Skip to content

Conversation

@DengreSarthak
Copy link
Member

@DengreSarthak DengreSarthak commented Sep 11, 2025

Summary by CodeRabbit

  • Bug Fixes

    • Ensures the logo displays correctly in static exports (e.g., GitHub Pages) by resolving image path issues.
  • Refactor

    • Simplified logo rendering using a standard image element for broader compatibility across static deployments.

@coderabbitai
Copy link

coderabbitai bot commented Sep 11, 2025

Caution

Review failed

The pull request is closed.

Walkthrough

Replaced Next.js Image with a plain img for the logo and added a local getImagePath helper to normalize image paths for static export. Updated the logo src to use getImagePath("/block.png"). No exported API changes.

Changes

Cohort / File(s) Summary
Navigation image handling
components/navigation.tsx
Remove Next.js Image import/usage; add getImagePath(path) to prefix "/" when needed; switch logo to <img src={getImagePath("/block.png")}>; add explanatory comment.

Estimated code review effort

🎯 2 (Simple) | ⏱️ ~10 minutes

Possibly related PRs

  • Image path fixed #39 — Adjusts getImagePath behavior affecting image src construction, overlapping with this helper’s logic.
  • Image url fix #17 — Applies getImagePath to hackathon images and references the same /block.png asset used in navigation.
  • image fix #5 — Similar refactor replacing hardcoded image src with a local getImagePath helper.

Poem

Hoppity hop on the static trail,
I polish paths so exports won’t fail.
No fancy frames, just img to go,
A tidy slash to guide the flow.
Block.png shines, crisp and clear—
Ship it quick, the carrots near! 🥕✨

Tip

👮 Agentic pre-merge checks are now available in preview!

Pro plan users can now enable pre-merge checks in their settings to enforce checklists before merging PRs.

  • Built-in checks – Quickly apply ready-made checks to enforce title conventions, require pull request descriptions that follow templates, validate linked issues for compliance, and more.
  • Custom agentic checks – Define your own rules using CodeRabbit’s advanced agentic capabilities to enforce organization-specific policies and workflows. For example, you can instruct CodeRabbit’s agent to verify that API documentation is updated whenever API schema files are modified in a PR. Note: Upto 5 custom checks are currently allowed during the preview period. Pricing for this feature will be announced in a few weeks.

Please see the documentation for more information.

Example:

reviews:
  pre_merge_checks:
    custom_checks:
      - name: "Undocumented Breaking Changes"
        mode: "warning"
        instructions: |
          Pass/fail criteria: All breaking changes to public APIs, CLI flags, environment variables, configuration keys, database schemas, or HTTP/GraphQL endpoints must be documented in the "Breaking Change" section of the PR description and in CHANGELOG.md. Exclude purely internal or private changes (e.g., code not exported from package entry points or explicitly marked as internal).

Please share your feedback with us on this Discord post.


📜 Recent review details

Configuration used: CodeRabbit UI

Review profile: CHILL

Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 1a43e3c and 7cb41f0.

📒 Files selected for processing (1)
  • components/navigation.tsx (2 hunks)
✨ Finishing touches
  • 📝 Generate Docstrings
🧪 Generate unit tests
  • Create PR with unit tests
  • Post copyable unit tests in a comment
  • Commit unit tests in branch sarthak

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

@DengreSarthak DengreSarthak merged commit 4cf3eb2 into main Sep 11, 2025
1 check was pending
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants