Asosiy tarkibga o'tish

Asboblarni chaqirish (HTTP)

OpenClaw Gateway bitta asbobni to‘g‘ridan-to‘g‘ri chaqirish uchun oddiy HTTP endpoint taqdim etadi. U har doim yoqilgan, biroq Gateway autentifikatsiyasi va asbob siyosati bilan cheklangan.
  • POST /tools/invoke
  • Gateway bilan bir xil port (WS + HTTP multiplex): http://<gateway-host>:<port>/tools/invoke
Standart maksimal payload hajmi 2 MB.

Autentifikatsiya

Gateway autentifikatsiya konfiguratsiyasidan foydalanadi. Bearer token yuboring:
  • Authorization: Bearer <token>
Eslatmalar:
  • gateway.auth.mode="token" bo‘lsa, gateway.auth.token (yoki OPENCLAW_GATEWAY_TOKEN) dan foydalaning.
  • gateway.auth.mode="password" bo‘lsa, gateway.auth.password (yoki OPENCLAW_GATEWAY_PASSWORD) dan foydalaning.
  • Agar gateway.auth.rateLimit sozlangan bo‘lsa va autentifikatsiya xatolari juda ko‘p yuz bersa, endpoint 429 va Retry-After bilan javob qaytaradi.

11. So‘rov tanasi

{
  "tool": "sessions_list",
  "action": "json",
  "args": {},
  "sessionKey": "main",
  "dryRun": false
}
Fields:
  • tool (string, required): tool name to invoke.
  • action (string, optional): mapped into args if the tool schema supports action and the args payload omitted it.
  • args (object, optional): tool-specific arguments.
    1. sessionKey (string, ixtiyoriy): maqsadli sessiya kaliti. If omitted or "main", the Gateway uses the configured main session key (honors session.mainKey and default agent, or global in global scope).
  • dryRun (boolean, optional): reserved for future use; currently ignored.

Policy + routing behavior

  1. Asboblar mavjudligi Gateway agentlari ishlatadigan xuddi shu siyosat zanjiri orqali filtrlanadi:
  • tools.profile / tools.byProvider.profile
  • tools.allow / tools.byProvider.allow
  • agents.<id>.tools.allow / agents.<id>.tools.byProvider.allow
  • group policies (if the session key maps to a group or channel)
  • subagent policy (when invoking with a subagent session key)
If a tool is not allowed by policy, the endpoint returns 404. Gateway HTTP ham standart tarzda qat’iy deny ro‘yxatini qo‘llaydi (hatto session policy ushbu vositaga ruxsat bergan bo‘lsa ham):
  • sessions_spawn
  • sessions_send
  • gateway
  • whatsapp_login
Ushbu deny ro‘yxatini gateway.tools orqali moslashtirishingiz mumkin:
{
  gateway: {
    tools: {
      // HTTP /tools/invoke orqali bloklanadigan qo‘shimcha vositalar
      deny: ["browser"],
      // Standart deny ro‘yxatidan vositalarni olib tashlash
      allow: ["gateway"],
    },
  },
}
To help group policies resolve context, you can optionally set:
  • x-openclaw-message-channel: <channel> (example: slack, telegram)
  • x-openclaw-account-id: <accountId> (when multiple accounts exist)

14. Javoblar

  • 200{ ok: true, result }
  • 400{ ok: false, error: { type, message } } (noto‘g‘ri so‘rov yoki vosita kiritish xatosi)
  • 401 → unauthorized
  • 429 → autentifikatsiya rate-limit’ga uchradi (Retry-After o‘rnatilgan)
  • 404 → tool not available (not found or not allowlisted)
  • 405 → method not allowed
  • 500{ ok: false, error: { type, message } } (kutilmagan vosita bajarilish xatosi; tozalangan xabar)

Example

curl -sS http://127.0.0.1:18789/tools/invoke \
  -H 'Authorization: Bearer YOUR_TOKEN' \
  -H 'Content-Type: application/json' \
  -d '{
    "tool": "sessions_list",
    "action": "json",
    "args": {}
  }'