Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
24 commits
Select commit Hold shift + click to select a range
440b9f3
feat: add PR Guidance Generator workflow
vmrh21 Mar 29, 2026
e6b3293
fix: use adaptive threshold instead of hard skip for small PR buckets
vmrh21 Mar 29, 2026
b0716a2
fix: sanitize control characters in PR fetch to prevent silent failures
vmrh21 Mar 29, 2026
1e56d83
feat: add --pr flag to guidance.generate and guidance.update
vmrh21 Mar 29, 2026
7118bb9
docs: update README and ambient.json with --pr flag and adaptive thre…
vmrh21 Mar 29, 2026
4768e21
fix: treat 80-line cap as soft target, never silently drop rules on u…
vmrh21 Mar 30, 2026
a6895eb
chore: add .gitignore and remove committed test artifacts
vmrh21 Mar 30, 2026
d3027f9
feat: add multi-repo support to guidance.generate and guidance.update
vmrh21 Mar 30, 2026
c0fb140
feat: --pr space/comma, --cve-only/--bugfix-only on update, agent sta…
vmrh21 Mar 30, 2026
f9bfe18
Merge branch 'ambient-code:main' into main
vmrh21 Mar 30, 2026
9546105
feat: add commit fallback analysis for repos with few or no fix PRs
vmrh21 Mar 31, 2026
50ff868
fix: expand CVE pattern to catch dep/bump PRs and commits with securi…
vmrh21 Mar 31, 2026
c81f456
fix: remove ^chore.*upgrade and ^chore.*bump from CVE dep patterns
vmrh21 Mar 31, 2026
7c50c6b
feat: fork-aware push and PR creation for repos without write access
vmrh21 Apr 1, 2026
537fa37
feat: add rhoai-manager workflow
vmrh21 Apr 3, 2026
920e5d9
feat: add odh-install and odh-update commands to rhoai-manager workflow
vmrh21 Apr 3, 2026
aa081f2
feat: detect RHOAI conflict in odh-install, add odh-uninstall command
vmrh21 Apr 3, 2026
e15ffa2
fix: detect ODH conflict in rhoai-install, clarify odh-uninstall for …
vmrh21 Apr 3, 2026
e6c9427
docs: update README and ambient.json for ODH commands
vmrh21 Apr 3, 2026
07be97c
feat: add /mirror-images command for disconnected cluster image mirro…
vmrh21 Apr 12, 2026
53c7842
fix: auto-detect RHOAI version from connected cluster CSV
vmrh21 Apr 12, 2026
b3dbef3
fix: address review gaps in mirror-images and rhoai-disconnected comm…
vmrh21 Apr 13, 2026
00ba9ad
feat: add summary display section to mirror-images command
vmrh21 Apr 14, 2026
df95c2a
feat: generate .cve-fix/examples.md guidance for Observability repos
Apr 16, 2026
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
30 changes: 30 additions & 0 deletions workflows/cve-fixer/.cve-fix/stolostron-grafana/examples.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
<!-- last-analyzed: 2026-04-16 | cve-merged: 0 -->

<!-- Insufficient PR history for full pattern extraction.
Update with /guidance.update after more CVE fixes are merged. -->

## Titles
- `Security: Fix CVE-YYYY-XXXXX (<package>)` (common across stolostron org)
- `fix(cve): CVE-YYYY-XXXXX - <package>` (conventional commit style, also used in org)

## Branches
- `fix/cve-<id>-<pkg>-<branch>-attempt-N` (common across stolostron org)
- e.g. `fix/cve-2026-33186-grpc-go-release-2.14-attempt-1`

## Files
- `go.mod` + `go.sum` always change together for Go dependency updates

## Co-upgrades
- When bumping a Go dependency, always run `go mod tidy` to update `go.sum`
- Go version bumps (`go.mod` directive) often require updating `Dockerfile` / `Containerfile.operator`

## PR Description
- Include CVE ID, severity, and affected package in description
- Reference the target branch (e.g. `release-2.16`) when targeting non-default branches
- Include test results section
- For multi-branch fixes, create separate PRs per branch (not a single PR)

## Don'ts
- ❌ Do not combine multiple CVE fixes in a single PR
- ❌ Do not target the wrong release branch (verify `--base` matches intended branch)
- ❌ Do not skip `go mod tidy` — incomplete `go.sum` updates will fail CI
Original file line number Diff line number Diff line change
@@ -0,0 +1,36 @@
<!-- last-analyzed: 2026-04-16 | cve-merged: 10 -->

## Titles
- `fix(cve): CVE-YYYY-XXXXX - <package>` (5/30 merged PRs)
- e.g. `fix(cve): CVE-2026-33186 - google.golang.org/grpc`
- e.g. `fix(cve): CVE-2026-33186 - google.golang.org/grpc`
- `Security: Fix CVE-YYYY-XXXXX (<package>)` (5/30 merged PRs)
- e.g. `Security: Fix CVE-2026-33186 (gRPC-Go) - release-2.13`
- e.g. `Security: Fix CVE-2026-33186 (gRPC-Go) - release-2.14`

## Branches
- `fix/cve-<id>-<pkg>-<branch>-attempt-N` (10/30 merged PRs)
- e.g. `fix/cve-2026-33186-grpc-go-backplane-2.10-attempt-1`
- e.g. `fix/cve-2026-33186-grpc-go-backplane-2.9-attempt-1`
- `dependabot/<ecosystem>/<pkg>-<version>` (2/30 merged PRs)
- e.g. `dependabot/go_modules/golang.org/x/net-0.38.0`
- e.g. `dependabot/go_modules/golang.org/x/oauth2-0.27.0`

## Files
- `go.mod` + `go.sum` always change together for Go dependency updates
- `Dockerfile` / `Containerfile.operator` may also be updated (Go version bumps)

## Co-upgrades
- When bumping a Go dependency, always run `go mod tidy` to update `go.sum`
- Go version bumps (`go.mod` directive) often require updating `Dockerfile` / `Containerfile.operator`

## PR Description
- Include CVE ID, severity, and affected package in description
- Reference the target branch (e.g. `release-2.16`) when targeting non-default branches
- Include test results section
- For multi-branch fixes, create separate PRs per branch (not a single PR)

## Don'ts
- ❌ Do not combine multiple CVE fixes in a single PR
- ❌ Do not target the wrong release branch (verify `--base` matches intended branch)
- ❌ Do not skip `go mod tidy` — incomplete `go.sum` updates will fail CI
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
<!-- last-analyzed: 2026-04-16 | cve-merged: 4 -->

## Titles
- `Security: Fix CVE-YYYY-XXXXX (<package>)` (4/15 merged PRs)
- e.g. `Security: Fix CVE-2026-33186 (grpc-go)`
- e.g. `Security: Fix CVE-2026-33186 (grpc-go)`

## Branches
- `fix/cve-<id>-<pkg>-<branch>-attempt-N` (4/15 merged PRs)
- e.g. `fix/cve-2026-33186-grpc-go-release-2.14-attempt-1`
- e.g. `fix/cve-2026-33186-grpc-go-release-2.15-attempt-1`
- `dependabot/<ecosystem>/<pkg>-<version>` (2/15 merged PRs)
- e.g. `dependabot/go_modules/github.com/golang-jwt/jwt/v5-5.2.2`
- e.g. `dependabot/go_modules/golang.org/x/crypto-0.35.0`

## Files
- `go.mod` + `go.sum` always change together for Go dependency updates
- `Dockerfile` / `Containerfile.operator` may also be updated (Go version bumps)

## Co-upgrades
- When bumping a Go dependency, always run `go mod tidy` to update `go.sum`
- Go version bumps (`go.mod` directive) often require updating `Dockerfile` / `Containerfile.operator`

## PR Description
- Include CVE ID, severity, and affected package in description
- Reference the target branch (e.g. `release-2.16`) when targeting non-default branches
- Include test results section
- For multi-branch fixes, create separate PRs per branch (not a single PR)

## Don'ts
- ❌ Do not combine multiple CVE fixes in a single PR
- ❌ Do not target the wrong release branch (verify `--base` matches intended branch)
- ❌ Do not skip `go mod tidy` — incomplete `go.sum` updates will fail CI
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
<!-- last-analyzed: 2026-04-16 | cve-merged: 0 -->

<!-- Insufficient PR history for full pattern extraction.
Update with /guidance.update after more CVE fixes are merged. -->

## Titles
- `Security: Fix CVE-YYYY-XXXXX (<package>)` (common across stolostron org)
- `fix(cve): CVE-YYYY-XXXXX - <package>` (conventional commit style, also used in org)

## Branches
- `fix/cve-<id>-<pkg>-<branch>-attempt-N` (common across stolostron org)
- e.g. `fix/cve-2026-33186-grpc-go-release-2.14-attempt-1`

## Files
- `go.mod` + `go.sum` always change together for Go dependency updates

## Co-upgrades
- When bumping a Go dependency, always run `go mod tidy` to update `go.sum`
- Go version bumps (`go.mod` directive) often require updating `Dockerfile` / `Containerfile.operator`

## PR Description
- Include CVE ID, severity, and affected package in description
- Reference the target branch (e.g. `release-2.16`) when targeting non-default branches
- Include test results section
- For multi-branch fixes, create separate PRs per branch (not a single PR)

## Don'ts
- ❌ Do not combine multiple CVE fixes in a single PR
- ❌ Do not target the wrong release branch (verify `--base` matches intended branch)
- ❌ Do not skip `go mod tidy` — incomplete `go.sum` updates will fail CI
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
<!-- last-analyzed: 2026-04-16 | cve-merged: 4 -->

## Titles
- `Security: Fix CVE-YYYY-XXXXX (<package>)` (4/10 merged PRs)
- e.g. `Security: Fix CVE-2026-33186 (grpc-go)`
- e.g. `Security: Fix CVE-2026-33186 (grpc-go)`

## Branches
- `fix/cve-<id>-<pkg>-<branch>-attempt-N` (4/10 merged PRs)
- e.g. `fix/cve-2026-33186-grpc-go-release-2.14-attempt-1`
- e.g. `fix/cve-2026-33186-grpc-go-release-2.15-attempt-1`

## Files
- `go.mod` + `go.sum` always change together for Go dependency updates
- `Dockerfile` / `Containerfile.operator` may also be updated (Go version bumps)

## Co-upgrades
- When bumping a Go dependency, always run `go mod tidy` to update `go.sum`
- Go version bumps (`go.mod` directive) often require updating `Dockerfile` / `Containerfile.operator`

## PR Description
- Include CVE ID, severity, and affected package in description
- Reference the target branch (e.g. `release-2.16`) when targeting non-default branches
- Include test results section
- For multi-branch fixes, create separate PRs per branch (not a single PR)

## Don'ts
- ❌ Do not combine multiple CVE fixes in a single PR
- ❌ Do not target the wrong release branch (verify `--base` matches intended branch)
- ❌ Do not skip `go mod tidy` — incomplete `go.sum` updates will fail CI
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
<!-- last-analyzed: 2026-04-16 | cve-merged: 4 -->

## Titles
- `Security: Fix CVE-YYYY-XXXXX (<package>)` (4/12 merged PRs)
- e.g. `Security: Fix CVE-2026-33186 (grpc-go)`
- e.g. `Security: Fix CVE-2026-33186 (grpc-go)`

## Branches
- `fix/cve-<id>-<pkg>-<branch>-attempt-N` (4/12 merged PRs)
- e.g. `fix/cve-2026-33186-grpc-go-release-2.14-attempt-1`
- e.g. `fix/cve-2026-33186-grpc-go-release-2.15-attempt-1`
- `dependabot/<ecosystem>/<pkg>-<version>` (1/12 merged PRs)
- e.g. `dependabot/go_modules/go.opentelemetry.io/otel/sdk-1.40.0`

## Files
- `go.mod` + `go.sum` always change together for Go dependency updates
- `Dockerfile` / `Containerfile.operator` may also be updated (Go version bumps)

## Co-upgrades
- When bumping a Go dependency, always run `go mod tidy` to update `go.sum`
- Go version bumps (`go.mod` directive) often require updating `Dockerfile` / `Containerfile.operator`

## PR Description
- Include CVE ID, severity, and affected package in description
- Reference the target branch (e.g. `release-2.16`) when targeting non-default branches
- Include test results section
- For multi-branch fixes, create separate PRs per branch (not a single PR)

## Don'ts
- ❌ Do not combine multiple CVE fixes in a single PR
- ❌ Do not target the wrong release branch (verify `--base` matches intended branch)
- ❌ Do not skip `go mod tidy` — incomplete `go.sum` updates will fail CI
28 changes: 28 additions & 0 deletions workflows/cve-fixer/.cve-fix/stolostron-node-exporter/examples.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
<!-- last-analyzed: 2026-04-16 | cve-merged: 0 -->

## Titles
- `Security: Fix CVE-YYYY-XXXXX (<package>)` (common across stolostron org)
- `fix(cve): CVE-YYYY-XXXXX - <package>` (conventional commit style, also used in org)

## Branches
- `fix/cve-<id>-<pkg>-<branch>-attempt-N` (common across stolostron org)
- e.g. `fix/cve-2026-33186-grpc-go-release-2.14-attempt-1`

## Files
- `go.mod` + `go.sum` always change together for Go dependency updates
- `Dockerfile` / `Containerfile.operator` may also be updated (Go version bumps)

## Co-upgrades
- When bumping a Go dependency, always run `go mod tidy` to update `go.sum`
- Go version bumps (`go.mod` directive) often require updating `Dockerfile` / `Containerfile.operator`

## PR Description
- Include CVE ID, severity, and affected package in description
- Reference the target branch (e.g. `release-2.16`) when targeting non-default branches
- Include test results section
- For multi-branch fixes, create separate PRs per branch (not a single PR)

## Don'ts
- ❌ Do not combine multiple CVE fixes in a single PR
- ❌ Do not target the wrong release branch (verify `--base` matches intended branch)
- ❌ Do not skip `go mod tidy` — incomplete `go.sum` updates will fail CI
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
<!-- last-analyzed: 2026-04-16 | cve-merged: 0 -->

## Titles
- `Security: Fix CVE-YYYY-XXXXX (<package>)` (common across stolostron org)
- `fix(cve): CVE-YYYY-XXXXX - <package>` (conventional commit style, also used in org)

## Branches
- `fix/cve-<id>-<pkg>-<branch>-attempt-N` (common across stolostron org)
- e.g. `fix/cve-2026-33186-grpc-go-release-2.14-attempt-1`

## Files
- `go.mod` + `go.sum` always change together for Go dependency updates
- `Dockerfile` / `Containerfile.operator` may also be updated (Go version bumps)
- `vendor/` directory is vendored — run `go mod vendor` after dependency changes

## Co-upgrades
- When bumping a Go dependency, always run `go mod tidy` to update `go.sum`
- This repo vendors dependencies — run `go mod vendor` after `go mod tidy`
- Go version bumps (`go.mod` directive) often require updating `Dockerfile` / `Containerfile.operator`

## PR Description
- Include CVE ID, severity, and affected package in description
- Reference the target branch (e.g. `release-2.16`) when targeting non-default branches
- Include test results section
- For multi-branch fixes, create separate PRs per branch (not a single PR)

## Don'ts
- ❌ Do not combine multiple CVE fixes in a single PR
- ❌ Do not target the wrong release branch (verify `--base` matches intended branch)
- ❌ Do not skip `go mod tidy` — incomplete `go.sum` updates will fail CI
30 changes: 30 additions & 0 deletions workflows/cve-fixer/.cve-fix/stolostron-observatorium/examples.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
<!-- last-analyzed: 2026-04-16 | cve-merged: 4 -->

## Titles
- `Security: Fix CVE-YYYY-XXXXX (<package>)` (4/19 merged PRs)
- e.g. `Security: Fix CVE-2026-33186 (grpc-go)`
- e.g. `Security: Fix CVE-2026-33186 (grpc-go)`

## Branches
- `fix/cve-<id>-<pkg>-<branch>-attempt-N` (4/19 merged PRs)
- e.g. `fix/cve-2026-33186-grpc-go-release-2.14-attempt-1`
- e.g. `fix/cve-2026-33186-grpc-go-release-2.15-attempt-1`

## Files
- `go.mod` + `go.sum` always change together for Go dependency updates
- `Dockerfile` / `Containerfile.operator` may also be updated (Go version bumps)

## Co-upgrades
- When bumping a Go dependency, always run `go mod tidy` to update `go.sum`
- Go version bumps (`go.mod` directive) often require updating `Dockerfile` / `Containerfile.operator`

## PR Description
- Include CVE ID, severity, and affected package in description
- Reference the target branch (e.g. `release-2.16`) when targeting non-default branches
- Include test results section
- For multi-branch fixes, create separate PRs per branch (not a single PR)

## Don'ts
- ❌ Do not combine multiple CVE fixes in a single PR
- ❌ Do not target the wrong release branch (verify `--base` matches intended branch)
- ❌ Do not skip `go mod tidy` — incomplete `go.sum` updates will fail CI
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
<!-- last-analyzed: 2026-04-16 | cve-merged: 5 -->

## Titles
- `Security: Fix CVE-YYYY-XXXXX (<package>)` (4/26 merged PRs)
- e.g. `Security: Fix CVE-2026-33186 (grpc-go)`
- e.g. `Security: Fix CVE-2026-33186 (grpc-go)`
- `Other CVE title format` (1/26 merged PRs)
- e.g. `[release-2.10] fix: CVE-2023-45288 ensure golang/x/net is 0.23+`

## Branches
- `fix/cve-<id>-<pkg>-<branch>-attempt-N` (4/26 merged PRs)
- e.g. `fix/cve-2026-33186-grpc-go-release-2.14-attempt-1`
- e.g. `fix/cve-2026-33186-grpc-go-release-2.15-attempt-1`

## Files
- `go.mod` + `go.sum` always change together for Go dependency updates
- `Dockerfile` / `Containerfile.operator` may also be updated (Go version bumps)

## Co-upgrades
- When bumping a Go dependency, always run `go mod tidy` to update `go.sum`
- Go version bumps (`go.mod` directive) often require updating `Dockerfile` / `Containerfile.operator`

## PR Description
- Include CVE ID, severity, and affected package in description
- Reference the target branch (e.g. `release-2.16`) when targeting non-default branches
- Include test results section
- For multi-branch fixes, create separate PRs per branch (not a single PR)

## Don'ts
- ❌ Do not combine multiple CVE fixes in a single PR
- ❌ Do not target the wrong release branch (verify `--base` matches intended branch)
- ❌ Do not skip `go mod tidy` — incomplete `go.sum` updates will fail CI
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
<!-- last-analyzed: 2026-04-16 | cve-merged: 4 -->

## Titles
- `fix(cve): CVE-YYYY-XXXXX - <package>` (4/22 merged PRs)
- e.g. `fix(cve): CVE-2026-33186 - google.golang.org/grpc [release-2.17]`
- e.g. `fix(cve): CVE-2026-33186 - google.golang.org/grpc [release-2.16]`

## Branches
- `fix/cve-<id>-<pkg>-<branch>-attempt-N` (4/22 merged PRs)
- e.g. `fix/cve-2026-33186-grpc-release-2.17-attempt-1`
- e.g. `fix/cve-2026-33186-grpc-release-2.16-attempt-1`

## Files
- `go.mod` + `go.sum` always change together for Go dependency updates
- `Dockerfile` / `Containerfile.operator` may also be updated (Go version bumps)

## Co-upgrades
- When bumping a Go dependency, always run `go mod tidy` to update `go.sum`
- Go version bumps (`go.mod` directive) often require updating `Dockerfile` / `Containerfile.operator`

## PR Description
- Include CVE ID, severity, and affected package in description
- Reference the target branch (e.g. `release-2.16`) when targeting non-default branches
- Include test results section
- For multi-branch fixes, create separate PRs per branch (not a single PR)

## Don'ts
- ❌ Do not combine multiple CVE fixes in a single PR
- ❌ Do not target the wrong release branch (verify `--base` matches intended branch)
- ❌ Do not skip `go mod tidy` — incomplete `go.sum` updates will fail CI
33 changes: 33 additions & 0 deletions workflows/cve-fixer/.cve-fix/stolostron-prometheus/examples.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
<!-- last-analyzed: 2026-04-16 | cve-merged: 4 -->

## Titles
- `Security: Fix CVE-YYYY-XXXXX (<package>)` (4/27 merged PRs)
- e.g. `Security: Fix CVE-2026-33186 (grpc-go)`
- e.g. `Security: Fix CVE-2026-33186 (grpc-go)`

## Branches
- `fix/cve-<id>-<pkg>-<branch>-attempt-N` (4/27 merged PRs)
- e.g. `fix/cve-2026-33186-grpc-go-release-2.14-attempt-1`
- e.g. `fix/cve-2026-33186-grpc-go-release-2.15-attempt-1`
- `dependabot/<ecosystem>/<pkg>-<version>` (3/27 merged PRs)
- e.g. `dependabot/go_modules/github.com/golang-jwt/jwt/v5-5.2.2`
- e.g. `dependabot/go_modules/golang.org/x/crypto-0.35.0`

## Files
- `go.mod` + `go.sum` always change together for Go dependency updates
- `Dockerfile` / `Containerfile.operator` may also be updated (Go version bumps)

## Co-upgrades
- When bumping a Go dependency, always run `go mod tidy` to update `go.sum`
- Go version bumps (`go.mod` directive) often require updating `Dockerfile` / `Containerfile.operator`

## PR Description
- Include CVE ID, severity, and affected package in description
- Reference the target branch (e.g. `release-2.16`) when targeting non-default branches
- Include test results section
- For multi-branch fixes, create separate PRs per branch (not a single PR)

## Don'ts
- ❌ Do not combine multiple CVE fixes in a single PR
- ❌ Do not target the wrong release branch (verify `--base` matches intended branch)
- ❌ Do not skip `go mod tidy` — incomplete `go.sum` updates will fail CI
Loading
Loading