Commit Graph

1387 Commits

Author SHA1 Message Date
master
607ce619fe feat(concelier): multi-sprint batch (mirror domain + advisory sources + durable runtime + credentials)
Bundled commit covering pre-session work from multiple Concelier sprints
already archived or in-flight:
- SPRINT_20260419_006: mirror domain / source key validation
- SPRINT_20260419_029 / 030: durable jobs orchestrator runtime + endpoint verification
- SPRINT_20260421_001: advisory source projection truthful counts
- SPRINT_20260421_002: FE advisory source consistency (connector-side bits)
- SPRINT_20260421_003: advisory connector runtime alignment
- SPRINT_20260422_003: source credential entry paths (in-flight)

Includes connector internals (ACSC / Adobe / CERT-BUND / Chromium / Cisco /
CVE-KEV / GHSA / JVN / KISA / MSRC / Oracle / Ubuntu), source management
endpoints, mirror domain management, federation endpoints, topology setup,
job registration, and associated dossier updates under
docs/modules/concelier/.

This commit groups ~229 file changes that accumulated across the above
sprints; individual changes are preserved at file granularity so blame
remains useful.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-22 16:05:53 +03:00
master
99a5ae923a chore(qa): notify compat rebuild evidence + archive completed sprints
SPRINT_20260422_001 (Notify compat surface restoration) — closes
NOTIFY-COMPAT-003 final criterion. notify-web rebuilt, 7/7 gateway probes
green post-rebuild (8th returns contracted 501 notify_overrides_not_supported).
Browser replay via direct Node+Playwright driver (MCP bridge rejected the
self-signed cert) confirmed Dashboard/Channels/Quiet Hours/Overrides/
Escalation/Throttle tabs render without runtime-unavailable banners. All 3
tasks DONE.

SPRINT_20260421_003 (Concelier advisory connector runtime alignment) —
all 7 tasks were already DONE before this session; archival is purely
administrative.

Evidence bundle at docs/qa/notify-compat-20260422/ includes EVIDENCE.md,
verify.mjs + verify_with_token.mjs, verify-results.json, and screenshots
for each verified tab.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-22 16:05:11 +03:00
master
563079fc69 feat(evidence-locker): Decision Capsule sealing pipeline
Builds the previously-aspirational Capsule create/seal/verify/export/replay
pipeline. Unblocks the former CAPSULE-001 task that lived (BLOCKED) in
SPRINT_20260408_005; carried over as CAPSULE-AUDIT-001 inside the new
SPRINT_20260422_002 (created + archived in same pass).

Pipeline:
- CapsuleManifest record: deterministic SBOM+feeds+reachability+policy+VEX
  content-address bundle.
- CapsuleManifestCanonicalizer: mirrors AUDIT-007 algorithm byte-for-byte
  (ordinal-sorted UTF-8 JSON via JsonDocument round-trip).
- ICapsuleSigner + EcdsaCapsuleSigner + NullCapsuleSigner: DSSE PAE
  contract, DSSE payload type application/vnd.stellaops.decision-capsule+json.
  Pattern-identical to IAuditBundleManifestSigner; defined locally rather
  than cross-referencing IExportAttestationSigner (which lives inside
  ExportCenter.WebService, not a shared library — future cleanup noted).
- CapsuleService: create / seal / verify / export (zip) / replay.
- PostgresCapsuleRepository (Dapper) with tenant RLS hookup.

Endpoints (all tenant-scoped, POST):
- POST /api/v1/evidence/capsules
- POST /api/v1/evidence/capsules/{id}/seal
- POST /api/v1/evidence/capsules/{id}/verify
- POST /api/v1/evidence/capsules/{id}/export (application/zip)
- POST /api/v1/evidence/capsules/{id}/replay

Storage: embedded migration 005_decision_capsules.sql creates
evidence_locker.decision_capsules (RLS-enforced) + indexes + CHECK
constraints. Auto-applied by existing EvidenceLockerMigrationRunner.

Audit (CAPSULE-AUDIT-001):
- 5 new AuditActions.Evidence constants (CreateCapsule/Seal/Verify/Export/Replay)
- Each endpoint chained with .Audited(AuditModules.Evidence, ...)
- contentHash surfaced on responses so AuditActionFilter propagates it
  into details_jsonb.

Tests: 9 focused tests (determinism x3, sign+verify+tamper x3, null-signer
graceful degradation, pipeline round-trip, 404 on missing). Full
EvidenceLocker namespace sweep: 141/141, 0 failures.

Docs: docs/modules/evidence-locker/architecture.md §9bis (manifest schema,
DSSE payload type, storage, API surface, relationship to
release.run_capsule_replay_linkage).

Runtime curl+Timeline assertion deferred — running container image
predates these changes; rebuild pending. Structural wiring identical to
runtime-verified VerdictEndpoints (AUDIT-002 precedent).

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-22 16:04:38 +03:00
master
c5cc11c28f feat(authority): wire auto-migration + idempotent schema (AGENTS.md §2.7)
Brings Authority into §2.7 compliance. Previously AutoMigrate=true was set
in Program.cs but no runner was wired; 001_initial_schema.sql was
non-idempotent so wiring AddStartupMigrations against a pre-bootstrapped
DB crash-looped. Discovered during DEPRECATE-003 when the new drop
migration couldn't apply via Authority's own startup path.

Idempotency fixes in 001_initial_schema.sql:
- CREATE INDEX → CREATE INDEX IF NOT EXISTS (27 indexes)
- CREATE TRIGGER → DROP TRIGGER IF EXISTS + CREATE TRIGGER (3 triggers)
- CREATE POLICY → DROP POLICY IF EXISTS + CREATE POLICY (12 policies)
- CREATE TABLE / FUNCTION (OR REPLACE) / RLS ENABLE / role DO blocks were
  already idempotent — left unchanged

Wiring:
- AddStartupMigrations("authority", "Authority", typeof(AuthorityDataSource)
  .Assembly) called inside RegisterAuthorityServices (canonical
  Signals/Scanner pattern).
- Stale options.AutoMigrate = true + options.MigrationsPath removed from
  Program.cs.
- Migrations\_archived\** excluded from the EmbeddedResource glob.

Init script cleanup (migrations own schema authority now):
- 04-authority-schema.sql: 569 lines → 60 lines (schema shells + guarded
  default-tenant seed fallback only; all DDL removed)
- 04b-authority-dedicated-schema.sql: same reduction for dedicated DB

Verification sequence — all PASS:
1. Green-field replay: 001 runs twice with zero semantic drift (pg_dump
   diff shows only session restrict nonce).
2. Wire against pre-migrated volume: runner applies 001+002 in 209ms, no
   crash-loop.
3. Wire + fresh schema: migrates 20 tables from empty in 395ms.
4. Idempotent restart: "Database is up to date", pure no-op.

Sprint SPRINT_20260422_003_Authority_auto_migration_compliance created
and archived in the same pass.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-22 16:03:43 +03:00
master
2e78085115 feat(audit): drop deprecated per-service audit tables + reconciliation (DEPRECATE-003)
Closes DEPRECATE-003 in SPRINT_20260408_005. Pre-release status means
the 30/90-day compat windows in the original Decision #5 are moot — no
external consumers. Decision #5 amended twice during session.

Drop migrations (embedded resources, auto-applied on startup per §2.7):
- authority.audit / authority.airgap_audit / authority.offline_kit_audit
  (002_drop_deprecated_audit_tables.sql)
- policy.audit (013; policy.gate_bypass_audit PRESERVED as domain evidence)
- notify.audit (008)
- scheduler.audit + partitions via CASCADE (009)
- proofchain.audit_log (004)

Kept by design:
- release_orchestrator.audit_entries + audit_sequences (hash chain, Decision #2)
- policy.gate_bypass_audit (domain evidence, unique query patterns)
- authority.login_attempts (auth protocol state, not audit)

Repository neutering — local DB write removed, Timeline emission preserved:
- PolicyAuditRepository.CreateAsync → Timeline-only; readers [Obsolete]
- NotifyAuditRepository.CreateAsync → Timeline-only; readers [Obsolete]
- PostgresSchedulerAuditService → removed INSERT, Timeline-only
- PostgresAttestorAuditSink.WriteAsync → no-op (endpoint-level .Audited()
  filter carries the audit signal)

Attestor cleanup:
- Deleted AuditLogEntity.cs
- Removed DbSet<AuditLogEntity> from ProofChainDbContext
- Removed LogAuditAsync / GetAuditLogAsync from IProofChainRepository
- Removed "audit_log" from SchemaIsolationService

Reconciliation tool substitutes for the 30-day wall-clock window:
- scripts/audit-reconciliation.ps1 joins each per-service audit table to
  timeline.unified_audit_events via the dual-write discriminator
  (details_jsonb.localAuditId / localEntryId) for deterministic pairs,
  tuple-matches Authority. Test-Table/to_regclass guards handle post-drop
  vacuous-pass. Overall PASS across pre/post/final runs.
- 4 reports under docs/qa/.

Sprint archivals:
- SPRINT_20260408_004 (Timeline unified audit sink) — all 7 tasks DONE
- SPRINT_20260408_005 (audit endpoint filter deprecation) — all 12 tasks DONE

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-22 16:03:02 +03:00
master
b5ad1694a6 feat(audit): redirect audit read endpoints to Timeline (DEPRECATE-002)
Per-service audit read endpoints now source their data from
timeline.unified_audit_events instead of local repositories. Closes
DEPRECATE-002 in SPRINT_20260408_005.

New shared abstraction:
- ITimelineAuditQueryClient + HttpTimelineAuditQueryClient in
  StellaOps.Audit.Emission, reusing AuditEmission:TimelineBaseUrl and a
  named HttpClient "StellaOps.AuditQuery". 6 focused tests.

Endpoints redirected (module=X filter per service):
- Authority ConsoleAdminEndpointExtensions.ListAuditEvents (was a 501 stub)
- Policy Engine + Gateway GovernanceEndpoints (list + by-id, were 501 stubs)
- Notify /api/v1/notify/audit (was INotifyAuditRepository.ListAsync)
- ReleaseOrchestrator AuditEndpoints list / by-id / resource-history /
  latest / sequence-range / summary. /verify stays local per Decision #2.

HttpUnifiedAuditEventProvider.GetEventsAsync neutered to empty list +
debug log; per-module legacy polling preserved under [Obsolete]
GetEventsLegacyAsync so CompositeUnifiedAuditEventProvider +
DurableAuditEmissionEndpointTests keep compiling.

Notify Program.cs also carries SPRINT_20260422_001 compat-endpoint wiring
(NotifyAdminCompatEndpoints mapping, INotifySimulationEngine DI, compat
simulation [FromBody]/[FromServices] binding) — bundled here because both
changes live in the same file.

Attestor has no public /audit read endpoint to redirect (write-only
IAttestorAuditSink); documented in sprint as N/A.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-22 16:01:32 +03:00
master
450d4023ea feat(export-center): DSSE-sign audit bundle manifests (AUDIT-007)
Ships a deterministic manifest + DSSE envelope inside each audit bundle.
Closes the final open criterion of SPRINT_20260408_004 AUDIT-007.

- AuditBundleManifest record: bundle id, tenant, time range, event count,
  SHA-256 of events.ndjson + chain-proof.json as canonical fields.
- AuditBundleManifestCanonicalizer: ordinal-sorted UTF-8 JSON (round-trip
  via JsonDocument), byte-identical across runs on equal input.
- IAuditBundleManifestSigner + default impl delegating to
  IExportAttestationSigner (local ECDSA, KMS via AddExportAttestationWithKms).
- Payload type application/vnd.stellaops.audit-bundle-manifest+json.
- Graceful degradation: signer_not_registered / signing_failed:<type> /
  disabled_by_request. Bundle always completes, manifest.json always emitted,
  envelope only when signed.
- 9 focused tests (determinism x3, sign+verify+tamper x3, null-signer,
  pipeline round-trip, 404 on missing). All green.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-22 16:00:42 +03:00
master
bf4a5fee54 docs(implplan): AUDIT-002 decoration count crosses 468 call sites
Sprint SPRINT_20260408_004. Execution log entry for the SbomService
backfill + Notifier wave E coverage extensions.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-20 00:59:02 +03:00
master
843d545448 feat(notifier): audit-decorate rules, templates, security write endpoints
Sprint SPRINT_20260408_004 AUDIT-002 (continuing decoration sweep).

Wave E covers state-mutating Notifier endpoints across four files:

IncidentEndpoints (1):
- POST /incidents/{deliveryId}/ack -> notifier.approve incident_delivery

RuleEndpoints (3):
- POST/PUT/DELETE /api/v2/rules{,/{id}}
  -> notifier.{create,update,delete} notify_rule

TemplateEndpoints (3):
- POST/PUT/DELETE /api/v2/templates{,/{id}}
  -> notifier.{create,update,delete} notify_template

SecurityEndpoints (5):
- POST /security/keys/rotate           -> notifier.rotate signing_key
- POST /security/webhooks              -> notifier.create webhook_security_config
- PUT  /security/webhooks/.../allowlist -> notifier.update webhook_allowlist
- POST /security/tenants/grants        -> notifier.create cross_tenant_grant
- DELETE /security/tenants/grants      -> notifier.revoke cross_tenant_grant

Read-like routes that happen to use POST (token verify/info, html
sanitize/validate/strip, tenant access validate, fuzz tests, get
methods) intentionally remain undecorated — they don't mutate state
and would generate audit noise.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-20 00:58:10 +03:00
master
032f3272f8 feat(sbom): audit-decorate internal backfill + retention endpoints
Sprint SPRINT_20260408_004 AUDIT-002 (final decoration wave).

Five internal-only SbomService endpoints now emit audit events:
- POST /internal/sbom/events/backfill -> sbom.execute sbom_events_backfill
- POST /internal/sbom/inventory/backfill -> sbom.execute sbom_inventory_backfill
- POST /internal/sbom/resolver-feed/backfill -> sbom.execute sbom_resolver_feed_backfill
- POST /internal/sbom/retention/prune -> sbom.delete sbom_retention_prune
- POST /internal/orchestrator/watermarks -> sbom.update orchestrator_watermark

These are recovery / retention / watermark-manipulation routes that
previously slipped past audit because of their `internal` prefix. They
produce high-value audit events (data mutations that operators run
during incidents) and deserve the same coverage as the user-facing
surface.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-20 00:52:27 +03:00
master
48ab7d33e3 docs(implplan): AUDIT-005 criterion 1 fully DONE (all 5 services)
Sprint SPRINT_20260408_004. Every per-service audit LIST endpoint
now advertises the Timeline successor link and Sunset 2027-10-19.
Remaining AUDIT-005 criteria (Timeline as SoT, no-data-loss) stay
gated on the 30-day production verification window.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-20 00:43:19 +03:00
master
9e88f6a950 feat(audit): deprecation headers on remaining per-service audit GETs
Sprint SPRINT_20260408_004 AUDIT-005 (criterion 1 fully DONE).

- Authority `/console/admin/audit` list endpoint advertises Sunset
  2027-10-19 and successor /api/v1/audit/events?modules=authority.
- Policy.Gateway `/api/v1/governance/audit/events` (list + by-id) do
  the same with modules=policy; both still honour the PolicyAudit scope.
- EvidenceLocker `/api/v1/evidence/audit` advertises modules=evidencelocker.
- EvidenceLocker csproj picks up the Audit.Emission project reference.

Together with the earlier Notify + ReleaseOrchestrator coverage, every
per-service audit LIST endpoint now emits the RFC-style Sunset /
Deprecation / Link headers pointing at Timeline's unified endpoint.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-20 00:43:00 +03:00
master
5c5c0881b1 docs(implplan): AUDIT-006 DONE — UI classification + retention shipped
Sprint SPRINT_20260408_004. Audit dashboard now renders the retention
tile and the log table shows classification / hold / redaction pills
alongside each event. All three criteria checked.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-20 00:04:18 +03:00
master
bcf579220a feat(web): audit log classification badges + retention tile
Sprint SPRINT_20260408_004 AUDIT-006 component layer.

audit-log-table:
- New Class. column between Severity and Actor shows the GDPR data
  classification pill with module-aware tooltip explaining what each
  class means (restricted > sensitive > personal > none).
- Compliance hold pill ("hold") surfaces when complianceHold is true.
- Redaction pill ("redacted") surfaces when piiRedactedAt is set, with
  the redaction timestamp in the title attr.
- Detail panel mirrors the three new pieces of metadata as labelled rows.
- formatModule() table extended with the 13 newly-emitting modules.
- Styles for classification/hold/redacted pills reuse the existing status
  colour tokens so dark/light themes inherit.

audit-log-dashboard:
- Fetches /api/v1/audit/retention-policies on open (catchError downgrades
  to a non-blocking warning banner).
- Renders a per-tenant retention tile above the tabs with a 4-column grid
  showing none/personal/sensitive/restricted retention days and a
  footnote linking to docs/modules/timeline/audit-retention.

Type-check clean.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-20 00:03:48 +03:00
master
5b131ca425 docs(implplan): AUDIT-006 DOING — model/client surfaces ready
Sprint SPRINT_20260408_004. AUDIT-006 flipped TODO → DOING with the
model + client layer complete for all three criteria (module filter,
classification visibility, retention display). Angular component
renders (badges, overview tile) are a component follow-up since they
live in separate component templates the background agent owns.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 23:56:59 +03:00
master
7ad7dabeb8 feat(web): audit log model + client for AUDIT-004/005/006 surfaces
Sprint SPRINT_20260408_004 AUDIT-006 (first slice).

- AuditModule union expanded with the 13 modules newly wired for unified
  emission during AUDIT-002 waves A/B (graph, concelier, notifier, notify,
  binaryindex, exportcenter, issuerdirectory, packsregistry, registry,
  router, signer, timeline, evidencelocker).
- New AuditDataClassification type + optional AuditEvent.dataClassification,
  complianceHold, and piiRedactedAt fields surface the AUDIT-004 state so
  the dashboard can render classification badges and retention context.
- New AuditRetentionPolicies interface paired with
  AuditLogClient.getRetentionPolicies() hitting Timeline's
  /api/v1/audit/retention-policies endpoint for the retention display.
- AuditLogClient.redactActorPii() wraps the DELETE
  /api/v1/audit/actors/{actorId}/pii endpoint for GDPR right-to-erasure.
- endpoints dictionary updated: new modules prefer the unified
  /api/v1/audit/events endpoint as the fallback path, with tagged
  module= query strings so operators can still slice by service.

Type-check clean. Table/dashboard component updates to render badges
follow in a later commit.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 23:56:35 +03:00
master
3e8754cf7c docs(implplan): AUDIT-005 DOING — deprecation headers wired
Sprint SPRINT_20260408_004. First criterion of AUDIT-005 met: two
per-service audit list endpoints now advertise Sunset/Deprecation/Link
headers pointing at Timeline's unified endpoint. Remaining two criteria
are gated on the 30-day production verification window.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 23:54:24 +03:00
master
e2f0a0df4f feat(audit): deprecation headers for per-service audit list endpoints
Sprints SPRINT_20260408_004 AUDIT-005 + SPRINT_20260408_005
DEPRECATE-002 (early, non-waiting half).

- StellaOps.Audit.Emission gains a `DeprecatedAuditEndpoint` helper:
  .DeprecatedForTimeline(sunset, successorLink) + a
  DeprecationHeaderEndpointFilter that writes RFC-style Sunset,
  Deprecation, and Link: <successor>; rel="successor-version" headers.
- Notify GET /api/v1/notify/audit + ReleaseOrchestrator
  GET /api/v1/release-orchestrator/audit now advertise Sunset
  2027-10-19 and link to /api/v1/audit/events?modules={notify|jobengine}.
  Chain-verify / summary / single-entry lookups on ReleaseOrchestrator
  are intentionally NOT deprecated — they serve service-level chain-of-
  custody evidence (sprint Decision 2) that the unified store cannot
  replace.

Both services build clean. Remaining per-service deprecation headers
(Authority /console/admin/audit, Policy /governance/audit/events,
EvidenceLocker /evidence/audit) follow the same pattern and can land
as a wave when those endpoints are touched for other reasons.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 23:53:57 +03:00
master
f5583c174f docs(implplan): AUDIT-007 DOING — events + chain proof in bundle
Sprint SPRINT_20260408_004. 2 of 3 criteria DONE: Timeline event pull
and chain-verification certificate are now included in AuditBundles.
DSSE manifest signing deferred as a follow-up (cross-service signer
handshake scope).

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 23:49:35 +03:00
master
71ce8fd26e feat(exportcenter): pull unified audit events into AuditBundle (AUDIT-007)
Sprint SPRINT_20260408_004 AUDIT-007 backend half.

- ITimelineAuditSource + HttpTimelineAuditSource talk to Timeline's
  /api/v1/audit/events with pagination, tenant header forwarding, and a
  hard MaxPages cap (default 200 ≈ 100k events). GetChainProofAsync
  pulls /api/v1/audit/verify-chain for the bundle manifest.
- AuditBundleContentSelection gains an AuditEvents flag (default true)
  and BundleSubjectRefDto gains a TenantId so the handler can route.
- AuditBundleJobHandler, when AuditEvents is selected and the source is
  registered, writes NDJSON events to audit/events.ndjson and a chain
  proof to audit/chain-proof.json, adds both as AUDIT_EVENTS /
  AUDIT_CHAIN_PROOF artifacts with sha256 digests; failures are logged
  and do not abort the bundle.
- AddTimelineAuditBundleSource DI helper binds to the
  ExportCenter:TimelineAudit config section; the truthful runtime
  registers it alongside the existing in-memory job handler.

Remaining AUDIT-007 work: DSSE-sign the audit bundle manifest via
Attestor integration — separate sprint because it requires cross-service
signer handshake.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 23:49:12 +03:00
master
e18f22d61c docs(implplan): AUDIT-004 DONE — all 5 completion criteria checked
Sprint SPRINT_20260408_004 AUDIT-004 reaches DONE with migration 005,
AuditDataClassifier (16 tests), RedactActorPiiAsync + DELETE endpoint,
AuditRetentionPurgeService, docs/modules/timeline/audit-retention.md,
and the new TimelineAuditRetentionCheck Doctor plugin all shipped.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 23:42:06 +03:00
master
9ce6da484a feat(timeline,doctor): expose retention policies + Doctor health check
Sprint SPRINT_20260408_004 AUDIT-004 — finishes the Doctor-side
completion criterion.

- Timeline: new GET /api/v1/audit/retention-policies endpoint returns
  the effective retention window in days per classification for the
  caller's tenant, with platform-default fallback applied via the
  existing resolve_audit_retention_days SQL function.
- PostgresUnifiedAuditEventStore.GetRetentionPoliciesAsync queries the
  function once per classification (none/personal/sensitive/restricted).
- Doctor Compliance plugin: new TimelineAuditRetentionCheck hits the
  endpoint, compares each bucket against minimums
  (none/personal ≥180d, sensitive ≥365d, restricted ≥1095d) and
  warns with remediation steps when a tenant override drops too low.
  Pairs with the existing AuditReadinessCheck but focuses on the
  unified-store retention side.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 23:41:46 +03:00
master
44195cd7af docs(timeline): audit retention + erasure dossier
Sprint SPRINT_20260408_004 AUDIT-004 documentation criterion.

docs/modules/timeline/audit-retention.md covers:
- Four-rung classification ladder and the "narrowest wins" rule
- Retention table structure, platform defaults, per-tenant overrides,
  and legal holds via compliance_hold
- AuditRetentionPurgeService config + operator recommendations
- Right-to-erasure endpoint contract, hash-chain integrity guarantees,
  and the idempotency semantics via pii_redacted_at
- Sequence-chain gap behaviour after purge and how chain verification
  should window its checks
- Compliance checklist for operators

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 23:39:28 +03:00
master
7e0819179b docs(implplan): AUDIT-004 core DONE (classification + retention + erasure)
Sprint SPRINT_20260408_004. AUDIT-004 flipped TODO → DOING with the
first three completion criteria checked. Migration 005, classifier,
retention purge host, and right-to-erasure endpoint all shipped across
commits 44c0e2b34..AUDIT-004 (migration + store + endpoint) and the
purge background host. Docs dossier + Doctor check deferred.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 23:38:22 +03:00
master
efc3500f20 feat(timeline): scheduled audit retention purge background host
Sprint SPRINT_20260408_004 AUDIT-004 (retention enforcement).

AuditRetentionPurgeService BackgroundService enumerates tenants that
have any rows in timeline.unified_audit_events, then calls
timeline.purge_expired_audit_events(tenantId, dryRun) per tenant.
The SQL function honours per-classification retention windows and the
compliance_hold flag (legal holds pass through unaffected).

AuditRetentionPurgeOptions bound from the AuditRetentionPurge config
section: Enabled (default true), DryRun (default false), InitialDelay
(default 5 min), Interval (default 6h). Failures on a single tenant
are logged and do not stop the rest of the cycle.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 23:37:25 +03:00
master
ebf1a1cb3d feat(timeline): GDPR data classification + retention + right-to-erasure
Sprint SPRINT_20260408_004 AUDIT-004.

Schema (migration 005_audit_data_classification_retention.sql):
- ALTER timeline.unified_audit_events adds data_classification
  (none|personal|sensitive|restricted, default 'none'), compliance_hold
  (default false, exempts from purge), pii_redacted_at (null until
  right-to-erasure redaction).
- New timeline.audit_retention_policies table holds per-tenant /
  per-classification retention windows; seed row tenant_id='*' = platform
  default (none/personal=365d, sensitive=730d, restricted=2555d ≈ 7y).
- Function resolve_audit_retention_days falls back tenant→platform→365d.
- Function purge_expired_audit_events iterates classes, honours
  compliance_hold, supports dry-run counting.
- Function redact_actor_pii replaces actor_email/actor_ip/actor_user_agent
  (+actor_name for personal/sensitive rows) with '[REDACTED]', preserves
  actor_id so the content_hash chain stays intact.

Code:
- AuditDataClassifier implements the none/personal/sensitive/restricted
  ladder: restricted (signer+attestor key/ceremony ops, cross-module
  key_escrow actions) > sensitive (authority auth-protocol events) >
  personal (actor email/ip/user_agent present). 16/16 unit tests pass.
- PostgresUnifiedAuditEventStore inserts include data_classification,
  defaulting to AuditDataClassifier.Classify() when the payload's
  precomputed value is absent. New RedactActorPiiAsync delegates to the
  SQL function.
- UnifiedAuditEvent record gets an optional DataClassification property
  so services that already classify events can bypass auto-classification.
- DELETE /api/v1/audit/actors/{actorId}/pii endpoint exposes
  right-to-erasure, scoped to the new Timeline.Admin policy backed by
  the timeline:admin scope (StellaOpsScopes.TimelineAdmin).

Remaining AUDIT-004 work: scheduled background purge host, Doctor
AuditReadinessCheck update to verify retention config, UI badges.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 23:36:08 +03:00
master
582dd151f3 docs(implplan): DEPRECATE-001 implementation DONE across 5 services
Sprint SPRINT_20260408_005. Repository-level dual-write wired for
Authority, Policy, Notify, Scheduler, JobEngine. Attestor uses
endpoint-level .Audited() (no repo-level change needed). Local write
stays authoritative; Timeline emission is fire-and-forget. Task
flipped TODO → DOING pending 30-day production verification window.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 22:43:31 +03:00
master
2f32c7f0c2 feat(jobengine): dual-write audit entries to Timeline unified sink
Sprint SPRINT_20260408_005 DEPRECATE-001 (JobEngine/ReleaseOrchestrator,
fifth service).

PostgresAuditRepository.AppendAsync now fans out to Timeline via the
optional IAuditEventEmitter after the local transaction commits. The
hash chain (content_hash, previous_entry_hash, sequence_number) stays
in the local audit_entries table as service-level chain-of-custody
evidence; Timeline receives only the summary event for cross-service
correlation, with the content hash surfaced as a detail field.

Same pattern as Authority/Policy/Notify/Scheduler dual-write:
fire-and-forget, optional DI, local write stays authoritative.

Remaining: Attestor dual-write (existing audit is already decorated
with .Audited() on endpoints — verifying the attestor audit log insert
path needs separate review).

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 22:42:39 +03:00
master
7c69058e19 feat(scheduler): dual-write audit events to Timeline unified sink
Sprint SPRINT_20260408_005 DEPRECATE-001 (Scheduler, fourth service).

PostgresSchedulerAuditService.WriteAsync now fans out to Timeline
via the optional IAuditEventEmitter after the local scheduler.audit
row insert. Fire-and-forget, same pattern as Authority/Policy/Notify.

AuditActor is mapped to actor.{id, name, type} with kind -> type,
ActorId -> id, DisplayName -> name. Metadata tuples flatten as
`metadata.{key}` fields in Details. ScheduleId/RunId included.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 22:40:55 +03:00
master
0acd2ecabb feat(notify): dual-write audit events to Timeline unified sink
Sprint SPRINT_20260408_005 DEPRECATE-001 (Notify, third service).

Same pattern as Authority + Policy dual-write: NotifyAuditRepository
now fans out to Timeline via the optional IAuditEventEmitter.
Fire-and-forget; local write stays authoritative.

Remaining DEPRECATE-001 services: Scheduler (ISchedulerAuditService),
JobEngine/ReleaseOrchestrator (PostgresAuditRepository.AppendAsync),
Attestor (audit log inserts).

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 22:39:14 +03:00
master
a7f3880e9f feat(policy): dual-write audit events to Timeline unified sink
Sprint SPRINT_20260408_005 DEPRECATE-001 (Policy, second service).

PolicyAuditRepository.CreateAsync now fans out to Timeline's unified
audit store via the optional IAuditEventEmitter (injected via
AddAuditEmission in Policy.Engine / Policy.Gateway Program.cs).
Same pattern as Authority dual-write in commit a947c8df6:
- Optional constructor dependency (default null) for DI compatibility
- Fire-and-forget emission wrapped in try/catch
- MapToTimelinePayload builds a UnifiedAuditEvent-compatible payload
  with actor (UserId or "policy-system"), resource (audit.ResourceType,
  audit.ResourceId), severity "info", and details including old/new
  value strings plus the local audit id.

Remaining DEPRECATE-001 services: Notify, Scheduler, JobEngine,
Attestor dual-write on the same pattern.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 22:37:58 +03:00
master
a947c8df6e feat(authority): dual-write audit events to Timeline unified sink
Sprint SPRINT_20260408_005 DEPRECATE-001 (Authority, first service).

AuthorityAuditSink.WriteAsync now fans out to Timeline's unified audit
store via the optional IAuditEventEmitter (injected via AddAuditEmission
in Program.cs). The local authority.audit table write remains the
authoritative path; the Timeline emission is strictly fire-and-forget:

- Optional constructor dependency (default null) keeps existing tests
  that construct the sink without the emitter working unchanged.
- Emission is wrapped in try/catch so any Timeline-side failure (DNS,
  timeout, auth) is logged as a warning and never impacts the local
  write or calling endpoint.
- MapToTimelinePayload builds a UnifiedAuditEvent-compatible payload
  with actor (subject id/name/IP/UA), resource (authority_session
  keyed by correlationId), severity derived from outcome, and event
  details including client, reason, and event type.

Existing AuthorityAuditSinkTests (2/2) still pass — backward compat
verified via direct xUnit run.

Remaining DEPRECATE-001 work: Policy, Notify, Scheduler, JobEngine,
Attestor dual-write wiring on the same pattern. Tracked as follow-ups.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 22:35:47 +03:00
master
05462f0443 docs(implplan): close AUDIT-003 as superseded by AUDIT-002 push model
Sprint SPRINT_20260408_004. After AUDIT-002 wired Emission in all 14+
priority services, the original AUDIT-003 scope of "add more polling
targets" is no longer load-bearing. The remaining candidate modules
(Scanner, Scheduler, Integrations, Attestor) do not expose HTTP audit
endpoints — they rely on Emission. SbomService's ledger audit endpoint
is artifact-specific and does not fit the unified polling contract.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 22:33:19 +03:00
master
44c0e2b346 docs(implplan): AUDIT-002 criterion 2 DONE after waves C+D
Sprint SPRINT_20260408_004 execution log entry for the 26+ new
.Audited() decorations across Graph, SbomService, Policy.Gateway,
Notifier, Concelier, Excititor (commits 4cbe58fc8 + 6c3ebff9d).
Combined with pre-existing decoration in Authority/Scanner/Policy.Engine/
Notify/JobEngine/Integrations/AdvisoryAI/EvidenceLocker/Attestor, the
codebase now has ~240 .Audited() call sites.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 22:32:40 +03:00
master
6c3ebff9db feat(audit): decorate concelier + excititor write endpoints (wave D)
Sprint SPRINT_20260408_004 AUDIT-002 decoration continues.

Concelier.WebService — FeedMirrorManagementEndpoints (8 endpoints):
- mirror config update         -> concelier.update feed_mirror
- mirror sync trigger          -> concelier.execute feed_mirror_sync
- mirror retention update      -> concelier.update feed_mirror_retention
- snapshot pin/delete          -> concelier.{update,delete} feed_snapshot
- airgap bundle create/delete  -> concelier.{create,delete} airgap_bundle

Concelier.WebService — SourceManagementEndpointExtensions (5 endpoints):
- source enable/disable        -> concelier.update advisory_source
- batch enable/disable         -> concelier.update advisory_source_batch
- per-source sync              -> concelier.execute advisory_source_sync

Excititor.WebService (4 endpoints):
- POST /api/v1/vex/candidates/{id}/approve -> vex.approve vex_candidate
- POST /api/v1/vex/candidates/{id}/reject  -> vex.reject  vex_candidate
- POST /ingest/vex                         -> vex.create  vex_document
- POST /airgap/v1/vex/import               -> vex.create  vex_airgap_bundle

Both services build clean.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 22:31:15 +03:00
master
4cbe58fc80 feat(audit): decorate write endpoints in 4 services (AUDIT-002 wave C)
Sprint SPRINT_20260408_004 AUDIT-002, second completion criterion
("at least write endpoints decorated with AuditActionAttribute").

Vertical slice using the existing .Audited(module, action, resourceType)
helper from AuditedRouteGroupExtensions:

- Graph.Api (4 endpoints):
  * POST /api/graphs/builds        -> graph.create graph_build
  * POST /api/graphs/overlays      -> graph.create graph_overlay
  * POST /graphs/{g}/saved-views   -> graph.create graph_saved_view
  * DELETE /graphs/{g}/saved-views/{v} -> graph.delete graph_saved_view

- SbomService (4 endpoints):
  * POST /sbom/upload + /api/v1/sbom/upload -> sbom.create sbom
  * POST /entrypoints              -> sbom.update sbom_entrypoint
  * POST /internal/orchestrator/sources  -> sbom.create orchestrator_source
  * POST /internal/orchestrator/control  -> sbom.update orchestrator_control

- Policy.Gateway ExceptionApproval (4 governance endpoints):
  * POST /exception/request        -> policy.create  exception_approval_request
  * POST /exception/{id}/approve   -> policy.approve ""
  * POST /exception/{id}/reject    -> policy.reject  ""
  * POST /exception/{id}/cancel    -> policy.cancel  ""

- Notifier EscalationEndpoints (9 endpoints):
  * policies CRUD                   -> notifier.{create,update,delete} escalation_policy
  * on-call schedules CRUD          -> notifier.{create,update,delete} oncall_schedule
  * escalation start/escalate/stop  -> notifier.execute incident_escalation

All 4 projects build clean. Events will flow to Timeline
/api/v1/audit/ingest once the services boot and execute these endpoints.

BinaryIndex uses MVC controllers — audit decoration for that style
requires a different wiring approach and is deferred to a follow-up.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 22:26:44 +03:00
master
abb9012c69 docs(implplan): AUDIT-002 DOING — 14/14 priority services wired
Sprint SPRINT_20260408_004. First completion criterion of AUDIT-002
("AddAuditEmission() called in all 14+ service Program.cs files") is
now DONE after waves A (commit b2b0c905b) + B (commit 981f4459a).
Remaining: endpoint-level AuditActionAttribute decoration, runtime
verification at /api/v1/audit/events, startup-time regression check.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 16:05:59 +03:00
master
981f4459a2 feat(audit): wire AddAuditEmission in 5 more services (AUDIT-002 wave B)
Sprint SPRINT_20260408_004_Timeline_unified_audit_sink AUDIT-002.

Second wave wiring — services outside the original 14-priority table that
own production audit-relevant surfaces:

- Router Gateway.WebService (ingress, claim mapping)
- Registry.TokenService (token issuance, plan admin)
- PacksRegistry.WebService (packs lifecycle)
- IssuerDirectory.WebService (issuer/subject identity, PII)
- ExportCenter.WebService (compliance bundle origin)

Same pattern: ProjectReference to StellaOps.Audit.Emission,
`using StellaOps.Audit.Emission;`, and `builder.Services
.AddAuditEmission(builder.Configuration);` placed after auth wiring.

All 5 projects build clean.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 16:05:11 +03:00
master
b2b0c905b8 feat(audit): wire AddAuditEmission in 7 services (AUDIT-002 wave A)
Sprint SPRINT_20260408_004_Timeline_unified_audit_sink AUDIT-002.

Wire the unified audit emitter in 7 webservices that were listed in the
AUDIT-002 priority table but missing the call:
- Concelier.WebService (priority 6a)
- Excititor.WebService (priority 6b)
- SbomService (priority 8)
- Graph.Api (priority 12)
- BinaryIndex.WebService (priority 14)
- Policy.Gateway (priority 3b)
- Notifier.WebService (priority 4b)

Each adds:
- ProjectReference to __Libraries/StellaOps.Audit.Emission
- using StellaOps.Audit.Emission;
- builder.Services.AddAuditEmission(builder.Configuration) in Program.cs
  placed after auth wiring, before authorization policies.

AUDIT-002 completion criterion "AddAuditEmission() called in all 14+
service Program.cs files" is now met for the listed priority services.
Endpoint-level AuditActionAttribute decoration is a separate wave.

All 7 projects build clean against the existing Audit.Emission lib.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 16:00:33 +03:00
master
6eb4394b1b docs(implplan,concelier): close SPRINT_20260419_027 REALPLAN-007-F
Durable advisory-observation + affected-symbol runtime is live:
PostgresAdvisoryObservationStore persists observations and delegates
to IAffectedSymbolExtractor during upsert; PostgresAffectedSymbolStore
backs /v1/signals/symbols/*. Non-testing runtime resolves both durable
stores (Unsupported* registration removed).

Targeted xUnit runs via scripts/test-targeted-xunit.ps1:
- PostgresAdvisoryObservationStoreTests 2/2
- PostgresAffectedSymbolStoreTests 2/2
- ConcelierInfrastructureRegistrationTests 3/3
- UnsupportedRuntimeWiringTests 9/9

docs/modules/concelier/architecture.md updated to reflect the
durable /v1/signals/symbols/* contract.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 15:00:59 +03:00
master
2e35bf4591 fix(tools,concelier): xunit helper strict-mode + test async disposal
- scripts/test-targeted-xunit.ps1: replace @(x).Count checks with
  [bool] coercion in Assert-FilterShape; StrictMode 'Latest' rejects
  .Count on null even when wrapped in @().
- ConcelierInfrastructureRegistrationTests.AddConcelierPostgresStorage_
  RegistersDurableObservationAndAffectedSymbolServices: wrap provider
  in try/finally with DisposeAsync — ConcelierDataSource is
  IAsyncDisposable only, so sync Dispose at `using` scope end throws.

Follow-up to SPRINT_20260419_027/028.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 14:57:24 +03:00
master
54e3ca1f1a docs(implplan): close SPRINT_20260419_028 TEST-RUNNER-001
test-targeted-xunit.ps1 verified end-to-end against
SchedulerStorageConfigurationTests (3/3 pass via direct DLL exec).
QA flow + testing-practices docs updated.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 14:52:17 +03:00
master
5ce0124cb9 docs(implplan): close SPRINT_20260417_002 SCHEDULER-COMPAT-001
SchedulerStorageConfiguration ResolveConnectionString supports flat,
compose-nested, and legacy keys; web host fails fast with a clear
message listing all three. Targeted xUnit run of
SchedulerStorageConfigurationTests passes 3/3.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 14:51:18 +03:00
master
45fba7af47 docs(implplan): archive SPRINT_20260418_001 — all tasks DONE
All three tasks are now DONE per the 2026-04-19 execution log:
- ADV-SETUP-006 setup source probe/apply reflects real connectivity
- ADV-SETUP-007 enabled-but-broken advisory warning + auth helper
- ADV-SETUP-008 targeted Platform + Concelier xUnit verification
  passed via the direct xUnit runner workflow.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 14:49:33 +03:00
master
3d14332609 wip(tools): xunit runner helper + QA guidance iteration
Follow-up to SPRINT_20260419_028 TEST-RUNNER-001.

- scripts/test-targeted-xunit.ps1: refinements to the helper.
- docs/code-of-conduct/TESTING_PRACTICES.md: default targeted xUnit v3
  verification to the new helper.
- docs/qa/feature-checks/FLOW.md: call out Microsoft Testing Platform
  filter-ignore behaviour and point to the helper.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 14:48:48 +03:00
master
333d894690 wip(tools): targeted xunit runner helper
Sprint SPRINT_20260419_028_Tools_targeted_xunit_runner_workflow
(TEST-RUNNER-001 DOING — sprint remains active).

- scripts/test-targeted-xunit.ps1: rebuild-and-invoke xUnit v3 in-process
  runner directly so targeted filters work under Microsoft Testing Platform
  (dotnet test --filter is ignored there).
- Register sprint file in implplan.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 14:48:23 +03:00
master
55ba864798 wip(concelier): tests for observation + affected symbol stores
Follow-up to SPRINT_20260419_027_Concelier_durable_affected_symbol_runtime.

PostgresAdvisoryObservationStoreTests + PostgresAffectedSymbolStoreTests
covering the durable store behaviour.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 14:48:04 +03:00
master
d6a7788070 wip(concelier): durable advisory observation + affected symbol stores
Follow-up to SPRINT_20260419_027_Concelier_durable_affected_symbol_runtime
(REALPLAN-007-F still DOING).

Postgres-backed IAdvisoryObservationStore + IAffectedSymbolStore
implementations for the durable observation + affected-symbol
persistence path introduced by migration 008.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 14:47:49 +03:00
master
7d8078985f docs(implplan): archive 34 DONE sprints; mark 2 active + 1 DOING
Archive every sprint in docs/implplan where all tasks are Status: DONE,
plus two Platform sprints that were moved manually but not yet tracked.

Archived (34):
- SPRINT_20260415_001 master cutover plan
- SPRINT_20260415_002 FE integration audit links + dashboard tips
- SPRINT_20260415_002..007 DOCS: notify/notifier, scheduler/registry,
  runtime data plane, platform/binaryindex/doctor, policy/findings/signer,
  concelier/excititor
- SPRINT_20260416_003..017 (Graph, Replay, Timeline, BinaryIndex symbols,
  Router, Notify x4 sub-sprints, Authority x2, ExportCenter x3, Attestor)
- SPRINT_20260417_001 Platform setup advisory/vex onboarding
- SPRINT_20260417_018..024 (AdvisoryAI x2, JobEngine webhook limiter,
  Integrations, Doctor, Concelier x2) + DevOps dotnet image
- SPRINT_20260418_025 Concelier durable mirror bundle import
- SPRINT_20260419_026 Concelier mirror import allowlisted root

Previously moved (2) now tracked under docs-archived:
- SPRINT_20260416_001 Platform local compose reset/rebuild + CLI bootstrap
- SPRINT_20260416_013 Platform truthful default bootstrap without demo seed

Still active in docs/implplan (5):
- SPRINT_20260408_004 Timeline unified audit sink (AUDIT-002..007 TODO)
- SPRINT_20260408_005 Audit endpoint filters deprecation
  (DEPRECATE-001..003 TODO; CAPSULE-001 BLOCKED)
- SPRINT_20260417_002 JobEngine scheduler storage compose compat (DOING)
- SPRINT_20260418_001 Platform advisory setup hardening (ADV-SETUP-008 DOING)
- SPRINT_20260419_027 Concelier durable affected symbol runtime (DOING)

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 14:47:26 +03:00
master
34e70d9090 wip(concelier): adjust unsupported runtime wiring test after guard removal
Follow-up to SPRINT_20260419_027_Concelier_durable_affected_symbol_runtime.

UnsupportedRuntimeWiringTests updated for the removed non-testing
UnsupportedAffectedSymbol registration.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-19 14:47:01 +03:00