Peter Steinberger
|
759d37635d
|
Revert "refactor: move tasks behind plugin-sdk seam"
This reverts commit da6e9bb76f.
|
2026-04-01 01:30:22 +09:00 |
|
Peter Steinberger
|
015ab98591
|
fix: restore ci status fast path and whatsapp tests
|
2026-03-31 16:21:55 +01:00 |
|
Peter Steinberger
|
da6e9bb76f
|
refactor: move tasks behind plugin-sdk seam
|
2026-03-31 15:22:09 +01:00 |
|
Gustavo Madeira Santana
|
1482afae57
|
Status: keep fast JSON off task audit runtime
|
2026-03-29 23:17:28 -04:00 |
|
Vincent Koc
|
c52fac836c
|
feat(tasks): add status health and maintenance command (#57423)
* feat(tasks): add status health and maintenance command
* fix(tasks): address status and maintenance review feedback
|
2026-03-30 12:10:44 +09:00 |
|
Vincent Koc
|
e6445c22aa
|
feat(status): surface task run pressure (#57350)
* feat(status): surface task run pressure
* Update src/commands/tasks.ts
Co-authored-by: greptile-apps[bot] <165735046+greptile-apps[bot]@users.noreply.github.com>
---------
Co-authored-by: greptile-apps[bot] <165735046+greptile-apps[bot]@users.noreply.github.com>
|
2026-03-30 09:09:10 +09:00 |
|
Peter Steinberger
|
a5cb9ec674
|
fix(ci): align skills api and trim status startup
|
2026-03-27 22:24:54 +00:00 |
|
Peter Steinberger
|
bcd61f0a38
|
refactor: dedupe helpers and source seams
|
2026-03-24 21:00:36 +00:00 |
|
Peter Steinberger
|
6b9915a106
|
refactor!: drop legacy CLAWDBOT env compatibility
|
2026-03-22 22:13:39 -07:00 |
|
Peter Steinberger
|
97e4f37171
|
fix: keep status --json stdout clean (#52449) (thanks @cgdusek)
|
2026-03-22 21:51:08 -07:00 |
|
Charles Dusek
|
03c4bacbfb
|
fix(cli): route deferred plugin logs to stderr in status --json
|
2026-03-22 21:51:08 -07:00 |
|
Vincent Koc
|
15fd11032d
|
fix(status): skip cold-start status probes
|
2026-03-21 08:59:19 -07:00 |
|
Tak Hoffman
|
192151610f
|
fix(status): skip plugin compatibility scan on empty json path
|
2026-03-19 18:06:03 -05:00 |
|
Vincent Koc
|
27d4fdf3bb
|
Plugins: surface compatibility notices
|
2026-03-17 20:03:40 -07:00 |
|
Peter Steinberger
|
9648e7fecb
|
refactor: consolidate lazy runtime surfaces
|
2026-03-17 00:59:20 -07:00 |
|
Peter Steinberger
|
143530407d
|
refactor(status): share scan helper state
|
2026-03-17 06:24:01 +00:00 |
|
Gustavo Madeira Santana
|
8cd1bdd345
|
Status: stabilize startup memory probes
|
2026-03-16 10:27:44 +00:00 |
|
Vincent Koc
|
ed82c7e57b
|
Status: lazy-load tailscale and memory scan deps
|
2026-03-15 23:12:27 -07:00 |
|
Peter Steinberger
|
99a4594bde
|
fix(plugins): resolve rebase fallout in auth hooks
|
2026-03-15 21:52:29 -07:00 |
|
Peter Steinberger
|
0c2ae71366
|
fix(outbound): preserve channel registry during provider snapshots
|
2026-03-15 21:52:29 -07:00 |
|
Peter Steinberger
|
656848dcd7
|
refactor: rename setup wizard surfaces
|
2026-03-15 21:40:31 -07:00 |
|
Peter Steinberger
|
33edb57e74
|
fix: keep provider resolution from clobbering channel plugins
|
2026-03-15 21:31:31 -07:00 |
|
Vincent Koc
|
7781f62d33
|
Status: restore lazy scan runtime typing
|
2026-03-15 21:28:56 -07:00 |
|
Vincent Koc
|
350b42d342
|
Status: lazy-load text scan helpers
|
2026-03-15 21:03:55 -07:00 |
|
Vincent Koc
|
986b772a89
|
Status: scope JSON plugin preload to configured channels
|
2026-03-15 20:05:54 -07:00 |
|
Vincent Koc
|
d8e138c743
|
Gateway: add presence-only probe mode for status
|
2026-03-15 19:56:08 -07:00 |
|
Josh Avant
|
a2cb81199e
|
secrets: harden read-only SecretRef command paths and diagnostics (#47794)
* secrets: harden read-only SecretRef resolution for status and audit
* CLI: add SecretRef degrade-safe regression coverage
* Docs: align SecretRef status and daemon probe semantics
* Security audit: close SecretRef review gaps
* Security audit: preserve source auth SecretRef configuredness
* changelog
Signed-off-by: joshavant <830519+joshavant@users.noreply.github.com>
---------
Signed-off-by: joshavant <830519+joshavant@users.noreply.github.com>
|
2026-03-15 21:55:24 -05:00 |
|
Vincent Koc
|
fdfefcaa11
|
Status: skip unused channel issue scan in JSON mode
|
2026-03-15 19:43:42 -07:00 |
|
Peter Steinberger
|
83ee5c0328
|
perf(status): defer heavy startup loading
|
2026-03-15 18:20:53 -07:00 |
|
Vincent Koc
|
2c7fb54956
|
Config: fail closed invalid config loads (#39071)
* Config: fail closed invalid config loads
* CLI: keep diagnostics on explicit best-effort config
* Tests: cover invalid config best-effort diagnostics
* Changelog: note invalid config fail-closed fix
* Status: pass best-effort config through status-all gateway RPCs
* CLI: pass config through gateway secret RPC
* CLI: skip plugin loading from invalid config
* Tests: align daemon token drift env precedence
|
2026-03-07 17:48:13 -08:00 |
|
Josh Avant
|
0e4245063f
|
CLI: make read-only SecretRef status flows degrade safely (#37023)
* CLI: add read-only SecretRef inspection
* CLI: fix read-only SecretRef status regressions
* CLI: preserve read-only SecretRef status fallbacks
* Docs: document read-only channel inspection hook
* CLI: preserve audit coverage for read-only SecretRefs
* CLI: fix read-only status account selection
* CLI: fix targeted gateway fallback analysis
* CLI: fix Slack HTTP read-only inspection
* CLI: align audit credential status checks
* CLI: restore Telegram read-only fallback semantics
|
2026-03-05 23:07:13 -06:00 |
|
Josh Avant
|
72cf9253fc
|
Gateway: add SecretRef support for gateway.auth.token with auth-mode guardrails (#35094)
|
2026-03-05 12:53:56 -06:00 |
|
Josh Avant
|
806803b7ef
|
feat(secrets): expand SecretRef coverage across user-supplied credentials (#29580)
* feat(secrets): expand secret target coverage and gateway tooling
* docs(secrets): align gateway and CLI secret docs
* chore(protocol): regenerate swift gateway models for secrets methods
* fix(config): restore talk apiKey fallback and stabilize runner test
* ci(windows): reduce test worker count for shard stability
* ci(windows): raise node heap for test shard stability
* test(feishu): make proxy env precedence assertion windows-safe
* fix(gateway): resolve auth password SecretInput refs for clients
* fix(gateway): resolve remote SecretInput credentials for clients
* fix(secrets): skip inactive refs in command snapshot assignments
* fix(secrets): scope gateway.remote refs to effective auth surfaces
* fix(secrets): ignore memory defaults when enabled agents disable search
* fix(secrets): honor Google Chat serviceAccountRef inheritance
* fix(secrets): address tsgo errors in command and gateway collectors
* fix(secrets): avoid auth-store load in providers-only configure
* fix(gateway): defer local password ref resolution by precedence
* fix(secrets): gate telegram webhook secret refs by webhook mode
* fix(secrets): gate slack signing secret refs to http mode
* fix(secrets): skip telegram botToken refs when tokenFile is set
* fix(secrets): gate discord pluralkit refs by enabled flag
* fix(secrets): gate discord voice tts refs by voice enabled
* test(secrets): make runtime fixture modes explicit
* fix(cli): resolve local qr password secret refs
* fix(cli): fail when gateway leaves command refs unresolved
* fix(gateway): fail when local password SecretRef is unresolved
* fix(gateway): fail when required remote SecretRefs are unresolved
* fix(gateway): resolve local password refs only when password can win
* fix(cli): skip local password SecretRef resolution on qr token override
* test(gateway): cast SecretRef fixtures to OpenClawConfig
* test(secrets): activate mode-gated targets in runtime coverage fixture
* fix(cron): support SecretInput webhook tokens safely
* fix(bluebubbles): support SecretInput passwords across config paths
* fix(msteams): make appPassword SecretInput-safe in onboarding/token paths
* fix(bluebubbles): align SecretInput schema helper typing
* fix(cli): clarify secrets.resolve version-skew errors
* refactor(secrets): return structured inactive paths from secrets.resolve
* refactor(gateway): type onboarding secret writes as SecretInput
* chore(protocol): regenerate swift models for secrets.resolve
* feat(secrets): expand extension credential secretref support
* fix(secrets): gate web-search refs by active provider
* fix(onboarding): detect SecretRef credentials in extension status
* fix(onboarding): allow keeping existing ref in secret prompt
* fix(onboarding): resolve gateway password SecretRefs for probe and tui
* fix(onboarding): honor secret-input-mode for local gateway auth
* fix(acp): resolve gateway SecretInput credentials
* fix(secrets): gate gateway.remote refs to remote surfaces
* test(secrets): cover pattern matching and inactive array refs
* docs(secrets): clarify secrets.resolve and remote active surfaces
* fix(bluebubbles): keep existing SecretRef during onboarding
* fix(tests): resolve CI type errors in new SecretRef coverage
* fix(extensions): replace raw fetch with SSRF-guarded fetch
* test(secrets): mark gateway remote targets active in runtime coverage
* test(infra): normalize home-prefix expectation across platforms
* fix(cli): only resolve local qr password refs in password mode
* test(cli): cover local qr token mode with unresolved password ref
* docs(cli): clarify local qr password ref resolution behavior
* refactor(extensions): reuse sdk SecretInput helpers
* fix(wizard): resolve onboarding env-template secrets before plaintext
* fix(cli): surface secrets.resolve diagnostics in memory and qr
* test(secrets): repair post-rebase runtime and fixtures
* fix(gateway): skip remote password ref resolution when token wins
* fix(secrets): treat tailscale remote gateway refs as active
* fix(gateway): allow remote password fallback when token ref is unresolved
* fix(gateway): ignore stale local password refs for none and trusted-proxy
* fix(gateway): skip remote secret ref resolution on local call paths
* test(cli): cover qr remote tailscale secret ref resolution
* fix(secrets): align gateway password active-surface with auth inference
* fix(cli): resolve inferred local gateway password refs in qr
* fix(gateway): prefer resolvable remote password over token ref pre-resolution
* test(gateway): cover none and trusted-proxy stale password refs
* docs(secrets): sync qr and gateway active-surface behavior
* fix: restore stability blockers from pre-release audit
* Secrets: fix collector/runtime precedence contradictions
* docs: align secrets and web credential docs
* fix(rebase): resolve integration regressions after main rebase
* fix(node-host): resolve gateway secret refs for auth
* fix(secrets): harden secretinput runtime readers
* gateway: skip inactive auth secretref resolution
* cli: avoid gateway preflight for inactive secret refs
* extensions: allow unresolved refs in onboarding status
* tests: fix qr-cli module mock hoist ordering
* Security: align audit checks with SecretInput resolution
* Gateway: resolve local-mode remote fallback secret refs
* Node host: avoid resolving inactive password secret refs
* Secrets runtime: mark Slack appToken inactive for HTTP mode
* secrets: keep inactive gateway remote refs non-blocking
* cli: include agent memory secret targets in runtime resolution
* docs(secrets): sync docs with active-surface and web search behavior
* fix(secrets): keep telegram top-level token refs active for blank account tokens
* fix(daemon): resolve gateway password secret refs for probe auth
* fix(secrets): skip IRC NickServ ref resolution when NickServ is disabled
* fix(secrets): align token inheritance and exec timeout defaults
* docs(secrets): clarify active-surface notes in cli docs
* cli: require secrets.resolve gateway capability
* gateway: log auth secret surface diagnostics
* secrets: remove dead provider resolver module
* fix(secrets): restore gateway auth precedence and fallback resolution
* fix(tests): align plugin runtime mock typings
---------
Co-authored-by: Peter Steinberger <steipete@gmail.com>
|
2026-03-03 02:58:20 +00:00 |
|
Peter Steinberger
|
b02b94673f
|
refactor: dedupe runtime and helper flows
|
2026-03-02 12:55:47 +00:00 |
|
Peter Steinberger
|
6b78544f82
|
refactor(commands): unify repeated ACP and routing flows
|
2026-03-02 05:20:19 +00:00 |
|
Vincent Koc
|
79f818e8a2
|
Status scan: guard deferred promise rejections
|
2026-03-01 12:56:56 -08:00 |
|
Vincent Koc
|
23c6e9836e
|
Status scan: overlap non-JSON async checks
|
2026-03-01 12:56:56 -08:00 |
|
Vincent Koc
|
7aa9267d00
|
Status scan: fix JSON channels result typing
|
2026-03-01 12:56:56 -08:00 |
|
Vincent Koc
|
ba0aa3cfae
|
Status scan: add parallel JSON fast path
|
2026-03-01 12:56:56 -08:00 |
|
Vincent Koc
|
22653c0e27
|
Status scan: skip channel table work in JSON mode
|
2026-03-01 12:56:56 -08:00 |
|
Peter Steinberger
|
b8b43175c5
|
style: align formatting with oxfmt 0.33
|
2026-02-18 01:34:35 +00:00 |
|
Peter Steinberger
|
31f9be126c
|
style: run oxfmt and fix gate failures
|
2026-02-18 01:29:02 +00:00 |
|
cpojer
|
d0cb8c19b2
|
chore: wtf.
|
2026-02-17 13:36:48 +09:00 |
|
Sebastian
|
ed11e93cf2
|
chore(format)
|
2026-02-16 23:20:16 -05:00 |
|
cpojer
|
90ef2d6bdf
|
chore: Update formatting.
|
2026-02-17 09:18:40 +09:00 |
|
Vignesh Natarajan
|
c4dbcc3444
|
Memory/QMD: make status checks side-effect free
|
2026-02-14 15:42:02 -08:00 |
|
Vignesh Natarajan
|
30098b04d7
|
chore: fix lint warnings
|
2026-02-02 23:45:05 -08:00 |
|
Vignesh Natarajan
|
9bef525944
|
chore: apply formatter
|
2026-02-02 23:45:05 -08:00 |
|
Vignesh Natarajan
|
5d3af3bc62
|
feat (memory): Implement new (opt-in) QMD memory backend
|
2026-02-02 23:45:05 -08:00 |
|
cpojer
|
f06dd8df06
|
chore: Enable "experimentalSortImports" in Oxfmt and reformat all imorts.
|
2026-02-01 10:03:47 +09:00 |
|