Files
DeskClaw/tests/unit/sanitize-config.test.ts
2026-03-08 00:00:47 +08:00

298 lines
9.5 KiB
TypeScript

/**
* Tests for openclaw.json config sanitization before Gateway start.
*
* The sanitizeOpenClawConfig() function in openclaw-auth.ts relies on
* Electron-specific helpers (readOpenClawJson / writeOpenClawJson) that
* read from ~/.openclaw/openclaw.json. To avoid mocking Electron + the
* real HOME directory, this test uses a standalone version of the
* sanitization logic that mirrors the production code exactly, operating
* on a temp directory with real file I/O.
*/
import { describe, it, expect, beforeEach, afterEach } from 'vitest';
import { mkdtemp, writeFile, readFile, rm } from 'fs/promises';
import { join } from 'path';
import { tmpdir } from 'os';
let tempDir: string;
let configPath: string;
async function writeConfig(data: unknown): Promise<void> {
await writeFile(configPath, JSON.stringify(data, null, 2), 'utf-8');
}
async function readConfig(): Promise<Record<string, unknown>> {
const raw = await readFile(configPath, 'utf-8');
return JSON.parse(raw);
}
/**
* Standalone mirror of the sanitization logic in openclaw-auth.ts.
* Uses the same blocklist approach as the production code.
*/
async function sanitizeConfig(filePath: string): Promise<boolean> {
let raw: string;
try {
raw = await readFile(filePath, 'utf-8');
} catch {
return false;
}
const config = JSON.parse(raw) as Record<string, unknown>;
let modified = false;
// Mirror of the production blocklist logic
const skills = config.skills;
if (skills && typeof skills === 'object' && !Array.isArray(skills)) {
const skillsObj = skills as Record<string, unknown>;
const KNOWN_INVALID_SKILLS_ROOT_KEYS = ['enabled', 'disabled'];
for (const key of KNOWN_INVALID_SKILLS_ROOT_KEYS) {
if (key in skillsObj) {
delete skillsObj[key];
modified = true;
}
}
}
// Mirror: remove stale tools.web.search.kimi.apiKey when moonshot provider exists.
const providers = ((config.models as Record<string, unknown> | undefined)?.providers as Record<string, unknown> | undefined) || {};
if (providers.moonshot) {
const tools = (config.tools as Record<string, unknown> | undefined) || {};
const web = (tools.web as Record<string, unknown> | undefined) || {};
const search = (web.search as Record<string, unknown> | undefined) || {};
const kimi = (search.kimi as Record<string, unknown> | undefined) || {};
if ('apiKey' in kimi) {
delete kimi.apiKey;
search.kimi = kimi;
web.search = search;
tools.web = web;
config.tools = tools;
modified = true;
}
}
if (modified) {
await writeFile(filePath, JSON.stringify(config, null, 2), 'utf-8');
}
return modified;
}
beforeEach(async () => {
tempDir = await mkdtemp(join(tmpdir(), 'clawx-test-'));
configPath = join(tempDir, 'openclaw.json');
});
afterEach(async () => {
await rm(tempDir, { recursive: true, force: true });
});
describe('sanitizeOpenClawConfig (blocklist approach)', () => {
it('removes skills.enabled at the root level of skills', async () => {
await writeConfig({
skills: {
enabled: true,
entries: {
'my-skill': { enabled: true, apiKey: 'abc' },
},
},
gateway: { mode: 'local' },
});
const modified = await sanitizeConfig(configPath);
expect(modified).toBe(true);
const result = await readConfig();
// Root-level "enabled" should be gone
expect(result.skills).not.toHaveProperty('enabled');
// entries[key].enabled must be preserved
const skills = result.skills as Record<string, unknown>;
const entries = skills.entries as Record<string, Record<string, unknown>>;
expect(entries['my-skill'].enabled).toBe(true);
expect(entries['my-skill'].apiKey).toBe('abc');
// Other top-level sections are untouched
expect(result.gateway).toEqual({ mode: 'local' });
});
it('removes skills.disabled at the root level of skills', async () => {
await writeConfig({
skills: {
disabled: false,
entries: { 'x': { enabled: false } },
},
});
const modified = await sanitizeConfig(configPath);
expect(modified).toBe(true);
const result = await readConfig();
expect(result.skills).not.toHaveProperty('disabled');
const skills = result.skills as Record<string, unknown>;
const entries = skills.entries as Record<string, Record<string, unknown>>;
expect(entries['x'].enabled).toBe(false);
});
it('removes both enabled and disabled when present together', async () => {
await writeConfig({
skills: {
enabled: true,
disabled: false,
entries: { 'a': { enabled: true } },
allowBundled: ['web-search'],
},
});
const modified = await sanitizeConfig(configPath);
expect(modified).toBe(true);
const result = await readConfig();
const skills = result.skills as Record<string, unknown>;
expect(skills).not.toHaveProperty('enabled');
expect(skills).not.toHaveProperty('disabled');
// Valid keys are preserved
expect(skills.allowBundled).toEqual(['web-search']);
expect(skills.entries).toBeDefined();
});
it('does nothing when config is already valid', async () => {
const original = {
skills: {
entries: { 'my-skill': { enabled: true } },
allowBundled: ['web-search'],
},
};
await writeConfig(original);
const modified = await sanitizeConfig(configPath);
expect(modified).toBe(false);
const result = await readConfig();
expect(result).toEqual(original);
});
it('preserves unknown valid keys (forward-compatible)', async () => {
// If OpenClaw adds new valid keys to skills in the future,
// the blocklist approach should NOT strip them.
const original = {
skills: {
entries: { 'x': { enabled: true } },
allowBundled: ['web-search'],
load: { extraDirs: ['/my/dir'], watch: true },
install: { preferBrew: false },
limits: { maxSkillsInPrompt: 5 },
futureNewKey: { some: 'value' }, // hypothetical future key
},
};
await writeConfig(original);
const modified = await sanitizeConfig(configPath);
expect(modified).toBe(false);
const result = await readConfig();
expect(result).toEqual(original);
});
it('handles config with no skills section', async () => {
const original = { gateway: { mode: 'local' } };
await writeConfig(original);
const modified = await sanitizeConfig(configPath);
expect(modified).toBe(false);
});
it('handles empty config', async () => {
await writeConfig({});
const modified = await sanitizeConfig(configPath);
expect(modified).toBe(false);
});
it('returns false for missing config file', async () => {
const modified = await sanitizeConfig(join(tempDir, 'nonexistent.json'));
expect(modified).toBe(false);
});
it('handles skills being an array (no-op, no crash)', async () => {
// Edge case: skills is not an object
await writeConfig({ skills: ['something'] });
const modified = await sanitizeConfig(configPath);
expect(modified).toBe(false);
});
it('preserves all other top-level config sections', async () => {
await writeConfig({
skills: { enabled: true, entries: {} },
channels: { discord: { token: 'abc', enabled: true } },
plugins: { entries: { whatsapp: { enabled: true } } },
gateway: { mode: 'local', auth: { token: 'xyz' } },
agents: { defaults: { model: { primary: 'gpt-4' } } },
models: { providers: { openai: { baseUrl: 'https://api.openai.com' } } },
});
const modified = await sanitizeConfig(configPath);
expect(modified).toBe(true);
const result = await readConfig();
// skills.enabled removed
expect(result.skills).not.toHaveProperty('enabled');
// All other sections unchanged
expect(result.channels).toEqual({ discord: { token: 'abc', enabled: true } });
expect(result.plugins).toEqual({ entries: { whatsapp: { enabled: true } } });
expect(result.gateway).toEqual({ mode: 'local', auth: { token: 'xyz' } });
expect(result.agents).toEqual({ defaults: { model: { primary: 'gpt-4' } } });
});
it('removes tools.web.search.kimi.apiKey when moonshot provider exists', async () => {
await writeConfig({
models: {
providers: {
moonshot: { baseUrl: 'https://api.moonshot.cn/v1', api: 'openai-completions' },
},
},
tools: {
web: {
search: {
kimi: {
apiKey: 'stale-inline-key',
baseUrl: 'https://api.moonshot.cn/v1',
},
},
},
},
});
const modified = await sanitizeConfig(configPath);
expect(modified).toBe(true);
const result = await readConfig();
const kimi = ((((result.tools as Record<string, unknown>).web as Record<string, unknown>).search as Record<string, unknown>).kimi as Record<string, unknown>);
expect(kimi).not.toHaveProperty('apiKey');
expect(kimi.baseUrl).toBe('https://api.moonshot.cn/v1');
});
it('keeps tools.web.search.kimi.apiKey when moonshot provider is absent', async () => {
const original = {
models: {
providers: {
openrouter: { baseUrl: 'https://openrouter.ai/api/v1', api: 'openai-completions' },
},
},
tools: {
web: {
search: {
kimi: {
apiKey: 'should-stay',
},
},
},
},
};
await writeConfig(original);
const modified = await sanitizeConfig(configPath);
expect(modified).toBe(false);
const result = await readConfig();
expect(result).toEqual(original);
});
});