forked from claude-did-this/claude-hub
2f62c1529c8bd6e5b3a3113ef4138f2962faf560
The coverage job was failing because it was running E2E tests that require Docker containers, but the coverage job only depends on unit tests, not the docker job. Changed the coverage generation to only run unit tests by using testPathPattern to exclude E2E tests. This is appropriate since: - E2E tests are primarily for workflow testing - Unit tests provide sufficient code coverage metrics - Docker containers are not available in the coverage job environment Resolves CI pipeline failure after codecov badge merge. 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <noreply@anthropic.com>
Claude GitHub Webhook
Deploy Claude Code as a GitHub bot. Mention @Claude in any issue or PR, and watch AI-powered code analysis happen in real-time. Production-ready microservice with container isolation, automated PR reviews, and intelligent issue labeling.
What This Does
# In any GitHub issue or PR:
@ClaudeBot explain this code architecture
@ClaudeBot review this PR for security vulnerabilities
@ClaudeBot suggest performance improvements
Claude analyzes your entire repository context, understands your codebase, and provides expert-level responses directly in GitHub comments. No context switching. No manual copy-paste. Just seamless AI integration where you work.
Key Features
Intelligent Automation 🤖
- Auto-labeling: New issues automatically tagged by content analysis
- PR Reviews: Comprehensive code reviews when CI checks pass
- Context-aware: Claude understands your entire repository structure
- Stateless execution: Each request runs in isolated Docker containers
Performance Architecture ⚡
- Parallel test execution with strategic runner distribution
- Conditional Docker builds (only when code changes)
- Repository caching for sub-second response times
- Advanced build profiling with timing metrics
Enterprise Security 🔒
- Webhook signature verification (HMAC-SHA256)
- AWS IAM role-based authentication
- Pre-commit credential scanning
- Container isolation with minimal permissions
- Fine-grained GitHub token scoping
Quick Start
# Clone and setup
git clone https://github.com/intelligence-assist/claude-hub.git
cd claude-hub
./scripts/setup/setup-secure-credentials.sh
# Launch with Docker Compose
docker compose up -d
Service runs on http://localhost:8082 by default.
Production Deployment
1. Environment Configuration
# Core settings
BOT_USERNAME=@ClaudeBot # GitHub mention trigger
GITHUB_WEBHOOK_SECRET=<generated> # Webhook validation
GITHUB_TOKEN=<fine-grained-pat> # Repository access
# AWS Bedrock (recommended)
AWS_REGION=us-east-1
ANTHROPIC_MODEL=anthropic.claude-3-sonnet-20240229-v1:0
CLAUDE_CODE_USE_BEDROCK=1
# Security
AUTHORIZED_USERS=user1,user2,user3 # Allowed GitHub usernames
CLAUDE_API_AUTH_REQUIRED=1 # Enable API authentication
2. GitHub Webhook Setup
- Navigate to Repository → Settings → Webhooks
- Add webhook:
- Payload URL:
https://your-domain.com/api/webhooks/github - Content type:
application/json - Secret: Your
GITHUB_WEBHOOK_SECRET - Events: Select "Send me everything"
- Payload URL:
3. AWS Authentication Options
# Option 1: IAM Instance Profile (EC2)
# Automatically uses instance metadata
# Option 2: ECS Task Role
# Automatically uses container credentials
# Option 3: AWS Profile
./scripts/aws/setup-aws-profiles.sh
# Option 4: Static Credentials (not recommended)
AWS_ACCESS_KEY_ID=xxx
AWS_SECRET_ACCESS_KEY=xxx
Advanced Usage
Direct API Access
Integrate Claude without GitHub webhooks:
curl -X POST http://localhost:8082/api/claude \
-H "Content-Type: application/json" \
-d '{
"repoFullName": "owner/repo",
"command": "Analyze security vulnerabilities",
"authToken": "your-token",
"useContainer": true
}'
CLI Tool
# Basic usage
./cli/claude-webhook myrepo "Review the authentication flow"
# PR review
./cli/claude-webhook owner/repo "Review this PR" -p -b feature-branch
# Specific issue
./cli/claude-webhook myrepo "Fix this bug" -i 42
Container Execution Modes
Different operations use tailored security profiles:
- Auto-tagging: Minimal permissions (Read + GitHub tools only)
- PR Reviews: Standard permissions (full tool access)
- Custom Commands: Configurable via
--allowedToolsflag
Architecture Deep Dive
Request Flow
GitHub Event → Webhook Endpoint → Signature Verification
↓ ↓
Container Spawn ← Command Parser ← Event Processor
↓
Claude Analysis → GitHub API → Comment/Label/Review
Container Lifecycle
- Spawn: New Docker container per request
- Clone: Repository fetched (or cache hit)
- Execute: Claude analyzes with configured tools
- Respond: Results posted via GitHub API
- Cleanup: Container destroyed, cache updated
Security Layers
- Network: Webhook signature validation
- Authentication: GitHub user allowlist
- Authorization: Fine-grained token permissions
- Execution: Container isolation
- Tools: Operation-specific allowlists
Performance Tuning
Repository Caching
REPO_CACHE_DIR=/cache/repos
REPO_CACHE_MAX_AGE_MS=3600000 # 1 hour
Container Optimization
CONTAINER_LIFETIME_MS=7200000 # 2 hour timeout
CLAUDE_CONTAINER_IMAGE=claudecode:latest
CI/CD Pipeline
- Parallel Jest test execution
- Docker layer caching
- Conditional image builds
- Self-hosted runners for heavy operations
Monitoring & Debugging
Health Check
curl http://localhost:8082/health
Logs
docker compose logs -f webhook
Test Suite
npm test # All tests
npm run test:unit # Unit only
npm run test:integration # Integration only
npm run test:coverage # With coverage report
Debug Mode
DEBUG=claude:* npm run dev
Documentation
- Complete Workflow - End-to-end technical guide
- Container Setup - Docker configuration details
- AWS Best Practices - IAM and credential management
- GitHub Integration - Webhook events and permissions
- Scripts Reference - Utility scripts documentation
Contributing
Development Setup
# Install dependencies
npm install
# Setup pre-commit hooks
./scripts/setup/setup-precommit.sh
# Run in dev mode
npm run dev
Code Standards
- Node.js 20+ with async/await patterns
- Jest for testing with >80% coverage target
- ESLint + Prettier for code formatting
- Conventional commits for version management
Security Checklist
- No hardcoded credentials
- All inputs sanitized
- Webhook signatures verified
- Container permissions minimal
- Logs redact sensitive data
Troubleshooting
Common Issues
Webhook not responding
- Verify signature secret matches
- Check GitHub token permissions
- Confirm webhook URL is accessible
Claude timeouts
- Increase
CONTAINER_LIFETIME_MS - Check AWS Bedrock quotas
- Verify network connectivity
Permission denied
- Confirm user in
AUTHORIZED_USERS - Check GitHub token scopes
- Verify AWS IAM permissions
Support
- Report issues: GitHub Issues
- Detailed troubleshooting: Complete Workflow Guide
License
MIT - See the LICENSE file for details.
Description
Languages
TypeScript
61.1%
JavaScript
30.3%
Shell
8%
Dockerfile
0.6%
