Commit Graph

38324 Commits

Author SHA1 Message Date
Peter Steinberger
e46dccb353 fix(discord): clarify command deploy rate-limit logs 2026-04-29 17:19:40 +01:00
Peter Steinberger
7471c2116f ci: use smaller runners for native live shards 2026-04-29 17:16:26 +01:00
Peter Steinberger
8cf724a381 fix(plugins): simplify bundled runtime deps staging
* fix(plugins): simplify bundled runtime deps staging

* refactor(plugins): declare bundled root runtime deps

* fix(plugins): isolate pnpm runtime dependency installs

* test(gateway): wait for deferred agent routing calls in server suite

* test(ci): follow extracted update-channel assertions

* fix(plugins): bypass pnpm age gate for bundled runtime deps

* test: drop stale rebase leftovers

* test: preserve mirrored root dependency drift guard

* test: stage mirrored deps in facade fixtures

* fix(plugin-sdk): expose provider setup metadata

* test(plugin-sdk): satisfy spread lint in facade deps fixture

* refactor(plugins): share bundled runtime deps install flow

* fix(plugins): finish runtime deps rebase cleanup

* fix(plugins): remove stale mirror import

* refactor(plugins): centralize bundled runtime root preparation

* fix(plugins): skip Windows pnpm cmd shims

* refactor(plugins): let package managers own runtime deps staging

* fix(plugins): validate staged runtime deps

* fix(plugins): preserve lazy runtime deps fallback
2026-04-29 17:04:56 +01:00
Peter Steinberger
86f473d8b9 ci: isolate moonshot live shard 2026-04-29 17:03:48 +01:00
Cathryn Lavery
763a88083e fix(gateway): persist hidden lifecycle session keys (#74442)
* Prevent hidden channel lifecycle runs from staying stuck as running

Hidden channel-routed runs were dropping session keys on lifecycle events at
our shared agent-event bus. Gateway lifecycle persistence then had to rely on
run-context lookup surviving until the terminal event, which is unnecessarily
fragile for the exact sessions that are intentionally hidden from Control UI.

This keeps session keys on hidden lifecycle events only, preserving the existing
privacy boundary for assistant/tool traffic while making terminal session-state
persistence explicit and test-covered.

Constraint: Hidden channel runs must stay out of Control UI chat/tool streams
Rejected: Broaden sessionKey preservation to every hidden event | would expose more hidden traffic than needed
Confidence: medium
Scope-risk: narrow
Reversibility: clean
Directive: If hidden-run event redaction changes again, keep lifecycle persistence independent from ephemeral run-context lookup
Tested: pnpm exec oxfmt --check --threads=1 CHANGELOG.md src/infra/agent-events.ts src/infra/agent-events.test.ts; pnpm tsgo:core; pnpm tsgo:extensions; pnpm tsgo:core:test; pnpm tsgo:extensions:test; pnpm test src/infra/agent-events.test.ts; pnpm test src/gateway/server-chat.agent-events.test.ts; pnpm test src/gateway/session-lifecycle-state.test.ts; pnpm lint:extensions:bundled; codex exec review returned ship it
Not-tested: Live gateway reproduction against Knox's local stuck-session install

* Clarify hidden lifecycle redaction and cover context fallback

The follow-up review asked for two things: document why the separate error
stream stays redacted for hidden runs, and cover the registered-context fallback
branch for hidden lifecycle events when callers omit sessionKey.

Constraint: Hidden assistant/tool/error diagnostics must remain redacted from Control UI
Rejected: Preserve sessionKey on the generic error stream | terminal persistence already flows through lifecycle phase:error, so widening the visible identity surface is unnecessary
Confidence: high
Scope-risk: narrow
Reversibility: clean
Directive: Keep hidden-run identity exceptions tightly scoped to terminal lifecycle persistence unless a concrete downstream consumer requires more
Tested: pnpm exec oxfmt --write --threads=1 src/infra/agent-events.ts src/infra/agent-events.test.ts; pnpm test src/infra/agent-events.test.ts; pnpm test src/gateway/server-chat.agent-events.test.ts; pnpm test src/gateway/session-lifecycle-state.test.ts
Not-tested: Full repo gate rerun; previous branch-wide gates remain from the parent PR commit

* fix(gateway): keep hidden agent broadcasts redacted

---------

Co-authored-by: Peter Steinberger <steipete@gmail.com>
2026-04-29 17:03:10 +01:00
Peter Steinberger
58db3d2d22 perf(test): trim media runner import cost 2026-04-29 16:59:42 +01:00
Peter Steinberger
e8b82d1cf9 refactor(discord): split component auth helpers 2026-04-29 16:56:17 +01:00
Peter Steinberger
334f4624e0 ci: avoid blacksmith for release setup jobs 2026-04-29 16:55:08 +01:00
Peter Steinberger
61d53f98d3 fix(cron): clean up timed out agent runs 2026-04-29 16:54:22 +01:00
Devin Robison
c1a42dce86 fix: enforce focus subagent scope (#73613)
* fix: enforce focus subagent scope

* docs: add changelog for focus scope fix
2026-04-29 09:54:09 -06:00
Peter Steinberger
b48f6ca1fc fix(ui): bind dashboard breadcrumb handler 2026-04-29 16:54:05 +01:00
Peter Steinberger
8d63ddce69 fix: harden runtime deps lock owner identity 2026-04-29 16:54:05 +01:00
Jim Smith
2d885a2402 fix(plugins): disambiguate runtime-deps lock owners by process start-time
`shouldRemoveRuntimeDepsLock` previously trusted `isAlive(owner.pid)`
alone when deciding whether a lock could be reclaimed. That works fine
on a normal host: when the writer dies the PID is gone and `isAlive`
returns false. Inside Docker it does not — every Node gateway process
runs as PID 1 (or PID 7 with `init: true`) in its container PID
namespace, so a stale lock left behind by a previous incarnation looks
"alive" to the new one. The 5-minute lock-wait timeout then fires and
the supervisor restarts, and the cycle repeats indefinitely. Operators
have to manually remove `.openclaw-runtime-deps.lock` to recover.

This change records `pidStartTimeMs` alongside `pid` and `createdAtMs`
when the lock is acquired, and consults it in the staleness check.
When both sides have start-time evidence and they disagree, the lock
is treated as stale; otherwise the existing PID-alive-means-fresh
behavior is preserved exactly. The capture point uses
`Date.now() - process.uptime() * 1000` once at module load, and the
read side uses `/proc/<pid>/stat` field 22 on Linux (returning null
elsewhere so legacy semantics still apply on macOS/Windows hosts).

This is strictly additive on the wire format and the predicate:
existing lock files without `pidStartTimeMs` continue to take the same
code path they did before, and platforms that cannot resolve a live
PID's start-time fall back to the same legacy behavior.

Refs #74346.
2026-04-29 16:54:05 +01:00
Peter Steinberger
3f0039e2ea fix(memory-wiki): reduce people wiki search noise 2026-04-29 16:52:48 +01:00
Peter Steinberger
c99d680714 ci: run release orchestration on github runners 2026-04-29 16:49:13 +01:00
Peter Steinberger
616f24fd49 refactor(gateway): consolidate lifecycle lazy boundary (#74105)
* refactor(gateway): consolidate lifecycle lazy boundary

* test(gateway): cover quoted lifecycle imports
2026-04-29 16:45:51 +01:00
Peter Steinberger
53e0874864 fix(models): satisfy params merge lint 2026-04-29 16:41:56 +01:00
Peter Steinberger
e8d23e5489 ci: cancel superseded release validation runs 2026-04-29 16:41:26 +01:00
Peter Steinberger
acae48b790 docs: document clawsweeper review findings 2026-04-29 16:40:19 +01:00
Peter Steinberger
240362bf6d fix: keep Discord runtime policy API export 2026-04-29 16:35:37 +01:00
Peter Steinberger
9fcae8458e fix: accept channel lastConnectedAt health snapshots 2026-04-29 16:35:37 +01:00
Peter Steinberger
8cbf77d997 chore: remove unused Discord runtime policy shim 2026-04-29 16:35:37 +01:00
Peter Steinberger
7acb78852f fix: keep Discord DM wildcard out of owner checks 2026-04-29 16:35:37 +01:00
Peter Steinberger
04f651b783 fix: preserve Slack DM access account lookup 2026-04-29 16:35:37 +01:00
Peter Steinberger
1d9959b77e fix: preserve DM access precedence in Slack runtime 2026-04-29 16:35:37 +01:00
Peter Steinberger
e6d72548b7 refactor: add shared channel DM access helpers 2026-04-29 16:35:37 +01:00
Peter Steinberger
8c68e7535f refactor: centralize channel DM access resolution 2026-04-29 16:35:37 +01:00
Peter Steinberger
606c881d27 test: stabilize release live e2e probes 2026-04-29 16:32:05 +01:00
Peter Steinberger
46171d7848 fix(models): merge legacy openrouter params 2026-04-29 16:32:05 +01:00
Peter Steinberger
e49703def6 fix(channels): preserve account status generic 2026-04-29 16:30:03 +01:00
Peter Steinberger
4dd2768c4b fix(channels): improve health metadata and reply diagnostics 2026-04-29 16:27:24 +01:00
Val Alexander
1390eadd92 fix(control-ui): link dashboard breadcrumb
Make the topbar OpenClaw breadcrumb a semantic Overview link, wire the existing navigate event at the app shell, and preserve prefixed Control UI base paths.\n\nValidation:\n- pnpm test ui/src/ui/navigation.browser.test.ts\n- pnpm exec oxfmt --check --threads=1 ui/src/ui/components/dashboard-header.ts ui/src/ui/app-render.ts ui/src/ui/navigation.browser.test.ts\n- git diff --check origin/main...HEAD
2026-04-29 10:27:10 -05:00
Peter Steinberger
a2cf05c4fb docs: complete clawsweeper skill commands 2026-04-29 16:26:28 +01:00
Peter Steinberger
c6b269154a docs: document clawsweeper re-review mention 2026-04-29 16:22:49 +01:00
Peter Steinberger
508cd6f805 fix(discord): remove stale component policy helper 2026-04-29 16:20:19 +01:00
Peter Steinberger
dc5a85d606 test(ci): align package artifact reuse assertion 2026-04-29 16:15:13 +01:00
Peter Steinberger
8935dd154a refactor(discord): simplify gateway and component wiring 2026-04-29 16:14:55 +01:00
Shakker
a0300378d6 docs: note openai model list manifest path 2026-04-29 16:07:33 +01:00
Shakker
2b4909e2db perf: move openai model list catalog to manifest 2026-04-29 16:07:33 +01:00
Peter Steinberger
2d53b49b20 ci: use same-run release package artifacts 2026-04-29 16:06:02 +01:00
Peter Steinberger
995aa4f428 fix(ci): restore package validation coverage 2026-04-29 16:05:20 +01:00
Peter Steinberger
b92d145252 fix(ci): repair discord route and health fixtures 2026-04-29 15:58:56 +01:00
Peter Steinberger
beff88175e ci: run release orchestration on blacksmith 2026-04-29 15:58:00 +01:00
Peter Steinberger
ca093d8402 ci: speed up package tarball validation 2026-04-29 15:56:08 +01:00
Peter Steinberger
204ef7f1c4 fix(telegram): report webhook registration status 2026-04-29 15:40:44 +01:00
Mason Huang
7108414009 ci: add codeql quality profile input (#74348)
* ci: add codeql quality profile input

* ci: gate codeql quality profiles

* ci: ignore spec files in codeql shard
2026-04-29 22:39:54 +08:00
Peter Steinberger
587b537b47 refactor(discord): simplify internal component wiring 2026-04-29 15:37:09 +01:00
Jesse Merhi
542821cd1e docs(security): clarify proxy SSRF reporting scope (#74338)
Merged via squash.

Prepared head SHA: 7dd9fcfade
Co-authored-by: jesse-merhi <79823012+jesse-merhi@users.noreply.github.com>
Co-authored-by: jesse-merhi <79823012+jesse-merhi@users.noreply.github.com>
Reviewed-by: @jesse-merhi
2026-04-30 00:30:16 +10:00
Peter Steinberger
b7db63751b perf(agents): cache subagent registry reads 2026-04-29 15:25:21 +01:00
Peter Steinberger
34d11d5757 fix(gateway): recognize Windows gateway listeners via PowerShell 2026-04-29 15:25:03 +01:00