Skip to content

refactor(server-nestjs): migrate package managers to NestJS#1980

Merged
shikanime merged 1 commit intomainfrom
pr1980
Apr 30, 2026
Merged

refactor(server-nestjs): migrate package managers to NestJS#1980
shikanime merged 1 commit intomainfrom
pr1980

Conversation

@shikanime
Copy link
Copy Markdown
Member

@shikanime shikanime commented Mar 6, 2026

Signed-off-by: William Phetsinorath william.phetsinorath-open@interieur.gouv.fr
Change-Id: I37010cbbfad6e0ac2dbd2adb8e560be36a6a6964


Stack created with Sapling. Best reviewed with ReviewStack.

@shikanime shikanime changed the base branch from main to pr1958 March 6, 2026 14:36
@shikanime shikanime marked this pull request as draft March 6, 2026 14:39
@shikanime shikanime force-pushed the pr1980 branch 2 times, most recently from 0798bdd to 2edf706 Compare March 9, 2026 10:35
@shikanime shikanime force-pushed the pr1958 branch 2 times, most recently from 31f5dfc to 6aef06f Compare March 9, 2026 11:30
@shikanime shikanime force-pushed the pr1980 branch 2 times, most recently from 786f110 to 56c2848 Compare March 9, 2026 13:22
@github-actions
Copy link
Copy Markdown
Contributor

🤖 Hey !

The security scan report for the current pull request is available here.

1 similar comment
@github-actions
Copy link
Copy Markdown
Contributor

🤖 Hey !

The security scan report for the current pull request is available here.

@github-actions
Copy link
Copy Markdown
Contributor

🤖 Hey !

The security scan report for the current pull request is available here.

11 similar comments
@github-actions
Copy link
Copy Markdown
Contributor

🤖 Hey !

The security scan report for the current pull request is available here.

@github-actions
Copy link
Copy Markdown
Contributor

🤖 Hey !

The security scan report for the current pull request is available here.

@github-actions
Copy link
Copy Markdown
Contributor

🤖 Hey !

The security scan report for the current pull request is available here.

@github-actions
Copy link
Copy Markdown
Contributor

🤖 Hey !

The security scan report for the current pull request is available here.

@github-actions
Copy link
Copy Markdown
Contributor

🤖 Hey !

The security scan report for the current pull request is available here.

@github-actions
Copy link
Copy Markdown
Contributor

🤖 Hey !

The security scan report for the current pull request is available here.

@github-actions
Copy link
Copy Markdown
Contributor

🤖 Hey !

The security scan report for the current pull request is available here.

@github-actions
Copy link
Copy Markdown
Contributor

🤖 Hey !

The security scan report for the current pull request is available here.

@github-actions
Copy link
Copy Markdown
Contributor

🤖 Hey !

The security scan report for the current pull request is available here.

@github-actions
Copy link
Copy Markdown
Contributor

🤖 Hey !

The security scan report for the current pull request is available here.

@github-actions
Copy link
Copy Markdown
Contributor

🤖 Hey !

The security scan report for the current pull request is available here.

@github-actions
Copy link
Copy Markdown
Contributor

🤖 Hey !

The security scan report for the current pull request is available here.

@github-actions
Copy link
Copy Markdown
Contributor

🤖 Hey !

The security scan report for the current pull request is available here.

1 similar comment
@github-actions
Copy link
Copy Markdown
Contributor

🤖 Hey !

The security scan report for the current pull request is available here.

Signed-off-by: William Phetsinorath <william.phetsinorath-open@interieur.gouv.fr>
Change-Id: I37010cbbfad6e0ac2dbd2adb8e560be36a6a6964
@github-actions
Copy link
Copy Markdown
Contributor

🤖 Hey !

The security scan report for the current pull request is available here.

3 similar comments
@github-actions
Copy link
Copy Markdown
Contributor

🤖 Hey !

The security scan report for the current pull request is available here.

@github-actions
Copy link
Copy Markdown
Contributor

🤖 Hey !

The security scan report for the current pull request is available here.

@github-actions
Copy link
Copy Markdown
Contributor

🤖 Hey !

The security scan report for the current pull request is available here.

@cloud-pi-native-sonarqube
Copy link
Copy Markdown

@github-actions
Copy link
Copy Markdown
Contributor

🤖 Hey !

The security scan report for the current pull request is available here.

1 similar comment
@github-actions
Copy link
Copy Markdown
Contributor

🤖 Hey !

The security scan report for the current pull request is available here.

Copy link
Copy Markdown
Collaborator

@StephaneTrebel StephaneTrebel left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Des questions, pas des problèmes, donc LGTM 🚀


const server = setupServer()
const nexusAdminPassword = faker.internet.password()
const basicAuth = `Basic ${Buffer.from(`admin:${nexusAdminPassword}`, 'utf8').toString('base64')}`
Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nitpick: Chuis un peu d'accord avec Sonarqube sur le principe, mais bon là c'est suffisament élémentaire pour ne pas être un problème

@@ -0,0 +1,33 @@
// Registry plugin identification
export const REGISTRY_PLUGIN_NAME = 'harbor'
Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thought: Finalement pourquoi on n'appellerait pas le module harbor plutôt que registry ? On a des variables, de la log, etc. qui disent "Harbor", mais le module/service s'appelle registry ? On rajoute de la confusion, je trouve 🤔

expect(client.deleteIdentityGroupName).toHaveBeenCalledWith(`project-${project.slug}-devops`)
expect(client.deleteIdentityGroupName).toHaveBeenCalledWith(`project-${project.slug}-developer`)
expect(client.deleteIdentityGroupName).toHaveBeenCalledWith(`project-${project.slug}-readonly`)
expect(client.deleteIdentityGroupName).toHaveBeenCalledWith(`project-${project.slug}-security`)
Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thought: Ptet qu'à un moment donné je me demande si on ne s'interdirait les toHaveBeenCalledWith. J'ai toujours eu la sensation que si on se sent obligés d'utiliser ça, c'est qu'on a un problème soit de testabilité du SUT, soit qu'on ne teste pas au bon niveau (trop abstrait ou pas assez)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

built preview Deploy preview app with Argo-cd tech Technical issue

Projects

None yet

Development

Successfully merging this pull request may close these issues.

💡 [REQUEST] - Etude de l'implémentation des RBAC avec NestJs

2 participants