This page defines the strict contract enforced byDocumentation Index
Fetch the complete documentation index at: https://docs2.openclaw.ai/llms.txt
Use this file to discover all available pages before exploring further.
openclaw secrets apply.
If a target does not match these rules, apply fails before mutating configuration.
Plan file shape
openclaw secrets apply --from <plan.json> expects a targets array of plan targets:
Provider upserts and deletes
Plans may also include two optional top-level fields that mutate thesecrets.providers map alongside the per-target writes:
providerUpserts— an object keyed by provider alias. Each value is a provider definition (the same shape accepted undersecrets.providers.<alias>inopenclaw.json, e.g. anexecorfileprovider).providerDeletes— an array of provider aliases to remove.
providerUpserts runs before targets, so a target.ref.provider may
reference a provider alias that the same plan introduces in
providerUpserts. Without this, plans that reference an alias not yet
configured in openclaw.json fail with provider "<alias>" is not configured.
providerUpserts are still subject to the
exec consent rules in Exec provider consent behavior:
plans containing exec providers require --allow-exec in write mode.
Supported target scope
Plan targets are accepted for supported credential paths in:Target type behavior
General rule:target.typemust be recognized and must match the normalizedtarget.pathshape.
models.providers.apiKeyskills.entries.apiKeychannels.googlechat.serviceAccount
Path validation rules
Each target is validated with all of the following:typemust be a recognized target type.pathmust be a non-empty dot path.pathSegmentscan be omitted. If provided, it must normalize to exactly the same path aspath.- Forbidden segments are rejected:
__proto__,prototype,constructor. - The normalized path must match the registered path shape for the target type.
- If
providerIdoraccountIdis set, it must match the id encoded in the path. auth-profiles.jsontargets requireagentId.- When creating a new
auth-profiles.jsonmapping, includeauthProfileProvider.
Failure behavior
If a target fails validation, apply exits with an error like:Exec provider consent behavior
--dry-runskips exec SecretRef checks by default.- Plans containing exec SecretRefs/providers are rejected in write mode unless
--allow-execis set. - When validating/applying exec-containing plans, pass
--allow-execin both dry-run and write commands.
Runtime and audit scope notes
- Ref-only
auth-profiles.jsonentries (keyRef/tokenRef) are included in runtime resolution and audit coverage. secrets applywrites supportedopenclaw.jsontargets, supportedauth-profiles.jsontargets, and optional scrub targets.
Operator checks
openclaw secrets configure or fix the target path to a supported shape above.