Temporary fix to handle "null" subject names in security analysis result#244
Conversation
|
No actionable comments were generated in the recent review. 🎉 ℹ️ Recent review info⚙️ Run configurationConfiguration used: Organization UI Review profile: CHILL Plan: Pro Run ID: 📒 Files selected for processing (2)
📝 WalkthroughWalkthroughSecurityAnalysisResultEntity adds a normalization helper that converts the literal string "null" to actual null when building the unique subject violations list. A new test validates that two limit violations—one with null and one with "null"—are properly deduplicated in the resulting entity. ChangesSubject Name Normalization
🚥 Pre-merge checks | ✅ 4 | ❌ 1❌ Failed checks (1 warning)
✅ Passed checks (4 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
|



PR Summary
In powsybl, limit violation can be created with "null" or null subject name. This is an issue for our code where we try to make distinct pairs relying on subjectid/subjectname (null is considered different to "null").
This fix can be reverted once powsybl/powsybl-core#3922 is merged.