* Remove Qwen OAuth integration (qwen-portal-auth) Qwen OAuth via portal.qwen.ai is being deprecated by the Qwen team due to traffic impact on their primary Qwen Code user base. Users should migrate to the officially supported Model Studio (Alibaba Cloud Coding Plan) provider instead. Ref: https://github.com/openclaw/openclaw/issues/49557 - Delete extensions/qwen-portal-auth/ plugin entirely - Remove qwen-portal from onboarding auth choices, provider aliases, auto-enable list, bundled plugin defaults, and pricing cache - Remove Qwen CLI credential sync (external-cli-sync, cli-credentials) - Remove QWEN_OAUTH_MARKER from model auth markers - Update docs/providers/qwen.md to redirect to Model Studio - Update model-providers docs (EN + zh-CN) to remove Qwen OAuth section - Regenerate config and plugin-sdk baselines - Update all affected tests Co-authored-by: Qwen-Coder <qwen-coder@alibabacloud.com> * Clean up residual qwen-portal references after OAuth removal * Add migration hint for deprecated qwen-portal OAuth provider * fix: finish qwen oauth removal follow-up --------- Co-authored-by: Qwen-Coder <qwen-coder@alibabacloud.com> Co-authored-by: Frank Yang <frank.ekn@gmail.com>
3.0 KiB
summary, read_when, title
| summary | read_when | title | ||
|---|---|---|---|---|
| CLI reference for `openclaw models` (status/list/set/scan, aliases, fallbacks, auth) |
|
models |
openclaw models
Model discovery, scanning, and configuration (default model, fallbacks, auth profiles).
Related:
- Providers + models: Models
- Provider auth setup: Getting started
Common commands
openclaw models status
openclaw models list
openclaw models set <model-or-alias>
openclaw models scan
openclaw models status shows the resolved default/fallbacks plus an auth overview.
When provider usage snapshots are available, the OAuth/token status section includes
provider usage headers.
Add --probe to run live auth probes against each configured provider profile.
Probes are real requests (may consume tokens and trigger rate limits).
Use --agent <id> to inspect a configured agent’s model/auth state. When omitted,
the command uses OPENCLAW_AGENT_DIR/PI_CODING_AGENT_DIR if set, otherwise the
configured default agent.
Notes:
models set <model-or-alias>acceptsprovider/modelor an alias.- Model refs are parsed by splitting on the first
/. If the model ID includes/(OpenRouter-style), include the provider prefix (example:openrouter/moonshotai/kimi-k2). - If you omit the provider, OpenClaw treats the input as an alias or a model for the default provider (only works when there is no
/in the model ID). models statusmay showmarker(<value>)in auth output for non-secret placeholders (for exampleOPENAI_API_KEY,secretref-managed,minimax-oauth,oauth:chutes,ollama-local) instead of masking them as secrets.
models status
Options:
--json--plain--check(exit 1=expired/missing, 2=expiring)--probe(live probe of configured auth profiles)--probe-provider <name>(probe one provider)--probe-profile <id>(repeat or comma-separated profile ids)--probe-timeout <ms>--probe-concurrency <n>--probe-max-tokens <n>--agent <id>(configured agent id; overridesOPENCLAW_AGENT_DIR/PI_CODING_AGENT_DIR)
Aliases + fallbacks
openclaw models aliases list
openclaw models fallbacks list
Auth profiles
openclaw models auth add
openclaw models auth login --provider <id>
openclaw models auth setup-token
openclaw models auth paste-token
models auth login runs a provider plugin’s auth flow (OAuth/API key). Use
openclaw plugins list to see which providers are installed.
Notes:
setup-tokenprompts for a setup-token value (generate it withclaude setup-tokenon any machine).paste-tokenaccepts a token string generated elsewhere or from automation.- Anthropic policy note: setup-token support is technical compatibility. Anthropic has blocked some subscription usage outside Claude Code in the past, so verify current terms before using it broadly.