Chore/k8s updates dec3 #2505
No reviewers
Labels
No labels
1week
2weeks
Failed compliance check
IP cameras
NATS
Possible security concern
Review effort 1/5
Review effort 2/5
Review effort 3/5
Review effort 4/5
Review effort 5/5
UI
aardvark
accessibility
amd64
api
arm64
auth
back-end
bgp
blog
bug
build
checkers
ci-cd
cleanup
cnpg
codex
core
dependencies
device-management
documentation
duplicate
dusk
ebpf
enhancement
eta 1d
eta 1hr
eta 3d
eta 3hr
feature
fieldsurvey
github_actions
go
good first issue
help wanted
invalid
javascript
k8s
log-collector
mapper
mtr
needs-triage
netflow
network-sweep
observability
oracle
otel
plug-in
proton
python
question
reddit
redhat
research
rperf
rperf-checker
rust
sdk
security
serviceradar-agent
serviceradar-agent-gateway
serviceradar-web
serviceradar-web-ng
siem
snmp
sysmon
topology
ubiquiti
wasm
wontfix
zen-engine
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
carverauto/serviceradar!2505
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "refs/pull/2505/head"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Imported from GitHub pull request.
Original GitHub pull request: #2055
Original author: @mfreeman451
Original URL: https://github.com/carverauto/serviceradar/pull/2055
Original created: 2025-12-04T04:17:31Z
Original updated: 2025-12-04T05:49:44Z
Original head: carverauto/serviceradar:chore/k8s_updates_dec3
Original base: main
Original merged: 2025-12-04T05:46:54Z by @mfreeman451
User description
IMPORTANT: Please sign the Developer Certificate of Origin
Thank you for your contribution to ServiceRadar. Please note, when contributing, the developer must include
a DCO sign-off statement indicating the DCO acceptance in one commit message. Here
is an example DCO Signed-off-by line in a commit message:
Describe your changes
Issue ticket number and link
Code checklist before requesting a review
PR Type
Enhancement, Other
Description
Update Next.js, React, and related dependencies to latest versions
Add database sequence privileges migration for AGE graph support
Configure CNPG runtime parameters with search_path setting
Increase SPIRE memory resource limits (256Mi → 512Mi)
Update application image tag to latest commit
Diagram Walkthrough
File Walkthrough
BUILD.bazel
Update npm package versions and hashesweb/BUILD.bazel
use-debounce)
MODULE.bazel
Update Bazel module dependencies and repositoriesMODULE.bazel
d3-hierarchy, dagre
package.json
Synchronize package.json with dependency updatesweb/package.json
serviceradar-config.yaml
Add CNPG runtime parameters configurationhelm/serviceradar/files/serviceradar-config.yaml
values.yaml
Update image tag, CNPG params, and resource limitshelm/serviceradar/values.yaml
00000000000017_age_sequence_privileges.up.sql
Add database sequence privileges for AGE graphspkg/db/cnpg/migrations/00000000000017_age_sequence_privileges.up.sql
schema
Imported GitHub PR comment.
Original author: @qodo-code-review[bot]
Original URL: https://github.com/carverauto/serviceradar/pull/2055#issuecomment-3610017414
Original created: 2025-12-04T04:18:08Z
PR Compliance Guide 🔍
Below is a summary of compliance checks for this PR:
No security concerns identified
No security vulnerabilities detected by AI analysis. Human verification advised for critical code.🎫 No ticket provided
Codebase context is not defined
Follow the guide to enable codebase context checks.
Generic: Meaningful Naming and Self-Documenting Code
Objective: Ensure all identifiers clearly express their purpose and intent, making code
self-documenting
Status: Passed
Generic: Secure Error Handling
Objective: To prevent the leakage of sensitive system information through error messages while
providing sufficient detail for internal debugging.
Status: Passed
Generic: Secure Logging Practices
Objective: To ensure logs are useful for debugging and auditing without exposing sensitive
information like PII, PHI, or cardholder data.
Status: Passed
Generic: Security-First Input Validation and Data Handling
Objective: Ensure all data inputs are validated, sanitized, and handled securely to prevent
vulnerabilities
Status: Passed
Generic: Comprehensive Audit Trails
Objective: To create a detailed and reliable record of critical system actions for security analysis
and compliance.
Status:
No audit logs: The migration grants sequence privileges but introduces no logging of this critical
permission change event.
Referred Code
Generic: Robust Error Handling and Edge Case Management
Objective: Ensure comprehensive error handling that provides meaningful context and graceful
degradation
Status:
Limited error handling: The DO block performs grants without exception handling or rollback strategy, which may
leave partial state if an error occurs.
Referred Code
Compliance status legend
🟢 - Fully Compliant🟡 - Partial Compliant
🔴 - Not Compliant
⚪ - Requires Further Human Verification
🏷️ - Compliance label
Imported GitHub PR comment.
Original author: @qodo-code-review[bot]
Original URL: https://github.com/carverauto/serviceradar/pull/2055#issuecomment-3610019808
Original created: 2025-12-04T04:19:04Z
PR Code Suggestions ✨
Explore these optional code suggestions:
Resolve duplicate dependency versions
Consolidate the two different major versions of
zod(v3 and v4) to a singleversion to avoid potential runtime errors and type mismatches.
web/pnpm-lock.yaml [3064-3068]
[To ensure code accuracy, apply this suggestion manually]Suggestion importance[1-10]: 9
__
Why: The suggestion correctly identifies that two major versions of
zodare present in the lockfile, which can cause critical runtime issues and type mismatches, and provides a correct solution.Fix incorrect PostgreSQL search path
Remove the quotes and escaping around
$userin thesearch_pathconfiguration toensure it correctly resolves to the current session user's schema.
helm/serviceradar/values.yaml [105-106]
Suggestion importance[1-10]: 9
__
Why: The suggestion correctly identifies a critical bug in the PostgreSQL
search_pathconfiguration that would cause runtime failures by treating$useras a literal schema name instead of a special placeholder.Improve database migration performance
Replace the loop that grants privileges to each sequence individually with a
single
GRANT ... ON ALL SEQUENCES IN SCHEMA ...statement for better performanceand simplicity.
pkg/db/cnpg/migrations/00000000000017_age_sequence_privileges.up.sql [13-22]
Suggestion importance[1-10]: 6
__
Why: The suggestion correctly proposes a more efficient and readable way to grant privileges on all sequences using a single SQL statement, replacing a less efficient loop.