docs/gateway/secrets-plan-contract.md
This page defines the strict contract enforced by openclaw secrets apply.
If a target does not match these rules, apply fails before mutating configuration.
openclaw secrets apply --from <plan.json> expects a targets array of plan targets:
{
version: 1,
protocolVersion: 1,
targets: [
{
type: "models.providers.apiKey",
path: "models.providers.openai.apiKey",
pathSegments: ["models", "providers", "openai", "apiKey"],
providerId: "openai",
ref: { source: "env", provider: "default", id: "OPENAI_API_KEY" },
},
{
type: "auth-profiles.api_key.key",
path: "profiles.openai:default.key",
pathSegments: ["profiles", "openai:default", "key"],
agentId: "main",
ref: { source: "env", provider: "default", id: "OPENAI_API_KEY" },
},
],
}
Plan targets are accepted for supported credential paths in:
General rule:
target.type must be recognized and must match the normalized target.path shape.Compatibility aliases remain accepted for existing plans:
models.providers.apiKeyskills.entries.apiKeychannels.googlechat.serviceAccountEach target is validated with all of the following:
type must be a recognized target type.path must be a non-empty dot path.pathSegments can be omitted. If provided, it must normalize to exactly the same path as path.__proto__, prototype, constructor.providerId or accountId is set, it must match the id encoded in the path.auth-profiles.json targets require agentId.auth-profiles.json mapping, include authProfileProvider.If a target fails validation, apply exits with an error like:
Invalid plan target path for models.providers.apiKey: models.providers.openai.baseUrl
No writes are committed for an invalid plan.
--dry-run skips exec SecretRef checks by default.--allow-exec is set.--allow-exec in both dry-run and write commands.auth-profiles.json entries (keyRef/tokenRef) are included in runtime resolution and audit coverage.secrets apply writes supported openclaw.json targets, supported auth-profiles.json targets, and optional scrub targets.# Validate plan without writes
openclaw secrets apply --from /tmp/openclaw-secrets-plan.json --dry-run
# Then apply for real
openclaw secrets apply --from /tmp/openclaw-secrets-plan.json
# For exec-containing plans, opt in explicitly in both modes
openclaw secrets apply --from /tmp/openclaw-secrets-plan.json --dry-run --allow-exec
openclaw secrets apply --from /tmp/openclaw-secrets-plan.json --allow-exec
If apply fails with an invalid target path message, regenerate the plan with openclaw secrets configure or fix the target path to a supported shape above.