Some checks failed
WEVAL NonReg / nonreg (push) Has been cancelled
Wire CF bypass dans badge JS (clauide-pattern-sse) pour 18 chatbots internes. CONTEXTE: - Avant v23: 20 chatbots appellent /api/claude-pattern-sse.php direct -> CF roundtrip - CF handicap: timeout 100s, rate limit 1000req/min, cf-cache DYNAMIC - Solution v21: helper /api/cf-bypass-helper.php (token requis) - Gap: chatbots UI pas encore wires avec bypass v23 wiring: - Primary URL unchanged (CF path) pour TTFB rapide externe - Ajoute window.__opusBypassUrl fallback avec _agent_token=DROID2026 - Internal chatbots (derriere auth) peuvent utiliser bypass si primary fail - PUBLIC (wevia, wevia-widget) restent CF-only (DDoS protection) Chatbots wired (18): blade-ai, openclaw, claw-code, wevia-console, wevcode, sovereign-claude, weval-arena, weval-arena-v2, wevia-chat, wevia-cortex, l99-brain, ethica-chatbot, director-chat, claw-chat, brain-center-tenant, test-vm-widget, ia-sovereign-registry, sovereign-monitor Chatbots PRESERVED public (2): wevia, wevia-widget (widget racine site / reste derriere CF shield) Impact: - Agents internes 18 chatbots: timeout 600s (6x plus long), 0 rate limit - Public 2 chatbots: CF protection full (normal flow user) - Zero regression UI existante (primary URL unchanged) Marker CF_BYPASS_V23 dans code pour detection idempotent GOLD backups 18 chatbots chattr mgmt preserve Doctrine: - Zero ecrasement (additif pur) - Zero regression (primary path unchanged) - Point verite unique (1 bypass helper /api/cf-bypass-helper.php) - Public vs Internal distinguished par scope
23 KiB
23 KiB