Peter Steinberger
7c31a9aafc
test: clear object shape matcher scan
2026-05-08 15:23:09 +01:00
Peter Steinberger
ad52612008
test: tighten docs config task assertions
2026-05-08 14:37:25 +01:00
Peter Steinberger
12487509c8
test: clarify config cli error assertions
2026-05-08 11:05:56 +01:00
Peter Steinberger
9ef37d1907
test: tighten assertions and harness coverage
2026-05-08 05:28:12 +01:00
Vincent Koc
fb73f2161e
fix(config): unset array index once
...
Fixes #76290 .
2026-05-03 10:42:49 -07:00
Peter Steinberger
9a49d143c8
test: update config patch schema fixture
2026-05-03 13:16:10 +01:00
Peter Steinberger
df51878b0b
fix(config): preserve empty patch objects
2026-04-29 22:02:02 +01:00
Peter Steinberger
ec7536078f
fix(config): validate unresolved SecretRef refs in dry-run
2026-04-29 22:02:02 +01:00
Peter Steinberger
8b8bba9621
fix(config): tighten patch command semantics
2026-04-29 22:02:02 +01:00
Peter Steinberger
48a01798b0
feat: add config apply patch command
2026-04-29 22:02:02 +01:00
Peter Steinberger
e899b32e1d
fix(agents): collapse local model timeout knobs
2026-04-27 10:16:50 +01:00
Shakker
df7348e586
fix: guide config users to plugin commands
2026-04-26 01:03:12 +01:00
Shakker
b018272fa1
fix: strip plugin install records before config validation
2026-04-26 01:03:12 +01:00
zhang-guiping
c1f423f845
fix(secrets): harden Windows ACL fallback and strip BOM ( #70662 )
...
Fail closed when Windows ACL checks cannot be verified for file and exec secret providers unless the provider explicitly opts into allowInsecurePath. Strip UTF-8 BOMs from file-backed secrets and document the trusted-path override.\n\nThanks @zhanggpcsu.
2026-04-23 19:32:15 +01:00
Peter Steinberger
819ff0463a
fix(config): protect model config merges
2026-04-22 23:18:05 +01:00
Peter Steinberger
0588dfe15d
fix(config): parse quoted bracket paths
2026-04-22 22:11:45 +01:00
ImLukeF
ddefce3c18
Config: align LLM idle timeout defaults
2026-04-11 15:48:58 +10:00
Peter Steinberger
5790435975
feat(agents): add video_generate tool
2026-04-05 18:44:06 +01:00
Hiroshi Tanaka
3f1b369f4a
feat(config): add rich description fields to JSON Schema output [AI-assisted] ( #60067 )
...
Merged via squash.
Prepared head SHA: a98b971924
Co-authored-by: solavrc <145330217+solavrc@users.noreply.github.com >
Co-authored-by: altaywtf <9790196+altaywtf@users.noreply.github.com >
Reviewed-by: @altaywtf
2026-04-04 22:10:08 +03:00
Peter Steinberger
bc23db501b
test: trim more core importOriginal usage
2026-04-03 19:49:43 +01:00
Josh Avant
788f56f30f
Secrets: hard-fail unsupported SecretRef policy and fix gateway restart token drift ( #58141 )
...
* Secrets: enforce C2 SecretRef policy and drift resolution
* Tests: add gateway auth startup/reload SecretRef runtime coverage
* Docs: sync C2 SecretRef policy and coverage matrix
* Config: hard-fail parent SecretRef policy writes
* Secrets: centralize unsupported SecretRef policy metadata
* Daemon: test service-env precedence for token drift refs
* Config: keep per-ref dry-run resolvability errors
* Docs: clarify config-set parent-object policy checks
* Gateway: fix drift fallback and schema-key filtering
* Gateway: align drift fallback with credential planner
* changelog
Signed-off-by: joshavant <830519+joshavant@users.noreply.github.com >
---------
Signed-off-by: joshavant <830519+joshavant@users.noreply.github.com >
2026-03-31 02:37:31 -05:00
Peter Steinberger
bff6a6a9c1
test(config): align optimistic write helpers
2026-03-30 01:02:25 +01:00
Peter Steinberger
f928b81279
test(config): align snapshot fixtures and isolation
2026-03-30 00:17:23 +01:00
Peter Steinberger
64bf80d4d5
refactor: move provider runtime into extensions
2026-03-27 05:38:58 +00:00
Mikhail Beliakov
fd934a566b
feat(cli): add json schema to cli tool ( #54523 )
...
Merged via squash.
Prepared head SHA: 39c15ee70d
Co-authored-by: kvokka <15954013+kvokka@users.noreply.github.com >
Co-authored-by: altaywtf <9790196+altaywtf@users.noreply.github.com >
Reviewed-by: @altaywtf
2026-03-26 02:30:32 +03:00
Peter Steinberger
72e58ca260
test(models): refresh example model fixtures
2026-03-22 23:00:18 -07:00
Peter Steinberger
2e6f2b0f07
test: centralize cli runtime capture helpers
2026-03-23 01:53:28 +00:00
Peter Steinberger
75835fc664
test: restore runtime-aware cli mocks
2026-03-22 18:35:37 -07:00
Peter Steinberger
976eefe373
test: align cli runtime mocks with output runtime
2026-03-22 17:32:20 -07:00
Peter Steinberger
aaa6068c08
test: stabilize json runtime captures ( #52428 ) (thanks @karanuppal)
2026-03-22 16:56:19 -07:00
Peter Steinberger
4e531d382b
fix(ci): restore cli runtime mocks and timeout exits
2026-03-22 23:43:58 +00:00
Vincent Koc
93fbe26adb
fix(config): tighten json and json5 parsing paths ( #51153 )
2026-03-20 10:10:57 -07:00
Josh Avant
1878272f67
CLI: prune inactive gateway auth credentials on mode set ( #50639 )
2026-03-19 16:05:43 -05:00
Josh Avant
2d3bcbfe08
CLI: skip exec SecretRef dry-run resolution unless explicitly allowed ( #49322 )
...
* CLI: gate exec SecretRef dry-run resolution behind opt-in
* Docs: clarify config dry-run exec opt-in behavior
* CLI: preserve static exec dry-run validation
2026-03-17 20:20:11 -05:00
joshavant
ab5aec137c
CLI: fix config set dry-run coverage gaps
2026-03-17 18:31:03 -05:00
Josh Avant
e99963100d
CLI: expand config set with SecretRef/provider builders and dry-run ( #49296 )
...
* CLI: expand config set ref/provider builder and dry-run
* Docs: revert README Discord token example
2026-03-17 18:15:49 -05:00
Vincent Koc
e4d80ed556
CI: restore main detect-secrets scan ( #38438 )
...
* Tests: stabilize detect-secrets fixtures
* Tests: fix rebased detect-secrets false positives
* Docs: keep snippets valid under detect-secrets
* Tests: finalize detect-secrets false-positive fixes
* Tests: reduce detect-secrets false positives
* Tests: keep detect-secrets pragmas inline
* Tests: remediate next detect-secrets batch
* Tests: tighten detect-secrets allowlists
* Tests: stabilize detect-secrets formatter drift
2026-03-07 10:06:35 -08:00
Peter Steinberger
67e3eb85d7
refactor(tests): dedupe browser and config cli test setup
2026-03-03 01:15:09 +00:00
Gustavo Madeira Santana
f26853f14c
CLI: dedupe config validate errors and expose allowed values
2026-03-02 20:05:12 -05:00
Peter Steinberger
2287d1ec13
test: micro-optimize slow suites and CLI command setup
2026-03-02 23:00:49 +00:00
Sid
3002f13ca7
feat(config): add openclaw config validate and improve startup error messages ( #31220 )
...
Merged via squash.
Prepared head SHA: 4598f2a541
Co-authored-by: Sid-Qin <201593046+Sid-Qin@users.noreply.github.com >
Co-authored-by: gumadeiras <5599352+gumadeiras@users.noreply.github.com >
Reviewed-by: @gumadeiras
2026-03-02 00:45:51 -05:00
cyb1278588254
96ffbb5aaf
CLI: add config path subcommand to print active config file path ( #26256 )
...
Merged via squash.
Prepared head SHA: b11c593a34
Co-authored-by: cyb1278588254 <48212932+cyb1278588254@users.noreply.github.com >
Co-authored-by: gumadeiras <5599352+gumadeiras@users.noreply.github.com >
Reviewed-by: @gumadeiras
2026-03-01 23:33:20 -05:00
Vincent Koc
b297bae027
fix(cli): allow Ollama apiKey config set without predeclared provider ( #29299 )
...
* CLI: seed Ollama provider on apiKey set
* Tests: cover Ollama apiKey config set path
2026-02-27 23:35:57 -08:00
Frank Yang
f208518cb9
fix(config): keep write inputs immutable when using unsetPaths ( #24134 )
...
Merged via /review-pr -> /prepare-pr -> /merge-pr.
Prepared head SHA: 951f8480c3
Co-authored-by: frankekn <4488090+frankekn@users.noreply.github.com >
Co-authored-by: gumadeiras <5599352+gumadeiras@users.noreply.github.com >
Reviewed-by: @gumadeiras
2026-02-23 02:51:13 -05:00
SleuthCo.AI
9c87b53c8e
security(cli): redact sensitive values in config get output ( #23654 )
...
* security(cli): redact sensitive values in config get output
`runConfigGet()` reads raw config values but never applies redaction
before printing. When a user runs `openclaw config get gateway.token`
the real credential is printed to the terminal, leaking it into shell
history, scrollback buffers, and screenshots.
Use the existing `redactConfigObject()` (from redact-snapshot.ts,
already used by the Web UI path) to scrub sensitive fields before
`getAtPath()` resolves the requested key.
Fixes #13683
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com >
* CLI/Config: add redaction regression test and changelog
---------
Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com >
Co-authored-by: Vincent Koc <vincentkoc@ieee.org >
2026-02-22 19:37:33 -05:00
Vignesh Natarajan
73b4330d4c
CLI/Config: keep explicitly unset keys removed
2026-02-21 21:08:04 -08:00
Peter Steinberger
861718e4dc
test: group remaining suite cleanups
2026-02-21 21:44:57 +00:00
adhitShet
d871ee91d0
fix(config-cli): correct misleading --json flag description ( #21332 )
...
Merged via /review-pr -> /prepare-pr -> /merge-pr.
Prepared head SHA: b6c8d1edfa
Co-authored-by: adhitShet <131381638+adhitShet@users.noreply.github.com >
Co-authored-by: gumadeiras <5599352+gumadeiras@users.noreply.github.com >
Reviewed-by: @gumadeiras
2026-02-19 20:09:17 -05:00
cpojer
0cf443afe8
chore: Fix types in tests 1/N.
2026-02-17 10:26:49 +09:00
Peter Steinberger
f717a13039
refactor(agent): dedupe harness and command workflows
2026-02-16 14:59:30 +00:00