Skip to content

upgrade calcit#57

Open
tiye wants to merge 3 commits intomainfrom
updates
Open

upgrade calcit#57
tiye wants to merge 3 commits intomainfrom
updates

Conversation

@tiye
Copy link
Copy Markdown
Member

@tiye tiye commented Feb 24, 2026

No description provided.

Copy link
Copy Markdown

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This pull request upgrades Calcit from version 0.9.20 to 0.11.6, along with updating multiple dependencies and adding comprehensive LLM agent documentation. The upgrade includes changes to the build toolchain (moving to Yarn PnP), dependency management, and CI/CD configuration.

Changes:

  • Core Calcit upgrade from 0.9.20 to 0.11.6 with corresponding dependency updates
  • Addition of extensive LLM agent documentation (3 new markdown files totaling ~2600 lines)
  • Migration to Yarn Plug'n'Play (PnP) with new loader file and .gitignore updates
  • CI/CD workflow updates including Node.js and Yarn version changes

Reviewed changes

Copilot reviewed 9 out of 13 changed files in this pull request and generated 6 comments.

Show a summary per file
File Description
package.json Upgraded @calcit/procs (0.9.20→0.11.6), dayjs (1.11.18→1.11.19), vite (7.1.11→7.3.0)
deps.cirru Updated calcit-version and 9 dependencies to specific versions from "main" branches
compact.cirru Auto-generated Calcit code with added :about field and :examples entries throughout
llms/Respo.md New 920-line comprehensive Respo development guide for LLM agents
llms/Calcit.md New 1083-line Calcit programming guide for AI agents with CLI commands
Agents.md New 609-line Cumulo development guide for LLM agents
.pnp.loader.mjs New 2126-line Yarn PnP ESM loader (generated)
.grok/settings.json New Grok AI configuration file
.gitignore Added .yarn/*.gz to ignore list
.gitattributes Marked .pnp.* and llms/*.md as linguist-generated
.github/workflows/upload.yaml Updated Node.js (20→24), actions/setup-node (v4→v6), removed cache config, added Corepack setup
Files not reviewed (1)
  • .pnp.loader.mjs: Language not supported

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

@@ -1,9 +1,9 @@

{} (:package |app)
{} (:about "|file is generated - never edit directly; learn cr edit/tree workflows before changing") (:package |app)
Copy link

Copilot AI Feb 24, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The Calcit version "0.11.6" is being set in both package.json (@calcit/procs) and deps.cirru (:calcit-version). However, the compact.cirru file contains a warning message at line 2 stating the file is generated and should never be edited directly. Please verify that the compact.cirru changes were generated by the Calcit tooling and not manually edited.

Copilot uses AI. Check for mistakes.
Comment on lines 427 to 428
js/localStorage.setItem (:storage-key config/site)
format-cirru-edn $ [] username password
Copy link

Copilot AI Feb 24, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The login workflow persists raw credentials to localStorage via js/localStorage.setItem with format-cirru-edn $ [] username password, which stores the username and password in cleartext in the browser. Any XSS or malicious third-party script on this origin can read these credentials and reuse them to impersonate users or pivot to other services where the same password is reused. Avoid storing passwords client‑side at all, or at minimum store only a short‑lived opaque token instead of plaintext credentials.

Suggested change
js/localStorage.setItem (:storage-key config/site)
format-cirru-edn $ [] username password

Copilot uses AI. Check for mistakes.
@@ -1437,8 +1547,10 @@
{} (:id op-id) (:name username) (:nickname username)
:password $ md5 password
Copy link

Copilot AI Feb 24, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

User passwords are hashed with md5 before being stored, which is a weak and outdated algorithm designed for checksums rather than password storage. Attackers with read access to the user database or backup files can efficiently crack MD5 hashes (especially unsalted) using precomputed tables or GPUs and recover original passwords. Replace MD5 with a modern password hashing function (e.g., bcrypt, scrypt, Argon2) with per‑user salts and appropriate work factors to make offline cracking impractical.

Copilot uses AI. Check for mistakes.
@NoEgAm
Copy link
Copy Markdown
Contributor

NoEgAm commented Mar 10, 2026

conflict

@tiye
Copy link
Copy Markdown
Member Author

tiye commented Mar 14, 2026

@NoEgAm updated

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants