Skip to content

Expand agent-facing Executor configuration tools#841

Draft
RhysSullivan wants to merge 15 commits into
dev-cli-daemon-scopefrom
core-tools-plugin
Draft

Expand agent-facing Executor configuration tools#841
RhysSullivan wants to merge 15 commits into
dev-cli-daemon-scopefrom
core-tools-plugin

Conversation

@RhysSullivan
Copy link
Copy Markdown
Owner

@RhysSullivan RhysSullivan commented May 17, 2026

Summary

Adds the foundational agent-facing Executor configuration surface so sources, secrets, policies, connections, and first-party plugin setup flows can be driven through Executor tools.

Key changes:

  • Expands the built-in executor.coreTools surface for scopes, secrets, source configuration, credential bindings, policies, connections, and OAuth browser handoff.
  • Adds agent-oriented descriptions to OpenAPI, GraphQL, MCP, Google Discovery, 1Password, and desktop settings tools so agents know the required setup flow.
  • Makes secret creation safe for agents by returning browser handoff URLs and allowing scope omission for single-scope local executors.
  • Makes stdio MCP handoff URLs reachable by starting a local web handoff server for dev:cli mcp.
  • Keeps dev CLI install commands cwd-independent and isolates local dev data under apps/local/.executor-dev.
  • Adds smoke/test coverage for agent configuration flows and desktop settings tools.

Validation

  • bun run --cwd packages/core/sdk test -- src/executor.test.ts
  • bun run --cwd apps/cli typecheck
  • bunx oxfmt --check packages/core/sdk/src/core-tools.ts packages/core/sdk/src/executor.test.ts apps/cli/src/main.ts
  • Previously run focused checks for React, plugin packages, lint, and local app typecheck during this branch work.

Notes

This PR is draft because it intentionally groups the foundational core tools and several provider flow descriptions; it likely still needs review for stack splitting and final UX decisions around source credential bindings.

Stack

  1. Serve live UI during dev CLI sessions #839
  2. Match daemon scope before reuse #840
  3. Expand agent-facing Executor configuration tools #841 👈 current

@cloudflare-workers-and-pages
Copy link
Copy Markdown

cloudflare-workers-and-pages Bot commented May 17, 2026

Deploying with  Cloudflare Workers  Cloudflare Workers

The latest updates on your project. Learn more about integrating Git with Workers.

Status Name Latest Commit Preview URL Updated (UTC)
✅ Deployment successful!
View logs
executor-marketing dcdde22 Commit Preview URL

Branch Preview URL
May 19 2026, 08:15 AM

@cloudflare-workers-and-pages
Copy link
Copy Markdown

cloudflare-workers-and-pages Bot commented May 17, 2026

Deploying with  Cloudflare Workers  Cloudflare Workers

The latest updates on your project. Learn more about integrating Git with Workers.

Status Name Latest Commit Updated (UTC)
✅ Deployment successful!
View logs
executor-cloud dcdde22 May 19 2026, 08:16 AM

@pkg-pr-new
Copy link
Copy Markdown

pkg-pr-new Bot commented May 17, 2026

Open in StackBlitz

@executor-js/cli

npm i https://pkg.pr.new/@executor-js/cli@841

@executor-js/config

npm i https://pkg.pr.new/@executor-js/config@841

@executor-js/execution

npm i https://pkg.pr.new/@executor-js/execution@841

@executor-js/sdk

npm i https://pkg.pr.new/@executor-js/sdk@841

@executor-js/codemode-core

npm i https://pkg.pr.new/@executor-js/codemode-core@841

@executor-js/runtime-quickjs

npm i https://pkg.pr.new/@executor-js/runtime-quickjs@841

@executor-js/plugin-file-secrets

npm i https://pkg.pr.new/@executor-js/plugin-file-secrets@841

@executor-js/plugin-google-discovery

npm i https://pkg.pr.new/@executor-js/plugin-google-discovery@841

@executor-js/plugin-graphql

npm i https://pkg.pr.new/@executor-js/plugin-graphql@841

@executor-js/plugin-keychain

npm i https://pkg.pr.new/@executor-js/plugin-keychain@841

@executor-js/plugin-mcp

npm i https://pkg.pr.new/@executor-js/plugin-mcp@841

@executor-js/plugin-onepassword

npm i https://pkg.pr.new/@executor-js/plugin-onepassword@841

@executor-js/plugin-openapi

npm i https://pkg.pr.new/@executor-js/plugin-openapi@841

executor

npm i https://pkg.pr.new/executor@841

commit: dcdde22

@RhysSullivan RhysSullivan force-pushed the dev-cli-daemon-scope branch from 953dd3c to 4a8ced1 Compare May 17, 2026 05:29
@RhysSullivan RhysSullivan force-pushed the core-tools-plugin branch 3 times, most recently from 08ead90 to 02ab416 Compare May 17, 2026 06:39
@RhysSullivan RhysSullivan force-pushed the dev-cli-daemon-scope branch from 9638dc8 to dddf5f4 Compare May 17, 2026 06:39
Introduces `coreToolsPlugin` in @executor-js/sdk exposing three static
tools agents can call directly:

- `scopes.list` — enumerate visible scopes by name; agents pick a scope
  by asking the user, not by guessing or defaulting.
- `secrets.list` — visible secrets as `{id, name, provider}`; values
  never cross the agent boundary.
- `secrets.create` — pre-allocates a secret id and returns a URL to the
  existing /secrets web form, pre-filled with name + id. The user enters
  the value in the browser; the agent confirms by re-listing.

The plugin auto-registers when `coreTools: { webBaseUrl }` is set on
ExecutorConfig, so hosts opt in with one line. apps/local wires it to
the daemon's own port — same host as the API, no separate UI server.

The /secrets web side reads the prefill params via TanStack Router
`validateSearch`, opens the add modal pre-filled, and locks the id via
a new `initialIdOverride` prop on SecretForm. URL prefilling works
fully through the dev:cli vite proxy.
@RhysSullivan RhysSullivan changed the title Add core tools for scope and secret setup Expand agent-facing Executor configuration tools May 19, 2026
@RhysSullivan RhysSullivan marked this pull request as draft May 19, 2026 05:12
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant