mirror of
https://github.com/openclaw/openclaw.git
synced 2026-03-19 05:50:47 +00:00
- Add full frontmatter (title, summary, read_when) to 4 files that had none: auth-credential-semantics.md, kilo-gateway-integration.md, CONTRIBUTING-THREAT-MODEL.md, THREAT-MODEL-ATLAS.md - Add missing title field to 3 provider docs: kilocode.md, litellm.md, together.md Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
1.7 KiB
1.7 KiB
title, summary, read_when
| title | summary | read_when | ||
|---|---|---|---|---|
| Auth Credential Semantics | Canonical credential eligibility and resolution semantics for auth profiles |
|
Auth Credential Semantics
This document defines the canonical credential eligibility and resolution semantics used across:
resolveAuthProfileOrderresolveApiKeyForProfilemodels status --probedoctor-auth
The goal is to keep selection-time and runtime behavior aligned.
Stable Reason Codes
okmissing_credentialinvalid_expiresexpiredunresolved_ref
Token Credentials
Token credentials (type: "token") support inline token and/or tokenRef.
Eligibility rules
- A token profile is ineligible when both
tokenandtokenRefare absent. expiresis optional.- If
expiresis present, it must be a finite number greater than0. - If
expiresis invalid (NaN,0, negative, non-finite, or wrong type), the profile is ineligible withinvalid_expires. - If
expiresis in the past, the profile is ineligible withexpired. tokenRefdoes not bypassexpiresvalidation.
Resolution rules
- Resolver semantics match eligibility semantics for
expires. - For eligible profiles, token material may be resolved from inline value or
tokenRef. - Unresolvable refs produce
unresolved_refinmodels status --probeoutput.
Legacy-Compatible Messaging
For script compatibility, probe errors keep this first line unchanged:
Auth profile credentials are missing or expired.
Human-friendly detail and stable reason codes may be added on subsequent lines.