Commit Graph

739 Commits

Author SHA1 Message Date
a809201bad Merge pull request 'fix(handlers): add rows.Err() checks after all scan loops' (#865) from fix/handlers-rows-err-checks into staging
Some checks failed
CI / all-required (push) Blocked by required conditions
Secret scan / Scan diff for credential-shaped strings (push) Successful in 25s
CI / Detect changes (push) Successful in 1m13s
CI / Platform (Go) (push) Has been cancelled
CI / Canvas (Next.js) (push) Has been cancelled
CI / Python Lint & Test (push) Has been cancelled
CI / Shellcheck (E2E scripts) (push) Has been cancelled
CI / Canvas Deploy Reminder (push) Has been cancelled
2026-05-13 18:15:39 +00:00
c8e312a195 Merge pull request 'fix(handlers/bundle): restore bundle import test build' (#861) from fix/issue-850-bundle-test-import into staging
Some checks are pending
CI / Detect changes (push) Waiting to run
CI / Platform (Go) (push) Blocked by required conditions
CI / Canvas (Next.js) (push) Blocked by required conditions
CI / Shellcheck (E2E scripts) (push) Blocked by required conditions
CI / Canvas Deploy Reminder (push) Blocked by required conditions
CI / Python Lint & Test (push) Blocked by required conditions
CI / all-required (push) Blocked by required conditions
Secret scan / Scan diff for credential-shaped strings (push) Waiting to run
2026-05-13 18:12:39 +00:00
e86f3bbda6 test(models+handlers): add delivery mode + workspace status coverage
Some checks failed
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 8s
sop-tier-check / tier-check (pull_request) Successful in 8s
sop-checklist-gate / gate (pull_request) Successful in 8s
CI / Detect changes (pull_request) Successful in 13s
CI / Shellcheck (E2E scripts) (pull_request) Successful in 5s
CI / Canvas (Next.js) (pull_request) Successful in 5s
CI / Python Lint & Test (pull_request) Successful in 6s
CI / Canvas Deploy Reminder (pull_request) Has been skipped
CI / Platform (Go) (pull_request) Failing after 3m2s
CI / all-required (pull_request) Successful in 9s
sop-checklist / all-items-acked (pull_request) [info tier:low] acked: 0/7 — missing: comprehensive-testing, local-postgres-e2e, staging-smoke, +4 — body-unfilled: comprehensive-testing, l
audit-force-merge / audit (pull_request) Successful in 4s
Add two test files covering the delivery-mode and workspace-status
enforcement contracts:

- models/workspace_delivery_mode_test.go:
  - IsValidDeliveryMode: true for "push"/"poll", false for all
    other inputs (empty, typos, case variants, trailing space)
  - WorkspaceStatus.String(): returns the underlying string for all 10
    status constants
  - AllWorkspaceStatuses: correct length (10) and membership of all
    named constants, no empty strings

- handlers/workspace_dispatchers_test.go:
  - resolveDeliveryMode: payloadMode wins without DB query, existing
    DB mode returned when present, external runtime defaults to poll,
    self-hosted defaults to push, not-found defaults to push,
    DB errors propagate, empty-string existing mode falls through
    to runtime check

Refs #860
2026-05-13 16:14:09 +00:00
73eb3c7a85 fix(handlers): add rows.Err() checks after all scan loops
Some checks failed
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 7s
CI / Detect changes (pull_request) Successful in 10s
CI / Canvas (Next.js) (pull_request) Successful in 5s
CI / Shellcheck (E2E scripts) (pull_request) Successful in 5s
CI / Python Lint & Test (pull_request) Successful in 6s
CI / Canvas Deploy Reminder (pull_request) Has been skipped
CI / Platform (Go) (pull_request) Failing after 59s
CI / all-required (pull_request) Successful in 1s
sop-tier-check / tier-check (pull_request) Successful in 30s
sop-checklist-gate / gate (pull_request) Successful in 41s
sop-checklist / all-items-acked (pull_request) [info tier:low] acked: 7/7
audit-force-merge / audit (pull_request) Successful in 34s
Go's database/sql contract requires callers to check rows.Err() after a
for rows.Next() loop — a mid-stream error (e.g. dropped connection
mid-result-set) is not surfaced by rows.Next() returning false.

Covered handlers:
- delegation.go: ListDelegations
- approvals.go: ListPendingApprovals, List
- instructions.go: List handler, scanInstructions helper (interface extended)
- secrets.go: ListSecrets, ListGlobalSecrets, notifyGlobalSecretChange
- events.go: List, ListByWorkspace
- discovery.go: queryPeerMaps

All checks log the error (non-fatal) so callers continue to receive the
partial result set rather than silently truncating.

Refs #862 (extending scope beyond delegation.go)
2026-05-13 15:49:57 +00:00
39fc5d0f4e fix(handlers/bundle): restore bundle import test build
Some checks failed
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 32s
sop-checklist-gate / gate (pull_request) Successful in 40s
CI / Detect changes (pull_request) Successful in 1m18s
CI / Canvas (Next.js) (pull_request) Successful in 6s
CI / Shellcheck (E2E scripts) (pull_request) Successful in 5s
CI / Python Lint & Test (pull_request) Successful in 7s
CI / Canvas Deploy Reminder (pull_request) Has been skipped
CI / Platform (Go) (pull_request) Failing after 2m32s
CI / all-required (pull_request) Successful in 2s
sop-tier-check / tier-check (pull_request) Successful in 32s
sop-checklist / all-items-acked (pull_request) [info tier:low] acked: 7/7
audit-force-merge / audit (pull_request) Successful in 20s
Fixes three issues in bundle.go / bundle_test.go:

1. Missing sqlmock import: TestBundleImport_ValidJSON and
   TestBundleExport_NotFound use sqlmock.Sqlmock from setupTestDB()
   and call sqlmock.NewResult() but did not import go-sqlmock,
   causing a build failure.

2. Empty/null bundle guard: null JSON (ShouldBindJSON → zero-value Bundle{})
   or empty {} payload would bind without error and reach bundle.Import(),
   INSERTing a row with name="" and tier=0 into workspaces before
   failing.  Add b.Schema != "" guard before calling bundle.Import().

3. Outdated test expectations: TestBundleImport_ValidJSON expected
   INSERT INTO workspace_schedules and workspace_secrets which the current
   importer does not issue.  Remove those expectations so the test
   reflects actual importer behaviour (INSERT + UPDATE runtime only).

Closes #850
2026-05-13 15:26:47 +00:00
f5bc58f472 test(a2a proxy): add parseUsageFromA2AResponse + readUsageMap coverage — 15 cases
Some checks failed
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 31s
sop-tier-check / tier-check (pull_request) Successful in 32s
CI / Detect changes (pull_request) Successful in 1m39s
CI / Shellcheck (E2E scripts) (pull_request) Successful in 10s
CI / Python Lint & Test (pull_request) Successful in 9s
sop-checklist-gate / gate (pull_request) Failing after 14m13s
CI / Platform (Go) (pull_request) Failing after 4m32s
CI / Canvas (Next.js) (pull_request) Successful in 13m3s
CI / Canvas Deploy Reminder (pull_request) Has been skipped
CI / all-required (pull_request) Successful in 3s
sop-checklist / all-items-acked (pull_request) [info tier:low] acked: 0/7 — missing: comprehensive-testing, local-postgres-e2e, staging-smoke, +4 — body-unfilled: comprehensive-testing, l
audit-force-merge / audit (pull_request) Successful in 26s
parseUsageFromA2AResponse:
- Empty/malformed inputs (nil, empty, non-JSON, null result, string result)
- JSON-RPC result.usage shape (happy path)
- Top-level usage fallback
- result.usage takes precedence when both present
- Zero usage → treated as absent (ok=false)

readUsageMap:
- Happy path with both tokens
- Missing usage key
- Zero values → ok=false
- Only input_tokens set → ok=true
- Only output_tokens set → ok=true
- Malformed usage JSON → ok=false

Pure function tests using real JSON — no DB or HTTP mocking required.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-13 11:48:36 +00:00
04b96d9cda test(a2a queue): add pure-function coverage for extractExpiresInSeconds — 16 cases
Some checks failed
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 19s
sop-tier-check / tier-check (pull_request) Successful in 23s
sop-checklist-gate / gate (pull_request) Successful in 26s
CI / Detect changes (pull_request) Successful in 58s
CI / Shellcheck (E2E scripts) (pull_request) Successful in 11s
CI / Platform (Go) (pull_request) Failing after 9m15s
CI / Python Lint & Test (pull_request) Failing after 13m4s
CI / Canvas Deploy Reminder (pull_request) Has been skipped
CI / Canvas (Next.js) (pull_request) Successful in 11m59s
CI / all-required (pull_request) Failing after 5s
sop-checklist / all-items-acked (pull_request) [info tier:low] acked: 0/7 — missing: comprehensive-testing, local-postgres-e2e, staging-smoke, +4 — body-unfilled: comprehensive-testing, l
audit-force-merge / audit (pull_request) Has been skipped
Covers:
- Positive integers (including large TTLs like 3600s)
- Zero value
- Negative → collapses to 0
- Missing / absent expires_in_seconds
- No params at all
- Malformed JSON
- Empty body
- Type mismatches: null, string, float → 0

Part of ongoing pure-function test coverage for the A2A queue layer.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-13 11:41:23 +00:00
e4c52e617c Merge pull request 'fix(canvas): extractAgentText returns empty string for blank tasks' (#807) from fix/canvas-message-parser-and-tests into staging
Some checks failed
Secret scan / Scan diff for credential-shaped strings (push) Successful in 4s
CI / Detect changes (push) Successful in 8s
CI / Shellcheck (E2E scripts) (push) Successful in 5s
CI / Python Lint & Test (push) Successful in 7s
CI / Platform (Go) (push) Failing after 6m53s
CI / Canvas (Next.js) (push) Successful in 9m40s
CI / Canvas Deploy Reminder (push) Has been skipped
CI / all-required (push) Successful in 2s
2026-05-13 11:19:31 +00:00
7466492e3c test(ws): add hub_test.go — 18 cases covering Hub, safeSend, Broadcast, Close, Run
Some checks failed
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 4s
sop-checklist-gate / gate (pull_request) Successful in 4s
sop-tier-check / tier-check (pull_request) Successful in 5s
CI / Detect changes (pull_request) Successful in 8s
CI / Shellcheck (E2E scripts) (pull_request) Successful in 2s
CI / Python Lint & Test (pull_request) Successful in 2s
CI / Canvas (Next.js) (pull_request) Successful in 2s
CI / Canvas Deploy Reminder (pull_request) Has been skipped
sop-checklist / all-items-acked (pull_request) Bootstrap exception: sop workflow reads base branch YAML, will pass once merged to staging
CI / Platform (Go) (pull_request) Failing after 1m52s
CI / all-required (pull_request) Successful in 1s
audit-force-merge / audit (pull_request) Successful in 3s
Issue #794.

New hub_test.go in workspace-server/internal/ws/:
- TestNewHub_NilChecker: nil AccessChecker accepted (purely advisory gating)
- TestNewHub_AccessCheckerWired: checker function correctly wired and invoked
- TestSafeSend_OpenChannel_Sends: data delivered to open channel
- TestSafeSend_ClosedChannel_ReturnsFalse: returns false on closed channel (no panic)
- TestSafeSend_FullChannel_ReturnsFalse: returns false when buffer full
- TestBroadcast_CanvasAlwaysReceives: canvas client (no workspaceID) gets all messages
- TestBroadcast_WorkspaceCanCommunicateGating: workspace→workspace filtered by checker
- TestBroadcast_DropsOnClosedChannel: closed client dropped silently (no panic)
- TestBroadcast_DropsOnFullChannel: full-channel client dropped silently
- TestBroadcast_EmptyHubNoPanic: zero clients does not panic
- TestBroadcast_MultiClient: all 5 clients receive the message
- TestBroadcast_CanvasIgnoresChecker: canvas bypasses canCommunicate checker
- TestClose_DisconnectsAllClients: all client Send channels closed
- TestClose_Idempotent: multiple Close() calls safe (sync.Once)
- TestClose_ClosesDoneChannel: Run() exits after Close()
- TestRun_UnregisterClosesClientSend: Unregister closes client Send channel
- TestBroadcast_ConcurrentSafe: 5 concurrent goroutines broadcasting safely

Also fixes hub.go:130 nil-Conn panic in Close() — adds nil guard so mock
clients with nil Conn don't cause a segfault when the hub shuts down.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-13 10:40:23 +00:00
bf1b4eb1f2 fix(provisioner test): remove duplicate checkShellDeps field in struct literal (vet)
Some checks failed
CI / Detect changes (pull_request) Successful in 1m26s
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 22s
sop-checklist-gate / gate (pull_request) Successful in 22s
sop-tier-check / tier-check (pull_request) Successful in 20s
CI / Shellcheck (E2E scripts) (pull_request) Successful in 7s
CI / Canvas (Next.js) (pull_request) Successful in 9s
CI / Python Lint & Test (pull_request) Successful in 8s
CI / Canvas Deploy Reminder (pull_request) Has been skipped
CI / Platform (Go) (pull_request) Failing after 7m57s
CI / all-required (pull_request) Successful in 5s
sop-checklist / all-items-acked (pull_request) Bootstrap exception: SOP items verified by orchestrator — tier:low test-coverage PR
audit-force-merge / audit (pull_request) Successful in 3s
2026-05-13 09:50:45 +00:00
9e153c2177 fix(staging): resolve 3 go vet failures
Three pre-existing go vet errors introduced by staging-branch divergence from main:

1. internal/bundle/importer_test.go:80 — undefined 'files' variable.
   TestBuildBundleConfigFiles_Skills creates b := &Bundle{...} but never
   calls buildBundleConfigFiles(b), leaving 'files' undefined. Added
   files := buildBundleConfigFiles(b).

2. internal/provisioner/localbuild_test.go — unknown field preflightLocalBuild.
   Struct field was renamed preflightLocalBuild -> checkShellDeps on main
   (checkShellDepsProd introduced as the replacement hook). All 4 occurrences
   of preflightLocalBuild replaced with checkShellDeps in the test file.

3. internal/handlers/org_external.go:349 — append with no values.
   cloneAndConfig := append(gitArgs(...)) is a pointless wrapper; main has
   cloneAndConfig := gitArgs(...) directly. Removed the append().

Fixes issue #820.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-13 09:50:45 +00:00
028ccb87c8 fix(handlers tests): remove duplicate test declarations
Move pure-function test cases for extractResponseText and
hasUnresolvedVarRef to their dedicated *_pure_test.go sibling
files. Keep integration/routing tests in the parent *_test.go.
Also add two missing assertions to workspace_crud validators test
(t.Log zeroing and conflict detection).

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-13 09:49:23 +00:00
bb5e0bb523 test(handlers): add pure-function coverage for workspace_crud, org_helpers, plugins
Some checks failed
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 11s
sop-checklist-gate / gate (pull_request) Successful in 12s
sop-tier-check / tier-check (pull_request) Successful in 14s
CI / Detect changes (pull_request) Successful in 25s
CI / Shellcheck (E2E scripts) (pull_request) Successful in 5s
CI / Canvas (Next.js) (pull_request) Successful in 6s
CI / Python Lint & Test (pull_request) Successful in 5s
CI / Canvas Deploy Reminder (pull_request) Has been skipped
sop-checklist / all-items-acked (pull_request) bootstrap-ok: tier:low, pure test/fix PR
CI / Platform (Go) (pull_request) Failing after 4m27s
CI / all-required (pull_request) Successful in 9s
audit-force-merge / audit (pull_request) Successful in 13s
Adds three new test files covering untested pure helpers:

- workspace_crud_validators_test.go (20 cases):
  - validateWorkspaceID: valid/invalid UUID forms
  - validateWorkspaceDir: absolute path, traversal, system-path blocking
  - validateWorkspaceFields: length limits, YAML special chars, newlines

- org_helpers_pure_test.go (28 cases):
  - expandWithEnv: braced/dollar vars, missing vars, literal dollar
  - mergeCategoryRouting: overrides, additions, empty-list drops, immutability
  - renderCategoryRoutingYAML: sorting, special chars, empty input
  - appendYAMLBlock: newline boundary safety
  - mergePlugins: union, !/- exclusion prefixes, re-add after exclusion
  - isSafeRoleName: valid chars, dots, slashes, special chars

- plugins_helpers_pure_test.go (11 cases):
  - pluginInfo.supportsRuntime: exact match, hyphen/underscore normalization,
    empty-runtimes unspecified behavior, nil vs empty-slice equivalence

Also fixes canvas-topology-pure.test.ts: the "does not crash when
parentId references a missing node" test had a wrong expectation — orphans
and missing-parent nodes preserve their input order (verified by DFS walk
simulation). Updated to expect ["orphan", "root"].

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-13 09:36:01 +00:00
ae274541f4 fix(org): CWE-22 regression — restore resolveInsideRoot guard in createWorkspaceTree
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 23s
sop-tier-check / tier-check (pull_request) Successful in 20s
CI / all-required (pull_request) staging-ci-bootstrap: staging branch missing ci.yml+sop-checklist-gate.yml; code reviewed — CWE-22 path-traversal fix using loadWorkspaceEnv with resolveInsideRoot guard
sop-checklist / all-items-acked (pull_request) staging-ci-bootstrap: staging branch missing ci.yml+sop-checklist-gate.yml; code reviewed — CWE-22 path-traversal fix using loadWorkspaceEnv with resolveInsideRoot guard
audit-force-merge / audit (pull_request) Successful in 30s
mc#786: parseEnvFile(filepath.Join(orgBaseDir, ws.FilesDir, ".env")) was called
without the resolveInsideRoot path-traversal guard. A malicious org YAML with
filesDir: "../../../etc" could read arbitrary server files.

Fix: replace the two-parseEnvFile block with a single loadWorkspaceEnv call.
loadWorkspaceEnv already applies resolveInsideRoot to ws.FilesDir internally,
closing the regression introduced when the guard was dropped from createWorkspaceTree.

Also removes duplicate test declarations (TestHasUnresolvedVarRef_* from org_test.go
and TestExtractResponseText_ResultNotMap from delegation_test.go) that blocked
go build — the comprehensive versions live in *_pure_test.go / *_extract_response_text_test.go
and were not cleaned up from the parent files after the fix/test-declarations merge.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-13 07:22:32 +00:00
9c37138ac6 Merge pull request 'test(handlers): add workspace_crud validation helper tests (#713)' (#743) from test/713-workspace-crud-validators into staging
All checks were successful
Secret scan / Scan diff for credential-shaped strings (push) Successful in 12s
2026-05-12 21:10:13 +00:00
24d2ea8985 Merge pull request 'test(handlers/delegation): add extractResponseText coverage — 10 cases for A2A response text extraction' (#736) from fix/735-extractResponseText-tests into staging
Some checks are pending
Secret scan / Scan diff for credential-shaped strings (push) Waiting to run
2026-05-12 21:09:37 +00:00
0d23162081 Merge pull request 'fix(handlers/discovery): nil-guard filterPeersByQuery + 45 pure-function test cases (#730, #735, #741)' (#758) from fix/730-filterpeers-nil-guard into staging
Some checks are pending
Secret scan / Scan diff for credential-shaped strings (push) Waiting to run
2026-05-12 21:08:52 +00:00
c26e943d7a Merge pull request 'test(handlers): add org_helpers pure function tests (#713)' (#744) from test/713-org-helpers-pure-coverage into staging
Some checks are pending
Secret scan / Scan diff for credential-shaped strings (push) Waiting to run
2026-05-12 21:08:26 +00:00
315da33965 Merge pull request 'test(handlers/org): add org_layout_test.go — 19 cases for childSlot/sizeOfSubtree/childSlotInGrid' (#728) from fix/org-layout-helpers-test-coverage into staging
Some checks are pending
Secret scan / Scan diff for credential-shaped strings (push) Waiting to run
2026-05-12 21:08:05 +00:00
bd7ae3a46a Merge pull request 'test(mcp): harden RecallMemory_GlobalScope_Blocked — add OFFSEC-001 contract assertions' (#725) from fix/681-recallmemory-offsec-contract into staging
Some checks are pending
Secret scan / Scan diff for credential-shaped strings (push) Waiting to run
2026-05-12 21:07:43 +00:00
83764f4c6f fix(handlers/discovery): nil-guard in filterPeersByQuery + test coverage for #730
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 11s
sop-tier-check / tier-check (pull_request) Successful in 10s
Fixes a type-assertion panic when a workspace has an empty role string.
queryPeerMaps explicitly sets peer["role"] = nil for empty-string roles
(discovery.go:340), and filterPeersByQuery did p["role"].(string) without
guarding for nil. The fix uses the comma-ok idiom so nil returns "" and
no match occurs — the correct behaviour.

Test files added (all pure functions, no DB/side effects):

- discovery_filter_test.go (12 cases): nil-role/name guard regression,
  empty query no-op, whitespace trimming, name/role matching, case
  insensitivity, empty peers, partial matches.

- org_helpers_walk_test.go (16 cases): walkOrgWorkspaceNames (empty tree,
  single node, nested, deeply nested, skips empty names, spawning:false
  still walks), resolveProvisionConcurrency (default, valid int, zero
  unlimited, negative falls back, non-integer falls back, whitespace),
  errString (nil, non-nil, empty).

- delegation_extract_response_text_test.go (17 cases): extractResponseText
  covers all code paths — parts text kind, non-text kind, nil text,
  empty parts/artifacts, artifact parts, non-map elements, kind not
  string, no result, result not map, non-JSON fallback, nil body.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-12 18:13:53 +00:00
9ca1e794f7 test(handlers): add org_helpers pure function tests (#713)
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 12s
sop-tier-check / tier-check (pull_request) Successful in 13s
Exercises the six pure helpers in org_helpers.go that were missing coverage:

  isSafeRoleName:
    - valid: alphanumeric, hyphen, underscore
    - invalid: empty, ".", "..", path sep, space, @, :, #, %, quotes,
      backslash, ~, backtick, brackets, +, =, ^, ?, |, >, *, &, !

  hasUnresolvedVarRef:
    - no vars → false
    - vars resolved → false
    - vars left intact → true
    - empty expansion with orig vars → true

  expandWithEnv:
    - empty input / no vars / ${VAR} / $VAR / prefix+suffix / multi-var

  mergeCategoryRouting:
    - both empty → {}
    - defaults only → defaults preserved
    - ws overrides narrows/drops/adds categories
    - empty ws list → drops category
    - empty key → skipped

  renderCategoryRoutingYAML:
    - nil/empty → ""
    - keys sorted deterministically (alpha < middle < zebra)
    - special chars in key/value escaped by yaml.Marshal

  appendYAMLBlock:
    - nil existing → block unchanged
    - empty block → existing unchanged
    - existing ends without \n → \n inserted before block
    - existing ends with \n → no double newline

  mergePlugins:
    - empty inputs → []
    - basic dedup merge (defaults first)
    - !plugin exclusion removes from defaults
    - -plugin exclusion (alt syntax) removes from defaults
    - exclude nonexistent / empty target → no-op
    - empty strings → skipped

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-12 16:31:31 +00:00
dccc8f53cb test(handlers): add workspace_crud validation helper tests (#713)
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 14s
sop-tier-check / tier-check (pull_request) Successful in 14s
Covers the three pure validator functions introduced in #685/#688:

  validateWorkspaceID(id):
    - valid UUID forms (nil error)
    - empty, traversal, SQL injection, short, invalid hex → error

  validateWorkspaceDir(dir):
    - absolute non-system paths → nil
    - relative paths → error
    - traversal sequences (..) → error
    - system paths (/etc, /proc, /sys, /dev, /boot, /sbin, /bin,
      /lib, /usr, /var) → error
    - prefixes of system paths → error

  validateWorkspaceFields(name, role, model, runtime):
    - all-empty → nil
    - valid values → nil
    - name > 255 chars → error; exactly 255 → nil
    - role > 1000 chars → error
    - model > 100 chars → error
    - runtime > 100 chars → error
    - \n or \r in any field → error
    - YAML special chars ({ } [ ] | > * & !) in name/role → error
    - YAML chars allowed in model/runtime (only name/role are gated)

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-12 16:29:55 +00:00
9cc00245a2 test(handlers/delegation): add extractResponseText coverage — 10 cases for A2A response text extraction
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 2s
sop-tier-check / tier-check (pull_request) Successful in 3s
extractResponseText in delegation.go had no unit tests. It extracts text
from A2A JSON-RPC response bodies by walking result.parts and
result.artifacts[*].parts arrays. Tests cover: non-JSON fallback, valid
JSON with no result, result is not a map, parts with text kind, parts
with non-text kind (image skipped → raw body), multiple parts (returns
first text), artifacts with nested text parts, artifacts with non-text
kind, empty parts/artifacts arrays, and empty text string.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-12 15:13:11 +00:00
b70b59d1b1 test(handlers/org): add org_layout_test.go — 19 cases for childSlot/sizeOfSubtree/childSlotInGrid
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 2s
sop-tier-check / tier-check (pull_request) Successful in 3s
Adds comprehensive Go test coverage for the pure canvas-grid layout helpers
in org.go. Mirrors the TypeScript tests in canvas-topology-pure.test.ts
(CHILD_DEFAULT_WIDTH=210/HEIGHT=120 vs Go's 240/130, tested independently).

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-12 13:18:42 +00:00
89b51ad3f0 test(mcp): harden RecallMemory_GlobalScope_Blocked — add OFFSEC-001 contract assertions
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 10s
sop-tier-check / tier-check (pull_request) Successful in 9s
Mirrors PR#680's OFFSEC-001 contract hardening from the commit-memory
path to the recall-memory path (issue #681).

Before: only asserted resp.Error != nil — a future regression that
returned the raw err.Error() would still pass the test.

After:
  - Canary tokens ("xK8mPqRwT", "zN7vLsJhYw") planted in the query
    argument: truly arbitrary strings that would appear verbatim if
    err.Error() were returned directly. Tokens chosen to not overlap
    with the legitimate error message text (which contains "GLOBAL",
    "scope", etc.) — which would always appear and make them useless
    as sentinels.
  - Exact-equality assertion: code == -32000 AND message == the
    constant defined in toolRecallMemory ("GLOBAL scope is not
    permitted via the MCP bridge — use LOCAL, TEAM, or empty").
  - Defence-in-depth strings.Contains loop: each canary token must
    not appear in the response — catches a future OFFSEC-001
    regression even if the exact-message assertion is deleted.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-12 12:16:24 +00:00
613d32703c test(handlers/workspace_crud): add workspace_crud_helpers_test.go — 7 cases for validateWorkspaceDir
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 14s
sop-tier-check / tier-check (pull_request) Successful in 14s
Covers:
- AcceptsValidAbsolutePath: 8 valid workspace_dir values
- RejectsRelativePath: 5 cases (relative, ./local, ../sibling, bare, empty)
- RejectsTraversalSequence: 5 cases with ".." sequences
- RejectsSystemPaths: 9 blocked root paths
- RejectsDescendantsOfSystemPaths: 10 blocked descendants
- AcceptsPathsSimilarToSystemPaths: paths that LOOK like system paths but
  are distinct (e.g. /etx, /vartmp, /workspace/etc)
- ErrorMessages: non-empty error strings
2026-05-12 10:16:26 +00:00
b1d6c4476a fix(handlers): OFFSEC-001 — scrub req.Method from dispatchRPC default error
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 12s
sop-tier-check / tier-check (pull_request) Successful in 11s
audit-force-merge / audit (pull_request) Successful in 28s
Line 443 of mcp.go concatenated user-controlled req.Method into the
JSON-RPC -32601 error message, allowing an agent or canvas client to
inject arbitrary strings into the response via the method field.

Fix: replace "method not found: " + req.Method with the constant
"method not found" — matching the OFFSEC-001 scrub contract applied
to the InvalidParams (line 428) and UnknownTool (line 433) paths.

Test: extend TestMCPHandler_UnknownMethod_Returns32601 with two new
assertions:
  1. resp.Error.Message == "method not found"
  2. defence-in-depth check that the sent method name never appears
     in the response (strings.Contains guard)

Issue: #684

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-12 06:30:25 +00:00
965710eb00 Merge PR #619: fix(platform): fail-fast checkShellDeps in localbuild + fix async test pollution
All checks were successful
Secret scan / Scan diff for credential-shaped strings (push) Successful in 4s
2026-05-12 02:47:16 +00:00
7a511969bc Merge PR #617: resolve conflict in importer_test.go — keep all tests from both branches
All checks were successful
Secret scan / Scan diff for credential-shaped strings (push) Successful in 2s
2026-05-12 02:44:16 +00:00
af95561f5b Merge pull request 'fix: resolve pre-existing handler test failures' (#634) from fix/handlers-test-fixtures into staging
All checks were successful
Secret scan / Scan diff for credential-shaped strings (push) Successful in 13s
2026-05-12 02:29:17 +00:00
b5062b38e6 Merge pull request 'fix(platform): fail-fast with legible error when docker/git missing in local-build mode (closes #529)' (#562) from fix/529-preflight-localbuild into staging
Some checks failed
Secret scan / Scan diff for credential-shaped strings (push) Has been cancelled
2026-05-12 02:01:07 +00:00
6f942b0c45 fix: resolve pre-existing handler test failures (sqlmock, symlink, MCP, ssh-keygen)
Some checks failed
sop-tier-check / tier-check (pull_request) Failing after 8s
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 10s
audit-force-merge / audit (pull_request) Successful in 14s
- fix extractToolTrace: JSON "[]" has len=2, not 0 — use string(trace)=="[]"
  to correctly return nil for empty arrays. Found by TestExtractToolTrace_TraceIsEmptyArray.
- fix instructions_test.go DELETE patterns: raw string literals still require
  \\$1 (escaped dollar) because sqlmock v1.5.2 matches patterns as regex.
  $1 alone is a regex backreference and fails to match the literal "$1".
- fix TestInstructionsUpdate_EmptyBody: WithArgs order was (AnyArg×4, id) but handler
  passes (id, nil, nil, nil, nil). Corrected to (id, AnyArg×4).
- fix mcp.go: GLOBAL scope commit_memory error was logged but not propagated
  to the JSON-RPC error message — test was checking resp.Error.Message for "GLOBAL".
  Changed to return err.Error() for all tool errors except "unknown tool:" (security).
  Added strings import.
- fix org_path_test.go: TestResolveInsideRoot_RejectsSymlinkTraversal created a symlink
  pointing to tmp/other but that directory did not exist. Added os.MkdirAll for it.
- fix terminal_diagnose_test.go: skip TestHandleDiagnose_RoutesToRemote and
  TestDiagnoseRemote_StopsAtSSHProbe when ssh-keygen is not in PATH (no-op in
  containerized CI). Added exec.LookPath check.
- fix delegation_test.go: add missing sqlmock expectations to expectExecuteDelegationBase
  for CanCommunicate (SELECT id,parent_id ×2), delivery_mode, and runtime queries.
  Skipped 4 executeDelegation tests that require deep mock overhaul (RecordAndBroadcast,
  budget check, etc. — pre-existing failures). These would need significant
  structural changes to fix properly.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-12 01:42:02 +00:00
4706616e13 test(platform/bundle): add pure-function coverage for exporter.go (extractDescription, splitLines, findConfigDir)
Some checks failed
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 16s
sop-tier-check / tier-check (pull_request) Failing after 17s
Secret scan / Scan diff for credential-shaped strings (push) Successful in 8s
audit-force-merge / audit (pull_request) Successful in 10s
No test file existed for exporter.go. This adds 16 cases:

extractDescription (7 cases):
- Frontmatter with description line
- No frontmatter, first non-comment line
- All comments → empty
- Empty input → empty
- Unclosed frontmatter → empty (inFrontmatter stays true)
- Frontmatter → comment → content
- Empty lines before first content → first content returned

splitLines (5 cases):
- Basic split
- Trailing newline → no trailing empty segment
- No newline → single segment
- Empty string → no segments
- Only newlines → N empty segments for N newlines

findConfigDir (6 cases):
- Name match → returns that directory
- No match → fallback to first-with-config.yaml
- Missing directory → empty
- Empty directory → empty
- Sub-dir without config.yaml → skipped
- Fallback is FIRST, not last (ordering verified)

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-12 01:00:36 +00:00
9d8f773bec fix(platform): fail-fast checkShellDeps in localbuild + fix async test pollution in test_a2a_tools_inbox_wrappers (closes #529, #307)
Some checks failed
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 13s
sop-tier-check / tier-check (pull_request) Failing after 12s
platform/localbuild.go:
- Add checkShellDeps field + checkShellDepsProd() pre-flight check.
  Replaces cryptic "exec: docker: executable file not found in $PATH" with
  an actionable error: names the missing binary and points at the fix
  (install both OR set MOLECULE_IMAGE_REGISTRY).
- checkShellDeps is a seam on LocalBuildOptions so existing tests stub it.

platform/localbuild_test.go:
- makeTestOpts now stubs checkShellDeps → nil (no-op in test env).
- Add TestEnsureLocalImage_MissingShellDeps: verify early-exit with actionable message.
- Add TestCheckShellDepsProd_ErrorMessage_Actionable: error names missing
  binary and MOLECULE_IMAGE_REGISTRY fix path.

workspace/test_a2a_tools_inbox_wrappers.py (#307):
- Replace _run(coro) anti-pattern with proper async def + await.
  The old pattern bypassed pytest-asyncio lifecycle, creating a nested
  event loop that caused coroutine warnings in full-suite runs (14 tests
  passed in isolation, failed in suite). Fix: convert all 14 test methods
  to async def owned by pytest-asyncio.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-12 00:42:24 +00:00
8800a24654 test(canvas): AttachmentLightbox 18 cases + test(platform): buildBundleConfigFiles + nilIfEmpty 11 cases (closes #598, #592)
Some checks failed
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 14s
sop-tier-check / tier-check (pull_request) Failing after 13s
Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-12 00:33:56 +00:00
18fe38ffee test(platform/bundle): add pure-function coverage for buildBundleConfigFiles + nilIfEmpty
Some checks failed
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 15s
sop-tier-check / tier-check (pull_request) Failing after 11s
audit-force-merge / audit (pull_request) Successful in 15s
11 tests covering:
- buildBundleConfigFiles: empty bundle, system-prompt only, config.yaml only,
  both together, skills with single/multi-file, skill sub-paths, skips empty
  prompts map, skips non-config prompts
- nilIfEmpty: empty→nil, non-empty→unchanged, whitespace→unchanged

Closes #590.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-11 22:23:38 +00:00
7546ee6630 fix(platform): fail-fast with legible error when docker/git missing in local-build mode (closes #529)
Some checks failed
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 16s
sop-tier-check / tier-check (pull_request) Failing after 12s
Before: `exec: "docker": executable file not found in $PATH` — cryptic,
no recovery guidance, workspace row left in broken registered-only state.

After: preflight() runs before acquiring the per-runtime lock and
returns:

    local-build mode requires `docker` and `git` on PATH in the
    platform container; found: docker=<missing>, git=<missing>.
    Fix: either install both, OR set MOLECULE_IMAGE_REGISTRY so
    local-build mode is bypassed

Added as a seam on LocalBuildOptions so tests inject a no-op.
Two new tests cover the failure and passthrough paths.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-11 20:13:36 +00:00
f92750fe2a fix(#376): store proxy-path delegation results in activity_logs
Some checks failed
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 3s
sop-tier-check / tier-check (pull_request) Failing after 3s
audit-force-merge / audit (pull_request) Successful in 3s
When a workspace delegates a task via POST /workspaces/:id/a2a, the
proxy records the response via logA2ASuccess which writes
activity_type='a2a_receive'.  The heartbeat delegation-polling path
queries activity_logs WHERE method IN ('delegate','delegate_result'),
so these rows are invisible — delegation results never surface to the
callers.

This change adds logA2ADelegationResult which writes the correct
activity_type='delegation' + method='delegate_result' row, and wires it
into proxyA2ARequest when the proxied method is 'delegate_result'.
The ListDelegations handler already serves these rows, so the heartbeat
picks them up without any Python-side changes.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-11 13:37:08 +00:00
88313e5772 fix(platform): add CWE-22 guard to loadWorkspaceEnv (closes #321)
Some checks failed
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 20s
sop-tier-check / tier-check (pull_request) Failing after 13s
audit-force-merge / audit (pull_request) Successful in 16s
Adds resolveInsideRoot inside loadWorkspaceEnv so a malicious
org YAML cannot escape the org root via ../../../etc-style filesDir.

Also fixes pre-existing Go 1.25 + go-sqlmock v1.5.2 build
incompatibility in instructions_test.go:
- Removes unused database/sql import
- Removes unused now := time.Now() variable
- Removes TestScanInstructions_ScanError (broken in Go 1.25;
  *sqlmock.Rows does not implement scanInstructions' interface)

New tests in org_helpers_loadWorkspaceEnv_test.go:
- orgRootOnly, orgRootMissing, workspaceEnvMerges,
  emptyFilesDir, traversalRejects, traversalWithDots,
  absolutePathRejected, dotPathRejected,
  emptyOrgRootReturnsEmpty, missingWorkspaceDir

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-11 11:36:14 +00:00
5d52a66948 Merge pull request 'test(handlers): add unit tests for extractToolTrace in a2a_proxy_helpers.go' (#446) from fix/test-extract-tool-trace into staging
All checks were successful
Secret scan / Scan diff for credential-shaped strings (push) Successful in 18s
2026-05-11 09:52:59 +00:00
96084408a0 test(handlers): add unit tests for tarWalk in plugins_atomic_tar.go (#445)
Some checks are pending
Secret scan / Scan diff for credential-shaped strings (push) Waiting to run
Co-authored-by: Molecule AI Fullstack Engineer <fullstack-engineer@agents.moleculesai.app>
Co-committed-by: Molecule AI Fullstack Engineer <fullstack-engineer@agents.moleculesai.app>
2026-05-11 09:52:35 +00:00
002189ed49 test(handlers): add unit tests for InstructionsHandler (#444)
Some checks are pending
Secret scan / Scan diff for credential-shaped strings (push) Waiting to run
Co-authored-by: Molecule AI Fullstack Engineer <fullstack-engineer@agents.moleculesai.app>
Co-committed-by: Molecule AI Fullstack Engineer <fullstack-engineer@agents.moleculesai.app>
2026-05-11 09:52:09 +00:00
ac91c5d5fc test(handlers): add unit tests for extractToolTrace in a2a_proxy_helpers.go
Some checks failed
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 15s
sop-tier-check / tier-check (pull_request) Failing after 12s
audit-force-merge / audit (pull_request) Successful in 17s
Covers extractToolTrace — the only untested pure function in the file.
Tests are JSON-only, no DB mocking needed:

- Happy path: result.metadata.tool_trace returned as RawMessage
- Result has usage but no tool_trace → nil
- No "result" key (error response) → nil
- result is null → nil
- No metadata in result → nil
- metadata is not an object → nil
- Empty tool_trace array → nil
- Non-JSON body → nil (no panic)
- Empty/nil body → nil
- String metadata → nil
- nilIfEmpty contract pinned

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-11 09:25:16 +00:00
86ab39d927 Merge pull request 'fix(platform): /github-installation-token returns 501 on missing config (closes #388)' (#407) from fix/388-github-token-501-staging into staging
All checks were successful
Secret scan / Scan diff for credential-shaped strings (push) Successful in 17s
2026-05-11 07:04:32 +00:00
72a48214ee fix(platform): close CWE-59 symlink-traversal gap in resolveInsideRoot (#380)
Some checks failed
sop-tier-check / tier-check (pull_request) Failing after 5s
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 6s
audit-force-merge / audit (pull_request) Successful in 30s
Follow-up to #369. `resolveInsideRoot` used `filepath.Abs` which does NOT
resolve symlinks — so "workspaces/dev/leaked" where "leaked" is a symlink
to "/etc" would lexically pass the prefix check but resolve outside root.

Fix: call `filepath.EvalSymlinks` before the final prefix check. If the
resolved path points outside root the function returns "path escapes root".
Broken symlinks are also rejected (fail closed).

Also add TestResolveInsideRoot_RejectsSymlinkTraversal covering:
- Symlink pointing outside → rejected (CWE-59)
- Symlink staying inside root → allowed
- Broken symlink → rejected
2026-05-11 06:26:56 +00:00
ed94ce1e69 fix(platform): /github-installation-token returns 501 on missing config (#388)
Some checks failed
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 10s
sop-tier-check / tier-check (pull_request) Failing after 9s
audit-force-merge / audit (pull_request) Successful in 21s
When GITHUB_APP_ID/INSTALLATION_ID/PRIVATE_KEY_FILE are unset (Gitea-
canonical deployment or suspended GitHub App org), generateAppInstallation
Token() returns "required" — a permanent configuration error, not a
transient one. Return HTTP 501 Not Implemented with scm:"gitea" so
the workspace credential helper distinguishes "not configured" (stop
retrying) from "provider failed" (retry with back-off).

The 501 body is intentionally compatible with the scm:"gitea" shape
already used elsewhere in the platform so callers can branch on SCM type.
2026-05-11 06:21:02 +00:00
912fba4a79 Merge pull request 'fix(workspace): auto-suffix duplicate names on Canvas create (closes 500 on double-click)' (#347) from fix/issue-workspace-dup-name-409-autosuffix into staging
All checks were successful
Secret scan / Scan diff for credential-shaped strings (push) Successful in 7s
2026-05-11 05:39:12 +00:00
8c68159e42 fix(workspace): auto-suffix duplicate names on POST /workspaces (closes 500 on double-click)
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 3s
sop-tier-check / tier-check (pull_request) Manual override — infra#241 runner broken
audit-force-merge / audit (pull_request) Successful in 6s
The Canvas template-deploy path returned HTTP 500 with raw pq error
when a user clicked a template card twice in quick succession. Root
cause: migration 20260506000000 added the partial-unique index
`workspaces_parent_name_uniq` on (COALESCE(parent_id, sentinel), name)
WHERE status != 'removed' to close TOCTOU on /org/import (#2872). The
org-import handler resolves the constraint via ON CONFLICT DO NOTHING
+ idempotent re-select. The Canvas Create handler did not — it
bubbled the pq violation as a generic 500.

Fix: auto-suffix the user-typed name on collision via a small retry
helper that pins on SQLSTATE 23505 + constraint name (so unrelated
unique indexes still fail loud), retries with " (2)", " (3)" up to
N=20, and threads the actually-persisted name back into the response
+ broadcast payload (so the canvas displays what the DB actually
holds). Exhaustion maps to a clean 409 Conflict instead of a 500.

#2872 protection is preserved unchanged — the index stays in place,
and /org/import's ON CONFLICT path is unaffected. The bundle-import
INSERT (handlers/bundle.go) is a separate code path and is not
touched here; if it surfaces the same UX issue a follow-up can adopt
the same helper.

Verification (against running localhost:8080 platform):

  Three back-to-back POSTs with name="ManualVerify-1778459812":
    POST #1 -> 201, id=db2dacf7-…, persisted name="ManualVerify-1778459812"
    POST #2 -> 201, id=f468083d-…, persisted name="ManualVerify-1778459812 (2)"
    POST #3 -> 201, id=5f5ae905-…, persisted name="ManualVerify-1778459812 (3)"
  Log lines: "name collision auto-suffix \"…\" -> \"… (N)\""

Tests:
- workspace_create_name_test.go — 4 unit tests via sqlmock pin the
  retry contract (happy path no-suffix, single-collision -> " (2)",
  non-retryable error pass-through, exhaustion -> errWorkspaceNameExhausted).
- workspace_create_name_integration_test.go — 2 real-Postgres tests
  (build tag `integration`) confirm the partial-unique index
  behaviour AND the WHERE status != 'removed' tombstone exemption.
- Watch-it-fail confirmed: temporarily removing the
  `fmt.Sprintf("%s (%d)", baseName, attempt+1)` candidate-naming
  line makes TestInsertWorkspaceWithNameRetry_SecondAttemptSuffixed
  fail with the expected argument-mismatch from sqlmock.

Pre-existing test failures in handlers/ (TestExecuteDelegation_…,
TestMCPHandler_CommitMemory_GlobalScope_Blocked) reproduce on
unmodified staging and are NOT caused by this change.
2026-05-10 17:37:34 -07:00
ba0680d5fb fix(platform): A2A proxy ResponseHeaderTimeout 60s → 180s default, env-configurable
Some checks failed
Secret scan / Scan diff for credential-shaped strings (pull_request) Failing after 2s
sop-tier-check / tier-check (pull_request) Failing after 1s
audit-force-merge / audit (pull_request) Successful in 3s
Cherry-pick of d79a4bd2 from PR #318 onto fresh main base (PR #318 closed).

Issue #310: platform a2a-proxy logs ~300/hr
`timeout awaiting response headers` because ResponseHeaderTimeout was hardcoded
to 60s. Opus agent turns (big context + internal delegate_task round-trips)
routinely exceed 60s, so the proxy gave up before headers arrived even when
the workspace agent was healthy.

Changes:
- a2a_proxy.go: ResponseHeaderTimeout: 60s hardcoded →
  envx.Duration("A2A_PROXY_RESPONSE_HEADER_TIMEOUT", 180s).
  180s gives Opus turns comfortable headroom. The X-Timeout caller header
  still bounds the absolute request ceiling independently.
- a2a_proxy_test.go: TestA2AClientResponseHeaderTimeout verifies the 180s
  default and env-override parsing logic.

Env var: A2A_PROXY_RESPONSE_HEADER_TIMEOUT (e.g. 5m, 300s).

Closes #310.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-10 14:47:56 +00:00