Skip to content

Conversation

@jmank88
Copy link
Contributor

@jmank88 jmank88 commented Dec 31, 2025

@github-actions
Copy link
Contributor

github-actions bot commented Dec 31, 2025

CORA - Pending Reviewers

All codeowners have approved! ✅

Legend: ✅ Approved | ❌ Changes Requested | 💬 Commented | 🚫 Dismissed | ⏳ Pending | ❓ Unknown

For more details, see the full review summary.

@github-actions
Copy link
Contributor

I see you updated files related to core. Please run pnpm changeset in the root directory to add a changeset as well as in the text include at least one of the following tags:

  • #added For any new functionality added.
  • #breaking_change For any functionality that requires manual action for the node to boot.
  • #bugfix For bug fixes.
  • #changed For any change to the existing functionality.
  • #db_update For any feature that introduces updates to database schema.
  • #deprecation_notice For any upcoming deprecation functionality.
  • #internal For changesets that need to be excluded from the final changelog.
  • #nops For any feature that is NOP facing and needs to be in the official Release Notes for the release.
  • #removed For any functionality/config that is removed.
  • #updated For any functionality that is updated.
  • #wip For any change that is not ready yet and external communication about it should be held off till it is feature complete.

@jmank88 jmank88 requested a review from bolekk December 31, 2025 15:39
Comment on lines 49 to 52
// TODO to be enforced after upgrading deployed nodes and settings
//if strings.HasPrefix(id, "org_") {
// errs = errors.Join(errs, fmt.Errorf("invalid org id %s: must not be prefixed org_", id))
//} else
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We have to allow org prefix (and configure duplicate settings) until we are only running the new code.

} else if strings.HasPrefix(id, "0x") {
errs = errors.Join(errs, fmt.Errorf("invalid owner id %s: must not be prefixed 0x", id))
} else if strings.ToLower(id) != id {
errs = errors.Join(errs, fmt.Errorf("invalid owner id %s: must be lower case", id))
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can't we simply require N hex characters? (where N is different for org, workflow and owner)

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The context values are being normalized to lowercase, so we need to ensure that we only use lowercase here too, since they are just treated as string keys for settings/limits, not decoded to raw bytes.

trunk-io[bot]

This comment was marked as outdated.

trunk-io[bot]

This comment was marked as outdated.

@jmank88 jmank88 force-pushed the CRE-1612-validate-cre-settings-keys branch from 68802b3 to a7fa630 Compare December 31, 2025 15:51
@jmank88 jmank88 requested review from a team, bolekk and pavel-raykov December 31, 2025 16:02
pavel-raykov
pavel-raykov previously approved these changes Dec 31, 2025
@trunk-io
Copy link

trunk-io bot commented Dec 31, 2025

Static BadgeStatic BadgeStatic BadgeStatic Badge

View Full Report ↗︎Docs

@cl-sonarqube-production
Copy link

Copy link

@trunk-io trunk-io bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🔴 Test Results: Unrelated Failure

Affected failures:

  1. Workflow Run: Integration Tests

What Broke

This failure appears to be unrelated to the changes in this PR. The CI failure is caused by newly introduced validation logic in deployment/cre/jobs/settings.go or an unexpected interaction with the updated test case in deployment/cre/jobs/propose_job_spec_test.go. The PR introduces new validation rules in deployment/cre/jobs/settings.go for CRE settings IDs, requiring them to be lowercase and without specific prefixes. Although the test deployment/cre/jobs/propose_job_spec_test.go was updated to align with some of these changes, the generic 'exit 1' error in the CI logs strongly suggests an unhandled validation failure or an incompatibility within the updated test case.

Autofix Options

You can use our MCP server to get AI assistance with debugging and fixing these failures.

  • Use MCP in your IDE to debug the issue. Try Help me fix CI failures from rhHp74eT to get started.

View all test uploads

@jmank88 jmank88 requested a review from pavel-raykov December 31, 2025 17:15
@jmank88 jmank88 enabled auto-merge December 31, 2025 17:31
@jmank88 jmank88 added this pull request to the merge queue Dec 31, 2025
Merged via the queue into develop with commit f2da465 Dec 31, 2025
216 of 218 checks passed
@jmank88 jmank88 deleted the CRE-1612-validate-cre-settings-keys branch December 31, 2025 20:33
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants