fix: guard clack cancel symbol in models auth CLI prompts#38951
Closed
MumuTW wants to merge 1 commit intoopenclaw:mainfrom
Closed
fix: guard clack cancel symbol in models auth CLI prompts#38951MumuTW wants to merge 1 commit intoopenclaw:mainfrom
MumuTW wants to merge 1 commit intoopenclaw:mainfrom
Conversation
When user cancels a manual token prompt (Ctrl+C/Escape) in `openclaw models auth` commands, the clack cancel symbol was coerced to "Symbol(clack:cancel)" and persisted as the token value in auth-profiles.json. This caused 401 errors when the profile was later used as a fallback. Add isCancel guard to the local text/select/confirm wrappers so cancellation exits cleanly instead of persisting a bogus token. Closes openclaw#38928
Contributor
Greptile SummaryThis PR fixes a bug where pressing Ctrl+C or Escape during a Key changes:
Confidence Score: 5/5
Last reviewed commit: 8bc215e |
This was referenced Mar 7, 2026
steipete
added a commit
that referenced
this pull request
Mar 7, 2026
Co-authored-by: MumuTW <[email protected]>
Contributor
|
Landed. Thank you @MumuTW. What I did:
SHA hashes:
Thanks again for the fix. |
mrosmarin
added a commit
to mrosmarin/openclaw
that referenced
this pull request
Mar 7, 2026
* main: (133 commits) reduce image size, offer slim image (openclaw#38479) fix(security): harden install base drift cleanup fix(agents): respect explicit provider baseUrl in merge mode (openclaw#39103) fix(agents): apply contextTokens cap for compaction threshold (openclaw#39099) fix(exec): block dangerous override-only env pivots fix(security): stage installs before publish fix(daemon): normalise whitespace in checkTokenDrift to prevent false-positive warning (openclaw#39108) fix(security): harden fs-safe copy writes refactor: dedupe bluebubbles webhook auth test setup refactor: dedupe discord native command test scaffolding refactor: dedupe anthropic probe target test setup refactor: dedupe minimax provider auth test setup refactor: dedupe runtime snapshot test fixtures fix: harden zip extraction writes fix(tests): stabilize diffs localReq headers (supersedes openclaw#39063) fix: harden workspace skill path containment fix(agents): land openclaw#38935 from @MumuTW fix(models): land openclaw#38947 from @davidemanuelDEV fix(gateway): land openclaw#39064 from @Narcooo fix(models-auth): land openclaw#38951 from @MumuTW ...
vincentkoc
pushed a commit
to BryanTegomoh/openclaw-fork
that referenced
this pull request
Mar 8, 2026
Co-authored-by: MumuTW <[email protected]>
openperf
pushed a commit
to openperf/moltbot
that referenced
this pull request
Mar 8, 2026
Co-authored-by: MumuTW <[email protected]>
mcaxtr
pushed a commit
to mcaxtr/openclaw
that referenced
this pull request
Mar 8, 2026
Co-authored-by: MumuTW <[email protected]>
Saitop
pushed a commit
to NomiciAI/openclaw
that referenced
this pull request
Mar 8, 2026
Co-authored-by: MumuTW <[email protected]>
GordonSH-oss
pushed a commit
to GordonSH-oss/openclaw
that referenced
this pull request
Mar 9, 2026
Co-authored-by: MumuTW <[email protected]>
jenawant
pushed a commit
to jenawant/openclaw
that referenced
this pull request
Mar 10, 2026
Co-authored-by: MumuTW <[email protected]>
4 tasks
dhoman
pushed a commit
to dhoman/chrono-claw
that referenced
this pull request
Mar 11, 2026
Co-authored-by: MumuTW <[email protected]>
senw-developers
pushed a commit
to senw-developers/va-openclaw
that referenced
this pull request
Mar 17, 2026
Co-authored-by: MumuTW <[email protected]>
V-Gutierrez
pushed a commit
to V-Gutierrez/openclaw-vendor
that referenced
this pull request
Mar 17, 2026
Co-authored-by: MumuTW <[email protected]>
alexey-pelykh
pushed a commit
to remoteclaw/remoteclaw
that referenced
this pull request
Mar 20, 2026
Co-authored-by: MumuTW <[email protected]> (cherry picked from commit 2ada1b7)
alexey-pelykh
pushed a commit
to remoteclaw/remoteclaw
that referenced
this pull request
Mar 20, 2026
Co-authored-by: MumuTW <[email protected]> (cherry picked from commit 2ada1b7)
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
openclaw models authcommands, the@clack/promptscancel symbol was coerced to the string"Symbol(clack:cancel)"and persisted as the token value inauth-profiles.json, causing 401 errors when the profile was later selected as a fallback.isCancelguard to the localtext/select/confirmwrappers insrc/commands/models/auth.tsso cancellation exits cleanly viaprocess.exit(0)instead of persisting a bogus token.Closes #38928
Test plan
openclaw models auth paste-token --provider openai, press Escape or Ctrl+C at the token prompt — verify the process exits without writing toauth-profiles.jsonopenclaw models auth add, cancel at any prompt — verify clean exitopenclaw models auth setup-token, cancel at confirm or token prompt — verify clean exit