Skip to content

ci: rename Claude OAuth secret to CC_OAUTH_TOKEN#702

Merged
bootjp merged 1 commit intomainfrom
ci/cc-oauth-token-rename
Apr 28, 2026
Merged

ci: rename Claude OAuth secret to CC_OAUTH_TOKEN#702
bootjp merged 1 commit intomainfrom
ci/cc-oauth-token-rename

Conversation

@bootjp
Copy link
Copy Markdown
Owner

@bootjp bootjp commented Apr 28, 2026

Summary

  • Switch .github/workflows/claude.yml to read the OAuth credential from secrets.CC_OAUTH_TOKEN instead of secrets.CLAUDE_CODE_OAUTH_TOKEN. Same token; new secret name.
  • The action input name (claude_code_oauth_token) is unchanged.

Why

Same workflow file, same claude-code-action SHA (11a9dadd = v1.0.108), same agent SDK (0.2.121), and an unchanged secret value produced 6 consecutive successful @claude runs (15:27–15:55 UTC) and then 4 consecutive failures (16:00–16:13 UTC) on 2026-04-28, all with the SDK error Could not resolve [authentication] thrown from validateHeaders. Failing run for reference: https://github.com/bootjp/elastickv/actions/runs/25063998905.

Successful and failing runs both reach App token successfully obtained in the OIDC → GitHub App exchange, and both download the same action SHA + same SDK version. The crash is in the agent SDK's Anthropic client constructor: neither apiKey nor authToken resolves. Workflow-side variables are exhausted, so the remaining moving parts are the secret name itself and the OAuth token behind it.

The previous name CLAUDE_CODE_OAUTH_TOKEN collides with the env var that Claude Code itself recognizes as a credential, so any process in the pipeline that touches its own login state (the action's child claude process, the runner-side claude install, or developer-machine tooling that shares the same env can clobber, mask, or otherwise interact with that env. Renaming the GitHub Actions secret avoids the magic-name interaction.

Behavior change

  • Active only when is mentioned. Other workflows are untouched.
  • Token has been re-registered under with a freshly issued OAuth token; the old secret remains in place but is no longer referenced.

Risk

  • If the new secret is missing or empty, invocations will fail at the same point as today's failures (no regression versus the failing baseline).
  • No code path / data-plane / replication / consistency surface — CI workflow only.

Test plan

  • After merge, comment on this PR (or any open PR) and observe a successful run.
  • If still failing with the same error, the next step is to re-add the explicit forwarding (the workaround) and/or pin to v1.0.107 () until upstream fixes the auth-forwarding regression. That follow-up is intentionally out of scope here so this PR cleanly tests the magic-name hypothesis in isolation.

Self-review

5-lens collapses to no-op: CI workflow change only, no data-loss / concurrency / performance / consistency surface, no test-coverage applicable.
PR_EOF
)

Same OAuth token, new secret name. The previous name CLAUDE_CODE_OAUTH_TOKEN
collides with the env var that Claude Code itself recognizes as a
credential, so any process in the pipeline that touches its own login
state (the action child claude process, the runner-side claude install,
or developer-machine tooling) can clobber, mask, or otherwise interact
with that env. Renaming the GitHub Actions secret to CC_OAUTH_TOKEN
avoids the magic-name interaction; the action input name
(claude_code_oauth_token) is unchanged.

Symptom: same workflow, same action SHA (v1.0.108 = 11a9dadd), same
agent SDK (0.2.121), unchanged secret value produced 6 consecutive
successful @claude runs (15:27-15:55 UTC) and then 4 consecutive
failures (16:00-16:13 UTC) on 2026-04-28, all with SDK error "Could
not resolve [authentication]" thrown from validateHeaders. Workflow
variables are exhausted, so the remaining moving parts are the secret
name itself and the OAuth token behind it. The secret has been
re-registered under CC_OAUTH_TOKEN with a fresh token; this commit
only flips the workflow reference.
@gemini-code-assist
Copy link
Copy Markdown
Contributor

Note

Gemini is unable to generate a review for this pull request due to the file types involved not being currently supported.

@coderabbitai
Copy link
Copy Markdown

coderabbitai Bot commented Apr 28, 2026

Warning

Rate limit exceeded

@bootjp has exceeded the limit for the number of commits that can be reviewed per hour. Please wait 9 minutes and 40 seconds before requesting another review.

To keep reviews running without waiting, you can enable usage-based add-on for your organization. This allows additional reviews beyond the hourly cap. Account admins can enable it under billing.

⌛ How to resolve this issue?

After the wait time has elapsed, a review can be triggered using the @coderabbitai review command as a PR comment. Alternatively, push new commits to this PR.

We recommend that you space out your commits to avoid hitting the rate limit.

🚦 How do rate limits work?

CodeRabbit enforces hourly rate limits for each developer per organization.

Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout.

Please see our FAQ for further information.

ℹ️ Review info
⚙️ Run configuration

Configuration used: defaults

Review profile: CHILL

Plan: Pro

Run ID: acba525c-8d29-478d-8475-764c98ec28b2

📥 Commits

Reviewing files that changed from the base of the PR and between 112d697 and 4e8c5f1.

📒 Files selected for processing (1)
  • .github/workflows/claude.yml
✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Commit unit tests in branch ci/cc-oauth-token-rename

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

@bootjp bootjp enabled auto-merge April 28, 2026 16:30
@bootjp bootjp merged commit 4d68b36 into main Apr 28, 2026
9 checks passed
@bootjp bootjp deleted the ci/cc-oauth-token-rename branch April 28, 2026 16:30
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant