From 1663b7586247017f5ee945ed506391fc5cb929b0 Mon Sep 17 00:00:00 2001 From: Shakker Date: Sat, 9 May 2026 05:07:44 +0100 Subject: [PATCH] test: tighten acp empty array assertions --- extensions/acpx/src/codex-auth-bridge.test.ts | 2 +- extensions/acpx/src/process-reaper.test.ts | 10 +++++----- extensions/acpx/src/runtime.test.ts | 4 ++-- 3 files changed, 8 insertions(+), 8 deletions(-) diff --git a/extensions/acpx/src/codex-auth-bridge.test.ts b/extensions/acpx/src/codex-auth-bridge.test.ts index f2d926a93f8..7ccc6b383c5 100644 --- a/extensions/acpx/src/codex-auth-bridge.test.ts +++ b/extensions/acpx/src/codex-auth-bridge.test.ts @@ -297,7 +297,7 @@ describe("prepareAcpxCodexAuthConfig", () => { }, ); const launched = JSON.parse(stdout.trim()) as { argv?: unknown; codexHome?: unknown }; - expect(launched.argv).toEqual([]); + expect(launched.argv).toStrictEqual([]); const expectedCodexHome = await fs.realpath(path.join(stateDir, "acpx", "codex-home")); expect(path.resolve(String(launched.codexHome))).toBe(expectedCodexHome); }); diff --git a/extensions/acpx/src/process-reaper.test.ts b/extensions/acpx/src/process-reaper.test.ts index 84164ba3b67..09dc32c2f23 100644 --- a/extensions/acpx/src/process-reaper.test.ts +++ b/extensions/acpx/src/process-reaper.test.ts @@ -149,7 +149,7 @@ describe("process reaper", () => { terminatedPids: [], skippedReason: "not-openclaw-owned", }); - expect(killed).toEqual([]); + expect(killed).toStrictEqual([]); }); it("skips recorded pid cleanup when process listing is unavailable", async () => { @@ -174,7 +174,7 @@ describe("process reaper", () => { terminatedPids: [], skippedReason: "unverified-root", }); - expect(killed).toEqual([]); + expect(killed).toStrictEqual([]); }); it("does not kill a reused pid when the live command is not OpenClaw-owned", async () => { @@ -192,7 +192,7 @@ describe("process reaper", () => { terminatedPids: [], skippedReason: "not-openclaw-owned", }); - expect(killed).toEqual([]); + expect(killed).toStrictEqual([]); }); it("does not kill a reused adapter pid when the stored root was a generated wrapper", async () => { @@ -216,7 +216,7 @@ describe("process reaper", () => { terminatedPids: [], skippedReason: "not-openclaw-owned", }); - expect(killed).toEqual([]); + expect(killed).toStrictEqual([]); }); it("skips non-owned recorded process trees", async () => { @@ -230,7 +230,7 @@ describe("process reaper", () => { }); expect(result.skippedReason).toBe("not-openclaw-owned"); - expect(killed).toEqual([]); + expect(killed).toStrictEqual([]); }); it("reaps stale OpenClaw-owned wrapper and adapter orphans on startup", async () => { diff --git a/extensions/acpx/src/runtime.test.ts b/extensions/acpx/src/runtime.test.ts index 6374610f02f..13e0e6d8389 100644 --- a/extensions/acpx/src/runtime.test.ts +++ b/extensions/acpx/src/runtime.test.ts @@ -976,7 +976,7 @@ describe("AcpxRuntime fresh reset wrapper", () => { reason: "user-close", }); - expect(killed).toEqual([]); + expect(killed).toStrictEqual([]); }); it("does not tear down reusable ACPX sessions after cancel", async () => { @@ -1019,7 +1019,7 @@ describe("AcpxRuntime fresh reset wrapper", () => { expect(cancel).toHaveBeenCalledWith(input); expect(listProcesses).not.toHaveBeenCalled(); - expect(killed).toEqual([]); + expect(killed).toStrictEqual([]); }); it("routes openclaw ensureSession through the bridge-safe delegate when MCP servers are configured", async () => {