mirror of
https://github.com/openclaw/openclaw.git
synced 2026-05-18 12:54:47 +00:00
* refactor: remove stale file-backed shims * fix: harden sqlite state ci boundaries * refactor: store matrix idb snapshots in sqlite * fix: satisfy rebased CI guardrails * refactor: store current conversation bindings in sqlite table * refactor: store tui last sessions in sqlite table * refactor: reset sqlite schema history * refactor: drop unshipped sqlite table migration * refactor: remove plugin index file rollback * refactor: drop unshipped sqlite sidecar migrations * refactor: remove runtime commitments kv migration * refactor: preserve kysely sync result types * refactor: drop unshipped sqlite schema migration table * test: keep session usage coverage sqlite-backed * refactor: keep sqlite migration doctor-only * refactor: isolate device legacy imports * refactor: isolate push voicewake legacy imports * refactor: isolate remaining runtime legacy imports * refactor: tighten sqlite migration guardrails * test: cover sqlite persisted enum parsing * refactor: isolate legacy update and tui imports * refactor: tighten sqlite state ownership * refactor: move legacy imports behind doctor * refactor: remove legacy session row lookup * refactor: canonicalize memory transcript locators * refactor: drop transcript path scope fallbacks * refactor: drop runtime legacy session delivery pruning * refactor: store tts prefs only in sqlite * refactor: remove cron store path runtime * refactor: use cron sqlite store keys * refactor: rename telegram message cache scope * refactor: read memory dreaming status from sqlite * refactor: rename cron status store key * refactor: stop remembering transcript file paths * test: use sqlite locators in agent fixtures * refactor: remove file-shaped commitments and cron store surfaces * refactor: keep compaction transcript handles out of session rows * refactor: derive transcript handles from session identity * refactor: derive runtime transcript handles * refactor: remove gateway session locator reads * refactor: remove transcript locator from session rows * refactor: store raw stream diagnostics in sqlite * refactor: remove file-shaped transcript rotation * refactor: hide legacy trajectory paths from runtime * refactor: remove runtime transcript file bridges * refactor: repair database-first rebase fallout * refactor: align tests with database-first state * refactor: remove transcript file handoffs * refactor: sync post-compaction memory by transcript scope * refactor: run codex app-server sessions by id * refactor: bind codex runtime state by session id * refactor: pass memory transcripts by sqlite scope * refactor: remove transcript locator cleanup leftovers * test: remove stale transcript file fixtures * refactor: remove transcript locator test helper * test: make cron sqlite keys explicit * test: remove cron runtime store paths * test: remove stale session file fixtures * test: use sqlite cron keys in diagnostics * refactor: remove runtime delivery queue backfill * test: drop fake export session file mocks * refactor: rename acp session read failure flag * refactor: rename acp row session key * refactor: remove session store test seams * refactor: move legacy session parser tests to doctor * refactor: reindex managed memory in place * refactor: drop stale session store wording * refactor: rename session row helpers * refactor: rename sqlite session entry modules * refactor: remove transcript locator leftovers * refactor: trim file-era audit wording * refactor: clean managed media through sqlite * fix: prefer explicit agent for exports * fix: use prepared agent for session resets * fix: canonicalize legacy codex binding import * test: rename state cleanup helper * docs: align backup docs with sqlite state * refactor: drop legacy Pi usage auth fallback * refactor: move legacy auth profile imports to doctor * refactor: keep Pi model discovery auth in memory * refactor: remove MSTeams legacy learning key fallback * refactor: store model catalog config in sqlite * refactor: use sqlite model catalog at runtime * refactor: remove model json compatibility aliases * refactor: store auth profiles in sqlite * refactor: seed copied auth profiles in sqlite * refactor: make auth profile runtime sqlite-addressed * refactor: migrate hermes secrets into sqlite auth store * refactor: move plugin install config migration to doctor * refactor: rename plugin index audit checks * test: drop auth file assumptions * test: remove legacy transcript file assertions * refactor: drop legacy cli session aliases * refactor: store skill uploads in sqlite * refactor: keep subagent attachments in sqlite vfs * refactor: drop subagent attachment cleanup state * refactor: move legacy session aliases to doctor * refactor: require node 24 for sqlite state runtime * refactor: move provider caches into sqlite state * fix: harden virtual agent filesystem * refactor: enforce database-first runtime state * refactor: rename compaction transcript rotation setting * test: clean sqlite refactor test types * refactor: consolidate sqlite runtime state * refactor: model session conversations in sqlite * refactor: stop deriving cron delivery from session keys * refactor: stop classifying sessions from key shape * refactor: hydrate announce targets from typed delivery * refactor: route heartbeat delivery from typed sqlite context * refactor: tighten typed sqlite session routing * refactor: remove session origin routing shadow * refactor: drop session origin shadow fixtures * perf: query sqlite vfs paths by prefix * refactor: use typed conversation metadata for sessions * refactor: prefer typed session routing metadata * refactor: require typed session routing metadata * refactor: resolve group tool policy from typed sessions * refactor: delete dead session thread info bridge * Show Codex subscription reset times in channel errors (#80456) * feat(plugin-sdk): consolidate session workflow APIs * fix(agents): allow read-only agent mount reads * [codex] refresh plugin regression fixtures * fix(agents): restore compaction gateway logs * test: tighten gateway startup assertions * Redact persisted secret-shaped payloads [AI] (#79006) * test: tighten device pair notify assertions * test: tighten hermes secret assertions * test: assert matrix client error shapes * test: assert config compat warnings * fix(heartbeat): remap cron-run exec events to session keys (#80214) * fix(codex): route btw through native side threads * fix(auth): accept friendly OpenAI order for Codex profiles * fix(codex): rotate auth profiles inside harness * fix: keep browser status page probe within timeout * test: assert agents add outputs * test: pin cron read status * fix(agents): avoid Pi resource discovery stalls Co-authored-by: dataCenter430 <titan032000@gmail.com> * fix: retire timed-out codex app-server clients * test: tighten qa lab runtime assertions * test: check security fix outputs * test: verify extension runtime messages * feat(wake): expose typed sessionKey on wake protocol + system event CLI * fix(gateway): await session_end during shutdown drain and track channel + compaction lifecycle paths (#57790) * test: guard talk consult call helper * fix(codex): scale context engine projection (#80761) * fix(codex): scale context engine projection * fix: document Codex context projection scaling * fix: document Codex context projection scaling * fix: document Codex context projection scaling * fix: document Codex context projection scaling * chore: align Codex projection changelog * chore: realign Codex projection changelog * fix: isolate Codex projection patch --------- Co-authored-by: Eva (agent) <eva+agent-78055@100yen.org> Co-authored-by: Josh Lehman <josh@martian.engineering> * refactor: move agent runtime state toward piless * refactor: remove cron session reaper * refactor: move session management to sqlite * refactor: finish database-first state migration * chore: refresh generated sqlite db types * refactor: remove stale file-backed shims * test: harden kysely type coverage # Conflicts: # .agents/skills/kysely-database-access/SKILL.md # src/infra/kysely-sync.types.test.ts # src/proxy-capture/store.sqlite.test.ts # src/state/openclaw-agent-db.test.ts # src/state/openclaw-state-db.test.ts * refactor: remove cron store path runtime * refactor: keep compaction transcript handles out of session rows * refactor: derive embedded transcripts from sqlite identity * refactor: remove embedded transcript locator handoff * refactor: remove runtime transcript file bridges * refactor: remove transcript file handoffs * refactor: remove MSTeams legacy learning key fallback * refactor: store model catalog config in sqlite * refactor: use sqlite model catalog at runtime # Conflicts: # docs/cli/secrets.md # docs/gateway/authentication.md # docs/gateway/secrets.md * fix: keep oauth sibling sync sqlite-local # Conflicts: # src/commands/onboard-auth.test.ts * refactor: remove task session store maintenance # Conflicts: # src/commands/tasks.ts * refactor: keep diagnostics in state sqlite * refactor: enforce database-first runtime state * refactor: consolidate sqlite runtime state * Show Codex subscription reset times in channel errors (#80456) * fix(codex): refresh subscription limit resets * fix(codex): format reset times for channels * Update CHANGELOG with latest changes and fixes Updated CHANGELOG with recent fixes and improvements. * fix(codex): keep command load failures on codex surface * fix(codex): format account rate limits as rows * fix(codex): summarize account limits as usage status * fix(codex): simplify account limit status * test: tighten subagent announce queue assertion * test: tighten session delete lifecycle assertions * test: tighten cron ops assertions * fix: track cron execution milestones * test: tighten hermes secret assertions * test: assert matrix sync store payloads * test: assert config compat warnings * fix(codex): align btw side thread semantics * fix(codex): honor codex fallback blocking * fix(agents): avoid Pi resource discovery stalls * test: tighten codex event assertions * test: tighten cron assertions * Fix Codex app-server OAuth harness auth * refactor: move agent runtime state toward piless * refactor: move device and push state to sqlite * refactor: move runtime json state imports to doctor * refactor: finish database-first state migration * chore: refresh generated sqlite db types * refactor: clarify cron sqlite store keys * refactor: remove stale file-backed shims * refactor: bind codex runtime state by session id * test: expect sqlite trajectory branch export * refactor: rename session row helpers * fix: keep legacy device identity import in doctor * refactor: enforce database-first runtime state * refactor: consolidate sqlite runtime state * build: align pi contract wrappers * chore: repair database-first rebase * refactor: remove session file test contracts * test: update gateway session expectations * refactor: stop routing from session compatibility shadows * refactor: stop persisting session route shadows * refactor: use typed delivery context in clients * refactor: stop echoing session route shadows * refactor: repair embedded runner rebase imports # Conflicts: # src/agents/pi-embedded-runner/run/attempt.tool-call-argument-repair.ts * refactor: align pi contract imports * refactor: satisfy kysely sync helper guard * refactor: remove file transcript bridge remnants * refactor: remove session locator compatibility * refactor: remove session file test contracts * refactor: keep rebase database-first clean * refactor: remove session file assumptions from e2e * docs: clarify database-first goal state * test: remove legacy store markers from sqlite runtime tests * refactor: remove legacy store assumptions from runtime seams * refactor: align sqlite runtime helper seams * test: update memory recall sqlite audit mock * refactor: align database-first runtime type seams * test: clarify doctor cron legacy store names * fix: preserve sqlite session route projections * test: fix copilot token cache test syntax * docs: update database-first proof status * test: align database-first test fixtures * docs: update database-first proof status * refactor: clean extension database-first drift * test: align agent session route proof * test: clarify doctor legacy path fixtures * chore: clean database-first changed checks * chore: repair database-first rebase markers * build: allow baileys git subdependency * chore: repair exp-vfs rebase drift * chore: finish exp-vfs rebase cleanup * chore: satisfy rebase lint drift * chore: fix qqbot rebase type seam * chore: fix rebase drift leftovers * fix: keep auth profile oauth secrets out of sqlite * fix: repair rebase drift tests * test: stabilize pairing request ordering * test: use source manifests in plugin contract checks * fix: restore gateway session metadata after rebase * fix: repair database-first rebase drift * fix: clean up database-first rebase fallout * test: stabilize line quick reply receipt time * fix: repair extension rebase drift * test: keep transcript redaction tests sqlite-backed * fix: carry injected transcript redaction through sqlite * chore: clean database branch rebase residue * fix: repair database branch CI drift * fix: repair database branch CI guard drift * fix: stabilize oauth tls preflight test * test: align database branch fast guards * test: repair build artifact boundary guards * chore: clean changelog rebase markers --------- Co-authored-by: pashpashpash <nik@vault77.ai> Co-authored-by: Eva <eva@100yen.org> Co-authored-by: stainlu <stainlu@newtype-ai.org> Co-authored-by: Jason Zhou <jason.zhou.design@gmail.com> Co-authored-by: Ruben Cuevas <hi@rubencu.com> Co-authored-by: Pavan Kumar Gondhi <pavangondhi@gmail.com> Co-authored-by: Shakker <shakkerdroid@gmail.com> Co-authored-by: Kaspre <36520309+Kaspre@users.noreply.github.com> Co-authored-by: dataCenter430 <titan032000@gmail.com> Co-authored-by: Kaspre <kaspre@gmail.com> Co-authored-by: pandadev66 <nova.full.stack@outlook.com> Co-authored-by: Eva <admin@100yen.org> Co-authored-by: Eva (agent) <eva+agent-78055@100yen.org> Co-authored-by: Josh Lehman <josh@martian.engineering> Co-authored-by: jeffjhunter <support@aipersonamethod.com>
304 lines
9.4 KiB
TypeScript
304 lines
9.4 KiB
TypeScript
// Session runtime-context Docker harness.
|
|
// Imports packaged dist modules so transcript behavior is verified against the
|
|
// npm tarball installed in the functional image.
|
|
import { spawnSync } from "node:child_process";
|
|
import fs from "node:fs/promises";
|
|
import os from "node:os";
|
|
import path from "node:path";
|
|
import {
|
|
queueRuntimeContextForNextTurn,
|
|
resolveRuntimeContextPromptParts,
|
|
} from "../../dist/agents/pi-embedded-runner/run/runtime-context-prompt.js";
|
|
|
|
type TranscriptEntry = {
|
|
type?: string;
|
|
customType?: string;
|
|
content?: string;
|
|
display?: boolean;
|
|
message?: {
|
|
role?: string;
|
|
content?: unknown;
|
|
};
|
|
};
|
|
type SqliteTranscriptStoreModule = {
|
|
appendSqliteSessionTranscriptEvent: (params: {
|
|
agentId: string;
|
|
sessionId: string;
|
|
event: unknown;
|
|
now?: () => number;
|
|
parentMode?: "database-tail";
|
|
}) => void;
|
|
loadSqliteSessionTranscriptEvents: (params: {
|
|
agentId: string;
|
|
sessionId: string;
|
|
}) => Array<{ event: unknown }>;
|
|
};
|
|
|
|
function assert(condition: unknown, message: string): asserts condition {
|
|
if (!condition) {
|
|
throw new Error(message);
|
|
}
|
|
}
|
|
|
|
function messageText(content: unknown): string {
|
|
if (typeof content === "string") {
|
|
return content;
|
|
}
|
|
if (!Array.isArray(content)) {
|
|
return "";
|
|
}
|
|
return content
|
|
.map((part) =>
|
|
part && typeof part === "object" && typeof (part as { text?: unknown }).text === "string"
|
|
? (part as { text: string }).text
|
|
: "",
|
|
)
|
|
.join("");
|
|
}
|
|
|
|
async function verifyRuntimeContextTranscriptShape(root: string) {
|
|
const { appendSqliteSessionTranscriptEvent, loadSqliteSessionTranscriptEvents } =
|
|
(await import("../../dist/config/sessions/transcript-store.sqlite.js")) as SqliteTranscriptStoreModule;
|
|
const agentId = "main";
|
|
const sessionId = "runtime";
|
|
let now = Date.now();
|
|
const appendEvent = (event: unknown) =>
|
|
appendSqliteSessionTranscriptEvent({
|
|
agentId,
|
|
sessionId,
|
|
event,
|
|
now: () => now++,
|
|
parentMode: "database-tail",
|
|
});
|
|
const effectivePrompt = [
|
|
"visible ask",
|
|
"",
|
|
"<<<BEGIN_OPENCLAW_INTERNAL_CONTEXT>>>",
|
|
"secret docker context",
|
|
"<<<END_OPENCLAW_INTERNAL_CONTEXT>>>",
|
|
].join("\n");
|
|
const promptSubmission = resolveRuntimeContextPromptParts({
|
|
effectivePrompt,
|
|
transcriptPrompt: "visible ask",
|
|
});
|
|
|
|
assert(promptSubmission.prompt === "visible ask", "visible prompt was not preserved");
|
|
assert(
|
|
promptSubmission.runtimeContext?.includes("secret docker context"),
|
|
"runtime context was not extracted",
|
|
);
|
|
|
|
await queueRuntimeContextForNextTurn({
|
|
runtimeContext: promptSubmission.runtimeContext,
|
|
session: {
|
|
sendCustomMessage: async (message, options) => {
|
|
assert(options?.deliverAs === "nextTurn", "runtime context was not queued for next turn");
|
|
appendEvent({
|
|
type: "custom_message",
|
|
id: "runtime-context",
|
|
parentId: null,
|
|
timestamp: now,
|
|
customType: message.customType,
|
|
content: message.content,
|
|
display: message.display,
|
|
details: message.details,
|
|
});
|
|
},
|
|
},
|
|
});
|
|
appendEvent({
|
|
type: "message",
|
|
id: "runtime-user",
|
|
parentId: null,
|
|
timestamp: now,
|
|
message: {
|
|
role: "user",
|
|
content: promptSubmission.prompt,
|
|
},
|
|
});
|
|
appendEvent({
|
|
type: "message",
|
|
id: "runtime-assistant",
|
|
parentId: null,
|
|
timestamp: now,
|
|
message: {
|
|
role: "assistant",
|
|
content: "done",
|
|
},
|
|
});
|
|
|
|
const entries = loadSqliteSessionTranscriptEvents({ agentId, sessionId }).map(
|
|
(entry) => entry.event as TranscriptEntry,
|
|
);
|
|
const customEntry = entries.find((entry) => entry.type === "custom_message");
|
|
assert(customEntry, "hidden runtime custom message was not persisted");
|
|
assert(customEntry.customType === "openclaw.runtime-context", "unexpected custom message type");
|
|
assert(customEntry.display === false, "runtime custom message should be hidden");
|
|
assert(
|
|
customEntry.content?.includes("secret docker context"),
|
|
"runtime custom message lost context",
|
|
);
|
|
|
|
const userEntries = entries.filter((entry) => entry.message?.role === "user");
|
|
assert(userEntries.length === 1, `expected one visible user message, got ${userEntries.length}`);
|
|
const userText = messageText(userEntries[0]?.message?.content);
|
|
assert(userText === "visible ask", `unexpected visible user text: ${JSON.stringify(userText)}`);
|
|
assert(
|
|
!userText.includes("OPENCLAW_INTERNAL_CONTEXT") && !userText.includes("secret docker context"),
|
|
"visible user transcript leaked runtime context",
|
|
);
|
|
}
|
|
|
|
async function seedBrokenLegacySessionForDoctorMigration(stateDir: string): Promise<string> {
|
|
const sessionsDir = path.join(stateDir, "agents", "main", "sessions");
|
|
const legacyTranscriptPath = path.join(sessionsDir, "broken.jsonl");
|
|
await fs.mkdir(sessionsDir, { recursive: true });
|
|
const entries = [
|
|
{ type: "session", version: 3, id: "broken-session" },
|
|
{
|
|
type: "message",
|
|
id: "parent",
|
|
parentId: null,
|
|
message: { role: "assistant", content: "previous" },
|
|
},
|
|
{
|
|
type: "message",
|
|
id: "runtime-user",
|
|
parentId: "parent",
|
|
message: {
|
|
role: "user",
|
|
content: [
|
|
"visible ask",
|
|
"",
|
|
"<<<BEGIN_OPENCLAW_INTERNAL_CONTEXT>>>",
|
|
"secret doctor context",
|
|
"<<<END_OPENCLAW_INTERNAL_CONTEXT>>>",
|
|
].join("\n"),
|
|
},
|
|
},
|
|
{
|
|
type: "message",
|
|
id: "runtime-assistant",
|
|
parentId: "runtime-user",
|
|
message: { role: "assistant", content: "stale branch" },
|
|
},
|
|
{
|
|
type: "message",
|
|
id: "plain-user",
|
|
parentId: "parent",
|
|
message: { role: "user", content: "visible ask" },
|
|
},
|
|
{
|
|
type: "message",
|
|
id: "plain-assistant",
|
|
parentId: "plain-user",
|
|
message: { role: "assistant", content: "active answer" },
|
|
},
|
|
];
|
|
await fs.writeFile(
|
|
legacyTranscriptPath,
|
|
`${entries.map((entry) => JSON.stringify(entry)).join("\n")}\n`,
|
|
"utf-8",
|
|
);
|
|
// This is intentionally a legacy input: the scenario proves doctor imports
|
|
// session indexes and transcript JSONL into SQLite, then removes the sources.
|
|
const legacySessionIndexPath = path.join(sessionsDir, "sessions.json");
|
|
await fs.writeFile(
|
|
legacySessionIndexPath,
|
|
JSON.stringify(
|
|
{
|
|
"agent:main:qa:docker-runtime-context": {
|
|
sessionId: "broken",
|
|
sessionFile: "broken.jsonl",
|
|
updatedAt: Date.now(),
|
|
displayName: "Docker runtime context repair",
|
|
},
|
|
},
|
|
null,
|
|
2,
|
|
),
|
|
"utf-8",
|
|
);
|
|
return legacyTranscriptPath;
|
|
}
|
|
|
|
async function verifyDoctorRepair(root: string) {
|
|
const stateDir = path.join(root, ".openclaw");
|
|
const configPath = path.join(stateDir, "openclaw.json");
|
|
const legacyTranscriptPath = await seedBrokenLegacySessionForDoctorMigration(stateDir);
|
|
await fs.mkdir(path.dirname(configPath), { recursive: true });
|
|
await fs.writeFile(configPath, JSON.stringify({ plugins: { enabled: false } }, null, 2));
|
|
|
|
const entry = await fs.stat("dist/index.mjs").then(
|
|
() => "dist/index.mjs",
|
|
() => "dist/index.js",
|
|
);
|
|
const result = spawnSync(process.execPath, [entry, "doctor", "--fix", "--yes", "--force"], {
|
|
cwd: process.cwd(),
|
|
env: {
|
|
...process.env,
|
|
HOME: root,
|
|
OPENCLAW_CONFIG_PATH: configPath,
|
|
OPENCLAW_DISABLE_BONJOUR: "1",
|
|
OPENCLAW_DISABLE_BUNDLED_PLUGINS: "1",
|
|
OPENCLAW_NO_ONBOARD: "1",
|
|
OPENCLAW_STATE_DIR: stateDir,
|
|
OPENCLAW_SKIP_CANVAS_HOST: "1",
|
|
OPENCLAW_SKIP_CHANNELS: "1",
|
|
OPENCLAW_SKIP_CRON: "1",
|
|
OPENCLAW_SKIP_GMAIL_WATCHER: "1",
|
|
},
|
|
encoding: "utf-8",
|
|
timeout: 120_000,
|
|
});
|
|
|
|
assert(
|
|
result.status === 0,
|
|
`doctor --fix failed\nstdout:\n${result.stdout}\nstderr:\n${result.stderr}`,
|
|
);
|
|
await fs.access(legacyTranscriptPath).then(
|
|
() => {
|
|
throw new Error("doctor left legacy transcript JSONL after SQLite import");
|
|
},
|
|
() => undefined,
|
|
);
|
|
const { loadSqliteSessionTranscriptEvents } =
|
|
(await import("../../dist/config/sessions/transcript-store.sqlite.js")) as SqliteTranscriptStoreModule;
|
|
const entries = loadSqliteSessionTranscriptEvents({
|
|
agentId: "main",
|
|
sessionId: "broken-session",
|
|
}).map((entry) => entry.event as TranscriptEntry);
|
|
const ids = entries.map((entry) => (entry as { id?: string }).id).filter(Boolean);
|
|
assert(
|
|
JSON.stringify(ids) ===
|
|
JSON.stringify(["broken-session", "parent", "plain-user", "plain-assistant"]),
|
|
`doctor kept wrong active branch: ${JSON.stringify(ids)}`,
|
|
);
|
|
assert(
|
|
entries.every(
|
|
(entry) => !messageText(entry.message?.content).includes("secret doctor context"),
|
|
),
|
|
"doctor repair left runtime context in active transcript",
|
|
);
|
|
}
|
|
|
|
async function main() {
|
|
const root = await fs.mkdtemp(path.join(os.tmpdir(), "openclaw-session-runtime-context-"));
|
|
process.env.HOME = root;
|
|
process.env.OPENCLAW_STATE_DIR = path.join(root, ".openclaw");
|
|
process.env.OPENCLAW_CONFIG_PATH = path.join(process.env.OPENCLAW_STATE_DIR, "openclaw.json");
|
|
try {
|
|
await verifyRuntimeContextTranscriptShape(root);
|
|
await verifyDoctorRepair(root);
|
|
console.log("session runtime context Docker E2E passed");
|
|
} finally {
|
|
if (process.env.OPENCLAW_SESSION_RUNTIME_CONTEXT_KEEP_ARTIFACTS !== "1") {
|
|
await fs.rm(root, { recursive: true, force: true });
|
|
} else {
|
|
console.error(`kept artifacts: ${root}`);
|
|
}
|
|
}
|
|
}
|
|
|
|
await main();
|