Commit Graph

31385 Commits

Author SHA1 Message Date
Marcus Castro
9828256c67 fix(commands): keep command auth type compatible 2026-04-14 19:39:57 -03:00
Marcus Castro
8d64f9fd96 fix(commands): validate channel auth override 2026-04-14 19:22:38 -03:00
Marcus Castro
92407d1874 fix(plugin-sdk): refresh command auth API baseline 2026-04-14 19:22:38 -03:00
Marcus Castro
d0a2b4d103 fix(commands): tighten channel auth contract 2026-04-14 19:22:38 -03:00
Marcus Castro
cf81c6de34 fix(commands): add core resolved command auth seam 2026-04-14 19:22:37 -03:00
Marcus Castro
2514bb5b4d refactor(commands): keep resolved auth seam core-only 2026-04-14 19:22:37 -03:00
Marcus Castro
63ec53366b fix(commands): tighten channel-resolved auth handoff 2026-04-14 19:22:37 -03:00
Marcus Castro
e454b69f02 fix(commands): honor channel-resolved command authorization 2026-04-14 19:22:37 -03:00
Vincent Koc
2d26929ff1 test(slack): harden thread context fixture cleanup 2026-04-14 23:11:43 +01:00
Peter Steinberger
7026ddadba test(gateway): tolerate loaded hook enqueue timing 2026-04-14 23:05:18 +01:00
Josh Lehman
ef3ac6a58e fix: guard Anthropic Messages max tokens (#66664)
* Docs: add Anthropic max_tokens investigation memo

Regeneration-Prompt: |
  Investigate the reported OpenClaw cron isolated-agent failure where an
  Anthropic Haiku run returned "max_tokens: must be greater than or equal to 1".
  Do not implement a fix yet. Inspect the cron isolated-agent execution path,
  the embedded runner, extra param plumbing, Anthropic transport code, and any
  model-selection or token-budget logic that could synthesize maxTokens = 0.
  Produce a concise maintainer memo with concrete file references, explain why
  cron itself is not the component setting maxTokens, identify the most likely
  root cause, describe the smallest repro shape, and recommend the cleanest fix.

* openclaw-e82: guard Anthropic Messages maxTokens

Regeneration-Prompt: |
  Fix the Anthropic Messages path so OpenClaw never sends max_tokens <= 0
  to Anthropic. Match the positive-number guard already used by the
  Anthropic Vertex transport, but keep the change scoped: validate token
  limits in src/agents/anthropic-transport-stream.ts where transport
  options are resolved and where the final payload is assembled, fall back
  to the model limit when a runtime override is zero, fail locally when no
  positive token budget exists, and drop non-positive maxTokens from
  src/agents/pi-embedded-runner/extra-params.ts so hidden config params do
  not leak through. Add focused regression coverage for both the transport
  and extra-param forwarding path, and remove the earlier investigation memo
  from the branch so the PR diff only contains the fix.

* fix: scope Anthropic max token guard

* fix: document Anthropic max token guard

* fix: floor Anthropic max token overrides
2026-04-14 15:05:04 -07:00
Vincent Koc
9b25c8f8e1 perf(tests): trim plugin and gateway hot paths 2026-04-14 23:03:23 +01:00
Gustavo Madeira Santana
5977579da4 QA: drop qa-channel install metadata
Remove the stale install metadata from the private qa-channel package.
The runner still loads from the repo checkout, but it should not
advertise an npm install path we do not support.
2026-04-14 17:59:37 -04:00
Peter Steinberger
54cf4cd857 test(agents): isolate shared subagent state 2026-04-14 22:49:31 +01:00
Peter Steinberger
e7dfc88bfa fix(infra): resolve opened file paths by identity 2026-04-14 22:49:31 +01:00
Vincent Koc
c6c222ba84 perf(tests): trim hot wizard and infra setup work 2026-04-14 22:42:32 +01:00
Gustavo Madeira Santana
85eac42d34 QA: remove runner install fallback catalog
Drop the generated qa-runner catalog and the missing/install placeholder
path for repo-private QA runners. The host should discover bundled QA
commands from manifest plus runtime surface only.

Also trim stale qa-matrix install docs and package metadata so the
source-only QA policy stays consistent.
2026-04-14 17:37:18 -04:00
Vincent Koc
5ddca5dd56 fix(agents): normalize mini openai reasoning 2026-04-14 22:26:47 +01:00
Vincent Koc
20463d1272 test(gateway): harden canvas auth websocket probe 2026-04-14 22:22:40 +01:00
Onur Solmaz
06a4bf5701 Actions: add reusable cross-OS release checks workflow (#66812) 2026-04-14 23:21:37 +02:00
Gustavo Madeira Santana
653100488d QA: fix matrix runner staging and host registration 2026-04-14 17:18:25 -04:00
Josh Avant
731d4666d2 fix(reply): resolve active channel/account SecretRefs in reply runs (#66796)
* Reply: resolve active channel/account SecretRefs in agent runs

* tests(reply): assert queued config scope wiring

* fix: document reply secret-scope regression coverage (#66796) (thanks @joshavant)
2026-04-14 16:04:57 -05:00
OfflynAI
d21f07a39e fix: allow workspace-rooted absolute media paths in auto-reply (#66689)
Merged via squash.

Prepared head SHA: 48206b5627
Co-authored-by: joelnishanth <140015627+joelnishanth@users.noreply.github.com>
Co-authored-by: gumadeiras <5599352+gumadeiras@users.noreply.github.com>
Reviewed-by: @gumadeiras
2026-04-14 17:04:31 -04:00
Gustavo Madeira Santana
5bf30d258f matrix: prefer named default account 2026-04-14 17:01:59 -04:00
Peter
70b67b0c68 fix(agents): preserve original prompt on model fallback retry (#65760) (#66029)
Merged via squash.

Prepared head SHA: ba919d1934
Co-authored-by: WuKongAI-CMU <210765158+WuKongAI-CMU@users.noreply.github.com>
Co-authored-by: altaywtf <9790196+altaywtf@users.noreply.github.com>
Reviewed-by: @altaywtf
2026-04-14 23:47:01 +03:00
Gustavo Madeira Santana
f958e311d2 tests: fix Feishu card action runtime mock typing 2026-04-14 16:38:01 -04:00
Rohan Santhosh Kumar
bb14412e87 fix(reply): classify billing cooldown summaries (#66363)
Merged via squash.

Prepared head SHA: 8cfc42a7ac
Co-authored-by: Rohan5commit <181558744+Rohan5commit@users.noreply.github.com>
Co-authored-by: altaywtf <9790196+altaywtf@users.noreply.github.com>
Reviewed-by: @altaywtf
2026-04-14 23:35:04 +03:00
Agustin Rivera
62430d9f3a Harden MCP loopback request validation (#66665)
* fix(mcp): harden loopback request guards

* fix(commit): block staged user log

* Revert pre-commit USER.md guard from this PR

Out of scope for the MCP loopback hardening — keep this PR
focused on the loopback request gate and the bearer-comparison
fix. The pre-commit worklog guard can land separately if
maintainers want it.

* changelog: note MCP loopback constant-time + Origin guard (#66665)

* fix(mcp): allow loopback flows that browsers flag as cross-site

The previous Sec-Fetch-Site early-return rejected legit local
browser callers like a UI hosted on http://localhost:<ui-port>
talking to MCP on http://127.0.0.1:<mcp-port> — browsers report
that host mismatch as cross-site even though both ends are
loopback. checkBrowserOrigin already authorizes those via its
local-loopback matcher (loopback peer + loopback Origin host),
so route every Origin-bearing request through that helper and
let it decide. Native MCP clients (no Origin header) continue to
short-circuit through to the bearer check unchanged.

Adds a regression test asserting that
  origin: http://localhost:43123, sec-fetch-site: cross-site
from a loopback peer is accepted with a valid bearer.

---------

Co-authored-by: Devin Robison <drobison@nvidia.com>
2026-04-14 14:32:05 -06:00
Gustavo Madeira Santana
82a2db71e8 refactor(qa): split Matrix QA into optional plugin (#66723)
Merged via squash.

Prepared head SHA: 27241bd089
Co-authored-by: gumadeiras <5599352+gumadeiras@users.noreply.github.com>
Co-authored-by: gumadeiras <5599352+gumadeiras@users.noreply.github.com>
Reviewed-by: @gumadeiras
2026-04-14 16:28:57 -04:00
Gustavo Madeira Santana
3425823dfb fix(regression): avoid sync startup for matrix status reads 2026-04-14 16:21:12 -04:00
Vincent Koc
c96871db30 test(feishu): avoid runtime env union lint trap 2026-04-14 21:14:43 +01:00
Agustin Rivera
472bcbbccc fix(agents): tighten workspace file opens (#66636)
* fix(agents): tighten workspace file opens

* fix(agents): clarify symlink rejection tests

* fix(agents): surface unsafe identity reads

* fix(agents): use non-blocking opens for identity reads and write-mode probes

* fix(fssafe): restore symlink read identity check

* fix(worklog): append comment resolution status

* fix(fssafe): close afterOpen handle leaks

* fix(worklog): append comment resolution follow-up

* fix(worklog): drop internal user file

* fix(agents): rethrow unexpected errors in agents.files.get

* changelog: note agents.files fs-safe routing + fd-first realpath (#66636)

* fix(agents): rethrow unexpected errors in agents.files.set too

Match the narrow-SafeOpenError catch pattern that agents.files.get
(commit 633b8f92) and writeWorkspaceFileOrRespond already use, so a
real OS error (ENOSPC, EACCES, EBUSY, ...) surfaces through normal
gateway error handling instead of being masked as
'unsafe workspace file'.

* test(agents): match fsStat/fsLstat mock signatures

The mock functions are declared as
  vi.fn(async (..._args: unknown[]) => Stats | null)
so mockImplementation callbacks must accept ...unknown[], not a
narrowed (filePath: string) argument. The narrower signature
works at runtime but trips tsgo's strict type check; switch to
args[0] unpacking so the callbacks match the hoisted mock shape.

---------

Co-authored-by: Devin Robison <drobison@nvidia.com>
2026-04-14 14:06:15 -06:00
Vincent Koc
9386e3a9d4 test(feishu): align lifecycle runtime env typing 2026-04-14 21:01:39 +01:00
@zimeg
d35bdf6311 refactor(slack): use packaged thread status method 2026-04-14 12:56:25 -07:00
Vincent Koc
fdbb0fb561 fix(ci): trim dist fanout from source-only node shards 2026-04-14 20:52:18 +01:00
Agustin Rivera
c8003f1b33 Harden Feishu webhook replay guards (#66707)
* fix(feishu): harden webhook replay guards

* changelog: note Feishu webhook + card-action fail-closed hardening (#66707)

* fix(feishu): move blank-token check above decodeFeishuCardAction

Run the early-return guard against a missing/blank card-action
token before decoding the card-action payload. Decoding is
side-effect-free so this is a readability + tiny-perf nit, not a
correctness change. Matches Greptile's P2 suggestion.

---------

Co-authored-by: Devin Robison <drobison@nvidia.com>
2026-04-14 13:50:41 -06:00
@zimeg
1f14c8d96b fix(slack): fix slash commands with button arg menu errors
Co-authored-by: Wang Siyuan <wsy0227@sjtu.edu.cn>
2026-04-14 12:39:56 -07:00
Vincent Koc
bd288e7683 test(agents): mock provider hook runtime in replay suites 2026-04-14 20:29:58 +01:00
Vincent Koc
34f9211e5c fix(plugin-sdk): fall back from dist facade overrides to source surfaces 2026-04-14 20:06:26 +01:00
Vincent Koc
df956f8162 test(slack): harden fixture cleanup retries 2026-04-14 19:51:21 +01:00
Vincent Koc
c2a192a48a test(contracts): fix readonly sentinel matcher types 2026-04-14 19:45:11 +01:00
Vincent Koc
c7f08d19ea test(contracts): refresh plugin boundary expectations 2026-04-14 19:39:33 +01:00
Vincent Koc
5012c38adc test(release): cover workspace template pack paths 2026-04-14 19:39:27 +01:00
Vincent Koc
95cdaf957b test(resilience): cover broken plugin startup and onboarding 2026-04-14 19:19:55 +01:00
darkamenosa
58a9905976 fix(onboard): normalize channel setup metadata (#66706)
thanks @darkamenosa
2026-04-14 19:11:52 +01:00
Vincent Koc
a848ddaa7e fix(deps): patch follow-redirects vulnerability 2026-04-14 19:00:55 +01:00
Vincent Koc
8d1510eb7b fix(lint): clear masked main check failures 2026-04-14 18:58:36 +01:00
Vincent Koc
09d7f276cb test(agentic): align OpenAI replay id expectations 2026-04-14 18:58:23 +01:00
Vincent Koc
64f32418b9 test(release): include workspace template pack paths 2026-04-14 18:54:06 +01:00
Vincent Koc
2aaa17dc6f fix(ci): restore main typecheck 2026-04-14 18:53:14 +01:00