You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: COMMAND_HISTORY.md
+39Lines changed: 39 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,3 +50,42 @@ Claude Code: When starting a new conversation, read this file to understand what
50
50
51
51
### Command 5: Switch to main and pull latest
52
52
**Result**: Already on `main` and up to date (merge had already updated the local branch).
53
+
54
+
---
55
+
56
+
## Session 3 — 2026-02-20
57
+
58
+
### Command 1: Switch deploy workflows from KUBE_CONFIG to Azure OIDC auth
59
+
**Prompt summary**: Stop storing kubeconfig in secrets. Use Azure subscription ID, tenant ID, and client ID to authenticate instead. The dev environment should also use AKS cluster name, resource group, ACR login server, and storage account name.
60
+
61
+
**Result**: Updated all three deploy workflows (`deploy-dev.yml`, `deploy-prod.yml`, `deploy.yml`):
- Added `id-token: write` permission to all workflows for OIDC token exchange
64
+
- Dev workflow switches container registry from GHCR to ACR (`vars.ACR_LOGIN_SERVER`), uses `vars.ACR_NAME` for `az acr login`, and passes `vars.STORAGE_ACCOUNT_NAME` to Helm
65
+
- Fixed `az acr login --name` to use registry name not login server URL
66
+
67
+
### Command 2: Create a branch, commit, create required secrets/variables in GitHub, create a PR
68
+
**Result**:
69
+
- Created branch `chore/azure-oidc-auth`, committed changes, opened PR #5
70
+
- Set repo-level secrets: `AZURE_TENANT_ID`, `AZURE_SUBSCRIPTION_ID`, `AZURE_CLIENT_ID`
71
+
- Dev environment variables (`AKS_CLUSTER_NAME`, `RESOURCE_GROUP`, `ACR_LOGIN_SERVER`, `ACR_NAME`, `STORAGE_ACCOUNT_NAME`) required a fine-grained PAT with Variables + Environments permissions — set after user provided PAT
72
+
73
+
### Command 3: Merge the PR
74
+
**Result**: Merged PR #5 into `main` (fast-forward), deleted `chore/azure-oidc-auth` branch.
75
+
76
+
### Command 4: Set up federated credentials in Azure
77
+
**Result**: Created three federated credentials on app registration `4f9acb18-3bf6-442c-9709-8612d2647a56` using `az ad app federated-credential create`:
**Result**: Set repo-level secrets (`AZURE_TENANT_ID`, `AZURE_SUBSCRIPTION_ID`, `AZURE_CLIENT_ID`) using the keyring OAuth token. Set dev environment variables (`AKS_CLUSTER_NAME`, `RESOURCE_GROUP`, `ACR_LOGIN_SERVER`, `ACR_NAME`, `STORAGE_ACCOUNT_NAME`) using a fine-grained PAT provided by the user (required Variables + Environments read/write permissions).
84
+
85
+
### Command 6: Fix failing UI lint
86
+
**Prompt summary**: Check the UI lint issue and create a PR.
87
+
88
+
**Result**: Found 4 `react-hooks/refs` errors — `canUndo` and `canRedo` were derived from `ref.current.length` during render in both `useUndoRedo.ts` and `App.tsx`. Fixed by tracking `canUndo`/`canRedo` as state values updated in `push`, `undo`, `redo`, and `reset` callbacks. Removed the `undoRedoVersion` workaround counter from `App.tsx`. Created branch `fix/ui-lint-ref-during-render`, opened PR #6.
**Result**: No documentation was out of date (`CLAUDE.md` has no references to auth or undo/redo; UI README is default Vite scaffold). Merged PR #6 into `main` (fast-forward), deleted branch.
0 commit comments