Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Improve vault start pnl query. #2664

Merged
merged 4 commits into from
Dec 17, 2024

Conversation

vincentwschau
Copy link
Contributor

@vincentwschau vincentwschau commented Dec 17, 2024

Changelist

Only fetch the starting vault pnl rows once when starting the service as this never changes. Use the hourly view to get the latest PnL ticks rather than the table as it contains less data.

Test Plan

Unit tests and deployed to a testing env.

Author/Reviewer Checklist

  • If this PR has changes that result in a different app state given the same prior state and transaction list, manually add the state-breaking label.
  • If the PR has breaking postgres changes to the indexer add the indexer-postgres-breaking label.
  • If this PR isn't state-breaking but has changes that modify behavior in PrepareProposal or ProcessProposal, manually add the label proposal-breaking.
  • If this PR is one of many that implement a specific feature, manually label them all feature:[feature-name].
  • If you wish to for mergify-bot to automatically create a PR to backport your change to a release branch, manually add the label backport/[branch-name].
  • Manually add any of the following labels: refactor, chore, bug.

Summary by CodeRabbit

Release Notes

  • New Features

    • Introduced a new function to retrieve the latest profit and loss (P&L) data for vaults.
    • Added caching functionality for vault-related P&L data.
    • New methods for managing vault mappings and P&L start dates.
  • Bug Fixes

    • Improved test suite setup and teardown for vault-related tests.
  • Refactor

    • Simplified data retrieval processes for vault P&L ticks.
    • Removed unnecessary imports and functions to streamline the vault controller logic.
  • Documentation

    • Updated types and interfaces to enhance data structure clarity.

@vincentwschau vincentwschau requested a review from a team as a code owner December 17, 2024 16:34
Copy link
Contributor

coderabbitai bot commented Dec 17, 2024

Walkthrough

This pull request introduces enhancements to the vault PnL (Profit and Loss) tracking system within the indexer services. Key changes include the addition of a new asynchronous function getLatestVaultPnl for retrieving the latest PnL data, the introduction of a caching mechanism for vault start PnL, and significant refactoring of the vault controller logic. These modifications span multiple files, focusing on improving data retrieval, caching, and management of vault-related information while maintaining existing functionalities.

Changes

File Change Summary
indexer/packages/postgres/src/stores/vault-pnl-ticks-view.ts Added getLatestVaultPnl() function to retrieve latest vault PnL entries
indexer/services/comlink/__tests__/controllers/api/v4/vault-controller.test.ts Added imports for vault start PnL cache management in tests
indexer/services/comlink/src/caches/vault-start-pnl.ts New file introducing vault start PnL caching mechanism with functions for managing cache
indexer/services/comlink/src/controllers/api/v4/vault-controller.ts Removed getVaultMapping(), updated PnL tick retrieval methods to streamline logic
indexer/services/comlink/src/index.ts Added initialization of vault start PnL cache in the startup sequence
indexer/services/comlink/src/lib/helpers.ts Added getVaultMapping() and getVaultPnlStartDate() functions to enhance vault management
indexer/services/comlink/src/types.ts Added VaultMapping interface for mapping subaccount IDs to vault data

Possibly related PRs

Suggested labels

backport/indexer/v7.x

Suggested reviewers

  • tqin7
  • shrenujb

Poem

🐰 In the vaults where numbers play,
PnL ticks dance, bright as day.
Caches spring to life with cheer,
Data flows, our path is clear!
A rabbit’s hop, a coder’s way! 🥕

Tip

CodeRabbit's docstrings feature is now available as part of our Early Access Program! Simply use the command @coderabbitai generate docstrings to have CodeRabbit automatically generate docstrings for your pull request. We would love to hear your feedback on Discord.


Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media?

❤️ Share
🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Generate unit testing code for this file.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai generate unit testing code for this file.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and generate unit testing code.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai generate docstrings to generate docstrings for this PR. (Beta)
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

CodeRabbit Configuration File (.coderabbit.yaml)

  • You can programmatically configure CodeRabbit by adding a .coderabbit.yaml file to the root of your repository.
  • Please see the configuration documentation for more information.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: # yaml-language-server: $schema=https://coderabbit.ai/integrations/schema.v2.json

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🧹 Nitpick comments (3)
indexer/services/comlink/src/caches/vault-start-pnl.ts (1)

13-21: Clarify the Use of 10-Minute Buffer in PnL Tick Retrieval

In startVaultStartPnlCache, a 10-minute buffer is added when retrieving the latest PnL tick: getVaultPnlStartDate().plus({ minutes: 10 }). Consider explaining the rationale behind the 10-minute buffer to improve code readability and maintainability. If the buffer duration may change in the future, consider making it a configurable parameter.

indexer/packages/postgres/src/stores/vault-pnl-ticks-view.ts (1)

66-88: Optimize SQL Query in getLatestVaultPnl for Performance

The getLatestVaultPnl function retrieves the latest PnL tick per subaccountId using DISTINCT ON. While this approach works, it may not be the most efficient with large datasets. Consider indexing subaccountId and blockTime columns if not already indexed, or refactoring the query to improve performance.

indexer/services/comlink/src/lib/helpers.ts (1)

760-763: Add date string validation.

The function should validate the date string format from config to prevent runtime errors.

Apply this diff:

 export function getVaultPnlStartDate(): DateTime {
+  const dateStr = config.VAULT_PNL_START_DATE;
+  const parsedDate = DateTime.fromISO(dateStr);
+  if (!parsedDate.isValid) {
+    throw new Error(`Invalid date format in VAULT_PNL_START_DATE: ${dateStr}`);
+  }
-  const startDate: DateTime = DateTime.fromISO(config.VAULT_PNL_START_DATE).toUTC();
+  const startDate: DateTime = parsedDate.toUTC();
   return startDate;
 }
📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between a3aea35 and 103bcab.

📒 Files selected for processing (7)
  • indexer/packages/postgres/src/stores/vault-pnl-ticks-view.ts (1 hunks)
  • indexer/services/comlink/__tests__/controllers/api/v4/vault-controller.test.ts (3 hunks)
  • indexer/services/comlink/src/caches/vault-start-pnl.ts (1 hunks)
  • indexer/services/comlink/src/controllers/api/v4/vault-controller.ts (5 hunks)
  • indexer/services/comlink/src/index.ts (2 hunks)
  • indexer/services/comlink/src/lib/helpers.ts (3 hunks)
  • indexer/services/comlink/src/types.ts (2 hunks)
🔇 Additional comments (8)
indexer/services/comlink/src/controllers/api/v4/vault-controller.ts (4)

43-43: Importing getVaultStartPnl

The import of getVaultStartPnl from vault-start-pnl is correctly added to access the cached vault start PnL data.


352-358: Potential Issue with Empty Start PnL in adjustVaultPnlTicks

In the getVaultSubaccountPnlTicks function, when calling adjustVaultPnlTicks(pnlTicks, getVaultStartPnl()), if getVaultStartPnl() returns an empty array or undefined, this could lead to incorrect adjustments or runtime errors. Verify that adjustVaultPnlTicks can handle empty or missing start PnL data gracefully.


549-555: Consistency in Adjusting Latest PnL Ticks

In getLatestPnlTicks, the adjusted PnL ticks are obtained by calling adjustVaultPnlTicks(latestPnlTicks, getVaultStartPnl()). Ensure that getVaultStartPnl() returns the correct baseline PnL data and that adjustments are applied accurately across all vaults.


Line range hint 562-575: Handling Adjustments in getLatestPnlTick

The function getLatestPnlTick now adjusts PnL ticks using adjustVaultPnlTicks(pnlTicks, getVaultStartPnl()). Confirm that this adjustment is valid for the specific vault subaccounts and that any potential discrepancies are accounted for.

indexer/services/comlink/src/caches/vault-start-pnl.ts (1)

27-33: Restricting Cache Clearing to Test Environments

In clearVaultStartPnl, throwing an error when attempting to clear the vault start PnL cache outside of the test environment is appropriate. Ensure that this function is only invoked in testing contexts, and consider logging the error or providing more detailed feedback.

indexer/services/comlink/src/index.ts (1)

46-47: Initializing Vault Start PnL Cache During Startup

The addition of await startVaultStartPnlCache(); correctly initializes the vault start PnL cache at application startup. This ensures that the cached data is available before handling requests.

indexer/services/comlink/src/types.ts (1)

695-697: LGTM! Well-structured interface definition.

The VaultMapping interface is clear, concise, and follows TypeScript best practices for defining a dictionary type.

indexer/services/comlink/__tests__/controllers/api/v4/vault-controller.test.ts (1)

27-27: LGTM! Proper test setup and teardown.

The changes correctly handle the vault start PnL cache state in tests:

  • Cache is cleared in afterEach to prevent test pollution
  • Cache is initialized with fresh data in createPnlTicks

Also applies to: 135-135, 658-658

Comment on lines 728 to 758
export async function getVaultMapping(): Promise<VaultMapping> {
const vaults: VaultFromDatabase[] = await VaultTable.findAll(
{},
[],
{},
);
const vaultMapping: VaultMapping = _.zipObject(
vaults.map((vault: VaultFromDatabase): string => {
return SubaccountTable.uuid(vault.address, 0);
}),
vaults,
);
const validVaultMapping: VaultMapping = {};
for (const subaccountId of _.keys(vaultMapping)) {
const perpetual: PerpetualMarketFromDatabase | undefined = perpetualMarketRefresher
.getPerpetualMarketFromClobPairId(
vaultMapping[subaccountId].clobPairId,
);
if (perpetual === undefined) {
logger.warning({
at: 'VaultController#getVaultPositions',
message: `Vault clob pair id ${vaultMapping[subaccountId]} does not correspond to a ` +
'perpetual market.',
subaccountId,
});
continue;
}
validVaultMapping[subaccountId] = vaultMapping[subaccountId];
}
return validVaultMapping;
}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛠️ Refactor suggestion

Add error handling and fix logging location.

The function should handle potential database errors. Also, there's a typo in the logging location.

Apply this diff:

 export async function getVaultMapping(): Promise<VaultMapping> {
-  const vaults: VaultFromDatabase[] = await VaultTable.findAll(
-    {},
-    [],
-    {},
-  );
+  try {
+    const vaults: VaultFromDatabase[] = await VaultTable.findAll(
+      {},
+      [],
+      {},
+    );
+    const vaultMapping: VaultMapping = _.zipObject(
+      vaults.map((vault: VaultFromDatabase): string => {
+        return SubaccountTable.uuid(vault.address, 0);
+      }),
+      vaults,
+    );
+    const validVaultMapping: VaultMapping = {};
+    for (const subaccountId of _.keys(vaultMapping)) {
+      const perpetual: PerpetualMarketFromDatabase | undefined = perpetualMarketRefresher
+        .getPerpetualMarketFromClobPairId(
+          vaultMapping[subaccountId].clobPairId,
+        );
+      if (perpetual === undefined) {
+        logger.warning({
-          at: 'VaultController#getVaultPositions',
+          at: 'helpers#getVaultMapping',
+          message: `Vault clob pair id ${vaultMapping[subaccountId].clobPairId} does not correspond to a perpetual market.`,
+          subaccountId,
+        });
+        continue;
+      }
+      validVaultMapping[subaccountId] = vaultMapping[subaccountId];
+    }
+    return validVaultMapping;
+  } catch (error) {
+    logger.error({
+      at: 'helpers#getVaultMapping',
+      message: 'Failed to get vault mapping',
+      error,
+    });
+    throw error;
+  }
 }
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
export async function getVaultMapping(): Promise<VaultMapping> {
const vaults: VaultFromDatabase[] = await VaultTable.findAll(
{},
[],
{},
);
const vaultMapping: VaultMapping = _.zipObject(
vaults.map((vault: VaultFromDatabase): string => {
return SubaccountTable.uuid(vault.address, 0);
}),
vaults,
);
const validVaultMapping: VaultMapping = {};
for (const subaccountId of _.keys(vaultMapping)) {
const perpetual: PerpetualMarketFromDatabase | undefined = perpetualMarketRefresher
.getPerpetualMarketFromClobPairId(
vaultMapping[subaccountId].clobPairId,
);
if (perpetual === undefined) {
logger.warning({
at: 'VaultController#getVaultPositions',
message: `Vault clob pair id ${vaultMapping[subaccountId]} does not correspond to a ` +
'perpetual market.',
subaccountId,
});
continue;
}
validVaultMapping[subaccountId] = vaultMapping[subaccountId];
}
return validVaultMapping;
}
export async function getVaultMapping(): Promise<VaultMapping> {
try {
const vaults: VaultFromDatabase[] = await VaultTable.findAll(
{},
[],
{},
);
const vaultMapping: VaultMapping = _.zipObject(
vaults.map((vault: VaultFromDatabase): string => {
return SubaccountTable.uuid(vault.address, 0);
}),
vaults,
);
const validVaultMapping: VaultMapping = {};
for (const subaccountId of _.keys(vaultMapping)) {
const perpetual: PerpetualMarketFromDatabase | undefined = perpetualMarketRefresher
.getPerpetualMarketFromClobPairId(
vaultMapping[subaccountId].clobPairId,
);
if (perpetual === undefined) {
logger.warning({
at: 'helpers#getVaultMapping',
message: `Vault clob pair id ${vaultMapping[subaccountId].clobPairId} does not correspond to a perpetual market.`,
subaccountId,
});
continue;
}
validVaultMapping[subaccountId] = vaultMapping[subaccountId];
}
return validVaultMapping;
} catch (error) {
logger.error({
at: 'helpers#getVaultMapping',
message: 'Failed to get vault mapping',
error,
});
throw error;
}
}

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

🧹 Nitpick comments (2)
indexer/services/comlink/src/controllers/api/v4/vault-controller.ts (2)

561-565: Consider extracting window configuration

The window configuration (config.VAULT_LATEST_PNL_TICK_WINDOW_HOURS * 60 * 60) is used directly in the query. Consider extracting this to a constant for better maintainability.

+const VAULT_LATEST_PNL_TICK_WINDOW_SECONDS = config.VAULT_LATEST_PNL_TICK_WINDOW_HOURS * 60 * 60;
+
 export async function getLatestPnlTick(
   vaults: VaultFromDatabase[],
 ): Promise<PnlTicksFromDatabase | undefined> {
   const pnlTicks: PnlTicksFromDatabase[] = await VaultPnlTicksView.getVaultsPnl(
     PnlTickInterval.hour,
-    config.VAULT_LATEST_PNL_TICK_WINDOW_HOURS * 60 * 60,
+    VAULT_LATEST_PNL_TICK_WINDOW_SECONDS,
     getVaultPnlStartDate(),
   );

352-358: Consider consolidating window calculations

Similar to the previous comment, the window calculations could be extracted and consolidated. This would improve maintainability and ensure consistent window calculations across the codebase.

+const VAULT_PNL_WINDOW_SECONDS = {
+  [PnlTickInterval.day]: config.VAULT_PNL_HISTORY_DAYS * 24 * 60 * 60,
+  [PnlTickInterval.hour]: config.VAULT_PNL_HISTORY_HOURS * 60 * 60,
+};
+
 async function getVaultSubaccountPnlTicks(
   vaultSubaccountIds: string[],
   resolution: PnlTickInterval,
 ): Promise<PnlTicksFromDatabase[]> {
   if (vaultSubaccountIds.length === 0) {
     return [];
   }
-  let windowSeconds: number;
-  if (resolution === PnlTickInterval.day) {
-    windowSeconds = config.VAULT_PNL_HISTORY_DAYS * 24 * 60 * 60;
-  } else {
-    windowSeconds = config.VAULT_PNL_HISTORY_HOURS * 60 * 60;
-  }
+  const windowSeconds = VAULT_PNL_WINDOW_SECONDS[resolution];
📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 103bcab and 2fb9b0b.

📒 Files selected for processing (1)
  • indexer/services/comlink/src/controllers/api/v4/vault-controller.ts (6 hunks)
🔇 Additional comments (2)
indexer/services/comlink/src/controllers/api/v4/vault-controller.ts (2)

549-555: Improved efficiency with cached start PnL

The implementation now uses VaultPnlTicksView.getLatestVaultPnl() and adjusts the results using cached start PnL, which aligns with the PR objective of optimizing PnL queries.


Line range hint 749-771: LGTM! Efficient implementation of PnL adjustment

The implementation uses a map-based approach for O(n) complexity and clearly handles the adjustment of PnL ticks. The code is well-structured and maintains good performance characteristics.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 2fb9b0b and 02838dd.

📒 Files selected for processing (1)
  • indexer/services/comlink/src/lib/helpers.ts (3 hunks)
🔇 Additional comments (1)
indexer/services/comlink/src/lib/helpers.ts (1)

728-758: 🛠️ Refactor suggestion

Add error handling for database operations.

The function should handle potential database errors and validate inputs.

Apply this diff:

 export async function getVaultMapping(): Promise<VaultMapping> {
+  try {
     const vaults: VaultFromDatabase[] = await VaultTable.findAll(
       {},
       [],
       {},
     );
+    if (!Array.isArray(vaults)) {
+      throw new Error('Expected array of vaults from database');
+    }
     const vaultMapping: VaultMapping = _.zipObject(
       vaults.map((vault: VaultFromDatabase): string => {
         return SubaccountTable.uuid(vault.address, 0);
       }),
       vaults,
     );
     const validVaultMapping: VaultMapping = {};
     for (const subaccountId of _.keys(vaultMapping)) {
       const perpetual: PerpetualMarketFromDatabase | undefined = perpetualMarketRefresher
         .getPerpetualMarketFromClobPairId(
           vaultMapping[subaccountId].clobPairId,
         );
       if (perpetual === undefined) {
         logger.warning({
           at: 'get-vault-mapping',
-          message: `Vault clob pair id ${vaultMapping[subaccountId]} does not correspond to a ` +
-            'perpetual market.',
+          message: `Vault clob pair id ${vaultMapping[subaccountId].clobPairId} does not correspond to a perpetual market.`,
           subaccountId,
         });
         continue;
       }
       validVaultMapping[subaccountId] = vaultMapping[subaccountId];
     }
     return validVaultMapping;
+  } catch (error) {
+    logger.error({
+      at: 'get-vault-mapping',
+      message: 'Failed to get vault mapping',
+      error,
+    });
+    throw error;
+  }
 }

Likely invalid or redundant comment.

Comment on lines +760 to +763
export function getVaultPnlStartDate(): DateTime {
const startDate: DateTime = DateTime.fromISO(config.VAULT_PNL_START_DATE).toUTC();
return startDate;
}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛠️ Refactor suggestion

Add validation for config value and date format.

The function should validate the config value exists and handle invalid date formats.

Apply this diff:

 export function getVaultPnlStartDate(): DateTime {
+  if (!config.VAULT_PNL_START_DATE) {
+    throw new Error('VAULT_PNL_START_DATE is not configured');
+  }
   const startDate: DateTime = DateTime.fromISO(config.VAULT_PNL_START_DATE).toUTC();
+  if (!startDate.isValid) {
+    throw new Error(`Invalid date format in VAULT_PNL_START_DATE: ${config.VAULT_PNL_START_DATE}`);
+  }
   return startDate;
 }
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
export function getVaultPnlStartDate(): DateTime {
const startDate: DateTime = DateTime.fromISO(config.VAULT_PNL_START_DATE).toUTC();
return startDate;
}
export function getVaultPnlStartDate(): DateTime {
if (!config.VAULT_PNL_START_DATE) {
throw new Error('VAULT_PNL_START_DATE is not configured');
}
const startDate: DateTime = DateTime.fromISO(config.VAULT_PNL_START_DATE).toUTC();
if (!startDate.isValid) {
throw new Error(`Invalid date format in VAULT_PNL_START_DATE: ${config.VAULT_PNL_START_DATE}`);
}
return startDate;
}

@vincentwschau vincentwschau merged commit 81ec99c into main Dec 17, 2024
16 checks passed
@vincentwschau vincentwschau deleted the vincentc/improve-vault-start-pnl-query branch December 17, 2024 20:27
mergify bot pushed a commit that referenced this pull request Dec 17, 2024
vincentwschau added a commit that referenced this pull request Dec 17, 2024
Co-authored-by: vincentwschau <99756290+vincentwschau@users.noreply.github.com>
@Solontus
Copy link

@Mergifyio backport release/indexer/v8.x

Copy link
Contributor

mergify bot commented Dec 26, 2024

backport release/indexer/v8.x

❌ Command disallowed due to command restrictions in the Mergify configuration.

  • sender-permission >= write

@vincentwschau
Copy link
Contributor Author

@Mergifyio backport release/indexer/v8.x

Copy link
Contributor

mergify bot commented Dec 26, 2024

backport release/indexer/v8.x

✅ Backports have been created

mergify bot pushed a commit that referenced this pull request Dec 26, 2024
vincentwschau added a commit that referenced this pull request Dec 26, 2024
Co-authored-by: vincentwschau <99756290+vincentwschau@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Development

Successfully merging this pull request may close these issues.

3 participants