d120db533aaef027057209a322c863558f36a370
Native iOS/macOS apps do not send an Origin header in WebSocket connections. The gateway checkBrowserOrigin() fails immediately on null origin before any allowedOrigins check can run. Injecting Origin at the HAProxy ingress level gives the gateway a valid origin to validate against the existing allowedOrigins list (https://openclaw.apps.lab.apilab.us). Related: openclaw/openclaw#24055, #35030, #35109
openclaw (OpenShift)
GitOps repo for deploying OpenClaw into the openclaw namespace.
Layout:
bootstrap/– ArgoCDApplication(apply manually once)manifests/– Namespace + workload resources (ArgoCD-managed)
Target:
- Namespace:
openclaw - Route host:
openclaw.apps.lab.apilab.us - Image:
default-route-openshift-image-registry.apps.lab.apilab.us/openclaw/openclaw:latest - Gateway port:
18789
Notes:
- This repo intentionally does not deploy TEI; it assumes the existing service:
http://text-embeddings.tei.svc.cluster.local:8080/v1/
Description