fix: log_level config schema to align with parse behaviour#2025
fix: log_level config schema to align with parse behaviour#2025
log_level config schema to align with parse behaviour#2025Conversation
WalkthroughThe change updates the enumeration values for the "log_level" property in the JSON schema configuration, replacing "warning" with "warn" and reordering the log levels. It removes a custom log level parsing function, replacing its usage with Changes
📜 Recent review detailsConfiguration used: CodeRabbit UI 📒 Files selected for processing (4)
💤 Files with no reviewable changes (1)
🚧 Files skipped from review as they are similar to previous changes (3)
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (9)
✨ Finishing Touches
🪧 TipsChatThere are 3 ways to chat with CodeRabbit:
SupportNeed help? Create a ticket on our support page for assistance with any issues or questions. Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments. CodeRabbit Commands (Invoked using PR comments)
Other keywords and placeholders
CodeRabbit Configuration File (
|
There was a problem hiding this comment.
Actionable comments posted: 0
🧹 Nitpick comments (1)
router/pkg/config/config.schema.json (1)
1348-1352: Schema aligns with runtime parser but could break existing configs – highlight in docs / release notesSwitching from
"warning"→"warn"(and adding"dpanic") correctly mirrors the zap log-level parser, so the validation/runtime gap is closed.
However, any user that previously relied on"warning"will now fail schema validation instead of merely getting an unexpected runtime level.Action items:
- Update user-facing docs and configuration examples to reflect the new values.
- Mention the breaking-change nature in the CHANGELOG / release notes so integrators can migrate.
No code change needed here; just ensuring rollout awareness.
📜 Review details
Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro
📒 Files selected for processing (1)
router/pkg/config/config.schema.json(1 hunks)
🧰 Additional context used
🧠 Learnings (1)
router/pkg/config/config.schema.json (1)
undefined
<retrieved_learning>
Learnt from: endigma
PR: #2009
File: router/pkg/config/config.go:0-0
Timestamp: 2025-07-03T10:33:25.778Z
Learning: The CardinalityLimit field in the Metrics struct (router/pkg/config/config.go) is validated at the JSON schema level in config.schema.json with a minimum value constraint of 1, preventing zero or negative values without requiring runtime validation.
</retrieved_learning>
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (7)
- GitHub Check: build-router
- GitHub Check: build_push_image
- GitHub Check: build_test
- GitHub Check: integration_test (./. ./fuzzquery ./lifecycle ./modules)
- GitHub Check: image_scan
- GitHub Check: Analyze (javascript-typescript)
- GitHub Check: Analyze (go)
Router image scan passed✅ No security vulnerabilities found in image: |
|
I think ne never exposed |
7b24c40 to
6af32e2
Compare
Summary by CodeRabbit
Checklist