2026-02-26 14:32:04 +01:00
---
2026-03-02 20:58:20 -06:00
summary: "Contract for `secrets apply` plans: target validation, path matching, and `auth-profiles.json` target scope"
2026-02-26 14:32:04 +01:00
read_when:
2026-03-02 20:58:20 -06:00
- Generating or reviewing `openclaw secrets apply` plans
2026-02-26 14:32:04 +01:00
- Debugging `Invalid plan target path` errors
2026-03-02 20:58:20 -06:00
- Understanding target type and path validation behavior
2026-02-26 14:32:04 +01:00
title: "Secrets Apply Plan Contract"
---
# Secrets apply plan contract
This page defines the strict contract enforced by `openclaw secrets apply` .
2026-03-02 20:58:20 -06:00
If a target does not match these rules, apply fails before mutating configuration.
2026-02-26 14:32:04 +01:00
## Plan file shape
`openclaw secrets apply --from <plan.json>` expects a `targets` array of plan targets:
```json5
{
version: 1,
protocolVersion: 1,
targets: [
{
type: "models.providers.apiKey",
path: "models.providers.openai.apiKey",
pathSegments: ["models", "providers", "openai", "apiKey"],
providerId: "openai",
ref: { source: "env", provider: "default", id: "OPENAI_API_KEY" },
},
2026-03-02 20:58:20 -06:00
{
type: "auth-profiles.api_key.key",
path: "profiles.openai:default.key",
pathSegments: ["profiles", "openai:default", "key"],
agentId: "main",
ref: { source: "env", provider: "default", id: "OPENAI_API_KEY" },
},
2026-02-26 14:32:04 +01:00
],
}
```
2026-03-02 20:58:20 -06:00
## Supported target scope
Plan targets are accepted for supported credential paths in:
- [SecretRef Credential Surface ](/reference/secretref-credential-surface )
## Target type behavior
2026-02-26 14:32:04 +01:00
2026-03-02 20:58:20 -06:00
General rule:
- `target.type` must be recognized and must match the normalized `target.path` shape.
Compatibility aliases remain accepted for existing plans:
- `models.providers.apiKey`
- `skills.entries.apiKey`
- `channels.googlechat.serviceAccount`
2026-02-26 14:32:04 +01:00
## Path validation rules
Each target is validated with all of the following:
2026-03-02 20:58:20 -06:00
- `type` must be a recognized target type.
2026-02-26 14:32:04 +01:00
- `path` must be a non-empty dot path.
- `pathSegments` can be omitted. If provided, it must normalize to exactly the same path as `path` .
- Forbidden segments are rejected: `__proto__` , `prototype` , `constructor` .
2026-03-02 20:58:20 -06:00
- The normalized path must match the registered path shape for the target type.
- If `providerId` or `accountId` is set, it must match the id encoded in the path.
- `auth-profiles.json` targets require `agentId` .
- When creating a new `auth-profiles.json` mapping, include `authProfileProvider` .
2026-02-26 14:32:04 +01:00
## Failure behavior
If a target fails validation, apply exits with an error like:
```text
Invalid plan target path for models.providers.apiKey: models.providers.openai.baseUrl
```
2026-03-02 20:58:20 -06:00
No writes are committed for an invalid plan.
2026-02-26 14:32:04 +01:00
2026-03-17 23:24:34 -05:00
## Exec provider consent behavior
- `--dry-run` skips exec SecretRef checks by default.
- Plans containing exec SecretRefs/providers are rejected in write mode unless `--allow-exec` is set.
- When validating/applying exec-containing plans, pass `--allow-exec` in both dry-run and write commands.
2026-03-02 20:58:20 -06:00
## Runtime and audit scope notes
2026-02-26 14:32:04 +01:00
2026-03-02 20:58:20 -06:00
- Ref-only `auth-profiles.json` entries (`keyRef` /`tokenRef` ) are included in runtime resolution and audit coverage.
- `secrets apply` writes supported `openclaw.json` targets, supported `auth-profiles.json` targets, and optional scrub targets.
2026-02-26 14:32:04 +01:00
## Operator checks
```bash
# Validate plan without writes
openclaw secrets apply --from /tmp/openclaw-secrets-plan.json --dry-run
# Then apply for real
openclaw secrets apply --from /tmp/openclaw-secrets-plan.json
2026-03-17 23:24:34 -05:00
# For exec-containing plans, opt in explicitly in both modes
openclaw secrets apply --from /tmp/openclaw-secrets-plan.json --dry-run --allow-exec
openclaw secrets apply --from /tmp/openclaw-secrets-plan.json --allow-exec
2026-02-26 14:32:04 +01:00
```
2026-03-02 20:58:20 -06:00
If apply fails with an invalid target path message, regenerate the plan with `openclaw secrets configure` or fix the target path to a supported shape above.
2026-02-26 14:32:04 +01:00
## Related docs
- [Secrets Management ](/gateway/secrets )
- [CLI `secrets` ](/cli/secrets )
2026-03-02 20:58:20 -06:00
- [SecretRef Credential Surface ](/reference/secretref-credential-surface )
2026-02-26 14:32:04 +01:00
- [Configuration Reference ](/gateway/configuration-reference )