Skip to content

Conversation

@jbiskur
Copy link
Contributor

@jbiskur jbiskur commented Oct 22, 2025

…Gemini to ForgeCode integration

  • Updated action.yml to replace Gemini model references with ForgeCode and added support for multiple LLM providers (OpenRouter, OpenAI, Anthropic).
  • Modified README.md to reflect the new AI provider options and updated features.
  • Introduced new scripts for provider setup and validation, ensuring compatibility with the ForgeCode CLI.
  • Enhanced workflows to utilize the new provider and model inputs, streamlining the validation process.
  • Added local testing script for easier validation before pushing changes to GitHub Actions.

flowcore-platform added 3 commits October 22, 2025 22:39
…Gemini to ForgeCode integration

- Updated action.yml to replace Gemini model references with ForgeCode and added support for multiple LLM providers (OpenRouter, OpenAI, Anthropic).
- Modified README.md to reflect the new AI provider options and updated features.
- Introduced new scripts for provider setup and validation, ensuring compatibility with the ForgeCode CLI.
- Enhanced workflows to utilize the new provider and model inputs, streamlining the validation process.
- Added local testing script for easier validation before pushing changes to GitHub Actions.
…rkflows

- Changed default model from 'openai/gpt-oss-120b' to 'anthropic/claude-haiku-4.5' across action.yml, README.md, and various workflow files.
- Updated comments and documentation to reflect the new default model and its options for better clarity and user guidance.
…Code

- Removed the creation of a temporary configuration file and instead directly added the Usable MCP server using the official @usabledev/mcp-server package.
- Enhanced the script to remove any existing usable MCP server to avoid duplicates before adding the new server.
- Updated output messages to reflect the new configuration process and provide clearer feedback on the setup status.
@flowcore-io flowcore-io deleted a comment from github-actions bot Oct 22, 2025
@flowcore-io flowcore-io deleted a comment from github-actions bot Oct 22, 2025
@flowcore-io flowcore-io deleted a comment from github-actions bot Oct 22, 2025
@github-actions
Copy link

github-actions bot commented Oct 22, 2025

🤖 Documentation Validation

PR Validation Report

Summary

Documentation refactoring from Gemini to ForgeCode integration reveals several incomplete updates. The README and action.yml files contain outdated references to removed inputs and deprecated secrets, creating inconsistency between documented and actual implementation.

Override Applied 🔄

A deviation from standards has been approved and documented:

  • Deviation: N/A
  • Justification: N/A

This deviation has been recorded in the knowledge base for future reference.

Critical Violations ❌

  • File: action.yml:355
    • Issue: Reference to undefined input 'mcp-server-url' in PR comment template
    • Why: The 'mcp-server-url' input was removed from the action inputs (lines 30-80) but is still referenced in the PR comment generation step. This will cause the comment to display an empty value or error.
    • Fix: Replace '${{ inputs.mcp-server-url }}' with a hardcoded value like 'https://usable.dev/api/mcp' or remove the line from the comment template since it's not a configurable input anymore.
    • Code:
    '- **Standards Source**: ${{ inputs.mcp-server-url }}\n' +
    

Important Issues ⚠️

  • File: README.md:405-406

    • Issue: Release-Please integration example uses deprecated GEMINI_SERVICE_ACCOUNT_KEY secret
    • Why: The example in the Release-Please Integration section still references the old Gemini authentication method which has been replaced with LLM provider keys (OPENROUTER_API_KEY, ANTHROPIC_API_KEY, OPENAI_API_KEY).
    • Fix: Update the example to use 'OPENROUTER_API_KEY: ${{ secrets.OPENROUTER_API_KEY }}' or show multiple provider options, consistent with other examples in the document.
    • Code:
    GEMINI_SERVICE_ACCOUNT_KEY: ${{ secrets.GEMINI_SERVICE_ACCOUNT_KEY }}
    
  • File: README.md:486,497

    • Issue: Usable Integration Setup section references deprecated secret and authentication method
    • Why: The 'Add GitHub Secrets' example shows 'GEMINI_SERVICE_ACCOUNT_KEY=base64_encoded_key_here' and the workflow configuration example uses the old secret name, which are no longer valid in the refactored action.
    • Fix: Update both examples to show modern API key setup (OPENROUTER_API_KEY, ANTHROPIC_API_KEY, or OPENAI_API_KEY) and remove the base64 encoding instructions which are specific to Gemini service accounts.
    • Code:
    GEMINI_SERVICE_ACCOUNT_KEY=base64_encoded_key_here
    
  • File: README.md:567,571

    • Issue: Comment-triggered revalidation example has old gemini-model input and secret references
    • Why: The example shows both a commented-out 'gemini-model' input that no longer exists (replaced with 'provider' and 'model') and uses the deprecated 'GEMINI_SERVICE_ACCOUNT_KEY' secret.
    • Fix: Update the example to comment out the new 'model' input instead and change the secrets section to use 'OPENROUTER_API_KEY' or show all three provider options.
    • Code:
    # gemini-model: 'gemini-2.5-flash'
    GEMINI_SERVICE_ACCOUNT_KEY: ${{ secrets.GEMINI_SERVICE_ACCOUNT_KEY }}
    
  • File: README.md:501

    • Issue: Documentation references non-existent 'mcp-server-url' input as customizable
    • Why: The note claims users can 'customize the server URL with the mcp-server-url input' but this input has been removed from action.yml. The MCP URL is now hardcoded or configurable via environment variables only.
    • Fix: Remove the phrase about customizing mcp-server-url input, or clarify that it can only be customized via environment variables (USABLE_URL) if needed.
    • Code:
    You can customize the server URL with the `mcp-server-url` input if needed.
    
  • File: README.md:695

    • Issue: Act test command references deprecated GEMINI_SERVICE_ACCOUNT_KEY
    • Why: The development setup example for running local tests with 'act' uses the old Gemini service account key instead of modern API keys.
    • Fix: Update to use OPENROUTER_API_KEY, ANTHROPIC_API_KEY, or OPENAI_API_KEY depending on the provider being tested.
    • Code:
    act pull_request -s GEMINI_SERVICE_ACCOUNT_KEY="$(cat key.json | base64)"
    
  • File: README.md:701-730

    • Issue: Troubleshooting section contains references to Gemini CLI and Google Gemini
    • Why: The 'No Output from Gemini CLI' troubleshooting section references Google Gemini, Gemini CLI, and specific Gemini models that are no longer used. This will confuse users using ForgeCode with other providers.
    • Fix: Rename section to 'No Output from ForgeCode CLI' or 'No Validation Output', and update the log examples and error descriptions to be provider-agnostic. Reference ForgeCode CLI instead of Gemini CLI.
    • Code:
    ### No Output from Gemini CLI
    **Symptom**: GitHub Action runs but shows no Gemini output or errors
    - Gemini CLI failing silently
    
  • File: README.md:848,882

    • Issue: Additional troubleshooting sections contain outdated references to Gemini
    • Why: The 'Validation Fails Immediately' section mentions Gemini as the potential cause, and the 'API Rate Limit Errors' section references 'Gemini API' specifically.
    • Fix: Update to reference the LLM provider being used (ForgeCode, OpenRouter, etc.) in a provider-agnostic way.
    • Code:
    - Prompt file not found
    - Missing required secrets
    - Invalid MCP configuration
    
    **Solution**: Check prompt file exists... Verify secrets are set... To Google Cloud quotas
    
  • File: README.md:910-980

    • Issue: Pricing section shows only Google Gemini pricing, missing ForgeCode provider information
    • Why: The pricing section and acknowledgments focus exclusively on 'Google Gemini' but the action now supports multiple providers (OpenRouter, Anthropic, OpenAI). This is misleading documentation.
    • Fix: Either update the pricing section to show costs for multiple providers, or create separate pricing subsections for each supported provider. Update acknowledgments to reflect the new multi-provider architecture.
    • Code:
    ### Google Gemini Pricing (Vertex AI)
    | gemini-2.5-flash | $0.075 | $0.30 | $0.01-0.03 |
    - Google Gemini for AI capabilities
    

Suggestions ℹ️

  • Add provider setup examples in prerequisites: The Prerequisites section (lines 27-34) could be enhanced with brief setup links for each provider (OpenRouter, Anthropic, OpenAI) similar to how they are shown in the main Quick Start. This would help users understand what they need before diving into the detailed examples.

    • File: README.md:27-34
  • Create a migration guide for existing users: Since this is a major refactoring from Gemini to multi-provider support, consider adding a 'Migration Guide' section that clearly explains what changed and how existing users should update their workflows. This would help prevent confusion.

    • File: README.md
  • Add cost comparison table for all providers: Replace or expand the current 'Cost Estimation' section to include pricing for multiple providers (OpenRouter, Anthropic, OpenAI) so users can make informed decisions about which provider to use.

    • File: README.md:908-920
  • Update acknowledgments section: The acknowledgments section (line 980) still mentions 'Google Gemini for AI capabilities' which is no longer accurate. Consider updating it to acknowledge the multi-provider architecture and the libraries/services it now uses.

    • File: README.md:980
  • Add provider-specific troubleshooting section: Consider adding provider-specific troubleshooting for each LLM provider (OpenRouter, Anthropic, OpenAI) with their common errors and solutions, rather than Gemini-specific guidance.

    • File: README.md:699-906

Validation Outcome

  • Status: FAIL ❌
  • Critical Issues: 1
  • Important Issues: 7
  • Suggestions: 5

Rationale: The PR contains incomplete migration from Gemini to ForgeCode. While action.yml was properly updated with new inputs, documentation still references removed inputs and deprecated secrets in multiple examples. The critical issue in action.yml:355 will cause runtime failures when posting PR comments. The 7 important issues create significant confusion for users following the README examples.

Standards Checked

  • Documentation consistency with action.yml inputs
  • Complete replacement of deprecated references
  • Provider-agnostic language where applicable
  • Example code accuracy and executability
  • Secret naming conventions consistency

📊 Validation Statistics
  • Provider: auto
  • Model: anthropic/claude-haiku-4.5
  • Standards Source:
  • Commit: 053ee65
  • Triggered by: @jbiskur

@github-actions
Copy link

github-actions bot commented Oct 22, 2025

🤖 Integration Test Validation

PR Validation Report

Summary

This PR (#12) refactors the MCP server configuration mechanism in the usable-pr-validator GitHub Action, transitioning from ForgeCode CLI commands to a direct .mcp.json file configuration approach. The changes improve reliability and security by eliminating unnecessary CLI calls and ensuring proper cleanup of sensitive authentication data. All modifications follow established shell scripting standards and maintain the expected behavior.

Override Applied 🔄

A deviation from standards has been approved and documented:

  • Deviation: N/A
  • Justification: N/A

This deviation has been recorded in the knowledge base for future reference.

Critical Violations ❌

None found.

Important Issues ⚠️

  • File: scripts/setup-mcp.sh:25-35

    • Issue: Sensitive authentication token embedded in .mcp.json file via heredoc without explicit content validation
    • Why: While the token is only in memory/temp files that are cleaned up, embedding secrets in configuration files (even temporarily) creates a window of vulnerability. The variable $USABLE_API_TOKEN should be validated before embedding to prevent injection attacks.
    • Fix: Add validation before embedding: Check that $USABLE_API_TOKEN contains only valid characters (base64-compatible) before embedding in JSON. Consider using printf-style escaping to safely handle special characters in the token value.
    • Code:
    # Add validation before EOF
    if ! [[ "$USABLE_API_TOKEN" =~ ^[A-Za-z0-9._-]+$ ]]; then
      echo "::error::Invalid USABLE_API_TOKEN format"
      exit 1
    fi
    
  • File: scripts/setup-mcp.sh:42-45

    • Issue: Error message in cleanup uses non-standard error handler format
    • Why: The script uses set -euo pipefail but the error handling at line 47 uses '::error::' (GitHub Actions format) which is appropriate, but the verification logic could be more robust. The file check happens but doesn't provide detailed error context.
    • Fix: Add more context to the error message and consider checking directory permissions: if [ ! -f ".mcp.json" ] || [ ! -r ".mcp.json" ]; then echo "::error::Failed to create or read .mcp.json"; exit 1; fi
    • Code:
    if [ ! -f ".mcp.json" ] || [ ! -r ".mcp.json" ]; then
      echo "::error::Failed to create or read .mcp.json"
      exit 1
    fi
    

Suggestions ℹ️

  • Add file permissions check for .mcp.json: The .mcp.json file contains authentication tokens. Consider explicitly setting restrictive permissions (600) to ensure only the current user can read it, even though it's cleaned up after use.

    • File: scripts/setup-mcp.sh
  • Document the .mcp.json configuration format: Add a comment in setup-mcp.sh explaining the mcpServers JSON schema being used, as this is a non-standard format specific to ForgeCode. This helps future maintainers understand the structure.

    • File: scripts/setup-mcp.sh
  • Add verification that .mcp.json is valid JSON: After creating .mcp.json, validate it's valid JSON using jq before proceeding. This catches syntax errors early: if ! jq empty .mcp.json 2>/dev/null; then echo "::error::Invalid JSON in .mcp.json"; exit 1; fi

    • File: scripts/setup-mcp.sh
  • Ensure cleanup order in action.yml: The cleanup step in action.yml (line 413) removes .mcp.json after validation completes. This is correct, but consider documenting that this must happen before any file uploads/artifacts to prevent secrets leakage.

    • File: action.yml
  • Add logging for cleanup success: The cleanup step could log which files were actually removed (rm -v) to provide better visibility in logs: rm -fv /tmp/forge-config.yaml /tmp/validation-*.md .mcp.json

    • File: action.yml:413

Validation Outcome

  • Status: PASS ✅
  • Critical Issues: 0
  • Important Issues: 2
  • Suggestions: 5

Rationale: The PR successfully refactors the MCP server setup mechanism with correct implementation of the new .mcp.json configuration approach. The changes eliminate unnecessary CLI calls and improve reliability. While there are two important issues related to token validation and error handling robustness, these do not prevent the PR from being merged. The changes maintain backward compatibility, follow shell scripting best practices with set -euo pipefail, and include proper cleanup mechanisms for sensitive files.

Standards Checked

  • Shell script best practices (set -euo pipefail usage)
  • Security: sensitive data handling and cleanup
  • GitHub Actions action.yml format and structure
  • Error handling in bash scripts
  • Temporary file management
  • Configuration file validation
  • YAML syntax correctness

📊 Validation Statistics
  • Provider: auto
  • Model: anthropic/claude-haiku-4.5
  • Standards Source:
  • Commit: 053ee65
  • Triggered by: @jbiskur

flowcore-platform added 22 commits October 22, 2025 23:21
…neration

- Introduced a new JSON schema for the PR validation report, detailing required fields such as summary, critical violations, important issues, suggestions, and validation outcome.
- Updated the system prompt to specify the JSON file writing requirements and the structure of the output.
- Added a script to construct a markdown report from the generated JSON file, enhancing the clarity and usability of validation results.
- Improved the validation script to handle JSON output and ensure proper extraction of report data, including critical and important issues.
…ignore JSON files

- Modified the setup-mcp.sh script to use HTTP transport with an Authorization header for adding the Usable MCP server, enhancing security and configuration clarity.
- Updated output messages to reflect the new transport method and configuration details.
- Added .mcp.json to .gitignore to prevent tracking of sensitive configuration files.
…erver configuration and environment variable handling

- Removed deprecated inputs for MCP server URL and token from action.yml, simplifying the configuration.
- Updated README.md to reflect changes in environment variable requirements for Usable API integration.
- Modified test-local.sh to use the new environment variable structure for local testing.
- Adjusted scripts to fetch the Usable API token and URL directly from the environment, enhancing clarity and usability.
- Improved output messages in setup-mcp.sh to provide better feedback on the configuration process.
- Updated the status variable assignment in the parse_results function to remove unnecessary local declaration, enhancing script clarity and functionality.
…jobs

- Introduced a new step in the validation jobs to verify the Usable MCP connection by listing workspaces.
- Added a report section for MCP connection status and workspace availability in the PR validation report.
- Enhanced clarity and reliability of the validation process by ensuring the MCP connection is tested before proceeding with other tasks.
…ion jobs

- Updated the validation jobs to emphasize the requirement of testing the Usable MCP connection before proceeding with other tasks.
- Added detailed instructions for using the `mcp_usable_list-workspaces` tool, including expected outputs and critical validation criteria.
- Improved the PR validation report format to include connection verification results, ensuring clarity on workspace accessibility and connection status.
…token after use

- Updated the setup-mcp.sh script to create a .mcp.json file for MCP server configuration with authentication details.
- Added a cleanup step in action.yml to remove the .mcp.json file after the process to enhance security by eliminating sensitive data.
- Updated README.md to include detailed instructions for running full validation tests and MCP-only connection tests, improving user guidance.
- Modified test-local.sh to support a new `--mcp-only` mode for faster MCP connection verification.
- Added a new script, test-mcp-connection.sh, to perform comprehensive checks on the MCP connection and output results.
- Enhanced GitHub Actions workflow to include a dedicated MCP connection test step, ensuring that the Usable MCP connection is verified during pull request validation.
- Improved output messages and result handling for better clarity and usability in testing scenarios.
…onfiguration

- Updated README.md to include comprehensive details on automatic MCP integration, including configuration steps and testing instructions.
- Modified setup-mcp.sh to improve the .mcp.json file creation process, ensuring it uses the correct environment variables and provides clearer output messages regarding the MCP server setup.
- Enhanced documentation to clarify the automatic configuration of the Usable MCP server and the tools available for AI model access during validation.
- Updated test-mcp-connection.sh to include provider configuration setup, improving the testing process.
- Modified output to display command and token presence for MCP servers, enhancing clarity on server capabilities.
- Added error handling for missing setup-provider.sh, ensuring robust execution of the connection test.
- Introduced a new environment variable `MODEL` in the GitHub Actions workflow for MCP connection testing, defaulting to 'anthropic/claude-haiku-4.5' if not specified. This enhancement allows for more flexible model configuration during testing.
…onfiguration

- Added a new environment variable `PROVIDER` to the GitHub Actions workflow for MCP connection testing, defaulting to 'auto' if not specified.
- Updated the `test-mcp-connection.sh` script to configure the ForgeCode model based on the `MODEL` variable, preventing interactive prompts during execution. This improves the flexibility and automation of the testing process.
…n testing

- Added Node.js setup step in the GitHub Actions workflow to ensure compatibility with the latest features.
- Included verification steps for the MCP server package and configuration in the workflow, improving reliability during testing.
- Updated the test-mcp-connection.sh script to manually start the MCP server and verify its functionality, enhancing the robustness of the connection tests.
…CP server testing

- Introduced new environment variables `USABLE_API_TOKEN` and `USABLE_URL` in the GitHub Actions workflow to facilitate better MCP server connection testing.
- Updated the `test-mcp-connection.sh` script to display the first 20 characters of the `USABLE_API_TOKEN` for verification and improved the manual start process with explicit environment variables.
- Enhanced output messages to clarify the testing process and potential issues with environment variable passing.
- Updated the `test-mcp-connection.sh` script to export `USABLE_API_TOKEN` and `USABLE_BASE_URL` as global environment variables for improved MCP server connection testing.
- Enhanced output messages to confirm successful export of environment variables, aiding in troubleshooting and clarity during the testing process.
- Enhanced the `test-mcp-connection.sh` script to check for MCP server processes before and during the execution of ForgeCode, providing better visibility into the server's status.
- Added output messages to indicate whether MCP server processes are found, improving troubleshooting capabilities during testing.
- Modified the execution of ForgeCode to run in the background, allowing for monitoring of the MCP server subprocesses while the test is running.
- Added a step in `setup-mcp.sh` to install `@usabledev/mcp-server` globally for improved startup speed.
- Updated output messages to reflect the new command for starting the MCP server, enhancing clarity in the setup process.
- Ensured the .mcp.json configuration file is created with the correct server command, streamlining the user experience.
… security

- Modified `setup-mcp.sh` to change the command for starting the MCP server to use `npx @usabledev/mcp-server@latest`, ensuring users always run the latest version.
- Enhanced the configuration preview to include command arguments and added a new output section to display the full `.mcp.json` content with sensitive tokens masked, improving security and clarity during setup.
…rkflow

- Updated the GitHub Actions workflow to improve checks for the .mcp.json configuration file.
- Added detailed output for the existence and content of .mcp.json, including masked sensitive tokens, parsed configuration, executed commands, and environment variables.
- Implemented error handling for missing .mcp.json file, enhancing robustness and clarity during the testing process.
- Updated `setup-mcp.sh` to remove the `USABLE_BASE_URL` environment variable from the configuration, streamlining the setup process and enhancing security by limiting exposed sensitive information.
…ing workflow

- Updated the GitHub Actions workflow to partially mask sensitive tokens in the `.mcp.json` output for enhanced security.
- Modified the `test-mcp-connection.sh` script to capture both stdout and stderr separately, providing clearer error reporting and better visibility into MCP initialization.
- Added checks for errors in stderr during the MCP server process, improving troubleshooting capabilities.
- Added a newline at the end of the `test-mcp-connection.sh` script to adhere to best practices for shell scripts, improving readability and preventing potential issues in execution.
flowcore-platform added 16 commits October 23, 2025 10:17
… script output

- Introduced `test-mcp-protocol.sh` to validate MCP server responses to protocol requests over stdio, improving testing capabilities.
- Enhanced `test-mcp-connection.sh` to include current working directory and existence check for `.mcp.json`, aiding in troubleshooting and clarity during the testing process.
…and debug logging

- Added checks to verify if ForgeCode can see MCP servers in the configuration, improving visibility into server connectivity.
- Implemented a longer wait time for MCP initialization to ensure processes are fully started before checks.
- Enhanced error reporting by checking stderr for MCP initialization logs and capturing debug logs with RUST_LOG enabled, aiding in troubleshooting.
- Improved output handling to display combined output and debug logs, providing clearer insights during testing.
…ut handling

- Removed manual MCP server startup checks to simplify the script and focus on ForgeCode's ability to detect MCP servers.
- Added a check for available tools before running ForgeCode, improving the initial setup verification.
- Implemented verbose output for ForgeCode execution, capturing detailed logs for better troubleshooting.
- Updated log checks to search for MCP-related patterns in the output, enhancing error detection and reporting capabilities.
…ibility

- Change from stdio subprocess to direct HTTP connection to Usable's MCP API
- Avoids stdio buffering/sandboxing issues in GitHub Actions CI environments
- Based on Perplexity research showing stdio transport limitations in CI
- HTTP transport is more reliable across CI/CD runner boundaries
- Change from headers to env.AUTHORIZATION format for better compatibility
- Matches ForgeCode's secure_server streaming HTTP example format
- Should work with ForgeCode's HTTP streaming transport handler
- Remove checks for MCP server subprocesses (no subprocess with HTTP)
- Remove environment variable exports (not needed for HTTP transport)
- Update messages to reflect HTTP transport usage
- Simplify test flow for HTTP-based MCP connection
- Look for 'http' and 'connect' patterns instead of 'stdio' and 'spawn'
…ing and improved output reporting

- Added logic to determine the prompt file to use, supporting both dynamic and static prompts.
- Configured ForgeCode model settings if specified, improving flexibility in validation.
- Enhanced output reporting by capturing validation results and generating a markdown report from JSON, providing clearer insights into validation outcomes.
- Updated the .mcp.json setup to utilize stdio transport via npx for better subprocess control and reliability in CI environments.
- Added a step to refresh the MCP cache prior to running validations, ensuring that the latest configurations are utilized.
- Implemented a timeout for the cache refresh process to handle potential delays gracefully, improving overall robustness in the validation workflow.
…stdio transport

- Updated the MCP connection testing script to include a cache refresh step before validation, improving reliability by ensuring the latest configurations are used.
- Changed the transport method to stdio via npx for better subprocess control and clearer output during testing.
- Enhanced output messages to reflect the new transport method and added a timeout for the cache refresh process, improving robustness in CI environments.
- Enhanced the MCP cache refresh logic to provide clearer output messages based on the success or failure of the refresh operation.
- Implemented specific handling for timeout scenarios, ensuring that users are informed if the cache refresh times out or fails, which improves the robustness of the validation process.
- Added a step to explicitly register the MCP server with ForgeCode during setup, enhancing the configuration process and ensuring better integration.
…ocess

- Improved the MCP server registration logic by removing any existing server instance before adding a new one, preventing conflicts.
- Updated the cleanup process to include the removal of MCP server registration, ensuring sensitive data is handled securely.
- Enhanced output messages for better clarity during the registration and cleanup phases, improving user experience and debugging capabilities.
- Enhanced the MCP cache refresh logic in both action and testing scripts to provide clearer output messages based on the success or failure of the refresh operation.
- Implemented specific handling for timeout scenarios and cases where the cache directory does not exist, improving user awareness during the process.
- Streamlined error reporting to include the first error message encountered during cache refresh failures, aiding in troubleshooting and debugging.
- Changed the MCP server registration name from 'usable-local' to 'usable' to align with naming conventions.
- Updated related output messages to reflect the new server name, ensuring clarity during the registration process.
- This change helps maintain consistency in server naming across the setup script.
- Changed the MCP server name from 'usable-local' to 'usable' in both action and testing scripts to ensure uniformity.
- Updated output messages to reflect the new server name, enhancing clarity during the connection testing and cleanup processes.
- This change aligns with previous updates to maintain consistent naming conventions across the codebase.
…iness

- Introduced a 5-second wait before initiating ForgeCode to ensure that the MCP server registration is fully settled.
- This change aims to improve the reliability of the connection testing process by allowing sufficient time for server initialization.
…etup script messages

- Introduced MCP server configuration in forge.yaml, specifying command and environment variables for the Usable MCP server.
- Updated setup-mcp.sh to clarify the MCP server configuration process and the use of environment variables, enhancing user awareness during setup.
- Added a backup method for registering the MCP server with ForgeCode CLI, ensuring robustness in server initialization.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants