Skip to content

Feat/upgrade lib commons v3.0.0 beta.18#563

Merged
jeffersonrodrigues92 merged 3 commits intodevelopfrom
feat/upgrade-lib-commons-v3.0.0-beta.18
Mar 6, 2026
Merged

Feat/upgrade lib commons v3.0.0 beta.18#563
jeffersonrodrigues92 merged 3 commits intodevelopfrom
feat/upgrade-lib-commons-v3.0.0-beta.18

Conversation

@jeffersonrodrigues92
Copy link
Contributor

Pull Request Checklist

Pull Request Type

  • Manager
  • Worker
  • Frontend
  • Infrastructure
  • Packages
  • Pipeline
  • Tests
  • Documentation

Checklist

Please check each item after it's completed.

  • I have tested these changes locally.
  • I have updated the documentation accordingly.
  • I have added necessary comments to the code, especially in complex areas.
  • I have ensured that my changes adhere to the project's coding standards.
  • I have checked for any potential security issues.
  • I have ensured that all tests pass.
  • I have updated the version appropriately (if applicable).
  • I have confirmed this code is ready for review.

Additional Notes

Obs: Please, always remember to target your PR to develop branch instead of main.

Includes granular error handling in TenantMiddleware (404/422 instead of 500).

X-Lerian-Ref: 0x1
X-Lerian-Ref: 0x1
@jeffersonrodrigues92 jeffersonrodrigues92 requested review from a team as code owners March 6, 2026 22:59
@jeffersonrodrigues92 jeffersonrodrigues92 merged commit 3ec6197 into develop Mar 6, 2026
10 of 12 checks passed
@jeffersonrodrigues92 jeffersonrodrigues92 deleted the feat/upgrade-lib-commons-v3.0.0-beta.18 branch March 6, 2026 22:59
@lerian-studio
Copy link
Contributor

Consider updating CHANGELOG.md to document this change. If this change doesn't need a changelog entry, add the skip-changelog label.

@coderabbitai
Copy link

coderabbitai bot commented Mar 6, 2026

Caution

Review failed

The pull request is closed.

ℹ️ Recent review info
⚙️ Run configuration

Configuration used: Organization UI

Review profile: ASSERTIVE

Plan: Pro

Run ID: 1aa991ff-2aec-4a39-a7f8-0963574dc17c

📥 Commits

Reviewing files that changed from the base of the PR and between 8a2b8b1 and a85edf3.

⛔ Files ignored due to path filters (1)
  • go.sum is excluded by !**/*.sum
📒 Files selected for processing (4)
  • README.md
  • components/manager/Dockerfile
  • components/worker/Dockerfile
  • go.mod

Walkthrough

This pull request includes four minor formatting and maintenance updates. The README.md file receives a blank line addition after the banner image. Two Dockerfile files (manager and worker) have trailing spaces added to their syntax directive lines. The go.mod dependency file updates the github.com/LerianStudio/lib-commons/v3 package from version v3.0.0-beta.17 to v3.0.0-beta.18. These changes introduce no functional modifications or behavioral alterations to the codebase.


Comment @coderabbitai help to get the list of available commands and usage tips.

@lerian-studio
Copy link
Contributor

📊 Unit Test Coverage Report: reporter-worker

Metric Value
Overall Coverage 90.9% ✅ PASS
Threshold 85%

Coverage by Package

Package Coverage
github.com/LerianStudio/reporter/components/worker/internal/services 93.0%

Generated by Go PR Analysis workflow

@lerian-studio
Copy link
Contributor

📊 Unit Test Coverage Report: reporter-manager

Metric Value
Overall Coverage 89.0% ✅ PASS
Threshold 85%

Coverage by Package

Package Coverage
github.com/LerianStudio/reporter/components/manager/internal/adapters/http/in 84.6%
github.com/LerianStudio/reporter/components/manager/internal/services 91.5%

Generated by Go PR Analysis workflow

@github-actions
Copy link

github-actions bot commented Mar 6, 2026

🔒 Security Scan Results — manager

Filesystem Scan

✅ No vulnerabilities or secrets found.

Docker Image Scan

Severity Vulnerability Title
CRITICAL/HIGH CVE-2026-22184 zlib: zlib: Arbitrary code execution via buffer overflow in untgz utility
MEDIUM CVE-2026-27171 zlib: zlib: Denial of Service via infinite loop in CRC32 combine functions

@github-actions
Copy link

github-actions bot commented Mar 6, 2026

🔒 Security Scan Results — worker

Filesystem Scan

✅ No vulnerabilities or secrets found.

Docker Image Scan

Severity Vulnerability Title
CRITICAL/HIGH CVE-2026-22184 zlib: zlib: Arbitrary code execution via buffer overflow in untgz utility
MEDIUM CVE-2026-27171 zlib: zlib: Denial of Service via infinite loop in CRC32 combine functions

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants