This is the dedicated checklist for update and plugin validation. The goal is simple: prove the installable package can update real user state, repair stale legacy state throughDocumentation Index
Fetch the complete documentation index at: https://docs.openclaw.ai/llms.txt
Use this file to discover all available pages before exploring further.
doctor, and still install, load, update, and uninstall
plugins from the supported sources.
For the broader test runner map, see Testing. For live provider
keys and network-touching suites, see Testing live.
What we protect
Update and plugin tests protect these contracts:- A package tarball is complete, has a valid
dist/postinstall-inventory.json, and does not depend on unpacked repo files. - A user can move from an older published package to the candidate package without losing config, agents, sessions, workspaces, plugin allowlists, or channel config.
openclaw doctor --fix --non-interactiveowns legacy cleanup and repair paths. Startup should not grow hidden compatibility migrations for stale plugin state.- Plugin installs work from local directories, git repos, npm packages, and the ClawHub registry path.
- Plugin npm dependencies are installed in the managed npm root, scanned before trust, and removed through npm during uninstall so hoisted dependencies do not linger.
- Plugin update is stable when nothing changed: install records, resolved source, installed dependency layout, and enabled state stay intact.
Local proof during development
Start narrow:release:check runs config/docs/API drift checks, writes the package dist
inventory, runs npm pack --dry-run, rejects forbidden packed files, installs
the tarball into a temp prefix, runs postinstall, and smokes bundled channel
entrypoints.
Docker lanes
The Docker lanes are the product-level proof. They install or update a real package inside Linux containers and assert behavior through CLI commands, Gateway startup, HTTP probes, RPC status, and filesystem state. Use focused lanes while iterating:test:docker:pluginsvalidates plugin install smoke, local folder installs, local folder update skip behavior, local folders with preinstalled dependencies,file:package installs, git installs with CLI execution, git moving-ref updates, npm registry installs with hoisted transitive dependencies, npm update no-ops, local ClawHub fixture installs and update no-ops, marketplace update behavior, and Claude-bundle enable/inspect. SetOPENCLAW_PLUGINS_E2E_CLAWHUB=0to keep the ClawHub block hermetic/offline.test:docker:plugin-updatevalidates that an unchanged installed plugin does not reinstall or lose install metadata duringopenclaw plugins update.test:docker:upgrade-survivorinstalls the candidate tarball over a dirty old-user fixture, runs package update plus non-interactive doctor, then starts a loopback Gateway and checks state preservation.test:docker:published-upgrade-survivorfirst installs a published baseline, configures it through a bakedopenclaw config setrecipe, updates it to the candidate tarball, runs doctor, checks legacy cleanup, starts the Gateway, and probes/healthz,/readyz, and RPC status.test:docker:update-migrationis the cleanup-heavy published-update lane. It starts from a configured Discord/Telegram-style user state, runs baseline doctor so configured plugin dependencies have a chance to materialize, seeds legacy plugin dependency debris for a configured packaged plugin, updates to the candidate tarball, and requires post-update doctor to remove the legacy dependency roots.
base, feishu-channel, bootstrap-persona,
plugin-deps-cleanup, tilde-log-path, and versioned-runtime-deps. In aggregate runs,
OPENCLAW_UPGRADE_SURVIVOR_SCENARIOS=reported-issues expands to all reported
issue-shaped scenarios.
Full update migration is intentionally separate from Full Release CI. Use the
manual Update Migration workflow when the release question is “can every
published stable release from 2026.4.23 onward update to this candidate and
clean up plugin dependency debris?”:
Package Acceptance
Package Acceptance is the GitHub-native package gate. It resolves one candidate package into apackage-under-test tarball, records version and SHA-256, then
runs reusable Docker E2E lanes against that exact tarball. The workflow harness
ref is separate from the package source ref, so current test logic can validate
older trusted releases.
Candidate sources:
source=npm: validateopenclaw@beta,openclaw@latest, or an exact published version.source=ref: pack a trusted branch, tag, or commit with the selected current harness.source=url: validate an HTTPS tarball with requiredpackage_sha256.source=artifact: reuse a tarball uploaded by another Actions run.
release-history is a bounded release-check sample: latest six stable releases,
2026.4.23, and one older pre-date anchor. For exhaustive published update
migration coverage, use all-since-2026.4.23 in the separate Update Migration
workflow instead of Full Release CI.
Run a package profile manually when validating a candidate before release:
suite_profile=product when the release question includes MCP channels,
cron/subagent cleanup, OpenAI web search, or OpenWebUI. Use suite_profile=full
only when you need full Docker release-path coverage.
Release default
For release candidates, the default proof stack is:pnpm check:changedandpnpm test:changedfor source-level regressions.pnpm release:checkfor package artifact integrity.- Package Acceptance
packageprofile or the release-check custom package lanes for install/update/plugin contracts. - Cross-OS release checks for OS-specific installer, onboarding, and platform behavior.
- Live suites only when the changed surface touches provider or hosted-service behavior.
Legacy compatibility
Compatibility leniency is narrow and time boxed:- Packages through
2026.4.25, including2026.4.25-beta.*, may tolerate already-shipped package metadata gaps in Package Acceptance. - The published
2026.4.26package may warn for local build metadata stamp files already shipped. - Later packages must satisfy modern contracts. The same gaps fail instead of warning or skipping.
upgrade-survivor or published-upgrade-survivor.
Adding coverage
When changing update or plugin behavior, add coverage at the lowest layer that can fail for the right reason:- Pure path or metadata logic: unit test beside the source.
- Package inventory or packed-file behavior:
package-dist-inventoryor tarball checker test. - CLI install/update behavior: Docker lane assertion or fixture.
- Published-release migration behavior:
published-upgrade-survivorscenario. - Registry/package source behavior:
test:docker:pluginsfixture or ClawHub fixture server. - Dependency layout or cleanup behavior: assert both runtime execution and the
filesystem boundary. npm dependencies may be hoisted under the managed npm
root, so tests should prove the root is scanned/cleaned instead of assuming a
package-local
node_modulestree.
Failure triage
Start with the artifact identity:- Package Acceptance
resolve_packagesummary: source, version, SHA-256, and artifact name. - Docker artifacts:
.artifacts/docker-tests/**/summary.json,failures.json, lane logs, and rerun commands. - Upgrade survivor summary:
.artifacts/upgrade-survivor/summary.json, including baseline version, candidate version, scenario, phase timings, and recipe steps.