Nushell-via-hero_proc integration + admin access control #8
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Overview
Wire hero_codescalers features to execute through nushell Actions/Jobs in hero_proc, and lock the dashboard behind an IPv6 admin whitelist stored in hero_proc secrets.
Child Issues
Closed — all four children done
nu→nushellinterpreter mapping; anyhow chain unwrap inrpc_handler)jobs.cleanupRPC + CLI subcommand; admin-gated;dry_run; predicate filters on kind/target/actor/older_than_ms; 7 unit testsADMIN_SECRETSis "admin hosts" not "admin users"service_codescalers --rootand refuses per-user startBonus fixes surfaced during this work
spec.tagswere not being copied ontoJob.tagsatjob.createtime, soJobSummary.tagswas alwaysnulland tag filters returned nothing. One-line fix inrpc/job.rshandle_create. Without this,jobs.cleanup(#10) couldn't find anything to clean.disk_total_gb/disk_used_gb/disk_pctin thestatsRPC and sidebar UI. Surfaced while looking at the system-stats panel during #12 verification.End-to-end behaviour now
On kristof4:
service.start service_router) enqueues a tagged hero_proc job; it shows up in the codescalers Jobs tab viajobs.list.jobs.cleanup --dry-runenumerates matching jobs and their unique action specs; without--dry-runit bulk-deletes both.hero_procrow count drops accordingly.Closing.