@laitszkin/apollo-toolkit 3.0.0 → 3.0.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +12 -0
- package/analyse-app-logs/scripts/__pycache__/filter_logs_by_time.cpython-312.pyc +0 -0
- package/analyse-app-logs/scripts/__pycache__/log_cli_utils.cpython-312.pyc +0 -0
- package/analyse-app-logs/scripts/__pycache__/search_logs.cpython-312.pyc +0 -0
- package/docs-to-voice/scripts/__pycache__/docs_to_voice.cpython-312.pyc +0 -0
- package/generate-spec/scripts/__pycache__/create-specscpython-312.pyc +0 -0
- package/jupiter-development/SKILL.md +5 -0
- package/katex/scripts/__pycache__/render_katex.cpython-312.pyc +0 -0
- package/open-github-issue/scripts/__pycache__/open_github_issue.cpython-312.pyc +0 -0
- package/package.json +1 -1
- package/read-github-issue/scripts/__pycache__/find_issues.cpython-312.pyc +0 -0
- package/read-github-issue/scripts/__pycache__/read_issue.cpython-312.pyc +0 -0
- package/resolve-review-comments/scripts/__pycache__/review_threads.cpython-312.pyc +0 -0
- package/scheduled-runtime-health-check/SKILL.md +8 -2
- package/systematic-debug/SKILL.md +5 -1
- package/text-to-short-video/scripts/__pycache__/enforce_video_aspect_ratio.cpython-312.pyc +0 -0
package/CHANGELOG.md
CHANGED
|
@@ -7,6 +7,18 @@ All notable changes to this repository are documented in this file.
|
|
|
7
7
|
### Changed
|
|
8
8
|
- None yet.
|
|
9
9
|
|
|
10
|
+
## [v3.0.2] - 2026-04-20
|
|
11
|
+
|
|
12
|
+
### Changed
|
|
13
|
+
- Strengthen `scheduled-runtime-health-check` so bounded-run investigations must detect artifact-path drift, reconcile reports back to one canonical run root before comparison, and report bounded execute time separately from setup and shutdown overhead.
|
|
14
|
+
- Strengthen `systematic-debug` so runtime reruns that inherit stale report paths are classified as artifact-routing problems before any performance conclusion, and speed analysis now separates execute time from provisioning/readiness/cleanup overhead.
|
|
15
|
+
|
|
16
|
+
## [v3.0.1] - 2026-04-19
|
|
17
|
+
|
|
18
|
+
### Changed
|
|
19
|
+
- Strengthen `jupiter-development` so Jupiter program registries are treated as discovery and observability inputs rather than automatic signing allowlists, preserving fail-closed local transaction grammar for wallet flows.
|
|
20
|
+
- Strengthen `scheduled-runtime-health-check` and `systematic-debug` so bounded runtime follow-ups compare only complete like-for-like run artifacts, derive missing-business-event causes from structured funnels, and report per-stage latency instead of vague wall-clock duration.
|
|
21
|
+
|
|
10
22
|
## [v3.0.0] - 2026-04-18
|
|
11
23
|
|
|
12
24
|
### Changed
|
|
Binary file
|
|
Binary file
|
|
Binary file
|
|
Binary file
|
|
Binary file
|
|
@@ -66,6 +66,10 @@ Implement Jupiter-backed Solana features safely by following the current officia
|
|
|
66
66
|
- Treat Jupiter token and price data as curated but evolving.
|
|
67
67
|
- Tokens V2 responses can change as Jupiter improves the schema.
|
|
68
68
|
- Price V3 intentionally withholds unreliable prices.
|
|
69
|
+
- Treat Jupiter routing program metadata as discovery data, not signer policy.
|
|
70
|
+
- Official program-label mappings such as `program-id-to-label` may help build observability, drift detection, and review queues for newly observed router programs.
|
|
71
|
+
- Do not automatically convert a Jupiter-maintained program list into a signing allowlist for wallet, hot-wallet, or `/swap-to-sol` style flows.
|
|
72
|
+
- Keep local transaction grammar fail-closed around allowed program classes, signer/writable scope, fee/output policy, instruction discriminators, and receiver semantics; only promote newly discovered programs after the local safety contract is understood and tested.
|
|
69
73
|
- For Jupiter Lend advanced recipes, expect versioned transactions, address lookup tables, and sometimes extra compute budget.
|
|
70
74
|
- Never commit private keys. Use environment variables, wallet adapters, secure signers, or managed key systems.
|
|
71
75
|
|
|
@@ -74,6 +78,7 @@ Implement Jupiter-backed Solana features safely by following the current officia
|
|
|
74
78
|
- Confirm the base URL, auth header, and required parameters match the official docs you used.
|
|
75
79
|
- Verify that any routing, payer, referral, or fee assumptions still hold after optional parameters are added.
|
|
76
80
|
- When building transactions manually, verify quote endpoint compatibility, instruction order, compute budget, address lookup tables, and signing flow.
|
|
81
|
+
- When using Jupiter-maintained program registries, verify that registry drift handling is observability-first: record unknown program labels and route context, alert or fail closed on unsafe transaction shapes, and keep signing decisions owned by the local policy layer rather than by the remote registry response.
|
|
77
82
|
- When the task involves on-chain actions, report any remaining environment needs clearly, such as API keys, RPC endpoints, or wallet secrets that were intentionally not embedded.
|
|
78
83
|
|
|
79
84
|
## Reference Files
|
|
Binary file
|
|
Binary file
|
package/package.json
CHANGED
|
Binary file
|
|
Binary file
|
|
Binary file
|
|
@@ -14,7 +14,7 @@ description: Use a background terminal to run a user-specified command immediate
|
|
|
14
14
|
|
|
15
15
|
## Standards
|
|
16
16
|
|
|
17
|
-
- Evidence: Anchor every conclusion to the requested command, execution window, startup/shutdown timestamps, one canonical run folder or artifact root, captured logs, and concrete runtime signals.
|
|
17
|
+
- Evidence: Anchor every conclusion to the requested command, execution window, startup/shutdown timestamps, one canonical run folder or artifact root, captured logs, and concrete runtime signals; when structured artifacts land outside that canonical root because of inherited environment or wrapper drift, prove the mismatch and treat the artifact-path correction as part of the evidence trail.
|
|
18
18
|
- Execution: Collect the run contract, verify the real stop mechanism before launch, choose the highest-fidelity execution mode that matches the user's intent, use a background terminal, optionally update the code only when the user asks, execute the requested command immediately or in the requested window, record the canonical run folder once the process materializes it, capture logs, stop cleanly when bounded, then delegate log review to `analyse-app-logs` only when findings are requested or needed.
|
|
19
19
|
- Quality: Keep scheduling, execution, and shutdown deterministic; separate confirmed findings from hypotheses; and mark each assessed module healthy/degraded/failed/unknown with reasons.
|
|
20
20
|
- Output: Return the run configuration, execution status, log locations, optional code-update result, optional module health by area, confirmed issues, potential issues, observability gaps, and scheduler status when applicable.
|
|
@@ -52,6 +52,8 @@ This skill is an orchestration layer. It owns the background terminal session, o
|
|
|
52
52
|
- Do not call a module healthy unless there is at least one positive signal for it.
|
|
53
53
|
- Separate scheduler failures, boot failures, runtime failures, and shutdown failures.
|
|
54
54
|
- For complex pipelines, identify the last successful stage before attributing the failure to application logic.
|
|
55
|
+
- When the user asks to compare a bounded run with a previous run, compare only runs with the same command or preset, duration, runtime mode, and complete structured artifacts. If the previous run lacks canonical reports, databases, or startup artifacts, mark the runs incomparable and explain the artifact completeness gap instead of inventing performance deltas.
|
|
56
|
+
- When wrappers, copied environments, or report-path variables cause the current run's report or database to land under an older run directory, stop and reconcile the artifact root before analysis: record the intended run root, locate the actual emitted files, move or copy them back only when needed to restore one canonical evidence set, and report the path drift as an observability problem instead of silently mixing runs.
|
|
55
57
|
- If logs cannot support a health judgment, mark the module as `unknown` instead of guessing.
|
|
56
58
|
|
|
57
59
|
## Required workflow
|
|
@@ -79,6 +81,7 @@ This skill is an orchestration layer. It owns the background terminal session, o
|
|
|
79
81
|
5. Run and capture readiness
|
|
80
82
|
- Execute the requested command in the same background terminal.
|
|
81
83
|
- As soon as the command emits or creates its canonical run directory, artifact root, or equivalent output location, record that path and reuse it for every later check.
|
|
84
|
+
- If later structured outputs appear under a different directory than the recorded run root, pause the analysis and reconcile the mismatch before reading metrics or logs from either location.
|
|
82
85
|
- Report the exact runtime mode used in the evidence record so later analysis does not accidentally treat synthetic-harness results as proof about production behavior.
|
|
83
86
|
- Wait for a concrete readiness signal when the command is expected to stay up, such as a health endpoint, listening-port log, worker boot line, or queue-consumer ready message.
|
|
84
87
|
- If readiness never arrives, stop the run, preserve logs, and treat it as a failed startup window.
|
|
@@ -93,9 +96,12 @@ This skill is an orchestration layer. It owns the background terminal session, o
|
|
|
93
96
|
- Invoke `analyse-app-logs` on only the captured runtime window.
|
|
94
97
|
- Pass the service or module names, environment, timezone, canonical run folder, relevant log files, and the exact start/end boundaries.
|
|
95
98
|
- When the command produced reports, databases, or other structured artifacts, compare them against the same run's logs before making a health judgment.
|
|
99
|
+
- For follow-up questions about why most business events did not happen, build a stage-by-stage funnel from the canonical artifacts before reading isolated logs: candidate counts, admission/precheck decisions, queue or governor outcomes, skipped/blocked reasons, executed counts, retry/remediation outcomes, and persistence records.
|
|
100
|
+
- For follow-up questions about runtime speed, report latency from structured timestamps when available, separating startup/readiness, queue wait, precheck/final-prepare, submission, confirmation, and end-to-end timings rather than collapsing them into one vague duration.
|
|
96
101
|
- Reuse its confirmed issues, hypotheses, and monitoring improvements instead of rewriting a separate incident workflow.
|
|
97
102
|
8. Produce the final report
|
|
98
103
|
- Always summarize the actual command executed, actual start/end timestamps, execution status, and log locations.
|
|
104
|
+
- Separate bounded execute time from setup, readiness, collection, and shutdown overhead so a 2-minute observation is not misreported as 2 minutes of end-to-end pipeline latency.
|
|
99
105
|
- Include the code-update result only when an update step was requested.
|
|
100
106
|
- When findings were requested, classify each relevant module as `healthy`, `degraded`, `failed`, or `unknown` with concrete evidence and separate observed issues from risks that still need validation.
|
|
101
107
|
|
|
@@ -122,7 +128,7 @@ Absence of errors alone is not enough for `healthy`.
|
|
|
122
128
|
Use this structure in responses:
|
|
123
129
|
|
|
124
130
|
1. Run summary
|
|
125
|
-
- Workspace, command, schedule if any, actual start/end timestamps, duration
|
|
131
|
+
- Workspace, command, schedule if any, actual start/end timestamps, bounded execute duration, total wall-clock duration, readiness result, shutdown result if applicable, canonical run folder or artifact root, and log locations.
|
|
126
132
|
2. Execution result
|
|
127
133
|
- Whether the command completed, stayed up for the requested window, or failed early.
|
|
128
134
|
3. Code update result
|
|
@@ -14,7 +14,7 @@ description: "Systematic debugging workflow for program issues: understand obser
|
|
|
14
14
|
|
|
15
15
|
## Standards
|
|
16
16
|
|
|
17
|
-
- Evidence: Gather expected versus observed behavior from code and runtime facts before deciding on a cause, and when the issue involves a runtime pipeline or bounded run, anchor the investigation to one canonical artifact root or run directory instead of mixed terminal snippets from multiple runs.
|
|
17
|
+
- Evidence: Gather expected versus observed behavior from code and runtime facts before deciding on a cause, and when the issue involves a runtime pipeline or bounded run, anchor the investigation to one canonical artifact root or run directory instead of mixed terminal snippets from multiple runs; if generated reports or databases drift into an older run directory, capture that mismatch explicitly before treating any artifact as evidence.
|
|
18
18
|
- Execution: Inspect the relevant paths, reproduce every plausible cause with tests or bounded reruns, choose a reproduction mode whose fidelity matches the user's claim, map each observed failure to a concrete pipeline stage, distinguish toolchain/platform faults from application-logic faults, classify failing tests as stale test contract vs test-harness interference vs real product bug, then apply the minimal fix at the true owner.
|
|
19
19
|
- Quality: Keep scope focused on the bug, prefer existing test patterns, explicitly rule out hypotheses that could not be reproduced, and when failures disappear in isolated reruns treat shared-state or parallel-test interference as a first-class hypothesis instead of silently dismissing the original failure.
|
|
20
20
|
- Output: Deliver the plausible-cause list, the canonical evidence source, reproduction tests or reruns, the final failure classification for each investigated symptom, validated fix summary, and passing-test confirmation.
|
|
@@ -25,6 +25,7 @@ description: "Systematic debugging workflow for program issues: understand obser
|
|
|
25
25
|
- Cover all plausible causes with reproducible tests instead of guessing a single cause.
|
|
26
26
|
- Keep fixes minimal, focused, and validated by passing tests.
|
|
27
27
|
- When logs or runtime artifacts exist, treat one run as canonical and compare every conclusion against that same run's generated artifacts, not against ad hoc console recollection.
|
|
28
|
+
- When comparing runtime runs, first verify the baseline run is complete enough for the requested comparison: same command or scenario, same runtime mode, same bounded duration, and matching structured artifacts. If the baseline is incomplete, report that the only proven change is artifact/run completeness and avoid drawing strategy or performance conclusions from missing data.
|
|
28
29
|
- When a repository has both scenario or harness runs and a production-like runtime, do not treat the lower-fidelity mode as proof about the higher-fidelity mode unless you explicitly state that limitation and the user agrees.
|
|
29
30
|
- When the failing flow crosses multiple layers, identify the last confirmed successful stage before assigning blame.
|
|
30
31
|
- When tests fail, separate stale assertions and fixture drift from real implementation regressions before changing product code.
|
|
@@ -58,6 +59,9 @@ Also auto-invoke this skill when mismatch evidence appears during normal executi
|
|
|
58
59
|
- If a hypothesized cause cannot be reproduced, document why and deprioritize it explicitly.
|
|
59
60
|
- For long-running or generated-artifact workflows, record the exact command, timestamps, and artifact paths before inspecting outputs so later comparisons stay on the same evidence set.
|
|
60
61
|
- Do not mix baseline data and rerun data casually; compare the same scenario or command across runs and call out when a conclusion comes from a rerun rather than the original failure.
|
|
62
|
+
- When rerun artifacts land in the wrong directory because a wrapper or inherited environment reused a previous report path, fix the evidence layout first and only then compare metrics; otherwise classify the result as an artifact-routing problem rather than a performance delta.
|
|
63
|
+
- For post-run "why did most events not happen" questions, derive the answer from a funnel over structured artifacts first, then corroborate with logs: discovered or eligible candidates, admission blocks, stale or skipped decisions, queue/governor outcomes, execution attempts, confirmations, retries, and persisted event rows.
|
|
64
|
+
- For speed questions, compute per-stage timings from available event timestamps and state which stages are measured versus unavailable; avoid treating wall-clock bounded duration as pipeline latency, and separately report bounded execute time versus provisioning/readiness/cleanup overhead when both are present.
|
|
61
65
|
- When test fixtures or assertions no longer match the implemented contract, update the tests instead of weakening the product behavior to satisfy stale expectations.
|
|
62
66
|
- When tests shell out to shared local infrastructure, add deterministic isolation such as mutexes, unique temp roots, or serialized sections before accepting flakes as inevitable.
|
|
63
67
|
|