Skip to content

Refactor GitHub OAuth environment variables and update CI/CD workflow…#5

Merged
Lathiya50 merged 5 commits into
mainfrom
refactor/github-oauth-env-ci-cd
Mar 14, 2026
Merged

Refactor GitHub OAuth environment variables and update CI/CD workflow…#5
Lathiya50 merged 5 commits into
mainfrom
refactor/github-oauth-env-ci-cd

Conversation

@Lathiya50
Copy link
Copy Markdown
Owner

@Lathiya50 Lathiya50 commented Mar 14, 2026

…s for consistency


Note

Medium Risk
Mostly configuration and documentation changes, but renaming GitHub OAuth/webhook env vars can break auth/webhook verification if secrets aren’t updated consistently across environments.

Overview
Standardizes GitHub-related environment variables across the app by renaming GITHUB_CLIENT_ID/SECRET and GITHUB_WEBHOOK_SECRET to GH_CLIENT_ID/SECRET and GH_WEBHOOK_SECRET, updating auth config and webhook signature verification accordingly.

Adds a new GitHub Actions workflow (.github/workflows/ci.yml) that runs lint/build and then deploys to Vercel on pushes to main, updates existing VPS deploy and Docker build-time env placeholders to match, and includes a detailed Vercel deployment guide in docs/vercel_deployment_epic.md.

Written by Cursor Bugbot for commit 7ec7995. This will update automatically on new commits. Configure here.

@vercel
Copy link
Copy Markdown

vercel Bot commented Mar 14, 2026

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Actions Updated (UTC)
code-review-ai Ready Ready Preview, Comment Mar 14, 2026 8:25am

Copy link
Copy Markdown

@cursor cursor Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Cursor Bugbot has reviewed your changes and found 1 potential issue.

Fix All in Cursor

Bugbot Autofix is OFF. To automatically fix reported issues with cloud agents, enable autofix in the Cursor dashboard.

Comment thread .github/workflows/ci.yml
OPENAI_API_KEY: ${{ secrets.OPENAI_API_KEY }}
GROQ_API_KEY: ${{ secrets.GROQ_API_KEY }}
INNGEST_EVENT_KEY: ${{ secrets.INNGEST_EVENT_KEY }}
INNGEST_SIGNING_KEY: ${{ secrets.INNGEST_SIGNING_KEY }}
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

CI workflow uses secrets without fallbacks, breaking builds

High Severity

The ci job env vars reference ${{ secrets.* }} without fallback values, so they resolve to empty strings when secrets aren't configured (e.g., fork PRs or new repo setups). The deploy-vps.yml in the same repo correctly uses the secrets.X != '' && secrets.X || 'fallback' pattern, and the documentation added in this same PR (section 8.1) explicitly recommends hardcoded placeholder values with the comment "Build-time placeholders (same idea as Dockerfile)." The actual workflow contradicts both patterns and will fail the build.

Additional Locations (1)
Fix in Cursor Fix in Web

@Lathiya50 Lathiya50 merged commit 2ca2869 into main Mar 14, 2026
4 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant