@gguf/claw
Version:
Multi-channel AI gateway with extensible messaging integrations
1,395 lines (1,381 loc) • 98 kB
JavaScript
import { t as CONFIG_PATH } from "./paths-B4BZAPZh.js";
import { B as theme, R as colorize, S as shortenHomePath, z as isRich$1 } from "./utils-CP9YLh6M.js";
import "./thinking-EAliFiVK.js";
import { Ct as formatUsageWindowSummary, Yt as describeFailoverError, cr as buildAuthHealthSummary, l as runEmbeddedPiAgent, lr as formatRemainingShort, or as maskApiKey, sr as DEFAULT_OAUTH_WARN_MS, wt as resolveUsageProviderId, xt as loadProviderUsageSummary } from "./reply-BylFHBd4.js";
import "./registry-B-j4DRfe.js";
import { f as defaultRuntime } from "./subsystem-BCQGGxdd.js";
import "./exec-DYqRzFbo.js";
import { D as resolveDefaultAgentWorkspaceDir, a as resolveAgentModelFallbacksOverride, c as resolveAgentWorkspaceDir, i as resolveAgentDir, l as resolveDefaultAgentId, o as resolveAgentModelPrimary } from "./agent-scope-BnZW9Gh2.js";
import { Bt as resolveAuthProfileDisplayLabel, Dt as upsertAuthProfile, Et as setAuthProfileOrder, Gt as DEFAULT_PROVIDER, J as resolveEnvApiKey, K as resolveApiKeyForProvider, Nt as resolveAuthStorePathForDisplay, Pt as resolveOpenClawAgentDir, W as getCustomProviderApiKey, Wt as DEFAULT_MODEL, X as getShellEnvAppliedKeys, dt as resolveAuthProfileOrder, g as resolveModelRefFromString, gt as resolveProfileUnusableUntilForDisplay, i as findNormalizedProviderValue, kt as ensureAuthProfileStore, l as normalizeProviderId, m as resolveDefaultModelForAgent, p as resolveConfiguredModelRef, q as resolveAwsSdkEnvVarName, r as buildModelAliasIndex, s as modelKey, tt as shouldEnableShellEnvFallback, u as parseModelRef, wt as listProfilesForProvider } from "./model-selection-CqaTAlhy.js";
import "./github-copilot-token-D2zp6kMZ.js";
import { t as formatCliCommand } from "./command-format-DEKzLnLg.js";
import "./boolean-BsqeuxE6.js";
import "./env-VriqyjXT.js";
import "./message-channel-Bena1Tzd.js";
import "./send-CsyONLnQ.js";
import { C as parseDurationMs, i as loadConfig } from "./config-PQiujvsf.js";
import "./manifest-registry-4k4vkhPS.js";
import "./runner-U04aiHHC.js";
import "./image-DxEpBZim.js";
import { t as ensureOpenClawModelsJson } from "./models-config-B459BnCS.js";
import { n as discoverModels, t as discoverAuthStorage } from "./pi-model-discovery-4uUnLc3n.js";
import "./pi-embedded-helpers-BdscQhyS.js";
import "./sandbox-UAzvS0V6.js";
import "./image-ops-CI1VknD1.js";
import "./common-a25M2Kvi.js";
import "./chrome-Dd5zBIFu.js";
import "./tailscale-C3JsBEiY.js";
import "./auth-DZSWPd8D.js";
import "./server-context-DAWsUNUs.js";
import "./frontmatter-6HZ0_y2V.js";
import "./skills-CLmzWt48.js";
import "./routes-DIQa_0pt.js";
import "./redact-B7Mjvk0c.js";
import "./errors-kfGqPQ4b.js";
import "./fs-safe-_OpKPuZA.js";
import "./paths-D1WZUYry.js";
import "./ssrf-6f5m2MMA.js";
import "./store-DSGYY-H9.js";
import "./ports-DwDxX6cS.js";
import "./trash-DLzIf__E.js";
import "./sessions-Z1BZU3xh.js";
import "./dock-7F-MiPtF.js";
import "./normalize-Ci8UyR3Z.js";
import "./accounts-Bj1dJ-fd.js";
import "./accounts-DOl1Wkxo.js";
import "./accounts-t6R5_PzC.js";
import "./bindings-Dja1z-h8.js";
import "./logging-xYH6GmRT.js";
import "./send-uu2Jc-Js.js";
import "./plugins-CKbXkuXd.js";
import { i as resolveSessionTranscriptPath, s as resolveSessionTranscriptsDirForAgent } from "./paths-C2NfoGZE.js";
import "./tool-display-Bx4M6uNT.js";
import "./fetch-guard-C1sYsWgl.js";
import "./api-key-rotation-CpGefdGL.js";
import "./local-roots-DiDvXIIo.js";
import "./sqlite-JcMMx8Z5.js";
import { n as loadModelCatalog } from "./model-catalog-CIixTnGt.js";
import "./tokens-D4lZk7-h.js";
import "./with-timeout-DijiQjw6.js";
import "./deliver-DgvS3uCz.js";
import "./diagnostic-UUwku4RV.js";
import "./diagnostic-session-state-ByqoIyGn.js";
import "./send-DbwyyQAv.js";
import { i as resolveForwardCompatModel, r as ANTIGRAVITY_OPUS_46_FORWARD_COMPAT_CANDIDATES } from "./model-VbWjwqaW.js";
import "./reply-prefix-DAK7-zK4.js";
import "./memory-cli-DxmtLhh_.js";
import "./manager-C0teWocQ.js";
import "./retry-rUEdE6zT.js";
import "./chunk-CMylpCPi.js";
import "./markdown-tables-B9VGUdDc.js";
import "./ir-24qCLTKH.js";
import "./render-CXDO_kgw.js";
import "./commands-registry-bb_U-3FM.js";
import "./client-BdSkEtCd.js";
import "./call-BCz_8mqq.js";
import "./pairing-token-B-_eiWlR.js";
import "./channel-activity-DynIQUB_.js";
import "./fetch-Bu5zBCce.js";
import "./tables-C70h_80U.js";
import "./send-CAfFUUkm.js";
import "./pairing-store-T5DpOfoL.js";
import "./proxy-BiOWrea2.js";
import { t as formatDocsLink } from "./links-BVCMOGeE.js";
import { n as runCommandWithRuntime, t as resolveOptionFromCommand } from "./cli-utils-CX1oQ81G.js";
import "./help-format-dbk2xW0E.js";
import { r as withProgressTotals } from "./progress-CaVMHLaE.js";
import "./resolve-route-2TU_aaLs.js";
import "./replies-NhrZJ3yf.js";
import "./skill-commands-N8Sho46-.js";
import "./workspace-dirs-CE3CxabZ.js";
import "./pi-tools.policy-DTy1DnPK.js";
import "./outbound-attachment-CntoLTI_.js";
import "./delivery-queue-CxDDEWQg.js";
import "./session-cost-usage-BlUDaylg.js";
import "./send-4LoRaltQ.js";
import { f as openUrl } from "./onboard-helpers-DbjfBSMX.js";
import { n as stylePromptMessage, r as stylePromptTitle, t as stylePromptHint } from "./prompt-style-VqCNjBi8.js";
import "./pairing-labels-DaESq9ML.js";
import "./exec-approvals-q0C8VDMT.js";
import "./nodes-screen-5fMfTT2n.js";
import "./control-service-BoO2TGOx.js";
import "./stagger-B6VQyn1F.js";
import "./channel-selection-DuDSoVSC.js";
import "./note-C-OTWf0F.js";
import { t as createClackPrompter } from "./clack-prompter-C8qX15zH.js";
import { t as renderTable } from "./table-D-EOwMue.js";
import { t as inferParamBFromIdOrName } from "./model-param-b-Cp9d4e-0.js";
import { n as redactSecrets } from "./format-B0yJsjEo.js";
import { a as isLocalBaseUrl, c as normalizeAlias, d as resolveModelTarget, f as updateConfig, i as formatTokenK, l as resolveKnownAgentId, n as ensureFlagCompatibility, o as loadValidConfigOrThrow, r as formatMs, s as mergePrimaryFallbackConfig, t as applyDefaultModelPrimaryUpdate, u as resolveModelKeysFromEntries } from "./shared-B-zggieW.js";
import { d as applyAuthProfileConfig, n as validateAnthropicSetupToken } from "./auth-token-CliHE70g.js";
import { n as logConfigUpdated } from "./logging-Cl6-FWdR.js";
import { a as createVpsAwareOAuthHandlers, c as githubCopilotLoginCommand, i as resolveProviderMatch, n as mergeConfigPatch, o as isRemoteEnvironment, r as pickAuthMethod, s as resolvePluginProviders, t as applyDefaultModel } from "./provider-auth-helpers-Bnx6HWum.js";
import { t as ensurePiAuthJsonFromAuthProfiles } from "./system-cli-CxV1Vjj3.js";
import path from "node:path";
import fs from "node:fs/promises";
import crypto from "node:crypto";
import { complete, getEnvApiKey, getModel } from "@mariozechner/pi-ai";
import { Type } from "@sinclair/typebox";
import { cancel, confirm, isCancel, multiselect, select, text } from "@clack/prompts";
//#region src/commands/models/aliases.ts
async function modelsAliasesListCommand(opts, runtime) {
ensureFlagCompatibility(opts);
const models = loadConfig().agents?.defaults?.models ?? {};
const aliases = Object.entries(models).reduce((acc, [modelKey, entry]) => {
const alias = entry?.alias?.trim();
if (alias) acc[alias] = modelKey;
return acc;
}, {});
if (opts.json) {
runtime.log(JSON.stringify({ aliases }, null, 2));
return;
}
if (opts.plain) {
for (const [alias, target] of Object.entries(aliases)) runtime.log(`${alias} ${target}`);
return;
}
runtime.log(`Aliases (${Object.keys(aliases).length}):`);
if (Object.keys(aliases).length === 0) {
runtime.log("- none");
return;
}
for (const [alias, target] of Object.entries(aliases)) runtime.log(`- ${alias} -> ${target}`);
}
async function modelsAliasesAddCommand(aliasRaw, modelRaw, runtime) {
const alias = normalizeAlias(aliasRaw);
const resolved = resolveModelTarget({
raw: modelRaw,
cfg: loadConfig()
});
await updateConfig((cfg) => {
const modelKey = `${resolved.provider}/${resolved.model}`;
const nextModels = { ...cfg.agents?.defaults?.models };
for (const [key, entry] of Object.entries(nextModels)) {
const existing = entry?.alias?.trim();
if (existing && existing === alias && key !== modelKey) throw new Error(`Alias ${alias} already points to ${key}.`);
}
nextModels[modelKey] = {
...nextModels[modelKey] ?? {},
alias
};
return {
...cfg,
agents: {
...cfg.agents,
defaults: {
...cfg.agents?.defaults,
models: nextModels
}
}
};
});
logConfigUpdated(runtime);
runtime.log(`Alias ${alias} -> ${resolved.provider}/${resolved.model}`);
}
async function modelsAliasesRemoveCommand(aliasRaw, runtime) {
const alias = normalizeAlias(aliasRaw);
const updated = await updateConfig((cfg) => {
const nextModels = { ...cfg.agents?.defaults?.models };
let found = false;
for (const [key, entry] of Object.entries(nextModels)) if (entry?.alias?.trim() === alias) {
nextModels[key] = {
...entry,
alias: void 0
};
found = true;
break;
}
if (!found) throw new Error(`Alias not found: ${alias}`);
return {
...cfg,
agents: {
...cfg.agents,
defaults: {
...cfg.agents?.defaults,
models: nextModels
}
}
};
});
logConfigUpdated(runtime);
if (!updated.agents?.defaults?.models || Object.values(updated.agents.defaults.models).every((entry) => !entry?.alias?.trim())) runtime.log("No aliases configured.");
}
//#endregion
//#region src/commands/models/auth.ts
const confirm$1 = (params) => confirm({
...params,
message: stylePromptMessage(params.message)
});
const text$1 = (params) => text({
...params,
message: stylePromptMessage(params.message)
});
const select$1 = (params) => select({
...params,
message: stylePromptMessage(params.message),
options: params.options.map((opt) => opt.hint === void 0 ? opt : {
...opt,
hint: stylePromptHint(opt.hint)
})
});
function resolveTokenProvider(raw) {
const trimmed = raw?.trim();
if (!trimmed) return null;
if (normalizeProviderId(trimmed) === "anthropic") return "anthropic";
return "custom";
}
function resolveDefaultTokenProfileId(provider) {
return `${normalizeProviderId(provider)}:manual`;
}
async function modelsAuthSetupTokenCommand(opts, runtime) {
const provider = resolveTokenProvider(opts.provider ?? "anthropic");
if (provider !== "anthropic") throw new Error("Only --provider anthropic is supported for setup-token.");
if (!process.stdin.isTTY) throw new Error("setup-token requires an interactive TTY.");
if (!opts.yes) {
if (!await confirm$1({
message: "Have you run `claude setup-token` and copied the token?",
initialValue: true
})) return;
}
const tokenInput = await text$1({
message: "Paste Anthropic setup-token",
validate: (value) => validateAnthropicSetupToken(String(value ?? ""))
});
const token = String(tokenInput ?? "").trim();
const profileId = resolveDefaultTokenProfileId(provider);
upsertAuthProfile({
profileId,
credential: {
type: "token",
provider,
token
}
});
await updateConfig((cfg) => applyAuthProfileConfig(cfg, {
profileId,
provider,
mode: "token"
}));
logConfigUpdated(runtime);
runtime.log(`Auth profile: ${profileId} (${provider}/token)`);
}
async function modelsAuthPasteTokenCommand(opts, runtime) {
const rawProvider = opts.provider?.trim();
if (!rawProvider) throw new Error("Missing --provider.");
const provider = normalizeProviderId(rawProvider);
const profileId = opts.profileId?.trim() || resolveDefaultTokenProfileId(provider);
const tokenInput = await text$1({
message: `Paste token for ${provider}`,
validate: (value) => value?.trim() ? void 0 : "Required"
});
const token = String(tokenInput ?? "").trim();
const expires = opts.expiresIn?.trim() && opts.expiresIn.trim().length > 0 ? Date.now() + parseDurationMs(String(opts.expiresIn ?? "").trim(), { defaultUnit: "d" }) : void 0;
upsertAuthProfile({
profileId,
credential: {
type: "token",
provider,
token,
...expires ? { expires } : {}
}
});
await updateConfig((cfg) => applyAuthProfileConfig(cfg, {
profileId,
provider,
mode: "token"
}));
logConfigUpdated(runtime);
runtime.log(`Auth profile: ${profileId} (${provider}/token)`);
}
async function modelsAuthAddCommand(_opts, runtime) {
const provider = await select$1({
message: "Token provider",
options: [{
value: "anthropic",
label: "anthropic"
}, {
value: "custom",
label: "custom (type provider id)"
}]
});
const providerId = provider === "custom" ? normalizeProviderId(String(await text$1({
message: "Provider id",
validate: (value) => value?.trim() ? void 0 : "Required"
}))) : provider;
if (await select$1({
message: "Token method",
options: [...providerId === "anthropic" ? [{
value: "setup-token",
label: "setup-token (claude)",
hint: "Paste a setup-token from `claude setup-token`"
}] : [], {
value: "paste",
label: "paste token"
}]
}) === "setup-token") {
await modelsAuthSetupTokenCommand({ provider: providerId }, runtime);
return;
}
const profileIdDefault = resolveDefaultTokenProfileId(providerId);
await modelsAuthPasteTokenCommand({
provider: providerId,
profileId: String(await text$1({
message: "Profile id",
initialValue: profileIdDefault,
validate: (value) => value?.trim() ? void 0 : "Required"
})).trim(),
expiresIn: await confirm$1({
message: "Does this token expire?",
initialValue: false
}) ? String(await text$1({
message: "Expires in (duration)",
initialValue: "365d",
validate: (value) => {
try {
parseDurationMs(String(value ?? ""), { defaultUnit: "d" });
return;
} catch {
return "Invalid duration (e.g. 365d, 12h, 30m)";
}
}
})).trim() : void 0
}, runtime);
}
function resolveRequestedLoginProviderOrThrow(providers, rawProvider) {
const requested = rawProvider?.trim();
if (!requested) return null;
const matched = resolveProviderMatch(providers, requested);
if (matched) return matched;
const available = providers.map((provider) => provider.id).filter(Boolean).toSorted((a, b) => a.localeCompare(b));
const availableText = available.length > 0 ? available.join(", ") : "(none)";
throw new Error(`Unknown provider "${requested}". Loaded providers: ${availableText}. Verify plugins via \`${formatCliCommand("openclaw plugins list --json")}\`.`);
}
function credentialMode(credential) {
if (credential.type === "api_key") return "api_key";
if (credential.type === "token") return "token";
return "oauth";
}
async function modelsAuthLoginCommand(opts, runtime) {
if (!process.stdin.isTTY) throw new Error("models auth login requires an interactive TTY.");
const config = await loadValidConfigOrThrow();
const defaultAgentId = resolveDefaultAgentId(config);
const agentDir = resolveAgentDir(config, defaultAgentId);
const workspaceDir = resolveAgentWorkspaceDir(config, defaultAgentId) ?? resolveDefaultAgentWorkspaceDir();
const providers = resolvePluginProviders({
config,
workspaceDir
});
if (providers.length === 0) throw new Error(`No provider plugins found. Install one via \`${formatCliCommand("openclaw plugins install")}\`.`);
const prompter = createClackPrompter();
const selectedProvider = resolveRequestedLoginProviderOrThrow(providers, opts.provider) ?? await prompter.select({
message: "Select a provider",
options: providers.map((provider) => ({
value: provider.id,
label: provider.label,
hint: provider.docsPath ? `Docs: ${provider.docsPath}` : void 0
}))
}).then((id) => resolveProviderMatch(providers, String(id)));
if (!selectedProvider) throw new Error("Unknown provider. Use --provider <id> to pick a provider plugin.");
const chosenMethod = pickAuthMethod(selectedProvider, opts.method) ?? (selectedProvider.auth.length === 1 ? selectedProvider.auth[0] : await prompter.select({
message: `Auth method for ${selectedProvider.label}`,
options: selectedProvider.auth.map((method) => ({
value: method.id,
label: method.label,
hint: method.hint
}))
}).then((id) => selectedProvider.auth.find((method) => method.id === String(id))));
if (!chosenMethod) throw new Error("Unknown auth method. Use --method <id> to select one.");
const isRemote = isRemoteEnvironment();
const result = await chosenMethod.run({
config,
agentDir,
workspaceDir,
prompter,
runtime,
isRemote,
openUrl: async (url) => {
await openUrl(url);
},
oauth: { createVpsAwareHandlers: (params) => createVpsAwareOAuthHandlers(params) }
});
for (const profile of result.profiles) upsertAuthProfile({
profileId: profile.profileId,
credential: profile.credential,
agentDir
});
await updateConfig((cfg) => {
let next = cfg;
if (result.configPatch) next = mergeConfigPatch(next, result.configPatch);
for (const profile of result.profiles) next = applyAuthProfileConfig(next, {
profileId: profile.profileId,
provider: profile.credential.provider,
mode: credentialMode(profile.credential)
});
if (opts.setDefault && result.defaultModel) next = applyDefaultModel(next, result.defaultModel);
return next;
});
logConfigUpdated(runtime);
for (const profile of result.profiles) runtime.log(`Auth profile: ${profile.profileId} (${profile.credential.provider}/${credentialMode(profile.credential)})`);
if (result.defaultModel) runtime.log(opts.setDefault ? `Default model set to ${result.defaultModel}` : `Default model available: ${result.defaultModel} (use --set-default to apply)`);
if (result.notes && result.notes.length > 0) await prompter.note(result.notes.join("\n"), "Provider notes");
}
//#endregion
//#region src/commands/models/auth-order.ts
function resolveTargetAgent(cfg, raw) {
const agentId = resolveKnownAgentId({
cfg,
rawAgentId: raw
}) ?? resolveDefaultAgentId(cfg);
return {
agentId,
agentDir: resolveAgentDir(cfg, agentId)
};
}
function describeOrder(store, provider) {
const providerKey = normalizeProviderId(provider);
const order = store.order?.[providerKey];
return Array.isArray(order) ? order : [];
}
function resolveAuthOrderContext(opts) {
const rawProvider = opts.provider?.trim();
if (!rawProvider) throw new Error("Missing --provider.");
const provider = normalizeProviderId(rawProvider);
const cfg = loadConfig();
const { agentId, agentDir } = resolveTargetAgent(cfg, opts.agent);
return {
cfg,
agentId,
agentDir,
provider
};
}
async function modelsAuthOrderGetCommand(opts, runtime) {
const { agentId, agentDir, provider } = resolveAuthOrderContext(opts);
const order = describeOrder(ensureAuthProfileStore(agentDir, { allowKeychainPrompt: false }), provider);
if (opts.json) {
runtime.log(JSON.stringify({
agentId,
agentDir,
provider,
authStorePath: shortenHomePath(`${agentDir}/auth-profiles.json`),
order: order.length > 0 ? order : null
}, null, 2));
return;
}
runtime.log(`Agent: ${agentId}`);
runtime.log(`Provider: ${provider}`);
runtime.log(`Auth file: ${shortenHomePath(`${agentDir}/auth-profiles.json`)}`);
runtime.log(order.length > 0 ? `Order override: ${order.join(", ")}` : "Order override: (none)");
}
async function modelsAuthOrderClearCommand(opts, runtime) {
const { agentId, agentDir, provider } = resolveAuthOrderContext(opts);
if (!await setAuthProfileOrder({
agentDir,
provider,
order: null
})) throw new Error("Failed to update auth-profiles.json (lock busy?).");
runtime.log(`Agent: ${agentId}`);
runtime.log(`Provider: ${provider}`);
runtime.log("Cleared per-agent order override.");
}
async function modelsAuthOrderSetCommand(opts, runtime) {
const { agentId, agentDir, provider } = resolveAuthOrderContext(opts);
const store = ensureAuthProfileStore(agentDir, { allowKeychainPrompt: false });
const providerKey = provider;
const requested = (opts.order ?? []).map((entry) => String(entry).trim()).filter(Boolean);
if (requested.length === 0) throw new Error("Missing profile ids. Provide one or more profile ids.");
for (const profileId of requested) {
const cred = store.profiles[profileId];
if (!cred) throw new Error(`Auth profile "${profileId}" not found in ${agentDir}.`);
if (normalizeProviderId(cred.provider) !== providerKey) throw new Error(`Auth profile "${profileId}" is for ${cred.provider}, not ${provider}.`);
}
const updated = await setAuthProfileOrder({
agentDir,
provider,
order: requested
});
if (!updated) throw new Error("Failed to update auth-profiles.json (lock busy?).");
runtime.log(`Agent: ${agentId}`);
runtime.log(`Provider: ${provider}`);
runtime.log(`Order override: ${describeOrder(updated, provider).join(", ")}`);
}
//#endregion
//#region src/commands/models/fallbacks-shared.ts
function getFallbacks(cfg, key) {
return (cfg.agents?.defaults?.[key])?.fallbacks ?? [];
}
function patchDefaultsFallbacks(cfg, params) {
const existing = cfg.agents?.defaults?.[params.key];
return {
...cfg,
agents: {
...cfg.agents,
defaults: {
...cfg.agents?.defaults,
[params.key]: mergePrimaryFallbackConfig(existing, { fallbacks: params.fallbacks }),
...params.models ? { models: params.models } : void 0
}
}
};
}
async function listFallbacksCommand(params, opts, runtime) {
ensureFlagCompatibility(opts);
const fallbacks = getFallbacks(loadConfig(), params.key);
if (opts.json) {
runtime.log(JSON.stringify({ fallbacks }, null, 2));
return;
}
if (opts.plain) {
for (const entry of fallbacks) runtime.log(entry);
return;
}
runtime.log(`${params.label} (${fallbacks.length}):`);
if (fallbacks.length === 0) {
runtime.log("- none");
return;
}
for (const entry of fallbacks) runtime.log(`- ${entry}`);
}
async function addFallbackCommand(params, modelRaw, runtime) {
const updated = await updateConfig((cfg) => {
const resolved = resolveModelTarget({
raw: modelRaw,
cfg
});
const targetKey = modelKey(resolved.provider, resolved.model);
const nextModels = { ...cfg.agents?.defaults?.models };
if (!nextModels[targetKey]) nextModels[targetKey] = {};
const existing = getFallbacks(cfg, params.key);
if (resolveModelKeysFromEntries({
cfg,
entries: existing
}).includes(targetKey)) return cfg;
return patchDefaultsFallbacks(cfg, {
key: params.key,
fallbacks: [...existing, targetKey],
models: nextModels
});
});
logConfigUpdated(runtime);
runtime.log(`${params.logPrefix}: ${getFallbacks(updated, params.key).join(", ")}`);
}
async function removeFallbackCommand(params, modelRaw, runtime) {
const updated = await updateConfig((cfg) => {
const resolved = resolveModelTarget({
raw: modelRaw,
cfg
});
const targetKey = modelKey(resolved.provider, resolved.model);
const aliasIndex = buildModelAliasIndex({
cfg,
defaultProvider: DEFAULT_PROVIDER
});
const existing = getFallbacks(cfg, params.key);
const filtered = existing.filter((entry) => {
const resolvedEntry = resolveModelRefFromString({
raw: String(entry ?? ""),
defaultProvider: DEFAULT_PROVIDER,
aliasIndex
});
if (!resolvedEntry) return true;
return modelKey(resolvedEntry.ref.provider, resolvedEntry.ref.model) !== targetKey;
});
if (filtered.length === existing.length) throw new Error(`${params.notFoundLabel} not found: ${targetKey}`);
return patchDefaultsFallbacks(cfg, {
key: params.key,
fallbacks: filtered
});
});
logConfigUpdated(runtime);
runtime.log(`${params.logPrefix}: ${getFallbacks(updated, params.key).join(", ")}`);
}
async function clearFallbacksCommand(params, runtime) {
await updateConfig((cfg) => {
return patchDefaultsFallbacks(cfg, {
key: params.key,
fallbacks: []
});
});
logConfigUpdated(runtime);
runtime.log(params.clearedMessage);
}
//#endregion
//#region src/commands/models/fallbacks.ts
async function modelsFallbacksListCommand(opts, runtime) {
return await listFallbacksCommand({
label: "Fallbacks",
key: "model"
}, opts, runtime);
}
async function modelsFallbacksAddCommand(modelRaw, runtime) {
return await addFallbackCommand({
label: "Fallbacks",
key: "model",
logPrefix: "Fallbacks"
}, modelRaw, runtime);
}
async function modelsFallbacksRemoveCommand(modelRaw, runtime) {
return await removeFallbackCommand({
label: "Fallbacks",
key: "model",
notFoundLabel: "Fallback",
logPrefix: "Fallbacks"
}, modelRaw, runtime);
}
async function modelsFallbacksClearCommand(runtime) {
return await clearFallbacksCommand({
key: "model",
clearedMessage: "Fallback list cleared."
}, runtime);
}
//#endregion
//#region src/commands/models/image-fallbacks.ts
async function modelsImageFallbacksListCommand(opts, runtime) {
return await listFallbacksCommand({
label: "Image fallbacks",
key: "imageModel"
}, opts, runtime);
}
async function modelsImageFallbacksAddCommand(modelRaw, runtime) {
return await addFallbackCommand({
label: "Image fallbacks",
key: "imageModel",
logPrefix: "Image fallbacks"
}, modelRaw, runtime);
}
async function modelsImageFallbacksRemoveCommand(modelRaw, runtime) {
return await removeFallbackCommand({
label: "Image fallbacks",
key: "imageModel",
notFoundLabel: "Image fallback",
logPrefix: "Image fallbacks"
}, modelRaw, runtime);
}
async function modelsImageFallbacksClearCommand(runtime) {
return await clearFallbacksCommand({
key: "imageModel",
clearedMessage: "Image fallback list cleared."
}, runtime);
}
//#endregion
//#region src/commands/models/list.configured.ts
function resolveConfiguredEntries(cfg) {
const resolvedDefault = resolveConfiguredModelRef({
cfg,
defaultProvider: DEFAULT_PROVIDER,
defaultModel: DEFAULT_MODEL
});
const aliasIndex = buildModelAliasIndex({
cfg,
defaultProvider: DEFAULT_PROVIDER
});
const order = [];
const tagsByKey = /* @__PURE__ */ new Map();
const aliasesByKey = /* @__PURE__ */ new Map();
for (const [key, aliases] of aliasIndex.byKey.entries()) aliasesByKey.set(key, aliases);
const addEntry = (ref, tag) => {
const key = modelKey(ref.provider, ref.model);
if (!tagsByKey.has(key)) {
tagsByKey.set(key, /* @__PURE__ */ new Set());
order.push(key);
}
tagsByKey.get(key)?.add(tag);
};
addEntry(resolvedDefault, "default");
const modelConfig = cfg.agents?.defaults?.model;
const imageModelConfig = cfg.agents?.defaults?.imageModel;
const modelFallbacks = typeof modelConfig === "object" ? modelConfig?.fallbacks ?? [] : [];
const imageFallbacks = typeof imageModelConfig === "object" ? imageModelConfig?.fallbacks ?? [] : [];
const imagePrimary = imageModelConfig?.primary?.trim() ?? "";
modelFallbacks.forEach((raw, idx) => {
const resolved = resolveModelRefFromString({
raw: String(raw ?? ""),
defaultProvider: DEFAULT_PROVIDER,
aliasIndex
});
if (!resolved) return;
addEntry(resolved.ref, `fallback#${idx + 1}`);
});
if (imagePrimary) {
const resolved = resolveModelRefFromString({
raw: imagePrimary,
defaultProvider: DEFAULT_PROVIDER,
aliasIndex
});
if (resolved) addEntry(resolved.ref, "image");
}
imageFallbacks.forEach((raw, idx) => {
const resolved = resolveModelRefFromString({
raw: String(raw ?? ""),
defaultProvider: DEFAULT_PROVIDER,
aliasIndex
});
if (!resolved) return;
addEntry(resolved.ref, `img-fallback#${idx + 1}`);
});
for (const key of Object.keys(cfg.agents?.defaults?.models ?? {})) {
const parsed = parseModelRef(String(key ?? ""), DEFAULT_PROVIDER);
if (!parsed) continue;
addEntry(parsed, "configured");
}
return { entries: order.map((key) => {
const slash = key.indexOf("/");
return {
key,
ref: {
provider: slash === -1 ? key : key.slice(0, slash),
model: slash === -1 ? "" : key.slice(slash + 1)
},
tags: tagsByKey.get(key) ?? /* @__PURE__ */ new Set(),
aliases: aliasesByKey.get(key) ?? []
};
}) };
}
//#endregion
//#region src/commands/models/list.errors.ts
const MODEL_AVAILABILITY_UNAVAILABLE_CODE = "MODEL_AVAILABILITY_UNAVAILABLE";
function formatErrorWithStack(err) {
if (err instanceof Error) return err.stack ?? `${err.name}: ${err.message}`;
return String(err);
}
function shouldFallbackToAuthHeuristics(err) {
if (!(err instanceof Error)) return false;
return err.code === MODEL_AVAILABILITY_UNAVAILABLE_CODE;
}
//#endregion
//#region src/commands/models/list.registry.ts
const hasAuthForProvider = (provider, cfg, authStore) => {
if (!cfg || !authStore) return false;
if (listProfilesForProvider(authStore, provider).length > 0) return true;
if (provider === "amazon-bedrock" && resolveAwsSdkEnvVarName()) return true;
if (resolveEnvApiKey(provider)) return true;
if (getCustomProviderApiKey(cfg, provider)) return true;
return false;
};
function createAvailabilityUnavailableError(message) {
const err = new Error(message);
err.code = MODEL_AVAILABILITY_UNAVAILABLE_CODE;
return err;
}
function normalizeAvailabilityError(err) {
if (shouldFallbackToAuthHeuristics(err) && err instanceof Error) return err;
return createAvailabilityUnavailableError(`Model availability unavailable: getAvailable() failed.\n${formatErrorWithStack(err)}`);
}
function validateAvailableModels(availableModels) {
if (!Array.isArray(availableModels)) throw createAvailabilityUnavailableError("Model availability unavailable: getAvailable() returned a non-array value.");
for (const model of availableModels) if (!model || typeof model !== "object" || typeof model.provider !== "string" || typeof model.id !== "string") throw createAvailabilityUnavailableError("Model availability unavailable: getAvailable() returned invalid model entries.");
return availableModels;
}
function loadAvailableModels(registry) {
let availableModels;
try {
availableModels = registry.getAvailable();
} catch (err) {
throw normalizeAvailabilityError(err);
}
try {
return validateAvailableModels(availableModels);
} catch (err) {
throw normalizeAvailabilityError(err);
}
}
async function loadModelRegistry(cfg) {
await ensureOpenClawModelsJson(cfg);
const agentDir = resolveOpenClawAgentDir();
await ensurePiAuthJsonFromAuthProfiles(agentDir);
const registry = discoverModels(discoverAuthStorage(agentDir), agentDir);
const appended = appendAntigravityForwardCompatModels(registry.getAll(), registry);
const models = appended.models;
const synthesizedForwardCompat = appended.synthesizedForwardCompat;
let availableKeys;
let availabilityErrorMessage;
try {
const availableModels = loadAvailableModels(registry);
availableKeys = new Set(availableModels.map((model) => modelKey(model.provider, model.id)));
for (const synthesized of synthesizedForwardCompat) if (hasAvailableTemplate(availableKeys, synthesized.templatePrefixes)) availableKeys.add(synthesized.key);
} catch (err) {
if (!shouldFallbackToAuthHeuristics(err)) throw err;
availableKeys = void 0;
if (!availabilityErrorMessage) availabilityErrorMessage = formatErrorWithStack(err);
}
return {
registry,
models,
availableKeys,
availabilityErrorMessage
};
}
function appendAntigravityForwardCompatModels(models, modelRegistry) {
const nextModels = [...models];
const synthesizedForwardCompat = [];
for (const candidate of ANTIGRAVITY_OPUS_46_FORWARD_COMPAT_CANDIDATES) {
const key = modelKey("google-antigravity", candidate.id);
if (nextModels.some((model) => modelKey(model.provider, model.id) === key)) continue;
const fallback = resolveForwardCompatModel("google-antigravity", candidate.id, modelRegistry);
if (!fallback) continue;
nextModels.push(fallback);
synthesizedForwardCompat.push({
key,
templatePrefixes: candidate.templatePrefixes
});
}
return {
models: nextModels,
synthesizedForwardCompat
};
}
function hasAvailableTemplate(availableKeys, templatePrefixes) {
for (const key of availableKeys) if (templatePrefixes.some((prefix) => key.startsWith(prefix))) return true;
return false;
}
function toModelRow(params) {
const { model, key, tags, aliases = [], availableKeys, cfg, authStore } = params;
if (!model) return {
key,
name: key,
input: "-",
contextWindow: null,
local: null,
available: null,
tags: [...tags, "missing"],
missing: true
};
const input = model.input.join("+") || "text";
const local = isLocalBaseUrl(model.baseUrl);
const available = availableKeys !== void 0 ? availableKeys.has(modelKey(model.provider, model.id)) : cfg && authStore ? hasAuthForProvider(model.provider, cfg, authStore) : false;
const aliasTags = aliases.length > 0 ? [`alias:${aliases.join(",")}`] : [];
const mergedTags = new Set(tags);
if (aliasTags.length > 0) {
for (const tag of mergedTags) if (tag === "alias" || tag.startsWith("alias:")) mergedTags.delete(tag);
for (const tag of aliasTags) mergedTags.add(tag);
}
return {
key,
name: model.name || model.id,
input,
contextWindow: model.contextWindow ?? null,
local,
available,
tags: Array.from(mergedTags),
missing: false
};
}
//#endregion
//#region src/commands/models/list.format.ts
const isRich = (opts) => Boolean(isRich$1() && !opts?.json && !opts?.plain);
const pad = (value, size) => value.padEnd(size);
const formatTag = (tag, rich) => {
if (!rich) return tag;
if (tag === "default") return theme.success(tag);
if (tag === "image") return theme.accentBright(tag);
if (tag === "configured") return theme.accent(tag);
if (tag === "missing") return theme.error(tag);
if (tag.startsWith("fallback#")) return theme.warn(tag);
if (tag.startsWith("img-fallback#")) return theme.warn(tag);
if (tag.startsWith("alias:")) return theme.accentDim(tag);
return theme.muted(tag);
};
const truncate = (value, max) => {
if (value.length <= max) return value;
if (max <= 3) return value.slice(0, max);
return `${value.slice(0, max - 3)}...`;
};
//#endregion
//#region src/commands/models/list.table.ts
const MODEL_PAD$1 = 42;
const INPUT_PAD = 10;
const CTX_PAD$1 = 8;
const LOCAL_PAD = 5;
const AUTH_PAD = 5;
function printModelTable(rows, runtime, opts = {}) {
if (opts.json) {
runtime.log(JSON.stringify({
count: rows.length,
models: rows
}, null, 2));
return;
}
if (opts.plain) {
for (const row of rows) runtime.log(row.key);
return;
}
const rich = isRich(opts);
const header = [
pad("Model", MODEL_PAD$1),
pad("Input", INPUT_PAD),
pad("Ctx", CTX_PAD$1),
pad("Local", LOCAL_PAD),
pad("Auth", AUTH_PAD),
"Tags"
].join(" ");
runtime.log(rich ? theme.heading(header) : header);
for (const row of rows) {
const keyLabel = pad(truncate(row.key, MODEL_PAD$1), MODEL_PAD$1);
const inputLabel = pad(row.input || "-", INPUT_PAD);
const ctxLabel = pad(formatTokenK(row.contextWindow), CTX_PAD$1);
const localLabel = pad(row.local === null ? "-" : row.local ? "yes" : "no", LOCAL_PAD);
const authLabel = pad(row.available === null ? "-" : row.available ? "yes" : "no", AUTH_PAD);
const tagsLabel = row.tags.length > 0 ? rich ? row.tags.map((tag) => formatTag(tag, rich)).join(",") : row.tags.join(",") : "";
const coloredInput = colorize(rich, row.input.includes("image") ? theme.accentBright : theme.info, inputLabel);
const coloredLocal = colorize(rich, row.local === null ? theme.muted : row.local ? theme.success : theme.muted, localLabel);
const coloredAuth = colorize(rich, row.available === null ? theme.muted : row.available ? theme.success : theme.error, authLabel);
const line = [
rich ? theme.accent(keyLabel) : keyLabel,
coloredInput,
ctxLabel,
coloredLocal,
coloredAuth,
tagsLabel
].join(" ");
runtime.log(line);
}
}
//#endregion
//#region src/commands/models/list.list-command.ts
async function modelsListCommand(opts, runtime) {
ensureFlagCompatibility(opts);
const { loadConfig } = await import("./config-PQiujvsf.js").then((n) => n.t);
const { ensureAuthProfileStore } = await import("./model-selection-CqaTAlhy.js").then((n) => n.ut);
const cfg = loadConfig();
const authStore = ensureAuthProfileStore();
const providerFilter = (() => {
const raw = opts.provider?.trim();
if (!raw) return;
return parseModelRef(`${raw}/_`, DEFAULT_PROVIDER)?.provider ?? raw.toLowerCase();
})();
let models = [];
let modelRegistry;
let availableKeys;
let availabilityErrorMessage;
try {
const loaded = await loadModelRegistry(cfg);
modelRegistry = loaded.registry;
models = loaded.models;
availableKeys = loaded.availableKeys;
availabilityErrorMessage = loaded.availabilityErrorMessage;
} catch (err) {
runtime.error(`Model registry unavailable:\n${formatErrorWithStack(err)}`);
process.exitCode = 1;
return;
}
if (availabilityErrorMessage !== void 0) runtime.error(`Model availability lookup failed; falling back to auth heuristics for discovered models: ${availabilityErrorMessage}`);
const modelByKey = new Map(models.map((model) => [modelKey(model.provider, model.id), model]));
const { entries } = resolveConfiguredEntries(cfg);
const configuredByKey = new Map(entries.map((entry) => [entry.key, entry]));
const rows = [];
if (opts.all) {
const sorted = [...models].toSorted((a, b) => {
const p = a.provider.localeCompare(b.provider);
if (p !== 0) return p;
return a.id.localeCompare(b.id);
});
for (const model of sorted) {
if (providerFilter && model.provider.toLowerCase() !== providerFilter) continue;
if (opts.local && !isLocalBaseUrl(model.baseUrl)) continue;
const key = modelKey(model.provider, model.id);
const configured = configuredByKey.get(key);
rows.push(toModelRow({
model,
key,
tags: configured ? Array.from(configured.tags) : [],
aliases: configured?.aliases ?? [],
availableKeys,
cfg,
authStore
}));
}
} else for (const entry of entries) {
if (providerFilter && entry.ref.provider.toLowerCase() !== providerFilter) continue;
let model = modelByKey.get(entry.key);
if (!model && modelRegistry) {
const forwardCompat = resolveForwardCompatModel(entry.ref.provider, entry.ref.model, modelRegistry);
if (forwardCompat) {
model = forwardCompat;
modelByKey.set(entry.key, forwardCompat);
}
}
if (!model) {
const { resolveModel } = await import("./model-VbWjwqaW.js").then((n) => n.t);
model = resolveModel(entry.ref.provider, entry.ref.model, void 0, cfg).model;
}
if (opts.local && model && !isLocalBaseUrl(model.baseUrl)) continue;
if (opts.local && !model) continue;
rows.push(toModelRow({
model,
key: entry.key,
tags: Array.from(entry.tags),
aliases: entry.aliases,
availableKeys,
cfg,
authStore
}));
}
if (rows.length === 0) {
runtime.log("No models found.");
return;
}
printModelTable(rows, runtime, opts);
}
//#endregion
//#region src/commands/models/list.auth-overview.ts
function resolveProviderAuthOverview(params) {
const { provider, cfg, store } = params;
const now = Date.now();
const profiles = listProfilesForProvider(store, provider);
const withUnusableSuffix = (base, profileId) => {
const unusableUntil = resolveProfileUnusableUntilForDisplay(store, profileId);
if (!unusableUntil || now >= unusableUntil) return base;
const stats = store.usageStats?.[profileId];
return `${base} [${typeof stats?.disabledUntil === "number" && now < stats.disabledUntil ? `disabled${stats.disabledReason ? `:${stats.disabledReason}` : ""}` : "cooldown"} ${formatRemainingShort(unusableUntil - now)}]`;
};
const labels = profiles.map((profileId) => {
const profile = store.profiles[profileId];
if (!profile) return `${profileId}=missing`;
if (profile.type === "api_key") return withUnusableSuffix(`${profileId}=${maskApiKey(profile.key ?? "")}`, profileId);
if (profile.type === "token") return withUnusableSuffix(`${profileId}=token:${maskApiKey(profile.token)}`, profileId);
const display = resolveAuthProfileDisplayLabel({
cfg,
store,
profileId
});
const suffix = display === profileId ? "" : display.startsWith(profileId) ? display.slice(profileId.length).trim() : `(${display})`;
return withUnusableSuffix(`${profileId}=OAuth${suffix ? ` ${suffix}` : ""}`, profileId);
});
const oauthCount = profiles.filter((id) => store.profiles[id]?.type === "oauth").length;
const tokenCount = profiles.filter((id) => store.profiles[id]?.type === "token").length;
const apiKeyCount = profiles.filter((id) => store.profiles[id]?.type === "api_key").length;
const envKey = resolveEnvApiKey(provider);
const customKey = getCustomProviderApiKey(cfg, provider);
return {
provider,
effective: (() => {
if (profiles.length > 0) return {
kind: "profiles",
detail: shortenHomePath(resolveAuthStorePathForDisplay())
};
if (envKey) return {
kind: "env",
detail: envKey.source.includes("OAUTH_TOKEN") || envKey.source.toLowerCase().includes("oauth") ? "OAuth (env)" : maskApiKey(envKey.apiKey)
};
if (customKey) return {
kind: "models.json",
detail: maskApiKey(customKey)
};
return {
kind: "missing",
detail: "missing"
};
})(),
profiles: {
count: profiles.length,
oauth: oauthCount,
token: tokenCount,
apiKey: apiKeyCount,
labels
},
...envKey ? { env: {
value: envKey.source.includes("OAUTH_TOKEN") || envKey.source.toLowerCase().includes("oauth") ? "OAuth (env)" : maskApiKey(envKey.apiKey),
source: envKey.source
} } : {},
...customKey ? { modelsJson: {
value: maskApiKey(customKey),
source: `models.json: ${shortenHomePath(params.modelsPath)}`
} } : {}
};
}
//#endregion
//#region src/commands/models/list.probe.ts
const PROBE_PROMPT = "Reply with OK. Do not use tools.";
const toStatus = (reason) => {
if (!reason) return "unknown";
if (reason === "auth") return "auth";
if (reason === "rate_limit") return "rate_limit";
if (reason === "billing") return "billing";
if (reason === "timeout") return "timeout";
if (reason === "format") return "format";
return "unknown";
};
function buildCandidateMap(modelCandidates) {
const map = /* @__PURE__ */ new Map();
for (const raw of modelCandidates) {
const parsed = parseModelRef(String(raw ?? ""), DEFAULT_PROVIDER);
if (!parsed) continue;
const list = map.get(parsed.provider) ?? [];
if (!list.includes(parsed.model)) list.push(parsed.model);
map.set(parsed.provider, list);
}
return map;
}
function selectProbeModel(params) {
const { provider, candidates, catalog } = params;
const direct = candidates.get(provider);
if (direct && direct.length > 0) return {
provider,
model: direct[0]
};
const fromCatalog = catalog.find((entry) => entry.provider === provider);
if (fromCatalog) return {
provider: fromCatalog.provider,
model: fromCatalog.id
};
return null;
}
function buildProbeTargets(params) {
const { cfg, providers, modelCandidates, options } = params;
const store = ensureAuthProfileStore();
const providerFilter = options.provider?.trim();
const providerFilterKey = providerFilter ? normalizeProviderId(providerFilter) : null;
const profileFilter = new Set((options.profileIds ?? []).map((id) => id.trim()).filter(Boolean));
return loadModelCatalog({ config: cfg }).then((catalog) => {
const candidates = buildCandidateMap(modelCandidates);
const targets = [];
const results = [];
for (const provider of providers) {
const providerKey = normalizeProviderId(provider);
if (providerFilterKey && providerKey !== providerFilterKey) continue;
const model = selectProbeModel({
provider: providerKey,
candidates,
catalog
});
const profileIds = listProfilesForProvider(store, providerKey);
const explicitOrder = findNormalizedProviderValue(store.order, providerKey) ?? findNormalizedProviderValue(cfg?.auth?.order, providerKey);
const allowedProfiles = explicitOrder && explicitOrder.length > 0 ? new Set(resolveAuthProfileOrder({
cfg,
store,
provider: providerKey
})) : null;
const filteredProfiles = profileFilter.size ? profileIds.filter((id) => profileFilter.has(id)) : profileIds;
if (filteredProfiles.length > 0) {
for (const profileId of filteredProfiles) {
const mode = store.profiles[profileId]?.type;
const label = resolveAuthProfileDisplayLabel({
cfg,
store,
profileId
});
if (explicitOrder && !explicitOrder.includes(profileId)) {
results.push({
provider: providerKey,
model: model ? `${model.provider}/${model.model}` : void 0,
profileId,
label,
source: "profile",
mode,
status: "unknown",
error: "Excluded by auth.order for this provider."
});
continue;
}
if (allowedProfiles && !allowedProfiles.has(profileId)) {
results.push({
provider: providerKey,
model: model ? `${model.provider}/${model.model}` : void 0,
profileId,
label,
source: "profile",
mode,
status: "unknown",
error: "Auth profile credentials are missing or expired."
});
continue;
}
if (!model) {
results.push({
provider: providerKey,
model: void 0,
profileId,
label,
source: "profile",
mode,
status: "no_model",
error: "No model available for probe"
});
continue;
}
targets.push({
provider: providerKey,
model,
profileId,
label,
source: "profile",
mode
});
}
continue;
}
if (profileFilter.size > 0) continue;
const envKey = resolveEnvApiKey(providerKey);
const customKey = getCustomProviderApiKey(cfg, providerKey);
if (!envKey && !customKey) continue;
const label = envKey ? "env" : "models.json";
const source = envKey ? "env" : "models.json";
const mode = envKey?.source.includes("OAUTH_TOKEN") ? "oauth" : "api_key";
if (!model) {
results.push({
provider: providerKey,
model: void 0,
label,
source,
mode,
status: "no_model",
error: "No model available for probe"
});
continue;
}
targets.push({
provider: providerKey,
model,
label,
source,
mode
});
}
return {
targets,
results
};
});
}
async function probeTarget(params) {
const { cfg, agentId, agentDir, workspaceDir, sessionDir, target, timeoutMs, maxTokens } = params;
if (!target.model) return {
provider: target.provider,
model: void 0,
profileId: target.profileId,
label: target.label,
source: target.source,
mode: target.mode,
status: "no_model",
error: "No model available for probe"
};
const sessionId = `probe-${target.provider}-${crypto.randomUUID()}`;
const sessionFile = resolveSessionTranscriptPath(sessionId, agentId);
await fs.mkdir(sessionDir, { recursive: true });
const start = Date.now();
try {
await runEmbeddedPiAgent({
sessionId,
sessionFile,
agentId,
workspaceDir,
agentDir,
config: cfg,
prompt: PROBE_PROMPT,
provider: target.model.provider,
model: target.model.model,
authProfileId: target.profileId,
authProfileIdSource: target.profileId ? "user" : void 0,
timeoutMs,
runId: `probe-${crypto.randomUUID()}`,
lane: `auth-probe:${target.provider}:${target.profileId ?? target.source}`,
thinkLevel: "off",
reasoningLevel: "off",
verboseLevel: "off",
streamParams: { maxTokens }
});
return {
provider: target.provider,
model: `${target.model.provider}/${target.model.model}`,
profileId: target.profileId,
label: target.label,
source: target.source,
mode: target.mode,
status: "ok",
latencyMs: Date.now() - start
};
} catch (err) {
const described = describeFailoverError(err);
return {
provider: target.provider,
model: `${target.model.provider}/${target.model.model}`,
profileId: target.profileId,
label: target.label,
source: target.source,
mode: target.mode,
status: toStatus(described.reason),
error: redactSecrets(described.message),
latencyMs: Date.now() - start
};
}
}
async function runTargetsWithConcurrency(params) {
const { cfg, targets, timeoutMs, maxTokens, onProgress } = params;
const concurrency = Math.max(1, Math.min(targets.length || 1, params.concurrency));
const agentId = resolveDefaultAgentId(cfg);
const agentDir = resolveOpenClawAgentDir();
const workspaceDir = resolveAgentWorkspaceDir(cfg, agentId) ?? resolveDefaultAgentWorkspaceDir();
const sessionDir = resolveSessionTranscriptsDirForAgent(agentId);
await fs.mkdir(workspaceDir, { recursive: true });
let completed = 0;
const results = Array.from({ length: targets.length });
let cursor = 0;
const worker = async () => {
while (true) {
const index = cursor;
cursor += 1;
if (index >= targets.length) return;
const target = targets[index];
onProgress?.({
completed,
total: targets.length,
label: `Probing ${target.provider}${target.profileId ? ` (${target.label})` : ""}`
});
results[index] = await probeTarget({
cfg,
agentId,
agentDir,
workspaceDir,
sessionDir,
target,
timeoutMs,
maxTokens
});
completed += 1;
onProgress?.({
completed,
total: targets.length
});
}
};
await Promise.all(Array.from({ length: concurrency }, () => worker()));
return results.filter((entry) => Boolean(entry));
}
async function runAuthProbes(params) {
const startedAt = Date.now();
const plan = await buildProbeTargets({
cfg: params.cfg,
providers: params.providers,
modelCandidates: params.modelCandidates,
options: params.options
});
const totalTargets = plan.targets.length;
params.onProgress?.({
completed: 0,
total: totalTargets
});
const results = totalTargets ? await runTargetsWithConcurrency({
cfg: params.cfg,
targets: plan.targets,
timeoutMs: params.options.timeoutMs,
maxTokens: params.options.maxTokens,
concurrency: params.options.concurrency,
onProgress: params.onProgress
}) : [];
const finishedAt = Date.now();
return {
startedAt,
finishedAt,
durationMs: finishedAt - startedAt,
totalTargets,
options: params.options,
results: [...plan.results, ...results]
};
}
function formatProbeLatency(latencyMs) {
if (!latencyMs && latencyMs !== 0) return "-";
return formatMs(latencyMs);
}
function sortProbeResults(results) {
return results.slice().toSorted((a, b) => {
const provider = a.pro