fix: avoid slack startup auth rejection leak

This commit is contained in:
Peter Steinberger
2026-04-27 07:55:56 +01:00
parent 725938f0f5
commit 53f536b368
2 changed files with 6 additions and 0 deletions

View File

@@ -186,6 +186,10 @@ export function createSlackBoltApp(params: {
receiver,
clientOptions: params.clientOptions,
ignoreSelf: false,
// Bolt eagerly starts an auth.test promise in the constructor when token
// verification is enabled. Invalid tokens can reject before any listener
// consumes that promise, tripping OpenClaw's fatal unhandled-rejection path.
tokenVerificationEnabled: false,
});
app.use(async (args) => {
if (shouldSkipOpenClawSlackSelfEvent(args)) {

View File

@@ -168,6 +168,7 @@ describe("createSlackBoltApp", () => {
receiver,
clientOptions,
ignoreSelf: false,
tokenVerificationEnabled: false,
});
expect((app as unknown as FakeApp).middleware).toHaveLength(1);
});
@@ -198,6 +199,7 @@ describe("createSlackBoltApp", () => {
receiver,
clientOptions,
ignoreSelf: false,
tokenVerificationEnabled: false,
});
expect((app as unknown as FakeApp).middleware).toHaveLength(1);
});