- Position MCP button as the leftmost action button
- Improves visibility and accessibility of MCP functionality
- User requested positioning change
🤖 Generated with [Claude Code](https://claude.ai/code)
Co-Authored-By: Claude <noreply@anthropic.com>
- Remove problematic stdio import to fix build issues
- Focus on SSE-based MCP servers for now
- Builds should work properly now
🤖 Generated with [Claude Code](https://claude.ai/code)
Co-Authored-By: Claude <noreply@anthropic.com>
Use dynamic import to avoid build-time import errors
Add fallback error handling for unsupported environments
This should fix both dev server and Docker build issues
🤖 Generated with [Claude Code](https://claude.ai/code)
Co-Authored-By: Claude <noreply@anthropic.com>
Remove deprecated node_compat section, use nodejs_compat flag only
🤖 Generated with [Claude Code](https://claude.ai/code)
Co-Authored-By: Claude <noreply@anthropic.com>
- Add nodejs_als compatibility flag and node_compat preset to wrangler.toml
- Remove artificial stdio limitation from MCP service
- Restore original example config with npx/uvx servers
- Update UI messaging to reflect both stdio and SSE support
- This should enable Jimmy's original stdio MCP functionality
🤖 Generated with [Claude Code](https://claude.ai/code)
Co-Authored-By: Claude <noreply@anthropic.com>
- Move MCP button to better position (after file upload, before enhance)
- Add runtime environment detection for stdio servers
- Update example config to focus on SSE-based servers
- Add warning about stdio server limitations in Cloudflare Workers
- Provide clearer error messages for unsupported server types
🤖 Generated with [Claude Code](https://claude.ai/code)
Co-Authored-By: Claude <noreply@anthropic.com>
- Move MCP connection button from BaseChat to ChatBox component
- Position MCP button in the bottom toolbar near other action buttons
- Improve discoverability of MCP functionality in the UI
- Remove unused import from BaseChat component
🤖 Generated with [Claude Code](https://claude.ai/code)
Co-Authored-By: Claude <noreply@anthropic.com>
- Pin @codemirror/state to version 6.5.2 to resolve version mismatch
- Fixes 'multiple instances of @codemirror/state' error in production builds
- Ensures all CodeMirror packages use consistent state version (6.5.2)
- Resolves instanceof checks failure that breaks CodeMirror functionality
This issue occurs when @codemirror/view depends on a newer version of
@codemirror/state than what's explicitly installed, causing multiple
instances to be bundled and breaking extension compatibility.
* fix: enhance Bayer MGA provider reliability and Docker integration
* Merge latest dev branch changes into Bayer MGA feature branch
* Improve Bayer MGA provider model filtering and error handling
* Add robust model validation with fallback mechanisms
* Enhance logging and debugging capabilities for model selection
* Add Bayer MGA environment variables to Docker configurations
* Update worker configuration with Bayer MGA API keys
* Add comprehensive Bayer MGA setup to .env.example
* Create standalone test script for Bayer MGA provider debugging
* Fix intermittent model selection issues beyond Claude 3.7 Sonnet
* Ensure provider switching works without breaking other providers
* Bayer MGA provider multimodel support and test coverage.
* Add Claude.md.
- Enhanced BayerMGAProvider getModelInstance method with model validation
- Added fallback mechanism when requested model is not available
- Improved dynamic model filtering with better validation
- Added UI model selection handling for unavailable models
- Added README.md to ECR deploy workflow paths-ignore
🤖 Generated with [Claude Code](https://claude.ai/code)
Co-Authored-By: Claude <noreply@anthropic.com>
- Increase nginx proxy-body-size and client-max-body-size to 500MB
- Add proxy timeouts for handling large file uploads and processing
- Supports large prompts, images, attachments, and GitHub project imports
🤖 Generated with [Claude Code](https://claude.ai/code)
Co-Authored-By: Claude <noreply@anthropic.com>
- Add ExternalSecret for auth secrets (SESSION_SECRET, GitHub OAuth) via AWS Secrets Manager
- Separate user-configurable provider API keys into dedicated K8s Secret
- Update deployment to use three-layer configuration model:
* ConfigMap: non-sensitive public settings
* ExternalSecret → Secret: infrastructure auth secrets from AWS
* Secret: user-configurable provider API keys managed via UI
- Add comprehensive documentation for AWS Secrets Manager setup
- Include K8s deployment architecture guide with troubleshooting commands
- Enable secure, auditable, and rotatable secrets management for production
This follows enterprise security best practices with proper separation of concerns between infrastructure and user secrets.
- Add SESSION_SECRET to Secret template for secure cookie encryption
- Add GITHUB_CLIENT_ID and GITHUB_CLIENT_SECRET for OAuth authentication
- Update deployment to reference both ConfigMap and Secret via envFrom
- Ensure sensitive data stays in Secret (base64 encoded) not ConfigMap
- Add helpful comments for secret generation and security best practices
This enables secure session management and GitHub authentication in EKS deployment.
- Update all auth-related routes to use @remix-run/cloudflare imports
- Fix GitHub OAuth server utilities to use Cloudflare-compatible session storage
- Resolve build failures caused by Node.js-specific modules in browser bundle
- Enable successful production builds for EKS deployment
This resolves the 'Cannot access xs before initialization' error by ensuring all imports are compatible with the Cloudflare Workers runtime environment.
- Fix TypeScript compilation errors in debug API route that were causing JavaScript bundling failures
- Add proper type definitions for API responses and test results
- Fix type conversions and parameter typing throughout debug route
- Update auth controls with proper error state typing
- Resolve 'Cannot access xs before initialization' runtime error in production
This fixes the EKS deployment crash by eliminating TypeScript compilation issues that were causing JavaScript module loading problems.
- Separate auth controls into lazy-loaded component to prevent module loading issues
- Add comprehensive error handling and fallbacks throughout auth system
- Make profile store resilient to initialization errors with safe localStorage access
- Add try-catch blocks around critical functions to prevent runtime crashes
- Provide fallback navigation methods when auth hooks fail
- Fix EKS deployment crash caused by JavaScript bundling/hoisting issues
This fixes the Header-DpwHgB0l.js runtime error that was preventing the app from loading in production.