Skip to content

feat: start pgo pool from kura config and auto-generate UUIDs#79

Merged
Taure merged 1 commit intomainfrom
feat/pool-from-config
Mar 29, 2026
Merged

feat: start pgo pool from kura config and auto-generate UUIDs#79
Taure merged 1 commit intomainfrom
feat/pool-from-config

Conversation

@Taure
Copy link
Copy Markdown
Owner

@Taure Taure commented Mar 29, 2026

Summary

  • Kura now starts the pgo pool during kura_app:start from its own app env config, eliminating duplicate connection config
  • kura_repo:config/1 reads from kura app env first, falls back to old per-app config for backward compatibility
  • Auto-generates UUID v4 for uuid primary key fields on insert when no value is provided

Test plan

  • Verified pool starts correctly from kura config
  • Verified UUID auto-generation on insert
  • Full simulation test passing

🤖 Generated with Claude Code

…keys

Kura now reads database connection config from its own app env
({kura, [{repo, ...}, {host, ...}, ...]}) and starts the pgo pool
during kura_app:start. This eliminates duplicate config across pgo
and the consuming app. Falls back to the old per-app config for
backward compatibility.

Also auto-generates UUID v4 for uuid primary key fields on insert
when no value is provided.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
@Taure Taure force-pushed the feat/pool-from-config branch from 991587f to 57abfb0 Compare March 29, 2026 06:31
@Taure Taure merged commit e76dcd7 into main Mar 29, 2026
2 checks passed
@Taure Taure deleted the feat/pool-from-config branch March 29, 2026 06:31
@github-actions
Copy link
Copy Markdown

🟢 Code Coverage — 93.4%

1910 of 2046 lines covered.


🟡 ELP Lint — 1 warning

5 diagnostics found. See job logs for details.


ℹ️ 11 OTP CVEs auto-ignored (already fixed in running version)

These CVEs are patched in the installed OTP version but NVD data
has not been updated to reflect this. They are excluded from the
scan via an auto-generated .trivyignore.

CVE Details
CVE-2026-23943 Fixed in 28.4.1, running 28.4.1 — Pre-auth SSH DoS via unbounded zlib inflate
CVE-2026-23942 Fixed in 28.4.1, running 28.4.1 — SFTP root escape via component-agnostic prefix check in ssh_sftpd
CVE-2026-23941 Fixed in 28.4.1, running 28.4.1 — Request smuggling via first-wins Content-Length parsing in inets httpd
CVE-2026-21620 Fixed in 28.3.2, running 28.4.1 — TFTP Path Traversal
CVE-2016-1000107 Fixed in 28.0.4, running 28.4.1 — Httpd CGI Scripts Environment Variable Pollution AKA "httpoxy"
CVE-2025-58050 Fixed in 28.0.3, running 28.4.1 — Buffer Read Overflow on Regular Expressions with (*scs:) and (*ACCEPT)
CVE-2025-48038 Fixed in 28.0.3, running 28.4.1 — SSH Unverified File Handles can Cause Excessive Use of System Resources
CVE-2025-48039 Fixed in 28.0.3, running 28.4.1 — SSH Unverified Paths can Cause Excessive Use of System Resources
CVE-2025-48040 Fixed in 28.0.3, running 28.4.1 — SSH Malicious Key Exchange Messages may Lead to Excessive Resource Consumption
CVE-2025-48041 Fixed in 28.0.3, running 28.4.1 — SSH_FXP_OPENDIR may Lead to Exhaustion of File Handles
CVE-2025-4748 Fixed in 28.0.1, running 28.4.1 — Absolute Path in Zip Module

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant