Onur
96fc5ddfb3
Infra: handle win32 unknown inode in file identity checks
2026-02-26 23:41:08 +01:00
Onur
7853c4fb7f
Discord: fix thread binding types in message/reply paths
2026-02-26 23:27:09 +01:00
Onur Solmaz
3e2118caa8
fix: harden thread-binding lifecycle persistence
2026-02-26 22:03:12 +01:00
Onur Solmaz
57dcd7ec08
refactor: remove remaining thread-binding ttl legacy paths
2026-02-26 20:57:39 +01:00
Onur Solmaz
aa7cf2d363
fix: migrate legacy thread binding expiry and reduce hot-path disk writes
2026-02-26 20:20:20 +01:00
Onur Solmaz
c7ad7f92c6
Merge remote-tracking branch 'origin/main' into feat/thread-bindings-idle-maxage
...
# Conflicts:
# docs/tools/slash-commands.md
# src/auto-reply/reply/commands-session.ts
# src/auto-reply/reply/commands-subagents-focus.test.ts
# src/auto-reply/reply/commands-subagents/action-focus.ts
# src/discord/monitor/provider.ts
# src/discord/monitor/thread-bindings.lifecycle.test.ts
# src/discord/monitor/thread-bindings.lifecycle.ts
# src/discord/monitor/thread-bindings.messages.ts
# src/discord/monitor/thread-bindings.ts
2026-02-26 20:07:33 +01:00
Peter Steinberger
ac03803d12
fix: align codex model api schema/type coverage ( #27501 ) (thanks @AytuncYildizli)
2026-02-26 18:51:04 +00:00
AytuncYildizli
861b90f79c
fix(config): add openai-codex-responses to ModelApiSchema
...
The config schema validates provider api fields against ModelApiSchema,
but openai-codex-responses was missing from the allowed values. This
forces users to set api: "openai-responses" for the openai-codex
provider, which routes requests to api.openai.com/v1/responses instead
of chatgpt.com/backend-api/codex/responses, causing HTTP 401 errors
because Codex OAuth tokens lack api.responses.write scope for the
standard OpenAI Responses endpoint.
The runtime already supports openai-codex-responses throughout: model
registry, stream dispatch (streamOpenAICodexResponses), and provider
detection (OPENAI_MODEL_APIS set). Only the config schema was missing
the literal.
2026-02-26 18:51:04 +00:00
Peter Steinberger
d92fc85555
refactor(cli): dedupe gateway run mode parsing
2026-02-26 19:50:49 +01:00
Shakker
f7041fbee3
fix(windows): normalize namespaced path containment checks
2026-02-26 18:49:48 +00:00
Peter Steinberger
dc6e4a5b13
fix: harden dm command authorization in open mode
2026-02-26 19:49:36 +01:00
Nimrod Gutman
3f20c43308
fix: add nimrod gutman maintainer profile ( #27840 ) (thanks @ngutman)
2026-02-26 20:46:37 +02:00
Viz
a81cf35a6f
Add contributor Jonathan Taylor to CONTRIBUTING.md
...
Added Jonathan Taylor's contributions and contact links.
2026-02-26 13:22:34 -05:00
Peter Steinberger
a909019078
fix: align gateway run auth modes ( #27469 ) (thanks @s1korrrr)
2026-02-26 18:20:27 +00:00
Rafal
1087033abd
fix(cli): list all supported auth modes in gateway run --auth help
...
Made-with: Cursor
2026-02-26 18:20:27 +00:00
Onur Solmaz
41eacccc42
refactor discord thread bindings to idle and max-age lifecycle
2026-02-26 19:14:28 +01:00
Shakker
47f52cd233
test(cli): tighten daemon status TLS mock typings
2026-02-26 18:13:33 +00:00
Shakker
bed69339c1
fix(cli): scope daemon status TLS fingerprint to local probes
2026-02-26 18:13:33 +00:00
Shakker
b788616d9c
fix(cli): add TLS daemon-status probe regression coverage
2026-02-26 18:13:33 +00:00
Liu Yuan
90d426f9ad
fix(cli): gateway status probe with TLS when bind=lan
...
- Use wss:// scheme when TLS is enabled (specifically for bind=lan)
- Load TLS runtime to get certificate fingerprint
- Pass fingerprint to probeGatewayStatus for self-signed cert trust
2026-02-26 18:13:33 +00:00
Peter Steinberger
d6eefe2e75
style: format auth boundary updates
2026-02-26 18:50:47 +01:00
Peter Steinberger
262bca9bdd
fix: restore dm command and self-chat auth behavior
2026-02-26 18:49:16 +01:00
Peter Steinberger
64de4b6d6a
fix: enforce explicit group auth boundaries across channels
2026-02-26 18:49:16 +01:00
Shakker
d0d83a2020
docs(changelog): add PR #17017 entry
2026-02-26 17:10:09 +00:00
Shakker
fe842b5f14
test(auto-reply): cover inbound timestamp guard
2026-02-26 17:10:09 +00:00
Liu Yuan
c596658b8d
feat(auto-reply): make agent time-aware with message timestamps
...
Add human-readable timestamp field to the Conversation info JSON block.
Before:
{
"conversation_label": "D id:123"
}
After:
{
"conversation_label": "D id:123",
"timestamp": "Sun 2026-02-15 13:35 GMT+8"
}
Benefits:
- Better time awareness for time-related questions
- Understand conversation gaps and response delays
- Handle delayed message delivery
- Context for relative time references ("just now", "later")
2026-02-26 17:10:09 +00:00
Peter Steinberger
10481097f8
refactor(security): enforce v1 node exec approval binding
2026-02-26 18:09:01 +01:00
Peter Steinberger
f4391c1725
docs(security): clarify Teams fileConsent uploadUrl report scope
2026-02-26 17:58:38 +01:00
Peter Steinberger
9597cf1890
docs(security): scope obfuscation parity reports as hardening
2026-02-26 17:58:25 +01:00
joshavant
edf7ad9b7d
add me to Maintainers list
...
Signed-off-by: joshavant <830519+joshavant@users.noreply.github.com >
2026-02-26 10:55:03 -06:00
Peter Steinberger
9f154efa8d
docs(acp): expand /acp operator playbook
2026-02-26 16:49:20 +00:00
Peter Steinberger
c5facb8477
fix(discord): avoid invalid /acp native option payload
2026-02-26 16:49:20 +00:00
Peter Steinberger
cd80c7e7ff
refactor: unify dm policy store reads and reason codes
2026-02-26 17:47:57 +01:00
Peter Steinberger
53e30475e2
test(agents): add compaction and workspace reset regressions
2026-02-26 17:41:25 +01:00
Peter Steinberger
0ec7711bc2
fix(agents): harden compaction and reset safety
...
Co-authored-by: jaden-clovervnd <91520439+jaden-clovervnd@users.noreply.github.com >
Co-authored-by: Sid <201593046+Sid-Qin@users.noreply.github.com >
Co-authored-by: Marcus Widing <245375637+widingmarcus-cyber@users.noreply.github.com >
2026-02-26 17:41:24 +01:00
Peter Steinberger
273973d374
refactor: unify typing dispatch lifecycle and policy boundaries
2026-02-26 17:36:16 +01:00
Peter Steinberger
6fd9ec97de
fix(gateway): preserve turn-origin messageChannel in agent runs
2026-02-26 17:25:56 +01:00
Peter Steinberger
08e3357480
refactor: share gateway security path canonicalization
2026-02-26 17:23:46 +01:00
Shakker
15e3e63705
protocol: regenerate Swift models for exec env field
2026-02-26 16:19:44 +00:00
Shakker
b044c149c1
Mattermost: avoid raw fetch in monitor media download
2026-02-26 16:03:39 +00:00
Peter Steinberger
8a51891ed5
test(exec-approvals): cover v1 binding precedence and mismatch mapping
2026-02-26 17:02:52 +01:00
Peter Steinberger
258d615c4d
fix: harden plugin route auth path canonicalization
2026-02-26 17:02:06 +01:00
Peter Steinberger
37a138c554
fix: harden typing lifecycle and cross-channel suppression
2026-02-26 17:01:09 +01:00
Peter Steinberger
4894d907fa
refactor(exec-approvals): unify system.run binding and generate host env policy
2026-02-26 16:58:01 +01:00
Ayaan Zaidi
baf1c8ea13
docs: add changelog for android device node commands ( #27664 ) (thanks @obviyus)
2026-02-26 21:26:11 +05:30
Ayaan Zaidi
cf327f60ba
fix(android): require validated network for device status
2026-02-26 21:26:11 +05:30
Ayaan Zaidi
d14e734e9c
refactor(android): remove dead thermal sdk branch
2026-02-26 21:26:11 +05:30
Ayaan Zaidi
d768c1f81c
feat(android): wire device commands into runtime
2026-02-26 21:26:11 +05:30
Ayaan Zaidi
67f6a13c5a
feat(android): add device status and info handler
2026-02-26 21:26:11 +05:30
Ayaan Zaidi
551647aa96
feat(android): add device invoke protocol commands
2026-02-26 21:26:11 +05:30