mirror of
https://github.com/openclaw/openclaw.git
synced 2026-05-19 00:04:44 +00:00
110 lines
3.6 KiB
TypeScript
110 lines
3.6 KiB
TypeScript
import { describe, expect, it, vi } from "vitest";
|
|
import { __testing, hasAwsCredentials } from "./embedding-provider.js";
|
|
|
|
describe("hasAwsCredentials", () => {
|
|
it("accepts static AWS key credentials without loading the credential chain", async () => {
|
|
const loadCredentialProvider = vi.fn();
|
|
|
|
await expect(
|
|
hasAwsCredentials(
|
|
{
|
|
AWS_ACCESS_KEY_ID: "access-key",
|
|
AWS_SECRET_ACCESS_KEY: "secret-key",
|
|
},
|
|
loadCredentialProvider,
|
|
),
|
|
).resolves.toBe(true);
|
|
|
|
expect(loadCredentialProvider).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it("accepts the Bedrock bearer token without loading the credential chain", async () => {
|
|
const loadCredentialProvider = vi.fn();
|
|
|
|
await expect(
|
|
hasAwsCredentials(
|
|
{
|
|
AWS_BEARER_TOKEN_BEDROCK: "bearer-token",
|
|
},
|
|
loadCredentialProvider,
|
|
),
|
|
).resolves.toBe(true);
|
|
|
|
expect(loadCredentialProvider).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it("requires AWS profile credentials to resolve through the credential chain", async () => {
|
|
const loadCredentialProvider = vi.fn().mockResolvedValue({
|
|
defaultProvider: () => async () => ({ accessKeyId: "resolved-access-key" }),
|
|
});
|
|
|
|
await expect(hasAwsCredentials({ AWS_PROFILE: "work" }, loadCredentialProvider)).resolves.toBe(
|
|
true,
|
|
);
|
|
|
|
expect(loadCredentialProvider).toHaveBeenCalledOnce();
|
|
});
|
|
|
|
it("rejects AWS profile markers when the credential chain cannot resolve", async () => {
|
|
const loadCredentialProvider = vi.fn().mockResolvedValue({
|
|
defaultProvider: () => async () => {
|
|
throw new Error("Could not load credentials from any providers");
|
|
},
|
|
});
|
|
|
|
await expect(
|
|
hasAwsCredentials({ AWS_PROFILE: "missing" }, loadCredentialProvider),
|
|
).resolves.toBe(false);
|
|
});
|
|
|
|
it("returns false when the AWS credential provider package is unavailable", async () => {
|
|
const loadCredentialProvider = vi.fn().mockResolvedValue(null);
|
|
|
|
await expect(hasAwsCredentials({}, loadCredentialProvider)).resolves.toBe(false);
|
|
});
|
|
});
|
|
|
|
describe("bedrock embedding response parsers", () => {
|
|
it("wraps malformed single embedding JSON", () => {
|
|
expect(() => __testing.parseSingle("titan-v2", "{not json")).toThrow(
|
|
"Amazon Bedrock embedding response returned malformed JSON",
|
|
);
|
|
});
|
|
|
|
it("wraps malformed batch embedding JSON", () => {
|
|
expect(() => __testing.parseCohereBatch("cohere-v3", "{not json")).toThrow(
|
|
"Amazon Bedrock embedding response returned malformed JSON",
|
|
);
|
|
});
|
|
|
|
it("rejects non-object embedding JSON", () => {
|
|
expect(() => __testing.parseSingle("titan-v2", "[]")).toThrow(
|
|
"Amazon Bedrock embedding response returned malformed JSON",
|
|
);
|
|
});
|
|
|
|
it("rejects missing single embedding vectors", () => {
|
|
expect(() => __testing.parseSingle("titan-v2", "{}")).toThrow(
|
|
"Amazon Bedrock embedding response returned malformed JSON",
|
|
);
|
|
});
|
|
|
|
it("rejects wrong single embedding vector element types", () => {
|
|
expect(() => __testing.parseSingle("titan-v2", '{"embedding":[1,"bad"]}')).toThrow(
|
|
"Amazon Bedrock embedding response returned malformed JSON",
|
|
);
|
|
});
|
|
|
|
it("rejects missing batch embedding vectors", () => {
|
|
expect(() => __testing.parseCohereBatch("cohere-v3", "{}")).toThrow(
|
|
"Amazon Bedrock embedding response returned malformed JSON",
|
|
);
|
|
});
|
|
|
|
it("rejects wrong batch embedding vector shapes", () => {
|
|
expect(() =>
|
|
__testing.parseCohereBatch("cohere-v3", '{"embeddings":[[1],{"bad":true}]}'),
|
|
).toThrow("Amazon Bedrock embedding response returned malformed JSON");
|
|
});
|
|
});
|