fix: request full operator scopes for OpenClaw v2026.2.14 compatibility#31
Closed
robbyczgw-cla wants to merge 1 commit intoibelick:mainfrom
Closed
fix: request full operator scopes for OpenClaw v2026.2.14 compatibility#31robbyczgw-cla wants to merge 1 commit intoibelick:mainfrom
robbyczgw-cla wants to merge 1 commit intoibelick:mainfrom
Conversation
74eabce to
285513f
Compare
This was referenced Feb 15, 2026
Contributor
Author
|
Superseded by #32 which implements proper Device Auth — eliminates the need for both the scope workaround and |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Problem
After updating OpenClaw to v2026.2.14, WebClaw fails to load sessions and models:
Fixes #30
Root Cause
OpenClaw v2026.2.14 enforces scope checks on API methods. The gateway clears all requested scopes to
[]for clients without device auth.Fix
Request all three operator scopes in
buildConnectParams:Important: This PR alone is not enough
Users also need to add to their OpenClaw config:
{ "gateway": { "controlUi": { "dangerouslyDisableDeviceAuth": true } } }This tells the gateway to preserve scopes for token-authenticated clients without device identity. Without this config, the gateway clears scopes regardless of what the client requests.
Update (v2026.2.15): OpenClaw #17682 fixed the gateway to properly handle this for
dangerouslyDisableDeviceAuthmode. Both steps (this PR + config flag) are needed.Long-term solution
Implement Device Auth (Ed25519 keypair signing) in WebClaw — this eliminates the need for
dangerouslyDisableDeviceAuth. Successfully implemented and tested in OpenCami.Local Validation
AI-assisted (Claude). Reviewed and tested by human.