mirror of
https://github.com/openclaw/openclaw.git
synced 2026-04-25 16:12:13 +00:00
test(nodes): update coverage after exec consolidation
This commit is contained in:
@@ -125,7 +125,7 @@ describe("argv helpers", () => {
|
||||
},
|
||||
{
|
||||
name: "help after -- terminator",
|
||||
argv: ["node", "openclaw", "nodes", "run", "--", "git", "--help"],
|
||||
argv: ["node", "openclaw", "nodes", "invoke", "--", "device.status", "--help"],
|
||||
expected: false,
|
||||
},
|
||||
{
|
||||
|
||||
@@ -1,7 +1,5 @@
|
||||
import { Command } from "commander";
|
||||
import { beforeAll, beforeEach, describe, expect, it, vi } from "vitest";
|
||||
import type { ExecApprovalsFile } from "../infra/exec-approvals.js";
|
||||
import { buildSystemRunPreparePayload } from "../test-utils/system-run-prepare-payload.js";
|
||||
import { createCliRuntimeCapture } from "./test-runtime-capture.js";
|
||||
|
||||
type NodeInvokeCall = {
|
||||
@@ -15,17 +13,6 @@ type NodeInvokeCall = {
|
||||
};
|
||||
|
||||
let lastNodeInvokeCall: NodeInvokeCall | null = null;
|
||||
let lastApprovalRequestCall: { params?: Record<string, unknown> } | null = null;
|
||||
let localExecApprovalsFile: ExecApprovalsFile = { version: 1, agents: {} };
|
||||
let nodeExecApprovalsFile: ExecApprovalsFile = {
|
||||
version: 1,
|
||||
defaults: {
|
||||
security: "allowlist",
|
||||
ask: "on-miss",
|
||||
askFallback: "deny",
|
||||
},
|
||||
agents: {},
|
||||
};
|
||||
|
||||
const callGateway = vi.fn(async (opts: NodeInvokeCall) => {
|
||||
if (opts.method === "node.list") {
|
||||
@@ -44,16 +31,6 @@ const callGateway = vi.fn(async (opts: NodeInvokeCall) => {
|
||||
}
|
||||
if (opts.method === "node.invoke") {
|
||||
lastNodeInvokeCall = opts;
|
||||
const command = opts.params?.command;
|
||||
if (command === "system.run.prepare") {
|
||||
const params = (opts.params?.params ?? {}) as {
|
||||
command?: unknown[];
|
||||
rawCommand?: unknown;
|
||||
cwd?: unknown;
|
||||
agentId?: unknown;
|
||||
};
|
||||
return buildSystemRunPreparePayload(params);
|
||||
}
|
||||
return {
|
||||
payload: {
|
||||
stdout: "",
|
||||
@@ -64,24 +41,12 @@ const callGateway = vi.fn(async (opts: NodeInvokeCall) => {
|
||||
},
|
||||
};
|
||||
}
|
||||
if (opts.method === "exec.approvals.node.get") {
|
||||
return {
|
||||
path: "/tmp/exec-approvals.json",
|
||||
exists: true,
|
||||
hash: "hash",
|
||||
file: nodeExecApprovalsFile,
|
||||
};
|
||||
}
|
||||
if (opts.method === "exec.approval.request") {
|
||||
lastApprovalRequestCall = opts as { params?: Record<string, unknown> };
|
||||
return { decision: "allow-once" };
|
||||
}
|
||||
return { ok: true };
|
||||
});
|
||||
|
||||
const randomIdempotencyKey = vi.fn(() => "rk_test");
|
||||
|
||||
const { defaultRuntime, resetRuntimeCapture } = createCliRuntimeCapture();
|
||||
const { runtimeErrors, defaultRuntime, resetRuntimeCapture } = createCliRuntimeCapture();
|
||||
|
||||
vi.mock("../gateway/call.js", () => ({
|
||||
callGateway: (opts: unknown) => callGateway(opts as NodeInvokeCall),
|
||||
@@ -93,20 +58,6 @@ vi.mock("../runtime.js", async (importOriginal) => ({
|
||||
defaultRuntime,
|
||||
}));
|
||||
|
||||
vi.mock("../config/config.js", () => ({
|
||||
loadConfig: () => ({}),
|
||||
}));
|
||||
|
||||
vi.mock("../infra/exec-approvals.js", async () => {
|
||||
const actual = await vi.importActual<typeof import("../infra/exec-approvals.js")>(
|
||||
"../infra/exec-approvals.js",
|
||||
);
|
||||
return {
|
||||
...actual,
|
||||
loadExecApprovals: () => localExecApprovalsFile,
|
||||
};
|
||||
});
|
||||
|
||||
describe("nodes-cli coverage", () => {
|
||||
let registerNodesCli: (program: Command) => void;
|
||||
let sharedProgram: Command;
|
||||
@@ -119,8 +70,6 @@ describe("nodes-cli coverage", () => {
|
||||
return last;
|
||||
};
|
||||
|
||||
const getApprovalRequestCall = () => lastApprovalRequestCall;
|
||||
|
||||
const runNodesCommand = async (args: string[]) => {
|
||||
await sharedProgram.parseAsync(args, { from: "user" });
|
||||
return getNodeInvokeCall();
|
||||
@@ -138,128 +87,23 @@ describe("nodes-cli coverage", () => {
|
||||
callGateway.mockClear();
|
||||
randomIdempotencyKey.mockClear();
|
||||
lastNodeInvokeCall = null;
|
||||
lastApprovalRequestCall = null;
|
||||
localExecApprovalsFile = { version: 1, agents: {} };
|
||||
nodeExecApprovalsFile = {
|
||||
version: 1,
|
||||
defaults: {
|
||||
security: "allowlist",
|
||||
ask: "on-miss",
|
||||
askFallback: "deny",
|
||||
},
|
||||
agents: {},
|
||||
};
|
||||
});
|
||||
|
||||
it("invokes system.run with parsed params", async () => {
|
||||
const invoke = await runNodesCommand([
|
||||
"nodes",
|
||||
"run",
|
||||
"--node",
|
||||
"mac-1",
|
||||
"--cwd",
|
||||
"/tmp",
|
||||
"--env",
|
||||
"FOO=bar",
|
||||
"--command-timeout",
|
||||
"1200",
|
||||
"--needs-screen-recording",
|
||||
"--invoke-timeout",
|
||||
"5000",
|
||||
"echo",
|
||||
"hi",
|
||||
]);
|
||||
|
||||
expect(invoke).toBeTruthy();
|
||||
expect(invoke?.params?.idempotencyKey).toBe("rk_test");
|
||||
expect(invoke?.params?.command).toBe("system.run");
|
||||
expect(invoke?.params?.params).toEqual({
|
||||
command: ["echo", "hi"],
|
||||
rawCommand: "echo hi",
|
||||
cwd: "/tmp",
|
||||
env: { FOO: "bar" },
|
||||
timeoutMs: 1200,
|
||||
needsScreenRecording: true,
|
||||
agentId: "main",
|
||||
approved: true,
|
||||
approvalDecision: "allow-once",
|
||||
runId: expect.any(String),
|
||||
});
|
||||
expect(invoke?.params?.timeoutMs).toBe(5000);
|
||||
const approval = getApprovalRequestCall();
|
||||
expect(approval?.params?.["systemRunPlan"]).toEqual({
|
||||
argv: ["echo", "hi"],
|
||||
cwd: "/tmp",
|
||||
commandText: "echo hi",
|
||||
commandPreview: null,
|
||||
agentId: "main",
|
||||
sessionKey: null,
|
||||
it("does not register the removed run wrapper", async () => {
|
||||
await expect(
|
||||
sharedProgram.parseAsync(["nodes", "run", "--node", "mac-1"], { from: "user" }),
|
||||
).rejects.toMatchObject({
|
||||
code: "commander.unknownCommand",
|
||||
});
|
||||
});
|
||||
|
||||
it("invokes system.run with raw command", async () => {
|
||||
const invoke = await runNodesCommand([
|
||||
"nodes",
|
||||
"run",
|
||||
"--agent",
|
||||
"main",
|
||||
"--node",
|
||||
"mac-1",
|
||||
"--raw",
|
||||
"echo hi",
|
||||
]);
|
||||
|
||||
expect(invoke).toBeTruthy();
|
||||
expect(invoke?.params?.idempotencyKey).toBe("rk_test");
|
||||
expect(invoke?.params?.command).toBe("system.run");
|
||||
expect(invoke?.params?.params).toMatchObject({
|
||||
command: ["/bin/sh", "-lc", "echo hi"],
|
||||
rawCommand: '/bin/sh -lc "echo hi"',
|
||||
agentId: "main",
|
||||
approved: true,
|
||||
approvalDecision: "allow-once",
|
||||
runId: expect.any(String),
|
||||
});
|
||||
const approval = getApprovalRequestCall();
|
||||
expect(approval?.params?.["systemRunPlan"]).toEqual({
|
||||
argv: ["/bin/sh", "-lc", "echo hi"],
|
||||
cwd: null,
|
||||
commandText: '/bin/sh -lc "echo hi"',
|
||||
commandPreview: "echo hi",
|
||||
agentId: "main",
|
||||
sessionKey: null,
|
||||
});
|
||||
});
|
||||
|
||||
it("inherits ask=off from local exec approvals when tools.exec.ask is unset", async () => {
|
||||
localExecApprovalsFile = {
|
||||
version: 1,
|
||||
defaults: {
|
||||
security: "allowlist",
|
||||
ask: "off",
|
||||
askFallback: "deny",
|
||||
},
|
||||
agents: {},
|
||||
};
|
||||
nodeExecApprovalsFile = {
|
||||
version: 1,
|
||||
defaults: {
|
||||
security: "allowlist",
|
||||
askFallback: "deny",
|
||||
},
|
||||
agents: {},
|
||||
};
|
||||
|
||||
const invoke = await runNodesCommand(["nodes", "run", "--node", "mac-1", "echo", "hi"]);
|
||||
|
||||
expect(invoke).toBeTruthy();
|
||||
expect(invoke?.params?.command).toBe("system.run");
|
||||
expect(invoke?.params?.params).toMatchObject({
|
||||
command: ["echo", "hi"],
|
||||
approved: false,
|
||||
});
|
||||
expect(invoke?.params?.params).not.toHaveProperty("approvalDecision");
|
||||
expect(getApprovalRequestCall()).toBeNull();
|
||||
it("blocks system.run on nodes invoke", async () => {
|
||||
await expect(
|
||||
sharedProgram.parseAsync(["nodes", "invoke", "--node", "mac-1", "--command", "system.run"], {
|
||||
from: "user",
|
||||
}),
|
||||
).rejects.toThrow("__exit__:1");
|
||||
expect(runtimeErrors.at(-1)).toContain('command "system.run" is reserved for shell execution');
|
||||
});
|
||||
|
||||
it("invokes system.notify with provided fields", async () => {
|
||||
|
||||
@@ -1,19 +1,18 @@
|
||||
import { beforeAll, beforeEach, describe, expect, it, vi } from "vitest";
|
||||
import { DEFAULT_EXEC_APPROVAL_TIMEOUT_MS } from "../../infra/exec-approvals.js";
|
||||
import { parseTimeoutMs } from "../nodes-run.js";
|
||||
import { parseTimeoutMs } from "../parse-timeout.js";
|
||||
|
||||
/**
|
||||
* Regression test for #12098:
|
||||
* `openclaw nodes run` times out after 35s because the CLI transport timeout
|
||||
* (35s default) is shorter than the exec approval timeout (120s). The
|
||||
* exec.approval.request call must use a transport timeout at least as long
|
||||
* as the approval timeout so the gateway has enough time to collect the
|
||||
* user's decision.
|
||||
* `exec.approval.request` times out after 35s when the CLI transport timeout
|
||||
* is shorter than the exec approval timeout (120s). The transport timeout
|
||||
* must be at least as long as the approval timeout so the gateway has enough
|
||||
* time to collect the user's decision.
|
||||
*
|
||||
* The root cause: callGatewayCli reads opts.timeout for the transport timeout.
|
||||
* Before the fix, nodes run called callGatewayCli("exec.approval.request", opts, ...)
|
||||
* without overriding opts.timeout, so the 35s CLI default raced against the
|
||||
* 120s approval wait on the gateway side. The CLI always lost.
|
||||
* Before the fix, node exec flows called callGatewayCli("exec.approval.request",
|
||||
* opts, ...) without overriding opts.timeout, so the 35s CLI default raced
|
||||
* against the 120s approval wait on the gateway side. The CLI always lost.
|
||||
*
|
||||
* The fix: override the transport timeout for exec.approval.request to be at
|
||||
* least approvalTimeoutMs + 10_000.
|
||||
@@ -32,7 +31,7 @@ vi.mock("../progress.js", () => ({
|
||||
withProgress: (_opts: unknown, fn: () => unknown) => fn(),
|
||||
}));
|
||||
|
||||
describe("nodes run: approval transport timeout (#12098)", () => {
|
||||
describe("exec approval transport timeout (#12098)", () => {
|
||||
let callGatewayCli: typeof import("./rpc.js").callGatewayCli;
|
||||
|
||||
beforeAll(async () => {
|
||||
@@ -100,7 +99,7 @@ describe("nodes run: approval transport timeout (#12098)", () => {
|
||||
// parseTimeoutMs returns undefined for garbage input, ?? 0 ensures
|
||||
// Math.max picks the approval floor instead of producing NaN
|
||||
const transportTimeoutMs = Math.max(parseTimeoutMs("foo") ?? 0, approvalTimeoutMs + 10_000);
|
||||
expect(transportTimeoutMs).toBe(130_000);
|
||||
expect(transportTimeoutMs).toBe(approvalTimeoutMs + 10_000);
|
||||
|
||||
await callGatewayCli(
|
||||
"exec.approval.request",
|
||||
@@ -110,6 +109,6 @@ describe("nodes run: approval transport timeout (#12098)", () => {
|
||||
);
|
||||
|
||||
const callOpts = callGatewaySpy.mock.calls[0][0];
|
||||
expect(callOpts.timeoutMs).toBe(130_000);
|
||||
expect(callOpts.timeoutMs).toBe(approvalTimeoutMs + 10_000);
|
||||
});
|
||||
});
|
||||
Reference in New Issue
Block a user