mirror of
https://github.com/openclaw/openclaw.git
synced 2026-03-17 04:50:51 +00:00
286 lines
8.9 KiB
TypeScript
286 lines
8.9 KiB
TypeScript
import fs from "node:fs/promises";
|
|
import os from "node:os";
|
|
import path from "node:path";
|
|
import { afterAll, beforeAll, describe, expect, it } from "vitest";
|
|
import {
|
|
connectOk,
|
|
installGatewayTestHooks,
|
|
rpcReq,
|
|
startServerWithClient,
|
|
testState,
|
|
writeSessionStore,
|
|
} from "./test-helpers.js";
|
|
|
|
installGatewayTestHooks({ scope: "suite" });
|
|
|
|
let startedServer: Awaited<ReturnType<typeof startServerWithClient>> | null = null;
|
|
let sharedTempRoot: string;
|
|
|
|
function requireWs(): Awaited<ReturnType<typeof startServerWithClient>>["ws"] {
|
|
if (!startedServer) {
|
|
throw new Error("gateway test server not started");
|
|
}
|
|
return startedServer.ws;
|
|
}
|
|
|
|
beforeAll(async () => {
|
|
sharedTempRoot = await fs.mkdtemp(path.join(os.tmpdir(), "openclaw-sessions-config-"));
|
|
startedServer = await startServerWithClient(undefined, { controlUiEnabled: true });
|
|
await connectOk(requireWs());
|
|
});
|
|
|
|
afterAll(async () => {
|
|
if (!startedServer) {
|
|
return;
|
|
}
|
|
startedServer.ws.close();
|
|
await startedServer.server.close();
|
|
startedServer = null;
|
|
await fs.rm(sharedTempRoot, { recursive: true, force: true });
|
|
});
|
|
|
|
async function resetTempDir(name: string): Promise<string> {
|
|
const dir = path.join(sharedTempRoot, name);
|
|
await fs.rm(dir, { recursive: true, force: true });
|
|
await fs.mkdir(dir, { recursive: true });
|
|
return dir;
|
|
}
|
|
|
|
async function getConfigHash() {
|
|
const current = await rpcReq<{
|
|
hash?: string;
|
|
}>(requireWs(), "config.get", {});
|
|
expect(current.ok).toBe(true);
|
|
expect(typeof current.payload?.hash).toBe("string");
|
|
return String(current.payload?.hash);
|
|
}
|
|
|
|
async function expectSchemaLookupInvalid(path: unknown) {
|
|
const res = await rpcReq<{ ok?: boolean }>(requireWs(), "config.schema.lookup", { path });
|
|
expect(res.ok).toBe(false);
|
|
expect(res.error?.message ?? "").toContain("invalid config.schema.lookup params");
|
|
}
|
|
|
|
describe("gateway config methods", () => {
|
|
it("round-trips config.set and returns the live config path", async () => {
|
|
const { createConfigIO } = await import("../config/config.js");
|
|
const current = await rpcReq<{
|
|
raw?: unknown;
|
|
hash?: string;
|
|
config?: Record<string, unknown>;
|
|
}>(requireWs(), "config.get", {});
|
|
expect(current.ok).toBe(true);
|
|
expect(typeof current.payload?.hash).toBe("string");
|
|
expect(current.payload?.config).toBeTruthy();
|
|
|
|
const res = await rpcReq<{
|
|
ok?: boolean;
|
|
path?: string;
|
|
config?: Record<string, unknown>;
|
|
}>(requireWs(), "config.set", {
|
|
raw: JSON.stringify(current.payload?.config ?? {}, null, 2),
|
|
baseHash: current.payload?.hash,
|
|
});
|
|
|
|
expect(res.ok).toBe(true);
|
|
expect(res.payload?.path).toBe(createConfigIO().configPath);
|
|
expect(res.payload?.config).toBeTruthy();
|
|
});
|
|
|
|
it("returns config.set validation details in the top-level error message", async () => {
|
|
const res = await rpcReq<{
|
|
ok?: boolean;
|
|
error?: {
|
|
message?: string;
|
|
};
|
|
}>(requireWs(), "config.set", {
|
|
raw: JSON.stringify({ gateway: { bind: 123 } }),
|
|
baseHash: await getConfigHash(),
|
|
});
|
|
const error = res.error as
|
|
| {
|
|
message?: string;
|
|
details?: {
|
|
issues?: Array<{ path?: string; message?: string }>;
|
|
};
|
|
}
|
|
| undefined;
|
|
|
|
expect(res.ok).toBe(false);
|
|
expect(error?.message ?? "").toContain("invalid config:");
|
|
expect(error?.message ?? "").toContain("gateway.bind");
|
|
expect(error?.message ?? "").toContain("allowed:");
|
|
expect(error?.details?.issues?.[0]?.path).toBe("gateway.bind");
|
|
});
|
|
|
|
it("returns a path-scoped config schema lookup", async () => {
|
|
const res = await rpcReq<{
|
|
path: string;
|
|
hintPath?: string;
|
|
children?: Array<{ key: string; path: string; required: boolean; hintPath?: string }>;
|
|
schema?: { properties?: unknown };
|
|
}>(requireWs(), "config.schema.lookup", {
|
|
path: "gateway.auth",
|
|
});
|
|
|
|
expect(res.ok).toBe(true);
|
|
expect(res.payload?.path).toBe("gateway.auth");
|
|
expect(res.payload?.hintPath).toBe("gateway.auth");
|
|
const tokenChild = res.payload?.children?.find((child) => child.key === "token");
|
|
expect(tokenChild).toMatchObject({
|
|
key: "token",
|
|
path: "gateway.auth.token",
|
|
hintPath: "gateway.auth.token",
|
|
});
|
|
expect(res.payload?.schema?.properties).toBeUndefined();
|
|
});
|
|
|
|
it("rejects config.schema.lookup when the path is missing", async () => {
|
|
const res = await rpcReq<{ ok?: boolean }>(requireWs(), "config.schema.lookup", {
|
|
path: "gateway.notReal.path",
|
|
});
|
|
|
|
expect(res.ok).toBe(false);
|
|
expect(res.error?.message).toBe("config schema path not found");
|
|
});
|
|
|
|
it.each([
|
|
{ name: "rejects config.schema.lookup when the path is only whitespace", path: " " },
|
|
{
|
|
name: "rejects config.schema.lookup when the path exceeds the protocol limit",
|
|
path: `gateway.${"a".repeat(1020)}`,
|
|
},
|
|
{
|
|
name: "rejects config.schema.lookup when the path contains invalid characters",
|
|
path: "gateway.auth\nspoof",
|
|
},
|
|
{
|
|
name: "rejects config.schema.lookup when the path is not a string",
|
|
path: 42,
|
|
},
|
|
])("$name", async ({ path }) => {
|
|
await expectSchemaLookupInvalid(path);
|
|
});
|
|
|
|
it("rejects prototype-chain config.schema.lookup paths without reflecting them", async () => {
|
|
const res = await rpcReq<{ ok?: boolean }>(requireWs(), "config.schema.lookup", {
|
|
path: "constructor",
|
|
});
|
|
|
|
expect(res.ok).toBe(false);
|
|
expect(res.error?.message).toBe("config schema path not found");
|
|
});
|
|
|
|
it("rejects config.patch when raw is null", async () => {
|
|
const res = await rpcReq<{ ok?: boolean }>(requireWs(), "config.patch", {
|
|
raw: "null",
|
|
baseHash: await getConfigHash(),
|
|
});
|
|
expect(res.ok).toBe(false);
|
|
expect(res.error?.message ?? "").toContain("raw must be an object");
|
|
});
|
|
});
|
|
|
|
describe("gateway server sessions", () => {
|
|
it("filters sessions by agentId", async () => {
|
|
const dir = await resetTempDir("agents");
|
|
testState.sessionConfig = {
|
|
store: path.join(dir, "{agentId}", "sessions.json"),
|
|
};
|
|
testState.agentsConfig = {
|
|
list: [{ id: "home", default: true }, { id: "work" }],
|
|
};
|
|
const homeDir = path.join(dir, "home");
|
|
const workDir = path.join(dir, "work");
|
|
await fs.mkdir(homeDir, { recursive: true });
|
|
await fs.mkdir(workDir, { recursive: true });
|
|
await writeSessionStore({
|
|
storePath: path.join(homeDir, "sessions.json"),
|
|
agentId: "home",
|
|
entries: {
|
|
main: {
|
|
sessionId: "sess-home-main",
|
|
updatedAt: Date.now(),
|
|
},
|
|
"discord:group:dev": {
|
|
sessionId: "sess-home-group",
|
|
updatedAt: Date.now() - 1000,
|
|
},
|
|
},
|
|
});
|
|
await writeSessionStore({
|
|
storePath: path.join(workDir, "sessions.json"),
|
|
agentId: "work",
|
|
entries: {
|
|
main: {
|
|
sessionId: "sess-work-main",
|
|
updatedAt: Date.now(),
|
|
},
|
|
},
|
|
});
|
|
|
|
const homeSessions = await rpcReq<{
|
|
sessions: Array<{ key: string }>;
|
|
}>(requireWs(), "sessions.list", {
|
|
includeGlobal: false,
|
|
includeUnknown: false,
|
|
agentId: "home",
|
|
});
|
|
expect(homeSessions.ok).toBe(true);
|
|
expect(homeSessions.payload?.sessions.map((s) => s.key).toSorted()).toEqual([
|
|
"agent:home:discord:group:dev",
|
|
"agent:home:main",
|
|
]);
|
|
|
|
const workSessions = await rpcReq<{
|
|
sessions: Array<{ key: string }>;
|
|
}>(requireWs(), "sessions.list", {
|
|
includeGlobal: false,
|
|
includeUnknown: false,
|
|
agentId: "work",
|
|
});
|
|
expect(workSessions.ok).toBe(true);
|
|
expect(workSessions.payload?.sessions.map((s) => s.key)).toEqual(["agent:work:main"]);
|
|
});
|
|
|
|
it("resolves and patches main alias to default agent main key", async () => {
|
|
const dir = await resetTempDir("main-alias");
|
|
const storePath = path.join(dir, "sessions.json");
|
|
testState.sessionStorePath = storePath;
|
|
testState.agentsConfig = { list: [{ id: "ops", default: true }] };
|
|
testState.sessionConfig = { mainKey: "work" };
|
|
|
|
await writeSessionStore({
|
|
storePath,
|
|
agentId: "ops",
|
|
mainKey: "work",
|
|
entries: {
|
|
main: {
|
|
sessionId: "sess-ops-main",
|
|
updatedAt: Date.now(),
|
|
},
|
|
},
|
|
});
|
|
|
|
const resolved = await rpcReq<{ ok: true; key: string }>(requireWs(), "sessions.resolve", {
|
|
key: "main",
|
|
});
|
|
expect(resolved.ok).toBe(true);
|
|
expect(resolved.payload?.key).toBe("agent:ops:work");
|
|
|
|
const patched = await rpcReq<{ ok: true; key: string }>(requireWs(), "sessions.patch", {
|
|
key: "main",
|
|
thinkingLevel: "medium",
|
|
});
|
|
expect(patched.ok).toBe(true);
|
|
expect(patched.payload?.key).toBe("agent:ops:work");
|
|
|
|
const stored = JSON.parse(await fs.readFile(storePath, "utf-8")) as Record<
|
|
string,
|
|
{ thinkingLevel?: string }
|
|
>;
|
|
expect(stored["agent:ops:work"]?.thinkingLevel).toBe("medium");
|
|
expect(stored.main).toBeUndefined();
|
|
});
|
|
});
|