Commit Graph

5193 Commits

Author SHA1 Message Date
cfa91075ed Merge pull request 'fix(tests/e2e): surface diagnose step Detail in EIC smoke output (mc#687)' (#748) from fix/713-eic-diagnose-detail into staging
Some checks are pending
Secret scan / Scan diff for credential-shaped strings (push) Waiting to run
2026-05-12 21:08:38 +00:00
c26e943d7a Merge pull request 'test(handlers): add org_helpers pure function tests (#713)' (#744) from test/713-org-helpers-pure-coverage into staging
Some checks are pending
Secret scan / Scan diff for credential-shaped strings (push) Waiting to run
2026-05-12 21:08:26 +00:00
315da33965 Merge pull request 'test(handlers/org): add org_layout_test.go — 19 cases for childSlot/sizeOfSubtree/childSlotInGrid' (#728) from fix/org-layout-helpers-test-coverage into staging
Some checks are pending
Secret scan / Scan diff for credential-shaped strings (push) Waiting to run
2026-05-12 21:08:05 +00:00
bd7ae3a46a Merge pull request 'test(mcp): harden RecallMemory_GlobalScope_Blocked — add OFFSEC-001 contract assertions' (#725) from fix/681-recallmemory-offsec-contract into staging
Some checks are pending
Secret scan / Scan diff for credential-shaped strings (push) Waiting to run
2026-05-12 21:07:43 +00:00
309f76caa2 Merge pull request 'test(handlers/workspace_crud): add workspace_crud_helpers_test.go — 7 cases for validateWorkspaceDir' (#716) from test/workspace-crud-helpers-coverage into staging
Some checks are pending
Secret scan / Scan diff for credential-shaped strings (push) Waiting to run
2026-05-12 21:07:27 +00:00
e3c662cecf ci: rerun after mc#724 all-required fix lands
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 20s
sop-tier-check / tier-check (pull_request) Successful in 19s
audit-force-merge / audit (pull_request) Successful in 30s
2026-05-12 20:51:55 +00:00
d8357d8720 ci: rerun after mc#724 all-required fix lands
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 10s
sop-tier-check / tier-check (pull_request) Successful in 22s
audit-force-merge / audit (pull_request) Successful in 41s
2026-05-12 20:51:46 +00:00
b3b6ef1695 ci: rerun after mc#724 all-required fix lands
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 11s
sop-tier-check / tier-check (pull_request) Successful in 10s
audit-force-merge / audit (pull_request) Successful in 27s
2026-05-12 20:51:39 +00:00
eb03eed089 ci: rerun after mc#724 all-required fix lands
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 16s
sop-tier-check / tier-check (pull_request) Successful in 17s
audit-force-merge / audit (pull_request) Successful in 24s
2026-05-12 20:51:09 +00:00
24df054dfb ci: rerun after mc#724 all-required fix lands
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 13s
sop-tier-check / tier-check (pull_request) Successful in 16s
audit-force-merge / audit (pull_request) Successful in 23s
2026-05-12 20:51:02 +00:00
ee4952bbbb Merge pull request 'fix(canvas): case-insensitive extension lookup in getIcon + topology test fix' (#749) from fix/697-canvas-geticon-topology into staging
All checks were successful
Secret scan / Scan diff for credential-shaped strings (push) Successful in 4s
2026-05-12 18:02:50 +00:00
1c61b117ae fix(canvas): case-insensitive extension lookup in getIcon + topology test fix
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 10s
sop-tier-check / tier-check (pull_request) Successful in 10s
audit-force-merge / audit (pull_request) Successful in 5s
Two pre-existing canvas test failures:

1. canvas/src/components/tabs/FilesTab/tree.ts:getIcon()
   FILE_ICONS keys are lowercase (".json") but the extension was looked
   up as-is (".JSON"). Result: FILE_ICONS[".JSON"] → undefined → fallback
   "📄" instead of "{}".
   Fix: lowercase the extension before FILE_ICONS lookup. Also added ?.
   null-coalescing on split().pop() to handle filenames without extension.

2. canvas/src/store/__tests__/canvas-topology-pure.test.ts
   sortParentsBeforeChildren test expectation was wrong: it assumed orphan
   would come after root, but when parentId references a missing node
   the orphan keeps its input order (orphan, then root). Updated the
   expectation and corrected the comment to match the actual behaviour.

Closes #697.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-12 17:16:42 +00:00
2ca7e24d70 Merge pull request 'test(canvas): add buildDeployMap unit tests (19 cases, #2071 follow-up)' (#742) from feat/2071-canvas-orgdeploystate-coverage into staging
All checks were successful
Secret scan / Scan diff for credential-shaped strings (push) Successful in 8s
2026-05-12 17:16:41 +00:00
551f4969b1 Merge pull request 'test(canvas/lib): add hydrate.test.ts — 7 cases for exponential-backoff hydration' (#703) from test/701-canvas-hydrate-coverage into staging
Some checks failed
Secret scan / Scan diff for credential-shaped strings (push) Has been cancelled
2026-05-12 17:16:39 +00:00
480b5adfb1 Merge pull request 'test(canvas): add DropTargetBadge unit tests (7 cases, #2071 follow-up)' (#745) from test/2071-canvas-drop-target-badge-coverage into staging
All checks were successful
Secret scan / Scan diff for credential-shaped strings (push) Successful in 6s
2026-05-12 17:16:19 +00:00
21f55579fa fix(tests/e2e): surface diagnose step Detail in EIC smoke output (mc#687)
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 2s
sop-tier-check / tier-check (pull_request) Successful in 3s
mc#687 root-cause finding from mc#424: the EIC diagnose smoke was
reading diagnoseStep.error (Go error string) and discarding
diagnoseStep.detail (subprocess stderr). The actionable signal — e.g.

  AccessDeniedException: ... is not authorized to perform:
  ec2-instance-connect:OpenTunnel

— lives in detail. Reading only .error produced:

  exec: process exited with status 1

which was uninformative and caused a 21h outage investigation.

Fix: extract .detail (subprocess stderr) as primary output; append
Go error string in parentheses when both fields are populated.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-12 17:11:35 +00:00
48440cc83d test(canvas): add DropTargetBadge unit tests (7 cases, #2071 follow-up)
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 21s
sop-tier-check / tier-check (pull_request) Successful in 26s
audit-force-merge / audit (pull_request) Successful in 8s
Adds isolated tests for DropTargetBadge — the floating drag-target affordance.
Render-condition coverage:

  - Renders nothing when dragOverNodeId is null
  - Renders nothing when dragOverNodeId node has no store match
  - Renders nothing when getInternalNode returns undefined
  - Renders badge with correct name when all inputs are valid
  - Badge text follows 'Drop into: <name>' format
  - Badge contains exact target name from store
  - Renders nothing when target name is null (empty data.name)

Ghost visibility (slot rect inside parent bounds) is deferred to
integration tests that render the full canvas — flowToScreenPosition
coordinate arithmetic is better covered there.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-12 16:40:12 +00:00
9ca1e794f7 test(handlers): add org_helpers pure function tests (#713)
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 12s
sop-tier-check / tier-check (pull_request) Successful in 13s
Exercises the six pure helpers in org_helpers.go that were missing coverage:

  isSafeRoleName:
    - valid: alphanumeric, hyphen, underscore
    - invalid: empty, ".", "..", path sep, space, @, :, #, %, quotes,
      backslash, ~, backtick, brackets, +, =, ^, ?, |, >, *, &, !

  hasUnresolvedVarRef:
    - no vars → false
    - vars resolved → false
    - vars left intact → true
    - empty expansion with orig vars → true

  expandWithEnv:
    - empty input / no vars / ${VAR} / $VAR / prefix+suffix / multi-var

  mergeCategoryRouting:
    - both empty → {}
    - defaults only → defaults preserved
    - ws overrides narrows/drops/adds categories
    - empty ws list → drops category
    - empty key → skipped

  renderCategoryRoutingYAML:
    - nil/empty → ""
    - keys sorted deterministically (alpha < middle < zebra)
    - special chars in key/value escaped by yaml.Marshal

  appendYAMLBlock:
    - nil existing → block unchanged
    - empty block → existing unchanged
    - existing ends without \n → \n inserted before block
    - existing ends with \n → no double newline

  mergePlugins:
    - empty inputs → []
    - basic dedup merge (defaults first)
    - !plugin exclusion removes from defaults
    - -plugin exclusion (alt syntax) removes from defaults
    - exclude nonexistent / empty target → no-op
    - empty strings → skipped

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-12 16:31:31 +00:00
85e7b6622e test(canvas): add buildDeployMap unit tests (19 cases, #2071 follow-up)
All checks were successful
sop-tier-check / tier-check (pull_request) Successful in 17s
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 18s
audit-force-merge / audit (pull_request) Successful in 10s
Adds isolated tests for the pure tree-traversal core of
useOrgDeployState. The buildDeployMap function handles:

  - Root / leaf identification via parent-chain walk
  - isDeployingRoot: true when any descendant is "provisioning"
  - isActivelyProvisioning: true only for the node itself
  - isLockedChild: true for non-root nodes in a deploying tree
  - isLockedChild: also true for nodes in deletingIds (cross-cutting)
  - descendantProvisioningCount: non-zero only on root nodes
  - O(n) single-pass walk verified on 50-node tree

Also exports buildDeployMap for direct unit testing (was internal).

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-12 16:26:16 +00:00
c7e0c9427a Merge pull request 'fix(canvas/mobile): remove ?? [] from agentMessages selector — infinite re-render' (#720) from fix/717-mobile-agentMessages-selector into staging
All checks were successful
Secret scan / Scan diff for credential-shaped strings (push) Successful in 16s
2026-05-12 16:07:34 +00:00
b70b59d1b1 test(handlers/org): add org_layout_test.go — 19 cases for childSlot/sizeOfSubtree/childSlotInGrid
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 2s
sop-tier-check / tier-check (pull_request) Successful in 3s
Adds comprehensive Go test coverage for the pure canvas-grid layout helpers
in org.go. Mirrors the TypeScript tests in canvas-topology-pure.test.ts
(CHILD_DEFAULT_WIDTH=210/HEIGHT=120 vs Go's 240/130, tested independently).

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-12 13:18:42 +00:00
89b51ad3f0 test(mcp): harden RecallMemory_GlobalScope_Blocked — add OFFSEC-001 contract assertions
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 10s
sop-tier-check / tier-check (pull_request) Successful in 9s
Mirrors PR#680's OFFSEC-001 contract hardening from the commit-memory
path to the recall-memory path (issue #681).

Before: only asserted resp.Error != nil — a future regression that
returned the raw err.Error() would still pass the test.

After:
  - Canary tokens ("xK8mPqRwT", "zN7vLsJhYw") planted in the query
    argument: truly arbitrary strings that would appear verbatim if
    err.Error() were returned directly. Tokens chosen to not overlap
    with the legitimate error message text (which contains "GLOBAL",
    "scope", etc.) — which would always appear and make them useless
    as sentinels.
  - Exact-equality assertion: code == -32000 AND message == the
    constant defined in toolRecallMemory ("GLOBAL scope is not
    permitted via the MCP bridge — use LOCAL, TEAM, or empty").
  - Defence-in-depth strings.Contains loop: each canary token must
    not appear in the response — catches a future OFFSEC-001
    regression even if the exact-message assertion is deleted.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-12 12:16:24 +00:00
105c084a11 fix(canvas/mobile): remove ?? [] from Zustand selector to prevent infinite render loop
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 3s
sop-tier-check / tier-check (pull_request) Successful in 4s
audit-force-merge / audit (pull_request) Successful in 18s
React error #185 (Maximum update depth exceeded) on mobile chat tab.

Root cause: useCanvasStore((s) => s.agentMessages[agentId] ?? []) used
a `?? []` fallback in the selector. Zustand uses Object.is for selector
equality. When agentMessages[agentId] is undefined (initial state), the
fallback creates a NEW [] reference on every store update. Zustand sees
this as a state change and re-renders the component. The component reads
from the store again, gets another new [] reference, and the cycle
repeats until React hits the depth cap.

Fix: remove `?? []` from the selector (returns undefined when no messages)
and move the fallback to the useState initializer:
  storedMessages = useCanvasStore(selector)     // returns undefined | T[]
  [messages] = useState(() => (storedMessages ?? []).map(...))

The useState initializer only runs once on mount, so the `?? []`
there is safe — it creates the initial state once, then messages are
managed via setMessages.

Fixes issue #651.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-12 11:13:56 +00:00
108001d0d5 feat(canvas): mobile-first shell with 6-screen iOS design + responsive desktop fixes
Implements the Claude Design handoff (Molecules AI Mobile.html) as a
viewport-gated React tree under canvas/src/components/mobile/. < 640px
renders the new shell instead of the desktop ReactFlow canvas.

Six screens, all bound to live store data:
- Home (agent list + filter chips + spawn FAB)
- Canvas (mini-graph with pinch-to-zoom + pan + reset)
- Detail (status pills, tabs: Overview / Activity / Config / Memory;
  Activity hits /workspaces/:id/activity)
- Chat (textarea composer, IME-safe Enter, sendInFlightRef guard;
  bootstraps from agentMessages so the prior thread shows on entry)
- Comms (live A2A feed via /workspaces/:id/activity + ACTIVITY_LOGGED)
- Spawn (bottom sheet; fetches /templates so users pick what's actually
  installed on their platform)

Plus a Me tab for mobile theme/accent/density.

Design system (palette.ts + primitives.tsx) ports tokens 1:1 from the
handoff: cream + dark palettes, T1-T4 tier chips, status dots with
halo, JetBrains Mono for IDs/timestamps. Inter + JetBrains Mono are
self-hosted via next/font/google so CSP `font-src 'self'` is honoured.

URL routing: routes sync to ?m=<route>&a=<id>; popstate restores route;
deep links seed initial state. /?m=detail without ?a collapses to home.

Accent override flows through React context (MobileAccentProvider) —
not by mutating the static MOL_LIGHT/MOL_DARK singletons.

SSR flash: isMobile is tri-state; loading spinner stays up until
matchMedia resolves so mobile devices never paint the desktop tree.

Desktop responsiveness fixes (separate but ride along):
- Toolbar: full-width with overflow-x-auto on mobile, logo text + count
  hidden < sm, divider/border collapse to sm: only.
- SidePanel: full-screen on mobile via matchMedia, resize handle hidden.
- Canvas: MiniMap hidden < sm (was overlapping the New Workspace FAB).

Tests (51 total, 33 new):
- palette.test.ts (12) - normalizeStatus, tierCode, light/dark parity
- components.test.ts (10) - toMobileAgent field mapping + classifyForFilter
- MobileApp.test.tsx (12) - route stack, deep links, popstate, tab bar
  hidden on chat, spawn overlay
- SidePanel.tabs.test.tsx (18) - regression-clean

Verified: tsc --noEmit clean across mobile/, page.tsx, layout.tsx.
Not yet verified: live phone browser (needs CP backend hydrated).

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-05-12 11:13:56 +00:00
613d32703c test(handlers/workspace_crud): add workspace_crud_helpers_test.go — 7 cases for validateWorkspaceDir
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 14s
sop-tier-check / tier-check (pull_request) Successful in 14s
Covers:
- AcceptsValidAbsolutePath: 8 valid workspace_dir values
- RejectsRelativePath: 5 cases (relative, ./local, ../sibling, bare, empty)
- RejectsTraversalSequence: 5 cases with ".." sequences
- RejectsSystemPaths: 9 blocked root paths
- RejectsDescendantsOfSystemPaths: 10 blocked descendants
- AcceptsPathsSimilarToSystemPaths: paths that LOOK like system paths but
  are distinct (e.g. /etx, /vartmp, /workspace/etc)
- ErrorMessages: non-empty error strings
2026-05-12 10:16:26 +00:00
6200a11048 test(canvas/lib): add hydrate.test.ts — 7 cases for exponential-backoff canvas hydration
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 10s
sop-tier-check / tier-check (pull_request) Successful in 13s
audit-force-merge / audit (pull_request) Successful in 8s
Tests canvas/src/lib/hydrate.ts: hydrateCanvas() with exponential backoff retry.

Cases:
1. Success on first attempt → { error: null }
2. Viewport fetch failure is non-fatal → store still hydrates
3. Success after 1 retry → onRetrying(1) called once, result { error: null }
4. onRetrying called correctly on each failed attempt
5. All attempts fail → error message after MAX_RETRIES
6. onRetrying called MAX_RETRIES-1 times before final exhausted attempt
7. Total elapsed time ≈ sum of exponential delays (1s + 2s = 3s)

Each attempt makes 2 parallel api.get calls (workspaces + viewport); mocks
set up per parallel-call to avoid Promise.all consuming wrong mock slots.

Issue: #701

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-12 09:46:29 +00:00
d96e6f68d3 Merge pull request 'fix(handlers): OFFSEC-001 — scrub req.Method from dispatchRPC default error' (#692) from fix/684-offsec-scrub-method-default into staging
All checks were successful
Secret scan / Scan diff for credential-shaped strings (push) Successful in 21s
2026-05-12 07:48:23 +00:00
b1d6c4476a fix(handlers): OFFSEC-001 — scrub req.Method from dispatchRPC default error
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 12s
sop-tier-check / tier-check (pull_request) Successful in 11s
audit-force-merge / audit (pull_request) Successful in 28s
Line 443 of mcp.go concatenated user-controlled req.Method into the
JSON-RPC -32601 error message, allowing an agent or canvas client to
inject arbitrary strings into the response via the method field.

Fix: replace "method not found: " + req.Method with the constant
"method not found" — matching the OFFSEC-001 scrub contract applied
to the InvalidParams (line 428) and UnknownTool (line 433) paths.

Test: extend TestMCPHandler_UnknownMethod_Returns32601 with two new
assertions:
  1. resp.Error.Message == "method not found"
  2. defence-in-depth check that the sent method name never appears
     in the response (strings.Contains guard)

Issue: #684

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-12 06:30:25 +00:00
965710eb00 Merge PR #619: fix(platform): fail-fast checkShellDeps in localbuild + fix async test pollution
All checks were successful
Secret scan / Scan diff for credential-shaped strings (push) Successful in 4s
2026-05-12 02:47:16 +00:00
7a511969bc Merge PR #617: resolve conflict in importer_test.go — keep all tests from both branches
All checks were successful
Secret scan / Scan diff for credential-shaped strings (push) Successful in 2s
2026-05-12 02:44:16 +00:00
f6bc90bc43 Merge pull request 'test(canvas): add WorkspaceNode component coverage (51 cases, closes #639)' (#642) from fix/issue-639-workspacenode-test-coverage into staging
All checks were successful
Secret scan / Scan diff for credential-shaped strings (push) Successful in 6s
2026-05-12 02:33:07 +00:00
1301f50509 Merge pull request 'test(workspace): OFFSEC-003 sanitization backstop for A2A exit points' (#539) from test/offsec-003-sanitization-backstop into staging
All checks were successful
Secret scan / Scan diff for credential-shaped strings (push) Successful in 11s
2026-05-12 02:29:35 +00:00
af95561f5b Merge pull request 'fix: resolve pre-existing handler test failures' (#634) from fix/handlers-test-fixtures into staging
All checks were successful
Secret scan / Scan diff for credential-shaped strings (push) Successful in 13s
2026-05-12 02:29:17 +00:00
3d863acdf2 Merge pull request 'fix(canvas/searchdialog): fix 2 pre-existing test failures' (#640) from fix/canvas-searchdialog-test-fixtures into staging
All checks were successful
Secret scan / Scan diff for credential-shaped strings (push) Successful in 12s
2026-05-12 02:28:57 +00:00
5c23498458 test(canvas): add WorkspaceNode component coverage (51 cases, closes #639)
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 15s
sop-tier-check / tier-check (pull_request) Successful in 16s
audit-force-merge / audit (pull_request) Successful in 7s
51 test cases across 8 describe blocks:
- render: name, role, tier badges, runtime label, skills, active task, offline banner
- status states: online, offline, provisioning, paused, degraded, failed, not_configured
- interactions: click select, shift-click multi, double-click chat, context menu, drag-over, keyboard, needsRestart
- layout: sub badge, needsRestart banner
- selection: single, multi, hover class
- accessibility: role, tabIndex, aria-pressed, aria-label, handle labels

Fixes Zustand useSyncExternalStore mock by using inline mock pattern
(vi.fn with captured closure _storeSnap) instead of module-level const.
Adds getState() to mock for restartWorkspace which bypasses selector.
Fixes Position.Top/Bottom mock values, multi role=button ambiguity
via cardButton() helper, and online status empty-label assertion.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-12 02:27:19 +00:00
a95859dcd6 fix(canvas/searchdialog): fix 2 pre-existing test failures
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 18s
sop-tier-check / tier-check (pull_request) Successful in 18s
audit-force-merge / audit (pull_request) Successful in 14s
Two bugs in the test suite for SearchDialog.tsx:

1. Zustand-compatible mock: the old vi.fn-only mock updated
   mockStoreState.searchOpen directly without notifying Zustand's
   useSyncExternalStore subscriber, so the Cmd+K test opened the
   dialog but the component never re-rendered (body stayed <div />).
   Fix: add subscribe() + getState() to the mock so React flushes
   the re-render when setSearchOpen fires. Also add act() wrapper
   around the keydown event for additional safety.

2. Stale React state: fireEvent.change did not reliably flush the
   onChange → query state update before ArrowDown fired, causing the
   component to read stale filtered/nodes state. Fix: manually set
   input.value, fire onChange inside act(), then call rerender() to
   force the component to see the new query before keyboard events.

Affected tests:
- "clears the query when Cmd+K opens the dialog" (was: body=<div />)
- "Enter selects the highlighted workspace" (was: selected n2 not n1)

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-12 02:08:25 +00:00
3f73ab87ff chore: re-trigger sop-tier-check after staging fix (PR #636)
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 4s
sop-tier-check / tier-check (pull_request) Successful in 5s
audit-force-merge / audit (pull_request) Has been skipped
2026-05-12 02:04:37 +00:00
95a074aabe Merge pull request 'test(canvas/chat): add AttachmentViews coverage (16 cases)' (#587) from fix/582-attachmentviews-tests into staging
All checks were successful
Secret scan / Scan diff for credential-shaped strings (push) Successful in 6s
2026-05-12 02:01:40 +00:00
c16b085716 Merge pull request 'test(workspace): push-mode queue envelope coverage for a2a_response.py (closes #308)' (#621) from fix/308-a2a-response-push-mode-tests into staging
All checks were successful
Secret scan / Scan diff for credential-shaped strings (push) Successful in 4s
2026-05-12 02:01:08 +00:00
b5062b38e6 Merge pull request 'fix(platform): fail-fast with legible error when docker/git missing in local-build mode (closes #529)' (#562) from fix/529-preflight-localbuild into staging
Some checks failed
Secret scan / Scan diff for credential-shaped strings (push) Has been cancelled
2026-05-12 02:01:07 +00:00
1c8c997705 chore: re-trigger sop-tier-check after staging fix (PR #636)
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 3s
sop-tier-check / tier-check (pull_request) Successful in 5s
audit-force-merge / audit (pull_request) Has been skipped
2026-05-12 02:00:03 +00:00
c3a1c156b2 chore: re-trigger sop-tier-check after staging fix (PR #636)
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 4s
sop-tier-check / tier-check (pull_request) Successful in 5s
audit-force-merge / audit (pull_request) Successful in 7s
2026-05-12 01:59:54 +00:00
bf8a869b60 chore: re-trigger sop-tier-check after staging fix (PR #636)
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 3s
sop-tier-check / tier-check (pull_request) Successful in 4s
audit-force-merge / audit (pull_request) Successful in 5s
2026-05-12 01:59:45 +00:00
9746e65421 chore: re-trigger sop-tier-check after staging fix (PR #636)
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 4s
sop-tier-check / tier-check (pull_request) Successful in 4s
audit-force-merge / audit (pull_request) Successful in 5s
2026-05-12 01:59:36 +00:00
72b862e10e chore: re-trigger sop-tier-check after token-graceful fix [skip ci]
This empty commit triggers a sop-tier-check re-run so the workflow
picks up the fixed sop-tier-check.sh from staging (PR #636).
2026-05-12 01:57:40 +00:00
7b64ff73be chore: re-trigger sop-tier-check after token-graceful fix [skip ci]
This empty commit triggers a sop-tier-check re-run so the workflow
picks up the fixed sop-tier-check.sh from staging (PR #636).
2026-05-12 01:57:32 +00:00
116c5570e8 chore: re-trigger sop-tier-check after token-graceful fix [skip ci]
This empty commit triggers a sop-tier-check re-run so the workflow
picks up the fixed sop-tier-check.sh from staging (PR #636).
2026-05-12 01:57:23 +00:00
1dc132b6e7 chore: re-trigger sop-tier-check after token-graceful fix [skip ci]
This empty commit triggers a sop-tier-check re-run so the workflow
picks up the fixed sop-tier-check.sh from staging (PR #636).
2026-05-12 01:57:15 +00:00
c7bb65cd2a Merge pull request 'fix(ci): sop-tier-check gracefully handles empty/invalid token (staging)' (#636) from fix/sop-tier-check-token-graceful-staging into staging
All checks were successful
Secret scan / Scan diff for credential-shaped strings (push) Successful in 2s
2026-05-12 01:54:07 +00:00
1156aa3eea fix(ci): sop-tier-check gracefully handles empty/invalid token
All checks were successful
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 3s
sop-tier-check / tier-check (pull_request) Successful in 3s
audit-force-merge / audit (pull_request) Successful in 2s
SOP_FAIL_OPEN=1 was not preventing CI failures because three API calls
with `set -euo pipefail` would abort the script before reaching the
SOP_FAIL_OPEN eval block. Same fix as main branch PR #635.

Refs: sop-tier-check failure on staging PRs #617, #621, #587, #562
2026-05-12 01:53:33 +00:00