diff --git a/CHANGELOG.md b/CHANGELOG.md index cbe93dae883..d12bcba91af 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -40,6 +40,7 @@ Docs: https://docs.openclaw.ai - Security/Prompt spoofing hardening: stop injecting queued runtime events into user-role prompt text, route them through trusted system-prompt context, and neutralize inbound spoof markers like `[System Message]` and line-leading `System:` in untrusted message content. (#30448) - Gateway/Node browser proxy routing: honor `profile` from `browser.request` JSON body when query params omit it, while preserving query-profile precedence when both are present. (#28852) Thanks @Sid-Qin. +- Browser/Extension relay reconnect tolerance: keep `/json/version` and `/cdp` reachable during short MV3 worker disconnects when attached targets still exist, and retain clients across reconnect grace windows. (#30232) Thanks @Sid-Qin. - Browser/Remote CDP ownership checks: skip local-process ownership errors for non-loopback remote CDP profiles when HTTP is reachable but the websocket handshake fails, and surface the remote websocket attach/retry path instead. (#15582) Landed from contributor (#28780) Thanks @stubbi, @bsormagec, @unblockedgamesstudio and @vincentkoc. - Docker/Image health checks: add Dockerfile `HEALTHCHECK` that probes gateway `GET /healthz` so container runtimes can mark unhealthy instances without requiring auth credentials in the probe command. (#11478) Thanks @U-C4N and @vincentkoc. - Daemon/systemd checks in containers: treat missing `systemctl` invocations (including `spawn systemctl ENOENT`/`EACCES`) as unavailable service state during `is-enabled` checks, preventing container flows from failing with `Gateway service check failed` before install/status handling can continue. (#26089) Thanks @sahilsatralkar and @vincentkoc. diff --git a/src/browser/extension-relay.test.ts b/src/browser/extension-relay.test.ts index 6a65e592c22..2964ceadf98 100644 --- a/src/browser/extension-relay.test.ts +++ b/src/browser/extension-relay.test.ts @@ -501,6 +501,46 @@ describe("chrome extension relay server", () => { await waitForClose(cdp, 2_000); }); + it("stops advertising websocket endpoint after reconnect grace expires", async () => { + process.env.OPENCLAW_EXTENSION_RELAY_RECONNECT_GRACE_MS = "120"; + + const { ext } = await startRelayWithExtension(); + ext.send( + JSON.stringify({ + method: "forwardCDPEvent", + params: { + method: "Target.attachedToTarget", + params: { + sessionId: "cb-tab-grace-expire", + targetInfo: { + targetId: "t-grace-expire", + type: "page", + title: "Grace expire", + url: "https://example.com", + }, + waitingForDebugger: false, + }, + }, + }), + ); + + await waitForListMatch( + async () => + (await fetch(`${cdpUrl}/json/list`, { + headers: relayAuthHeaders(cdpUrl), + }).then((r) => r.json())) as Array<{ id?: string }>, + (list) => list.some((entry) => entry.id === "t-grace-expire"), + ); + + ext.close(); + await new Promise((r) => setTimeout(r, 250)); + + const version = (await fetch(`${cdpUrl}/json/version`, { + headers: relayAuthHeaders(cdpUrl), + }).then((r) => r.json())) as { webSocketDebuggerUrl?: string }; + expect(version.webSocketDebuggerUrl).toBeUndefined(); + }); + it("accepts extension websocket access with relay token query param", async () => { const port = await getFreePort(); cdpUrl = `http://127.0.0.1:${port}`;