Commit Graph

955 Commits

Author SHA1 Message Date
GitHub Actions
2c21985d8b feat: Enhance Hecate documentation with installation options and UX snippets for Orthrus Agent 2025-12-08 00:10:49 +00:00
GitHub Actions
ecf60b08e0 feat: Add Orthrus documentation for Remote Socket Proxy Agent and its configuration 2025-12-07 04:35:44 +00:00
GitHub Actions
502bc24b8c feat: Revise Hecate dashboard integration for unified server management and add connection type workflows 2025-12-07 04:35:10 +00:00
GitHub Actions
e904ba86ca feat: Add Hecate module for managing third-party tunneling services with API and frontend integration 2025-12-07 03:43:24 +00:00
GitHub Actions
8f7b4b9aaa refactor: Update QA report to reflect Optional Features implementation
docs: Modify security documentation to indicate Cerberus is enabled by default

test: Adjust frontend feature flag tests to align with new Cerberus flag

feat: Integrate feature flags into Layout component for conditional rendering

test: Enhance Layout component tests for feature flag visibility

feat: Implement Optional Features section in System Settings page

test: Add tests for Optional Features toggles in System Settings

fix: Remove unused Cerberus state from System Settings component
2025-12-07 03:35:28 +00:00
GitHub Actions
fa66884e59 feat: Add guideline for Pull Request title conventions in documentation 2025-12-07 03:22:49 +00:00
GitHub Actions
2c1cf5f0ac feat: Implement SSL Provider selection feature with tests and documentation
- Added functionality to select SSL Provider (Auto, Let's Encrypt, ZeroSSL) in the Caddy Manager.
- Updated the ApplyConfig method to handle different SSL provider settings and staging flags.
- Created unit tests for various SSL provider scenarios, ensuring correct behavior and backward compatibility.
- Enhanced frontend System Settings page to include SSL Provider dropdown with appropriate options and descriptions.
- Updated documentation to reflect new SSL Provider feature and its usage.
- Added QA report detailing testing outcomes and security verification for the SSL Provider implementation.
2025-12-06 20:59:34 +00:00
GitHub Actions
7624f6fad8 Add QA testing reports for certificate page authentication fixes
- Created detailed QA testing report documenting the authentication issues with certificate endpoints, including test results and root cause analysis.
- Added final QA report confirming successful resolution of the authentication issue, with all tests passing and security verifications completed.
- Included test output logs before and after the fix to illustrate the changes in endpoint behavior.
- Documented the necessary code changes made to the route registration in `routes.go` to ensure proper application of authentication middleware.
2025-12-06 19:34:51 +00:00
GitHub Actions
92a7a6e942 feat: update QA phase to include security tasks in audit process 2025-12-06 03:42:53 +00:00
GitHub Actions
334de738c8 feat: enhance QA phase by adding linting and manual pre-commit checks in audit process 2025-12-06 03:41:40 +00:00
GitHub Actions
3b7eb7be2d feat: update QA phase to include regression testing in audit process 2025-12-06 03:38:35 +00:00
GitHub Actions
944216f98a feat: enhance QA phase by specifying meticulous testing requirements 2025-12-06 03:36:50 +00:00
GitHub Actions
ceeedca585 feat: refine Management agent's delegation model and update workflow phases 2025-12-06 03:18:04 +00:00
GitHub Actions
8ef1e7cda0 feat: enhance type safety in security API and related tests 2025-12-06 02:57:51 +00:00
GitHub Actions
8e2ba14ae5 feat: add certificate management security and cleanup dialog
- Documented certificate management security features in security.md, including backup and recovery processes.
- Implemented CertificateCleanupDialog component for confirming deletion of orphaned certificates when deleting proxy hosts.
- Enhanced ProxyHosts page to check for orphaned certificates and prompt users accordingly during deletion.
- Added tests for certificate cleanup prompts and behaviors in ProxyHosts, ensuring correct handling of unique, shared, and production certificates.
2025-12-06 01:43:46 +00:00
GitHub Actions
bd5b3b31bf feat: refactor Management agent to enhance orchestration role and streamline delegation process 2025-12-05 23:20:24 +00:00
GitHub Actions
0973852640 feat: add validation for CrowdSec configuration status and improve file selection handling 2025-12-05 22:42:06 +00:00
GitHub Actions
8b2661c280 chore: update .gitignore, remove keybindings file, and modify Go module dependencies 2025-12-05 22:28:19 +00:00
GitHub Actions
8929bb4abf feat: add keybindings and tasks for linting and testing workflows 2025-12-05 19:08:03 +00:00
GitHub Actions
09320a74ed feat: implement bulk ACL application feature for efficient access list management across multiple proxy hosts
feat: add modular Security Dashboard implementation plan with environment-driven security service activation
fix: update go.mod and go.sum for dependency version upgrades and optimizations
feat: enable gzip compression for API responses to reduce payload size
fix: optimize SQLite connection settings for better performance and concurrency
refactor: enhance RequireAuth component with consistent loading overlay
feat: configure global query client with optimized defaults for performance in main.tsx
refactor: replace health check useEffect with React Query for improved caching and auto-refresh
build: add code splitting in vite.config.ts for better caching and parallel loading
2025-12-05 18:45:18 +00:00
GitHub Actions
de3fa8e3bd chore: update .codecov.yml, .dockerignore, and .gitignore for improved coverage and build context exclusions 2025-12-05 18:42:25 +00:00
GitHub Actions
72ff6313de Implement CrowdSec integration with API endpoints for managing IP bans and decisions
- Added unit tests for CrowdSec handler, including listing, banning, and unbanning IPs.
- Implemented mock command executor for testing command execution.
- Created tests for various scenarios including successful operations, error handling, and invalid inputs.
- Developed CrowdSec configuration tests to ensure proper handler setup and JSON output.
- Documented security features and identified gaps in CrowdSec, WAF, and Rate Limiting implementations.
- Established acceptance criteria for feature completeness and outlined implementation phases for future work.
2025-12-05 17:23:26 +00:00
GitHub Actions
11357a1a15 feat: implement uptime monitor synchronization for proxy host updates and enhance related tests 2025-12-05 16:29:51 +00:00
GitHub Actions
e5809236b0 feat: add detailed plan for UI/UX and backend bug fixes addressing multiple issues 2025-12-05 16:02:44 +00:00
GitHub Actions
220cfb585a fix: standardize agent names and add Management agent for orchestration 2025-12-05 15:48:19 +00:00
Jeremy
d2740fafcc Merge pull request #318 from Wikid82/development
Propagate changes from development into feature/beta-release
2025-12-05 01:49:46 -05:00
Jeremy
2b7e51cb34 Merge branch 'feature/beta-release' into development 2025-12-05 01:49:06 -05:00
Jeremy
4871bdfe02 Merge pull request #315 from Wikid82/main
Propagate changes from main into development
2025-12-05 01:48:38 -05:00
GitHub Actions
fa9d548908 fix(ci): correct conditional for release creation step
- Change 'changed' check from truthy string to explicit 'true' comparison
- GitHub Actions treats non-empty strings as truthy, causing step to run unexpectedly
- This was causing the workflow to attempt updating v0.3.0 release when it shouldn't
2025-12-05 06:38:00 +00:00
Jeremy
e8052508a7 Merge branch 'development' into main 2025-12-05 01:30:57 -05:00
renovate[bot]
a060db58de chore(deps): update module github.com/quic-go/quic-go to v0.57.1 (#317)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
2025-12-05 06:29:42 +00:00
renovate[bot]
aebae095b4 chore(deps): update module github.com/expr-lang/expr to v1.17.6 (#316)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
2025-12-05 06:29:20 +00:00
GitHub Actions
934ce87095 fix(ci): resolve benchmark push and release update failures
- Use GITHUB_TOKEN instead of CHARON_TOKEN for benchmark gh-pages push
- Add make_latest: false to prevent immutable release update errors
- Fixes Performance Regression Check authentication failure
- Fixes Auto Versioning target_commitish immutable error
2025-12-05 06:25:55 +00:00
Jeremy
15bfcfa57b Merge pull request #313 from Wikid82/development
chore: Beta Release - development → main
2025-12-05 01:16:38 -05:00
Jeremy
891f87c2a6 Merge pull request #314 from Wikid82/development
Propagate changes from development into feature/beta-release
2025-12-05 01:15:58 -05:00
Jeremy
1a2152aa75 Merge pull request #312 from Wikid82/feature/beta-release
feat: Phase 5 Frontend, Security Hardening & CVE Remediation
2025-12-05 01:05:45 -05:00
Jeremy
1f4d03c268 Merge branch 'development' into feature/beta-release 2025-12-05 00:57:10 -05:00
GitHub Actions
fc263e7afb fix(tests): eliminate race condition in TestCertificateHandler_Delete_NoBackupService
The test was failing intermittently when run with -race flag due to a race
condition between:
1. CertificateService constructor spawning a background goroutine that
   immediately queries the database
2. The test's HTTP request handler also querying the database

On CI runners, the timing window is wider than on local machines, causing
frequent failures. Solution: Add a 200ms sleep to allow the background
goroutine to complete its initial sync before the test proceeds.

This is acceptable in test code as it mirrors real-world usage where the
service initializes before receiving HTTP requests.

Fixes intermittent failure:
  Error: Not equal: expected: 200, actual: 500
  no such table: ssl_certificates
2025-12-05 05:35:24 +00:00
GitHub Actions
9c04b3c198 fix(security): prevent email header injection (CWE-93)
CodeQL flagged critical vulnerabilities in mail_service.go where
untrusted input could be used to inject additional email headers
via CRLF sequences.

Changes:
- Add sanitizeEmailHeader() to strip CR, LF, and control characters
- Sanitize all header values (from, to, subject) in buildEmail()
- Add validateEmailAddress() using net/mail.ParseAddress
- Add comprehensive security tests for header injection prevention

This addresses the 3 critical CodeQL alerts:
- Line 199: buildEmail header construction
- Line 260: sendSSL message usage
- Line 307: sendSTARTTLS message usage

Security: CWE-93 (Improper Neutralization of CRLF Sequences)
2025-12-05 05:02:09 +00:00
GitHub Actions
0315700666 fix: exclude main packages and infrastructure from coverage calculation
Packages like cmd/api, cmd/seed, internal/logger, and internal/metrics
are entrypoints and infrastructure code that don't benefit from unit
tests. These were being counted as 0% coverage in CI (which has the
full Go toolchain including covdata) but excluded locally (due to
'no such tool covdata' error), causing a ~2.5% coverage discrepancy.

Standard Go practice is to exclude such packages from coverage
calculations. This fix filters them from the coverage profile before
computing the total.
2025-12-05 04:39:13 +00:00
GitHub Actions
1143a372fa fix: restore /setup API routes removed in user management commit
The commit c06c282 (feat: add SMTP settings page and user management
features) removed userHandler.RegisterRoutes(api) and manually
registered only some of the routes, missing the critical /setup
endpoints.

This restores GET /api/v1/setup and POST /api/v1/setup which are
required for initial admin setup flow.
2025-12-05 04:27:43 +00:00
GitHub Actions
0453924fe7 fix: resolve CI test failures
- Remove SQLite cache=shared from certificate handler tests to prevent
  database locking issues in parallel test runs
- Add JSON validation before jq parsing in integration-test.sh to
  provide clear error messages when setup endpoint returns invalid response
- Remove unused fmt import from certificate_handler_coverage_test.go
2025-12-05 04:08:08 +00:00
GitHub Actions
562bb012fb feat: Enhance Dockerfile for Caddy with security patches and automate dependency management
- Added custom manager in renovate.json to track Go dependencies patched in Dockerfile for Caddy CVE fixes.
- Updated Dockerfile to pre-fetch and override vulnerable module versions for dependencies (expr, quic-go, smallstep/certificates) during the build process.
- Improved build resilience by implementing a fallback mechanism for Caddy versioning.
- Introduced tests for user SMTP audit, covering invite token security, input validation, authorization, and SMTP config security.
- Enhanced user invite functionality with duplicate email protection and case-insensitive checks.
- Updated go.work.sum to include new dependencies and ensure compatibility.
2025-12-05 02:15:43 +00:00
GitHub Actions
c06c2829a6 feat: add SMTP settings page and user management features
- Added a new SMTP settings page with functionality to configure SMTP settings, test connections, and send test emails.
- Implemented user management page to list users, invite new users, and manage user permissions.
- Created modals for inviting users and editing user permissions.
- Added tests for the new SMTP settings and user management functionalities.
- Updated navigation to include links to the new SMTP settings and user management pages.
2025-12-05 00:47:57 +00:00
GitHub Actions
d3c5196631 feat: update security hardening plan to include user gateway and identity features
- Expand plan to cover Identity Provider (IdP) functionality
- Introduce user onboarding via email invites
- Implement user-centric permissions management
- Enhance SMTP configuration details
- Outline phases for backend and frontend implementation
2025-12-04 22:00:08 +00:00
renovate[bot]
a74174b009 fix(deps): update dependency react-router-dom to ^7.10.1 (#311)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
2025-12-04 21:51:58 +00:00
GitHub Actions
3b74da3b06 feat: remove outdated security fixes plan document 2025-12-04 21:03:49 +00:00
GitHub Actions
cecf0ef9d6 ci: run perf asserts in CI (backend quality & benchmark jobs) 2025-12-04 20:58:18 +00:00
GitHub Actions
05cb8046d6 feat: enhance QA_Security agent workflow with CodeQL and Trivy scan execution 2025-12-04 20:38:28 +00:00
GitHub Actions
fa41fda360 feat: add comprehensive security audit tests for SQL injection, input validation, and settings persistence 2025-12-04 20:27:13 +00:00