test(live): scope provider auth discovery

This commit is contained in:
Vincent Koc
2026-05-05 02:00:39 -07:00
parent 678323d013
commit 9fa685e3b3
3 changed files with 98 additions and 4 deletions

View File

@@ -5,6 +5,7 @@ import { getRuntimeConfig } from "../config/config.js";
import { parseLiveCsvFilter } from "../media-generation/live-test-helpers.js";
import { runTasksWithConcurrency } from "../utils/run-with-concurrency.js";
import { resolveOpenClawAgentDir } from "./agent-paths.js";
import { externalCliDiscoveryForProviders } from "./auth-profiles/external-cli-discovery.js";
import {
collectAnthropicApiKeys,
isAnthropicBillingError,
@@ -730,8 +731,13 @@ describeLive("live models (profile keys)", () => {
logProgress(`[live-models] anthropic keys loaded: ${anthropicKeys.length}`);
}
const providers = parseProviderFilter(process.env.OPENCLAW_LIVE_PROVIDERS);
const agentDir = resolveOpenClawAgentDir();
const authStorage = discoverAuthStorage(agentDir);
const authStorage = discoverAuthStorage(agentDir, {
config: cfg,
env: process.env,
...(providers ? { externalCli: externalCliDiscoveryForProviders({ cfg, providers }) } : {}),
});
logProgress("[live-models] loading model registry");
const models = await withLiveStageTimeout(
Promise.resolve().then(() => discoverModels(authStorage, agentDir).getAll()),
@@ -743,7 +749,6 @@ describeLive("live models (profile keys)", () => {
const useExplicit = Boolean(rawModels) && !useModern;
const filter = useExplicit ? parseModelFilter(rawModels) : null;
const allowNotFoundSkip = useModern;
const providers = parseProviderFilter(process.env.OPENCLAW_LIVE_PROVIDERS);
const perModelTimeoutMs = toInt(process.env.OPENCLAW_LIVE_MODEL_TIMEOUT_MS, 30_000);
const maxModels = resolveHighSignalLiveModelLimit({
rawMaxModels: process.env.OPENCLAW_LIVE_MAX_MODELS,

View File

@@ -0,0 +1,79 @@
import { describe, expect, it, vi } from "vitest";
import type { OpenClawConfig } from "../config/types.openclaw.js";
const storeMocks = vi.hoisted(() => ({
ensureAuthProfileStore: vi.fn(() => ({ version: 1, profiles: {} })),
loadAuthProfileStoreForRuntime: vi.fn(() => ({ version: 1, profiles: {} })),
loadAuthProfileStoreForSecretsRuntime: vi.fn(() => ({ version: 1, profiles: {} })),
}));
const credentialMocks = vi.hoisted(() => ({
resolvePiCredentialMapFromStore: vi.fn(() => ({})),
}));
const discoveryCoreMocks = vi.hoisted(() => ({
addEnvBackedPiCredentials: vi.fn((credentials: unknown) => credentials),
scrubLegacyStaticAuthJsonEntriesForDiscovery: vi.fn(),
}));
vi.mock("./auth-profiles/store.js", () => storeMocks);
vi.mock("./pi-auth-credentials.js", () => credentialMocks);
vi.mock("./pi-auth-discovery-core.js", () => discoveryCoreMocks);
vi.mock("./synthetic-auth.runtime.js", () => ({
resolveRuntimeSyntheticAuthProviderRefs: () => [],
}));
vi.mock("../plugins/provider-runtime.js", () => ({
resolveProviderSyntheticAuthWithPlugin: vi.fn(),
}));
import { externalCliDiscoveryForProviders } from "./auth-profiles/external-cli-discovery.js";
import { resolvePiCredentialsForDiscovery } from "./pi-auth-discovery.js";
describe("resolvePiCredentialsForDiscovery external CLI scoping", () => {
it("threads scoped external CLI discovery into writable auth store loading", () => {
const cfg = {} as OpenClawConfig;
const externalCli = externalCliDiscoveryForProviders({
cfg,
providers: ["fireworks"],
});
resolvePiCredentialsForDiscovery("/tmp/openclaw-agent", {
config: cfg,
env: {},
externalCli,
});
expect(storeMocks.ensureAuthProfileStore).toHaveBeenCalledWith("/tmp/openclaw-agent", {
allowKeychainPrompt: false,
config: cfg,
externalCli,
});
expect(storeMocks.loadAuthProfileStoreForRuntime).not.toHaveBeenCalled();
});
it("preserves scoped external CLI discovery for read-only auth store loading", () => {
const cfg = {} as OpenClawConfig;
const externalCli = externalCliDiscoveryForProviders({
cfg,
providers: ["fireworks"],
});
resolvePiCredentialsForDiscovery("/tmp/openclaw-agent", {
config: cfg,
env: {},
externalCli,
readOnly: true,
});
expect(storeMocks.loadAuthProfileStoreForRuntime).toHaveBeenCalledWith("/tmp/openclaw-agent", {
allowKeychainPrompt: false,
config: cfg,
externalCli,
readOnly: true,
});
});
});

View File

@@ -1,7 +1,9 @@
import { resolveProviderSyntheticAuthWithPlugin } from "../plugins/provider-runtime.js";
import { resolveRuntimeSyntheticAuthProviderRefs } from "../plugins/synthetic-auth.runtime.js";
import type { ExternalCliAuthDiscovery } from "./auth-profiles/external-cli-discovery.js";
import {
ensureAuthProfileStore,
loadAuthProfileStoreForRuntime,
loadAuthProfileStoreForSecretsRuntime,
} from "./auth-profiles/store.js";
import { resolvePiCredentialMapFromStore, type PiCredentialMap } from "./pi-auth-credentials.js";
@@ -11,6 +13,7 @@ import {
} from "./pi-auth-discovery-core.js";
export type DiscoverAuthStorageOptions = {
externalCli?: ExternalCliAuthDiscovery;
readOnly?: boolean;
skipCredentials?: boolean;
} & PiDiscoveryAuthLookupOptions;
@@ -19,10 +22,17 @@ export function resolvePiCredentialsForDiscovery(
agentDir: string,
options?: DiscoverAuthStorageOptions,
): PiCredentialMap {
const storeOptions = {
allowKeychainPrompt: false,
...(options?.config ? { config: options.config } : {}),
...(options?.externalCli ? { externalCli: options.externalCli } : {}),
};
const store =
options?.readOnly === true
? loadAuthProfileStoreForSecretsRuntime(agentDir)
: ensureAuthProfileStore(agentDir, { allowKeychainPrompt: false });
? options.externalCli || options.config
? loadAuthProfileStoreForRuntime(agentDir, { readOnly: true, ...storeOptions })
: loadAuthProfileStoreForSecretsRuntime(agentDir)
: ensureAuthProfileStore(agentDir, storeOptions);
const credentials = addEnvBackedPiCredentials(resolvePiCredentialMapFromStore(store), {
config: options?.config,
workspaceDir: options?.workspaceDir,