Commit Graph

33454 Commits

Author SHA1 Message Date
VACInc
962b25b4a6 fix: preserve restart continuations after reboot (#63406) (thanks @VACInc)
* gateway: add restart continuation sentinel

* gateway: address restart continuation review

* gateway: handle restart continuation edge cases

* gateway: keep restart continuations on threaded delivery path

* fix(gateway): harden restart continuation routing

* test(gateway): cover restart continuation edge cases

* docs(agent): clarify restart continuation usage

* fix: preserve restart continuations after reboot (#63406) (thanks @VACInc)

---------

Co-authored-by: VACInc <3279061+VACInc@users.noreply.github.com>
Co-authored-by: Ayaan Zaidi <hi@obviy.us>
2026-04-22 20:09:07 +05:30
Garming
a43be09dca fix(doctor): skip token generation for trusted-proxy and none auth modes (#59055)
runGatewayAuthHealth() only excluded 'password' and 'token' (with existing
token) from its needsToken check. When gateway.auth.mode was set to
'trusted-proxy' or 'none', doctor --fix would incorrectly:

1. Flag the config as 'missing a token'
2. Prompt to generate a gateway token
3. Overwrite auth.mode to 'token' in openclaw.json

This silently broke trusted-proxy deployments (common in SaaS/reverse-proxy
setups) by replacing the delegated auth mode with token auth.

The fix aligns runGatewayAuthHealth() with the existing
hasExplicitGatewayInstallAuthMode() in auth-install-policy.ts, which
already correctly returns false for 'password', 'none', and 'trusted-proxy'.

Co-authored-by: wujiaming88 <wujiaming88@example.com>
2026-04-22 22:38:27 +08:00
Peter Steinberger
38135ff6b4 ci: keep cpu-sensitive lanes larger 2026-04-22 15:08:47 +01:00
Peter Steinberger
ba9589256c build: refresh a2ui bundle hash 2026-04-22 15:07:23 +01:00
Peter Steinberger
cdf5f66298 ci: keep long matrix aggregates on blacksmith 2026-04-22 15:00:17 +01:00
Peter Steinberger
0f4ec84a2c fix: fail closed on plugin integrity drift 2026-04-22 14:59:52 +01:00
Peter Steinberger
dc2c3a4920 fix(gateway): harden WS pairing locality 2026-04-22 14:55:58 +01:00
Peter Steinberger
95e430f670 ci: run aggregate checks off blacksmith 2026-04-22 14:53:41 +01:00
Peter Steinberger
fd01a66e30 ci: downsize blacksmith runners 2026-04-22 14:39:20 +01:00
Peter Steinberger
d7ea136384 fix(agent): align pi session tool options 2026-04-22 14:39:20 +01:00
Peter Steinberger
fef830f4cf chore: update dependencies 2026-04-22 14:35:00 +01:00
Peter Steinberger
0d12422418 ci: consolidate test shard fanout 2026-04-22 14:23:43 +01:00
pashpashpash
cd41bd1359 fix(codex): apply GPT-5 prompt overlay (#70175) 2026-04-22 22:00:23 +09:00
cxy
608cfd36f5 fix(qqbot): add interaction intents (#70143)
* feat(qqbot): add intents interaction

* fix(qqbot): add interaction intents (#70143) (thanks @cxyhhhhh)

---------

Co-authored-by: sliverp <870080352@qq.com>
2026-04-22 20:03:33 +08:00
Ayaan Zaidi
4a16cf8008 fix: require cli auth epoch version (#70132) 2026-04-22 17:03:33 +05:30
Ayaan Zaidi
7fd8eeecf2 fix: update cli session changelog (#70132) 2026-04-22 17:03:33 +05:30
Ayaan Zaidi
9ad58ddc7e test(cli): cover oauth auth epoch continuity 2026-04-22 17:03:33 +05:30
Ayaan Zaidi
1ff461fe7b fix(cli): stabilize oauth session auth epochs 2026-04-22 17:03:33 +05:30
Nimrod Gutman
8778521167 fix(plugins): avoid doctor crash on legacy interactive state (#70135)
* fix(plugins): hydrate legacy interactive state

* fix(plugins): avoid doctor crash on legacy interactive state (#70135) (thanks @ngutman)
2026-04-22 14:17:09 +03:00
Nimrod Gutman
cfda375bb6 chore(pi): remove local pr prompts
Remove repo-local /landpr and /reviewpr prompt templates so maintainers use the externally maintained workflow instead.
These flows remain available from the external maintainers repo via globally installed Pi skills and prompts.
2026-04-22 13:38:47 +03:00
Ted Li
13fae1685f fix(config): accept truncateAfterCompaction (#68395)
Merged via squash.

Prepared head SHA: bf45148a75
Co-authored-by: MonkeyLeeT <6754057+MonkeyLeeT@users.noreply.github.com>
Co-authored-by: hxy91819 <8814856+hxy91819@users.noreply.github.com>
Reviewed-by: @hxy91819
2026-04-22 18:31:03 +08:00
Ayaan Zaidi
16f016f07e fix: update cli session changelog (#70106) 2026-04-22 15:35:21 +05:30
Ayaan Zaidi
1e3e077370 fix(gateway): preserve cli session binding metadata 2026-04-22 15:35:21 +05:30
Ayaan Zaidi
7a2203be50 fix(cli): upgrade legacy mcp session reuse 2026-04-22 15:35:21 +05:30
Ayaan Zaidi
18869acf46 fix(cli): keep provider-owned sessions through implicit expiry 2026-04-22 15:35:21 +05:30
Sliverp
e36e0e8ad2 fix: lower the log level from info to debug (#70108) 2026-04-22 17:58:49 +08:00
Jacky
fbdf502e08 place permission under each branch of bot permissions for discord docs (#69218)
Merged via squash.

Prepared head SHA: dd6ae52d90
Co-authored-by: epicseven-cup <59263116+epicseven-cup@users.noreply.github.com>
Co-authored-by: velvet-shark <126378+velvet-shark@users.noreply.github.com>
Reviewed-by: @velvet-shark
2026-04-22 11:49:15 +02:00
pashpashpash
abf940db61 fix(codex): unchain app-server defaults (#70082) 2026-04-22 17:53:49 +09:00
Val Alexander
43a941b51c fix(pair): render /pair qr as media (#70047)
* fix(pair): render pair qr as media

* fix(gateway): preserve media reply threading

* fix(gateway): harden webchat media replies

* fix(plugin-sdk): keep trustedLocalMedia internal

* docs(changelog): note pair qr media fix

* Update CHANGELOG with recent fixes and enhancements

Updated changelog to include recent fixes and enhancements.
2026-04-22 03:31:09 -05:00
Ayaan Zaidi
81ca7bc40b fix: keep claude cli sessions warm (#69679)
* feat(cli): keep claude cli sessions warm

* test(cli): cover claude live session reuse

* fix(cli): harden claude live session reuse

* fix(cli): redact mcp session key logs

* fix(cli): bound claude live session turns

* fix(cli): reuse claude live sessions on resume

* refactor(cli): canonicalize claude live argv

* fix(cli): preserve claude live resume state

* fix(cli): close dead claude live sessions

* fix(cli): serialize claude live session creates

* fix(cli): count pending claude live sessions

* fix(cli): tighten claude live resume abort

* fix(cli): reject closed claude live sessions

* fix(cli): refresh claude live fingerprints

* fix(cli): stabilize MCP resume hash

* fix: preserve claude live inline resume (#69679)

---------

Co-authored-by: Frank Yang <frank.ekn@gmail.com>
2026-04-22 13:44:18 +05:30
Val Alexander
dab46a7e98 qa: harden parity gate execution (#70045) 2026-04-22 03:08:25 -05:00
Peter Steinberger
bee2e0f38f fix: keep custom pi tools executable 2026-04-22 08:52:55 +01:00
Peter Steinberger
4431d6c5d0 fix: harden tokenjuice host typing 2026-04-22 08:52:55 +01:00
Peter Steinberger
d8892ee227 test: harden qa private runtime staging 2026-04-22 08:52:55 +01:00
Peter Steinberger
eb67964239 ci: build private qa parity runtime 2026-04-22 08:52:55 +01:00
Peter Steinberger
dd9adc57c2 test: harden qa parity runtime staging 2026-04-22 08:52:55 +01:00
Peter Steinberger
137f64d0c0 fix: drop stale socket mode opt-in 2026-04-22 08:52:55 +01:00
Peter Steinberger
8bfb4024f6 test: harden qa parity config cleanup 2026-04-22 08:52:55 +01:00
Peter Steinberger
cd088d8a16 ci: build runtime before parity gate 2026-04-22 08:52:55 +01:00
Peter Steinberger
764bb310f7 ci: pin qa parity tool profile 2026-04-22 08:52:55 +01:00
Peter Steinberger
0cd785d8a5 ci: stabilize parity gate runner 2026-04-22 08:52:55 +01:00
Peter Steinberger
895b2690c4 ci: serialize parity gate scenarios 2026-04-22 08:52:55 +01:00
Peter Steinberger
5bb8f5ae8d docs: update changelog for channel health (#69833) (thanks @bek91) 2026-04-22 08:52:55 +01:00
Peter Steinberger
d8d0380297 fix: use transport activity for stale health 2026-04-22 08:52:55 +01:00
Bek
270003aefd fix: clean up slack socket waiters on start hooks 2026-04-22 08:52:55 +01:00
Bek
cd1977bf16 fix: make slack socket health event-driven 2026-04-22 08:52:55 +01:00
Vincent Koc
da86ce7887 feat(openai): add codex device-code auth and fix login options in menu (#69557)
Merged via squash.

Prepared head SHA: 4918ed69f1
Co-authored-by: vincentkoc <25068+vincentkoc@users.noreply.github.com>
Co-authored-by: BunsDev <68980965+BunsDev@users.noreply.github.com>
Reviewed-by: @BunsDev
2026-04-22 02:47:20 -05:00
Dewaldt Huysamen
d4eb236523 fix(release-check): assert bundled plugin runtime deps after packed postinstall (#70035)
* fix(release-check): assert bundled plugin runtime deps after packed postinstall

Release-check already validates source dist/extensions runtime deps are staged, but runPackedBundledChannelEntrySmoke never re-validates after the packed postinstall runs against the installed tarball. That gap is how 2026.4.21 shipped without @whiskeysockets/baileys in dist/extensions/whatsapp/node_modules, because the source staging passed while the installed layout was left broken.

Re-use collectBuiltBundledPluginStagedRuntimeDependencyErrors against the installed packageRoot right after runPackedBundledPluginPostinstall and fail release-check if any declared runtime dependency is missing from the plugin-local node_modules.

* fix(release-check): check postinstalled dep sentinels at packageRoot/node_modules

Codex review on #70035 caught that collectInstalledBundledPluginRuntimeDepErrors was pointing at dist/extensions/<id>/node_modules, but packed postinstall installs and probes sentinels at packageRoot/node_modules (see dependencySentinelPath in scripts/postinstall-bundled-plugins.mjs). The previous implementation would have falsely failed release-check on healthy packed installs while still missing the original WhatsApp regression.

Reuse discoverBundledPluginRuntimeDeps from postinstall-bundled-plugins.mjs so the release guard uses the exact same dep discovery and sentinel paths the packed postinstall uses. Update the test fixtures accordingly so they model the real install layout.
2026-04-22 00:31:40 -07:00
Vincent Koc
55b297ef15 fix(agents): keep mocked OpenAI Responses on HTTP (#69815)
* fix(agents): keep mocked OpenAI responses on HTTP

* docs(changelog): add entry for mocked responses fix
2026-04-22 00:25:02 -07:00
pashpashpash
1dd3fb1611 Fix Codex auth handoff for the app-server harness (#69990)
* Codex: fix auth bridge token shape

* Codex: preserve selected auth tokens

* Codex: prefer selected profile id token

* Codex: honor inherited Codex home

---------

Co-authored-by: Val Alexander <68980965+BunsDev@users.noreply.github.com>
2026-04-22 16:22:29 +09:00