feat: refactor sgclaw around zeroclaw compat runtime
This commit is contained in:
20
README.md
20
README.md
@@ -16,6 +16,26 @@ sgClaw 项目仓库。
|
||||
cargo test
|
||||
cargo test --test planner_test -q
|
||||
cargo test --test agent_runtime_test -q
|
||||
node --test tools/browser_smoke/fake_deepseek_server.test.mjs
|
||||
node tools/browser_smoke/run_deepseek_browser_smoke.mjs
|
||||
cargo run
|
||||
bash frontend/sgClaw验证/serve.sh
|
||||
```
|
||||
|
||||
## 浏览器侧 DeepSeek smoke
|
||||
|
||||
在已经可用的 SuperRPA 浏览器构建目录上,可以通过下面的组合验证浏览器侧 `sgclaw` 是否真的走了 ZeroClaw/DeepSeek compat runtime,而不是回退到本地 planner:
|
||||
|
||||
```bash
|
||||
python3 /home/zyl/projects/superRpa/src/chrome/browser/superrpa/sgclaw/build_sgclaw.py \
|
||||
--manifest-path /home/zyl/projects/sgClaw/claw/.worktrees/zeroclaw-core-refactor/Cargo.toml \
|
||||
--out /home/zyl/projects/superRpa/src/out/KylinRelease/sgclaw
|
||||
|
||||
node tools/browser_smoke/run_deepseek_browser_smoke.mjs
|
||||
```
|
||||
|
||||
该 wrapper 会:
|
||||
- 启动本地 fake DeepSeek 服务
|
||||
- 注入 `DEEPSEEK_API_KEY` / `DEEPSEEK_BASE_URL` / `DEEPSEEK_MODEL`
|
||||
- 调用现有 `/home/zyl/projects/superRpa/src/chrome/browser/superrpa/sgclaw/sgclaw_chat_smoke.mjs`
|
||||
- 在 smoke 通过后,再额外确认 fake 服务确实收到了百度和知乎两组 provider 请求
|
||||
|
||||
Reference in New Issue
Block a user