Skip to content

Conversation

@skosito
Copy link
Contributor

@skosito skosito commented Nov 3, 2025

Description

not for review, early in wip mode, e2e tests and upgrade tests (except rpc) are passing

How Has This Been Tested?

  • Tested CCTX in localnet
  • Tested in development environment
  • Go unit tests
  • Go integration tests
  • Tested via GitHub Actions

@skosito skosito added the UPGRADE_TESTS Run make start-upgrade-tests label Nov 3, 2025
@skosito skosito changed the title feat: upgrade cosmos evm new [WIP] feat: upgrade cosmos evm to 0.5 [WIP] Nov 3, 2025
@coderabbitai
Copy link
Contributor

coderabbitai bot commented Nov 3, 2025

Important

Review skipped

Draft detected.

Please check the settings in the CodeRabbit UI or the .coderabbit.yaml file in this repository. To trigger a single review, invoke the @coderabbitai review command.

You can disable this status message by setting the reviews.review_status to false in the CodeRabbit configuration file.

✨ Finishing touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Post copyable unit tests in a comment
  • Commit unit tests in branch upgrade-cosmos-evm-new

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

@github-actions
Copy link

github-actions bot commented Nov 3, 2025

!!!WARNING!!!
nosec detected in the following files: rpc/backend/comet_to_eth.go, rpc/backend/backend_suite_test.go, rpc/backend/blocks_test.go, rpc/backend/chain_info.go, rpc/backend/tracing.go, rpc/backend/tx_info.go, rpc/backend/tx_pool.go, rpc/backend/utils.go, rpc/namespaces/ethereum/debug/api.go, rpc/types/events.go, rpc/types/events_test.go, server/config/config.go

Be very careful about using #nosec in code. It can be a quick way to suppress security warnings and move forward with development, it should be employed with caution. Suppressing warnings with #nosec can hide potentially serious vulnerabilities. Only use #nosec when you're absolutely certain that the security issue is either a false positive or has been mitigated in another way.

Only suppress a single rule (or a specific set of rules) within a section of code, while continuing to scan for other problems. To do this, you can list the rule(s) to be suppressed within the #nosec annotation, e.g: /* #nosec G401 */ or //#nosec G201 G202 G203
Broad #nosec annotations should be avoided, as they can hide other vulnerabilities. The CI will block you from merging this PR until you remove #nosec annotations that do not target specific rules.

Pay extra attention to the way #nosec is being used in the files listed above.

@github-actions github-actions bot added the nosec label Nov 3, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

breaking:cli nosec UPGRADE_TESTS Run make start-upgrade-tests

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants