mirror of https://github.com/openclaw/openclaw.git
revert: 9bffa3422c
This commit is contained in:
parent
173fe3cb54
commit
39b4185d0b
|
|
@ -96,7 +96,6 @@ Docs: https://docs.openclaw.ai
|
||||||
- Telegram/media errors: redact Telegram file URLs before building media fetch errors so failed inbound downloads do not leak bot tokens into logs. Thanks @space08.
|
- Telegram/media errors: redact Telegram file URLs before building media fetch errors so failed inbound downloads do not leak bot tokens into logs. Thanks @space08.
|
||||||
- Agents/failover: normalize abort-wrapped `429 RESOURCE_EXHAUSTED` provider failures before abort short-circuiting so wrapped Google/Vertex rate limits continue across configured fallback models, including the embedded runner prompt-error path. (#39820) Thanks @lupuletic.
|
- Agents/failover: normalize abort-wrapped `429 RESOURCE_EXHAUSTED` provider failures before abort short-circuiting so wrapped Google/Vertex rate limits continue across configured fallback models, including the embedded runner prompt-error path. (#39820) Thanks @lupuletic.
|
||||||
- Mattermost/thread routing: non-inbound reply paths (TUI/WebUI turns, tool-call callbacks, subagent responses) now correctly route to the originating Mattermost thread when `replyToMode: "all"` is active; also prevents stale `origin.threadId` metadata from resurrecting cleared thread routes. (#44283) thanks @teconomix
|
- Mattermost/thread routing: non-inbound reply paths (TUI/WebUI turns, tool-call callbacks, subagent responses) now correctly route to the originating Mattermost thread when `replyToMode: "all"` is active; also prevents stale `origin.threadId` metadata from resurrecting cleared thread routes. (#44283) thanks @teconomix
|
||||||
- Gateway/websocket pairing bypass for disabled auth: skip device-pairing enforcement when `gateway.auth.mode=none` so Control UI connections behind reverse proxies no longer get stuck on `pairing required` (code 1008) despite auth being explicitly disabled. (#42931)
|
|
||||||
- Auth/login lockout recovery: clear stale `auth_permanent` and `billing` disabled state for all profiles matching the target provider when `openclaw models auth login` is invoked, so users locked out by expired or revoked OAuth tokens can recover by re-authenticating instead of waiting for the cooldown timer to expire. (#43057)
|
- Auth/login lockout recovery: clear stale `auth_permanent` and `billing` disabled state for all profiles matching the target provider when `openclaw models auth login` is invoked, so users locked out by expired or revoked OAuth tokens can recover by re-authenticating instead of waiting for the cooldown timer to expire. (#43057)
|
||||||
|
|
||||||
## 2026.3.12
|
## 2026.3.12
|
||||||
|
|
|
||||||
|
|
@ -674,10 +674,7 @@ export function attachGatewayWsMessageHandler(params: {
|
||||||
authOk,
|
authOk,
|
||||||
authMethod,
|
authMethod,
|
||||||
});
|
});
|
||||||
// auth.mode=none disables all authentication — device pairing is an
|
|
||||||
// auth mechanism and must also be skipped when the operator opted out.
|
|
||||||
const skipPairing =
|
const skipPairing =
|
||||||
resolvedAuth.mode === "none" ||
|
|
||||||
shouldSkipBackendSelfPairing({
|
shouldSkipBackendSelfPairing({
|
||||||
connectParams,
|
connectParams,
|
||||||
isLocalClient,
|
isLocalClient,
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue