Compare commits
9 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
481208caf2 | ||
|
|
65443a1464 | ||
|
|
71269fe041 | ||
|
|
d1876b8dd7 | ||
|
|
eb6cf7f380 | ||
|
|
4331c798d9 | ||
|
|
c55932c41a | ||
|
|
eb16452d8b | ||
|
|
7ab2ce2617 |
2
.github/workflows/auto-changelog.yml
vendored
2
.github/workflows/auto-changelog.yml
vendored
@@ -14,4 +14,4 @@ jobs:
|
||||
- name: Draft Release
|
||||
uses: release-drafter/release-drafter@b1476f6e6eb133afa41ed8589daba6dc69b4d3f5 # v6
|
||||
env:
|
||||
CHARON_TOKEN: ${{ secrets.CHARON_TOKEN }}
|
||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
||||
|
||||
6
.github/workflows/auto-versioning.yml
vendored
6
.github/workflows/auto-versioning.yml
vendored
@@ -68,7 +68,7 @@ jobs:
|
||||
# Export the tag for downstream steps
|
||||
echo "tag=${TAG}" >> $GITHUB_OUTPUT
|
||||
env:
|
||||
CHARON_TOKEN: ${{ secrets.CHARON_TOKEN }}
|
||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
||||
|
||||
- name: Determine tag
|
||||
id: determine_tag
|
||||
@@ -89,14 +89,14 @@ jobs:
|
||||
run: |
|
||||
TAG=${{ steps.determine_tag.outputs.tag }}
|
||||
echo "Checking for release for tag: ${TAG}"
|
||||
STATUS=$(curl -s -o /dev/null -w "%{http_code}" -H "Authorization: token ${CHARON_TOKEN}" -H "Accept: application/vnd.github+json" "https://api.github.com/repos/${GITHUB_REPOSITORY}/releases/tags/${TAG}") || true
|
||||
STATUS=$(curl -s -o /dev/null -w "%{http_code}" -H "Authorization: token ${GITHUB_TOKEN}" -H "Accept: application/vnd.github+json" "https://api.github.com/repos/${GITHUB_REPOSITORY}/releases/tags/${TAG}") || true
|
||||
if [ "${STATUS}" = "200" ]; then
|
||||
echo "exists=true" >> $GITHUB_OUTPUT
|
||||
else
|
||||
echo "exists=false" >> $GITHUB_OUTPUT
|
||||
fi
|
||||
env:
|
||||
CHARON_TOKEN: ${{ secrets.CHARON_TOKEN }}
|
||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
||||
|
||||
- name: Create GitHub Release (tag-only, no workspace changes)
|
||||
if: ${{ steps.semver.outputs.changed == 'true' && steps.check_release.outputs.exists == 'false' }}
|
||||
|
||||
2
.github/workflows/propagate-changes.yml
vendored
2
.github/workflows/propagate-changes.yml
vendored
@@ -157,5 +157,5 @@ jobs:
|
||||
}
|
||||
}
|
||||
env:
|
||||
CHARON_TOKEN: ${{ secrets.CHARON_TOKEN }}
|
||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
||||
CPMP_TOKEN: ${{ secrets.CPMP_TOKEN }}
|
||||
|
||||
8
.github/workflows/release-goreleaser.yml
vendored
8
.github/workflows/release-goreleaser.yml
vendored
@@ -13,10 +13,10 @@ jobs:
|
||||
goreleaser:
|
||||
runs-on: ubuntu-latest
|
||||
env:
|
||||
# Use the built-in CHARON_TOKEN by default for GitHub API operations.
|
||||
# If you need to provide a PAT with elevated permissions, add a CHARON_TOKEN secret
|
||||
# Use the built-in GITHUB_TOKEN by default for GitHub API operations.
|
||||
# If you need to provide a PAT with elevated permissions, add a GITHUB_TOKEN secret
|
||||
# at the repo or organization level and update the env here accordingly.
|
||||
CHARON_TOKEN: ${{ secrets.CHARON_TOKEN }}
|
||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
||||
steps:
|
||||
- name: Checkout
|
||||
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6
|
||||
@@ -47,7 +47,7 @@ jobs:
|
||||
with:
|
||||
version: 0.13.0
|
||||
|
||||
# CHARON_TOKEN is set from CHARON_TOKEN or CPMP_TOKEN (fallback), defaulting to GITHUB_TOKEN
|
||||
# GITHUB_TOKEN is set from GITHUB_TOKEN or CPMP_TOKEN (fallback), defaulting to GITHUB_TOKEN
|
||||
|
||||
|
||||
- name: Run GoReleaser
|
||||
|
||||
21
.github/workflows/renovate.yml
vendored
21
.github/workflows/renovate.yml
vendored
@@ -2,7 +2,7 @@ name: Renovate
|
||||
|
||||
on:
|
||||
schedule:
|
||||
- cron: '0 5 * * *' # daily 05:00 EST
|
||||
- cron: '0 5 * * *' # daily 05:00 UTC
|
||||
workflow_dispatch:
|
||||
|
||||
permissions:
|
||||
@@ -18,28 +18,11 @@ jobs:
|
||||
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6
|
||||
with:
|
||||
fetch-depth: 1
|
||||
- name: Choose Renovate Token
|
||||
run: |
|
||||
# Prefer explicit tokens (CHARON_TOKEN > CPMP_TOKEN) if provided; otherwise use the default GITHUB_TOKEN
|
||||
if [ -n "${{ secrets.CHARON_TOKEN }}" ]; then
|
||||
echo "Using CHARON_TOKEN" >&2
|
||||
echo "GITHUB_TOKEN=${{ secrets.CHARON_TOKEN }}" >> $GITHUB_ENV
|
||||
else
|
||||
echo "Using default GITHUB_TOKEN from Actions" >&2
|
||||
echo "GITHUB_TOKEN=${{ secrets.GITHUB_TOKEN }}" >> $GITHUB_ENV
|
||||
fi
|
||||
|
||||
- name: Fail-fast if token not set
|
||||
run: |
|
||||
if [ -z "${{ env.GITHUB_TOKEN }}" ]; then
|
||||
echo "ERROR: No Renovate token provided. Set CHARON_TOKEN, CPMP_TOKEN, or rely on default GITHUB_TOKEN." >&2
|
||||
exit 1
|
||||
fi
|
||||
|
||||
- name: Run Renovate
|
||||
uses: renovatebot/github-action@502904f1cefdd70cba026cb1cbd8c53a1443e91b # v44.1.0
|
||||
with:
|
||||
configurationFile: .github/renovate.json
|
||||
token: ${{ env.GITHUB_TOKEN }}
|
||||
token: ${{ secrets.RENOVATE_TOKEN }}
|
||||
env:
|
||||
LOG_LEVEL: info
|
||||
|
||||
10
.github/workflows/renovate_prune.yml
vendored
10
.github/workflows/renovate_prune.yml
vendored
@@ -24,17 +24,17 @@ jobs:
|
||||
steps:
|
||||
- name: Choose GitHub Token
|
||||
run: |
|
||||
if [ -n "${{ secrets.CHARON_TOKEN }}" ]; then
|
||||
echo "Using CHARON_TOKEN" >&2
|
||||
echo "CHARON_TOKEN=${{ secrets.CHARON_TOKEN }}" >> $GITHUB_ENV
|
||||
if [ -n "${{ secrets.GITHUB_TOKEN }}" ]; then
|
||||
echo "Using GITHUB_TOKEN" >&2
|
||||
echo "GITHUB_TOKEN=${{ secrets.GITHUB_TOKEN }}" >> $GITHUB_ENV
|
||||
else
|
||||
echo "Using CPMP_TOKEN fallback" >&2
|
||||
echo "CHARON_TOKEN=${{ secrets.CPMP_TOKEN }}" >> $GITHUB_ENV
|
||||
echo "GITHUB_TOKEN=${{ secrets.CPMP_TOKEN }}" >> $GITHUB_ENV
|
||||
fi
|
||||
- name: Prune renovate branches
|
||||
uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8
|
||||
with:
|
||||
github-token: ${{ env.CHARON_TOKEN }}
|
||||
github-token: ${{ env.GITHUB_TOKEN }}
|
||||
script: |
|
||||
const owner = context.repo.owner;
|
||||
const repo = context.repo.repo;
|
||||
|
||||
4
.gitignore
vendored
4
.gitignore
vendored
@@ -81,9 +81,7 @@ charon.db
|
||||
*~
|
||||
.DS_Store
|
||||
*.xcf
|
||||
.vscode/
|
||||
.vscode/launch.json
|
||||
.vscode.backup*/
|
||||
|
||||
|
||||
# -----------------------------------------------------------------------------
|
||||
# Logs & Temp Files
|
||||
|
||||
22
.vscode/launch.json
vendored
Normal file
22
.vscode/launch.json
vendored
Normal file
@@ -0,0 +1,22 @@
|
||||
{
|
||||
"version": "0.2.0",
|
||||
"configurations": [
|
||||
{
|
||||
"name": "Attach to Backend (Docker)",
|
||||
"type": "go",
|
||||
"request": "attach",
|
||||
"mode": "remote",
|
||||
"substitutePath": [
|
||||
{
|
||||
"from": "${workspaceFolder}",
|
||||
"to": "/app"
|
||||
}
|
||||
],
|
||||
"port": 2345,
|
||||
"host": "127.0.0.1",
|
||||
"showLog": true,
|
||||
"trace": "log",
|
||||
"logOutput": "rpc"
|
||||
}
|
||||
]
|
||||
}
|
||||
252
.vscode/tasks.json
vendored
Normal file
252
.vscode/tasks.json
vendored
Normal file
@@ -0,0 +1,252 @@
|
||||
{
|
||||
"version": "2.0.0",
|
||||
"tasks": [
|
||||
{
|
||||
"label": "Build: Local Docker Image",
|
||||
"type": "shell",
|
||||
"command": "docker build -t charon:local .",
|
||||
"group": "build",
|
||||
"problemMatcher": [],
|
||||
"presentation": {
|
||||
"reveal": "always",
|
||||
"panel": "new"
|
||||
}
|
||||
},
|
||||
{
|
||||
"label": "Build: Backend",
|
||||
"type": "shell",
|
||||
"command": "cd backend && go build ./...",
|
||||
"group": "build",
|
||||
"problemMatcher": ["$go"]
|
||||
},
|
||||
{
|
||||
"label": "Build: Frontend",
|
||||
"type": "shell",
|
||||
"command": "cd frontend && npm run build",
|
||||
"group": "build",
|
||||
"problemMatcher": []
|
||||
},
|
||||
{
|
||||
"label": "Build: All",
|
||||
"type": "shell",
|
||||
"dependsOn": ["Build: Backend", "Build: Frontend"],
|
||||
"group": {
|
||||
"kind": "build",
|
||||
"isDefault": true
|
||||
},
|
||||
"problemMatcher": []
|
||||
},
|
||||
{
|
||||
"label": "Test: Backend Unit Tests",
|
||||
"type": "shell",
|
||||
"command": "cd backend && go test ./...",
|
||||
"group": "test",
|
||||
"problemMatcher": ["$go"]
|
||||
},
|
||||
{
|
||||
"label": "Test: Backend with Coverage",
|
||||
"type": "shell",
|
||||
"command": "scripts/go-test-coverage.sh",
|
||||
"group": "test",
|
||||
"problemMatcher": []
|
||||
},
|
||||
{
|
||||
"label": "Test: Frontend",
|
||||
"type": "shell",
|
||||
"command": "cd frontend && npm run test",
|
||||
"group": "test",
|
||||
"problemMatcher": []
|
||||
},
|
||||
{
|
||||
"label": "Test: Frontend with Coverage",
|
||||
"type": "shell",
|
||||
"command": "scripts/frontend-test-coverage.sh",
|
||||
"group": "test",
|
||||
"problemMatcher": []
|
||||
},
|
||||
{
|
||||
"label": "Lint: Pre-commit (All Files)",
|
||||
"type": "shell",
|
||||
"command": "source .venv/bin/activate && pre-commit run --all-files",
|
||||
"group": "test",
|
||||
"problemMatcher": [],
|
||||
"presentation": {
|
||||
"reveal": "always",
|
||||
"panel": "shared"
|
||||
}
|
||||
},
|
||||
{
|
||||
"label": "Lint: Go Vet",
|
||||
"type": "shell",
|
||||
"command": "cd backend && go vet ./...",
|
||||
"group": "test",
|
||||
"problemMatcher": ["$go"]
|
||||
},
|
||||
{
|
||||
"label": "Lint: GolangCI-Lint (Docker)",
|
||||
"type": "shell",
|
||||
"command": "cd backend && docker run --rm -v $(pwd):/app:ro -w /app golangci/golangci-lint:latest golangci-lint run -v",
|
||||
"group": "test",
|
||||
"problemMatcher": []
|
||||
},
|
||||
{
|
||||
"label": "Lint: Frontend",
|
||||
"type": "shell",
|
||||
"command": "cd frontend && npm run lint",
|
||||
"group": "test",
|
||||
"problemMatcher": []
|
||||
},
|
||||
{
|
||||
"label": "Lint: Frontend (Fix)",
|
||||
"type": "shell",
|
||||
"command": "cd frontend && npm run lint -- --fix",
|
||||
"group": "test",
|
||||
"problemMatcher": []
|
||||
},
|
||||
{
|
||||
"label": "Lint: TypeScript Check",
|
||||
"type": "shell",
|
||||
"command": "cd frontend && npm run type-check",
|
||||
"group": "test",
|
||||
"problemMatcher": []
|
||||
},
|
||||
{
|
||||
"label": "Lint: Markdownlint",
|
||||
"type": "shell",
|
||||
"command": "npx markdownlint '**/*.md' --ignore node_modules --ignore .venv --ignore test-results --ignore codeql-db --ignore codeql-agent-results",
|
||||
"group": "test",
|
||||
"problemMatcher": []
|
||||
},
|
||||
{
|
||||
"label": "Lint: Markdownlint (Fix)",
|
||||
"type": "shell",
|
||||
"command": "npx markdownlint '**/*.md' --fix --ignore node_modules --ignore .venv --ignore test-results --ignore codeql-db --ignore codeql-agent-results",
|
||||
"group": "test",
|
||||
"problemMatcher": []
|
||||
},
|
||||
{
|
||||
"label": "Lint: Hadolint Dockerfile",
|
||||
"type": "shell",
|
||||
"command": "docker run --rm -i hadolint/hadolint < Dockerfile",
|
||||
"group": "test",
|
||||
"problemMatcher": []
|
||||
},
|
||||
{
|
||||
"label": "Security: Trivy Scan",
|
||||
"type": "shell",
|
||||
"command": "docker run --rm -v $(pwd):/app aquasec/trivy:latest fs --scanners vuln,secret,misconfig /app",
|
||||
"group": "test",
|
||||
"problemMatcher": []
|
||||
},
|
||||
{
|
||||
"label": "Security: Go Vulnerability Check",
|
||||
"type": "shell",
|
||||
"command": "cd backend && go run golang.org/x/vuln/cmd/govulncheck@latest ./...",
|
||||
"group": "test",
|
||||
"problemMatcher": []
|
||||
},
|
||||
{
|
||||
"label": "Docker: Start Dev Environment",
|
||||
"type": "shell",
|
||||
"command": "docker compose -f docker-compose.dev.yml up -d",
|
||||
"group": "none",
|
||||
"problemMatcher": []
|
||||
},
|
||||
{
|
||||
"label": "Docker: Stop Dev Environment",
|
||||
"type": "shell",
|
||||
"command": "docker compose -f docker-compose.dev.yml down",
|
||||
"group": "none",
|
||||
"problemMatcher": []
|
||||
},
|
||||
{
|
||||
"label": "Docker: Start Local Environment",
|
||||
"type": "shell",
|
||||
"command": "docker compose -f docker-compose.local.yml up -d",
|
||||
"group": "none",
|
||||
"problemMatcher": []
|
||||
},
|
||||
{
|
||||
"label": "Docker: Stop Local Environment",
|
||||
"type": "shell",
|
||||
"command": "docker compose -f docker-compose.local.yml down",
|
||||
"group": "none",
|
||||
"problemMatcher": []
|
||||
},
|
||||
{
|
||||
"label": "Docker: View Logs",
|
||||
"type": "shell",
|
||||
"command": "docker compose logs -f",
|
||||
"group": "none",
|
||||
"problemMatcher": [],
|
||||
"isBackground": true
|
||||
},
|
||||
{
|
||||
"label": "Docker: Prune Unused Resources",
|
||||
"type": "shell",
|
||||
"command": "docker system prune -f",
|
||||
"group": "none",
|
||||
"problemMatcher": []
|
||||
},
|
||||
{
|
||||
"label": "Integration: Run All",
|
||||
"type": "shell",
|
||||
"command": "scripts/integration-test.sh",
|
||||
"group": "test",
|
||||
"problemMatcher": [],
|
||||
"presentation": {
|
||||
"reveal": "always",
|
||||
"panel": "new"
|
||||
}
|
||||
},
|
||||
{
|
||||
"label": "Integration: Coraza WAF",
|
||||
"type": "shell",
|
||||
"command": "scripts/coraza_integration.sh",
|
||||
"group": "test",
|
||||
"problemMatcher": []
|
||||
},
|
||||
{
|
||||
"label": "Integration: CrowdSec",
|
||||
"type": "shell",
|
||||
"command": "scripts/crowdsec_integration.sh",
|
||||
"group": "test",
|
||||
"problemMatcher": []
|
||||
},
|
||||
{
|
||||
"label": "Integration: CrowdSec Decisions",
|
||||
"type": "shell",
|
||||
"command": "scripts/crowdsec_decision_integration.sh",
|
||||
"group": "test",
|
||||
"problemMatcher": []
|
||||
},
|
||||
{
|
||||
"label": "Integration: CrowdSec Startup",
|
||||
"type": "shell",
|
||||
"command": "scripts/crowdsec_startup_test.sh",
|
||||
"group": "test",
|
||||
"problemMatcher": []
|
||||
},
|
||||
{
|
||||
"label": "Utility: Check Version Match Tag",
|
||||
"type": "shell",
|
||||
"command": "scripts/check-version-match-tag.sh",
|
||||
"group": "none",
|
||||
"problemMatcher": []
|
||||
},
|
||||
{
|
||||
"label": "Utility: Clear Go Cache",
|
||||
"type": "shell",
|
||||
"command": "scripts/clear-go-cache.sh",
|
||||
"group": "none",
|
||||
"problemMatcher": []
|
||||
},
|
||||
{
|
||||
"label": "Utility: Bump Beta Version",
|
||||
"type": "shell",
|
||||
"command": "scripts/bump_beta.sh",
|
||||
"group": "none",
|
||||
"problemMatcher": []
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -48,7 +48,7 @@ RUN --mount=type=cache,target=/app/frontend/node_modules/.cache \
|
||||
npm run build
|
||||
|
||||
# ---- Backend Builder ----
|
||||
FROM --platform=$BUILDPLATFORM golang:1.25.5-alpine AS backend-builder
|
||||
FROM --platform=$BUILDPLATFORM golang:1.23-alpine AS backend-builder
|
||||
# Copy xx helpers for cross-compilation
|
||||
COPY --from=xx / /
|
||||
|
||||
@@ -98,7 +98,7 @@ RUN --mount=type=cache,target=/root/.cache/go-build \
|
||||
# ---- Caddy Builder ----
|
||||
# Build Caddy from source to ensure we use the latest Go version and dependencies
|
||||
# This fixes vulnerabilities found in the pre-built Caddy images (e.g. CVE-2025-59530, stdlib issues)
|
||||
FROM --platform=$BUILDPLATFORM golang:1.25.5-alpine AS caddy-builder
|
||||
FROM --platform=$BUILDPLATFORM golang:1.23-alpine AS caddy-builder
|
||||
ARG TARGETOS
|
||||
ARG TARGETARCH
|
||||
ARG CADDY_VERSION
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
module github.com/Wikid82/charon/backend
|
||||
|
||||
go 1.25.5
|
||||
go 1.23
|
||||
|
||||
require (
|
||||
github.com/containrrr/shoutrrr v0.8.0
|
||||
|
||||
@@ -7,7 +7,7 @@ This draft PR merges recent beta preparation changes from `feature/beta-release`
|
||||
## Changes Included
|
||||
|
||||
1. Workflow Token Updates
|
||||
- Prefer `CHARON_TOKEN` with `CPMP_TOKEN` as a fallback to maintain backward compatibility.
|
||||
- Prefer `GITHUB_TOKEN` with `CPMP_TOKEN` as a fallback to maintain backward compatibility.
|
||||
- Ensured consistent secret reference across `release.yml` and `renovate_prune.yml`.
|
||||
2. Release Workflow Adjustments
|
||||
- Fixed environment variable configuration for release publication.
|
||||
@@ -68,7 +68,7 @@ This draft PR merges recent beta preparation changes from `feature/beta-release`
|
||||
|
||||
Marking this as a DRAFT to allow review of token changes before merge. Please:
|
||||
|
||||
- Confirm `CHARON_TOKEN` (or `CPMP_TOKEN` fallback) exists in repo secrets.
|
||||
- Confirm `GITHUB_TOKEN` (or `CPMP_TOKEN` fallback) exists in repo secrets.
|
||||
- Review for any missed workflow references.
|
||||
|
||||
---
|
||||
|
||||
@@ -6,7 +6,7 @@ This draft PR merges recent beta preparation changes from `feature/beta-release`
|
||||
|
||||
## Changes Included (Summary)
|
||||
|
||||
- Workflow token migration: prefer `CHARON_TOKEN` (fallback `CPMP_TOKEN`) across release and maintenance workflows.
|
||||
- Workflow token migration: prefer `GITHUB_TOKEN` (fallback `CPMP_TOKEN`) across release and maintenance workflows.
|
||||
- Stabilized release workflow prerelease detection and artifact publication.
|
||||
- Prior (already merged earlier) CI enhancements: pinned action versions, Docker multi-arch debug tooling reliability, dynamic `dlv` binary resolution.
|
||||
- Documentation updates enumerating each incremental workflow/token adjustment for auditability.
|
||||
@@ -21,7 +21,7 @@ Ensures alpha integration branch inherits hardened CI/release pipeline and updat
|
||||
|
||||
## Risk & Mitigation
|
||||
|
||||
- Secret Name Change: Prefer `CHARON_TOKEN` (keep `CPMP_TOKEN` as a fallback). Mitigation: Verify `CHARON_TOKEN` (or `CPMP_TOKEN`) presence before merge.
|
||||
- Secret Name Change: Prefer `GITHUB_TOKEN` (keep `CPMP_TOKEN` as a fallback). Mitigation: Verify `GITHUB_TOKEN` (or `CPMP_TOKEN`) presence before merge.
|
||||
- Workflow Fan-out: Reusable workflow path validated locally; CI run (draft) will confirm.
|
||||
|
||||
## Follow-ups (Out of Scope)
|
||||
@@ -38,9 +38,9 @@ Ensures alpha integration branch inherits hardened CI/release pipeline and updat
|
||||
|
||||
## Requested Review Focus
|
||||
|
||||
1. Confirm `CHARON_TOKEN` (or `CPMP_TOKEN` fallback) availability.
|
||||
1. Confirm `GITHUB_TOKEN` (or `CPMP_TOKEN` fallback) availability.
|
||||
2. Sanity-check release artifact matrix remains correct.
|
||||
3. Spot any residual `CHARON_TOKEN` or `CPMP_TOKEN` references missed.
|
||||
3. Spot any residual `GITHUB_TOKEN` or `CPMP_TOKEN` references missed.
|
||||
|
||||
---
|
||||
Generated draft to align branches; will convert to ready-for-review after validation.
|
||||
|
||||
@@ -6,7 +6,7 @@ Draft PR to merge hardened CI/release workflow changes from `feature/beta-releas
|
||||
|
||||
## Highlights
|
||||
|
||||
- Secret token migration: prefer `CHARON_TOKEN` while maintaining support for `CPMP_TOKEN` (fallback) where needed.
|
||||
- Secret token migration: prefer `GITHUB_TOKEN` while maintaining support for `CPMP_TOKEN` (fallback) where needed.
|
||||
- Release workflow refinements: stable prerelease detection (alpha/beta/rc), artifact matrix intact.
|
||||
- Prior infra hardening (already partially merged earlier): pinned GitHub Action SHAs/tags, resilient Delve (`dlv`) multi-arch build handling.
|
||||
- Extensive incremental documentation trail in `docs/beta_release_draft_pr.md` plus concise snapshot in `docs/beta_release_draft_pr_body_snapshot.md` for reviewers.
|
||||
@@ -17,8 +17,8 @@ Most recent snapshot commit: `308ae5dd` (final body content before PR). Full ord
|
||||
|
||||
## Review Checklist
|
||||
|
||||
- Secret `CHARON_TOKEN` (or `CPMP_TOKEN` fallback) exists and has required scopes.
|
||||
- No lingering `CHARON_TOKEN` or `CPMP_TOKEN` references beyond allowed GitHub-provided contexts.
|
||||
- Secret `GITHUB_TOKEN` (or `CPMP_TOKEN` fallback) exists and has required scopes.
|
||||
- No lingering `GITHUB_TOKEN` or `CPMP_TOKEN` references beyond allowed GitHub-provided contexts.
|
||||
- Artifact list (frontend dist, backend binaries, caddy binaries) still correct for release.
|
||||
|
||||
## Risks & Mitigations
|
||||
|
||||
@@ -10,7 +10,7 @@ The Docker build workflow uses GitHub Container Registry (GHCR) to store your im
|
||||
|
||||
### How It Works
|
||||
|
||||
GitHub Actions automatically uses the built-in secret token to authenticate with GHCR. We recommend creating a `CHARON_TOKEN` secret (preferred); workflows currently still work with `CPMP_TOKEN` for backward compatibility.
|
||||
GitHub Actions automatically uses the built-in secret token to authenticate with GHCR. We recommend creating a `GITHUB_TOKEN` secret (preferred); workflows currently still work with `CPMP_TOKEN` for backward compatibility.
|
||||
|
||||
- ✅ Push images to `ghcr.io/wikid82/charon`
|
||||
- ✅ Link images to your repository
|
||||
@@ -172,13 +172,13 @@ When you're ready to release a new version:
|
||||
|
||||
**Problem**: "Error: denied: requested access to the resource is denied"
|
||||
|
||||
- **Fix**: This shouldn't happen with `CHARON_TOKEN` or `CPMP_TOKEN` - check workflow permissions
|
||||
- **Fix**: This shouldn't happen with `GITHUB_TOKEN` or `CPMP_TOKEN` - check workflow permissions
|
||||
- **Verify**: Settings → Actions → General → Workflow permissions → "Read and write permissions" enabled
|
||||
|
||||
**Problem**: Can't pull the image
|
||||
|
||||
- **Fix**: Make the package public (see Step 1 above)
|
||||
- **Or**: Authenticate with GitHub: `echo $CHARON_TOKEN | docker login ghcr.io -u USERNAME --password-stdin` (or `CPMP_TOKEN` for backward compatibility)
|
||||
- **Or**: Authenticate with GitHub: `echo $GITHUB_TOKEN | docker login ghcr.io -u USERNAME --password-stdin` (or `CPMP_TOKEN` for backward compatibility)
|
||||
|
||||
### Docs Don't Deploy
|
||||
|
||||
|
||||
Reference in New Issue
Block a user