
.github/workflows/assign-issue-creator.yml

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/.github/workflows/assign-issue-creator.yml b/.github/workflows/assign-issue-creator.yml
--- a/.github/workflows/assign-issue-creator.yml
+++ b/.github/workflows/assign-issue-creator.yml
@@ -8,6 +8,7 @@
 
 jobs:
   call-reusable-workflow:
+    permissions: read-all
     # @main 은 .github 레포지토리의 main 브랜치를 사용한다는 의미입니다. 버전을 위해 @v1과 같이 태그를 사용하는 것을 권장합니다.
     uses: 33-Auto/.github/.github/workflows/reusable-assign-issue-creator.yml@main
     # 이 워크플로우는 secrets를 전달할 필요가 없지만, 필요 시 아래와 같이 전달합니다.
EOF
@@ -8,6 +8,7 @@

jobs:
call-reusable-workflow:
permissions: read-all
# @main 은 .github 레포지토리의 main 브랜치를 사용한다는 의미입니다. 버전을 위해 @v1과 같이 태그를 사용하는 것을 권장합니다.
uses: 33-Auto/.github/.github/workflows/reusable-assign-issue-creator.yml@main
# 이 워크플로우는 secrets를 전달할 필요가 없지만, 필요 시 아래와 같이 전달합니다.
Copilot is powered by AI and may make mistakes. Always verify output.
Comment on lines +11 to +19
if: >
github.event.pull_request.merged == true &&
github.event.pull_request.base.ref == 'dev'
uses: 33-Auto/.github/.github/workflows/reusable-close-linked-issues.yml@main
# with를 통해 재사용 워크플로우의 inputs에 값을 전달합니다.
with:
pr-body: ${{ github.event.pull_request.body }}
issue-number: ${{ github.event.pull_request.number }}
secrets: inherit # 재사용 워크플로우가 GITHUB_TOKEN을 사용할 수 있도록 전달 No newline at end of file

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}

Copilot Autofix

AI 3 months ago

To fix the problem, add an explicit permissions block at the root of the workflow (i.e., at the same level as name and on), so that it applies to the entire workflow and to all jobs unless overridden. The block should grant only the minimum required permissions. Since the job is closing issues (which requires the issues: write permission) and is triggered on pull request events (for which contents metadata read access may be needed), set:

permissions:
  contents: read
  issues: write

For maximum safety, don't add additional permissions without clear evidence they are needed.

Place this block after the name line (line 3) and before the on line (line 5).


Suggested changeset 1
.github/workflows/close-issues-on-dev-merge.yml

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/.github/workflows/close-issues-on-dev-merge.yml b/.github/workflows/close-issues-on-dev-merge.yml
--- a/.github/workflows/close-issues-on-dev-merge.yml
+++ b/.github/workflows/close-issues-on-dev-merge.yml
@@ -1,6 +1,9 @@
 # 각 레포지토리의 .github/workflows/close-issues-on-dev-merge.yml
 
 name: Auto Close Issues on dev merge
+permissions:
+  contents: read
+  issues: write
 
 on:
   pull_request:
EOF
@@ -1,6 +1,9 @@
# 각 레포지토리의 .github/workflows/close-issues-on-dev-merge.yml

name: Auto Close Issues on dev merge
permissions:
contents: read
issues: write

on:
pull_request:
Copilot is powered by AI and may make mistakes. Always verify output.
Comment on lines +10 to +15
uses: 33-Auto/.github/.github/workflows/reusable-pr-reminder.yml@main
secrets:
# 해당 시크릿은 조직의 시크릿에 저장되어 있음
SLACK_WEBHOOK_URL: ${{ secrets.SLACK_WEBHOOK_URL }}
with:
SLACK_USER_MAP: ${{ vars.SLACK_USER_MAP }} No newline at end of file

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}

Copilot Autofix

AI 3 months ago

To fix the problem, we should add a permissions block at the workflow level or at the job level for call-reusable-reminder in .github/workflows/pr-reminder.yml. As the workflow is primarily running a reusable workflow via uses:, it's safest to set explicit minimal permissions at workflow level so all jobs inherit it. The block should specify the least privilege required; typically, for read-only workflows, this is contents: read. If the reusable workflow requires write access to, for example, pull-requests, then that should be included, but absent further information, a minimal starting block is preferred. The change consists of inserting the permissions: block just after the workflow name.


Suggested changeset 1
.github/workflows/pr-reminder.yml

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/.github/workflows/pr-reminder.yml b/.github/workflows/pr-reminder.yml
--- a/.github/workflows/pr-reminder.yml
+++ b/.github/workflows/pr-reminder.yml
@@ -1,4 +1,6 @@
   name: PR Reminder
+  permissions:
+    contents: read
 
   on:
     schedule:
EOF
@@ -1,4 +1,6 @@
name: PR Reminder
permissions:
contents: read

on:
schedule:
Copilot is powered by AI and may make mistakes. Always verify output.
Comment on lines +11 to +17
uses: 33-Auto/.github/.github/workflows/reusable-pr-assign-and-review.yml@main
with:
team-slug-for-review: "review_avengers" # 여기에 리뷰를 요청할 팀의 slug를 입력합니다.
pr-author: ${{ github.event.pull_request.user.login }}
pr-number: ${{ github.event.pull_request.number }}
secrets:
ORGANIZATION_TOKEN: ${{ secrets.ORGANIZATION_TOKEN }} # 재사용 워크플로우가 ORGANIZATION_TOKEN을 사용할 수 있도록 전달

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}

Copilot Autofix

AI 3 months ago

To fix this problem, you should add a permissions block specifying the least privilege required for this workflow. Since the workflow is calling a reusable workflow handling PR assignments and review requests, the required minimal permissions are typically contents: read (to allow basic access and context), and pull-requests: write (to interact with PRs). Insert the following block above jobs: (line 9), or at the top level of the workflow, unless specific jobs require customized permissions. No other code needs changing, only the addition of the permissions block.

Suggested changeset 1
.github/workflows/request-pr-review.yml

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/.github/workflows/request-pr-review.yml b/.github/workflows/request-pr-review.yml
--- a/.github/workflows/request-pr-review.yml
+++ b/.github/workflows/request-pr-review.yml
@@ -2,6 +2,10 @@
 
 name: PR Assignee & Team Review Request
 
+permissions:
+  contents: read
+  pull-requests: write
+
 on:
   pull_request:
     types: [opened, reopened, ready_for_review]
EOF
@@ -2,6 +2,10 @@

name: PR Assignee & Team Review Request

permissions:
contents: read
pull-requests: write

on:
pull_request:
types: [opened, reopened, ready_for_review]
Copilot is powered by AI and may make mistakes. Always verify output.
@coderabbitai
Copy link

coderabbitai bot commented Nov 7, 2025

Important

Review skipped

Auto reviews are disabled on base/target branches other than the default branch.

Please check the settings in the CodeRabbit UI or the .coderabbit.yaml file in this repository. To trigger a single review, invoke the @coderabbitai review command.

You can disable this status message by setting the reviews.review_status to false in the CodeRabbit configuration file.

✨ Finishing touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Post copyable unit tests in a comment
  • Commit unit tests in branch dev

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

Copy link

@taemin3 taemin3 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

확인했습니다

@Sangyoon98 Sangyoon98 merged commit 7e2913c into main Nov 7, 2025
7 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants