mirror of
https://github.com/openclaw/openclaw.git
synced 2026-03-28 20:16:28 +01:00
* Remove Qwen OAuth integration (qwen-portal-auth) Qwen OAuth via portal.qwen.ai is being deprecated by the Qwen team due to traffic impact on their primary Qwen Code user base. Users should migrate to the officially supported Model Studio (Alibaba Cloud Coding Plan) provider instead. Ref: https://github.com/openclaw/openclaw/issues/49557 - Delete extensions/qwen-portal-auth/ plugin entirely - Remove qwen-portal from onboarding auth choices, provider aliases, auto-enable list, bundled plugin defaults, and pricing cache - Remove Qwen CLI credential sync (external-cli-sync, cli-credentials) - Remove QWEN_OAUTH_MARKER from model auth markers - Update docs/providers/qwen.md to redirect to Model Studio - Update model-providers docs (EN + zh-CN) to remove Qwen OAuth section - Regenerate config and plugin-sdk baselines - Update all affected tests Co-authored-by: Qwen-Coder <qwen-coder@alibabacloud.com> * Clean up residual qwen-portal references after OAuth removal * Add migration hint for deprecated qwen-portal OAuth provider * fix: finish qwen oauth removal follow-up --------- Co-authored-by: Qwen-Coder <qwen-coder@alibabacloud.com> Co-authored-by: Frank Yang <frank.ekn@gmail.com>
82 lines
3.0 KiB
Markdown
82 lines
3.0 KiB
Markdown
---
|
||
summary: "CLI reference for `openclaw models` (status/list/set/scan, aliases, fallbacks, auth)"
|
||
read_when:
|
||
- You want to change default models or view provider auth status
|
||
- You want to scan available models/providers and debug auth profiles
|
||
title: "models"
|
||
---
|
||
|
||
# `openclaw models`
|
||
|
||
Model discovery, scanning, and configuration (default model, fallbacks, auth profiles).
|
||
|
||
Related:
|
||
|
||
- Providers + models: [Models](/providers/models)
|
||
- Provider auth setup: [Getting started](/start/getting-started)
|
||
|
||
## Common commands
|
||
|
||
```bash
|
||
openclaw models status
|
||
openclaw models list
|
||
openclaw models set <model-or-alias>
|
||
openclaw models scan
|
||
```
|
||
|
||
`openclaw models status` shows the resolved default/fallbacks plus an auth overview.
|
||
When provider usage snapshots are available, the OAuth/token status section includes
|
||
provider usage headers.
|
||
Add `--probe` to run live auth probes against each configured provider profile.
|
||
Probes are real requests (may consume tokens and trigger rate limits).
|
||
Use `--agent <id>` to inspect a configured agent’s model/auth state. When omitted,
|
||
the command uses `OPENCLAW_AGENT_DIR`/`PI_CODING_AGENT_DIR` if set, otherwise the
|
||
configured default agent.
|
||
|
||
Notes:
|
||
|
||
- `models set <model-or-alias>` accepts `provider/model` or an alias.
|
||
- Model refs are parsed by splitting on the **first** `/`. If the model ID includes `/` (OpenRouter-style), include the provider prefix (example: `openrouter/moonshotai/kimi-k2`).
|
||
- If you omit the provider, OpenClaw treats the input as an alias or a model for the **default provider** (only works when there is no `/` in the model ID).
|
||
- `models status` may show `marker(<value>)` in auth output for non-secret placeholders (for example `OPENAI_API_KEY`, `secretref-managed`, `minimax-oauth`, `oauth:chutes`, `ollama-local`) instead of masking them as secrets.
|
||
|
||
### `models status`
|
||
|
||
Options:
|
||
|
||
- `--json`
|
||
- `--plain`
|
||
- `--check` (exit 1=expired/missing, 2=expiring)
|
||
- `--probe` (live probe of configured auth profiles)
|
||
- `--probe-provider <name>` (probe one provider)
|
||
- `--probe-profile <id>` (repeat or comma-separated profile ids)
|
||
- `--probe-timeout <ms>`
|
||
- `--probe-concurrency <n>`
|
||
- `--probe-max-tokens <n>`
|
||
- `--agent <id>` (configured agent id; overrides `OPENCLAW_AGENT_DIR`/`PI_CODING_AGENT_DIR`)
|
||
|
||
## Aliases + fallbacks
|
||
|
||
```bash
|
||
openclaw models aliases list
|
||
openclaw models fallbacks list
|
||
```
|
||
|
||
## Auth profiles
|
||
|
||
```bash
|
||
openclaw models auth add
|
||
openclaw models auth login --provider <id>
|
||
openclaw models auth setup-token
|
||
openclaw models auth paste-token
|
||
```
|
||
|
||
`models auth login` runs a provider plugin’s auth flow (OAuth/API key). Use
|
||
`openclaw plugins list` to see which providers are installed.
|
||
|
||
Notes:
|
||
|
||
- `setup-token` prompts for a setup-token value (generate it with `claude setup-token` on any machine).
|
||
- `paste-token` accepts a token string generated elsewhere or from automation.
|
||
- Anthropic policy note: setup-token support is technical compatibility. Anthropic has blocked some subscription usage outside Claude Code in the past, so verify current terms before using it broadly.
|