Skip to content

fix: use backend identity for remote OpenClaw gateway fallback#12

Closed
moltar-bot wants to merge 2 commits into
ByMosDev:mainfrom
moltar-forge:fix/openclaw-remote-gateway-auth
Closed

fix: use backend identity for remote OpenClaw gateway fallback#12
moltar-bot wants to merge 2 commits into
ByMosDev:mainfrom
moltar-forge:fix/openclaw-remote-gateway-auth

Conversation

@moltar-bot
Copy link
Copy Markdown
Contributor

Summary

  • update the WebSocket auth fallback in openclawGatewayClient to identify as gateway-client (mode: backend) when device auth env vars are missing
  • stop using the openclaw-control-ui identity for that fallback path
  • update fallback logging to reflect shared gateway-auth behavior
  • add a unit test covering the fallback handshake identity

Why

For remote HTTPS/WSS OpenClaw deployments, using a Control UI client identity without device credentials can trigger:

control ui requires device identity (use HTTPS or localhost secure context)

This change keeps device-auth flow intact when configured, but makes the non-device fallback use a backend identity that works with shared gateway auth tokens in server-to-server scenarios.

Validation

  • npm test -- src/services/openclawGatewayClient.test.js

Fixes #1


Migrated PR source from moltar-bot:fix/openclaw-remote-gateway-auth to moltar-forge:fix/openclaw-remote-gateway-auth.
Supersedes #4.

@kalinon
Copy link
Copy Markdown
Contributor

kalinon commented Mar 6, 2026

Superseded by # (), which rolls up all commits currently on moltar-forge:main relative to bymosbot:main.

@moltar-bot moltar-bot closed this Mar 6, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Issues connecting to non-local openclaw

2 participants