mirror of
https://github.com/openclaw/openclaw.git
synced 2026-05-22 00:31:28 +00:00
* refactor: remove stale file-backed shims * fix: harden sqlite state ci boundaries * refactor: store matrix idb snapshots in sqlite * fix: satisfy rebased CI guardrails * refactor: store current conversation bindings in sqlite table * refactor: store tui last sessions in sqlite table * refactor: reset sqlite schema history * refactor: drop unshipped sqlite table migration * refactor: remove plugin index file rollback * refactor: drop unshipped sqlite sidecar migrations * refactor: remove runtime commitments kv migration * refactor: preserve kysely sync result types * refactor: drop unshipped sqlite schema migration table * test: keep session usage coverage sqlite-backed * refactor: keep sqlite migration doctor-only * refactor: isolate device legacy imports * refactor: isolate push voicewake legacy imports * refactor: isolate remaining runtime legacy imports * refactor: tighten sqlite migration guardrails * test: cover sqlite persisted enum parsing * refactor: isolate legacy update and tui imports * refactor: tighten sqlite state ownership * refactor: move legacy imports behind doctor * refactor: remove legacy session row lookup * refactor: canonicalize memory transcript locators * refactor: drop transcript path scope fallbacks * refactor: drop runtime legacy session delivery pruning * refactor: store tts prefs only in sqlite * refactor: remove cron store path runtime * refactor: use cron sqlite store keys * refactor: rename telegram message cache scope * refactor: read memory dreaming status from sqlite * refactor: rename cron status store key * refactor: stop remembering transcript file paths * test: use sqlite locators in agent fixtures * refactor: remove file-shaped commitments and cron store surfaces * refactor: keep compaction transcript handles out of session rows * refactor: derive transcript handles from session identity * refactor: derive runtime transcript handles * refactor: remove gateway session locator reads * refactor: remove transcript locator from session rows * refactor: store raw stream diagnostics in sqlite * refactor: remove file-shaped transcript rotation * refactor: hide legacy trajectory paths from runtime * refactor: remove runtime transcript file bridges * refactor: repair database-first rebase fallout * refactor: align tests with database-first state * refactor: remove transcript file handoffs * refactor: sync post-compaction memory by transcript scope * refactor: run codex app-server sessions by id * refactor: bind codex runtime state by session id * refactor: pass memory transcripts by sqlite scope * refactor: remove transcript locator cleanup leftovers * test: remove stale transcript file fixtures * refactor: remove transcript locator test helper * test: make cron sqlite keys explicit * test: remove cron runtime store paths * test: remove stale session file fixtures * test: use sqlite cron keys in diagnostics * refactor: remove runtime delivery queue backfill * test: drop fake export session file mocks * refactor: rename acp session read failure flag * refactor: rename acp row session key * refactor: remove session store test seams * refactor: move legacy session parser tests to doctor * refactor: reindex managed memory in place * refactor: drop stale session store wording * refactor: rename session row helpers * refactor: rename sqlite session entry modules * refactor: remove transcript locator leftovers * refactor: trim file-era audit wording * refactor: clean managed media through sqlite * fix: prefer explicit agent for exports * fix: use prepared agent for session resets * fix: canonicalize legacy codex binding import * test: rename state cleanup helper * docs: align backup docs with sqlite state * refactor: drop legacy Pi usage auth fallback * refactor: move legacy auth profile imports to doctor * refactor: keep Pi model discovery auth in memory * refactor: remove MSTeams legacy learning key fallback * refactor: store model catalog config in sqlite * refactor: use sqlite model catalog at runtime * refactor: remove model json compatibility aliases * refactor: store auth profiles in sqlite * refactor: seed copied auth profiles in sqlite * refactor: make auth profile runtime sqlite-addressed * refactor: migrate hermes secrets into sqlite auth store * refactor: move plugin install config migration to doctor * refactor: rename plugin index audit checks * test: drop auth file assumptions * test: remove legacy transcript file assertions * refactor: drop legacy cli session aliases * refactor: store skill uploads in sqlite * refactor: keep subagent attachments in sqlite vfs * refactor: drop subagent attachment cleanup state * refactor: move legacy session aliases to doctor * refactor: require node 24 for sqlite state runtime * refactor: move provider caches into sqlite state * fix: harden virtual agent filesystem * refactor: enforce database-first runtime state * refactor: rename compaction transcript rotation setting * test: clean sqlite refactor test types * refactor: consolidate sqlite runtime state * refactor: model session conversations in sqlite * refactor: stop deriving cron delivery from session keys * refactor: stop classifying sessions from key shape * refactor: hydrate announce targets from typed delivery * refactor: route heartbeat delivery from typed sqlite context * refactor: tighten typed sqlite session routing * refactor: remove session origin routing shadow * refactor: drop session origin shadow fixtures * perf: query sqlite vfs paths by prefix * refactor: use typed conversation metadata for sessions * refactor: prefer typed session routing metadata * refactor: require typed session routing metadata * refactor: resolve group tool policy from typed sessions * refactor: delete dead session thread info bridge * Show Codex subscription reset times in channel errors (#80456) * feat(plugin-sdk): consolidate session workflow APIs * fix(agents): allow read-only agent mount reads * [codex] refresh plugin regression fixtures * fix(agents): restore compaction gateway logs * test: tighten gateway startup assertions * Redact persisted secret-shaped payloads [AI] (#79006) * test: tighten device pair notify assertions * test: tighten hermes secret assertions * test: assert matrix client error shapes * test: assert config compat warnings * fix(heartbeat): remap cron-run exec events to session keys (#80214) * fix(codex): route btw through native side threads * fix(auth): accept friendly OpenAI order for Codex profiles * fix(codex): rotate auth profiles inside harness * fix: keep browser status page probe within timeout * test: assert agents add outputs * test: pin cron read status * fix(agents): avoid Pi resource discovery stalls Co-authored-by: dataCenter430 <titan032000@gmail.com> * fix: retire timed-out codex app-server clients * test: tighten qa lab runtime assertions * test: check security fix outputs * test: verify extension runtime messages * feat(wake): expose typed sessionKey on wake protocol + system event CLI * fix(gateway): await session_end during shutdown drain and track channel + compaction lifecycle paths (#57790) * test: guard talk consult call helper * fix(codex): scale context engine projection (#80761) * fix(codex): scale context engine projection * fix: document Codex context projection scaling * fix: document Codex context projection scaling * fix: document Codex context projection scaling * fix: document Codex context projection scaling * chore: align Codex projection changelog * chore: realign Codex projection changelog * fix: isolate Codex projection patch --------- Co-authored-by: Eva (agent) <eva+agent-78055@100yen.org> Co-authored-by: Josh Lehman <josh@martian.engineering> * refactor: move agent runtime state toward piless * refactor: remove cron session reaper * refactor: move session management to sqlite * refactor: finish database-first state migration * chore: refresh generated sqlite db types * refactor: remove stale file-backed shims * test: harden kysely type coverage # Conflicts: # .agents/skills/kysely-database-access/SKILL.md # src/infra/kysely-sync.types.test.ts # src/proxy-capture/store.sqlite.test.ts # src/state/openclaw-agent-db.test.ts # src/state/openclaw-state-db.test.ts * refactor: remove cron store path runtime * refactor: keep compaction transcript handles out of session rows * refactor: derive embedded transcripts from sqlite identity * refactor: remove embedded transcript locator handoff * refactor: remove runtime transcript file bridges * refactor: remove transcript file handoffs * refactor: remove MSTeams legacy learning key fallback * refactor: store model catalog config in sqlite * refactor: use sqlite model catalog at runtime # Conflicts: # docs/cli/secrets.md # docs/gateway/authentication.md # docs/gateway/secrets.md * fix: keep oauth sibling sync sqlite-local # Conflicts: # src/commands/onboard-auth.test.ts * refactor: remove task session store maintenance # Conflicts: # src/commands/tasks.ts * refactor: keep diagnostics in state sqlite * refactor: enforce database-first runtime state * refactor: consolidate sqlite runtime state * Show Codex subscription reset times in channel errors (#80456) * fix(codex): refresh subscription limit resets * fix(codex): format reset times for channels * Update CHANGELOG with latest changes and fixes Updated CHANGELOG with recent fixes and improvements. * fix(codex): keep command load failures on codex surface * fix(codex): format account rate limits as rows * fix(codex): summarize account limits as usage status * fix(codex): simplify account limit status * test: tighten subagent announce queue assertion * test: tighten session delete lifecycle assertions * test: tighten cron ops assertions * fix: track cron execution milestones * test: tighten hermes secret assertions * test: assert matrix sync store payloads * test: assert config compat warnings * fix(codex): align btw side thread semantics * fix(codex): honor codex fallback blocking * fix(agents): avoid Pi resource discovery stalls * test: tighten codex event assertions * test: tighten cron assertions * Fix Codex app-server OAuth harness auth * refactor: move agent runtime state toward piless * refactor: move device and push state to sqlite * refactor: move runtime json state imports to doctor * refactor: finish database-first state migration * chore: refresh generated sqlite db types * refactor: clarify cron sqlite store keys * refactor: remove stale file-backed shims * refactor: bind codex runtime state by session id * test: expect sqlite trajectory branch export * refactor: rename session row helpers * fix: keep legacy device identity import in doctor * refactor: enforce database-first runtime state * refactor: consolidate sqlite runtime state * build: align pi contract wrappers * chore: repair database-first rebase * refactor: remove session file test contracts * test: update gateway session expectations * refactor: stop routing from session compatibility shadows * refactor: stop persisting session route shadows * refactor: use typed delivery context in clients * refactor: stop echoing session route shadows * refactor: repair embedded runner rebase imports # Conflicts: # src/agents/pi-embedded-runner/run/attempt.tool-call-argument-repair.ts * refactor: align pi contract imports * refactor: satisfy kysely sync helper guard * refactor: remove file transcript bridge remnants * refactor: remove session locator compatibility * refactor: remove session file test contracts * refactor: keep rebase database-first clean * refactor: remove session file assumptions from e2e * docs: clarify database-first goal state * test: remove legacy store markers from sqlite runtime tests * refactor: remove legacy store assumptions from runtime seams * refactor: align sqlite runtime helper seams * test: update memory recall sqlite audit mock * refactor: align database-first runtime type seams * test: clarify doctor cron legacy store names * fix: preserve sqlite session route projections * test: fix copilot token cache test syntax * docs: update database-first proof status * test: align database-first test fixtures * docs: update database-first proof status * refactor: clean extension database-first drift * test: align agent session route proof * test: clarify doctor legacy path fixtures * chore: clean database-first changed checks * chore: repair database-first rebase markers * build: allow baileys git subdependency * chore: repair exp-vfs rebase drift * chore: finish exp-vfs rebase cleanup * chore: satisfy rebase lint drift * chore: fix qqbot rebase type seam * chore: fix rebase drift leftovers * fix: keep auth profile oauth secrets out of sqlite * fix: repair rebase drift tests * test: stabilize pairing request ordering * test: use source manifests in plugin contract checks * fix: restore gateway session metadata after rebase * fix: repair database-first rebase drift * fix: clean up database-first rebase fallout * test: stabilize line quick reply receipt time * fix: repair extension rebase drift * test: keep transcript redaction tests sqlite-backed * fix: carry injected transcript redaction through sqlite * chore: clean database branch rebase residue * fix: repair database branch CI drift * fix: repair database branch CI guard drift * fix: stabilize oauth tls preflight test * test: align database branch fast guards * test: repair build artifact boundary guards * chore: clean changelog rebase markers --------- Co-authored-by: pashpashpash <nik@vault77.ai> Co-authored-by: Eva <eva@100yen.org> Co-authored-by: stainlu <stainlu@newtype-ai.org> Co-authored-by: Jason Zhou <jason.zhou.design@gmail.com> Co-authored-by: Ruben Cuevas <hi@rubencu.com> Co-authored-by: Pavan Kumar Gondhi <pavangondhi@gmail.com> Co-authored-by: Shakker <shakkerdroid@gmail.com> Co-authored-by: Kaspre <36520309+Kaspre@users.noreply.github.com> Co-authored-by: dataCenter430 <titan032000@gmail.com> Co-authored-by: Kaspre <kaspre@gmail.com> Co-authored-by: pandadev66 <nova.full.stack@outlook.com> Co-authored-by: Eva <admin@100yen.org> Co-authored-by: Eva (agent) <eva+agent-78055@100yen.org> Co-authored-by: Josh Lehman <josh@martian.engineering> Co-authored-by: jeffjhunter <support@aipersonamethod.com>
493 lines
18 KiB
TypeScript
493 lines
18 KiB
TypeScript
import type { Command } from "commander";
|
|
import { defaultRuntime } from "../runtime.js";
|
|
import { formatDocsLink } from "../terminal/links.js";
|
|
import { theme } from "../terminal/theme.js";
|
|
import { resolveOptionFromCommand, runCommandWithRuntime } from "./cli-utils.js";
|
|
import { formatCliCommand } from "./command-format.js";
|
|
|
|
function runModelsCommand(action: () => Promise<void>) {
|
|
return runCommandWithRuntime(defaultRuntime, action);
|
|
}
|
|
|
|
function rejectAgentScopedModelWrite(command: Command, commandName: "set" | "set-image"): void {
|
|
const agent = resolveOptionFromCommand<string>(command, "agent");
|
|
if (!agent) {
|
|
return;
|
|
}
|
|
throw new Error(
|
|
`openclaw models ${commandName} does not support --agent; it only updates global model defaults. Remove --agent, or run ${formatCliCommand("openclaw agents list")} and set the per-agent model in agent config.`,
|
|
);
|
|
}
|
|
|
|
export function registerModelsCli(program: Command) {
|
|
const models = program
|
|
.command("models")
|
|
.description("Model discovery, scanning, and configuration")
|
|
.option("--status-json", "Output JSON (alias for `models status --json`)", false)
|
|
.option("--status-plain", "Plain output (alias for `models status --plain`)", false)
|
|
.option(
|
|
"--agent <id>",
|
|
"Agent id to inspect (overrides OPENCLAW_AGENT_DIR/PI_CODING_AGENT_DIR)",
|
|
)
|
|
.addHelpText(
|
|
"after",
|
|
() =>
|
|
`\n${theme.muted("Docs:")} ${formatDocsLink("/cli/models", "docs.openclaw.ai/cli/models")}\n`,
|
|
);
|
|
|
|
models
|
|
.command("list")
|
|
.description("List models (configured by default)")
|
|
.option("--all", "Show full model catalog", false)
|
|
.option("--local", "Filter to local models", false)
|
|
.option("--provider <id>", "Filter by provider id")
|
|
.option("--json", "Output JSON", false)
|
|
.option("--plain", "Plain line output", false)
|
|
.action(async (opts) => {
|
|
await runModelsCommand(async () => {
|
|
const { modelsListCommand } = await import("../commands/models/list.list-command.js");
|
|
await modelsListCommand(opts, defaultRuntime);
|
|
});
|
|
});
|
|
|
|
models
|
|
.command("status")
|
|
.description("Show configured model state")
|
|
.option("--json", "Output JSON", false)
|
|
.option("--plain", "Plain output", false)
|
|
.option(
|
|
"--check",
|
|
"Exit non-zero if auth is expiring/expired (1=expired/missing, 2=expiring)",
|
|
false,
|
|
)
|
|
.option("--probe", "Probe configured provider auth (live)", false)
|
|
.option("--probe-provider <name>", "Only probe a single provider")
|
|
.option(
|
|
"--probe-profile <id>",
|
|
"Only probe specific auth profile ids (repeat or comma-separated)",
|
|
(value, previous) => {
|
|
const next = Array.isArray(previous) ? previous : previous ? [previous] : [];
|
|
next.push(value);
|
|
return next;
|
|
},
|
|
)
|
|
.option("--probe-timeout <ms>", "Per-probe timeout in ms")
|
|
.option("--probe-concurrency <n>", "Concurrent probes")
|
|
.option("--probe-max-tokens <n>", "Probe max tokens (best-effort)")
|
|
.option(
|
|
"--agent <id>",
|
|
"Agent id to inspect (overrides OPENCLAW_AGENT_DIR/PI_CODING_AGENT_DIR)",
|
|
)
|
|
.action(async (opts, command) => {
|
|
const agent =
|
|
resolveOptionFromCommand<string>(command, "agent") ?? (opts.agent as string | undefined);
|
|
await runModelsCommand(async () => {
|
|
const { modelsStatusCommand } = await import("../commands/models/list.status-command.js");
|
|
await modelsStatusCommand(
|
|
{
|
|
json: Boolean(opts.json),
|
|
plain: Boolean(opts.plain),
|
|
check: Boolean(opts.check),
|
|
probe: Boolean(opts.probe),
|
|
probeProvider: opts.probeProvider as string | undefined,
|
|
probeProfile: opts.probeProfile as string | string[] | undefined,
|
|
probeTimeout: opts.probeTimeout as string | undefined,
|
|
probeConcurrency: opts.probeConcurrency as string | undefined,
|
|
probeMaxTokens: opts.probeMaxTokens as string | undefined,
|
|
agent,
|
|
},
|
|
defaultRuntime,
|
|
);
|
|
});
|
|
});
|
|
|
|
models
|
|
.command("set")
|
|
.description("Set the default model")
|
|
.argument("<model>", "Model id or alias")
|
|
.action(async (model: string, _opts: unknown, command: Command) => {
|
|
rejectAgentScopedModelWrite(command, "set");
|
|
await runModelsCommand(async () => {
|
|
const { modelsSetCommand } = await import("../commands/models/set.js");
|
|
await modelsSetCommand(model, defaultRuntime);
|
|
});
|
|
});
|
|
|
|
models
|
|
.command("set-image")
|
|
.description("Set the image model")
|
|
.argument("<model>", "Model id or alias")
|
|
.action(async (model: string, _opts: unknown, command: Command) => {
|
|
rejectAgentScopedModelWrite(command, "set-image");
|
|
await runModelsCommand(async () => {
|
|
const { modelsSetImageCommand } = await import("../commands/models/set-image.js");
|
|
await modelsSetImageCommand(model, defaultRuntime);
|
|
});
|
|
});
|
|
|
|
const aliases = models.command("aliases").description("Manage model aliases");
|
|
|
|
aliases
|
|
.command("list")
|
|
.description("List model aliases")
|
|
.option("--json", "Output JSON", false)
|
|
.option("--plain", "Plain output", false)
|
|
.action(async (opts) => {
|
|
await runModelsCommand(async () => {
|
|
const { modelsAliasesListCommand } = await import("../commands/models/aliases.js");
|
|
await modelsAliasesListCommand(opts, defaultRuntime);
|
|
});
|
|
});
|
|
|
|
aliases
|
|
.command("add")
|
|
.description("Add or update a model alias")
|
|
.argument("<alias>", "Alias name")
|
|
.argument("<model>", "Model id or alias")
|
|
.action(async (alias: string, model: string) => {
|
|
await runModelsCommand(async () => {
|
|
const { modelsAliasesAddCommand } = await import("../commands/models/aliases.js");
|
|
await modelsAliasesAddCommand(alias, model, defaultRuntime);
|
|
});
|
|
});
|
|
|
|
aliases
|
|
.command("remove")
|
|
.description("Remove a model alias")
|
|
.argument("<alias>", "Alias name")
|
|
.action(async (alias: string) => {
|
|
await runModelsCommand(async () => {
|
|
const { modelsAliasesRemoveCommand } = await import("../commands/models/aliases.js");
|
|
await modelsAliasesRemoveCommand(alias, defaultRuntime);
|
|
});
|
|
});
|
|
|
|
const fallbacks = models.command("fallbacks").description("Manage model fallback list");
|
|
|
|
fallbacks
|
|
.command("list")
|
|
.description("List fallback models")
|
|
.option("--json", "Output JSON", false)
|
|
.option("--plain", "Plain output", false)
|
|
.action(async (opts) => {
|
|
await runModelsCommand(async () => {
|
|
const { modelsFallbacksListCommand } = await import("../commands/models/fallbacks.js");
|
|
await modelsFallbacksListCommand(opts, defaultRuntime);
|
|
});
|
|
});
|
|
|
|
fallbacks
|
|
.command("add")
|
|
.description("Add a fallback model")
|
|
.argument("<model>", "Model id or alias")
|
|
.action(async (model: string) => {
|
|
await runModelsCommand(async () => {
|
|
const { modelsFallbacksAddCommand } = await import("../commands/models/fallbacks.js");
|
|
await modelsFallbacksAddCommand(model, defaultRuntime);
|
|
});
|
|
});
|
|
|
|
fallbacks
|
|
.command("remove")
|
|
.description("Remove a fallback model")
|
|
.argument("<model>", "Model id or alias")
|
|
.action(async (model: string) => {
|
|
await runModelsCommand(async () => {
|
|
const { modelsFallbacksRemoveCommand } = await import("../commands/models/fallbacks.js");
|
|
await modelsFallbacksRemoveCommand(model, defaultRuntime);
|
|
});
|
|
});
|
|
|
|
fallbacks
|
|
.command("clear")
|
|
.description("Clear all fallback models")
|
|
.action(async () => {
|
|
await runModelsCommand(async () => {
|
|
const { modelsFallbacksClearCommand } = await import("../commands/models/fallbacks.js");
|
|
await modelsFallbacksClearCommand(defaultRuntime);
|
|
});
|
|
});
|
|
|
|
const imageFallbacks = models
|
|
.command("image-fallbacks")
|
|
.description("Manage image model fallback list");
|
|
|
|
imageFallbacks
|
|
.command("list")
|
|
.description("List image fallback models")
|
|
.option("--json", "Output JSON", false)
|
|
.option("--plain", "Plain output", false)
|
|
.action(async (opts) => {
|
|
await runModelsCommand(async () => {
|
|
const { modelsImageFallbacksListCommand } =
|
|
await import("../commands/models/image-fallbacks.js");
|
|
await modelsImageFallbacksListCommand(opts, defaultRuntime);
|
|
});
|
|
});
|
|
|
|
imageFallbacks
|
|
.command("add")
|
|
.description("Add an image fallback model")
|
|
.argument("<model>", "Model id or alias")
|
|
.action(async (model: string) => {
|
|
await runModelsCommand(async () => {
|
|
const { modelsImageFallbacksAddCommand } =
|
|
await import("../commands/models/image-fallbacks.js");
|
|
await modelsImageFallbacksAddCommand(model, defaultRuntime);
|
|
});
|
|
});
|
|
|
|
imageFallbacks
|
|
.command("remove")
|
|
.description("Remove an image fallback model")
|
|
.argument("<model>", "Model id or alias")
|
|
.action(async (model: string) => {
|
|
await runModelsCommand(async () => {
|
|
const { modelsImageFallbacksRemoveCommand } =
|
|
await import("../commands/models/image-fallbacks.js");
|
|
await modelsImageFallbacksRemoveCommand(model, defaultRuntime);
|
|
});
|
|
});
|
|
|
|
imageFallbacks
|
|
.command("clear")
|
|
.description("Clear all image fallback models")
|
|
.action(async () => {
|
|
await runModelsCommand(async () => {
|
|
const { modelsImageFallbacksClearCommand } =
|
|
await import("../commands/models/image-fallbacks.js");
|
|
await modelsImageFallbacksClearCommand(defaultRuntime);
|
|
});
|
|
});
|
|
|
|
models
|
|
.command("scan")
|
|
.description("Scan OpenRouter free models for tools + images")
|
|
.option("--min-params <b>", "Minimum parameter size (billions)")
|
|
.option("--max-age-days <days>", "Skip models older than N days")
|
|
.option("--provider <name>", "Filter by provider prefix")
|
|
.option("--max-candidates <n>", "Max fallback candidates", "6")
|
|
.option("--timeout <ms>", "Per-probe timeout in ms")
|
|
.option("--concurrency <n>", "Probe concurrency")
|
|
.option("--no-probe", "Skip live probes; list free candidates only")
|
|
.option("--yes", "Accept defaults without prompting", false)
|
|
.option("--no-input", "Disable prompts (use defaults)")
|
|
.option("--set-default", "Set agents.defaults.model to the first selection", false)
|
|
.option("--set-image", "Set agents.defaults.imageModel to the first image selection", false)
|
|
.option("--json", "Output JSON", false)
|
|
.action(async (opts) => {
|
|
await runModelsCommand(async () => {
|
|
const { modelsScanCommand } = await import("../commands/models/scan.js");
|
|
await modelsScanCommand(opts, defaultRuntime);
|
|
});
|
|
});
|
|
|
|
models.action(async (opts) => {
|
|
await runModelsCommand(async () => {
|
|
const { modelsStatusCommand } = await import("../commands/models/list.status-command.js");
|
|
await modelsStatusCommand(
|
|
{
|
|
json: Boolean(opts?.statusJson),
|
|
plain: Boolean(opts?.statusPlain),
|
|
agent: opts?.agent as string | undefined,
|
|
},
|
|
defaultRuntime,
|
|
);
|
|
});
|
|
});
|
|
|
|
const auth = models.command("auth").description("Manage model auth profiles");
|
|
auth.option("--agent <id>", "Agent id for auth commands");
|
|
auth.action(() => {
|
|
auth.help();
|
|
});
|
|
|
|
auth
|
|
.command("list")
|
|
.description("List saved auth profiles")
|
|
.option("--provider <id>", "Filter by provider id")
|
|
.option("--agent <id>", "Agent id (default: configured default agent)")
|
|
.option("--json", "Output JSON", false)
|
|
.action(async (opts, command) => {
|
|
const agent =
|
|
resolveOptionFromCommand<string>(command, "agent") ?? (opts.agent as string | undefined);
|
|
await runModelsCommand(async () => {
|
|
const { modelsAuthListCommand } = await import("../commands/models/auth-list.js");
|
|
await modelsAuthListCommand(
|
|
{
|
|
provider: opts.provider as string | undefined,
|
|
agent,
|
|
json: Boolean(opts.json),
|
|
},
|
|
defaultRuntime,
|
|
);
|
|
});
|
|
});
|
|
|
|
auth
|
|
.command("add")
|
|
.description("Interactive auth helper (provider auth or paste token)")
|
|
.action(async (command) => {
|
|
const agent =
|
|
resolveOptionFromCommand<string>(command, "agent") ??
|
|
resolveOptionFromCommand<string>(auth, "agent");
|
|
await runModelsCommand(async () => {
|
|
const { modelsAuthAddCommand } = await import("../commands/models/auth.js");
|
|
await modelsAuthAddCommand({ agent }, defaultRuntime);
|
|
});
|
|
});
|
|
|
|
auth
|
|
.command("login")
|
|
.description("Run a provider plugin auth flow (OAuth/API key)")
|
|
.option("--provider <id>", "Provider id registered by a plugin")
|
|
.option("--method <id>", "Provider auth method id")
|
|
.option("--set-default", "Apply the provider's default model recommendation", false)
|
|
.action(async (opts, command) => {
|
|
const agent = resolveOptionFromCommand<string>(command, "agent");
|
|
await runModelsCommand(async () => {
|
|
const { modelsAuthLoginCommand } = await import("../commands/models/auth.js");
|
|
await modelsAuthLoginCommand(
|
|
{
|
|
provider: opts.provider as string | undefined,
|
|
method: opts.method as string | undefined,
|
|
setDefault: Boolean(opts.setDefault),
|
|
agent,
|
|
},
|
|
defaultRuntime,
|
|
);
|
|
});
|
|
});
|
|
|
|
auth
|
|
.command("setup-token")
|
|
.description("Run a provider CLI to create/sync a token (TTY required)")
|
|
.option("--provider <name>", "Provider id")
|
|
.option("--yes", "Skip confirmation", false)
|
|
.action(async (opts, command) => {
|
|
const agent = resolveOptionFromCommand<string>(command, "agent");
|
|
await runModelsCommand(async () => {
|
|
const { modelsAuthSetupTokenCommand } = await import("../commands/models/auth.js");
|
|
await modelsAuthSetupTokenCommand(
|
|
{
|
|
provider: opts.provider as string | undefined,
|
|
yes: Boolean(opts.yes),
|
|
agent,
|
|
},
|
|
defaultRuntime,
|
|
);
|
|
});
|
|
});
|
|
|
|
auth
|
|
.command("paste-token")
|
|
.description("Paste a token into the SQLite auth store and update config")
|
|
.requiredOption("--provider <name>", "Provider id (e.g. anthropic)")
|
|
.option("--profile-id <id>", "Auth profile id (default: <provider>:manual)")
|
|
.option(
|
|
"--expires-in <duration>",
|
|
"Optional expiry duration (e.g. 365d, 12h). Stored as absolute expiresAt.",
|
|
)
|
|
.action(async (opts, command) => {
|
|
const agent = resolveOptionFromCommand<string>(command, "agent");
|
|
await runModelsCommand(async () => {
|
|
const { modelsAuthPasteTokenCommand } = await import("../commands/models/auth.js");
|
|
await modelsAuthPasteTokenCommand(
|
|
{
|
|
provider: opts.provider as string | undefined,
|
|
profileId: opts.profileId as string | undefined,
|
|
expiresIn: opts.expiresIn as string | undefined,
|
|
agent,
|
|
},
|
|
defaultRuntime,
|
|
);
|
|
});
|
|
});
|
|
|
|
auth
|
|
.command("login-github-copilot")
|
|
.description("Login to GitHub Copilot via GitHub device flow (TTY required)")
|
|
.option("--yes", "Overwrite existing profile without prompting", false)
|
|
.action(async (opts, command) => {
|
|
const agent = resolveOptionFromCommand<string>(command, "agent");
|
|
await runModelsCommand(async () => {
|
|
const { modelsAuthLoginCommand } = await import("../commands/models/auth.js");
|
|
await modelsAuthLoginCommand(
|
|
{
|
|
provider: "github-copilot",
|
|
method: "device",
|
|
yes: Boolean(opts.yes),
|
|
agent,
|
|
},
|
|
defaultRuntime,
|
|
);
|
|
});
|
|
});
|
|
|
|
const order = auth.command("order").description("Manage per-agent auth profile order overrides");
|
|
|
|
order
|
|
.command("get")
|
|
.description("Show per-agent auth order override")
|
|
.requiredOption("--provider <name>", "Provider id (e.g. anthropic)")
|
|
.option("--agent <id>", "Agent id (default: configured default agent)")
|
|
.option("--json", "Output JSON", false)
|
|
.action(async (opts, command) => {
|
|
const agent =
|
|
resolveOptionFromCommand<string>(command, "agent") ?? (opts.agent as string | undefined);
|
|
await runModelsCommand(async () => {
|
|
const { modelsAuthOrderGetCommand } = await import("../commands/models/auth-order.js");
|
|
await modelsAuthOrderGetCommand(
|
|
{
|
|
provider: opts.provider as string,
|
|
agent,
|
|
json: Boolean(opts.json),
|
|
},
|
|
defaultRuntime,
|
|
);
|
|
});
|
|
});
|
|
|
|
order
|
|
.command("set")
|
|
.description("Set per-agent auth order override")
|
|
.requiredOption("--provider <name>", "Provider id (e.g. anthropic)")
|
|
.option("--agent <id>", "Agent id (default: configured default agent)")
|
|
.argument("<profileIds...>", "Auth profile ids (e.g. anthropic:default)")
|
|
.action(async (profileIds: string[], opts, command) => {
|
|
const agent =
|
|
resolveOptionFromCommand<string>(command, "agent") ?? (opts.agent as string | undefined);
|
|
await runModelsCommand(async () => {
|
|
const { modelsAuthOrderSetCommand } = await import("../commands/models/auth-order.js");
|
|
await modelsAuthOrderSetCommand(
|
|
{
|
|
provider: opts.provider as string,
|
|
agent,
|
|
order: profileIds,
|
|
},
|
|
defaultRuntime,
|
|
);
|
|
});
|
|
});
|
|
|
|
order
|
|
.command("clear")
|
|
.description("Clear per-agent auth order override (fall back to config/round-robin)")
|
|
.requiredOption("--provider <name>", "Provider id (e.g. anthropic)")
|
|
.option("--agent <id>", "Agent id (default: configured default agent)")
|
|
.action(async (opts, command) => {
|
|
const agent =
|
|
resolveOptionFromCommand<string>(command, "agent") ?? (opts.agent as string | undefined);
|
|
await runModelsCommand(async () => {
|
|
const { modelsAuthOrderClearCommand } = await import("../commands/models/auth-order.js");
|
|
await modelsAuthOrderClearCommand(
|
|
{
|
|
provider: opts.provider as string,
|
|
agent,
|
|
},
|
|
defaultRuntime,
|
|
);
|
|
});
|
|
});
|
|
}
|