mirror of https://github.com/openclaw/openclaw.git
fix(gateway): remove re-introduced auth.mode=none pairing bypass
The revert of #43478 (commit39b4185d0b) was silently undone by3704293e6fwhich was based on a branch that included the original change. This removes the auth.mode=none skipPairing condition again. The blanket skip was too broad - it disabled pairing for ALL websocket clients, not just Control UI behind reverse proxies.
This commit is contained in:
parent
b5b589d99d
commit
92fc8065e9
|
|
@ -674,18 +674,14 @@ export function attachGatewayWsMessageHandler(params: {
|
||||||
authOk,
|
authOk,
|
||||||
authMethod,
|
authMethod,
|
||||||
});
|
});
|
||||||
// auth.mode=none disables all authentication — device pairing is an
|
|
||||||
// auth mechanism and must also be skipped when the operator opted out.
|
|
||||||
const skipPairing =
|
const skipPairing =
|
||||||
resolvedAuth.mode === "none" ||
|
|
||||||
shouldSkipBackendSelfPairing({
|
shouldSkipBackendSelfPairing({
|
||||||
connectParams,
|
connectParams,
|
||||||
isLocalClient,
|
isLocalClient,
|
||||||
hasBrowserOriginHeader,
|
hasBrowserOriginHeader,
|
||||||
sharedAuthOk,
|
sharedAuthOk,
|
||||||
authMethod,
|
authMethod,
|
||||||
}) ||
|
}) || shouldSkipControlUiPairing(controlUiAuthPolicy, role, trustedProxyAuthOk);
|
||||||
shouldSkipControlUiPairing(controlUiAuthPolicy, role, trustedProxyAuthOk);
|
|
||||||
if (device && devicePublicKey && !skipPairing) {
|
if (device && devicePublicKey && !skipPairing) {
|
||||||
const formatAuditList = (items: string[] | undefined): string => {
|
const formatAuditList = (items: string[] | undefined): string => {
|
||||||
if (!items || items.length === 0) {
|
if (!items || items.length === 0) {
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue