惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
G
GRAHAM CLULEY
P
Privacy & Cybersecurity Law Blog
Threat Intelligence Blog | Flashpoint
Threat Intelligence Blog | Flashpoint
宝玉的分享
宝玉的分享
P
Proofpoint News Feed
H
Help Net Security
V
Visual Studio Blog
阮一峰的网络日志
阮一峰的网络日志
C
Cisco Blogs
人人都是产品经理
人人都是产品经理
Know Your Adversary
Know Your Adversary
freeCodeCamp Programming Tutorials: Python, JavaScript, Git & More
Recorded Future
Recorded Future
I
Intezer
罗磊的独立博客
T
The Exploit Database - CXSecurity.com
Blog — PlanetScale
Blog — PlanetScale
Malwarebytes
Malwarebytes
Spread Privacy
Spread Privacy
T
Tor Project blog
V
Vulnerabilities – Threatpost
云风的 BLOG
云风的 BLOG
腾讯CDC
B
Blog RSS Feed
Stack Overflow Blog
Stack Overflow Blog
F
Future of Privacy Forum
MyScale Blog
MyScale Blog
Latest news
Latest news
IT之家
IT之家
MongoDB | Blog
MongoDB | Blog
The Hacker News
The Hacker News
S
Securelist
博客园 - 【当耐特】
C
CXSECURITY Database RSS Feed - CXSecurity.com
T
Threat Research - Cisco Blogs
Jina AI
Jina AI
Cisco Talos Blog
Cisco Talos Blog
B
Blog
博客园 - 三生石上(FineUI控件)
Last Week in AI
Last Week in AI
CTFtime.org: upcoming CTF events
CTFtime.org: upcoming CTF events
M
MIT News - Artificial intelligence
V
V2EX
D
Darknet – Hacking Tools, Hacker News & Cyber Security
The Cloudflare Blog
The GitHub Blog
The GitHub Blog
博客园 - 聂微东
F
Full Disclosure
C
CERT Recently Published Vulnerability Notes

Recent Commits to openclaw:main

ci(qa): publish soak parity artifacts fix(qa): keep searchable tool coverage report-only test(e2e): isolate kitchen sink rpc gateway fix(ollama): allow Orb host local auth (#84999) · openclaw/openclaw@277a4b6 test(qa-lab): add personal failure recovery scenario · openclaw/openclaw@229323d ci: tune crabbox developer image config feat(qa-lab): add jsonl replay harness · openclaw/openclaw@cf06578 fix(codex): beta blocker - keep context engine on canonical session k… · openclaw/openclaw@66dcc4e chore(release): refresh generated baselines · openclaw/openclaw@1b1580c fix(openshell): use NVIDIA CLI contract · openclaw/openclaw@e72f601 docs(release): prefer 1Password provider preflight Policy: add model, network, and MCP conformance checks (#80783) · openclaw/openclaw@6dbd5bd fix(agents): fence embedded session writes refactor: remove sender owner tool gating · openclaw/openclaw@02182d5 docs: remove stale owner tool wording test: update command auth expectations · openclaw/openclaw@95eac52 fix(xai): keep OAuth URL clickable (#84927) · openclaw/openclaw@159b300 Fix stale WebChat typing indicator after terminal session patch (#84565) docs: document rejected autoreview findings · openclaw/openclaw@c49647e docs(changelog): note VAPID subject fix · openclaw/openclaw@db606a8 perf(plugins): reuse compatible gateway startup registry · openclaw/openclaw@d2ad7d6 test: cover dispatch registry reuse caller · openclaw/openclaw@b248b48 docs: add plugin registry reuse changelog · openclaw/openclaw@6ccca4a fix(tests): wrap kitchen sink pnpm runner fix(agents): cap heartbeat context hint fallback · openclaw/openclaw@04061bc chore(deadcode): dedupe repeated helpers · openclaw/openclaw@88c49f9 perf(cli): cache stable subcommand help (#84786) · openclaw/openclaw@f39f56a fix(ollama): preserve tool call ids [AI-assisted] (#84855) · openclaw/openclaw@2000227 fix: align remaining copyright notice · openclaw/openclaw@f43e83c fix(config): append numeric bound hints to ceiling/floor validation e… · openclaw/openclaw@8a8f9dc fix(qa): enable private self-check runtime · openclaw/openclaw@0fb1de5 fix(diffs): replace iconMarkup string with ToolbarIconName enum to el… · openclaw/openclaw@b7f9bf5 fix: update mac copyright owner fix(agents): normalize openapi tool schemas · openclaw/openclaw@ec67290 fix(memory): stop recall tracking when dreaming is disabled · openclaw/openclaw@c89632b fix(diagnostics-otel): suppress exporter rejection crashes (#84881) perf: speed up secrets and nodes help startup (#84818) · openclaw/openclaw@233765b docs: add PDF timeout changelog · openclaw/openclaw@e3b77d6 fix(pdf): bound remote body reads [Fix] Reject slow node event sends (#84387) fix(doctor): detect Codex bwrap namespace denials · openclaw/openclaw@43c6c26 fix(update): prune stale local bundled plugin shadows · openclaw/openclaw@4a360ac ci: add live Codex plugin release check · openclaw/openclaw@3eb2d64 fix(slack): suppress reasoning reply payloads (#84322) chore: update vite · openclaw/openclaw@ec7495c chore: update dependencies · openclaw/openclaw@ec10d12 fix(config): validate browser sandbox bind sources [AI] (#84799) · openclaw/openclaw@3cc8b2a doctor: constrain legacy plugin cleanup paths [AI] (#84801) Fix Telegram isolated polling stall watchdog (#84861) · openclaw/openclaw@40db92f ci(release): keep non-waiting clawhub publish best effort fix(docker): keep prune store warmup before offline stage · openclaw/openclaw@1e8d966 ci(release): require resolved target before child dispatch · openclaw/openclaw@2fd02c2 fix(docker): keep runtime prune offline · openclaw/openclaw@a329b9e ci(release): streamline beta publish verification · openclaw/openclaw@1c5fda1 ci(release): preserve direct repair publishes · openclaw/openclaw@0604d25 ci(release): keep focused validation reruns independent · openclaw/openclaw@624d920 [Fix] Keep node systemd tokens out of unit files (#84815) fix: reject symlinked whatsapp creds · openclaw/openclaw@194f078 fix(whatsapp): guard credential atomic writes refactor(whatsapp): use async fs-safe credential checks · openclaw/openclaw@9ec9fbf fix(doctor): clear stale runtime override pins (#84221) fix(agents): disable pi-coding-agent auto-retry to prevent tool call … fix(trajectory): tolerate partial skill snapshot entries in support c… · openclaw/openclaw@c9b6a8b fix(ui): widen settings personal card · openclaw/openclaw@3156d94 fix(agents): log pre-prompt compaction fits decisions (#84676) · openclaw/openclaw@79be940 fix(memory-core): allow bounded dreaming session cleanup (#84802) · openclaw/openclaw@0671a2a perf(cli): lazy-load agents actions for help (#84483) · openclaw/openclaw@168f8a7 Skip empty sherpa structured transcripts (#84667) · openclaw/openclaw@46030f5 feat: support git and local skill installs (#84793) · openclaw/openclaw@c031274 Policy: add tool metadata conformance (#80056) fix(doctor): warn when sandbox hides MCP tools (#84742) · openclaw/openclaw@6745fe8 perf(cli): speed up onboarding help startup (#84488) · openclaw/openclaw@2c0c9c9 perf: isolate doctor core check tests (#84493) · openclaw/openclaw@2585249 feat(tasks): explain stale-running maintenance decisions (#84691) · openclaw/openclaw@3d3cf96 fix(minimax): stop advertising music duration control (#84765) fix(codex): guard path-only bootstrap files [AI-assisted] (#84736) · openclaw/openclaw@c4f14a3 Warn on plaintext secret config in doctor (#84718) · openclaw/openclaw@9cdf8a1 Remove skill prelude exec allowlist (#84570) perf(tui): defer EmbeddedTuiBackend import, drop dead warmup helpers … · openclaw/openclaw@b79effe perf(tui): skip plugin metadata + provider catalog on remote TUI star… · openclaw/openclaw@d91ef6b Route JSON-mode plugin registration logs to stderr (#84741) · openclaw/openclaw@b3ec4f0 build: suppress rolldown-plugin-dts CommonJS dts warnings from bundle… [codex] Fix macOS app copyright year (#84729) · openclaw/openclaw@5c4c6a4 fix(approval): route /approve through approval resolver (#84678) · openclaw/openclaw@b58572e test(secret-file): cover NickServ + account-level symlinks, narrow in… · openclaw/openclaw@4d47f9a fix(infra): restore symlink rejection in tryReadSecretFileSync (#84711) · openclaw/openclaw@90fd26b ci: preserve node path across setup action steps · openclaw/openclaw@d786b4e fix(update): defer legacy parent plugin repair · openclaw/openclaw@f4dc9b1 fix(update): prefer npm during post-core repair · openclaw/openclaw@2e389b6 test: align release timeout budget expectations · openclaw/openclaw@3844513 ci: extend stable release validation monitors · openclaw/openclaw@6b52105 fix(update): adopt post-core plugin payloads fix: preserve update compatibility host during release upgrades · openclaw/openclaw@1fdeee3 fix(update): prefer existing npm plugins during repair fix(update): preserve post-core host version · openclaw/openclaw@e57fa51 chore(release): update appcast for 2026.5.19 · openclaw/openclaw@ec8e700 chore(release): refresh generated baselines · openclaw/openclaw@6c7fe58 chore(release): bump version to 2026.5.20 · openclaw/openclaw@7b90661 fix(doctor): migrate invalid thinking formats (#84626) · openclaw/openclaw@6e9d47b fix(slack): normalize approval user ids (#84671) · openclaw/openclaw@9e4eca0
fix(sessions): preserve compatible auth overrides (#85014) · openclaw/openclaw@b33deb4
clawsweeper · 2026-05-22 · via Recent Commits to openclaw:main

@@ -1,4 +1,5 @@

11

import { afterEach, describe, expect, test } from "vitest";

2+

import { resetProviderAuthAliasMapCacheForTest } from "../agents/provider-auth-aliases.js";

23

import type { OpenClawConfig } from "../config/config.js";

34

import type { SessionEntry } from "../config/sessions.js";

45

import { createEmptyPluginRegistry } from "../plugins/registry-empty.js";

@@ -108,6 +109,7 @@ function createAllowlistedAnthropicModelCfg(): OpenClawConfig {

108109109110

describe("gateway sessions patch", () => {

110111

afterEach(() => {

112+

resetProviderAuthAliasMapCacheForTest();

111113

resetPluginRuntimeStateForTest();

112114

});

113115

@@ -271,7 +273,7 @@ describe("gateway sessions patch", () => {

271273

expectPatchError(result, "invalid elevatedLevel");

272274

});

273275274-

test("clears auth overrides when model patch changes", async () => {

276+

test("preserves same-provider auth overrides when model patch changes", async () => {

275277

const store: Record<string, SessionEntry> = {

276278

"agent:main:main": {

277279

sessionId: "sess",

@@ -294,6 +296,151 @@ describe("gateway sessions patch", () => {

294296

);

295297

expect(entry.providerOverride).toBe("anthropic");

296298

expect(entry.modelOverride).toBe("claude-sonnet-4-6");

299+

expect(entry.authProfileOverride).toBe("anthropic:default");

300+

expect(entry.authProfileOverrideSource).toBe("user");

301+

expect(entry.authProfileOverrideCompactionCount).toBe(3);

302+

});

303+304+

test("preserves auth overrides for provider-auth aliases when model patch changes", async () => {

305+

const store: Record<string, SessionEntry> = {

306+

"agent:main:main": {

307+

sessionId: "sess-alias",

308+

updatedAt: 1,

309+

providerOverride: "byteplus",

310+

modelOverride: "seedance-1-0-lite-t2v-250428",

311+

authProfileOverride: "byteplus:work",

312+

authProfileOverrideSource: "user",

313+

authProfileOverrideCompactionCount: 2,

314+

} as SessionEntry,

315+

};

316+

const entry = expectPatchOk(

317+

await runPatch({

318+

store,

319+

patch: { key: MAIN_SESSION_KEY, model: "byteplus-plan/ark-code-latest" },

320+

loadGatewayModelCatalog: async () => [

321+

{ provider: "byteplus-plan", id: "ark-code-latest", name: "ark-code-latest" },

322+

],

323+

}),

324+

);

325+

expect(entry.providerOverride).toBe("byteplus-plan");

326+

expect(entry.modelOverride).toBe("ark-code-latest");

327+

expect(entry.authProfileOverride).toBe("byteplus:work");

328+

expect(entry.authProfileOverrideSource).toBe("user");

329+

expect(entry.authProfileOverrideCompactionCount).toBe(2);

330+

});

331+332+

test("preserves unprefixed auth overrides when existing provider matches model patch", async () => {

333+

const store: Record<string, SessionEntry> = {

334+

"agent:main:main": {

335+

sessionId: "sess-unprefixed-same-provider",

336+

updatedAt: 1,

337+

providerOverride: "anthropic",

338+

modelOverride: "claude-opus-4-6",

339+

authProfileOverride: "work",

340+

authProfileOverrideSource: "user",

341+

authProfileOverrideCompactionCount: 4,

342+

} as SessionEntry,

343+

};

344+

const entry = expectPatchOk(

345+

await runPatch({

346+

store,

347+

patch: { key: MAIN_SESSION_KEY, model: "anthropic/claude-sonnet-4-6" },

348+

loadGatewayModelCatalog: async () => [

349+

{ provider: "anthropic", id: "claude-sonnet-4-6", name: "sonnet" },

350+

],

351+

}),

352+

);

353+

expect(entry.providerOverride).toBe("anthropic");

354+

expect(entry.modelOverride).toBe("claude-sonnet-4-6");

355+

expect(entry.authProfileOverride).toBe("work");

356+

expect(entry.authProfileOverrideSource).toBe("user");

357+

expect(entry.authProfileOverrideCompactionCount).toBe(4);

358+

});

359+360+

test("preserves unprefixed auth overrides when existing provider is the default", async () => {

361+

const store: Record<string, SessionEntry> = {

362+

"agent:main:main": {

363+

sessionId: "sess-unprefixed-default-provider",

364+

updatedAt: 1,

365+

authProfileOverride: "work",

366+

authProfileOverrideSource: "user",

367+

authProfileOverrideCompactionCount: 4,

368+

} as SessionEntry,

369+

};

370+

const entry = expectPatchOk(

371+

await runPatch({

372+

cfg: {

373+

agents: {

374+

defaults: {

375+

model: { primary: "anthropic/claude-opus-4-6" },

376+

},

377+

},

378+

} as OpenClawConfig,

379+

store,

380+

patch: { key: MAIN_SESSION_KEY, model: "anthropic/claude-sonnet-4-6" },

381+

loadGatewayModelCatalog: async () => [

382+

{ provider: "anthropic", id: "claude-sonnet-4-6", name: "sonnet" },

383+

],

384+

}),

385+

);

386+

expect(entry.providerOverride).toBe("anthropic");

387+

expect(entry.modelOverride).toBe("claude-sonnet-4-6");

388+

expect(entry.authProfileOverride).toBe("work");

389+

expect(entry.authProfileOverrideSource).toBe("user");

390+

expect(entry.authProfileOverrideCompactionCount).toBe(4);

391+

});

392+393+

test("clears unprefixed auth overrides when model patch changes provider", async () => {

394+

const store: Record<string, SessionEntry> = {

395+

"agent:main:main": {

396+

sessionId: "sess-unprefixed-provider-change",

397+

updatedAt: 1,

398+

providerOverride: "anthropic",

399+

modelOverride: "claude-opus-4-6",

400+

authProfileOverride: "work",

401+

authProfileOverrideSource: "user",

402+

authProfileOverrideCompactionCount: 4,

403+

} as SessionEntry,

404+

};

405+

const entry = expectPatchOk(

406+

await runPatch({

407+

store,

408+

patch: { key: MAIN_SESSION_KEY, model: "openai/gpt-5.4" },

409+

loadGatewayModelCatalog: async () => [

410+

{ provider: "openai", id: "gpt-5.4", name: "gpt-5.4" },

411+

],

412+

}),

413+

);

414+

expect(entry.providerOverride).toBe("openai");

415+

expect(entry.modelOverride).toBe("gpt-5.4");

416+

expect(entry.authProfileOverride).toBeUndefined();

417+

expect(entry.authProfileOverrideSource).toBeUndefined();

418+

expect(entry.authProfileOverrideCompactionCount).toBeUndefined();

419+

});

420+421+

test("clears provider-prefixed auth overrides when model patch changes provider", async () => {

422+

const store: Record<string, SessionEntry> = {

423+

"agent:main:main": {

424+

sessionId: "sess-provider-change",

425+

updatedAt: 1,

426+

providerOverride: "anthropic",

427+

modelOverride: "claude-opus-4-6",

428+

authProfileOverride: "anthropic:default",

429+

authProfileOverrideSource: "user",

430+

authProfileOverrideCompactionCount: 3,

431+

} as SessionEntry,

432+

};

433+

const entry = expectPatchOk(

434+

await runPatch({

435+

store,

436+

patch: { key: MAIN_SESSION_KEY, model: "openai/gpt-5.4" },

437+

loadGatewayModelCatalog: async () => [

438+

{ provider: "openai", id: "gpt-5.4", name: "gpt-5.4" },

439+

],

440+

}),

441+

);

442+

expect(entry.providerOverride).toBe("openai");

443+

expect(entry.modelOverride).toBe("gpt-5.4");

297444

expect(entry.authProfileOverride).toBeUndefined();

298445

expect(entry.authProfileOverrideSource).toBeUndefined();

299446

expect(entry.authProfileOverrideCompactionCount).toBeUndefined();