agentxchain 2.149.2 → 2.151.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -4,7 +4,7 @@
4
4
  * Two-tier lazy idle-threshold detection:
5
5
  *
6
6
  * 1. **Fast startup watchdog (BUG-51):** if an active turn has been
7
- * `dispatched`/`starting`/`running` for >30 seconds with NO startup proof
7
+ * `dispatched`/`starting`/`running` for >180 seconds with NO startup proof
8
8
  * (no first-byte output recorded on the turn or in dispatch-progress) and
9
9
  * NO staged result, it is a "ghost turn" — the subprocess never reached a
10
10
  * healthy running state. Transitions to `failed_start` immediately.
@@ -24,7 +24,7 @@
24
24
  * requiring a background daemon.
25
25
  *
26
26
  * Default thresholds:
27
- * - Startup watchdog: 30 seconds (configurable via run_loop.startup_watchdog_ms
27
+ * - Startup watchdog: 180 seconds (configurable via run_loop.startup_watchdog_ms
28
28
  * or runtimes.<id>.startup_watchdog_ms for local_cli runtimes)
29
29
  * - local_cli stale turns: 10 minutes
30
30
  * - api_proxy stale turns: 5 minutes
@@ -42,7 +42,7 @@ import { hasMeaningfulStagedResult } from './staged-result-proof.js';
42
42
 
43
43
  const DEFAULT_LOCAL_CLI_THRESHOLD_MS = 10 * 60 * 1000; // 10 minutes
44
44
  const DEFAULT_API_PROXY_THRESHOLD_MS = 5 * 60 * 1000; // 5 minutes
45
- const DEFAULT_STARTUP_WATCHDOG_MS = 30 * 1000; // 30 seconds (BUG-51)
45
+ const DEFAULT_STARTUP_WATCHDOG_MS = 180 * 1000; // 180 seconds (BUG-54)
46
46
  const LEGACY_STAGING_PATH = '.agentxchain/staging/turn-result.json';
47
47
 
48
48
  /**
@@ -125,21 +125,51 @@
125
125
  "gates": {
126
126
  "planning_signoff": {
127
127
  "requires_files": [".planning/PM_SIGNOFF.md", ".planning/ROADMAP.md", ".planning/SYSTEM_SPEC.md"],
128
- "requires_human_approval": true
128
+ "requires_human_approval": true,
129
+ "credentialed": false
129
130
  },
130
131
  "architecture_review": {
131
- "requires_files": [".planning/ARCHITECTURE.md"]
132
+ "requires_files": [".planning/ARCHITECTURE.md"],
133
+ "credentialed": false
132
134
  },
133
135
  "implementation_complete": {
134
136
  "requires_files": [".planning/IMPLEMENTATION_NOTES.md"],
135
- "requires_verification_pass": true
137
+ "requires_verification_pass": true,
138
+ "credentialed": false
136
139
  },
137
140
  "security_review_signoff": {
138
- "requires_files": [".planning/SECURITY_REVIEW.md"]
141
+ "requires_files": [".planning/SECURITY_REVIEW.md"],
142
+ "credentialed": false
139
143
  },
140
144
  "qa_ship_verdict": {
141
145
  "requires_files": [".planning/acceptance-matrix.md", ".planning/ship-verdict.md", ".planning/RELEASE_NOTES.md"],
142
- "requires_human_approval": true
146
+ "requires_human_approval": true,
147
+ "requires_verification_pass": true,
148
+ "credentialed": false
149
+ }
150
+ },
151
+ "approval_policy": {
152
+ "phase_transitions": {
153
+ "default": "require_human",
154
+ "rules": [
155
+ {
156
+ "from_phase": "planning",
157
+ "to_phase": "architecture",
158
+ "action": "auto_approve",
159
+ "when": {
160
+ "gate_passed": true,
161
+ "credentialed_gate": false
162
+ }
163
+ }
164
+ ]
165
+ },
166
+ "run_completion": {
167
+ "action": "auto_approve",
168
+ "when": {
169
+ "gate_passed": true,
170
+ "all_phases_visited": true,
171
+ "credentialed_gate": false
172
+ }
143
173
  }
144
174
  },
145
175
  "policies": [