Skip to content

Update gog Calendar command date format to RFC3339#104

Merged
steipete merged 1 commit intoopenclaw:mainfrom
jayhickey:jay/fix-calendar-range
Jan 3, 2026
Merged

Update gog Calendar command date format to RFC3339#104
steipete merged 1 commit intoopenclaw:mainfrom
jayhickey:jay/fix-calendar-range

Conversation

@jayhickey
Copy link
Copy Markdown
Contributor

@jayhickey jayhickey commented Jan 2, 2026

I am seeing instances where Clawdis is not including timezone in the gog calendar range requests. This results in a 400 bad request from the Google API, e.g.

gog calendar events primary --from 2026-01-02T00:00:00 --to 2026-01-03T23:59:59 --account <email>

Google API error (400 badRequest): Bad Request

While this is a valid ISO 8601 format, Google Calendar API requires a stricter RFC 3339 format with time zone information, like the following:

gog calendar events primary --from 2026-01-02T00:00:00-08:00 --to 2026-01-03T23:59:59-08:00 --account <email>

<calendar events listed successfully>

I am seeing instances where Clawdis is not including timezone in the gog calendar range requests. This results in a 400 bad request from the Google API, e.g.

```
gog calendar events primary --from 2026-01-02T00:00:00 --to 2026-01-03T23:59:59 --account <email>

Google API error (400 badRequest): Bad Request
```

While this is a valid ISO 8601 format, Google Calendar API requires a stricter RFC 3339 format like the following:

```
gog calendar events primary --from 2026-01-02T00:00:00Z --to 2026-01-03T23:59:59Z --account <email>

<calendar events listed successfully>
```
@steipete
Copy link
Copy Markdown
Contributor

steipete commented Jan 3, 2026

🦞 Codex Review

Findings

  • ✅ No issues. Doc-only change.

Summary
Update calendar CLI docs to use RFC3339 placeholders.

Review by Clawd 🦞 via Codex

@steipete
Copy link
Copy Markdown
Contributor

steipete commented Jan 3, 2026

thank you!

@steipete steipete merged commit 7e9be3c into openclaw:main Jan 3, 2026
1 check passed
slathrop referenced this pull request in slathrop/openclaw-js Feb 11, 2026
- Switch from process.on('warning') to process.emitWarning wrapping
- Add normalizeWarningArgs to handle all emitWarning call signatures
- Intercept warnings at source before they reach any listener
- Update tests to use real emitWarning calls
slathrop referenced this pull request in slathrop/openclaw-js Feb 11, 2026
Tasks completed: 2/2
- Task 1: Port commits #103 and #104 (warning filter centralization)
- Task 2: Port commit #105 (project hygiene)

SUMMARY: .planning/phases/13-paths-config-refactoring/13-05-SUMMARY.md
Milofax added a commit to Milofax/openclaw that referenced this pull request Feb 12, 2026
…loses openclaw#104)

Playwright's connectOverCDP() attaches to ALL open pages during
initialization. If any page's renderer is stuck (e.g. TradingView with
heavy JS), the entire connection hangs indefinitely.

Add a pre-connection health check that probes each page via raw CDP
Runtime.evaluate("1") and closes unresponsive pages before
connectOverCDP() runs.
Milofax added a commit to Milofax/openclaw that referenced this pull request Feb 12, 2026
…loses openclaw#104) (#1)

Playwright's connectOverCDP() attaches to ALL open pages during
initialization. If any page's renderer is stuck (e.g. TradingView with
heavy JS), the entire connection hangs indefinitely.

Add a pre-connection health check that probes each page via raw CDP
Runtime.evaluate("1") and closes unresponsive pages before
connectOverCDP() runs.
Milofax added a commit to Milofax/openclaw that referenced this pull request Feb 12, 2026
* fix(browser): evict stuck browser pages before Playwright connection (Closes openclaw#104)

Playwright's connectOverCDP() attaches to ALL open pages during
initialization. If any page's renderer is stuck (e.g. TradingView with
heavy JS), the entire connection hangs indefinitely.

Add a pre-connection health check that probes each page via raw CDP
Runtime.evaluate("1") and closes unresponsive pages before
connectOverCDP() runs.

* fix(browser): run stuck page eviction on cached connections too

The eviction only ran during fresh connectOverCDP() calls. When a cached
Playwright connection was reused, stuck pages (e.g. TradingView with
blocked renderer) would cause page-level operations to hang instead.

Now evictStuckPagesViaCdp() runs before returning the cached connection,
closing any pages whose Runtime.evaluate("1") doesn't respond within 3s.
Playwright auto-removes closed pages via Target.targetDestroyed events.
Milofax added a commit to Milofax/openclaw that referenced this pull request Feb 18, 2026
…loses openclaw#104) (#1)

Playwright's connectOverCDP() attaches to ALL open pages during
initialization. If any page's renderer is stuck (e.g. TradingView with
heavy JS), the entire connection hangs indefinitely.

Add a pre-connection health check that probes each page via raw CDP
Runtime.evaluate("1") and closes unresponsive pages before
connectOverCDP() runs.
Milofax added a commit to Milofax/openclaw that referenced this pull request Feb 18, 2026
* fix(browser): evict stuck browser pages before Playwright connection (Closes openclaw#104)

Playwright's connectOverCDP() attaches to ALL open pages during
initialization. If any page's renderer is stuck (e.g. TradingView with
heavy JS), the entire connection hangs indefinitely.

Add a pre-connection health check that probes each page via raw CDP
Runtime.evaluate("1") and closes unresponsive pages before
connectOverCDP() runs.

* fix(browser): run stuck page eviction on cached connections too

The eviction only ran during fresh connectOverCDP() calls. When a cached
Playwright connection was reused, stuck pages (e.g. TradingView with
blocked renderer) would cause page-level operations to hang instead.

Now evictStuckPagesViaCdp() runs before returning the cached connection,
closing any pages whose Runtime.evaluate("1") doesn't respond within 3s.
Playwright auto-removes closed pages via Target.targetDestroyed events.
@slayoffer
Copy link
Copy Markdown

@claude please review this PR

@dbhurley
Copy link
Copy Markdown
Contributor

dbhurley commented Mar 4, 2026

This issue has been fixed in the upstream gogcli project.

See: steipete/gogcli#409

The fix clarifies the help text for --from and --to flags to explicitly mention that RFC3339 format with timezone is required (e.g. 2026-01-02T00:00:00-08:00).

You can update gog to the latest version once the PR is merged.

heatherstew44-maker pushed a commit to heatherstew44-maker/openclaw that referenced this pull request Mar 8, 2026
Piboonsak added a commit to Piboonsak/openclaw_github that referenced this pull request Mar 9, 2026
- Add user-facing error messages with emoji indicators
- Document that user is NOT notified when agent terminates (Issue openclaw#104)
- Add hint to implement channel error forwarding for future enhancement

This is a scoped-down fix focusing on logging clarity.
Full channel notification requires async message send + context injection.

Partially addresses: openclaw#104
Sprint: 1.6
CyberSpencer added a commit to CyberSpencer/openclaw that referenced this pull request Mar 19, 2026
* fix(heartbeat): trim activeHours time values

* ci(formal): warn instead of failing when extractor drift blocks regeneration
0x666c6f added a commit to 0x666c6f/openclaw that referenced this pull request Mar 26, 2026
* fix(slack): default Slack queue to followup

* fix: address PR review findings

* fix: address CI failure from review fixes
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants