mirror of
https://github.com/openclaw/openclaw.git
synced 2026-05-10 19:20:42 +00:00
The plugin's `catalog.run` hook already exchanged a GitHub OAuth token
for a short-lived Copilot API token and resolved the per-account baseUrl,
but it returned `models: []` and the bundled openclaw runtime relied
entirely on the static manifest catalog. That meant:
- Static `contextWindow` values were a conservative 128k for every
model, far below reality (gpt-5.4/5.5 are 400k, claude-opus-4.6/4.7
internal variants are 1M, claude-sonnet-4 is 200k, etc.).
- Newly published Copilot models (gpt-5.5, gpt-5.1*, gemini-3-pro-preview,
the claude-opus-*-1m internal variants, etc.) didn't appear at all
until the manifest was patched.
- Per-account entitlement was invisible — every user saw the same
hardcoded 22-model list regardless of plan.
Wire it up:
- Add `fetchCopilotModelCatalog` in `extensions/github-copilot/models.ts`.
Calls `${baseUrl}/models` with the resolved Copilot API token and the
same Editor-Version / Copilot-Integration-Id headers used elsewhere in
the plugin. Maps each entry to a `ModelDefinitionConfig`:
- `contextWindow` ← `capabilities.limits.max_context_window_tokens`
- `maxTokens` ← `capabilities.limits.max_output_tokens`
- `input` ← `["text", "image"]` if `supports.vision`, else `["text"]`
- `reasoning` ← `Array.isArray(supports.reasoning_effort) && supports.reasoning_effort.length > 0`
- `api` ← `anthropic-messages` for Anthropic vendor or claude*
ids; otherwise `openai-responses`
Filters out non-chat objects (embeddings) and internal routers
(`accounts/...` ids). Dedupes by id. 10s default timeout.
- Update the `catalog.run` hook in `extensions/github-copilot/index.ts`
to call the new function after token-exchange and return the live
results. On any HTTP/parse failure it falls back to `models: []`,
which preserves the static manifest catalog as the visible fallback —
no behavior regression for users with `discovery.enabled: false` or
in offline scenarios.
- Bump `modelCatalog.discovery."github-copilot"` from `"static"` to
`"refreshable"` in `openclaw.plugin.json` so the catalog hook is
actually invoked at runtime. Without this the discovery infrastructure
treats the provider as static-only and never calls `catalog.run`.
- Add `gpt-5.5` to the static manifest catalog and `DEFAULT_MODEL_IDS`
with the correct values from the API (`contextWindow: 400000`,
`maxTokens: 128000`, `reasoning: true`, multimodal). This means users
on `discovery.enabled: false` still get gpt-5.5 visible without
needing to override `models.providers.github-copilot.models` in their
config.
Tests added (5, all passing alongside the existing 24):
- `fetchCopilotModelCatalog` maps a representative `/models` response
(chat models incl. an internal 1M-context Anthropic variant, a router,
an embedding) to the right `ModelDefinitionConfig` shape with real
context windows.
- baseUrl trailing slash is normalized.
- Duplicate ids in the API response are deduped (first wins).
- Non-2xx HTTP raises so the caller can fall back to the static catalog.
- Empty token / baseUrl reject synchronously without calling fetch.
Targeted run: `pnpm test extensions/github-copilot/models.test.ts` →
29/29 pass. `pnpm exec oxfmt --check extensions/github-copilot/` clean.
`pnpm tsgo:core` clean.
Real-world proof:
Built locally and dropped the resulting tarball into a downstream
container with `gh auth login --hostname github.com` (Copilot
subscription on the linked account). Before this change,
`openclaw models list --provider github-copilot` returned the 22-entry
static catalog with every entry showing 128k context. After this change,
the same command (with `--refresh`) returns 30 entries with API-accurate
context windows including the new gpt-5.1 family, the claude-opus-*-1m
variants, and the corrected `gemini-3*-preview` ids.
Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
455 lines
14 KiB
TypeScript
455 lines
14 KiB
TypeScript
import type { OpenClawConfig } from "openclaw/plugin-sdk/config-types";
|
|
import { resolvePluginConfigObject } from "openclaw/plugin-sdk/plugin-config-runtime";
|
|
import {
|
|
definePluginEntry,
|
|
type ProviderAuthContext,
|
|
type ProviderAuthResult,
|
|
type ProviderAuthMethodNonInteractiveContext,
|
|
} from "openclaw/plugin-sdk/plugin-entry";
|
|
import {
|
|
applyAuthProfileConfig,
|
|
coerceSecretRef,
|
|
ensureAuthProfileStore,
|
|
listProfilesForProvider,
|
|
normalizeOptionalSecretInput,
|
|
resolveDefaultSecretProviderAlias,
|
|
upsertAuthProfileWithLock,
|
|
} from "openclaw/plugin-sdk/provider-auth";
|
|
import { normalizeOptionalLowercaseString } from "openclaw/plugin-sdk/text-runtime";
|
|
import { resolveFirstGithubToken } from "./auth.js";
|
|
import { githubCopilotMemoryEmbeddingProviderAdapter } from "./embeddings.js";
|
|
import {
|
|
PROVIDER_ID,
|
|
fetchCopilotModelCatalog,
|
|
resolveCopilotForwardCompatModel,
|
|
} from "./models.js";
|
|
import { buildGithubCopilotReplayPolicy } from "./replay-policy.js";
|
|
import { wrapCopilotProviderStream } from "./stream.js";
|
|
|
|
const COPILOT_ENV_VARS = ["COPILOT_GITHUB_TOKEN", "GH_TOKEN", "GITHUB_TOKEN"];
|
|
const DEFAULT_COPILOT_MODEL = "github-copilot/claude-opus-4.7";
|
|
const DEFAULT_COPILOT_PROFILE_ID = "github-copilot:github";
|
|
const COPILOT_XHIGH_MODEL_IDS = ["gpt-5.4", "gpt-5.3-codex", "gpt-5.2", "gpt-5.2-codex"] as const;
|
|
|
|
type GithubCopilotPluginConfig = {
|
|
discovery?: {
|
|
enabled?: boolean;
|
|
};
|
|
};
|
|
|
|
async function loadGithubCopilotRuntime() {
|
|
return await import("./register.runtime.js");
|
|
}
|
|
|
|
function applyCopilotDefaultModel(cfg: OpenClawConfig): OpenClawConfig {
|
|
const defaults = cfg.agents?.defaults;
|
|
const existingModel = defaults?.model;
|
|
const existingPrimary =
|
|
typeof existingModel === "string"
|
|
? existingModel.trim()
|
|
: typeof existingModel === "object" && typeof existingModel?.primary === "string"
|
|
? existingModel.primary.trim()
|
|
: "";
|
|
if (existingPrimary) {
|
|
return cfg;
|
|
}
|
|
const fallbacks =
|
|
typeof existingModel === "object" && existingModel !== null && "fallbacks" in existingModel
|
|
? (existingModel as { fallbacks?: string[] }).fallbacks
|
|
: undefined;
|
|
return {
|
|
...cfg,
|
|
agents: {
|
|
...cfg.agents,
|
|
defaults: {
|
|
...defaults,
|
|
model: {
|
|
...(fallbacks ? { fallbacks } : undefined),
|
|
primary: DEFAULT_COPILOT_MODEL,
|
|
},
|
|
models: {
|
|
...defaults?.models,
|
|
[DEFAULT_COPILOT_MODEL]: defaults?.models?.[DEFAULT_COPILOT_MODEL] ?? {},
|
|
},
|
|
},
|
|
},
|
|
};
|
|
}
|
|
|
|
function resolveExistingCopilotTokenProfileId(agentDir?: string): string | undefined {
|
|
const authStore = ensureAuthProfileStore(agentDir, {
|
|
allowKeychainPrompt: false,
|
|
});
|
|
return listProfilesForProvider(authStore, PROVIDER_ID).find((profileId) => {
|
|
const profile = authStore.profiles[profileId];
|
|
if (profile?.type !== "token") {
|
|
return false;
|
|
}
|
|
return Boolean(
|
|
normalizeOptionalSecretInput(profile.token) || coerceSecretRef(profile.tokenRef)?.id.trim(),
|
|
);
|
|
});
|
|
}
|
|
|
|
function resolveExistingCopilotAuthResult(agentDir?: string): ProviderAuthResult | null {
|
|
const profileId = resolveExistingCopilotTokenProfileId(agentDir);
|
|
if (!profileId) {
|
|
return null;
|
|
}
|
|
const authStore = ensureAuthProfileStore(agentDir, {
|
|
allowKeychainPrompt: false,
|
|
});
|
|
const credential = authStore.profiles[profileId];
|
|
if (!credential || credential.type !== "token") {
|
|
return null;
|
|
}
|
|
return {
|
|
profiles: [
|
|
{
|
|
profileId,
|
|
credential,
|
|
},
|
|
],
|
|
defaultModel: DEFAULT_COPILOT_MODEL,
|
|
};
|
|
}
|
|
|
|
async function resolveCopilotNonInteractiveToken(
|
|
ctx: ProviderAuthMethodNonInteractiveContext,
|
|
flagValue: string | undefined,
|
|
) {
|
|
const resolveFromEnvChain = async () => {
|
|
for (const envVar of COPILOT_ENV_VARS) {
|
|
const resolved = await ctx.resolveApiKey({
|
|
provider: PROVIDER_ID,
|
|
flagName: "--github-copilot-token",
|
|
envVar,
|
|
envVarName: envVar,
|
|
allowProfile: false,
|
|
required: false,
|
|
});
|
|
if (resolved) {
|
|
return resolved;
|
|
}
|
|
}
|
|
return null;
|
|
};
|
|
|
|
if (ctx.opts.secretInputMode === "ref") {
|
|
const resolved = await resolveFromEnvChain();
|
|
if (resolved) {
|
|
return resolved;
|
|
}
|
|
if (flagValue) {
|
|
ctx.runtime.error(
|
|
[
|
|
"--github-copilot-token cannot be used with --secret-input-mode ref unless COPILOT_GITHUB_TOKEN, GH_TOKEN, or GITHUB_TOKEN is set in env.",
|
|
"Set one of those env vars and omit --github-copilot-token, or use --secret-input-mode plaintext.",
|
|
].join("\n"),
|
|
);
|
|
ctx.runtime.exit(1);
|
|
}
|
|
return null;
|
|
}
|
|
|
|
const primary = await ctx.resolveApiKey({
|
|
provider: PROVIDER_ID,
|
|
flagValue,
|
|
flagName: "--github-copilot-token",
|
|
envVar: COPILOT_ENV_VARS[0],
|
|
envVarName: COPILOT_ENV_VARS[0],
|
|
allowProfile: false,
|
|
required: false,
|
|
});
|
|
if (primary || flagValue) {
|
|
return primary;
|
|
}
|
|
|
|
for (const envVar of COPILOT_ENV_VARS.slice(1)) {
|
|
const resolved = await ctx.resolveApiKey({
|
|
provider: PROVIDER_ID,
|
|
flagName: "--github-copilot-token",
|
|
envVar,
|
|
envVarName: envVar,
|
|
allowProfile: false,
|
|
required: false,
|
|
});
|
|
if (resolved) {
|
|
return resolved;
|
|
}
|
|
}
|
|
return null;
|
|
}
|
|
|
|
async function runGitHubCopilotNonInteractiveAuth(
|
|
ctx: ProviderAuthMethodNonInteractiveContext,
|
|
): Promise<OpenClawConfig | null> {
|
|
const opts = ctx.opts as Record<string, unknown> | undefined;
|
|
const flagValue = normalizeOptionalSecretInput(opts?.githubCopilotToken);
|
|
const resolved = await resolveCopilotNonInteractiveToken(ctx, flagValue);
|
|
|
|
let profileId = DEFAULT_COPILOT_PROFILE_ID;
|
|
if (resolved) {
|
|
const useTokenRef = ctx.opts.secretInputMode === "ref" && resolved.source === "env";
|
|
if (useTokenRef && !resolved.envVarName) {
|
|
ctx.runtime.error(
|
|
[
|
|
'--secret-input-mode ref requires an explicit environment variable for provider "github-copilot".',
|
|
"Set COPILOT_GITHUB_TOKEN in env and retry, or use --secret-input-mode plaintext.",
|
|
].join("\n"),
|
|
);
|
|
ctx.runtime.exit(1);
|
|
return null;
|
|
}
|
|
await upsertAuthProfileWithLock({
|
|
profileId,
|
|
credential: {
|
|
type: "token",
|
|
provider: PROVIDER_ID,
|
|
...(useTokenRef
|
|
? {
|
|
tokenRef: {
|
|
source: "env",
|
|
provider: resolveDefaultSecretProviderAlias(ctx.baseConfig, "env", {
|
|
preferFirstProviderForSource: true,
|
|
}),
|
|
id: resolved.envVarName!,
|
|
},
|
|
}
|
|
: { token: resolved.key }),
|
|
},
|
|
agentDir: ctx.agentDir,
|
|
});
|
|
} else {
|
|
if (flagValue && ctx.opts.secretInputMode === "ref") {
|
|
return null;
|
|
}
|
|
const existingProfileId = resolveExistingCopilotTokenProfileId(ctx.agentDir);
|
|
if (!existingProfileId) {
|
|
ctx.runtime.error(
|
|
"Missing --github-copilot-token (or COPILOT_GITHUB_TOKEN / GH_TOKEN / GITHUB_TOKEN env var) for --auth-choice github-copilot.",
|
|
);
|
|
ctx.runtime.exit(1);
|
|
return null;
|
|
}
|
|
profileId = existingProfileId;
|
|
}
|
|
|
|
return applyCopilotDefaultModel(
|
|
applyAuthProfileConfig(ctx.config, {
|
|
profileId,
|
|
provider: PROVIDER_ID,
|
|
mode: "token",
|
|
}),
|
|
);
|
|
}
|
|
|
|
export default definePluginEntry({
|
|
id: "github-copilot",
|
|
name: "GitHub Copilot Provider",
|
|
description: "Bundled GitHub Copilot provider plugin",
|
|
register(api) {
|
|
const startupPluginConfig = (api.pluginConfig ?? {}) as GithubCopilotPluginConfig;
|
|
|
|
function resolveCurrentPluginConfig(config?: OpenClawConfig): GithubCopilotPluginConfig {
|
|
const runtimePluginConfig = resolvePluginConfigObject(config, "github-copilot");
|
|
if (runtimePluginConfig) {
|
|
return runtimePluginConfig as GithubCopilotPluginConfig;
|
|
}
|
|
return config ? {} : startupPluginConfig;
|
|
}
|
|
|
|
async function runGitHubCopilotAuth(ctx: ProviderAuthContext) {
|
|
const existing = resolveExistingCopilotAuthResult(ctx.agentDir);
|
|
if (existing) {
|
|
const runLogin = await ctx.prompter.confirm({
|
|
message: "GitHub Copilot auth already exists. Re-run login?",
|
|
initialValue: false,
|
|
});
|
|
if (!runLogin) {
|
|
return existing;
|
|
}
|
|
}
|
|
|
|
await ctx.prompter.note(
|
|
[
|
|
"This will open a GitHub device login to authorize Copilot.",
|
|
"Requires an active GitHub Copilot subscription.",
|
|
].join("\n"),
|
|
"GitHub Copilot",
|
|
);
|
|
|
|
const { runGitHubCopilotDeviceFlow } = await import("./login.js");
|
|
|
|
const result = await runGitHubCopilotDeviceFlow({
|
|
showCode: async ({ verificationUrl, userCode, expiresInMs }) => {
|
|
const expiresInMinutes = Math.max(1, Math.round(expiresInMs / 60_000));
|
|
await ctx.prompter.note(
|
|
[
|
|
"Open this URL in your browser and enter the code below.",
|
|
`URL: ${verificationUrl}`,
|
|
`Code: ${userCode}`,
|
|
`Code expires in ${expiresInMinutes} minutes. Never share it.`,
|
|
"",
|
|
"If a browser does not open automatically after you continue, copy the URL manually.",
|
|
].join("\n"),
|
|
"Authorize GitHub Copilot",
|
|
);
|
|
},
|
|
openUrl: async (url) => {
|
|
await ctx.openUrl(url);
|
|
},
|
|
});
|
|
|
|
if (result.status === "access_denied") {
|
|
await ctx.prompter.note("GitHub Copilot login was cancelled.", "GitHub Copilot");
|
|
return { profiles: [] };
|
|
}
|
|
|
|
if (result.status === "expired") {
|
|
await ctx.prompter.note(
|
|
"The GitHub device code expired. Retry login to get a new code.",
|
|
"GitHub Copilot",
|
|
);
|
|
return { profiles: [] };
|
|
}
|
|
|
|
return {
|
|
profiles: [
|
|
{
|
|
profileId: DEFAULT_COPILOT_PROFILE_ID,
|
|
credential: {
|
|
type: "token" as const,
|
|
provider: PROVIDER_ID,
|
|
token: result.accessToken,
|
|
},
|
|
},
|
|
],
|
|
defaultModel: DEFAULT_COPILOT_MODEL,
|
|
};
|
|
}
|
|
|
|
api.registerMemoryEmbeddingProvider(githubCopilotMemoryEmbeddingProviderAdapter);
|
|
|
|
api.registerProvider({
|
|
id: PROVIDER_ID,
|
|
label: "GitHub Copilot",
|
|
docsPath: "/providers/models",
|
|
envVars: COPILOT_ENV_VARS,
|
|
auth: [
|
|
{
|
|
id: "device",
|
|
label: "GitHub device login",
|
|
hint: "Browser device-code flow",
|
|
kind: "device_code",
|
|
run: async (ctx) => await runGitHubCopilotAuth(ctx),
|
|
runNonInteractive: async (ctx) => await runGitHubCopilotNonInteractiveAuth(ctx),
|
|
},
|
|
],
|
|
wizard: {
|
|
setup: {
|
|
choiceId: "github-copilot",
|
|
choiceLabel: "GitHub Copilot",
|
|
choiceHint: "Device login with your GitHub account",
|
|
methodId: "device",
|
|
modelSelection: {
|
|
promptWhenAuthChoiceProvided: true,
|
|
},
|
|
},
|
|
},
|
|
catalog: {
|
|
order: "late",
|
|
run: async (ctx) => {
|
|
const pluginConfig = resolveCurrentPluginConfig(ctx.config);
|
|
const discoveryEnabled =
|
|
pluginConfig.discovery?.enabled ?? ctx.config?.models?.copilotDiscovery?.enabled;
|
|
if (discoveryEnabled === false) {
|
|
return null;
|
|
}
|
|
const { DEFAULT_COPILOT_API_BASE_URL, resolveCopilotApiToken } =
|
|
await loadGithubCopilotRuntime();
|
|
const { githubToken, hasProfile } = await resolveFirstGithubToken({
|
|
agentDir: ctx.agentDir,
|
|
config: ctx.config,
|
|
env: ctx.env,
|
|
});
|
|
if (!hasProfile && !githubToken) {
|
|
return null;
|
|
}
|
|
let baseUrl = DEFAULT_COPILOT_API_BASE_URL;
|
|
let copilotApiToken: string | undefined;
|
|
if (githubToken) {
|
|
try {
|
|
const token = await resolveCopilotApiToken({
|
|
githubToken,
|
|
env: ctx.env,
|
|
});
|
|
baseUrl = token.baseUrl;
|
|
copilotApiToken = token.token;
|
|
} catch {
|
|
baseUrl = DEFAULT_COPILOT_API_BASE_URL;
|
|
}
|
|
}
|
|
// Try to fetch the live model catalog from Copilot's /models
|
|
// endpoint so the runtime tracks per-account entitlements and
|
|
// accurate context windows (max_context_window_tokens) without
|
|
// manifest churn. On any failure we return an empty model list,
|
|
// which lets the static manifest catalog continue to be the
|
|
// visible fallback for users.
|
|
let discoveredModels: Awaited<ReturnType<typeof fetchCopilotModelCatalog>> = [];
|
|
if (copilotApiToken) {
|
|
try {
|
|
discoveredModels = await fetchCopilotModelCatalog({
|
|
copilotApiToken,
|
|
baseUrl,
|
|
});
|
|
} catch {
|
|
discoveredModels = [];
|
|
}
|
|
}
|
|
return {
|
|
provider: {
|
|
baseUrl,
|
|
models: discoveredModels,
|
|
},
|
|
};
|
|
},
|
|
},
|
|
resolveDynamicModel: (ctx) => resolveCopilotForwardCompatModel(ctx),
|
|
wrapStreamFn: wrapCopilotProviderStream,
|
|
buildReplayPolicy: ({ modelId }) => buildGithubCopilotReplayPolicy(modelId),
|
|
resolveThinkingProfile: ({ modelId }) => ({
|
|
levels: [
|
|
{ id: "off" },
|
|
{ id: "minimal" },
|
|
{ id: "low" },
|
|
{ id: "medium" },
|
|
{ id: "high" },
|
|
...(COPILOT_XHIGH_MODEL_IDS.includes(
|
|
(normalizeOptionalLowercaseString(modelId) ?? "") as never,
|
|
)
|
|
? [{ id: "xhigh" as const }]
|
|
: []),
|
|
],
|
|
}),
|
|
prepareRuntimeAuth: async (ctx) => {
|
|
const { resolveCopilotApiToken } = await loadGithubCopilotRuntime();
|
|
const token = await resolveCopilotApiToken({
|
|
githubToken: ctx.apiKey,
|
|
env: ctx.env,
|
|
});
|
|
return {
|
|
apiKey: token.token,
|
|
baseUrl: token.baseUrl,
|
|
expiresAt: token.expiresAt,
|
|
};
|
|
},
|
|
resolveUsageAuth: async (ctx) => await ctx.resolveOAuthToken(),
|
|
fetchUsageSnapshot: async (ctx) => {
|
|
const { fetchCopilotUsage } = await loadGithubCopilotRuntime();
|
|
return await fetchCopilotUsage(ctx.token, ctx.timeoutMs, ctx.fetchFn);
|
|
},
|
|
});
|
|
},
|
|
});
|