feat(port-forward): default to control-plane transport#212
Open
feat(port-forward): default to control-plane transport#212
Conversation
Member
Author
Review PromptPlease review this pull request and provide feedback on:
Be constructive and helpful in your feedback. Specific rules for this codebase: General rules
PII in Logs - HIGH PRIORITYFlag any code that logs user PII (Personally Identifiable Information). This is a critical security and compliance issue. Check for and reject:
Require instead:
Example violations to flag: logger.info(f"User {user.email} logged in") # BAD
logging.warning(f"Failed for {body.email}") # BAD
print(f"Contact sent: {data}") # BAD if data contains email
discord_message += f"Email: {user.email}" # BADCorrect patterns: logger.info(f"User auth_id={user.auth_id} logged in") # GOOD
logger.warning("Failed login", {"auth_id": user.auth_id}) # GOODi18n rules
|
Member
Author
|
Implemented the control-plane What changed:
Validation run on the current branch head:
Review notes:
PR: #212 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
TL;DR
This turns
spz port-forwardinto a control-plane feature: it now prefers authenticated WebSocket transport over the Spritz API on443, keeps SSH as an explicit fallback, and hardens the new tunnel path for mixed-rollout and dropped-connection cases.Summary
GET /api/spritzes/:name/port-forwardin the API and reuse pod port-forwarding for both SSH and control-plane transportsspz port-forwardprefer WebSocket transport, while automatically falling back to legacy SSH when the control-plane endpoint is unavailableReview focus
Validation
cd /Users/onur/repos/spritz/api && go test ./...pnpm --dir /Users/onur/repos/spritz/cli test -- test/help.test.ts test/port-forward.test.tspnpm --dir /Users/onur/repos/spritz/cli test -- test/port-forward.test.tspnpm --dir /Users/onur/repos/spritz/cli testpnpm --dir /Users/onur/repos/spritz/cli buildcd /Users/onur/repos/spritz && npx -y @simpledoc/simpledoc checktcodex review --base mainon earlier heads surfaced and drove fixes for startup validation, rollout fallback, EOF handling, and dropped-tunnel cleanup; the final rerun hit a local Codex client transport failure (http://127.0.0.1:8787/responses) before completion, so I also triggered PR-side AI reviewtcx pr review --pr 212 --repo textcortex/spritz --watchtimed out without Codex/Claude replies on the latest headtcx pr can-merge --pr 212 --repo textcortex/spritz