fix: Issue 67056 image runtime headers#67326
fix: Issue 67056 image runtime headers#67326sahilsatralkar wants to merge 4 commits intoopenclaw:mainfrom
Conversation
Greptile SummaryThis PR fixes image runtime auth to forward provider-level headers from Confidence Score: 5/5Safe to merge; the image auth fix is correct and well-tested, and the cli-registry-loader addition is logically sound. All findings are P2. The image runtime fix correctly handles all auth resolution paths and is backed by targeted tests. The cli-registry-loader addition is correct but undocumented in the PR description — a transparency concern, not a correctness one. src/plugins/cli-registry-loader.ts — the bundled memory-slot injection change is unmentioned in the PR description. Prompt To Fix All With AIThis is a comment left during a code review.
Path: src/plugins/cli-registry-loader.ts
Line: 105-119
Comment:
**Undescribed change bundled with image-headers fix**
`withPrimaryMemorySlotPluginId` and `resolveConfiguredMemorySlotPluginId` are unrelated to the image runtime header bug described in the PR. The PR description, root-cause section, and regression test plan all focus exclusively on `src/media-understanding/image.ts`. These CLI registry changes don't appear to be mentioned anywhere in the PR write-up, making them invisible to reviewers scanning the description. Consider either updating the PR description to cover this change or splitting it into a separate PR.
How can I resolve this? If you propose a fix, please make it concise.Reviews (1): Last reviewed commit: "fix(image): preserve provider headers in..." | Re-trigger Greptile |
There was a problem hiding this comment.
💡 Codex Review
Here are some automated review suggestions for this pull request.
Reviewed commit: c179ddd6fe
ℹ️ About Codex in GitHub
Codex has been enabled to automatically review pull requests in this repo. Reviews are triggered when you
- Open a pull request for review
- Mark a draft as ready
- Comment "@codex review".
If Codex has suggestions, it will comment; otherwise it will react with 👍.
When you sign up for Codex through ChatGPT, Codex can also answer questions or update the PR, like "@codex address that feedback".
c179ddd to
acafa16
Compare
There was a problem hiding this comment.
💡 Codex Review
Here are some automated review suggestions for this pull request.
Reviewed commit: acafa16387
ℹ️ About Codex in GitHub
Codex has been enabled to automatically review pull requests in this repo. Reviews are triggered when you
- Open a pull request for review
- Mark a draft as ready
- Comment "@codex review".
If Codex has suggestions, it will comment; otherwise it will react with 👍.
When you sign up for Codex through ChatGPT, Codex can also answer questions or update the PR, like "@codex address that feedback".
Summary
Describe the problem and fix in 2–5 bullets:
If this PR fixes a plugin beta-release blocker, title it
fix(<plugin-id>): beta blocker - <summary>and link the matchingBeta blocker: <plugin-name> - <summary>issue labeledbeta-blocker. Contributors cannot label PRs, so the title is the PR-side signal for maintainers and automation.Change Type (select all)
Scope (select all touched areas)
Linked Issue/PR
Root Cause (if applicable)
For bug fixes or regressions, explain why this happened, not just what changed. Otherwise write
N/A. If the cause is unclear, writeUnknown.Regression Test Plan (if applicable)
For bug fixes or regressions, name the smallest reliable test coverage that should catch this. Otherwise write
N/A.User-visible / Behavior Changes
List user-visible changes (including defaults/config).
If none, write
None.Image requests using custom OpenAI-compatible models now preserve provider-level headers from model registry auth, matching expected provider behavior.
Diagram (if applicable)
For UI changes or non-trivial logic flows, include a small ASCII diagram reviewers can scan quickly. Otherwise write
N/A.Before:
[image tool request] -> [resolve API key only] -> [complete without provider headers]
After:
[image tool request] -> [resolve apiKey+headers from model registry (fallback to legacy API key path)] -> [complete with headers] -> [provider accepts request]
Security Impact (required)
Repro + Verification
Environment
Steps
Expected
Actual
Evidence
Attach at least one:
Human Verification (required)
What you personally verified (not just CI), and how:
Review Conversations
If a bot review conversation is addressed by this PR, resolve that conversation yourself. Do not leave bot review conversation cleanup for maintainers.
Compatibility / Migration
Risks and Mitigations
List only real risks for this PR. Add/remove entries as needed. If none, write
None.Built with Codex