From 2c8eb6955548c64f1f2e7fe7f861a2092b9d6e10 Mon Sep 17 00:00:00 2001 From: Viachaslau Date: Fri, 20 Feb 2026 19:35:45 +0400 Subject: [PATCH 1/5] chore: initialize workflow skip-checks:true --- .brightsec/.gitkeep | 0 1 file changed, 0 insertions(+), 0 deletions(-) create mode 100644 .brightsec/.gitkeep diff --git a/.brightsec/.gitkeep b/.brightsec/.gitkeep new file mode 100644 index 0000000..e69de29 From 722af4d76132429d58e5ddce6154d436c993e987 Mon Sep 17 00:00:00 2001 From: Viachaslau Date: Fri, 20 Feb 2026 19:37:35 +0400 Subject: [PATCH 2/5] ci: temporarily disable workflows while addressing security issues skip-checks:true --- .github/workflows/ci.yml | 124 --------------------------------------- 1 file changed, 124 deletions(-) delete mode 100644 .github/workflows/ci.yml diff --git a/.github/workflows/ci.yml b/.github/workflows/ci.yml deleted file mode 100644 index 4e2a120..0000000 --- a/.github/workflows/ci.yml +++ /dev/null @@ -1,124 +0,0 @@ -name: ci - -on: - push: - branches: - - main - pull_request: - -jobs: - test: - runs-on: ubuntu-latest - container: - image: buildpack-deps:buster - defaults: - run: - shell: bash - services: - postgres: - image: postgres:9.6 - env: - POSTGRES_USER: postgres - POSTGRES_PASSWORD: postgres - POSTGRES_DB: blog_development - ports: - - 5432:5432 - options: >- - --name postgres - --health-cmd "pg_isready -U postgres" - --health-interval 5s - --health-timeout 5s - --health-retries 10 - env: - PGHOST: postgres - PGPORT: 5432 - PGUSER: postgres - PGPASSWORD: postgres - PGDATABASE: blog_development - DATABASE_URL: postgres://postgres:postgres@postgres:5432/blog_development - steps: - - uses: actions/checkout@v4 - - - name: Point apt to Debian archive - run: | - sed -i 's|deb.debian.org/debian|archive.debian.org/debian|g' /etc/apt/sources.list - sed -i 's|security.debian.org/debian-security|archive.debian.org/debian-security|g' /etc/apt/sources.list - sed -i '/buster-updates/d' /etc/apt/sources.list - - - name: Install system deps - run: | - apt-get -o Acquire::Check-Valid-Until=false -o Acquire::AllowInsecureRepositories=true update - apt-get -o Acquire::Check-Valid-Until=false -o Acquire::AllowInsecureRepositories=true install -y --no-install-recommends \ - build-essential \ - libffi-dev \ - libgdbm-dev \ - libpq-dev \ - libreadline-dev \ - libssl-dev \ - libxml2-dev \ - libxslt1-dev \ - postgresql-client \ - nodejs \ - libyaml-dev \ - zlib1g-dev - - - name: Install Ruby 2.3.3 - env: - RUBY_PREFIX: /opt/ruby-2.3.3 - run: | - git clone --depth=1 https://github.com/rbenv/ruby-build.git /tmp/ruby-build - /tmp/ruby-build/install.sh - ruby-build 2.3.3 "$RUBY_PREFIX" - echo "$RUBY_PREFIX/bin" >> "$GITHUB_PATH" - - - name: Install bundler - run: gem install bundler -v 1.10.6 - - - name: Configure bundler for nokogiri - run: bundle config build.nokogiri --use-system-libraries - - - name: Install gems - run: bundle install - - - name: Wait for postgres - run: | - for i in $(seq 1 30); do - pg_isready -h "$PGHOST" -p "$PGPORT" -d "$PGDATABASE" && break - sleep 2 - done - bundle exec ruby -e "require 'pg'; PG.connect(host: ENV['PGHOST'], port: ENV['PGPORT'].to_i, dbname: ENV['PGDATABASE'], user: ENV['PGUSER'], password: ENV['PGPASSWORD']);" - - - name: Setup database - run: bundle exec rake db:create db:migrate db:seed - - - name: Start server - run: | - bundle exec rails server -b 0.0.0.0 -p 3000 >rails.log 2>&1 & - - - name: Wait for server readiness - run: | - READY=0 - for i in $(seq 1 30); do - echo "Attempt ${i}/30: checking http://localhost:3000" - if curl -sSfL http://localhost:3000 >/dev/null; then - echo "Server responded successfully on attempt ${i}." - READY=1 - break - fi - echo "Server still starting up, waiting 2s before retry." - sleep 2 - done - if [ "$READY" -ne 1 ]; then - echo "Server failed to start" - tail -n 200 rails.log || true - exit 1 - fi - echo "Server is ready; last 200 lines of rails.log:" - tail -n 200 rails.log || true - - - name: Check homepage - run: | - if ! curl -sSfL http://localhost:3000 | grep -F "Home"; then - echo "Homepage check failed" - exit 1 - fi From 4485114266061dd0b3d0ffe2a219fc94068065d2 Mon Sep 17 00:00:00 2001 From: Viachaslau Date: Fri, 20 Feb 2026 19:37:45 +0400 Subject: [PATCH 3/5] test: add auto-generated e2e security tests skip-checks:true --- .brightsec/tests/get-posts-search.test.ts | 40 +++++++++++++++++++++++ 1 file changed, 40 insertions(+) create mode 100644 .brightsec/tests/get-posts-search.test.ts diff --git a/.brightsec/tests/get-posts-search.test.ts b/.brightsec/tests/get-posts-search.test.ts new file mode 100644 index 0000000..517dd4f --- /dev/null +++ b/.brightsec/tests/get-posts-search.test.ts @@ -0,0 +1,40 @@ +import { test, before, after } from 'node:test'; +import { SecRunner } from '@sectester/runner'; +import { AttackParamLocation, HttpMethod } from '@sectester/scan'; + +const timeout = 40 * 60 * 1000; +const baseUrl = process.env.BRIGHT_TARGET_URL!; + +let runner!: SecRunner; + +before(async () => { + runner = new SecRunner({ + hostname: process.env.BRIGHT_HOSTNAME!, + projectId: process.env.BRIGHT_PROJECT_ID! + }); + + await runner.init(); +}); + +after(() => runner.clear()); + +test('GET /posts/search', { signal: AbortSignal.timeout(timeout) }, async () => { + await runner + .createScan({ + tests: ['sqli', 'xss', 'csrf', 'business_constraint_bypass'], + attackParamLocations: [AttackParamLocation.QUERY], + starMetadata: { + code_source: 'NeuraLegion/ruby-example-app:master', + databases: ['PostgreSQL'], + user_roles: ['admin'] + }, + poolSize: +process.env.SECTESTER_SCAN_POOL_SIZE || undefined + }) + .setFailFast(false) + .timeout(timeout) + .run({ + method: HttpMethod.GET, + url: `${baseUrl}/posts/search?search_term=example`, + auth: process.env.BRIGHT_AUTH_ID + }); +}); \ No newline at end of file From 176cce0a1dfe3f7543950348818198f42216d30e Mon Sep 17 00:00:00 2001 From: Viachaslau Date: Fri, 20 Feb 2026 19:37:58 +0400 Subject: [PATCH 4/5] ci: add CI workflow to run e2e security tests --- .github/workflows/bright.yml | 131 ++++++++++++++++++ .../configure-bright-credentials/action.yaml | 53 +++++++ 2 files changed, 184 insertions(+) create mode 100644 .github/workflows/bright.yml create mode 100644 .github/workflows/composite/configure-bright-credentials/action.yaml diff --git a/.github/workflows/bright.yml b/.github/workflows/bright.yml new file mode 100644 index 0000000..2c317bc --- /dev/null +++ b/.github/workflows/bright.yml @@ -0,0 +1,131 @@ +name: Bright + +on: + pull_request: + branches: + - '**' + +permissions: + checks: write + contents: read + id-token: write + +jobs: + test: + runs-on: ubuntu-latest + container: + image: buildpack-deps:buster + defaults: + run: + shell: bash + services: + postgres: + image: postgres:9.6 + env: + POSTGRES_USER: postgres + POSTGRES_PASSWORD: postgres + POSTGRES_DB: blog_development + ports: + - 5432:5432 + options: >- + --name postgres + --health-cmd "pg_isready -U postgres" + --health-interval 5s + --health-timeout 5s + --health-retries 10 + env: + PGHOST: postgres + PGPORT: 5432 + PGUSER: postgres + PGPASSWORD: postgres + PGDATABASE: blog_development + DATABASE_URL: postgres://postgres:postgres@postgres:5432/blog_development + steps: + - uses: actions/checkout@v4 + + - name: Point apt to Debian archive + run: | + sed -i 's|deb.debian.org/debian|archive.debian.org/debian|g' /etc/apt/sources.list + sed -i 's|security.debian.org/debian-security|archive.debian.org/debian-security|g' /etc/apt/sources.list + sed -i '/buster-updates/d' /etc/apt/sources.list + + - name: Install system deps + run: | + apt-get -o Acquire::Check-Valid-Until=false -o Acquire::AllowInsecureRepositories=true update + apt-get -o Acquire::Check-Valid-Until=false -o Acquire::AllowInsecureRepositories=true install -y --no-install-recommends \ + build-essential \ + libffi-dev \ + libgdbm-dev \ + libpq-dev \ + libreadline-dev \ + libssl-dev \ + libxml2-dev \ + libxslt1-dev \ + postgresql-client \ + nodejs \ + libyaml-dev \ + zlib1g-dev + + - name: Install Ruby 2.3.3 + env: + RUBY_PREFIX: /opt/ruby-2.3.3 + run: | + git clone --depth=1 https://github.com/rbenv/ruby-build.git /tmp/ruby-build + /tmp/ruby-build/install.sh + ruby-build 2.3.3 "$RUBY_PREFIX" + echo "$RUBY_PREFIX/bin" >> "$GITHUB_PATH" + + - name: Install bundler + run: gem install bundler -v 1.10.6 + + - name: Configure bundler for nokogiri + run: bundle config build.nokogiri --use-system-libraries + + - name: Install gems + run: bundle install + + - name: Setup database + run: bundle exec rake db:create db:migrate db:seed + + - name: Start server + env: + DATABASE_URL: postgres://postgres:postgres@postgres:5432/blog_development + PGDATABASE: blog_development + PGHOST: postgres + PGPASSWORD: postgres + PGPORT: 5432 + PGUSER: postgres + run: | + bundle exec rails server -b 0.0.0.0 -p 3000 >rails.log 2>&1 & + + - name: Wait for server readiness + run: | + i=1; while [ "$i" -le 30 ]; do curl -sS -o /dev/null http://127.0.0.1:3000 && exit 0; sleep 5; i=$((i + 1)); done; exit 1 + + - name: Setup Node.js + uses: actions/setup-node@v4 + with: + node-version: 22.x + + - name: Install SecTesterJS dependencies + run: | + npm i --save=false --prefix .brightsec @sectester/core@0.49.0 @sectester/repeater@0.49.0 @sectester/scan@0.49.0 @sectester/runner@0.49.0 @sectester/reporter@0.49.0 + + - name: Authenticate with Bright + uses: ./.github/workflows/composite/configure-bright-credentials + with: + BRIGHT_HOSTNAME: development.playground.brightsec.com + BRIGHT_PROJECT_ID: 5naKKxNc3e4Akp1GuEdmiK + BRIGHT_TOKEN: ${{ secrets.BRIGHT_TOKEN }} + + - name: Run security tests + env: + BRIGHT_HOSTNAME: development.playground.brightsec.com + BRIGHT_PROJECT_ID: 5naKKxNc3e4Akp1GuEdmiK + BRIGHT_AUTH_ID: m8XBzLrw8pWSjHQDhKQgCr + GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} + BRIGHT_TOKEN: ${{ env.BRIGHT_TOKEN }} + BRIGHT_TARGET_URL: http://127.0.0.1:3000 + SECTESTER_SCAN_POOL_SIZE: ${{ vars.SECTESTER_SCAN_POOL_SIZE }} + run: | + node --experimental-transform-types --experimental-strip-types --experimental-detect-module --disable-warning=MODULE_TYPELESS_PACKAGE_JSON --disable-warning=ExperimentalWarning --test-force-exit --test-concurrency=4 --test .brightsec/tests/*.test.ts \ No newline at end of file diff --git a/.github/workflows/composite/configure-bright-credentials/action.yaml b/.github/workflows/composite/configure-bright-credentials/action.yaml new file mode 100644 index 0000000..8498384 --- /dev/null +++ b/.github/workflows/composite/configure-bright-credentials/action.yaml @@ -0,0 +1,53 @@ +name: 'Configure BrightSec credentials' + +inputs: + BRIGHT_HOSTNAME: + description: 'Hostname for the BrightSec environment' + required: true + BRIGHT_PROJECT_ID: + description: 'Project ID for BrightSec' + required: true + BRIGHT_TOKEN: + description: 'Pre-configured token' + required: false + +runs: + using: 'composite' + steps: + - id: configure_env_from_input + name: 'Set existing token in env' + shell: bash + if: ${{ inputs.BRIGHT_TOKEN != '' }} + env: + BRIGHT_TOKEN: ${{ inputs.BRIGHT_TOKEN }} + run: | + echo "BRIGHT_TOKEN=${BRIGHT_TOKEN}" >> $GITHUB_ENV + + - id: configure_bright_credentials_through_oidc + name: 'Exchange OIDC credentials for Bright token' + shell: bash + if: ${{ inputs.BRIGHT_TOKEN == '' }} + env: + BRIGHT_HOSTNAME: ${{ inputs.BRIGHT_HOSTNAME }} + BRIGHT_PROJECT_ID: ${{ inputs.BRIGHT_PROJECT_ID }} + run: | + # Retrieve OIDC token from GitHub + OIDC_TOKEN=$(curl -sS -H "Authorization: Bearer $ACTIONS_ID_TOKEN_REQUEST_TOKEN" \ + "${ACTIONS_ID_TOKEN_REQUEST_URL}" | jq -r '.value') + + # Post the token to BrightSec + RESPONSE=$(curl -s -X POST "https://${BRIGHT_HOSTNAME}/api/v1/projects/${BRIGHT_PROJECT_ID}/api-keys/oidc" \ + -H "Content-Type: application/json" \ + -d "{\"token\": \"${OIDC_TOKEN}\"}") + + if ! echo "$RESPONSE" | jq -e . > /dev/null 2>&1; then + echo "Error: $RESPONSE" 1>&2 + exit 1 + fi + + # Extract the pureKey + PURE_KEY=$(echo "$RESPONSE" | jq -r '.pureKey') + + # Mask and store in environment + echo "::add-mask::$PURE_KEY" + echo "BRIGHT_TOKEN=$PURE_KEY" >> $GITHUB_ENV From f9729939adfa2110b3d128fb4b81c6c7fbd10436 Mon Sep 17 00:00:00 2001 From: Viachaslau Date: Fri, 20 Feb 2026 19:47:25 +0400 Subject: [PATCH 5/5] revert: restore original workflow files and remove temporary one --- .brightsec/tests/get-posts-search.test.ts | 40 ---------- .github/workflows/{bright.yml => ci.yml} | 79 +++++++++---------- .../configure-bright-credentials/action.yaml | 53 ------------- 3 files changed, 36 insertions(+), 136 deletions(-) delete mode 100644 .brightsec/tests/get-posts-search.test.ts rename .github/workflows/{bright.yml => ci.yml} (59%) delete mode 100644 .github/workflows/composite/configure-bright-credentials/action.yaml diff --git a/.brightsec/tests/get-posts-search.test.ts b/.brightsec/tests/get-posts-search.test.ts deleted file mode 100644 index 517dd4f..0000000 --- a/.brightsec/tests/get-posts-search.test.ts +++ /dev/null @@ -1,40 +0,0 @@ -import { test, before, after } from 'node:test'; -import { SecRunner } from '@sectester/runner'; -import { AttackParamLocation, HttpMethod } from '@sectester/scan'; - -const timeout = 40 * 60 * 1000; -const baseUrl = process.env.BRIGHT_TARGET_URL!; - -let runner!: SecRunner; - -before(async () => { - runner = new SecRunner({ - hostname: process.env.BRIGHT_HOSTNAME!, - projectId: process.env.BRIGHT_PROJECT_ID! - }); - - await runner.init(); -}); - -after(() => runner.clear()); - -test('GET /posts/search', { signal: AbortSignal.timeout(timeout) }, async () => { - await runner - .createScan({ - tests: ['sqli', 'xss', 'csrf', 'business_constraint_bypass'], - attackParamLocations: [AttackParamLocation.QUERY], - starMetadata: { - code_source: 'NeuraLegion/ruby-example-app:master', - databases: ['PostgreSQL'], - user_roles: ['admin'] - }, - poolSize: +process.env.SECTESTER_SCAN_POOL_SIZE || undefined - }) - .setFailFast(false) - .timeout(timeout) - .run({ - method: HttpMethod.GET, - url: `${baseUrl}/posts/search?search_term=example`, - auth: process.env.BRIGHT_AUTH_ID - }); -}); \ No newline at end of file diff --git a/.github/workflows/bright.yml b/.github/workflows/ci.yml similarity index 59% rename from .github/workflows/bright.yml rename to .github/workflows/ci.yml index 2c317bc..4e2a120 100644 --- a/.github/workflows/bright.yml +++ b/.github/workflows/ci.yml @@ -1,14 +1,10 @@ -name: Bright +name: ci on: - pull_request: + push: branches: - - '**' - -permissions: - checks: write - contents: read - id-token: write + - main + pull_request: jobs: test: @@ -84,48 +80,45 @@ jobs: - name: Install gems run: bundle install + - name: Wait for postgres + run: | + for i in $(seq 1 30); do + pg_isready -h "$PGHOST" -p "$PGPORT" -d "$PGDATABASE" && break + sleep 2 + done + bundle exec ruby -e "require 'pg'; PG.connect(host: ENV['PGHOST'], port: ENV['PGPORT'].to_i, dbname: ENV['PGDATABASE'], user: ENV['PGUSER'], password: ENV['PGPASSWORD']);" + - name: Setup database run: bundle exec rake db:create db:migrate db:seed - name: Start server - env: - DATABASE_URL: postgres://postgres:postgres@postgres:5432/blog_development - PGDATABASE: blog_development - PGHOST: postgres - PGPASSWORD: postgres - PGPORT: 5432 - PGUSER: postgres run: | bundle exec rails server -b 0.0.0.0 -p 3000 >rails.log 2>&1 & - name: Wait for server readiness run: | - i=1; while [ "$i" -le 30 ]; do curl -sS -o /dev/null http://127.0.0.1:3000 && exit 0; sleep 5; i=$((i + 1)); done; exit 1 - - - name: Setup Node.js - uses: actions/setup-node@v4 - with: - node-version: 22.x - - - name: Install SecTesterJS dependencies - run: | - npm i --save=false --prefix .brightsec @sectester/core@0.49.0 @sectester/repeater@0.49.0 @sectester/scan@0.49.0 @sectester/runner@0.49.0 @sectester/reporter@0.49.0 - - - name: Authenticate with Bright - uses: ./.github/workflows/composite/configure-bright-credentials - with: - BRIGHT_HOSTNAME: development.playground.brightsec.com - BRIGHT_PROJECT_ID: 5naKKxNc3e4Akp1GuEdmiK - BRIGHT_TOKEN: ${{ secrets.BRIGHT_TOKEN }} - - - name: Run security tests - env: - BRIGHT_HOSTNAME: development.playground.brightsec.com - BRIGHT_PROJECT_ID: 5naKKxNc3e4Akp1GuEdmiK - BRIGHT_AUTH_ID: m8XBzLrw8pWSjHQDhKQgCr - GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} - BRIGHT_TOKEN: ${{ env.BRIGHT_TOKEN }} - BRIGHT_TARGET_URL: http://127.0.0.1:3000 - SECTESTER_SCAN_POOL_SIZE: ${{ vars.SECTESTER_SCAN_POOL_SIZE }} + READY=0 + for i in $(seq 1 30); do + echo "Attempt ${i}/30: checking http://localhost:3000" + if curl -sSfL http://localhost:3000 >/dev/null; then + echo "Server responded successfully on attempt ${i}." + READY=1 + break + fi + echo "Server still starting up, waiting 2s before retry." + sleep 2 + done + if [ "$READY" -ne 1 ]; then + echo "Server failed to start" + tail -n 200 rails.log || true + exit 1 + fi + echo "Server is ready; last 200 lines of rails.log:" + tail -n 200 rails.log || true + + - name: Check homepage run: | - node --experimental-transform-types --experimental-strip-types --experimental-detect-module --disable-warning=MODULE_TYPELESS_PACKAGE_JSON --disable-warning=ExperimentalWarning --test-force-exit --test-concurrency=4 --test .brightsec/tests/*.test.ts \ No newline at end of file + if ! curl -sSfL http://localhost:3000 | grep -F "Home"; then + echo "Homepage check failed" + exit 1 + fi diff --git a/.github/workflows/composite/configure-bright-credentials/action.yaml b/.github/workflows/composite/configure-bright-credentials/action.yaml deleted file mode 100644 index 8498384..0000000 --- a/.github/workflows/composite/configure-bright-credentials/action.yaml +++ /dev/null @@ -1,53 +0,0 @@ -name: 'Configure BrightSec credentials' - -inputs: - BRIGHT_HOSTNAME: - description: 'Hostname for the BrightSec environment' - required: true - BRIGHT_PROJECT_ID: - description: 'Project ID for BrightSec' - required: true - BRIGHT_TOKEN: - description: 'Pre-configured token' - required: false - -runs: - using: 'composite' - steps: - - id: configure_env_from_input - name: 'Set existing token in env' - shell: bash - if: ${{ inputs.BRIGHT_TOKEN != '' }} - env: - BRIGHT_TOKEN: ${{ inputs.BRIGHT_TOKEN }} - run: | - echo "BRIGHT_TOKEN=${BRIGHT_TOKEN}" >> $GITHUB_ENV - - - id: configure_bright_credentials_through_oidc - name: 'Exchange OIDC credentials for Bright token' - shell: bash - if: ${{ inputs.BRIGHT_TOKEN == '' }} - env: - BRIGHT_HOSTNAME: ${{ inputs.BRIGHT_HOSTNAME }} - BRIGHT_PROJECT_ID: ${{ inputs.BRIGHT_PROJECT_ID }} - run: | - # Retrieve OIDC token from GitHub - OIDC_TOKEN=$(curl -sS -H "Authorization: Bearer $ACTIONS_ID_TOKEN_REQUEST_TOKEN" \ - "${ACTIONS_ID_TOKEN_REQUEST_URL}" | jq -r '.value') - - # Post the token to BrightSec - RESPONSE=$(curl -s -X POST "https://${BRIGHT_HOSTNAME}/api/v1/projects/${BRIGHT_PROJECT_ID}/api-keys/oidc" \ - -H "Content-Type: application/json" \ - -d "{\"token\": \"${OIDC_TOKEN}\"}") - - if ! echo "$RESPONSE" | jq -e . > /dev/null 2>&1; then - echo "Error: $RESPONSE" 1>&2 - exit 1 - fi - - # Extract the pureKey - PURE_KEY=$(echo "$RESPONSE" | jq -r '.pureKey') - - # Mask and store in environment - echo "::add-mask::$PURE_KEY" - echo "BRIGHT_TOKEN=$PURE_KEY" >> $GITHUB_ENV