feat(agentworkforce): integration-verifier persona + skills for end-to-end Relayfile integration verification#169
Conversation
… Relayfile integration verification Adds a dedicated AgentWorkforce persona that drives the same end-to-end verification methodology proven against rw_fc7b534b during the May 2026 discovery-chain rollout (cloud#745 → #756 → #761 + #771 + the gaps #778, #780, #766, #775 we surfaced and filed honestly). Seven-phase flow per provider × workspace: auth → connect → sync → tree-shape → discovery (.adapter.md + .schema.json + .create.example.json) → outbound writeback round-trip → webhook-driven inbound sync. What landed: - .agentworkforce/workforce/personas/integration-verifier.json — claude harness, claude-opus-4-7, high reasoning, 1800s timeout, permissions.mode = bypassPermissions, three skills referenced. - .agentworkforce/workforce/skills/integration-verification-playbook/SKILL.md — canonical methodology: the seven phases, the don't-guess-payloads rule, the /join latency workaround (cloud#766), the schema-validated > LAYOUT-documented > skip target-selection rule, the test-marker conventions for outward-facing writes, the recurring failure-pattern table (cloud#778 empty schemas masked by writeManagedFile dedup; cloud#780 missing edit rules; cloud#766 control-plane latency; cloud#762 Worker bundle drift; cloud#736 connection-ingress; cloud#775 latent dedup at parity-enablement), and the issue-filing template. - .agentworkforce/workforce/skills/relayfile-architecture-cheatsheet/SKILL.md — compressed architecture model: api.relayfile.dev vs agentrelay.com/cloud, workspace-token vs cloud-token, the discovery chain, the single ADAPTERS registry, the file-native writeback contract (canonical-edit vs non-canonical-create vs receipt pointer), the digest pipeline + the internal-path filter from cloud#771, Worker import safety (B1), and the Phase-0 acceptance-against-prod semantics. Skills array also references the prpm-published canonical setup walkthrough @agent-relay/setting-up-relayfile as the operator-facing source of truth, with an explicit tiebreaker (prpm skill wins on CLI mechanics; the playbook stays authoritative for verification methodology + failure patterns). Validates against workforce/packages/persona-kit/schemas/persona.schema.json via jsonschema. The CLI installs via: agentworkforce agent integration-verifier Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
|
Warning Rate limit exceeded
You’ve run out of usage credits. Purchase more in the billing tab. ⌛ How to resolve this issue?After the wait time has elapsed, a review can be triggered using the We recommend that you space out your commits to avoid hitting the rate limit. 🚦 How do rate limits work?CodeRabbit enforces hourly rate limits for each developer per organization. Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout. Please see our FAQ for further information. ℹ️ Review info⚙️ Run configurationConfiguration used: Organization UI Review profile: CHILL Plan: Pro Plus Run ID: 📒 Files selected for processing (3)
✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
Summary
Adds a dedicated AgentWorkforce persona —
integration-verifier— that drives the same end-to-end verification methodology we proved againstrw_fc7b534bduring the May 2026 discovery-chain rollout (cloud#745 → #756 → #761 + #771, plus the gaps cloud#766, #775, #778, #780 we surfaced and filed honestly).Invoked via:
or scripted with a kickoff task description (e.g. "verify gmail + gcal full-fledged on rw_fc7b534b").
Why this exists
A merged PR is not a verified integration. Across the May 2026 effort the following gaps were only visible by actually exercising the end-to-end flow on a real workspace — never by reading PR descriptions:
writeManagedFilebyte-stable dedup) — cloud#778.backfilled:true.pgfrom a sibling import, breaking deploys — cloud#762.Each of these passed CI. Each was caught only by running the full flow. The persona locks in that the full flow gets run on every new integration.
What's in the PR (3 files, purely additive)
integration-verifier.jsonclaude, modelclaude-opus-4-7, high reasoning, 1800s timeout.permissions.mode = bypassPermissions— auto-approve every tool call (the model-side discipline lives in the system prompt, not the harness allow-list).@agent-relay/setting-up-relayfile(prpm — installed on session boot) — the canonical operator-facing setup walkthrough; authoritative for CLI mechanics.local/integration-verification-playbook— the seven-phase methodology + failure-pattern table + issue-filing template (live ledger).local/relayfile-architecture-cheatsheet— compressed architecture model so the agent doesn't re-derive it.claudeMdContentencodes operating principles: don't guess payloads, schema-validated > LAYOUT-documented > skip, outward-facing safety (test markers, throwaway targets), honest issue-filing, don't bypass real CI signals, no autonomous merges without explicit operator authorization.integration-verification-playbook/SKILL.mdThe seven-phase flow per provider × workspace:
/join-slow workaround (direct curl with--max-time 120+ persist to~/.relayfile/credentials.json).relayfile integration connect …, verifyoauth.connected:true,connectionMatched:true, realcurrentConnectionIddirectly against the cloud status endpoint.initialSync.state:"complete", confirm record/index/alias trees exist (not justLAYOUT.md/_index.json)./<provider>/LAYOUT.md, spot-check canonical records + alias subtrees match what's documented.POST /sync/refresh, read each writable resource's.schema.json+.create.example.json+.adapter.md; watch for the cloud#778 pattern (backfilled:truebutproperties:{}with stalelastEditedAt).[relayfile writeback test <ISO-utc>]marker; verify the op completed + the round-trip; watch for the cloud#780 pattern ("No <provider> writeback rule matched <path>").Plus a recurring-failure-pattern table with the precedent issue for each class, the issue-filing template, and test-marker conventions. The file is explicitly the live ledger — new failure modes get appended.
relayfile-architecture-cheatsheet/SKILL.mdCompressed working-memory model so the verifier doesn't re-derive the architecture each session:
nango-webhook-router → record-writer.ts writeBatchToRelayfile → materializeProviderContractand the singleADAPTERSregistry.Validation
../workforce/packages/persona-kit/schemas/persona.schema.json(jsonschema.validate ✓).permissions.mode: "bypassPermissions"is in$defs.PermissionMode.enum.sourcefields resolve: prpm skill installs at session boot; both local SKILL.md files exist at the declared paths.agentworkforce agent integration-verifierinstalls cleanly (nocp: SKILL.md: No such file or directoryfailures — the directory-per-skill layout matches what the CLI's plugin installer expects).How it gets used
For a new integration verification (the immediate use case is Gmail + Google Calendar):
Then provide the kickoff TASK_DESCRIPTION: which provider(s), which workspace id, smoke vs full-fledged scope. The agent loads all three skills, runs the seven phases, captures empirical evidence, files issues per the template for any real gap, and returns a verification matrix.
🤖 Generated with Claude Code