CCI report: 6a8fd204-8c41-4a3d-b4f6-c80fdd604a17

Request message

{
  "request": "trigger",
  "version": 1,
  "event_type": "patch",
  "repository": {
    "id": "rad:z3gqcJUoA1n9HaHKufZs5FCSGazv5",
    "name": "heartwood",
    "description": "Radicle Heartwood Protocol & Stack",
    "private": false,
    "default_branch": "master",
    "delegates": [
      "did:key:z6MksFqXN3Yhqk8pTJdUGLwATkRfQvwZXPqR2qMEhbS9wzpT",
      "did:key:z6MktaNvN1KVFMkSRAiN4qK5yvX1zuEEaseeX5sffhzPZRZW",
      "did:key:z6MkireRatUThvd3qzfKht1S44wpm4FEWSSa4PRMTSQZ3voM",
      "did:key:z6MkgFq6z5fkF2hioLLSNu1zP2qEL1aHXHZzGH1FLFGAnBGz",
      "did:key:z6MkkPvBfjP4bQmco5Dm7UGsX2ruDBieEHi8n9DVJWX5sTEz"
    ]
  },
  "action": "Updated",
  "patch": {
    "id": "bea09df15505cfcebc72ad40f629747d2e82f670",
    "author": {
      "id": "did:key:z6MkireRatUThvd3qzfKht1S44wpm4FEWSSa4PRMTSQZ3voM",
      "alias": "fintohaps"
    },
    "title": "Introduce Canonical Reference Rules",
    "state": {
      "status": "open",
      "conflicts": []
    },
    "before": "e30e66e009393ee4b25692581a37f42320725085",
    "after": "924a75d1b0b5a1149c34d51064d9ec94a8249f99",
    "commits": [
      "924a75d1b0b5a1149c34d51064d9ec94a8249f99",
      "006ed4397d50c439722346a3e9b286c65742b432",
      "5db2d2dbb64e64b7cfb8fcd15f32a8bbd6785997",
      "32460cec4c9fdf6ecf494a26cc82e8454369a564",
      "64650eddc1bdf19dfb876a13895a57bbf0004d1e",
      "5bc4f885cef6120e9acd78d80af8d712cca786a9"
    ],
    "target": "af35e6f4d04735c33cc10777d6421a61555db754",
    "labels": [],
    "assignees": [],
    "revisions": [
      {
        "id": "bea09df15505cfcebc72ad40f629747d2e82f670",
        "author": {
          "id": "did:key:z6MkireRatUThvd3qzfKht1S44wpm4FEWSSa4PRMTSQZ3voM",
          "alias": "fintohaps"
        },
        "description": "Introduce canonical reference rules via a payload entry in the identity\ndocument. The payload is identified by `xyz.radicle.crefs`, and the payload\ncurrently contains one key `rules`, which is followed by the set of rules. For\neach rule, there is a reference pattern string to identify the rule, which in\nturn is composed of the `allow` and `threshold` values. The canonical reference\nrules are now used to check for canonical updates. However, if none are\navailable, then the `threshold`, `delegates`, and the project `defaultBranch`\nare used to construct a single rule for the default branch as a fallback. **Note\nthat if the rules are present, and there is no default branch rule then the\ncanonical reference for the default branch will not be computed**.",
        "base": "e30e66e009393ee4b25692581a37f42320725085",
        "oid": "c7d8494bba0989cd30af9649a1914dcca80509ec",
        "timestamp": 1750249544
      },
      {
        "id": "e1843518fed7d26055d74adff23b920f9ab201fb",
        "author": {
          "id": "did:key:z6MkireRatUThvd3qzfKht1S44wpm4FEWSSa4PRMTSQZ3voM",
          "alias": "fintohaps"
        },
        "description": "Introduce canonical reference rules via a payload entry in the identity\ndocument. The payload is identified by `xyz.radicle.crefs`, and the payload\ncurrently contains one key `rules`, which is followed by the set of rules. For\neach rule, there is a reference pattern string to identify the rule, which in\nturn is composed of the `allow` and `threshold` values. The canonical\nreference rules are now used to check for canonical updates. The rule for the\n`defaultBranch` of an `xyz.radicle.project` is synthesized from the identity\ndocument fields: `threshold` and `delegates`. This means that a rule for that\nreference is not allowed within the rule set. This checked when performing a\n`rad id update`.\n\nChanges from previous revision:\n- Checks against default branch when updating\n- Refactors business logic away from the CLI into an `doc::update` module\n- Includes pushing canonical tag example\n- Reword CHANGELOG entry",
        "base": "e30e66e009393ee4b25692581a37f42320725085",
        "oid": "924a75d1b0b5a1149c34d51064d9ec94a8249f99",
        "timestamp": 1750411367
      }
    ]
  }
}

Send response

{
  "response": "triggered",
  "run_id": {
    "id": "6a8fd204-8c41-4a3d-b4f6-c80fdd604a17"
  },
  "info_url": "https://cci.rad.levitte.org//6a8fd204-8c41-4a3d-b4f6-c80fdd604a17.html"
}

Checkout the source (in /opt/radcis/ci.rad.levitte.org/cci/state/6a8fd204-8c41-4a3d-b4f6-c80fdd604a17/w)

Started at: 2025-06-20 11:25:03.871542+02:00

Commands:

Read the repo configuration (.radicle/native.yaml in /opt/radcis/ci.rad.levitte.org/cci/state/6a8fd204-8c41-4a3d-b4f6-c80fdd604a17/w)

shell: 'cargo --version

  rustc --version


  cargo fmt --check

  cargo clippy --all-targets --workspace -- --deny warnings

  cargo build --all-targets --workspace

  cargo doc --workspace --no-deps

  cargo test --workspace --no-fail-fast

  '

Run the script

Commands:

Send result

{
  "response": "finished",
  "result": "success"
}