Skip to content

Conversation

@seanspeaks
Copy link
Contributor

@seanspeaks seanspeaks commented Dec 7, 2025

Summary

Fixes #514 - UpdateIntegration was passing the new config instead of the existing database config to the integration constructor, breaking partial update semantics.

  • Pass integrationRecord.config (existing) instead of config (new) to constructor
  • Integration's onUpdate handler now correctly receives existing config in this.config and new config in params.config
  • Partial updates now preserve unspecified fields as expected

Test plan

  • Added TDD tests verifying this.config contains existing database values when onUpdate is called
  • Added tests verifying partial config updates preserve unspecified fields
  • Added tests verifying nested values are preserved during partial updates
  • All 95 integration use-case tests pass

…tion

Fixes #514 - UpdateIntegration was passing the new config instead of the
existing database config to the integration constructor. This broke partial
update semantics where onUpdate methods expect to merge changes with the
current state via patterns like this._deepMerge(this.config, params.config).

Changes:
- Pass integrationRecord.config (existing) instead of config (new) to constructor
- Add TDD tests verifying partial config update preserves unspecified fields
- Update DummyIntegration test double to implement proper onUpdate merge behavior
- Add ConfigCapturingIntegration test double for verifying config state
@seanspeaks seanspeaks changed the base branch from main to next December 7, 2025 05:33
@gitguardian
Copy link

gitguardian bot commented Dec 7, 2025

⚠️ GitGuardian has uncovered 1 secret following the scan of your pull request.

Please consider investigating the findings and remediating the incidents. Failure to do so may lead to compromising the associated services or software components.

🔎 Detected hardcoded secret in your pull request
GitGuardian id GitGuardian status Secret Commit Filename
22520632 Triggered Generic High Entropy Secret 29da1f3 packages/core/credential/repositories/tests/credential-repository-documentdb-encryption.test.js View secret
🛠 Guidelines to remediate hardcoded secrets
  1. Understand the implications of revoking this secret by investigating where it is used in your code.
  2. Replace and store your secret safely. Learn here the best practices.
  3. Revoke and rotate this secret.
  4. If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.

To avoid such incidents in the future consider


🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.

@sonarqubecloud
Copy link

sonarqubecloud bot commented Dec 7, 2025

Quality Gate Failed Quality Gate failed

Failed conditions
316 Security Hotspots
5.4% Duplication on New Code (required ≤ 3%)
E Security Rating on New Code (required ≥ A)
D Reliability Rating on New Code (required ≥ A)

See analysis details on SonarQube Cloud

Catch issues before they fail your Quality Gate with our IDE extension SonarQube for IDE

@seanspeaks seanspeaks changed the title feat(vpc): Default to stage-specific subnets for isolation fix: pass existing config to integration constructor in UpdateIntegration Dec 7, 2025
@seanspeaks seanspeaks merged commit 0d369ea into next Dec 7, 2025
12 of 27 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants