fix(ci): default local low-memory checks

This commit is contained in:
Vincent Koc
2026-03-31 15:03:08 +09:00
parent 3a87783632
commit 8dfbcaa200
13 changed files with 198 additions and 90 deletions

View File

@@ -1721,7 +1721,7 @@ export function createConfigIO(overrides: ConfigIoDeps = {}) {
const effectiveConfigRaw = legacyResolution.effectiveConfigRaw;
for (const w of readResolution.envWarnings) {
deps.logger.warn(
`Config (${configPath}): missing env var "${w.varName}" at ${w.configPath} feature using this value will be unavailable`,
`Config (${configPath}): missing env var "${w.varName}" at ${w.configPath} - feature using this value will be unavailable`,
);
}
warnOnConfigMiskeys(effectiveConfigRaw, deps.logger);
@@ -1971,7 +1971,7 @@ export function createConfigIO(overrides: ConfigIoDeps = {}) {
// sections reference unset env vars (e.g. optional provider API keys).
const envVarWarnings = readResolution.envWarnings.map((w) => ({
path: w.configPath,
message: `Missing env var "${w.varName}" feature using this value will be unavailable`,
message: `Missing env var "${w.varName}" - feature using this value will be unavailable`,
}));
const resolvedConfigRaw = readResolution.resolvedConfigRaw;
@@ -2021,7 +2021,7 @@ export function createConfigIO(overrides: ConfigIoDeps = {}) {
const nodeErr = err as NodeJS.ErrnoException;
let message: string;
if (nodeErr?.code === "EACCES") {
// Permission denied common in Docker/container deployments where the
// Permission denied - common in Docker/container deployments where the
// config file is owned by root but the gateway runs as a non-root user.
const uid = process.getuid?.();
const uidHint = typeof uid === "number" ? String(uid) : "$(id -u)";
@@ -2123,7 +2123,7 @@ export function createConfigIO(overrides: ConfigIoDeps = {}) {
// Restore ${VAR} env var references that were resolved during config loading.
// Read the current file (pre-substitution) and restore any references whose
// resolved values match the incoming config so we don't overwrite
// resolved values match the incoming config - so we don't overwrite
// "${ANTHROPIC_API_KEY}" with "sk-ant-..." when the caller didn't change it.
//
// We use only the root file's parsed content (no $include resolution) to avoid
@@ -2179,7 +2179,7 @@ export function createConfigIO(overrides: ConfigIoDeps = {}) {
}
}
}
// Do NOT apply runtime defaults when writing user config should only contain
// Do NOT apply runtime defaults when writing - user config should only contain
// explicitly set values. Runtime defaults are applied when loading (issue #6070).
const stampedOutputConfig = stampConfigVersion(outputConfig);
const json = JSON.stringify(stampedOutputConfig, null, 2).trimEnd().concat("\n");

View File

@@ -121,7 +121,7 @@ export type OpenClawPluginToolContext = {
agentDir?: string;
agentId?: string;
sessionKey?: string;
/** Ephemeral session UUID regenerated on /new and /reset. Use for per-conversation isolation. */
/** Ephemeral session UUID - regenerated on /new and /reset. Use for per-conversation isolation. */
sessionId?: string;
browser?: {
sandboxBridgeUrl?: string;
@@ -1750,7 +1750,7 @@ export type OpenClawPluginApi = {
* Use this for simple state-toggling or status commands that don't need AI reasoning.
*/
registerCommand: (command: OpenClawPluginCommandDefinition) => void;
/** Register a context engine implementation (exclusive slot only one active at a time). */
/** Register a context engine implementation (exclusive slot - only one active at a time). */
registerContextEngine: (
id: string,
factory: import("../context-engine/registry.js").ContextEngineFactory,
@@ -2021,7 +2021,7 @@ export type PluginHookBeforeCompactionEvent = {
sessionFile?: string;
};
// before_reset hook fired when /new or /reset clears a session
// before_reset hook - fired when /new or /reset clears a session
export type PluginHookBeforeResetEvent = {
sessionFile?: string;
messages?: unknown[];
@@ -2141,7 +2141,7 @@ export type PluginHookMessageSentEvent = {
export type PluginHookToolContext = {
agentId?: string;
sessionKey?: string;
/** Ephemeral session UUID regenerated on /new and /reset. */
/** Ephemeral session UUID - regenerated on /new and /reset. */
sessionId?: string;
/** Stable run identifier for this agent invocation. */
runId?: string;
@@ -2181,7 +2181,7 @@ export type PluginHookBeforeToolCallResult = {
severity?: "info" | "warning" | "critical";
timeoutMs?: number;
timeoutBehavior?: "allow" | "deny";
/** Set automatically by the hook runner plugins should not set this. */
/** Set automatically by the hook runner - plugins should not set this. */
pluginId?: string;
/**
* Best-effort callback invoked with the final outcome after approval resolves, times out, or is cancelled.