-
Notifications
You must be signed in to change notification settings - Fork 0
ci: add build workflow for monorepo #2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Changes from all commits
Commits
Show all changes
13 commits
Select commit
Hold shift + click to select a range
c30f699
ci: add build workflow for monorepo
davidcrowe 272c08f
chore: sync package-lock with workspace dependencies
davidcrowe 57ca498
chore(build): make validatabl-core a proper referenced project
davidcrowe a688436
chore(build): wire @gatewaystack/validatabl-core path for validatabl
davidcrowe 3be9af5
chore(build): stop recompiling validatabl-core from validatabl
davidcrowe 90b359c
chore(build): centralize path aliases in tsconfig.base
davidcrowe c1e135c
chore(build): resolve @gatewaystack/validatabl-core from dist in vali…
davidcrowe 5722886
chore(validatabl): add .js extensions for NodeNext moduleResolution
davidcrowe 9442070
chore(tsconfig): resolve @gatewaystack/* to src for internal builds
davidcrowe f7420e1
chore: fix validatabl-core TS resolution and CI debug
davidcrowe 8945fd7
Clean TS artifacts, switch to npm build, fix project refs, add SECURI…
davidcrowe 27c9e9e
Fix workspace protocol for request-context dependency
davidcrowe 8113d80
readme update
davidcrowe File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,34 @@ | ||
| name: Build | ||
|
|
||
| on: | ||
| push: | ||
| branches: [ main ] | ||
| pull_request: | ||
| branches: [ main ] | ||
|
|
||
| jobs: | ||
| build: | ||
| runs-on: ubuntu-latest | ||
|
|
||
| steps: | ||
| - name: Checkout repo | ||
| uses: actions/checkout@v4 | ||
|
|
||
| - name: Set up Node.js | ||
| uses: actions/setup-node@v4 | ||
| with: | ||
| node-version: 20 | ||
| cache: 'npm' | ||
|
|
||
| - name: Install dependencies | ||
| run: npm ci | ||
|
|
||
| - name: Show TS config for validatabl | ||
| run: npx tsc --showConfig -p packages/validatabl | ||
|
|
||
| - name: Trace module resolution for validatabl | ||
| run: npx tsc -p packages/validatabl --traceResolution | ||
|
|
||
| - name: Build TypeScript monorepo | ||
| run: npm run build | ||
|
|
||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,86 @@ | ||
| # Security Policy for GatewayStack | ||
|
|
||
| GatewayStack is an open-source **agentic control plane** for user-scoped AI governance. | ||
| We take security seriously and appreciate responsible disclosure of vulnerabilities. | ||
|
|
||
| --- | ||
|
|
||
| ## Supported Versions | ||
|
|
||
| GatewayStack is under active development. We currently provide security fixes for: | ||
|
|
||
| - The latest commit on the `main` branch | ||
| - The most recent tagged release | ||
|
|
||
| If you're using an older tag or a fork, please try to reproduce on `main` before reporting. | ||
|
|
||
| --- | ||
|
|
||
| ## Reporting a Vulnerability | ||
|
|
||
| If you believe you’ve found a security vulnerability in GatewayStack or any of the | ||
| `@gatewaystack/*` packages, please report it **privately**: | ||
|
|
||
| - **GitHub:** Use the **“Report a vulnerability”** link in the repository’s **Security** tab | ||
| (if available in your account) | ||
|
|
||
| Please include as much detail as possible: | ||
|
|
||
| - A clear **description** of the issue and potential impact | ||
| - **Steps to reproduce** (code, configuration, or requests) | ||
| - Any relevant **logs**, stack traces, or screenshots | ||
| - The **commit hash / version** you tested against | ||
| - Your environment (Node.js version, OS, package versions) | ||
|
|
||
| Please **do not** open a public GitHub issue for sensitive security reports. | ||
|
|
||
| --- | ||
|
|
||
| ## Coordinated Disclosure Policy | ||
|
|
||
| We follow a responsible / coordinated disclosure process: | ||
|
|
||
| 1. You report the vulnerability to us privately. | ||
| 2. We acknowledge your report within **5 business days**. | ||
| 3. We work with you to: | ||
| - Reproduce and assess impact | ||
| - Develop and test a fix | ||
| - Prepare an advisory and release | ||
| 4. We aim to release a fix and advisory within **30 days**, depending on severity and complexity. | ||
| 5. Once a fix is released, we’ll credit you (if you’d like) in the security advisory. | ||
|
|
||
| If you believe we have not responded in a reasonable timeframe, you may follow up on your | ||
| original report to request a status update. | ||
|
|
||
| --- | ||
|
|
||
| ## Scope & Expectations | ||
|
|
||
| You are welcome to: | ||
|
|
||
| - Test against your own local deployments of GatewayStack | ||
| - Review and analyze the source code | ||
| - Probe configuration and integration flows for security issues | ||
|
|
||
| Please **do not**: | ||
|
|
||
| - Access, modify, or destroy data that does not belong to you | ||
| - Perform Denial of Service (DoS) or stress tests against shared / production deployments | ||
| - Use automated scanning in a way that could degrade service for others | ||
|
|
||
| If you’re unsure whether something is in scope, you can email us first and ask. | ||
|
|
||
| --- | ||
|
|
||
| ## Bug Bounties | ||
|
|
||
| At this time we **do not run a formal bug bounty program** and cannot guarantee financial rewards. | ||
|
|
||
| We do, however, deeply appreciate security research contributions and are happy to provide: | ||
|
|
||
| - Acknowledgment in security advisories (with your consent) | ||
| - Public credit in the project’s documentation or release notes | ||
|
|
||
| --- | ||
|
|
||
| Thank you for helping keep Gatewaystack and its users safe. |
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Check warning
Code scanning / CodeQL
Workflow does not contain permissions Medium
Copilot Autofix
AI 4 days ago
To fix the problem, add a
permissionsblock to the workflow, either at the root (applies to all jobs) or to the individual job. Since there is only one job (build), the minimal effective change is to addpermissions: contents: readat the workflow root (after thename:oron:block), which limits the GITHUB_TOKEN permissions to only read contents. This is the least privilege required for standard build/check workflows, unless a job actually needs write access to contents, issues, or PRs (which is not apparent here). The change consists of adding the block:after the
name:and beforeon:or afteron:.