Commit Graph

38335 Commits

Author SHA1 Message Date
Peter Steinberger
0519107bd3 refactor(plugins): share bundled runtime deps install script helpers 2026-04-29 17:35:01 +01:00
Peter Steinberger
f4af0777a7 fix(discord): remove duplicate public policy export 2026-04-29 17:33:33 +01:00
openclaw-clawsweeper[bot]
63fe2e12d7 fix(clawsweeper): address review for clawsweeper-commit-openclaw-openclaw-587b537b4745 (1) 2026-04-29 17:33:33 +01:00
openclaw-clawsweeper[bot]
4e115c5dbb fix: Found one compatibility regression in the published Discord plugi 2026-04-29 17:33:33 +01:00
Peter Steinberger
9d03cd15a9 refactor(plugins): split bundled runtime deps helpers 2026-04-29 17:32:14 +01:00
Peter Steinberger
5201c42251 refactor(discord): split messaging runtime actions 2026-04-29 17:31:53 +01:00
openclaw-clawsweeper[bot]
a512b5dde9 fix: The commit introduces imports from `src/channels/plugins/dm-acces 2026-04-29 17:31:11 +01:00
Carl
5e384fed6d fix(google): prevent empty contents error for gemini (#74465)
* fix(google): prevent empty contents error for gemini

* test(google): cover empty Gemini contents fallback

* docs(changelog): note Gemini empty content fallback

---------

Co-authored-by: Peter Steinberger <steipete@gmail.com>
2026-04-29 17:30:51 +01:00
Vyctor Huggo Przozwski da Silva
df0074768c fix(exec): reject invalid host targets (#74468)
* fix(exec): reject invalid host targets

* docs(changelog): credit exec host validation contributor

---------

Co-authored-by: Peter Steinberger <steipete@gmail.com>
2026-04-29 17:25:45 +01:00
Agustin Rivera
9a0b43c47e feat(nvidia): add NVIDIA provider with onboarding flow (#71204)
* feat(nvidia): add NVIDIA provider with onboarding flow

Add the NVIDIA build.nvidia.com API as a bundled provider. Default model
is nvidia/nvidia/nemotron-3-super-120b-a12b: first segment is the provider
id, remaining "nvidia/nemotron-3-super-120b-a12b" is the literal upstream
model id (which happens to start with "nvidia/" because NVIDIA is also the
model maker).

Supporting core change: introduce a provider capability flag
nativeIdsIncludeProviderPrefix so providers whose native catalog ids
intentionally include their provider prefix (OpenRouter) opt into self-prefix
dedupe in modelKey, without hardcoding provider names in core. Providers
whose ids merely happen to start with their own name (NVIDIA) leave the flag
unset and get the full <provider>/<model-id> concatenation.

- extensions/nvidia/*: new plugin, catalog, onboarding, tests, docs
- extensions/openrouter/index.ts: declare nativeIdsIncludeProviderPrefix
- src/plugins/types.ts: add field to ProviderPlugin
- src/plugins/registry.ts: populate self-prefix set on registration
- src/agents/provider-self-prefix.ts: sync accessor used by modelKey
- src/agents/model-ref-shared.ts: modelKey consults the flag
- test updates for affected surfaces

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

* refactor(model-picker): simplify literal-prefix display to label-only

* fix(model-picker): pass workspaceDir/env to allowlist literal-prefix resolution

* chore: untrack generated baseline JSON artifacts (gitignored)

* fix(nvidia): show literal model ref in picker and onboarding notes

* fix(nvidia): show hint whenever display label differs from stored config

* fix(nvidia): drop redundant hint from Keep current label

* fix(nvidia): restore literal double-prefix display labels

* fix(picker): handle literal-prefix fast path

* fix(picker): show literal keep label

* fix(docs): update nvidia provider docs

* fix(nvidia): update test helper imports

* fix(changelog): add nvidia provider entry

---------

Co-authored-by: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-29 09:25:12 -07:00
edge_kase
2dadc82cf4 fix(sandbox): gracefully handle Docker daemon unavailability when sandbox mode is off (#73671)
Merged via squash.

Prepared head SHA: 378851cf40
Co-authored-by: kaseonedge <15183881+kaseonedge@users.noreply.github.com>
Co-authored-by: sallyom <11166065+sallyom@users.noreply.github.com>
Reviewed-by: @sallyom
2026-04-29 12:23:30 -04:00
Peter Steinberger
e46dccb353 fix(discord): clarify command deploy rate-limit logs 2026-04-29 17:19:40 +01:00
Peter Steinberger
7471c2116f ci: use smaller runners for native live shards 2026-04-29 17:16:26 +01:00
Peter Steinberger
8cf724a381 fix(plugins): simplify bundled runtime deps staging
* fix(plugins): simplify bundled runtime deps staging

* refactor(plugins): declare bundled root runtime deps

* fix(plugins): isolate pnpm runtime dependency installs

* test(gateway): wait for deferred agent routing calls in server suite

* test(ci): follow extracted update-channel assertions

* fix(plugins): bypass pnpm age gate for bundled runtime deps

* test: drop stale rebase leftovers

* test: preserve mirrored root dependency drift guard

* test: stage mirrored deps in facade fixtures

* fix(plugin-sdk): expose provider setup metadata

* test(plugin-sdk): satisfy spread lint in facade deps fixture

* refactor(plugins): share bundled runtime deps install flow

* fix(plugins): finish runtime deps rebase cleanup

* fix(plugins): remove stale mirror import

* refactor(plugins): centralize bundled runtime root preparation

* fix(plugins): skip Windows pnpm cmd shims

* refactor(plugins): let package managers own runtime deps staging

* fix(plugins): validate staged runtime deps

* fix(plugins): preserve lazy runtime deps fallback
2026-04-29 17:04:56 +01:00
Peter Steinberger
86f473d8b9 ci: isolate moonshot live shard 2026-04-29 17:03:48 +01:00
Cathryn Lavery
763a88083e fix(gateway): persist hidden lifecycle session keys (#74442)
* Prevent hidden channel lifecycle runs from staying stuck as running

Hidden channel-routed runs were dropping session keys on lifecycle events at
our shared agent-event bus. Gateway lifecycle persistence then had to rely on
run-context lookup surviving until the terminal event, which is unnecessarily
fragile for the exact sessions that are intentionally hidden from Control UI.

This keeps session keys on hidden lifecycle events only, preserving the existing
privacy boundary for assistant/tool traffic while making terminal session-state
persistence explicit and test-covered.

Constraint: Hidden channel runs must stay out of Control UI chat/tool streams
Rejected: Broaden sessionKey preservation to every hidden event | would expose more hidden traffic than needed
Confidence: medium
Scope-risk: narrow
Reversibility: clean
Directive: If hidden-run event redaction changes again, keep lifecycle persistence independent from ephemeral run-context lookup
Tested: pnpm exec oxfmt --check --threads=1 CHANGELOG.md src/infra/agent-events.ts src/infra/agent-events.test.ts; pnpm tsgo:core; pnpm tsgo:extensions; pnpm tsgo:core:test; pnpm tsgo:extensions:test; pnpm test src/infra/agent-events.test.ts; pnpm test src/gateway/server-chat.agent-events.test.ts; pnpm test src/gateway/session-lifecycle-state.test.ts; pnpm lint:extensions:bundled; codex exec review returned ship it
Not-tested: Live gateway reproduction against Knox's local stuck-session install

* Clarify hidden lifecycle redaction and cover context fallback

The follow-up review asked for two things: document why the separate error
stream stays redacted for hidden runs, and cover the registered-context fallback
branch for hidden lifecycle events when callers omit sessionKey.

Constraint: Hidden assistant/tool/error diagnostics must remain redacted from Control UI
Rejected: Preserve sessionKey on the generic error stream | terminal persistence already flows through lifecycle phase:error, so widening the visible identity surface is unnecessary
Confidence: high
Scope-risk: narrow
Reversibility: clean
Directive: Keep hidden-run identity exceptions tightly scoped to terminal lifecycle persistence unless a concrete downstream consumer requires more
Tested: pnpm exec oxfmt --write --threads=1 src/infra/agent-events.ts src/infra/agent-events.test.ts; pnpm test src/infra/agent-events.test.ts; pnpm test src/gateway/server-chat.agent-events.test.ts; pnpm test src/gateway/session-lifecycle-state.test.ts
Not-tested: Full repo gate rerun; previous branch-wide gates remain from the parent PR commit

* fix(gateway): keep hidden agent broadcasts redacted

---------

Co-authored-by: Peter Steinberger <steipete@gmail.com>
2026-04-29 17:03:10 +01:00
Peter Steinberger
58db3d2d22 perf(test): trim media runner import cost 2026-04-29 16:59:42 +01:00
Peter Steinberger
e8b82d1cf9 refactor(discord): split component auth helpers 2026-04-29 16:56:17 +01:00
Peter Steinberger
334f4624e0 ci: avoid blacksmith for release setup jobs 2026-04-29 16:55:08 +01:00
Peter Steinberger
61d53f98d3 fix(cron): clean up timed out agent runs 2026-04-29 16:54:22 +01:00
Devin Robison
c1a42dce86 fix: enforce focus subagent scope (#73613)
* fix: enforce focus subagent scope

* docs: add changelog for focus scope fix
2026-04-29 09:54:09 -06:00
Peter Steinberger
b48f6ca1fc fix(ui): bind dashboard breadcrumb handler 2026-04-29 16:54:05 +01:00
Peter Steinberger
8d63ddce69 fix: harden runtime deps lock owner identity 2026-04-29 16:54:05 +01:00
Jim Smith
2d885a2402 fix(plugins): disambiguate runtime-deps lock owners by process start-time
`shouldRemoveRuntimeDepsLock` previously trusted `isAlive(owner.pid)`
alone when deciding whether a lock could be reclaimed. That works fine
on a normal host: when the writer dies the PID is gone and `isAlive`
returns false. Inside Docker it does not — every Node gateway process
runs as PID 1 (or PID 7 with `init: true`) in its container PID
namespace, so a stale lock left behind by a previous incarnation looks
"alive" to the new one. The 5-minute lock-wait timeout then fires and
the supervisor restarts, and the cycle repeats indefinitely. Operators
have to manually remove `.openclaw-runtime-deps.lock` to recover.

This change records `pidStartTimeMs` alongside `pid` and `createdAtMs`
when the lock is acquired, and consults it in the staleness check.
When both sides have start-time evidence and they disagree, the lock
is treated as stale; otherwise the existing PID-alive-means-fresh
behavior is preserved exactly. The capture point uses
`Date.now() - process.uptime() * 1000` once at module load, and the
read side uses `/proc/<pid>/stat` field 22 on Linux (returning null
elsewhere so legacy semantics still apply on macOS/Windows hosts).

This is strictly additive on the wire format and the predicate:
existing lock files without `pidStartTimeMs` continue to take the same
code path they did before, and platforms that cannot resolve a live
PID's start-time fall back to the same legacy behavior.

Refs #74346.
2026-04-29 16:54:05 +01:00
Peter Steinberger
3f0039e2ea fix(memory-wiki): reduce people wiki search noise 2026-04-29 16:52:48 +01:00
Peter Steinberger
c99d680714 ci: run release orchestration on github runners 2026-04-29 16:49:13 +01:00
Peter Steinberger
616f24fd49 refactor(gateway): consolidate lifecycle lazy boundary (#74105)
* refactor(gateway): consolidate lifecycle lazy boundary

* test(gateway): cover quoted lifecycle imports
2026-04-29 16:45:51 +01:00
Peter Steinberger
53e0874864 fix(models): satisfy params merge lint 2026-04-29 16:41:56 +01:00
Peter Steinberger
e8d23e5489 ci: cancel superseded release validation runs 2026-04-29 16:41:26 +01:00
Peter Steinberger
acae48b790 docs: document clawsweeper review findings 2026-04-29 16:40:19 +01:00
Peter Steinberger
240362bf6d fix: keep Discord runtime policy API export 2026-04-29 16:35:37 +01:00
Peter Steinberger
9fcae8458e fix: accept channel lastConnectedAt health snapshots 2026-04-29 16:35:37 +01:00
Peter Steinberger
8cbf77d997 chore: remove unused Discord runtime policy shim 2026-04-29 16:35:37 +01:00
Peter Steinberger
7acb78852f fix: keep Discord DM wildcard out of owner checks 2026-04-29 16:35:37 +01:00
Peter Steinberger
04f651b783 fix: preserve Slack DM access account lookup 2026-04-29 16:35:37 +01:00
Peter Steinberger
1d9959b77e fix: preserve DM access precedence in Slack runtime 2026-04-29 16:35:37 +01:00
Peter Steinberger
e6d72548b7 refactor: add shared channel DM access helpers 2026-04-29 16:35:37 +01:00
Peter Steinberger
8c68e7535f refactor: centralize channel DM access resolution 2026-04-29 16:35:37 +01:00
Peter Steinberger
606c881d27 test: stabilize release live e2e probes 2026-04-29 16:32:05 +01:00
Peter Steinberger
46171d7848 fix(models): merge legacy openrouter params 2026-04-29 16:32:05 +01:00
Peter Steinberger
e49703def6 fix(channels): preserve account status generic 2026-04-29 16:30:03 +01:00
Peter Steinberger
4dd2768c4b fix(channels): improve health metadata and reply diagnostics 2026-04-29 16:27:24 +01:00
Val Alexander
1390eadd92 fix(control-ui): link dashboard breadcrumb
Make the topbar OpenClaw breadcrumb a semantic Overview link, wire the existing navigate event at the app shell, and preserve prefixed Control UI base paths.\n\nValidation:\n- pnpm test ui/src/ui/navigation.browser.test.ts\n- pnpm exec oxfmt --check --threads=1 ui/src/ui/components/dashboard-header.ts ui/src/ui/app-render.ts ui/src/ui/navigation.browser.test.ts\n- git diff --check origin/main...HEAD
2026-04-29 10:27:10 -05:00
Peter Steinberger
a2cf05c4fb docs: complete clawsweeper skill commands 2026-04-29 16:26:28 +01:00
Peter Steinberger
c6b269154a docs: document clawsweeper re-review mention 2026-04-29 16:22:49 +01:00
Peter Steinberger
508cd6f805 fix(discord): remove stale component policy helper 2026-04-29 16:20:19 +01:00
Peter Steinberger
dc5a85d606 test(ci): align package artifact reuse assertion 2026-04-29 16:15:13 +01:00
Peter Steinberger
8935dd154a refactor(discord): simplify gateway and component wiring 2026-04-29 16:14:55 +01:00
Shakker
a0300378d6 docs: note openai model list manifest path 2026-04-29 16:07:33 +01:00
Shakker
2b4909e2db perf: move openai model list catalog to manifest 2026-04-29 16:07:33 +01:00