Peter Steinberger
da64a978e5
chore: prepare 2026.4.1 release
2026-04-01 17:57:10 +01:00
Vincent Koc
ec426ac356
perf(test): narrow slack string normalization imports
2026-04-02 00:29:50 +09:00
Vincent Koc
0453d355fd
perf(test): narrow discord monitor runtime seams
2026-04-01 23:47:22 +09:00
Vincent Koc
76c4ecd651
perf(test): narrow sdk seams for channel hotspots
2026-04-01 23:14:48 +09:00
Peter Steinberger
8988894ff7
build: prepare 2026.4.1-beta.1 release
2026-04-01 15:09:19 +01:00
Vincent Koc
da9ffad368
fix(channels): restore target parsing barrel seam
2026-04-01 22:46:10 +09:00
Peter Steinberger
00218ac8a4
fix(auth): persist codex oauth refresh tokens
2026-04-01 14:25:33 +01:00
Jacob Tomlinson
14a779ee8d
revert: sandbox: block sensitive external bind sources ( #59016 )
...
This reverts commit 8db20c1965 .
2026-04-01 14:01:05 +01:00
Peter Steinberger
131f6dac37
refactor: unify failover signal classification
2026-04-01 21:50:58 +09:00
Peter Steinberger
25e2934809
refactor: route session target matching through plugin parsers
2026-04-01 13:42:57 +01:00
Peter Steinberger
33fbd9b770
refactor: dedupe auth profile store normalization
2026-04-01 13:37:37 +01:00
Peter Steinberger
ab3c646bb1
fix: preserve telegram exec approval topic routing
2026-04-01 13:34:50 +01:00
openperf
ac68321d4d
fix(auth-profiles ): ensure credential key and token are strings to prevent crash
...
Fixes #58861
2026-04-01 21:33:10 +09:00
Peter Steinberger
cd4b03c568
fix: unify structured provider failover classification ( #58856 ) (thanks @aaron-he-zhu)
2026-04-01 21:31:18 +09:00
Aaron Zhu
c96ee42300
fix(agents): normalize provider errors for better failover
...
Add provider-specific error patterns for AWS Bedrock, Ollama, Mistral,
Cohere, DeepSeek, Together AI, and Cloudflare Workers AI. These providers
return errors in non-standard formats that the generic classifiers miss,
causing incorrect failover behavior (e.g., context overflow misclassified
as format error, ThrottlingException not recognized as rate limit).
Wire provider patterns into isContextOverflowError() and
classifyFailoverReason() as catch-all layers after generic classifiers.
2026-04-01 21:31:18 +09:00
Chinar Amrutkar
74b9f22a42
fix: add Telegram error suppression controls ( #51914 ) (thanks @chinar-amrutkar)
...
* feat(telegram): add error policy for suppressing repetitive error messages
Introduces per-account error policy configuration that can suppress
repetitive error messages (e.g., 429 rate limit, ECONNRESET) to
prevent noisy error floods in Telegram channels.
Closes #34498
* fix(telegram): track error cooldown per message
* fix(telegram): prune expired error cooldowns
* fix: add Telegram error suppression controls (#51914 ) (thanks @chinar-amrutkar)
---------
Co-authored-by: chinar-amrutkar <chinar-amrutkar@users.noreply.github.com>
Co-authored-by: Ayaan Zaidi <hi@obviy.us>
2026-04-01 17:52:28 +05:30
Ayaan Zaidi
ef286987e7
test: fix context pruning runtime fixtures
2026-04-01 16:48:00 +05:30
Ayaan Zaidi
f70ad924a6
fix: align cache-ttl pruning with thinking replay sanitization
2026-04-01 16:33:57 +05:30
Ayaan Zaidi
c65e152b39
fix: preserve anthropic thinking replay ( #58916 )
...
* test: add anthropic thinking replay regressions
* fix: preserve anthropic thinking blocks on replay
* fix: preserve anthropic thinking replay (#58916 )
* fix: move anthropic replay changelog entry (#58916 )
2026-04-01 16:23:47 +05:30
Charles Dusek
32ae841098
feat(web-search): add SearXNG as bundled web search provider plugin ( #57317 )
...
* feat(web-search): add bundled searxng plugin
* test(web-search): cover searxng config wiring
* test(web-search): include searxng in bundled provider inventory
* test(web-search): keep searxng ordering aligned
* fix(web-search): sanitize searxng result rows
---------
Co-authored-by: Vincent Koc <vincentkoc@ieee.org>
2026-04-01 19:24:33 +09:00
Chinar Amrutkar
3f67581e50
fix: retry safe wrapped Telegram send failures ( #51895 ) (thanks @chinar-amrutkar)
...
* fix(telegram): traverse error .cause chain in formatErrorMessage and match grammY HttpError
grammY wraps network failures in HttpError with message
'Network request for ... failed!' and the original error in .cause.
formatErrorMessage only checked err.message, so shouldRetry never
fired for the most common transient failure class.
Changes:
- formatErrorMessage now traverses .cause chain, appending nested
error messages (with cycle protection)
- Added 'Network request' to TELEGRAM_RETRY_RE as belt-and-suspenders
- Added tests for .cause traversal, circular references, and grammY
HttpError retry behavior
Fixes #51525
* style: fix oxfmt formatting in retry-policy.ts
* fix: add braces to satisfy oxlint requirement
* fix(telegram): keep send retries strict
* test(telegram): cover wrapped retry paths
* fix(telegram): retry rate-limited sends safely
* fix: retry safe wrapped Telegram send failures (#51895 ) (thanks @chinar-amrutkar)
* fix: preserve wrapped Telegram rate-limit retries (#51895 ) (thanks @chinar-amrutkar)
---------
Co-authored-by: chinar-amrutkar <chinar-amrutkar@users.noreply.github.com>
Co-authored-by: Ayaan Zaidi <hi@obviy.us>
2026-04-01 15:54:29 +05:30
Luke
1654c3a851
feat(gateway): make chat history max chars configurable ( #58900 )
...
* feat(gateway): make chat history max chars configurable
* fix(gateway): address review feedback
* docs(changelog): note configurable chat history limits
2026-04-01 21:08:37 +11:00
ImLukeF
101c31f5e1
test: harden ci-sensitive unit suites
2026-04-01 20:53:16 +11:00
ImLukeF
4e63dc0b1c
fix: hide raw provider errors from chat replies
2026-04-01 20:53:16 +11:00
ryanlee-gemini
fbe3ca4d7d
fix(plugins): pass dangerouslyForceUnsafeInstall through archive and … ( #58879 )
...
Merged via squash.
Prepared head SHA: 87eb27d902
Co-authored-by: ryanlee-gemini <181323138+ryanlee-gemini@users.noreply.github.com>
Co-authored-by: odysseus0 <8635094+odysseus0@users.noreply.github.com>
Reviewed-by: @odysseus0
2026-04-01 02:52:01 -07:00
Vincent Koc
07c60ae461
fix(agent): treat webchat exec approvals as native UI ( #58904 )
...
* fix(agent): treat webchat exec approvals as native UI
* docs(changelog): note webchat exec approval UI fix
* test(agent): cover webchat native approval guidance
2026-04-01 18:36:21 +09:00
Peter Steinberger
f6317fb747
fix(gateway): stop pinning node commands to pairing state
2026-04-01 18:27:06 +09:00
Peter Steinberger
fe57ee513f
test: drop stale task boundary allowlist entries
2026-04-01 10:17:47 +01:00
Peter Steinberger
d005cc8b42
test: align cron abort regression with #58833
2026-04-01 10:17:47 +01:00
Peter Steinberger
f559ea126d
fix: land slash command metadata parsing ( #58725 ) (thanks @Mlightsnow)
2026-04-01 10:17:47 +01:00
HansY
3b1f8e3461
fix: strip inbound metadata before slash command detection ( #58674 )
...
Slash commands like /model and /new were silently ignored when the inbound
message body included metadata prefix blocks (Conversation info, Sender info,
timestamps) injected by buildInboundUserContextPrefix. The command detection
functions (hasControlCommand, isControlCommandMessage, parseSendPolicyCommand)
now call stripInboundMetadata before normalizeCommandBody so embedded slash
commands are correctly recognized.
2026-04-01 10:17:20 +01:00
Ayaan Zaidi
fb28b02540
fix: preserve bundled channel plugin compat ( #58873 )
...
* fix: preserve bundled channel plugin compat
* fix: preserve bundled channel plugin compat (#58873 )
* fix: scope channel plugin compat to bundled plugins (#58873 )
2026-04-01 14:42:36 +05:30
Vincent Koc
2d53ffdec1
fix(exec): resolve remote approval regressions ( #58792 )
...
* fix(exec): restore remote approval policy defaults
* fix(exec): handle headless cron approval conflicts
* fix(exec): make allow-always durable
* fix(exec): persist exact-command shell trust
* fix(doctor): match host exec fallback
* fix(exec): preserve blocked and inline approval state
* Doctor: surface allow-always ask bypass
* Doctor: match effective exec policy
* Exec: match node durable command text
* Exec: tighten durable approval security
* Exec: restore owner approver fallback
* Config: refresh Slack approval metadata
---------
Co-authored-by: scoootscooob <zhentongfan@gmail.com>
2026-04-01 02:07:20 -07:00
Peter Steinberger
db0cea5689
refactor(gateway): extract node pairing reconciliation
2026-04-01 18:02:31 +09:00
nanakotsai
7f53c1ca00
test(exec): cover delayed Discord approval continuation
2026-04-01 17:56:55 +09:00
nanakotsai
63da2c7034
fix(exec): resume agent session after approval completion
2026-04-01 17:56:55 +09:00
Forgely3D
4fa11632b4
fix: escalate to model fallback after rate-limit profile rotation cap ( #58707 )
...
* fix: escalate to model fallback after rate-limit profile rotation cap
Per-model rate limits (e.g. Anthropic Sonnet-only quotas) are not
relieved by rotating auth profiles — if all profiles share the same
model quota, cycling between them loops forever without falling back
to the next model in the configured fallbacks chain.
Apply the same rotation-cap pattern introduced for overloaded_error
(#58348 ) to rate_limit errors:
- Add `rateLimitedProfileRotations` to auth.cooldowns config (default: 1)
- After N profile rotations on a rate_limit error, throw FailoverError
to trigger cross-provider model fallback
- Add `resolveRateLimitProfileRotationLimit` helper following the same
pattern as `resolveOverloadProfileRotationLimit`
Fixes #58572
* fix: cap prompt-side rate-limit failover (#58707 ) (thanks @Forgely3D)
* fix: restore latest-main gates for #58707
---------
Co-authored-by: Ember (Forgely3D) <ember@forgely.co>
Co-authored-by: Peter Steinberger <steipete@gmail.com>
2026-04-01 17:54:10 +09:00
Vincent Koc
8fce663861
fix(subagents): harden task-registry lifecycle writes ( #58869 )
...
* fix(subagents): harden task-registry lifecycle writes
* chore(changelog): note subagent task-registry hardening
* fix(subagents): align lifecycle terminal timestamps
* fix(subagents): sanitize lifecycle warning metadata
2026-04-01 17:50:52 +09:00
sandpile
1ce410a7be
fix(sandbox): use browser image for browser runtime matching ( #58759 )
...
* fix(sandbox): compare browser runtimes against sandbox browser image
* refactor(sandbox): route docker runtime matching by config label kind
* fix(sandbox): tag browser runtime removals correctly
* test(sandbox): share docker backend test config
* fix(sandbox): normalize browser runtime image matching
---------
Co-authored-by: Vincent Koc <vincentkoc@ieee.org>
2026-04-01 17:44:52 +09:00
scoootscooob
10750fb80e
Cron: avoid busy-wait drift for recurring main jobs ( #58872 )
2026-04-01 01:31:21 -07:00
Peter Steinberger
32f392eda4
refactor(core): drop old anthropic stream wrapper file
2026-04-01 09:21:48 +01:00
Peter Steinberger
59c23dee09
refactor(anthropic): move stream wrappers into plugin
2026-04-01 09:21:48 +01:00
Peter Steinberger
2bc8a0d67c
refactor: add doctor cron migration helpers
2026-04-01 17:06:24 +09:00
Peter Steinberger
19d0c2dd1d
refactor: remove cron legacy delivery from runtime
2026-04-01 17:06:01 +09:00
Peter Steinberger
95182d51cc
fix: harden bundled plugin runtime deps
2026-04-01 08:55:00 +01:00
Vincent Koc
d4643e06bd
fix(line): resolve dist runtime contract path
2026-04-01 13:20:50 +05:30
Vincent Koc
facdeb3432
feat(tasks): add chat-native task board ( #58828 )
2026-04-01 16:48:36 +09:00
Peter Steinberger
7cf8ccf9b3
fix: avoid startup gateway reload loop ( #58678 ) (thanks @yelog)
2026-04-01 16:47:55 +09:00
Peter Steinberger
802bdb099e
refactor: move cron legacy delivery migration to doctor
2026-04-01 16:44:10 +09:00
Vincent Koc
cfa307baed
fix(status): keep task snapshots pure
2026-04-01 16:36:57 +09:00