Skip to content

Use custom Sphinx build action for docs#844

Draft
i-oden wants to merge 15 commits intodevfrom
codex/add-sphinx-build-action-with-inputs
Draft

Use custom Sphinx build action for docs#844
i-oden wants to merge 15 commits intodevfrom
codex/add-sphinx-build-action-with-inputs

Conversation

@i-oden
Copy link
Member

@i-oden i-oden commented Sep 9, 2025

Summary

  • add local container action to build Sphinx HTML and PDF
  • switch release workflow to use local action instead of external sphinx-action

Testing

  • pytest -q (fails: ModuleNotFoundError: No module named 'pyfakefs')

https://chatgpt.com/codex/tasks/task_b_68bff322a9a88326ac64ed74d6266d14

@codecov
Copy link

codecov bot commented Sep 9, 2025

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 56.91%. Comparing base (da1af8a) to head (cec4273).

Additional details and impacted files
@@           Coverage Diff           @@
##              dev     #844   +/-   ##
=======================================
  Coverage   56.91%   56.91%           
=======================================
  Files          63       63           
  Lines        3681     3681           
=======================================
  Hits         2095     2095           
  Misses       1586     1586           

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

return emoji_pattern.sub(lambda x: r"\emoji{" + x.group(0) + "}", text)

def process_file(filepath):
with open(filepath, "r", encoding="utf-8") as f:

Check warning

Code scanning / SnykCode

Path Traversal Warning

Unsanitized input from {0} {1} into {2}, where it is used as a path. This may result in a Path Traversal vulnerability and allow an attacker to read arbitrary files.
content = f.read()
new_content = replace_emojis(content)
if new_content != content:
with open(filepath, "w", encoding="utf-8") as f:

Check warning

Code scanning / SnykCode

Path Traversal Warning

Unsanitized input from {0} {1} into {2}, where it is used as a path. This may result in a Path Traversal vulnerability and allow an attacker to write arbitrary files.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant