Skip to content

Releases: Dicklesworthstone/cass_memory_system

cass-memory v0.2.9

22 Apr 17:44

Choose a tag to compare

cass-memory v0.2.8

21 Apr 02:15

Choose a tag to compare

v0.2.8 — Critical macOS arm64 fix + OpenAI strict-mode fix

🛠 Fixes

  • #43 — macOS arm64 v0.2.6/v0.2.7 SIGKILL on Apple Silicon. The prebuilt cass-memory-macos-arm64 binary is now ad-hoc code-signed (codesign --force --sign -) during release builds. Apple's AMFI kernel protection terminates unsigned arm64 Mach-O binaries with SIGKILL at exec — v0.2.6/v0.2.7 shipped without any signature and were effectively broken on M-series Macs. v0.2.8 ships a properly signed binary that passes codesign --verify and runs cleanly. The macOS x64 binary is also signed for consistency.
  • #44cm reflect / cm validate / cm doctor --audit HTTP 400 against strict OpenAI-compatible backends. The response_format.json_schema objects previously declared strict: true while omitting optional properties from the required array, which violates OpenAI's documented strict-mode contract. The reflector, validator, and audit schemas are now fully strict-compliant: every property appears in required, genuinely-optional fields use a nullable union (e.g. ["string","null"]), every object sets additionalProperties: false, and a domain-level normalizeLLMDelta() converts the null-bearing LLM output back to the undefined-bearing domain shape. This keeps structured-output guarantees on all OpenAI-compatible backends instead of silently disabling strict mode on custom baseURLs.

Release build notes

This release was built via the dsr fallback path (local compile on trj for Linux/Windows + native signed build on mmini for macOS) because GitHub Actions was severely throttled (>45min queue depth). Artifacts are bit-for-bit equivalent to what the .github/workflows/release.yml workflow produces and the macOS arm64 binary has been smoke-tested on Apple Silicon (exec passes under AMFI).

Installation

curl -fsSL https://raw.githubusercontent.com/Dicklesworthstone/cass_memory_system/main/install.sh | bash

Checksums are provided alongside each binary.

cass-memory v0.2.7

16 Apr 19:55

Choose a tag to compare

cass-memory v0.2.6

16 Apr 19:11

Choose a tag to compare

cass-memory v0.2.5

09 Apr 00:05

Choose a tag to compare

cass-memory v0.2.4

04 Apr 14:53

Choose a tag to compare

cass-memory v0.2.3

07 Jan 07:57

Choose a tag to compare

cass-memory v0.2.2

05 Jan 22:56

Choose a tag to compare

Installer Improvements & Bug Fixes

This patch release focuses on improving the installation experience with more robust version detection and proper concurrent install protection.

🐛 Bug Fixes

Redirect-Based Version Resolution

The installer now uses GitHub's redirect behavior instead of the API to detect the latest version:

  • No rate limiting: API calls are limited to 60/hour for unauthenticated users; redirects have no limit
  • No JSON parsing: Eliminates cross-platform issues with grep/sed differences between GNU and BSD
  • Simpler failures: Only fails if GitHub is completely down

The mechanism works by following https://github.com/owner/repo/releases/latesthttps://github.com/owner/repo/releases/tag/v0.2.2 and extracting the version from the final URL.

Fixed Concurrent Install Protection

The lock file path was incorrectly using PID expansion ($), causing each installer process to create its own unique lock file. This defeated the purpose of preventing concurrent installations. The fix uses a static path /tmp/cass-memory-install.lock.

📝 Documentation

  • Moved installation comment outside the code block in README for better formatting

⬆️ Upgrade

# Quick upgrade (recommended)
curl -fsSL https://raw.githubusercontent.com/Dicklesworthstone/cass_memory_system/main/install.sh | bash -s -- --easy-mode --verify

# Specific version
install.sh --version v0.2.2 --verify

# From source
install.sh --from-source --verify

📦 Checksums

SHA256 checksums are available as .sha256 files alongside each binary. Verify with:

sha256sum -c cass-memory-linux-x64.sha256

Full Changelog: v0.2.1...v0.2.2

Full Changelog: v0.2.1...v0.2.2

cass-memory v0.2.1

03 Jan 17:36

Choose a tag to compare

What's Changed

Bug Fixes

  • fix(cass): Resolve timeline.groups.flatMap error - fixes session discovery in cm reflect (#7, #9)
    • cass timeline uses --since Nd format instead of --days N
    • Properly handle cass timeline returning groups as object instead of array
  • fix(cass): Improve Codex CLI session parsing (#6)
    • Handle nested payload.content format
    • Fallback to direct JSONL parsing when cass returns >50% UNKNOWN entries
  • fix(cass): Add size limit for fallback session parsing to prevent OOM
  • fix(privacy): Add file locking for concurrent config access
  • fix(robustness): Add signal handlers and model loading locks
  • fix(undo): Add missing imports for utils functions

Performance

  • perf(curate): Optimize duplicate detection with pre-computed token sets
  • perf(audit,trauma): Optimize batch operations

Features

  • feat(serve): Return richer delta info in MCP dry-run responses
  • feat(onboard): mark-done now also updates reflection processed log

Testing

  • Improved test coverage across multiple modules:
    • reflect: 61% → 82%
    • serve: 52% → 68%
    • context: 52% → 86%
    • playbook: 63% → 81%
    • top: 60% → 100%
  • Added 31 integration tests for onboard command
  • Added comprehensive E2E tests for CLI commands

Other

  • Removed dead code from curate.ts and semantic.ts
  • Various test improvements and cleanups

Upgrade Notes

This release fixes critical issues with cm reflect session discovery. Users on v0.2.0 experiencing "timeline.groups.flatMap" errors should upgrade.

Full Changelog: v0.2.0...v0.2.1

cass-memory v0.2.0

16 Dec 01:00

Choose a tag to compare