mirror of
https://github.com/openclaw/openclaw.git
synced 2026-05-06 07:50:43 +00:00
112 lines
5.8 KiB
Markdown
112 lines
5.8 KiB
Markdown
---
|
|
summary: "Operator roles, scopes, and approval-time checks for Gateway clients"
|
|
read_when:
|
|
- Debugging missing operator scope errors
|
|
- Reviewing device or node pairing approvals
|
|
- Adding or classifying Gateway RPC methods
|
|
title: "Operator scopes"
|
|
---
|
|
|
|
Operator scopes define what a Gateway client may do after it authenticates.
|
|
They are a control-plane guardrail inside one trusted Gateway operator domain,
|
|
not hostile multi-tenant isolation. If you need strong separation between
|
|
people, teams, or machines, run separate Gateways under separate OS users or
|
|
hosts.
|
|
|
|
Related: [Security](/gateway/security), [Gateway protocol](/gateway/protocol),
|
|
[Gateway pairing](/gateway/pairing), [Devices CLI](/cli/devices).
|
|
|
|
## Roles
|
|
|
|
Gateway WebSocket clients connect with one role:
|
|
|
|
- `operator`: control-plane clients such as CLI, Control UI, automation, and
|
|
trusted helper processes.
|
|
- `node`: capability hosts such as macOS, iOS, Android, or headless nodes that
|
|
expose commands through `node.invoke`.
|
|
|
|
Operator RPC methods require the `operator` role. Node-originated methods
|
|
require the `node` role.
|
|
|
|
## Scope levels
|
|
|
|
| Scope | Meaning |
|
|
| ----------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
|
|
| `operator.read` | Read-only status, lists, catalog, logs, session reads, and other non-mutating control-plane calls. |
|
|
| `operator.write` | Normal mutating operator actions such as sending messages, invoking tools, updating talk/voice settings, and node command relay. Also satisfies `operator.read`. |
|
|
| `operator.admin` | Administrative control-plane access. Satisfies every `operator.*` scope. Required for config mutation, updates, native hooks, sensitive reserved namespaces, and high-risk approvals. |
|
|
| `operator.pairing` | Device and node pairing management, including listing, approving, rejecting, removing, rotating, and revoking pairing records or device tokens. |
|
|
| `operator.approvals` | Exec and plugin approval APIs. |
|
|
| `operator.talk.secrets` | Reading Talk configuration with secrets included. |
|
|
|
|
Unknown future `operator.*` scopes require an exact match unless the caller has
|
|
`operator.admin`.
|
|
|
|
## Method scope is only the first gate
|
|
|
|
Each Gateway RPC has a least-privilege method scope. That method scope decides
|
|
whether the request can reach the handler. Some handlers then apply stricter
|
|
approval-time checks based on the concrete thing being approved or mutated.
|
|
|
|
Examples:
|
|
|
|
- `device.pair.approve` is reachable with `operator.pairing`, but approving an
|
|
operator device can only mint or preserve scopes the caller already holds.
|
|
- `node.pair.approve` is reachable with `operator.pairing`, then derives extra
|
|
approval scopes from the pending node command list.
|
|
- `chat.send` is normally a write-scoped method, but persistent `/config set`
|
|
and `/config unset` require `operator.admin` at command level.
|
|
|
|
This lets lower-scope operators perform low-risk pairing actions without making
|
|
all pairing approval admin-only.
|
|
|
|
## Device pairing approvals
|
|
|
|
Device pairing records are the durable source of approved roles and scopes.
|
|
Already paired devices do not get broader access silently: reconnects that ask
|
|
for a broader role or broader scopes create a new pending upgrade request.
|
|
|
|
When approving a device request:
|
|
|
|
- A request with no operator role does not need operator token scope approval.
|
|
- A request for `operator.read`, `operator.write`, `operator.approvals`,
|
|
`operator.pairing`, or `operator.talk.secrets` requires the caller to hold
|
|
those scopes, or `operator.admin`.
|
|
- A request for `operator.admin` requires `operator.admin`.
|
|
- A repair request with no explicit scopes can inherit the existing operator
|
|
token scopes. If that existing token is admin-scoped, approval still requires
|
|
`operator.admin`.
|
|
|
|
For paired-device token sessions, management is self-scoped unless the caller
|
|
also has `operator.admin`: non-admin callers see only their own pairing entries,
|
|
can approve or reject only their own pending request, and can rotate, revoke, or
|
|
remove only their own device entry.
|
|
|
|
## Node pairing approvals
|
|
|
|
Legacy `node.pair.*` uses a separate Gateway-owned node pairing store. WS nodes
|
|
use device pairing with `role: node`, but the same approval-level vocabulary
|
|
applies.
|
|
|
|
`node.pair.approve` uses the pending request command list to derive additional
|
|
required scopes:
|
|
|
|
- Commandless request: `operator.pairing`
|
|
- Non-exec node commands: `operator.pairing` + `operator.write`
|
|
- `system.run`, `system.run.prepare`, or `system.which`:
|
|
`operator.pairing` + `operator.admin`
|
|
|
|
Node pairing establishes identity and trust. It does not replace the node's
|
|
own `system.run` exec approval policy.
|
|
|
|
## Shared-secret auth
|
|
|
|
Shared gateway token/password auth is treated as trusted operator access for
|
|
that Gateway. OpenAI-compatible HTTP surfaces and `/tools/invoke` restore the
|
|
normal full operator default scope set for shared-secret bearer auth, even if a
|
|
caller sends narrower declared scopes.
|
|
|
|
Identity-bearing modes, such as trusted proxy auth or private-ingress `none`,
|
|
can still honor explicit declared scopes. Use separate Gateways for real trust
|
|
boundary separation.
|