Files
openclaw/src/commands/doctor.warns-state-directory-is-missing.e2e.test.ts
2026-03-26 19:16:43 +00:00

170 lines
5.2 KiB
TypeScript

import fs from "node:fs";
import os from "node:os";
import path from "node:path";
import { beforeEach, describe, expect, it } from "vitest";
import { createDoctorRuntime, mockDoctorConfigSnapshot } from "./doctor.e2e-harness.js";
import { loadDoctorCommandForTest, terminalNoteMock } from "./doctor.note-test-helpers.js";
import "./doctor.fast-path-mocks.js";
let doctorCommand: typeof import("./doctor.js").doctorCommand;
describe("doctor command", () => {
beforeEach(async () => {
doctorCommand = await loadDoctorCommandForTest({
unmockModules: ["./doctor-state-integrity.js"],
});
});
it("warns when the state directory is missing", async () => {
mockDoctorConfigSnapshot();
const missingDir = fs.mkdtempSync(path.join(os.tmpdir(), "openclaw-missing-state-"));
fs.rmSync(missingDir, { recursive: true, force: true });
process.env.OPENCLAW_STATE_DIR = missingDir;
await doctorCommand(createDoctorRuntime(), {
nonInteractive: true,
workspaceSuggestions: false,
});
const stateNote = terminalNoteMock.mock.calls.find(([message]) =>
String(message).includes("state directory missing"),
);
expect(stateNote).toBeTruthy();
expect(String(stateNote?.[0])).toContain("CRITICAL");
});
it("warns about opencode provider overrides", async () => {
mockDoctorConfigSnapshot({
config: {
models: {
providers: {
opencode: {
api: "openai-completions",
baseUrl: "https://opencode.ai/zen/v1",
},
"opencode-go": {
api: "openai-completions",
baseUrl: "https://opencode.ai/zen/go/v1",
},
},
},
},
});
await doctorCommand(createDoctorRuntime(), {
nonInteractive: true,
workspaceSuggestions: false,
});
const warned = terminalNoteMock.mock.calls.some(
([message, title]) =>
title === "OpenCode" &&
String(message).includes("models.providers.opencode") &&
String(message).includes("models.providers.opencode-go"),
);
expect(warned).toBe(true);
});
it("skips gateway auth warning when OPENCLAW_GATEWAY_TOKEN is set", async () => {
mockDoctorConfigSnapshot({
config: {
gateway: { mode: "local" },
},
});
const prevToken = process.env.OPENCLAW_GATEWAY_TOKEN;
process.env.OPENCLAW_GATEWAY_TOKEN = "env-token-1234567890";
try {
await doctorCommand(createDoctorRuntime(), {
nonInteractive: true,
workspaceSuggestions: false,
});
} finally {
if (prevToken === undefined) {
delete process.env.OPENCLAW_GATEWAY_TOKEN;
} else {
process.env.OPENCLAW_GATEWAY_TOKEN = prevToken;
}
}
const warned = terminalNoteMock.mock.calls.some(([message]) =>
String(message).includes("Gateway auth is off or missing a token"),
);
expect(warned).toBe(false);
});
it("warns when token and password are both configured and gateway.auth.mode is unset", async () => {
mockDoctorConfigSnapshot({
config: {
gateway: {
mode: "local",
auth: {
token: "token-value",
password: "password-value", // pragma: allowlist secret
},
},
},
});
await doctorCommand(createDoctorRuntime(), {
nonInteractive: true,
workspaceSuggestions: false,
});
const gatewayAuthNote = terminalNoteMock.mock.calls.find((call) => call[1] === "Gateway auth");
expect(gatewayAuthNote).toBeTruthy();
expect(String(gatewayAuthNote?.[0])).toContain("gateway.auth.mode is unset");
expect(String(gatewayAuthNote?.[0])).toContain("openclaw config set gateway.auth.mode token");
expect(String(gatewayAuthNote?.[0])).toContain(
"openclaw config set gateway.auth.mode password",
);
});
it("keeps doctor read-only when gateway token is SecretRef-managed but unresolved", async () => {
mockDoctorConfigSnapshot({
config: {
gateway: {
mode: "local",
auth: {
mode: "token",
token: {
source: "env",
provider: "default",
id: "OPENCLAW_GATEWAY_TOKEN",
},
},
},
secrets: {
providers: {
default: { source: "env" },
},
},
},
});
const previousToken = process.env.OPENCLAW_GATEWAY_TOKEN;
delete process.env.OPENCLAW_GATEWAY_TOKEN;
try {
await doctorCommand(createDoctorRuntime(), {
nonInteractive: true,
workspaceSuggestions: false,
});
} finally {
if (previousToken === undefined) {
delete process.env.OPENCLAW_GATEWAY_TOKEN;
} else {
process.env.OPENCLAW_GATEWAY_TOKEN = previousToken;
}
}
const gatewayAuthNote = terminalNoteMock.mock.calls.find((call) => call[1] === "Gateway auth");
expect(gatewayAuthNote).toBeTruthy();
expect(String(gatewayAuthNote?.[0])).toContain(
"Gateway token is managed via SecretRef and is currently unavailable.",
);
expect(String(gatewayAuthNote?.[0])).toContain(
"Doctor will not overwrite gateway.auth.token with a plaintext value.",
);
});
});