Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
43 commits
Select commit Hold shift + click to select a range
087fb3d
feat: Add ServiceNow integration documentation and bug fixes
Jan 23, 2026
502355f
Removed the readme files for bug fix details
Jan 24, 2026
33bee68
Updated servicenow integration readme
Jan 24, 2026
cd8c520
chore: Revert custom logo changes to upstream version
Jan 24, 2026
fb8181b
chore: Revert terraform main.tf to upstream version
Jan 24, 2026
660d76c
Removed the two openai sample spec downloaed from servicennow site
Jan 24, 2026
de866eb
Update docs/how-to/agents/ServiceNow/servicenow_agent_instructions.txt
vivche Jan 24, 2026
20f994a
Update docs/how-to/agents/ServiceNow/open_api_specs/sample_servicenow…
vivche Jan 24, 2026
351f143
Update docs/how-to/azure_speech_managed_identity_manul_setup.md
vivche Jan 24, 2026
5fe5b14
Update application/single_app/semantic_kernel_plugins/openapi_plugin_…
vivche Jan 24, 2026
9626219
Checked in the bug fix detail readme to docs/explanation/fixes/v0.236…
Jan 24, 2026
6364827
Merge branch 'servicenow-integration' of https://github.com/vivche/si…
Jan 24, 2026
dce54a1
Added version number to the feature readme files
Jan 24, 2026
8353d77
Added version number to document, and removed redudant import statement
Jan 24, 2026
5aa7007
refactor: use _ for intentionally unused variable in AI Search test
Jan 24, 2026
548d8d8
Removed azure_speech_managed_indeity_manual readme file since it is u…
Jan 24, 2026
62b0b5b
update version numbers to 0.236.012 in bug fix documentation
Jan 24, 2026
b0be501
Update application/single_app/semantic_kernel_loader.py
vivche Jan 24, 2026
e264a13
Update docs/how-to/agents/ServiceNow/open_api_specs/sample_now_knowle…
vivche Jan 24, 2026
b04bd67
Update docs/explanation/fixes/v0.236.012/AZURE_AI_SEARCH_TEST_CONNECT…
vivche Jan 24, 2026
84c01e9
Update docs/how-to/agents/ServiceNow/open_api_specs/sample_now_knowle…
vivche Jan 24, 2026
c8e383e
Update docs/how-to/agents/ServiceNow/open_api_specs/sample_servicenow…
vivche Jan 24, 2026
39dc7a4
Update docs/explanation/fixes/v0.236.012/GROUP_AGENT_LOADING_FIX.md
vivche Jan 24, 2026
2e8c737
Remvoed debug statements that might include senstive info
Jan 24, 2026
d0581d5
Merge branch 'servicenow-integration' of https://github.com/vivche/si…
Jan 24, 2026
0c23a78
Rollback Azure AI Search test connection fix for separate PR
Jan 24, 2026
7f8248a
Update application/single_app/semantic_kernel_plugins/openapi_plugin_…
vivche Jan 24, 2026
a0fbffd
Update docs/explanation/fixes/v0.236.012/GROUP_AGENT_LOADING_FIX.md
vivche Jan 24, 2026
4bac07a
Update docs/explanation/fixes/v0.236.012/GROUP_ACTION_OAUTH_SCHEMA_ME…
vivche Jan 24, 2026
1c31db4
Update docs/how-to/agents/ServiceNow/SERVICENOW_OAUTH_SETUP.md
vivche Jan 24, 2026
31e8341
Added ServiceNow support for create and publish article. Including r…
Jan 27, 2026
c70db6b
Replace actual servicenow instance name with generic name in the read…
Jan 27, 2026
fa72a65
Merge remote-tracking branch 'upstream/Development' into servicenow-i…
Jan 27, 2026
0ed07b1
Changed version number in ServiceNow readme files to 0.237.005 since …
Jan 27, 2026
61d8a8b
Enhance ServiceNow agent for managing new KB article creation
Jan 28, 2026
715bb6b
Added readme and open ai specs and agent instructions to support Serv…
Jan 28, 2026
b5804ad
Remove any references to actual ServiceNow instances
Jan 28, 2026
cd09c7a
docs: Update release notes for ServiceNow integration and bug fixes
Jan 30, 2026
39e812c
resolve conflict
Jan 30, 2026
fd66132
Merge branch 'Development' into servicenow-integration, and moved fix…
Jan 31, 2026
0c161ae
fix the version number in config.py
Jan 31, 2026
bf90baf
Security: Restrict group agent loading to active group only
Jan 31, 2026
8a9ad98
Fixed an instruction error that caused semantic kernel to fall back t…
Jan 31, 2026
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 1 addition & 2 deletions application/single_app/config.py
Original file line number Diff line number Diff line change
Expand Up @@ -88,8 +88,7 @@
EXECUTOR_TYPE = 'thread'
EXECUTOR_MAX_WORKERS = 30
SESSION_TYPE = 'filesystem'
VERSION = "0.237.007"

VERSION = "0.237.008"

SECRET_KEY = os.getenv('SECRET_KEY', 'dev-secret-key-change-in-production')

Expand Down
12 changes: 12 additions & 0 deletions application/single_app/route_backend_plugins.py
Original file line number Diff line number Diff line change
Expand Up @@ -458,6 +458,12 @@ def create_group_action_route():
for key in ('group_id', 'last_updated', 'user_id', 'is_global', 'is_group', 'scope'):
payload.pop(key, None)

# Merge with schema to ensure all required fields are present (same as global actions)
schema_dir = os.path.join(current_app.root_path, 'static', 'json', 'schemas')
merged = get_merged_plugin_settings(payload.get('type'), payload, schema_dir)
payload['metadata'] = merged.get('metadata', payload.get('metadata', {}))
payload['additionalFields'] = merged.get('additionalFields', payload.get('additionalFields', {}))

try:
saved = save_group_action(active_group, payload)
except Exception as exc:
Expand Down Expand Up @@ -511,6 +517,12 @@ def update_group_action_route(action_id):
except ValueError as exc:
return jsonify({'error': str(exc)}), 400

# Merge with schema to ensure all required fields are present (same as global actions)
schema_dir = os.path.join(current_app.root_path, 'static', 'json', 'schemas')
schema_merged = get_merged_plugin_settings(merged.get('type'), merged, schema_dir)
merged['metadata'] = schema_merged.get('metadata', merged.get('metadata', {}))
merged['additionalFields'] = schema_merged.get('additionalFields', merged.get('additionalFields', {}))

try:
saved = save_group_action(active_group, merged)
except Exception as exc:
Expand Down
57 changes: 43 additions & 14 deletions application/single_app/semantic_kernel_loader.py
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# semantic_kernel_loader.py
ο»Ώ# semantic_kernel_loader.py
"""
Loader for Semantic Kernel plugins/actions from app settings.
- Loads plugin/action manifests from settings (CosmosDB)
Expand Down Expand Up @@ -1186,26 +1186,60 @@ def load_user_semantic_kernel(kernel: Kernel, settings, user_id: str, redis_clie
for agent in agents_cfg:
agent['is_global'] = False

# Load group agents for user's active group (if any)
try:
active_group_id = require_active_group(user_id)
group_agents = get_group_agents(active_group_id)
if group_agents:
print(f"[SK Loader] Found {len(group_agents)} group agents for active group '{active_group_id}'")
# Badge group agents with group metadata
for group_agent in group_agents:
group_agent['is_global'] = False
group_agent['is_group'] = True
agents_cfg.extend(group_agents)
print(f"[SK Loader] After merging group agents: {len(agents_cfg)} total agents")
else:
print(f"[SK Loader] No group agents found for active group '{active_group_id}'")
except ValueError:
# No active group set - this is fine, just means no group agents available
print(f"[SK Loader] User '{user_id}' has no active group - skipping group agent loading")

# Append selected group agent (if any) to the candidate list so downstream selection logic can resolve it
selected_agent_data = selected_agent if isinstance(selected_agent, dict) else {}
selected_agent_is_group = selected_agent_data.get('is_group', False)
if selected_agent_is_group:
resolved_group_id = selected_agent_data.get('group_id')
active_group_id = None

# Group agent MUST have a group_id
if not resolved_group_id:
log_event(
"[SK Loader] Group agent selected but no group_id provided in selection data.",
level=logging.ERROR
)
load_core_plugins_only(kernel, settings)
return kernel, None

try:
active_group_id = require_active_group(user_id)
if not resolved_group_id:
resolved_group_id = active_group_id
elif resolved_group_id != active_group_id:
if resolved_group_id != active_group_id:
debug_print(
f"[SK Loader] Selected group agent references group {resolved_group_id}, active group is {active_group_id}."
)
except ValueError as err:
debug_print(f"[SK Loader] No active group available while loading group agent: {err}")
if not resolved_group_id:
log_event(
"[SK Loader] Group agent selected but no active group in settings.",
level=logging.WARNING
"[SK Loader] Group agent selected from the non-active group.",
level=logging.ERROR
)
load_core_plugins_only(kernel, settings)
return kernel, None
except ValueError as err:
debug_print(f"[SK Loader] No active group available while loading group agent: {err}")
log_event(
"[SK Loader] Group agent selected but no active group in settings.",
level=logging.ERROR
)
load_core_plugins_only(kernel, settings)
return kernel, None

if resolved_group_id:
agent_identifier = selected_agent_data.get('id') or selected_agent_data.get('name')
Expand Down Expand Up @@ -1234,11 +1268,6 @@ def load_user_semantic_kernel(kernel: Kernel, settings, user_id: str, redis_clie
f"[SK Loader] Selected group agent '{selected_agent_data.get('name')}' not found for group {resolved_group_id}.",
level=logging.WARNING
)
else:
log_event(
"[SK Loader] Unable to resolve group ID for selected group agent; skipping group agent load.",
level=logging.WARNING
)

# PATCH: Merge global agents if enabled
merge_global = settings.get('merge_global_semantic_kernel_with_workspace', False)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@
import tempfile
from typing import Dict, Any, Optional
from .openapi_plugin import OpenApiPlugin
from functions_debug import debug_print


class OpenApiPluginFactory:
Expand Down Expand Up @@ -130,10 +131,48 @@ def _extract_auth_config(cls, config: Dict[str, Any]) -> Dict[str, Any]:
return {}

auth_type = auth_config.get('type', 'none')
debug_print(f"[Factory] auth_type: {auth_type}")

if auth_type == 'none':
return {}

# Return the auth config as-is since the OpenApiPlugin already handles
# the different auth types
# Check if this is basic auth stored in the 'key' field format
# Simple Chat stores basic auth as: auth.type='key', auth.key='username:password', additionalFields.auth_method='basic'
additional_fields = config.get('additionalFields', {})
auth_method = additional_fields.get('auth_method', '')
debug_print(f"[Factory] additionalFields.auth_method: {auth_method}")

if auth_type == 'key' and auth_method == 'basic':
# Extract username and password from the combined key
key = auth_config.get('key', '')
debug_print(f"[Factory] Applying basic auth transformation")
if ':' in key:
username, password = key.split(':', 1)
return {
'type': 'basic',
'username': username,
'password': password
}
else:
# Malformed basic auth key
return {}

# For bearer tokens stored as 'key' type
if auth_type == 'key' and auth_method == 'bearer':
token = auth_config.get('key', '')
debug_print(f"[Factory] Applying bearer auth transformation")
return {
'type': 'bearer',
'token': token
}

# For OAuth2 stored as 'key' type
if auth_type == 'key' and auth_method == 'oauth2':
debug_print(f"[Factory] Applying OAuth2 auth transformation")
return {
'type': 'bearer', # OAuth2 tokens are typically bearer tokens
'token': auth_config.get('key', '')
}

# Return the auth config as-is for other auth types
return auth_config
Loading