openclaw-lighthouse

install.sh + Feishu setup: duplicate plugin id warning spam and gateway health check failure

Summary

Running the installer (curl -fsSL https://openclaw.ai/install.sh | bash) and then enabling Feishu produced two problem signals:

  1. repeated config warnings about duplicate plugin id for feishu
  2. health check failure because gateway was not reachable (1006 abnormal closure)

The logs also show:

Environment

Reproduction

  1. Run installer:
    • curl -fsSL https://openclaw.ai/install.sh | bash
  2. Install/enable Feishu plugin in onboarding flow.
  3. Observe repeated warnings:
    • plugins.entries.feishu: plugin feishu: duplicate plugin id detected ...
  4. Observe systemd message:
    • Systemd user services are unavailable. Skipping lingering checks and service install.
  5. Health check later fails with:
    • gateway closed (1006 abnormal closure (no close frame))

Findings

  1. The duplicate id warning indicates two Feishu plugin sources are discoverable with the same id (feishu).
  2. One warning path points to bundled plugin location:
    • /usr/lib/node_modules/openclaw/extensions/feishu/index.ts
  3. Repeated warning lines suggest the config/validation path emits the same warning multiple times in this flow.
  4. Gateway health check failure is likely operational (gateway not running/reachable) rather than plugin crash.
  5. The runtime explicitly reports systemd user services unavailable, which explains skipped service install and later gateway reachability issues.

Mitigation / Workaround

  1. Keep only one Feishu plugin source active (avoid duplicate id collision):
    • Use bundled plugin or installed plugin under ~/.openclaw/extensions/feishu, not both.
  2. Set explicit plugin allowlist:
    • plugins.allow: ["feishu"]
  3. Start gateway with a mode that works on this host:
    • supported user systemd service, or
    • foreground/tmux mode when systemctl --user is unavailable.
  4. Verify after changes:
    • openclaw gateway status
    • openclaw channels status --probe
    • openclaw logs --follow

Risk / Impact

Next actions

References