Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support new Weaviate 1.29 features #261

Merged
merged 20 commits into from
Feb 18, 2025
Merged

Support new Weaviate 1.29 features #261

merged 20 commits into from
Feb 18, 2025

Conversation

tsmith023
Copy link
Collaborator

@tsmith023 tsmith023 commented Feb 7, 2025

  • Adds full support for RBAC in its GA state in client.roles and client.users namespaces
  • Replaces the GQL backend of collection.aggregate with gRPC for versions >= 1.29.0. Falls-back to GQL otherwise

Copy link

@orca-security-eu orca-security-eu bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Orca Security Scan Summary

Status Check Issues by priority
Passed Passed Infrastructure as Code high 0   medium 1   low 3   info 3 View in Orca
Passed Passed SAST high 0   medium 9   low 0   info 0 View in Orca
Passed Passed Secrets high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Vulnerabilities high 0   medium 0   low 0   info 0 View in Orca
🛡️ The following IaC misconfigurations have been detected
NAME FILE
medium Controller creating containers without dropped capabilities ...ker-compose-rbac.yml View in code
low Memory Not Limited ...ker-compose-rbac.yml View in code
low Container Traffic Not Bound To Host Interface ...ker-compose-rbac.yml View in code
low Cpus Not Limited ...ker-compose-rbac.yml View in code
info Healthcheck Not Set ...ker-compose-rbac.yml View in code
info Restart Policy On Failure Not Set To 5 ...ker-compose-rbac.yml View in code
info Ensure that, if applicable, SELinux security options are set (Automated) ...ker-compose-rbac.yml View in code
🛡️ The following SAST misconfigurations have been detected
NAME FILE
medium Detects Potential Object Injection via User Input ...to/v1/base_search.ts View in code
medium Detects Potential Object Injection via User Input ...to/v1/base_search.ts View in code
medium Detects Potential Object Injection via User Input ...to/v1/base_search.ts View in code
medium Detects Potential Object Injection via User Input ...to/v1/base_search.ts View in code
medium Detects Potential Object Injection via User Input ...to/v1/base_search.ts View in code
medium Detects Potential Object Injection via User Input ...to/v1/base_search.ts View in code
medium Detects Potential Object Injection via User Input ...to/v1/base_search.ts View in code
medium Detects Potential Object Injection via User Input ...to/v1/base_search.ts View in code
medium Detects Potential Object Injection via User Input ...to/v1/base_search.ts View in code

@weaviate-git-bot
Copy link

Great to see you again! Thanks for the contribution.

beep boop - the Weaviate bot 👋🤖

PS:
Are you already a member of the Weaviate Slack channel?

- Split `roles` with `users`
- make `actions` an array inside `permissions`
- rename several methods to be aligned with py client in a non-BC way
- only run roles/users tests for `>1.29` due to no BC
Refactor `roles` namespace, adding `users`, to align with new Python API
…ient

Update roles API to use latest schema and align with recent py changes
@tsmith023 tsmith023 changed the title Dev/1.29 Support new Weaviate 1.29 features Feb 17, 2025
@tsmith023 tsmith023 marked this pull request as ready for review February 17, 2025 13:09
@tsmith023 tsmith023 requested a review from a team as a code owner February 17, 2025 13:09
@tsmith023 tsmith023 merged commit 3a19ce7 into main Feb 18, 2025
12 of 14 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants