Commit Graph

31370 Commits

Author SHA1 Message Date
Vincent Koc
c6c222ba84 perf(tests): trim hot wizard and infra setup work 2026-04-14 22:42:32 +01:00
Gustavo Madeira Santana
85eac42d34 QA: remove runner install fallback catalog
Drop the generated qa-runner catalog and the missing/install placeholder
path for repo-private QA runners. The host should discover bundled QA
commands from manifest plus runtime surface only.

Also trim stale qa-matrix install docs and package metadata so the
source-only QA policy stays consistent.
2026-04-14 17:37:18 -04:00
Vincent Koc
5ddca5dd56 fix(agents): normalize mini openai reasoning 2026-04-14 22:26:47 +01:00
Vincent Koc
20463d1272 test(gateway): harden canvas auth websocket probe 2026-04-14 22:22:40 +01:00
Onur Solmaz
06a4bf5701 Actions: add reusable cross-OS release checks workflow (#66812) 2026-04-14 23:21:37 +02:00
Gustavo Madeira Santana
653100488d QA: fix matrix runner staging and host registration 2026-04-14 17:18:25 -04:00
Josh Avant
731d4666d2 fix(reply): resolve active channel/account SecretRefs in reply runs (#66796)
* Reply: resolve active channel/account SecretRefs in agent runs

* tests(reply): assert queued config scope wiring

* fix: document reply secret-scope regression coverage (#66796) (thanks @joshavant)
2026-04-14 16:04:57 -05:00
OfflynAI
d21f07a39e fix: allow workspace-rooted absolute media paths in auto-reply (#66689)
Merged via squash.

Prepared head SHA: 48206b5627
Co-authored-by: joelnishanth <140015627+joelnishanth@users.noreply.github.com>
Co-authored-by: gumadeiras <5599352+gumadeiras@users.noreply.github.com>
Reviewed-by: @gumadeiras
2026-04-14 17:04:31 -04:00
Gustavo Madeira Santana
5bf30d258f matrix: prefer named default account 2026-04-14 17:01:59 -04:00
Peter
70b67b0c68 fix(agents): preserve original prompt on model fallback retry (#65760) (#66029)
Merged via squash.

Prepared head SHA: ba919d1934
Co-authored-by: WuKongAI-CMU <210765158+WuKongAI-CMU@users.noreply.github.com>
Co-authored-by: altaywtf <9790196+altaywtf@users.noreply.github.com>
Reviewed-by: @altaywtf
2026-04-14 23:47:01 +03:00
Gustavo Madeira Santana
f958e311d2 tests: fix Feishu card action runtime mock typing 2026-04-14 16:38:01 -04:00
Rohan Santhosh Kumar
bb14412e87 fix(reply): classify billing cooldown summaries (#66363)
Merged via squash.

Prepared head SHA: 8cfc42a7ac
Co-authored-by: Rohan5commit <181558744+Rohan5commit@users.noreply.github.com>
Co-authored-by: altaywtf <9790196+altaywtf@users.noreply.github.com>
Reviewed-by: @altaywtf
2026-04-14 23:35:04 +03:00
Agustin Rivera
62430d9f3a Harden MCP loopback request validation (#66665)
* fix(mcp): harden loopback request guards

* fix(commit): block staged user log

* Revert pre-commit USER.md guard from this PR

Out of scope for the MCP loopback hardening — keep this PR
focused on the loopback request gate and the bearer-comparison
fix. The pre-commit worklog guard can land separately if
maintainers want it.

* changelog: note MCP loopback constant-time + Origin guard (#66665)

* fix(mcp): allow loopback flows that browsers flag as cross-site

The previous Sec-Fetch-Site early-return rejected legit local
browser callers like a UI hosted on http://localhost:<ui-port>
talking to MCP on http://127.0.0.1:<mcp-port> — browsers report
that host mismatch as cross-site even though both ends are
loopback. checkBrowserOrigin already authorizes those via its
local-loopback matcher (loopback peer + loopback Origin host),
so route every Origin-bearing request through that helper and
let it decide. Native MCP clients (no Origin header) continue to
short-circuit through to the bearer check unchanged.

Adds a regression test asserting that
  origin: http://localhost:43123, sec-fetch-site: cross-site
from a loopback peer is accepted with a valid bearer.

---------

Co-authored-by: Devin Robison <drobison@nvidia.com>
2026-04-14 14:32:05 -06:00
Gustavo Madeira Santana
82a2db71e8 refactor(qa): split Matrix QA into optional plugin (#66723)
Merged via squash.

Prepared head SHA: 27241bd089
Co-authored-by: gumadeiras <5599352+gumadeiras@users.noreply.github.com>
Co-authored-by: gumadeiras <5599352+gumadeiras@users.noreply.github.com>
Reviewed-by: @gumadeiras
2026-04-14 16:28:57 -04:00
Gustavo Madeira Santana
3425823dfb fix(regression): avoid sync startup for matrix status reads 2026-04-14 16:21:12 -04:00
Vincent Koc
c96871db30 test(feishu): avoid runtime env union lint trap 2026-04-14 21:14:43 +01:00
Agustin Rivera
472bcbbccc fix(agents): tighten workspace file opens (#66636)
* fix(agents): tighten workspace file opens

* fix(agents): clarify symlink rejection tests

* fix(agents): surface unsafe identity reads

* fix(agents): use non-blocking opens for identity reads and write-mode probes

* fix(fssafe): restore symlink read identity check

* fix(worklog): append comment resolution status

* fix(fssafe): close afterOpen handle leaks

* fix(worklog): append comment resolution follow-up

* fix(worklog): drop internal user file

* fix(agents): rethrow unexpected errors in agents.files.get

* changelog: note agents.files fs-safe routing + fd-first realpath (#66636)

* fix(agents): rethrow unexpected errors in agents.files.set too

Match the narrow-SafeOpenError catch pattern that agents.files.get
(commit 633b8f92) and writeWorkspaceFileOrRespond already use, so a
real OS error (ENOSPC, EACCES, EBUSY, ...) surfaces through normal
gateway error handling instead of being masked as
'unsafe workspace file'.

* test(agents): match fsStat/fsLstat mock signatures

The mock functions are declared as
  vi.fn(async (..._args: unknown[]) => Stats | null)
so mockImplementation callbacks must accept ...unknown[], not a
narrowed (filePath: string) argument. The narrower signature
works at runtime but trips tsgo's strict type check; switch to
args[0] unpacking so the callbacks match the hoisted mock shape.

---------

Co-authored-by: Devin Robison <drobison@nvidia.com>
2026-04-14 14:06:15 -06:00
Vincent Koc
9386e3a9d4 test(feishu): align lifecycle runtime env typing 2026-04-14 21:01:39 +01:00
@zimeg
d35bdf6311 refactor(slack): use packaged thread status method 2026-04-14 12:56:25 -07:00
Vincent Koc
fdbb0fb561 fix(ci): trim dist fanout from source-only node shards 2026-04-14 20:52:18 +01:00
Agustin Rivera
c8003f1b33 Harden Feishu webhook replay guards (#66707)
* fix(feishu): harden webhook replay guards

* changelog: note Feishu webhook + card-action fail-closed hardening (#66707)

* fix(feishu): move blank-token check above decodeFeishuCardAction

Run the early-return guard against a missing/blank card-action
token before decoding the card-action payload. Decoding is
side-effect-free so this is a readability + tiny-perf nit, not a
correctness change. Matches Greptile's P2 suggestion.

---------

Co-authored-by: Devin Robison <drobison@nvidia.com>
2026-04-14 13:50:41 -06:00
@zimeg
1f14c8d96b fix(slack): fix slash commands with button arg menu errors
Co-authored-by: Wang Siyuan <wsy0227@sjtu.edu.cn>
2026-04-14 12:39:56 -07:00
Vincent Koc
bd288e7683 test(agents): mock provider hook runtime in replay suites 2026-04-14 20:29:58 +01:00
Vincent Koc
34f9211e5c fix(plugin-sdk): fall back from dist facade overrides to source surfaces 2026-04-14 20:06:26 +01:00
Vincent Koc
df956f8162 test(slack): harden fixture cleanup retries 2026-04-14 19:51:21 +01:00
Vincent Koc
c2a192a48a test(contracts): fix readonly sentinel matcher types 2026-04-14 19:45:11 +01:00
Vincent Koc
c7f08d19ea test(contracts): refresh plugin boundary expectations 2026-04-14 19:39:33 +01:00
Vincent Koc
5012c38adc test(release): cover workspace template pack paths 2026-04-14 19:39:27 +01:00
Vincent Koc
95cdaf957b test(resilience): cover broken plugin startup and onboarding 2026-04-14 19:19:55 +01:00
darkamenosa
58a9905976 fix(onboard): normalize channel setup metadata (#66706)
thanks @darkamenosa
2026-04-14 19:11:52 +01:00
Vincent Koc
a848ddaa7e fix(deps): patch follow-redirects vulnerability 2026-04-14 19:00:55 +01:00
Vincent Koc
8d1510eb7b fix(lint): clear masked main check failures 2026-04-14 18:58:36 +01:00
Vincent Koc
09d7f276cb test(agentic): align OpenAI replay id expectations 2026-04-14 18:58:23 +01:00
Vincent Koc
64f32418b9 test(release): include workspace template pack paths 2026-04-14 18:54:06 +01:00
Vincent Koc
2aaa17dc6f fix(ci): restore main typecheck 2026-04-14 18:53:14 +01:00
chaoliang yan
e0d1810632 fix(failover): classify finish_reason: network_error as timeout (#61281) (#61784)
Merged via squash.

Prepared head SHA: f4ab2f9e0b
Co-authored-by: lawrence3699 <247479654+lawrence3699@users.noreply.github.com>
Co-authored-by: altaywtf <9790196+altaywtf@users.noreply.github.com>
Reviewed-by: @altaywtf
2026-04-14 20:42:16 +03:00
xiwuqi
7fbd31818b fix: classify invalid-model fallback errors (#50028)
Merged via squash.

Prepared head SHA: 04b13e09e1
Co-authored-by: xiwuqi <64734786+xiwuqi@users.noreply.github.com>
Co-authored-by: altaywtf <9790196+altaywtf@users.noreply.github.com>
Reviewed-by: @altaywtf
2026-04-14 20:32:29 +03:00
Vincent Koc
66e06b50ba perf(doctor): fast-path bundled channel compat migrations 2026-04-14 18:26:48 +01:00
Vincent Koc
088b41b04b perf(test): split doctor preflight mock modes 2026-04-14 18:18:46 +01:00
OpenCodeEngineer
17c4f62312 fix(agents): classify unknown-no-details Responses failures as unknown for failover (#65254)
Merged via squash.

Prepared head SHA: 92ed4381b6
Co-authored-by: OpenCodeEngineer <261470075+OpenCodeEngineer@users.noreply.github.com>
Co-authored-by: altaywtf <9790196+altaywtf@users.noreply.github.com>
Reviewed-by: @altaywtf
2026-04-14 20:13:55 +03:00
Vincent Koc
1898b2093f fix(plugin-sdk): widen root alias source candidates 2026-04-14 18:09:36 +01:00
Chunyue Wang
4bc46ccfed fix(gateway): cap compaction reserve floor to context window for small models (#65671)
Fixes #65465. Caps the compaction reserveTokensFloor so that at least min(8 000, 50%) of the context window remains available for
  prompt content, preventing the default 20 000-token floor from exceeding the entire context window on small-context local models (e.g. Ollama
  16K). The cap is only applied when contextTokenBudget is provided, preserving backward compatibility.
2026-04-15 01:08:11 +08:00
Vincent Koc
1169dd7039 perf(doctor): skip blocker scans without plugin disablement 2026-04-14 18:07:59 +01:00
Vincent Koc
2cab81d9a7 fix(plugins): widen plugin-sdk source alias candidates 2026-04-14 18:07:40 +01:00
Vincent Koc
6821b8bfaa fix(plugins): widen extension-api source alias candidates 2026-04-14 18:05:05 +01:00
Vincent Koc
0a9616caa8 fix(matrix): align extension-api source aliases 2026-04-14 18:03:26 +01:00
Vincent Koc
3362cccc20 perf(doctor): skip redundant plugin legacy rescans 2026-04-14 18:02:30 +01:00
Vincent Koc
6b2d418973 fix(channels): resolve bundled plugin mts candidates 2026-04-14 18:01:44 +01:00
Michael Appel
acd4e0a32f fix(gateway): re-resolve HTTP auth per-request to honor credential rotation [AI] (#66651)
* fix: address issue

* fix: address review feedback

* changelog: note HTTP auth per-request rotation honor (#66651)

---------

Co-authored-by: Devin Robison <drobison@nvidia.com>
2026-04-14 11:00:28 -06:00
Vincent Koc
0a87707092 fix(matrix): normalize trusted wrapper bin hints 2026-04-14 17:58:58 +01:00