From 5d09fc4236113d9cf49c1d43bef6f9017b8487a9 Mon Sep 17 00:00:00 2001 From: Jonathan Haas Date: Sat, 9 May 2026 23:32:07 -0700 Subject: [PATCH] ci: accept existing org read token for feedback sweeps --- .github/workflows/review-feedback-backfill.yml | 4 ++-- .github/workflows/review-feedback-sentinel.yml | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/.github/workflows/review-feedback-backfill.yml b/.github/workflows/review-feedback-backfill.yml index 6fe2d16..cc2cbe5 100644 --- a/.github/workflows/review-feedback-backfill.yml +++ b/.github/workflows/review-feedback-backfill.yml @@ -28,7 +28,7 @@ jobs: runs-on: ubuntu-latest timeout-minutes: 60 env: - GH_TOKEN: ${{ secrets.EVALOPS_REVIEW_GUARD_TOKEN }} + GH_TOKEN: ${{ secrets.EVALOPS_REVIEW_GUARD_TOKEN || secrets.EVALOPS_ORG_READ_TOKEN }} SINCE_HOURS: ${{ inputs.since_hours || '720' }} MIN_SEVERITY: ${{ inputs.min_severity || 'high' }} PR_LIMIT: ${{ inputs.pr_limit || '1000' }} @@ -38,7 +38,7 @@ jobs: - name: Require org review guard token run: | if [ -z "${GH_TOKEN}" ]; then - echo "::error::Set secrets.EVALOPS_REVIEW_GUARD_TOKEN with org-wide PR read access before running the 30-day feedback backfill." + echo "::error::Set secrets.EVALOPS_REVIEW_GUARD_TOKEN or secrets.EVALOPS_ORG_READ_TOKEN with org-wide PR read access before running the 30-day feedback backfill." exit 2 fi diff --git a/.github/workflows/review-feedback-sentinel.yml b/.github/workflows/review-feedback-sentinel.yml index 83de825..6068735 100644 --- a/.github/workflows/review-feedback-sentinel.yml +++ b/.github/workflows/review-feedback-sentinel.yml @@ -28,7 +28,7 @@ jobs: runs-on: ubuntu-latest timeout-minutes: 15 env: - GH_TOKEN: ${{ secrets.EVALOPS_REVIEW_GUARD_TOKEN }} + GH_TOKEN: ${{ secrets.EVALOPS_REVIEW_GUARD_TOKEN || secrets.EVALOPS_ORG_READ_TOKEN }} SINCE_HOURS: ${{ inputs.since_hours || '72' }} MIN_SEVERITY: ${{ inputs.min_severity || 'high' }} PR_LIMIT: ${{ inputs.pr_limit || '100' }} @@ -38,7 +38,7 @@ jobs: - name: Require org review guard token run: | if [ -z "${GH_TOKEN}" ]; then - echo "::error::Set secrets.EVALOPS_REVIEW_GUARD_TOKEN with org-wide PR read access before running the review feedback sentinel." + echo "::error::Set secrets.EVALOPS_REVIEW_GUARD_TOKEN or secrets.EVALOPS_ORG_READ_TOKEN with org-wide PR read access before running the review feedback sentinel." exit 2 fi