Skip to content

docs: Add manual OAuth setup for remote/headless deployments#67

Merged
steipete merged 1 commit intoopenclaw:mainfrom
wstock:docs/claude-code-oauth-setup
Jan 1, 2026
Merged

docs: Add manual OAuth setup for remote/headless deployments#67
steipete merged 1 commit intoopenclaw:mainfrom
wstock:docs/claude-code-oauth-setup

Conversation

@wstock
Copy link
Copy Markdown
Contributor

@wstock wstock commented Jan 1, 2026

Summary

Expands the "Remote mode note" section with practical guidance for headless/Docker/SSH deployments:

  • Document exact oauth.json format required (access, refresh, expires)
  • Clarify that auto-import only works for pi-coding-agent legacy paths, not Claude Code
  • Add jq script to convert Claude Code credentials to Clawdis format

Context

When running Clawdis remotely (Docker, SSH, headless server), users cannot use the macOS app OAuth flow and need to manually set up credentials. This was undocumented, causing confusion when credentials copied from Claude Code did not work due to different field names.

🤖 Generated with Claude Code

Expand "Remote mode note" section with:
- Exact oauth.json format required (access, refresh, expires)
- Note that auto-import doesn't work with Claude Code credentials
- jq script to convert Claude Code credentials to Clawdis format

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
@wstock wstock force-pushed the docs/claude-code-oauth-setup branch from 84bce7f to f9ddda1 Compare January 1, 2026 14:28
@wstock wstock changed the title docs: Add Claude Code OAuth credential conversion guide docs: Add manual OAuth setup for remote/headless deployments Jan 1, 2026
@steipete
Copy link
Copy Markdown
Contributor

steipete commented Jan 1, 2026

Thank you! Very helpful!

@steipete steipete merged commit 7366b55 into openclaw:main Jan 1, 2026
1 check passed
dgarson referenced this pull request in dgarson/clawdbot Feb 4, 2026
chore: resolve merge conflicts and fix lint errors
Dulyawat-K added a commit to Dulyawat-K/openclaw that referenced this pull request Feb 4, 2026
- Add Extended Cognitive State endpoint (openclaw#66)
- Add Create Cognitive Event endpoint (openclaw#67)
- Add Create Affect Signal endpoint (openclaw#68)
- Add Patch Current Intent endpoint (openclaw#69)
- Add Get Explanation Hooks endpoint (openclaw#70)
- Update ToC with AERITH Runtime Wiring section

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
@slayoffer
Copy link
Copy Markdown

@claude please review this PR

songliu0403-rgb pushed a commit to songliu0403-rgb/openclaw that referenced this pull request Feb 26, 2026
Piboonsak referenced this pull request in Piboonsak/openclaw_github Mar 6, 2026
Adds env_file directive to docker-compose.prod.yml for flexible environment configuration.

Benefits:
- Load environment variables from .env file (copy from .env.example)
- Easier local development and testing
- Cleaner separation of config from secrets
- Supports agent workspace development iteration

Related to agent self-development capability sprint.
Piboonsak referenced this pull request in Piboonsak/openclaw_github Mar 6, 2026
deploy.sh previously only sed-updated the image tag in the VPS compose
file. New volume mounts (env_file, .env:/home/node/.env:ro, gitrepo)
from docker-compose.prod.yml never reached the VPS.

Changes:
- Add scp step to sync docker-compose.prod.yml -> VPS before deploy
- Add chown 1000:1000 for volumes/gitrepo bind-mount target
- Add .env placeholder creation to prevent Docker creating a directory
- Update deploy-vps.yml comment to reflect new sync behavior
heatherstew44-maker pushed a commit to heatherstew44-maker/openclaw that referenced this pull request Mar 8, 2026
style(overlay): update recording overlay theme to pink palette
CyberSpencer added a commit to CyberSpencer/openclaw that referenced this pull request Mar 19, 2026
Resolves contract drift across control UI host/render/gateway wiring and gateway server method typing so core gates return to green.

Refs openclaw#63

Refs openclaw#64

Refs openclaw#65

Refs openclaw#66

Refs openclaw#67
CyberSpencer added a commit to CyberSpencer/openclaw that referenced this pull request Mar 19, 2026
Applies oxfmt normalization to previously drifting docs and a small set of source/test/style files so pnpm check is fully green again.

Refs openclaw#67
jfy9606 pushed a commit to jfy9606/openclaw that referenced this pull request Mar 22, 2026
openclaw#67)

Bumps [actions/create-github-app-token](https://github.com/actions/create-github-app-token) from 1.12.0 to 2.2.1.
- [Release notes](https://github.com/actions/create-github-app-token/releases)
- [Commits](actions/create-github-app-token@d72941d...29824e6)

---
updated-dependencies:
- dependency-name: actions/create-github-app-token
  dependency-version: 2.2.1
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
0x666c6f added a commit to 0x666c6f/openclaw that referenced this pull request Mar 26, 2026
…law#67)

* fix(slack:PLA-825): allow monitored incident thread follow-ups

* fix(slack:PLA-825): address review findings

* fix(slack:PLA-825): address follow-up review findings

* fix(slack:PLA-825): tighten thread follow-up ingress guard

* fix: clarify slack incident follow-up guards

* fix: rename slack incident follow-up bypass param

* refactor: clarify slack incident follow-up intent

* refactor(slack): clarify incident follow-up gates

* fix(slack): cover incident follow-up review gaps

* fix: preserve slack resolved follow-up filtering

* fix: drop dead slack incident ingress warn path

* refactor: clarify slack resolved-update suppression

* fix(slack): keep resolved follow-up suppression scoped

* fix(slack): audit approved incident follow-ups

* fix: address slack incident follow-up review notes

* fix(slack): allow bot-rooted incident follow-ups

* fix(slack): clarify incident thread follow-up guards
hxy91819 added a commit to hxy91819/openclaw that referenced this pull request Apr 18, 2026
Two related gaps in the CHANGELOG write path both caused PRs to land
in the wrong place:

1) `resolve_merge_changelog_section` only consulted the environment
   override and PR labels. If a PR was only tagged with something
   like `size: S` (no `bug`/`fix`/`feature` label), the default fell
   through to Changes even when the PR title made the category
   obvious (e.g. `fix(cron): clean up deleteAfterRun direct
   deliveries` on PR openclaw#67807). That Conventional-Commits prefix is
   the repo's actual classification signal for most PRs and was
   being ignored.

   Add a title-prefix fallback after the label check: a title
   starting with `fix`, `bugfix`, or `hotfix` (followed by `(`, `:`,
   `!`, or whitespace) routes to Fixes; `feat`, `feature`, `enhance`
   route to Changes. Labels still win when present. Deliberately
   strict so `fixup!`, `fixing ...`, `fixture updates`, `featured
   posts` are not misread as `fix:`/`feat:`.

2) `appendUnreleasedChangelogEntry` deduped only on full-text
   equivalence. When a PR had a detailed entry written during
   prepare and then the merge step called `ensure_pr_changelog_entry`
   again with the short PR-title form, the two text bodies differed
   and the same PR got a duplicate line — that is what happened to
   PR openclaw#67679, which ended up with lines under both `### Changes` and
   `### Fixes`.

   Add a stronger precheck: scan the `## Unreleased` block for any
   existing bullet whose first PR reference matches the new entry's
   PR number. If one exists anywhere in the block (any sub-section),
   skip insertion. Dedup is scoped to Unreleased so the same PR
   number in a released block does not suppress a new Unreleased
   entry, and uses integer-equality on the PR number so `openclaw#67` is
   not shadowed by `openclaw#6767`.

Together these two changes cover both of the recently observed
failure modes:
- Missing section signal from labels (PR openclaw#67807) is now picked up
  from the title.
- Second ensure at merge time (PR openclaw#67679) no longer plants a
  duplicate in a different sub-section.

Covered by shell smoke (27 resolver scenarios) and vitest (12 cases
incl. the openclaw#67679 cross-section regression, released-block false
positive, and PR-number prefix collision).
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants