Skip to content

feat: impl syntax highlighter for markdown files#5

Closed
laststylebender14 wants to merge 2 commits intomainfrom
feat/impl-syntax-highlighter-for-markdown-files
Closed

feat: impl syntax highlighter for markdown files#5
laststylebender14 wants to merge 2 commits intomainfrom
feat/impl-syntax-highlighter-for-markdown-files

Conversation

@laststylebender14
Copy link
Copy Markdown
Contributor

No description provided.

@tusharmath tusharmath closed this Dec 26, 2024
@amitksingh1490 amitksingh1490 deleted the feat/impl-syntax-highlighter-for-markdown-files branch October 1, 2025 14:53
Zetkolink referenced this pull request in Zetkolink/forgecode Apr 8, 2026
Performance:
- #5: embed_batch sub-batching (max 20 texts per Ollama request)
- tailcallhq#6: delete_by_file_paths batching (max 100 paths per Qdrant filter)

Security:
- tailcallhq#13: Rate limiting on CreateApiKey (max 1 key/second)
- tailcallhq#14: API keys stored as SHA-256 hashes in SQLite

Quality:
- tailcallhq#17: Pinned all Cargo.toml dependency versions
- tailcallhq#16: Added compute_hash compatibility tests (2 new tests)

Co-Authored-By: ForgeCode <noreply@users.noreply.github.com>
Zetkolink referenced this pull request in Zetkolink/forgecode Apr 8, 2026
Performance:
- #5: embed_batch sub-batching (max 20 texts per Ollama request)
- tailcallhq#6: delete_by_file_paths batching (max 100 paths per Qdrant filter)

Security:
- tailcallhq#13: Rate limiting on CreateApiKey (max 1 key/second)
- tailcallhq#14: API keys stored as SHA-256 hashes in SQLite

Quality:
- tailcallhq#17: Pinned all Cargo.toml dependency versions
- tailcallhq#16: Added compute_hash compatibility tests (2 new tests)
Zetkolink referenced this pull request in Zetkolink/forgecode Apr 8, 2026
Performance:
- #5: embed_batch sub-batching (max 20 texts per Ollama request)
- tailcallhq#6: delete_by_file_paths batching (max 100 paths per Qdrant filter)

Security:
- tailcallhq#13: Rate limiting on CreateApiKey (max 1 key/second)
- tailcallhq#14: API keys stored as SHA-256 hashes in SQLite

Quality:
- tailcallhq#17: Pinned all Cargo.toml dependency versions
- tailcallhq#16: Added compute_hash compatibility tests (2 new tests)
xihale added a commit to xihale/forgecode that referenced this pull request Apr 26, 2026
…uplicate path resolution

- ExternalHookInterceptor now holds Arc<Vec<PreparedHook>> instead of
  cloning hook content on every call (tailcallhq#14)
- PreparedHook pre-creates the executable (memfd on Linux, temp-file
  elsewhere) at construction time, eliminating the per-call memfd
  create/seal overhead (tailcallhq#16) and the fd-lifetime race condition (tailcallhq#17)
- The memfd guard is kept alive for the entire session, ensuring
  /proc/self/fd/N remains valid for all spawn() calls
- Non-Linux temp files are cleaned up in PreparedHook::drop (tailcallhq#15)
- Add validate_hook_path_for_delete() that works with missing files,
  allowing cleanup of stale trust-store entries (tailcallhq#18)
- Extract resolve_and_validate_hook_path() helper in ui.rs to
  deduplicate ~40 lines of identical path resolution logic between
  trust and delete handlers (tailcallhq#13)
- Add clarifying comment on Orchestrator.cached_hooks explaining the
  dual propagation path (primary via Hook, sub-agents via context) (tailcallhq#20)
- Log the corrupted file path in TrustStore::load() so users can
  recover their data before it's overwritten (tailcallhq#5)
- Remove committed plan files (working documents with unchecked tasks) (tailcallhq#19)

Co-Authored-By: ForgeCode <noreply@forgecode.dev>
xihale added a commit to xihale/forgecode that referenced this pull request Apr 26, 2026
- Fix path traversal bypass in validate_hook_path_for_delete: add
  lexical normalization to resolve `..` components before the
  starts_with check (tailcallhq#1)
- Ensure validate_hook_path_for_delete returns paths relative to the
  non-canonical base, so relative_hook_path() can strip the prefix
  correctly even when HOME is a symlink (tailcallhq#6)
- Upgrade PreparedHook::prepare() failure from debug! to warn! so
  users are alerted when trusted hooks fail to load (tailcallhq#2)
- Replace 3-tuple return in resolve_and_validate_hook_path with a
  named ResolvedHook struct for readability (tailcallhq#4)
- Use structured logging fields (path + error) in TrustStore::load()
  warning instead of inline format string (tailcallhq#5)

Co-Authored-By: ForgeCode <noreply@forgecode.dev>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants