🧪 Skills
ClawShow-Gateway-Connect
Install and activate @bowong/clawshow-gateway in OpenClaw, then migrate existing Gateway channel configuration to ClawShow with rollback safety. Use when a u...
v1.0.3
Description
name: clawshow-gateway-connect description: Install and activate @bowong/clawshow-gateway in OpenClaw, then migrate existing Gateway channel configuration to ClawShow with rollback safety. Use when a user wants one-step plugin install plus config migration without repeating requirements each run, applying changes via Config RPC config.apply full replace with minimal file access and no default outbound test traffic. metadata: openclaw: primaryEnv: CLAWSHOW_AUTH_TOKEN requires: bins: - openclaw
Clawshow Gateway Connect
Execute a safe, minimal install-and-migrate flow from current OpenClaw settings to ClawShowGateway without breaking unrelated configuration.
Runtime Inputs
- Required:
authToken - Optional:
relayUrl(defaultwss://clawshow-api.bowong.cc) - If
authTokenis missing, ask once and stop before editing.
Workflow
- Identify current config source
- Search only OpenClaw gateway config files (
*.json,*.yaml,*.yml) in the active project path. - Do not read
.env, secrets files, deployment manifests, or unrelated workspace files. - Prefer editing the project-tracked config over user-global config when both exist.
- If multiple candidate files exist, pick the file currently used by the running Gateway process.
- Create rollback copy before edits
- Save a sibling backup copy of the target config file with timestamp suffix (for example
.bak.20260313-1405). - Never delete the backup in the same task.
- Install plugin/package
- Install using OpenClaw plugin manager only:
openclaw plugins install @bowong/clawshow-gateway
- Verify installation:
openclaw plugins list
- Confirm package id is exactly
@bowong/clawshow-gateway. - If already installed, do not reinstall unless version repair is needed.
- Migrate channel config to ClawShow
- Ensure package id references
@bowong/clawshow-gatewaywhere plugin/package declarations are required. - Ensure channel section exists under
channels.clawshow. - Set:
channels.clawshow.enabled: true(required)channels.clawshow.relayUrl: "wss://clawshow-api.bowong.cc"(optional)channels.clawshow.authToken: "<real token>"(required)channels.clawshow.name: "ClawShow Gateway"(required)channels.clawshow.dmPolicy: "open"(required)channels.clawshow.allowFrom: ["*"](required)
- Preserve unrelated channels, plugins, and runtime options unchanged.
- Remove conflicting legacy routing only when necessary
- If older channel config routes the same outbound traffic target, disable only the overlapping route.
- Do not remove entire legacy channel blocks unless user explicitly asks.
- Validate config shape
- Confirm JSON/YAML syntax after edit.
- Confirm required keys exist for ClawShow (
authTokenat minimum). - Confirm package/plugin id and channel id are consistent (
clawshow). - Confirm
enabled,relayUrl,authToken,name,dmPolicy, andallowFromare directly underchannels.clawshow(nodefaultlayer).
- Apply config (Config RPC only)
- Follow
Config RPC (programmatic updates)exactly, usingconfig.apply (full replace). - Do not use direct file-edit-only activation,
config.patch, or manual restart as the primary path. - Execute:
openclaw gateway call config.get --params '{}'- Capture
payload.hashasbaseHash. - Build the full post-migration config as one JSON5 string in
raw. openclaw gateway call config.apply --params '{ "raw": "<full-json5-config>", "baseHash": "<hash>", "note": "migrate to @bowong/clawshow-gateway" }'
- Respect control-plane rate limits for write RPCs (
config.apply,config.patch,update.run): 3 requests per 60 seconds perdeviceId+clientIp. - If apply fails due to stale hash/conflict, call
config.getagain, rebase on newest config, and retry once.
- Verify runtime behavior
- Do not force a manual restart here;
config.applyalready validates, writes, and restarts in one step. - Run status/probe command if available.
- Do not send outbound test messages by default.
- Only send an external test message if the user explicitly asks for network verification.
- Report outcome
- Include the backup file path.
- Include verification command results.
- If verification is blocked, state the blocker and provide the exact next command.
Canonical Target Snippet
Use this structure when writing or repairing JSON config:
{
"channels": {
"clawshow": {
"enabled": true,
"relayUrl": "wss://clawshow-api.bowong.cc",
"authToken": "YOUR_CLAWSHOW_AUTH_TOKEN",
"name": "ClawShow Gateway",
"dmPolicy": "open",
"allowFrom": [
"*"
]
}
}
}
Guardrails
- Keep edits minimal and reversible.
- Never invent secrets; leave placeholders for missing keys.
- Never exfiltrate secrets from local files.
- Never rewrite formatting style of the whole file.
- Never remove unrelated keys to "clean up".
Reviews (0)
Sign in to write a review.
No reviews yet. Be the first to review!
Comments (0)
No comments yet. Be the first to share your thoughts!