-
Notifications
You must be signed in to change notification settings - Fork 3
Comparing changes
Open a pull request
base repository: loonghao/webhook_bridge
base: v0.6.0
head repository: loonghao/webhook_bridge
compare: v2.0.0
- 11 commits
- 108 files changed
- 2 contributors
Commits on May 31, 2025
-
feat!: release v1.0.0 with hybrid Go/Python architecture
BREAKING CHANGE: Complete rewrite with Go HTTP server and Python CLI tool Major Changes: - Remove old Python webhook_bridge package and FastAPI server - Add Go HTTP server with Gin framework for high performance - Create Python CLI tool for binary management and easy installation - Add modern dashboard with Tailwind CSS and shadcn/ui design - Support cross-platform binary distribution (Linux, Windows, macOS) - Implement comprehensive CI/CD pipelines with Go and Python testing - Add gRPC communication between Go server and Python executor - Simplify deployment with single binary distribution - Improve performance with concurrent worker pool - Add modern web interface with real-time updates New Features: - uvx webhook-bridge install/run commands for easy usage - Cross-platform binary auto-download and management - Modern responsive web dashboard - RESTful API with comprehensive documentation - Configuration management with YAML support - Comprehensive logging and monitoring - Docker support with multi-stage builds - Security scanning and code quality checks Architecture: - Go HTTP server (cmd/server) - High-performance request handling - Python executor (python_executor) - Flexible plugin execution - Python CLI tool (webhook_bridge) - Binary management and installation - Modern web dashboard (web/) - User interface and monitoring - gRPC communication - Efficient inter-service communication This is a major version release with breaking changes. Users should migrate from v0.x using the new installation method.
Configuration menu - View commit details
-
Copy full SHA for 3f0097d - Browse repository at this point
Copy the full SHA 3f0097dView commit details -
feat: optimize CI for Go-first architecture and clean up project
- Update .gitignore to ignore protobuf generated files and build artifacts - Rename go-ci.yml to main-ci.yml as primary CI pipeline - Integrate Python testing as auxiliary job in main CI - Optimize codecov.yml with Go-first configuration (80% target for Go, 70% for Python) - Simplify mr-test.yml to only run on Python file changes - Remove redundant CI workflows (codecov.yml, travis.yml) - Clean up temporary files, build artifacts, and outdated configs - Remove protobuf generated files from version control (now CI-generated) This establishes Go as the primary language with Python as secondary support, streamlines CI workflows, and improves codecov integration for both languages. Signed-off-by: longhao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for bb181f1 - Browse repository at this point
Copy the full SHA bb181f1View commit details -
fix: modernize golangci-lint configuration for CI compatibility
- Update to golangci-lint v1.64+ compatible format - Remove deprecated configuration options (skip-dirs, skip-files) - Fix linter name (goerr113 -> err113) - Add comprehensive exclude rules for CI stability - Balance code quality with practical development needs - Reduce noise from non-critical issues (formatting, unused functions) - Focus on essential linters: errcheck, gosimple, govet, staticcheck - Exclude security warnings for development tools and config files Signed-off-by: longhao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for ba5e161 - Browse repository at this point
Copy the full SHA ba5e161View commit details -
fix: optimize Python lint configuration for CI compatibility
- Update pyproject.toml ruff configuration with comprehensive ignore rules - Add CI-friendly exclusions for type annotations, security warnings, complexity - Fix import sorting with isort for all Python files - Update pre-commit configuration to use python3 instead of python3.10 - Disable pre-commit in nox lint-fix due to Windows compatibility issues - Balance code quality standards with practical development needs Python lint now passes with 'uvx nox -s lint' and 'uvx nox -s lint-fix' Signed-off-by: longhao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for f1c85a0 - Browse repository at this point
Copy the full SHA f1c85a0View commit details -
fix: replace deprecated gosec GitHub Action with direct installation
- Replace securecodewarrior/github-action-gosec@v2 with direct gosec installation - Use 'go install github.com/securecodewarrior/gosec/v2/cmd/gosec@latest' - Add 'if: always()' to SARIF upload to ensure results are uploaded even on failure - This fixes the 'Missing download info' error in CI security scan Signed-off-by: longhao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 90fae7c - Browse repository at this point
Copy the full SHA 90fae7cView commit details -
fix: resolve CI PowerShell compatibility issues
- Add shell: bash directive to build steps using bash syntax - Fix gosec repository URL from securecodewarrior to securego - Add proper permissions for security scanning - Exclude G204 warnings for legitimate subprocess usage - Update Python auxiliary tests to use uv toolchain Signed-off-by: longhao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for da6a4ae - Browse repository at this point
Copy the full SHA da6a4aeView commit details -
fix: resolve port range conflicts in CI environment
- Update port test ranges from 50000-50010 to 60000-60010 to avoid CI conflicts - Update fallback port tests to use 60030+ range - Fix TestGetFreePortInRange_NoFreePort to use 60020-60022 range - All port tests now pass in CI environment Signed-off-by: longhao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 34170a5 - Browse repository at this point
Copy the full SHA 34170a5View commit details -
fix: resolve security vulnerabilities identified by gosec
- Add ReadHeaderTimeout to all HTTP servers to prevent Slowloris attacks - Change directory permissions from 0755 to 0750 for better security - Change file permissions from 0644 to 0600 for sensitive config files - Add proper error handling for exec.Command operations - Improve security posture across all HTTP server configurations Security improvements: - HTTP servers now have proper timeouts configured - Directory and file permissions follow security best practices - Better error handling prevents potential security issues Signed-off-by: longhao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for dd08a7b - Browse repository at this point
Copy the full SHA dd08a7bView commit details -
fix: add path validation to prevent directory traversal attacks (G304)
- Add validateConfigPath() function to validate config file paths - Add validateFilePath() function to validate file copy operations - Prevent directory traversal attacks with .. path components - Restrict file operations to safe directories (working dir, user config, temp) - Only allow .yaml/.yml extensions for config files - Maintain test compatibility with temp directory access Security improvements: - G304 file inclusion vulnerabilities now have proper path validation - Directory traversal attacks are prevented - File operations are restricted to safe locations - Config files are validated for safe extensions Signed-off-by: longhao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 55cd7f7 - Browse repository at this point
Copy the full SHA 55cd7f7View commit details -
fix: resolve golangci-lint errcheck issues
- Add proper error handling for filepath.Abs() calls - Fix errcheck warnings in validateConfigPath() function - Fix errcheck warnings in validateFilePath() function - Improve error messages for path validation failures This resolves the golangci-lint errcheck issues: - internal/config/config.go:213:9: Error return value of filepath.Abs is not checked - internal/config/config.go:220:17: Error return value of filepath.Abs is not checked - internal/config/config.go:228:15: Error return value of filepath.Abs is not checked Signed-off-by: longhao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 0a1df23 - Browse repository at this point
Copy the full SHA 0a1df23View commit details -
Configuration menu - View commit details
-
Copy full SHA for 3c294ed - Browse repository at this point
Copy the full SHA 3c294edView commit details
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff v0.6.0...v2.0.0