pyro-mcp/runtime_sources/linux-x86_64
Thales Maciel fc72fcd3a1 Add guest-only workspace secrets
Add explicit workspace secrets across the CLI, SDK, and MCP, with create-time secret definitions and per-call secret-to-env mapping for exec, shell open, and service start. Persist only safe secret metadata in workspace records, materialize secret files under /run/pyro-secrets, and redact secret values from exec output, shell reads, service logs, and surfaced errors.

Fix the remaining real-guest shell gap by shipping bundled guest init alongside the guest agent and patching both into guest-backed workspace rootfs images before boot. The new init mounts devpts so PTY shells work on Firecracker guests, while reset continues to recreate the sandbox and re-materialize secrets from stored task-local secret material.

Validation: uv lock; UV_CACHE_DIR=.uv-cache make check; UV_CACHE_DIR=.uv-cache make dist-check; and a real guest-backed Firecracker smoke covering workspace create with secrets, secret-backed exec, shell, service, reset, and delete.
2026-03-12 15:43:34 -03:00
..
bin Add real runtime materialization pipeline and bundle artifacts 2026-03-06 19:26:29 -03:00
guest Add guest-only workspace secrets 2026-03-12 15:43:34 -03:00
packages Finalize guest boot and exec runtime updates 2026-03-07 17:09:21 -03:00
profiles Add real runtime materialization pipeline and bundle artifacts 2026-03-06 19:26:29 -03:00
scripts Add guest-only workspace secrets 2026-03-12 15:43:34 -03:00
runtime.lock.json Add seeded task workspace creation 2026-03-11 21:45:38 -03:00