Skip to content

Conversation

@darwinboersma
Copy link

JIRA ticket

https://tetrascience.atlassian.net/browse/SW-1095

Code changes

Added GH workflows for publishing the package on PR and on merge to main branch (alpha and beta publishing, respectively)

QA

Publishing this PR and merging it will allow me to confirm that the actions function as expected

Checklist before requesting a review

  • I have performed a self-review of my code on localhost and it looks good
  • I added proper Description both to pr and jira ticket

@darwinboersma darwinboersma requested a review from a team as a code owner January 20, 2026 18:40
@augmentcode
Copy link

augmentcode bot commented Jan 20, 2026

🤖 Augment PR Summary

Summary: This PR adds GitHub Actions workflows to publish ts-lib-ui-kit pre-releases to the internal registry for easier validation.

Changes:

  • Added a pull_request-triggered workflow to build and publish an alpha package for PR validation.
  • Added a push-to-main workflow to build and publish a beta package after merges.
  • Both workflows configure Yarn to use JFrog Artifactory (read registry for installs, then switch to write registry for publishing).
  • Version is auto-suffixed with -alpha.${{ github.run_number }} or -beta.${{ github.run_number }} before publishing.

Technical Notes: Uses Node 20, Yarn dependency caching, and yarn npm publish with npm dist-tags (alpha/beta).

🤖 Was this summary useful? React with 👍 or 👎

Copy link

@augmentcode augmentcode bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Review completed. 1 suggestions posted.

Fix All in Augment

Comment augment review to trigger a new review at any time.

name: Publish PR

on:
pull_request:
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This workflow runs on pull_request but uses Artifactory write secrets later; that can both fail for forked PRs (secrets unavailable) and expose secrets to untrusted PR code in same-repo contributions. Consider gating the job to non-fork PRs / trusted actors (or using a pull_request_target-based flow with careful checkout) to avoid accidental secret exposure.

Fix This in Augment

🤖 Was this useful? React with 👍 or 👎

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants