Skip to content

merge: hard-cutover sync main into kontext-dev#31

Merged
michiosw merged 5 commits into
kontext-devfrom
sync/main-to-kontext-dev
Mar 4, 2026
Merged

merge: hard-cutover sync main into kontext-dev#31
michiosw merged 5 commits into
kontext-devfrom
sync/main-to-kontext-dev

Conversation

@michiosw
Copy link
Copy Markdown

@michiosw michiosw commented Mar 4, 2026

Hard-cutover sync continuation. This PR merges main into kontext-dev using a real merge commit (no squash).


Open with Devin

adaley-openai and others added 5 commits March 4, 2026 16:41
Validated login + refresh flows. Removing scopes from the refresh
request until we have upgrade flow in place. Confirmed that tokens
refresh with existing scopes.
merge: hard-cutover sync upstream/main into main
@michiosw michiosw merged commit 0cebe2e into kontext-dev Mar 4, 2026
8 of 10 checks passed
@michiosw michiosw deleted the sync/main-to-kontext-dev branch March 4, 2026 16:51
Copy link
Copy Markdown

@kontext-review kontext-review Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Kontext Review: 1 Issues Found (Advisory)

Inline findings posted:

  • [LOW][maintainability] Architectural finding (codex-rs/login/src/server.rs:434)

Reviewer summary:

  • The PR successfully syncs main into kontext-dev, updating OAuth scopes for the login server and cleaning up the refresh token request by removing the unnecessary scope field.
  • The changes are minimal, focused, and align with standard OAuth2 practices for refresh tokens.
Scores and diagnostics
  • Architecture: 7.0/10
  • Organization: 7.0/10
  • Cleanliness: 7.0/10
  • Overall: 7.0/10
  • Candidate findings: 1
  • Published inline: 1
  • Published summary-only: 0
  • Suppressed findings: 0

Limitations

  • Review is limited to the provided diff.

  • Cannot verify if the removed scope field in RefreshRequest impacts the specific OAuth provider's non-standard requirements, though it aligns with the standard OAuth2 spec.

  • Model: gemini-3.1-pro-preview

  • Omitted files: 0

Generated at 2026-03-04T16:51:21.456Z.

(
"scope".to_string(),
"openid profile email offline_access".to_string(),
"openid profile email offline_access api.connectors.read api.connectors.invoke"
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

[LOW][maintainability] Architectural finding

Impact: Can reduce maintainability or correctness if left unresolved.
Suggested fix: Apply a targeted refactor and add/adjust tests where needed.
Evidence: The OAuth scopes are hardcoded as a single string literal. If these scopes are referenced in other parts of the application (e.g., token validation), extracting them to a shared constant would prevent drift.

Copy link
Copy Markdown

@devin-ai-integration devin-ai-integration Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

✅ Devin Review: No Issues Found

Devin Review analyzed this PR and found no potential bugs to report.

View in Devin Review to see 1 additional finding.

Open in Devin Review

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants