build(plugins): externalize acpx release packages

This commit is contained in:
Peter Steinberger
2026-05-02 08:47:58 +01:00
parent 10c8b9085a
commit 010f7a58a1
17 changed files with 134 additions and 32 deletions

View File

@@ -126,8 +126,15 @@ See [Configuration Reference](/gateway/configuration-reference).
## Plugin setup for acpx backend
Fresh installs ship the bundled `acpx` runtime plugin enabled by default, so ACP
usually works without a manual plugin install step.
Packaged installs use the official `@openclaw/acpx` runtime plugin for ACP.
Install and enable it before using ACP harness sessions:
```bash
openclaw plugins install @openclaw/acpx
openclaw config set plugins.entries.acpx.enabled true
```
Source checkouts can also use the local workspace plugin after `pnpm install`.
Start with:
@@ -136,10 +143,10 @@ Start with:
```
If you disabled `acpx`, denied it via `plugins.allow` / `plugins.deny`, or want
to switch to a local development checkout, use the explicit plugin path:
to switch back to the packaged plugin, use the explicit package path:
```bash
openclaw plugins install acpx
openclaw plugins install @openclaw/acpx
openclaw config set plugins.entries.acpx.enabled true
```
@@ -157,7 +164,7 @@ Then verify backend health:
### acpx command and version configuration
By default, the bundled `acpx` plugin registers the embedded ACP backend without
By default, the `acpx` plugin registers the embedded ACP backend without
spawning an ACP agent during Gateway startup. Run `/acp doctor` for an explicit
live probe. Set `OPENCLAW_ACPX_RUNTIME_STARTUP_PROBE=1` only when you need the
Gateway to probe the configured agent at startup.
@@ -243,7 +250,7 @@ What this does:
### Runtime timeout configuration
The bundled `acpx` plugin defaults embedded runtime turns to a 120-second
The `acpx` plugin defaults embedded runtime turns to a 120-second
timeout. This gives slower harnesses such as Gemini CLI enough time to complete
ACP startup and initialization. Override it if your host needs a different
runtime limit:

View File

@@ -39,10 +39,15 @@ directly to existing OpenClaw channel conversations, use
## Does this work out of the box?
Usually yes. Fresh installs ship the bundled `acpx` runtime plugin enabled
by default with a plugin-local pinned `acpx` binary that OpenClaw probes
and self-repairs immediately after the Gateway HTTP listener is live. Run
`/acp doctor` for a readiness check.
Yes, after installing the official ACP runtime plugin:
```bash
openclaw plugins install @openclaw/acpx
openclaw config set plugins.entries.acpx.enabled true
```
Source checkouts can use the local `extensions/acpx` workspace plugin after
`pnpm install`. Run `/acp doctor` for a readiness check.
OpenClaw only teaches agents about ACP spawning when ACP is **truly
usable**: ACP must be enabled, dispatch must not be disabled, the current
@@ -53,8 +58,8 @@ an unavailable backend.
<AccordionGroup>
<Accordion title="First-run gotchas">
- If `plugins.allow` is set, it is a restrictive plugin inventory and **must** include `acpx`; otherwise the bundled default is intentionally blocked and `/acp doctor` reports the missing allowlist entry.
- The bundled Codex ACP adapter is staged with the `acpx` plugin and launched locally when possible.
- If `plugins.allow` is set, it is a restrictive plugin inventory and **must** include `acpx`; otherwise the installed ACP backend is intentionally blocked and `/acp doctor` reports the missing allowlist entry.
- The Codex ACP adapter is staged with the `acpx` plugin and launched locally when possible.
- Other target harness adapters may still be fetched on demand with `npx` the first time you use them.
- Vendor auth still has to exist on the host for that harness.
- If the host has no npm or network access, first-run adapter fetches fail until caches are pre-warmed or the adapter is installed another way.
@@ -86,7 +91,7 @@ should call those tools directly.
## Supported harness targets
With the bundled `acpx` backend, use these harness ids as `/acp spawn <id>`
With the `acpx` backend, use these harness ids as `/acp spawn <id>`
or `sessions_spawn({ runtime: "acp", agentId: "<id>" })` targets:
| Harness id | Typical backend | Notes |
@@ -232,7 +237,7 @@ See also [Sub-agents](/tools/subagents).
For Claude Code through ACP, the stack is:
1. OpenClaw ACP session control plane.
2. Bundled `acpx` runtime plugin.
2. Official `@openclaw/acpx` runtime plugin.
3. Claude ACP adapter.
4. Claude-side runtime/session machinery.