CCI report: 56e01f75-17a6-4781-86aa-b1ee79e2c3c6

Request message

{
  "request": "trigger",
  "version": 1,
  "event_type": "patch",
  "repository": {
    "id": "rad:z3gqcJUoA1n9HaHKufZs5FCSGazv5",
    "name": "heartwood",
    "description": "Radicle Heartwood Protocol & Stack",
    "private": false,
    "default_branch": "master",
    "delegates": [
      "did:key:z6MksFqXN3Yhqk8pTJdUGLwATkRfQvwZXPqR2qMEhbS9wzpT",
      "did:key:z6MktaNvN1KVFMkSRAiN4qK5yvX1zuEEaseeX5sffhzPZRZW",
      "did:key:z6MkireRatUThvd3qzfKht1S44wpm4FEWSSa4PRMTSQZ3voM",
      "did:key:z6MkgFq6z5fkF2hioLLSNu1zP2qEL1aHXHZzGH1FLFGAnBGz",
      "did:key:z6MkkPvBfjP4bQmco5Dm7UGsX2ruDBieEHi8n9DVJWX5sTEz"
    ]
  },
  "action": "Created",
  "patch": {
    "id": "a2f8d9768df457afecb0ce4ca10ba9017d84cf28",
    "author": {
      "id": "did:key:z6MkireRatUThvd3qzfKht1S44wpm4FEWSSa4PRMTSQZ3voM",
      "alias": "fintohaps"
    },
    "title": "Update gix-* crates",
    "state": {
      "status": "open",
      "conflicts": []
    },
    "before": "980ed5618602567dd13b0b522180e0fe889f701c",
    "after": "695137476a724856f44578e09e3d028f1e2aba68",
    "commits": [
      "695137476a724856f44578e09e3d028f1e2aba68",
      "d688e6679caa1dfcd665747eeba48c45b3601b88",
      "00bd7559547d0012b3d0e38305b460bc22bb6d8c",
      "be83c20cebc9e57fd1e67d93a3f94ce7686886ab"
    ],
    "target": "980ed5618602567dd13b0b522180e0fe889f701c",
    "labels": [],
    "assignees": [],
    "revisions": [
      {
        "id": "a2f8d9768df457afecb0ce4ca10ba9017d84cf28",
        "author": {
          "id": "did:key:z6MkireRatUThvd3qzfKht1S44wpm4FEWSSa4PRMTSQZ3voM",
          "alias": "fintohaps"
        },
        "description": "Fixes [CVE-2026-0810].\n\nThe `gix` crates require updating due to the security vulnerability above.\nThey require updating together in lock-step so both `radicle-fetch`\nand `radicle-oid` are affected.\n\n`radicle-oid` handles the non-exhaustive nature of `ObjectId`.\n\n`radicle-fetch` updates to the new API types, however, this comes with\nsome updates to the `ls_refs` protocol.\n\nA regression is documented in [gitoxide issue 2429].\nThe regression highlighted that it is the duty of the caller to also\nfilter the outcome of ls-refs, and `ref-prefix` is simply an\noptimisation.\n\nThe ls-refs code is refactored to better represent and handle this operation.\n\n[CVE-2026-0810]: https://www.cve.org/CVERecord?id=CVE-2026-0810\n[gitoxide issue 2429]: https://github.com/GitoxideLabs/gitoxide/issues/2429",
        "base": "980ed5618602567dd13b0b522180e0fe889f701c",
        "oid": "695137476a724856f44578e09e3d028f1e2aba68",
        "timestamp": 1771258251
      }
    ]
  }
}

Send response

{
  "response": "triggered",
  "run_id": {
    "id": "56e01f75-17a6-4781-86aa-b1ee79e2c3c6"
  },
  "info_url": "https://cci.rad.levitte.org//56e01f75-17a6-4781-86aa-b1ee79e2c3c6.html"
}

Checkout the source (in /opt/radcis/ci.rad.levitte.org/cci/state/56e01f75-17a6-4781-86aa-b1ee79e2c3c6/w)

Started at: 2026-02-16 17:10:54.484229+01:00

Commands:

Read the repo configuration (.radicle/native.yaml in /opt/radcis/ci.rad.levitte.org/cci/state/56e01f75-17a6-4781-86aa-b1ee79e2c3c6/w)

shell: 'export RUSTDOCFLAGS=''-D warnings''


  cargo --version

  rustc --version


  cargo fmt --check

  cargo clippy --all-targets --workspace -- --deny warnings

  cargo build --all-targets --workspace

  cargo doc --workspace --no-deps --all-features

  cargo test --workspace --no-fail-fast

  '

Run the script

Commands:

Send result

{
  "response": "finished",
  "result": "failure"
}