Skip to content

Conversation

c-warren
Copy link
Contributor

@c-warren c-warren commented Oct 4, 2025

What changed?

Adds a linter to ensure the conventional commit standard is used for PR titles.

Why?

See cadence-workflow/cadence@c4b6330 for more details.

How did you test it?

In the cadence repo.

Potential risks

N/A

@c-warren c-warren merged commit e52124b into cadence-workflow:master Oct 4, 2025
12 checks passed
gazi-yestemirova pushed a commit to gazi-yestemirova/cadence-go-client that referenced this pull request Oct 14, 2025
…ow#1462)

<!-- Describe what has changed in this PR -->
**What changed?**

Adds a linter to ensure the conventional commit standard is used for PR titles.

<!-- Tell your future self why have you made these changes -->
**Why?**

See cadence-workflow/cadence@c4b6330 for more details.

<!-- How have you verified this change? Tested locally? Added a unit test? Checked in staging env? -->
**How did you test it?**

In the cadence repo.

<!-- Assuming the worst case, what can be broken when deploying this change to production? -->
**Potential risks**

N/A

Signed-off-by: Chris Warren <[email protected]>
Signed-off-by: Gaziza Yestemirova <[email protected]>
gazi-yestemirova added a commit that referenced this pull request Oct 14, 2025
* feat: Introduce FailoverDomain endpoint from cadence-idl

Signed-off-by: Gaziza Yestemirova <[email protected]>

* fix TestWorkflowExecutionContinuedAsNewEventAttributes

Signed-off-by: Gaziza Yestemirova <[email protected]>

* ci: Lint PR titles with Conventional Commmit standard (#1462)

<!-- Describe what has changed in this PR -->
**What changed?**

Adds a linter to ensure the conventional commit standard is used for PR titles.

<!-- Tell your future self why have you made these changes -->
**Why?**

See cadence-workflow/cadence@c4b6330 for more details.

<!-- How have you verified this change? Tested locally? Added a unit test? Checked in staging env? -->
**How did you test it?**

In the cadence repo.

<!-- Assuming the worst case, what can be broken when deploying this change to production? -->
**Potential risks**

N/A

Signed-off-by: Chris Warren <[email protected]>
Signed-off-by: Gaziza Yestemirova <[email protected]>

* ci: Allow gpg signed commits to pass DCO checks (#1463)

Signed-off-by: Chris Warren <[email protected]>
Signed-off-by: Gaziza Yestemirova <[email protected]>

* Add endpoints for DomainClient

Signed-off-by: Gaziza Yestemirova <[email protected]>

* Update clusterName

Signed-off-by: Gaziza Yestemirova <[email protected]>

* Add another domain to fail over

Signed-off-by: Gaziza Yestemirova <[email protected]>

---------

Signed-off-by: Gaziza Yestemirova <[email protected]>
Signed-off-by: Chris Warren <[email protected]>
Co-authored-by: Chris Warren <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants