Commit Graph

31419 Commits

Author SHA1 Message Date
Omar Shahine
6f1d321aab feat(bluebubbles): replay missed webhook messages after gateway restart (#66857)
Adds an in-process startup catchup pass to the BlueBubbles channel that
queries BB Server for messages delivered since a persisted per-account
cursor and re-feeds each through the existing processMessage pipeline.

Fixes the missed-message hole documented in #66721: BB's WebhookService
is fire-and-forget on POST failure, and MessagePoller only re-fires
webhooks on BB-side reconnection events, not on webhook-receiver
recovery.

- New extensions/bluebubbles/src/catchup.ts with singleflight per
  accountId, cursor persistence via the canonical state-paths
  resolver, bounded query (perRunLimit + maxAgeMinutes), failure-held
  cursor, truncation-aware page-boundary advancement, future-cursor
  recovery, isFromMe filter (pre- and post-normalization).
- monitor.ts fires catchup as a background task after the webhook
  target registers.
- config-schema.ts adds optional catchup block; accounts.ts adds
  catchup to nestedObjectKeys for deep-merge per-account overrides.
- Dedupes against #66816's persistent inbound GUID cache.
- 22 scoped tests; full BB suite 411/411; pnpm check green; live E2E
  on macOS 26.3 / BB Server 1.9.x recovered 3/3 missed messages.

Closes #66721.

Co-authored-by: Omar Shahine <omar@shahine.com>
2026-04-14 19:20:42 -07:00
Serhii
ff4edd0559 fix: restore Telegram native auto defaults (#66843) (thanks @kashevk0)
* fix(config): restore Telegram native commands under auto defaults

* chore: trigger CI rerun

* test(config): split native auto-default regressions

* fix: restore Telegram native auto defaults (#66843) (thanks @kashevk0)

---------

Co-authored-by: Ayaan Zaidi <hi@obviy.us>
2026-04-15 07:46:35 +05:30
Peter Steinberger
d974ceac21 test(e2e): harden Parallels smoke probes 2026-04-15 03:13:07 +01:00
Peter Steinberger
1c46fa0031 test(e2e): quote linux bad-plugin diagnostic grep 2026-04-15 03:01:16 +01:00
Gustavo Madeira Santana
3c03d41f13 QA: split Matrix scenario leaf types 2026-04-14 21:16:48 -04:00
Gustavo Madeira Santana
4c52731051 fix(ci): parse quoted pnpm snapshot keys 2026-04-14 21:15:43 -04:00
Gustavo Madeira Santana
da43277cc9 fix(ci): make pnpm audit hook dependency-free 2026-04-14 21:12:26 -04:00
Peter Steinberger
e49be93f2c fix(release): keep legacy update QA sidecars 2026-04-15 02:08:13 +01:00
Gustavo Madeira Santana
9463f1c498 QA: expand Matrix config scenario coverage 2026-04-14 21:07:31 -04:00
François Martin
734bb9c2e7 Telegram/documents: sanitize binary payloads to prevent prompt input inflation (#66877)
Merged via squash.

Prepared head SHA: 09a87c184f
Co-authored-by: martinfrancois <14319020+martinfrancois@users.noreply.github.com>
Co-authored-by: gumadeiras <5599352+gumadeiras@users.noreply.github.com>
Reviewed-by: @gumadeiras
2026-04-14 20:53:00 -04:00
Gustavo Madeira Santana
0c4e0d7030 memory: block dreaming self-ingestion (#66852)
Merged via squash.

Prepared head SHA: 4742656a0d
Co-authored-by: gumadeiras <5599352+gumadeiras@users.noreply.github.com>
Co-authored-by: gumadeiras <5599352+gumadeiras@users.noreply.github.com>
Reviewed-by: @gumadeiras
2026-04-14 20:29:12 -04:00
Peter Steinberger
5702ab695b test(e2e): harden beta preflight failures 2026-04-15 01:27:07 +01:00
Mason Huang
9727ed4547 feat(skills): add discussion_comment support to secret-scanning skill (#65628)
Merged via squash.

Prepared head SHA: 071e9f4b7a
Co-authored-by: hxy91819 <8814856+hxy91819@users.noreply.github.com>
Co-authored-by: hxy91819 <8814856+hxy91819@users.noreply.github.com>
Reviewed-by: @hxy91819
2026-04-15 08:11:03 +08:00
Vincent Koc
55ee327981 fix(ci): replace retired pnpm audit hook 2026-04-15 01:10:07 +01:00
Gustavo Madeira Santana
3aae0fb16d QA: tighten Matrix substrate coverage 2026-04-14 20:06:08 -04:00
Gustavo Madeira Santana
874eebe539 QA: extract Matrix event modules 2026-04-14 20:06:07 -04:00
Vincent Koc
f3a5b96b62 test(gateway): harden runtime services delivery recovery assertion 2026-04-15 01:01:28 +01:00
Peter Steinberger
9577d6609b build: refresh release surface baselines 2026-04-15 00:58:17 +01:00
Vincent Koc
0329ec40db ci(tests): split agentic node shard into three lanes 2026-04-15 00:55:41 +01:00
Peter Steinberger
81b66e5bf3 test(qa-matrix): type provisioned topology fixture 2026-04-15 00:50:27 +01:00
Peter Steinberger
5ed9016914 fix: narrow a2ui bundle hash inputs 2026-04-15 00:46:40 +01:00
Gustavo Madeira Santana
778ac4330a QA: finish Matrix P1 harness coverage 2026-04-14 19:42:17 -04:00
Gustavo Madeira Santana
5e77cbd9ec QA: add Matrix transport substrate 2026-04-14 19:42:17 -04:00
Peter Steinberger
711b1a8f64 docs: parallelize Parallels smoke guidance 2026-04-15 00:42:06 +01:00
Peter Steinberger
956b04975d build: refresh A2UI bundle hash 2026-04-15 00:42:05 +01:00
Vincent Koc
97ee0c6fd3 perf(migrations): trim legacy migration and bind cold paths 2026-04-15 00:38:45 +01:00
Vincent Koc
a2888f8f7d fix(ci): exclude private qa sidecars from install verify 2026-04-15 00:32:44 +01:00
Vincent Koc
16c949ed5f test(agents): trim hot replay approval suites 2026-04-15 00:29:09 +01:00
Gustavo Madeira Santana
3d5c0c3b87 docs(qa): refresh QA testing skill 2026-04-14 19:26:24 -04:00
Vincent Koc
f1c2be7d32 fix(ci): slim build-artifacts dist producer 2026-04-15 00:13:01 +01:00
Vincent Koc
87ef32c937 perf(tests): avoid bundled channel cold-loads in hot paths 2026-04-15 00:11:43 +01:00
Vincent Koc
06715db218 test(gateway): avoid startup auth module reset churn 2026-04-14 23:59:30 +01:00
Vincent Koc
ed1dfe23d4 perf(commands): trim sessions cold-path imports 2026-04-14 23:59:30 +01:00
Josh Avant
1769fb2aa1 fix(secrets): align SecretRef inspect/strict behavior across preload/runtime paths (#66818)
* Config: add inspect/strict SecretRef string resolver

* CLI: pass resolved/source config snapshots to plugin preload

* Slack: keep HTTP route registration config-only

* Providers: normalize SecretRef handling for auth and web tools

* Secrets: add Exa web search target to registry and docs

* Telegram: resolve env SecretRef tokens at runtime

* Agents: resolve custom provider env SecretRef ids

* Providers: fail closed on blocked SecretRef fallback

* Telegram: enforce env SecretRef policy for runtime token refs

* Status/Providers/Telegram: tighten SecretRef preload and fallback handling

* Providers: enforce env SecretRef policy checks in fallback auth paths

* fix: add SecretRef lifecycle changelog entry (#66818) (thanks @joshavant)
2026-04-14 17:59:28 -05:00
Gustavo Madeira Santana
4491bdad76 QA: drop dead qa-lab-runtime shim
Remove the old qa-lab-runtime shim now that qa-runtime is the only live
consumer seam. This leaves one tiny shared runtime facade instead of two
parallel names for the same private helper surface.
2026-04-14 18:53:36 -04:00
Gustavo Madeira Santana
95be2c1605 QA: replace qa-lab-runtime with qa-runtime
Introduce a tiny generic qa-runtime seam for shared live-lane helpers and
repoint qa-matrix to it. This keeps the qa-lab host split while removing
the host-owned runtime name from runner code.

Drop the old qa-lab-runtime shim/export now that nothing consumes it and
keep the plugin-sdk surface aligned with the new seam.
2026-04-14 18:53:25 -04:00
Omar Shahine
58742acaab fix(bluebubbles): dedupe inbound webhooks across restarts (#19176, #12053) (#66816)
BlueBubbles MessagePoller replays its ~1-week lookback window as new-message
webhooks after BB Server restart or reconnect. Add a persistent file-backed
GUID dedupe (TTL=7d) at the top of processMessage using createClaimableDedupe
from the Plugin SDK. Claim/finalize/release semantics ensure transient delivery
failures release the GUID so a later replay can retry.

Fixes #19176, #12053.

Co-authored-by: Omar Shahine <omar@shahine.com>
2026-04-14 15:45:05 -07:00
Vincent Koc
59b5db5cbf test(perf): trim slow gateway, daemon, and command specs 2026-04-14 23:40:03 +01:00
Vincent Koc
d5b1329bf3 test(perf): speed up slow launchd and sessions specs 2026-04-14 23:34:09 +01:00
Peter Steinberger
e1e0120c0d test(live): skip codex html interruptions in modern sweep 2026-04-14 23:31:07 +01:00
Josh Lehman
75e7fc97f8 fix: preserve runtime token budget in deferred context-engine maintenance (#66820)
* fix(context-engine): pass deferred maintenance token budget

Thread tokenBudget through the after-turn runtime context so background context-engine maintenance reuses the real model context window instead of falling back to 128k. Also pass through a best-effort currentTokenCount from the latest call total and make the runtime context type explicit about both fields.

Regeneration-Prompt: |
  OpenClaw already passed the real context token budget into direct context-engine calls like afterTurn and assemble, but deferred maintain() reused only the runtimeContext object and that object did not carry tokenBudget. Lossless Claw therefore fell back to 128k during background maintenance, which made budget-trigger fire much more aggressively than the live model context warranted. Thread the real contextTokenBudget into buildAfterTurnRuntimeContext so deferred maintenance receives the same budget, and pass a straightforward best-effort currentTokenCount from the latest call total while the relevant data is already in scope. Keep the change additive, update the runtime-context type, and cover the background maintenance/runtime-context behavior with focused tests.

* fix(context-engine): use prompt usage for deferred maintenance
2026-04-14 15:30:37 -07:00
Vincent Koc
58d0c179d7 fix(ci): split agentic node shard by runtime shape 2026-04-14 23:22:08 +01:00
Vincent Koc
2d26929ff1 test(slack): harden thread context fixture cleanup 2026-04-14 23:11:43 +01:00
Peter Steinberger
7026ddadba test(gateway): tolerate loaded hook enqueue timing 2026-04-14 23:05:18 +01:00
Josh Lehman
ef3ac6a58e fix: guard Anthropic Messages max tokens (#66664)
* Docs: add Anthropic max_tokens investigation memo

Regeneration-Prompt: |
  Investigate the reported OpenClaw cron isolated-agent failure where an
  Anthropic Haiku run returned "max_tokens: must be greater than or equal to 1".
  Do not implement a fix yet. Inspect the cron isolated-agent execution path,
  the embedded runner, extra param plumbing, Anthropic transport code, and any
  model-selection or token-budget logic that could synthesize maxTokens = 0.
  Produce a concise maintainer memo with concrete file references, explain why
  cron itself is not the component setting maxTokens, identify the most likely
  root cause, describe the smallest repro shape, and recommend the cleanest fix.

* openclaw-e82: guard Anthropic Messages maxTokens

Regeneration-Prompt: |
  Fix the Anthropic Messages path so OpenClaw never sends max_tokens <= 0
  to Anthropic. Match the positive-number guard already used by the
  Anthropic Vertex transport, but keep the change scoped: validate token
  limits in src/agents/anthropic-transport-stream.ts where transport
  options are resolved and where the final payload is assembled, fall back
  to the model limit when a runtime override is zero, fail locally when no
  positive token budget exists, and drop non-positive maxTokens from
  src/agents/pi-embedded-runner/extra-params.ts so hidden config params do
  not leak through. Add focused regression coverage for both the transport
  and extra-param forwarding path, and remove the earlier investigation memo
  from the branch so the PR diff only contains the fix.

* fix: scope Anthropic max token guard

* fix: document Anthropic max token guard

* fix: floor Anthropic max token overrides
2026-04-14 15:05:04 -07:00
Vincent Koc
9b25c8f8e1 perf(tests): trim plugin and gateway hot paths 2026-04-14 23:03:23 +01:00
Gustavo Madeira Santana
5977579da4 QA: drop qa-channel install metadata
Remove the stale install metadata from the private qa-channel package.
The runner still loads from the repo checkout, but it should not
advertise an npm install path we do not support.
2026-04-14 17:59:37 -04:00
Peter Steinberger
54cf4cd857 test(agents): isolate shared subagent state 2026-04-14 22:49:31 +01:00
Peter Steinberger
e7dfc88bfa fix(infra): resolve opened file paths by identity 2026-04-14 22:49:31 +01:00
Vincent Koc
c6c222ba84 perf(tests): trim hot wizard and infra setup work 2026-04-14 22:42:32 +01:00