onboard: add non-interactive trusted-proxy flags and allowUsers#49107
onboard: add non-interactive trusted-proxy flags and allowUsers#49107mattf wants to merge 3 commits intoopenclaw:mainfrom
Conversation
|
Codex review: found issues before merge. Summary Reproducibility: yes. Source inspection shows current main rejects Next step before merge Security Review findings
Review detailsBest possible solution: Land a focused, rebased implementation that mirrors the existing gateway auth builder semantics, wires Commander option keys correctly, and treats loopback trusted-proxy support as an explicit opt-in rather than implied docs behavior. Do we have a high-confidence way to reproduce the issue? Yes. Source inspection shows current main rejects Is this the best way to solve the issue? No, not as submitted. Non-interactive onboard is the right layer, but the patch needs safer auth-mode replacement, correct Commander flag plumbing, and explicit loopback trust handling before it is the maintainable fix. Full review comments:
Overall correctness: patch is incorrect Security concerns:
What I checked:
Likely related people:
Remaining risk / open question:
Codex review notes: model gpt-5.5, reasoning high; reviewed against 89db1e5440f5. |
|
addresses #73639 |
Adds non-interactive CLI flags to configure gateway trusted-proxy and Control UI allowed origins.
Changes:
Testing: unit tests for gateway-config passed locally.
Related work: add links here if desired.