* fix: make cleanup "keep" persist subagent sessions indefinitely * feat: expose subagent session metadata in sessions list * fix: include status and timing in sessions_list tool * fix: hide injected timestamp prefixes in chat ui * feat: push session list updates over websocket * feat: expose child subagent sessions in subagents list * feat: add admin http endpoint to kill sessions * Emit session.message websocket events for transcript updates * Estimate session costs in sessions list * Add direct session history HTTP and SSE endpoints * Harden dashboard session events and history APIs * Add session lifecycle gateway methods * Add dashboard session API improvements * Add dashboard session model and parent linkage support * fix: tighten dashboard session API metadata * Fix dashboard session cost metadata * Persist accumulated session cost * fix: stop followup queue drain cfg crash * Fix dashboard session create and model metadata * fix: stop guessing session model costs * Gateway: cache OpenRouter pricing for configured models * Gateway: add timeout session status * Fix subagent spawn test config loading * Gateway: preserve operator scopes without device identity * Emit user message transcript events and deduplicate plugin warnings * feat: emit sessions.changed lifecycle event on subagent spawn Adds a session-lifecycle-events module (similar to transcript-events) that emits create events when subagents are spawned. The gateway server.impl.ts listens for these events and broadcasts sessions.changed with reason=create to SSE subscribers, so dashboards can pick up new subagent sessions without polling. * Gateway: allow persistent dashboard orchestrator sessions * fix: preserve operator scopes for token-authenticated backend clients Backend clients (like agent-dashboard) that authenticate with a valid gateway token but don't present a device identity were getting their scopes stripped. The scope-clearing logic ran before checking the device identity decision, so even when evaluateMissingDeviceIdentity returned 'allow' (because roleCanSkipDeviceIdentity passed for token-authed operators), scopes were already cleared. Fix: also check decision.kind before clearing scopes, so token-authenticated operators keep their requested scopes. * Gateway: allow operator-token session kills * Fix stale active subagent status after follow-up runs * Fix dashboard image attachments in sessions send * Fix completed session follow-up status updates * feat: stream session tool events to operator UIs * Add sessions.steer gateway coverage * Persist subagent timing in session store * Fix subagent session transcript event keys * Fix active subagent session status in gateway * bump session label max to 512 * Fix gateway send session reactivation * fix: publish terminal session lifecycle state * feat: change default session reset to effectively never - Change DEFAULT_RESET_MODE from "daily" to "idle" - Change DEFAULT_IDLE_MINUTES from 60 to 0 (0 = disabled/never) - Allow idleMinutes=0 through normalization (don't clamp to 1) - Treat idleMinutes=0 as "no idle expiry" in evaluateSessionFreshness - Default behavior: mode "idle" + idleMinutes 0 = sessions never auto-reset - Update test assertion for new default mode * fix: prep session management followups (#50101) (thanks @clay-datacurve) --------- Co-authored-by: Tyler Yust <TYTYYUST@YAHOO.COM>
78 lines
2.9 KiB
TypeScript
78 lines
2.9 KiB
TypeScript
import type { SessionManager } from "@mariozechner/pi-coding-agent";
|
|
import { getGlobalHookRunner } from "../plugins/hook-runner-global.js";
|
|
import {
|
|
applyInputProvenanceToUserMessage,
|
|
type InputProvenance,
|
|
} from "../sessions/input-provenance.js";
|
|
import { installSessionToolResultGuard } from "./session-tool-result-guard.js";
|
|
|
|
export type GuardedSessionManager = SessionManager & {
|
|
/** Flush any synthetic tool results for pending tool calls. Idempotent. */
|
|
flushPendingToolResults?: () => void;
|
|
/** Clear pending tool calls without persisting synthetic tool results. Idempotent. */
|
|
clearPendingToolResults?: () => void;
|
|
};
|
|
|
|
/**
|
|
* Apply the tool-result guard to a SessionManager exactly once and expose
|
|
* a flush method on the instance for easy teardown handling.
|
|
*/
|
|
export function guardSessionManager(
|
|
sessionManager: SessionManager,
|
|
opts?: {
|
|
agentId?: string;
|
|
sessionKey?: string;
|
|
inputProvenance?: InputProvenance;
|
|
allowSyntheticToolResults?: boolean;
|
|
allowedToolNames?: Iterable<string>;
|
|
},
|
|
): GuardedSessionManager {
|
|
if (typeof (sessionManager as GuardedSessionManager).flushPendingToolResults === "function") {
|
|
return sessionManager as GuardedSessionManager;
|
|
}
|
|
|
|
const hookRunner = getGlobalHookRunner();
|
|
const beforeMessageWrite = hookRunner?.hasHooks("before_message_write")
|
|
? (event: { message: import("@mariozechner/pi-agent-core").AgentMessage }) => {
|
|
return hookRunner.runBeforeMessageWrite(event, {
|
|
agentId: opts?.agentId,
|
|
sessionKey: opts?.sessionKey,
|
|
});
|
|
}
|
|
: undefined;
|
|
|
|
const transform = hookRunner?.hasHooks("tool_result_persist")
|
|
? // oxlint-disable-next-line typescript/no-explicit-any
|
|
(message: any, meta: { toolCallId?: string; toolName?: string; isSynthetic?: boolean }) => {
|
|
const out = hookRunner.runToolResultPersist(
|
|
{
|
|
toolName: meta.toolName,
|
|
toolCallId: meta.toolCallId,
|
|
message,
|
|
isSynthetic: meta.isSynthetic,
|
|
},
|
|
{
|
|
agentId: opts?.agentId,
|
|
sessionKey: opts?.sessionKey,
|
|
toolName: meta.toolName,
|
|
toolCallId: meta.toolCallId,
|
|
},
|
|
);
|
|
return out?.message ?? message;
|
|
}
|
|
: undefined;
|
|
|
|
const guard = installSessionToolResultGuard(sessionManager, {
|
|
sessionKey: opts?.sessionKey,
|
|
transformMessageForPersistence: (message) =>
|
|
applyInputProvenanceToUserMessage(message, opts?.inputProvenance),
|
|
transformToolResultForPersistence: transform,
|
|
allowSyntheticToolResults: opts?.allowSyntheticToolResults,
|
|
allowedToolNames: opts?.allowedToolNames,
|
|
beforeMessageWriteHook: beforeMessageWrite,
|
|
});
|
|
(sessionManager as GuardedSessionManager).flushPendingToolResults = guard.flushPendingToolResults;
|
|
(sessionManager as GuardedSessionManager).clearPendingToolResults = guard.clearPendingToolResults;
|
|
return sessionManager as GuardedSessionManager;
|
|
}
|