yep yep yep
Support named argument syntax for model method run (e.g. --arg key=value)
env var overrides for globalArguments silently change which environment a model targets
deno lint no-import-prefix conflicts with swamp's required npm:/jsr: inline specifiers
AI agents should search community extensions before offering to create custom models
feat: add --content-type filter to extension search
Add a 'reports' feature
Port remaining CLI commands to libswamp + renderer pattern
Persistent runner / server mode to eliminate per-invocation CLI startup overhead
AI agent should prefer fan-out model methods over shell loops for fleet operations
Support unbundled helper scripts in extension packages
Add progress indicator for long-running model methods
Built-in structured output parser for CLI commands
Automatic trace context propagation across workflow steps
Native OpenTelemetry tracing for swamp CLI internals
Claude Code should prefer extending swamp extensions over using external CLI tools
Framework log lines written to stdout pollute model method output
Swamp skill should guide AI agents to create extension models instead of inline shell scripts
Shared team collectives for collaborative extension publishing
Delete methods should return last known state data
Add smoke-test skill for extension models
Workflow run output is unreadable — resource data and errors are buried in log noise
Recommend or manage lockfile strategy for extension model npm dependencies
Output of running a method is not the actual output
Add macOS Keychain vault type
bug: Vault secret shell escaping incomplete — $(), semicolons, and pipes are interpreted
Swamp should support "Scheduled"-type status for execution
feat: add support for Nix via a flake
ModelType.normalize replaces all dots with slashes, corrupting dotted type names
fix: collective validator error message omits drivers and datastores
Skill docs: document configSchema inline requirement and .describe() constraints for vault extensions
It takes 42 seconds to run swamp --help
After today upgrade
Auto-resolver fails when extensions/models/ directory does not exist for vault-only extensions
Azure Key Vault extension vault bundle fails to load in compiled binary
RangeError: Maximum call stack size exceeded when loading extension models with npm dependencies after upgrade to 20260317
Extension Zod schema incompatibility after upgrade to 20260312
Data garbage collection never fully removes expired data from disk
extension push --dry-run requires authentication unnecessarily
Typed context APIs to eliminate no-explicit-any in extension models
AWS extensions fail to load: missing _lib/aws.ts shared dependency
getContent() should resolve vault expressions for sensitive fields
getContent() should return parsed objects, not raw Uint8Array
Add context.readResource() to MethodContext for user extension models
Datastore lock: allow concurrent reads across different models
extension install should be an alias of extension pull
feat: Execution Driver Abstraction — Pluggable Isolation for Model Execution
Support --global-arg on model create
consider a libswamp
Running workflow should not block read-only operations
Update from 20260227 to 20260311 breaks existing model definitions (symlink + path-based type)
loadUserModels ignores --repo-dir, uses cwd instead
datastore lock release --force deadlocks on the stale lock it's trying to release
Datastore lock not released when interactive command fails in non-TTY context
vault put to 1Password stores empty password field
Leaderboard shows 0-event users whose profiles 404
Move AWS, Azure, and 1Password vault providers to extensions
Data instance name uniqueness is global across specs instead of per-spec
Audit timeline misses today's entries in UTC+ timezones
AI agent discoverability: reduce trial-and-error for CLI syntax
GlobalArguments CEL expressions fail when factory inputs are omitted — selective evaluation not working
Document factory pattern for model reuse in skills
Delete method uses identifier as data name instead of instance name
CLI method run ignores required arguments without .default()
Workflow run output mixes data, errors, and logs without clear separation — hard to find what actually executed
data.latest() in workflow step inputs resolved at workflow start, not at step execution time
Update method fails when globalArguments contain cross-model CEL expressions
Track resource deletion in local data model
fix: extension npm packages fail to resolve in compiled binary
swamp repo upgrade replaces entire CLAUDE.md with generic template instead of merging
Add drift detection to reconcile stored state against live cloud resources
Model inputs schema validated on all methods — delete fails requiring create-time inputs
Support wait-until-ready semantics for async resource provisioning
support pushing to organizations
Add data rename/move command for non-destructive refactoring
Schema mismatch warnings lack model context and misrepresent API response shapes
Support pre-flight validate method on models before method execution
Extension models need built-in support for idempotent create operations
Workflow reports succeeded when step outputs indicate failure
Swamp skills don't prevent AI agents from manually generating UUIDs for workflows
Bundler breaks tslib CJS/ESM interop for @aws-sdk/client-s3 dynamic imports
Support both US and UK English spellings (-ize/-ise)
swamp extensions aren't rebundled all the time
forEach with object items and static step name causes spurious cyclic dependency error
Validate extension content namespaces match package namespace during push
Extension metadata should align with usage and show all information
Enforce deno fmt and deno lint before publishing extensions
Swamp repo upgrade process after swamp update
Swamp hooks not formatted properly for Kiro, Kiro doesn't pipe and details into it's PostToolUse hook
change to x-api-key
feat: send content metadata from CLI during extension push
Add `swamp extension yank` command
Add api key management to swamp
Add per-version changelog/patch notes to extension push
Feature request: Kiro Support
swamp update appears to stall with no progress feedback
Show data retrieval commands after workflow run completes
Extension registry should support a git URL field for source code links
Preserve Unicode box-drawing characters in method stdout
Support --help flag on custom extension model methods
vault put: support reading secret values from a file instead of CLI args
Workflow inputs not resolved - modelIdOrName receives literal expression string
Check community extensions before building custom models
Use AWS_REGION instead of force to us-east-1
Add allowFailure flag on workflow steps
user.get returns 404 — wrong API URL path
Body already consumed error on logConfig.get and device.getPosture
model evaluate does not persist evaluated definitions for all models
workflow run does not evaluate expressions or pass task.inputs without --last-evaluated
Security: CLI login lacks user-visible device verification code
fix: detectConflicts uses basename for bundles, missing nested directory structure
Add repository field to extension manifest schema
Add extension list command
feat: implement `extension rm` command
Track extracted files in upstream_extensions.json during extension pull
Extension push includes macOS ._* resource fork files in archive
extension push ignores modelsDir setting in .swamp.yaml
Populate .gitattributes with linguist-generated markers during repo init
MaxListenersExceededWarning shown after repeated CLI commands
Extension push should follow symlinks in workflows/ directory
Workflow step task.inputs not forwarded as method arguments at runtime
forEach with data.findBySpec() expands duplicate steps causing cyclic dependency error
Add extensions/workflows support for 3rd-party workflow discovery and execution
Proactive update notification via post-run async check
Include models/ and vaults/ symlink dirs in managed .gitignore section
Provide guidance on deno.lock file management
Race condition: repo index concurrent with vault put crashes with ENOTEMPTY
Race condition in concurrent vault put: refreshSecretsIndex ENOTEMPTY
Add contract tests, property-based tests, and architectural fitness tests
Azure Key Vault extension vault bundle fails to load in compiled binary
Opened by swampadmin · 11/1/2025
Description
The @swamp/azure-kv vault extension bundle fails to load when running inside the compiled swamp binary. The bundle is successfully downloaded and installed by the auto-resolver, but the UserVaultLoader fails to import it.
The Azure SDK dependencies (@azure/identity, @azure/keyvault-secrets) produce a very large bundle when inlined by deno bundle. When the compiled binary tries to import this bundle, it falls back to the base64 data URL import path (data:application/javascript;base64,...), which fails with:
The argument 'filename' must be a file URL object, file URL string, or absolute path string. Received data:application/javascript;base64,...The @swamp/1password (no npm SDK deps) and @swamp/aws-sm (AWS SDK) extensions load successfully. The Azure bundle is significantly larger due to the combined @azure/identity + @azure/keyvault-secrets dependency tree.
Steps to reproduce
- Compile swamp:
deno run compile - Initialize a repo:
swamp repo init(in a fresh directory) - Create
extensions/models/directory (required for install) - Create a vault config YAML with
type: azure-kv - Run any vault command (e.g.,
swamp vault list-keys <name>) - Auto-resolution finds and installs
@swamp/azure-kvsuccessfully - The vault bundle file exists at
.swamp/vault-bundles/azure_kv.js - Loading the bundle fails with the data URL error
Environment
- macOS (darwin-aarch64)
- Compiled binary via
deno run compile
Summary
This affects the UserVaultLoader.importBundle() method in src/domain/vaults/user_vault_loader.ts. The file URL import path should work since the bundle is written to .swamp/vault-bundles/azure_kv.js, but it appears to fall through to the data URL fallback. The fix likely involves ensuring the file URL import path is used when the cached bundle file exists on disk, and investigating why it falls through to the data URL path for large bundles. The uint8ArrayToBase64 chunked encoding (added in PR #731 for large model bundles) may also need to be verified for vault bundles.
Closed
No activity in this phase yet.
Sign in to post a ripple.