fix(ci): stabilize detect-secrets baseline

This commit is contained in:
Peter Steinberger
2026-03-08 01:25:15 +00:00
parent eb9e78d6d0
commit 08597e817d
4 changed files with 14 additions and 14 deletions

View File

@@ -203,7 +203,7 @@
"filename": "apps/macos/Sources/OpenClawProtocol/GatewayModels.swift", "filename": "apps/macos/Sources/OpenClawProtocol/GatewayModels.swift",
"hashed_secret": "7990585255d25249fb1e6eac3d2bd6c37429b2cd", "hashed_secret": "7990585255d25249fb1e6eac3d2bd6c37429b2cd",
"is_verified": false, "is_verified": false,
"line_number": 1745 "line_number": 1749
} }
], ],
"apps/macos/Tests/OpenClawIPCTests/AnthropicAuthResolverTests.swift": [ "apps/macos/Tests/OpenClawIPCTests/AnthropicAuthResolverTests.swift": [
@@ -264,7 +264,7 @@
"filename": "apps/shared/OpenClawKit/Sources/OpenClawProtocol/GatewayModels.swift", "filename": "apps/shared/OpenClawKit/Sources/OpenClawProtocol/GatewayModels.swift",
"hashed_secret": "7990585255d25249fb1e6eac3d2bd6c37429b2cd", "hashed_secret": "7990585255d25249fb1e6eac3d2bd6c37429b2cd",
"is_verified": false, "is_verified": false,
"line_number": 1745 "line_number": 1749
} }
], ],
"docs/.i18n/zh-CN.tm.jsonl": [ "docs/.i18n/zh-CN.tm.jsonl": [
@@ -11123,7 +11123,7 @@
"filename": "extensions/nextcloud-talk/src/channel.ts", "filename": "extensions/nextcloud-talk/src/channel.ts",
"hashed_secret": "71f8e7976e4cbc4561c9d62fb283e7f788202acb", "hashed_secret": "71f8e7976e4cbc4561c9d62fb283e7f788202acb",
"is_verified": false, "is_verified": false,
"line_number": 399 "line_number": 403
} }
], ],
"extensions/nostr/README.md": [ "extensions/nostr/README.md": [
@@ -12410,28 +12410,28 @@
"filename": "src/gateway/auth.test.ts", "filename": "src/gateway/auth.test.ts",
"hashed_secret": "db5543cd7440bbdc4c5aaf8aa363715c31dd5a27", "hashed_secret": "db5543cd7440bbdc4c5aaf8aa363715c31dd5a27",
"is_verified": false, "is_verified": false,
"line_number": 95 "line_number": 96
}, },
{ {
"type": "Secret Keyword", "type": "Secret Keyword",
"filename": "src/gateway/auth.test.ts", "filename": "src/gateway/auth.test.ts",
"hashed_secret": "d51f846285cbc6d1dd76677a0fd588c8df44e506", "hashed_secret": "d51f846285cbc6d1dd76677a0fd588c8df44e506",
"is_verified": false, "is_verified": false,
"line_number": 112 "line_number": 113
}, },
{ {
"type": "Secret Keyword", "type": "Secret Keyword",
"filename": "src/gateway/auth.test.ts", "filename": "src/gateway/auth.test.ts",
"hashed_secret": "e5e9fa1ba31ecd1ae84f75caaa474f3a663f05f4", "hashed_secret": "e5e9fa1ba31ecd1ae84f75caaa474f3a663f05f4",
"is_verified": false, "is_verified": false,
"line_number": 254 "line_number": 255
}, },
{ {
"type": "Secret Keyword", "type": "Secret Keyword",
"filename": "src/gateway/auth.test.ts", "filename": "src/gateway/auth.test.ts",
"hashed_secret": "a4b48a81cdab1e1a5dd37907d6c85ca1c61ddc7c", "hashed_secret": "a4b48a81cdab1e1a5dd37907d6c85ca1c61ddc7c",
"is_verified": false, "is_verified": false,
"line_number": 262 "line_number": 263
} }
], ],
"src/gateway/call.test.ts": [ "src/gateway/call.test.ts": [
@@ -12622,7 +12622,7 @@
"filename": "src/infra/outbound/outbound.test.ts", "filename": "src/infra/outbound/outbound.test.ts",
"hashed_secret": "804ec071803318791b835cffd6e509c8d32239db", "hashed_secret": "804ec071803318791b835cffd6e509c8d32239db",
"is_verified": false, "is_verified": false,
"line_number": 850 "line_number": 896
} }
], ],
"src/infra/provider-usage.auth.normalizes-keys.test.ts": [ "src/infra/provider-usage.auth.normalizes-keys.test.ts": [
@@ -12916,7 +12916,7 @@
"filename": "src/telegram/monitor.test.ts", "filename": "src/telegram/monitor.test.ts",
"hashed_secret": "5934c4d4a4fa5d66ddb3d3fc0bba84996c17a5b7", "hashed_secret": "5934c4d4a4fa5d66ddb3d3fc0bba84996c17a5b7",
"is_verified": false, "is_verified": false,
"line_number": 603 "line_number": 641
} }
], ],
"src/telegram/webhook.test.ts": [ "src/telegram/webhook.test.ts": [
@@ -13011,5 +13011,5 @@
} }
] ]
}, },
"generated_at": "2026-03-07T23:50:03Z" "generated_at": "2026-03-08T01:23:32Z"
} }

View File

@@ -601,7 +601,7 @@ describe("readSystemdServiceExecStart", () => {
}); });
expect(command?.environmentValueSources).toEqual({ expect(command?.environmentValueSources).toEqual({
OPENCLAW_GATEWAY_TOKEN: "file", OPENCLAW_GATEWAY_TOKEN: "file",
OPENCLAW_GATEWAY_PASSWORD: "file", OPENCLAW_GATEWAY_PASSWORD: "file", // pragma: allowlist secret
}); });
}); });
}); });

View File

@@ -404,7 +404,7 @@ describe("resolveGatewayConnectionAuth", () => {
config, config,
env, env,
includeLegacyEnv: false, includeLegacyEnv: false,
localPasswordPrecedence: "config-first", localPasswordPrecedence: "config-first", // pragma: allowlist secret
}), }),
).rejects.toThrow("gateway.auth.password"); ).rejects.toThrow("gateway.auth.password");
expect(() => expect(() =>
@@ -412,7 +412,7 @@ describe("resolveGatewayConnectionAuth", () => {
cfg: config, cfg: config,
env, env,
includeLegacyEnv: false, includeLegacyEnv: false,
localPasswordPrecedence: "config-first", localPasswordPrecedence: "config-first", // pragma: allowlist secret
}), }),
).toThrow("gateway.auth.password"); ).toThrow("gateway.auth.password");
}); });

View File

@@ -265,7 +265,7 @@ export function resolveGatewayCredentialsFromConfig(params: {
} }
if ( if (
localPasswordRef && localPasswordRef &&
localPasswordPrecedence === "config-first" && localPasswordPrecedence === "config-first" && // pragma: allowlist secret
!localPassword && !localPassword &&
Boolean(envPassword) && Boolean(envPassword) &&
localPasswordCanWin localPasswordCanWin