|
Some checks failed
CI / Platform (Go) (pull_request) Failing after 8m9s
CI / Shellcheck (E2E scripts) (pull_request) Successful in 6s
E2E API Smoke Test / E2E API Smoke Test (pull_request) Failing after 2m34s
Handlers Postgres Integration / Handlers Postgres Integration (pull_request) Successful in 2m42s
CI / Canvas (Next.js) (pull_request) Successful in 7s
CI / Python Lint & Test (pull_request) Successful in 6s
Block internal-flavored paths / Block forbidden paths (pull_request) Successful in 10s
Harness Replays / Harness Replays (pull_request) Successful in 5s
Runtime PR-Built Compatibility / PR-built wheel + import smoke (pull_request) Successful in 6s
E2E Staging Canvas (Playwright) / Canvas tabs E2E (pull_request) Successful in 7s
lint-continue-on-error-tracking / lint-continue-on-error-tracking (pull_request) Failing after 1m10s
CI / all-required (pull_request) Failing after 4s
CI / Canvas Deploy Reminder (pull_request) Has been skipped
CI / Detect changes (pull_request) Successful in 26s
lint-required-no-paths / lint-required-no-paths (pull_request) Successful in 1m11s
Harness Replays / detect-changes (pull_request) Successful in 15s
Lint curl status-code capture / Scan workflows for curl status-capture pollution (pull_request) Successful in 13s
Lint pre-flip continue-on-error / Verify continue-on-error flips have run-log proof (pull_request) Successful in 1m25s
E2E API Smoke Test / detect-changes (pull_request) Successful in 26s
E2E Staging Canvas (Playwright) / detect-changes (pull_request) Successful in 23s
Handlers Postgres Integration / detect-changes (pull_request) Successful in 24s
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 13s
qa-review / approved (pull_request) Failing after 13s
sop-checklist / all-items-acked (pull_request) acked: 0/7 — missing: comprehensive-testing, local-postgres-e2e, staging-smoke, +4 — body-unfilled: 7
security-review / approved (pull_request) Failing after 12s
Lint workflow YAML (Gitea-1.22.6-hostile shapes) / Lint workflow YAML for Gitea-1.22.6-hostile shapes (pull_request) Successful in 1m30s
sop-checklist-gate / gate (pull_request) Successful in 13s
sop-tier-check / tier-check (pull_request) Successful in 13s
Runtime PR-Built Compatibility / detect-changes (pull_request) Successful in 22s
gate-check-v3 / gate-check (pull_request) Successful in 19s
mc#687 root-cause from mc#424: when the diagnose probe's send-ssh-public-key step fails (IAM permission gap), the Go error string says only "exec: exit status 1" — the actionable AWS permission error is in the subprocess stderr captured by CombinedOutput() but was not being surfaced as `detail`. Fix: add unwrapGoError() helper that extracts subprocess stderr from the Go-wrapped error string (the fmt.Errorf wraps CombinedOutput in parens). The send-ssh-public-key step now populates both Error (Go error string) and Detail (subprocess stderr), so the E2E smoke (which now reads detail) sees e.g. "AccessDeniedException: ... is not authorized to perform: ec2-instance-connect:OpenTunnel" verbatim. Complements PR #748 which fixes the E2E test to read detail field. Regression gate for mc#687. Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com> |
||
|---|---|---|
| .. | ||
| cmd | ||
| internal | ||
| migrations | ||
| pkg/provisionhook | ||
| .air.toml | ||
| .ci-force | ||
| .gitignore | ||
| .golangci.yaml | ||
| Dockerfile | ||
| Dockerfile.dev | ||
| Dockerfile.tenant | ||
| entrypoint-tenant.sh | ||
| go.mod | ||
| go.sum | ||