Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
31 commits
Select commit Hold shift + click to select a range
da92359
[FEAT] 부품 기본 기능 구현
yangjiseonn Oct 9, 2025
7c09b92
[FEAT] CSV 파일로 초기 데이터 적재
yangjiseonn Oct 10, 2025
f060131
[FEAT] 에러 코드 추가
yangjiseonn Oct 10, 2025
22bd224
Merge pull request #2 from 33-Auto/feat/#1
yangjiseonn Oct 10, 2025
b98400b
[FIX] description 필드 제거
yangjiseonn Oct 12, 2025
6626292
[SETTING] PostgreSQL 연결 설정
yangjiseonn Oct 12, 2025
4f28cf1
Merge pull request #4 from 33-Auto/feat/#3
yangjiseonn Oct 12, 2025
765ed7f
[SETTING] CI 수정
yangjiseonn Oct 12, 2025
aa03037
[SETTING] CI 수정
yangjiseonn Oct 12, 2025
de9a6b8
Merge pull request #7 from 33-Auto/main
CHOOSLA Oct 12, 2025
0cbe14e
[FEAT] DTO 필드 추가
yangjiseonn Oct 13, 2025
11baac1
[FEAT] 단일 부품 조회 API 추가
yangjiseonn Oct 13, 2025
ae4fa16
chore(CI): :wrench: CI 관련 워크플로우 등록, gitignore 업데이트
CHOOSLA Oct 13, 2025
b79caaf
Merge pull request #10 from 33-Auto/feat/#8
yangjiseonn Oct 13, 2025
0376d7d
chore: Apply batch updates from central configuration
CHOOSLA Oct 14, 2025
5203bd3
Merge branch 'dev' into chore/#9
CHOOSLA Oct 14, 2025
fd24e46
Merge pull request #11 from 33-Auto/chore/#9
CHOOSLA Oct 14, 2025
0d8d885
[FIX]API 경로 수정
yangjiseonn Oct 14, 2025
d3cf43e
Merge pull request #12 from 33-Auto/SPM-81
yangjiseonn Oct 14, 2025
ddf423c
chore: Apply batch updates from central configuration
CHOOSLA Oct 15, 2025
edc262a
chore: Apply batch updates from central configuration
CHOOSLA Oct 16, 2025
b92096e
chore: Apply batch updates from central configuration
CHOOSLA Oct 16, 2025
3410f39
chore: Apply batch updates from central configuration
CHOOSLA Oct 16, 2025
fb1d5a6
chore: Apply batch updates from central configuration
CHOOSLA Oct 16, 2025
045970a
chore: Apply batch updates from central configuration
CHOOSLA Oct 16, 2025
c137926
chore: Apply batch updates from central configuration
CHOOSLA Oct 16, 2025
3fa5904
chore: Apply batch updates from central configuration
CHOOSLA Oct 16, 2025
c715506
chore: Apply batch updates from central configuration
CHOOSLA Oct 16, 2025
9661698
chore: Apply batch updates from central configuration
CHOOSLA Oct 17, 2025
54c2b6c
chore: Apply batch updates from central configuration
CHOOSLA Oct 17, 2025
344adec
chore: Apply batch updates from central configuration
CHOOSLA Oct 17, 2025
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Binary file renamed .DS_Store → .github/.DS_Store
Binary file not shown.
Binary file added .github/workflows/.DS_Store
Binary file not shown.
14 changes: 14 additions & 0 deletions .github/workflows/assign-issue-creator.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
# 각 레포지토리의 .github/workflows/assign-issue-creator.yml

name: Assign issue creator

on:
issues:
types: [opened]

jobs:
call-reusable-workflow:
# @main 은 .github 레포지토리의 main 브랜치를 사용한다는 의미입니다. 버전을 위해 @v1과 같이 태그를 사용하는 것을 권장합니다.
uses: 33-Auto/.github/.github/workflows/reusable-assign-issue-creator.yml@main
# 이 워크플로우는 secrets를 전달할 필요가 없지만, 필요 시 아래와 같이 전달합니다.
# secrets: inherit
Comment on lines +12 to +14

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}

Copilot Autofix

AI 4 months ago

The best way to fix this issue is to explicitly set a permissions block at the workflow or job level in .github/workflows/assign-issue-creator.yml, restricting the GitHub token's access to only what is necessary. Since this workflow does not run its own steps (only calls a reusable workflow), the minimal reasonable permissions for it would be contents: read, unless further write permissions are required by the reusable workflow and not inherited. To be safe and general, apply the permissions block at the top level (immediately below name and before on), as this will apply to all jobs unless overridden. No additional imports, methods, or definitions are required—just an edit to the YAML file.

Suggested changeset 1
.github/workflows/assign-issue-creator.yml

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/.github/workflows/assign-issue-creator.yml b/.github/workflows/assign-issue-creator.yml
--- a/.github/workflows/assign-issue-creator.yml
+++ b/.github/workflows/assign-issue-creator.yml
@@ -1,6 +1,8 @@
 # 각 레포지토리의 .github/workflows/assign-issue-creator.yml
 
 name: Assign issue creator
+permissions:
+  contents: read
 
 on:
   issues:
EOF
@@ -1,6 +1,8 @@
# 각 레포지토리의 .github/workflows/assign-issue-creator.yml

name: Assign issue creator
permissions:
contents: read

on:
issues:
Copilot is powered by AI and may make mistakes. Always verify output.
24 changes: 23 additions & 1 deletion .github/workflows/ci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -77,4 +77,26 @@ jobs:
provenance: false
tags: |
${{ steps.vars.outputs.IMAGE }}:${{ steps.vars.outputs.TAG_VERSION }}
${{ steps.vars.outputs.IMAGE }}:${{ steps.vars.outputs.TAG_LATEST }}
${{ steps.vars.outputs.IMAGE }}:${{ steps.vars.outputs.TAG_LATEST }}


# EC2 자동 배포
- name: Deploy to EC2 (Part)
uses: appleboy/ssh-action@master
with:
host: 3.38.218.173
username: ubuntu
key: ${{ secrets.SAMPOOM_KEY }}
script: |
echo "배포 시작..."
sudo docker login -u ${{ secrets.DOCKERHUB_USERNAME }} -p ${{ secrets.DOCKERHUB_PASSWORD }}
sudo docker pull hysungzzang/sampoom:part-latest
sudo docker stop part-service || true
sudo docker rm part-service || true
sudo docker run -d --name part-service -p 8080:8080 \
-e SPRING_APPLICATION_JSON='{"server":{"address":"0.0.0.0","port":8080}}' \
-e SPRING_DATASOURCE_URL=jdbc:postgresql://3.38.218.173:5432/mydb \
-e SPRING_DATASOURCE_USERNAME=myuser \
-e SPRING_DATASOURCE_PASSWORD=mypassword \
hysungzzang/sampoom:part-latest
echo "배포 완료!"
19 changes: 19 additions & 0 deletions .github/workflows/close-issues-on-dev-merge.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
# 각 레포지토리의 .github/workflows/close-issues-on-dev-merge.yml

name: Auto Close Issues on dev merge

on:
pull_request:
types: [closed]

jobs:
call-reusable-workflow:
if: >
github.event.pull_request.merged == true &&
github.event.pull_request.base.ref == 'dev'
uses: 33-Auto/.github/.github/workflows/reusable-close-linked-issues.yml@main
# with를 통해 재사용 워크플로우의 inputs에 값을 전달합니다.
with:
pr-body: ${{ github.event.pull_request.body }}
issue-number: ${{ github.event.pull_request.number }}
secrets: inherit # 재사용 워크플로우가 GITHUB_TOKEN을 사용할 수 있도록 전달
Comment on lines +11 to +19

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}

Copilot Autofix

AI 4 months ago

The best fix is to add a permissions block at the root level of your workflow, immediately below the name key and above the on key, to explicitly set the minimal required privileges. Since the job involves closing issues when a PR is merged, it will require specific issues: write permission and contents: read to access the code if needed, but should not require broader write permissions. If the workflow manipulates pull requests as part of its tasks, also consider pull-requests: write. In general, set contents: read as the baseline, then add issues: write and/or pull-requests: write if needed for closing issues and updating PRs. Edit .github/workflows/close-issues-on-dev-merge.yml to insert the permissions block after the workflow name.

Suggested changeset 1
.github/workflows/close-issues-on-dev-merge.yml

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/.github/workflows/close-issues-on-dev-merge.yml b/.github/workflows/close-issues-on-dev-merge.yml
--- a/.github/workflows/close-issues-on-dev-merge.yml
+++ b/.github/workflows/close-issues-on-dev-merge.yml
@@ -1,6 +1,9 @@
 # 각 레포지토리의 .github/workflows/close-issues-on-dev-merge.yml
 
 name: Auto Close Issues on dev merge
+permissions:
+  contents: read
+  issues: write
 
 on:
   pull_request:
EOF
@@ -1,6 +1,9 @@
# 각 레포지토리의 .github/workflows/close-issues-on-dev-merge.yml

name: Auto Close Issues on dev merge
permissions:
contents: read
issues: write

on:
pull_request:
Copilot is powered by AI and may make mistakes. Always verify output.
24 changes: 13 additions & 11 deletions .github/workflows/pr-reminder.yml
Original file line number Diff line number Diff line change
@@ -1,13 +1,15 @@
name: PR Reminder
name: PR Reminder

on:
schedule:
- cron: "0 0,5,8 * * *" # 아침 9시, 오후 2시, 오후 5시에 실행 (UTC 기준으로 설정해서 한국 시간에 맞춤)
workflow_dispatch:
on:
schedule:
- cron: "47 23,4,7,8,10 * * *" # 아침 8시 47분, 오후 2시 47분, 오후 4시 47분, 오후 5시 47분, 오후 7시 47분 에 실행 (UTC 기준으로 설정해서 한국 시간에 맞춤)
workflow_dispatch:

jobs:
call-reusable-reminder:
uses: 33-Auto/.github/.github/workflows/reusable-pr-reminder.yml@main
secrets:
# 해당 시크릿은 조직의 시크릿에 저장되어 있음
SLACK_WEBHOOK_URL: ${{ secrets.SLACK_WEBHOOK_URL }}
jobs:
call-reusable-reminder:
uses: 33-Auto/.github/.github/workflows/reusable-pr-reminder.yml@main
secrets:
# 해당 시크릿은 조직의 시크릿에 저장되어 있음
SLACK_WEBHOOK_URL: ${{ secrets.SLACK_WEBHOOK_URL }}
with:
SLACK_USER_MAP: ${{ vars.SLACK_USER_MAP }}
Comment on lines +10 to +15

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}

Copilot Autofix

AI 4 months ago

To fix the problem, add a permissions: block at the top level of the workflow file, defining the minimal required permissions for this workflow/job. Since the workflow simply calls a reusable workflow and does not seem to require repository write access or permission to interact with PRs/issues directly (all logic and required permissions for those actions should live in the reusable workflow itself), the minimal safe permissions are contents: read.
Add the permissions: key immediately below the workflow name: line and before the on: section. This block will apply to all jobs in this workflow unless a more specific permissions block is defined at the job level. No new modules or code structures are necessary, only this addition to the YAML workflow file.


Suggested changeset 1
.github/workflows/pr-reminder.yml

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/.github/workflows/pr-reminder.yml b/.github/workflows/pr-reminder.yml
--- a/.github/workflows/pr-reminder.yml
+++ b/.github/workflows/pr-reminder.yml
@@ -1,4 +1,6 @@
   name: PR Reminder
+  permissions:
+    contents: read
 
   on:
     schedule:
EOF
@@ -1,4 +1,6 @@
name: PR Reminder
permissions:
contents: read

on:
schedule:
Copilot is powered by AI and may make mistakes. Always verify output.
17 changes: 17 additions & 0 deletions .github/workflows/request-pr-review.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
# 각 레포지토리의 .github/workflows/request-pr-review.yml

name: PR Assignee & Team Review Request

on:
pull_request:
types: [opened, reopened, ready_for_review]

jobs:
call-reusable-workflow:
uses: 33-Auto/.github/.github/workflows/reusable-pr-assign-and-review.yml@main
with:
team-slug-for-review: "review_avengers" # 여기에 리뷰를 요청할 팀의 slug를 입력합니다.
pr-author: ${{ github.event.pull_request.user.login }}
pr-number: ${{ github.event.pull_request.number }}
secrets:
ORGANIZATION_TOKEN: ${{ secrets.ORGANIZATION_TOKEN }} # 재사용 워크플로우가 ORGANIZATION_TOKEN을 사용할 수 있도록 전달
Comment on lines +11 to +17

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}

Copilot Autofix

AI 4 months ago

To fix the problem, an explicit permissions block should be added to the workflow YAML to limit the GITHUB_TOKEN's permissions. The block can be placed at the workflow root (affecting all jobs), or specifically for the single job if only one exists. The safest approach is adding it to the workflow root, as this workflow only has one job. For requesting PR reviews, contents: read and pull-requests: write are usually sufficient; these allow the workflow to read repo contents and request reviews or assign PRs, but not make broad changes. The change should be made at the top of the file, after the name field and before the on block.

No new imports or definitions are required. Only the addition of a small YAML block is necessary.


Suggested changeset 1
.github/workflows/request-pr-review.yml

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/.github/workflows/request-pr-review.yml b/.github/workflows/request-pr-review.yml
--- a/.github/workflows/request-pr-review.yml
+++ b/.github/workflows/request-pr-review.yml
@@ -2,6 +2,10 @@
 
 name: PR Assignee & Team Review Request
 
+permissions:
+  contents: read
+  pull-requests: write
+
 on:
   pull_request:
     types: [opened, reopened, ready_for_review]
EOF
@@ -2,6 +2,10 @@

name: PR Assignee & Team Review Request

permissions:
contents: read
pull-requests: write

on:
pull_request:
types: [opened, reopened, ready_for_review]
Copilot is powered by AI and may make mistakes. Always verify output.
20 changes: 20 additions & 0 deletions .github/workflows/trigger_infra.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
name: Trigger Infra CD

on:
push:
branches:
- main

jobs:
trigger-infra:
runs-on: ubuntu-latest
steps:
- name: Trigger infra repo deploy workflow
uses: peter-evans/repository-dispatch@v3
with:
token: ${{ secrets.ORGANIZATION_TOKEN }}
# [중요] 아래 repository 값은 모든 앱이 공유하는 '중앙 인프라 리포지토리' 주소이다.
repository: 33-Auto/Sampoom-Management-Infra
event-type: deploy
# 'Sampoom-Management-Backend-Part'은 스크립트가 동적으로 치환할 자리표시자(placeholder)이다.
client-payload: '{"service":"Sampoom-Management-Backend-Part","branch":"main"}'
Comment on lines +10 to +20

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}

Copilot Autofix

AI 4 months ago

To address this issue, add an explicit permissions: block to restrict the privileges granted to the workflow. Since the workflow only dispatches another workflow using a separately supplied token and does not need to modify any repository data or use the GITHUB_TOKEN for write operations, the permissions can be set to minimal read access. Add the following line immediately after the workflow name: field but before on:; this sets the default permission for all jobs. The optimal value is permissions: {} (no permissions at all), but if any minimal GitHub information is required you can use contents: read. For maximal safety, start with permissions: {}.

Steps:

  • Insert permissions: {} at line 2, immediately after name: Trigger Infra CD.

Suggested changeset 1
.github/workflows/trigger_infra.yml

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/.github/workflows/trigger_infra.yml b/.github/workflows/trigger_infra.yml
--- a/.github/workflows/trigger_infra.yml
+++ b/.github/workflows/trigger_infra.yml
@@ -1,4 +1,5 @@
 name: Trigger Infra CD
+permissions: {}
 
 on:
   push:
EOF
@@ -1,4 +1,5 @@
name: Trigger Infra CD
permissions: {}

on:
push:
Copilot is powered by AI and may make mistakes. Always verify output.
Loading
Loading