)
+- feat: emission of OTel resource spans is completely async - this brings down inference overhead to < 1Β΅second
+- fix: added latency calculation for vertex native requests
+- feat: added cached tokens and reasoning tokens to the usage in ui
+- fix: cost calculation for vertex requests
+- feat: added global region support for vertex API
+- fix: added filter for extra fields in chat completions request for Mistral provider
+- fix: added wildcard validation for allowed origins in UI security settings
+- fix: fixed code field in pending_safety_checks for Responses API
\ No newline at end of file
diff --git a/transports/version b/transports/version
index d4c4950a3..0c00f6108 100644
--- a/transports/version
+++ b/transports/version
@@ -1 +1 @@
-1.3.9
+1.3.10
diff --git a/ui/app/config/views/securityView.tsx b/ui/app/config/views/securityView.tsx
index bd226eb46..9a43f38af 100644
--- a/ui/app/config/views/securityView.tsx
+++ b/ui/app/config/views/securityView.tsx
@@ -68,7 +68,9 @@ export default function SecurityView() {
const validation = validateOrigins(localConfig.allowed_origins);
if (!validation.isValid && localConfig.allowed_origins.length > 0) {
- toast.error(`Invalid origins: ${validation.invalidOrigins.join(", ")}. Origins must be valid URLs like https://example.com`);
+ toast.error(
+ `Invalid origins: ${validation.invalidOrigins.join(", ")}. Origins must be valid URLs like https://example.com, wildcard patterns like https://*.example.com, or "*" to allow all origins`,
+ );
return;
}
@@ -109,13 +111,14 @@ export default function SecurityView() {
Comma-separated list of allowed origins for CORS and WebSocket connections. Localhost origins are always allowed. Each
- origin must be a complete URL with protocol (e.g., https://app.example.com, http://10.0.0.100:3000, https://*.example.com).
+ origin must be a complete URL with protocol (e.g., https://app.example.com, http://10.0.0.100:3000). Wildcards are supported
+ for subdomains (e.g., https://*.example.com) or use "*" to allow all origins.