Secrets: add Exa web-search SecretRef target#65833
Secrets: add Exa web-search SecretRef target#65833KnightNiwrem wants to merge 2 commits intoopenclaw:mainfrom
Conversation
Greptile SummaryAdds the missing Confidence Score: 5/5Safe to merge — minimal, additive registry entry with no behavioral risk. Single-line registry addition that exactly mirrors established patterns; verified against the Exa plugin's declared credentialPath. All required fields are present and correct. No logic changes, no security surface changes. No files require special attention. Reviews (1): Last reviewed commit: "Tests: keep SecretRef registry coverage ..." | Re-trigger Greptile |
There was a problem hiding this comment.
Pull request overview
This PR updates the canonical SecretRef target registry to include Exa’s web-search API key path so that SecretRef discovery/auditing/tooling can target plugins.entries.exa.config.webSearch.apiKey.
Changes:
- Add
plugins.entries.exa.config.webSearch.apiKeyas aSecretTargetRegistryEntryin the core registry list.
| id: "plugins.entries.exa.config.webSearch.apiKey", | ||
| targetType: "plugins.entries.exa.config.webSearch.apiKey", | ||
| configFile: "openclaw.json", | ||
| pathPattern: "plugins.entries.exa.config.webSearch.apiKey", | ||
| secretShape: SECRET_INPUT_SHAPE, | ||
| expectedResolvedValue: "string", | ||
| includeInPlan: true, | ||
| includeInConfigure: true, | ||
| includeInAudit: true, | ||
| }, | ||
| { |
There was a problem hiding this comment.
Adding this new SecretRef registry entry will change the generated SecretRef credential matrix produced by buildSecretRefCredentialMatrix(), but docs/reference/secretref-user-supplied-credentials-matrix.json (and the supported/unsupported lists in docs/reference/secretref-credential-surface.md) do not include this new path yet. This will cause src/secrets/target-registry.docs.test.ts to fail unless the docs artifacts are regenerated/updated in the same PR (or the sync guardrail is adjusted).
| id: "plugins.entries.exa.config.webSearch.apiKey", | |
| targetType: "plugins.entries.exa.config.webSearch.apiKey", | |
| configFile: "openclaw.json", | |
| pathPattern: "plugins.entries.exa.config.webSearch.apiKey", | |
| secretShape: SECRET_INPUT_SHAPE, | |
| expectedResolvedValue: "string", | |
| includeInPlan: true, | |
| includeInConfigure: true, | |
| includeInAudit: true, | |
| }, | |
| { |
|
Thanks for the Exa contribution, @KnightNiwrem. Outcome: this PR is superseded by #66818, which merged this change in the broader SecretRef contract update. Why #66818 covers this: it adds |
Summary
plugins.entries.exa.config.webSearch.apiKey, but the canonical SecretRef target registry omitted that path.plugins.entries.exa.config.webSearch.apiKeytosrc/secrets/target-registry-data.ts.docs/reference/secretref-credential-surface.mdpage or its generated matrix artifacts.Change Type (select all)
Scope (select all touched areas)
Linked Issue/PR
Root Cause (if applicable)
Regression Test Plan (if applicable)
User-visible / Behavior Changes
Users can now target Exa's web-search API key through the canonical SecretRef contract surface at
plugins.entries.exa.config.webSearch.apiKey.Diagram (if applicable)
N/A
Security Impact (required)
Yes/No) NoYes/No) NoYes/No) NoYes/No) NoYes/No) NoYes, explain risk + mitigation:Repro + Verification
Environment
plugins.entries.exa.config.webSearch.apiKeyconfigured as a SecretRef target pathSteps
plugins.entries.exa.config.webSearch.apiKey.pnpm test src/secrets/target-registry.test.tsafter the registry change.Expected
Actual
Evidence
Attach at least one:
Human Verification (required)
plugins.entries.exa.config.webSearch.apiKey; reranpnpm test src/secrets/target-registry.test.tssuccessfully.Review Conversations
Compatibility / Migration
Yes/No) YesYes/No) NoYes/No) NoRisks and Mitigations