@yottagraph-app/aether-instructions 1.1.1 → 1.1.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/package.json +1 -1
  2. package/rules/agents.mdc +12 -3
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@yottagraph-app/aether-instructions",
3
- "version": "1.1.1",
3
+ "version": "1.1.2",
4
4
  "description": "Cursor rules, commands, and skills for Aether development",
5
5
  "files": [
6
6
  "rules",
package/rules/agents.mdc CHANGED
@@ -53,9 +53,12 @@ Use `broadchurch_auth` for all Elemental API calls. It lives at
53
53
  `agents/broadchurch_auth.py` and is automatically bundled into each agent
54
54
  directory at deploy time. It handles:
55
55
 
56
- - Reading the API URL from `broadchurch.yaml` (or `ELEMENTAL_API_URL` env var)
57
- - Minting and caching GCP ID tokens in production
58
- - Falling back to `ELEMENTAL_API_TOKEN` for local dev
56
+ - Routing through the Broadchurch Portal gateway proxy in production
57
+ (no direct QS credentials needed the portal handles Auth0 M2M auth)
58
+ - Authenticating to the proxy with a per-tenant API key from
59
+ `broadchurch.yaml` (`gateway.qs_api_key`)
60
+ - Falling back to `ELEMENTAL_API_URL` + `ELEMENTAL_API_TOKEN` env vars
61
+ for local dev
59
62
 
60
63
  ```python
61
64
  try:
@@ -123,6 +126,12 @@ Select your agent from the dropdown in the web UI. You can also run a single age
123
126
  during local dev (agents/ is the CWD → on sys.path). At deploy time, the
124
127
  workflow copies it into the agent directory alongside `broadchurch.yaml`.
125
128
 
129
+ In production, all Elemental API calls go through the Portal Gateway at
130
+ `{gateway_url}/api/qs/{org_id}/...`. The agent sends `X-Api-Key` (from
131
+ `broadchurch.yaml`) and the portal injects its own Auth0 M2M token
132
+ upstream. This keeps QS credentials out of agents entirely and gives the
133
+ platform a per-tenant kill switch.
134
+
126
135
  **Important:** Always use the try/except import pattern shown above. ADK
127
136
  wraps agent code in a package at deploy time, so absolute imports fail at
128
137
  runtime in Agent Engine — the relative import fallback is required.