Skip to content

🧹 chore: Use int64 when dealing with HTTP Ranges#3874

Merged
ReneWerner87 merged 3 commits intomainfrom
update-rangeset-to-use-int64-for-large-files
Nov 18, 2025
Merged

🧹 chore: Use int64 when dealing with HTTP Ranges#3874
ReneWerner87 merged 3 commits intomainfrom
update-rangeset-to-use-int64-for-large-files

Conversation

@gaby
Copy link
Member

@gaby gaby commented Nov 17, 2025

Summary

  • This pull request significantly improves the robustness of HTTP Range header parsing by addressing potential integer overflow issues when dealing with very large file sizes. It refactors the internal Range handling to consistently use int64 for size and range bounds, introduces a clamping mechanism to prevent overflows during parsing, and updates relevant interfaces and documentation. These changes ensure more reliable and secure processing of range requests, especially in environments with large data transfers.

@gaby gaby requested a review from a team as a code owner November 17, 2025 15:10
Copilot AI review requested due to automatic review settings November 17, 2025 15:10
@github-actions github-actions bot added the v3 label Nov 17, 2025
@coderabbitai
Copy link
Contributor

coderabbitai bot commented Nov 17, 2025

Note

Other AI code review bot(s) detected

CodeRabbit has detected other AI code review bot(s) in this pull request and will avoid duplicating their findings in the review comments. This may lead to a less comprehensive review.

Walkthrough

The Range API and related types were widened from 32-bit to 64-bit: Range(size int) was changed to Range(size int64) in Ctx and Req interfaces, RangeSet fields became int64, parsing now validates bounds with a new helper, tests and docs updated for large-file ranges.

Changes

Cohort / File(s) Summary
Interface updates
ctx_interface_gen.go, req_interface_gen.go
Changed Range(size int)Range(size int64) in Ctx and Req interfaces.
Range implementation
req.go
RangeSet.Start/End changed from intint64; DefaultReq.Range parameter changed to int64; added internal parseBound helper to validate/convert bounds and return ErrRangeMalformed for invalid bounds; Content-Range formatting now uses strconv.FormatInt(size, 10); imports updated.
Tests
ctx_test.go
Added tests for large-file ranges and overflow scenarios (Test_Ctx_Range_LargeFile, Test_Ctx_Range_Overflow); added math import and adjusted expectations for int64 boundaries.
Documentation
docs/api/ctx.md
Updated example signature to func (c fiber.Ctx) Range(size int64) (Range, error) and related docs text.

Sequence Diagram(s)

sequenceDiagram
    participant Client
    participant Ctx
    participant DefaultReq
    participant parseBound

    Client->>Ctx: Range(size: int64)
    Ctx->>DefaultReq: Range(size: int64)
    DefaultReq->>parseBound: validate start/end strings
    alt bounds valid
        parseBound-->>DefaultReq: start:int64, end:int64
        DefaultReq-->>Ctx: Range{Start:int64, End:int64}
        Ctx-->>Client: return Range
    else malformed bounds / overflow
        parseBound-->>DefaultReq: ErrRangeMalformed
        DefaultReq-->>Ctx: return error
        Ctx-->>Client: return error
    end
Loading

Estimated code review effort

🎯 3 (Moderate) | ⏱️ ~20 minutes

  • Verify all interface and implementation signatures changed consistently.
  • Inspect parseBound logic for correct int64 conversion, overflow handling, and negative-value behavior.
  • Confirm Content-Range string formatting and any uses that assume 32-bit ints.
  • Run and validate updated tests for large-file behavior.

Possibly related PRs

Suggested labels

🧹 Updates

Suggested reviewers

  • sixcolors
  • efectn
  • ReneWerner87

Poem

🐇
I hopped through bytes both wide and tall,
From int to int64 I stretch my sprawl.
Ranges grow long and errors shrink,
This rabbit tests each boundary link. 🥕

Pre-merge checks and finishing touches

❌ Failed checks (1 warning, 1 inconclusive)
Check name Status Explanation Resolution
Docstring Coverage ⚠️ Warning Docstring coverage is 40.00% which is insufficient. The required threshold is 80.00%. You can run @coderabbitai generate docstrings to improve docstring coverage.
Description check ❓ Inconclusive The PR description is vague and does not follow the repository's template, missing critical structured sections like detailed changes, checklist items, and type of change classification. Expand the description to follow the template: detail specific changes, mark checklist items (benchmarks, docs, tests, etc.), specify the change type, and provide migration guidance if needed.
✅ Passed checks (1 passed)
Check name Status Explanation
Title check ✅ Passed The title clearly and concisely summarizes the main change: converting HTTP Range handling from int to int64 for larger file size support.
✨ Finishing touches
  • 📝 Generate docstrings
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Post copyable unit tests in a comment
  • Commit unit tests in branch update-rangeset-to-use-int64-for-large-files

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

@gemini-code-assist
Copy link
Contributor

Summary of Changes

Hello @gaby, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

This pull request significantly improves the robustness of HTTP Range header parsing by addressing potential integer overflow issues when dealing with very large file sizes. It refactors the internal Range handling to consistently use int64 for size and range bounds, introduces a clamping mechanism to prevent overflows during parsing, and updates relevant interfaces and documentation. These changes ensure more reliable and secure processing of range requests, especially in environments with large data transfers.

Highlights

  • Range Parsing Robustness: The Range header parsing logic has been enhanced to prevent potential integer overflows by clamping parsed range header bounds against math.MaxUint64 >> 1 before converting them to int64. This ensures that the overflow check remains within the math package's capabilities.
  • Type Signature Updates: The Range method in both the Ctx and Req interfaces, as well as its implementation in DefaultReq, now accepts int64 for the size parameter instead of int. Additionally, the Start and End fields within the RangeSet struct have been updated from int to int64 to accommodate larger values.
  • New Helper Function and Error Handling: A new internal helper function, parseBound, has been introduced in req.go to encapsulate the logic for parsing string values into int64 and applying the math.MaxUint64 >> 1 clamp. This function also includes specific error handling for malformed range values.
  • Expanded Test Coverage: New test cases (Test_Ctx_Range_LargeFile) have been added to ctx_test.go to specifically validate the Range method's behavior when dealing with large file sizes and range values, confirming the correct handling of int64 conversions and the new clamping mechanism.
  • Documentation Alignment: The API documentation for the Ctx.Range method in docs/api/ctx.md has been updated to reflect the change in the size parameter's type from int to int64.
Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point by creating a comment using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands on the current page.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in pull request comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here.

You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

@gaby gaby changed the title Clamp range parsing with math.MaxUint64 🧹 chore: Add support for int64 when using Range() Nov 17, 2025
@codecov
Copy link

codecov bot commented Nov 17, 2025

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 91.58%. Comparing base (5d91977) to head (25e844a).
⚠️ Report is 43 commits behind head on main.

Additional details and impacted files
@@            Coverage Diff             @@
##             main    #3874      +/-   ##
==========================================
- Coverage   91.64%   91.58%   -0.06%     
==========================================
  Files         115      115              
  Lines        9848     9857       +9     
==========================================
+ Hits         9025     9028       +3     
- Misses        523      528       +5     
- Partials      300      301       +1     
Flag Coverage Δ
unittests 91.58% <100.00%> (-0.06%) ⬇️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

@gaby gaby changed the title 🧹 chore: Add support for int64 when using Range() 🧹 chore: Use int64 when dealing with HTTP Ranges Nov 17, 2025
Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR updates the HTTP Range header parsing to use int64 instead of int for range bounds, and adds clamping to prevent overflow when converting parsed uint64 values to int64. The threshold is set to math.MaxUint64 >> 1 (which equals math.MaxInt64), ensuring values stay within safe bounds for signed 64-bit integers.

Key Changes:

  • Changed RangeSet.Start and RangeSet.End from int to int64 to support larger files
  • Updated Range(size) method signature to accept int64 instead of int
  • Added parseBound helper function that clamps parsed values at math.MaxInt64 to prevent overflow

Reviewed Changes

Copilot reviewed 5 out of 5 changed files in this pull request and generated 1 comment.

Show a summary per file
File Description
req.go Core implementation: added parseBound function with overflow protection, updated RangeSet fields to int64, and changed Range method signature
req_interface_gen.go Updated generated interface to reflect Range(size int64) signature change
ctx_interface_gen.go Updated generated interface to reflect Range(size int64) signature change
docs/api/ctx.md Updated documentation to show the new Range(size int64) signature
ctx_test.go Added Test_Ctx_Range_LargeFile to verify large file range handling with values exceeding math.MaxInt32

Copy link
Contributor

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

The pull request effectively addresses the issue of clamping range parsing by migrating relevant types and parsing logic to int64 and incorporating math.MaxUint64 for robust overflow checks. The introduction of the parseBound helper function centralizes the parsing and validation logic, ensuring that range header bounds are correctly handled and preventing potential overflows when converting to int64. The updated test cases, including Test_Ctx_Range_LargeFile, adequately cover the new functionality, and the documentation has been updated to reflect the changes in the Range method signature. Overall, the changes are well-implemented and improve the reliability of range header processing.

Copy link

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

🧹 Nitpick comments (1)
docs/api/ctx.md (1)

1371-1396: Documentation updated correctly.

The signature change is accurately reflected in the documentation. The example remains valid since integer literals can be used where int64 is expected.

Consider adding a brief note about large file support to help users understand why int64 is used:

 ### Range
 
 Returns a struct containing the type and a slice of ranges.
+Accepts file sizes up to 2^63-1 bytes to support very large files.
 Only the canonical `bytes` unit is recognized and any optional

This would make it clearer why the API uses int64 rather than int, especially for developers working with large file serving.

📜 Review details

Configuration used: CodeRabbit UI

Review profile: CHILL

Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between aaad4cf and 185a1e3.

📒 Files selected for processing (5)
  • ctx_interface_gen.go (1 hunks)
  • ctx_test.go (2 hunks)
  • docs/api/ctx.md (1 hunks)
  • req.go (5 hunks)
  • req_interface_gen.go (1 hunks)
🧰 Additional context used
🧠 Learnings (4)
📓 Common learnings
Learnt from: efectn
Repo: gofiber/fiber PR: 3824
File: listen_test.go:560-564
Timestamp: 2025-11-13T11:34:38.503Z
Learning: The gofiber/fiber project only supports the latest Go versions, so Go 1.22+ syntax features (such as `for range N` integer range loops) are acceptable and preferred.
Learnt from: ReneWerner87
Repo: gofiber/fiber PR: 3161
File: app.go:923-932
Timestamp: 2024-11-15T07:56:21.623Z
Learning: In the Fiber framework, breaking changes are acceptable when moving from version 2 to version 3, including modifications to method signatures such as in the `Test` method in `app.go`.
📚 Learning: 2024-11-08T04:10:42.990Z
Learnt from: gaby
Repo: gofiber/fiber PR: 3193
File: middleware/cache/cache_test.go:897-897
Timestamp: 2024-11-08T04:10:42.990Z
Learning: In the Fiber framework, `Context()` is being renamed to `RequestCtx()`, and `UserContext()` to `Context()` to improve clarity and align with Go's context conventions.

Applied to files:

  • docs/api/ctx.md
📚 Learning: 2024-10-16T12:12:30.506Z
Learnt from: gaby
Repo: gofiber/fiber PR: 3170
File: ctx_test.go:1721-1724
Timestamp: 2024-10-16T12:12:30.506Z
Learning: In the Go unit tests in `ctx_test.go`, it is acceptable to use invalid CIDR notation such as `"0.0.0.1/31junk"` for testing purposes.

Applied to files:

  • ctx_test.go
📚 Learning: 2025-10-16T07:19:52.418Z
Learnt from: grivera64
Repo: gofiber/fiber PR: 3807
File: adapter_test.go:118-144
Timestamp: 2025-10-16T07:19:52.418Z
Learning: In the Fiber codebase, the linter does not allow `require` assertions from within HTTP handlers (including net/http-style handlers). Use `t.Fatalf`, `t.Errorf`, or similar `testing.T` methods for error handling inside handler functions instead.

Applied to files:

  • ctx_test.go
🧬 Code graph analysis (4)
req_interface_gen.go (1)
req.go (1)
  • Range (18-21)
ctx_interface_gen.go (1)
req.go (1)
  • Range (18-21)
req.go (3)
constants.go (2)
  • HeaderRange (236-236)
  • HeaderContentRange (234-234)
error.go (1)
  • ErrRangeMalformed (30-30)
res.go (1)
  • DefaultRes (127-129)
ctx_test.go (2)
constants.go (1)
  • HeaderRange (236-236)
req.go (1)
  • Range (18-21)
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (6)
  • GitHub Check: Agent
  • GitHub Check: lint
  • GitHub Check: Compare
  • GitHub Check: repeated
  • GitHub Check: unit (1.25.x, windows-latest)
  • GitHub Check: unit (1.25.x, macos-latest)
🔇 Additional comments (4)
req_interface_gen.go (1)

171-171: Verified: Interface and implementation signatures are consistent.

The generated interface signature in req_interface_gen.go:171 matches the DefaultReq implementation in req.go:741. Both use int64 for the size parameter, and the implementation correctly handles large file ranges throughout the function logic.

ctx_interface_gen.go (1)

305-305: LGTM! Signature change supports large file ranges.

The change from int to int64 properly supports range operations on files larger than 2GB. This is a breaking change, which is acceptable for the v2→v3 transition.

Verification confirms all requirements:

  1. ✅ ifacemaker generator (ctx.go:52) is configured to process req.go containing the updated Range method
  2. ✅ req.go:741 correctly implements Range(size int64) (Range, error)
  3. ✅ Call sites are updated (ctx_test.go:3581 passes compatible int64 values)
ctx_test.go (1)

3609-3632: Great addition for 64-bit coverage.

This test nails the >32-bit start/end and suffix cases so we won’t regress the new int64 path.

req.go (1)

748-821: Appreciate the defensive clamp.

Keeping bounds ≤ math.MaxUint64 >> 1 means we never overflow the int64 conversion and malformed ranges bail out early with ErrRangeMalformed; much cleaner than sprinkling casts.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

🧹 Nitpick comments (1)
req.go (1)

749-758: Consider consistent error wrapping.

The overflow check parsed > (math.MaxUint64 >> 1) correctly prevents values exceeding MaxInt64 from being converted to int64. However, the error handling is inconsistent: parse errors are wrapped with context (line 752), but the overflow case returns bare ErrRangeMalformed (line 755).

For consistency and better debugging, consider wrapping the overflow error as well:

 	if parsed > (math.MaxUint64 >> 1) {
-		return 0, ErrRangeMalformed
+		return 0, fmt.Errorf("range bound %q exceeds maximum: %w", value, ErrRangeMalformed)
 	}
📜 Review details

Configuration used: CodeRabbit UI

Review profile: CHILL

Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 185a1e3 and 47c5d56.

📒 Files selected for processing (1)
  • req.go (5 hunks)
🧰 Additional context used
🧠 Learnings (1)
📚 Learning: 2025-11-13T11:34:38.503Z
Learnt from: efectn
Repo: gofiber/fiber PR: 3824
File: listen_test.go:560-564
Timestamp: 2025-11-13T11:34:38.503Z
Learning: The gofiber/fiber project only supports the latest Go versions, so Go 1.22+ syntax features (such as `for range N` integer range loops) are acceptable and preferred.

Applied to files:

  • req.go
🧬 Code graph analysis (1)
req.go (3)
constants.go (2)
  • HeaderRange (236-236)
  • HeaderContentRange (234-234)
error.go (1)
  • ErrRangeMalformed (30-30)
res.go (1)
  • DefaultRes (127-129)
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (4)
  • GitHub Check: lint
  • GitHub Check: unit (1.25.x, windows-latest)
  • GitHub Check: repeated
  • GitHub Check: Compare
🔇 Additional comments (5)
req.go (5)

6-7: LGTM! Imports support the new overflow-safe parsing.

The fmt and math imports are appropriately used in the new parseBound helper for error wrapping and overflow detection.


26-27: Breaking change acknowledged for v3.

Widening Start and End to int64 is a breaking API change that requires callers to update their code. However, since this PR targets the v3 branch (as indicated by the label), this is appropriate for a major version bump and enables support for large files beyond 32-bit offsets.


742-742: Breaking change acknowledged for v3.

The signature change from Range(size int) to Range(size int64) breaks backward compatibility but is consistent with the RangeSet field changes and necessary to handle files larger than 2GB. Since this targets v3, the breaking change is appropriate.


795-799: LGTM! Overflow errors are properly rejected.

The logic correctly distinguishes between overflow errors (which should fail immediately) and parse errors from empty strings (which indicate special range forms like -nnn or nnn-). The early return ensures only valid parsing failures reach the suffix/open-ended range handling below.


819-819: LGTM! Correctly formats int64 size.

The switch from strconv.Itoa to strconv.FormatInt(size, 10) is necessary and correct for handling the widened int64 size parameter.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

🧹 Nitpick comments (1)
ctx_test.go (1)

3609-3649: New Range tests correctly cover int64 boundaries and overflow; one small readability nit

The two new tests nicely exercise:

  • A size/start/end well beyond 32‑bit (size/start based on math.MaxInt32) to verify Ctx.Range works with large int64 values, including a suffix range (bytes=-200).
  • Overflow/validation behavior for bounds above the clamping threshold, asserting ErrRangeMalformed when the parsed value exceeds math.MaxUint64 >> 1 (i.e. MaxInt64), which matches the new clamping logic and prior review feedback.

As a tiny readability improvement, you could define tooBig directly from math.MaxInt64 instead of mirroring the internal clamp expression:

tooBig := uint64(math.MaxInt64) + 1

This keeps the numeric boundary identical while making the intent (“just over MaxInt64”) more obvious to readers.

📜 Review details

Configuration used: CodeRabbit UI

Review profile: CHILL

Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 47c5d56 and 25e844a.

📒 Files selected for processing (1)
  • ctx_test.go (2 hunks)
🧰 Additional context used
🧠 Learnings (3)
📚 Learning: 2024-10-16T12:12:30.506Z
Learnt from: gaby
Repo: gofiber/fiber PR: 3170
File: ctx_test.go:1721-1724
Timestamp: 2024-10-16T12:12:30.506Z
Learning: In the Go unit tests in `ctx_test.go`, it is acceptable to use invalid CIDR notation such as `"0.0.0.1/31junk"` for testing purposes.

Applied to files:

  • ctx_test.go
📚 Learning: 2024-07-02T13:29:56.992Z
Learnt from: gaby
Repo: gofiber/fiber PR: 3056
File: middleware/encryptcookie/utils.go:22-25
Timestamp: 2024-07-02T13:29:56.992Z
Learning: The `encryptcookie_test.go` file contains unit tests that validate key lengths for both `EncryptCookie` and `DecryptCookie` functions, ensuring that invalid key lengths raise appropriate errors.

Applied to files:

  • ctx_test.go
📚 Learning: 2025-10-16T07:19:52.418Z
Learnt from: grivera64
Repo: gofiber/fiber PR: 3807
File: adapter_test.go:118-144
Timestamp: 2025-10-16T07:19:52.418Z
Learning: In the Fiber codebase, the linter does not allow `require` assertions from within HTTP handlers (including net/http-style handlers). Use `t.Fatalf`, `t.Errorf`, or similar `testing.T` methods for error handling inside handler functions instead.

Applied to files:

  • ctx_test.go
🧬 Code graph analysis (1)
ctx_test.go (3)
constants.go (1)
  • HeaderRange (236-236)
req.go (1)
  • Range (19-22)
error.go (1)
  • ErrRangeMalformed (30-30)
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (5)
  • GitHub Check: lint
  • GitHub Check: unit (1.25.x, windows-latest)
  • GitHub Check: unit (1.25.x, macos-latest)
  • GitHub Check: repeated
  • GitHub Check: Compare
🔇 Additional comments (1)
ctx_test.go (1)

7-43: math import usage is appropriate

The added math import is used for MaxInt32 and MaxUint64 in the new range tests and keeps everything within the standard library; no issues here.

@ReneWerner87 ReneWerner87 added v3 and removed v3 labels Nov 18, 2025
@ReneWerner87 ReneWerner87 added this to v3 Nov 18, 2025
@ReneWerner87 ReneWerner87 added this to the v3 milestone Nov 18, 2025
@ReneWerner87 ReneWerner87 merged commit 2d4eb62 into main Nov 18, 2025
21 of 23 checks passed
@ReneWerner87 ReneWerner87 deleted the update-rangeset-to-use-int64-for-large-files branch November 18, 2025 07:04
@github-project-automation github-project-automation bot moved this to Done in v3 Nov 18, 2025
@gaby gaby added the 📜 RFC Compliance Feature, implementation, or contribution adheres to relevant RFC standards. label Nov 27, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

codex 📜 RFC Compliance Feature, implementation, or contribution adheres to relevant RFC standards. 🧹 Updates v3

Projects

Status: Done

Development

Successfully merging this pull request may close these issues.

3 participants