huangcj
|
dc8253a84d
|
fix(memory): serialize local embedding initialization to avoid duplicate model loads (#15639)
Merged via squash.
Prepared head SHA: a085fc21a8
Co-authored-by: SubtleSpark <43933609+SubtleSpark@users.noreply.github.com>
Co-authored-by: gumadeiras <5599352+gumadeiras@users.noreply.github.com>
Reviewed-by: @gumadeiras
|
2026-03-04 10:09:03 -05:00 |
|
Gustavo Madeira Santana
|
21e8d88c1d
|
build: fix ineffective dynamic imports with lazy boundaries (#33690)
Merged via squash.
Prepared head SHA: 38b3c23d6f
Co-authored-by: gumadeiras <5599352+gumadeiras@users.noreply.github.com>
Co-authored-by: gumadeiras <5599352+gumadeiras@users.noreply.github.com>
Reviewed-by: @gumadeiras
|
2026-03-03 20:14:41 -05:00 |
|
Henry Loenwind
|
997197c6c9
|
bug: Workaround for QMD upstream bug (#27028)
Merged via squash.
Prepared head SHA: 939f9f4574
Co-authored-by: HenryLoenwind <1485873+HenryLoenwind@users.noreply.github.com>
Co-authored-by: gumadeiras <5599352+gumadeiras@users.noreply.github.com>
Reviewed-by: @gumadeiras
|
2026-03-03 01:48:43 -05:00 |
|
Peter Steinberger
|
da6e6fb900
|
test: fix strict runtime mock types in channel tests
|
2026-03-03 03:06:22 +00:00 |
|
Josh Avant
|
806803b7ef
|
feat(secrets): expand SecretRef coverage across user-supplied credentials (#29580)
* feat(secrets): expand secret target coverage and gateway tooling
* docs(secrets): align gateway and CLI secret docs
* chore(protocol): regenerate swift gateway models for secrets methods
* fix(config): restore talk apiKey fallback and stabilize runner test
* ci(windows): reduce test worker count for shard stability
* ci(windows): raise node heap for test shard stability
* test(feishu): make proxy env precedence assertion windows-safe
* fix(gateway): resolve auth password SecretInput refs for clients
* fix(gateway): resolve remote SecretInput credentials for clients
* fix(secrets): skip inactive refs in command snapshot assignments
* fix(secrets): scope gateway.remote refs to effective auth surfaces
* fix(secrets): ignore memory defaults when enabled agents disable search
* fix(secrets): honor Google Chat serviceAccountRef inheritance
* fix(secrets): address tsgo errors in command and gateway collectors
* fix(secrets): avoid auth-store load in providers-only configure
* fix(gateway): defer local password ref resolution by precedence
* fix(secrets): gate telegram webhook secret refs by webhook mode
* fix(secrets): gate slack signing secret refs to http mode
* fix(secrets): skip telegram botToken refs when tokenFile is set
* fix(secrets): gate discord pluralkit refs by enabled flag
* fix(secrets): gate discord voice tts refs by voice enabled
* test(secrets): make runtime fixture modes explicit
* fix(cli): resolve local qr password secret refs
* fix(cli): fail when gateway leaves command refs unresolved
* fix(gateway): fail when local password SecretRef is unresolved
* fix(gateway): fail when required remote SecretRefs are unresolved
* fix(gateway): resolve local password refs only when password can win
* fix(cli): skip local password SecretRef resolution on qr token override
* test(gateway): cast SecretRef fixtures to OpenClawConfig
* test(secrets): activate mode-gated targets in runtime coverage fixture
* fix(cron): support SecretInput webhook tokens safely
* fix(bluebubbles): support SecretInput passwords across config paths
* fix(msteams): make appPassword SecretInput-safe in onboarding/token paths
* fix(bluebubbles): align SecretInput schema helper typing
* fix(cli): clarify secrets.resolve version-skew errors
* refactor(secrets): return structured inactive paths from secrets.resolve
* refactor(gateway): type onboarding secret writes as SecretInput
* chore(protocol): regenerate swift models for secrets.resolve
* feat(secrets): expand extension credential secretref support
* fix(secrets): gate web-search refs by active provider
* fix(onboarding): detect SecretRef credentials in extension status
* fix(onboarding): allow keeping existing ref in secret prompt
* fix(onboarding): resolve gateway password SecretRefs for probe and tui
* fix(onboarding): honor secret-input-mode for local gateway auth
* fix(acp): resolve gateway SecretInput credentials
* fix(secrets): gate gateway.remote refs to remote surfaces
* test(secrets): cover pattern matching and inactive array refs
* docs(secrets): clarify secrets.resolve and remote active surfaces
* fix(bluebubbles): keep existing SecretRef during onboarding
* fix(tests): resolve CI type errors in new SecretRef coverage
* fix(extensions): replace raw fetch with SSRF-guarded fetch
* test(secrets): mark gateway remote targets active in runtime coverage
* test(infra): normalize home-prefix expectation across platforms
* fix(cli): only resolve local qr password refs in password mode
* test(cli): cover local qr token mode with unresolved password ref
* docs(cli): clarify local qr password ref resolution behavior
* refactor(extensions): reuse sdk SecretInput helpers
* fix(wizard): resolve onboarding env-template secrets before plaintext
* fix(cli): surface secrets.resolve diagnostics in memory and qr
* test(secrets): repair post-rebase runtime and fixtures
* fix(gateway): skip remote password ref resolution when token wins
* fix(secrets): treat tailscale remote gateway refs as active
* fix(gateway): allow remote password fallback when token ref is unresolved
* fix(gateway): ignore stale local password refs for none and trusted-proxy
* fix(gateway): skip remote secret ref resolution on local call paths
* test(cli): cover qr remote tailscale secret ref resolution
* fix(secrets): align gateway password active-surface with auth inference
* fix(cli): resolve inferred local gateway password refs in qr
* fix(gateway): prefer resolvable remote password over token ref pre-resolution
* test(gateway): cover none and trusted-proxy stale password refs
* docs(secrets): sync qr and gateway active-surface behavior
* fix: restore stability blockers from pre-release audit
* Secrets: fix collector/runtime precedence contradictions
* docs: align secrets and web credential docs
* fix(rebase): resolve integration regressions after main rebase
* fix(node-host): resolve gateway secret refs for auth
* fix(secrets): harden secretinput runtime readers
* gateway: skip inactive auth secretref resolution
* cli: avoid gateway preflight for inactive secret refs
* extensions: allow unresolved refs in onboarding status
* tests: fix qr-cli module mock hoist ordering
* Security: align audit checks with SecretInput resolution
* Gateway: resolve local-mode remote fallback secret refs
* Node host: avoid resolving inactive password secret refs
* Secrets runtime: mark Slack appToken inactive for HTTP mode
* secrets: keep inactive gateway remote refs non-blocking
* cli: include agent memory secret targets in runtime resolution
* docs(secrets): sync docs with active-surface and web search behavior
* fix(secrets): keep telegram top-level token refs active for blank account tokens
* fix(daemon): resolve gateway password secret refs for probe auth
* fix(secrets): skip IRC NickServ ref resolution when NickServ is disabled
* fix(secrets): align token inheritance and exec timeout defaults
* docs(secrets): clarify active-surface notes in cli docs
* cli: require secrets.resolve gateway capability
* gateway: log auth secret surface diagnostics
* secrets: remove dead provider resolver module
* fix(secrets): restore gateway auth precedence and fallback resolution
* fix(tests): align plugin runtime mock typings
---------
Co-authored-by: Peter Steinberger <steipete@gmail.com>
|
2026-03-03 02:58:20 +00:00 |
|
Peter Steinberger
|
55c128ddc2
|
refactor(memory): dedupe readonly recovery test scenarios
|
2026-03-03 02:53:14 +00:00 |
|
Peter Steinberger
|
7897ffb72f
|
refactor(memory): dedupe openai batch fetch flows
|
2026-03-03 02:53:13 +00:00 |
|
nico-hoff
|
3eec79bd6c
|
feat(memory): add Ollama embedding provider (#26349)
Merged via /review-pr -> /prepare-pr -> /merge-pr.
Prepared head SHA: ac41386543
Co-authored-by: nico-hoff <43175972+nico-hoff@users.noreply.github.com>
Co-authored-by: gumadeiras <5599352+gumadeiras@users.noreply.github.com>
Reviewed-by: @gumadeiras
|
2026-03-02 20:56:40 -05:00 |
|
Peter Steinberger
|
282b107e99
|
test(perf): speed up cron, memory, and secrets hotspots
|
2026-03-03 00:43:01 +00:00 |
|
Peter Steinberger
|
6a42d09129
|
refactor: dedupe gateway config and infra flows
|
2026-03-03 00:15:14 +00:00 |
|
Peter Steinberger
|
2937fe0351
|
perf(config): skip redundant schema and session-store work
|
2026-03-02 20:19:10 +00:00 |
|
Peter Steinberger
|
d979eeda9f
|
perf(runtime): reduce slack prep and qmd cache-key overhead
|
2026-03-02 19:48:02 +00:00 |
|
Peter Steinberger
|
1616113170
|
perf(runtime): reduce cron persistence and logger overhead
|
2026-03-02 19:34:04 +00:00 |
|
Peter Steinberger
|
83ec545bed
|
test(perf): trim repeated setup in cron memory and config suites
|
2026-03-02 19:16:46 +00:00 |
|
Peter Steinberger
|
602f6439bd
|
test(memory): stabilize windows qmd spawn expectation
|
2026-03-02 18:06:12 +00:00 |
|
Peter Steinberger
|
18f8393b6c
|
fix: harden sandbox writes and centralize atomic file writes
|
2026-03-02 16:45:12 +00:00 |
|
Peter Steinberger
|
998d477f5e
|
test: stabilize cross-platform regression suites (#31594)
|
2026-03-02 15:47:21 +00:00 |
|
Peter Steinberger
|
e9dd6121f2
|
refactor(core): dedupe embedding imports and env parsing
|
2026-03-02 15:21:19 +00:00 |
|
Tak Hoffman
|
cd653c55d7
|
windows: unify non-core spawn handling across acp qmd and docker (openclaw#31750) thanks @Takhoffman
Verified:
- pnpm install --frozen-lockfile
- pnpm build
- pnpm check (fails on pre-existing unrelated src/slack/monitor/events/messages.ts typing errors)
- pnpm vitest run src/acp/client.test.ts src/memory/qmd-manager.test.ts src/agents/sandbox/docker.execDockerRaw.enoent.test.ts src/agents/sandbox/docker.windows.test.ts extensions/acpx/src/runtime-internals/process.test.ts
Co-authored-by: Takhoffman <781889+Takhoffman@users.noreply.github.com>
|
2026-03-02 08:05:39 -06:00 |
|
Peter Steinberger
|
d9a8d3853d
|
test(perf): trim qmd manager fixture setup overhead
|
2026-03-02 11:54:21 +00:00 |
|
Peter Steinberger
|
45888276a3
|
test(integration): dedupe messaging, secrets, and plugin test suites
|
2026-03-02 07:13:11 +00:00 |
|
Glucksberg
|
134296276a
|
fix(memory): discard stdout for qmd update/embed to prevent output cap failure (openclaw#28900) thanks @Glucksberg
Verified:
- pnpm install --frozen-lockfile
- pnpm build
- pnpm check
- pnpm test:macmini
Co-authored-by: Glucksberg <80581902+Glucksberg@users.noreply.github.com>
Co-authored-by: Tak Hoffman <781889+Takhoffman@users.noreply.github.com>
|
2026-03-01 12:16:50 -06:00 |
|
Vignesh Natarajan
|
f57b4669e1
|
Memory: keep keyword hits when hybrid vector misses
|
2026-02-28 14:18:24 -08:00 |
|
Rodrigo Uroz
|
1867611733
|
fix(memory): readonly sync recovery (openclaw#25799) thanks @rodrigouroz
Verified:
- pnpm build
- pnpm check
- pnpm test:macmini (fails in this environment at src/daemon/launchd.integration.test.ts beforeAll hook timeout; merged with Tak override)
Co-authored-by: rodrigouroz <384037+rodrigouroz@users.noreply.github.com>
Co-authored-by: Tak Hoffman <781889+Takhoffman@users.noreply.github.com>
|
2026-02-27 12:26:43 -06:00 |
|
Peter Steinberger
|
75423a00d6
|
refactor: deduplicate shared helpers and test setup
|
2026-02-23 20:40:44 +00:00 |
|
Peter Steinberger
|
8af19ddc5b
|
refactor: extract shared dedupe helpers for runtime paths
|
2026-02-23 05:43:43 +00:00 |
|
Peter Steinberger
|
60c494c024
|
test: tighten mistral media and onboarding coverage
|
2026-02-23 00:19:05 +00:00 |
|
Vincent Koc
|
d92ba4f8aa
|
feat: Provider/Mistral full support for Mistral on OpenClaw 🇫🇷 (#23845)
* Onboard: add Mistral auth choice and CLI flags
* Onboard/Auth: add Mistral provider config defaults
* Auth choice: wire Mistral API-key flow
* Onboard non-interactive: support --mistral-api-key
* Media understanding: add Mistral Voxtral audio provider
* Changelog: note Mistral onboarding and media support
* Docs: add Mistral provider and onboarding/media references
* Tests: cover Mistral media registry/defaults and auth mapping
* Memory: add Mistral embeddings provider support
* Onboarding: refresh Mistral model metadata
* Docs: document Mistral embeddings and endpoints
* Memory: persist Mistral embedding client state in managers
* Memory: add regressions for mistral provider wiring
* Gateway: add live tool probe retry helper
* Gateway: cover live tool probe retry helper
* Gateway: retry malformed live tool-read probe responses
* Memory: support plain-text batch error bodies
* Tests: add Mistral Voxtral live transcription smoke
* Docs: add Mistral live audio test command
* Revert: remove Mistral live voice test and docs entry
* Onboard: re-export Mistral default model ref from models
* Changelog: credit joeVenner for Mistral work
* fix: include Mistral in auto audio key fallback
* Update CHANGELOG.md
* Update CHANGELOG.md
---------
Co-authored-by: Shakker <shakkerdroid@gmail.com>
|
2026-02-23 00:03:56 +00:00 |
|
Vignesh Natarajan
|
1000ff04ea
|
fix(memory): hard-cap embedding inputs before batch
|
2026-02-22 15:40:18 -08:00 |
|
Vignesh Natarajan
|
d7747148d0
|
fix(memory): reindex when sources change
|
2026-02-22 15:12:07 -08:00 |
|
Vignesh Natarajan
|
a58b40e153
|
chore(test): stabilize mcporter assertions on Windows
|
2026-02-22 14:47:50 -08:00 |
|
Vignesh Natarajan
|
82d34b4b06
|
fix(memory): harden qmd collection recovery
|
2026-02-22 14:40:04 -08:00 |
|
Vignesh Natarajan
|
1ad9f9af5a
|
fix(memory): resolve qmd Windows shim commands
|
2026-02-22 14:24:49 -08:00 |
|
Peter Steinberger
|
7c109f5737
|
fix: resolve ci type errors and reconnect test flake
|
2026-02-22 21:35:20 +00:00 |
|
Peter Steinberger
|
52ee1f697e
|
test(memory): cover shared batch output and error helpers
|
2026-02-22 21:19:09 +00:00 |
|
Peter Steinberger
|
ad51372f78
|
refactor(memory): share batch provider scaffolding
|
2026-02-22 21:19:09 +00:00 |
|
Peter Steinberger
|
6ef4eda1f0
|
refactor(memory): share post-json helper across remote fetchers
|
2026-02-22 20:04:51 +00:00 |
|
Peter Steinberger
|
dd8c0b694d
|
perf(test): speed async memory sync close coverage
|
2026-02-22 17:51:38 +00:00 |
|
Vincent Koc
|
9ae08ce205
|
Memory: add Arabic query expansion stop words (#23717)
|
2026-02-22 12:17:47 -05:00 |
|
Peter Steinberger
|
eb041daee2
|
fix(memory): route batch APIs through guarded remote HTTP
|
2026-02-22 18:15:15 +01:00 |
|
Peter Steinberger
|
f87db7c627
|
fix(memory): enforce guarded remote policy for embeddings
|
2026-02-22 18:15:15 +01:00 |
|
Peter Steinberger
|
f6feb4144c
|
refactor(memory): add guarded remote HTTP helper
|
2026-02-22 18:15:15 +01:00 |
|
Peter Steinberger
|
296b19e413
|
test: dedupe gateway browser discord and channel coverage
|
2026-02-22 17:11:54 +00:00 |
|
Peter Steinberger
|
572daed456
|
test: trim duplicate async-search status reopen check
|
2026-02-22 17:06:35 +00:00 |
|
Peter Steinberger
|
c23cdf67d7
|
test: speed up qmd boot retry lock test
|
2026-02-22 17:06:35 +00:00 |
|
Vincent Koc
|
35b162af76
|
Memory: add Spanish and Portuguese query expansion stop words (#23710)
|
2026-02-22 11:26:12 -05:00 |
|
Vincent Koc
|
21cbf59509
|
feat(memory): add Japanese query expansion support for FTS (#23156)
* Memory: add Japanese query expansion support
* Docs/Changelog: credit Japanese FTS update
|
2026-02-22 11:19:20 -05:00 |
|
Vignesh Natarajan
|
99a2f5379e
|
Memory/QMD: normalize Han-script BM25 search queries
|
2026-02-22 01:53:00 -08:00 |
|
Peter Steinberger
|
1e76ca593e
|
test(core): tighten reset usage in auth, registry restart, and memory search
|
2026-02-22 08:34:20 +00:00 |
|
Peter Steinberger
|
8a0a28763e
|
test(core): reduce mock reset overhead across unit and e2e specs
|
2026-02-22 08:22:58 +00:00 |
|