Peter Steinberger
5f2273e81e
fix(gateway): unify chat display projection
2026-04-26 05:33:58 +01:00
Shakker
2e7635f4f9
fix: scope web provider ownership to plugin index
2026-04-26 04:39:12 +01:00
Shakker
1a193b2d96
fix: scope cold plugin manifests to index
2026-04-26 03:47:45 +01:00
Vincent Koc
10763781fd
fix(config): resolve plugin contracts cold
2026-04-25 19:33:56 -07:00
Vincent Koc
6afac5208a
fix(secrets): resolve plugin env metadata cold
2026-04-25 19:18:30 -07:00
Peter Steinberger
0ca952cdd5
feat(tts): add per-agent voice overrides
2026-04-26 02:54:13 +01:00
Shakker
c19f8a5223
refactor: consolidate plugin install index store
2026-04-26 01:03:12 +01:00
Vincent Koc
74059aaa29
fix(secrets): honor plugin install ledger for web fetch discovery
2026-04-25 13:55:00 -07:00
Vincent Koc
70d1871db7
fix(secrets): honor plugin install ledger in web search risk
2026-04-25 13:50:44 -07:00
Peter Steinberger
7a71a66571
perf: cache provider env var lookups
2026-04-25 08:35:57 +01:00
Peter Steinberger
9e5d09c962
fix(config): reject legacy secretref env markers
2026-04-25 03:48:11 +01:00
Vincent Koc
7536993397
feat(plugins): read setup provider env vars ( #71226 )
...
* feat(plugins): read setup provider env vars
* fix(plugins): mark provider env compat deprecation
2026-04-24 12:59:02 -07:00
Peter Steinberger
11fa1d2dc7
test: mock secrets apply runtime preflight
2026-04-24 12:22:49 +01:00
Peter Steinberger
9faa9d33e6
test: mock web tools manifest lookup
2026-04-24 12:19:50 +01:00
zhang-guiping
c1f423f845
fix(secrets): harden Windows ACL fallback and strip BOM ( #70662 )
...
Fail closed when Windows ACL checks cannot be verified for file and exec secret providers unless the provider explicitly opts into allowInsecurePath. Strip UTF-8 BOMs from file-backed secrets and document the trusted-path override.\n\nThanks @zhanggpcsu.
2026-04-23 19:32:15 +01:00
Peter Steinberger
158a0d4ab4
test: trim duplicate runtime smoke work
2026-04-23 11:28:26 +01:00
Peter Steinberger
3fd2a94404
refactor: generalize command sender identity checks
2026-04-22 06:11:49 +01:00
Peter Steinberger
6639bbbc2e
refactor: generalize conversation id labels
2026-04-22 06:11:49 +01:00
Peter Steinberger
e20a5eeddb
refactor: keep legacy web search config in doctor
2026-04-22 06:11:49 +01:00
Peter Steinberger
a6dce7cf19
refactor: resolve web search secrets by target path
2026-04-22 06:11:49 +01:00
Peter Steinberger
89741c7a23
refactor: use generic web search runtime credential hooks
2026-04-22 06:11:49 +01:00
Peter Steinberger
94f670b893
refactor: use generic web search credential hooks
2026-04-22 06:11:49 +01:00
Peter Steinberger
0c863124bb
refactor: derive setup promotion rules from plugins
2026-04-22 06:11:49 +01:00
Peter Steinberger
db055a5c0d
refactor: move WhatsApp group inference out of core
2026-04-22 06:11:49 +01:00
Peter Steinberger
bdcbb6b49d
refactor: move Feishu model override parsing to plugin
2026-04-22 06:11:49 +01:00
Peter Steinberger
7189b49f81
refactor: move media defaults into plugin manifests
2026-04-22 06:11:49 +01:00
Peter Steinberger
2e775fb03e
refactor: move stale socket modes to channel status
2026-04-22 06:11:49 +01:00
Peter Steinberger
0a027ff591
refactor: derive CLI web credential targets
2026-04-22 06:11:49 +01:00
Peter Steinberger
bc9c2cc162
refactor: derive web credential secret targets from manifests
2026-04-22 06:11:49 +01:00
Gustavo Madeira Santana
24db09a19b
fix(cli): keep channel status checks off plugin runtimes ( #69479 )
...
Merged via squash.
Prepared head SHA: 63f6e416a9
Co-authored-by: gumadeiras <5599352+gumadeiras@users.noreply.github.com >
Co-authored-by: gumadeiras <5599352+gumadeiras@users.noreply.github.com >
Reviewed-by: @gumadeiras
2026-04-21 13:53:08 -04:00
Peter Steinberger
982b1c9464
test(ci): reduce channel contract import cost
2026-04-21 00:40:07 +01:00
Peter Steinberger
88d97c55c7
test: share secrets runtime file fixture
2026-04-20 22:28:49 +01:00
Peter Steinberger
9cba6672d6
refactor: share inactive web provider warnings
2026-04-20 22:28:49 +01:00
Peter Steinberger
19525e1dd0
test: share media auth snapshot setup
2026-04-20 22:28:49 +01:00
Peter Steinberger
cf4354ad83
test: share plugin secret collector setup
2026-04-20 22:28:49 +01:00
Peter Steinberger
382201acf0
test: share gateway password inactive assertion
2026-04-20 22:21:34 +01:00
Peter Steinberger
de404de321
test: share secrets exec resolver fixtures
2026-04-20 22:17:34 +01:00
Peter Steinberger
f3e6eeb643
perf(gateway): fast path startup secrets
2026-04-20 21:30:06 +01:00
Peter Steinberger
975b989de6
test: reduce module reload churn
2026-04-20 20:28:47 +01:00
Peter Steinberger
17fcbcefbc
refactor: share plugin config trust helpers
2026-04-18 23:55:05 +01:00
Peter Steinberger
1f1ff0567a
refactor(lint): reduce map spread patterns
2026-04-18 19:27:43 +01:00
Peter Steinberger
df525b90f2
chore(lint): enable unnecessary type parameter rule
2026-04-18 18:31:13 +01:00
Gustavo Madeira Santana
a464f5926b
Secrets: avoid broad web search discovery for single plugin config
...
Add an Exa web-search contract artifact and use single bundled plugin-scoped webSearch config as a provider hint. This keeps runtime secret resolution on metadata-only surfaces instead of importing full provider tool implementations.
2026-04-17 13:38:24 -04:00
Vincent Koc
7320dfc1ff
test(perf): speed up slow cron infra and secrets specs
2026-04-15 10:22:43 +01:00
Josh Avant
1769fb2aa1
fix(secrets): align SecretRef inspect/strict behavior across preload/runtime paths ( #66818 )
...
* Config: add inspect/strict SecretRef string resolver
* CLI: pass resolved/source config snapshots to plugin preload
* Slack: keep HTTP route registration config-only
* Providers: normalize SecretRef handling for auth and web tools
* Secrets: add Exa web search target to registry and docs
* Telegram: resolve env SecretRef tokens at runtime
* Agents: resolve custom provider env SecretRef ids
* Providers: fail closed on blocked SecretRef fallback
* Telegram: enforce env SecretRef policy for runtime token refs
* Status/Providers/Telegram: tighten SecretRef preload and fallback handling
* Providers: enforce env SecretRef policy checks in fallback auth paths
* fix: add SecretRef lifecycle changelog entry (#66818 ) (thanks @joshavant)
2026-04-14 17:59:28 -05:00
Vincent Koc
c6c222ba84
perf(tests): trim hot wizard and infra setup work
2026-04-14 22:42:32 +01:00
Vincent Koc
bd20a920a2
perf(config): use generated SecretRef policy metadata
2026-04-13 20:19:04 +01:00
Vincent Koc
961eb95e9a
perf(secrets): lazy-load provider env var exports
2026-04-13 19:52:02 +01:00
Vincent Koc
b051b0511c
perf(secrets): fast-path explicit channel target lookup
2026-04-13 15:49:23 +01:00
scoootscooob
94ef2f1b0d
CLI: detect env-backed audio providers ( #65491 )
...
* CLI: detect env-backed audio providers
* fix(cli): trust audio provider env detection
* Secrets: keep default provider env lookups stable
* Plugins: harden env-backed auth defaults
* Plugins: tighten trusted env var lookups
---------
Co-authored-by: Vincent Koc <vincentkoc@ieee.org >
2026-04-12 14:04:44 -07:00