docs(governance): validate policy/eval repo assumptions for MWS planning#23630
docs(governance): validate policy/eval repo assumptions for MWS planning#23630BrianCLong wants to merge 1 commit intomainfrom
Conversation
|
Warning You have reached your daily quota limit. Please wait up to 24 hours and I will start processing your requests again! |
|
Warning Rate limit exceeded
Your organization is not enrolled in usage-based pricing. Contact your admin to enable usage-based pricing to continue reviews beyond the rate limit, or try again in 18 minutes and 42 seconds. ⌛ How to resolve this issue?After the wait time has elapsed, a review can be triggered using the We recommend that you space out your commits to avoid hitting the rate limit. 🚦 How do rate limits work?CodeRabbit enforces hourly rate limits for each developer per organization. Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout. Please see our FAQ for further information. ℹ️ Review info⚙️ Run configurationConfiguration used: Organization UI Review profile: CHILL Plan: Pro Run ID: 📒 Files selected for processing (1)
✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
Motivation
Description
docs/repo_assumptions.mdwith a scoped validation ledger (scope:src/,.github/workflows/,docs/) that enumerates verified agent execution entrypoints, CI workflow surfaces, and evidence artifact conventions.policy_decision.jsonalongsidereport.json/metrics.json, wire CI assertions into existing eval workflows, and keep runtime enforcement behind a feature flag (default OFF).Testing
rgsearches for policy, workflow, and evidence artifacts which returned expected matches (success).test -s docs/repo_assumptions.md(success).Codex Task