Skip to content

Enable and test Gotify and Custom Webhook notifications#754

Draft
Wikid82 wants to merge 52 commits intodevelopmentfrom
feature/beta-release
Draft

Enable and test Gotify and Custom Webhook notifications#754
Wikid82 wants to merge 52 commits intodevelopmentfrom
feature/beta-release

Conversation

@Wikid82
Copy link
Owner

@Wikid82 Wikid82 commented Feb 23, 2026

Primary goals:

  1. Enable a unified wrapper path for outbound provider dispatch.
  2. Make Gotify token handling write-only and non-leaking by contract.
  3. Add explicit SSRF/redirect/rebinding protections.
  4. Add strict error leakage controls for preview/test paths.
  5. Add wrapper transport guardrails and expanded validation tests.

renovate bot and others added 2 commits February 23, 2026 21:17
…n-major-updates

chore(deps): update actions/download-artifact digest to 70fc10c (feature/beta-release)
@Wikid82 Wikid82 self-assigned this Feb 23, 2026
@Wikid82 Wikid82 added frontend UI/UX code feature New functionality monitoring Logging and statistics manual-testing labels Feb 23, 2026
@Wikid82 Wikid82 added this to Charon Feb 23, 2026
@github-project-automation github-project-automation bot moved this to Backlog in Charon Feb 23, 2026
@Wikid82 Wikid82 moved this from Backlog to In Progress in Charon Feb 23, 2026
@github-advanced-security
Copy link

This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation.

@github-actions
Copy link
Contributor

github-actions bot commented Feb 23, 2026

✅ Supply Chain Verification Results

PASSED

📦 SBOM Summary

  • Components: 1670

🔍 Vulnerability Scan

Severity Count
🔴 Critical 0
🟠 High 0
🟡 Medium 10
🟢 Low 4
Total 14

📎 Artifacts

  • SBOM (CycloneDX JSON) and Grype results available in workflow artifacts

Generated by Supply Chain Verification workflow • View Details

…load validation

- Enhanced Notifications component tests to include support for Discord, Gotify, and Webhook provider types.
- Updated test cases to validate the correct handling of provider type options and ensure proper payload structure during creation, preview, and testing.
- Introduced new tests for Gotify token handling and ensured sensitive information is not exposed in the UI.
- Refactored existing tests for clarity and maintainability, including improved assertions and error handling.
- Added comprehensive coverage for payload validation scenarios, including malformed requests and security checks against SSRF and oversized payloads.
renovate bot and others added 30 commits February 25, 2026 00:43
…n-major-updates

chore(deps): update non-major-updates (feature/beta-release)
- Added guidance for Docker socket group access in docker-compose files.
- Introduced docker-compose.override.example.yml for supplemental group configuration.
- Improved entrypoint diagnostics to include socket GID and group guidance.
- Updated README with instructions for setting up Docker socket access.
- Enhanced backend error handling to provide actionable messages for permission issues.
- Updated frontend components to display troubleshooting information regarding Docker socket access.
- Added tests to ensure proper error messages and guidance are rendered in UI.
- Revised code coverage settings to include Docker service files for better regression tracking.
…ontrol

- Added role-based middleware to various security handler tests to ensure only admin users can access certain endpoints.
- Created a new test file for authorization checks on security mutators, verifying that non-admin users receive forbidden responses.
- Updated existing tests to include role setting for admin users, ensuring consistent access control during testing.
- Introduced sensitive data masking in settings handler responses, ensuring sensitive values are not exposed in API responses.
- Enhanced user handler responses to mask API keys and invite tokens, providing additional security for user-related endpoints.
- Refactored routes to group security admin endpoints under a dedicated route with role-based access control.
- Added tests for import handler routes to verify authorization guards, ensuring only admin users can access import functionalities.
…ests with API key masking and authorization headers
…n-major-updates

chore(deps): update non-major-updates (feature/beta-release)
…n-dependencies

chore(deps): pin github/codeql-action action to 4558047 (feature/beta-release)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

feature New functionality frontend UI/UX code manual-testing monitoring Logging and statistics

Projects

Status: In Progress

Development

Successfully merging this pull request may close these issues.

2 participants