From bc42952c31d2cabfae7af7899d89e1c196b752d7 Mon Sep 17 00:00:00 2001 From: Peter Steinberger Date: Sat, 2 May 2026 06:56:38 +0100 Subject: [PATCH] refactor: hide acp auth internals --- src/acp/control-plane/manager.utils.ts | 2 +- src/acp/control-plane/runtime-options.ts | 4 ++-- src/agents/auth-profiles/persisted.ts | 2 +- src/agents/auth-profiles/policy.ts | 2 +- 4 files changed, 5 insertions(+), 5 deletions(-) diff --git a/src/acp/control-plane/manager.utils.ts b/src/acp/control-plane/manager.utils.ts index 297ebc8ac58..77174f6e404 100644 --- a/src/acp/control-plane/manager.utils.ts +++ b/src/acp/control-plane/manager.utils.ts @@ -47,7 +47,7 @@ export function requireReadySessionMeta(resolution: AcpSessionResolution): Sessi throw resolveAcpSessionResolutionError(resolution); } -export function normalizeSessionKey(sessionKey: string): string { +function normalizeSessionKey(sessionKey: string): string { return sessionKey.trim(); } diff --git a/src/acp/control-plane/runtime-options.ts b/src/acp/control-plane/runtime-options.ts index 1461ada8517..41f28e9eb04 100644 --- a/src/acp/control-plane/runtime-options.ts +++ b/src/acp/control-plane/runtime-options.ts @@ -82,7 +82,7 @@ export function validateRuntimeModelInput(rawModel: unknown): string { }); } -export function validateRuntimeThinkingInput(rawThinking: unknown): string { +function validateRuntimeThinkingInput(rawThinking: unknown): string { return validateBoundedText({ value: rawThinking, field: "Thinking level", @@ -110,7 +110,7 @@ export function validateRuntimeCwdInput(rawCwd: unknown): string { return cwd; } -export function validateRuntimeTimeoutSecondsInput(rawTimeout: unknown): number { +function validateRuntimeTimeoutSecondsInput(rawTimeout: unknown): number { if (typeof rawTimeout !== "number" || !Number.isFinite(rawTimeout)) { failInvalidOption("Timeout must be a positive integer in seconds."); } diff --git a/src/agents/auth-profiles/persisted.ts b/src/agents/auth-profiles/persisted.ts index d123d8bdbc3..5b44626816a 100644 --- a/src/agents/auth-profiles/persisted.ts +++ b/src/agents/auth-profiles/persisted.ts @@ -103,7 +103,7 @@ function warnRejectedCredentialEntries(source: string, rejected: RejectedCredent }); } -export function coerceLegacyAuthStore(raw: unknown): LegacyAuthStore | null { +function coerceLegacyAuthStore(raw: unknown): LegacyAuthStore | null { if (!raw || typeof raw !== "object") { return null; } diff --git a/src/agents/auth-profiles/policy.ts b/src/agents/auth-profiles/policy.ts index 5fd1114756f..ff899206651 100644 --- a/src/agents/auth-profiles/policy.ts +++ b/src/agents/auth-profiles/policy.ts @@ -95,7 +95,7 @@ function collectOAuthModeSecretRefViolations(params: { } } -export function collectOAuthSecretRefPolicyViolations(params: { +function collectOAuthSecretRefPolicyViolations(params: { store: AuthProfileStore; cfg?: OpenClawConfig; profileIds?: Iterable;