Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[patch] Release v1.7.14 #2699

Merged
merged 1 commit into from
Oct 11, 2024
Merged

[patch] Release v1.7.14 #2699

merged 1 commit into from
Oct 11, 2024

Conversation

kpango
Copy link
Collaborator

@kpango kpango commented Oct 11, 2024

✨ New feature

⚡ Improve performance

  • Refactor grpc/status.withDetails function for performance #2664 #2668

♻️ Refactor

🐛 Bugfix

✏️ Document

  • Fix broken links in the document files #2611 #2614

✅ Testing

💚 CI

📈 Metrics/Tracing

  • Introduce an observability crate using opentelemetry-rust #2535 #2609

Summary by CodeRabbit

  • New Features

    • Added several new contributors to the project, enhancing community involvement.
    • Introduced a new configuration file for spell checking, improving documentation quality.
    • Expanded the project with new configuration files, documentation, and source code for enhanced functionality.
  • Bug Fixes

    • Updated version information in issue templates for accuracy.
  • Documentation

    • Improved clarity in the pull request template and updated version information.
  • Chores

    • Modified GitHub Actions for better handling of Docker image tags.

Copy link
Contributor

coderabbitai bot commented Oct 11, 2024

📝 Walkthrough

Walkthrough

This pull request introduces multiple changes across various files, including the addition of new contributors in the .all-contributorsrc file, the creation of a new spell-check configuration file .cspell.json, and updates to the .deepsource.toml file regarding Dockerfile paths and trusted registries. Additionally, there are significant updates to the GitHub issue templates and pull request templates to reflect new software versions. The changes also include numerous new files related to the Vald system, enhancing the project's overall architecture.

Changes

File Path Change Summary
.all-contributorsrc Added new contributors: aknishid, hrichiksite, smorihira, iammytoo, and added "commitType": "docs".
.cspell.json New configuration file for CodeSpell checker with settings for spell checking, including ignored paths and words.
.deepsource.toml Updated Dockerfile paths and trusted registries in the docker analyzer configuration.
.gitfiles Introduced multiple new files and directories for the Vald system, including configuration, documentation, and source code.
.github/ISSUE_TEMPLATE/bug_report.md Updated environment versions for Go, Docker, Kubernetes, NGT, Vald, Rust, and Helm.
.github/ISSUE_TEMPLATE/security_issue_report.md Updated environment versions for Go, Docker, Kubernetes, NGT, Vald, Rust, Helm, and Faiss.
.github/PULL_REQUEST_TEMPLATE.md Updated version information and improved clarity in the template.
.github/actions/detect-docker-image-tags/action.yaml Renamed input parameter from tag_name to tags and updated logic to handle multiple tags.

Suggested labels

priority/low, size/XXXL, area/gateway/filter, area/gateway/lb, area/gateway/mirror, area/agent/core/faiss, area/agent/core/ngt, area/internal, area/tools/cli/loadtest, area/helm, actions/backport/release/v1.7

Suggested reviewers

  • hlts2
  • vankichi
  • kmrmt

Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media?

❤️ Share
🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Generate unit testing code for this file.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai generate unit testing code for this file.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and generate unit testing code.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

CodeRabbit Configuration File (.coderabbit.yaml)

  • You can programmatically configure CodeRabbit by adding a .coderabbit.yaml file to the root of your repository.
  • Please see the configuration documentation for more information.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: # yaml-language-server: $schema=https://coderabbit.ai/integrations/schema.v2.json

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

@kpango kpango changed the base branch from main to release/v1.7 October 11, 2024 06:12
@kpango kpango changed the title Pre release/v1.7.14/patch Release v1.7.14 Oct 11, 2024
@kpango kpango changed the title Release v1.7.14 [patch] Release v1.7.14 Oct 11, 2024
@vdaas-ci
Copy link
Collaborator

[FORMAT] Failed to format.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Caution

Inline review comments failed to post

🛑 Comments failed to post (13)
.github/ISSUE_TEMPLATE/bug_report.md (1)

25-32: 💡 Codebase verification

Issues Identified with Version Numbers and Consistency

The bug report template requires updates to ensure accuracy and consistency:

  1. Go Version: Listed as go1.23.2, which exceeds the latest stable release 1.21.x.
  2. Docker Version: Listed as v19.03.14, which is outdated compared to the current releases.
  3. Kubernetes Version: Listed as v1.31.0, surpassing the latest stable release v1.28.x.
  4. Rust Version: Unable to verify the version due to a script error; please verify manually.
  5. Vald Version: Correctly prefixed with 'v' (v1.7.13), maintaining consistency.

Please update the version numbers in the template to reflect the latest stable releases and ensure all entries follow a consistent formatting standard.

🔗 Analysis chain

Verify version numbers and ensure consistency

The updated version information is a valuable addition to the bug report template. However, there are a few points that require attention:

  1. The Vald version (v1.7.13) is missing the 'v' prefix used in other entries. Consider adding it for consistency.

  2. Some version numbers seem unusually high and may not reflect current stable releases:

    • Go v1.23.2 (latest stable is 1.21.x as of October 2023)
    • Kubernetes v1.31.1 (latest stable is 1.28.x as of October 2023)
  3. The addition of Rust, Helm, and Faiss versions aligns well with the PR objectives.

Please run the following script to verify the latest stable versions of these software components:

Please update the version numbers in the template based on the script output, ensuring they reflect the latest stable versions compatible with your project.

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Verify latest stable versions of software components

echo "Vald version:"
gh release list --repo vdaas/vald --limit 1

echo "Go version:"
curl -sSL https://golang.org/VERSION?m=text

echo "Rust version:"
curl -sSL https://static.rust-lang.org/dist/channel-rust-stable.toml | grep -m 1 "version ="

echo "Docker version:"
curl -sSL https://api.github.com/repos/docker/docker-ce/releases/latest | jq -r .tag_name

echo "Kubernetes version:"
curl -sSL https://storage.googleapis.com/kubernetes-release/release/stable.txt

echo "Helm version:"
curl -sSL https://api.github.com/repos/helm/helm/releases/latest | jq -r .tag_name

echo "NGT version:"
gh release list --repo yahoojapan/NGT --limit 1

echo "Faiss version:"
gh release list --repo facebookresearch/faiss --limit 1

Length of output: 1173

.github/workflows/build-protobuf.yaml (2)

42-42: 💡 Codebase verification

Inconsistency Found: 'TAG' Output Variable Missing in _detect-ci-container Workflow

The output variable TAG is not defined in the _detect-ci-container workflow. Please update the _detect-ci-container workflow to include the TAG output to ensure consistency with the build-protobuf.yaml workflow.

🔗 Analysis chain

Verify the consistency of the output variable change.

The output variable referenced in the build job's container image has been updated from TAG_NAME to TAG. This change is crucial for the workflow to function correctly.

Run the following script to verify if this change is consistent with the _detect-ci-container workflow:

If the script doesn't find the TAG output, it might indicate an inconsistency between this workflow and the _detect-ci-container workflow. In that case, you'll need to update either this file or the _detect-ci-container workflow to ensure they match.

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Verify the consistency of the TAG output in the _detect-ci-container workflow

# Test: Search for the output definition in the _detect-ci-container workflow
output_definition=$(rg --type yaml 'outputs:.*TAG:' .github/workflows/_detect-ci-container.yaml)

if [ -n "$output_definition" ]; then
    echo "Output 'TAG' found in _detect-ci-container workflow:"
    echo "$output_definition"
else
    echo "Error: Output 'TAG' not found in _detect-ci-container workflow."
    echo "Please ensure that the output variable is correctly defined as 'TAG' in the _detect-ci-container workflow."
fi

Length of output: 487


37-37: 💡 Codebase verification

Issue Detected: Missing 'TAG' Output Variable in _detect-ci-container.yaml

The workflow .github/workflows/_detect-ci-container.yaml does not define the required TAG output variable. This mismatch may cause failures in the build-protobuf.yaml workflow when it references TAG.

🔗 Analysis chain

Verify the existence of the new workflow file.

The file extension for the _detect-ci-container workflow has been changed from .yml to .yaml. While this change promotes consistency in file extensions, we need to ensure that the new file actually exists.

Run the following script to verify the existence of the new workflow file:

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Verify the existence of the _detect-ci-container.yaml file

# Test: Check if the file exists
if [ -f ".github/workflows/_detect-ci-container.yaml" ]; then
    echo "File exists: .github/workflows/_detect-ci-container.yaml"
else
    echo "Error: File not found: .github/workflows/_detect-ci-container.yaml"
    echo "Please ensure the file has been renamed or created with the .yaml extension."
fi

Length of output: 487

.github/workflows/_detect-ci-container.yaml (1)

41-48: ⚠️ Potential issue

Shell script needs improvement for robustness and safety.

The final step to process the Docker image tag has some areas for improvement:

  1. Address the shellcheck warning about word splitting:
- TAG=$(echo "$TAGS" | awk '{print $1}' | awk -F '=' '{print $2}')
+ TAG=$(echo "$TAGS" | awk '{print $1}' | awk -F '=' '{print $2}' | tr -d '"')
  1. Add error handling for when no tags are found:
- name: Get Docker image tag from detection result
  id: get_tag_name
  run: |
    if [ -z "$TAGS" ]; then
      echo "Error: No tags found for the image."
      exit 1
    fi
    TAG=$(echo "$TAGS" | awk '{print $1}' | awk -F '=' '{print $2}' | tr -d '"')
    if [ -z "$TAG" ]; then
      echo "Error: Failed to extract tag from '$TAGS'"
      exit 1
    fi
    echo "TAG=${TAG}"
    echo "TAG=${TAG}" >> $GITHUB_OUTPUT
  env:
    TAGS: ${{ steps.detect_tag_name.outputs.IMAGE_TAGS }}

These changes will make the script more robust and handle potential error cases.

🧰 Tools
🪛 actionlint

43-43: shellcheck reported issue in this script: SC2086:info:3:22: Double quote to prevent globbing and word splitting

(shellcheck)

.github/helm/values/values-correction.yaml (2)

34-48: 🛠️ Refactor suggestion

Consider enabling HPA and adjusting replica count for the agent.

The agent component has a fixed number of replicas (10) and HPA disabled. Enabling HPA and adjusting the replica count can provide better scalability and resource utilization.

 agent:
-  minReplicas: 10
-  maxReplicas: 10
+  minReplicas: 3
+  maxReplicas: 20
   podManagementPolicy: Parallel
   hpa:
-    enabled: false
+    enabled: true
+    targetCPUUtilizationPercentage: 80
+    targetMemoryUtilizationPercentage: 80
   resources:
     requests:
       cpu: 100m
       memory: 50Mi
   ngt:
     auto_index_duration_limit: 2m
     auto_index_check_duration: 30s
     auto_index_length: 500
     dimension: 784
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

agent:
  minReplicas: 3
  maxReplicas: 20
  podManagementPolicy: Parallel
  hpa:
    enabled: true
    targetCPUUtilizationPercentage: 80
    targetMemoryUtilizationPercentage: 80
  resources:
    requests:
      cpu: 100m
      memory: 50Mi
  ngt:
    auto_index_duration_limit: 2m
    auto_index_check_duration: 30s
    auto_index_length: 500
    dimension: 784

22-33: 🛠️ Refactor suggestion

Consider enabling HPA for better scalability.

The gateway load balancer has HPA disabled. Enabling HPA can help the system automatically scale based on resource utilization, improving overall performance and resource efficiency.

 gateway:
   lb:
     enabled: true
     minReplicas: 1
     hpa:
-      enabled: false
+      enabled: true
+      targetCPUUtilizationPercentage: 80
+      targetMemoryUtilizationPercentage: 80
     resources:
       requests:
         cpu: 100m
         memory: 50Mi
     gateway_config:
       index_replica: 2
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

gateway:
  lb:
    enabled: true
    minReplicas: 1
    hpa:
      enabled: true
      targetCPUUtilizationPercentage: 80
      targetMemoryUtilizationPercentage: 80
    resources:
      requests:
        cpu: 100m
        memory: 50Mi
    gateway_config:
      index_replica: 2
.deepsource.toml (1)

50-70: 💡 Codebase verification

Discrepancy Detected: Missing Dockerfile Entries in .deepsource.toml

The following Dockerfiles are present in the repository but not listed in .deepsource.toml:

  • dockers/binfmt/Dockerfile
  • dockers/buildkit/syft/scanner/Dockerfile

Please update .deepsource.toml to include these Dockerfiles to ensure comprehensive static analysis.

🔗 Analysis chain

LGTM! Dockerfile paths updated to reflect project restructuring.

The changes to the dockerfile_paths section appear to align with the PR objectives of enhancing and refactoring the project structure. The new paths suggest a more granular and organized Docker setup, which is a positive improvement.

To ensure all Dockerfiles are correctly included, please run the following script:

This will help identify any discrepancies between the actual Dockerfiles in the repository and those listed in the configuration.

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Verify all Dockerfiles are included in .deepsource.toml

# Test: Compare Dockerfiles in the repo with those listed in .deepsource.toml
echo "Dockerfiles in the repository:"
fd Dockerfile
echo "---"
echo "Dockerfiles listed in .deepsource.toml:"
rg 'dockerfile_paths' .deepsource.toml -A 30 | rg '".+"'

Length of output: 2100

.github/workflows/check-conflict.yaml (1)

36-58: ⚠️ Potential issue

Script functionality is correct, but could be improved.

The script successfully checks for merge conflicts and handles the GitHub API interaction. However, there are some areas for improvement:

  1. Use double quotes to prevent globbing and word splitting.
  2. Replace backticks with $() for command substitution.
  3. Add error handling for curl commands.
  4. Consider using GitHub CLI (gh) for API interactions if available in the runner environment.

Here's a revised version of the script addressing these points:

      - name: Check conflict
        run: |
          if grep -r "<<<< HEAD" . --exclude-dir=.git --exclude=check-conflict.yaml; then
            PR_COMMENTS=$(curl -s -H "Authorization: token $GITHUB_TOKEN" "$API_URL?per_page=10000")
            BODY=$(echo -E "$PR_COMMENTS" | jq 'last(.[] | select(.user.login == "vdaas-ci") | select(.body | test("^\\\\*\\\\*\\\\[WARNING:CONFLICT")) | .body)' -r)

            if [ "$BODY" = "null" ]; then
              if ! curl --fail \
                -H "Accept: application/json" \
                -H "Content-Type:application/json" \
                -H "Authorization: token $GITHUB_TOKEN" \
                --request POST \
                --data '{"body": "**[WARNING:CONFLICT]** You may need to resolve conflicts. Please check."}' \
                "$API_URL"; then
                echo "Failed to post comment to PR"
                exit 1
              fi
            fi
            echo "Please fix conflict locally."
            exit 1
          else
            echo "No conflicts found"
          fi
        env:
          GITHUB_TOKEN: ${{ secrets.DISPATCH_TOKEN }}
          API_URL: ${{ github.event.pull_request.comments_url }}

This version addresses the shellcheck warnings and adds basic error handling for the curl command.

🧰 Tools
🪛 actionlint

37-37: shellcheck reported issue in this script: SC2006:style:2:15: Use $(...) notation instead of legacy backticks ...

(shellcheck)


37-37: shellcheck reported issue in this script: SC2086:info:2:21: Double quote to prevent globbing and word splitting

(shellcheck)


37-37: shellcheck reported issue in this script: SC2006:style:3:8: Use $(...) notation instead of legacy backticks ...

(shellcheck)


37-37: shellcheck reported issue in this script: SC2086:info:12:5: Double quote to prevent globbing and word splitting

(shellcheck)

.github/workflows/dockers-buildbase-image.yaml (1)

20-72: 💡 Codebase verification

Security concern: secrets: inherit used with pull_request_target.

The workflow inherits secrets using secrets: inherit, which can expose sensitive information when used with pull_request_target.

  • File: .github/workflows/dockers-buildbase-image.yaml
  • Line: secrets: inherit
🔗 Analysis chain

Workflow triggers are well-defined, but verify security implications.

The triggers for this workflow are comprehensive and well-structured:

  • Hourly scheduled builds ensure regular updates.
  • Push triggers on main and release branches are appropriate.
  • Detailed path filters for pull requests prevent unnecessary builds.

However, the use of pull_request_target should be carefully reviewed:

Please verify the security implications of using pull_request_target. This event can potentially expose secrets to fork-based pull requests. Ensure that proper precautions are in place to prevent unauthorized access to sensitive information.

To assist in this verification, you can run the following script to check for any sensitive operations in the workflow:

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Check for potentially sensitive operations in the workflow

# Test: Look for uses of secrets or other potentially sensitive operations
rg --type yaml '(secrets:|env:|\${{ secrets)' .github/workflows/dockers-buildbase-image.yaml

Length of output: 366


Script:

#!/bin/bash
# Description: Check for potentially sensitive operations in the workflow

# Test: Look for uses of secrets or other potentially sensitive operations
rg --type yaml '(secrets:|env:|\$\{\{\s*secrets)' .github/workflows/dockers-buildbase-image.yaml

Length of output: 119

.github/workflows/dockers-agent-image.yaml (1)

81-86: 💡 Codebase verification

Issue Detected: Duplicate runs-on Entries in _docker-image.yaml

The _docker-image.yaml file contains multiple runs-on: ubuntu-latest entries within the jobs section. Duplicate keys in YAML can lead to unexpected behavior and configuration issues.

  • .github/workflows/_docker-image.yaml: Duplicate runs-on: ubuntu-latest entries in the jobs section.

Additionally, there's a commented-out username: ${{ github.actor }} line that should be reviewed to ensure proper configuration.

🔗 Analysis chain

LGTM: Job definition is concise and follows good practices.

The job definition uses a reusable workflow, which is excellent for maintaining DRY principles. The use of a separate workflow file for Docker image building suggests a modular approach to CI/CD pipelines. Inheriting secrets is crucial for secure access to necessary credentials during the build process.

To ensure the referenced workflow file exists and is properly configured, please run the following command:

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Verify the existence and basic structure of the _docker-image.yaml file
if [ -f .github/workflows/_docker-image.yaml ]; then
  echo "File _docker-image.yaml exists. Checking its content:"
  grep -E "name:|on:|jobs:" .github/workflows/_docker-image.yaml
else
  echo "Error: _docker-image.yaml file not found in .github/workflows/"
fi

Length of output: 962

.github/workflows/fossa.yaml (1)

32-32: 💡 Codebase verification

File extension consistency issue detected.

The workflow file .github/workflows/codeql-analysis.yml uses the .yml extension, which is inconsistent with other workflow files using .yaml. It is recommended to standardize all workflow files to use the .yaml extension for consistency.

🔗 Analysis chain

LGTM: File extension change is acceptable.

The change from .yml to .yaml is valid as both are acceptable extensions for YAML files. However, it's important to maintain consistency across the project.

To ensure consistency, let's check if other workflow files use the same extension:

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Check for consistency in workflow file extensions

# Test: Count .yml and .yaml files in workflows directory
echo "Workflow file extension usage:"
fd -e yml -e yaml . .github/workflows | sort | uniq -c

Length of output: 572


Script:

#!/bin/bash
# Description: Check for consistency in workflow file extensions

# Test: Count .yml and .yaml files in workflows directory
echo "Workflow file extension usage:"
fd -e yml -e yaml . .github/workflows | sort | uniq -c

Length of output: 3347

.github/workflows/e2e.yaml (1)

223-223: 💡 Codebase verification

Action Required: Standardize E2E_WAIT_FOR_CREATE_INDEX_DURATION to 5m across all instances.

Multiple occurrences of E2E_WAIT_FOR_CREATE_INDEX_DURATION with differing durations found in .github/workflows/e2e.yaml. Ensure all instances are updated to 5m to maintain consistency and prevent flaky tests.

🔗 Analysis chain

LGTM! Monitor impact on workflow duration.

Increasing E2E_WAIT_FOR_CREATE_INDEX_DURATION from 3m to 5m is a good change to reduce potential flaky tests caused by insufficient wait time for index creation.

Monitor the impact of this change on overall workflow duration. Run the following script to compare job durations before and after this change:

If there's a significant increase in job duration, consider optimizing other parts of the workflow to compensate.

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Compare e2e-stream-crud-skip-exist-check job durations

# Test: Fetch and compare job durations
echo "Recent job durations:"
gh run list --workflow=e2e.yaml --limit 10 --json databaseId,createdAt --jq '.[] | [.databaseId, .createdAt] | @tsv' | while read -r run_id created_at; do
    duration=$(gh run view $run_id --json jobs --jq '.jobs[] | select(.name == "E2E test (Stream CRUD: skip strict exist check)") | .durationInMinutes')
    echo "$created_at: $duration minutes"
done

Length of output: 2749


Script:

#!/bin/bash
# Description: Verify the updated E2E_WAIT_FOR_CREATE_INDEX_DURATION in e2e.yaml

# Search for the E2E_WAIT_FOR_CREATE_INDEX_DURATION variable and print its value
grep 'E2E_WAIT_FOR_CREATE_INDEX_DURATION=' .github/workflows/e2e.yaml

Length of output: 485

.gitfiles (1)

881-885: 💡 Codebase verification

Exclude Generated Index Files from Version Control

The files grp, obj, prf, and tre within internal/core/algorithm/ngt/assets/index/ are currently tracked in the repository. If these files are generated during build or runtime processes, they should be excluded from version control to avoid potential merge conflicts and reduce repository size.

  • Update .gitignore to exclude the following files:
    • internal/core/algorithm/ngt/assets/index/grp
    • internal/core/algorithm/ngt/assets/index/obj
    • internal/core/algorithm/ngt/assets/index/prf
    • internal/core/algorithm/ngt/assets/index/tre
🔗 Analysis chain

Confirm the inclusion of potential generated files

The files within internal/core/algorithm/ngt/assets/index/:

  • grp
  • obj
  • prf
  • tre

appear to be index files that might be generated during runtime or build processes. Including generated files in version control can lead to merge conflicts and increased repository size.

Please run the following script to check if these files are being generated and should be excluded from version control:

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Find index files that might be generated and should not be committed.

# Expected result: List of potentially generated index files included in the repository.
fd --type f --regex '^(grp|obj|prf|tre)$' internal/core/algorithm/ngt/assets/index/

Length of output: 606


Script:

#!/bin/bash
# Description: Find index files that might be generated and should not be committed.

# Expected result: List of potentially generated index files included in the repository.
fd --type f --regex '^(grp|obj|prf|tre)$' internal/core/algorithm/ngt/assets/index/

Length of output: 265

@kpango kpango merged commit edd5061 into release/v1.7 Oct 11, 2024
110 checks passed
@kpango kpango deleted the pre-release/v1.7.14/patch branch October 11, 2024 20:07
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants