mirror of
https://github.com/openclaw/openclaw.git
synced 2026-05-06 14:10:51 +00:00
fix: keep session history redaction forced
This commit is contained in:
@@ -863,7 +863,7 @@ Notes:
|
||||
- Set `logging.file` for a stable path.
|
||||
- `consoleLevel` bumps to `debug` when `--verbose`.
|
||||
- `maxFileBytes`: maximum active log file size in bytes before rotation (positive integer; default: `104857600` = 100 MB). OpenClaw keeps up to five numbered archives beside the active file.
|
||||
- `redactSensitive` / `redactPatterns`: best-effort masking for console output, file logs, OTLP log records, and persisted session transcript text.
|
||||
- `redactSensitive` / `redactPatterns`: best-effort masking for console output, file logs, OTLP log records, and persisted session transcript text. `redactSensitive: "off"` only disables this general log/transcript policy; UI/tool/diagnostic safety surfaces still redact secrets before emission.
|
||||
|
||||
---
|
||||
|
||||
|
||||
@@ -55,7 +55,7 @@ You can tune console verbosity independently via:
|
||||
## Redaction
|
||||
|
||||
OpenClaw can mask sensitive tokens before log or transcript output leaves the
|
||||
process. The same redaction policy is applied at console, file-log, OTLP
|
||||
process. This logging redaction policy is applied at console, file-log, OTLP
|
||||
log-record, and session transcript text sinks, so matching secret values are
|
||||
masked before JSONL lines or messages are written to disk.
|
||||
|
||||
@@ -65,6 +65,13 @@ masked before JSONL lines or messages are written to disk.
|
||||
- Matches are masked by keeping the first 6 + last 4 chars (length >= 18), otherwise `***`.
|
||||
- Defaults cover common key assignments, CLI flags, JSON fields, bearer headers, PEM blocks, and popular token prefixes.
|
||||
|
||||
Some safety boundaries always redact regardless of `logging.redactSensitive`.
|
||||
That includes Control UI tool-call events, `sessions_history` tool output,
|
||||
diagnostics support exports, provider error observations, exec approval command
|
||||
display, and Gateway WebSocket protocol logs. These surfaces may still use
|
||||
`logging.redactPatterns` as additional patterns, but `redactSensitive: "off"`
|
||||
does not make them emit raw secrets.
|
||||
|
||||
## Gateway WebSocket logs
|
||||
|
||||
The gateway prints WebSocket protocol logs in two modes:
|
||||
|
||||
@@ -219,6 +219,14 @@ masked before the line or message is written to disk. Redaction is best-effort:
|
||||
it applies to text-bearing message content and log strings, not every
|
||||
identifier or binary payload field.
|
||||
|
||||
`logging.redactSensitive: "off"` only disables this general log/transcript
|
||||
policy. OpenClaw still redacts safety-boundary payloads that can be shown to UI
|
||||
clients, support bundles, diagnostics observers, approval prompts, or agent
|
||||
tools. Examples include Control UI tool-call events, `sessions_history` output,
|
||||
diagnostics support exports, provider error observations, exec approval command
|
||||
display, and Gateway WebSocket protocol logs. Custom `logging.redactPatterns`
|
||||
can still add project-specific patterns on those surfaces.
|
||||
|
||||
## Diagnostics and OpenTelemetry
|
||||
|
||||
Diagnostics are structured, machine-readable events for model runs and
|
||||
|
||||
Reference in New Issue
Block a user