Skip to content

Conversation

@dreamiurg
Copy link
Owner

Summary

Adds .gitignore to the paths-ignore filter in the CI workflow to prevent wasteful CI runs when only .gitignore is updated on push to main.

Changes

  • Added .gitignore to paths-ignore list in .github/workflows/ci.yml
  • Updated comment to reflect "docs-only and metadata changes"

Behavior

On push to main:

  • Changes only to .gitignore → CI skipped ✅
  • Changes to .gitignore + code → CI runs ✅

On pull requests:

  • Always runs CI (for review purposes) ✅

Impact

Prevents unnecessary CI runs for metadata-only changes like the recent PR #31 that only updated .gitignore.

🤖 Generated with Claude Code

Adds .gitignore to paths-ignore filter for push to main.
This prevents wasteful CI runs when only .gitignore is updated.

PRs still run CI for review purposes.

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
@dreamiurg dreamiurg enabled auto-merge (squash) October 25, 2025 20:06
@coderabbitai
Copy link

coderabbitai bot commented Oct 25, 2025

Warning

Rate limit exceeded

@dreamiurg has exceeded the limit for the number of commits or files that can be reviewed per hour. Please wait 13 minutes and 6 seconds before requesting another review.

⌛ How to resolve this issue?

After the wait time has elapsed, a review can be triggered using the @coderabbitai review command as a PR comment. Alternatively, push new commits to this PR.

We recommend that you space out your commits to avoid hitting the rate limit.

🚦 How do rate limits work?

CodeRabbit enforces hourly rate limits for each developer per organization.

Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout.

Please see our FAQ for further information.

📥 Commits

Reviewing files that changed from the base of the PR and between c243df1 and 7c08c2b.

📒 Files selected for processing (1)
  • .github/workflows/ci.yml (1 hunks)
✨ Finishing touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Post copyable unit tests in a comment
  • Commit unit tests in branch ci/skip-tests-for-gitignore-only

Comment @coderabbitai help to get the list of available commands and usage tips.

@dreamiurg dreamiurg merged commit 013b9bf into main Oct 25, 2025
8 checks passed
@dreamiurg dreamiurg deleted the ci/skip-tests-for-gitignore-only branch October 25, 2025 20:07
@codecov
Copy link

codecov bot commented Oct 25, 2025

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 78.92%. Comparing base (c243df1) to head (7c08c2b).
⚠️ Report is 1 commits behind head on main.

Additional details and impacted files
@@           Coverage Diff           @@
##             main      #32   +/-   ##
=======================================
  Coverage   78.92%   78.92%           
=======================================
  Files           8        8           
  Lines        1077     1077           
=======================================
  Hits          850      850           
  Misses        227      227           

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

dreamiurg added a commit that referenced this pull request Nov 1, 2025
Suppress two categories of CodeQL alerts that are false positives:

1. Clear-text logging (alert #31): The flagged print() statement outputs
   public peak data to stdout for CLI users, not logging. No sensitive
   data is handled by this tool.

2. Overly permissive regex (alerts #32-35): The emoji removal regex uses
   overlapping Unicode ranges intentionally for comprehensive coverage.
   Used only for display formatting, not security validation.

Both suppressions include detailed comments explaining why the alerts
are false positives in this context.

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
dreamiurg added a commit that referenced this pull request Nov 1, 2025
* ci: pin GitHub Actions to commit SHAs for security

Pin all GitHub Actions dependencies to specific commit SHAs instead
of version tags to prevent supply chain attacks. This follows OpenSSF
Scorecard best practices for dependency pinning.

Pinned actions:
- actions/checkout@v5
- actions/create-github-app-token@v2
- actions/setup-python@v6
- actions/upload-artifact@v4
- amannn/action-semantic-pull-request@v6
- astral-sh/setup-uv@v7
- codecov/codecov-action@v5
- github/codeql-action/*@V3
- github/codeql-action/*@v4
- ossf/scorecard-action@v2.4.3
- pypa/gh-action-pypi-publish@release/v1

All SHAs include comments showing the original version tag for
maintainability.

Expected impact: Pinned-Dependencies score 0 → 10

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>

* fix: suppress CodeQL false positives with explanatory comments

Suppress two categories of CodeQL alerts that are false positives:

1. Clear-text logging (alert #31): The flagged print() statement outputs
   public peak data to stdout for CLI users, not logging. No sensitive
   data is handled by this tool.

2. Overly permissive regex (alerts #32-35): The emoji removal regex uses
   overlapping Unicode ranges intentionally for comprehensive coverage.
   Used only for display formatting, not security validation.

Both suppressions include detailed comments explaining why the alerts
are false positives in this context.

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>

---------

Co-authored-by: Claude <noreply@anthropic.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants