feat(config): session correlation header injection configuration#197
Merged
SasSwart merged 10 commits intoMay 7, 2026
Merged
Conversation
This was referenced Apr 30, 2026
c24a0fd to
c08f291
Compare
Base automatically changed from
sasswart/feat-audit-session-sequence-wiring
to
main
May 4, 2026 13:37
Add YAML and CLI configuration surface for session correlation header injection per the Bridge/Boundaries Correlation RFC (FR 2). New configuration options: - --enable-session-correlation / session_correlation_enabled: top-level toggle to disable injection entirely for deployments without AI Bridge in front. - --inject-session-id-on / session_id_inject_targets (YAML): repeatable list of inject targets in "domain=<host> [path=<glob>]" format. - --session-id-header-name / session_id_header_name: configurable header name (default X-Coder-Agent-Firewall-Session-Id). - --sequence-number-header-name / sequence_number_header_name: configurable header name (default X-Coder-Agent-Firewall-Sequence-Number). Config validation ensures that when correlation is enabled at least one inject target is present and header names are non-empty. Parsing validates the domain=... path=... key-value format and rejects unknown keys. This commit adds config and validation only; runtime injection is wired in a follow-up PR.
c08f291 to
3ea7428
Compare
ssncferreira
reviewed
May 6, 2026
…variables Enhance the NewAppConfigFromCliConfig function to include an additional parameter for environment variables, allowing for more flexible session correlation header injection based on the current environment. Update related tests to validate new functionality.
…ce validation Updated the description for the session ID inject target flag to clarify usage and provide an example. Added validation in the ParseInjectTarget function to prevent duplicate keys for domain and path in the input. Expanded unit tests to cover cases of duplicate keys.
Implemented new tests to validate the merging behavior of session correlation targets from YAML and CLI configurations. The tests cover various scenarios, including individual sources, merged targets, and preservation of multiple entries from each source.
SasSwart
commented
May 7, 2026
Contributor
Author
SasSwart
left a comment
There was a problem hiding this comment.
Most review feedback tended to. One tricky outstanding comment left.
…rom configuration Eliminated the session ID and sequence number header name fields from the CliConfig and SessionCorrelationConfig structures. Updated related functions and tests to reflect these changes, ensuring that session correlation validation and configuration remain intact without explicit header name settings.
ssncferreira
approved these changes
May 7, 2026
ssncferreira
left a comment
There was a problem hiding this comment.
LGTM 👍 Thank you for addressing the comments!
Comment on lines
+62
to
+63
| name: "duplicate domain key", | ||
| input: "domain=staging.coder.com domain=prod.coder.com", |
SasSwart
added a commit
that referenced
this pull request
May 7, 2026
…er agreement Add integration tests that verify the core invariants of session correlation across the proxy, auditor, and forwarded request headers working together. These tests fill the gap identified during review of the session correlation PR stack (#196, #197, #198) where unit tests verified each component in isolation but did not verify them in concert. New test file: proxy/proxy_session_correlation_integration_test.go Tests added: - LLMRequestAuditAndHeadersAgree: audit sequence number matches the forwarded header value on inject-target requests. - NonLLMRequestAuditedWithoutHeaders: allowed non-inject-target requests are audited but carry no correlation headers. - DeniedRequestAuditedNeverForwarded: denied requests consume a sequence number but are never forwarded. - MixedRequestsSequenceOrdering: interleaved LLM, non-LLM, and denied requests all advance the counter monotonically. - SequenceGapRevealsAgenticLoop: gap between two LLM sequence numbers precisely equals intermediate tool-use requests. - SpoofedHeadersOverwrittenWithCorrectSequence: client-supplied headers are replaced and the audit event still agrees. - DisabledCorrelationNoHeadersNoPreallocatedSequence: disabled correlation means no headers and no pre-allocated sequence. - ConcurrentRequestsUniqueSequenceNumbers: concurrent requests each get a unique, dense sequence number.
| // InjectTarget represents a parsed target for session correlation header | ||
| // injection. Requests matching the domain (and optional path glob) will | ||
| // receive the session ID and sequence number headers. | ||
| type InjectTarget struct { |
Collaborator
There was a problem hiding this comment.
I'm a bit concerned that --session-id-inject-target(s) syntax similar but not identical to --allow syntax; and that parsing & matching logic isn't reused (see rulesengine pkg).
rulesengine pkg is well documented, so customers will probably rely on it; and it will be confusing that --session-id-inject-target(s) syntax different from it.
SasSwart
added a commit
that referenced
this pull request
May 14, 2026
…er agreement Add integration tests that verify the core invariants of session correlation across the proxy, auditor, and forwarded request headers working together. These tests fill the gap identified during review of the session correlation PR stack (#196, #197, #198) where unit tests verified each component in isolation but did not verify them in concert. New test file: proxy/proxy_session_correlation_integration_test.go Tests added: - LLMRequestAuditAndHeadersAgree: audit sequence number matches the forwarded header value on inject-target requests. - NonLLMRequestAuditedWithoutHeaders: allowed non-inject-target requests are audited but carry no correlation headers. - DeniedRequestAuditedNeverForwarded: denied requests consume a sequence number but are never forwarded. - MixedRequestsSequenceOrdering: interleaved LLM, non-LLM, and denied requests all advance the counter monotonically. - SequenceGapRevealsAgenticLoop: gap between two LLM sequence numbers precisely equals intermediate tool-use requests. - SpoofedHeadersOverwrittenWithCorrectSequence: client-supplied headers are replaced and the audit event still agrees. - DisabledCorrelationNoHeadersNoPreallocatedSequence: disabled correlation means no headers and no pre-allocated sequence. - ConcurrentRequestsUniqueSequenceNumbers: concurrent requests each get a unique, dense sequence number.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
PR Map
RFC: Bridge ↔ Boundaries Correlation
Add YAML and CLI configuration surface for session correlation header injection per FR 2 of the RFC.
Depends on #196.
Changes
config/session_correlation.go: New file. DefinesSessionCorrelationConfig,InjectTarget,ParseInjectTarget(with duplicate-key detection),ValidateSessionCorrelation, fixed header name constants (SessionIDHeaderName,SequenceNumberHeaderName), andDefaultInjectTargetFromEnv— a helper that derives a default inject target fromCODER_AGENT_URLwhen no explicit targets are configured.config/session_correlation_test.go: New file. Table-driven tests forParseInjectTarget(including duplicate-key rejection),ValidateSessionCorrelation, the end-to-endNewAppConfigFromCliConfigsession correlation path (with controlledenviron),DefaultInjectTargetFromEnv, CLI+YAML target merging (TestBuildSessionCorrelation_TargetMerge), and theCODER_AGENT_URLfallback path (TestBuildSessionCorrelation_AgentURLFallback).config/config.go: Wire session correlation fields intoCliConfig(three new fields for serpent bindings:SessionCorrelationEnabled,InjectSessionIDTarget,InjectSessionIDTargets) andAppConfig(newSessionCorrelationfield).NewAppConfigFromCliConfignow accepts anenviron []stringparameter so theCODER_AGENT_URLfallback is testable without relying on the host environment. AddbuildSessionCorrelationhelper that merges YAML+CLI inject targets, falls back to a target derived fromCODER_AGENT_URLwhen none are configured and session correlation is enabled, and validates the result.cli/cli.go: Register three new serpent options, passos.Environ()toNewAppConfigFromCliConfig, and add usage examples including a zero-config workspace example.New CLI flags
--enable-session-correlationBOUNDARY_SESSION_CORRELATION_ENABLEDsession_correlation_enabledfalseCODER_AGENT_URL(set automatically in Coder workspaces)--session-id-inject-targetBOUNDARY_SESSION_ID_INJECT_TARGETdomain=<host> [path=<glob>]session_id_inject_targetsHeader names are fixed constants (
X-Coder-Agent-Firewall-Session-Id,X-Coder-Agent-Firewall-Sequence-Number) matching what Coder AI Gateway expects — they are not user-configurable.Config validation ensures that when correlation is enabled at least one inject target is present (either explicit or auto-derived from
CODER_AGENT_URL). Parsing validates thedomain=... path=...key-value format, rejects unknown keys, and rejects duplicate keys within a single target string.This commit adds config and validation only; runtime injection is wired in a follow-up PR.
Note
This PR was authored by Coder Agents.