CCI report: cf0aafe7-c013-4a5e-b882-7c3f74dbe8da

Request message

{
  "request": "trigger",
  "version": 1,
  "event_type": "patch",
  "repository": {
    "id": "rad:z3gqcJUoA1n9HaHKufZs5FCSGazv5",
    "name": "heartwood",
    "description": "Radicle Heartwood Protocol & Stack",
    "private": false,
    "default_branch": "master",
    "delegates": [
      "did:key:z6MksFqXN3Yhqk8pTJdUGLwATkRfQvwZXPqR2qMEhbS9wzpT",
      "did:key:z6MktaNvN1KVFMkSRAiN4qK5yvX1zuEEaseeX5sffhzPZRZW",
      "did:key:z6MkireRatUThvd3qzfKht1S44wpm4FEWSSa4PRMTSQZ3voM",
      "did:key:z6MkgFq6z5fkF2hioLLSNu1zP2qEL1aHXHZzGH1FLFGAnBGz",
      "did:key:z6MkkPvBfjP4bQmco5Dm7UGsX2ruDBieEHi8n9DVJWX5sTEz"
    ]
  },
  "action": "Updated",
  "patch": {
    "id": "bea09df15505cfcebc72ad40f629747d2e82f670",
    "author": {
      "id": "did:key:z6MkkPvBfjP4bQmco5Dm7UGsX2ruDBieEHi8n9DVJWX5sTEz",
      "alias": "lorenz"
    },
    "title": "Introduce Canonical Reference Rules",
    "state": {
      "status": "open",
      "conflicts": []
    },
    "before": "fb8681f5bc5460a7970f023d61b272d0a1474711",
    "after": "b23e506ff82fa349e2a95222efe3bd6934e7f290",
    "commits": [
      "b23e506ff82fa349e2a95222efe3bd6934e7f290",
      "e2d98f1d4c657e3e5c3c92f9f3cea9d5aa080d1f",
      "c72ff4d7adb09865b525137c443a891112f80308",
      "6aecac5744b076cb2f06987281f42b907a6d4a69"
    ],
    "target": "fb8681f5bc5460a7970f023d61b272d0a1474711",
    "labels": [],
    "assignees": [],
    "revisions": [
      {
        "id": "bea09df15505cfcebc72ad40f629747d2e82f670",
        "author": {
          "id": "did:key:z6MkkPvBfjP4bQmco5Dm7UGsX2ruDBieEHi8n9DVJWX5sTEz",
          "alias": "lorenz"
        },
        "description": "Introduce canonical reference rules via a payload entry in the identity\ndocument. The payload is identified by `xyz.radicle.crefs`, and the payload\ncurrently contains one key `rules`, which is followed by the set of rules. For\neach rule, there is a reference pattern string to identify the rule, which in\nturn is composed of the `allow` and `threshold` values. The canonical reference\nrules are now used to check for canonical updates. However, if none are\navailable, then the `threshold`, `delegates`, and the project `defaultBranch`\nare used to construct a single rule for the default branch as a fallback. **Note\nthat if the rules are present, and there is no default branch rule then the\ncanonical reference for the default branch will not be computed**.",
        "base": "e30e66e009393ee4b25692581a37f42320725085",
        "oid": "c7d8494bba0989cd30af9649a1914dcca80509ec",
        "timestamp": 1750249544
      },
      {
        "id": "e1843518fed7d26055d74adff23b920f9ab201fb",
        "author": {
          "id": "did:key:z6MkkPvBfjP4bQmco5Dm7UGsX2ruDBieEHi8n9DVJWX5sTEz",
          "alias": "lorenz"
        },
        "description": "Introduce canonical reference rules via a payload entry in the identity\ndocument. The payload is identified by `xyz.radicle.crefs`, and the payload\ncurrently contains one key `rules`, which is followed by the set of rules. For\neach rule, there is a reference pattern string to identify the rule, which in\nturn is composed of the `allow` and `threshold` values. The canonical\nreference rules are now used to check for canonical updates. The rule for the\n`defaultBranch` of an `xyz.radicle.project` is synthesized from the identity\ndocument fields: `threshold` and `delegates`. This means that a rule for that\nreference is not allowed within the rule set. This checked when performing a\n`rad id update`.\n\nChanges from previous revision:\n- Checks against default branch when updating\n- Refactors business logic away from the CLI into an `doc::update` module\n- Includes pushing canonical tag example\n- Reword CHANGELOG entry",
        "base": "e30e66e009393ee4b25692581a37f42320725085",
        "oid": "924a75d1b0b5a1149c34d51064d9ec94a8249f99",
        "timestamp": 1750411367
      },
      {
        "id": "1a117d1d8aa9b8fb9b4149bca07f0df4e35252d9",
        "author": {
          "id": "did:key:z6MkkPvBfjP4bQmco5Dm7UGsX2ruDBieEHi8n9DVJWX5sTEz",
          "alias": "lorenz"
        },
        "description": "Changes:\n- Report matched rules when checking default branch\n- Remove erroneous `eprintln`\n- Reword to `commit for canonical reference`\n- Reword docs for `Allowed::Set`\n- Remove erroneous `no_run`",
        "base": "e30e66e009393ee4b25692581a37f42320725085",
        "oid": "e20211a7d36464e3e1dfb3dc7b468f492587615f",
        "timestamp": 1750420942
      },
      {
        "id": "977dfa45912cf6b88e9be818cb2714dfbcbe5dae",
        "author": {
          "id": "did:key:z6MkkPvBfjP4bQmco5Dm7UGsX2ruDBieEHi8n9DVJWX5sTEz",
          "alias": "lorenz"
        },
        "description": "Minor changes to wording, do not say \"canonical head\" but \"canonical reference\". Rebase.",
        "base": "fb8681f5bc5460a7970f023d61b272d0a1474711",
        "oid": "408d4f27e7ef6a56ca1998802c4e8feb9da991ac",
        "timestamp": 1752677819
      },
      {
        "id": "d226c1d700dfeac7930a819a96e805b1c2f54e01",
        "author": {
          "id": "did:key:z6MkkPvBfjP4bQmco5Dm7UGsX2ruDBieEHi8n9DVJWX5sTEz",
          "alias": "lorenz"
        },
        "description": "Rebase",
        "base": "fb8681f5bc5460a7970f023d61b272d0a1474711",
        "oid": "b23e506ff82fa349e2a95222efe3bd6934e7f290",
        "timestamp": 1752682241
      }
    ]
  }
}

Send response

{
  "response": "triggered",
  "run_id": {
    "id": "cf0aafe7-c013-4a5e-b882-7c3f74dbe8da"
  },
  "info_url": "https://cci.rad.levitte.org//cf0aafe7-c013-4a5e-b882-7c3f74dbe8da.html"
}

Checkout the source (in /opt/radcis/ci.rad.levitte.org/cci/state/cf0aafe7-c013-4a5e-b882-7c3f74dbe8da/w)

Started at: 2025-07-16 18:12:31.279665+02:00

Commands:

Read the repo configuration (.radicle/native.yaml in /opt/radcis/ci.rad.levitte.org/cci/state/cf0aafe7-c013-4a5e-b882-7c3f74dbe8da/w)

shell: 'cargo --version

  rustc --version


  cargo fmt --check

  cargo clippy --all-targets --workspace -- --deny warnings

  cargo build --all-targets --workspace

  cargo doc --workspace --no-deps

  cargo test --workspace --no-fail-fast

  '

Run the script

Commands:

Send result

{
  "response": "finished",
  "result": "failure"
}