CCI report: d7e1435e-557f-4b97-a09c-a2d1d6c9e09b

Request message

{
  "request": "trigger",
  "version": 1,
  "event_type": "patch",
  "repository": {
    "id": "rad:z3gqcJUoA1n9HaHKufZs5FCSGazv5",
    "name": "heartwood",
    "description": "Radicle Heartwood Protocol & Stack",
    "private": false,
    "default_branch": "master",
    "delegates": [
      "did:key:z6MksFqXN3Yhqk8pTJdUGLwATkRfQvwZXPqR2qMEhbS9wzpT",
      "did:key:z6MktaNvN1KVFMkSRAiN4qK5yvX1zuEEaseeX5sffhzPZRZW",
      "did:key:z6MkireRatUThvd3qzfKht1S44wpm4FEWSSa4PRMTSQZ3voM",
      "did:key:z6MkgFq6z5fkF2hioLLSNu1zP2qEL1aHXHZzGH1FLFGAnBGz",
      "did:key:z6MkkPvBfjP4bQmco5Dm7UGsX2ruDBieEHi8n9DVJWX5sTEz"
    ]
  },
  "action": "Updated",
  "patch": {
    "id": "bea09df15505cfcebc72ad40f629747d2e82f670",
    "author": {
      "id": "did:key:z6MkireRatUThvd3qzfKht1S44wpm4FEWSSa4PRMTSQZ3voM",
      "alias": "fintohaps"
    },
    "title": "Introduce Canonical Reference Rules",
    "state": {
      "status": "open",
      "conflicts": []
    },
    "before": "e30e66e009393ee4b25692581a37f42320725085",
    "after": "e20211a7d36464e3e1dfb3dc7b468f492587615f",
    "commits": [
      "e20211a7d36464e3e1dfb3dc7b468f492587615f",
      "68fe9fd588dfcedfe87f43c1ea0bfe61a84d9e54",
      "cf77406758bd624f2567aebe627e5e8951f46413",
      "56f3af445ae64ef1a904046fd3f89132338eafe0",
      "8110f7b4ed83d63bfafd05f32801795e3a0c6258",
      "f7c5e03456c491fea7c3aa8a0c06fe72e606299c"
    ],
    "target": "af35e6f4d04735c33cc10777d6421a61555db754",
    "labels": [],
    "assignees": [],
    "revisions": [
      {
        "id": "bea09df15505cfcebc72ad40f629747d2e82f670",
        "author": {
          "id": "did:key:z6MkireRatUThvd3qzfKht1S44wpm4FEWSSa4PRMTSQZ3voM",
          "alias": "fintohaps"
        },
        "description": "Introduce canonical reference rules via a payload entry in the identity\ndocument. The payload is identified by `xyz.radicle.crefs`, and the payload\ncurrently contains one key `rules`, which is followed by the set of rules. For\neach rule, there is a reference pattern string to identify the rule, which in\nturn is composed of the `allow` and `threshold` values. The canonical reference\nrules are now used to check for canonical updates. However, if none are\navailable, then the `threshold`, `delegates`, and the project `defaultBranch`\nare used to construct a single rule for the default branch as a fallback. **Note\nthat if the rules are present, and there is no default branch rule then the\ncanonical reference for the default branch will not be computed**.",
        "base": "e30e66e009393ee4b25692581a37f42320725085",
        "oid": "c7d8494bba0989cd30af9649a1914dcca80509ec",
        "timestamp": 1750249544
      },
      {
        "id": "e1843518fed7d26055d74adff23b920f9ab201fb",
        "author": {
          "id": "did:key:z6MkireRatUThvd3qzfKht1S44wpm4FEWSSa4PRMTSQZ3voM",
          "alias": "fintohaps"
        },
        "description": "Introduce canonical reference rules via a payload entry in the identity\ndocument. The payload is identified by `xyz.radicle.crefs`, and the payload\ncurrently contains one key `rules`, which is followed by the set of rules. For\neach rule, there is a reference pattern string to identify the rule, which in\nturn is composed of the `allow` and `threshold` values. The canonical\nreference rules are now used to check for canonical updates. The rule for the\n`defaultBranch` of an `xyz.radicle.project` is synthesized from the identity\ndocument fields: `threshold` and `delegates`. This means that a rule for that\nreference is not allowed within the rule set. This checked when performing a\n`rad id update`.\n\nChanges from previous revision:\n- Checks against default branch when updating\n- Refactors business logic away from the CLI into an `doc::update` module\n- Includes pushing canonical tag example\n- Reword CHANGELOG entry",
        "base": "e30e66e009393ee4b25692581a37f42320725085",
        "oid": "924a75d1b0b5a1149c34d51064d9ec94a8249f99",
        "timestamp": 1750411367
      },
      {
        "id": "1a117d1d8aa9b8fb9b4149bca07f0df4e35252d9",
        "author": {
          "id": "did:key:z6MkireRatUThvd3qzfKht1S44wpm4FEWSSa4PRMTSQZ3voM",
          "alias": "fintohaps"
        },
        "description": "Changes:\n- Report matched rules when checking default branch\n- Remove erroneous `eprintln`\n- Reword to `commit for canonical reference`\n- Reword docs for `Allowed::Set`\n- Remove erroneous `no_run`",
        "base": "e30e66e009393ee4b25692581a37f42320725085",
        "oid": "e20211a7d36464e3e1dfb3dc7b468f492587615f",
        "timestamp": 1750420942
      }
    ]
  }
}

Send response

{
  "response": "triggered",
  "run_id": {
    "id": "d7e1435e-557f-4b97-a09c-a2d1d6c9e09b"
  },
  "info_url": "https://cci.rad.levitte.org//d7e1435e-557f-4b97-a09c-a2d1d6c9e09b.html"
}

Checkout the source (in /opt/radcis/ci.rad.levitte.org/cci/state/d7e1435e-557f-4b97-a09c-a2d1d6c9e09b/w)

Started at: 2025-06-20 14:02:55.806495+02:00

Commands:

Read the repo configuration (.radicle/native.yaml in /opt/radcis/ci.rad.levitte.org/cci/state/d7e1435e-557f-4b97-a09c-a2d1d6c9e09b/w)

shell: 'cargo --version

  rustc --version


  cargo fmt --check

  cargo clippy --all-targets --workspace -- --deny warnings

  cargo build --all-targets --workspace

  cargo doc --workspace --no-deps

  cargo test --workspace --no-fail-fast

  '

Run the script

Commands:

Send result

{
  "response": "finished",
  "result": "success"
}