Files
openclaw/src/config/config.web-search-provider.test.ts
2026-03-26 15:26:11 +00:00

363 lines
12 KiB
TypeScript

import { afterEach, beforeEach, describe, expect, it, vi } from "vitest";
import { buildWebSearchProviderConfig } from "./test-helpers.js";
vi.mock("../runtime.js", () => ({
defaultRuntime: { log: vi.fn(), error: vi.fn() },
}));
const getScopedWebSearchCredential = (key: string) => (search?: Record<string, unknown>) =>
(search?.[key] as { apiKey?: unknown } | undefined)?.apiKey;
const getConfiguredPluginWebSearchCredential =
(pluginId: string) => (config?: Record<string, unknown>) =>
(
config?.plugins as
| { entries?: Record<string, { config?: { webSearch?: { apiKey?: unknown } } }> }
| undefined
)?.entries?.[pluginId]?.config?.webSearch?.apiKey;
const mockWebSearchProviders = [
{
id: "brave",
envVars: ["BRAVE_API_KEY"],
credentialPath: "plugins.entries.brave.config.webSearch.apiKey",
getCredentialValue: (search?: Record<string, unknown>) => search?.apiKey,
getConfiguredCredentialValue: getConfiguredPluginWebSearchCredential("brave"),
},
{
id: "firecrawl",
envVars: ["FIRECRAWL_API_KEY"],
credentialPath: "plugins.entries.firecrawl.config.webSearch.apiKey",
getCredentialValue: getScopedWebSearchCredential("firecrawl"),
getConfiguredCredentialValue: getConfiguredPluginWebSearchCredential("firecrawl"),
},
{
id: "gemini",
envVars: ["GEMINI_API_KEY"],
credentialPath: "plugins.entries.google.config.webSearch.apiKey",
getCredentialValue: getScopedWebSearchCredential("gemini"),
getConfiguredCredentialValue: getConfiguredPluginWebSearchCredential("google"),
},
{
id: "grok",
envVars: ["XAI_API_KEY"],
credentialPath: "plugins.entries.xai.config.webSearch.apiKey",
getCredentialValue: getScopedWebSearchCredential("grok"),
getConfiguredCredentialValue: getConfiguredPluginWebSearchCredential("xai"),
},
{
id: "kimi",
envVars: ["KIMI_API_KEY", "MOONSHOT_API_KEY"],
credentialPath: "plugins.entries.moonshot.config.webSearch.apiKey",
getCredentialValue: getScopedWebSearchCredential("kimi"),
getConfiguredCredentialValue: getConfiguredPluginWebSearchCredential("moonshot"),
},
{
id: "perplexity",
envVars: ["PERPLEXITY_API_KEY", "OPENROUTER_API_KEY"],
credentialPath: "plugins.entries.perplexity.config.webSearch.apiKey",
getCredentialValue: getScopedWebSearchCredential("perplexity"),
getConfiguredCredentialValue: getConfiguredPluginWebSearchCredential("perplexity"),
},
{
id: "tavily",
envVars: ["TAVILY_API_KEY"],
credentialPath: "plugins.entries.tavily.config.webSearch.apiKey",
getCredentialValue: getScopedWebSearchCredential("tavily"),
getConfiguredCredentialValue: getConfiguredPluginWebSearchCredential("tavily"),
},
] as const;
vi.mock("../plugins/web-search-providers.js", () => {
return {
resolveBundledPluginWebSearchProviders: () => mockWebSearchProviders,
resolvePluginWebSearchProviders: () => mockWebSearchProviders,
};
});
let validateConfigObjectWithPlugins: typeof import("./config.js").validateConfigObjectWithPlugins;
let resolveSearchProvider: typeof import("../agents/tools/web-search.js").__testing.resolveSearchProvider;
beforeEach(async () => {
vi.resetModules();
({ validateConfigObjectWithPlugins } = await import("./config.js"));
({
__testing: { resolveSearchProvider },
} = await import("../agents/tools/web-search.js"));
});
function pluginWebSearchApiKey(
config: Record<string, unknown> | undefined,
pluginId: string,
): unknown {
return (
config?.plugins as
| { entries?: Record<string, { config?: { webSearch?: { apiKey?: unknown } } }> }
| undefined
)?.entries?.[pluginId]?.config?.webSearch?.apiKey;
}
describe("web search provider config", () => {
it("does not warn for legacy brave config when bundled web search allowlist compat applies", () => {
const res = validateConfigObjectWithPlugins({
plugins: {
allow: ["bluebubbles", "memory-core"],
},
tools: {
web: {
search: {
enabled: true,
apiKey: "test-brave-key", // pragma: allowlist secret
},
},
},
});
expect(res.ok).toBe(true);
if (!res.ok) {
return;
}
expect(res.warnings).not.toContainEqual(
expect.objectContaining({
path: "plugins.entries.brave",
message: expect.stringContaining(
"plugin disabled (not in allowlist) but config is present",
),
}),
);
});
it("accepts perplexity provider and config", () => {
const res = validateConfigObjectWithPlugins(
buildWebSearchProviderConfig({
enabled: true,
provider: "perplexity",
providerConfig: {
apiKey: "test-key", // pragma: allowlist secret
baseUrl: "https://openrouter.ai/api/v1",
model: "perplexity/sonar-pro",
},
}),
);
expect(res.ok).toBe(true);
});
it("accepts gemini provider and config", () => {
const res = validateConfigObjectWithPlugins(
buildWebSearchProviderConfig({
enabled: true,
provider: "gemini",
providerConfig: {
apiKey: "test-key", // pragma: allowlist secret
model: "gemini-2.5-flash",
},
}),
);
expect(res.ok).toBe(true);
});
it("accepts firecrawl provider and config", () => {
const res = validateConfigObjectWithPlugins(
buildWebSearchProviderConfig({
enabled: true,
provider: "firecrawl",
providerConfig: {
apiKey: "fc-test-key", // pragma: allowlist secret
baseUrl: "https://api.firecrawl.dev",
},
}),
);
expect(res.ok).toBe(true);
});
it("accepts tavily provider config on the plugin-owned path", () => {
const res = validateConfigObjectWithPlugins(
buildWebSearchProviderConfig({
enabled: true,
provider: "tavily",
providerConfig: {
apiKey: {
source: "env",
provider: "default",
id: "TAVILY_API_KEY",
},
baseUrl: "https://api.tavily.com",
},
}),
);
expect(res.ok).toBe(true);
});
it("does not migrate the nonexistent legacy Tavily scoped config", () => {
const res = validateConfigObjectWithPlugins({
tools: {
web: {
search: {
provider: "tavily",
tavily: {
apiKey: "tvly-test-key",
},
},
},
},
});
expect(res.ok).toBe(true);
if (!res.ok) {
return;
}
expect(res.config.tools?.web?.search?.provider).toBe("tavily");
expect((res.config.tools?.web?.search as Record<string, unknown> | undefined)?.tavily).toBe(
undefined,
);
expect(pluginWebSearchApiKey(res.config as Record<string, unknown>, "tavily")).toBe(undefined);
});
it("accepts gemini provider with no extra config", () => {
const res = validateConfigObjectWithPlugins(
buildWebSearchProviderConfig({
provider: "gemini",
}),
);
expect(res.ok).toBe(true);
});
it("accepts brave llm-context mode config", () => {
const res = validateConfigObjectWithPlugins(
buildWebSearchProviderConfig({
provider: "brave",
providerConfig: {
mode: "llm-context",
},
}),
);
expect(res.ok).toBe(true);
});
it("rejects invalid brave mode config values", () => {
const res = validateConfigObjectWithPlugins(
buildWebSearchProviderConfig({
provider: "brave",
providerConfig: {
mode: "invalid-mode",
},
}),
);
expect(res.ok).toBe(false);
});
});
describe("web search provider auto-detection", () => {
const savedEnv = { ...process.env };
beforeEach(() => {
delete process.env.BRAVE_API_KEY;
delete process.env.FIRECRAWL_API_KEY;
delete process.env.GEMINI_API_KEY;
delete process.env.KIMI_API_KEY;
delete process.env.MOONSHOT_API_KEY;
delete process.env.PERPLEXITY_API_KEY;
delete process.env.OPENROUTER_API_KEY;
delete process.env.TAVILY_API_KEY;
delete process.env.XAI_API_KEY;
delete process.env.KIMI_API_KEY;
delete process.env.MOONSHOT_API_KEY;
});
afterEach(() => {
process.env = { ...savedEnv };
vi.restoreAllMocks();
});
it("falls back to brave when no keys available", () => {
expect(resolveSearchProvider({})).toBe("brave");
});
it("auto-detects brave when only BRAVE_API_KEY is set", () => {
process.env.BRAVE_API_KEY = "test-brave-key"; // pragma: allowlist secret
expect(resolveSearchProvider({})).toBe("brave");
});
it("auto-detects gemini when only GEMINI_API_KEY is set", () => {
process.env.GEMINI_API_KEY = "test-gemini-key"; // pragma: allowlist secret
expect(resolveSearchProvider({})).toBe("gemini");
});
it("auto-detects tavily when only TAVILY_API_KEY is set", () => {
process.env.TAVILY_API_KEY = "tvly-test-key"; // pragma: allowlist secret
expect(resolveSearchProvider({})).toBe("tavily");
});
it("auto-detects firecrawl when only FIRECRAWL_API_KEY is set", () => {
process.env.FIRECRAWL_API_KEY = "fc-test-key"; // pragma: allowlist secret
expect(resolveSearchProvider({})).toBe("firecrawl");
});
it("auto-detects kimi when only KIMI_API_KEY is set", () => {
process.env.KIMI_API_KEY = "test-kimi-key"; // pragma: allowlist secret
expect(resolveSearchProvider({})).toBe("kimi");
});
it("auto-detects perplexity when only PERPLEXITY_API_KEY is set", () => {
process.env.PERPLEXITY_API_KEY = "test-perplexity-key"; // pragma: allowlist secret
expect(resolveSearchProvider({})).toBe("perplexity");
});
it("auto-detects perplexity when only OPENROUTER_API_KEY is set", () => {
process.env.OPENROUTER_API_KEY = "sk-or-v1-test"; // pragma: allowlist secret
expect(resolveSearchProvider({})).toBe("perplexity");
});
it("auto-detects grok when only XAI_API_KEY is set", () => {
process.env.XAI_API_KEY = "test-xai-key"; // pragma: allowlist secret
expect(resolveSearchProvider({})).toBe("grok");
});
it("auto-detects kimi when only KIMI_API_KEY is set", () => {
process.env.KIMI_API_KEY = "test-kimi-key"; // pragma: allowlist secret
expect(resolveSearchProvider({})).toBe("kimi");
});
it("auto-detects kimi when only MOONSHOT_API_KEY is set", () => {
process.env.MOONSHOT_API_KEY = "test-moonshot-key"; // pragma: allowlist secret
expect(resolveSearchProvider({})).toBe("kimi");
});
it("follows alphabetical order — brave wins when multiple keys available", () => {
process.env.BRAVE_API_KEY = "test-brave-key"; // pragma: allowlist secret
process.env.GEMINI_API_KEY = "test-gemini-key"; // pragma: allowlist secret
process.env.PERPLEXITY_API_KEY = "test-perplexity-key"; // pragma: allowlist secret
process.env.XAI_API_KEY = "test-xai-key"; // pragma: allowlist secret
expect(resolveSearchProvider({})).toBe("brave");
});
it("gemini wins over grok, kimi, and perplexity when brave unavailable", () => {
process.env.GEMINI_API_KEY = "test-gemini-key"; // pragma: allowlist secret
process.env.PERPLEXITY_API_KEY = "test-perplexity-key"; // pragma: allowlist secret
process.env.XAI_API_KEY = "test-xai-key"; // pragma: allowlist secret
expect(resolveSearchProvider({})).toBe("gemini");
});
it("grok wins over kimi and perplexity when brave and gemini unavailable", () => {
process.env.XAI_API_KEY = "test-xai-key"; // pragma: allowlist secret
process.env.KIMI_API_KEY = "test-kimi-key"; // pragma: allowlist secret
process.env.PERPLEXITY_API_KEY = "test-perplexity-key"; // pragma: allowlist secret
expect(resolveSearchProvider({})).toBe("grok");
});
it("explicit provider always wins regardless of keys", () => {
process.env.BRAVE_API_KEY = "test-brave-key"; // pragma: allowlist secret
expect(
resolveSearchProvider({ provider: "gemini" } as unknown as Parameters<
typeof resolveSearchProvider
>[0]),
).toBe("gemini");
});
});