Skip to content

feat: Unify workflows to v2#720

Merged
ausias-armesto merged 2 commits intomainfrom
ausias/unify-workflows-v2
Mar 27, 2026
Merged

feat: Unify workflows to v2#720
ausias-armesto merged 2 commits intomainfrom
ausias/unify-workflows-v2

Conversation

@ausias-armesto
Copy link
Contributor

@ausias-armesto ausias-armesto commented Mar 26, 2026

Unify workflows to v2:

Summary by CodeRabbit

  • New Features

    • Added Nix flake and shell configurations for a reproducible development environment.
  • Chores

    • Reworked CI/CD workflows to use reusable jobs, improve concurrency and branching behavior, and adjust pipeline triggers.
    • Added post-build failure notification and expanded release input options (including an RC option).

@ausias-armesto ausias-armesto self-assigned this Mar 26, 2026
@coderabbitai
Copy link

coderabbitai bot commented Mar 26, 2026

📝 Walkthrough

Walkthrough

Refactors GitHub Actions workflows to delegate Docker builds to a reusable workflow, changes workflow triggers/concurrency and Node setup inputs, and adds Nix flake and shell definitions for development and docker build tooling.

Changes

Cohort / File(s) Summary
Workflows — build / merge / release
\.github/workflows/build.yaml, \.github/workflows/merge.yaml, \.github/workflows/release.yaml
Replaced inline Docker build/push steps with a reusable hoprnet/hopr-workflows/.../build-docker.yaml@build-docker-v1 job; updated triggers and concurrency keys; changed Node setup action/input key; added Zulip failure notification job in merge; release now calls reusable release-version flow and exposes released_version.
Nix flake
flake.nix
Added a Nix flake defining devShells.default and apps docker-x86_64-linux and default that run a docker build wrapper.
Nix shell
shell.nix
Added a development shell enabling nodejs_22, an overridden yarn pinned to Node 22, and inotify-tools on Linux.

Sequence Diagram(s)

sequenceDiagram
    autonumber
    actor GitHub
    participant Workflow as "Repo Workflow"
    participant Reusable as "hopr-workflows/build-docker"
    participant GCR as "GCP / Container Registry"
    participant Cachix as "Cachix"
    participant Zulip as "Zulip (notify)"

    GitHub->>Workflow: trigger (push/PR/merge/release)
    Workflow->>Reusable: call build-docker (inputs: matrix, version_type, image params, secrets)
    Reusable->>Cachix: use Cachix for Nix caches (auth via secrets)
    Reusable->>GCR: build & push image (using GCP creds)
    Reusable-->>Workflow: return status & outputs (image tags, version)
    alt failure on merge/release
        Workflow->>Zulip: send failure message (Zulip creds)
    end
Loading

Estimated code review effort

🎯 3 (Moderate) | ⏱️ ~25 minutes

🚥 Pre-merge checks | ✅ 4 | ❌ 1

❌ Failed checks (1 warning)

Check name Status Explanation Resolution
Linked Issues check ⚠️ Warning The PR introduces flake.nix and shell.nix for Nix build support but does not implement required nix commands (binary-x86_64-linux, binary-aarch64-linux, docker-x86_64-linux, docker-aarch64-linux, test, check) specified in issue #714. Implement all required Nix flake outputs defined in issue #714 (binary and docker builds for x86_64 and aarch64, test and check commands) to fully meet the nix-lib unification objective.
✅ Passed checks (4 passed)
Check name Status Explanation
Description Check ✅ Passed Check skipped - CodeRabbit’s high-level summary is enabled.
Title check ✅ Passed The PR title 'feat: Unify workflows to v2' accurately and concisely describes the primary change of refactoring workflows to v2 using a reusable workflow pattern.
Out of Scope Changes check ✅ Passed The changes are focused on workflow refactoring (build.yaml, merge.yaml, release.yaml) and Nix infrastructure (flake.nix, shell.nix), all directly related to the PR objectives of unifying workflows to v2 and refactoring to build binaries before docker images.
Docstring Coverage ✅ Passed No functions found in the changed files to evaluate docstring coverage. Skipping docstring coverage check.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Commit unit tests in branch ausias/unify-workflows-v2

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🧹 Nitpick comments (4)
.github/workflows/merge.yaml (1)

8-8: Remove commented-out code.

The commented # - synchronize line appears to be leftover from development/debugging. Consider removing it to keep the workflow file clean.

🧹 Proposed fix
     branches:
       - main
-      # - synchronize
 concurrency:
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In @.github/workflows/merge.yaml at line 8, Remove the leftover commented-out
line "# - synchronize" from the workflow file to clean up the YAML; locate the
commented entry (the exact string "# - synchronize") and delete that line so the
workflow contains only active steps and no commented debug artifacts.
flake.nix (2)

13-13: Remove unused variable pkgsLinux.

pkgsLinux is defined but never used in the flake. This appears to be leftover code.

🧹 Proposed fix
         let
           pkgs = nixpkgs.legacyPackages.${system};
-          pkgsLinux = nixpkgs.legacyPackages."x86_64-linux";

           dockerBuild = pkgs.writeShellApplication {
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@flake.nix` at line 13, The flake defines an unused variable pkgsLinux which
should be removed to avoid dead code; locate the declaration of pkgsLinux
(pkgsLinux = nixpkgs.legacyPackages."x86_64-linux") and delete that binding (or
replace it with a used value if you intended to use it), ensuring no other
references remain in the flake.

21-28: Redundant shebang and set options in writeShellApplication.

writeShellApplication automatically prepends a bash shebang and set -euo pipefail to the script. The explicit lines on 22-23 are redundant.

🧹 Proposed fix
             text = ''
-              #!/usr/bin/env bash
-              set -euo pipefail
-
               echo "[+] Building: hopr-admin:latest"
               docker build --platform linux/amd64 -t hopr-admin:latest -f ./Dockerfile .
               echo "[✓] Done: hopr-admin:latest"
             '';
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@flake.nix` around lines 21 - 28, The embedded script passed to
writeShellApplication contains an explicit "#!/usr/bin/env bash" and "set -euo
pipefail" which are redundant because writeShellApplication already prepends
them; remove those two lines from the text block (the multiline string that
builds the hopr-admin Docker image) so only the actual commands (echo, docker
build, echo) remain, leaving writeShellApplication to supply the shebang and set
flags.
.github/workflows/build.yaml (1)

10-11: Consider restricting the labeled trigger to specific labels.

Adding the labeled event type will trigger the workflow whenever any label is added to the PR. If this is intentional for a specific label-based workflow (e.g., to re-run builds), consider adding a condition to filter by label name to avoid unnecessary runs.

Example condition that could be added to jobs:

if: github.event.action != 'labeled' || github.event.label.name == 'rebuild'
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In @.github/workflows/build.yaml around lines 10 - 11, The workflow currently
listens to the "labeled" event and will run for any label; restrict it by adding
a guard so jobs only proceed for the intended label (e.g., add an if condition
on jobs such as if: github.event.action != 'labeled' || github.event.label.name
== 'rebuild') so that the "labeled" trigger stays but only triggers actual job
runs for the specific label; update the workflow's on: block to keep "labeled"
and add the conditional to each job (or a common job template) that should be
filtered.
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Nitpick comments:
In @.github/workflows/build.yaml:
- Around line 10-11: The workflow currently listens to the "labeled" event and
will run for any label; restrict it by adding a guard so jobs only proceed for
the intended label (e.g., add an if condition on jobs such as if:
github.event.action != 'labeled' || github.event.label.name == 'rebuild') so
that the "labeled" trigger stays but only triggers actual job runs for the
specific label; update the workflow's on: block to keep "labeled" and add the
conditional to each job (or a common job template) that should be filtered.

In @.github/workflows/merge.yaml:
- Line 8: Remove the leftover commented-out line "# - synchronize" from the
workflow file to clean up the YAML; locate the commented entry (the exact string
"# - synchronize") and delete that line so the workflow contains only active
steps and no commented debug artifacts.

In `@flake.nix`:
- Line 13: The flake defines an unused variable pkgsLinux which should be
removed to avoid dead code; locate the declaration of pkgsLinux (pkgsLinux =
nixpkgs.legacyPackages."x86_64-linux") and delete that binding (or replace it
with a used value if you intended to use it), ensuring no other references
remain in the flake.
- Around line 21-28: The embedded script passed to writeShellApplication
contains an explicit "#!/usr/bin/env bash" and "set -euo pipefail" which are
redundant because writeShellApplication already prepends them; remove those two
lines from the text block (the multiline string that builds the hopr-admin
Docker image) so only the actual commands (echo, docker build, echo) remain,
leaving writeShellApplication to supply the shebang and set flags.

ℹ️ Review info
⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: a9a0e3d1-20d1-4d4e-92d2-891233fd1a55

📥 Commits

Reviewing files that changed from the base of the PR and between 0bd7a9c and 14f7402.

⛔ Files ignored due to path filters (1)
  • flake.lock is excluded by !**/*.lock
📒 Files selected for processing (5)
  • .github/workflows/build.yaml
  • .github/workflows/merge.yaml
  • .github/workflows/release.yaml
  • flake.nix
  • shell.nix

@github-actions
Copy link

github-actions bot commented Mar 26, 2026

🔎 Trivy Security Report

Target Package Installed Severity CVE
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) curl 7.74.0-1.3+deb11u7 CRITICAL CVE-2023-38545
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) curl 7.74.0-1.3+deb11u7 HIGH CVE-2023-27533
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) curl 7.74.0-1.3+deb11u7 HIGH CVE-2023-27534
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) curl 7.74.0-1.3+deb11u7 HIGH CVE-2024-2398
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) e2fsprogs 1.46.2-2 HIGH CVE-2022-1304
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) gpgv 2.2.27-2+deb11u2 HIGH CVE-2025-68973
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libc-bin 2.31-13+deb11u6 HIGH CVE-2023-4911
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libc-bin 2.31-13+deb11u6 HIGH CVE-2024-2961
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libc-bin 2.31-13+deb11u6 HIGH CVE-2024-33599
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libc-bin 2.31-13+deb11u6 HIGH CVE-2025-4802
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libc6 2.31-13+deb11u6 HIGH CVE-2023-4911
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libc6 2.31-13+deb11u6 HIGH CVE-2024-2961
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libc6 2.31-13+deb11u6 HIGH CVE-2024-33599
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libc6 2.31-13+deb11u6 HIGH CVE-2025-4802
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libcom-err2 1.46.2-2 HIGH CVE-2022-1304
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libcurl4 7.74.0-1.3+deb11u7 CRITICAL CVE-2023-38545
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libcurl4 7.74.0-1.3+deb11u7 HIGH CVE-2023-27533
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libcurl4 7.74.0-1.3+deb11u7 HIGH CVE-2023-27534
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libcurl4 7.74.0-1.3+deb11u7 HIGH CVE-2024-2398
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libexpat1 2.2.10-2+deb11u5 CRITICAL CVE-2024-45491
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libexpat1 2.2.10-2+deb11u5 CRITICAL CVE-2024-45492
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libexpat1 2.2.10-2+deb11u5 HIGH CVE-2023-52425
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libexpat1 2.2.10-2+deb11u5 HIGH CVE-2024-45490
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libext2fs2 1.46.2-2 HIGH CVE-2022-1304
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libfreetype6 2.10.4+dfsg-1+deb11u1 HIGH CVE-2025-27363
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libgd3 2.3.0-2 HIGH CVE-2021-40145
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libgnutls30 3.7.1-5+deb11u3 HIGH CVE-2024-0553
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libgnutls30 3.7.1-5+deb11u3 HIGH CVE-2024-0567
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libgnutls30 3.7.1-5+deb11u3 HIGH CVE-2025-32988
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libgnutls30 3.7.1-5+deb11u3 HIGH CVE-2025-32990
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libgssapi-krb5-2 1.18.3-6+deb11u3 CRITICAL CVE-2024-37371
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libgssapi-krb5-2 1.18.3-6+deb11u3 HIGH CVE-2024-37370
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libicu67 67.1-7 HIGH CVE-2025-5222
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libk5crypto3 1.18.3-6+deb11u3 CRITICAL CVE-2024-37371
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libk5crypto3 1.18.3-6+deb11u3 HIGH CVE-2024-37370
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libkrb5-3 1.18.3-6+deb11u3 CRITICAL CVE-2024-37371
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libkrb5-3 1.18.3-6+deb11u3 HIGH CVE-2024-37370
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libkrb5support0 1.18.3-6+deb11u3 CRITICAL CVE-2024-37371
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libkrb5support0 1.18.3-6+deb11u3 HIGH CVE-2024-37370
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libnghttp2-14 1.43.0-1 HIGH CVE-2023-44487
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libpam-modules 1.4.0-9+deb11u1 HIGH CVE-2025-6020
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libpam-modules-bin 1.4.0-9+deb11u1 HIGH CVE-2025-6020
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libpam-runtime 1.4.0-9+deb11u1 HIGH CVE-2025-6020
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libpam0g 1.4.0-9+deb11u1 HIGH CVE-2025-6020
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libpng16-16 1.6.37-3 HIGH CVE-2025-64720
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libpng16-16 1.6.37-3 HIGH CVE-2025-65018
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libpng16-16 1.6.37-3 HIGH CVE-2025-66293
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libpng16-16 1.6.37-3 HIGH CVE-2026-22695
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libpng16-16 1.6.37-3 HIGH CVE-2026-22801
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libpng16-16 1.6.37-3 HIGH CVE-2026-25646
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libss2 1.46.2-2 HIGH CVE-2022-1304
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libssh2-1 1.9.0-2 HIGH CVE-2020-22218
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libssl1.1 1.1.1n-0+deb11u5 HIGH CVE-2025-69419
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libssl1.1 1.1.1n-0+deb11u5 HIGH CVE-2025-69421
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libsystemd0 247.3-7+deb11u4 HIGH CVE-2023-50387
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libsystemd0 247.3-7+deb11u4 HIGH CVE-2023-50868
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libtiff5 4.2.0-1+deb11u4 HIGH CVE-2023-52356
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libtiff5 4.2.0-1+deb11u4 HIGH CVE-2024-7006
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libtiff5 4.2.0-1+deb11u4 HIGH CVE-2025-9900
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libtinfo6 6.2+20201114-2+deb11u1 HIGH CVE-2023-29491
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libudev1 247.3-7+deb11u4 HIGH CVE-2023-50387
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libudev1 247.3-7+deb11u4 HIGH CVE-2023-50868
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libx11-6 2:1.7.2-1+deb11u1 HIGH CVE-2023-43787
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libx11-data 2:1.7.2-1+deb11u1 HIGH CVE-2023-43787
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libxml2 2.9.10+dfsg-6.7+deb11u4 CRITICAL CVE-2024-56171
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libxml2 2.9.10+dfsg-6.7+deb11u4 CRITICAL CVE-2025-49794
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libxml2 2.9.10+dfsg-6.7+deb11u4 CRITICAL CVE-2025-49796
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libxml2 2.9.10+dfsg-6.7+deb11u4 HIGH CVE-2022-2309
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libxml2 2.9.10+dfsg-6.7+deb11u4 HIGH CVE-2022-49043
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libxml2 2.9.10+dfsg-6.7+deb11u4 HIGH CVE-2024-25062
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libxml2 2.9.10+dfsg-6.7+deb11u4 HIGH CVE-2025-24928
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libxml2 2.9.10+dfsg-6.7+deb11u4 HIGH CVE-2025-27113
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libxml2 2.9.10+dfsg-6.7+deb11u4 HIGH CVE-2025-32414
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libxml2 2.9.10+dfsg-6.7+deb11u4 HIGH CVE-2025-32415
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libxml2 2.9.10+dfsg-6.7+deb11u4 HIGH CVE-2025-6021
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libxslt1.1 1.1.34-4+deb11u1 HIGH CVE-2024-55549
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libxslt1.1 1.1.34-4+deb11u1 HIGH CVE-2025-24855
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) libxslt1.1 1.1.34-4+deb11u1 HIGH CVE-2025-7424
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) logsave 1.46.2-2 HIGH CVE-2022-1304
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) ncurses-base 6.2+20201114-2+deb11u1 HIGH CVE-2023-29491
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) ncurses-bin 6.2+20201114-2+deb11u1 HIGH CVE-2023-29491
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) openssl 1.1.1n-0+deb11u5 HIGH CVE-2025-69419
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) openssl 1.1.1n-0+deb11u5 HIGH CVE-2025-69421
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) perl-base 5.32.1-4+deb11u2 HIGH CVE-2020-16156
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) perl-base 5.32.1-4+deb11u2 HIGH CVE-2023-31484
europe-west3-docker.pkg.dev/hoprassociation/docker-images/hopr-admin:3.0.5-commit.384afdd-linux-amd64 (debian 11.7) perl-base 5.32.1-4+deb11u2 HIGH CVE-2023-47038

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🧹 Nitpick comments (1)
.github/workflows/release.yaml (1)

50-50: Configure actionlint for custom self-hosted runner labels.

The static analysis tool (actionlint) flags self-hosted-hoprnet-small as an unknown label. This is a false positive since it's a valid custom label for your self-hosted runners.

To suppress this warning, create or update .github/actionlint.yaml with your custom runner labels:

🔧 Proposed actionlint configuration
# .github/actionlint.yaml
self-hosted-runner:
  labels:
    - self-hosted-hoprnet-small
    - self-hosted-hoprnet-bigger
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In @.github/workflows/release.yaml at line 50, Add your custom self-hosted
runner label to actionlint's config so actionlint stops flagging
"self-hosted-hoprnet-small": create or update the actionlint config to include a
self-hosted-runner labels list containing "self-hosted-hoprnet-small" (and other
custom labels like "self-hosted-hoprnet-bigger") so the runner label used in the
workflow (self-hosted-hoprnet-small) is recognized by actionlint.
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Nitpick comments:
In @.github/workflows/release.yaml:
- Line 50: Add your custom self-hosted runner label to actionlint's config so
actionlint stops flagging "self-hosted-hoprnet-small": create or update the
actionlint config to include a self-hosted-runner labels list containing
"self-hosted-hoprnet-small" (and other custom labels like
"self-hosted-hoprnet-bigger") so the runner label used in the workflow
(self-hosted-hoprnet-small) is recognized by actionlint.

ℹ️ Review info
⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: 42bde00c-6385-497d-bd23-490f0000f5d3

📥 Commits

Reviewing files that changed from the base of the PR and between 14f7402 and 384afdd.

📒 Files selected for processing (2)
  • .github/workflows/merge.yaml
  • .github/workflows/release.yaml
🚧 Files skipped from review as they are similar to previous changes (1)
  • .github/workflows/merge.yaml

@ausias-armesto ausias-armesto requested review from a team and mjadach-iv March 26, 2026 18:23
@ausias-armesto ausias-armesto merged commit 5c20a28 into main Mar 27, 2026
8 checks passed
@ausias-armesto ausias-armesto deleted the ausias/unify-workflows-v2 branch March 27, 2026 07:49
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Refactor workflows to build binaries before docker images Use nix-lib and unify build and package

1 participant