Commit Graph

1798 Commits

Author SHA1 Message Date
Jeremy
ae3417a986 Merge branch 'feature/beta-release' into renovate/feature/beta-release-peter-evans-create-or-update-comment-5.x 2026-01-12 00:51:02 -05:00
Jeremy
9836288e91 Merge branch 'main' into feature/beta-release 2026-01-12 00:34:06 -05:00
github-actions[bot]
21e15e9639 chore: move processed issue files to created/ 2026-01-12 05:33:49 +00:00
GitHub Actions
3fb870f109 fix: improve Docker image handling in CI workflow with exact tag extraction and validation 2026-01-12 05:33:29 +00:00
Jeremy
22a23da6e9 Add nightly branch to propagate changes workflow 2026-01-12 00:19:19 -05:00
renovate[bot]
e86124f556 chore(deps): update anchore/sbom-action action to v0.21.1 2026-01-12 05:05:57 +00:00
renovate[bot]
bcdc472b0a chore(deps): update actions/setup-node action to v6 2026-01-12 05:04:50 +00:00
renovate[bot]
b0502e641e fix(deps): update module golang.org/x/net to v0.48.0 2026-01-12 05:04:34 +00:00
renovate[bot]
69d527682a chore(deps): update actions/github-script action to v7.1.0 2026-01-12 05:04:02 +00:00
renovate[bot]
fcd40909e9 chore(deps): update actions/download-artifact action to v4.3.0 2026-01-12 05:03:57 +00:00
renovate[bot]
b1fd466e20 chore(deps): update actions/checkout action to v4.3.1 2026-01-12 05:03:51 +00:00
renovate[bot]
6794935518 fix(deps): update npm minor/patch 2026-01-12 05:02:46 +00:00
renovate[bot]
b44ff56283 chore(deps): update peter-evans/create-or-update-comment action to v5 2026-01-12 05:02:31 +00:00
Jeremy
cb877af974 Fix base branch pattern for Renovate configuration 2026-01-11 23:59:45 -05:00
Jeremy
2b259ff4a6 Update base branch patterns in renovate.json 2026-01-11 23:55:47 -05:00
Jeremy
23e4d9f7eb Add base branch patterns for feature and nightly 2026-01-11 23:54:13 -05:00
GitHub Actions
480d97f058 fix: add performance_diagnostics.md to .gitignore to exclude performance reports from version control 2026-01-12 04:47:51 +00:00
GitHub Actions
d7939bed70 feat: add ManualDNSChallenge component and related hooks for manual DNS challenge management
- Implemented `useManualChallenge`, `useChallengePoll`, and `useManualChallengeMutations` hooks for managing manual DNS challenges.
- Created tests for the `useManualChallenge` hooks to ensure correct fetching and mutation behavior.
- Added `ManualDNSChallenge` component for displaying challenge details and actions.
- Developed end-to-end tests for the Manual DNS Provider feature, covering provider selection, challenge UI, and accessibility compliance.
- Included error handling tests for verification failures and network errors.
2026-01-12 04:01:40 +00:00
GitHub Actions
a199dfd079 fix: update golang.org/x/mod to v0.31.0 in go.work.sum 2026-01-11 22:08:25 +00:00
GitHub Actions
118e35f73e fix: patch golang.org/x/crypto in CrowdSec builder stage
Add x/crypto v0.46.0 upgrade to CrowdSec builder stage to remediate:
- GHSA-j5w8-q4qc-rx2x (SSH public key parsing DoS)
- GHSA-f6x5-jh6r-wrfv (SSH certificate parsing DoS)

The CrowdSec builder was missing the x/crypto patch that exists in
our backend go.mod, causing scanners to detect v0.42.0 vulnerabilities
in the final image.
2026-01-11 21:50:50 +00:00
GitHub Actions
74c6911200 fix: regenerate go.sum after dependency upgrade
The validator v10.30.1 upgrade requires updated go.sum entries
for golang.org/x/net and related transitive dependencies.

Resolves Docker build failure: 'missing go.sum entry for module
providing package golang.org/x/net/idna'
2026-01-11 21:34:23 +00:00
GitHub Actions
972f41af79 fix: upgrade go-playground/validator to v10.30.1 to remediate golang.org/x/crypto vulnerabilities
Upgrades validator from v10.28.0 to v10.30.1, which transitively upgrades
golang.org/x/crypto from v0.42.0 (vulnerable) to v0.46.0 (patched).

Remediates:
- GHSA-j5w8-q4qc-rx2x (SSH connection handling vulnerability)
- GHSA-f6x5-jh6r-wrfv (SSH key parsing vulnerability)

Previously attempted replace directive approach did not work because Go
embeds original dependency versions in binary metadata, which scanners read.
Direct dependency upgrade is the correct solution.

Expected impact: Reduces Medium vulnerabilities from 8 to 4 (Alpine CVEs only)

Testing: All backend unit tests passing
2026-01-11 21:27:18 +00:00
GitHub Actions
e643a60c32 fix: remediate supply chain vulnerabilities and implement no-cache builds
## Summary
Addresses 8 Medium severity vulnerabilities identified in supply chain scan
for PR #461. Implements no-cache Docker builds to prevent layer caching
issues and remediates golang.org/x/crypto vulnerabilities via replace
directive.

## Changes

### Security Fixes
- Add go.mod replace directive forcing golang.org/x/crypto v0.42.0 -> v0.45.0
  - Addresses GHSA-j5w8-q4qc-rx2x (SSH connection handling)
  - Addresses GHSA-f6x5-jh6r-wrfv (SSH key parsing)
  - Transitive dependency from go-playground/validator/v10@v10.28.0
  - Tested with backend unit tests - all passing

### Docker Build Improvements
- Add no-cache: true to docker-build.yml main build step
- Add --no-cache flag to PR-specific builds (trivy-pr-app-only)
- Add --no-cache flag to waf-integration.yml builds
- Remove GitHub Actions cache configuration (cache-from, cache-to)
- Ensures clean builds with accurate vulnerability
2026-01-11 20:56:44 +00:00
GitHub Actions
d8cc4da730 fix: Implement no-cache Docker builds to eliminate false positive vulnerabilities from cached layers 2026-01-11 20:39:57 +00:00
GitHub Actions
622f5a48e4 fix: Enhance supply chain security with updated PR comments, remediation plan, scan analysis, and detailed vulnerability reporting
- Implemented a new workflow for supply chain security that updates PR comments with current scan results, replacing stale data.
- Created a remediation plan addressing high-severity vulnerabilities in CrowdSec binaries, including action items and timelines.
- Developed a discrepancy analysis document to investigate differences between local and CI vulnerability scans, identifying root causes and remediation steps.
- Enhanced vulnerability reporting in PR comments to include detailed findings, collapsible sections for readability, and artifact uploads for compliance tracking.
2026-01-11 20:13:15 +00:00
GitHub Actions
e06eb4177b fix; CVE-2025-68156 remediation
- Changed report title to reflect security audit focus
- Updated date and status to indicate approval for commit
- Enhanced executive summary with detailed validation results
- Included comprehensive test coverage results for backend and frontend
- Documented pre-commit hooks validation and known issues
- Added detailed security scan results, confirming absence of CVE-2025-68156
- Verified binary inspection for expr-lang dependency
- Provided risk assessment and recommendations for post-merge actions
- Updated compliance matrix and final assessment sections
- Improved overall report structure and clarity
2026-01-11 19:33:25 +00:00
GitHub Actions
db7490d763 feat: Enhance supply chain verification by excluding PR builds and add Docker image artifact handling 2026-01-11 07:17:12 +00:00
GitHub Actions
9f2dc3e530 fix: add mandatory instruction to read relevant guidelines before starting tasks 2026-01-11 06:45:26 +00:00
GitHub Actions
b9fa62f8f4 fix: add mandatory instruction to read relevant guidelines before starting tasks across agent documentation 2026-01-11 06:45:17 +00:00
GitHub Actions
10902e37a0 fix: update golangci-lint entry command and enhance current specification for Playwright MCP server initialization 2026-01-11 06:09:23 +00:00
github-actions[bot]
efd8a5d0f3 chore: move processed issue files to created/ 2026-01-11 05:33:23 +00:00
GitHub Actions
a895bde4e9 feat: Integrate Staticcheck Pre-Commit Hook and Update QA Report
- Updated current specification to reflect the integration of Staticcheck into pre-commit hooks.
- Added problem statement, success criteria, and implementation plan for Staticcheck integration.
- Enhanced QA validation report to confirm successful implementation of Staticcheck pre-commit blocking.
- Created new Playwright configuration and example test cases for frontend testing.
- Updated package.json and package-lock.json to include Playwright and related dependencies.
- Archived previous QA report for CI workflow documentation updates.
2026-01-11 05:33:01 +00:00
GitHub Actions
5674280c65 fix: Refactor token references in workflows and documentation
- Updated references from `CPMP_TOKEN` to `CHARON_TOKEN` in beta release draft PR body, beta release PR body, and GitHub setup documentation.
- Enhanced clarity in documentation regarding the use of `GITHUB_TOKEN` and fallback options.
- Removed outdated sections from the archived plan for the Docs-to-Issues workflow fix, streamlining the document.
- Initiated integration of Staticcheck into pre-commit hooks to improve code quality, including updates to Makefile, VS Code tasks, and documentation.
2026-01-11 04:27:26 +00:00
GitHub Actions
474186f0ee fix: resolve CI status check issue in docs-to-issues workflow and enhance validation documentation 2026-01-11 04:20:17 +00:00
GitHub Actions
10e3f0f71a fix: complete validation of docs-to-issues workflow and remove CI skip 2026-01-11 04:18:35 +00:00
GitHub Actions
2fa77b1838 fix: remove [skip ci] from commit message to allow CI checks on PRs 2026-01-11 04:15:13 +00:00
github-actions[bot]
3b68d5e5f8 chore: move processed issue files to created/ [skip ci] 2026-01-11 04:00:49 +00:00
GitHub Actions
93ff3cb16a fix: CI/CD workflow improvements
- Mark current specification as complete and ready for the next task.
- Document completed work on CI/CD workflow fixes, including implementation summary and QA report links.
- Archive previous planning documents related to GitHub security warnings.
- Revise QA report to reflect the successful validation of CI workflow documentation updates, with zero high/critical issues found.
- Add new QA report for Grype SBOM remediation implementation, detailing security scans, validation results, and recommendations.
2026-01-11 04:00:30 +00:00
GitHub Actions
1eab988467 test: add unit tests for CrowdSec handler functionality and environment variable handling 2026-01-11 01:20:35 +00:00
GitHub Actions
6c99372c52 fix(ci): add workflow orchestration for supply chain verification
Resolves issue where supply-chain-verify.yml ran before docker-build.yml
completed, causing verification to skip on PRs because Docker image
didn't exist yet.

**Root Cause:**
Both workflows triggered independently on PR events with no dependency,
running concurrently instead of sequentially.

**Solution:**
Add workflow_run trigger to supply-chain-verify that waits for
docker-build to complete successfully before running.

**Changes:**
- Remove pull_request trigger from supply-chain-verify.yml
- Add workflow_run trigger for "Docker Build, Publish & Test"
- Add job conditional checking workflow_run.conclusion == 'success'
- Update tag determination to handle workflow_run context
- Extract PR number from workflow_run metadata
- Update PR comment logic for workflow_run events
- Add debug logging for workflow_run context
- Document workflow_run depth limitation

**Behavior:**
- PRs: docker-build → supply-chain-verify (sequential)
- Push to main: docker-build → supply-chain-verify (sequential)
- Failed builds: verification skipped (correct behavior)
- Manual triggers: preserved via workflow_dispatch
- Scheduled runs: preserved for weekly scans

**Security:**
- Workflow security validated: LOW risk
- workflow_run runs in default branch context (prevents privilege escalation)
- No secret exposure in logs or comments
- Proper input sanitization for workflow metadata
- YAML validation passed
- Pre-commit hooks passed

**Testing:**
- YAML syntax validated
- All references verified correct
- Regression testing completed (no breaking changes)
- Debug instrumentation added for validation

**Documentation:**
- Implementation summary created
- QA report with security audit
- Plan archived for reference
- Testing guidelines provided

Related: #461 (PR where issue was discovered)
Resolves: Supply chain verification skipping on PRs

Co-authored-by: GitHub Copilot <copilot@github.com>
2026-01-11 00:59:10 +00:00
Jeremy
95fa11f7e9 Merge pull request #481 from Wikid82/renovate/npm-minorpatch
fix(deps): update npm minor/patch
2026-01-10 19:37:52 -05:00
renovate[bot]
8b15016185 fix(deps): update npm minor/patch 2026-01-11 00:36:58 +00:00
github-actions[bot]
8bd0f9433a chore: move processed issue files to created/ [skip ci] 2026-01-10 05:41:15 +00:00
GitHub Actions
e95590a727 fix: Update security remediation plan and QA report for Grype SBOM implementation
- Removed outdated security remediation plan for DoD failures, indicating no active specifications.
- Documented recent completion of Grype SBOM remediation, including implementation summary and QA report.
- Updated QA report to reflect successful validation of security scans with zero HIGH/CRITICAL findings.
- Deleted the previous QA report file as its contents are now integrated into the current report.
2026-01-10 05:40:56 +00:00
GitHub Actions
18d1294c24 fix: remediate CodeQL email injection vulnerability with comprehensive email header validation and encoding 2026-01-10 05:14:05 +00:00
Jeremy
fb910dbba8 Merge pull request #479 from Wikid82/renovate/npm-minorpatch
chore(deps): update npm minor/patch
2026-01-09 22:43:51 -05:00
renovate[bot]
848172dcc4 chore(deps): update npm minor/patch 2026-01-10 03:43:11 +00:00
GitHub Actions
b2d5418d67 feat: implement comprehensive supply chain security with cryptographic verification and documentation 2026-01-10 03:39:25 +00:00
GitHub Actions
8bcfe28709 docs: comprehensive supply chain security QA audit report
Complete security audit covering:
- CodeQL analysis (0 Critical/High issues)
- Trivy vulnerability scanning (clean)
- Shellcheck linting (2 issues fixed)
- Supply chain skill testing
- GitHub Actions workflow validation
- Regression testing

All critical checks PASSED. Ready for deployment.
2026-01-10 03:33:38 +00:00
GitHub Actions
9eb0f31e75 chore: Refactor patch coverage remediation plan and create dedicated spec file
- Moved the existing patch coverage remediation plan from `current_spec.md` to a new file `patch_coverage_spec.md` for better organization and focus on security remediation.
- Updated the goal to emphasize restoring Codecov patch coverage to green by ensuring 100% of modified lines are executed by tests.
- Defined two workstreams: one for fixing patch coverage in specific backend files and another for updating prevention measures in instructions and agent files.
- Added a detailed missing files table to track Codecov patch report line ranges and corresponding test strategies.
- Included guidance on handling partial patch lines and common patterns for missed coverage.
- Specified a remediation plan with a test-first approach and per-file testing strategies for targeted coverage improvements.
- Updated relevant instructions and agent files to enforce patch coverage requirements and improve validation processes.
2026-01-10 03:06:07 +00:00