OpenClaw Enhancements: Critical OpenAI Codex Fix and Upgrade Stability
The OpenClaw project continues its iterative development, with recent merges focusing on both critical bug fixes and foundational stability. This digest covers key pull requests integrated into the main branch, shedding light on improvements to external integrations and the project's testing infrastructure. These updates are vital for ensuring a reliable and robust experience for developers and users leveraging OpenClaw's capabilities.
Merged PRs
During the recent 6-hour window, two significant pull requests were merged into the openclaw/openclaw repository:
Key Changes
The merged PRs reflect a dual focus: enhancing the reliability of external integrations and strengthening the project's internal testing mechanisms.
PR #75199, titled "test: add upgrade survivor package lane," introduces a new testing lane specifically designed to ensure that the project's packages remain functional and compatible across future upgrades. This is a proactive step towards maintaining long-term stability and reducing potential regressions during dependency updates or major version bumps. While not directly user-facing, such infrastructure improvements are crucial for the health and maintainability of the OpenClaw platform.
The more immediately impactful change comes from PR #75111, "[codex] fix OpenAI Codex OAuth transport." This pull request addresses a critical issue affecting the OpenAI Codex integration. Previously, a change in the openai-codex traffic routing through createOpenAIResponsesTransportStreamFn() inadvertently bypassed the existing authentication injection wrapper in the embedded runner path. This led to 401 Unauthorized status codes because the OAuth bearer token was not being passed into Codex Responses requests.
The fix implemented in this PR is comprehensive:
- It ensures that a native Codex transport is only created in the attribution wrapper when no wrapped stream has already been provided, thus preserving existing auth-injection streams.
- Already-wrapped Codex streams are kept intact, allowing runtime OAuth injection to correctly reach the transport layer.
- Unsupported request fields are now stripped specifically for the native ChatGPT Codex backend, preventing issues with its
client.responses.createmethod, while preserving caller controls likemax_output_tokens,temperature, and metadata for custom or proxy Codex-compatible endpoints. - Crucially,
accountIdandchatgptPlanTypeare now carried through Codex OAuth login and refresh profile storage, maintaining user account context.
Impact
These merged pull requests have a direct and positive impact on the OpenClaw ecosystem.
For developers and maintainers, the addition of an "upgrade survivor package lane" (PR #75199) signifies a commitment to robust testing and future-proofing. This helps prevent unexpected breakage when dependencies are updated, contributing to a more stable development environment and reducing the effort required for future maintenance tasks.
The fix for the OpenAI Codex OAuth transport (PR #75111) directly addresses a significant pain point for users relying on the OpenAI Codex extension. Users who previously encountered 401 Unauthorized errors due to authentication failures will now experience reliable access to OpenAI Codex services. The careful handling of request payloads also ensures compatibility with both native ChatGPT Codex backends and custom, proxy-compatible endpoints, offering flexibility without sacrificing functionality. Furthermore, the persistence of account metadata like accountId and chatgptPlanType means a smoother, more consistent user experience, as refreshed profiles will retain essential account and plan context. This enhancement is vital for users who integrate OpenAI Codex into their workflows, ensuring uninterrupted and correctly attributed interactions.