Skip to content

ci: pin dependency-audit reusable workflow to SHA (closes #87)#112

Open
don-petry wants to merge 2 commits intomainfrom
claude/issue-87-20260418-1841
Open

ci: pin dependency-audit reusable workflow to SHA (closes #87)#112
don-petry wants to merge 2 commits intomainfrom
claude/issue-87-20260418-1841

Conversation

@don-petry
Copy link
Copy Markdown
Contributor

Summary

  • Pins petry-projects/.github/.github/workflows/dependency-audit-reusable.yml from @v1 to its full commit SHA to satisfy the org-level action-pinning policy.
  • SHA resolved via gh api repos/petry-projects/.github/git/refs/tags/v1ee22b427cbce9ecadcf2b436acb57c3adf0cb63d
uses: petry-projects/.github/.github/workflows/dependency-audit-reusable.yml@ee22b427cbce9ecadcf2b436acb57c3adf0cb63d # v1

Standard: ci-standards.md#action-pinning-policy

Closes #87

Generated with Claude Code

Pin petry-projects/.github/.github/workflows/dependency-audit-reusable.yml
from @v1 to its full commit SHA to satisfy the org-level action-pinning
policy (standards/ci-standards.md#action-pinning-policy).

SHA resolved via: gh api repos/petry-projects/.github/git/refs/tags/v1

Closes #87

Co-authored-by: don-petry <don-petry@users.noreply.github.com>
Copilot AI review requested due to automatic review settings April 18, 2026 18:43
@coderabbitai
Copy link
Copy Markdown

coderabbitai Bot commented Apr 18, 2026

Warning

Rate limit exceeded

@github-actions[bot] has exceeded the limit for the number of commits that can be reviewed per hour. Please wait 44 minutes and 28 seconds before requesting another review.

Your organization is not enrolled in usage-based pricing. Contact your admin to enable usage-based pricing to continue reviews beyond the rate limit, or try again in 44 minutes and 28 seconds.

⌛ How to resolve this issue?

After the wait time has elapsed, a review can be triggered using the @coderabbitai review command as a PR comment. Alternatively, push new commits to this PR.

We recommend that you space out your commits to avoid hitting the rate limit.

🚦 How do rate limits work?

CodeRabbit enforces hourly rate limits for each developer per organization.

Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout.

Please see our FAQ for further information.

ℹ️ Review info
⚙️ Run configuration

Configuration used: Path: .coderabbit.yaml

Review profile: CHILL

Plan: Pro

Run ID: 2ee9e43d-0b88-46ef-8ac6-35a786b5e89e

📥 Commits

Reviewing files that changed from the base of the PR and between bca8483 and 323fe4d.

📒 Files selected for processing (1)
  • .github/workflows/dependency-audit.yml
✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Commit unit tests in branch claude/issue-87-20260418-1841

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

@don-petry
Copy link
Copy Markdown
Contributor Author

@don-petry — you're the CODEOWNER for this repository. This PR pins the dependency-audit-reusable.yml reusable workflow reference to its full commit SHA to resolve the compliance finding in issue #87.

Change summary: One line in .github/workflows/dependency-audit.yml@v1@ee22b427cbce9ecadcf2b436acb57c3adf0cb63d # v1. SHA was resolved directly from the v1 tag ref via the GitHub API.

Please review and merge when ready.

@sonarqubecloud
Copy link
Copy Markdown

Copy link
Copy Markdown

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Note

Copilot was unable to run its full agentic suite in this review.

Pins the dependency-audit reusable workflow reference to an immutable commit SHA to comply with the org action-pinning policy.

Changes:

  • Update the uses: reference from @v1 to a full commit SHA for the reusable workflow.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

@don-petry
Copy link
Copy Markdown
Contributor Author

Automated review — APPROVED

Risk: LOW
Reviewed commit: 02a5c3f2f5fff655b086a8ce07d439d24ac70e8e
Cascade: triage → deep (see triage: haiku 4.5 → deep: sonnet 4.6 + duck: gpt-5.4 → audit: opus 4.6 for models)

Summary

Single-line GitHub Actions workflow change that pins a reusable workflow reference from the mutable @v1 tag to its immutable commit SHA (ee22b427), satisfying the org-level action-pinning policy from issue #87. The SHA was independently verified against the v1 tag ref in petry-projects/.github and matches exactly. All CI checks pass (CodeQL, SonarCloud, AgentShield) with no security findings.

Findings

Info

  • [info] .github/workflows/dependency-audit.yml:33 — SHA ee22b427cbce9ecadcf2b436acb57c3adf0cb63d confirmed to match the v1 tag in petry-projects/.github via API verification — change is correct and safe. (supply-chain)
  • [info] All CI checks passed: CodeQL (actions), SonarCloud (0 issues, 0 hotspots), AgentShield, Dependency audit, Claude Code. No failures or warnings. (ci-status)
  • [info] .github/workflows/dependency-audit.yml:33 — Change correctly resolves issue Compliance: unpinned-actions-dependency-audit.yml #87 (org action-pinning policy compliance). Mutable tag reference replaced with pinned SHA plus inline comment preserving the semantic version. (compliance)

CI status

All CI checks passed: CodeQL, SonarCloud (0 issues, 0 hotspots), AgentShield, Dependency audit, Claude Code.


Reviewed by the don-petry PR-review cascade (triage: haiku 4.5 → deep: sonnet 4.6 + duck: gpt-5.4 → audit: opus 4.6). Reply with @don-petry if you need a human.

@don-petry don-petry enabled auto-merge (squash) April 19, 2026 16:55
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Compliance: unpinned-actions-dependency-audit.yml

2 participants