Commit Graph

12 Commits

Author SHA1 Message Date
rE-Bo0t.bx1
a28ce0a4e6 feat: add gen-auth tool and refactor compose templates
Major refactor of Docker Compose configurations and tooling enhancements.

-  Add `gen-auth` script for generating Tor Control Port credentials
- 🐳 Refactor Docker Compose templates:
  - Add native healthcheck configurations to all relay/bridge files
  - Standardize security capabilities (drop ALL, add SETUID/SETGID)
  - Remove verbose comments to streamline template usage
  - Update volume definitions for better data persistence
- 🔧 Update base dependencies:
  - Alpine Linux -> 3.23.0
  - Golang -> 1.25.5-alpine
- 🧹 Standardize ENV variable names across all configurations
2025-12-05 04:37:19 +08:00
dependabot[bot]
ba7d822420 build(deps): bump golang from 1.25-alpine to 1.25.5-alpine (#12)
Bumps golang from 1.25-alpine to 1.25.5-alpine.

---
updated-dependencies:
- dependency-name: golang
  dependency-version: 1.25.5-alpine
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2025-12-05 03:23:49 +08:00
rE-Bo0t.bx1
7f9f6c328d 🐋 fix(docker): enforce UID 100 for tor user to resolve permission conflicts
Recent Alpine base images introduce a 'klogd' user at UID 100, which forced
the 'tor' package to install as UID 101. This caused "Permission denied"
errors for existing data volumes owned by UID 100.

This fix:
- Removes the conflicting 'klogd' user
- Manually creates the 'tor' user with fixed UID 100 / GID 101
- Ensures compatibility with existing persistent volumes
2025-12-01 01:40:01 +08:00
renovate[bot]
84b32e1ce9 🏗️ build(deps): upgrade Golang Docker tag to v1.25
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
2025-11-21 03:07:17 +08:00
rE-Bo0t.bx1
83674c71fe 🏗️ build(deps): downgrade golang docker tag to v1.24 2025-11-21 02:51:40 +08:00
renovate[bot]
5a6406b1c2 build Update golang Docker tag to v1.25 (#9)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
2025-11-21 02:35:08 +08:00
rE-Bo0t.bx1
31faba35b1 🛡 fix(security): remove musl and openssl from Dockerfile to streamline dependencies 2025-11-20 23:58:23 +08:00
rE-Bo0t.bx1
51af5d0ecc 🛡 fix(security): add musl and openssl to Dockerfile for improved security and compatibility 2025-11-20 23:46:42 +08:00
rE-Bo0t.bx1
ed513c9852 🛡 fix(security): resolve critical CVEs via multi-stage build and OS upgrade
This commit addresses high-severity vulnerabilities detected by Docker Scout in both the Lyrebird binary and the Alpine base image.

Changes:
- Lyrebird: Implemented a multi-stage build using golang:1.24-alpine. This compiles Lyrebird from source to resolve "baked-in" Go runtime and dependency vulnerabilities (stdlib, crypto, pion) found in the upstream Alpine package.
- Base OS: Added apk upgrade --no-cache to force the installation of the latest system libraries, patching active CVEs in musl and openssl.

Resolves: CVE-2025-9230 (openssl), CVE-2025-26519 (musl), and multiple Go runtime CVEs.
2025-11-20 23:22:24 +08:00
rE-Bo0t.bx1
2af8ec9565 🛡 fix(security): resolve critical CVEs via multi-stage build and OS upgrade
This commit addresses high-severity vulnerabilities detected by Docker Scout in both the Lyrebird binary and the Alpine base image.

Changes:
- Lyrebird: Implemented a multi-stage build using golang:1.24-alpine. This compiles Lyrebird from source to resolve "baked-in" Go runtime and dependency vulnerabilities (stdlib, crypto, pion) found in the upstream Alpine package.
- Base OS: Added apk upgrade --no-cache to force the installation of the latest system libraries, patching active CVEs in musl and openssl.

Resolves: CVE-2025-9230 (openssl), CVE-2025-26519 (musl), and multiple Go runtime CVEs.
2025-11-20 23:16:35 +08:00
rE-Bo0t.bx1
de1fdaa2aa 🛡 fix(security): compile lyrebird from source to resolve Go runtime CVEs
- Implements multi-stage build in `Dockerfile` and `Dockerfile.edge` using `golang:1.24-alpine` to compile `lyrebird` from official source.
- Resolves high-severity vulnerabilities in `stdlib`, `crypto`, and `pion` by enforcing latest Go runtime and dependency updates (`go get -u`).
- Maintains minimal image footprint by discarding the build toolchain and copying only the stripped binary to the final Alpine image.
2025-11-20 21:26:06 +08:00
rE-Bo0t.bx1
a94d409f2b feat(v1.1.2): Alpine edge variant, dual CI, GHCR edge builds 🚀
- Add Dockerfile.edge 🐚🔧
- Add stable and edge CI matrix 🔁📦
- GHCR edge-only deployment 🟣📤
- SBOMs for both variants 📜🔍
- Tests, screenshots, logo 🧪🖼️
- Update docs and PR template 📝
- Remove dependabot.yml 🗑️
2025-11-17 22:38:30 +08:00