Conversation
* chore: add the workers deploy workflow + wrangler.toml file * delete wranger.jsonc to avoid pipeline conflict
…t access central repository (#30) * update the workflow inline because the repository is public and cannot access central repository * add the env vriable to the pipeline * add the env variables to the Deploy to Cloudflare Workers steps
|
🚀 Preview deployed! Worker: |
|
🚀 Preview deployed! Worker: |
[API-410] Add a switch to select the Intent API env used for issuing intents.
|
Important Review skippedAuto reviews are disabled on base/target branches other than the default branch. Please check the settings in the CodeRabbit UI or the ⚙️ Run configurationConfiguration used: defaults Review profile: CHILL Plan: Pro Run ID: You can disable this status message by setting the Use the checkbox below for a quick retry:
✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
| node-version: "20" | ||
|
|
||
| - name: Setup Bun | ||
| uses: oven-sh/setup-bun@v2 |
There was a problem hiding this comment.
3rd party Github Actions should be pinned - high severity
A third-party GitHub Action was imported, and is not pinned via a hash. This leaves your CI/CD at risk for potential supply chain attacks, if the affected GitHub Action is compromised.
| uses: oven-sh/setup-bun@v2 | |
| uses: oven-sh/setup-bun@0c5077e51419868618aeaa5fe8019c62421857d6 # v2.2.0 |
Reply @AikidoSec ignore: [REASON] to ignore this issue.
More info
| run: bun run build | ||
|
|
||
| - name: Deploy to Cloudflare Workers | ||
| uses: cloudflare/wrangler-action@v3 |
There was a problem hiding this comment.
3rd party Github Actions should be pinned - high severity
A third-party GitHub Action was imported, and is not pinned via a hash. This leaves your CI/CD at risk for potential supply chain attacks, if the affected GitHub Action is compromised.
| uses: cloudflare/wrangler-action@v3 | |
| uses: cloudflare/wrangler-action@9acf94ace14e7dc412b076f2c5c20b8ce93c79cd # v3.15.0 |
Reply @AikidoSec ignore: [REASON] to ignore this issue.
More info
There was a problem hiding this comment.
2 Open source vulnerabilities detected - medium severity
Aikido detected 2 vulnerabilities across 1 package, it includes 2 medium vulnerabilities.
Details
Remediation Aikido suggests bumping the vulnerable packages to a safe version.
Reply @AikidoSec ignore: [REASON] to ignore this issue.
More info
|
🚀 Preview deployed! Worker: |
…changes Resolve merge conflicts caused by tab-to-spaces reformatting on develop (Mobile fixes #32). Accept develop's formatting and functional additions (same-chain timings, wallet connectors, token management), then re-apply PR #39's API migration (containerToIntent wrapper, Solana gating, recipient field, @lifi/intent v0.0.4). Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
No description provided.