ci: add compliance check workflow for org ruleset#37
Conversation
Adds compliance-check.yml that calls the reusable compliance workflow. The workflow name is 'compliance' to match the org-level required status check context, unblocking PR merges. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
|
You have reached your Codex usage limits for code reviews. You can see your limits in the Codex usage dashboard. |
|
|
Warning Rate limit exceeded
⌛ How to resolve this issue?After the wait time has elapsed, a review can be triggered using the We recommend that you space out your commits to avoid hitting the rate limit. 🚦 How do rate limits work?CodeRabbit enforces hourly rate limits for each developer per organization. Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout. Please see our FAQ for further information. ℹ️ Review info⚙️ Run configurationConfiguration used: defaults Review profile: CHILL Plan: Pro Run ID: 📒 Files selected for processing (1)
✨ Finishing Touches🧪 Generate unit tests (beta)
📝 Coding Plan
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
| uses: CHITTYOS/chittyops/.github/workflows/reusable-compliance-check.yml@main | ||
| with: | ||
| service_name: 'chittycommand' | ||
| tier: 3 | ||
| check_health: true | ||
| domain: 'command.chitty.cc' |
Check warning
Code scanning / CodeQL
Workflow does not contain permissions Medium
Show autofix suggestion
Hide autofix suggestion
Copilot Autofix
AI 2 days ago
In general, to fix this category of issue you add a permissions: block either at the top (root) of the workflow to apply to all jobs, or under a specific job to apply only there. The block should grant the minimum scopes needed. For workflows that only run checks and do not need to write back to the repository, contents: read is a good baseline. If the reusable workflow needs additional permissions (for example, to update issues or pull requests), those can be added explicitly.
For this specific workflow, the simplest and safest change without altering behavior of the reusable workflow is to declare minimal read-only permissions at the workflow root, just under the name: key and before on:. This ensures the GITHUB_TOKEN available to the compliance job (and thus to the called reusable workflow) is constrained to read repository contents by default. If the reusable workflow requires more permissions, they can still be granted there; our change does not prevent that, but documents and constrains the default from this workflow’s side. Concretely, in .github/workflows/compliance-check.yml, add:
permissions:
contents: readbetween lines 1 and 3. No imports or additional methods are needed, since this is a YAML configuration change only.
| @@ -1,4 +1,6 @@ | ||
| name: compliance | ||
| permissions: | ||
| contents: read | ||
|
|
||
| on: | ||
| push: |
Summary
compliance-check.ymlcalling the reusable compliance workflowcomplianceto match org-level required status check contextcompliancecheckTest plan
compliancecheck appears in PR status checks🤖 Generated with Claude Code