Skip to content

feat: enable ci testing#123

Merged
codyshoffner merged 18 commits into
mainfrom
feat/enable-ci
May 4, 2026
Merged

feat: enable ci testing#123
codyshoffner merged 18 commits into
mainfrom
feat/enable-ci

Conversation

@codyshoffner
Copy link
Copy Markdown
Contributor

@codyshoffner codyshoffner commented Mar 31, 2026

Description

Simplifies the package template by stripping out defaults that were more noise than help. The defaults could be overwhelming to new users and frequent package creators would have to delete much of the defaults. We also learned the uds-mcp server burned extra cycles reasoning through the "bloated" template.

In the new UDS docs we created a user guide for building a package from this template, so these example values being removed from this PR are not as important as they once were.

Notable Changes

  • Removed many commented out example values.
  • Flavors stripped to upstream only. Users can add registry1 and unicorn flavors when they actually need them.
  • CI added to the template. The template now runs a ci-setup task on PR.
  • Refreshed much of the docs
  • Pruned old tasks that are no longer required

Related Issue

Relates to # https://linear.app/defense-unicorns/issue/MCP-66/mcp-template-clean-up

Type of change

  • Bug fix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Other (security config, docs update, etc)

Checklist before merging

@github-actions
Copy link
Copy Markdown

github-actions Bot commented Mar 31, 2026

ghcr.io/stefanprodan/podinfo 6.11.2 -> 6.7.1

New vulnerabilities: 62
Fixed vulnerabilities: 5
Existing vulnerabilities: 73

New vulnerabilities
ID SEVERITY URL
GHSA-9h8m-3fm2-qjrq high GHSA-9h8m-3fm2-qjrq
CVE-2025-26519 high https://security.alpinelinux.org/vuln/CVE-2025-26519
CVE-2025-69419 high https://security.alpinelinux.org/vuln/CVE-2025-69419
CVE-2025-15467 high https://security.alpinelinux.org/vuln/CVE-2025-15467
CVE-2025-0665 high https://security.alpinelinux.org/vuln/CVE-2025-0665
CVE-2025-9086 high https://security.alpinelinux.org/vuln/CVE-2025-9086
CVE-2025-69421 high https://security.alpinelinux.org/vuln/CVE-2025-69421
CVE-2025-26519 high https://security.alpinelinux.org/vuln/CVE-2025-26519
CVE-2025-0725 high https://security.alpinelinux.org/vuln/CVE-2025-0725
CVE-2025-69421 high https://security.alpinelinux.org/vuln/CVE-2025-69421
CVE-2025-9086 high https://security.alpinelinux.org/vuln/CVE-2025-9086
GHSA-mh63-6h87-95cp high GHSA-mh63-6h87-95cp
CVE-2025-69420 high https://security.alpinelinux.org/vuln/CVE-2025-69420
CVE-2025-0725 high https://security.alpinelinux.org/vuln/CVE-2025-0725
CVE-2025-5399 high https://security.alpinelinux.org/vuln/CVE-2025-5399
CVE-2025-31498 high https://nvd.nist.gov/vuln/detail/CVE-2025-31498
CVE-2025-5399 high https://security.alpinelinux.org/vuln/CVE-2025-5399
CVE-2025-9230 high https://security.alpinelinux.org/vuln/CVE-2025-9230
CVE-2025-15467 high https://security.alpinelinux.org/vuln/CVE-2025-15467
CVE-2025-0665 high https://security.alpinelinux.org/vuln/CVE-2025-0665
CVE-2025-69419 high https://security.alpinelinux.org/vuln/CVE-2025-69419
CVE-2025-69420 high https://security.alpinelinux.org/vuln/CVE-2025-69420
CVE-2025-9230 high https://security.alpinelinux.org/vuln/CVE-2025-9230
CVE-2025-68160 medium https://security.alpinelinux.org/vuln/CVE-2025-68160
CVE-2025-66199 medium https://security.alpinelinux.org/vuln/CVE-2025-66199
CVE-2024-13176 medium https://security.alpinelinux.org/vuln/CVE-2024-13176
CVE-2025-69418 medium https://security.alpinelinux.org/vuln/CVE-2025-69418
CVE-2025-66199 medium https://security.alpinelinux.org/vuln/CVE-2025-66199
CVE-2024-12797 medium https://security.alpinelinux.org/vuln/CVE-2024-12797
CVE-2025-9231 medium https://security.alpinelinux.org/vuln/CVE-2025-9231
CVE-2025-9232 medium https://security.alpinelinux.org/vuln/CVE-2025-9232
CVE-2024-9681 medium https://security.alpinelinux.org/vuln/CVE-2024-9681
CVE-2024-12797 medium https://security.alpinelinux.org/vuln/CVE-2024-12797
CVE-2025-10966 medium https://nvd.nist.gov/vuln/detail/CVE-2025-10966
CVE-2025-68160 medium https://security.alpinelinux.org/vuln/CVE-2025-68160
CVE-2026-22796 medium https://security.alpinelinux.org/vuln/CVE-2026-22796
CVE-2026-22795 medium https://security.alpinelinux.org/vuln/CVE-2026-22795
CVE-2025-62408 medium https://nvd.nist.gov/vuln/detail/CVE-2025-62408
CVE-2026-22796 medium https://security.alpinelinux.org/vuln/CVE-2026-22796
CVE-2024-9681 medium https://security.alpinelinux.org/vuln/CVE-2024-9681
CVE-2026-22795 medium https://security.alpinelinux.org/vuln/CVE-2026-22795
CVE-2024-9143 medium https://security.alpinelinux.org/vuln/CVE-2024-9143
CVE-2025-10148 medium https://security.alpinelinux.org/vuln/CVE-2025-10148
CVE-2024-13176 medium https://security.alpinelinux.org/vuln/CVE-2024-13176
CVE-2025-9231 medium https://security.alpinelinux.org/vuln/CVE-2025-9231
CVE-2024-9143 medium https://security.alpinelinux.org/vuln/CVE-2024-9143
CVE-2025-15468 medium https://security.alpinelinux.org/vuln/CVE-2025-15468
CVE-2025-10148 medium https://security.alpinelinux.org/vuln/CVE-2025-10148
CVE-2025-9232 medium https://security.alpinelinux.org/vuln/CVE-2025-9232
CVE-2025-69418 medium https://security.alpinelinux.org/vuln/CVE-2025-69418
CVE-2025-15468 medium https://security.alpinelinux.org/vuln/CVE-2025-15468
CVE-2024-58251 low https://security.alpinelinux.org/vuln/CVE-2024-58251
CVE-2025-46394 low https://security.alpinelinux.org/vuln/CVE-2025-46394
CVE-2024-11053 low https://security.alpinelinux.org/vuln/CVE-2024-11053
CVE-2025-0167 low https://security.alpinelinux.org/vuln/CVE-2025-0167
CVE-2025-0167 low https://security.alpinelinux.org/vuln/CVE-2025-0167
CVE-2025-46394 low https://security.alpinelinux.org/vuln/CVE-2025-46394
CVE-2024-58251 low https://security.alpinelinux.org/vuln/CVE-2024-58251
CVE-2025-46394 low https://security.alpinelinux.org/vuln/CVE-2025-46394
CVE-2024-11053 low https://security.alpinelinux.org/vuln/CVE-2024-11053
CVE-2024-58251 low https://security.alpinelinux.org/vuln/CVE-2024-58251
GHSA-29wx-vh33-7x7r low GHSA-29wx-vh33-7x7r
Fixed vulnerabilities
ID SEVERITY URL
CVE-2026-2673 high https://security.alpinelinux.org/vuln/CVE-2026-2673
GHSA-mh2q-q3fh-2475 high GHSA-mh2q-q3fh-2475
CVE-2026-33810 high https://nvd.nist.gov/vuln/detail/CVE-2026-33810
CVE-2026-3805 high https://nvd.nist.gov/vuln/detail/CVE-2026-3805
CVE-2026-2673 high https://security.alpinelinux.org/vuln/CVE-2026-2673
Existing vulnerabilities
ID SEVERITY URL
CVE-2025-22871 critical https://nvd.nist.gov/vuln/detail/CVE-2025-22871
GHSA-p77j-4mvh-x3m3 critical GHSA-p77j-4mvh-x3m3
CVE-2026-31789 critical https://security.alpinelinux.org/vuln/CVE-2026-31789
CVE-2026-27143 critical https://nvd.nist.gov/vuln/detail/CVE-2026-27143
CVE-2026-31789 critical https://security.alpinelinux.org/vuln/CVE-2026-31789
CVE-2025-68121 critical https://nvd.nist.gov/vuln/detail/CVE-2025-68121
CVE-2025-61725 high https://nvd.nist.gov/vuln/detail/CVE-2025-61725
CVE-2025-61726 high https://nvd.nist.gov/vuln/detail/CVE-2025-61726
CVE-2025-47907 high https://nvd.nist.gov/vuln/detail/CVE-2025-47907
CVE-2025-61732 high https://nvd.nist.gov/vuln/detail/CVE-2025-61732
CVE-2026-27144 high https://nvd.nist.gov/vuln/detail/CVE-2026-27144
CVE-2026-31790 high https://security.alpinelinux.org/vuln/CVE-2026-31790
CVE-2026-32283 high https://nvd.nist.gov/vuln/detail/CVE-2026-32283
CVE-2026-28388 high https://security.alpinelinux.org/vuln/CVE-2026-28388
CVE-2026-32281 high https://nvd.nist.gov/vuln/detail/CVE-2026-32281
CVE-2026-28387 high https://security.alpinelinux.org/vuln/CVE-2026-28387
CVE-2025-61729 high https://nvd.nist.gov/vuln/detail/CVE-2025-61729
CVE-2025-61731 high https://nvd.nist.gov/vuln/detail/CVE-2025-61731
CVE-2025-58188 high https://nvd.nist.gov/vuln/detail/CVE-2025-58188
CVE-2026-28389 high https://security.alpinelinux.org/vuln/CVE-2026-28389
CVE-2026-32280 high https://nvd.nist.gov/vuln/detail/CVE-2026-32280
CVE-2026-25679 high https://nvd.nist.gov/vuln/detail/CVE-2026-25679
CVE-2026-28390 high https://security.alpinelinux.org/vuln/CVE-2026-28390
CVE-2025-4674 high https://nvd.nist.gov/vuln/detail/CVE-2025-4674
CVE-2025-61723 high https://nvd.nist.gov/vuln/detail/CVE-2025-61723
CVE-2026-27135 high https://nvd.nist.gov/vuln/detail/CVE-2026-27135
CVE-2026-28390 high https://security.alpinelinux.org/vuln/CVE-2026-28390
CVE-2026-28388 high https://security.alpinelinux.org/vuln/CVE-2026-28388
CVE-2026-27140 high https://nvd.nist.gov/vuln/detail/CVE-2026-27140
GHSA-hfvc-g4fc-pqhx high GHSA-hfvc-g4fc-pqhx
CVE-2025-58187 high https://nvd.nist.gov/vuln/detail/CVE-2025-58187
CVE-2026-28387 high https://security.alpinelinux.org/vuln/CVE-2026-28387
CVE-2026-28389 high https://security.alpinelinux.org/vuln/CVE-2026-28389
CVE-2026-40200 high https://security.alpinelinux.org/vuln/CVE-2026-40200
CVE-2026-40200 high https://security.alpinelinux.org/vuln/CVE-2026-40200
CVE-2026-31790 high https://security.alpinelinux.org/vuln/CVE-2026-31790
CVE-2025-47906 medium https://nvd.nist.gov/vuln/detail/CVE-2025-47906
CVE-2026-27171 medium https://security.alpinelinux.org/vuln/CVE-2026-27171
CVE-2025-14017 medium https://nvd.nist.gov/vuln/detail/CVE-2025-14017
CVE-2026-32289 medium https://nvd.nist.gov/vuln/detail/CVE-2026-32289
CVE-2025-14524 medium https://nvd.nist.gov/vuln/detail/CVE-2025-14524
CVE-2026-27142 medium https://nvd.nist.gov/vuln/detail/CVE-2026-27142
CVE-2025-58185 medium https://nvd.nist.gov/vuln/detail/CVE-2025-58185
GHSA-vvgc-356p-c3xw medium GHSA-vvgc-356p-c3xw
CVE-2025-58183 medium https://nvd.nist.gov/vuln/detail/CVE-2025-58183
CVE-2025-60876 medium https://nvd.nist.gov/vuln/detail/CVE-2025-60876
GHSA-qxp5-gwg8-xv66 medium GHSA-qxp5-gwg8-xv66
CVE-2025-15079 medium https://nvd.nist.gov/vuln/detail/CVE-2025-15079
CVE-2025-61728 medium https://nvd.nist.gov/vuln/detail/CVE-2025-61728
CVE-2025-60876 medium https://nvd.nist.gov/vuln/detail/CVE-2025-60876
CVE-2026-3784 medium https://nvd.nist.gov/vuln/detail/CVE-2026-3784
CVE-2026-32282 medium https://nvd.nist.gov/vuln/detail/CVE-2026-32282
CVE-2025-4673 medium https://nvd.nist.gov/vuln/detail/CVE-2025-4673
CVE-2025-47912 medium https://nvd.nist.gov/vuln/detail/CVE-2025-47912
CVE-2024-45341 medium https://nvd.nist.gov/vuln/detail/CVE-2024-45341
CVE-2026-6042 medium https://security.alpinelinux.org/vuln/CVE-2026-6042
CVE-2024-45336 medium https://nvd.nist.gov/vuln/detail/CVE-2024-45336
CVE-2025-13034 medium https://nvd.nist.gov/vuln/detail/CVE-2025-13034
CVE-2025-61730 medium https://nvd.nist.gov/vuln/detail/CVE-2025-61730
CVE-2025-60876 medium https://nvd.nist.gov/vuln/detail/CVE-2025-60876
CVE-2025-58186 medium https://nvd.nist.gov/vuln/detail/CVE-2025-58186
CVE-2026-3783 medium https://nvd.nist.gov/vuln/detail/CVE-2026-3783
CVE-2025-61724 medium https://nvd.nist.gov/vuln/detail/CVE-2025-61724
CVE-2025-14819 medium https://nvd.nist.gov/vuln/detail/CVE-2025-14819
CVE-2026-32288 medium https://nvd.nist.gov/vuln/detail/CVE-2026-32288
CVE-2025-58189 medium https://nvd.nist.gov/vuln/detail/CVE-2025-58189
CVE-2026-6042 medium https://security.alpinelinux.org/vuln/CVE-2026-6042
CVE-2025-22866 medium https://nvd.nist.gov/vuln/detail/CVE-2025-22866
CVE-2026-1965 medium https://nvd.nist.gov/vuln/detail/CVE-2026-1965
CVE-2025-61727 medium https://nvd.nist.gov/vuln/detail/CVE-2025-61727
CVE-2026-27139 low https://nvd.nist.gov/vuln/detail/CVE-2026-27139
CVE-2025-22873 low https://nvd.nist.gov/vuln/detail/CVE-2025-22873
CVE-2025-15224 low https://nvd.nist.gov/vuln/detail/CVE-2025-15224


generated with uds-pk scan compare

Comment thread tasks.yaml
@codyshoffner codyshoffner marked this pull request as ready for review April 29, 2026 18:56
@codyshoffner codyshoffner requested a review from a team as a code owner April 29, 2026 18:56
Comment thread adr/0001-record-architecture-decisions.md
Copy link
Copy Markdown
Contributor

@nywilken nywilken left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The clean up looks good and exhaustive. Linking out to the references in place of hardcoded examples helps reduce the noise.

Comment thread tests/auth.setup.ts
@michalszynkiewicz
Copy link
Copy Markdown
Contributor

LGTM, did you have a chance to check this with uds-mcp?

@codyshoffner
Copy link
Copy Markdown
Contributor Author

@michalszynkiewicz yes I have ran it a few times with uds-mcp and it seems to be having an easier time with it

@codyshoffner codyshoffner changed the title feat(WIP): testing CI feat: testing CI May 4, 2026
@codyshoffner codyshoffner changed the title feat: testing CI feat: enable ci testing May 4, 2026
@codyshoffner codyshoffner merged commit 03092a2 into main May 4, 2026
17 checks passed
@codyshoffner codyshoffner deleted the feat/enable-ci branch May 4, 2026 20:44
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants