Commit Graph

1375 Commits

Author SHA1 Message Date
GitHub Actions
ab4db87f59 fix: remove invalid trusted_proxies structure causing 500 error on proxy host save
Remove handler-level `trusted_proxies` configuration from ReverseProxyHandler that was
using an invalid object structure. Caddy's reverse_proxy handler expects trusted_proxies
to be an array of CIDR strings, not an object with {source, ranges}.

The server-level trusted_proxies configuration in config.go already provides equivalent
IP spoofing protection globally for all routes, making the handler-level setting redundant.

Changes:
- backend: Remove lines 184-189 from internal/caddy/types.go
- backend: Update 3 unit tests to remove handler-level trusted_proxies assertions
- docs: Document fix in CHANGELOG.md

Fixes: #[issue-number] (500 error when saving proxy hosts)

Tests: All 84 backend tests pass (84.6% coverage)
Security: Trivy + govulncheck clean, no vulnerabilities
2025-12-20 05:46:03 +00:00
GitHub Actions
0a93ce9da2 fix: resolve 500 error on proxy host save due to invalid Caddy configuration
- Updated the critical bug analysis document to reflect the root cause of the 500 error during proxy host save, which was identified as an invalid structure for `trusted_proxies` in the Caddy configuration.
- Removed the handler-level `trusted_proxies` configuration that was incorrectly set as an object instead of an array.
- Added detailed evidence analysis, root cause analysis, and proposed fixes to ensure proper regeneration of Caddy configuration after proxy host updates.
- Created a new document to summarize the previous investigation into the missing `X-Forwarded-Port` header in the Seerr SSO authentication flow.
2025-12-20 04:06:49 +00:00
GitHub Actions
01b20bdd46 docs: add investigation report on Caddy configuration file behavior 2025-12-20 02:58:04 +00:00
GitHub Actions
22c3b620c3 feat: add support for Visual Studio Code workspace files to .gitignore 2025-12-20 02:11:44 +00:00
GitHub Actions
f936c93896 fix: add missing field handlers in proxy host Update endpoint
Add handlers for enable_standard_headers, forward_auth_enabled, and waf_disabled fields
in the proxy host Update function. These fields were defined in the model but were not
being processed during updates, causing:

- 500 errors when saving proxy host configurations
- Auth pass-through failures for apps like Seerr/Overseerr due to missing X-Forwarded-* headers

Changes:
- backend: Add field handlers for 3 missing fields in proxy_host_handler.go
- backend: Add 5 comprehensive unit tests for field handling
- frontend: Update TypeScript ProxyHost interface with missing fields
- docs: Document fixes in CHANGELOG.md

Tests: All 1147 tests pass (backend 85.6%, frontend 87.7% coverage)
Security: No vulnerabilities (Trivy + govulncheck clean)

Fixes #16 (auth pass-through)
Fixes #17 (500 error on save)
2025-12-20 01:55:52 +00:00
GitHub Actions
6712ee9e43 feat: add Supervisor role and restructure workflow phases for improved delegation and review process 2025-12-20 00:55:44 +00:00
GitHub Actions
81085ec890 feat: add standard proxy headers with backward compatibility
Add X-Real-IP, X-Forwarded-Proto, X-Forwarded-Host, and X-Forwarded-Port headers to all proxy hosts for proper client IP detection, HTTPS enforcement, and logging.

- New feature flag: enable_standard_headers (default: true for new hosts, false for existing)
- UI: Checkbox in proxy host form and bulk apply modal for easy migration
- Security: Always configure trusted_proxies when headers enabled
- Backward compatible: Existing hosts preserve legacy behavior until explicitly enabled

BREAKING CHANGE: New proxy hosts will have standard headers enabled by default. Existing hosts maintain legacy behavior. Users can opt-in via UI.

Backend: 98.7% coverage, 8 new tests
Frontend: 87.7% coverage, full TypeScript support
Docs: Comprehensive migration guide and troubleshooting

Closes #<issue-number> (FileFlows WebSocket fix)
2025-12-19 20:32:03 +00:00
GitHub Actions
b79af10014 feat: enhance WebSocket support by adding X-Forwarded headers and related tests 2025-12-19 18:55:49 +00:00
GitHub Actions
ba3941c577 feat: add subagent usage templates and orchestration guidelines 2025-12-19 18:55:49 +00:00
GitHub Actions
8511d98160 fix(i18n): translations
- Added translation support using react-i18next in WafConfig and CrowdSecConfig components.
- Updated UI elements to use translation keys instead of hardcoded strings.
- Enhanced test coverage for i18n integration, including mocks for translation in tests.
- Fixed various test cases to align with new translation structure.
- Created a QA report for i18n implementation, noting validation of translation files and areas for improvement.
2025-12-19 18:55:49 +00:00
GitHub Actions
03518145c0 feat: update testing instructions to enhance clarity and detail on execution protocols 2025-12-19 18:55:48 +00:00
GitHub Actions
097d44b874 feat: add testing instructions for code and content validation 2025-12-19 18:55:48 +00:00
GitHub Actions
9401d3894d fix: update workflow instructions to reference correct agent files 2025-12-19 18:55:48 +00:00
GitHub Actions
62f649ef5b feat: add API-Friendly security header preset for mobile apps
- Add new API-Friendly preset (70/100) optimized for mobile apps and API clients
- CORP set to "cross-origin" to allow mobile app access
- CSP disabled as APIs don't need content security policy
- Add tooltips to preset cards explaining use cases and compatibility
- Add warning banner in ProxyHostForm when Strict/Paranoid selected
- Warn users about mobile app compatibility issues

Presets now: Basic (65) < API-Friendly (70) < Strict (85) < Paranoid (100)

Recommended for: Radarr, Sonarr, Plex, Jellyfin, Home Assistant, Vaultwarden
2025-12-19 18:55:48 +00:00
GitHub Actions
47f42125b1 chore: update version to 0.14.1 2025-12-19 18:55:48 +00:00
GitHub Actions
9c70c99c95 Add comprehensive documentation and guidelines for markdown, performance optimization, Playwright testing, secure coding, TypeScript development, and Copilot management
- Introduced markdown content rules and validation requirements in markdown.instructions.md
- Added React controls and platform libraries guidelines in pcf-react-platform-libraries.instructions.md
- Created extensive performance optimization instructions covering frontend, backend, and database best practices in performance-optimization.instructions.md
- Established Playwright test writing guidelines and structure in playwright-typescript.instructions.md
- Developed secure coding practices based on OWASP Top 10 in security-and-owasp.instructions.md
- Defined directives for managing Copilot interactions and code generation in taming-copilot.instructions.md
- Provided TypeScript 5.x and ES2022 development guidelines in typescript-5-es2022.instructions.md
2025-12-19 18:55:48 +00:00
GitHub Actions
1513c0b636 fix: resolve security header profile persistence bug
- Add diagnostic logging to track security_header_profile_id conversions
- Replace silent failures with explicit HTTP 400 error responses
- Fix ProxyHostService.Update to properly handle nullable foreign keys
- Fix frontend dropdown to use explicit null checks (no falsy coercion)
- Add 7 comprehensive tests for profile assignment edge cases

Root cause: Backend handler had no else clause for type conversion failures,
causing old values to persist. Fixed by adding logging, error handling, and
changing service layer from Updates() to Select("*") for nullable FKs.

Refs: #<issue_number_if_applicable>
2025-12-19 18:55:48 +00:00
GitHub Actions
555ab5e669 feat: add security header profile assignment to proxy hosts
Implement complete workflow for assigning security header profiles
to proxy hosts via dropdown selector in ProxyHostForm.

Backend Changes:
- Add security_header_profile_id handling to proxy host update endpoint
- Add SecurityHeaderProfile preloading in service layer
- Add 5 comprehensive tests for profile CRUD operations

Frontend Changes:
- Add Security Headers section to ProxyHostForm with dropdown
- Group profiles: System Profiles (presets) vs Custom Profiles
- Remove confusing "Apply" button from SecurityHeaders page
- Rename section to "System Profiles (Read-Only)" for clarity
- Show security score inline when profile selected

UX Improvements:
- Clear workflow: Select profile → Assign to host → Caddy applies
- No more confusion about what "Apply" does
- Discoverable security header assignment
- Visual distinction between presets and custom profiles

Tests: Backend 85.6%, Frontend 87.21% coverage
Docs: Updated workflows in docs/features.md
2025-12-19 18:55:48 +00:00
GitHub Actions
c039ef10cf Refactor security headers workflow and improve user feedback
- Removed the Badge component displaying preset type in SecurityHeaders.tsx for a cleaner UI.
- Added detailed analysis for the "Apply Preset" workflow, highlighting user confusion and root causes.
- Proposed fixes to enhance user experience, including clearer toast messages, loading indicators, and better naming for profile sections.
- Documented the complete workflow trace for applying security header presets, emphasizing the need for per-host assignment.
2025-12-19 18:55:48 +00:00
GitHub Actions
3149e624f8 fix: consolidate preset UI and fix field name mismatch
- Remove redundant "Quick Start Presets" section
- Rename "System Presets" to "Quick Presets"
- Add Apply button to each preset card (View, Apply, Clone)
- Sort presets by security_score ascending (Basic → Strict → Paranoid)
- Fix field names: score → security_score, type → preset_type

The score now displays correctly and presets apply as expected.

Tests: 1101 passed, 87.46% coverage
2025-12-19 18:55:48 +00:00
GitHub Actions
08f4683afc fix: update Frontend TypeScript Check name and remove manual stage 2025-12-19 18:55:48 +00:00
GitHub Actions
8b49da4d25 fix: resolve SecurityHeaders page rendering issue
Update frontend API layer to correctly unwrap backend response objects.
Backend returns wrapped responses (e.g., {profiles: [...]}) while frontend
was expecting unwrapped arrays. Fixed 6 API methods in securityHeaders.ts
to properly extract data from response wrappers.

Changes:
- listProfiles(): unwrap .profiles
- getProfile(): unwrap .profile
- createProfile(): unwrap .profile
- updateProfile(): unwrap .profile
- getPresets(): unwrap .presets
- applyPreset(): unwrap .profile
2025-12-19 18:55:48 +00:00
GitHub Actions
f043a020c4 fix: ensure presets is an array before checking its length 2025-12-19 18:55:48 +00:00
GitHub Actions
8cf762164f feat: implement HTTP Security Headers management (Issue #20)
Add comprehensive security header management system with reusable
profiles, interactive builders, and security scoring.

Features:
- SecurityHeaderProfile model with 11+ header types
- CRUD API with 10 endpoints (/api/v1/security/headers/*)
- Caddy integration for automatic header injection
- 3 built-in presets (Basic, Strict, Paranoid)
- Security score calculator (0-100) with suggestions
- Interactive CSP builder with validation
- Permissions-Policy builder
- Real-time security score preview
- Per-host profile assignment

Headers Supported:
- HSTS with preload support
- Content-Security-Policy with report-only mode
- X-Frame-Options, X-Content-Type-Options
- Referrer-Policy, Permissions-Policy
- Cross-Origin-Opener/Resource/Embedder-Policy
- X-XSS-Protection, Cache-Control security

Implementation:
- Backend: models, handlers, services (85% coverage)
- Frontend: React components, hooks (87.46% coverage)
- Tests: 1,163 total tests passing
- Docs: Comprehensive feature documentation

Closes #20
2025-12-19 18:55:48 +00:00
GitHub Actions
01ec910d58 fix: update .gitignore to exclude additional temporary files and directories 2025-12-19 18:55:48 +00:00
GitHub Actions
fa5b85949e fix: add trivy scan output file to .gitignore to prevent version control clutter 2025-12-19 18:55:48 +00:00
GitHub Actions
fd9d09b341 fix: add timeouts to Docker container run and CrowdSec hub update for improved reliability 2025-12-19 18:55:48 +00:00
Jeremy
aa1b8cd8ce Merge pull request #433 from Wikid82/development
Propagate changes from development into feature/beta-release
2025-12-19 07:16:52 -05:00
renovate[bot]
03d166f05a fix(deps): update dependency lucide-react to ^0.562.0 (#432)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
2025-12-19 00:52:20 +00:00
Jeremy
bb1b06b916 Merge pull request #431 from Wikid82/development
Propagate changes from development into feature/beta-release
2025-12-18 18:49:40 -05:00
Jeremy
0d2b4e167d Merge branch 'feature/beta-release' into development 2025-12-18 18:49:31 -05:00
Jeremy
a2900cec2e Merge pull request #430 from Wikid82/main
Propagate changes from main into development
2025-12-18 18:47:10 -05:00
Jeremy
98d4e279c1 Merge branch 'development' into main v0.14.1 2025-12-18 18:46:50 -05:00
Jeremy
3184807990 Merge pull request #427 from Wikid82/copilot/implement-translations-issue-33
feat: implement multi-language support (i18n) for UI
v0.14.0
2025-12-18 17:31:51 -05:00
Jeremy
6a9c64aee2 Merge pull request #429 from Wikid82/development
Propagate changes from development into feature/beta-release
2025-12-18 14:18:11 -05:00
Jeremy
bc35986992 Merge pull request #428 from Wikid82/main
Propagate changes from main into development
2025-12-18 14:02:08 -05:00
copilot-swe-agent[bot]
9ed7d56857 docs: add comprehensive i18n implementation summary
Co-authored-by: Wikid82 <176516789+Wikid82@users.noreply.github.com>
2025-12-18 19:01:57 +00:00
copilot-swe-agent[bot]
9f56b54959 docs: add i18n examples and improve RTL comments
Co-authored-by: Wikid82 <176516789+Wikid82@users.noreply.github.com>
2025-12-18 18:59:11 +00:00
copilot-swe-agent[bot]
fde660ff0e docs: add translation documentation and fix SystemSettings tests
Co-authored-by: Wikid82 <176516789+Wikid82@users.noreply.github.com>
2025-12-18 18:56:32 +00:00
copilot-swe-agent[bot]
b3514b1134 test: add unit tests for i18n functionality
Co-authored-by: Wikid82 <176516789+Wikid82@users.noreply.github.com>
2025-12-18 18:49:40 +00:00
copilot-swe-agent[bot]
e912bc4c80 feat: add i18n infrastructure and language selector
Co-authored-by: Wikid82 <176516789+Wikid82@users.noreply.github.com>
2025-12-18 18:47:41 +00:00
Jeremy
1981dd371b Merge branch 'main' into copilot/implement-translations-issue-33 2025-12-18 13:40:52 -05:00
Jeremy
4cec3595e2 Merge pull request #426 from Wikid82/copilot/troubleshoot-websocket-issues
feat: WebSocket connection tracking and troubleshooting infrastructure
v0.13.0
2025-12-18 13:39:58 -05:00
copilot-swe-agent[bot]
134e2e49b3 Initial plan 2025-12-18 18:39:13 +00:00
copilot-swe-agent[bot]
27344e9812 fix: improve test ID generation in concurrent test 2025-12-18 18:26:46 +00:00
copilot-swe-agent[bot]
1f9af267a3 fix: add null safety check for WebSocket connections
Co-authored-by: Wikid82 <176516789+Wikid82@users.noreply.github.com>
2025-12-18 18:24:29 +00:00
copilot-swe-agent[bot]
96dd7a84e9 chore: fix trailing whitespace from pre-commit 2025-12-18 18:13:53 +00:00
copilot-swe-agent[bot]
628838b6d4 test: add frontend tests for WebSocket tracking
Co-authored-by: Wikid82 <176516789+Wikid82@users.noreply.github.com>
2025-12-18 18:12:45 +00:00
copilot-swe-agent[bot]
8c4823edb6 feat: add WebSocket connection monitoring UI and documentation
Co-authored-by: Wikid82 <176516789+Wikid82@users.noreply.github.com>
2025-12-18 18:09:43 +00:00
copilot-swe-agent[bot]
854a940536 feat: add WebSocket connection tracking backend
Co-authored-by: Wikid82 <176516789+Wikid82@users.noreply.github.com>
2025-12-18 18:04:40 +00:00