Skip to content

How it works Section Modified in Landing page#3

Open
aamnasiddiqui-think41 wants to merge 5 commits into
docs/setupfrom
fixes/website-homepage
Open

How it works Section Modified in Landing page#3
aamnasiddiqui-think41 wants to merge 5 commits into
docs/setupfrom
fixes/website-homepage

Conversation

@aamnasiddiqui-think41
Copy link
Copy Markdown
Collaborator

image

sripathikrishnan and others added 5 commits January 23, 2026 14:28
- Restructure User Flow into Setup, Runtime, and Token Refresh sections
- Add Organization Setup section as prerequisite
- Update Skills section with Agent Skills standard reference
- Simplify Testing section to use cloud-based workflow
- Enable Docker builds for all branches (not just main)
- Update CI/CD docs to reflect branch tagging

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
- Restructure index.md as a clean overview with prerequisites checklist
- Add both gcloud CLI and Google Cloud Console instructions for every step
- Include direct links to Console pages and verification steps
- Format troubleshooting with consistent Symptom/Cause/Solution pattern
- Remove duplicate content between files

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
Explain that creating service accounts is separate from granting
permissions. The role cannot assign IAM roles to created accounts,
so they have zero access to GCP resources.

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
sripathikrishnan added a commit that referenced this pull request Feb 9, 2026
Bug #4: Remove cell- prefix filter in engine.py that prevented
cell style definitions from reaching _generate_cell_style_request().

Bug #12: Detect tab title changes in differ.py and emit
updateDocumentTabProperties in walker.py.

Bug #3: Generate content insertion requests for new tab bodies in
walker.py. Move addDocumentTab to batch 1 in push.py and rewrite
placeholder tab IDs to real IDs from the API response.

All three fixes verified with live push + re-pull round-trip.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
sripathikrishnan added a commit that referenced this pull request Feb 27, 2026
Security:
- Move session_token from POST body to Authorization: Bearer header to prevent
  proxy/access log exposure (#1)
- Atomic ownership check in revoke_session_token via expected_email param,
  eliminating TOCTOU race (#2)
- Redact full session_hash from list_sessions when admin views another user's
  sessions; self-service callers retain it (#3)
- Fix X-Forwarded-For to use rightmost (infra-injected) IP instead of
  first (spoofable) entry (#7)

Correctness:
- Ensure service account is provisioned at session establishment time
  (exchange_auth_code_for_session), enforcing the invariant that SA always
  exists for any v2 session; remove downstream or-"" fallbacks and 500 guard (#6)
- Validate _server_base_url before opening browser to avoid post-auth failure
  when server URL is not configured (#4)
- Raise ValueError instead of silently dropping extra scopes in v2
  get_oauth_token (#5)
- Apply SA_TOKEN_CACHE_SECONDS cap client-side for SA tokens (#8)

UX:
- Prompt for confirmation before revoking an existing valid session in
  auth login; skip prompt when stdin is not a tty (#9)
- Use timezone.utc in all datetime.fromtimestamp calls in CLI output (#10)

Fakes / tests:
- Fix FakeDatabase.retrieve_auth_code to check flow_type and expiry before
  popping, preventing silent code destruction on type mismatch (#11)
- Update FakeDatabase.revoke_session_token to accept expected_email (#2)

Docs:
- Fix stale pseudo_scope field name in database.py docstring (#12)
- Document _explicit_auth_urls v2 activation edge case (#13)
- Add type safety / None discipline principle to CLAUDE.md files

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants