8000 Adjust alias resolution implementation to not to alter the current API's flow · weaviate/weaviate@b7d9555 · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

Adjust alias resolution implementation to not to alter the current API's flow #23007

Adjust alias resolution implementation to not to alter the current API's flow

Adjust alias resolution implementation to not to alter the current API's flow #23007

Triggered via pull request July 1, 2025 08:43
Status Failure
Total duration 25m 17s
Artifacts 5

pull_requests.yaml

on: pull_request
modules-on-demand-tests-check
4s
modules-on-demand-tests-check
Matrix: integration-tests
Matrix: push-docker-fast
compile-and-upload-binaries
9m 10s
compile-and-upload-binaries
buf-checks
11s
buf-checks
Matrix: acceptance-tests-large
Matrix: acceptance-tests
Matrix: modules-acceptance-tests
Matrix: modules-acceptance-tests-api
Matrix: modules-acceptance-tests-large
Matrix: modules-acceptance-tests-light
codecov
0s
codecov
generate-docker-report
6s
generate-docker-report
acceptance-tests-windows
1m 47s
acceptance-tests-windows
push-docker
0s
push-docker
Fit to window
Zoom out
Zoom in

Annotations

3 errors and 12 warnings
unit-tests
Process completed with exit code 1.
acceptance-tests (--acceptance-go-client-only-fast)
Process completed with exit code 1.
acceptance-tests (--acceptance-only-fast)
Process completed with exit code 1.
[MEDIUM] Accidental Mutation of Shared URL Struct in Go Code: adapters/handlers/rest/operations/authz/add_permissions_urlbuilder.go#L67
Details: The Shared URL struct might have been unintentionally modified. Verify that this modification is intentional. Recommendation: Review the usage of the shared URL struct to ensure that any mutations are intentional and do not introduce security vulnerabilities. Consider using immutable structures or appropriate synchronization mechanisms. Impact: LOW | Likelihood: LOW | Confidence: LOW
[HIGH] Potential Misuse of Read() with io.EOF in Go: adapters/repos/db/lsmkv/segment_serialization_inverted.go#L436
Details: The Read() function in Go can return fewer bytes than requested along with an io.EOF error. It is important to handle this correctly to avoid logic errors in your program. Always check the number of bytes read and handle io.EOF appropriately. Recommendation: Ensure that the Read() function is properly checked for the number of bytes read and the io.EOF error to avoid incorrect assumptions about the end of input data.
[HIGH] Missing RUnlock on RWMutex before function return: adapters/repos/db/lsmkv/segment_group.go#L490
Details: Ensure that `RUnlock` is called on an `RWMutex` (`$T` variable) lock before exiting a function to prevent potential deadlocks. Recommendation: Ensure that every RWMutex lock acquired with RLock is properly released with RUnlock before returning from a function. This prevents potential deadlocks and ensures proper resource management in concurrent Go applications. Impact: MEDIUM | Likelihood: HIGH | Confidence: MEDIUM
[HIGH] Missing RUnlock on RWMutex before function return: adapters/repos/db/lsmkv/segment_group.go#L490
Details: Ensure that `RUnlock` is called on an `RWMutex` (`$T` variable) lock before exiting a function to prevent potential deadlocks. Recommendation: Ensure that every RWMutex lock acquired with RLock is properly released with RUnlock before returning from a function. This prevents potential deadlocks and ensures proper resource management in concurrent Go applications. Impact: MEDIUM | Likelihood: HIGH | Confidence: MEDIUM
[HIGH] Missing RUnlock on RWMutex before function return: adapters/repos/db/lsmkv/segment_group.go#L479
Details: Ensure that `RUnlock` is called on an `RWMutex` (`$T` variable) lock before exiting a function to prevent potential deadlocks. Recommendation: Ensure that every RWMutex lock acquired with RLock is properly released with RUnlock before returning from a function. This prevents potential deadlocks and ensures proper resource management in concurrent Go applications. Impact: MEDIUM | Likelihood: HIGH | Confidence: MEDIUM
[HIGH] Missing RUnlock on RWMutex before function return: adapters/repos/db/lsmkv/segment_group.go#L479
Details: Ensure that `RUnlock` is called on an `RWMutex` (`$T` variable) lock before exiting a function to prevent potential deadlocks. Recommendation: Ensure that every RWMutex lock acquired with RLock is properly released with RUnlock before returning from a function. This prevents potential deadlocks and ensures proper resource management in concurrent Go applications. Impact: MEDIUM | Likelihood: HIGH | Confidence: MEDIUM
[HIGH] Exposed Go Profiling Endpoint Can Leak Sensitive Information: adapters/handlers/rest/configure_api.go#L1735
Details: Go's built-in profiling service can be accessed through the `/debug/pprof` endpoint when the `net/http/pprof` package is imported. This endpoint does not require authentication, allowing anonymous access, which poses a risk of exposing sensitive information. It is advised to disable this profiling feature in production environments by removing the `net/http/pprof` import from your code. Recommendation: Remove the `net/http/pprof` import to disable the profiling service in production. This prevents unauthorized access to the `/debug/pprof` endpoint, which can expose sensitive data.
[HIGH] Exposed Go Profiling Endpoint Can Leak Sensitive Information: adapters/handlers/rest/configure_api.go#L1731
Details: Go's built-in profiling service can be accessed through the `/debug/pprof` endpoint when the `net/http/pprof` package is imported. This endpoint does not require authentication, allowing anonymous access, which poses a risk of exposing sensitive information. It is advised to disable this profiling feature in production environments by removing the `net/http/pprof` import from your code. Recommendation: Remove the `net/http/pprof` import to disable the profiling service in production. This prevents unauthorized access to the `/debug/pprof` endpoint, which can expose sensitive data.
[HIGH] Exposed Go Profiling Endpoint Can Leak Sensitive Information: adapters/handlers/rest/configure_api.go#L300
Details: Go's built-in profiling service can be accessed through the `/debug/pprof` endpoint when the `net/http/pprof` package is imported. This endpoint does not require authentication, allowing anonymous access, which poses a risk of exposing sensitive information. It is advised to disable this profiling feature in production environments by removing the `net/http/pprof` import from your code. Recommendation: Remove the `net/http/pprof` import to disable the profiling service in production. This prevents unauthorized access to the `/debug/pprof` endpoint, which can expose sensitive data.
sast-scanning
Unexpected input(s) 'fetch-depth', valid inputs are ['entryPoint', 'args', 'api_token', 'exit_code', 'no_color', 'project_key', 'silent', 'disable_err_report', 'path', 'exclude_paths', 'format', 'output', 'timeout', 'preview_lines', 'console_output', 'config', 'show_annotations', 'max_file_size', 'display_name', 'debug', 'log_path']
compile-and-upload-binaries
No files were found with the provided path: dist/weaviate_linux_arm64. No artifacts will be uploaded.
compile-and-upload-binaries
No files were found with the provided path: dist/weaviate_windows_arm64. No artifacts will be uploaded.

Artifacts

Produced during runtime
Name Size Digest
binaries-linux-amd64
60.6 MB
sha256:a72d69fa058543170c507856dc3e7c5c1d02212087f81edd34ec5ef56eb8eb81
binaries-macos-unsigned
121 MB
sha256:c76aca87c5764c292ba33206289f0c9e23f16fcb19736d657a790ab26e98cc1f
binaries-windows-amd64
61.1 MB
sha256:83a66417bc7d7bc7b17c3bfa1a7767e17690127cc3db02496ff54aabc06fd5ac
coverage-report-integration--integration-vector-package-only
968 KB
sha256:e07a177dea8cbde2858d19da381a357d08bd54d7f4a93132980347cf32575c6b
coverage-report-integration--integration-without-vector-package
2.44 MB
sha256:4802474ac0d6a0b68aa23ee166e7f83678c801de858ea842bf75db53a56e2750
0