mirror of
https://github.com/paperclipai/paperclip
synced 2026-04-25 17:25:15 +02:00
## Thinking Path > - Paperclip orchestrates AI agents for zero-human companies > - The environments subsystem already models execution environments, but before this branch there was no end-to-end SSH-backed runtime path for agents to actually run work against a remote box > - That meant agents could be configured around environment concepts without a reliable way to execute adapter sessions remotely, sync workspace state, and preserve run context across supported adapters > - We also need environment selection to participate in normal Paperclip control-plane behavior: agent defaults, project/issue selection, route validation, and environment probing > - Because this capability is still experimental, the UI surface should be easy to hide and easy to remove later without undoing the underlying implementation > - This pull request adds SSH environment execution support across the runtime, adapters, routes, schema, and tests, then puts the visible environment-management UI behind an experimental flag > - The benefit is that we can validate real SSH-backed agent execution now while keeping the user-facing controls safely gated until the feature is ready to come out of experimentation ## What Changed - Added SSH-backed execution target support in the shared adapter runtime, including remote workspace preparation, skill/runtime asset sync, remote session handling, and workspace restore behavior after runs. - Added SSH execution coverage for supported local adapters, plus remote execution tests across Claude, Codex, Cursor, Gemini, OpenCode, and Pi. - Added environment selection and environment-management backend support needed for SSH execution, including route/service work, validation, probing, and agent default environment persistence. - Added CLI support for SSH environment lab verification and updated related docs/tests. - Added the `enableEnvironments` experimental flag and gated the environment UI behind it on company settings, agent configuration, and project configuration surfaces. ## Verification - `pnpm exec vitest run packages/adapters/claude-local/src/server/execute.remote.test.ts packages/adapters/cursor-local/src/server/execute.remote.test.ts packages/adapters/gemini-local/src/server/execute.remote.test.ts packages/adapters/opencode-local/src/server/execute.remote.test.ts packages/adapters/pi-local/src/server/execute.remote.test.ts` - `pnpm exec vitest run server/src/__tests__/environment-routes.test.ts` - `pnpm exec vitest run server/src/__tests__/instance-settings-routes.test.ts` - `pnpm exec vitest run ui/src/lib/new-agent-hire-payload.test.ts ui/src/lib/new-agent-runtime-config.test.ts` - `pnpm -r typecheck` - `pnpm build` - Manual verification on a branch-local dev server: - enabled the experimental flag - created an SSH environment - created a Linux Claude agent using that environment - confirmed a run executed on the Linux box and synced workspace changes back ## Risks - Medium: this touches runtime execution flow across multiple adapters, so regressions would likely show up in remote session setup, workspace sync, or environment selection precedence. - The UI flag reduces exposure, but the underlying runtime and route changes are still substantial and rely on migration correctness. - The change set is broad across adapters, control-plane services, migrations, and UI gating, so review should pay close attention to environment-selection precedence and remote workspace lifecycle behavior. ## Model Used - OpenAI Codex via Paperclip's local Codex adapter, GPT-5-class coding model with tool use and code execution in the local repo workspace. The local adapter does not surface a more specific public model version string in this branch workflow. ## Checklist - [x] I have included a thinking path that traces from project context to this change - [x] I have specified the model used (with version and capability details) - [x] I have checked ROADMAP.md and confirmed this PR does not duplicate planned core work - [x] I have run tests locally and they pass - [x] I have added or updated tests where applicable - [ ] If this change affects the UI, I have included before/after screenshots - [x] I have updated relevant documentation to reflect my changes - [x] I have considered and documented any risks above - [x] I will address all Greptile and reviewer comments before requesting merge
451 lines
14 KiB
TypeScript
451 lines
14 KiB
TypeScript
import express from "express";
|
|
import request from "supertest";
|
|
import { beforeEach, describe, expect, it, vi } from "vitest";
|
|
|
|
const mockProjectService = vi.hoisted(() => ({
|
|
create: vi.fn(),
|
|
createWorkspace: vi.fn(),
|
|
getById: vi.fn(),
|
|
listWorkspaces: vi.fn(),
|
|
resolveByReference: vi.fn(),
|
|
update: vi.fn(),
|
|
updateWorkspace: vi.fn(),
|
|
}));
|
|
|
|
const mockExecutionWorkspaceService = vi.hoisted(() => ({
|
|
getById: vi.fn(),
|
|
update: vi.fn(),
|
|
}));
|
|
|
|
const mockSecretService = vi.hoisted(() => ({
|
|
normalizeEnvBindingsForPersistence: vi.fn(),
|
|
}));
|
|
const mockEnvironmentService = vi.hoisted(() => ({
|
|
getById: vi.fn(),
|
|
}));
|
|
|
|
const mockWorkspaceOperationService = vi.hoisted(() => ({}));
|
|
const mockLogActivity = vi.hoisted(() => vi.fn());
|
|
const mockGetTelemetryClient = vi.hoisted(() => vi.fn());
|
|
const mockAssertCanManageProjectWorkspaceRuntimeServices = vi.hoisted(() => vi.fn());
|
|
const mockAssertCanManageExecutionWorkspaceRuntimeServices = vi.hoisted(() => vi.fn());
|
|
|
|
function registerModuleMocks() {
|
|
vi.doMock("../telemetry.js", () => ({
|
|
getTelemetryClient: mockGetTelemetryClient,
|
|
}));
|
|
|
|
vi.doMock("../services/index.js", () => ({
|
|
executionWorkspaceService: () => mockExecutionWorkspaceService,
|
|
environmentService: () => mockEnvironmentService,
|
|
logActivity: mockLogActivity,
|
|
projectService: () => mockProjectService,
|
|
secretService: () => mockSecretService,
|
|
workspaceOperationService: () => mockWorkspaceOperationService,
|
|
}));
|
|
|
|
vi.doMock("../services/workspace-runtime.js", () => ({
|
|
cleanupExecutionWorkspaceArtifacts: vi.fn(),
|
|
startRuntimeServicesForWorkspaceControl: vi.fn(),
|
|
stopRuntimeServicesForExecutionWorkspace: vi.fn(),
|
|
stopRuntimeServicesForProjectWorkspace: vi.fn(),
|
|
}));
|
|
|
|
vi.doMock("../routes/workspace-runtime-service-authz.js", () => ({
|
|
assertCanManageProjectWorkspaceRuntimeServices: mockAssertCanManageProjectWorkspaceRuntimeServices,
|
|
assertCanManageExecutionWorkspaceRuntimeServices: mockAssertCanManageExecutionWorkspaceRuntimeServices,
|
|
}));
|
|
}
|
|
|
|
async function createProjectApp(actor: Record<string, unknown>) {
|
|
const { projectRoutes } = await import("../routes/projects.js");
|
|
const { errorHandler } = await import("../middleware/index.js");
|
|
const app = express();
|
|
app.use(express.json());
|
|
app.use((req, _res, next) => {
|
|
(req as any).actor = actor;
|
|
next();
|
|
});
|
|
app.use("/api", projectRoutes({} as any));
|
|
app.use(errorHandler);
|
|
return app;
|
|
}
|
|
|
|
async function createExecutionWorkspaceApp(actor: Record<string, unknown>) {
|
|
const { executionWorkspaceRoutes } = await import("../routes/execution-workspaces.js");
|
|
const { errorHandler } = await import("../middleware/index.js");
|
|
const app = express();
|
|
app.use(express.json());
|
|
app.use((req, _res, next) => {
|
|
(req as any).actor = actor;
|
|
next();
|
|
});
|
|
app.use("/api", executionWorkspaceRoutes({} as any));
|
|
app.use(errorHandler);
|
|
return app;
|
|
}
|
|
|
|
function buildProject(overrides: Record<string, unknown> = {}) {
|
|
return {
|
|
id: "project-1",
|
|
companyId: "company-1",
|
|
urlKey: "project-1",
|
|
goalId: null,
|
|
goalIds: [],
|
|
goals: [],
|
|
name: "Project",
|
|
description: null,
|
|
status: "backlog",
|
|
leadAgentId: null,
|
|
targetDate: null,
|
|
color: null,
|
|
env: null,
|
|
pauseReason: null,
|
|
pausedAt: null,
|
|
executionWorkspacePolicy: null,
|
|
codebase: null,
|
|
workspaces: [],
|
|
primaryWorkspace: null,
|
|
archivedAt: null,
|
|
createdAt: new Date(),
|
|
updatedAt: new Date(),
|
|
...overrides,
|
|
};
|
|
}
|
|
|
|
function buildExecutionWorkspace(overrides: Record<string, unknown> = {}) {
|
|
return {
|
|
id: "workspace-1",
|
|
companyId: "company-1",
|
|
projectId: "project-1",
|
|
projectWorkspaceId: null,
|
|
sourceIssueId: null,
|
|
mode: "isolated_workspace",
|
|
strategyType: "git_worktree",
|
|
name: "Workspace",
|
|
status: "active",
|
|
cwd: "/tmp/workspace",
|
|
repoUrl: null,
|
|
baseRef: "main",
|
|
branchName: "feature/test",
|
|
providerType: "git_worktree",
|
|
providerRef: null,
|
|
derivedFromExecutionWorkspaceId: null,
|
|
lastUsedAt: new Date(),
|
|
openedAt: new Date(),
|
|
closedAt: null,
|
|
cleanupEligibleAt: null,
|
|
cleanupReason: null,
|
|
config: null,
|
|
metadata: null,
|
|
runtimeServices: [],
|
|
createdAt: new Date(),
|
|
updatedAt: new Date(),
|
|
...overrides,
|
|
};
|
|
}
|
|
|
|
describe("workspace runtime service route authorization", () => {
|
|
const projectId = "11111111-1111-4111-8111-111111111111";
|
|
const workspaceId = "22222222-2222-4222-8222-222222222222";
|
|
const executionWorkspaceId = "33333333-3333-4333-8333-333333333333";
|
|
|
|
beforeEach(() => {
|
|
vi.resetModules();
|
|
vi.doUnmock("../telemetry.js");
|
|
vi.doUnmock("../services/index.js");
|
|
vi.doUnmock("../services/workspace-runtime.js");
|
|
vi.doUnmock("../routes/workspace-runtime-service-authz.js");
|
|
vi.doUnmock("../routes/projects.js");
|
|
vi.doUnmock("../routes/execution-workspaces.js");
|
|
vi.doUnmock("../routes/authz.js");
|
|
vi.doUnmock("../middleware/index.js");
|
|
registerModuleMocks();
|
|
vi.resetAllMocks();
|
|
mockEnvironmentService.getById.mockReset();
|
|
mockSecretService.normalizeEnvBindingsForPersistence.mockImplementation(async (_companyId, env) => env);
|
|
mockProjectService.resolveByReference.mockResolvedValue({ ambiguous: false, project: null });
|
|
mockProjectService.create.mockResolvedValue(buildProject());
|
|
mockProjectService.update.mockResolvedValue(buildProject());
|
|
mockProjectService.createWorkspace.mockResolvedValue({
|
|
id: workspaceId,
|
|
companyId: "company-1",
|
|
projectId,
|
|
name: "Workspace",
|
|
sourceType: "local_path",
|
|
cwd: "/tmp/project",
|
|
repoUrl: null,
|
|
repoRef: null,
|
|
defaultRef: null,
|
|
visibility: "default",
|
|
setupCommand: null,
|
|
cleanupCommand: null,
|
|
remoteProvider: null,
|
|
remoteWorkspaceRef: null,
|
|
sharedWorkspaceKey: null,
|
|
metadata: null,
|
|
runtimeConfig: null,
|
|
isPrimary: false,
|
|
runtimeServices: [],
|
|
createdAt: new Date(),
|
|
updatedAt: new Date(),
|
|
});
|
|
mockProjectService.listWorkspaces.mockResolvedValue([{
|
|
id: workspaceId,
|
|
companyId: "company-1",
|
|
projectId,
|
|
name: "Workspace",
|
|
sourceType: "local_path",
|
|
cwd: "/tmp/project",
|
|
repoUrl: null,
|
|
repoRef: null,
|
|
defaultRef: null,
|
|
visibility: "default",
|
|
setupCommand: null,
|
|
cleanupCommand: null,
|
|
remoteProvider: null,
|
|
remoteWorkspaceRef: null,
|
|
sharedWorkspaceKey: null,
|
|
metadata: null,
|
|
runtimeConfig: null,
|
|
isPrimary: false,
|
|
runtimeServices: [],
|
|
createdAt: new Date(),
|
|
updatedAt: new Date(),
|
|
}]);
|
|
mockProjectService.updateWorkspace.mockResolvedValue({
|
|
id: workspaceId,
|
|
companyId: "company-1",
|
|
projectId,
|
|
name: "Workspace",
|
|
sourceType: "local_path",
|
|
cwd: "/tmp/project",
|
|
repoUrl: null,
|
|
repoRef: null,
|
|
defaultRef: null,
|
|
visibility: "default",
|
|
setupCommand: null,
|
|
cleanupCommand: null,
|
|
remoteProvider: null,
|
|
remoteWorkspaceRef: null,
|
|
sharedWorkspaceKey: null,
|
|
metadata: null,
|
|
runtimeConfig: null,
|
|
isPrimary: false,
|
|
runtimeServices: [],
|
|
createdAt: new Date(),
|
|
updatedAt: new Date(),
|
|
});
|
|
mockExecutionWorkspaceService.update.mockResolvedValue(buildExecutionWorkspace());
|
|
mockAssertCanManageProjectWorkspaceRuntimeServices.mockResolvedValue(undefined);
|
|
mockAssertCanManageExecutionWorkspaceRuntimeServices.mockResolvedValue(undefined);
|
|
});
|
|
|
|
it("rejects agent callers for project workspace runtime service mutations when workspace auth denies access", async () => {
|
|
const { forbidden } = await import("../errors.js");
|
|
mockProjectService.getById.mockResolvedValue(buildProject({
|
|
id: projectId,
|
|
workspaces: [{
|
|
id: workspaceId,
|
|
companyId: "company-1",
|
|
projectId,
|
|
name: "Workspace",
|
|
sourceType: "local_path",
|
|
cwd: "/tmp/project",
|
|
repoUrl: null,
|
|
repoRef: null,
|
|
defaultRef: null,
|
|
visibility: "default",
|
|
setupCommand: null,
|
|
cleanupCommand: null,
|
|
remoteProvider: null,
|
|
remoteWorkspaceRef: null,
|
|
sharedWorkspaceKey: null,
|
|
metadata: null,
|
|
runtimeConfig: null,
|
|
isPrimary: false,
|
|
runtimeServices: [],
|
|
createdAt: new Date(),
|
|
updatedAt: new Date(),
|
|
}],
|
|
}));
|
|
mockAssertCanManageProjectWorkspaceRuntimeServices.mockRejectedValue(
|
|
forbidden("Missing permission to manage workspace runtime services"),
|
|
);
|
|
const app = await createProjectApp({
|
|
type: "agent",
|
|
agentId: "agent-1",
|
|
companyId: "company-1",
|
|
source: "agent_key",
|
|
runId: "run-1",
|
|
});
|
|
|
|
const res = await request(app)
|
|
.post(`/api/projects/${projectId}/workspaces/${workspaceId}/runtime-services/start`)
|
|
.send({});
|
|
|
|
expect(res.status).toBe(403);
|
|
expect(res.body.error).toContain("Missing permission");
|
|
expect(mockProjectService.getById).toHaveBeenCalledWith(projectId);
|
|
expect(mockAssertCanManageProjectWorkspaceRuntimeServices).toHaveBeenCalled();
|
|
}, 15000);
|
|
|
|
it("rejects agent callers that create project execution workspace commands", async () => {
|
|
const app = await createProjectApp({
|
|
type: "agent",
|
|
agentId: "agent-1",
|
|
companyId: "company-1",
|
|
source: "agent_key",
|
|
runId: "run-1",
|
|
});
|
|
|
|
const res = await request(app)
|
|
.post("/api/companies/company-1/projects")
|
|
.send({
|
|
name: "Exploit",
|
|
executionWorkspacePolicy: {
|
|
enabled: true,
|
|
workspaceStrategy: {
|
|
type: "git_worktree",
|
|
provisionCommand: "touch /tmp/paperclip-rce",
|
|
},
|
|
},
|
|
});
|
|
|
|
expect(res.status).toBe(403);
|
|
expect(res.body.error).toContain("host-executed workspace commands");
|
|
expect(mockProjectService.create).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it("rejects agent callers that update project workspace cleanup commands", async () => {
|
|
mockProjectService.getById.mockResolvedValue(buildProject());
|
|
const app = await createProjectApp({
|
|
type: "agent",
|
|
agentId: "agent-1",
|
|
companyId: "company-1",
|
|
source: "agent_key",
|
|
runId: "run-1",
|
|
});
|
|
|
|
const res = await request(app)
|
|
.patch(`/api/projects/${projectId}/workspaces/${workspaceId}`)
|
|
.send({
|
|
cleanupCommand: "rm -rf /tmp/paperclip-rce",
|
|
});
|
|
|
|
expect(res.status).toBe(403);
|
|
expect(res.body.error).toContain("host-executed workspace commands");
|
|
expect(mockProjectService.updateWorkspace).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it("allows board callers through the project workspace runtime auth gate", async () => {
|
|
mockProjectService.getById.mockResolvedValue(null);
|
|
const app = await createProjectApp({
|
|
type: "board",
|
|
userId: "board-1",
|
|
companyIds: ["company-1"],
|
|
source: "session",
|
|
isInstanceAdmin: false,
|
|
});
|
|
|
|
const res = await request(app)
|
|
.post(`/api/projects/${projectId}/workspaces/${workspaceId}/runtime-services/start`)
|
|
.send({});
|
|
|
|
expect(res.status).toBe(404);
|
|
expect(res.body.error).toContain("Project not found");
|
|
expect(mockProjectService.getById).toHaveBeenCalledWith(projectId);
|
|
});
|
|
|
|
it("rejects agent callers for execution workspace runtime service mutations when workspace auth denies access", async () => {
|
|
const { forbidden } = await import("../errors.js");
|
|
mockExecutionWorkspaceService.getById.mockResolvedValue(buildExecutionWorkspace({ id: executionWorkspaceId }));
|
|
mockAssertCanManageExecutionWorkspaceRuntimeServices.mockRejectedValue(
|
|
forbidden("Missing permission to manage workspace runtime services"),
|
|
);
|
|
const app = await createExecutionWorkspaceApp({
|
|
type: "agent",
|
|
agentId: "agent-1",
|
|
companyId: "company-1",
|
|
source: "agent_key",
|
|
runId: "run-1",
|
|
});
|
|
|
|
const res = await request(app)
|
|
.post(`/api/execution-workspaces/${executionWorkspaceId}/runtime-services/restart`)
|
|
.send({});
|
|
|
|
expect(res.status).toBe(403);
|
|
expect(res.body.error).toContain("Missing permission");
|
|
expect(mockExecutionWorkspaceService.getById).toHaveBeenCalledWith(executionWorkspaceId);
|
|
expect(mockAssertCanManageExecutionWorkspaceRuntimeServices).toHaveBeenCalled();
|
|
}, 15000);
|
|
|
|
it("rejects agent callers that patch execution workspace command config", async () => {
|
|
mockExecutionWorkspaceService.getById.mockResolvedValue(buildExecutionWorkspace({ id: executionWorkspaceId }));
|
|
const app = await createExecutionWorkspaceApp({
|
|
type: "agent",
|
|
agentId: "agent-1",
|
|
companyId: "company-1",
|
|
source: "agent_key",
|
|
runId: "run-1",
|
|
});
|
|
|
|
const res = await request(app)
|
|
.patch(`/api/execution-workspaces/${executionWorkspaceId}`)
|
|
.send({
|
|
config: {
|
|
cleanupCommand: "rm -rf /tmp/paperclip-rce",
|
|
},
|
|
});
|
|
|
|
expect(res.status).toBe(403);
|
|
expect(res.body.error).toContain("host-executed workspace commands");
|
|
expect(mockExecutionWorkspaceService.update).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it("rejects agent callers that smuggle execution workspace commands through metadata.config", async () => {
|
|
mockExecutionWorkspaceService.getById.mockResolvedValue(buildExecutionWorkspace({ id: executionWorkspaceId }));
|
|
const app = await createExecutionWorkspaceApp({
|
|
type: "agent",
|
|
agentId: "agent-1",
|
|
companyId: "company-1",
|
|
source: "agent_key",
|
|
runId: "run-1",
|
|
});
|
|
|
|
const res = await request(app)
|
|
.patch(`/api/execution-workspaces/${executionWorkspaceId}`)
|
|
.send({
|
|
metadata: {
|
|
config: {
|
|
provisionCommand: "touch /tmp/paperclip-rce",
|
|
},
|
|
},
|
|
});
|
|
|
|
expect(res.status).toBe(403);
|
|
expect(res.body.error).toContain("host-executed workspace commands");
|
|
expect(mockExecutionWorkspaceService.update).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it("allows board callers through the execution workspace runtime auth gate", async () => {
|
|
mockExecutionWorkspaceService.getById.mockResolvedValue(null);
|
|
const app = await createExecutionWorkspaceApp({
|
|
type: "board",
|
|
userId: "board-1",
|
|
companyIds: ["company-1"],
|
|
source: "session",
|
|
isInstanceAdmin: false,
|
|
});
|
|
|
|
const res = await request(app)
|
|
.post(`/api/execution-workspaces/${executionWorkspaceId}/runtime-services/restart`)
|
|
.send({});
|
|
|
|
expect(res.status).toBe(404);
|
|
expect(res.body.error).toContain("Execution workspace not found");
|
|
expect(mockExecutionWorkspaceService.getById).toHaveBeenCalledWith(executionWorkspaceId);
|
|
});
|
|
});
|