Conversation
ba0b691 to
6ae78cb
Compare
This comment was marked as resolved.
This comment was marked as resolved.
commit: |
e154517 to
6204f2a
Compare
6204f2a to
1319f01
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR was opened by the Changesets release GitHub action. When you're ready to do a release, you can merge this and the packages will be published to npm automatically. If you're not ready to do a release yet, that's fine, whenever you add more changesets to main, this PR will be updated.
Releases
agents@0.4.0
Minor Changes
#848
a167344Thanks @mattzcarey! - Upgrade MCP SDK to 1.26.0 to prevent cross-client response leakage. Updated examples for stateless MCP Servers create newMcpServerinstance per request instead of sharing a single instance. A guard is added in this version of the MCP SDK which will prevent connection to a Server instance that has already been connected to a transport. Developers will need to modify their code if they declare theirMcpServerinstance as a global variable.#298
27f4e3eThanks @jaredhanson! - AddcreateMcpOAuthProvidermethod to theAgentclass, allowing subclasses to override the default OAuth provider used when connecting to MCP servers. This enables custom authentication strategies such as pre-registered client credentials or mTLS, beyond the built-in dynamic client registration.#610
f59f305Thanks @threepointone! - DeprecateonStateUpdateserver-side hook in favor ofonStateChangedonStateChangedis a drop-in rename ofonStateUpdate(same signature, same behavior)onStateUpdatestill works but emits a one-time console warning per classvalidateStateChangerejections now propagate aCF_AGENT_STATE_ERRORmessage back to the client#871
27f8f75Thanks @threepointone! - Migrate x402 MCP integration from legacyx402package to@x402/coreand@x402/evmv2Breaking changes for x402 users:
x402with@x402/coreand@x402/evmPaymentRequirementstype now uses v2 fields (e.g.amountinstead ofmaxAmountRequired)X402ClientConfig.accounttype changed fromviem.AccounttoClientEvmSigner(structurally compatible withprivateKeyToAccount())Migration guide:
Update dependencies:
Update network identifiers — both legacy names and CAIP-2 format are accepted:
If you access
PaymentRequirementsfields in callbacks, update to v2 field names (see@x402/coredocs).The
versionfield onX402ConfigandX402ClientConfigis now deprecated and ignored — the protocol version is determined automatically.Other changes:
X402ClientConfig.networkis now optional — the client auto-selects from available payment requirementsPAYMENT-SIGNATURE) and v1 (X-PAYMENT) HTTP headersnormalizeNetworkexport for converting legacy network names to CAIP-2 formatPaymentRequirements,PaymentRequired,Network,FacilitatorConfig, andClientEvmSignerfromagents/x402Patch Changes
#610
f59f305Thanks @threepointone! - Add readonly connections: restrict WebSocket clients from modifying agent stateshouldConnectionBeReadonly,setConnectionReadonly,isConnectionReadonlysetState()and mutating@callable()methods for readonly connections_cf_readonly), surviving hibernation without extra SQLconnection.setState()callsonStateUpdateErrorcallback for handling rejected state updates#855
271a3cfThanks @threepointone! - FixuseAgentandAgentClientcrashing when usingbasePathrouting.#868
b3e2dc1Thanks @threepointone! - Fix MCP OAuth callback URL leaking instance nameAdd
callbackPathoption toaddMcpServerto prevent instance name leakage in MCP OAuth callback URLs. WhensendIdentityOnConnectisfalse,callbackPathis now required — the default callback URL would expose the instance name, undermining the security intent. Also fixes callback request detection to match via thestateparameter instead of a loose/callbackURL substring check, enabling custom callback paths.#872
de71f9eThanks @threepointone! - update dependencies8893fbeThanks @threepointone! - partykit releasespartyserver
0.1.3(Feb 8, 2026)configurable: trueto thestate,setState,serializeAttachment, anddeserializeAttachmentproperty descriptors on connection objects. This allows downstream consumers (like the Cloudflare Agents SDK) to redefine these properties withObject.definePropertyfor namespacing or wrapping internal state storage. Default behavior is unchanged.0.1.4(Feb 9, 2026)routePartykitRequest. Passcors: truefor permissive defaults orcors: { ...headers }for custom CORS headers. Preflight (OPTIONS) requests are handled automatically for matched routes, and CORS headers are appended to all non-WebSocket responses — including responses returned byonBeforeRequest.setNametakes care of it, along with the nestedblockConcurrencyWhilecall.partysocket
1.1.12(Feb 8, 2026)PartySocket.reconnect()crashing when usingbasePathwithoutroom. The reconnect guard now accepts eitherroomorbasePathas sufficient context to construct a connection URL.PartySocketwithoutroomorbasePath(and withoutstartClosed: true), instead of silently connecting to a malformed URL containing"undefined"as the room name.1.1.13(Feb 9, 2026)reconnect()not working aftermaxRetrieshas been exhausted. The_connectLockwas not released when the max retries early return was hit in_connect(), preventing any subsequentreconnect()call from initiating a new connection.#869
fc17506Thanks @threepointone! - Removeroom/partyworkaround forbasePathrouting now that partysocket handles reconnect without requiringroomto be set.#873
d0579faThanks @threepointone! - Remove CORS wrapping fromrouteAgentRequestand delegate to partyserver's native CORS support. Thecorsoption is now passed directly through toroutePartykitRequest, which handles preflight and response headers automatically since partyserver 0.1.4.#865
c3211d0Thanks @threepointone! - update dependenciesUpdated dependencies [
21a7977,3de98a3,c3211d0]:@cloudflare/ai-chat@0.0.7
Patch Changes
#859
3de98a3Thanks @threepointone! - broaden peer deps#865
c3211d0Thanks @threepointone! - update dependencies@cloudflare/codemode@0.0.7
Patch Changes
#849
21a7977Thanks @Muhammad-Bin-Ali! - Allow configurable model inexperimental_codemodeinstead of hardcodedgpt-4.1#859
3de98a3Thanks @threepointone! - broaden peer deps#865
c3211d0Thanks @threepointone! - update dependencieshono-agents@3.0.3
Patch Changes
13c6c26Thanks @threepointone! - broaden deps#865
c3211d0Thanks @threepointone! - update dependencies