Skip to content

3.2.0#76

Merged
Anof-cyber merged 59 commits intomasterfrom
dev
Feb 18, 2026
Merged

3.2.0#76
Anof-cyber merged 59 commits intomasterfrom
dev

Conversation

@Anof-cyber
Copy link
Member

Pull Request

⚠️ IMPORTANT - READ BEFORE SUBMITTING

Required Pre-Submission Checklist

  • I have read the CONTRIBUTING.md file
  • I have created a GitHub issue for this change and linked it below
  • I have forked the dev branch (NOT master)
  • I understand that the master branch is ONLY updated when a new release is created
  • I understand that pull requests to master will be REJECTED

⛔ Critical Information

DO NOT submit a pull request directly to the master branch. The master branch is only updated when a new release is created. No direct commits or merges are accepted to master - neither from the InterceptSuite team nor from contributors.

All changes MUST be submitted to the dev branch, which contains the latest code and commits.

You MUST create a GitHub issue first before submitting a pull request. This allows the InterceptSuite team to:

  • Verify if the bug is already fixed in the development branch
  • Confirm if a new feature is accepted and approved
  • Avoid duplicate work

Pull requests without an associated issue will be rejected.


Pull Request Details

Type of Change

  • Bug Fix
  • New Feature
  • Code Improvement/Refactoring
  • Documentation Update
  • Other (please describe):

Related GitHub Issue

Issue Link:

Platform(s) Affected

  • Windows
  • macOS
  • Linux
  • Cross-platform/All

macOS Application Changes

Does this pull request include changes to the macOS application?

  • Yes
  • No

If YES, you MUST answer the following:

macOS Code Signing & Verification

  • I have signed the macOS app with a valid Apple Developer account
  • I have run the signed application on macOS to verify my changes work as expected
  • I confirm the application launches and functions correctly with my changes

⚠️ Important: If you cannot sign the macOS app to verify your code changes work, please DO NOT submit this pull request. Instead, use the GitHub issue you created to let the InterceptSuite team fix the bug or add the feature. You will need to wait for the next release.


Description of Changes

What does this pull request do?

How has this been tested?

  • Test environment (OS, version, etc.):
  • Test steps:
  • Test results:

Compilation & Dependencies

  • I have reviewed the CONTRIBUTING.md file for compilation instructions
  • I have verified all required libraries and packages are documented
  • My changes compile without errors
  • My changes do not introduce new dependencies (or I have documented them below)

New dependencies (if any):


Screenshots/Logs (if applicable)


Additional Context


Final Checklist

  • My code follows the project's coding style
  • I have commented my code, particularly in hard-to-understand areas
  • I have updated documentation as needed
  • My changes do not generate new warnings or errors
  • I have tested my changes on the target platform(s)
  • I have verified this change is based on the latest dev branch
  • I understand that pull requests without an associated GitHub issue will be rejected

Anof-cyber and others added 30 commits February 2, 2026 13:36
NOTE - Still under developent with almost no testing done if this method work with all required features same as mac and windows
- Moved Local Git to public dev branch
- Added Windows arch in Linux
-  Moved from EBPF based development to  NFQUEUE
- Added test CLI
…ction track, fixed pid lookup, added falback, improved lookup speed

moved windows core to Linux code
moved windows filter validation for broadcast ip and pid reserved to linux
added build scrippt, Copied Windows CLI into Linux C CLI
…, fixed linux and windows any ip udp associate
Comment on lines +12 to +104
runs-on: ubuntu-latest

steps:
- name: Checkout code
uses: actions/checkout@v4

- name: Install build dependencies
run: |
sudo apt-get update
sudo apt-get install -y \
build-essential \
gcc \
make \
libnetfilter-queue-dev \
libnfnetlink-dev \
libgtk-3-dev \
pkg-config
shell: bash

- name: Verify dependencies
run: |
echo "=== Checking GCC ==="
gcc --version
echo ""
echo "=== Checking Make ==="
make --version
echo ""
echo "=== Checking pkg-config ==="
pkg-config --version
echo ""
echo "=== Checking GTK3 ==="
pkg-config --modversion gtk+-3.0
echo ""
echo "=== Checking libnetfilter_queue ==="
pkg-config --modversion libnetfilter_queue || echo "Package info not available, but headers should be present"
shell: bash

- name: Build project
run: |
cd Linux
chmod +x build.sh
./build.sh
shell: bash

- name: Verify build output
run: |
echo "=== Build Output ==="
ls -lh Linux/output/
echo ""
if [ -f "Linux/output/libproxybridge.so" ]; then
echo "✓ Library built successfully"
file Linux/output/libproxybridge.so
else
echo "✗ Library build failed"
exit 1
fi
echo ""
if [ -f "Linux/output/ProxyBridge" ]; then
echo "✓ CLI built successfully"
file Linux/output/ProxyBridge
else
echo "✗ CLI build failed"
exit 1
fi
echo ""
if [ -f "Linux/output/ProxyBridgeGUI" ]; then
echo "✓ GUI built successfully"
file Linux/output/ProxyBridgeGUI
else
echo "⚠ GUI build skipped (GTK3 not available or build failed)"
fi
shell: bash

- name: Upload artifacts
uses: actions/upload-artifact@v4
with:
name: ProxyBridge-Linux-Build-${{ github.sha }}
path: Linux/output/
retention-days: 30

- name: Display build summary
run: |
echo ""
echo "========================================="
echo "Build Complete!"
echo "========================================="
cd Linux/output
for file in *; do
size=$(du -h "$file" | cut -f1)
echo " $file - $size"
done
echo "========================================="
shell: bash

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}

Copilot Autofix

AI 29 days ago

To fix the problem, explicitly declare minimal GITHUB_TOKEN permissions in the workflow. Since this job only needs to read repository contents (for actions/checkout) and upload artifacts (which does not require repository write access), we can safely restrict permissions to contents: read at the workflow or job level.

The best fix without changing functionality is to add a root‑level permissions block right under the name: line in .github/workflows/build-linux.yml, applying to all jobs that don’t override it. For example:

name: Build Linux
permissions:
  contents: read

No other permissions appear necessary for the shown steps. No additional imports, methods, or definitions are required; this is a pure YAML configuration change.

Suggested changeset 1
.github/workflows/build-linux.yml

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/.github/workflows/build-linux.yml b/.github/workflows/build-linux.yml
--- a/.github/workflows/build-linux.yml
+++ b/.github/workflows/build-linux.yml
@@ -1,4 +1,6 @@
 name: Build Linux
+permissions:
+  contents: read
 
 on:
   push:
EOF
@@ -1,4 +1,6 @@
name: Build Linux
permissions:
contents: read

on:
push:
Copilot is powered by AI and may make mistakes. Always verify output.
Comment on lines +10 to +129
runs-on: ubuntu-latest
if: github.event_name == 'release' || (github.event_name == 'workflow_dispatch' && github.actor == github.repository_owner)

steps:
- name: Checkout code
uses: actions/checkout@v4

- name: Install build dependencies
run: |
sudo apt-get update
sudo apt-get install -y \
build-essential \
gcc \
make \
libnetfilter-queue-dev \
libnfnetlink-dev \
libgtk-3-dev \
pkg-config
shell: bash

- name: Build project
run: |
cd Linux
chmod +x build.sh
./build.sh
shell: bash

- name: Copy setup script to output
run: |
echo "Copying setup.sh to output directory..."
cp Linux/setup.sh Linux/output/
chmod +x Linux/output/setup.sh
echo "✓ Setup script copied"
shell: bash

- name: Verify build output
run: |
echo "=== Build Output ==="
ls -lh Linux/output/
echo ""
if [ -f "Linux/output/libproxybridge.so" ]; then
echo "✓ Library built successfully"
file Linux/output/libproxybridge.so
else
echo "✗ Library build failed"
exit 1
fi
echo ""
if [ -f "Linux/output/ProxyBridge" ]; then
echo "✓ CLI built successfully"
file Linux/output/ProxyBridge
else
echo "✗ CLI build failed"
exit 1
fi
echo ""
if [ -f "Linux/output/setup.sh" ]; then
echo "✓ Setup script copied"
else
echo "✗ Setup script missing"
exit 1
fi
shell: bash

- name: Extract version from tag
id: version
run: |
if [ "${{ github.event_name }}" == "release" ]; then
VERSION="${{ github.event.release.tag_name }}"
else
VERSION="dev-$(date +%Y%m%d-%H%M%S)"
fi
# Remove 'v' prefix if present
VERSION="${VERSION#v}"
echo "version=$VERSION" >> $GITHUB_OUTPUT
echo "Version: $VERSION"
shell: bash

- name: Create release archive
run: |
VERSION="${{ steps.version.outputs.version }}"
ARCHIVE_NAME="ProxyBridge-Linux-v${VERSION}.tar.gz"

echo "Creating archive: $ARCHIVE_NAME"
cd Linux/output
tar -czf "../$ARCHIVE_NAME" ./*

echo ""
echo "Archive created successfully:"
ls -lh "../$ARCHIVE_NAME"

# Move archive to root for upload
mv "../$ARCHIVE_NAME" "../../$ARCHIVE_NAME"
shell: bash

- name: List release files
run: |
echo ""
echo "==================================="
echo "Release Files:"
echo "==================================="
ls -lh ProxyBridge-Linux-*.tar.gz

echo ""
echo "Archive contents:"
tar -tzf ProxyBridge-Linux-*.tar.gz
shell: bash

- name: Upload archive to release
if: github.event_name == 'release'
uses: softprops/action-gh-release@v1
with:
files: ProxyBridge-Linux-v*.tar.gz

- name: Upload build artifacts
uses: actions/upload-artifact@v4
with:
name: ProxyBridge-Linux-Release-${{ steps.version.outputs.version }}
path: ProxyBridge-Linux-*.tar.gz
retention-days: 90

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}

Copilot Autofix

AI 29 days ago

In general, the fix is to add an explicit permissions: block that grants the minimal required scopes to the GITHUB_TOKEN. This can be done at the workflow root (applies to all jobs) or at the job level. Since only this single job exists in the snippet, adding it at the workflow root is simple and future-proof.

The best minimal fix without changing functionality is:

  • At the top level of .github/workflows/release-linux.yml, add a permissions: block after the on: block (or before jobs:) that sets contents: write. This is sufficient because the job uses softprops/action-gh-release, which needs to create or update release assets (requiring contents: write), and the other steps only read the repo contents via actions/checkout and upload artifacts to Actions storage (which does not need additional scopes).
  • No other imports or code changes are needed; this is purely a workflow YAML configuration change.

Concretely, edit .github/workflows/release-linux.yml to insert:

permissions:
  contents: write

between the on: section (line 3–6) and jobs: (line 8).

Suggested changeset 1
.github/workflows/release-linux.yml

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/.github/workflows/release-linux.yml b/.github/workflows/release-linux.yml
--- a/.github/workflows/release-linux.yml
+++ b/.github/workflows/release-linux.yml
@@ -5,6 +5,9 @@
     types: [published, created]
   workflow_dispatch:
 
+permissions:
+  contents: write
+
 jobs:
   build-and-release:
     runs-on: ubuntu-latest
EOF
@@ -5,6 +5,9 @@
types: [published, created]
workflow_dispatch:

permissions:
contents: write

jobs:
build-and-release:
runs-on: ubuntu-latest
Copilot is powered by AI and may make mistakes. Always verify output.
Unable to commit as this autofix suggestion is now outdated
@sonarqubecloud
Copy link

Quality Gate Failed Quality Gate failed

Failed conditions
84 Security Hotspots
D Security Rating on New Code (required ≥ A)
E Reliability Rating on New Code (required ≥ A)

See analysis details on SonarQube Cloud

Catch issues before they fail your Quality Gate with our IDE extension SonarQube for IDE

@Anof-cyber Anof-cyber merged commit 7dd955f into master Feb 18, 2026
13 of 15 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant