CCI report: 1a33f3f8-4c05-4003-93d8-970e43737367

Request message

{
  "request": "trigger",
  "version": 1,
  "event_type": "patch",
  "repository": {
    "id": "rad:z3gqcJUoA1n9HaHKufZs5FCSGazv5",
    "name": "heartwood",
    "description": "Radicle Heartwood Protocol & Stack",
    "private": false,
    "default_branch": "master",
    "delegates": [
      "did:key:z6MksFqXN3Yhqk8pTJdUGLwATkRfQvwZXPqR2qMEhbS9wzpT",
      "did:key:z6MktaNvN1KVFMkSRAiN4qK5yvX1zuEEaseeX5sffhzPZRZW",
      "did:key:z6MkireRatUThvd3qzfKht1S44wpm4FEWSSa4PRMTSQZ3voM",
      "did:key:z6MkgFq6z5fkF2hioLLSNu1zP2qEL1aHXHZzGH1FLFGAnBGz",
      "did:key:z6MkkPvBfjP4bQmco5Dm7UGsX2ruDBieEHi8n9DVJWX5sTEz"
    ]
  },
  "action": "Created",
  "patch": {
    "id": "57b4dcd330e2a7269b5134529e6de70815b36157",
    "author": {
      "id": "did:key:z6MkkPvBfjP4bQmco5Dm7UGsX2ruDBieEHi8n9DVJWX5sTEz",
      "alias": "lorenz"
    },
    "title": "radicle/node: `Address` improvements",
    "state": {
      "status": "open",
      "conflicts": []
    },
    "before": "45abb881a3389bea913ae10af32fb837060787ab",
    "after": "65e49f91b972d78913967dd3ae059df2da27aaae",
    "commits": [
      "65e49f91b972d78913967dd3ae059df2da27aaae",
      "b0331cf556d2c6d19aeafa5d106b9529efe21ac2"
    ],
    "target": "45abb881a3389bea913ae10af32fb837060787ab",
    "labels": [],
    "assignees": [],
    "revisions": [
      {
        "id": "57b4dcd330e2a7269b5134529e6de70815b36157",
        "author": {
          "id": "did:key:z6MkkPvBfjP4bQmco5Dm7UGsX2ruDBieEHi8n9DVJWX5sTEz",
          "alias": "lorenz"
        },
        "description": "## radicle/node: `Address::is_local` for DNS names\n\n`Address:is_local` would return `false` for all DNS names. This is\nincorrect, with one counterexample being the name \"localhost\", which\ngenerally resolves to a local (usually loopback) address.\n\nThe function is changed to catch \"localhost\", but also the top level\ndomain \".localhost\", which is reserved in RFC 2606, Section 2.\n\n`Address::is_routable` would return `true` for all DNS names. While it\nis much harder to decide global routeability based on a domain name, as\nthese usually have to be resolved to an address before being able to\njudge routability, there is one particular class of names, namely local\nones (see above), which are not globally routable.\n\n## radicle/node: Revisit routeability of IP addresses\n\nAll IPv6 addresses would be considered globally routeable, even though\nthe Rust standard library offers convenience functions to check for\nloopback, link-local addresses etc.\n\nImprove checks for IPv6 routeability to catch the most obvious cases of\nlocal or unspecified addresses.\n\nRefactor the check for IPv4 routeability to be more readable and refer\nto RFCs, IANA lists, and Rust stabilization tracking issues as\nappropriate.",
        "base": "45abb881a3389bea913ae10af32fb837060787ab",
        "oid": "65e49f91b972d78913967dd3ae059df2da27aaae",
        "timestamp": 1764436478
      }
    ]
  }
}

Send response

{
  "response": "triggered",
  "run_id": {
    "id": "1a33f3f8-4c05-4003-93d8-970e43737367"
  },
  "info_url": "https://cci.rad.levitte.org//1a33f3f8-4c05-4003-93d8-970e43737367.html"
}

Checkout the source (in /opt/radcis/ci.rad.levitte.org/cci/state/1a33f3f8-4c05-4003-93d8-970e43737367/w)

Started at: 2025-11-29 18:14:43.305890+01:00

Commands:

Read the repo configuration (.radicle/native.yaml in /opt/radcis/ci.rad.levitte.org/cci/state/1a33f3f8-4c05-4003-93d8-970e43737367/w)

shell: 'export RUSTDOCFLAGS=''-D warnings''


  cargo --version

  rustc --version


  cargo fmt --check

  cargo clippy --all-targets --workspace -- --deny warnings

  cargo build --all-targets --workspace

  cargo doc --workspace --no-deps --all-features

  cargo test --workspace --no-fail-fast

  '

Run the script

Commands:

Send result

{
  "response": "finished",
  "result": "failure"
}