@openrig/cli 0.1.5 → 0.1.7

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (151) hide show
  1. package/daemon/dist/adapters/claude-resume.js +1 -1
  2. package/daemon/dist/adapters/cmux-transport.d.ts.map +1 -1
  3. package/daemon/dist/adapters/cmux-transport.js +40 -3
  4. package/daemon/dist/adapters/cmux-transport.js.map +1 -1
  5. package/daemon/dist/adapters/cmux.d.ts +4 -2
  6. package/daemon/dist/adapters/cmux.d.ts.map +1 -1
  7. package/daemon/dist/adapters/cmux.js +90 -11
  8. package/daemon/dist/adapters/cmux.js.map +1 -1
  9. package/daemon/dist/adapters/compose-services-adapter.d.ts +73 -0
  10. package/daemon/dist/adapters/compose-services-adapter.d.ts.map +1 -0
  11. package/daemon/dist/adapters/compose-services-adapter.js +195 -0
  12. package/daemon/dist/adapters/compose-services-adapter.js.map +1 -0
  13. package/daemon/dist/adapters/tmux-exec.d.ts.map +1 -1
  14. package/daemon/dist/adapters/tmux-exec.js +22 -2
  15. package/daemon/dist/adapters/tmux-exec.js.map +1 -1
  16. package/daemon/dist/db/migrations/020_rig_services.d.ts +3 -0
  17. package/daemon/dist/db/migrations/020_rig_services.d.ts.map +1 -0
  18. package/daemon/dist/db/migrations/020_rig_services.js +17 -0
  19. package/daemon/dist/db/migrations/020_rig_services.js.map +1 -0
  20. package/daemon/dist/domain/bootstrap-orchestrator.d.ts +7 -0
  21. package/daemon/dist/domain/bootstrap-orchestrator.d.ts.map +1 -1
  22. package/daemon/dist/domain/bootstrap-orchestrator.js +73 -1
  23. package/daemon/dist/domain/bootstrap-orchestrator.js.map +1 -1
  24. package/daemon/dist/domain/compose-project-name.d.ts +3 -0
  25. package/daemon/dist/domain/compose-project-name.d.ts.map +1 -0
  26. package/daemon/dist/domain/compose-project-name.js +16 -0
  27. package/daemon/dist/domain/compose-project-name.js.map +1 -0
  28. package/daemon/dist/domain/native-resume-probe.js +5 -2
  29. package/daemon/dist/domain/native-resume-probe.js.map +1 -1
  30. package/daemon/dist/domain/node-cmux-service.d.ts +19 -0
  31. package/daemon/dist/domain/node-cmux-service.d.ts.map +1 -0
  32. package/daemon/dist/domain/node-cmux-service.js +75 -0
  33. package/daemon/dist/domain/node-cmux-service.js.map +1 -0
  34. package/daemon/dist/domain/node-inventory.js +1 -1
  35. package/daemon/dist/domain/node-inventory.js.map +1 -1
  36. package/daemon/dist/domain/restore-orchestrator.d.ts +2 -0
  37. package/daemon/dist/domain/restore-orchestrator.d.ts.map +1 -1
  38. package/daemon/dist/domain/restore-orchestrator.js +13 -0
  39. package/daemon/dist/domain/restore-orchestrator.js.map +1 -1
  40. package/daemon/dist/domain/rig-repository.d.ts +6 -1
  41. package/daemon/dist/domain/rig-repository.d.ts.map +1 -1
  42. package/daemon/dist/domain/rig-repository.js +65 -0
  43. package/daemon/dist/domain/rig-repository.js.map +1 -1
  44. package/daemon/dist/domain/rig-teardown.d.ts +1 -0
  45. package/daemon/dist/domain/rig-teardown.d.ts.map +1 -1
  46. package/daemon/dist/domain/rig-teardown.js +17 -0
  47. package/daemon/dist/domain/rig-teardown.js.map +1 -1
  48. package/daemon/dist/domain/rigspec-instantiator.d.ts +7 -0
  49. package/daemon/dist/domain/rigspec-instantiator.d.ts.map +1 -1
  50. package/daemon/dist/domain/rigspec-instantiator.js +7 -0
  51. package/daemon/dist/domain/rigspec-instantiator.js.map +1 -1
  52. package/daemon/dist/domain/rigspec-schema.d.ts.map +1 -1
  53. package/daemon/dist/domain/rigspec-schema.js +200 -0
  54. package/daemon/dist/domain/rigspec-schema.js.map +1 -1
  55. package/daemon/dist/domain/service-orchestrator.d.ts +59 -0
  56. package/daemon/dist/domain/service-orchestrator.d.ts.map +1 -0
  57. package/daemon/dist/domain/service-orchestrator.js +172 -0
  58. package/daemon/dist/domain/service-orchestrator.js.map +1 -0
  59. package/daemon/dist/domain/services-readiness.d.ts +23 -0
  60. package/daemon/dist/domain/services-readiness.d.ts.map +1 -0
  61. package/daemon/dist/domain/services-readiness.js +63 -0
  62. package/daemon/dist/domain/services-readiness.js.map +1 -0
  63. package/daemon/dist/domain/snapshot-capture.d.ts.map +1 -1
  64. package/daemon/dist/domain/snapshot-capture.js +10 -0
  65. package/daemon/dist/domain/snapshot-capture.js.map +1 -1
  66. package/daemon/dist/domain/spec-library-service.d.ts +1 -0
  67. package/daemon/dist/domain/spec-library-service.d.ts.map +1 -1
  68. package/daemon/dist/domain/spec-library-service.js +7 -0
  69. package/daemon/dist/domain/spec-library-service.js.map +1 -1
  70. package/daemon/dist/domain/spec-review-service.d.ts +29 -0
  71. package/daemon/dist/domain/spec-review-service.d.ts.map +1 -1
  72. package/daemon/dist/domain/spec-review-service.js +26 -0
  73. package/daemon/dist/domain/spec-review-service.js.map +1 -1
  74. package/daemon/dist/domain/types.d.ts +83 -0
  75. package/daemon/dist/domain/types.d.ts.map +1 -1
  76. package/daemon/dist/openrig-compat.d.ts.map +1 -1
  77. package/daemon/dist/openrig-compat.js +4 -1
  78. package/daemon/dist/openrig-compat.js.map +1 -1
  79. package/daemon/dist/routes/adapters.js +3 -2
  80. package/daemon/dist/routes/adapters.js.map +1 -1
  81. package/daemon/dist/routes/env.d.ts +3 -0
  82. package/daemon/dist/routes/env.d.ts.map +1 -0
  83. package/daemon/dist/routes/env.js +119 -0
  84. package/daemon/dist/routes/env.js.map +1 -0
  85. package/daemon/dist/routes/sessions.d.ts.map +1 -1
  86. package/daemon/dist/routes/sessions.js +14 -0
  87. package/daemon/dist/routes/sessions.js.map +1 -1
  88. package/daemon/dist/routes/spec-library.d.ts.map +1 -1
  89. package/daemon/dist/routes/spec-library.js +21 -0
  90. package/daemon/dist/routes/spec-library.js.map +1 -1
  91. package/daemon/dist/server.d.ts +3 -0
  92. package/daemon/dist/server.d.ts.map +1 -1
  93. package/daemon/dist/server.js +5 -0
  94. package/daemon/dist/server.js.map +1 -1
  95. package/daemon/dist/startup.d.ts.map +1 -1
  96. package/daemon/dist/startup.js +15 -3
  97. package/daemon/dist/startup.js.map +1 -1
  98. package/daemon/specs/agents/apps/vault-specialist/agent.yaml +36 -0
  99. package/daemon/specs/agents/apps/vault-specialist/guidance/role.md +34 -0
  100. package/daemon/specs/agents/apps/vault-specialist/skills/vault-user/SKILL.md +64 -0
  101. package/daemon/specs/agents/apps/vault-specialist/startup/context.md +46 -0
  102. package/daemon/specs/agents/development/implementer/agent.yaml +1 -1
  103. package/daemon/specs/agents/development/implementer/guidance/role.md +1 -0
  104. package/daemon/specs/agents/orchestration/orchestrator/agent.yaml +1 -1
  105. package/daemon/specs/agents/orchestration/orchestrator/guidance/role.md +1 -0
  106. package/daemon/specs/agents/shared/agent.yaml +2 -0
  107. package/daemon/specs/agents/shared/skills/core/openrig-user/SKILL.md +53 -2
  108. package/daemon/specs/agents/shared/skills/mental-model-ha/SKILL.md +953 -0
  109. package/daemon/specs/rigs/launch/secrets-manager/rig.yaml +37 -0
  110. package/daemon/specs/rigs/launch/secrets-manager/secrets-manager.compose.yaml +18 -0
  111. package/dist/commands/destroy.d.ts +9 -0
  112. package/dist/commands/destroy.d.ts.map +1 -0
  113. package/dist/commands/destroy.js +175 -0
  114. package/dist/commands/destroy.js.map +1 -0
  115. package/dist/commands/doctor.d.ts +1 -0
  116. package/dist/commands/doctor.d.ts.map +1 -1
  117. package/dist/commands/doctor.js +82 -7
  118. package/dist/commands/doctor.js.map +1 -1
  119. package/dist/commands/down.d.ts.map +1 -1
  120. package/dist/commands/down.js +2 -1
  121. package/dist/commands/down.js.map +1 -1
  122. package/dist/commands/env.d.ts +4 -0
  123. package/dist/commands/env.d.ts.map +1 -0
  124. package/dist/commands/env.js +139 -0
  125. package/dist/commands/env.js.map +1 -0
  126. package/dist/commands/restore.d.ts.map +1 -1
  127. package/dist/commands/restore.js +2 -1
  128. package/dist/commands/restore.js.map +1 -1
  129. package/dist/commands/specs.d.ts.map +1 -1
  130. package/dist/commands/specs.js +11 -4
  131. package/dist/commands/specs.js.map +1 -1
  132. package/dist/commands/up.d.ts.map +1 -1
  133. package/dist/commands/up.js +9 -2
  134. package/dist/commands/up.js.map +1 -1
  135. package/dist/destroy-helpers.d.ts +63 -0
  136. package/dist/destroy-helpers.d.ts.map +1 -0
  137. package/dist/destroy-helpers.js +224 -0
  138. package/dist/destroy-helpers.js.map +1 -0
  139. package/dist/index.d.ts +3 -0
  140. package/dist/index.d.ts.map +1 -1
  141. package/dist/index.js +4 -0
  142. package/dist/index.js.map +1 -1
  143. package/dist/openrig-compat.d.ts.map +1 -1
  144. package/dist/openrig-compat.js +4 -1
  145. package/dist/openrig-compat.js.map +1 -1
  146. package/package.json +1 -1
  147. package/ui/dist/assets/index-BsXbqPEl.css +1 -0
  148. package/ui/dist/assets/index-CXZYxZbF.js +225 -0
  149. package/ui/dist/index.html +2 -2
  150. package/ui/dist/assets/index-DGPFTQEV.css +0 -1
  151. package/ui/dist/assets/index-VA_A8dpm.js +0 -224
@@ -0,0 +1,64 @@
1
+ # Vault User
2
+
3
+ You have access to a HashiCorp Vault instance managed by this rig's environment.
4
+
5
+ ## Connection
6
+
7
+ - **Address:** `http://127.0.0.1:8200`
8
+ - **Token:** `openrig-dev-token`
9
+ - **Auth header:** `X-Vault-Token: openrig-dev-token`
10
+
11
+ Always set the token before making API calls. For curl, use `-H "X-Vault-Token: openrig-dev-token"`.
12
+
13
+ ## Health Check
14
+
15
+ ```bash
16
+ curl -s http://127.0.0.1:8200/v1/sys/health | jq .
17
+ ```
18
+
19
+ A healthy response has `"initialized": true` and `"sealed": false`.
20
+
21
+ ## Secret Operations
22
+
23
+ ### Write a secret
24
+
25
+ ```bash
26
+ curl -s -X POST http://127.0.0.1:8200/v1/secret/data/<path> \
27
+ -H "X-Vault-Token: openrig-dev-token" \
28
+ -d '{"data": {"key": "value"}}' | jq .
29
+ ```
30
+
31
+ ### Read a secret
32
+
33
+ ```bash
34
+ curl -s http://127.0.0.1:8200/v1/secret/data/<path> \
35
+ -H "X-Vault-Token: openrig-dev-token" | jq .
36
+ ```
37
+
38
+ The secret value is in `.data.data`.
39
+
40
+ ### List secrets
41
+
42
+ ```bash
43
+ curl -s -X LIST http://127.0.0.1:8200/v1/secret/metadata/ \
44
+ -H "X-Vault-Token: openrig-dev-token" | jq .
45
+ ```
46
+
47
+ List a subdirectory by appending the path: `.../secret/metadata/<prefix>/`.
48
+
49
+ ### Delete a secret
50
+
51
+ ```bash
52
+ curl -s -X DELETE http://127.0.0.1:8200/v1/secret/data/<path> \
53
+ -H "X-Vault-Token: openrig-dev-token"
54
+ ```
55
+
56
+ ## Explaining Secrets
57
+
58
+ When asked to explain the current secret structure, list all paths and summarize what each contains. Use the list endpoint recursively if needed.
59
+
60
+ ## Important Notes
61
+
62
+ - This is Vault dev mode — all data is in-memory and lost on restart
63
+ - The KV secrets engine is mounted at `secret/` by default in dev mode
64
+ - Use the `rig env status` command to verify Vault health through OpenRig before direct probing
@@ -0,0 +1,46 @@
1
+ # Startup Context: Vault Managed App
2
+
3
+ ## Environment
4
+
5
+ This rig runs HashiCorp Vault in dev mode as a managed environment service. Vault boots before you launch — by the time you receive this context, Vault should already be healthy.
6
+
7
+ ## Access
8
+
9
+ - **Address:** `http://127.0.0.1:8200`
10
+ - **Dev root token:** `openrig-dev-token`
11
+ - **UI:** `http://127.0.0.1:8200/ui`
12
+ - **API:** `http://127.0.0.1:8200/v1`
13
+
14
+ ## Ground Yourself First
15
+
16
+ Before making topology or registration claims, ground yourself with OpenRig identity:
17
+
18
+ ```bash
19
+ rig whoami --json
20
+ ```
21
+
22
+ Trust the startup identity context OpenRig gives you. Do not claim that the rig is unlaunched, unattached, or unregistered unless `rig whoami --json` or another direct OpenRig command proves it.
23
+
24
+ ## Checking Status
25
+
26
+ Use OpenRig env surfaces first:
27
+
28
+ ```bash
29
+ rig env status <rig-name>
30
+ ```
31
+
32
+ For direct Vault health checks:
33
+
34
+ ```bash
35
+ curl -s http://127.0.0.1:8200/v1/sys/health | jq .
36
+ ```
37
+
38
+ Or via the Vault CLI if available:
39
+
40
+ ```bash
41
+ vault status -address=http://127.0.0.1:8200
42
+ ```
43
+
44
+ ## Your Role
45
+
46
+ You are the Vault specialist. Other agents in larger topologies may delegate Vault-domain work to you. When they do, use your domain knowledge to perform the requested operations and report results clearly.
@@ -11,7 +11,7 @@ imports:
11
11
  profiles:
12
12
  default:
13
13
  uses:
14
- skills: [using-superpowers, openrig-user, development-team, test-driven-development, systematic-debugging, verification-before-completion, writing-plans, executing-plans]
14
+ skills: [using-superpowers, openrig-user, development-team, test-driven-development, mental-model-ha, systematic-debugging, verification-before-completion, writing-plans, executing-plans]
15
15
  guidance: []
16
16
  subagents: []
17
17
  hooks: []
@@ -9,6 +9,7 @@ Load these packaged skills now before editing:
9
9
  - `openrig-user`
10
10
  - `development-team`
11
11
  - `test-driven-development`
12
+ - `mental-model-ha`
12
13
  - `systematic-debugging`
13
14
  - `writing-plans`
14
15
  - `executing-plans`
@@ -11,7 +11,7 @@ imports:
11
11
  profiles:
12
12
  default:
13
13
  uses:
14
- skills: [using-superpowers, openrig-user, orchestration-team, systematic-debugging, verification-before-completion, writing-plans, executing-plans, brainstorming]
14
+ skills: [using-superpowers, openrig-user, orchestration-team, mental-model-ha, systematic-debugging, verification-before-completion, writing-plans, executing-plans, brainstorming]
15
15
  guidance: []
16
16
  subagents: []
17
17
  hooks: []
@@ -8,6 +8,7 @@ Load these packaged skills now before doing substantive work:
8
8
  - `using-superpowers`
9
9
  - `openrig-user`
10
10
  - `orchestration-team`
11
+ - `mental-model-ha`
11
12
  - `systematic-debugging`
12
13
  - `brainstorming`
13
14
  - `writing-plans`
@@ -20,6 +20,8 @@ resources:
20
20
  path: skills/process/using-superpowers
21
21
  - id: openrig-user
22
22
  path: skills/core/openrig-user
23
+ - id: mental-model-ha
24
+ path: skills/mental-model-ha
23
25
  - id: systematic-debugging
24
26
  path: skills/process/systematic-debugging
25
27
  - id: test-driven-development
@@ -16,6 +16,40 @@ Most work in OpenRig reduces to this loop:
16
16
  - read context: `rig transcript ...`, `rig ask ...`, `rig chatroom history ...`
17
17
  - act: `rig send`, `rig capture`, `rig broadcast`, lifecycle commands
18
18
 
19
+ ## Agent-Managed Apps
20
+
21
+ An agent-managed app is a deployable OpenRig unit made of:
22
+ - the software or service
23
+ - one specialist agent dedicated to that software
24
+
25
+ Treat the specialist as the domain delegate for that app.
26
+ The current canonical example is:
27
+ - rig: `secrets-manager`
28
+ - pod: `vault`
29
+ - member: `specialist`
30
+ - logical ID: `vault.specialist`
31
+ - session: `vault-specialist@secrets-manager`
32
+
33
+ Typical operator loop:
34
+
35
+ ```bash
36
+ rig up secrets-manager --cwd /path/to/project
37
+ rig ps --nodes --json
38
+ rig send vault-specialist@secrets-manager "Check Vault health and report back." --verify
39
+ rig env status secrets-manager
40
+ rig env logs secrets-manager
41
+ ```
42
+
43
+ Cross-rig communication is valid when the target session resolves uniquely.
44
+ Example:
45
+
46
+ ```bash
47
+ rig send vault-specialist@secrets-manager "Read secret/data/dogfood and report the value." --verify
48
+ ```
49
+
50
+ Use the specialist instead of teaching every peer the same app-specific toolchain.
51
+ For Vault, ask `vault.specialist` to do secrets-domain work rather than improvising curl or Vault CLI usage in unrelated agents.
52
+
19
53
  ## Identity and Recovery
20
54
 
21
55
  Start here after launch, compaction, or confusion:
@@ -63,6 +97,9 @@ rig daemon status
63
97
  rig config
64
98
  rig preflight
65
99
  rig doctor
100
+ rig env status <rig>
101
+ rig env logs <rig>
102
+ rig env down <rig>
66
103
  ```
67
104
 
68
105
  ## Transcript and Communication
@@ -161,6 +198,7 @@ This is an evidence/context command. It is not a hidden second-LLM call.
161
198
  rig up <source>
162
199
  rig up <source> --plan
163
200
  rig up <source> --yes
201
+ rig up <source> --cwd /path/to/project
164
202
  rig up <source> --json
165
203
  ```
166
204
 
@@ -176,9 +214,9 @@ Bare names are special:
176
214
 
177
215
  Current behavior notes:
178
216
  - `--target <root>` is only for `.rigbundle` / package installation. It does not change agent cwd.
217
+ - `rig up --cwd` is shipped. `rig up --cwd <path>` sends a per-run cwd override for all members in that launch.
179
218
  - `local:` `agent_ref` values resolve relative to the rig spec directory, not your shell cwd.
180
219
  - if you copy a built-in spec elsewhere, keep its `agents/` tree beside the YAML or rewrite those refs to `path:/absolute/path`
181
- - there is no shipped `rig up --cwd` override yet
182
220
 
183
221
  Legacy/spec-specific surfaces still ship too:
184
222
 
@@ -199,6 +237,20 @@ rig down <rigId> --json
199
237
 
200
238
  If `--snapshot` succeeds, human output includes the restore hint.
201
239
 
240
+ ### Environment services
241
+
242
+ ```bash
243
+ rig env status <rig>
244
+ rig env logs <rig> [service]
245
+ rig env down <rig>
246
+ ```
247
+
248
+ Use these for service-backed rigs and agent-managed apps.
249
+ For `secrets-manager`, these are the fastest CLI surfaces for:
250
+ - confirming whether Vault is healthy
251
+ - reading Vault container logs
252
+ - stopping the Vault env without tearing down the specialist session first
253
+
202
254
  ### Release management without killing live claimed sessions
203
255
 
204
256
  ```bash
@@ -463,6 +515,5 @@ Design assumptions that hold in the shipped CLI:
463
515
 
464
516
  Do not assume these exist unless the shipped help starts listing them:
465
517
  - `rig claim`
466
- - `rig env`
467
518
  - `rig blame`
468
519
  - `rig replay`