Skip to content

Codex-generated pull request#3

Open
ctsunny wants to merge 1 commit intomainfrom
codex/locate-issue-preventing-button-clicks
Open

Codex-generated pull request#3
ctsunny wants to merge 1 commit intomainfrom
codex/locate-issue-preventing-button-clicks

Conversation

@ctsunny
Copy link
Owner

@ctsunny ctsunny commented Mar 17, 2026

Codex generated this pull request, but encountered an unexpected error after generation. This is a placeholder PR message.


Codex Task

Copy link

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

Reviewed commit: b21c8978ca

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

Comment on lines +1565 to +1567
q.Set("gen_cmd", cmd)
}
http.Redirect(w, r, panelPath+"?"+q.Encode(), http.StatusFound)

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P1 Badge Stop exposing init token in redirect query params

In handleGenInstallCmd, the generated shell command (which includes --init-token) is placed into gen_cmd and then sent via 302 query string back to the admin page. That makes the token appear in browser history and typical access logs/proxy logs, so a credential that can authorize new client registration is leaked beyond the page itself. Render this value without putting it in the URL (for example, server-side flash state or direct template render after POST).

Useful? React with 👍 / 👎.

Comment on lines +1555 to +1556
panelURL := fmt.Sprintf("%s://%s", requestScheme(r), r.Host)
cmd := "curl --proto '=https' --tlsv1.2 -fsSL " +

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P2 Badge Generate install URL from canonical external address

The install command now builds --server-url from requestScheme(r) and r.Host, which can be an internal HTTP upstream address when the panel is behind a reverse proxy that does TLS termination or host rewriting without forwarding headers. In that deployment pattern, generated commands point clients to an unreachable/wrong endpoint, whereas the previous browser-side generation used the externally visible URL. Use a canonical configured public URL (or robust forwarded-header parsing) for command generation.

Useful? React with 👍 / 👎.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant