2026-01-20 07:35:29 +00:00
---
summary: "Expose an OpenResponses-compatible /v1/responses HTTP endpoint from the Gateway"
read_when:
- Integrating clients that speak the OpenResponses API
- You want item-based inputs, client tool calls, or SSE events
2026-01-31 16:04:03 -05:00
title: "OpenResponses API"
2026-01-20 07:35:29 +00:00
---
2026-01-31 21:13:13 +09:00
2026-01-20 07:35:29 +00:00
# OpenResponses API (HTTP)
2026-01-30 03:15:10 +01:00
OpenClaw’ s Gateway can serve an OpenResponses-compatible `POST /v1/responses` endpoint.
2026-01-20 07:35:29 +00:00
This endpoint is **disabled by default** . Enable it in config first.
- `POST /v1/responses`
- Same port as the Gateway (WS + HTTP multiplex): `http://<gateway-host>:<port>/v1/responses`
Under the hood, requests are executed as a normal Gateway agent run (same codepath as
2026-01-30 03:15:10 +01:00
`openclaw agent` ), so routing/permissions/config match your Gateway.
2026-01-20 07:35:29 +00:00
## Authentication
Uses the Gateway auth configuration. Send a bearer token:
- `Authorization: Bearer <token>`
Notes:
2026-01-31 21:13:13 +09:00
2026-01-30 03:15:10 +01:00
- When `gateway.auth.mode="token"` , use `gateway.auth.token` (or `OPENCLAW_GATEWAY_TOKEN` ).
- When `gateway.auth.mode="password"` , use `gateway.auth.password` (or `OPENCLAW_GATEWAY_PASSWORD` ).
2026-02-13 15:32:38 +01:00
- If `gateway.auth.rateLimit` is configured and too many auth failures occur, the endpoint returns `429` with `Retry-After` .
2026-01-20 07:35:29 +00:00
2026-03-02 00:27:32 +00:00
## Security boundary (important)
Treat this endpoint as a **full operator-access** surface for the gateway instance.
- HTTP bearer auth here is not a narrow per-user scope model.
- A valid Gateway token/password for this endpoint should be treated like an owner/operator credential.
- Requests run through the same control-plane agent path as trusted operator actions.
2026-03-07 18:48:13 +00:00
- There is no separate non-owner/per-user tool boundary on this endpoint; once a caller passes Gateway auth here, OpenClaw treats that caller as a trusted operator for this gateway.
2026-03-02 00:27:32 +00:00
- If the target agent policy allows sensitive tools, this endpoint can use them.
- Keep this endpoint on loopback/tailnet/private ingress only; do not expose it directly to the public internet.
See [Security ](/gateway/security ) and [Remote access ](/gateway/remote ).
2026-01-20 07:35:29 +00:00
## Choosing an agent
No custom headers required: encode the agent id in the OpenResponses `model` field:
2026-01-30 03:15:10 +01:00
- `model: "openclaw:<agentId>"` (example: `"openclaw:main"` , `"openclaw:beta"` )
2026-01-20 07:35:29 +00:00
- `model: "agent:<agentId>"` (alias)
2026-01-30 03:15:10 +01:00
Or target a specific OpenClaw agent by header:
2026-01-20 07:35:29 +00:00
2026-01-30 03:15:10 +01:00
- `x-openclaw-agent-id: <agentId>` (default: `main` )
2026-01-20 07:35:29 +00:00
Advanced:
2026-01-31 21:13:13 +09:00
2026-01-30 03:15:10 +01:00
- `x-openclaw-session-key: <sessionKey>` to fully control session routing.
2026-01-20 07:35:29 +00:00
## Enabling the endpoint
Set `gateway.http.endpoints.responses.enabled` to `true` :
```json5
{
gateway: {
http: {
endpoints: {
2026-01-31 21:13:13 +09:00
responses: { enabled: true },
},
},
},
2026-01-20 07:35:29 +00:00
}
```
## Disabling the endpoint
Set `gateway.http.endpoints.responses.enabled` to `false` :
```json5
{
gateway: {
http: {
endpoints: {
2026-01-31 21:13:13 +09:00
responses: { enabled: false },
},
},
},
2026-01-20 07:35:29 +00:00
}
```
## Session behavior
By default the endpoint is **stateless per request** (a new session key is generated each call).
If the request includes an OpenResponses `user` string, the Gateway derives a stable session key
from it, so repeated calls can share an agent session.
## Request shape (supported)
The request follows the OpenResponses API with item-based input. Current support:
- `input` : string or array of item objects.
- `instructions` : merged into the system prompt.
- `tools` : client tool definitions (function tools).
- `tool_choice` : filter or require client tools.
- `stream` : enables SSE streaming.
- `max_output_tokens` : best-effort output limit (provider dependent).
- `user` : stable session routing.
Accepted but **currently ignored** :
- `max_tool_calls`
- `reasoning`
- `metadata`
- `store`
- `previous_response_id`
- `truncation`
## Items (input)
### `message`
2026-01-31 21:13:13 +09:00
2026-01-20 07:35:29 +00:00
Roles: `system` , `developer` , `user` , `assistant` .
- `system` and `developer` are appended to the system prompt.
- The most recent `user` or `function_call_output` item becomes the “current message.”
- Earlier user/assistant messages are included as history for context.
### `function_call_output` (turn-based tools)
Send tool results back to the model:
```json
{
"type": "function_call_output",
"call_id": "call_123",
"output": "{\"temperature\": \"72F\"}"
}
```
### `reasoning` and `item_reference`
Accepted for schema compatibility but ignored when building the prompt.
## Tools (client-side function tools)
Provide tools with `tools: [{ type: "function", function: { name, description?, parameters? } }]` .
If the agent decides to call a tool, the response returns a `function_call` output item.
You then send a follow-up request with `function_call_output` to continue the turn.
## Images (`input_image`)
Supports base64 or URL sources:
```json
{
"type": "input_image",
"source": { "type": "url", "url": "https://example.com/image.png" }
}
```
2026-03-06 22:49:38 -05:00
Allowed MIME types (current): `image/jpeg` , `image/png` , `image/gif` , `image/webp` , `image/heic` , `image/heif` .
2026-01-20 07:35:29 +00:00
Max size (current): 10MB.
## Files (`input_file`)
Supports base64 or URL sources:
```json
{
"type": "input_file",
"source": {
"type": "base64",
"media_type": "text/plain",
"data": "SGVsbG8gV29ybGQh",
"filename": "hello.txt"
}
}
```
Allowed MIME types (current): `text/plain` , `text/markdown` , `text/html` , `text/csv` ,
`application/json` , `application/pdf` .
Max size (current): 5MB.
Current behavior:
2026-01-31 21:13:13 +09:00
2026-01-20 07:35:29 +00:00
- File content is decoded and added to the **system prompt** , not the user message,
so it stays ephemeral (not persisted in session history).
- PDFs are parsed for text. If little text is found, the first pages are rasterized
into images and passed to the model.
2026-01-20 07:59:25 +00:00
PDF parsing uses the Node-friendly `pdfjs-dist` legacy build (no worker). The modern
PDF.js build expects browser workers/DOM globals, so it is not used in the Gateway.
URL fetch defaults:
2026-01-31 21:13:13 +09:00
2026-01-20 07:59:25 +00:00
- `files.allowUrl` : `true`
- `images.allowUrl` : `true`
2026-02-13 01:38:15 +01:00
- `maxUrlParts` : `8` (total URL-based `input_file` + `input_image` parts per request)
2026-01-20 07:59:25 +00:00
- Requests are guarded (DNS resolution, private IP blocking, redirect caps, timeouts).
2026-02-13 01:38:15 +01:00
- Optional hostname allowlists are supported per input type (`files.urlAllowlist` , `images.urlAllowlist` ).
- Exact host: `"cdn.example.com"`
- Wildcard subdomains: `"*.assets.example.com"` (does not match apex)
2026-01-20 07:59:25 +00:00
2026-01-20 07:35:29 +00:00
## File + image limits (config)
Defaults can be tuned under `gateway.http.endpoints.responses` :
```json5
{
gateway: {
http: {
endpoints: {
responses: {
enabled: true,
maxBodyBytes: 20000000,
2026-02-13 01:38:15 +01:00
maxUrlParts: 8,
2026-01-20 07:35:29 +00:00
files: {
allowUrl: true,
2026-02-13 01:38:15 +01:00
urlAllowlist: ["cdn.example.com", "*.assets.example.com"],
2026-01-31 21:13:13 +09:00
allowedMimes: [
"text/plain",
"text/markdown",
"text/html",
"text/csv",
"application/json",
"application/pdf",
],
2026-01-20 07:35:29 +00:00
maxBytes: 5242880,
maxChars: 200000,
maxRedirects: 3,
timeoutMs: 10000,
pdf: {
maxPages: 4,
maxPixels: 4000000,
2026-01-31 21:13:13 +09:00
minTextChars: 200,
},
2026-01-20 07:35:29 +00:00
},
images: {
allowUrl: true,
2026-02-13 01:38:15 +01:00
urlAllowlist: ["images.example.com"],
2026-03-06 11:19:36 -05:00
allowedMimes: [
"image/jpeg",
"image/png",
"image/gif",
"image/webp",
"image/heic",
"image/heif",
],
2026-01-20 07:35:29 +00:00
maxBytes: 10485760,
maxRedirects: 3,
2026-01-31 21:13:13 +09:00
timeoutMs: 10000,
},
},
},
},
},
2026-01-20 07:35:29 +00:00
}
```
2026-01-20 07:59:25 +00:00
Defaults when omitted:
2026-01-31 21:13:13 +09:00
2026-01-20 07:59:25 +00:00
- `maxBodyBytes` : 20MB
2026-02-13 01:38:15 +01:00
- `maxUrlParts` : 8
2026-01-20 07:59:25 +00:00
- `files.maxBytes` : 5MB
- `files.maxChars` : 200k
- `files.maxRedirects` : 3
- `files.timeoutMs` : 10s
- `files.pdf.maxPages` : 4
- `files.pdf.maxPixels` : 4,000,000
- `files.pdf.minTextChars` : 200
- `images.maxBytes` : 10MB
- `images.maxRedirects` : 3
- `images.timeoutMs` : 10s
2026-03-06 11:19:36 -05:00
- HEIC/HEIF `input_image` sources are accepted and normalized to JPEG before provider delivery.
2026-01-20 07:59:25 +00:00
2026-02-13 01:38:15 +01:00
Security note:
- URL allowlists are enforced before fetch and on redirect hops.
- Allowlisting a hostname does not bypass private/internal IP blocking.
- For internet-exposed gateways, apply network egress controls in addition to app-level guards.
See [Security ](/gateway/security ).
2026-01-20 07:35:29 +00:00
## Streaming (SSE)
Set `stream: true` to receive Server-Sent Events (SSE):
- `Content-Type: text/event-stream`
- Each event line is `event: <type>` and `data: <json>`
- Stream ends with `data: [DONE]`
Event types currently emitted:
2026-01-31 21:13:13 +09:00
2026-01-20 07:35:29 +00:00
- `response.created`
- `response.in_progress`
- `response.output_item.added`
- `response.content_part.added`
- `response.output_text.delta`
- `response.output_text.done`
- `response.content_part.done`
- `response.output_item.done`
- `response.completed`
- `response.failed` (on error)
## Usage
`usage` is populated when the underlying provider reports token counts.
## Errors
Errors use a JSON object like:
```json
{ "error": { "message": "...", "type": "invalid_request_error" } }
```
Common cases:
2026-01-31 21:13:13 +09:00
2026-01-20 07:35:29 +00:00
- `401` missing/invalid auth
- `400` invalid request body
- `405` wrong method
## Examples
Non-streaming:
2026-01-31 21:13:13 +09:00
2026-01-20 07:35:29 +00:00
```bash
curl -sS http://127.0.0.1:18789/v1/responses \
-H 'Authorization: Bearer YOUR_TOKEN' \
-H 'Content-Type: application/json' \
2026-01-30 03:15:10 +01:00
-H 'x-openclaw-agent-id: main' \
2026-01-20 07:35:29 +00:00
-d '{
2026-01-30 03:15:10 +01:00
"model": "openclaw",
2026-01-20 07:35:29 +00:00
"input": "hi"
}'
```
Streaming:
2026-01-31 21:13:13 +09:00
2026-01-20 07:35:29 +00:00
```bash
curl -N http://127.0.0.1:18789/v1/responses \
-H 'Authorization: Bearer YOUR_TOKEN' \
-H 'Content-Type: application/json' \
2026-01-30 03:15:10 +01:00
-H 'x-openclaw-agent-id: main' \
2026-01-20 07:35:29 +00:00
-d '{
2026-01-30 03:15:10 +01:00
"model": "openclaw",
2026-01-20 07:35:29 +00:00
"stream": true,
"input": "hi"
}'
```