Injecting secure api keys in openshell #1841
Replies: 3 comments
-
|
Hi @ddeaguilar — great question! Yes, the How it works under the hood: placeholders like To use it with your own API key:
Hope that helps — let us know if you run into anything! |
Beta Was this translation helpful? Give feedback.
-
|
Thanks, it is working! I followed the commands for creating the provider and I could see a new provider when listing the available ones. However later it wasn't being picked up by my environment, for example the openshell term command shows the providers in a section and my new provider did not appear. I managed to consistently make it work by first doing the nemoclaw installation and then deleting and recreating its sandbox. This way I can launch the openshell command with my custom providers. As for the output of the providers section inside of |
Beta Was this translation helpful? Give feedback.
-
|
That's great information. Now, is there a way for me to ask for the credentials when doing the onboarding process? Something like: Enter the URL endpoint; user id; password, so then the credentials stays stored and being used by the services across the board? I'm not talking about OAuth or anything, just basic auth on a simple REST call. Then we can get fancy, but for now, would be awesome having this simple steps... Anything on that? |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi. I saw that when following the Telegram onboarding the bot token is replaced inside of the sandbox environment with
openshell:resolve:env:TELEGRAM_BOT_TOKEN. This way OpenClaw won't ever see the credentials and when making egress requests that string will be replaced with the real value, known by the openshell environment.I was wondering if I can achieve the same behavior for generic api keys/tokens?
Beta Was this translation helpful? Give feedback.
All reactions