How it works Section Modified in Landing page#3
Open
aamnasiddiqui-think41 wants to merge 5 commits into
Open
Conversation
Collaborator
aamnasiddiqui-think41
commented
Jan 23, 2026
- Restructure User Flow into Setup, Runtime, and Token Refresh sections - Add Organization Setup section as prerequisite - Update Skills section with Agent Skills standard reference - Simplify Testing section to use cloud-based workflow - Enable Docker builds for all branches (not just main) - Update CI/CD docs to reflect branch tagging Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
- Restructure index.md as a clean overview with prerequisites checklist - Add both gcloud CLI and Google Cloud Console instructions for every step - Include direct links to Console pages and verification steps - Format troubleshooting with consistent Symptom/Cause/Solution pattern - Remove duplicate content between files Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
Explain that creating service accounts is separate from granting permissions. The role cannot assign IAM roles to created accounts, so they have zero access to GCP resources. Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
…es/website-homepage
sripathikrishnan
added a commit
that referenced
this pull request
Feb 9, 2026
Bug #4: Remove cell- prefix filter in engine.py that prevented cell style definitions from reaching _generate_cell_style_request(). Bug #12: Detect tab title changes in differ.py and emit updateDocumentTabProperties in walker.py. Bug #3: Generate content insertion requests for new tab bodies in walker.py. Move addDocumentTab to batch 1 in push.py and rewrite placeholder tab IDs to real IDs from the API response. All three fixes verified with live push + re-pull round-trip. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
sripathikrishnan
added a commit
that referenced
this pull request
Feb 27, 2026
Security: - Move session_token from POST body to Authorization: Bearer header to prevent proxy/access log exposure (#1) - Atomic ownership check in revoke_session_token via expected_email param, eliminating TOCTOU race (#2) - Redact full session_hash from list_sessions when admin views another user's sessions; self-service callers retain it (#3) - Fix X-Forwarded-For to use rightmost (infra-injected) IP instead of first (spoofable) entry (#7) Correctness: - Ensure service account is provisioned at session establishment time (exchange_auth_code_for_session), enforcing the invariant that SA always exists for any v2 session; remove downstream or-"" fallbacks and 500 guard (#6) - Validate _server_base_url before opening browser to avoid post-auth failure when server URL is not configured (#4) - Raise ValueError instead of silently dropping extra scopes in v2 get_oauth_token (#5) - Apply SA_TOKEN_CACHE_SECONDS cap client-side for SA tokens (#8) UX: - Prompt for confirmation before revoking an existing valid session in auth login; skip prompt when stdin is not a tty (#9) - Use timezone.utc in all datetime.fromtimestamp calls in CLI output (#10) Fakes / tests: - Fix FakeDatabase.retrieve_auth_code to check flow_type and expiry before popping, preventing silent code destruction on type mismatch (#11) - Update FakeDatabase.revoke_session_token to accept expected_email (#2) Docs: - Fix stale pseudo_scope field name in database.py docstring (#12) - Document _explicit_auth_urls v2 activation edge case (#13) - Add type safety / None discipline principle to CLAUDE.md files Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.