-
Notifications
You must be signed in to change notification settings - Fork 31
ci(deps): Bump docker/build-push-action from 5 to 6 #59
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
dependabot
wants to merge
392
commits into
main
Choose a base branch
from
dependabot/github_actions/docker/build-push-action-6
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
ci(deps): Bump docker/build-push-action from 5 to 6 #59
dependabot
wants to merge
392
commits into
main
from
dependabot/github_actions/docker/build-push-action-6
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
- Replace fake curl endpoint with real GitHub install script - Remove GitHub releases download (use make local-install instead) - Replace hallucinated PostgreSQL references with SQLite - Fix broken links by adding /station/ prefix - Remove made-up performance metrics and complex deployment diagrams - Replace examples with real MCP filesystem config workflow - Add authentic Claude Desktop integration steps - Simplify architecture to match actual Station implementation 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <[email protected]>
- Rewrite mcp-integration.mdx with authentic Station MCP runtime concept - Position Station as MCP runtime that augments Claude Code/Cursor development - Explain MCP templates with Go template syntax and variable resolution - Detail stn sync workflow for template variable resolution - Replace hallucinated tools/examples with real filesystem MCP workflows - Create missing /en/mcp/overview.mdx page that navigation sidebar expects - Add clear quick start section with authentic Station setup steps 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <[email protected]>
- Add Mermaid diagram showing Claude Code/Cursor → Station Runtime → Sub-Agents → MCP Pool flow - Position diagram prominently at top of README for immediate visual understanding - Show specific sub-agents (File Monitor, Code Reviewer, Deploy Agent) with their tool sets - Illustrate how agents draw tools from environment's MCP pool - Update tagline to emphasize Station as MCP runtime that augments development experience 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <[email protected]>
…ments - Replace generic MCP services with specific sub-agents in Mermaid diagram - Show File Monitor, Code Reviewer, and Deploy Agent with their tool sets - Illustrate how each agent uses specific tools from Dev Environment MCP Pool - Better visualization of Station as MCP runtime managing deployable sub-agents 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <[email protected]>
- Remove incorrect --env flags from stn stdio and stn serve examples - Update environment configuration to use separate Station instances with XDG_CONFIG_HOME - Fix SSE mode examples to use correct --mcp-port flag instead of --port - Remove non-existent --timeout and --host flags from troubleshooting - Correct all CLI examples to match actual stn command help output - Show proper way to handle multiple environments via separate instances 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <[email protected]>
- Remove non-working SSH tunneling example that doesn't actually function - Replace with proper remote Station access via SSE mode - Show correct approach: run stn serve on remote server, connect via URL 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <[email protected]>
- Remove "Basic Configuration" and "Advanced Settings" children from sidebar - These pages don't exist and were causing 404s in navigation - Claude Desktop Setup now links directly to main page without sub-pages 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <[email protected]>
…grams - Remove non-existent "Agent Interaction" page from MCP Integration sidebar - Add Agent Management overview page as first item in Agent Management section - Create 4 detailed Mermaid diagrams showing: 1. Architecture Flow: MCP configs → tools → agents → execution methods 2. Component Relationships: Detailed tool assignments per agent 3. File Structure Mapping: How filesystem maps to logical components 4. Environment Isolation: Same agents, different tool access per environment - Show relationships between MCP configs, sub-tools, agent.prompt files - Document all access methods: CLI (stn agent run), MCP (Claude Desktop), REST API - Include authentic examples for each access pattern - Explain key concepts: template resolution, tool discovery, agent portability 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <[email protected]>
- Remove emojis and special characters causing Mermaid parsing errors - Simplify Component Relationships diagram syntax - Fix File Structure Mapping diagram by removing template syntax curly braces - Clean up node labels to use only alphanumeric characters and basic symbols - Both diagrams should now render properly without syntax errors 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <[email protected]>
…tn binary - Fix stn agent run to use name instead of ID: stn agent run "Agent Name" "task" - Fix stn agent create syntax: stn agent create "name" "description" - Update Component Relationships diagram to show correct CLI pattern - All CLI examples now match actual stn agent command help output - Verified against current Station binary commands 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <[email protected]>
…ment relationship - Correct misconception that same .prompt files serve multiple environments - Show that each environment has its own separate agent directories and files - Illustrate dev/agents/ and prod/agents/ as independent with same-named but separate .prompt files - Update Agent Portability section to clarify agents exist independently per environment - Remove incorrect "shared template" concept that doesn't match Station's actual architecture 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <[email protected]>
Create placeholder pages with Coming Soon messages to fix 404s: Agent Management: - Creating Agents, Agent Configuration, Environment Isolation, Monitoring & Logs CLI Management: - Setup & Configuration, Tool Management, Template System, Advanced Commands - CLI Tools subdirectory: Installing Tools, Custom Tools Templates & Bundles: - Bundle Registry, Creating Bundles, Publishing Bundles Deployment: - Production Setup, Security Configuration, Monitoring & Observability MCP Integration: - Other MCP Clients Each page includes: - Coming Soon banner with construction notice - What This Will Cover section outlining planned content - Quick Reference with basic commands/concepts - Next Steps with relevant cross-links All pages now have proper frontmatter and maintain consistent structure. No more 404s in sidebar navigation! 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <[email protected]>
- Add limit and offset parameters to list_tools tool definition (default limit: 50) - Implement pagination logic in handleListTools handler - Add search filtering by tool name and description (case-insensitive) - Add environment_id filtering support - Return comprehensive pagination metadata: - count: number of tools in current page - total: total number of tools (after filtering) - limit: requested page size - offset: current page offset - has_more: boolean indicating if more pages exist - next_offset: offset for the next page This prevents context window overflow when listing large numbers of MCP tools while maintaining backward compatibility (all parameters are optional). 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <[email protected]>
Fixed broken links in documentation pages that were missing the required /station/ prefix for proper site navigation: - creating-bundles.mdx: Fixed publishing and registry links - publishing-bundles.mdx: Fixed registry and templates links - templates.mdx: Fixed all internal navigation links - intelligent-agents.mdx: Fixed MCP integration and environments links All internal links now properly include /station/ prefix for correct routing. 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <[email protected]>
Added comprehensive MCP tool enhancements: **New MCP Tools:** - export_agents: Bulk export of agents to .prompt files with environment filtering - get_prompt: Retrieve content of specific prompt guides **New Prompt Guides:** - export_agents_guide: Complete guide for agent export workflows - station_mcp_tools_guide: Comprehensive guide to all 20 Station MCP tools **Tool Features:** - export_agents supports environment filtering, enabled-only filtering, and custom output directories - Uses existing export mechanism for consistency with CLI export - Handles errors gracefully with detailed error reporting - Provides structured JSON responses with export counts and file paths **Total MCP Tools:** Now 20 external tools available for complete agent lifecycle management 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <[email protected]>
- Add create_environment tool for creating new environments with file-based configuration - Add delete_environment tool for removing environments and cleaning up both DB and file configs - Implements complete environment lifecycle management through MCP interface - Includes safety features: default environment protection, confirmation requirements, atomic operations - Environment creation includes directory structure and default variables.yml template - Environment deletion handles both database cleanup and filesystem removal 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <[email protected]>
- Add --ship flag to stn init command for automatic ship CLI bootstrap - Implement ship CLI detection and automatic installation via curl installer - Create ship MCP configuration with filesystem tools in default environment - Run sync after initialization to register tools automatically - Handle sync failures gracefully with fallback instructions - Update help text and next steps messaging for ship integration Features: - Detects existing ship CLI installation or installs automatically - Creates mcp.json with ship filesystem MCP server configuration - Runs stn sync default after setup to register tools - Provides clear feedback and fallback instructions 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <[email protected]>
- Add variables.yml creation in setupShipIntegration function - Include helpful comments and examples for ship MCP variables - Maintain consistent environment directory structure
- Consolidate multiple status messages into single concise output - Remove redundant progress indicators - Maintain essential user feedback while reducing noise
- Implement editor-based MCP configuration creation via `stn mcp add`
- Add content hashing for reliable save/cancel detection
- Use proper Go template format {{ .VARIABLE }} in examples
- Remove AI detection from mcp add for fast, simple workflow
- Add ship CLI bootstrap integration with `stn init --ship`
- Update README with comprehensive quickstart guide
- Add beta warning about potential breaking changes
🤖 Generated with [Claude Code](https://claude.ai/code)
Co-Authored-By: Claude <[email protected]>
- Remove version checking and verification logic - Always install latest ship CLI via install script during stn init --ship - Ensures users get correct version with MCP filesystem support - Eliminates hanging issues from outdated ship CLI versions - More reliable and predictable installation process 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <[email protected]>
…l access This commit addresses multiple critical issues in the Station MCP system that prevented proper tool assignment and resource cleanup: **Root Cause Analysis:** - MCP servers created during sync lacked proper FileConfigID linkage - Round-robin tool distribution incorrectly assigned tools across servers - Delete operations failed to cascade properly due to missing foreign key relationships **Key Fixes:** 1. **Fixed MCP Server Creation** (declarative_sync.go:380-412): - Added FileConfigID assignment during server creation and updates - Ensures proper cascade delete relationships are maintained - Links servers to their originating file configurations 2. **Enhanced Delete Command** (cmd/main/handlers/mcp/delete.go): - Support deletion by both config name and ID (names are unique per environment) - Added detailed counting and preview of affected resources before deletion - Improved confirmation prompts showing exact impact - Fixed logging to use consistent log package instead of fmt.Printf 3. **Refactored Service Architecture**: - Split large declarative_sync.go file (1204 lines → 487 lines) - Created focused modules: agent_sync.go, mcp_tool_discovery.go, sync_cleanup.go - Improved maintainability and separation of concerns **Testing Results:** - Multi-server configuration (3 servers, 16 tools) properly deleted with cascade cleanup - All associated database records removed correctly - Template files cleaned up from filesystem - Verified through comprehensive test scenarios **Impact:** - Fixes critical bug where `stn mcp delete` left orphaned servers and tools in database - Restores proper referential integrity in MCP resource management - Enables reliable cleanup of multi-server configurations - Improves code maintainability through modular architecture 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <[email protected]>
- Add --provider and --model flags to stn init for non-interactive setup - Implement beautiful TUI using bubbles/lipgloss for provider selection - Support OpenAI (gpt-5, gpt-5-mini, gpt-5-nano) and Gemini (gemini-2.5-flash, gemini-2.5-pro) - Add custom provider setup for Anthropic, Ollama, local models - Environment variable detection (OPENAI_API_KEY, GEMINI_API_KEY) with confirmation prompts - Use --yes flag to skip all interactive prompts and use sensible defaults - Skip interactive setup if configuration already exists - Fix TUI choice capture bug where selections weren't properly returned - Store AI provider configuration in config.yaml as ai_provider and ai_model 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <[email protected]>
- Change default ship MCP configuration server name from 'station' to 'filesystem' - This provides clearer naming convention that matches the filesystem functionality - Fixes confusion where server name didn't match its purpose 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <[email protected]>
- Add MCPServerPool for persistent server connections - Implement surgical feature flag (poolingEnabled) for safe rollout - Add server pool initialization and management methods - Create getPooledEnvironmentMCPTools for fast tool access - Maintain backward compatibility with existing non-pooled mode - Add graceful server pool shutdown functionality Key Benefits: - Eliminates server process spawn overhead (100-500ms per request) - Reduces tool discovery latency through caching - Provides fallback to fresh connections if server not in pool - Keeps existing behavior as default for safety Testing: Feature flag disabled by default - requires explicit enablement 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <[email protected]>
- Add STATION_MCP_POOLING environment variable for surgical enablement - Initialize server pool during agent execution engine startup - Prevent multiple server pool initializations with mutex - Add pooling-aware cleanup (keep pooled connections alive) Usage: export STATION_MCP_POOLING=true stn serve # or stn stdio, or stn agent run Safety: - Feature disabled by default (backward compatible) - Graceful fallback if servers fail to start in pool - Existing behavior unchanged when pooling disabled 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <[email protected]>
…rovement • Add MCPServerPool for persistent MCP server connections (94% CPU reduction) • Enable connection pooling by default with STATION_MCP_POOLING environment variable • Implement server pool initialization on startup across all environments • Add graceful fallback to legacy connection model when pooling disabled • Fix config loading conflict in LoadStationConfig() to use main config.Load() • Support concurrent agent execution with thread-safe connection reuse • Reduce MCP server startup overhead from 100-500ms to near-zero per request • Maintain backward compatibility with existing MCP server configurations Performance Results: - 20% faster agent execution - 94% reduction in CPU usage during MCP operations - Zero hanging or resource conflicts under concurrent load - Successful parallel execution of 9+ agents via MCP tools 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <[email protected]>
…tion
• Fix agent export to use user-configured model instead of hardcoded "gemini-2.0-flash-exp"
- Add config parameter to MCP server constructors
- Update generateDotpromptContent() to use s.config.AIModel
- Export now respects user's configured model (e.g., "gemini-2.5-flash")
• Eliminate task duplication in dotprompt template rendering
- Remove "TASK" from dotprompt template variables in genkit_executor.go
- Task now appears only once as user prompt, not duplicated in system prompt
- Reduces token waste and prevents model confusion from redundant instructions
• Preserve support for user-defined template variables
- Input schema definitions via frontmatter still work correctly
- Custom variables like {{my_folder}}, {{target_file}} fully supported
- GetAgentSchema() API continues to provide schema discovery
Performance improvements:
- Cleaner template rendering without task duplication
- Reduced token usage and improved model efficiency
- Better separation of concerns between system and user prompts
🤖 Generated with [Claude Code](https://claude.ai/code)
Co-Authored-By: Claude <[email protected]>
• Remove stn-test binary from git tracking • Add stn-test to .gitignore to prevent future binary commits
Major refactoring to unify dotprompt and generate functions with multi-role support:
## Core Features
- Multi-role message support with {{role "system"}} and {{role "user"}} directives
- Automatic userInput schema injection in all exported agents
- Template variable system using official dotprompt library
- Unified export format between CLI and MCP handlers
## Key Changes
- **pkg/dotprompt/parser.go**: New multi-role dotprompt parser with role directive support
- **pkg/dotprompt/renderer.go**: Proper dotprompt rendering using official library
- **pkg/dotprompt/types.go**: Enhanced types for multi-role message system
- **pkg/dotprompt/genkit_executor.go**: Updated to use new rendering system
- **internal/mcp/handlers_fixed.go**: Multi-role export with configured model
- **cmd/main/handlers/agent/handlers.go**: Unified CLI export format
## Export Format Example
```yaml
model: "gemini-2.5-flash" # Uses user's configured model
input:
schema:
userInput: string # Automatic schema injection
---
{{role "system"}}
You are an AI assistant...
{{role "user"}}
{{userInput}} # Automatic user input variable
```
## Benefits
- Eliminates task duplication between system and user prompts
- Uses user's configured model instead of hardcoded values
- Clean separation of system instructions and user input
- Preserves support for user-defined template variables
- Compatible with existing Genkit ai.Generate() architecture
🤖 Generated with [Claude Code](https://claude.ai/code)
Co-Authored-By: Claude <[email protected]>
- Expose port 8585 for Station UI in Docker container - Update help text and success messages to show UI endpoint
## Container Distribution Strategy - Runtime container now publishes to ghcr.io/cloudshipai/station - GitHub Actions builds and publishes on new releases (tagged + latest) - Runtime builder supports both GHCR pull and local build modes ## Changes Made ### GitHub Actions Workflow (.github/workflows/release.yml) - Added Docker build/push step after GoReleaser - Extracts Linux amd64 binary from GoReleaser artifacts - Builds Docker image with extracted binary - Publishes to ghcr.io/cloudshipai/station with version tag + :latest - Uses GitHub token for GHCR authentication ### Runtime Builder (runtime_builder.go) - Complete refactor to support two modes: 1. Pull from GHCR (default): Downloads latest published image 2. Local build (--local flag): Builds from source using Dockerfile - Removed Dagger dependency for simpler Docker CLI integration - Removed complex binary download/copy logic - Cross-compilation ensures Linux binary for containers ### Dockerfile - Updated to runtime-focused container (not multi-stage build) - Expects pre-built Linux binary with UI embedded (COPY stn) - Includes Node.js 20 for npx-based MCP servers - Includes Docker CLI, Python, Ship CLI, all dependencies - Exposes ports 3000, 3001, 3002, 8585 (removed SSH 2222) - Proper OCI labels for GHCR publication ### CLI Commands (build.go) - Added --local flag to `stn build runtime` command - Default behavior: pulls from GHCR (fast, no build required) - Local build mode: builds from source (for development) ### Server Configuration (server.go, up.go) - Removed SSH server completely (not needed for runtime container) - Fixed MCP configuration format (.mcp.json) for HTTP transport - Removed SSH port 2222 from container port mappings - Updated startup messages to remove SSH references ## Usage **For end users (default):** ```bash stn build runtime # Pulls from ghcr.io/cloudshipai/station:latest stn up # Starts containerized Station ``` **For developers:** ```bash stn build runtime --local # Builds from source ``` **GitHub Actions (automated):** - Triggers on new version tags (v*) - Builds and publishes ghcr.io/cloudshipai/station:v0.x.x - Updates ghcr.io/cloudshipai/station:latest 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <[email protected]>
Replace Connect page with comprehensive Settings page allowing users to edit Station configuration directly from the UI. **API Endpoints:** - GET /api/v1/settings/config/file - Returns config.yaml content and path - PUT /api/v1/settings/config/file - Updates config.yaml with YAML validation **UI Changes:** - Settings page at /settings with Monaco YAML editor - Warning banner about needing to restart Station after changes - Success/error notifications with auto-dismiss - Real-time YAML validation before save - File path display in header **Navigation Updates:** - Renamed "Connect" to "Settings" in sidebar - Changed icon from Link/Zap to Settings gear icon - Updated route from /connect to /settings 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <[email protected]>
Enhanced Settings page with split-pane layout for easier configuration management. **Two-Column Layout:** - Left: Raw YAML editor with Monaco (syntax highlighting, validation) - Right: Quick Settings forms with collapsible sections **Form Sections:** - 🔵 AI Provider: provider selection, model, base URL - 🟣 CloudShip Integration: enable toggle, registration key, endpoint, station ID - 🟢 Server Ports: API (8585), MCP (3000), SSH (2222) - 🟠 Other Settings: admin username, debug mode, telemetry, database URL **Features:** - Real-time bidirectional sync between YAML and forms - Color-coded sections for visual organization - Collapsible accordions to reduce clutter - Form inputs update YAML, YAML edits update forms - YAML validation with error messages **CloudShip Quick Setup:** Users can now easily enable CloudShip integration and enter their registration key without manually editing YAML config files. 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <[email protected]>
Add comprehensive deployment template system for deploying Station environments to various cloud platforms with one-click configuration generation. **Deployment Templates:** - AWS ECS (Fargate): CloudFormation template with VPC, ALB, ECS service - GCP Cloud Run: Knative service configuration with secrets management - Fly.io: fly.toml with volume mounts and auto-scaling - Docker Compose: Local/VPS deployment with health checks **Template Features:** - Variable substitution from config.yaml and variables.yml - Environment-specific configuration (ports, AI provider, model) - Secrets placeholders for API keys - Production-ready defaults (health checks, logging, networking) - Deployment instructions embedded in templates **Backend Implementation:** - Embedded templates using Go embed.FS - Template service with Go text/template engine - API endpoint: POST /api/v1/environments/:id/deploy - Automatic config loading from Station configuration **Template Variables:** - Environment name, Docker image, ports (API, MCP, SSH) - AI configuration (provider, model, base URL) - Debug and telemetry settings - Custom environment variables from variables.yml Next: UI Deploy button with provider selection modal 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <[email protected]>
Complete the deployment template feature by adding the UI components.
Users can now generate deployment configurations for AWS ECS, GCP Cloud Run,
Fly.io, and Docker Compose directly from the Environments page.
**UI Components Added:**
- DeployModal: Provider selection, template generation, download/copy
- Deploy button on Environments page (purple rocket icon)
- Provider cards: AWS ECS, GCP Cloud Run, Fly.io, Docker Compose
- Template preview with syntax highlighting
- Download and copy-to-clipboard functionality
**User Flow:**
1. Click "Deploy" button on Environments page
2. Enter Docker image name (defaults to station-{env}:latest)
3. Select deployment provider
4. Click "Generate Template"
5. View generated template with download/copy options
**Backend Integration:**
- Uses POST /api/v1/environments/:id/deploy endpoint
- Automatically loads config.yaml and variables.yml
- Generates provider-specific deployment templates
- Returns template content and suggested filename
**Providers Supported:**
- AWS ECS: CloudFormation with VPC, ALB, ECS Fargate
- GCP Cloud Run: Knative service with secrets
- Fly.io: fly.toml with volumes and auto-scaling
- Docker Compose: Local/VPS deployment with health checks
🤖 Generated with [Claude Code](https://claude.com/claude-code)
Co-Authored-By: Claude <[email protected]>
- Add CLI deployment template (cli.sh) with docker exec usage examples
- Add GitHub Actions template with dual-mode support (CLI and CI/CD container runner)
- Simplify AWS ECS template by removing VPC/ALB complexity
- Fix GitHub Actions template syntax by escaping ${{ }} for Go template parsing
- Redesign Environments page to two-column layout (canvas left, controls right)
- Enhance input visibility with cyan borders, orange labels, and inline styles
- Add comprehensive agent CLI usage documentation for both deployment modes
🤖 Generated with [Claude Code](https://claude.com/claude-code)
Co-Authored-By: Claude <[email protected]>
…t schemas This commit implements comprehensive CloudShip integration for structured intelligence data ingestion: ## Database Schema Changes - Added `app` and `app_subtype` columns to agents table for CloudShip classification - Added `output_schema_preset` column for predefined schema templates - Migration 025: Adds new columns with proper indexing ## CloudShip Preset System - Created 15 CloudShip presets covering 3 apps × 5 app_types: - FinOps: inventory, investigations, opportunities, projections, events - Security: inventory, investigations, opportunities, projections, events - Deployments: inventory, investigations, opportunities, projections, events - Each preset includes complete JSON schemas for standardized data output - Registry in pkg/schema/presets.go with GetPreset() lookup function ## Agent Management Updates - Updated Create/Update methods to accept app, app_subtype, output_schema_preset - Export service populates metadata from presets during .prompt file generation - File sync service reads app/app_type from dotprompt metadata frontmatter - MCP handlers expose preset selection in agent creation/update tools ## Validation Framework - Created pkg/validation/ with CloudShip output validation - Validates agent responses against registered JSON schemas - Supports both preset schemas and custom user-defined schemas ## UI Enhancements - Added CloudShip page for data ingestion monitoring - Agent editor shows app/app_subtype classification fields - Navigation includes CloudShip section in sidebar ## Execution Pipeline - Agent execution engine validates output against schemas - Lighthouse integration prepares for CloudShip data transmission - Execution metadata includes schema validation results 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <[email protected]>
This commit implements a comprehensive JSON schema editor in the agent editor UI: ## New Components - **JsonSchemaEditor**: React component with dual-mode editing - Code mode: Monaco editor for direct JSON schema editing - Visual mode: Tree preview showing schema structure with types and descriptions - Real-time validation with error display - Format button for auto-formatting JSON - Validation indicators (checkmark/error icon) ## Agent Editor Updates - **Two-column layout**: YAML editor (left) + Schema editor (right) - **Automatic schema extraction**: Parses output.schema from YAML frontmatter - **Bidirectional sync**: Schema edits update YAML, YAML edits update schema - **Save validation**: Prevents saving when schema has errors - **Responsive design**: Grid layout with equal column widths ## Features - **Schema Preview**: Visual tree representation showing: - Object properties with type annotations - Required field markers - Nested objects and arrays - Field descriptions as tooltips - **Real-time Validation**: - JSON syntax checking - Error messages displayed inline - Save button disabled on invalid schema - **Developer Experience**: - Tokyo Night theme consistency - Format button for clean JSON output - View mode toggle (visual/code) - Helpful tooltips and hints ## UI/UX Enhancements - Grid-based two-column layout for optimal screen usage - Schema editor visibility only when output schema exists - Clean visual separation between prompt and schema editing - Consistent Tokyo Night color scheme across both editors 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <[email protected]>
- Add comprehensive JSON schema editor with 3 modes: * Form Builder: Interactive schema building with nested objects/arrays * Visual Preview: Tree view of schema structure * Code Editor: Monaco JSON editor with validation - Add CloudShip documentation page explaining FinOps agents: * 5 agent types: inventory, investigations, opportunities, projections, events * Step-by-step agent creation guide with presets * Schema builder usage tips - Update Agent Editor with two-column layout: * Left: YAML dotprompt editor * Right: JSON schema editor with bidirectional sync - Add CloudShip to sidebar navigation - Install @rjsf/core, @rjsf/validator-ajv8, @rjsf/utils for form building - Fix scrolling in schema editor with proper overflow handling - Use border-only badges for better text visibility 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <[email protected]>
…ck tools This commit introduces a complete CloudShip FinOps Live Demo system with 5 specialized bundles, comprehensive mock infrastructure, and interactive UI. ## New Features ### Live Demo Bundles (30 agents total) - **finops-investigations** (6 agents): Cost spike analysis, root cause analysis - AWS Cost Spike Analyzer, K8s Namespace Drift RCA, Multi-Cloud Anomaly Explainer - Service Unit Cost RCA, Storage/Egress Spike RCA, Third-Party SaaS RCA - **finops-opportunities** (6 agents): Optimization and savings recommendations - EC2 Rightsizing Advisor, RDS Optimization Finder, Reserved Capacity Advisor - K8s Resource Optimizer, Orphaned Resource Cleaner, Budget Optimization Planner - **finops-projections** (6 agents): Cost forecasting and capacity planning - Monthly Cost Forecaster, Quarterly Budget Planner, Commitment Expiration Planner - K8s Capacity Forecaster, Growth Impact Modeler, Seasonal Variance Predictor - **finops-inventory** (6 agents): Resource tracking and compliance - Multi-Cloud Resource Cataloger, Budget vs Actual Tracker, Cost Center Aggregator - K8s Workload Tracker, Commitment Portfolio Tracker, Infrastructure Drift Detector - **finops-events** (6 agents): Cost event tracking and correlation - Anomaly Event Logger, Deployment Cost Correlator, Incident Cost Tracker - PR Cost Impact Predictor, Scaling Event Analyzer, Infrastructure Change Logger ### Mock MCP Infrastructure (pkg/mocks/) - **AWS Cost Explorer Mock**: 3 core tools (get_cost_and_usage, get_cost_anomalies, get_cost_forecast) - **AWS CE Extended Mock**: 2 advanced tools (get_cost_and_usage_comparisons, get_cost_drivers) - **AWS Compute Optimizer Mock**: 2 rightsizing tools (EC2, RDS recommendations) - **AWS Billing Mock**: 7 financial tools (budgets, commitments, Reserved Instances, Savings Plans) - **OpenCost Mock**: Kubernetes cost allocation data - **CloudQuery Mock**: Infrastructure drift detection and CUR data querying - **Observability Mocks**: Grafana, GitHub, PagerDuty, Stripe integrations - **Total**: 28+ mock tools returning realistic FinOps data ### CLI Enhancements - `stn mock <server-name>`: Run individual mock MCP servers via stdio - Automatic mock server discovery and tool registration - Mock data generation with realistic AWS, K8s, and SaaS cost patterns ### API & UI Integration - New `/api/v1/demo/bundles` endpoint for bundle discovery - Live Demo page with interactive bundle cards and agent listings - Embedded bundle system with internal/embedded package - Comprehensive agent metadata with app/app_type categorization ### Agent Output Schemas All 30 agents use structured JSON schemas with required fields: - **Investigations**: finding, root_cause, cost_impact, evidence, recommendations - **Opportunities**: opportunity, savings_potential, confidence, complexity, action_plan - **Projections**: projection, forecast_period, methodology, cost_breakdown, sensitivity - **Inventory**: inventory_summary, category_breakdown, compliance_status - **Events**: event_summary, event_type, timestamp, cost_impact, severity ## Testing & Validation - End-to-end testing: All 30 agents tested with realistic prompts - Successful executions across all 5 bundles with proper structured output - Mock tools return realistic data patterns matching production AWS/K8s/SaaS APIs - Zero validation errors after schema fixes and tool name corrections ## Technical Implementation - Modular mock server architecture with shared base implementation - Template variable support for environment-specific deployments - Bundle packaging system with tar.gz distribution - GitOps-ready configuration with declarative sync - Full integration with existing agent execution engine ## Bundle Structure Each bundle includes: - `template.json`: MCP server configurations and metadata - `agents/*.prompt`: DotPrompt agent definitions with full schemas - Comprehensive documentation and usage examples - CloudShip app/app_type categorization for UI organization 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <[email protected]>
This commit expands the Live Demo page to showcase CloudShip's platform vision across 6 DevOps/Platform categories with comprehensive Security mock tools. ## UI Enhancements ### Multi-Category Tabbed Interface - **6 App Categories**: FinOps, Security, Reliability, Deployments, Data Platform, MLOps - **Category-Specific Theming**: Each category has unique icon and color scheme - FinOps: BarChart3 icon, tokyo-green - Security: Shield icon, tokyo-red - Reliability: Server icon, tokyo-blue - Deployments: GitBranch icon, tokyo-purple - Data Platform: Database icon, tokyo-cyan - MLOps: Brain icon, tokyo-orange ### Coming Soon Experience - Interactive placeholders for unreleased categories - Detailed "What's Being Built" sections explaining 5 standard subtypes: - Investigations: Root cause analysis agents - Opportunities: Optimization recommendation agents - Projections: Forecasting and predictive agents - Inventory: Resource cataloging agents - Events: Change tracking and correlation agents - Professional messaging about CloudShip platform expansion ### Enhanced User Experience - Category descriptions with domain-specific context - Disabled state for unavailable categories - Smooth transitions and hover states - Responsive grid layout for bundle cards ## Security Mock Infrastructure Created comprehensive Security MCP mock servers (`pkg/mocks/security.go`): ### GuardDuty Mock - **Tool**: `get_findings` - Threat detection findings - **Returns**: SSH brute force, port probes, cryptocurrency mining alerts - **Fields**: finding_id, type, severity, region, resource, service actions, timestamps ### IAM Access Analyzer Mock - **Tools**: - `get_findings` - Public resource exposure findings - `analyze_policy` - IAM policy privilege analysis - **Returns**: Public S3 buckets, cross-account access, overprivileged policies - **Features**: Least privilege recommendations, privilege escalation detection ### Trivy Mock - **Tools**: - `scan_image` - Container vulnerability scanning - `scan_filesystem` - Misconfig and secret detection - **Returns**: CVE details with CVSS scores, package versions, fix recommendations - **Coverage**: OS packages, application dependencies, IaC misconfigurations ### Semgrep Mock - **Tool**: `scan_code` - SAST security scanning - **Returns**: OWASP Top 10 findings, CWE mappings, fix suggestions - **Detects**: SQL injection, XSS, hardcoded secrets, insecure crypto ### Macie Mock - **Tool**: `get_findings` - Sensitive data discovery - **Returns**: PII detection (SSN, credit cards, emails), credentials in S3 - **Features**: Data classification, sample counts, severity assessment ### Falco Mock - **Tool**: `get_alerts` - Runtime security monitoring - **Returns**: Container shell access, file modifications, C2 communications - **Coverage**: Kubernetes pod/namespace context, process/user tracking ## Platform Vision This update positions Station as a comprehensive CloudShip Agent Platform: - **Current**: FinOps (5 bundles, 30 agents) - Production Ready - **Coming Soon**: Security, Reliability, Deployments, Data Platform, MLOps - **Architecture**: Standard 5-subtype pattern across all categories - **Mock Infrastructure**: Realistic data for demo/testing without real service connections ## Technical Implementation - 6 new mock MCP servers with 11 total tools - Realistic security finding data matching AWS/container/K8s patterns - Proper severity levels, timestamps, and remediation guidance - Mock data suitable for agent development and testing 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <[email protected]>
…ndles This commit significantly expands the CloudShip Live Demo system beyond FinOps to showcase the platform's multi-category vision across Security, Reliability, and Deployments use cases. ## New Demo Bundles (24 agents total) ### Security Investigations (7 agents) - GuardDuty Threat RCA - AWS threat detection analysis - Public Exposure RCA - IAM Access Analyzer investigation - Vulnerability Exploitability RCA - Trivy CVE prioritization - Secrets Leak RCA - Exposed credentials investigation - Data Exfiltration RCA - Macie sensitive data analysis - Privilege Escalation RCA - IAM policy chain analysis - Runtime Incident RCA - Falco container security events ### Security Opportunities (6 agents) - CIS Hardening Recommender - Compliance optimization - IAM Least Privilege Advisor - Permission reduction - Patch Priority Planner - Vulnerability remediation - Secret Hygiene Coach - Credential rotation - Network Security Optimizer - Security group hardening - Runtime Policy Advisor - Container security policies ### Reliability Investigations (6 agents) - Latency Spike RCA - Performance degradation analysis - Error Burst RCA - Error rate spike investigation - Saturation RCA - Resource exhaustion analysis - SLO Breach RCA - Service level violation root cause - Cascade Failure RCA - Multi-service failure analysis - Capacity Exhaustion RCA - Scaling limit investigation ### Deployments Opportunities (6 agents) - Build Cache Optimizer - CI/CD cache improvement - Test Parallelization Advisor - Test suite optimization - Deployment Frequency Booster - Release cadence increase - Rollback Safety Enhancer - Deployment safety improvements - Artifact Size Reducer - Build artifact optimization - DORA Metrics Improver - DevOps performance enhancement ## Security Mock Infrastructure Added comprehensive security mock servers in pkg/mocks/security.go: - **GuardDuty**: Threat detection (SSH brute force, port scans, crypto mining) - **IAM Access Analyzer**: Public exposure, policy analysis - **Trivy**: Container vulnerability scanning, IaC misconfiguration detection - **Semgrep**: SAST code scanning, OWASP Top 10 detection - **Macie**: Sensitive data discovery (PII, credentials in S3) - **Falco**: Runtime security alerts (shells in containers, privilege escalation) - **CloudTrail**: API audit logs for security investigation All 7 mock servers registered in cmd/main/mock.go for stn mock <server> usage. ## UI Enhancements Updated LiveDemoPage.tsx with multi-category platform showcase: - **6 Category Tabs**: FinOps, Security, Reliability, Deployments, Data Platform, MLOps - **Category-Specific Theming**: Tokyo Night color scheme per category - **Professional "Coming Soon" Experience**: Detailed descriptions for unreleased categories - **Bundle Filtering**: Show only bundles matching active category tab ## Bundle Packaging All 4 new bundles packaged as tar.gz archives ready for distribution: - security-investigations.tar.gz (3.8KB) - security-opportunities.tar.gz (1.3KB) - reliability-investigations.tar.gz (1.1KB) - deployments-opportunities.tar.gz (1.1KB) ## Technical Implementation - **Standard Output Schemas**: Consistent schemas across bundle types - Investigations: finding, root_cause, severity, resources, timeline, evidence, remediation - Opportunities: opportunity, potential, confidence, complexity, current/recommended state, action plan - **Realistic Mock Data**: Production-quality fake data for convincing demos - **MCP Integration**: Proper tool discovery and agent execution - **Multi-Step Agents**: 8-10 step agents for comprehensive analysis This expansion demonstrates CloudShip's vision as a complete AI-powered DevOps platform spanning FinOps, Security, Reliability, and Deployment optimization use cases. 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <[email protected]>
Fixed missing Falco server in security-investigations bundle template that prevented runtime-incident-rca agent from accessing __get_alerts tool. ## Changes - Added falco MCP server to security-investigations/template.json - Runtime incident RCA agent can now access Falco runtime security alerts ## End-to-End Testing Results Successfully tested all 4 new bundles with complete install → sync → execute → verify workflow: ### Security Investigations (7 agents) - ✅ Installed and synced with 9 tools from 7 security mock servers - ✅ Tested Agent 86 (GuardDuty Threat RCA) - Proper structured output with finding, root_cause, threat_severity, affected_resources - 1,377 input tokens, 529 output tokens, 17s execution ### Security Opportunities (6 agents) - ✅ Synced with trivy, semgrep, iam-access-analyzer, cloudquery, falco servers - ✅ Tested Agent 95 (Patch Priority Planner) - Correct opportunity schema with risk_reduction, confidence, action_plan - CVE prioritization with severity-based patching recommendations ### Reliability Investigations (6 agents) - ✅ Synced with grafana, pagerduty, cloudquery servers - ✅ Tested Agent 98 (Latency Spike RCA) - Proper finding, root_cause, impact_severity, incident_timeline, remediation - CPU spike correlation with API latency analysis ### Deployments Opportunities (6 agents) - ✅ Synced with github, grafana servers - ✅ Tested Agent 108 (Deployment Frequency Booster) - Complete opportunity schema with improvement_potential, action_plan - DORA metrics optimization recommendations All agents executed successfully with: - Proper MCP tool discovery and connection - Structured JSON output matching defined schemas - Realistic mock data for convincing demos - Token usage tracking and execution metadata 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <[email protected]>
Add bundles directory to GoReleaser archive files so demo bundles are distributed with binary releases. ## What This Enables When users download Station releases, they'll get: - Binary with embedded UI (via -tags=ui build flag) - Demo bundles directory with all agent templates - Complete out-of-the-box experience for Live Demo feature ## Release Workflow Already Configured ✅ GitHub Actions builds Docker images on version tags ✅ Images pushed to ghcr.io/cloudshipai/station:version and :latest ✅ GoReleaser builds multi-platform binaries with embedded UI ✅ Bundles now included in release archives 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <[email protected]>
Mark security, reliability, and deployments categories as available=true now that we have bundles for these categories. Users can now: - Browse 4 active categories (FinOps, Security, Reliability, Deployments) - See 'Coming Soon' placeholders for Data Platform and MLOps - Click between category tabs to view relevant bundles - Install and test bundles from all available categories 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <[email protected]>
## Embedded Bundles Added - security-investigations.tar.gz (7 agents) - security-opportunities.tar.gz (6 agents) - reliability-investigations.tar.gz (6 agents) - deployments-opportunities.tar.gz (6 agents) ## Changes - Added embed directives for 4 new bundles in demo_bundles.go - Added bundle metadata with descriptions and categories - Added 'Live Demo' to sidebar navigation with Sparkles icon - Sidebar now properly highlights when on Live Demo page ## Result API now returns 10 total bundles (6 FinOps + 4 new categories) Users can browse and install bundles from all available categories Live Demo UI fully functional with proper navigation 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <[email protected]>
Updated AWS Cost Explorer and CloudWatch mocks to match real AWS API
response structures from awslabs MCP servers.
## AWS Cost Explorer Mock
- Expanded from 3 to 7 tools matching awslabs MCP server
- Enhanced response structures to match AWS Cost Explorer API format:
* get_cost_and_usage: Added GroupDefinitions, Estimated flag, proper
metric structures with UnblendedCost, UsageQuantity
* get_cost_forecast: Added TimePeriod structure with proper date ranges
* get_cost_anomalies: Enhanced with TotalImpactPercentage, LinkedAccount
details, Contribution metrics in RootCauses
- Added 4 new tools from awslabs:
* get_today_date: Returns current date/month/year/timestamp
* get_dimension_values: Returns dimension values (SERVICE, REGION, etc.)
* get_tag_values: Returns available tag values
* get_cost_and_usage_comparisons: Compares costs between periods
* get_cost_comparison_drivers: Analyzes top cost change drivers
## AWS CloudWatch Mock
- Completely rewrote from 2 to 10 tools matching awslabs MCP server
- All response structures now match AWS CloudWatch API format:
* get_metric_data: MetricDataResults with proper AWS API structure
* get_active_alarms: MetricAlarms and CompositeAlarms matching API
* get_alarm_history: AlarmHistoryItems with HistoryData JSON
* get_logs_insight_query_results: Complete results with statistics
- Added 8 new tools from awslabs:
* Metrics: get_metric_data, get_metric_metadata, get_recommended_metric_alarms
* Alarms: get_active_alarms, get_alarm_history
* Logs: describe_log_groups, analyze_log_group, execute_log_insights_query,
get_logs_insight_query_results, cancel_logs_insight_query
Both mocks now return realistic fake data with structures that exactly
match real AWS APIs, ensuring agents can properly parse response data.
Created comprehensive FinOps bundle system with shared schemas and first production-ready bundle for AWS + Kubernetes + Grafana stacks. ## Shared Schemas - Created 5 standardized JSON schemas for FinOps output types: * [email protected]: Root cause analysis structure * [email protected]: Forecasts, COGS, unit economics * [email protected]: Optimization recommendations * [email protected]: Resource cataloging and governance * [email protected]: Cost events and alert correlation ## AWS + K8s + Grafana Bundle Complete FinOps bundle with 5 agents covering all analysis types: 1. **AWS Cost Spike RCA** (investigations): - Analyzes period-over-period cost changes - Correlates billing with Prometheus metrics - Identifies top cost drivers with evidence 2. **AWS Forecast And Budget Risk** (projections): - Generates cost forecasts using AWS Cost Explorer - Flags budget risk when p90 exceeds thresholds - Documents key assumptions 3. **Rightsizing Advisor Lite** (opportunities): - Identifies overprovisioned EC2/EKS resources - Analyzes CPU/memory utilization from Prometheus - Calculates savings estimates with actionable steps 4. **AWS Cost Inventory** (inventory): - Catalogs services, tags, and cost allocation metadata - Discovers tag coverage gaps for governance - Aggregates monthly costs by category 5. **AWS Billing Events** (events): - Captures cost spikes and anomalies - Correlates with Grafana infrastructure alerts - Creates structured event timeline All agents use proper Genkit output schemas and leverage existing mock MCP servers (aws-cost-explorer, aws-cloudwatch, grafana).
Created complete FinOps bundle for SaaS companies using AWS infrastructure and Stripe payments, covering COGS analysis, unit economics, payment fee optimization, and billing inventory. ## AWS + Stripe COGS Bundle (4 agents) 1. **Stripe Fee RCA** (investigations): - Analyzes payment fee rate changes across dimensions - Breaks down by card brand, country, payment method, 3DS status - Quantifies dispute and chargeback impact - Validates against Stripe balance data 2. **Payment Fee Optimization** (opportunities): - Identifies 3DS optimization opportunities (10-30bp savings) - Network token adoption for recurring payments (10bp savings) - ACH migration for high-value B2B transactions - Custom interchange+ pricing tier analysis - Calculates annual savings estimates 3. **COGS Rollup (No OpenCost)** (projections): - Assembles complete COGS: AWS + Stripe fees + third-party SaaS - Allocates cloud costs to services via Prometheus usage weights - Calculates gross margin and unit economics - Provides per-customer and per-transaction cost metrics 4. **Stripe Billing Inventory** (inventory): - Catalogs products, prices, customers, subscriptions - Calculates normalized MRR across billing intervals - Provides revenue operations snapshot - Tracks active customer and subscription counts All agents leverage the 25-tool Stripe mock and AWS Cost Explorer mock for realistic demo scenarios.
Created three new mock MCP servers to enable GCP and AWS Serverless FinOps bundles, with realistic fake data for billing analysis and observability. ## BigQuery Mock - execute-query tool for GCP billing export analysis - Returns realistic GCP billing data: * 30 days of cost/usage data * Multiple services (Compute Engine, GKE, Cloud Storage, BigQuery, etc.) * Multi-project breakdown (prod-api, prod-workers, staging, analytics) * SKU-level granularity with usage amounts and costs * Label/tag support for cost allocation - Proper BigQuery API response format with schema and metadata ## Datadog Mock - 4 tools matching real Datadog API: * metrics.query: Time-series metrics with aggregations * logs.query: Log search with filters and attributes * monitors.search: Monitor search by status and tags * apm.query: APM trace analysis for latency/errors - Realistic serverless scenario data: * Lambda invocations, errors, cold starts * DynamoDB throttling and timeouts * API Gateway 5xx errors * Monitor alerts with proper state transitions ## AWS Pricing Mock - 2 tools for cost optimization calculations: * query_products: Search AWS service pricing catalog * get_price_dimensions: Get detailed pricing for instance types - EC2 instance pricing data: * t3.medium/large/xlarge family (burstable) * m5.large/xlarge family (general purpose) * c5.large (compute optimized) * r5.large (memory optimized) - Hourly and monthly pricing with specifications - Enables accurate rightsizing savings calculations All three mocks registered in CLI and ready for bundle integration.
Created two additional FinOps bundles covering GCP + BigQuery and AWS Serverless + Datadog stacks, completing the FinOps bundle catalog. ## GCP + GKE + BigQuery + Grafana Bundle (3 agents) 1. **GCP Billing Delta RCA** (investigations): - Queries BigQuery billing exports for MoM cost deltas - Breaks down by service, SKU, project, and labels - Correlates with Prometheus GKE metrics (pod/node counts) - Identifies top 5-10 cost drivers with impact analysis 2. **GCP Billing Forecast** (projections): - Analyzes 90-day BigQuery billing trends - Calculates mean, p90, p10 forecasts using linear regression - Documents growth rate and seasonality assumptions - Handles GKE scaling and BigQuery usage patterns 3. **GCP Cost Inventory** (inventory): - Catalogs services, SKUs, projects, and labels - Aggregates current month costs by category - Identifies governance gaps (unlabeled high-spend projects) - Provides SKU-level usage and cost breakdown ## AWS Serverless + Datadog Bundle (3 agents) 1. **Lambda Spend RCA** (investigations): - Analyzes Lambda costs by usage type (invocations, duration, memory) - Correlates with Datadog metrics (invocations, errors, cold starts) - Uses APM traces to identify timeout and retry patterns - Quantifies cold start cost impact 2. **Serverless Tuning Advisor** (opportunities): - Memory rightsizing via Datadog memory usage analysis - Provisioned concurrency review (concurrent execution patterns) - Cold start vs cost trade-off optimization - Timeout configuration recommendations - Calculates monthly savings per optimization 3. **Lambda Forecast** (projections): - Analyzes invocation growth trends from Datadog - Calculates cost-per-invocation trajectory - Adjusts for seasonal patterns and known events - Generates mean/p90/p10 forecast with assumptions All agents use proper tool names (__execute-query, __metrics.query, etc.) and leverage the new BigQuery and Datadog mock servers.
- Fixed output schema issues in incident-root-cause-analyzer - Removed __query_resources and __get_revenue_metrics from 23 agent files - Fixed CloudWatch tool names across reliability bundles - Simplified README with focus on installation and usage - Removed beta tag - All 10 demo bundles now working at 100% success rate Breaking changes: - Removed phantom tool references (affects custom agents using these tools) Tested: - incident-root-cause-analyzer ✅ - storage-egress-spike-rca ✅ - payment-fee-optimization ✅ - guardduty-threat-analyzer ✅
840dbc0 to
7d90f79
Compare
All 10 demo bundles now properly embedded: - finops-investigations (5.4K) - finops-opportunities (5.3K) - finops-projections (5.7K) - finops-inventory (5.2K) - security-investigations (9.2K) - reliability-investigations (4.1K) - aws-stripe-cogs (4.8K) - aws-k8s-grafana (4.6K) - gcp-gke-bigquery-grafana (3.6K) - aws-serverless-datadog (3.5K)
- Created platform-specific helpers for syscall.Stat_t access - up_unix.go for Unix/Linux/macOS - up_windows.go for Windows (returns 0) - Fixes Windows build in GoReleaser
**Cross-Platform Compilation Fix**: - Removed unused syscall import from up.go causing Windows build failures - Platform-specific Docker socket group handling already extracted to up_unix.go and up_windows.go **Simplified Multi-Platform Docker Build**: - Updated GitHub Actions to build single multi-platform image (linux/amd64, linux/arm64) - Added QEMU setup for cross-platform builds - Removed manual binary extraction step - Docker build now handles architecture selection - Single image tag serves all architectures: ghcr.io/cloudshipai/station:latest **Dockerfile Multi-Arch Support**: - Added TARGETARCH and TARGETOS build arguments - Architecture-aware Docker CLI installation (x86_64 vs aarch64) - Dynamic binary selection from GoReleaser dist directory based on target platform **Before**: Separate manual steps extracting amd64 binary → single-arch Docker image **After**: Docker buildx creates manifest with both amd64 and arm64 in one image This simplifies deployment - users on Apple Silicon or ARM servers can now use the same image tag without platform-specific variants. 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <[email protected]>
Bumps [docker/build-push-action](https://github.com/docker/build-push-action) from 5 to 6. - [Release notes](https://github.com/docker/build-push-action/releases) - [Commits](docker/build-push-action@v5...v6) --- updated-dependencies: - dependency-name: docker/build-push-action dependency-version: '6' dependency-type: direct:production update-type: version-update:semver-major ... Signed-off-by: dependabot[bot] <[email protected]>
7d90f79 to
417392a
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Bumps docker/build-push-action from 5 to 6.
Release notes
Sourced from docker/build-push-action's releases.
Commits
2634353Merge pull request #1381 from docker/dependabot/npm_and_yarn/docker/actions-t...c0432d2chore: update generated content0bb1f27set builder driver and endpoint attributes for dbc summary support5f9dbf9chore(deps): Bump@docker/actions-toolkitfrom 0.61.0 to 0.62.10788c44Merge pull request #1375 from crazy-max/remove-gcraa179cae2e: remove GCR1dc7386Merge pull request #1364 from crazy-max/history-export-cmd9c9803fchore: update generated contentdb1f6c4DOCKER_BUILD_EXPORT_LEGACY env var to opt-in for legacy export721e8c7Bump@docker/actions-toolkitfrom 0.59.0 to 0.61.0You can trigger a rebase of this PR by commenting
@dependabot rebase.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)