From c5ea7c4d0fa4a26439a9e95739624e7b35930a45 Mon Sep 17 00:00:00 2001 From: Vincent Koc Date: Tue, 5 May 2026 21:03:26 -0700 Subject: [PATCH] docs: typography hygiene across 6 pages --- docs/concepts/messages.md | 2 +- docs/concepts/model-failover.md | 4 ++-- docs/concepts/queue.md | 2 +- docs/gateway/authentication.md | 6 +++--- docs/gateway/index.md | 2 +- docs/tools/exec.md | 4 ++-- 6 files changed, 10 insertions(+), 10 deletions(-) diff --git a/docs/concepts/messages.md b/docs/concepts/messages.md index 8c18c756146..0b1cd65ca7e 100644 --- a/docs/concepts/messages.md +++ b/docs/concepts/messages.md @@ -181,7 +181,7 @@ Details: [Configuration](/gateway/config-agents#messages) and channel docs. ## Silent replies -The exact silent token `NO_REPLY` / `no_reply` means “do not deliver a user-visible reply”. +The exact silent token `NO_REPLY` / `no_reply` means "do not deliver a user-visible reply". When a turn also has pending tool media, such as generated TTS audio, OpenClaw strips the silent text but still delivers the media attachment. OpenClaw resolves that behavior by conversation type: diff --git a/docs/concepts/model-failover.md b/docs/concepts/model-failover.md index 4209a2a0b5c..da1eda2ac6a 100644 --- a/docs/concepts/model-failover.md +++ b/docs/concepts/model-failover.md @@ -106,7 +106,7 @@ When a provider has multiple profiles, OpenClaw chooses an order like this: -If no explicit order is configured, OpenClaw uses a round‑robin order: +If no explicit order is configured, OpenClaw uses a round-robin order: - **Primary key:** profile type (**OAuth before API keys**). - **Secondary key:** `usageStats.lastUsed` (oldest first, within each type). @@ -128,7 +128,7 @@ Auto-pinned profiles (selected by the session router) are treated as a **prefere ### Why OAuth can "look lost" -If you have both an OAuth profile and an API key profile for the same provider, round‑robin can switch between them across messages unless pinned. To force a single profile: +If you have both an OAuth profile and an API key profile for the same provider, round-robin can switch between them across messages unless pinned. To force a single profile: - Pin with `auth.order[provider] = ["provider:profileId"]`, or - Use a per-session override via `/model …` with a profile override (when supported by your UI/chat surface). diff --git a/docs/concepts/queue.md b/docs/concepts/queue.md index cf96270d545..8e142162d04 100644 --- a/docs/concepts/queue.md +++ b/docs/concepts/queue.md @@ -113,7 +113,7 @@ keys. ## Troubleshooting -- If commands seem stuck, enable verbose logs and look for “queued for …ms” lines to confirm the queue is draining. +- If commands seem stuck, enable verbose logs and look for "queued for ...ms" lines to confirm the queue is draining. - If you need queue depth, enable verbose logs and watch for queue timing lines. - Codex app-server runs that accept a turn and then stop emitting progress are interrupted by the Codex adapter so the active session lane can release instead of waiting for the outer run timeout. - When diagnostics are enabled, sessions that remain in `processing` past `diagnostics.stuckSessionWarnMs` with no observed reply, tool, status, block, or ACP progress are classified by current activity. Active work logs as `session.long_running`; active work with no recent progress logs as `session.stalled`; `session.stuck` is reserved for stale session bookkeeping with no active work, and only that path can release the affected session lane so queued work drains. Repeated `session.stuck` diagnostics back off while the session remains unchanged. diff --git a/docs/gateway/authentication.md b/docs/gateway/authentication.md index 25c725b1bb0..d06ee1ac45a 100644 --- a/docs/gateway/authentication.md +++ b/docs/gateway/authentication.md @@ -22,7 +22,7 @@ For credential eligibility/reason-code rules used by `models status --probe`, se ## Recommended setup (API key, any provider) -If you’re running a long-lived gateway, start with an API key for your chosen +If you're running a long-lived gateway, start with an API key for your chosen provider. For Anthropic specifically, API key auth is still the most predictable server setup, but OpenClaw also supports reusing a local Claude CLI login. @@ -51,7 +51,7 @@ openclaw models status openclaw doctor ``` -If you’d rather not manage env vars yourself, onboarding can store +If you'd rather not manage env vars yourself, onboarding can store API keys for daemon use: `openclaw onboard`. See [Help](/help) for details on env inheritance (`env.shellEnv`, @@ -187,7 +187,7 @@ Use `/model` (or `/model list`) for a compact picker; use `/model status` for th ### Per-agent (CLI override) -Set an explicit auth profile order override for an agent (stored in that agent’s `auth-state.json`): +Set an explicit auth profile order override for an agent (stored in that agent's `auth-state.json`): ```bash openclaw models auth order get --provider anthropic diff --git a/docs/gateway/index.md b/docs/gateway/index.md index 0b500b0758d..b76a1b0f8f8 100644 --- a/docs/gateway/index.md +++ b/docs/gateway/index.md @@ -83,7 +83,7 @@ After the first successful load, the running process serves the active in-memory ## OpenAI-compatible endpoints -OpenClaw’s highest-leverage compatibility surface is now: +OpenClaw's highest-leverage compatibility surface is now: - `GET /v1/models` - `GET /v1/models/{id}` diff --git a/docs/tools/exec.md b/docs/tools/exec.md index 24a9c9a452a..0278c4d5c66 100644 --- a/docs/tools/exec.md +++ b/docs/tools/exec.md @@ -96,7 +96,7 @@ Notes: ## Config - `tools.exec.notifyOnExit` (default: true): when true, backgrounded exec sessions enqueue a system event and request a heartbeat on exit. -- `tools.exec.approvalRunningNoticeMs` (default: 10000): emit a single “running” notice when an approval-gated exec runs longer than this (0 disables). +- `tools.exec.approvalRunningNoticeMs` (default: 10000): emit a single "running" notice when an approval-gated exec runs longer than this (0 disables). - `tools.exec.timeoutSec` (default: 1800): default per-command exec timeout in seconds. Per-call `timeout` overrides it; per-call `timeout: 0` disables the exec process timeout. - `tools.exec.host` (default: `auto`; resolves to `sandbox` when sandbox runtime is active, `gateway` otherwise) - `tools.exec.security` (default: `deny` for sandbox, `full` for gateway + node when unset) @@ -143,7 +143,7 @@ openclaw config get agents.list openclaw config set agents.list[0].tools.exec.node "node-id-or-name" ``` -Control UI: the Nodes tab includes a small “Exec node binding” panel for the same settings. +Control UI: the Nodes tab includes a small "Exec node binding" panel for the same settings. ## Session overrides (`/exec`)