7 Commits

Author SHA1 Message Date
Sharang Parnerkar
78b215bb77 ci: retrigger after transient clippy failure
Some checks failed
CI / Clippy (push) Successful in 2m54s
CI / Format (push) Successful in 4s
CI / Security Audit (push) Successful in 1m45s
CI / Tests (push) Successful in 4m11s
CI / Deploy (push) Successful in 1m28s
CI / E2E Tests (push) Failing after 1s
2026-04-08 16:20:43 +02:00
Sharang Parnerkar
58428892a8 ci: log orca webhook response so the step isnt silent on success
Some checks failed
CI / Format (push) Successful in 5s
CI / Clippy (push) Failing after 2s
CI / Security Audit (push) Successful in 1m52s
CI / Tests (push) Has been skipped
CI / Deploy (push) Has been skipped
CI / E2E Tests (push) Has been skipped
2026-04-08 15:09:01 +02:00
Sharang Parnerkar
24b604ce51 ci: install openssl for orca webhook HMAC signing
Some checks failed
CI / Clippy (push) Successful in 2m59s
CI / Security Audit (push) Successful in 1m54s
CI / Tests (push) Successful in 4m16s
CI / Deploy (push) Successful in 1m25s
CI / E2E Tests (push) Failing after 1s
CI / Format (push) Successful in 5s
2026-04-08 14:56:12 +02:00
Sharang Parnerkar
a02827a34b ci: smoke test full deploy cycle (build → push → orca redeploy)
Some checks failed
CI / Format (push) Successful in 4s
CI / Clippy (push) Successful in 3m4s
CI / Security Audit (push) Successful in 1m43s
CI / Tests (push) Successful in 3m59s
CI / Deploy (push) Failing after 1m19s
CI / E2E Tests (push) Has been skipped
2026-04-08 12:58:53 +02:00
Sharang Parnerkar
5b431f65dc chore(deps): cargo update to fix audit vulnerabilities
Some checks failed
CI / Format (push) Successful in 4s
CI / Clippy (push) Successful in 2m46s
CI / Security Audit (push) Successful in 1m44s
CI / Deploy (push) Successful in 13m45s
CI / E2E Tests (push) Failing after 15s
CI / Tests (push) Successful in 3m53s
Bumps transitive deps (aws-lc-sys, quinn-proto, rustls-webpki, etc.)
to versions without RUSTSEC advisories. Two unmaintained-warning
deps remain (fxhash via scraper, instant via async-stripe) but
those are non-blocking warnings only.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-08 10:05:36 +02:00
Sharang Parnerkar
b5ee887387 ci: replace coolify webhook with orca deploy
Some checks failed
CI / Security Audit (push) Failing after 1m43s
CI / Tests (push) Has been skipped
CI / Deploy (push) Has been skipped
CI / E2E Tests (push) Has been skipped
CI / Format (push) Successful in 22s
CI / Clippy (push) Successful in 2m49s
Build and push image to registry, then trigger orca redeploy via
HMAC-signed webhook. Coolify webhook is no longer the source of truth.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-08 09:31:43 +02:00
75a35dbb85 feat(sidebar): add compliance scanner link from env config (#19)
Some checks failed
CI / Format (push) Successful in 4s
CI / Clippy (push) Successful in 2m43s
CI / Security Audit (push) Successful in 1m37s
CI / Tests (push) Successful in 3m54s
CI / Deploy (push) Successful in 2s
CI / E2E Tests (push) Failing after 31s
2026-03-09 08:39:00 +00:00
13 changed files with 456 additions and 344 deletions

View File

@@ -74,6 +74,11 @@ LANGGRAPH_URL=
LANGFLOW_URL=
LANGFUSE_URL=
# ---------------------------------------------------------------------------
# Compliance scanner (external tool, opens in new tab) [OPTIONAL]
# ---------------------------------------------------------------------------
COMPLIANCE_SCANNER_URL=
# ---------------------------------------------------------------------------
# Vector database [OPTIONAL]
# ---------------------------------------------------------------------------

View File

@@ -262,10 +262,30 @@ jobs:
needs: [test]
if: github.ref == 'refs/heads/main'
container:
image: alpine:latest
image: docker:27-cli
steps:
- name: Trigger Coolify deploy
- name: Checkout
run: |
apk add --no-cache curl
curl -sf "${{ secrets.COOLIFY_WEBHOOK }}" \
-H "Authorization: Bearer ${{ secrets.COOLIFY_TOKEN }}"
apk add --no-cache git curl openssl
git init
git remote add origin "${GITHUB_SERVER_URL}/${GITHUB_REPOSITORY}.git"
git fetch --depth=1 origin "${GITHUB_SHA}"
git checkout FETCH_HEAD
- name: Build and push image
run: |
IMAGE=registry.meghsakha.com/certifai-dashboard
echo "${{ secrets.REGISTRY_PASSWORD }}" | \
docker login registry.meghsakha.com -u "${{ secrets.REGISTRY_USERNAME }}" --password-stdin
docker build -t "$IMAGE:latest" -t "$IMAGE:${GITHUB_SHA}" .
docker push "$IMAGE:latest"
docker push "$IMAGE:${GITHUB_SHA}"
- name: Trigger orca redeploy
run: |
PAYLOAD=$(printf '{"ref":"refs/heads/main","repository":{"full_name":"sharang/certifai"},"head_commit":{"id":"%s","message":"CI deploy"}}' "${GITHUB_SHA}")
SIG=$(printf '%s' "$PAYLOAD" | openssl dgst -sha256 -hmac "${{ secrets.ORCA_WEBHOOK_SECRET }}" | awk '{print $2}')
echo "Calling orca webhook for sharang/certifai@${GITHUB_SHA}"
RESP=$(curl -fsS -w "\nHTTP %{http_code}" -X POST "http://46.225.100.82:6880/api/v1/webhooks/github" \
-H "Content-Type: application/json" \
-H "X-Hub-Signature-256: sha256=$SIG" \
-d "$PAYLOAD")
echo "$RESP"

725
Cargo.lock generated

File diff suppressed because it is too large Load Diff

View File

@@ -46,7 +46,8 @@
"agents": "Agenten",
"flow": "Flow",
"analytics": "Analytics",
"pricing": "Preise"
"pricing": "Preise",
"compliance": "Compliance"
},
"auth": {
"redirecting_login": "Weiterleitung zur Anmeldung...",

View File

@@ -46,7 +46,8 @@
"agents": "Agents",
"flow": "Flow",
"analytics": "Analytics",
"pricing": "Pricing"
"pricing": "Pricing",
"compliance": "Compliance"
},
"auth": {
"redirecting_login": "Redirecting to login...",

View File

@@ -46,7 +46,8 @@
"agents": "Agentes",
"flow": "Flujo",
"analytics": "Estadisticas",
"pricing": "Precios"
"pricing": "Precios",
"compliance": "Cumplimiento"
},
"auth": {
"redirecting_login": "Redirigiendo al inicio de sesion...",

View File

@@ -46,7 +46,8 @@
"agents": "Agents",
"flow": "Flux",
"analytics": "Analytique",
"pricing": "Tarifs"
"pricing": "Tarifs",
"compliance": "Conformite"
},
"auth": {
"redirecting_login": "Redirection vers la connexion...",

View File

@@ -46,7 +46,8 @@
"agents": "Agentes",
"flow": "Fluxo",
"analytics": "Analise",
"pricing": "Precos"
"pricing": "Precos",
"compliance": "Conformidade"
},
"auth": {
"redirecting_login": "A redirecionar para o inicio de sessao...",

View File

@@ -76,6 +76,7 @@ pub fn AppShell() -> Element {
name: info.name,
avatar_url: info.avatar_url,
librechat_url: info.librechat_url,
compliance_scanner_url: info.compliance_scanner_url,
class: sidebar_cls,
on_nav: move |_| mobile_menu_open.set(false),
}

View File

@@ -1,7 +1,7 @@
use dioxus::prelude::*;
use dioxus_free_icons::icons::bs_icons::{
BsBoxArrowRight, BsBuilding, BsChatDots, BsCloudArrowUp, BsCodeSlash, BsGithub, BsGlobe2,
BsGrid, BsHouseDoor, BsMoonFill, BsSunFill,
BsGrid, BsHouseDoor, BsMoonFill, BsShieldCheck, BsSunFill,
};
use dioxus_free_icons::Icon;
@@ -44,13 +44,14 @@ pub fn Sidebar(
email: String,
avatar_url: String,
#[props(default = "http://localhost:3080".to_string())] librechat_url: String,
#[props(default)] compliance_scanner_url: String,
#[props(default = "sidebar".to_string())] class: String,
#[props(default)] on_nav: EventHandler<()>,
) -> Element {
let locale = use_context::<Signal<Locale>>();
let locale_val = *locale.read();
let nav_items: Vec<NavItem> = vec![
let mut nav_items: Vec<NavItem> = vec![
NavItem {
key: "dashboard",
label: t(locale_val, "nav.dashboard"),
@@ -84,6 +85,16 @@ pub fn Sidebar(
},
];
// Only show the compliance scanner link when a URL is configured.
if !compliance_scanner_url.is_empty() {
nav_items.push(NavItem {
key: "compliance",
label: t(locale_val, "nav.compliance"),
target: NavTarget::External(compliance_scanner_url.clone()),
icon: rsx! { Icon { icon: BsShieldCheck, width: 18, height: 18 } },
});
}
// Determine current path to highlight the active nav link.
let current_route = use_route::<Route>();
let logout_label = t(locale_val, "common.logout");

View File

@@ -35,6 +35,7 @@ pub async fn check_auth() -> Result<AuthInfo, ServerFnError> {
let langgraph_url = state.services.langgraph_url.clone();
let langflow_url = state.services.langflow_url.clone();
let langfuse_url = state.services.langfuse_url.clone();
let compliance_scanner_url = state.services.compliance_scanner_url.clone();
Ok(AuthInfo {
authenticated: true,
@@ -46,6 +47,7 @@ pub async fn check_auth() -> Result<AuthInfo, ServerFnError> {
langgraph_url,
langflow_url,
langfuse_url,
compliance_scanner_url,
})
}
None => Ok(AuthInfo::default()),

View File

@@ -168,6 +168,8 @@ pub struct ServiceUrls {
pub s3_access_key: String,
/// S3 secret key (wrapped for debug safety).
pub s3_secret_key: SecretString,
/// Compliance scanner URL (external tool opened in a new tab).
pub compliance_scanner_url: String,
}
impl ServiceUrls {
@@ -194,6 +196,7 @@ impl ServiceUrls {
s3_url: optional_env("S3_URL"),
s3_access_key: optional_env("S3_ACCESS_KEY"),
s3_secret_key: SecretString::from(optional_env("S3_SECRET_KEY")),
compliance_scanner_url: optional_env("COMPLIANCE_SCANNER_URL"),
})
}
}

View File

@@ -30,6 +30,8 @@ pub struct AuthInfo {
pub langflow_url: String,
/// Langfuse observability URL (empty if not configured)
pub langfuse_url: String,
/// Compliance scanner URL (empty if not configured)
pub compliance_scanner_url: String,
}
/// Per-user LLM provider configuration stored in MongoDB.
@@ -100,6 +102,7 @@ mod tests {
assert_eq!(info.langgraph_url, "");
assert_eq!(info.langflow_url, "");
assert_eq!(info.langfuse_url, "");
assert_eq!(info.compliance_scanner_url, "");
}
#[test]
@@ -114,6 +117,7 @@ mod tests {
langgraph_url: "http://localhost:8123".into(),
langflow_url: "http://localhost:7860".into(),
langfuse_url: "http://localhost:3000".into(),
compliance_scanner_url: "http://localhost:9090".into(),
};
let json = serde_json::to_string(&info).expect("serialize AuthInfo");
let back: AuthInfo = serde_json::from_str(&json).expect("deserialize AuthInfo");