Commit Graph

1621 Commits

Author SHA1 Message Date
GitHub Actions e643a60c32 fix: remediate supply chain vulnerabilities and implement no-cache builds
## Summary
Addresses 8 Medium severity vulnerabilities identified in supply chain scan
for PR #461. Implements no-cache Docker builds to prevent layer caching
issues and remediates golang.org/x/crypto vulnerabilities via replace
directive.

## Changes

### Security Fixes
- Add go.mod replace directive forcing golang.org/x/crypto v0.42.0 -> v0.45.0
  - Addresses GHSA-j5w8-q4qc-rx2x (SSH connection handling)
  - Addresses GHSA-f6x5-jh6r-wrfv (SSH key parsing)
  - Transitive dependency from go-playground/validator/v10@v10.28.0
  - Tested with backend unit tests - all passing

### Docker Build Improvements
- Add no-cache: true to docker-build.yml main build step
- Add --no-cache flag to PR-specific builds (trivy-pr-app-only)
- Add --no-cache flag to waf-integration.yml builds
- Remove GitHub Actions cache configuration (cache-from, cache-to)
- Ensures clean builds with accurate vulnerability
2026-01-11 20:56:44 +00:00
GitHub Actions d8cc4da730 fix: Implement no-cache Docker builds to eliminate false positive vulnerabilities from cached layers 2026-01-11 20:39:57 +00:00
GitHub Actions 622f5a48e4 fix: Enhance supply chain security with updated PR comments, remediation plan, scan analysis, and detailed vulnerability reporting
- Implemented a new workflow for supply chain security that updates PR comments with current scan results, replacing stale data.
- Created a remediation plan addressing high-severity vulnerabilities in CrowdSec binaries, including action items and timelines.
- Developed a discrepancy analysis document to investigate differences between local and CI vulnerability scans, identifying root causes and remediation steps.
- Enhanced vulnerability reporting in PR comments to include detailed findings, collapsible sections for readability, and artifact uploads for compliance tracking.
2026-01-11 20:13:15 +00:00
GitHub Actions e06eb4177b fix; CVE-2025-68156 remediation
- Changed report title to reflect security audit focus
- Updated date and status to indicate approval for commit
- Enhanced executive summary with detailed validation results
- Included comprehensive test coverage results for backend and frontend
- Documented pre-commit hooks validation and known issues
- Added detailed security scan results, confirming absence of CVE-2025-68156
- Verified binary inspection for expr-lang dependency
- Provided risk assessment and recommendations for post-merge actions
- Updated compliance matrix and final assessment sections
- Improved overall report structure and clarity
2026-01-11 19:33:25 +00:00
GitHub Actions db7490d763 feat: Enhance supply chain verification by excluding PR builds and add Docker image artifact handling 2026-01-11 07:17:12 +00:00
GitHub Actions 9f2dc3e530 fix: add mandatory instruction to read relevant guidelines before starting tasks 2026-01-11 06:45:26 +00:00
GitHub Actions b9fa62f8f4 fix: add mandatory instruction to read relevant guidelines before starting tasks across agent documentation 2026-01-11 06:45:17 +00:00
GitHub Actions 10902e37a0 fix: update golangci-lint entry command and enhance current specification for Playwright MCP server initialization 2026-01-11 06:09:23 +00:00
github-actions[bot] efd8a5d0f3 chore: move processed issue files to created/ 2026-01-11 05:33:23 +00:00
GitHub Actions a895bde4e9 feat: Integrate Staticcheck Pre-Commit Hook and Update QA Report
- Updated current specification to reflect the integration of Staticcheck into pre-commit hooks.
- Added problem statement, success criteria, and implementation plan for Staticcheck integration.
- Enhanced QA validation report to confirm successful implementation of Staticcheck pre-commit blocking.
- Created new Playwright configuration and example test cases for frontend testing.
- Updated package.json and package-lock.json to include Playwright and related dependencies.
- Archived previous QA report for CI workflow documentation updates.
2026-01-11 05:33:01 +00:00
GitHub Actions 5674280c65 fix: Refactor token references in workflows and documentation
- Updated references from `CPMP_TOKEN` to `CHARON_TOKEN` in beta release draft PR body, beta release PR body, and GitHub setup documentation.
- Enhanced clarity in documentation regarding the use of `GITHUB_TOKEN` and fallback options.
- Removed outdated sections from the archived plan for the Docs-to-Issues workflow fix, streamlining the document.
- Initiated integration of Staticcheck into pre-commit hooks to improve code quality, including updates to Makefile, VS Code tasks, and documentation.
2026-01-11 04:27:26 +00:00
GitHub Actions 474186f0ee fix: resolve CI status check issue in docs-to-issues workflow and enhance validation documentation 2026-01-11 04:20:17 +00:00
GitHub Actions 10e3f0f71a fix: complete validation of docs-to-issues workflow and remove CI skip 2026-01-11 04:18:35 +00:00
GitHub Actions 2fa77b1838 fix: remove [skip ci] from commit message to allow CI checks on PRs 2026-01-11 04:15:13 +00:00
github-actions[bot] 3b68d5e5f8 chore: move processed issue files to created/ [skip ci] 2026-01-11 04:00:49 +00:00
GitHub Actions 93ff3cb16a fix: CI/CD workflow improvements
- Mark current specification as complete and ready for the next task.
- Document completed work on CI/CD workflow fixes, including implementation summary and QA report links.
- Archive previous planning documents related to GitHub security warnings.
- Revise QA report to reflect the successful validation of CI workflow documentation updates, with zero high/critical issues found.
- Add new QA report for Grype SBOM remediation implementation, detailing security scans, validation results, and recommendations.
2026-01-11 04:00:30 +00:00
GitHub Actions 1eab988467 test: add unit tests for CrowdSec handler functionality and environment variable handling 2026-01-11 01:20:35 +00:00
GitHub Actions 6c99372c52 fix(ci): add workflow orchestration for supply chain verification
Resolves issue where supply-chain-verify.yml ran before docker-build.yml
completed, causing verification to skip on PRs because Docker image
didn't exist yet.

**Root Cause:**
Both workflows triggered independently on PR events with no dependency,
running concurrently instead of sequentially.

**Solution:**
Add workflow_run trigger to supply-chain-verify that waits for
docker-build to complete successfully before running.

**Changes:**
- Remove pull_request trigger from supply-chain-verify.yml
- Add workflow_run trigger for "Docker Build, Publish & Test"
- Add job conditional checking workflow_run.conclusion == 'success'
- Update tag determination to handle workflow_run context
- Extract PR number from workflow_run metadata
- Update PR comment logic for workflow_run events
- Add debug logging for workflow_run context
- Document workflow_run depth limitation

**Behavior:**
- PRs: docker-build → supply-chain-verify (sequential)
- Push to main: docker-build → supply-chain-verify (sequential)
- Failed builds: verification skipped (correct behavior)
- Manual triggers: preserved via workflow_dispatch
- Scheduled runs: preserved for weekly scans

**Security:**
- Workflow security validated: LOW risk
- workflow_run runs in default branch context (prevents privilege escalation)
- No secret exposure in logs or comments
- Proper input sanitization for workflow metadata
- YAML validation passed
- Pre-commit hooks passed

**Testing:**
- YAML syntax validated
- All references verified correct
- Regression testing completed (no breaking changes)
- Debug instrumentation added for validation

**Documentation:**
- Implementation summary created
- QA report with security audit
- Plan archived for reference
- Testing guidelines provided

Related: #461 (PR where issue was discovered)
Resolves: Supply chain verification skipping on PRs

Co-authored-by: GitHub Copilot <copilot@github.com>
2026-01-11 00:59:10 +00:00
github-actions[bot] 8bd0f9433a chore: move processed issue files to created/ [skip ci] 2026-01-10 05:41:15 +00:00
GitHub Actions e95590a727 fix: Update security remediation plan and QA report for Grype SBOM implementation
- Removed outdated security remediation plan for DoD failures, indicating no active specifications.
- Documented recent completion of Grype SBOM remediation, including implementation summary and QA report.
- Updated QA report to reflect successful validation of security scans with zero HIGH/CRITICAL findings.
- Deleted the previous QA report file as its contents are now integrated into the current report.
2026-01-10 05:40:56 +00:00
GitHub Actions 18d1294c24 fix: remediate CodeQL email injection vulnerability with comprehensive email header validation and encoding 2026-01-10 05:14:05 +00:00
GitHub Actions b2d5418d67 feat: implement comprehensive supply chain security with cryptographic verification and documentation 2026-01-10 03:39:25 +00:00
GitHub Actions 8bcfe28709 docs: comprehensive supply chain security QA audit report
Complete security audit covering:
- CodeQL analysis (0 Critical/High issues)
- Trivy vulnerability scanning (clean)
- Shellcheck linting (2 issues fixed)
- Supply chain skill testing
- GitHub Actions workflow validation
- Regression testing

All critical checks PASSED. Ready for deployment.
2026-01-10 03:33:38 +00:00
GitHub Actions 9eb0f31e75 chore: Refactor patch coverage remediation plan and create dedicated spec file
- Moved the existing patch coverage remediation plan from `current_spec.md` to a new file `patch_coverage_spec.md` for better organization and focus on security remediation.
- Updated the goal to emphasize restoring Codecov patch coverage to green by ensuring 100% of modified lines are executed by tests.
- Defined two workstreams: one for fixing patch coverage in specific backend files and another for updating prevention measures in instructions and agent files.
- Added a detailed missing files table to track Codecov patch report line ranges and corresponding test strategies.
- Included guidance on handling partial patch lines and common patterns for missed coverage.
- Specified a remediation plan with a test-first approach and per-file testing strategies for targeted coverage improvements.
- Updated relevant instructions and agent files to enforce patch coverage requirements and improve validation processes.
2026-01-10 03:06:07 +00:00
GitHub Actions 4d7f0425ee fix: pin CrowdSec builder to Go 1.25.5 to eliminate HIGH CVEs and enhance email header validation to prevent CRLF injection 2026-01-10 03:02:23 +00:00
GitHub Actions 543492092b fix(docker): improve security comments and clarify user privilege handling in Dockerfile 2026-01-10 00:15:18 +00:00
GitHub Actions db0ab55373 fix(docker): enhance error handling and user feedback for Docker service unavailability 2026-01-10 00:08:25 +00:00
GitHub Actions 311c75abaa chore: update tasks.json for improved task management and organization 2026-01-09 22:00:43 +00:00
GitHub Actions b28f3b8bcc test: add SMTP configuration tests and multi-credential DNS provider support 2026-01-09 07:02:36 +00:00
GitHub Actions 04532efa05 chore: update coverage requirements and testing protocols across agent instructions and guidelines 2026-01-09 07:00:41 +00:00
GitHub Actions 9c226ec898 Add structured autonomy prompts for generating, implementing, and planning implementation documentation
- Introduced `structured-autonomy-generate.prompt.md` for generating implementation plans from PRs.
- Added `structured-autonomy-implement.prompt.md` to execute implementation plans step-by-step.
- Created `structured-autonomy-plan.prompt.md` for collaborative project planning and outlining development steps.
- Implemented prompts for suggesting relevant GitHub Copilot agents, chat modes, collections, instructions, and prompts from the awesome-copilot repository.
- Developed `update-implementation-plan.prompt.md` for updating existing implementation plans with new requirements and structured output.
2026-01-09 03:53:42 +00:00
Jeremy dcd2d99231 Merge pull request #477 from Wikid82/development
Propagate changes from development into feature/beta-release
2026-01-08 19:22:45 -05:00
Jeremy c87be87257 Merge branch 'feature/beta-release' into development 2026-01-08 19:22:10 -05:00
Jeremy b3e2a1fae6 Merge pull request #476 from Wikid82/renovate/npm-minorpatch
fix(deps): update npm minor/patch
2026-01-08 19:19:39 -05:00
Jeremy 31f27377bb Merge branch 'development' into renovate/npm-minorpatch 2026-01-08 19:19:19 -05:00
Jeremy c60b0fed1b Merge pull request #475 from Wikid82/renovate/golang.org-x-net-0.x
fix(deps): update module golang.org/x/net to v0.48.0
2026-01-08 19:17:35 -05:00
GitHub Actions c25ff3a862 fix(dialog): add aria-describedby attribute to DialogContent for accessibility 2026-01-08 23:30:09 +00:00
GitHub Actions 33bb3d1deb chore: add CHARON_ENCRYPTION_KEY to all Docker Compose files and README
- Add encryption key environment variable to docker-compose.yml,
  docker-compose.dev.yml, docker-compose.local.yml, docker-compose.test.yml
- Update README.md Quick Start examples (compose and docker run)
- Include generation instructions: openssl rand -base64 32

Required for DNS provider and plugin features which encrypt sensitive data at rest.
2026-01-08 23:22:00 +00:00
GitHub Actions 1399e563fc chore: Add tests for multi-credential DNS providers and enhance config generation
- Implemented tests to verify multi-credential DNS providers create separate TLS automation policies per zone with zone-specific credentials.
- Added tests for ZeroSSL issuer and both ACME and ZeroSSL issuers in multi-credential scenarios.
- Verified handling of ACME staging CA and scenarios where zones have no matching domains.
- Ensured graceful handling when provider type is not found in the registry.
- Added tests for disabled hosts, custom certificates, and advanced config normalization.
- Enhanced credential retrieval logic to handle multi-credential scenarios, including disabled credentials and catch-all matches.
- Improved security decision handling with admin whitelist checks.
- Updated encryption key handling in integration tests for consistent behavior.
2026-01-08 22:57:16 +00:00
renovate[bot] 0894de3ebb fix(deps): update npm minor/patch 2026-01-08 20:27:19 +00:00
renovate[bot] de79603b77 fix(deps): update module golang.org/x/net to v0.48.0 2026-01-08 20:26:56 +00:00
GitHub Actions eba63d42d1 fix(dns): implement DNS routes with navigation and localization support 2026-01-08 17:08:47 +00:00
GitHub Actions f40e4805d6 fix(tests): normalize whitespace in plugin and hub sync test files 2026-01-08 12:44:13 +00:00
GitHub Actions 277b7b53ee test: boost backend coverage from 73% to 84.1% with 169 new tests
- Add comprehensive test suite for plugin_handler (25 tests)
- Expand credential_handler error path coverage (20 tests)
- Enhance caddy/config DNS challenge & security tests (23 tests)
- Improve hub_sync SSRF protection & backup tests (66 tests)
- Add encryption_handler, audit_log, manager tests (35+ tests)
- Fix DNS provider registry initialization in test files
- Configure encryption keys for credential rotation tests

Coverage improvements by file:
- plugin_handler: 0% → 75.67%
- credential_handler: 32.83% → 84.93%
- caddy/config: 79.82% → 94.5%
- hub_sync: 56.78% → 78%+
- encryption_handler: 78.29% → 94.29%
- manager: 76.13% → 96.46%
- audit_log_handler: 78.08% → 94.25%

Overall backend: 73% → 84.1% (+11.1%)

All 1400+ tests passing. Security scans clean (CodeQL, Go vuln).
2026-01-08 12:43:51 +00:00
GitHub Actions d22bf6c3f1 fix: add exclusion for all output files with .out extension in .gitignore 2026-01-08 00:22:02 +00:00
GitHub Actions 65070b095a fix: enforce 100% coverage for new/modified code in backend and frontend tests 2026-01-08 00:09:04 +00:00
GitHub Actions 703bdb0745 fix(docker): resolve ARM64 cross-compilation gold linker failure
Go 1.25 hardcodes -fuse-ld=gold for ARM64 external linking, but Alpine's
clang toolchain only includes LLD. Add a clang wrapper that:
- Intercepts -fuse-ld=gold and replaces with -fuse-ld=lld
- Spoofs GNU gold version output for Go's linker validation

Fixes continuous CI failures on linux/arm64 platform builds.
2026-01-07 23:55:51 +00:00
Jeremy 0f99bad9f2 Merge pull request #472 from Wikid82/renovate/npm-minorpatch
fix(deps): update npm minor/patch
2026-01-07 16:13:57 -05:00
Jeremy 2524e48e91 Merge pull request #471 from Wikid82/renovate/golang.org-x-net-0.x
fix(deps): update module golang.org/x/net to v0.48.0
2026-01-07 16:13:24 -05:00
Jeremy 7e47d580a5 Merge pull request #470 from Wikid82/renovate/renovatebot-github-action-44.x
chore(deps): update renovatebot/github-action action to v44.2.3
2026-01-07 16:12:49 -05:00