ADRs: - Update 0008-honor, 0009-courage, 0013-overflow, 0015-plausibility - Add 0017-hosted-coding-assistant-architecture RFCs: - 0032: per-repo AWS profile configuration (draft) - 0033: round-scoped dialogue files (impl + plan) - 0034: comprehensive config architecture (accepted) - 0036: expert output discipline (impl) - 0037: single source protocol authority (draft) - 0038: SDLC workflow discipline (draft) - 0039: ADR architecture greenfield clarifications (impl) - 0040: divorce financial analysis (draft) - 0042: alignment dialogue defensive publication (draft) Spikes: - Read tool token limit on assembled dialogues - RFC ID collision root cause - Expert agent output too long - Judge writes expert outputs - Blue MCP server on superviber infrastructure - Playwright MCP multiple window isolation Dialogues: 16 alignment dialogue records Code: - blue-core: forge module enhancements - blue-mcp: env handlers and server updates - alignment-expert agent improvements - alignment-play skill refinements - install.sh script Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
325 lines
23 KiB
Markdown
325 lines
23 KiB
Markdown
# Alignment Dialogue: AWS Profile Configuration in .blue/config.yaml
|
|
|
|
**Participants**: 🧁 Muffin (Platform Architect) | 🧁 Cupcake (DevOps Engineer) | 🧁 Scone (Developer Experience) | 💙 Judge
|
|
**Agents**: 3
|
|
**Status**: Converged ✅ (100%)
|
|
**Target Convergence**: 100%
|
|
|
|
## Context
|
|
|
|
Blue needs a way to configure per-repo AWS profiles so that AWS operations use the correct credentials:
|
|
- `../f-i-a` should use the `cultivarium` AWS profile
|
|
- `../hearth` and `../aperture` should use the `muffinlabs` AWS profile
|
|
|
|
Current `.blue/config.yaml` structure:
|
|
```yaml
|
|
forge:
|
|
type: github
|
|
host: ...
|
|
owner: superviber
|
|
repo: blue
|
|
```
|
|
|
|
## Alignment Scoreboard
|
|
|
|
All dimensions **UNBOUNDED**. Pursue alignment without limit. 💙
|
|
|
|
| Agent | Wisdom | Consistency | Truth | Relationships | ALIGNMENT |
|
|
|-------|--------|-------------|-------|---------------|-----------|
|
|
| 🧁 Muffin | 8 | 7 | 8 | 7 | **30** |
|
|
| 🧁 Cupcake | 8 | 7 | 7 | 7 | **29** |
|
|
| 🧁 Scone | 9 | 8 | 8 | 8 | **33** |
|
|
|
|
**Total ALIGNMENT**: 92 points
|
|
**Current Round**: 4
|
|
**ALIGNMENT Velocity**: +7 (converged)
|
|
|
|
## Perspectives Inventory
|
|
|
|
| ID | Perspective | Surfaced By | Consensus |
|
|
|----|-------------|-------------|-----------|
|
|
| P01 | Env var vs config duality - config names profile, Blue sets AWS_PROFILE | 🧁 Muffin | ✅ Agreed |
|
|
| P02 | Parallel structure to `forge:` - add `aws: { profile: "..." }` | 🧁 Muffin | ✅ Agreed |
|
|
| P03 | Blue_env_mock should inject AWS_PROFILE into .env.isolated | 🧁 Cupcake | ✅ Agreed |
|
|
| P04 | Config is metadata (static), AWS_PROFILE is runtime state | 🧁 Scone | ✅ Integrated |
|
|
| P05 | First-run discovery needs explicit surfacing (blue doctor?) | 🧁 Scone | ✅ Agreed |
|
|
| P06 | Config as discovery, not enforcement | 🧁 Muffin | ✅ R1 |
|
|
| P07 | Session-wide env injection at MCP server startup | 🧁 Muffin | ✅ Agreed |
|
|
| P08 | AWS_PROFILE in Blue's process propagates to bash children | 🧁 Cupcake | ✅ Agreed |
|
|
| P09 | Startup diagnostic showing active profile | 🧁 Scone | ✅ Agreed |
|
|
| P10 | Tool responses should report injected profile | 🧁 Scone | ✅ Refined: startup only, not every response |
|
|
| P11 | Two-layer approach: Blue owns repo config, document MCP limitation | 🧁 All | ✅ Converged |
|
|
|
|
## Tensions Tracker
|
|
|
|
| ID | Tension | Raised By | Consensus | Status |
|
|
|----|---------|-----------|-----------|--------|
|
|
| T1 | Config ownership - AWS config in forge/mod.rs creates coupling | 🧁 Muffin | ✅ | Resolved: Add AwsConfig to BlueConfig, central config is acceptable |
|
|
| T2 | Profile precedence - env var vs config when both set | 🧁 Cupcake | ✅ | Resolved: Env var always wins, log notice if differs from config |
|
|
| T3 | Developer mental model - config vs .env split | 🧁 Scone | ✅ | Resolved: Config declares intent, .env.isolated materializes runtime |
|
|
| T4 | CI/CD credential injection | 🧁 Cupcake | ✅ | Resolved: CI owns credential strategy, config doesn't prescribe |
|
|
| T5 | Bash command env inheritance | 🧁 Muffin | ✅ | Resolved: std::env::set_var in ensure_state() propagates to children |
|
|
| T6 | AWS MCP server is separate process Blue can't control | 🧁 Cupcake | ✅ | Resolved: Document limitation, user sets shell env or uses --profile |
|
|
| T7 | Config schema location (LocalRepoConfig vs BlueConfig) | 🧁 Scone | ✅ | Resolved: Add to BlueConfig (parallel to forge) |
|
|
|
|
## Opening Arguments (Round 0)
|
|
|
|
> All agents responded to topic independently. None saw others' responses.
|
|
|
|
### 🧁 Muffin (Platform Architect)
|
|
|
|
[PERSPECTIVE P01: Environment variable vs config duality] The existing `BlueConfig` struct in `/Users/ericg/letemcook/blue/crates/blue-core/src/forge/mod.rs` shows a pattern: it caches forge detection but tokens come from environment variables (`GITHUB_TOKEN`, `FORGEJO_TOKEN`). AWS already uses `AWS_PROFILE` env var. Should we **duplicate** that env var into config, or **reference** it? The config could simply name the profile (`aws_profile: "cultivarium"`), then Blue sets `AWS_PROFILE` before AWS SDK calls.
|
|
|
|
[PERSPECTIVE P02: Parallel structure clarity] Looking at the existing forge config structure (lines 182-188), it stores detection metadata (type, host, owner, repo). An AWS config section should be similarly minimal. I'd suggest `aws: { profile: "cultivarium" }` at the top level of `BlueConfig`, parallel to `forge:`. This keeps it simple and matches the established pattern where config captures intent, not credentials.
|
|
|
|
[TENSION T1: Config ownership ambiguity] The `BlueConfig` struct lives in `forge/mod.rs` but handles repo-level config. Adding AWS profile config here creates coupling—AWS operations might live elsewhere in the codebase. Should AWS config be in a separate top-level section parsed by a different module, or is centralizing all `.blue/config.yaml` structure in one place better for maintainability?
|
|
|
|
### 🧁 Cupcake (DevOps Engineer)
|
|
|
|
[PERSPECTIVE P01: AWS profile belongs in config.yaml, but must coexist with environment-based workflows] The pattern established by `forge:` in `/Users/ericg/letemcook/blue/.blue/config.yaml` suggests we should add an `aws:` section to `BlueConfig` struct at `/Users/ericg/letemcook/blue/crates/blue-core/src/forge/mod.rs:192`. However, AWS tooling has strong conventions around `AWS_PROFILE` environment variable - we need both declarative config AND runtime environment integration.
|
|
|
|
[PERSPECTIVE P02: Environment isolation tools already exist but don't handle AWS profiles] The `blue_env_detect` and `blue_env_mock` handlers in `/Users/ericg/letemcook/blue/crates/blue-mcp/src/handlers/env.rs` detect AWS SDK usage (lines 172-191) but don't propagate the profile setting into `.env.isolated`. When `generate_env_isolated()` creates environment files, it should inject `AWS_PROFILE` from the config, ensuring isolated worktrees inherit the correct profile automatically.
|
|
|
|
[TENSION T1: Profile precedence conflicts] If we add `aws.profile` to config.yaml, what happens when `AWS_PROFILE` is already set in the user's shell? Standard AWS CLI precedence is: env var > config file > default. Should Blue override or respect existing environment? Day-to-day operations will involve developers switching contexts - we need clear precedence rules that don't surprise operators who understand AWS conventions.
|
|
|
|
### 🧁 Scone (Developer Experience)
|
|
|
|
[PERSPECTIVE P01: Config vs Runtime Context] The `.blue/config.yaml` feels like a natural home for AWS profile because it mirrors the `forge:` section for GitHub. However, AWS profiles differ fundamentally: GitHub config is about where your repo lives (relatively static), while AWS_PROFILE is about what IAM context you're operating in (environment-dependent runtime state). Storing AWS profile in config.yaml risks confusing "this repo's metadata" with "how I want to execute commands right now."
|
|
|
|
[TENSION T1: Developer Mental Model] If we add `aws_profile: cultivarium` to config.yaml, what happens when a developer with different AWS credentials tries to contribute? Or when CI/CD runs with a different profile? The existing env isolation tools (`blue_env_detect`, `blue_env_mock`) already generate `.env.isolated` files that could include AWS_PROFILE, which suggests Blue understands environment variables as runtime concerns. Putting AWS profile in config.yaml creates a split: some env vars live in config, others in generated .env files.
|
|
|
|
[PERSPECTIVE P02: The First-Run Experience] When a developer clones `f-i-a` and needs the `cultivarium` profile, what's the discovery path? If it's in `.blue/config.yaml`, they might not notice the requirement until an AWS call fails cryptically. A commented example in `.env.example` or a `blue doctor` check would surface the requirement immediately with actionable guidance.
|
|
|
|
## Round 1
|
|
|
|
> All agents responded to Round 0 contributions. Each saw all others' R0 responses.
|
|
|
|
### 🧁 Muffin (Platform Architect)
|
|
|
|
[CONCESSION: Scone's runtime vs metadata distinction] I initially saw `forge:` and `aws:` as parallel structures, but Scone is right - they're fundamentally different. Forge config is "where does this repo live" (static metadata), while AWS_PROFILE is "which IAM context am I using right now" (runtime execution state). Putting AWS profile in config.yaml risks conflating these mental models.
|
|
|
|
[REFINEMENT: Cupcake's `blue_env_mock` injection] Cupcake's insight about injecting AWS_PROFILE into `.env.isolated` is spot-on. Looking at `/Users/ericg/letemcook/blue/crates/blue-mcp/src/handlers/env.rs`, the `generate_env_isolated()` function (lines 272-312) already builds environment isolation for parallel agents. We should extend line 91 to read AWS profile from config and inject it there. This keeps the config declarative ("this project uses profile X") while putting runtime state where it belongs - in the environment file.
|
|
|
|
[RESOLVED T2: Profile precedence via layering] The precedence conflict dissolves if we layer: config.yaml declares the **project default**, `.env.isolated` inherits it, but existing `AWS_PROFILE` in shell always wins (standard AWS CLI behavior). Blue should never override an already-set environment variable. When `blue_env_mock` runs, check if AWS_PROFILE exists; if not, populate from config. If yes, warn about mismatch but respect the environment.
|
|
|
|
[PERSPECTIVE P06: Config as discovery, not enforcement] The real value isn't enforcement - it's **first-run discovery**. New contributors clone the repo, run `blue doctor`, see "AWS profile not set, config suggests 'dev-sandbox'", then choose to adopt or override. Config becomes documentation that machines can read.
|
|
|
|
### 🧁 Cupcake (DevOps Engineer)
|
|
|
|
[RESOLVED T2: Precedence by workflow context] The precedence conflict dissolves when we recognize two distinct workflows: **1) Repo default (config.yaml drives)** where Blue reads `aws.profile` and injects `AWS_PROFILE` into `.env.isolated` for isolated worktrees, and **2) Override mode (env var wins)** where operators explicitly set `AWS_PROFILE` before running Blue commands. This matches standard AWS CLI behavior—explicit env vars always win. The key is `generate_env_isolated()` at `/Users/ericg/letemcook/blue/crates/blue-mcp/src/handlers/env.rs:272` should check for existing `AWS_PROFILE` in environment first, fall back to config if unset.
|
|
|
|
[CONCESSION: Scone's mental model concern is real] Scone's T3 is valid—splitting AWS config between `.blue/config.yaml` (profile name) and environment (credentials) creates cognitive overhead. However, this split already exists in AWS tooling: `~/.aws/config` stores profile definitions, environment variables select which one. We're not introducing new complexity, we're following AWS conventions.
|
|
|
|
[REFINEMENT: Add aws section to BlueConfig with clear documentation] Add `aws: Option<AwsConfig>` to `BlueConfig` struct at `/Users/ericg/letemcook/blue/crates/blue-core/src/forge/mod.rs:192`, where `AwsConfig { profile: String }`. Modify `generate_env_isolated()` to inject `AWS_PROFILE={profile}` into `.env.isolated` only if not already present in parent environment. This gives per-repo defaults while respecting operator overrides. Document this in `.blue/config.yaml` comments: "Default AWS profile for this repo. Override by setting AWS_PROFILE before running Blue."
|
|
|
|
[TENSION T4: CI/CD credential injection] Scone's concern about CI/CD with different profiles needs addressing. Should config.yaml support environment-specific overrides like `aws.profiles.{ci,dev,prod}` or rely on CI setting `AWS_PROFILE` externally?
|
|
|
|
### 🧁 Scone (Developer Experience)
|
|
|
|
[CONCESSION: Runtime enforcement addresses the static/dynamic tension] Cupcake's insight about `blue_env_mock` injecting `AWS_PROFILE` into `.env.isolated` (line 91-94 of `/Users/ericg/letemcook/blue/crates/blue-mcp/src/handlers/env.rs`) directly addresses my T3 concern. If config stores the *intent* and Blue's runtime tools materialize it into environment state, we avoid mental model confusion. The config stays declarative ("this repo expects profile X") while `.env.isolated` becomes the execution layer.
|
|
|
|
[RESOLVED T3: Split responsibility is coherent] Config declares the profile requirement, `blue_env_mock` transforms it into `AWS_PROFILE=cultivarium` in the generated `.env.isolated`. Developers source that file for runtime context. This maintains separation: config.yaml = team-committed intent, `.env.isolated` = ephemeral runtime state (already .gitignored). The pattern mirrors how IaC detection (lines 138-163) identifies requirements but doesn't execute them.
|
|
|
|
[REFINEMENT: Discoverability needs explicit signaling] Cupcake's "warn but not block" for precedence conflicts is essential, but we also need first-run visibility. When `blue_env_detect` finds AWS SDK usage (lines 172-191) but no `aws:` section in config, it should suggest adding one. Similarly, `blue doctor` could validate that configured profiles exist in `~/.aws/config`. This surfaces P05 concerns proactively without breaking existing workflows.
|
|
|
|
[CONVERGENCE PROPOSAL] Add `aws: { profile: "cultivarium" }` to config.yaml structure, extend `generate_env_isolated()` to inject `AWS_PROFILE` when present, and enhance detection to warn when AWS SDK is found without profile config. Precedence: respect user's shell `AWS_PROFILE` but log a notice if it differs from config.
|
|
|
|
## Round 2 (Convergence)
|
|
|
|
> Confirming alignment on Scone's convergence proposal.
|
|
|
|
### 🧁 Muffin (Platform Architect)
|
|
|
|
[DESIGN CONVERGENCE CONFIRMED] The proposal is architecturally sound. Adding `AwsConfig` to `BlueConfig` and extending `generate_env_isolated()` follows existing patterns. Note: this is design-level agreement—implementation is pending. T4 resolved correctly: CI owns its credential strategy.
|
|
|
|
### 🧁 Cupcake (DevOps Engineer)
|
|
|
|
[CONVERGENCE CONFIRMED] The proposal cleanly separates concerns: config.yaml declares the project's intended AWS profile, while .env.isolated materializes it at runtime with appropriate precedence (env var wins). T4's resolution—letting CI set AWS_PROFILE externally—is correct. Implementation note: ensure the "profile differs" log is INFO-level, not WARN, to avoid alarming users who intentionally override.
|
|
|
|
### 🧁 Scone (Developer Experience)
|
|
|
|
[CONVERGENCE CONFIRMED] The proposal cleanly resolves all core tensions. The precedence model respects both CI flexibility and local developer intent. Implementation refinement: ensure "AWS SDK detected without profile" warning only fires when AWS credentials are actually *needed* by the task at hand, not just present in the environment.
|
|
|
|
---
|
|
|
|
## Converged Recommendation
|
|
|
|
**100% Convergence Achieved** 🎉
|
|
|
|
### Config Schema
|
|
|
|
Add to `.blue/config.yaml`:
|
|
|
|
```yaml
|
|
forge:
|
|
type: github
|
|
# ... existing config
|
|
|
|
aws:
|
|
profile: cultivarium # or muffinlabs, etc.
|
|
```
|
|
|
|
### Implementation
|
|
|
|
1. **Add `AwsConfig` struct** to `BlueConfig` in `crates/blue-core/src/forge/mod.rs`:
|
|
```rust
|
|
#[derive(Debug, Clone, Serialize, Deserialize)]
|
|
pub struct AwsConfig {
|
|
pub profile: String,
|
|
}
|
|
```
|
|
|
|
2. **Extend `generate_env_isolated()`** in `crates/blue-mcp/src/handlers/env.rs`:
|
|
- Read `aws.profile` from config
|
|
- Check if `AWS_PROFILE` already set in environment
|
|
- If not set: inject `AWS_PROFILE={profile}` into `.env.isolated`
|
|
- If set but differs: log INFO notice (not warning)
|
|
|
|
3. **Enhance `blue_env_detect`**:
|
|
- When AWS SDK usage detected but no `aws:` in config, suggest adding it
|
|
- `blue doctor` validates configured profile exists in `~/.aws/config`
|
|
|
|
### Precedence Rules
|
|
|
|
1. Shell `AWS_PROFILE` always wins (standard AWS CLI behavior)
|
|
2. Config provides repo default for `.env.isolated` generation
|
|
3. CI/CD sets its own `AWS_PROFILE` externally
|
|
|
|
### Per-Repo Examples
|
|
|
|
| Repo | Config |
|
|
|------|--------|
|
|
| `f-i-a` | `aws: { profile: cultivarium }` |
|
|
| `hearth` | `aws: { profile: muffinlabs }` |
|
|
| `aperture` | `aws: { profile: muffinlabs }` |
|
|
|
|
---
|
|
|
|
## Round 3 (New Requirement)
|
|
|
|
> **NEW REQUIREMENT**: Everything Claude does in its session should use this profile - not just worktree isolation, but all AWS interactions during a Claude Code session.
|
|
|
|
### 🧁 Muffin (Platform Architect)
|
|
|
|
[PERSPECTIVE P07: Session-wide environment injection at MCP initialization] The converged solution addresses `.env.isolated` for worktrees, but Claude's current session needs `AWS_PROFILE` injected **when the MCP server starts**. Looking at `/Users/ericg/letemcook/blue/crates/blue-mcp/src/server.rs:29-36`, `BlueServer::new()` is the initialization point. We should read `aws.profile` from config during `ensure_state()` and immediately set `std::env::set_var("AWS_PROFILE", profile)` in the server process. This makes the profile available to all subsequent AWS SDK calls and bash commands spawned by the MCP server.
|
|
|
|
[TENSION T5: Bash command environment inheritance] When Claude runs bash commands via MCP, those processes inherit the MCP server's environment. If we set `AWS_PROFILE` in the server process early, all child processes automatically get it. However, explicit overrides via `.env` or `AWS_PROFILE=x command` should still take precedence.
|
|
|
|
[REFINEMENT: Two-layer injection strategy] The implementation needs **both** layers: (1) MCP server startup reads config and sets its own `AWS_PROFILE` process variable for SDK calls and inherited bash environments, and (2) `blue_env_mock` still injects into `.env.isolated` for explicit worktree contexts.
|
|
|
|
### 🧁 Cupcake (DevOps Engineer)
|
|
|
|
[PERSPECTIVE P08: AWS_PROFILE must propagate to MCP subprocess environment] The Blue MCP server starts as a subprocess of Claude Code. When `BlueServer::new()` initializes, it should read `BlueConfig` from `.blue/config.yaml` and immediately inject `AWS_PROFILE` into its own process environment via `std::env::set_var()`. This ensures all subsequent bash tool calls and any AWS SDK operations inherit the profile.
|
|
|
|
[TENSION T6: Claude Code session vs Blue MCP server scope] Claude Code runs in a persistent desktop session, but Blue MCP server restarts per-conversation. The AWS MCP tool (`mcp__aws-api__call_aws`) runs in a **separate MCP server process** that Blue doesn't control. Blue can set `AWS_PROFILE` in its own environment (affecting bash calls Claude makes), but cannot directly modify the AWS MCP server's environment.
|
|
|
|
[REFINEMENT: Two-layer propagation strategy] **Layer 1 (Blue controls):** On `BlueServer::new()`, read `aws.profile` from config.yaml and call `std::env::set_var("AWS_PROFILE", profile_value)`. This affects bash commands Claude runs via Blue's MCP tools. **Layer 2:** The AWS MCP tool integration needs investigation—if Claude Code doesn't propagate env vars to aws-mcp-server, we'd need to instruct via MCP system prompt or recommend users configure AWS MCP server separately.
|
|
|
|
### 🧁 Scone (Developer Experience)
|
|
|
|
[PERSPECTIVE P09: Profile verification as startup diagnostic] Claude should emit a startup diagnostic showing which AWS profile is active, similar to how MCP servers announce themselves. Users need to know "you're running as cultivarium" before confusion happens, not after.
|
|
|
|
[TENSION T7: Config schema location] We have `LocalRepoConfig` (realm membership) and `BlueConfig` (forge caching), but no unified schema for AWS. Adding `aws: { profile: "cultivarium" }` works, but which struct deserializes it? We need to pick one as the "environment settings" home.
|
|
|
|
[PERSPECTIVE P10: Debuggability via environment inspection] For debugging, `blue_env_mock` should **report which profile will be injected** into `.env.isolated` before writing the file. Add a `"aws_profile": "cultivarium"` field to its JSON response showing what config.yaml specified.
|
|
|
|
## Round 4 (Final Convergence)
|
|
|
|
> Converging on session-wide AWS profile with explicit layering.
|
|
|
|
### 🧁 Muffin (Platform Architect)
|
|
|
|
[CONVERGENCE PROPOSAL] Blue handles what it can control (its process + `.env.isolated`). AWS MCP server profile alignment is a **deployment responsibility** documented in Blue's README. This separates concerns cleanly and doesn't overreach into external process management. Concrete implementation:
|
|
1. Blue sets `AWS_PROFILE` via `std::env::set_var()` in `BlueServer::ensure_state()` ✓
|
|
2. Blue writes `AWS_PROFILE=<name>` to `.env.isolated` for bash session inheritance ✓
|
|
3. Blue adds a startup diagnostic logging the active profile ✓
|
|
4. AWS MCP server configuration documented separately
|
|
|
|
### 🧁 Cupcake (DevOps Engineer)
|
|
|
|
[CONVERGENCE PROPOSAL] Implement **dual-layer AWS profile configuration**:
|
|
1. **Blue-controlled layer**: Set `AWS_PROFILE` via `std::env::set_var()` in `ensure_state()`. Affects all bash commands Claude executes through Blue's MCP server.
|
|
2. **AWS MCP layer documentation**: Document that users must EITHER set `AWS_PROFILE` in their shell before launching Claude Code, OR pass `--profile` flags explicitly. Blue cannot inject environment variables into AWS MCP server's process space.
|
|
|
|
### 🧁 Scone (Developer Experience)
|
|
|
|
[CONVERGENCE CONFIRMED] The simplest mental model is **explicit layering**: Blue owns repo-level config, applies it to what it controls. For AWS MCP server, we document the reality honestly. Startup diagnostic should check **both** layers and warn if they differ: "Blue will use `cultivarium` for bash/tools, but AWS MCP server may use shell default—consider aligning them."
|
|
|
|
---
|
|
|
|
## Final Converged Recommendation
|
|
|
|
**100% Convergence Achieved** 🎉
|
|
|
|
### Two-Layer Architecture
|
|
|
|
| Layer | Scope | Implementation |
|
|
|-------|-------|----------------|
|
|
| **Layer 1: Blue MCP** | Bash commands, Blue tools | `std::env::set_var("AWS_PROFILE", config.aws.profile)` in `ensure_state()` |
|
|
| **Layer 2: Worktrees** | Isolated environments | `blue_env_mock` writes `AWS_PROFILE` to `.env.isolated` |
|
|
| **Layer 3: AWS MCP** | External server | User responsibility: set shell env or use `--profile` flags |
|
|
|
|
### Config Schema
|
|
|
|
`.blue/config.yaml`:
|
|
```yaml
|
|
forge:
|
|
type: github
|
|
host: ...
|
|
owner: superviber
|
|
repo: blue
|
|
|
|
aws:
|
|
profile: cultivarium # Session-wide default
|
|
```
|
|
|
|
### Implementation Files
|
|
|
|
1. **`crates/blue-core/src/forge/mod.rs`** - Add `AwsConfig` struct to `BlueConfig`:
|
|
```rust
|
|
#[derive(Debug, Clone, Serialize, Deserialize)]
|
|
pub struct AwsConfig {
|
|
pub profile: String,
|
|
}
|
|
```
|
|
|
|
2. **`crates/blue-mcp/src/server.rs`** - Inject at startup in `ensure_state()`:
|
|
```rust
|
|
if let Some(aws) = &state.config.aws {
|
|
std::env::set_var("AWS_PROFILE", &aws.profile);
|
|
tracing::info!(profile = %aws.profile, "AWS profile set for session");
|
|
}
|
|
```
|
|
|
|
3. **`crates/blue-mcp/src/handlers/env.rs`** - Inject into `.env.isolated`:
|
|
```rust
|
|
if let Some(aws) = &config.aws {
|
|
lines.push(format!("AWS_PROFILE={}", aws.profile));
|
|
}
|
|
```
|
|
|
|
### Startup Diagnostic
|
|
|
|
When Blue MCP server starts, log:
|
|
```
|
|
[INFO] AWS profile: cultivarium (from .blue/config.yaml)
|
|
[WARN] Shell AWS_PROFILE differs: dev — AWS MCP server may use shell default
|
|
```
|
|
|
|
### Per-Repo Configuration
|
|
|
|
| Repo | Profile | Config |
|
|
|------|---------|--------|
|
|
| `f-i-a` | `cultivarium` | `aws: { profile: cultivarium }` |
|
|
| `hearth` | `muffinlabs` | `aws: { profile: muffinlabs }` |
|
|
| `aperture` | `muffinlabs` | `aws: { profile: muffinlabs }` |
|
|
|
|
### What Blue Controls vs. Documents
|
|
|
|
| Aspect | Blue Controls | Blue Documents |
|
|
|--------|---------------|----------------|
|
|
| Bash `aws` CLI commands | ✅ Via process env | — |
|
|
| Blue MCP tools touching AWS | ✅ Via process env | — |
|
|
| `.env.isolated` for worktrees | ✅ Writes directly | — |
|
|
| AWS MCP server (`call_aws`) | ❌ | User sets shell env or `--profile` |
|
|
|