/** * IPC Handlers * Registers all IPC handlers for main-renderer communication */ import { ipcMain, BrowserWindow, shell, dialog, app, nativeImage } from 'electron'; import { existsSync, cpSync, mkdirSync, rmSync } from 'node:fs'; import { homedir } from 'node:os'; import { join, extname, basename } from 'node:path'; import crypto from 'node:crypto'; import { GatewayManager } from '../gateway/manager'; import { ClawHubService, ClawHubSearchParams, ClawHubInstallParams, ClawHubUninstallParams } from '../gateway/clawhub'; import { type ProviderConfig, } from '../utils/secure-storage'; import { getOpenClawStatus, getOpenClawDir, getOpenClawConfigDir, getOpenClawSkillsDir, ensureDir } from '../utils/paths'; import { getOpenClawCliCommand } from '../utils/openclaw-cli'; import { getAllSettings, getSetting, resetSettings, setSetting, type AppSettings } from '../utils/store'; import { saveProviderKeyToOpenClaw, removeProviderFromOpenClaw, } from '../utils/openclaw-auth'; import { logger } from '../utils/logger'; import { saveChannelConfig, getChannelConfig, getChannelFormValues, deleteChannelConfig, listConfiguredChannels, setChannelEnabled, validateChannelConfig, validateChannelCredentials, } from '../utils/channel-config'; import { checkUvInstalled, installUv, setupManagedPython } from '../utils/uv-setup'; import { updateSkillConfig, getSkillConfig, getAllSkillConfigs } from '../utils/skill-config'; import { whatsAppLoginManager } from '../utils/whatsapp-login'; import { getProviderConfig } from '../utils/provider-registry'; import { deviceOAuthManager, OAuthProviderType } from '../utils/device-oauth'; import { browserOAuthManager, type BrowserOAuthProviderType } from '../utils/browser-oauth'; import { applyProxySettings } from './proxy'; import { getRecentTokenUsageHistory } from '../utils/token-usage'; import { getProviderService } from '../services/providers/provider-service'; import { getOpenClawProviderKey, syncDefaultProviderToRuntime, syncDeletedProviderApiKeyToRuntime, syncDeletedProviderToRuntime, syncProviderApiKeyToRuntime, syncSavedProviderToRuntime, syncUpdatedProviderToRuntime, } from '../services/providers/provider-runtime-sync'; import { validateApiKeyWithProvider } from '../services/providers/provider-validation'; import { appUpdater } from './updater'; import { PORTS } from '../utils/config'; type AppRequest = { id?: string; module: string; action: string; payload?: unknown; }; type AppResponse = { id?: string; ok: boolean; data?: unknown; error?: { code: 'VALIDATION' | 'PERMISSION' | 'TIMEOUT' | 'GATEWAY' | 'INTERNAL' | 'UNSUPPORTED'; message: string; details?: unknown; }; }; /** * Register all IPC handlers */ export function registerIpcHandlers( gatewayManager: GatewayManager, clawHubService: ClawHubService, mainWindow: BrowserWindow ): void { // Unified request protocol (non-breaking: legacy channels remain available) registerUnifiedRequestHandlers(gatewayManager); registerHostApiProxyHandlers(); // Gateway handlers registerGatewayHandlers(gatewayManager, mainWindow); // ClawHub handlers registerClawHubHandlers(clawHubService); // OpenClaw handlers registerOpenClawHandlers(gatewayManager); // Provider handlers registerProviderHandlers(gatewayManager); // Shell handlers registerShellHandlers(); // Dialog handlers registerDialogHandlers(); // Session handlers registerSessionHandlers(); // App handlers registerAppHandlers(); // Settings handlers registerSettingsHandlers(gatewayManager); // UV handlers registerUvHandlers(); // Log handlers (for UI to read gateway/app logs) registerLogHandlers(); // Usage handlers registerUsageHandlers(); // Skill config handlers (direct file access, no Gateway RPC) registerSkillConfigHandlers(); // Cron task handlers (proxy to Gateway RPC) registerCronHandlers(gatewayManager); // Window control handlers (for custom title bar on Windows/Linux) registerWindowHandlers(mainWindow); // WhatsApp handlers registerWhatsAppHandlers(mainWindow); // Device OAuth handlers (Code Plan) registerDeviceOAuthHandlers(mainWindow); // File staging handlers (upload/send separation) registerFileHandlers(); } type HostApiFetchRequest = { path: string; method?: string; headers?: Record; body?: unknown; }; function registerHostApiProxyHandlers(): void { ipcMain.handle('hostapi:fetch', async (_, request: HostApiFetchRequest) => { try { const path = typeof request?.path === 'string' ? request.path : ''; if (!path || !path.startsWith('/')) { throw new Error(`Invalid host API path: ${String(request?.path)}`); } const method = (request.method || 'GET').toUpperCase(); const headers: Record = { ...(request.headers || {}) }; let body: BodyInit | undefined; if (request.body !== undefined && request.body !== null) { if (typeof request.body === 'string') { body = request.body; } else { body = JSON.stringify(request.body); if (!headers['Content-Type'] && !headers['content-type']) { headers['Content-Type'] = 'application/json'; } } } const response = await fetch(`http://127.0.0.1:${PORTS.CLAWX_HOST_API}${path}`, { method, headers, body, }); const data: { status: number; ok: boolean; json?: unknown; text?: string } = { status: response.status, ok: response.ok, }; if (response.status !== 204) { const contentType = response.headers.get('content-type') || ''; if (contentType.includes('application/json')) { data.json = await response.json().catch(() => undefined); } else { data.text = await response.text().catch(() => ''); } } return { ok: true, data }; } catch (error) { return { ok: false, error: { message: error instanceof Error ? error.message : String(error), }, }; } }); } function mapAppErrorCode(error: unknown): AppResponse['error']['code'] { const msg = error instanceof Error ? error.message.toLowerCase() : String(error).toLowerCase(); if (msg.includes('timeout')) return 'TIMEOUT'; if (msg.includes('permission') || msg.includes('denied') || msg.includes('forbidden')) return 'PERMISSION'; if (msg.includes('gateway')) return 'GATEWAY'; if (msg.includes('invalid') || msg.includes('required')) return 'VALIDATION'; return 'INTERNAL'; } function isProxyKey(key: keyof AppSettings): boolean { return ( key === 'proxyEnabled' || key === 'proxyServer' || key === 'proxyHttpServer' || key === 'proxyHttpsServer' || key === 'proxyAllServer' || key === 'proxyBypassRules' ); } function registerUnifiedRequestHandlers(gatewayManager: GatewayManager): void { const providerService = getProviderService(); const handleProxySettingsChange = async () => { const settings = await getAllSettings(); await applyProxySettings(settings); if (gatewayManager.getStatus().state === 'running') { await gatewayManager.restart(); } }; ipcMain.handle('app:request', async (_, request: AppRequest): Promise => { if (!request || typeof request.module !== 'string' || typeof request.action !== 'string') { return { id: request?.id, ok: false, error: { code: 'VALIDATION', message: 'Invalid app request format' }, }; } try { let data: unknown; switch (request.module) { case 'app': { if (request.action === 'version') data = app.getVersion(); else if (request.action === 'name') data = app.getName(); else if (request.action === 'platform') data = process.platform; else { return { id: request.id, ok: false, error: { code: 'UNSUPPORTED', message: `APP_REQUEST_UNSUPPORTED:${request.module}.${request.action}`, }, }; } break; } case 'provider': { if (request.action === 'list') { data = await providerService.listLegacyProvidersWithKeyInfo(); break; } if (request.action === 'get') { const payload = request.payload as { providerId?: string } | string | undefined; const providerId = typeof payload === 'string' ? payload : payload?.providerId; if (!providerId) throw new Error('Invalid provider.get payload'); data = await providerService.getLegacyProvider(providerId); break; } if (request.action === 'getDefault') { data = await providerService.getDefaultLegacyProvider(); break; } if (request.action === 'hasApiKey') { const payload = request.payload as { providerId?: string } | string | undefined; const providerId = typeof payload === 'string' ? payload : payload?.providerId; if (!providerId) throw new Error('Invalid provider.hasApiKey payload'); data = await providerService.hasLegacyProviderApiKey(providerId); break; } if (request.action === 'getApiKey') { const payload = request.payload as { providerId?: string } | string | undefined; const providerId = typeof payload === 'string' ? payload : payload?.providerId; if (!providerId) throw new Error('Invalid provider.getApiKey payload'); data = await providerService.getLegacyProviderApiKey(providerId); break; } if (request.action === 'validateKey') { const payload = request.payload as | { providerId?: string; apiKey?: string; options?: { baseUrl?: string } } | [string, string, { baseUrl?: string }?] | undefined; const providerId = Array.isArray(payload) ? payload[0] : payload?.providerId; const apiKey = Array.isArray(payload) ? payload[1] : payload?.apiKey; const options = Array.isArray(payload) ? payload[2] : payload?.options; if (!providerId || typeof apiKey !== 'string') { throw new Error('Invalid provider.validateKey payload'); } const provider = await providerService.getLegacyProvider(providerId); const providerType = provider?.type || providerId; const registryBaseUrl = getProviderConfig(providerType)?.baseUrl; const resolvedBaseUrl = options?.baseUrl || provider?.baseUrl || registryBaseUrl; data = await validateApiKeyWithProvider(providerType, apiKey, { baseUrl: resolvedBaseUrl }); break; } if (request.action === 'save') { const payload = request.payload as | { config?: ProviderConfig; apiKey?: string } | [ProviderConfig, string?] | undefined; const config = Array.isArray(payload) ? payload[0] : payload?.config; const apiKey = Array.isArray(payload) ? payload[1] : payload?.apiKey; if (!config) throw new Error('Invalid provider.save payload'); try { await providerService.saveLegacyProvider(config); if (apiKey !== undefined) { const trimmedKey = apiKey.trim(); if (trimmedKey) { await providerService.setLegacyProviderApiKey(config.id, trimmedKey); } } try { await syncSavedProviderToRuntime(config, apiKey, gatewayManager); } catch (err) { console.warn('Failed to sync openclaw provider config:', err); } data = { success: true }; } catch (error) { data = { success: false, error: String(error) }; } break; } if (request.action === 'delete') { const payload = request.payload as { providerId?: string } | string | undefined; const providerId = typeof payload === 'string' ? payload : payload?.providerId; if (!providerId) throw new Error('Invalid provider.delete payload'); try { const existing = await providerService.getLegacyProvider(providerId); await providerService.deleteLegacyProvider(providerId); if (existing?.type) { try { await syncDeletedProviderToRuntime(existing, providerId, gatewayManager); } catch (err) { console.warn('Failed to completely remove provider from OpenClaw:', err); } } data = { success: true }; } catch (error) { data = { success: false, error: String(error) }; } break; } if (request.action === 'setApiKey') { const payload = request.payload as | { providerId?: string; apiKey?: string } | [string, string] | undefined; const providerId = Array.isArray(payload) ? payload[0] : payload?.providerId; const apiKey = Array.isArray(payload) ? payload[1] : payload?.apiKey; if (!providerId || typeof apiKey !== 'string') throw new Error('Invalid provider.setApiKey payload'); try { await providerService.setLegacyProviderApiKey(providerId, apiKey); const provider = await providerService.getLegacyProvider(providerId); const providerType = provider?.type || providerId; const ock = getOpenClawProviderKey(providerType, providerId); try { await saveProviderKeyToOpenClaw(ock, apiKey); } catch (err) { console.warn('Failed to save key to OpenClaw auth-profiles:', err); } data = { success: true }; } catch (error) { data = { success: false, error: String(error) }; } break; } if (request.action === 'updateWithKey') { const payload = request.payload as | { providerId?: string; updates?: Partial; apiKey?: string } | [string, Partial, string?] | undefined; const providerId = Array.isArray(payload) ? payload[0] : payload?.providerId; const updates = Array.isArray(payload) ? payload[1] : payload?.updates; const apiKey = Array.isArray(payload) ? payload[2] : payload?.apiKey; if (!providerId || !updates) throw new Error('Invalid provider.updateWithKey payload'); const existing = await providerService.getLegacyProvider(providerId); if (!existing) { data = { success: false, error: 'Provider not found' }; break; } const previousKey = await providerService.getLegacyProviderApiKey(providerId); const previousOck = getOpenClawProviderKey(existing.type, providerId); try { const nextConfig: ProviderConfig = { ...existing, ...updates, updatedAt: new Date().toISOString(), }; const ock = getOpenClawProviderKey(nextConfig.type, providerId); await providerService.saveLegacyProvider(nextConfig); if (apiKey !== undefined) { const trimmedKey = apiKey.trim(); if (trimmedKey) { await providerService.setLegacyProviderApiKey(providerId, trimmedKey); await saveProviderKeyToOpenClaw(ock, trimmedKey); } else { await providerService.deleteLegacyProviderApiKey(providerId); await removeProviderFromOpenClaw(ock); } } try { await syncUpdatedProviderToRuntime(nextConfig, apiKey, gatewayManager); } catch (err) { console.warn('Failed to sync openclaw config after provider update:', err); } data = { success: true }; } catch (error) { try { await providerService.saveLegacyProvider(existing); if (previousKey) { await providerService.setLegacyProviderApiKey(providerId, previousKey); await saveProviderKeyToOpenClaw(previousOck, previousKey); } else { await providerService.deleteLegacyProviderApiKey(providerId); await removeProviderFromOpenClaw(previousOck); } } catch (rollbackError) { console.warn('Failed to rollback provider updateWithKey:', rollbackError); } data = { success: false, error: String(error) }; } break; } if (request.action === 'deleteApiKey') { const payload = request.payload as { providerId?: string } | string | undefined; const providerId = typeof payload === 'string' ? payload : payload?.providerId; if (!providerId) throw new Error('Invalid provider.deleteApiKey payload'); try { await providerService.deleteLegacyProviderApiKey(providerId); const provider = await providerService.getLegacyProvider(providerId); const providerType = provider?.type || providerId; const ock = getOpenClawProviderKey(providerType, providerId); try { if (ock) { await removeProviderFromOpenClaw(ock); } } catch (err) { console.warn('Failed to completely remove provider from OpenClaw:', err); } data = { success: true }; } catch (error) { data = { success: false, error: String(error) }; } break; } if (request.action === 'setDefault') { const payload = request.payload as { providerId?: string } | string | undefined; const providerId = typeof payload === 'string' ? payload : payload?.providerId; if (!providerId) throw new Error('Invalid provider.setDefault payload'); try { await providerService.setDefaultLegacyProvider(providerId); const provider = await providerService.getLegacyProvider(providerId); if (provider) { try { await syncDefaultProviderToRuntime(providerId, gatewayManager); } catch (err) { console.warn('Failed to set OpenClaw default model:', err); } } data = { success: true }; } catch (error) { data = { success: false, error: String(error) }; } break; } return { id: request.id, ok: false, error: { code: 'UNSUPPORTED', message: `APP_REQUEST_UNSUPPORTED:${request.module}.${request.action}`, }, }; } case 'update': { if (request.action === 'status') { data = appUpdater.getStatus(); break; } if (request.action === 'version') { data = appUpdater.getCurrentVersion(); break; } if (request.action === 'check') { try { await appUpdater.checkForUpdates(); data = { success: true, status: appUpdater.getStatus() }; } catch (error) { data = { success: false, error: String(error), status: appUpdater.getStatus() }; } break; } if (request.action === 'download') { try { await appUpdater.downloadUpdate(); data = { success: true }; } catch (error) { data = { success: false, error: String(error) }; } break; } if (request.action === 'install') { appUpdater.quitAndInstall(); data = { success: true }; break; } if (request.action === 'setChannel') { const payload = request.payload as { channel?: 'stable' | 'beta' | 'dev' } | 'stable' | 'beta' | 'dev' | undefined; const channel = typeof payload === 'string' ? payload : payload?.channel; if (!channel) throw new Error('Invalid update.setChannel payload'); appUpdater.setChannel(channel); data = { success: true }; break; } if (request.action === 'setAutoDownload') { const payload = request.payload as { enable?: boolean } | boolean | undefined; const enable = typeof payload === 'boolean' ? payload : payload?.enable; if (typeof enable !== 'boolean') throw new Error('Invalid update.setAutoDownload payload'); appUpdater.setAutoDownload(enable); data = { success: true }; break; } if (request.action === 'cancelAutoInstall') { appUpdater.cancelAutoInstall(); data = { success: true }; break; } return { id: request.id, ok: false, error: { code: 'UNSUPPORTED', message: `APP_REQUEST_UNSUPPORTED:${request.module}.${request.action}`, }, }; } case 'cron': { if (request.action === 'list') { const result = await gatewayManager.rpc('cron.list', { includeDisabled: true }); const jobs = (result as { jobs?: GatewayCronJob[] })?.jobs ?? []; data = jobs.map(transformCronJob); break; } if (request.action === 'create') { const payload = request.payload as | { input?: { name: string; message: string; schedule: string; enabled?: boolean } } | [{ name: string; message: string; schedule: string; enabled?: boolean }] | { name: string; message: string; schedule: string; enabled?: boolean } | undefined; const input = Array.isArray(payload) ? payload[0] : ('input' in (payload ?? {}) ? (payload as { input: { name: string; message: string; schedule: string; enabled?: boolean } }).input : payload); if (!input) throw new Error('Invalid cron.create payload'); const gatewayInput = { name: input.name, schedule: { kind: 'cron', expr: input.schedule }, payload: { kind: 'agentTurn', message: input.message }, enabled: input.enabled ?? true, wakeMode: 'next-heartbeat', sessionTarget: 'isolated', delivery: { mode: 'none' }, }; const created = await gatewayManager.rpc('cron.add', gatewayInput); data = created && typeof created === 'object' ? transformCronJob(created as GatewayCronJob) : created; break; } if (request.action === 'update') { const payload = request.payload as | { id?: string; input?: Record } | [string, Record] | undefined; const id = Array.isArray(payload) ? payload[0] : payload?.id; const input = Array.isArray(payload) ? payload[1] : payload?.input; if (!id || !input) throw new Error('Invalid cron.update payload'); const patch = { ...input }; if (typeof patch.schedule === 'string') patch.schedule = { kind: 'cron', expr: patch.schedule }; if (typeof patch.message === 'string') { patch.payload = { kind: 'agentTurn', message: patch.message }; delete patch.message; } data = await gatewayManager.rpc('cron.update', { id, patch }); break; } if (request.action === 'delete') { const payload = request.payload as { id?: string } | string | undefined; const id = typeof payload === 'string' ? payload : payload?.id; if (!id) throw new Error('Invalid cron.delete payload'); data = await gatewayManager.rpc('cron.remove', { id }); break; } if (request.action === 'toggle') { const payload = request.payload as { id?: string; enabled?: boolean } | [string, boolean] | undefined; const id = Array.isArray(payload) ? payload[0] : payload?.id; const enabled = Array.isArray(payload) ? payload[1] : payload?.enabled; if (!id || typeof enabled !== 'boolean') throw new Error('Invalid cron.toggle payload'); data = await gatewayManager.rpc('cron.update', { id, patch: { enabled } }); break; } if (request.action === 'trigger') { const payload = request.payload as { id?: string } | string | undefined; const id = typeof payload === 'string' ? payload : payload?.id; if (!id) throw new Error('Invalid cron.trigger payload'); data = await gatewayManager.rpc('cron.run', { id, mode: 'force' }); break; } return { id: request.id, ok: false, error: { code: 'UNSUPPORTED', message: `APP_REQUEST_UNSUPPORTED:${request.module}.${request.action}`, }, }; } case 'usage': { if (request.action === 'recentTokenHistory') { const payload = request.payload as { limit?: number } | number | undefined; const limit = typeof payload === 'number' ? payload : payload?.limit; const safeLimit = typeof limit === 'number' && Number.isFinite(limit) ? Math.max(Math.floor(limit), 1) : undefined; data = await getRecentTokenUsageHistory(safeLimit); break; } return { id: request.id, ok: false, error: { code: 'UNSUPPORTED', message: `APP_REQUEST_UNSUPPORTED:${request.module}.${request.action}`, }, }; } case 'settings': { if (request.action === 'getAll') { data = await getAllSettings(); break; } if (request.action === 'get') { const payload = request.payload as { key?: keyof AppSettings } | [keyof AppSettings] | undefined; const key = Array.isArray(payload) ? payload[0] : payload?.key; if (!key) throw new Error('Invalid settings.get payload'); data = await getSetting(key); break; } if (request.action === 'set') { const payload = request.payload as | { key?: keyof AppSettings; value?: AppSettings[keyof AppSettings] } | [keyof AppSettings, AppSettings[keyof AppSettings]] | undefined; const key = Array.isArray(payload) ? payload[0] : payload?.key; const value = Array.isArray(payload) ? payload[1] : payload?.value; if (!key) throw new Error('Invalid settings.set payload'); await setSetting(key, value as never); if (isProxyKey(key)) { await handleProxySettingsChange(); } data = { success: true }; break; } if (request.action === 'setMany') { const patch = (request.payload ?? {}) as Partial; const entries = Object.entries(patch) as Array<[keyof AppSettings, AppSettings[keyof AppSettings]]>; for (const [key, value] of entries) { await setSetting(key, value as never); } if (entries.some(([key]) => isProxyKey(key))) { await handleProxySettingsChange(); } data = { success: true }; break; } if (request.action === 'reset') { await resetSettings(); const settings = await getAllSettings(); await handleProxySettingsChange(); data = { success: true, settings }; break; } return { id: request.id, ok: false, error: { code: 'UNSUPPORTED', message: `APP_REQUEST_UNSUPPORTED:${request.module}.${request.action}`, }, }; } default: return { id: request.id, ok: false, error: { code: 'UNSUPPORTED', message: `APP_REQUEST_UNSUPPORTED:${request.module}.${request.action}`, }, }; } return { id: request.id, ok: true, data }; } catch (error) { return { id: request.id, ok: false, error: { code: mapAppErrorCode(error), message: error instanceof Error ? error.message : String(error), }, }; } }); } /** * Skill config IPC handlers * Direct read/write to ~/.openclaw/openclaw.json (bypasses Gateway RPC) */ function registerSkillConfigHandlers(): void { // Update skill config (apiKey and env) ipcMain.handle('skill:updateConfig', async (_, params: { skillKey: string; apiKey?: string; env?: Record; }) => { return await updateSkillConfig(params.skillKey, { apiKey: params.apiKey, env: params.env, }); }); // Get skill config ipcMain.handle('skill:getConfig', async (_, skillKey: string) => { return await getSkillConfig(skillKey); }); // Get all skill configs ipcMain.handle('skill:getAllConfigs', async () => { return await getAllSkillConfigs(); }); } /** * Gateway CronJob type (as returned by cron.list RPC) */ interface GatewayCronJob { id: string; name: string; description?: string; enabled: boolean; createdAtMs: number; updatedAtMs: number; schedule: { kind: string; expr?: string; everyMs?: number; at?: string; tz?: string }; payload: { kind: string; message?: string; text?: string }; delivery?: { mode: string; channel?: string; to?: string }; sessionTarget?: string; state: { nextRunAtMs?: number; lastRunAtMs?: number; lastStatus?: string; lastError?: string; lastDurationMs?: number; }; } /** * Transform a Gateway CronJob to the frontend CronJob format */ function transformCronJob(job: GatewayCronJob) { // Extract message from payload const message = job.payload?.message || job.payload?.text || ''; // Build target from delivery info — only if a delivery channel is specified const channelType = job.delivery?.channel; const target = channelType ? { channelType, channelId: channelType, channelName: channelType } : undefined; // Build lastRun from state const lastRun = job.state?.lastRunAtMs ? { time: new Date(job.state.lastRunAtMs).toISOString(), success: job.state.lastStatus === 'ok', error: job.state.lastError, duration: job.state.lastDurationMs, } : undefined; // Build nextRun from state const nextRun = job.state?.nextRunAtMs ? new Date(job.state.nextRunAtMs).toISOString() : undefined; return { id: job.id, name: job.name, message, schedule: job.schedule, // Pass the object through; frontend parseCronSchedule handles it target, enabled: job.enabled, createdAt: new Date(job.createdAtMs).toISOString(), updatedAt: new Date(job.updatedAtMs).toISOString(), lastRun, nextRun, }; } /** * Cron task IPC handlers * Proxies cron operations to the Gateway RPC service. * The frontend works with plain cron expression strings, but the Gateway * expects CronSchedule objects ({ kind: "cron", expr: "..." }). * These handlers bridge the two formats. */ function registerCronHandlers(gatewayManager: GatewayManager): void { // List all cron jobs — transforms Gateway CronJob format to frontend CronJob format ipcMain.handle('cron:list', async () => { try { const result = await gatewayManager.rpc('cron.list', { includeDisabled: true }); const data = result as { jobs?: GatewayCronJob[] }; const jobs = data?.jobs ?? []; // Auto-repair legacy UI-created jobs that were saved without // delivery: { mode: 'none' }. The Gateway auto-normalizes them // to delivery: { mode: 'announce' } which then fails with // "Channel is required" when no external channels are configured. for (const job of jobs) { const isIsolatedAgent = (job.sessionTarget === 'isolated' || !job.sessionTarget) && job.payload?.kind === 'agentTurn'; const needsRepair = isIsolatedAgent && job.delivery?.mode === 'announce' && !job.delivery?.channel; if (needsRepair) { try { await gatewayManager.rpc('cron.update', { id: job.id, patch: { delivery: { mode: 'none' } }, }); job.delivery = { mode: 'none' }; // Clear stale channel-resolution error from the last run if (job.state?.lastError?.includes('Channel is required')) { job.state.lastError = undefined; job.state.lastStatus = 'ok'; } } catch (e) { console.warn(`Failed to auto-repair cron job ${job.id}:`, e); } } } // Transform Gateway format to frontend format return jobs.map(transformCronJob); } catch (error) { console.error('Failed to list cron jobs:', error); throw error; } }); // Create a new cron job // UI-created tasks have no delivery target — results go to the ClawX chat page. // Tasks created via external channels (Feishu, Discord, etc.) are handled // directly by the OpenClaw Gateway and do not pass through this IPC handler. ipcMain.handle('cron:create', async (_, input: { name: string; message: string; schedule: string; enabled?: boolean; }) => { try { const gatewayInput = { name: input.name, schedule: { kind: 'cron', expr: input.schedule }, payload: { kind: 'agentTurn', message: input.message }, enabled: input.enabled ?? true, wakeMode: 'next-heartbeat', sessionTarget: 'isolated', // UI-created jobs deliver results via ClawX WebSocket chat events, // not external messaging channels. Setting mode='none' prevents // the Gateway from attempting channel delivery (which would fail // with "Channel is required" when no channels are configured). delivery: { mode: 'none' }, }; const result = await gatewayManager.rpc('cron.add', gatewayInput); // Transform the returned job to frontend format if (result && typeof result === 'object') { return transformCronJob(result as GatewayCronJob); } return result; } catch (error) { console.error('Failed to create cron job:', error); throw error; } }); // Update an existing cron job ipcMain.handle('cron:update', async (_, id: string, input: Record) => { try { // Transform schedule string to CronSchedule object if present const patch = { ...input }; if (typeof patch.schedule === 'string') { patch.schedule = { kind: 'cron', expr: patch.schedule }; } // Transform message to payload format if present if (typeof patch.message === 'string') { patch.payload = { kind: 'agentTurn', message: patch.message }; delete patch.message; } const result = await gatewayManager.rpc('cron.update', { id, patch }); return result; } catch (error) { console.error('Failed to update cron job:', error); throw error; } }); // Delete a cron job ipcMain.handle('cron:delete', async (_, id: string) => { try { const result = await gatewayManager.rpc('cron.remove', { id }); return result; } catch (error) { console.error('Failed to delete cron job:', error); throw error; } }); // Toggle a cron job enabled/disabled ipcMain.handle('cron:toggle', async (_, id: string, enabled: boolean) => { try { const result = await gatewayManager.rpc('cron.update', { id, patch: { enabled } }); return result; } catch (error) { console.error('Failed to toggle cron job:', error); throw error; } }); // Trigger a cron job manually ipcMain.handle('cron:trigger', async (_, id: string) => { try { const result = await gatewayManager.rpc('cron.run', { id, mode: 'force' }); return result; } catch (error) { console.error('Failed to trigger cron job:', error); throw error; } }); } /** * UV-related IPC handlers */ function registerUvHandlers(): void { // Check if uv is installed ipcMain.handle('uv:check', async () => { return await checkUvInstalled(); }); // Install uv and setup managed Python ipcMain.handle('uv:install-all', async () => { try { const isInstalled = await checkUvInstalled(); if (!isInstalled) { await installUv(); } // Always run python setup to ensure it exists in uv's cache await setupManagedPython(); return { success: true }; } catch (error) { console.error('Failed to setup uv/python:', error); return { success: false, error: String(error) }; } }); } /** * Log-related IPC handlers * Allows the renderer to read application logs for diagnostics */ function registerLogHandlers(): void { // Get recent logs from memory ring buffer ipcMain.handle('log:getRecent', async (_, count?: number) => { return logger.getRecentLogs(count); }); // Read log file content (last N lines) ipcMain.handle('log:readFile', async (_, tailLines?: number) => { return await logger.readLogFile(tailLines); }); // Get log file path (so user can open in file explorer) ipcMain.handle('log:getFilePath', async () => { return logger.getLogFilePath(); }); // Get log directory path ipcMain.handle('log:getDir', async () => { return logger.getLogDir(); }); // List all log files ipcMain.handle('log:listFiles', async () => { return await logger.listLogFiles(); }); } /** * Gateway-related IPC handlers */ function registerGatewayHandlers( gatewayManager: GatewayManager, mainWindow: BrowserWindow ): void { type GatewayHttpProxyRequest = { path?: string; method?: string; headers?: Record; body?: unknown; timeoutMs?: number; }; // Get Gateway status ipcMain.handle('gateway:status', () => { return gatewayManager.getStatus(); }); // Check if Gateway is connected ipcMain.handle('gateway:isConnected', () => { return gatewayManager.isConnected(); }); // Start Gateway ipcMain.handle('gateway:start', async () => { try { await gatewayManager.start(); return { success: true }; } catch (error) { return { success: false, error: String(error) }; } }); // Stop Gateway ipcMain.handle('gateway:stop', async () => { try { await gatewayManager.stop(); return { success: true }; } catch (error) { return { success: false, error: String(error) }; } }); // Restart Gateway ipcMain.handle('gateway:restart', async () => { try { await gatewayManager.restart(); return { success: true }; } catch (error) { return { success: false, error: String(error) }; } }); // Gateway RPC call ipcMain.handle('gateway:rpc', async (_, method: string, params?: unknown, timeoutMs?: number) => { try { const result = await gatewayManager.rpc(method, params, timeoutMs); return { success: true, result }; } catch (error) { return { success: false, error: String(error) }; } }); // Gateway HTTP proxy // Renderer must not call gateway HTTP directly (CORS); all HTTP traffic // should go through this main-process proxy. ipcMain.handle('gateway:httpProxy', async (_, request: GatewayHttpProxyRequest) => { try { const status = gatewayManager.getStatus(); const port = status.port || 18789; const path = request?.path && request.path.startsWith('/') ? request.path : '/'; const method = (request?.method || 'GET').toUpperCase(); const timeoutMs = typeof request?.timeoutMs === 'number' && request.timeoutMs > 0 ? request.timeoutMs : 15000; const token = await getSetting('gatewayToken'); const headers: Record = { ...(request?.headers ?? {}), }; if (!headers.Authorization && !headers.authorization && token) { headers.Authorization = `Bearer ${token}`; } let body: string | undefined; if (request?.body !== undefined && request?.body !== null) { body = typeof request.body === 'string' ? request.body : JSON.stringify(request.body); if (!headers['Content-Type'] && !headers['content-type']) { headers['Content-Type'] = 'application/json'; } } const controller = new AbortController(); const timer = setTimeout(() => controller.abort(), timeoutMs); const response = await proxyAwareFetch(`http://127.0.0.1:${port}${path}`, { method, headers, body, signal: controller.signal, }); clearTimeout(timer); const contentType = (response.headers.get('content-type') || '').toLowerCase(); if (contentType.includes('application/json')) { const json = await response.json(); return { success: true, status: response.status, ok: response.ok, json, }; } const text = await response.text(); return { success: true, status: response.status, ok: response.ok, text, }; } catch (error) { return { success: false, error: String(error), }; } }); // Chat send with media — reads staged files from disk and builds attachments. // Raster images (png/jpg/gif/webp) are inlined as base64 vision attachments. // All other files are referenced by path in the message text so the model // can access them via tools (the same format channels use). const VISION_MIME_TYPES = new Set([ 'image/png', 'image/jpeg', 'image/bmp', 'image/webp', ]); ipcMain.handle('chat:sendWithMedia', async (_, params: { sessionKey: string; message: string; deliver?: boolean; idempotencyKey: string; media?: Array<{ filePath: string; mimeType: string; fileName: string }>; }) => { try { let message = params.message; // The Gateway processes image attachments through TWO parallel paths: // Path A: `attachments` param → parsed via `parseMessageWithAttachments` → // injected as inline vision content when the model supports images. // Format: { content: base64, mimeType: string, fileName?: string } // Path B: `[media attached: ...]` in message text → Gateway's native image // detection (`detectAndLoadPromptImages`) reads the file from disk and // injects it as inline vision content. Also works for history messages. // We use BOTH paths for maximum reliability. const imageAttachments: Array> = []; const fileReferences: string[] = []; if (params.media && params.media.length > 0) { const fsP = await import('fs/promises'); for (const m of params.media) { const exists = await fsP.access(m.filePath).then(() => true, () => false); logger.info(`[chat:sendWithMedia] Processing file: ${m.fileName} (${m.mimeType}), path: ${m.filePath}, exists: ${exists}, isVision: ${VISION_MIME_TYPES.has(m.mimeType)}`); // Always add file path reference so the model can access it via tools fileReferences.push( `[media attached: ${m.filePath} (${m.mimeType}) | ${m.filePath}]`, ); if (VISION_MIME_TYPES.has(m.mimeType)) { // Send as base64 attachment in the format the Gateway expects: // { content: base64String, mimeType: string, fileName?: string } // The Gateway normalizer looks for `a.content` (NOT `a.source.data`). const fileBuffer = await fsP.readFile(m.filePath); const base64Data = fileBuffer.toString('base64'); logger.info(`[chat:sendWithMedia] Read ${fileBuffer.length} bytes, base64 length: ${base64Data.length}`); imageAttachments.push({ content: base64Data, mimeType: m.mimeType, fileName: m.fileName, }); } } } // Append file references to message text so the model knows about them if (fileReferences.length > 0) { const refs = fileReferences.join('\n'); message = message ? `${message}\n\n${refs}` : refs; } const rpcParams: Record = { sessionKey: params.sessionKey, message, deliver: params.deliver ?? false, idempotencyKey: params.idempotencyKey, }; if (imageAttachments.length > 0) { rpcParams.attachments = imageAttachments; } logger.info(`[chat:sendWithMedia] Sending: message="${message.substring(0, 100)}", attachments=${imageAttachments.length}, fileRefs=${fileReferences.length}`); // Longer timeout for chat sends to tolerate high-latency networks (avoids connect error) const timeoutMs = 120000; const result = await gatewayManager.rpc('chat.send', rpcParams, timeoutMs); logger.info(`[chat:sendWithMedia] RPC result: ${JSON.stringify(result)}`); return { success: true, result }; } catch (error) { logger.error(`[chat:sendWithMedia] Error: ${String(error)}`); return { success: false, error: String(error) }; } }); // Get the Control UI URL with token for embedding ipcMain.handle('gateway:getControlUiUrl', async () => { try { const status = gatewayManager.getStatus(); const token = await getSetting('gatewayToken'); const port = status.port || 18789; // Pass token as query param - Control UI will store it in localStorage const url = `http://127.0.0.1:${port}/?token=${encodeURIComponent(token)}`; return { success: true, url, port, token }; } catch (error) { return { success: false, error: String(error) }; } }); // Health check ipcMain.handle('gateway:health', async () => { try { const health = await gatewayManager.checkHealth(); return { success: true, ...health }; } catch (error) { return { success: false, ok: false, error: String(error) }; } }); // Forward Gateway events to renderer gatewayManager.on('status', (status) => { if (!mainWindow.isDestroyed()) { mainWindow.webContents.send('gateway:status-changed', status); } }); gatewayManager.on('message', (message) => { if (!mainWindow.isDestroyed()) { mainWindow.webContents.send('gateway:message', message); } }); gatewayManager.on('notification', (notification) => { if (!mainWindow.isDestroyed()) { mainWindow.webContents.send('gateway:notification', notification); } }); gatewayManager.on('channel:status', (data) => { if (!mainWindow.isDestroyed()) { mainWindow.webContents.send('gateway:channel-status', data); } }); gatewayManager.on('chat:message', (data) => { if (!mainWindow.isDestroyed()) { mainWindow.webContents.send('gateway:chat-message', data); } }); gatewayManager.on('exit', (code) => { if (!mainWindow.isDestroyed()) { mainWindow.webContents.send('gateway:exit', code); } }); gatewayManager.on('error', (error) => { if (!mainWindow.isDestroyed()) { mainWindow.webContents.send('gateway:error', error.message); } }); } /** * OpenClaw-related IPC handlers * For checking package status and channel configuration */ function registerOpenClawHandlers(gatewayManager: GatewayManager): void { async function ensureDingTalkPluginInstalled(): Promise<{ installed: boolean; warning?: string }> { const targetDir = join(homedir(), '.openclaw', 'extensions', 'dingtalk'); const targetManifest = join(targetDir, 'openclaw.plugin.json'); if (existsSync(targetManifest)) { logger.info('DingTalk plugin already installed from local mirror'); return { installed: true }; } const candidateSources = app.isPackaged ? [ join(process.resourcesPath, 'openclaw-plugins', 'dingtalk'), join(process.resourcesPath, 'app.asar.unpacked', 'build', 'openclaw-plugins', 'dingtalk'), join(process.resourcesPath, 'app.asar.unpacked', 'openclaw-plugins', 'dingtalk') ] : [ join(app.getAppPath(), 'build', 'openclaw-plugins', 'dingtalk'), join(process.cwd(), 'build', 'openclaw-plugins', 'dingtalk'), join(__dirname, '../../build/openclaw-plugins/dingtalk'), ]; const sourceDir = candidateSources.find((dir) => existsSync(join(dir, 'openclaw.plugin.json'))); if (!sourceDir) { logger.warn('Bundled DingTalk plugin mirror not found in candidate paths', { candidateSources }); return { installed: false, warning: `Bundled DingTalk plugin mirror not found. Checked: ${candidateSources.join(' | ')}`, }; } try { mkdirSync(join(homedir(), '.openclaw', 'extensions'), { recursive: true }); rmSync(targetDir, { recursive: true, force: true }); cpSync(sourceDir, targetDir, { recursive: true, dereference: true }); if (!existsSync(targetManifest)) { return { installed: false, warning: 'Failed to install DingTalk plugin mirror (manifest missing).' }; } logger.info(`Installed DingTalk plugin from bundled mirror: ${sourceDir}`); return { installed: true }; } catch (error) { logger.warn('Failed to install DingTalk plugin from bundled mirror:', error); return { installed: false, warning: 'Failed to install bundled DingTalk plugin mirror', }; } } // Get OpenClaw package status ipcMain.handle('openclaw:status', () => { const status = getOpenClawStatus(); logger.info('openclaw:status IPC called', status); return status; }); // Check if OpenClaw is ready (package present) ipcMain.handle('openclaw:isReady', () => { const status = getOpenClawStatus(); return status.packageExists; }); // Get the resolved OpenClaw directory path (for diagnostics) ipcMain.handle('openclaw:getDir', () => { return getOpenClawDir(); }); // Get the OpenClaw config directory (~/.openclaw) ipcMain.handle('openclaw:getConfigDir', () => { return getOpenClawConfigDir(); }); // Get the OpenClaw skills directory (~/.openclaw/skills) ipcMain.handle('openclaw:getSkillsDir', () => { const dir = getOpenClawSkillsDir(); ensureDir(dir); return dir; }); // Get a shell command to run OpenClaw CLI without modifying PATH ipcMain.handle('openclaw:getCliCommand', () => { try { const status = getOpenClawStatus(); if (!status.packageExists) { return { success: false, error: `OpenClaw package not found at: ${status.dir}` }; } if (!existsSync(status.entryPath)) { return { success: false, error: `OpenClaw entry script not found at: ${status.entryPath}` }; } return { success: true, command: getOpenClawCliCommand() }; } catch (error) { return { success: false, error: String(error) }; } }); // ==================== Channel Configuration Handlers ==================== // Save channel configuration ipcMain.handle('channel:saveConfig', async (_, channelType: string, config: Record) => { try { logger.info('channel:saveConfig', { channelType, keys: Object.keys(config || {}) }); if (channelType === 'dingtalk') { const installResult = await ensureDingTalkPluginInstalled(); if (!installResult.installed) { return { success: false, error: installResult.warning || 'DingTalk plugin install failed', }; } await saveChannelConfig(channelType, config); if (gatewayManager.getStatus().state !== 'stopped') { logger.info(`Scheduling Gateway reload after channel:saveConfig (${channelType})`); gatewayManager.debouncedReload(); } else { logger.info(`Gateway is stopped; skip immediate reload after channel:saveConfig (${channelType})`); } return { success: true, pluginInstalled: installResult.installed, warning: installResult.warning, }; } await saveChannelConfig(channelType, config); if (gatewayManager.getStatus().state !== 'stopped') { logger.info(`Scheduling Gateway reload after channel:saveConfig (${channelType})`); gatewayManager.debouncedReload(); } else { logger.info(`Gateway is stopped; skip immediate reload after channel:saveConfig (${channelType})`); } return { success: true }; } catch (error) { console.error('Failed to save channel config:', error); return { success: false, error: String(error) }; } }); // Get channel configuration ipcMain.handle('channel:getConfig', async (_, channelType: string) => { try { const config = await getChannelConfig(channelType); return { success: true, config }; } catch (error) { console.error('Failed to get channel config:', error); return { success: false, error: String(error) }; } }); // Get channel form values (reverse-transformed for UI pre-fill) ipcMain.handle('channel:getFormValues', async (_, channelType: string) => { try { const values = await getChannelFormValues(channelType); return { success: true, values }; } catch (error) { console.error('Failed to get channel form values:', error); return { success: false, error: String(error) }; } }); // Delete channel configuration ipcMain.handle('channel:deleteConfig', async (_, channelType: string) => { try { await deleteChannelConfig(channelType); if (gatewayManager.getStatus().state !== 'stopped') { logger.info(`Scheduling Gateway reload after channel:deleteConfig (${channelType})`); gatewayManager.debouncedReload(); } else { logger.info(`Gateway is stopped; skip immediate reload after channel:deleteConfig (${channelType})`); } return { success: true }; } catch (error) { console.error('Failed to delete channel config:', error); return { success: false, error: String(error) }; } }); // List configured channels ipcMain.handle('channel:listConfigured', async () => { try { const channels = await listConfiguredChannels(); return { success: true, channels }; } catch (error) { console.error('Failed to list channels:', error); return { success: false, error: String(error) }; } }); // Enable or disable a channel ipcMain.handle('channel:setEnabled', async (_, channelType: string, enabled: boolean) => { try { await setChannelEnabled(channelType, enabled); if (gatewayManager.getStatus().state !== 'stopped') { logger.info(`Scheduling Gateway reload after channel:setEnabled (${channelType}, enabled=${enabled})`); gatewayManager.debouncedReload(); } else { logger.info(`Gateway is stopped; skip immediate reload after channel:setEnabled (${channelType})`); } return { success: true }; } catch (error) { console.error('Failed to set channel enabled:', error); return { success: false, error: String(error) }; } }); // Validate channel configuration ipcMain.handle('channel:validate', async (_, channelType: string) => { try { const result = await validateChannelConfig(channelType); return { success: true, ...result }; } catch (error) { console.error('Failed to validate channel:', error); return { success: false, valid: false, errors: [String(error)], warnings: [] }; } }); // Validate channel credentials by calling actual service APIs (before saving) ipcMain.handle('channel:validateCredentials', async (_, channelType: string, config: Record) => { try { const result = await validateChannelCredentials(channelType, config); return { success: true, ...result }; } catch (error) { console.error('Failed to validate channel credentials:', error); return { success: false, valid: false, errors: [String(error)], warnings: [] }; } }); } /** * WhatsApp Login Handlers */ function registerWhatsAppHandlers(mainWindow: BrowserWindow): void { // Request WhatsApp QR code ipcMain.handle('channel:requestWhatsAppQr', async (_, accountId: string) => { try { logger.info('channel:requestWhatsAppQr', { accountId }); await whatsAppLoginManager.start(accountId); return { success: true }; } catch (error) { logger.error('channel:requestWhatsAppQr failed', error); return { success: false, error: String(error) }; } }); // Cancel WhatsApp login ipcMain.handle('channel:cancelWhatsAppQr', async () => { try { await whatsAppLoginManager.stop(); return { success: true }; } catch (error) { logger.error('channel:cancelWhatsAppQr failed', error); return { success: false, error: String(error) }; } }); // Check WhatsApp status (is it active?) // ipcMain.handle('channel:checkWhatsAppStatus', ...) // Forward events to renderer whatsAppLoginManager.on('qr', (data) => { if (!mainWindow.isDestroyed()) { mainWindow.webContents.send('channel:whatsapp-qr', data); } }); whatsAppLoginManager.on('success', (data) => { if (!mainWindow.isDestroyed()) { logger.info('whatsapp:login-success', data); mainWindow.webContents.send('channel:whatsapp-success', data); } }); whatsAppLoginManager.on('error', (error) => { if (!mainWindow.isDestroyed()) { logger.error('whatsapp:login-error', error); mainWindow.webContents.send('channel:whatsapp-error', error); } }); } /** * Device OAuth Handlers (Code Plan) */ function registerDeviceOAuthHandlers(mainWindow: BrowserWindow): void { deviceOAuthManager.setWindow(mainWindow); browserOAuthManager.setWindow(mainWindow); // Request Provider OAuth initialization ipcMain.handle( 'provider:requestOAuth', async ( _, provider: OAuthProviderType | BrowserOAuthProviderType, region?: 'global' | 'cn', options?: { accountId?: string; label?: string }, ) => { try { logger.info(`provider:requestOAuth for ${provider}`); if (provider === 'google') { await browserOAuthManager.startFlow(provider, options); } else { await deviceOAuthManager.startFlow(provider, region, options); } return { success: true }; } catch (error) { logger.error('provider:requestOAuth failed', error); return { success: false, error: String(error) }; } }, ); // Cancel Provider OAuth ipcMain.handle('provider:cancelOAuth', async () => { try { await deviceOAuthManager.stopFlow(); await browserOAuthManager.stopFlow(); return { success: true }; } catch (error) { logger.error('provider:cancelOAuth failed', error); return { success: false, error: String(error) }; } }); } /** * Provider-related IPC handlers */ function registerProviderHandlers(gatewayManager: GatewayManager): void { const providerService = getProviderService(); // Listen for OAuth success to automatically restart the Gateway with new tokens/configs. // Use a longer debounce (8s) so that provider:setDefault — which writes the full config // and then calls debouncedRestart(2s) — has time to fire and coalesce into a single // restart. Without this, the OAuth restart fires first with stale config, and the // subsequent provider:setDefault restart is deferred and dropped. deviceOAuthManager.on('oauth:success', ({ provider, accountId }) => { logger.info(`[IPC] Scheduling Gateway restart after ${provider} OAuth success for ${accountId}...`); gatewayManager.debouncedRestart(8000); }); browserOAuthManager.on('oauth:success', ({ provider, accountId }) => { logger.info(`[IPC] Scheduling Gateway restart after ${provider} OAuth success for ${accountId}...`); gatewayManager.debouncedRestart(8000); }); // Get all providers with key info ipcMain.handle('provider:list', async () => { return await providerService.listLegacyProvidersWithKeyInfo(); }); // New provider-service endpoints used by the account-based refactor. ipcMain.handle('provider:listVendors', async () => { return await providerService.listVendors(); }); ipcMain.handle('provider:listAccounts', async () => { return await providerService.listAccounts(); }); ipcMain.handle('provider:getAccount', async (_, accountId: string) => { return await providerService.getAccount(accountId); }); // Get a specific provider ipcMain.handle('provider:get', async (_, providerId: string) => { return await providerService.getLegacyProvider(providerId); }); // Save a provider configuration ipcMain.handle('provider:save', async (_, config: ProviderConfig, apiKey?: string) => { try { // Save the provider config await providerService.saveLegacyProvider(config); // Store the API key if provided if (apiKey !== undefined) { const trimmedKey = apiKey.trim(); if (trimmedKey) { await providerService.setLegacyProviderApiKey(config.id, trimmedKey); // Also write to OpenClaw auth-profiles.json so the gateway can use it try { await syncProviderApiKeyToRuntime(config.type, config.id, trimmedKey); } catch (err) { console.warn('Failed to save key to OpenClaw auth-profiles:', err); } } } // Sync the provider configuration to openclaw.json so Gateway knows about it try { await syncSavedProviderToRuntime(config, apiKey, gatewayManager); } catch (err) { console.warn('Failed to sync openclaw provider config:', err); } return { success: true }; } catch (error) { return { success: false, error: String(error) }; } }); // Delete a provider ipcMain.handle('provider:delete', async (_, providerId: string) => { try { const existing = await providerService.getLegacyProvider(providerId); await providerService.deleteLegacyProvider(providerId); // Best-effort cleanup in OpenClaw auth profiles & openclaw.json config if (existing?.type) { try { await syncDeletedProviderToRuntime(existing, providerId, gatewayManager); } catch (err) { console.warn('Failed to completely remove provider from OpenClaw:', err); } } return { success: true }; } catch (error) { return { success: false, error: String(error) }; } }); // Update API key for a provider ipcMain.handle('provider:setApiKey', async (_, providerId: string, apiKey: string) => { try { await providerService.setLegacyProviderApiKey(providerId, apiKey); // Also write to OpenClaw auth-profiles.json const provider = await providerService.getLegacyProvider(providerId); const providerType = provider?.type || providerId; try { await syncProviderApiKeyToRuntime(providerType, providerId, apiKey); } catch (err) { console.warn('Failed to save key to OpenClaw auth-profiles:', err); } return { success: true }; } catch (error) { return { success: false, error: String(error) }; } }); // Atomically update provider config and API key ipcMain.handle( 'provider:updateWithKey', async ( _, providerId: string, updates: Partial, apiKey?: string ) => { const existing = await providerService.getLegacyProvider(providerId); if (!existing) { return { success: false, error: 'Provider not found' }; } const previousKey = await providerService.getLegacyProviderApiKey(providerId); const previousOck = getOpenClawProviderKey(existing.type, providerId); try { const nextConfig: ProviderConfig = { ...existing, ...updates, updatedAt: new Date().toISOString(), }; const ock = getOpenClawProviderKey(nextConfig.type, providerId); await providerService.saveLegacyProvider(nextConfig); if (apiKey !== undefined) { const trimmedKey = apiKey.trim(); if (trimmedKey) { await providerService.setLegacyProviderApiKey(providerId, trimmedKey); await syncProviderApiKeyToRuntime(nextConfig.type, providerId, trimmedKey); } else { await providerService.deleteLegacyProviderApiKey(providerId); await removeProviderFromOpenClaw(ock); } } // Sync the provider configuration to openclaw.json so Gateway knows about it try { await syncUpdatedProviderToRuntime(nextConfig, apiKey, gatewayManager); } catch (err) { console.warn('Failed to sync openclaw config after provider update:', err); } return { success: true }; } catch (error) { // Best-effort rollback to keep config/key consistent. try { await providerService.saveLegacyProvider(existing); if (previousKey) { await providerService.setLegacyProviderApiKey(providerId, previousKey); await saveProviderKeyToOpenClaw(previousOck, previousKey); } else { await providerService.deleteLegacyProviderApiKey(providerId); await removeProviderFromOpenClaw(previousOck); } } catch (rollbackError) { console.warn('Failed to rollback provider updateWithKey:', rollbackError); } return { success: false, error: String(error) }; } } ); // Delete API key for a provider ipcMain.handle('provider:deleteApiKey', async (_, providerId: string) => { try { await providerService.deleteLegacyProviderApiKey(providerId); // Keep OpenClaw auth-profiles.json in sync with local key storage const provider = await providerService.getLegacyProvider(providerId); try { await syncDeletedProviderApiKeyToRuntime(provider, providerId); } catch (err) { console.warn('Failed to completely remove provider from OpenClaw:', err); } return { success: true }; } catch (error) { return { success: false, error: String(error) }; } }); // Check if a provider has an API key ipcMain.handle('provider:hasApiKey', async (_, providerId: string) => { return await providerService.hasLegacyProviderApiKey(providerId); }); // Get the actual API key (for internal use only - be careful!) ipcMain.handle('provider:getApiKey', async (_, providerId: string) => { return await providerService.getLegacyProviderApiKey(providerId); }); // Set default provider and update OpenClaw default model ipcMain.handle('provider:setDefault', async (_, providerId: string) => { try { await providerService.setDefaultLegacyProvider(providerId); // Update OpenClaw config to use this provider's default model try { await syncDefaultProviderToRuntime(providerId, gatewayManager); } catch (err) { console.warn('Failed to set OpenClaw default model:', err); } return { success: true }; } catch (error) { return { success: false, error: String(error) }; } }); // Get default provider ipcMain.handle('provider:getDefault', async () => { return await providerService.getDefaultLegacyProvider(); }); // Validate API key by making a real test request to the provider. // providerId can be either a stored provider ID or a provider type. ipcMain.handle( 'provider:validateKey', async ( _, providerId: string, apiKey: string, options?: { baseUrl?: string } ) => { try { // First try to get existing provider const provider = await providerService.getLegacyProvider(providerId); // Use provider.type if provider exists, otherwise use providerId as the type // This allows validation during setup when provider hasn't been saved yet const providerType = provider?.type || providerId; const registryBaseUrl = getProviderConfig(providerType)?.baseUrl; // Prefer caller-supplied baseUrl (live form value) over persisted config. // This ensures Setup/Settings validation reflects unsaved edits immediately. const resolvedBaseUrl = options?.baseUrl || provider?.baseUrl || registryBaseUrl; console.log(`[clawx-validate] validating provider type: ${providerType}`); return await validateApiKeyWithProvider(providerType, apiKey, { baseUrl: resolvedBaseUrl }); } catch (error) { console.error('Validation error:', error); return { valid: false, error: String(error) }; } } ); } /** * Shell-related IPC handlers */ function registerShellHandlers(): void { // Open external URL ipcMain.handle('shell:openExternal', async (_, url: string) => { await shell.openExternal(url); }); // Open path in file explorer ipcMain.handle('shell:showItemInFolder', async (_, path: string) => { shell.showItemInFolder(path); }); // Open path ipcMain.handle('shell:openPath', async (_, path: string) => { return await shell.openPath(path); }); } /** * ClawHub-related IPC handlers */ function registerClawHubHandlers(clawHubService: ClawHubService): void { // Search skills ipcMain.handle('clawhub:search', async (_, params: ClawHubSearchParams) => { try { const results = await clawHubService.search(params); return { success: true, results }; } catch (error) { return { success: false, error: String(error) }; } }); // Install skill ipcMain.handle('clawhub:install', async (_, params: ClawHubInstallParams) => { try { await clawHubService.install(params); return { success: true }; } catch (error) { return { success: false, error: String(error) }; } }); // Uninstall skill ipcMain.handle('clawhub:uninstall', async (_, params: ClawHubUninstallParams) => { try { await clawHubService.uninstall(params); return { success: true }; } catch (error) { return { success: false, error: String(error) }; } }); // List installed skills ipcMain.handle('clawhub:list', async () => { try { const results = await clawHubService.listInstalled(); return { success: true, results }; } catch (error) { return { success: false, error: String(error) }; } }); // Open skill readme ipcMain.handle('clawhub:openSkillReadme', async (_, slug: string) => { try { await clawHubService.openSkillReadme(slug); return { success: true }; } catch (error) { return { success: false, error: String(error) }; } }); } /** * Dialog-related IPC handlers */ function registerDialogHandlers(): void { // Show open dialog ipcMain.handle('dialog:open', async (_, options: Electron.OpenDialogOptions) => { const result = await dialog.showOpenDialog(options); return result; }); // Show save dialog ipcMain.handle('dialog:save', async (_, options: Electron.SaveDialogOptions) => { const result = await dialog.showSaveDialog(options); return result; }); // Show message box ipcMain.handle('dialog:message', async (_, options: Electron.MessageBoxOptions) => { const result = await dialog.showMessageBox(options); return result; }); } /** * App-related IPC handlers */ function registerAppHandlers(): void { // Get app version ipcMain.handle('app:version', () => { return app.getVersion(); }); // Get app name ipcMain.handle('app:name', () => { return app.getName(); }); // Get app path ipcMain.handle('app:getPath', (_, name: Parameters[0]) => { return app.getPath(name); }); // Get platform ipcMain.handle('app:platform', () => { return process.platform; }); // Quit app ipcMain.handle('app:quit', () => { app.quit(); }); // Relaunch app ipcMain.handle('app:relaunch', () => { app.relaunch(); app.quit(); }); } function registerSettingsHandlers(gatewayManager: GatewayManager): void { const handleProxySettingsChange = async () => { const settings = await getAllSettings(); await applyProxySettings(settings); if (gatewayManager.getStatus().state === 'running') { await gatewayManager.restart(); } }; ipcMain.handle('settings:get', async (_, key: keyof AppSettings) => { return await getSetting(key); }); ipcMain.handle('settings:getAll', async () => { return await getAllSettings(); }); ipcMain.handle('settings:set', async (_, key: keyof AppSettings, value: AppSettings[keyof AppSettings]) => { await setSetting(key, value as never); if ( key === 'proxyEnabled' || key === 'proxyServer' || key === 'proxyHttpServer' || key === 'proxyHttpsServer' || key === 'proxyAllServer' || key === 'proxyBypassRules' ) { await handleProxySettingsChange(); } return { success: true }; }); ipcMain.handle('settings:setMany', async (_, patch: Partial) => { const entries = Object.entries(patch) as Array<[keyof AppSettings, AppSettings[keyof AppSettings]]>; for (const [key, value] of entries) { await setSetting(key, value as never); } if (entries.some(([key]) => key === 'proxyEnabled' || key === 'proxyServer' || key === 'proxyHttpServer' || key === 'proxyHttpsServer' || key === 'proxyAllServer' || key === 'proxyBypassRules' )) { await handleProxySettingsChange(); } return { success: true }; }); ipcMain.handle('settings:reset', async () => { await resetSettings(); const settings = await getAllSettings(); await handleProxySettingsChange(); return { success: true, settings }; }); } function registerUsageHandlers(): void { ipcMain.handle('usage:recentTokenHistory', async (_, limit?: number) => { const safeLimit = typeof limit === 'number' && Number.isFinite(limit) ? Math.max(Math.floor(limit), 1) : undefined; return await getRecentTokenUsageHistory(safeLimit); }); } /** * Window control handlers (for custom title bar on Windows/Linux) */ function registerWindowHandlers(mainWindow: BrowserWindow): void { ipcMain.handle('window:minimize', () => { mainWindow.minimize(); }); ipcMain.handle('window:maximize', () => { if (mainWindow.isMaximized()) { mainWindow.unmaximize(); } else { mainWindow.maximize(); } }); ipcMain.handle('window:close', () => { mainWindow.close(); }); ipcMain.handle('window:isMaximized', () => { return mainWindow.isMaximized(); }); } // ── Mime type helpers ──────────────────────────────────────────── const EXT_MIME_MAP: Record = { '.png': 'image/png', '.jpg': 'image/jpeg', '.jpeg': 'image/jpeg', '.gif': 'image/gif', '.webp': 'image/webp', '.svg': 'image/svg+xml', '.bmp': 'image/bmp', '.ico': 'image/x-icon', '.mp4': 'video/mp4', '.webm': 'video/webm', '.mov': 'video/quicktime', '.avi': 'video/x-msvideo', '.mkv': 'video/x-matroska', '.mp3': 'audio/mpeg', '.wav': 'audio/wav', '.ogg': 'audio/ogg', '.flac': 'audio/flac', '.pdf': 'application/pdf', '.zip': 'application/zip', '.gz': 'application/gzip', '.tar': 'application/x-tar', '.7z': 'application/x-7z-compressed', '.rar': 'application/vnd.rar', '.json': 'application/json', '.xml': 'application/xml', '.csv': 'text/csv', '.txt': 'text/plain', '.md': 'text/markdown', '.html': 'text/html', '.css': 'text/css', '.js': 'text/javascript', '.ts': 'text/typescript', '.py': 'text/x-python', '.doc': 'application/msword', '.docx': 'application/vnd.openxmlformats-officedocument.wordprocessingml.document', '.xls': 'application/vnd.ms-excel', '.xlsx': 'application/vnd.openxmlformats-officedocument.spreadsheetml.sheet', '.ppt': 'application/vnd.ms-powerpoint', '.pptx': 'application/vnd.openxmlformats-officedocument.presentationml.presentation', }; function getMimeType(ext: string): string { return EXT_MIME_MAP[ext.toLowerCase()] || 'application/octet-stream'; } function mimeToExt(mimeType: string): string { for (const [ext, mime] of Object.entries(EXT_MIME_MAP)) { if (mime === mimeType) return ext; } return ''; } const OUTBOUND_DIR = join(homedir(), '.openclaw', 'media', 'outbound'); /** * Generate a preview data URL for image files. * Resizes large images while preserving aspect ratio (only constrain the * longer side so the image is never squished). The frontend handles * square cropping via CSS object-fit: cover. */ async function generateImagePreview(filePath: string, mimeType: string): Promise { try { const img = nativeImage.createFromPath(filePath); if (img.isEmpty()) return null; const size = img.getSize(); const maxDim = 512; // keep enough resolution for crisp display on Retina // Only resize if larger than threshold — specify ONE dimension to keep ratio if (size.width > maxDim || size.height > maxDim) { const resized = size.width >= size.height ? img.resize({ width: maxDim }) // landscape / square → constrain width : img.resize({ height: maxDim }); // portrait → constrain height return `data:image/png;base64,${resized.toPNG().toString('base64')}`; } // Small image — use original (async read to avoid blocking) const { readFile: readFileAsync } = await import('fs/promises'); const buf = await readFileAsync(filePath); return `data:${mimeType};base64,${buf.toString('base64')}`; } catch { return null; } } /** * File staging IPC handlers * Stage files to ~/.openclaw/media/outbound/ for gateway access */ function registerFileHandlers(): void { // Stage files from real disk paths (used with dialog:open) ipcMain.handle('file:stage', async (_, filePaths: string[]) => { const fsP = await import('fs/promises'); await fsP.mkdir(OUTBOUND_DIR, { recursive: true }); const results = []; for (const filePath of filePaths) { const id = crypto.randomUUID(); const ext = extname(filePath); const stagedPath = join(OUTBOUND_DIR, `${id}${ext}`); await fsP.copyFile(filePath, stagedPath); const s = await fsP.stat(stagedPath); const mimeType = getMimeType(ext); const fileName = basename(filePath); // Generate preview for images let preview: string | null = null; if (mimeType.startsWith('image/')) { preview = await generateImagePreview(stagedPath, mimeType); } results.push({ id, fileName, mimeType, fileSize: s.size, stagedPath, preview }); } return results; }); // Stage file from buffer (used for clipboard paste / drag-drop) ipcMain.handle('file:stageBuffer', async (_, payload: { base64: string; fileName: string; mimeType: string; }) => { const fsP = await import('fs/promises'); await fsP.mkdir(OUTBOUND_DIR, { recursive: true }); const id = crypto.randomUUID(); const ext = extname(payload.fileName) || mimeToExt(payload.mimeType); const stagedPath = join(OUTBOUND_DIR, `${id}${ext}`); const buffer = Buffer.from(payload.base64, 'base64'); await fsP.writeFile(stagedPath, buffer); const mimeType = payload.mimeType || getMimeType(ext); const fileSize = buffer.length; // Generate preview for images let preview: string | null = null; if (mimeType.startsWith('image/')) { preview = await generateImagePreview(stagedPath, mimeType); } return { id, fileName: payload.fileName, mimeType, fileSize, stagedPath, preview }; }); // Load thumbnails for file paths on disk (used to restore previews in history) // Save an image to a user-chosen location (base64 data URI or existing file path) ipcMain.handle('media:saveImage', async (_, params: { base64?: string; mimeType?: string; filePath?: string; defaultFileName: string; }) => { try { const ext = params.defaultFileName.includes('.') ? params.defaultFileName.split('.').pop()! : (params.mimeType?.split('/')[1] || 'png'); const result = await dialog.showSaveDialog({ defaultPath: join(homedir(), 'Downloads', params.defaultFileName), filters: [ { name: 'Images', extensions: [ext, 'png', 'jpg', 'jpeg', 'webp', 'gif'] }, { name: 'All Files', extensions: ['*'] }, ], }); if (result.canceled || !result.filePath) return { success: false }; const fsP = await import('fs/promises'); if (params.filePath) { try { await fsP.access(params.filePath); await fsP.copyFile(params.filePath, result.filePath); } catch { return { success: false, error: 'Source file not found' }; } } else if (params.base64) { const buffer = Buffer.from(params.base64, 'base64'); await fsP.writeFile(result.filePath, buffer); } else { return { success: false, error: 'No image data provided' }; } return { success: true, savedPath: result.filePath }; } catch (err) { return { success: false, error: String(err) }; } }); ipcMain.handle('media:getThumbnails', async (_, paths: Array<{ filePath: string; mimeType: string }>) => { const fsP = await import('fs/promises'); const results: Record = {}; for (const { filePath, mimeType } of paths) { try { const s = await fsP.stat(filePath); let preview: string | null = null; if (mimeType.startsWith('image/')) { preview = await generateImagePreview(filePath, mimeType); } results[filePath] = { preview, fileSize: s.size }; } catch { results[filePath] = { preview: null, fileSize: 0 }; } } return results; }); } /** * Session IPC handlers * * Performs a soft-delete of a session's JSONL transcript on disk. * sessionKey format: "agent::" — e.g. "agent:main:session-1234567890". * The JSONL file lives at: ~/.openclaw/agents//sessions/.jsonl * Renaming to .deleted.jsonl hides it from sessions.list and token-usage * (both already filter out filenames containing ".deleted."). */ function registerSessionHandlers(): void { ipcMain.handle('session:delete', async (_, sessionKey: string) => { try { if (!sessionKey || !sessionKey.startsWith('agent:')) { return { success: false, error: `Invalid sessionKey: ${sessionKey}` }; } const parts = sessionKey.split(':'); if (parts.length < 3) { return { success: false, error: `sessionKey has too few parts: ${sessionKey}` }; } const agentId = parts[1]; const openclawConfigDir = getOpenClawConfigDir(); const sessionsDir = join(openclawConfigDir, 'agents', agentId, 'sessions'); const sessionsJsonPath = join(sessionsDir, 'sessions.json'); logger.info(`[session:delete] key=${sessionKey} agentId=${agentId}`); logger.info(`[session:delete] sessionsJson=${sessionsJsonPath}`); const fsP = await import('fs/promises'); // ── Step 1: read sessions.json to find the UUID file for this sessionKey ── let sessionsJson: Record = {}; try { const raw = await fsP.readFile(sessionsJsonPath, 'utf8'); sessionsJson = JSON.parse(raw) as Record; } catch (e) { logger.warn(`[session:delete] Could not read sessions.json: ${String(e)}`); return { success: false, error: `Could not read sessions.json: ${String(e)}` }; } // sessions.json structure: try common shapes used by OpenClaw Gateway: // Shape A (array): { sessions: [{ key, file, ... }] } // Shape B (object): { [sessionKey]: { file, ... } } // Shape C (array): { sessions: [{ key, id, ... }] } — id is the UUID let uuidFileName: string | undefined; // Shape A / C — array under "sessions" key if (Array.isArray(sessionsJson.sessions)) { const entry = (sessionsJson.sessions as Array>) .find((s) => s.key === sessionKey || s.sessionKey === sessionKey); if (entry) { // Could be "file", "fileName", "id" + ".jsonl", or "path" uuidFileName = (entry.file ?? entry.fileName ?? entry.path) as string | undefined; if (!uuidFileName && typeof entry.id === 'string') { uuidFileName = `${entry.id}.jsonl`; } } } // Shape B — flat object keyed by sessionKey; value may be a string or an object. // Actual Gateway format: { sessionFile: "/abs/path/uuid.jsonl", sessionId: "uuid", ... } let resolvedSrcPath: string | undefined; if (!uuidFileName && sessionsJson[sessionKey] != null) { const val = sessionsJson[sessionKey]; if (typeof val === 'string') { uuidFileName = val; } else if (typeof val === 'object' && val !== null) { const entry = val as Record; // Priority: absolute sessionFile path > relative file/fileName/path > id/sessionId as UUID const absFile = (entry.sessionFile ?? entry.file ?? entry.fileName ?? entry.path) as string | undefined; if (absFile) { if (absFile.startsWith('/') || absFile.match(/^[A-Za-z]:\\/)) { // Absolute path — use directly resolvedSrcPath = absFile; } else { uuidFileName = absFile; } } else { // Fall back to UUID fields const uuidVal = (entry.id ?? entry.sessionId) as string | undefined; if (uuidVal) uuidFileName = uuidVal.endsWith('.jsonl') ? uuidVal : `${uuidVal}.jsonl`; } } } if (!uuidFileName && !resolvedSrcPath) { const rawVal = sessionsJson[sessionKey]; logger.warn(`[session:delete] Cannot resolve file for "${sessionKey}". Raw value: ${JSON.stringify(rawVal)}`); return { success: false, error: `Cannot resolve file for session: ${sessionKey}` }; } // Normalise: if we got a relative filename, resolve it against sessionsDir if (!resolvedSrcPath) { if (!uuidFileName!.endsWith('.jsonl')) uuidFileName = `${uuidFileName}.jsonl`; resolvedSrcPath = join(sessionsDir, uuidFileName!); } const dstPath = resolvedSrcPath.replace(/\.jsonl$/, '.deleted.jsonl'); logger.info(`[session:delete] file: ${resolvedSrcPath}`); // ── Step 2: rename the JSONL file ── try { await fsP.access(resolvedSrcPath); await fsP.rename(resolvedSrcPath, dstPath); logger.info(`[session:delete] Renamed ${resolvedSrcPath} → ${dstPath}`); } catch (e) { logger.warn(`[session:delete] Could not rename file: ${String(e)}`); } // ── Step 3: remove the entry from sessions.json ── try { // Re-read to avoid race conditions const raw2 = await fsP.readFile(sessionsJsonPath, 'utf8'); const json2 = JSON.parse(raw2) as Record; if (Array.isArray(json2.sessions)) { json2.sessions = (json2.sessions as Array>) .filter((s) => s.key !== sessionKey && s.sessionKey !== sessionKey); } else if (json2[sessionKey]) { delete json2[sessionKey]; } await fsP.writeFile(sessionsJsonPath, JSON.stringify(json2, null, 2), 'utf8'); logger.info(`[session:delete] Removed "${sessionKey}" from sessions.json`); } catch (e) { logger.warn(`[session:delete] Could not update sessions.json: ${String(e)}`); // Non-fatal — JSONL rename already done } return { success: true }; } catch (err) { logger.error(`[session:delete] Unexpected error for ${sessionKey}:`, err); return { success: false, error: String(err) }; } }); }