Part 1: API Key Integration - Create electron/utils/openclaw-auth.ts to write keys to ~/.openclaw/agents/main/agent/auth-profiles.json - Update provider:save and provider:setApiKey IPC handlers to persist keys to OpenClaw auth-profiles alongside ClawX storage - Save API key to OpenClaw on successful validation in Setup wizard - Pass provider API keys as environment variables when starting the Gateway process (ANTHROPIC_API_KEY, OPENROUTER_API_KEY, etc.) Part 2: Embed OpenClaw Control UI for Chat - Replace custom Chat UI with <webview> embedding the Gateway's built-in Control UI at http://127.0.0.1:{port}/?token={token} - Add gateway:getControlUiUrl IPC handler to provide tokenized URL - Enable webviewTag in Electron BrowserWindow preferences - Override X-Frame-Options/CSP headers to allow webview embedding - Suppress noisy control-ui token_mismatch stderr messages - Add loading/error states for the embedded webview This fixes the "No API key found for provider" error and replaces the buggy custom chat implementation with OpenClaw's battle-tested Control UI.
164 lines
4.2 KiB
TypeScript
164 lines
4.2 KiB
TypeScript
/**
|
|
* OpenClaw Auth Profiles Utility
|
|
* Writes API keys to ~/.openclaw/agents/main/agent/auth-profiles.json
|
|
* so the OpenClaw Gateway can load them for AI provider calls.
|
|
*/
|
|
import { existsSync, mkdirSync, readFileSync, writeFileSync } from 'fs';
|
|
import { join } from 'path';
|
|
import { homedir } from 'os';
|
|
|
|
const AUTH_STORE_VERSION = 1;
|
|
const AUTH_PROFILE_FILENAME = 'auth-profiles.json';
|
|
|
|
/**
|
|
* Auth profile entry for an API key
|
|
*/
|
|
interface AuthProfileEntry {
|
|
type: 'api_key';
|
|
provider: string;
|
|
key: string;
|
|
}
|
|
|
|
/**
|
|
* Auth profiles store format
|
|
*/
|
|
interface AuthProfilesStore {
|
|
version: number;
|
|
profiles: Record<string, AuthProfileEntry>;
|
|
order?: Record<string, string[]>;
|
|
lastGood?: Record<string, string>;
|
|
}
|
|
|
|
/**
|
|
* Provider type to environment variable name mapping
|
|
*/
|
|
const PROVIDER_ENV_VARS: Record<string, string> = {
|
|
anthropic: 'ANTHROPIC_API_KEY',
|
|
openai: 'OPENAI_API_KEY',
|
|
google: 'GEMINI_API_KEY',
|
|
openrouter: 'OPENROUTER_API_KEY',
|
|
groq: 'GROQ_API_KEY',
|
|
deepgram: 'DEEPGRAM_API_KEY',
|
|
cerebras: 'CEREBRAS_API_KEY',
|
|
xai: 'XAI_API_KEY',
|
|
mistral: 'MISTRAL_API_KEY',
|
|
};
|
|
|
|
/**
|
|
* Get the path to the auth-profiles.json for a given agent
|
|
*/
|
|
function getAuthProfilesPath(agentId = 'main'): string {
|
|
return join(homedir(), '.openclaw', 'agents', agentId, 'agent', AUTH_PROFILE_FILENAME);
|
|
}
|
|
|
|
/**
|
|
* Read existing auth profiles store, or create an empty one
|
|
*/
|
|
function readAuthProfiles(agentId = 'main'): AuthProfilesStore {
|
|
const filePath = getAuthProfilesPath(agentId);
|
|
|
|
try {
|
|
if (existsSync(filePath)) {
|
|
const raw = readFileSync(filePath, 'utf-8');
|
|
const data = JSON.parse(raw) as AuthProfilesStore;
|
|
// Validate basic structure
|
|
if (data.version && data.profiles && typeof data.profiles === 'object') {
|
|
return data;
|
|
}
|
|
}
|
|
} catch (error) {
|
|
console.warn('Failed to read auth-profiles.json, creating fresh store:', error);
|
|
}
|
|
|
|
return {
|
|
version: AUTH_STORE_VERSION,
|
|
profiles: {},
|
|
};
|
|
}
|
|
|
|
/**
|
|
* Write auth profiles store to disk
|
|
*/
|
|
function writeAuthProfiles(store: AuthProfilesStore, agentId = 'main'): void {
|
|
const filePath = getAuthProfilesPath(agentId);
|
|
const dir = join(filePath, '..');
|
|
|
|
// Ensure directory exists
|
|
if (!existsSync(dir)) {
|
|
mkdirSync(dir, { recursive: true });
|
|
}
|
|
|
|
writeFileSync(filePath, JSON.stringify(store, null, 2), 'utf-8');
|
|
}
|
|
|
|
/**
|
|
* Save a provider API key to OpenClaw's auth-profiles.json
|
|
* This writes the key in the format OpenClaw expects so the gateway
|
|
* can use it for AI provider calls.
|
|
*
|
|
* @param provider - Provider type (e.g., 'anthropic', 'openrouter', 'openai', 'google')
|
|
* @param apiKey - The API key to store
|
|
* @param agentId - Agent ID (defaults to 'main')
|
|
*/
|
|
export function saveProviderKeyToOpenClaw(
|
|
provider: string,
|
|
apiKey: string,
|
|
agentId = 'main'
|
|
): void {
|
|
const store = readAuthProfiles(agentId);
|
|
|
|
// Profile ID follows OpenClaw convention: <provider>:default
|
|
const profileId = `${provider}:default`;
|
|
|
|
// Upsert the profile entry
|
|
store.profiles[profileId] = {
|
|
type: 'api_key',
|
|
provider,
|
|
key: apiKey,
|
|
};
|
|
|
|
// Update order to include this profile
|
|
if (!store.order) {
|
|
store.order = {};
|
|
}
|
|
if (!store.order[provider]) {
|
|
store.order[provider] = [];
|
|
}
|
|
if (!store.order[provider].includes(profileId)) {
|
|
store.order[provider].push(profileId);
|
|
}
|
|
|
|
// Set as last good
|
|
if (!store.lastGood) {
|
|
store.lastGood = {};
|
|
}
|
|
store.lastGood[provider] = profileId;
|
|
|
|
writeAuthProfiles(store, agentId);
|
|
console.log(`Saved API key for provider "${provider}" to OpenClaw auth-profiles (agent: ${agentId})`);
|
|
}
|
|
|
|
/**
|
|
* Get the environment variable name for a provider type
|
|
*/
|
|
export function getProviderEnvVar(provider: string): string | undefined {
|
|
return PROVIDER_ENV_VARS[provider];
|
|
}
|
|
|
|
/**
|
|
* Build environment variables object with all stored API keys
|
|
* for passing to the Gateway process
|
|
*/
|
|
export function buildProviderEnvVars(providers: Array<{ type: string; apiKey: string }>): Record<string, string> {
|
|
const env: Record<string, string> = {};
|
|
|
|
for (const { type, apiKey } of providers) {
|
|
const envVar = PROVIDER_ENV_VARS[type];
|
|
if (envVar && apiKey) {
|
|
env[envVar] = apiKey;
|
|
}
|
|
}
|
|
|
|
return env;
|
|
}
|