8000 Disable CNA by default and only enable for object bucket · weaviate/weaviate@fe6e0e6 · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

Disable CNA by default and only enable for object bucket #23008

Disable CNA by default and only enable for object bucket

Disable CNA by default and only enable for object bucket #23008

Triggered via pull request July 1, 2025 08:43
Status Failure
Total duration 26m 27s
Artifacts 6

pull_requests.yaml

on: pull_request
modules-on-demand-tests-check
7s
modules-on-demand-tests-check
Matrix: integration-tests
Matrix: push-docker-fast
compile-and-upload-binaries
9m 4s
compile-and-upload-binaries
run-swagger
45s
run-swagger
vulnerability-scanning
2m 42s
vulnerability-scanning
sast-scanning
1m 59s
sast-scanning
buf-checks
12s
buf-checks
Matrix: acceptance-tests-large
Matrix: acceptance-tests
Matrix: modules-acceptance-tests
Matrix: modules-acceptance-tests-api
Matrix: modules-acceptance-tests-large
Matrix: modules-acceptance-tests-light
generate-docker-report
5s
generate-docker-report
acceptance-tests-windows
2m 19s
acceptance-tests-windows
push-docker
0s
push-docker
Fit to window
Zoom out
Zoom in

Annotations

1 error and 13 warnings
modules-acceptance-tests (--only-module-backup-gcs)
Final attempt failed. Child_process exited with error code 1
[MEDIUM] Accidental Mutation of Shared URL Struct in Go Code: adapters/handlers/rest/operations/authz/add_permissions_urlbuilder.go#L67
Details: The Shared URL struct might have been unintentionally modified. Verify that this modification is intentional. Recommendation: Review the usage of the shared URL struct to ensure that any mutations are intentional and do not introduce security vulnerabilities. Consider using immutable structures or appropriate synchronization mechanisms. Impact: LOW | Likelihood: LOW | Confidence: LOW
[HIGH] Potential Misuse of Read() with io.EOF in Go: adapters/repos/db/lsmkv/segment_serialization_inverted.go#L436
Details: The Read() function in Go can return fewer bytes than requested along with an io.EOF error. It is important to handle this correctly to avoid logic errors in your program. Always check the number of bytes read and handle io.EOF appropriately. Recommendation: Ensure that the Read() function is properly checked for the number of bytes read and the io.EOF error to avoid incorrect assumptions about the end of input data.
[HIGH] Missing RUnlock on RWMutex before function return: adapters/repos/db/lsmkv/segment_group.go#L490
Details: Ensure that `RUnlock` is called on an `RWMutex` (`$T` variable) lock before exiting a function to prevent potential deadlocks. Recommendation: Ensure that every RWMutex lock acquired with RLock is properly released with RUnlock before returning from a function. This prevents potential deadlocks and ensures proper resource management in concurrent Go applications. Impact: MEDIUM | Likelihood: HIGH | Confidence: MEDIUM
[HIGH] Missing RUnlock on RWMutex before function return: adapters/repos/db/lsmkv/segment_group.go#L490
Details: Ensure that `RUnlock` is called on an `RWMutex` (`$T` variable) lock before exiting a function to prevent potential deadlocks. Recommendation: Ensure that every RWMutex lock acquired with RLock is properly released with RUnlock before returning from a function. This prevents potential deadlocks and ensures proper resource management in concurrent Go applications. Impact: MEDIUM | Likelihood: HIGH | Confidence: MEDIUM
[HIGH] Missing RUnlock on RWMutex before function return: adapters/repos/db/lsmkv/segment_group.go#L479
Details: Ensure that `RUnlock` is called on an `RWMutex` (`$T` variable) lock before exiting a function to prevent potential deadlocks. Recommendation: Ensure that every RWMutex lock acquired with RLock is properly released with RUnlock before returning from a function. This prevents potential deadlocks and ensures proper resource management in concurrent Go applications. Impact: MEDIUM | Likelihood: HIGH | Confidence: MEDIUM
[HIGH] Missing RUnlock on RWMutex before function return: adapters/repos/db/lsmkv/segment_group.go#L479
Details: Ensure that `RUnlock` is called on an `RWMutex` (`$T` variable) lock before exiting a function to prevent potential deadlocks. Recommendation: Ensure that every RWMutex lock acquired with RLock is properly released with RUnlock before returning from a function. This prevents potential deadlocks and ensures proper resource management in concurrent Go applications. Impact: MEDIUM | Likelihood: HIGH | Confidence: MEDIUM
[HIGH] Exposed Go Profiling Endpoint Can Leak Sensitive Information: adapters/handlers/rest/configure_api.go#L1699
Details: Go's built-in profiling service can be accessed through the `/debug/pprof` endpoint when the `net/http/pprof` package is imported. This endpoint does not require authentication, allowing anonymous access, which poses a risk of exposing sensitive information. It is advised to disable this profiling feature in production environments by removing the `net/http/pprof` import from your code. Recommendation: Remove the `net/http/pprof` import to disable the profiling service in production. This prevents unauthorized access to the `/debug/pprof` endpoint, which can expose sensitive data.
[HIGH] Exposed Go Profiling Endpoint Can Leak Sensitive Information: adapters/handlers/rest/configure_api.go#L1695
Details: Go's built-in profiling service can be accessed through the `/debug/pprof` endpoint when the `net/http/pprof` package is imported. This endpoint does not require authentication, allowing anonymous access, which poses a risk of exposing sensitive information. It is advised to disable this profiling feature in production environments by removing the `net/http/pprof` import from your code. Recommendation: Remove the `net/http/pprof` import to disable the profiling service in production. This prevents unauthorized access to the `/debug/pprof` endpoint, which can expose sensitive data.
[HIGH] Exposed Go Profiling Endpoint Can Leak Sensitive Information: adapters/handlers/rest/configure_api.go#L272
Details: Go's built-in profiling service can be accessed through the `/debug/pprof` endpoint when the `net/http/pprof` package is imported. This endpoint does not require authentication, allowing anonymous access, which poses a risk of exposing sensitive information. It is advised to disable this profiling feature in production environments by removing the `net/http/pprof` import from your code. Recommendation: Remove the `net/http/pprof` import to disable the profiling service in production. This prevents unauthorized access to the `/debug/pprof` endpoint, which can expose sensitive data.
sast-scanning
Unexpected input(s) 'fetch-depth', valid inputs are ['entryPoint', 'args', 'api_token', 'exit_code', 'no_color', 'project_key', 'silent', 'disable_err_report', 'path', 'exclude_paths', 'format', 'output', 'timeout', 'preview_lines', 'console_output', 'config', 'show_annotations', 'max_file_size', 'display_name', 'debug', 'log_path']
compile-and-upload-binaries
No files were found with the provided path: dist/weaviate_linux_arm64. No artifacts will be uploaded.
compile-and-upload-binaries
No files were found with the provided path: dist/weaviate_windows_arm64. No artifacts will be uploaded.
modules-acceptance-tests (--only-module-backup-gcs)
Attempt 1 failed. Reason: Timeout of 900000ms hit

Artifacts

Produced during runtime
Name Size Digest
binaries-linux-amd64
60.5 MB
sha256:836bef0a307d5e44b4eeb2ae216af08bf098e802c668bd205bfdf796e7aa6b1a
binaries-macos-unsigned
121 MB
sha256:33ae79c6af28272b2f0094d7da007bd0a20b28e4b0a3415bc8d53683949c7f6a
binaries-windows-amd64
61 MB
sha256:6098d1a824f24e811ac250977ee2570b104202653d21d92b9dfdcce7ee151035
coverage-report-integration--integration-vector-package-only
898 KB
sha256:ca35699ebfcf5346c2f395908c6c34a0c3689767b7487764898196ec3e81410f
coverage-report-integration--integration-without-vector-package
2.42 MB
sha256:622ebed6344dcd007104a5c10ea79e13b0f23cf9227ebb850807d2485c29171f
coverage-report-unit
655 KB
sha256:3c587adbcc99580c3f2d0a4d3da34b28bc131f5044e1baeb2da527f6f856ce48
0