Commit Graph

3558 Commits

Author SHA1 Message Date
GitHub Actions
bb7b6a7f9e feat: Implement partial update for ProxyHostHandler
- Added a new test case to ensure that partial updates do not wipe existing fields in the ProxyHost model.
- Modified the Update method in ProxyHostHandler to handle partial updates by only mutating fields present in the JSON payload.
- Enhanced the handling of nullable foreign keys and locations during updates.
- Removed the requirement for 100% coverage checks for critical backend modules in the CI pipeline.
2025-12-02 21:06:15 +00:00
renovate[bot]
c3b14004fa chore(deps): update actions/checkout action to v6.0.1 (#290)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
2025-12-02 20:52:21 +00:00
renovate[bot]
e97c46a4b9 fix(deps): update npm minor/patch 2025-12-02 18:39:07 +00:00
renovate[bot]
5a239f473f chore(deps): update actions/checkout digest to 8e8c483 2025-12-02 18:38:15 +00:00
renovate[bot]
a714a35056 chore(deps): update npm minor/patch to ^8.48.1 (#287)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
2025-12-02 14:28:02 +00:00
GitHub Actions
5193d2c24b refactor(quality-checks): remove module-specific coverage checks for backend and frontend 2025-12-02 05:27:35 +00:00
GitHub Actions
a4e65ff0fa refactor(coverage): remove module-specific frontend coverage checks 2025-12-02 05:23:36 +00:00
GitHub Actions
47d60536d2 fix(docs): update mandatory test coverage command in Frontend_Dev agent 2025-12-02 04:58:24 +00:00
GitHub Actions
bd85148b8e fix(docs): update mandatory test coverage command in Frontend_Dev agent 2025-12-02 04:51:27 +00:00
GitHub Actions
f621cb29ae fix(docs): update path for frontend test coverage script in Frontend_Dev agent 2025-12-02 04:49:17 +00:00
GitHub Actions
62ae91d0c3 fix(tests): add Notification model migrations to all handler tests using NotificationService 2025-12-02 04:34:37 +00:00
GitHub Actions
d285014358 fix(tests): add missing Notification models to handler test migrations 2025-12-02 04:19:25 +00:00
GitHub Actions
d89dd8fc0c fix(tests): exclude e2e directory from Vitest to prevent Playwright conflicts 2025-12-02 04:16:52 +00:00
GitHub Actions
bd5f0c3459 feat(tests): add cleanup step to remove integration test proxy host from database 2025-12-02 04:08:52 +00:00
GitHub Actions
33dc664425 feat(waf): update WAF middleware to evaluate and log suspicious payloads without blocking in monitor mode 2025-12-02 03:53:12 +00:00
GitHub Actions
9859a40294 feat(agent): update mandatory test coverage command to use script 2025-12-02 03:52:04 +00:00
GitHub Actions
8d26a631d4 feat(tests): add integration test for WAF middleware behavior and metrics exposure 2025-12-02 03:36:58 +00:00
GitHub Actions
d1731f81dd feat(docs): enhance documentation for Cerberus security suite, WAF configuration, and API endpoints 2025-12-02 03:05:57 +00:00
GitHub Actions
34347b1ff5 Refactor uptime service and tests; add WAF configuration UI and e2e tests
- Refactored `SyncMonitors` method in `uptime_service.go` for better readability.
- Updated unit tests for `UptimeService` to ensure proper functionality.
- Introduced Playwright configuration for end-to-end testing.
- Added e2e tests for WAF blocking and monitoring functionality.
- Enhanced the Security page to include WAF mode and rule set selection.
- Implemented tests for WAF configuration changes and validation.
- Created a `.last-run.json` file to store test results.
2025-12-02 02:51:50 +00:00
GitHub Actions
47a4966676 feat(workflow): add context acquisition steps for handoff contract in agent workflows 2025-12-02 02:21:59 +00:00
GitHub Actions
2f801e8152 feat(workflow): update verification steps to include mandatory frontend test coverage script 2025-12-02 02:14:42 +00:00
GitHub Actions
b78d79516e feat(workflow): add WAF integration testing workflow with Docker setup and reporting 2025-12-02 02:10:35 +00:00
GitHub Actions
44c4d955f5 feat(security): add WAF configuration page with rule set management and tests 2025-12-02 01:53:28 +00:00
GitHub Actions
8c015bceba fix(workflow): update verification steps to include frontend test coverage script and type check 2025-12-02 01:53:18 +00:00
GitHub Actions
a08edf1895 Refactor WAF handler configuration to use 'include' array instead of 'rules_file'
- Updated the GenerateConfig function to replace 'rules_file' with 'include' for WAF handlers, aligning with the coraza-caddy plugin requirements.
- Modified related tests to check for the presence of 'include' instead of 'rules_file'.
- Enhanced the ApplyConfig method to prepend necessary Coraza directives to ruleset files if not already present.
- Added tests to verify that the SecRuleEngine directives are correctly prepended and that existing directives are not duplicated.
- Implemented debug logging for generated config size and content.
2025-12-02 01:32:47 +00:00
GitHub Actions
202e457d2c fix(workflow): update verification steps to include Frontend Test Coverage and Type Check tasks 2025-12-02 01:32:34 +00:00
GitHub Actions
fa01664eb7 fix(workflow): update pre-commit requirements to ensure coverage goals are met 2025-12-02 01:25:49 +00:00
GitHub Actions
4e975421de feat(integration): add integration test for Coraza WAF script execution 2025-12-02 00:32:40 +00:00
GitHub Actions
14859adf87 Enhance GenerateConfig function to accept ruleset paths and update related tests
- Modified the GenerateConfig function to include an additional parameter for ruleset paths.
- Updated multiple test cases across various files to accommodate the new parameter.
- Enhanced the manager's ApplyConfig method to handle ruleset file creation and error handling.
- Added integration tests for Coraza WAF to validate runtime behavior and ruleset application.
- Updated documentation to include instructions for testing Coraza WAF integration locally.
2025-12-01 21:11:17 +00:00
GitHub Actions
76ab163e69 feat(security): integrate Caddy Manager into SecurityHandler and update related tests 2025-12-01 20:16:08 +00:00
GitHub Actions
fabdbc42cb feat(docs): add documentation agents for technical writing, planning, and QA security 2025-12-01 20:13:51 +00:00
GitHub Actions
f5fb460cc6 feat(security): add DeleteRuleSet endpoint and implement related service logic 2025-12-01 19:56:15 +00:00
GitHub Actions
b0a4d75a2a Refactor security configuration: Remove external CrowdSec mode support
- Updated SecurityConfig model to only support 'local' or 'disabled' modes for CrowdSec.
- Modified related logic in the manager and services to reject external mode.
- Adjusted tests to validate the new restrictions on CrowdSec modes.
- Updated frontend components to remove references to external mode and provide appropriate user feedback.
- Enhanced documentation to reflect the removal of external CrowdSec mode support.
2025-12-01 19:43:45 +00:00
GitHub Actions
08f9c8f87d fix(docs): correct typos and improve clarity in copilot instructions 2025-12-01 18:44:11 +00:00
GitHub Actions
570d904019 feat(security): implement decision and ruleset management with logging and retrieval 2025-12-01 18:23:15 +00:00
GitHub Actions
53765afd35 feat(security): implement self-lockout protection and admin whitelist
- Added SecurityConfig model to manage Cerberus settings including admin whitelist and break-glass token.
- Introduced SecurityService for handling security configurations and token generation.
- Updated Manager to check for admin whitelist before applying configurations to prevent accidental lockouts.
- Enhanced frontend with hooks and API calls for managing security settings and generating break-glass tokens.
- Updated documentation to include self-lockout protection measures and best practices for using Cerberus.
2025-12-01 18:10:58 +00:00
GitHub Actions
26c4acffb0 feat: update big picture section in copilot instructions for clarity on Charon's purpose and user focus 2025-12-01 16:52:43 +00:00
GitHub Actions
c83928f628 Refactor Caddy configuration management to include security settings
- Updated `GenerateConfig` function calls in tests to include additional security parameters.
- Enhanced `Manager` struct to hold a `SecurityConfig` instance for managing security-related settings.
- Implemented `computeEffectiveFlags` method to determine the effective state of security features based on both static configuration and runtime database settings.
- Added comprehensive tests for the new security configuration handling, ensuring correct behavior for various scenarios including ACL and CrowdSec settings.
- Adjusted existing tests to accommodate the new structure and ensure compatibility with the updated configuration management.
2025-12-01 16:22:21 +00:00
GitHub Actions
fd4555674d feat: enhance README instructions with docker compose and run details for better user guidance 2025-12-01 16:22:21 +00:00
GitHub Actions
85828ea695 feat: update code quality guidelines for improved clarity and consistency 2025-12-01 16:22:21 +00:00
GitHub Actions
1df5999635 feat: enhance ACL handler to properly block access based on geographic restrictions 2025-12-01 16:22:21 +00:00
GitHub Actions
581229e454 feat: ensure ACL is disabled when Cerberus is off in security status response 2025-12-01 16:22:21 +00:00
GitHub Actions
9259257986 feat: enhance security documentation with multi-layer protection guidance and ACL usage recommendations 2025-12-01 16:22:21 +00:00
GitHub Actions
486987cc96 feat: remove IP-based presets from ACL templates for improved security management 2025-12-01 16:22:21 +00:00
GitHub Actions
5717941d45 feat: add runtime override for ACL enabled flag in security handler 2025-12-01 16:22:21 +00:00
GitHub Actions
b45ac58f10 feat: add ACL_DBOverride test to validate ACL configuration in security handler 2025-12-01 16:22:21 +00:00
GitHub Actions
b813c383c2 feat: update registry token handling in docker-publish workflow 2025-12-01 16:22:21 +00:00
GitHub Actions
d341879ff4 ci(docker): use step outputs for REGISTRY_PASSWORD in docker-publish workflow 2025-12-01 16:22:21 +00:00
GitHub Actions
4d639698bb Enhance logging security by sanitizing sensitive data
- Implemented filename sanitization in backup, import, and certificate handlers to prevent log injection attacks.
- Added tests to ensure filenames are sanitized correctly in backup and import handlers.
- Updated notification and domain handlers to sanitize domain names before logging.
- Introduced middleware functions for sanitizing request paths and headers to redact sensitive information in logs.
- Enhanced recovery middleware to sanitize logged paths and headers during panic situations.
- Updated various services to log sanitized values for sensitive fields.
2025-12-01 16:22:21 +00:00
GitHub Actions
927bec9374 feat: add trace package with ContextKey type and RequestIDKey constant 2025-12-01 16:22:21 +00:00