v0.5.54
Changed
- Added startup guidance when
gateway_auth_mode=trusted-proxyis enabled to clarify why direct local CLI gateway calls can showtrusted_proxy_user_missing/unauthorized. - Bump OpenClaw to 2026.2.24.
Added
- New add-on option
gateway_additional_allowed_originsfor extra Control UI origins inlan_httpsmode. - Custom SANs in TLS certificate (
lan_httpsmode): hostnames and IPs fromgateway_additional_allowed_originsandgateway_public_urlare now included in the server certificate's Subject Alternative Name. The certificate auto-regenerates when SANs change.
Fixed
- Gateway token on landing page: read token directly from
openclaw.jsoninstead of viaopenclaw config getwhich redacts secrets since OpenClaw v2026.2.22+ (fixes "Open Gateway Web UI" button sendingopenclaw_redactedas the token). - Token retrieval instructions: all "get your token" references in the landing page and DOCS now use
jq -r '.gateway.auth.token' /config/.openclaw/openclaw.jsonwith a note explaining why the oldopenclaw config getcommand no longer works. lan_httpsstartup no longer overwritesgateway.controlUi.allowedOriginswith defaults only.- Control UI origins are now merged as: built-in defaults + existing config values +
gateway_additional_allowed_origins(deduplicated). - In
lan_reverse_proxyand other non-lan_httpssetups, Control UI origins now also include the origin derived fromgateway_public_url. gateway.controlUi.allowedOriginsconfiguration is now consistently applied via merge logic (defaults + existing values + user extras), reducing manualopenclaw.jsonedits after upgrades.- Add-on no longer exits/restarts when OpenClaw runtime process is restarted during onboarding or config changes.
run.shnow supervises the OpenClaw runtime (openclaw gateway run/openclaw node run) and auto-restarts it while keeping nginx + terminal alive.
Full Changelog: v0.5.53...v0.5.54