diff --git a/AGENTS.md b/AGENTS.md index 2fafde4..afd9e89 100644 --- a/AGENTS.md +++ b/AGENTS.md @@ -31,11 +31,11 @@ disinto/ (code repo) ├── supervisor/ supervisor-run.sh — formula-driven health monitoring (polling-loop executor) │ preflight.sh — pre-flight data collection for supervisor formula ├── architect/ architect-run.sh — strategic decomposition of vision into sprints -├── vault/ vault-env.sh — shared env setup (vault redesign in progress, see #73-#77) +├── action-vault/ vault-env.sh — shared env setup (vault redesign in progress, see #73-#77) │ SCHEMA.md — vault item schema documentation │ validate.sh — vault item validator │ examples/ — example vault action TOMLs (promote, publish, release, webhook-call) -├── lib/ env.sh, agent-sdk.sh, ci-helpers.sh, ci-debug.sh, load-project.sh, parse-deps.sh, guard.sh, mirrors.sh, pr-lifecycle.sh, issue-lifecycle.sh, worktree.sh, formula-session.sh, stack-lock.sh, forge-setup.sh, forge-push.sh, ops-setup.sh, ci-setup.sh, generators.sh, hire-agent.sh, release.sh, build-graph.py, branch-protection.sh, secret-scan.sh, tea-helpers.sh, vault.sh, ci-log-reader.py, git-creds.sh, sprint-filer.sh +├── lib/ env.sh, agent-sdk.sh, ci-helpers.sh, ci-debug.sh, load-project.sh, parse-deps.sh, guard.sh, mirrors.sh, pr-lifecycle.sh, issue-lifecycle.sh, worktree.sh, formula-session.sh, stack-lock.sh, forge-setup.sh, forge-push.sh, ops-setup.sh, ci-setup.sh, generators.sh, hire-agent.sh, release.sh, build-graph.py, branch-protection.sh, secret-scan.sh, tea-helpers.sh, action-vault.sh, ci-log-reader.py, git-creds.sh, sprint-filer.sh │ hooks/ — Claude Code session hooks (on-compact-reinject, on-idle-stop, on-phase-change, on-pretooluse-guard, on-session-end, on-stop-failure) ├── projects/ *.toml.example — templates; *.toml — local per-box config (gitignored) ├── formulas/ Issue templates (TOML specs for multi-step agent tasks) diff --git a/vault/SCHEMA.md b/action-vault/SCHEMA.md similarity index 100% rename from vault/SCHEMA.md rename to action-vault/SCHEMA.md diff --git a/vault/classify.sh b/action-vault/classify.sh similarity index 100% rename from vault/classify.sh rename to action-vault/classify.sh diff --git a/vault/examples/promote.toml b/action-vault/examples/promote.toml similarity index 100% rename from vault/examples/promote.toml rename to action-vault/examples/promote.toml diff --git a/vault/examples/publish.toml b/action-vault/examples/publish.toml similarity index 100% rename from vault/examples/publish.toml rename to action-vault/examples/publish.toml diff --git a/vault/examples/release.toml b/action-vault/examples/release.toml similarity index 100% rename from vault/examples/release.toml rename to action-vault/examples/release.toml diff --git a/vault/examples/webhook-call.toml b/action-vault/examples/webhook-call.toml similarity index 100% rename from vault/examples/webhook-call.toml rename to action-vault/examples/webhook-call.toml diff --git a/vault/policy.toml b/action-vault/policy.toml similarity index 100% rename from vault/policy.toml rename to action-vault/policy.toml diff --git a/vault/validate.sh b/action-vault/validate.sh similarity index 100% rename from vault/validate.sh rename to action-vault/validate.sh diff --git a/vault/vault-env.sh b/action-vault/vault-env.sh similarity index 100% rename from vault/vault-env.sh rename to action-vault/vault-env.sh diff --git a/docker/edge/dispatcher.sh b/docker/edge/dispatcher.sh index 67a1ba9..ef6077f 100755 --- a/docker/edge/dispatcher.sh +++ b/docker/edge/dispatcher.sh @@ -46,7 +46,7 @@ OPS_REPO_ROOT="${OPS_REPO_ROOT:-/home/debian/disinto-ops}" VAULT_ACTIONS_DIR="${OPS_REPO_ROOT}/vault/actions" # Vault action validation -VAULT_ENV="${SCRIPT_ROOT}/../vault/vault-env.sh" +VAULT_ENV="${SCRIPT_ROOT}/../action-vault/vault-env.sh" # Admin users who can merge vault PRs (from issue #77) # Comma-separated list of Forgejo usernames with admin role diff --git a/docs/VAULT.md b/docs/VAULT.md index 838c364..d927170 100644 --- a/docs/VAULT.md +++ b/docs/VAULT.md @@ -26,8 +26,8 @@ The `main` branch on the ops repo (`johba/disinto-ops`) is protected via Forgejo ## Vault PR Lifecycle -1. **Request** — Agent calls `lib/vault.sh:vault_request()` with action TOML content -2. **Validation** — TOML is validated against the schema in `vault/vault-env.sh` +1. **Request** — Agent calls `lib/action-vault.sh:vault_request()` with action TOML content +2. **Validation** — TOML is validated against the schema in `action-vault/vault-env.sh` 3. **PR Creation** — A PR is created on `disinto-ops` with: - Branch: `vault/` - Title: `vault: ` @@ -90,12 +90,12 @@ To verify the protection is working: - #73 — Vault redesign proposal - #74 — Vault action TOML schema -- #75 — Vault PR creation helper (`lib/vault.sh`) +- #75 — Vault PR creation helper (`lib/action-vault.sh`) - #76 — Dispatcher rewrite (poll for merged vault PRs) - #77 — Branch protection on ops repo (this issue) ## See Also -- [`lib/vault.sh`](../lib/vault.sh) — Vault PR creation helper -- [`vault/vault-env.sh`](../vault/vault-env.sh) — TOML validation +- [`lib/action-vault.sh`](../lib/action-vault.sh) — Vault PR creation helper +- [`action-vault/vault-env.sh`](../action-vault/vault-env.sh) — TOML validation - [`lib/branch-protection.sh`](../lib/branch-protection.sh) — Branch protection helper diff --git a/formulas/run-gardener.toml b/formulas/run-gardener.toml index 7b0cdde..427aeb3 100644 --- a/formulas/run-gardener.toml +++ b/formulas/run-gardener.toml @@ -177,7 +177,7 @@ DUST (trivial — single-line edit, rename, comment, style, whitespace): VAULT (needs human decision or external resource): File a vault procurement item using vault_request(): - source "$(dirname "$0")/../lib/vault.sh" + source "$(dirname "$0")/../lib/action-vault.sh" TOML_CONTENT="# Vault action: context = \"\" unblocks = [\"#NNN\"] diff --git a/formulas/run-predictor.toml b/formulas/run-predictor.toml index ddaa8a4..14364aa 100644 --- a/formulas/run-predictor.toml +++ b/formulas/run-predictor.toml @@ -125,8 +125,8 @@ For each weakness you identify, choose one: The prediction explains the theory. The vault PR triggers the proof after human approval. When the planner runs next, evidence is already there. - Vault dispatch (requires lib/vault.sh): - source "$PROJECT_REPO_ROOT/lib/vault.sh" + Vault dispatch (requires lib/action-vault.sh): + source "$PROJECT_REPO_ROOT/lib/action-vault.sh" TOML_CONTENT="id = \"predict--\" context = \"Test prediction #: — focus: \" @@ -154,7 +154,7 @@ tea is pre-configured with login "$TEA_LOGIN" and repo "$FORGE_REPO". --title "" --body "<body>" --labels "prediction/unreviewed" 2. Dispatch formula via vault (if exploiting): - source "$PROJECT_REPO_ROOT/lib/vault.sh" + source "$PROJECT_REPO_ROOT/lib/action-vault.sh" PR_NUM=$(vault_request "predict-NNN-<formula>" "$TOML_CONTENT") # See EXPLOIT section above for TOML_CONTENT format diff --git a/lib/AGENTS.md b/lib/AGENTS.md index ce6d52a..11d9d0a 100644 --- a/lib/AGENTS.md +++ b/lib/AGENTS.md @@ -22,7 +22,7 @@ sourced as needed. | `lib/worktree.sh` | Reusable git worktree management: `worktree_create(path, branch, [base_ref])` — create worktree, checkout base, fetch submodules. `worktree_recover(path, branch, [remote])` — detect existing worktree, reuse if on correct branch (sets `_WORKTREE_REUSED`), otherwise clean and recreate. `worktree_cleanup(path)` — `git worktree remove --force`, clear Claude Code project cache (`~/.claude/projects/` matching path). `worktree_cleanup_stale([max_age_hours])` — scan `/tmp` for orphaned worktrees older than threshold, skip preserved and active tmux worktrees, prune. `worktree_preserve(path, reason)` — mark worktree as preserved for debugging (writes `.worktree-preserved` marker, skipped by stale cleanup). | dev-agent.sh, supervisor-run.sh, planner-run.sh, predictor-run.sh, gardener-run.sh | | `lib/pr-lifecycle.sh` | Reusable PR lifecycle library: `pr_create()`, `pr_find_by_branch()`, `pr_poll_ci()`, `pr_poll_review()`, `pr_merge()`, `pr_is_merged()`, `pr_walk_to_merge()`, `build_phase_protocol_prompt()`. Requires `lib/ci-helpers.sh`. | dev-agent.sh (future) | | `lib/issue-lifecycle.sh` | Reusable issue lifecycle library: `issue_claim()` (add in-progress, remove backlog), `issue_release()` (remove in-progress, add backlog), `issue_block()` (post diagnostic comment with secret redaction, add blocked label), `issue_close()`, `issue_check_deps()` (parse deps, check transitive closure; sets `_ISSUE_BLOCKED_BY`, `_ISSUE_SUGGESTION`), `issue_suggest_next()` (find next unblocked backlog issue; sets `_ISSUE_NEXT`), `issue_post_refusal()` (structured refusal comment with dedup). Label IDs cached in globals on first lookup. Sources `lib/secret-scan.sh`. | dev-agent.sh (future) | -| `lib/vault.sh` | **Vault PR helper** — create vault action PRs on ops repo via Forgejo API (works from containers without SSH). `vault_request <action_id> <toml_content>` validates TOML (using `validate_vault_action` from `vault/vault-env.sh`), creates branch `vault/<action-id>`, writes `vault/actions/<action-id>.toml`, creates PR targeting `main` with title `vault: <action-id>` and body from context field, returns PR number. Idempotent: if PR exists, returns existing number. **Low-tier bypass**: if the action's `blast_radius` classifies as `low` (via `vault/classify.sh`), `vault_request` calls `_vault_commit_direct()` which commits directly to ops `main` using `FORGE_ADMIN_TOKEN` — no PR, no approval wait. Returns `0` (not a PR number) for direct commits. Requires `FORGE_TOKEN`, `FORGE_ADMIN_TOKEN` (low-tier only), `FORGE_URL`, `FORGE_REPO`, `FORGE_OPS_REPO`. Uses the calling agent's own token (saves/restores `FORGE_TOKEN` around sourcing `vault-env.sh`), so approval workflow respects individual agent identities. | dev-agent (vault actions), future vault dispatcher | +| `lib/action-vault.sh` | **Vault PR helper** — create vault action PRs on ops repo via Forgejo API (works from containers without SSH). `vault_request <action_id> <toml_content>` validates TOML (using `validate_vault_action` from `action-vault/vault-env.sh`), creates branch `vault/<action-id>`, writes `vault/actions/<action-id>.toml`, creates PR targeting `main` with title `vault: <action-id>` and body from context field, returns PR number. Idempotent: if PR exists, returns existing number. **Low-tier bypass**: if the action's `blast_radius` classifies as `low` (via `action-vault/classify.sh`), `vault_request` calls `_vault_commit_direct()` which commits directly to ops `main` using `FORGE_ADMIN_TOKEN` — no PR, no approval wait. Returns `0` (not a PR number) for direct commits. Requires `FORGE_TOKEN`, `FORGE_ADMIN_TOKEN` (low-tier only), `FORGE_URL`, `FORGE_REPO`, `FORGE_OPS_REPO`. Uses the calling agent's own token (saves/restores `FORGE_TOKEN` around sourcing `vault-env.sh`), so approval workflow respects individual agent identities. | dev-agent (vault actions), future vault dispatcher | | `lib/branch-protection.sh` | Branch protection helpers for Forgejo repos. `setup_vault_branch_protection()` — configures admin-only merge protection on main (require 1 approval, restrict merge to admin role, block direct pushes). `setup_profile_branch_protection()` — same protection for `.profile` repos. `verify_branch_protection()` — checks protection is correctly configured. `remove_branch_protection()` — removes protection (cleanup/testing). Handles race condition after initial push: retries with backoff if Forgejo hasn't processed the branch yet. Requires `FORGE_TOKEN`, `FORGE_URL`, `FORGE_OPS_REPO`. | bin/disinto (hire-an-agent) | | `lib/agent-sdk.sh` | `agent_run([--resume SESSION_ID] [--worktree DIR] PROMPT)` — one-shot `claude -p` invocation with session persistence. Saves session ID to `SID_FILE`, reads it back on resume. `agent_recover_session()` — restore previous session ID from `SID_FILE` on startup. **Nudge guard**: skips nudge injection if the worktree is clean and no push is expected, preventing spurious re-invocations. Callers must define `SID_FILE`, `LOGFILE`, and `log()` before sourcing. **Concurrency**: external `flock` on `session.lock` is gated behind `CLAUDE_EXTERNAL_LOCK=1` (default off). When unset, each container's per-session `CLAUDE_CONFIG_DIR` isolation lets Claude Code's native lockfile handle OAuth refresh — no external serialization needed. Set `CLAUDE_EXTERNAL_LOCK=1` to re-enable the old flock wrapper as a rollback mechanism. See [`docs/CLAUDE-AUTH-CONCURRENCY.md`](../docs/CLAUDE-AUTH-CONCURRENCY.md) and AD-002 (#647). | formula-driven agents (dev-agent, planner-run, predictor-run, gardener-run) | | `lib/forge-setup.sh` | `setup_forge()` — Forgejo instance provisioning: creates admin user, bot accounts, org, repos (code + ops), configures webhooks, sets repo topics. Extracted from `bin/disinto`. Requires `FORGE_URL`, `FORGE_TOKEN`, `FACTORY_ROOT`. **Password storage (#361)**: after creating each bot account, stores its password in `.env` as `FORGE_<BOT>_PASS` (e.g. `FORGE_PASS`, `FORGE_REVIEW_PASS`, etc.) for use by `forge-push.sh`. | bin/disinto (init) | diff --git a/lib/vault.sh b/lib/action-vault.sh similarity index 97% rename from lib/vault.sh rename to lib/action-vault.sh index 484fd57..6348cc6 100644 --- a/lib/vault.sh +++ b/lib/action-vault.sh @@ -1,9 +1,9 @@ #!/usr/bin/env bash -# vault.sh — Helper for agents to create vault PRs on ops repo +# action-vault.sh — Helper for agents to create vault PRs on ops repo # # Source after lib/env.sh: # source "$(dirname "$0")/../lib/env.sh" -# source "$(dirname "$0")/lib/vault.sh" +# source "$(dirname "$0")/lib/action-vault.sh" # # Required globals: FORGE_TOKEN, FORGE_URL, FORGE_REPO, FORGE_OPS_REPO # Optional: OPS_REPO_ROOT (local path for ops repo) @@ -12,7 +12,7 @@ # vault_request <action_id> <toml_content> — Create vault PR, return PR number # # The function: -# 1. Validates TOML content using validate_vault_action() from vault/vault-env.sh +# 1. Validates TOML content using validate_vault_action() from action-vault/vault-env.sh # 2. Creates a branch on the ops repo: vault/<action-id> # 3. Writes TOML to vault/actions/<action-id>.toml on that branch # 4. Creates PR targeting main with title "vault: <action-id>" @@ -133,7 +133,7 @@ vault_request() { printf '%s' "$toml_content" > "$tmp_toml" # Source vault-env.sh for validate_vault_action - local vault_env="${FACTORY_ROOT:-$(cd "$(dirname "${BASH_SOURCE[0]}")/.." && pwd)}/vault/vault-env.sh" + local vault_env="${FACTORY_ROOT:-$(cd "$(dirname "${BASH_SOURCE[0]}")/.." && pwd)}/action-vault/vault-env.sh" if [ ! -f "$vault_env" ]; then echo "ERROR: vault-env.sh not found at $vault_env" >&2 return 1 @@ -161,7 +161,7 @@ vault_request() { ops_api="$(_vault_ops_api)" # Classify the action to determine if PR bypass is allowed - local classify_script="${FACTORY_ROOT:-$(cd "$(dirname "${BASH_SOURCE[0]}")/.." && pwd)}/vault/classify.sh" + local classify_script="${FACTORY_ROOT:-$(cd "$(dirname "${BASH_SOURCE[0]}")/.." && pwd)}/action-vault/classify.sh" local vault_tier vault_tier=$("$classify_script" "${VAULT_ACTION_FORMULA:-}" "${VAULT_BLAST_RADIUS_OVERRIDE:-}") || { # Classification failed, default to high tier (require PR) diff --git a/lib/forge-setup.sh b/lib/forge-setup.sh index b925103..68b5592 100644 --- a/lib/forge-setup.sh +++ b/lib/forge-setup.sh @@ -719,7 +719,7 @@ setup_forge() { fi # Add all bot users as collaborators with appropriate permissions - # dev-bot: write (PR creation via lib/vault.sh) + # dev-bot: write (PR creation via lib/action-vault.sh) # review-bot: read (PR review) # planner-bot: write (prerequisites.md, memory) # gardener-bot: write (backlog grooming) diff --git a/lib/release.sh b/lib/release.sh index 9ddf2bd..b9a3978 100644 --- a/lib/release.sh +++ b/lib/release.sh @@ -18,8 +18,8 @@ # ============================================================================= set -euo pipefail -# Source vault.sh for _vault_log helper -source "${FACTORY_ROOT}/lib/vault.sh" +# Source action-vault.sh for _vault_log helper +source "${FACTORY_ROOT}/lib/action-vault.sh" # Assert required globals are set before using this module. _assert_release_globals() {