Skip to content

Prepare v0.1.1 release#5

Merged
jacobjmc merged 2 commits intomainfrom
codex/release-0.1.1
Mar 7, 2026
Merged

Prepare v0.1.1 release#5
jacobjmc merged 2 commits intomainfrom
codex/release-0.1.1

Conversation

@jacobjmc
Copy link
Owner

@jacobjmc jacobjmc commented Mar 7, 2026

Summary

  • harden public release readiness and docs for OpenCode Monitor
  • move remote backend tokens into system keychain when available
  • clean up remaining React hook lint warnings and clarify Apple Silicon macOS support

Validation

  • npm run lint
  • npm run typecheck
  • npm run test
  • npm run build
  • cd src-tauri && cargo test

Summary by cubic

Prepares the v0.1.1 release with secure token storage and a smoother setup. Remote backend tokens now use the system keychain, and the app manages its own OpenCode server; docs and metadata are updated.

  • New Features

    • Store remote backend tokens in the system keychain (macOS/Windows/Linux Secret Service). Migrates from plaintext on read and keeps tokens out of settings files.
    • Managed local OpenCode server with platform-aware PID paths and improved health checks. README adds install targets and clarifies defaults.
    • Update CLI updater to prefer “opencode” (brew formula/cask/npm), with legacy “codex” as fallback.
    • Add app/package metadata and change bundle identifier; clarify macOS Apple Silicon support.
    • Add keyring dependency and libdbus-1-dev to Linux CI/release builds.
  • Bug Fixes

    • Clean up React hook deps to remove warnings and avoid stale values in user input, layout, and thread hooks.

Written for commit 2b8905d. Summary will update on new commits.

Copy link

@cubic-dev-ai cubic-dev-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

1 issue found across 16 files

Prompt for AI agents (unresolved issues)

Check if these issues are valid — if so, understand the root cause of each and fix them. If appropriate, use sub-agents to investigate and fix each issue separately.


<file name="src-tauri/src/shared/codex_update_core.rs">

<violation number="1" location="src-tauri/src/shared/codex_update_core.rs:204">
P2: New `method` strings (`*_legacy`) break the existing `CodexUpdateMethod` contract; return the existing canonical values or update the shared type contract in lockstep.</violation>
</file>

You're on the cubic free plan with 16 free PR reviews remaining this month. Upgrade for unlimited reviews.

Reply with feedback, questions, or to request a fix. Tag @cubic-dev-ai to re-run a review.

let (ok, output) = run_brew_upgrade(&["--cask", "codex"]).await?;
let upgraded = brew_output_indicates_upgrade(&output);
(
"brew_cask_legacy".to_string(),
Copy link

@cubic-dev-ai cubic-dev-ai bot Mar 7, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P2: New method strings (*_legacy) break the existing CodexUpdateMethod contract; return the existing canonical values or update the shared type contract in lockstep.

Prompt for AI agents
Check if this issue is valid — if so, understand the root cause and fix it. At src-tauri/src/shared/codex_update_core.rs, line 204:

<comment>New `method` strings (`*_legacy`) break the existing `CodexUpdateMethod` contract; return the existing canonical values or update the shared type contract in lockstep.</comment>

<file context>
@@ -167,11 +167,41 @@ pub(crate) async fn codex_update_core(
+        let (ok, output) = run_brew_upgrade(&["--cask", "codex"]).await?;
+        let upgraded = brew_output_indicates_upgrade(&output);
+        (
+            "brew_cask_legacy".to_string(),
             Some("codex".to_string()),
             ok,
</file context>
Fix with Cubic

@jacobjmc jacobjmc merged commit bdf3c63 into main Mar 7, 2026
10 checks passed
@jacobjmc jacobjmc deleted the codex/release-0.1.1 branch March 7, 2026 04:08
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant