Commit Graph

6 Commits

Author SHA1 Message Date
Alex Newman 2ea716a017 MAESTRO: Close PR #530 - retry logic superseded by fail-open hook strategy
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-05 18:27:55 -05:00
Alex Newman 4e4ad32f97 MAESTRO: Close PR #922 - async SessionStart hooks would break context injection
SessionStart hooks must run synchronously because the context hook's stdout
is captured and injected as Claude's system-level memory context. The Windows
blocking issue was already resolved by the fail-open approach in PRs #973,
#959, and #964.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-05 18:27:06 -05:00
Alex Newman faa1360f33 MAESTRO: Merge PR #964 - add fetch timeouts to Stop hook and health checks
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-05 18:25:49 -05:00
Alex Newman be01694383 MAESTRO: Merge PR #959 - fail open on /api/context/inject during initialization
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-05 18:23:24 -05:00
Alex Newman bf4d9421e0 MAESTRO: Merge PR #973 - hooks fail gracefully instead of blocking prompts
session-init.ts: replaced throws on worker 500/SDK agent failure with
logger.failure() + graceful exit 0. user-message.ts: replaced throw with
graceful return, console.error → process.stderr.write, USER_MESSAGE_ONLY → SUCCESS.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-05 18:19:41 -05:00
Alex Newman 311d62cc02 MAESTRO: Merge PR #960 removing user-message hook from SessionStart to fix startup error
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-05 18:16:15 -05:00