openclaw/docs/gateway
Bob 6a705a37f2
ACP: add persistent Discord channel and Telegram topic bindings (#34873)
* docs: add ACP persistent binding experiment plan

* docs: align ACP persistent binding spec to channel-local config

* docs: scope Telegram ACP bindings to forum topics only

* docs: lock bound /new and /reset behavior to in-place ACP reset

* ACP: add persistent discord/telegram conversation bindings

* ACP: fix persistent binding reuse and discord thread parent context

* docs: document channel-specific persistent ACP bindings

* ACP: split persistent bindings and share conversation id helpers

* ACP: defer configured binding init until preflight passes

* ACP: fix discord thread parent fallback and explicit disable inheritance

* ACP: keep bound /new and /reset in-place

* ACP: honor configured bindings in native command flows

* ACP: avoid configured fallback after runtime bind failure

* docs: refine ACP bindings experiment config examples

* acp: cut over to typed top-level persistent bindings

* ACP bindings: harden reset recovery and native command auth

* Docs: add ACP bound command auth proposal

* Tests: normalize i18n registry zh-CN assertion encoding

* ACP bindings: address review findings for reset and fallback routing

* ACP reset: gate hooks on success and preserve /new arguments

* ACP bindings: fix auth and binding-priority review findings

* Telegram ACP: gate ensure on auth and accepted messages

* ACP bindings: fix session-key precedence and unavailable handling

* ACP reset/native commands: honor fallback targets and abort on bootstrap failure

* Config schema: validate ACP binding channel and Telegram topic IDs

* Discord ACP: apply configured DM bindings to native commands

* ACP reset tails: dispatch through ACP after command handling

* ACP tails/native reset auth: fix target dispatch and restore full auth

* ACP reset detection: fallback to active ACP keys for DM contexts

* Tests: type runTurn mock input in ACP dispatch test

* ACP: dedup binding route bootstrap and reset target resolution

* reply: align ACP reset hooks with bound session key

* docs: replace personal discord ids with placeholders

* fix: add changelog entry for ACP persistent bindings (#34873) (thanks @dutifulbob)

---------

Co-authored-by: Onur <2453968+osolmaz@users.noreply.github.com>
2026-03-05 09:38:12 +01:00
..
security fix(discord): align DiscordAccountConfig.token type with SecretInput (#32490) 2026-03-03 14:59:57 -06:00
authentication.md follow-up: align ingress, atomic paths, and channel tests with credential semantics (#33733) 2026-03-03 20:29:46 -06:00
background-process.md Exec/ACP: inject OPENCLAW_SHELL into child shell env (#31271) 2026-03-01 20:31:06 -08:00
bonjour.md
bridge-protocol.md
cli-backends.md fix: code/cli acpx reliability 20260304 (#34020) 2026-03-04 01:15:28 -05:00
configuration-examples.md docs: tighten subscription guidance and update MiniMax M2.5 refs 2026-03-03 00:02:37 +00:00
configuration-reference.md ACP: add persistent Discord channel and Telegram topic bindings (#34873) 2026-03-05 09:38:12 +01:00
configuration.md feat(secrets): expand SecretRef coverage across user-supplied credentials (#29580) 2026-03-03 02:58:20 +00:00
discovery.md
doctor.md fix(telegram): warn when accounts.default is missing in multi-account setup (#32544) 2026-03-03 03:27:19 -05:00
gateway-lock.md
health.md
heartbeat.md
index.md
local-models.md docs: tighten subscription guidance and update MiniMax M2.5 refs 2026-03-03 00:02:37 +00:00
logging.md
multiple-gateways.md
network-model.md
openai-http-api.md fix(gateway): enforce owner boundary for agent runs 2026-03-02 00:27:44 +00:00
openresponses-http-api.md fix(gateway): enforce owner boundary for agent runs 2026-03-02 00:27:44 +00:00
pairing.md
protocol.md refactor!: remove versioned system-run approval contract 2026-03-02 01:12:53 +00:00
remote-gateway-readme.md
remote.md fix(gateway): allow ws:// to private network addresses (#28670) 2026-03-01 20:49:45 -08:00
sandbox-vs-tool-policy-vs-elevated.md
sandboxing.md feat(security): Harden Docker browser container chromium flags (#23889) (#31504) 2026-03-02 11:28:27 -08:00
secrets-plan-contract.md feat(secrets): expand SecretRef coverage across user-supplied credentials (#29580) 2026-03-03 02:58:20 +00:00
secrets.md feat(secrets): expand SecretRef coverage across user-supplied credentials (#29580) 2026-03-03 02:58:20 +00:00
tailscale.md
tools-invoke-http-api.md
troubleshooting.md
trusted-proxy-auth.md