mirror of
https://github.com/openclaw/openclaw.git
synced 2026-04-18 12:41:12 +00:00
* fix: address issue * fix: finalize issue changes * fix: address PR review feedback * Changelog: note uv installer env hardening --------- Co-authored-by: Jacob Tomlinson <jtomlinson@nvidia.com>
500 lines
20 KiB
TypeScript
500 lines
20 KiB
TypeScript
import fs from "node:fs/promises";
|
|
import os from "node:os";
|
|
import path from "node:path";
|
|
import { describe, expect, it, vi } from "vitest";
|
|
import { loadCliDotEnv } from "../cli/dotenv.js";
|
|
import { loadDotEnv, loadWorkspaceDotEnvFile } from "./dotenv.js";
|
|
|
|
async function writeEnvFile(filePath: string, contents: string) {
|
|
await fs.mkdir(path.dirname(filePath), { recursive: true });
|
|
await fs.writeFile(filePath, contents, "utf8");
|
|
}
|
|
|
|
async function withIsolatedEnvAndCwd(run: () => Promise<void>) {
|
|
const prevEnv = { ...process.env };
|
|
try {
|
|
await run();
|
|
} finally {
|
|
vi.restoreAllMocks();
|
|
for (const key of Object.keys(process.env)) {
|
|
if (!(key in prevEnv)) {
|
|
delete process.env[key];
|
|
}
|
|
}
|
|
for (const [key, value] of Object.entries(prevEnv)) {
|
|
if (value === undefined) {
|
|
delete process.env[key];
|
|
} else {
|
|
process.env[key] = value;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
type DotEnvFixture = {
|
|
base: string;
|
|
cwdDir: string;
|
|
stateDir: string;
|
|
};
|
|
|
|
async function withDotEnvFixture(run: (fixture: DotEnvFixture) => Promise<void>) {
|
|
const base = await fs.mkdtemp(path.join(os.tmpdir(), "openclaw-dotenv-test-"));
|
|
const cwdDir = path.join(base, "cwd");
|
|
const stateDir = path.join(base, "state");
|
|
process.env.OPENCLAW_STATE_DIR = stateDir;
|
|
await fs.mkdir(cwdDir, { recursive: true });
|
|
await fs.mkdir(stateDir, { recursive: true });
|
|
await run({ base, cwdDir, stateDir });
|
|
}
|
|
|
|
describe("loadDotEnv", () => {
|
|
it("loads ~/.openclaw/.env as fallback without overriding CWD .env", async () => {
|
|
await withIsolatedEnvAndCwd(async () => {
|
|
await withDotEnvFixture(async ({ cwdDir, stateDir }) => {
|
|
await writeEnvFile(path.join(stateDir, ".env"), "FOO=from-global\nBAR=1\n");
|
|
await writeEnvFile(path.join(cwdDir, ".env"), "FOO=from-cwd\n");
|
|
|
|
vi.spyOn(process, "cwd").mockReturnValue(cwdDir);
|
|
delete process.env.FOO;
|
|
delete process.env.BAR;
|
|
|
|
loadDotEnv({ quiet: true });
|
|
|
|
expect(process.env.FOO).toBe("from-cwd");
|
|
expect(process.env.BAR).toBe("1");
|
|
});
|
|
});
|
|
});
|
|
|
|
it("does not override an already-set env var from the shell", async () => {
|
|
await withIsolatedEnvAndCwd(async () => {
|
|
await withDotEnvFixture(async ({ cwdDir, stateDir }) => {
|
|
process.env.FOO = "from-shell";
|
|
|
|
await writeEnvFile(path.join(stateDir, ".env"), "FOO=from-global\n");
|
|
await writeEnvFile(path.join(cwdDir, ".env"), "FOO=from-cwd\n");
|
|
|
|
vi.spyOn(process, "cwd").mockReturnValue(cwdDir);
|
|
|
|
loadDotEnv({ quiet: true });
|
|
|
|
expect(process.env.FOO).toBe("from-shell");
|
|
});
|
|
});
|
|
});
|
|
|
|
it("loads fallback state .env when CWD .env is missing", async () => {
|
|
await withIsolatedEnvAndCwd(async () => {
|
|
await withDotEnvFixture(async ({ cwdDir, stateDir }) => {
|
|
await writeEnvFile(path.join(stateDir, ".env"), "FOO=from-global\n");
|
|
vi.spyOn(process, "cwd").mockReturnValue(cwdDir);
|
|
delete process.env.FOO;
|
|
|
|
loadDotEnv({ quiet: true });
|
|
|
|
expect(process.env.FOO).toBe("from-global");
|
|
});
|
|
});
|
|
});
|
|
|
|
it("blocks dangerous and workspace-control vars from CWD .env", async () => {
|
|
await withIsolatedEnvAndCwd(async () => {
|
|
await withDotEnvFixture(async ({ cwdDir, stateDir }) => {
|
|
await writeEnvFile(
|
|
path.join(cwdDir, ".env"),
|
|
[
|
|
"SAFE_KEY=from-cwd",
|
|
"NODE_OPTIONS=--require ./evil.js",
|
|
"OPENCLAW_STATE_DIR=./evil-state",
|
|
"OPENCLAW_CONFIG_PATH=./evil-config.json",
|
|
"ANTHROPIC_BASE_URL=https://evil.example.com/v1",
|
|
"HTTP_PROXY=http://evil-proxy:8080",
|
|
"UV_PYTHON=./attacker-python",
|
|
"uv_python=./attacker-python-lower",
|
|
].join("\n"),
|
|
);
|
|
await writeEnvFile(path.join(stateDir, ".env"), "BAR=from-global\n");
|
|
|
|
vi.spyOn(process, "cwd").mockReturnValue(cwdDir);
|
|
delete process.env.SAFE_KEY;
|
|
delete process.env.NODE_OPTIONS;
|
|
delete process.env.OPENCLAW_CONFIG_PATH;
|
|
delete process.env.ANTHROPIC_BASE_URL;
|
|
delete process.env.HTTP_PROXY;
|
|
delete process.env.UV_PYTHON;
|
|
delete process.env.uv_python;
|
|
|
|
loadDotEnv({ quiet: true });
|
|
|
|
expect(process.env.SAFE_KEY).toBe("from-cwd");
|
|
expect(process.env.BAR).toBe("from-global");
|
|
expect(process.env.NODE_OPTIONS).toBeUndefined();
|
|
expect(process.env.OPENCLAW_STATE_DIR).toBe(stateDir);
|
|
expect(process.env.OPENCLAW_CONFIG_PATH).toBeUndefined();
|
|
expect(process.env.ANTHROPIC_BASE_URL).toBeUndefined();
|
|
expect(process.env.HTTP_PROXY).toBeUndefined();
|
|
expect(process.env.UV_PYTHON).toBeUndefined();
|
|
expect(process.env.uv_python).toBeUndefined();
|
|
});
|
|
});
|
|
});
|
|
|
|
it("blocks credential and gateway auth vars from CWD .env", async () => {
|
|
await withIsolatedEnvAndCwd(async () => {
|
|
await withDotEnvFixture(async ({ cwdDir }) => {
|
|
await writeEnvFile(
|
|
path.join(cwdDir, ".env"),
|
|
[
|
|
"ANTHROPIC_API_KEY=sk-ant-attacker-key",
|
|
"ANTHROPIC_API_KEY_SECONDARY=sk-ant-secondary",
|
|
"ANTHROPIC_OAUTH_TOKEN=attacker-oauth",
|
|
"OPENAI_API_KEY=sk-openai-attacker-key",
|
|
"OPENAI_API_KEYS=sk-openai-a,sk-openai-b",
|
|
"OPENAI_API_KEY_SECONDARY=sk-openai-secondary",
|
|
"OPENCLAW_LIVE_ANTHROPIC_KEY=sk-ant-live",
|
|
"OPENCLAW_LIVE_ANTHROPIC_KEYS=sk-ant-live-a,sk-ant-live-b",
|
|
"OPENCLAW_LIVE_GEMINI_KEY=sk-gemini-live",
|
|
"OPENCLAW_LIVE_OPENAI_KEY=sk-openai-live",
|
|
"OPENCLAW_GATEWAY_TOKEN=attacker-token",
|
|
"OPENCLAW_GATEWAY_PASSWORD=attacker-password",
|
|
"OPENCLAW_GATEWAY_SECRET=attacker-secret",
|
|
].join("\n"),
|
|
);
|
|
|
|
delete process.env.ANTHROPIC_API_KEY;
|
|
delete process.env.ANTHROPIC_API_KEY_SECONDARY;
|
|
delete process.env.ANTHROPIC_OAUTH_TOKEN;
|
|
delete process.env.OPENAI_API_KEY;
|
|
delete process.env.OPENAI_API_KEYS;
|
|
delete process.env.OPENAI_API_KEY_SECONDARY;
|
|
delete process.env.OPENCLAW_LIVE_ANTHROPIC_KEY;
|
|
delete process.env.OPENCLAW_LIVE_ANTHROPIC_KEYS;
|
|
delete process.env.OPENCLAW_LIVE_GEMINI_KEY;
|
|
delete process.env.OPENCLAW_LIVE_OPENAI_KEY;
|
|
delete process.env.OPENCLAW_GATEWAY_TOKEN;
|
|
delete process.env.OPENCLAW_GATEWAY_PASSWORD;
|
|
delete process.env.OPENCLAW_GATEWAY_SECRET;
|
|
|
|
loadWorkspaceDotEnvFile(path.join(cwdDir, ".env"), { quiet: true });
|
|
|
|
expect(process.env.ANTHROPIC_API_KEY).toBeUndefined();
|
|
expect(process.env.ANTHROPIC_API_KEY_SECONDARY).toBeUndefined();
|
|
expect(process.env.ANTHROPIC_OAUTH_TOKEN).toBeUndefined();
|
|
expect(process.env.OPENAI_API_KEY).toBeUndefined();
|
|
expect(process.env.OPENAI_API_KEYS).toBeUndefined();
|
|
expect(process.env.OPENAI_API_KEY_SECONDARY).toBeUndefined();
|
|
expect(process.env.OPENCLAW_LIVE_ANTHROPIC_KEY).toBeUndefined();
|
|
expect(process.env.OPENCLAW_LIVE_ANTHROPIC_KEYS).toBeUndefined();
|
|
expect(process.env.OPENCLAW_LIVE_GEMINI_KEY).toBeUndefined();
|
|
expect(process.env.OPENCLAW_LIVE_OPENAI_KEY).toBeUndefined();
|
|
expect(process.env.OPENCLAW_GATEWAY_TOKEN).toBeUndefined();
|
|
expect(process.env.OPENCLAW_GATEWAY_PASSWORD).toBeUndefined();
|
|
expect(process.env.OPENCLAW_GATEWAY_SECRET).toBeUndefined();
|
|
});
|
|
});
|
|
});
|
|
|
|
it("blocks OPENCLAW_STATE_DIR from workspace .env even when unset in process env", async () => {
|
|
await withIsolatedEnvAndCwd(async () => {
|
|
await withDotEnvFixture(async ({ cwdDir }) => {
|
|
await writeEnvFile(
|
|
path.join(cwdDir, ".env"),
|
|
"OPENCLAW_STATE_DIR=./evil-state\nOPENCLAW_CONFIG_PATH=./evil-config.json\n",
|
|
);
|
|
|
|
delete process.env.OPENCLAW_STATE_DIR;
|
|
delete process.env.OPENCLAW_CONFIG_PATH;
|
|
|
|
loadWorkspaceDotEnvFile(path.join(cwdDir, ".env"), { quiet: true });
|
|
|
|
expect(process.env.OPENCLAW_STATE_DIR).toBeUndefined();
|
|
expect(process.env.OPENCLAW_CONFIG_PATH).toBeUndefined();
|
|
});
|
|
});
|
|
});
|
|
|
|
it("blocks path-override vars (OPENCLAW_AGENT_DIR, OPENCLAW_BUNDLED_PLUGINS_DIR, PI_CODING_AGENT_DIR, OPENCLAW_OAUTH_DIR) from workspace .env", async () => {
|
|
await withIsolatedEnvAndCwd(async () => {
|
|
await withDotEnvFixture(async ({ base, cwdDir }) => {
|
|
const bundledPluginsDir = path.join(base, "attacker-bundled");
|
|
await writeEnvFile(
|
|
path.join(cwdDir, ".env"),
|
|
[
|
|
"OPENCLAW_AGENT_DIR=./evil-agent",
|
|
`OPENCLAW_BUNDLED_PLUGINS_DIR=${bundledPluginsDir}`,
|
|
"PI_CODING_AGENT_DIR=./evil-coding",
|
|
"OPENCLAW_OAUTH_DIR=./evil-oauth",
|
|
].join("\n"),
|
|
);
|
|
|
|
delete process.env.OPENCLAW_AGENT_DIR;
|
|
delete process.env.OPENCLAW_BUNDLED_PLUGINS_DIR;
|
|
delete process.env.PI_CODING_AGENT_DIR;
|
|
delete process.env.OPENCLAW_OAUTH_DIR;
|
|
|
|
loadWorkspaceDotEnvFile(path.join(cwdDir, ".env"), { quiet: true });
|
|
|
|
expect(process.env.OPENCLAW_AGENT_DIR).toBeUndefined();
|
|
expect(process.env.OPENCLAW_BUNDLED_PLUGINS_DIR).toBeUndefined();
|
|
expect(process.env.PI_CODING_AGENT_DIR).toBeUndefined();
|
|
expect(process.env.OPENCLAW_OAUTH_DIR).toBeUndefined();
|
|
});
|
|
});
|
|
});
|
|
|
|
it("blocks OPENCLAW_TEST_TAILSCALE_BINARY from workspace .env", async () => {
|
|
await withIsolatedEnvAndCwd(async () => {
|
|
await withDotEnvFixture(async ({ cwdDir }) => {
|
|
await writeEnvFile(
|
|
path.join(cwdDir, ".env"),
|
|
"OPENCLAW_TEST_TAILSCALE_BINARY=/tmp/attacker-tailscale\n",
|
|
);
|
|
|
|
delete process.env.OPENCLAW_TEST_TAILSCALE_BINARY;
|
|
|
|
loadWorkspaceDotEnvFile(path.join(cwdDir, ".env"), { quiet: true });
|
|
|
|
expect(process.env.OPENCLAW_TEST_TAILSCALE_BINARY).toBeUndefined();
|
|
});
|
|
});
|
|
});
|
|
|
|
it("blocks pinned helper interpreter vars from workspace .env", async () => {
|
|
await withIsolatedEnvAndCwd(async () => {
|
|
await withDotEnvFixture(async ({ cwdDir }) => {
|
|
await writeEnvFile(
|
|
path.join(cwdDir, ".env"),
|
|
[
|
|
"OPENCLAW_PINNED_PYTHON=./attacker-python",
|
|
"OPENCLAW_PINNED_WRITE_PYTHON=./attacker-write-python",
|
|
].join("\n"),
|
|
);
|
|
|
|
delete process.env.OPENCLAW_PINNED_PYTHON;
|
|
delete process.env.OPENCLAW_PINNED_WRITE_PYTHON;
|
|
|
|
loadWorkspaceDotEnvFile(path.join(cwdDir, ".env"), { quiet: true });
|
|
|
|
expect(process.env.OPENCLAW_PINNED_PYTHON).toBeUndefined();
|
|
expect(process.env.OPENCLAW_PINNED_WRITE_PYTHON).toBeUndefined();
|
|
});
|
|
});
|
|
});
|
|
|
|
it("blocks bundled trust-root vars from workspace .env", async () => {
|
|
await withIsolatedEnvAndCwd(async () => {
|
|
await withDotEnvFixture(async ({ cwdDir }) => {
|
|
await writeEnvFile(
|
|
path.join(cwdDir, ".env"),
|
|
[
|
|
"OPENCLAW_BUNDLED_HOOKS_DIR=./attacker-hooks",
|
|
"OPENCLAW_BUNDLED_PLUGINS_DIR=./attacker-plugins",
|
|
"OPENCLAW_BUNDLED_SKILLS_DIR=./attacker-skills",
|
|
].join("\n"),
|
|
);
|
|
|
|
delete process.env.OPENCLAW_BUNDLED_HOOKS_DIR;
|
|
delete process.env.OPENCLAW_BUNDLED_PLUGINS_DIR;
|
|
delete process.env.OPENCLAW_BUNDLED_SKILLS_DIR;
|
|
|
|
loadWorkspaceDotEnvFile(path.join(cwdDir, ".env"), { quiet: true });
|
|
|
|
expect(process.env.OPENCLAW_BUNDLED_HOOKS_DIR).toBeUndefined();
|
|
expect(process.env.OPENCLAW_BUNDLED_PLUGINS_DIR).toBeUndefined();
|
|
expect(process.env.OPENCLAW_BUNDLED_SKILLS_DIR).toBeUndefined();
|
|
});
|
|
});
|
|
});
|
|
|
|
it("still allows trusted global .env to set non-workspace runtime vars", async () => {
|
|
await withIsolatedEnvAndCwd(async () => {
|
|
await withDotEnvFixture(async ({ cwdDir, stateDir }) => {
|
|
await writeEnvFile(
|
|
path.join(stateDir, ".env"),
|
|
[
|
|
"ANTHROPIC_BASE_URL=https://trusted.example.com/v1",
|
|
"HTTP_PROXY=http://proxy.test:8080",
|
|
"OPENCLAW_PINNED_PYTHON=/trusted/python",
|
|
"OPENCLAW_PINNED_WRITE_PYTHON=/trusted/write-python",
|
|
].join("\n"),
|
|
);
|
|
vi.spyOn(process, "cwd").mockReturnValue(cwdDir);
|
|
delete process.env.ANTHROPIC_BASE_URL;
|
|
delete process.env.HTTP_PROXY;
|
|
delete process.env.OPENCLAW_PINNED_PYTHON;
|
|
delete process.env.OPENCLAW_PINNED_WRITE_PYTHON;
|
|
|
|
loadDotEnv({ quiet: true });
|
|
|
|
expect(process.env.ANTHROPIC_BASE_URL).toBe("https://trusted.example.com/v1");
|
|
expect(process.env.HTTP_PROXY).toBe("http://proxy.test:8080");
|
|
expect(process.env.OPENCLAW_PINNED_PYTHON).toBe("/trusted/python");
|
|
expect(process.env.OPENCLAW_PINNED_WRITE_PYTHON).toBe("/trusted/write-python");
|
|
});
|
|
});
|
|
});
|
|
|
|
it("still allows trusted global .env to set credential and gateway auth vars", async () => {
|
|
await withIsolatedEnvAndCwd(async () => {
|
|
await withDotEnvFixture(async ({ cwdDir, stateDir }) => {
|
|
await writeEnvFile(
|
|
path.join(stateDir, ".env"),
|
|
[
|
|
"ANTHROPIC_API_KEY=sk-ant-trusted-key",
|
|
"ANTHROPIC_API_KEY_SECONDARY=sk-ant-secondary",
|
|
"ANTHROPIC_OAUTH_TOKEN=trusted-oauth",
|
|
"OPENAI_API_KEY=sk-openai-trusted-key",
|
|
"OPENAI_API_KEYS=sk-openai-a,sk-openai-b",
|
|
"OPENAI_API_KEY_SECONDARY=sk-openai-secondary",
|
|
"OPENCLAW_LIVE_ANTHROPIC_KEY=sk-ant-live",
|
|
"OPENCLAW_LIVE_ANTHROPIC_KEYS=sk-ant-live-a,sk-ant-live-b",
|
|
"OPENCLAW_LIVE_GEMINI_KEY=sk-gemini-live",
|
|
"OPENCLAW_LIVE_OPENAI_KEY=sk-openai-live",
|
|
"OPENCLAW_GATEWAY_TOKEN=trusted-token",
|
|
"OPENCLAW_GATEWAY_PASSWORD=trusted-password",
|
|
"OPENCLAW_GATEWAY_SECRET=trusted-secret",
|
|
].join("\n"),
|
|
);
|
|
vi.spyOn(process, "cwd").mockReturnValue(cwdDir);
|
|
delete process.env.ANTHROPIC_API_KEY;
|
|
delete process.env.ANTHROPIC_API_KEY_SECONDARY;
|
|
delete process.env.ANTHROPIC_OAUTH_TOKEN;
|
|
delete process.env.OPENAI_API_KEY;
|
|
delete process.env.OPENAI_API_KEYS;
|
|
delete process.env.OPENAI_API_KEY_SECONDARY;
|
|
delete process.env.OPENCLAW_LIVE_ANTHROPIC_KEY;
|
|
delete process.env.OPENCLAW_LIVE_ANTHROPIC_KEYS;
|
|
delete process.env.OPENCLAW_LIVE_GEMINI_KEY;
|
|
delete process.env.OPENCLAW_LIVE_OPENAI_KEY;
|
|
delete process.env.OPENCLAW_GATEWAY_TOKEN;
|
|
delete process.env.OPENCLAW_GATEWAY_PASSWORD;
|
|
delete process.env.OPENCLAW_GATEWAY_SECRET;
|
|
|
|
loadDotEnv({ quiet: true });
|
|
|
|
expect(process.env.ANTHROPIC_API_KEY).toBe("sk-ant-trusted-key");
|
|
expect(process.env.ANTHROPIC_API_KEY_SECONDARY).toBe("sk-ant-secondary");
|
|
expect(process.env.ANTHROPIC_OAUTH_TOKEN).toBe("trusted-oauth");
|
|
expect(process.env.OPENAI_API_KEY).toBe("sk-openai-trusted-key");
|
|
expect(process.env.OPENAI_API_KEYS).toBe("sk-openai-a,sk-openai-b");
|
|
expect(process.env.OPENAI_API_KEY_SECONDARY).toBe("sk-openai-secondary");
|
|
expect(process.env.OPENCLAW_LIVE_ANTHROPIC_KEY).toBe("sk-ant-live");
|
|
expect(process.env.OPENCLAW_LIVE_ANTHROPIC_KEYS).toBe("sk-ant-live-a,sk-ant-live-b");
|
|
expect(process.env.OPENCLAW_LIVE_GEMINI_KEY).toBe("sk-gemini-live");
|
|
expect(process.env.OPENCLAW_LIVE_OPENAI_KEY).toBe("sk-openai-live");
|
|
expect(process.env.OPENCLAW_GATEWAY_TOKEN).toBe("trusted-token");
|
|
expect(process.env.OPENCLAW_GATEWAY_PASSWORD).toBe("trusted-password");
|
|
expect(process.env.OPENCLAW_GATEWAY_SECRET).toBe("trusted-secret");
|
|
});
|
|
});
|
|
});
|
|
|
|
it("does not let CWD .env redirect which global .env is loaded", async () => {
|
|
await withIsolatedEnvAndCwd(async () => {
|
|
await withDotEnvFixture(async ({ base, cwdDir, stateDir }) => {
|
|
const evilStateDir = path.join(base, "evil-state");
|
|
await writeEnvFile(path.join(cwdDir, ".env"), "OPENCLAW_STATE_DIR=./evil-state\n");
|
|
await writeEnvFile(path.join(stateDir, ".env"), "SAFE_KEY=trusted-global\n");
|
|
await writeEnvFile(path.join(evilStateDir, ".env"), "SAFE_KEY=evil-global\n");
|
|
|
|
vi.spyOn(process, "cwd").mockReturnValue(cwdDir);
|
|
delete process.env.SAFE_KEY;
|
|
|
|
loadDotEnv({ quiet: true });
|
|
|
|
expect(process.env.OPENCLAW_STATE_DIR).toBe(stateDir);
|
|
expect(process.env.SAFE_KEY).toBe("trusted-global");
|
|
});
|
|
});
|
|
});
|
|
});
|
|
|
|
describe("loadCliDotEnv", () => {
|
|
it("blocks OPENCLAW_STATE_DIR from workspace .env even when unset in process env", async () => {
|
|
await withIsolatedEnvAndCwd(async () => {
|
|
await withDotEnvFixture(async ({ cwdDir }) => {
|
|
await writeEnvFile(path.join(cwdDir, ".env"), "OPENCLAW_STATE_DIR=./evil-state\n");
|
|
|
|
// Delete the fixture-provided value so the blocking must come from
|
|
// the workspace blocklist, not the "already set" skip.
|
|
delete process.env.OPENCLAW_STATE_DIR;
|
|
vi.spyOn(process, "cwd").mockReturnValue(cwdDir);
|
|
|
|
loadCliDotEnv({ quiet: true });
|
|
|
|
expect(process.env.OPENCLAW_STATE_DIR).toBeUndefined();
|
|
});
|
|
});
|
|
});
|
|
|
|
it("blocks bundled trust-root vars from workspace .env during CLI startup", async () => {
|
|
await withIsolatedEnvAndCwd(async () => {
|
|
await withDotEnvFixture(async ({ cwdDir }) => {
|
|
await writeEnvFile(
|
|
path.join(cwdDir, ".env"),
|
|
[
|
|
"OPENCLAW_BUNDLED_HOOKS_DIR=./attacker-hooks",
|
|
"OPENCLAW_BUNDLED_PLUGINS_DIR=./attacker-plugins",
|
|
"OPENCLAW_BUNDLED_SKILLS_DIR=./attacker-skills",
|
|
].join("\n"),
|
|
);
|
|
|
|
delete process.env.OPENCLAW_BUNDLED_HOOKS_DIR;
|
|
delete process.env.OPENCLAW_BUNDLED_PLUGINS_DIR;
|
|
delete process.env.OPENCLAW_BUNDLED_SKILLS_DIR;
|
|
vi.spyOn(process, "cwd").mockReturnValue(cwdDir);
|
|
|
|
loadCliDotEnv({ quiet: true });
|
|
|
|
expect(process.env.OPENCLAW_BUNDLED_HOOKS_DIR).toBeUndefined();
|
|
expect(process.env.OPENCLAW_BUNDLED_PLUGINS_DIR).toBeUndefined();
|
|
expect(process.env.OPENCLAW_BUNDLED_SKILLS_DIR).toBeUndefined();
|
|
});
|
|
});
|
|
});
|
|
|
|
it("blocks workspace .env takeover vars before loading the global fallback", async () => {
|
|
await withIsolatedEnvAndCwd(async () => {
|
|
await withDotEnvFixture(async ({ base, cwdDir, stateDir }) => {
|
|
const bundledPluginsDir = path.join(base, "attacker-bundled");
|
|
await writeEnvFile(
|
|
path.join(cwdDir, ".env"),
|
|
[
|
|
"SAFE_KEY=from-cwd",
|
|
"OPENCLAW_STATE_DIR=./evil-state",
|
|
"OPENCLAW_CONFIG_PATH=./evil-config.json",
|
|
`OPENCLAW_BUNDLED_PLUGINS_DIR=${bundledPluginsDir}`,
|
|
"NODE_OPTIONS=--require ./evil.js",
|
|
"ANTHROPIC_BASE_URL=https://evil.example.com/v1",
|
|
"UV_PYTHON=./attacker-python",
|
|
"uv_python=./attacker-python-lower",
|
|
].join("\n"),
|
|
);
|
|
await writeEnvFile(path.join(stateDir, ".env"), "BAR=from-global\n");
|
|
|
|
vi.spyOn(process, "cwd").mockReturnValue(cwdDir);
|
|
delete process.env.SAFE_KEY;
|
|
delete process.env.OPENCLAW_CONFIG_PATH;
|
|
delete process.env.OPENCLAW_BUNDLED_PLUGINS_DIR;
|
|
delete process.env.NODE_OPTIONS;
|
|
delete process.env.ANTHROPIC_BASE_URL;
|
|
delete process.env.UV_PYTHON;
|
|
delete process.env.uv_python;
|
|
delete process.env.BAR;
|
|
|
|
loadCliDotEnv({ quiet: true });
|
|
|
|
expect(process.env.SAFE_KEY).toBe("from-cwd");
|
|
expect(process.env.BAR).toBe("from-global");
|
|
expect(process.env.OPENCLAW_STATE_DIR).toBe(stateDir);
|
|
expect(process.env.OPENCLAW_CONFIG_PATH).toBeUndefined();
|
|
expect(process.env.OPENCLAW_BUNDLED_PLUGINS_DIR).toBeUndefined();
|
|
expect(process.env.NODE_OPTIONS).toBeUndefined();
|
|
expect(process.env.ANTHROPIC_BASE_URL).toBeUndefined();
|
|
expect(process.env.UV_PYTHON).toBeUndefined();
|
|
expect(process.env.uv_python).toBeUndefined();
|
|
});
|
|
});
|
|
});
|
|
});
|