
# General
.DS_Store
__MACOSX/
.AppleDouble
.LSOverride
Icon[
]

# Thumbnails
._*

# Files that might appear in the root of a volume
.DocumentRevisions-V100
.fseventsd
.Spotlight-V100
.TemporaryItems
.Trashes
.VolumeIcon.icns
.com.apple.timemachine.donotpresent

# Directories potentially created on remote AFP share
.AppleDB
.AppleDesktop
Network Trash Folder
Temporary Items
.apdisk

.env

.jq-template.awk

# If you prefer the allow list template instead of the deny list, see community template:
# https://github.com/github/gitignore/blob/main/community/Golang/Go.AllowList.gitignore
#
# Build output directories
bin/
dist/
# Release pipeline staging (per-arch linux embed sets, see Makefile release-embeds)
embeds/

# Root-level binaries (build output belongs in bin/)
/clawker
/fawker
/callback-forwarder
/clawker-socket-server
/clawker-generate
/clawkerd
/gen-docs

# Binaries for programs and plugins
*.exe
*.exe~
*.dll
*.so
*.dylib

# Test binary, built with `go test -c`
*.test

# Code coverage profiles and other test artifacts
*.out
coverage.*
*.coverprofile
profile.cov

# Dependency directories (remove the comment below to include it)
# vendor/

# Go workspace file
go.work
go.work.sum

# env file
.env
.envrc

# Editor/IDE
# .idea/
# .vscode/

**/*/clawker.env
.mcp.json

# serena
.serena/cache
.serena/logs
.claude/settings.local.json

# ralph loop working directory
.ralph/
RALPH-TEST.md

.idea/

# dev clawker file isolation set clawker env vars to 
# this directory if you want to isolate dev files 
# from your system's installation of clawker.
.clawkerlocal/

.clawker.local.yaml

# Embedded firewall stack binaries (built by `make ebpf-binary` /
# `make coredns-binary` / `make cp-binary` via the pinned Dockerfile.controlplane
# multi-stage build; not committed).
internal/controlplane/cpboot/assets/ebpf-manager
internal/controlplane/cpboot/assets/clawker-cp
internal/controlplane/firewall/assets/coredns-clawker
# clawkerd is pure Go (no BPF deps); built by `make clawkerd-binary`.
internal/clawkerd/assets/clawkerd

# Root-level build artifact from ad-hoc `go build ./cmd/clawker-cp`
/clawker-cp

# bpf2go-generated Go wrappers + compiled BPF bytecode. Produced on every
# build inside the pinned Dockerfile.controlplane bpf-builder stage; never committed.
# On fresh clones, `make ebpf-binary` (or anything that depends on it such as
# `make test` / `make clawker-build`) regenerates these on first use. Expect
# IDE red squiggles in internal/controlplane/firewall/ebpf/manager.go until the first
# `make` run populates these.
internal/controlplane/firewall/ebpf/clawker_x86_bpfel.go
internal/controlplane/firewall/ebpf/clawker_x86_bpfel.o
internal/controlplane/firewall/ebpf/clawker_arm64_bpfel.go
internal/controlplane/firewall/ebpf/clawker_arm64_bpfel.o

# BPF kernel BTF dump — clawker does not use CO-RE and does not consume
# vmlinux.h. Historical developer workflows may still generate it via
# bpftool; this guard prevents it from sneaking back into the tree.
internal/controlplane/firewall/ebpf/bpf/vmlinux.h

# Adversarial test artifacts
test/adversarial/report.html
test/adversarial/certs/
test/adversarial/attacker-server/attacker-server

firewall-tests-debug.log

.claude/scheduled_tasks.lock
