Skip to content

feat: add claude code oauth token to wind-tunnel secrets#70

Merged
mattyg merged 1 commit intomainfrom
feat/claude-code-oauth-token-wind-tunnel
Feb 18, 2026
Merged

feat: add claude code oauth token to wind-tunnel secrets#70
mattyg merged 1 commit intomainfrom
feat/claude-code-oauth-token-wind-tunnel

Conversation

@mattyg
Copy link
Copy Markdown
Member

@mattyg mattyg commented Feb 18, 2026

Follow-up to holochain/wind-tunnel#538 -- added holochain foundation account token

Summary by CodeRabbit

Release Notes

  • New Features
    • Added Claude Code OAuth token authentication for GitHub Actions workflows. Tokens are securely stored as encrypted GitHub Actions secrets, enabling integrated workflows to authenticate with Claude Code services while maintaining security.

@cocogitto-bot
Copy link
Copy Markdown

cocogitto-bot bot commented Feb 18, 2026

✔️ 0ea15bf - Conventional commits check succeeded.

@mattyg mattyg requested a review from a team February 18, 2026 18:02
@coderabbitai
Copy link
Copy Markdown

coderabbitai bot commented Feb 18, 2026

No actionable comments were generated in the recent review. 🎉


Walkthrough

This PR adds Claude Code OAuth token provisioning to the wind-tunnel repository. It introduces a secure configuration entry in Pulumi and a new function that creates a GitHub Actions secret using the configured token value.

Changes

Cohort / File(s) Summary
Configuration
Pulumi.github.yaml
Added secure configuration entry for holochain:claudeCodeOauthToken to store the OAuth token.
Secret Provisioning
main.go
Added AddClaudeCodeOauthTokenSecret function to create GitHub Actions secret, invoked for wind-tunnel repository. Note: Function definition appears duplicated in the file.

Estimated code review effort

🎯 3 (Moderate) | ⏱️ ~20 minutes

Possibly related PRs

Suggested reviewers

  • ThetaSinner
  • jost-s
  • cdunster
🚥 Pre-merge checks | ✅ 2 | ❌ 1

❌ Failed checks (1 warning)

Check name Status Explanation Resolution
Docstring Coverage ⚠️ Warning Docstring coverage is 0.00% which is insufficient. The required threshold is 80.00%. Write docstrings for the functions missing them to satisfy the coverage threshold.
✅ Passed checks (2 passed)
Check name Status Explanation
Description Check ✅ Passed Check skipped - CodeRabbit’s high-level summary is enabled.
Title check ✅ Passed The title accurately and specifically describes the main change: adding a Claude Code OAuth token to wind-tunnel secrets, which aligns with the PR objectives and code modifications.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing Touches
  • 📝 Generate docstrings
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Post copyable unit tests in a comment
  • Commit unit tests in branch feat/claude-code-oauth-token-wind-tunnel

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

@github-actions
Copy link
Copy Markdown

🍹 preview on holochain/holochain/github

Pulumi report

View in Pulumi Cloud

  Previewing update (holochain/github)

View Live: https://app.pulumi.com/holochain/holochain/github/previews/7c149af9-5f11-4a4a-9568-9e880e940136

pulumi:pulumi:Stack: (same)
  [urn=urn:pulumi:github::holochain::pulumi:pulumi:Stack::holochain-github]
  + github:index/actionsSecret:ActionsSecret: (create)
      [urn=urn:pulumi:github::holochain::github:index/actionsSecret:ActionsSecret::wind-tunnel-claude-code-oauth-token]
      [provider=urn:pulumi:github::holochain::pulumi:providers:github::default_6_11_0::dce38a79-6242-43ba-a5ff-26fae2b6f93c]
      destroyOnDrift: true
      plaintextValue: [secret]
      repository    : "wind-tunnel"
      secretName    : "CLAUDE_CODE_OAUTH_TOKEN"
Resources:
  + 1 to create
  365 unchanged
  

@mattyg mattyg merged commit b171438 into main Feb 18, 2026
4 checks passed
@mattyg mattyg deleted the feat/claude-code-oauth-token-wind-tunnel branch February 18, 2026 20:08
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants