Skip to content

Release: 1 fix, 4 chores → Main#7679

Merged
h0lybyte merged 6 commits intomainfrom
dev
Mar 6, 2026
Merged

Release: 1 fix, 4 chores → Main#7679
h0lybyte merged 6 commits intomainfrom
dev

Conversation

@github-actions
Copy link
Contributor

@github-actions github-actions bot commented Mar 6, 2026

Release: Dev → Main

6 atomic commits ready for main

Bug Fixes

Chores

Other Changes


This PR is automatically maintained by CI

Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
h0lybyte added 2 commits March 6, 2026 17:39
Replace node:24-alpine with node:24-slim in Dockerfile STAGE A.
Alpine's musl libc mishandles V8's large heap reservations, causing
SIGINT (exit code 130) during static route generation even with 8GB
max-old-space-size. Debian's glibc handles MAP_NORESERVE correctly.
Only affects the build stage — final runtime image is unchanged.
@github-actions
Copy link
Contributor Author

github-actions bot commented Mar 6, 2026

Dependency Review

The following issues were found:
  • ✅ 0 vulnerable package(s)
  • ✅ 0 package(s) with incompatible licenses
  • ✅ 0 package(s) with invalid SPDX license definitions
  • ⚠️ 1 package(s) with unknown licenses.
See the Details below.

License Issues

Cargo.lock

PackageVersionLicenseIssue Type
toml1.0.5+spec-1.1.0NullUnknown License

OpenSSF Scorecard

PackageVersionScoreDetails
cargo/socket2 0.6.3 🟢 6.2
Details
CheckScoreReason
Code-Review🟢 10all changesets reviewed
Maintained🟢 1011 commit(s) and 6 issue activity found in the last 90 days -- score normalized to 10
Binary-Artifacts🟢 10no binaries found in the repo
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Packaging⚠️ -1packaging workflow not detected
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Fuzzing⚠️ 0project is not fuzzed
License🟢 10license file detected
Signed-Releases⚠️ -1no releases found
Security-Policy🟢 10security policy file detected
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
SAST⚠️ 0SAST tool is not run on all commits -- score normalized to 0
cargo/toml 1.0.5+spec-1.1.0 UnknownUnknown
cargo/uuid 1.22.0 🟢 6.8
Details
CheckScoreReason
Security-Policy🟢 10security policy file detected
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Maintained🟢 1024 commit(s) and 6 issue activity found in the last 90 days -- score normalized to 10
Code-Review🟢 4Found 5/12 approved changesets -- score normalized to 4
Binary-Artifacts🟢 10no binaries found in the repo
Packaging⚠️ -1packaging workflow not detected
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Pinned-Dependencies🟢 8dependency not pinned by hash detected -- score normalized to 8
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
License🟢 9license file detected
Fuzzing🟢 10project is fuzzed
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
SAST⚠️ 0SAST tool is not run on all commits -- score normalized to 0
cargo/wayland-backend 0.3.14 🟢 4.1
Details
CheckScoreReason
Code-Review🟢 3Found 4/13 approved changesets -- score normalized to 3
Packaging⚠️ -1packaging workflow not detected
Maintained🟢 1030 commit(s) and 5 issue activity found in the last 90 days -- score normalized to 10
Binary-Artifacts🟢 10no binaries found in the repo
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
Security-Policy⚠️ 0security policy file not detected
Fuzzing⚠️ 0project is not fuzzed
License🟢 10license file detected
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ 0branch protection not enabled on development/release branches
SAST⚠️ 0SAST tool is not run on all commits -- score normalized to 0
cargo/wayland-sys 0.31.10 🟢 4.1
Details
CheckScoreReason
Code-Review🟢 3Found 4/13 approved changesets -- score normalized to 3
Packaging⚠️ -1packaging workflow not detected
Maintained🟢 1030 commit(s) and 5 issue activity found in the last 90 days -- score normalized to 10
Binary-Artifacts🟢 10no binaries found in the repo
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
Security-Policy⚠️ 0security policy file not detected
Fuzzing⚠️ 0project is not fuzzed
License🟢 10license file detected
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ 0branch protection not enabled on development/release branches
SAST⚠️ 0SAST tool is not run on all commits -- score normalized to 0

Scanned Files

  • Cargo.lock

@github-actions github-actions bot changed the title Release: 1 chore → Main Release: 1 fix, 2 chores → Main Mar 6, 2026
h0lybyte added 2 commits March 6, 2026 17:44
* fix(cryptothrone): remove www.cryptothrone.com from ingress TLS

www.cryptothrone.com has no DNS record, causing cert-manager HTTP-01
self-check to fail with "no such host". This blocks certificate issuance
for the bare domain too, resulting in Cloudflare 526 (invalid origin cert).

* fix(kube): replace non-existent letsencrypt-prod issuer with letsencrypt-http

Three ingresses referenced letsencrypt-prod ClusterIssuer which does not
exist, causing cert-manager to fail certificate issuance. All three certs
show READY: False. Switching to letsencrypt-http which has the correct
DNS zone solvers for kbve.com, discord.sh, and all other domains.

Affected services:
- api.kbve.com + supabase.kbve.com (kilobase API via Kong)
- discord.sh
- notification.kbve.com
@github-actions github-actions bot changed the title Release: 1 fix, 2 chores → Main Release: 1 fix, 3 chores → Main Mar 6, 2026
@github-actions github-actions bot changed the title Release: 1 fix, 3 chores → Main Release: 1 fix, 4 chores → Main Mar 6, 2026
@h0lybyte h0lybyte merged commit 38cd6dd into main Mar 6, 2026
8 checks passed
@github-project-automation github-project-automation bot moved this from Review to Done in KBVE Mar 6, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

Status: Done

Development

Successfully merging this pull request may close these issues.

1 participant