Skip to content

Latest commit

 

History

History
122 lines (83 loc) · 2.84 KB

File metadata and controls

122 lines (83 loc) · 2.84 KB

Runtime Workspace

  • Path: docs/workspace.md
  • Version: 20260514

Purpose

This document describes how @flancer32/github-flows-app uses the filesystem workspace passed to @teqfw/github-flows.

Workspace Root

The application reads WORKSPACE_ROOT from .env:

WORKSPACE_ROOT=./var/work

The path is passed to @teqfw/github-flows as the runtime workspaceRoot.

The application does not own the internal runtime meaning of this directory. It only supplies the location and may expose selected subdirectories through the read-only static surface.

Recommended Layout

For a local deployment, the workspace normally contains:

var/work/
  cfg/
  log/
  app.log

cfg/ contains profile fragments and prompts consumed by @teqfw/github-flows.

log/ contains runtime-produced event archives and observational indexes.

app.log may contain stdout and stderr from the long-running application process when configured through systemd.

Profile Configuration

The runtime package reads profile fragments from:

WORKSPACE_ROOT/cfg/

A minimal profile tree may start as:

cfg/
  profile.json
  repos/
    owner/
      repository/
        issues-opened/
          profile.json
          prompt.md

Directory names are organizational. Runtime matching is based on trigger fields inside profile.json, not on directory names.

Read the runtime package overview before creating production profiles:

node_modules/@teqfw/github-flows/docs/overview.md

Follow the documentation map in that package for the current profile and trigger guides.

Logs

The runtime package writes admitted-event archives under the workspace log tree.

The canonical runtime log path is owned by @teqfw/github-flows:

WORKSPACE_ROOT/log/run/{owner}/{repo}/{eventId}/

The application may also write a process log such as:

WORKSPACE_ROOT/app.log

Use process log rotation for app.log. Do not treat runtime event archives as application-owned state.

Static Inspection Links

The public web/ directory may contain symbolic links to workspace subdirectories:

web/cfg -> ../var/work/cfg
web/log -> ../var/work/log

These links are for read-only inspection. When exposed through Apache or another public web server, protect them with authentication.

The setup guide setup/ubuntu/apache.md covers this deployment shape.

Credentials

Do not store long-lived credentials under WORKSPACE_ROOT.

The workspace may be exposed through protected operational views and may contain per-run files. Store GitHub tokens, Codex auth state, and other long-lived secrets outside the workspace and mount them into agent containers only when a selected profile requires them.

Use setup/ubuntu/auth.md for the credential layout used by the provided Codex agent image.