chore(workflow): add SDK parity dispatch workflow#14
Conversation
- Introduced a new GitHub Actions workflow for SDK parity dispatch. - Triggers on push and pull request events for changes in the `src` directory and `package.json`. - Utilizes a reusable workflow from the tapsilat/tapsilat-sdk-parity repository. - Inherits secrets for secure access during execution.
There was a problem hiding this comment.
Pull request overview
Adds a new GitHub Actions workflow that dispatches an SDK parity check by invoking a reusable workflow from tapsilat/tapsilat-sdk-parity, scoped to changes in src/** and package.json.
Changes:
- Introduced
SDK Parity Dispatchworkflow triggered onpush,pull_request, and manualworkflow_dispatch. - Configured path filters to run only when
src/**orpackage.jsonchanges. - Delegated execution to an external reusable workflow and inherited caller secrets.
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
| parity-dispatch: | ||
| uses: tapsilat/tapsilat-sdk-parity/.github/workflows/reusable-sdk-parity-dispatch.yml@main |
There was a problem hiding this comment.
The reusable workflow reference is pinned to @main, which is mutable. Since this job also inherits secrets, upstream changes on main could unexpectedly change behavior or exfiltrate secrets. Pin the reusable workflow to an immutable ref (a commit SHA or a version tag) and update it intentionally when needed.
| uses: tapsilat/tapsilat-sdk-parity/.github/workflows/reusable-sdk-parity-dispatch.yml@main | ||
| secrets: inherit |
There was a problem hiding this comment.
secrets: inherit passes all repository/environment secrets to the called workflow. Given this calls a reusable workflow from a different repository, this is a broad secret exposure surface. Prefer explicitly passing only the specific secrets the reusable workflow needs (or avoid secrets entirely if possible).
| name: SDK Parity Dispatch | ||
|
|
||
| on: | ||
| push: | ||
| paths: |
There was a problem hiding this comment.
This workflow doesn’t declare explicit permissions. When invoking external reusable workflows (especially alongside secret usage), it’s safer to set least-privilege permissions for GITHUB_TOKEN (for example contents: read and only additional scopes if required).
srcdirectory andpackage.json.