Commit Graph

1798 Commits

Author SHA1 Message Date
GitHub Actions
62ae91d0c3 fix(tests): add Notification model migrations to all handler tests using NotificationService 2025-12-02 04:34:37 +00:00
GitHub Actions
d285014358 fix(tests): add missing Notification models to handler test migrations 2025-12-02 04:19:25 +00:00
GitHub Actions
d89dd8fc0c fix(tests): exclude e2e directory from Vitest to prevent Playwright conflicts 2025-12-02 04:16:52 +00:00
GitHub Actions
bd5f0c3459 feat(tests): add cleanup step to remove integration test proxy host from database 2025-12-02 04:08:52 +00:00
GitHub Actions
33dc664425 feat(waf): update WAF middleware to evaluate and log suspicious payloads without blocking in monitor mode 2025-12-02 03:53:12 +00:00
GitHub Actions
9859a40294 feat(agent): update mandatory test coverage command to use script 2025-12-02 03:52:04 +00:00
GitHub Actions
8d26a631d4 feat(tests): add integration test for WAF middleware behavior and metrics exposure 2025-12-02 03:36:58 +00:00
GitHub Actions
d1731f81dd feat(docs): enhance documentation for Cerberus security suite, WAF configuration, and API endpoints 2025-12-02 03:05:57 +00:00
GitHub Actions
34347b1ff5 Refactor uptime service and tests; add WAF configuration UI and e2e tests
- Refactored `SyncMonitors` method in `uptime_service.go` for better readability.
- Updated unit tests for `UptimeService` to ensure proper functionality.
- Introduced Playwright configuration for end-to-end testing.
- Added e2e tests for WAF blocking and monitoring functionality.
- Enhanced the Security page to include WAF mode and rule set selection.
- Implemented tests for WAF configuration changes and validation.
- Created a `.last-run.json` file to store test results.
2025-12-02 02:51:50 +00:00
GitHub Actions
47a4966676 feat(workflow): add context acquisition steps for handoff contract in agent workflows 2025-12-02 02:21:59 +00:00
GitHub Actions
2f801e8152 feat(workflow): update verification steps to include mandatory frontend test coverage script 2025-12-02 02:14:42 +00:00
GitHub Actions
b78d79516e feat(workflow): add WAF integration testing workflow with Docker setup and reporting 2025-12-02 02:10:35 +00:00
GitHub Actions
44c4d955f5 feat(security): add WAF configuration page with rule set management and tests 2025-12-02 01:53:28 +00:00
GitHub Actions
8c015bceba fix(workflow): update verification steps to include frontend test coverage script and type check 2025-12-02 01:53:18 +00:00
GitHub Actions
a08edf1895 Refactor WAF handler configuration to use 'include' array instead of 'rules_file'
- Updated the GenerateConfig function to replace 'rules_file' with 'include' for WAF handlers, aligning with the coraza-caddy plugin requirements.
- Modified related tests to check for the presence of 'include' instead of 'rules_file'.
- Enhanced the ApplyConfig method to prepend necessary Coraza directives to ruleset files if not already present.
- Added tests to verify that the SecRuleEngine directives are correctly prepended and that existing directives are not duplicated.
- Implemented debug logging for generated config size and content.
2025-12-02 01:32:47 +00:00
GitHub Actions
202e457d2c fix(workflow): update verification steps to include Frontend Test Coverage and Type Check tasks 2025-12-02 01:32:34 +00:00
GitHub Actions
fa01664eb7 fix(workflow): update pre-commit requirements to ensure coverage goals are met 2025-12-02 01:25:49 +00:00
GitHub Actions
4e975421de feat(integration): add integration test for Coraza WAF script execution 2025-12-02 00:32:40 +00:00
GitHub Actions
14859adf87 Enhance GenerateConfig function to accept ruleset paths and update related tests
- Modified the GenerateConfig function to include an additional parameter for ruleset paths.
- Updated multiple test cases across various files to accommodate the new parameter.
- Enhanced the manager's ApplyConfig method to handle ruleset file creation and error handling.
- Added integration tests for Coraza WAF to validate runtime behavior and ruleset application.
- Updated documentation to include instructions for testing Coraza WAF integration locally.
2025-12-01 21:11:17 +00:00
GitHub Actions
76ab163e69 feat(security): integrate Caddy Manager into SecurityHandler and update related tests 2025-12-01 20:16:08 +00:00
GitHub Actions
fabdbc42cb feat(docs): add documentation agents for technical writing, planning, and QA security 2025-12-01 20:13:51 +00:00
GitHub Actions
f5fb460cc6 feat(security): add DeleteRuleSet endpoint and implement related service logic 2025-12-01 19:56:15 +00:00
GitHub Actions
b0a4d75a2a Refactor security configuration: Remove external CrowdSec mode support
- Updated SecurityConfig model to only support 'local' or 'disabled' modes for CrowdSec.
- Modified related logic in the manager and services to reject external mode.
- Adjusted tests to validate the new restrictions on CrowdSec modes.
- Updated frontend components to remove references to external mode and provide appropriate user feedback.
- Enhanced documentation to reflect the removal of external CrowdSec mode support.
2025-12-01 19:43:45 +00:00
GitHub Actions
08f9c8f87d fix(docs): correct typos and improve clarity in copilot instructions 2025-12-01 18:44:11 +00:00
GitHub Actions
570d904019 feat(security): implement decision and ruleset management with logging and retrieval 2025-12-01 18:23:15 +00:00
GitHub Actions
53765afd35 feat(security): implement self-lockout protection and admin whitelist
- Added SecurityConfig model to manage Cerberus settings including admin whitelist and break-glass token.
- Introduced SecurityService for handling security configurations and token generation.
- Updated Manager to check for admin whitelist before applying configurations to prevent accidental lockouts.
- Enhanced frontend with hooks and API calls for managing security settings and generating break-glass tokens.
- Updated documentation to include self-lockout protection measures and best practices for using Cerberus.
2025-12-01 18:10:58 +00:00
GitHub Actions
26c4acffb0 feat: update big picture section in copilot instructions for clarity on Charon's purpose and user focus 2025-12-01 16:52:43 +00:00
GitHub Actions
c83928f628 Refactor Caddy configuration management to include security settings
- Updated `GenerateConfig` function calls in tests to include additional security parameters.
- Enhanced `Manager` struct to hold a `SecurityConfig` instance for managing security-related settings.
- Implemented `computeEffectiveFlags` method to determine the effective state of security features based on both static configuration and runtime database settings.
- Added comprehensive tests for the new security configuration handling, ensuring correct behavior for various scenarios including ACL and CrowdSec settings.
- Adjusted existing tests to accommodate the new structure and ensure compatibility with the updated configuration management.
2025-12-01 16:22:21 +00:00
GitHub Actions
fd4555674d feat: enhance README instructions with docker compose and run details for better user guidance 2025-12-01 16:22:21 +00:00
GitHub Actions
85828ea695 feat: update code quality guidelines for improved clarity and consistency 2025-12-01 16:22:21 +00:00
GitHub Actions
1df5999635 feat: enhance ACL handler to properly block access based on geographic restrictions 2025-12-01 16:22:21 +00:00
GitHub Actions
581229e454 feat: ensure ACL is disabled when Cerberus is off in security status response 2025-12-01 16:22:21 +00:00
GitHub Actions
9259257986 feat: enhance security documentation with multi-layer protection guidance and ACL usage recommendations 2025-12-01 16:22:21 +00:00
GitHub Actions
486987cc96 feat: remove IP-based presets from ACL templates for improved security management 2025-12-01 16:22:21 +00:00
GitHub Actions
5717941d45 feat: add runtime override for ACL enabled flag in security handler 2025-12-01 16:22:21 +00:00
GitHub Actions
b45ac58f10 feat: add ACL_DBOverride test to validate ACL configuration in security handler 2025-12-01 16:22:21 +00:00
GitHub Actions
b813c383c2 feat: update registry token handling in docker-publish workflow 2025-12-01 16:22:21 +00:00
GitHub Actions
d341879ff4 ci(docker): use step outputs for REGISTRY_PASSWORD in docker-publish workflow 2025-12-01 16:22:21 +00:00
GitHub Actions
4d639698bb Enhance logging security by sanitizing sensitive data
- Implemented filename sanitization in backup, import, and certificate handlers to prevent log injection attacks.
- Added tests to ensure filenames are sanitized correctly in backup and import handlers.
- Updated notification and domain handlers to sanitize domain names before logging.
- Introduced middleware functions for sanitizing request paths and headers to redact sensitive information in logs.
- Enhanced recovery middleware to sanitize logged paths and headers during panic situations.
- Updated various services to log sanitized values for sensitive fields.
2025-12-01 16:22:21 +00:00
GitHub Actions
927bec9374 feat: add trace package with ContextKey type and RequestIDKey constant 2025-12-01 16:22:21 +00:00
GitHub Actions
3403633181 feat: update request ID handling to use trace package constants in notification service 2025-12-01 16:22:21 +00:00
GitHub Actions
17c1751e9c feat: enhance Security page functionality and update tests for CrowdSec integration 2025-12-01 16:22:21 +00:00
GitHub Actions
53244d77a8 feat: add CrowdSec installation and create necessary directories in Dockerfile 2025-12-01 16:22:21 +00:00
GitHub Actions
22a29955c8 feat: update request ID handling to use trace package constants 2025-12-01 16:22:21 +00:00
GitHub Actions
f1955711dc feat: enhance error handling for gzip and tar writer closures in ExportConfig 2025-12-01 16:22:21 +00:00
GitHub Actions
7cf55c2c39 feat: replace standard logging with structured logging in seed application 2025-12-01 16:22:21 +00:00
GitHub Actions
891a8a3a0f feat: replace log package with structured logging in main application 2025-12-01 16:22:21 +00:00
GitHub Actions
d27f28e20c feat: propagate request context in notification service and related handlers 2025-12-01 16:22:21 +00:00
GitHub Actions
fe1e62a360 feat: add request ID propagation to context in middleware 2025-12-01 16:22:21 +00:00
GitHub Actions
8f566653ef feat: enhance logging in config and manager with structured logging 2025-12-01 16:22:21 +00:00