feat(kiloclaw): bump openclaw to version 2026.3.2#762
Open
kilo-code-bot[bot] wants to merge 1 commit intomainfrom
Open
feat(kiloclaw): bump openclaw to version 2026.3.2#762kilo-code-bot[bot] wants to merge 1 commit intomainfrom
kilo-code-bot[bot] wants to merge 1 commit intomainfrom
Conversation
Contributor
Author
Code Review SummaryStatus: No Issues Found | Recommendation: Merge Straightforward version bump of Files Reviewed (1 file)
|
olearycrew
approved these changes
Mar 3, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Bumps openclaw from
2026.2.26to2026.3.2inkiloclaw/Dockerfile.The following BREAKING changes in this release may affect our deployment:
tools.profiledefaults tomessagingfor new installs — New local installs now default tomessagingprofile instead of broad coding/system tools. If our deployment relies on the default tool profile for coding/system access, this may need explicit configuration.ACP dispatch now defaults to enabled —
acp.dispatch.enabledis nowtrueby default. If we need to pause ACP turn routing, we must explicitly setacp.dispatch.enabled=false. This could affect agent routing behavior if ACP was previously off by default.Plugin SDK removed
api.registerHttpHandler(...)— Plugins must now useapi.registerHttpRoute(...)orregisterPluginHttpRoute(...). If any of our custom plugins use the old API, they will break.Zalo Personal plugin (
@openclaw/zalouser) no longer depends on external CLI binaries — If we use the Zalo Personal plugin, operators must runopenclaw channels login --channel zalouserafter upgrade to refresh sessions in the new JS-native path.Release Notes
Changes
openclaw secretsplanning/apply/audit flows, onboarding SecretInput UX, and related docs; unresolved refs now fail fast on active surfaces while inactive surfaces report non-blocking diagnostics. (#29580) Thanks @joshavant.pdftool with native Anthropic and Google PDF provider support, extraction fallback for non-native models, configurable defaults (agents.defaults.pdfModel,pdfMaxBytesMb,pdfMaxPages), and docs/tests covering routing, validation, and registration. (#31319) Thanks @tyler6204.sendPayloadsupport across direct-text-media, Discord, Slack, WhatsApp, Zalo, and Zalouser with multi-media iteration and chunk-aware text fallback. (#30144) Thanks @nohat.MiniMax-M2.5-highspeedsupport across built-in provider catalogs, onboarding flows, and MiniMax OAuth plugin defaults, while keeping legacyMiniMax-M2.5-Lightningcompatibility for existing configs.sessions_spawn(subagent runtime only) with base64/utf8 encoding, transcript content redaction, lifecycle cleanup, and configurable limits viatools.sessions_spawn.attachments. (#16761) Thanks @napetrov.channels.telegram.streamingtopartial(fromoff) so new Telegram setups get live preview streaming out of the box, with runtime fallback to message-edit preview when native drafts are unavailable.sendMessageDraftfor private preview streaming, keep reasoning/answer preview lanes separated in DM reasoning-stream mode. (#31824) Thanks @obviyus.disableAudioPreflighton group/topic config to skip mention-detection preflight transcription for inbound voice notes where operators want text-only mention checks. (#23067) Thanks @yangnim21029.openclaw config validate(with--json) to validate config files before gateway startup, and include detailed invalid-key paths in startup invalid-config errors. (#31220) thanks @Sid-Qin.fileQuality,fileScale,fileMaxWidth) for generated diff artifacts, and document PDF as the preferred option when messaging channels compress images. (#31342) Thanks @gumadeiras.memorySearch.provider = "ollama"andmemorySearch.fallback = "ollama"support, honormodels.providers.ollamasettings for memory embedding requests, and document Ollama embedding usage. (#26349) Thanks @nico-hoff.@openclaw/zalouser): rebuilt channel runtime to use nativezca-jsintegration in-process, removing external CLI transport usage and keeping QR/login + send/listen flows fully inside OpenClaw.channelRuntimeonChannelGatewayContextso external channel plugins can access shared runtime helpers (reply/routing/session/text/media/commands) without internal imports. (#25462) Thanks @guxiaobo.api.runtime.stt.transcribeAudioFile(...)so extensions can transcribe local audio files through OpenClaw's configured media-understanding audio providers. (#22402) Thanks @benthecarman.sessionKeyinsession_start/session_endhook events and contexts so plugins can correlate lifecycle callbacks with routing identity. (#26394) Thanks @tempeste.message:transcribedandmessage:preprocessed, plus richer outboundmessage:sentcontext (isGroup,groupId) for group-conversation correlation and post-transcription automations. (#9859) Thanks @Drickon.tools.media.audio.echoTranscript+echoFormatto send a pre-agent transcript confirmation message to the originating chat, with echo disabled by default. (#32150) Thanks @AytuncYildizli.runtime.system.requestHeartbeatNow(...)so extensions can wake targeted sessions immediately after enqueueing system events. (#19464) Thanks @AustinEral.runtime.events.onAgentEventandruntime.events.onSessionTranscriptUpdatefor extension-side subscriptions, and isolate transcript-listener failures so one faulty listener cannot break the entire update fanout. (#16044) Thanks @scifantastic.cli.banner.taglineMode(random|default|off) to control funny tagline behavior in startup output, with docs + FAQ guidance and regression tests for config override behavior.Breaking
tools.profiletomessagingfor new local installs (interactive + non-interactive). New setups no longer start with broad coding/system tools unless explicitly configured.acp.dispatch.enabled=false). If you need to pause ACP turn routing while keeping/acpcontrols, setacp.dispatch.enabled=false. Docs: https://docs.openclaw.ai/tools/acp-agentsapi.registerHttpHandler(...). Plugins must register explicit HTTP routes viaapi.registerHttpRoute({ path, auth, match, handler }), and dynamic webhook lifecycles should useregisterPluginHttpRoute(...).@openclaw/zalouser) no longer depends on externalzca-compatible CLI binaries (openzca,zca-cli) for runtime send/listen/login; operators should useopenclaw channels login --channel zalouserafter upgrade to refresh sessions in the new JS-native path.Fixes
gateway-clientbackend self-connections to skip device pairing while still requiring pairing for non-local/direct-host paths, restoringsessions_spawnwithgateway.tls.enabled=truein Docker/LAN setups. Fixes #30740. Thanks @Sid-Qin and @vincentkoc.sessions_spawnwithruntime="acp"by rejecting ACP spawns from sandboxed requester sessions and rejectingsandbox="require"for ACP runtime, preventing sandbox-boundary bypass via host-side ACP initialization. (#32254) Thanks @tdjackey for reporting, and @dutifulbob for the fix.web_fetchand citation-redirect URL checks when proxy env vars are set, and require explicit dangerous opt-in before env-proxy routing can bypass pinned dispatch for trusted/operator-controlled endpoints. Thanks @tdjackey for reporting.gateway.controlUi.dangerouslyAllowHostHeaderOriginFallbackaccepts websocket origins, harden safe-regex detection for quantified ambiguous alternation patterns, and bound large regex-evaluation inputs for session-filter and log-redaction paths./api/channels/*variants to prevent alternate-path auth bypass through plugin handlers. Thanks @tdjackey for reporting.[System Message]and line-leadingSystem:in untrusted message content. (#30448)HEALTHCHECKthat probes gatewayGET /healthzso container runtimes can mark unhealthy instances without requiring auth credentials in the probe command. (#11478) Thanks @U-C4N and @vincentkoc./workspacebind mounts read-only wheneverworkspaceAccessis notrw(includingnone) across both core sandbox container and sandbox browser create flows. (#32227) Thanks @guanyu-zhang.OPENCLAW_SANDBOXopt-in parsing explicit (1|true|yes|on), support custom Docker socket paths viaOPENCLAW_DOCKER_SOCKET, defer docker.sock exposure until sandbox prerequisites pass, and reset/roll back persisted sandbox mode tooffwhen setup is skipped or partially fails to avoid stale broken sandbox state. (#29974) Thanks @jamtujest and @vincentkoc.