Integrated Openclaw, ZeroClaw and PicoClaw as 24/7 agents in our serverless engine with persistence #119
Conversation
|
Caution Review failedThe pull request is closed. ℹ️ Recent review info⚙️ Run configurationConfiguration used: defaults Review profile: CHILL Plan: Pro Run ID: ⛔ Files ignored due to path filters (5)
📒 Files selected for processing (30)
📝 WalkthroughWalkthroughThis PR introduces OpenClaw, PicoClaw, and ZeroClaw service frameworks by adding enum definitions, executor mappings, and validation logic. It implements a comprehensive template system enabling CLI deployment of these services with template resolution, agent registration, persistent storage, and specialized credential output. Changes
Sequence Diagram(s)sequenceDiagram
actor User as User/CLI
participant CLI as CLI (deploy)
participant Resolver as Template Resolver
participant DB as Database
participant SDK as SDK Client
participant Server as Server/Executor
participant Output as Post-Deploy Output
User->>CLI: runagent deploy openclaw/gateway
CLI->>Resolver: _resolve_template_path("openclaw/gateway")
Resolver-->>CLI: (resolved_path, downloaded_temp_dir)
CLI->>DB: Query existing agent by template name
alt Agent exists
CLI->>User: Prompt to proceed
else No match
CLI->>CLI: Continue deployment
end
CLI->>CLI: Load runagent.config.json
alt No agent_id or null UUID
CLI->>CLI: Generate new agent_id
CLI->>CLI: Update config with new_id
end
CLI->>SDK: deploy_remote(path, agent_config)
SDK->>Server: start_agent(agent_id, metadata)
Server-->>SDK: network_info, deployment_details
SDK-->>CLI: deployment_result with network_info
alt Deployed service is OpenClaw Gateway
CLI->>Server: Poll agent status
Server-->>CLI: gateway_url, gateway_token, pairing_status
CLI->>Output: Print gateway credentials & MCP setup guidance
end
CLI->>Output: Print deployment summary
Output-->>User: Success with endpoint info
Note over CLI: Cleanup: delete temp_dir if downloaded
Estimated code review effort🎯 4 (Complex) | ⏱️ ~45 minutes Possibly related PRs
Poem
✨ Finishing Touches📝 Generate docstrings
🧪 Generate unit tests (beta)
📝 Coding Plan
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment Tip CodeRabbit can use Trivy to scan for security misconfigurations and secrets in Infrastructure as Code files.Add a .trivyignore file to your project to customize which findings Trivy reports. |
Summary by CodeRabbit
Release Notes
New Features
runagent deploy openclaw/gateway.Documentation