-
Notifications
You must be signed in to change notification settings - Fork 0
ci: skip CI when only .gitignore changes #32
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Adds .gitignore to paths-ignore filter for push to main. This prevents wasteful CI runs when only .gitignore is updated. PRs still run CI for review purposes. 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
|
Warning Rate limit exceeded@dreamiurg has exceeded the limit for the number of commits or files that can be reviewed per hour. Please wait 13 minutes and 6 seconds before requesting another review. ⌛ How to resolve this issue?After the wait time has elapsed, a review can be triggered using the We recommend that you space out your commits to avoid hitting the rate limit. 🚦 How do rate limits work?CodeRabbit enforces hourly rate limits for each developer per organization. Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout. Please see our FAQ for further information. 📒 Files selected for processing (1)
✨ Finishing touches🧪 Generate unit tests (beta)
Comment |
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## main #32 +/- ##
=======================================
Coverage 78.92% 78.92%
=======================================
Files 8 8
Lines 1077 1077
=======================================
Hits 850 850
Misses 227 227 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
Suppress two categories of CodeQL alerts that are false positives: 1. Clear-text logging (alert #31): The flagged print() statement outputs public peak data to stdout for CLI users, not logging. No sensitive data is handled by this tool. 2. Overly permissive regex (alerts #32-35): The emoji removal regex uses overlapping Unicode ranges intentionally for comprehensive coverage. Used only for display formatting, not security validation. Both suppressions include detailed comments explaining why the alerts are false positives in this context. 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
* ci: pin GitHub Actions to commit SHAs for security Pin all GitHub Actions dependencies to specific commit SHAs instead of version tags to prevent supply chain attacks. This follows OpenSSF Scorecard best practices for dependency pinning. Pinned actions: - actions/checkout@v5 - actions/create-github-app-token@v2 - actions/setup-python@v6 - actions/upload-artifact@v4 - amannn/action-semantic-pull-request@v6 - astral-sh/setup-uv@v7 - codecov/codecov-action@v5 - github/codeql-action/*@V3 - github/codeql-action/*@v4 - ossf/scorecard-action@v2.4.3 - pypa/gh-action-pypi-publish@release/v1 All SHAs include comments showing the original version tag for maintainability. Expected impact: Pinned-Dependencies score 0 → 10 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com> * fix: suppress CodeQL false positives with explanatory comments Suppress two categories of CodeQL alerts that are false positives: 1. Clear-text logging (alert #31): The flagged print() statement outputs public peak data to stdout for CLI users, not logging. No sensitive data is handled by this tool. 2. Overly permissive regex (alerts #32-35): The emoji removal regex uses overlapping Unicode ranges intentionally for comprehensive coverage. Used only for display formatting, not security validation. Both suppressions include detailed comments explaining why the alerts are false positives in this context. 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com> --------- Co-authored-by: Claude <noreply@anthropic.com>
Summary
Adds
.gitignoreto thepaths-ignorefilter in the CI workflow to prevent wasteful CI runs when only.gitignoreis updated on push to main.Changes
.gitignoreto paths-ignore list in.github/workflows/ci.ymlBehavior
On push to main:
.gitignore→ CI skipped ✅.gitignore+ code → CI runs ✅On pull requests:
Impact
Prevents unnecessary CI runs for metadata-only changes like the recent PR #31 that only updated
.gitignore.🤖 Generated with Claude Code