Closes the last functional gaps where the MCP tool registry exposed write verbs the CLI didn't: - vault set <k> <v> [--type env|file --mount <path> --description ...] Client-side crypto_secretbox_easy with a fresh symmetric key sealed to the member's own pubkey via crypto_box_seal — same pattern used for file shares. Pairs with the existing vault list/delete. - watch add <url> [--label --interval --mode --extract --notify-on] Pairs with watch list/remove. - webhook create <name> — pairs with webhook list/delete. Cleanup: deletes 22 stub files under apps/cli/src/mcp/tools/* plus router.ts, middleware/, handlers/ (~120 LoC). These were FAMILY/TOOLS metadata-only re-exports left over from before the 1.5.0 tool-less push-pipe flip; nothing imports them. The legitimate MCP surfaces stay: the inbound <channel> push pipe, mesh skills as prompts and skill:// resources, and the mesh-service proxy mode. Released as 1.23.0 on npm. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
6.0 KiB
Changelog
1.23.0 (2026-05-03) — close the CLI surface, prune dead MCP stubs
Three previously-MCP-only write verbs land on the CLI, closing every functional gap between the (defunct since 1.5.0) MCP tool registry and the CLI:
claudemesh vault set <key> <value>— encrypts client-side viacrypto_secretbox_easywith a fresh symmetric key, then seals the key to the member's own pubkey viacrypto_box_seal(same shape as the file-share crypto). Flags:--type env|file,--mount <path>,--description <text>. Pairs with the existingvault list/delete.claudemesh watch add <url>— registers a URL change watcher. Flags:--label,--interval <sec>,--mode,--extract <css>,--notify-on changed|always. Pairs withwatch list/remove.claudemesh webhook create <name>— issues a fresh inbound webhook; prints url + one-shot secret. Pairs withwebhook list/delete.
Cleanup: removed 22 dead stub files under apps/cli/src/mcp/tools/*,
the unused router.ts, middleware/*, and handlers/* directories
(~120 LoC). The MCP server in 1.5.0+ has been a tool-less push-pipe;
these stubs were leftover scaffolding that never wired into the
tools/list response. The legitimate MCP surfaces stay untouched:
<channel source="claudemesh">push pipe (the irreducible reason MCP exists at all — no other Claude Code surface can inject events mid-turn).- Mesh skills exposed as MCP prompts (slash commands) and
resources (
skill://claudemesh/<name>). - Mesh-deployed MCP services proxied via the sub-process tool surface (separate code path under server.ts:855+).
1.22.1 (2026-05-03) — daemon docs + help
- Root
claudemesh --helpnow lists thedaemonsubcommand suite under its own section (was missing in 1.22.0). claudemesh daemon(no subcommand) now prints a usage block instead of silently launching the daemon.daemon help|--help|-hwork too.- Bundled SKILL.md gained a "Daemon path (v0.9.0, opt-in, fastest)"
section explaining the runtime, lifecycle commands, and how it relates
to
claudemesh install(independent — not auto-started).
1.22.0 (2026-05-03) — daemon v0.9.0
New: claudemesh daemon — long-lived peer mesh runtime
Persistent local process that holds the broker WS, durable outbox/inbox in
SQLite, IPC over UDS (+ optional loopback TCP with bearer token), and SSE
event stream. Surrogates wire-up; claudemesh send and friends route
through the daemon when its socket is present, falling back to the
existing bridge / cold paths otherwise.
Subcommands:
daemon up|start [--mesh <slug>] [--name ...] [--no-tcp] [--public-health]daemon status [--json],daemon down|stop,daemon versiondaemon outbox list [--failed|--pending|--inflight|--done]daemon outbox requeue <id> [--new-client-id <id>]daemon accept-host(per-host fingerprint pin)daemon install-service --mesh <slug>(macOS launchd / Linux systemd-user)daemon uninstall-service
Idempotency end-to-end:
- Caller-stable
client_message_id+ canonicalrequest_fingerprint(sha256 of envelope_version || dest_kind || dest_ref || reply_to || priority || canonical_meta_json || body_hash) attach on every send. - Broker persists both on
mesh.message_queue(migration 0028, additive- nullable) and echoes them on push, so receiving daemons dedupe their
inbox by
client_message_id.
- nullable) and echoes them on push, so receiving daemons dedupe their
inbox by
- §4.5.1 IPC duplicate-lookup table (11 cases × no-row / 5 statuses × match/mismatch) covered by 15 unit tests.
Crash recovery:
- Outbox row transitions:
pending→inflight→done/dead/aborted.BEGIN IMMEDIATEserializes daemon-local writes; the drain worker is wakeable via promise-replacement and backs off failed sends. - Decrypt path tries session secret key, then member secret key, then base64 fallback, so legacy unencrypted pushes still inbox cleanly.
Sprint 7 (broker-side dedupe enforcement: partial unique index +
mesh.client_message_dedupe atomic-accept table) is intentionally
deferred — see .artifacts/shipped/2026-05-03-daemon-spec-broker- hardening-followups.md.
1.0.0-alpha.0 (2026-04-13)
Architecture
- Complete folder restructure:
entrypoints/,cli/,commands/,services/(17 feature-folders with facade pattern),ui/,mcp/,constants/,types/,utils/,locales/,templates/ - 212 source files, 10,900 lines
- ESM-only, Bun bundler, TypeScript strict mode
New CLI commands
claudemesh register— account creation via browser handoffclaudemesh login— device-code OAuthclaudemesh logout— revoke session + clear credentialsclaudemesh whoami— identity check with--jsonsupportclaudemesh new <name>— create mesh from CLI (was dashboard-only)claudemesh invite [email]— generate invite from CLI (was dashboard-only)
Ported from v1 (full feature parity)
- All 79 MCP tools
- All 85 WS message types (broker protocol unchanged)
- Welcome wizard, launch flow, install/uninstall
- Ed25519 + NaCl crypto (keypairs, crypto_box DMs, file encryption)
- Reconnect with exponential backoff
- Status priority engine, scheduled messages, URL watch
- Doctor checks, Telegram bridge connect wizard
Security hardening (25 bugs fixed across 4 reviews)
execFileinstead ofexecfor browser open (command injection fix)- ReDoS-safe pattern matching in peer file sharing
- Atomic config writes via temp file + rename
- Auth token stored with
openSync(mode: 0o600)— no permission race - Decryption oracle collapsed to generic error in
get_file - Download size limit (100MB) on file retrieval
- Path traversal protection with
realpathSyncfor symlink escapes - Callback listener double-resolve guard
- Push buffer 1MB per-message truncation
makeReqIdusescrypto.randomBytesinstead ofMath.random- Connect guard prevents double-connect race
Breaking changes from v0.10.x
- Flat command namespace (no
launchsubcommand, noadvancedprefix) - New config shape (same data, cleaner layout)
- New
--jsonoutput format withschema_version: "1.0" - New exit codes (see
constants/exit-codes.ts)