openclaw/src/infra/provider-usage.auth.normali...

437 lines
14 KiB
TypeScript

import fs from "node:fs/promises";
import os from "node:os";
import path from "node:path";
import { afterAll, beforeAll, describe, expect, it } from "vitest";
import { NON_ENV_SECRETREF_MARKER } from "../agents/model-auth-markers.js";
import { resolveProviderAuths } from "./provider-usage.auth.js";
describe("resolveProviderAuths key normalization", () => {
let suiteRoot = "";
let suiteCase = 0;
const EMPTY_PROVIDER_ENV = {
ZAI_API_KEY: undefined,
Z_AI_API_KEY: undefined,
MINIMAX_API_KEY: undefined,
MINIMAX_CODE_PLAN_KEY: undefined,
XIAOMI_API_KEY: undefined,
} satisfies Record<string, string | undefined>;
beforeAll(async () => {
suiteRoot = await fs.mkdtemp(path.join(os.tmpdir(), "openclaw-provider-auth-suite-"));
});
afterAll(async () => {
await fs.rm(suiteRoot, { recursive: true, force: true });
suiteRoot = "";
suiteCase = 0;
});
async function withSuiteHome<T>(
fn: (home: string) => Promise<T>,
env: Record<string, string | undefined>,
): Promise<T> {
const base = path.join(suiteRoot, `case-${++suiteCase}`);
await fs.mkdir(base, { recursive: true });
await fs.mkdir(path.join(base, ".openclaw", "agents", "main", "sessions"), { recursive: true });
const keysToRestore = new Set<string>([
"HOME",
"USERPROFILE",
"HOMEDRIVE",
"HOMEPATH",
"OPENCLAW_HOME",
"OPENCLAW_STATE_DIR",
...Object.keys(env),
]);
const snapshot: Record<string, string | undefined> = {};
for (const key of keysToRestore) {
snapshot[key] = process.env[key];
}
process.env.HOME = base;
process.env.USERPROFILE = base;
delete process.env.OPENCLAW_HOME;
process.env.OPENCLAW_STATE_DIR = path.join(base, ".openclaw");
for (const [key, value] of Object.entries(env)) {
if (value === undefined) {
delete process.env[key];
} else {
process.env[key] = value;
}
}
try {
return await fn(base);
} finally {
for (const [key, value] of Object.entries(snapshot)) {
if (value === undefined) {
delete process.env[key];
} else {
process.env[key] = value;
}
}
}
}
async function writeAuthProfiles(home: string, profiles: Record<string, unknown>) {
const agentDir = path.join(home, ".openclaw", "agents", "main", "agent");
await fs.mkdir(agentDir, { recursive: true });
await fs.writeFile(
path.join(agentDir, "auth-profiles.json"),
`${JSON.stringify({ version: 1, profiles }, null, 2)}\n`,
"utf8",
);
}
async function writeConfig(home: string, config: Record<string, unknown>) {
const stateDir = path.join(home, ".openclaw");
await fs.mkdir(stateDir, { recursive: true });
await fs.writeFile(
path.join(stateDir, "openclaw.json"),
`${JSON.stringify(config, null, 2)}\n`,
"utf8",
);
}
async function writeProfileOrder(home: string, provider: string, profileIds: string[]) {
const agentDir = path.join(home, ".openclaw", "agents", "main", "agent");
const parsed = JSON.parse(
await fs.readFile(path.join(agentDir, "auth-profiles.json"), "utf8"),
) as Record<string, unknown>;
const order = (parsed.order && typeof parsed.order === "object" ? parsed.order : {}) as Record<
string,
unknown
>;
order[provider] = profileIds;
parsed.order = order;
await fs.writeFile(
path.join(agentDir, "auth-profiles.json"),
`${JSON.stringify(parsed, null, 2)}\n`,
);
}
async function writeLegacyPiAuth(home: string, raw: string) {
const legacyDir = path.join(home, ".pi", "agent");
await fs.mkdir(legacyDir, { recursive: true });
await fs.writeFile(path.join(legacyDir, "auth.json"), raw, "utf8");
}
function createTestModelDefinition() {
return {
id: "test-model",
name: "Test Model",
reasoning: false,
input: ["text"],
cost: { input: 0, output: 0, cacheRead: 0, cacheWrite: 0 },
contextWindow: 1024,
maxTokens: 256,
};
}
async function resolveMinimaxAuthFromConfiguredKey(apiKey: string) {
return await withSuiteHome(
async (home) => {
await writeConfig(home, {
models: {
providers: {
minimax: {
baseUrl: "https://api.minimaxi.com",
models: [createTestModelDefinition()],
apiKey,
},
},
},
});
return await resolveProviderAuths({
providers: ["minimax"],
});
},
{
...EMPTY_PROVIDER_ENV,
},
);
}
async function expectResolvedAuthsFromSuiteHome(params: {
providers: Parameters<typeof resolveProviderAuths>[0]["providers"];
expected: Awaited<ReturnType<typeof resolveProviderAuths>>;
env?: Record<string, string | undefined>;
setup?: (home: string) => Promise<void>;
}) {
await withSuiteHome(
async (home) => {
await params.setup?.(home);
const auths = await resolveProviderAuths({
providers: params.providers,
});
expect(auths).toEqual(params.expected);
},
{
...EMPTY_PROVIDER_ENV,
...params.env,
},
);
}
it.each([
{
name: "strips embedded CR/LF from env keys",
providers: ["zai", "minimax", "xiaomi"] as const,
env: {
ZAI_API_KEY: "zai-\r\nkey",
MINIMAX_API_KEY: "minimax-\r\nkey",
XIAOMI_API_KEY: "xiaomi-\r\nkey",
},
expected: [
{ provider: "zai", token: "zai-key" },
{ provider: "minimax", token: "minimax-key" },
{ provider: "xiaomi", token: "xiaomi-key" },
],
},
{
name: "accepts z-ai env alias and normalizes embedded CR/LF",
providers: ["zai"] as const,
env: {
Z_AI_API_KEY: "zai-\r\nkey",
},
expected: [{ provider: "zai", token: "zai-key" }],
},
{
name: "prefers ZAI_API_KEY over the z-ai alias when both are set",
providers: ["zai"] as const,
env: {
ZAI_API_KEY: "direct-zai-key",
Z_AI_API_KEY: "alias-zai-key",
},
expected: [{ provider: "zai", token: "direct-zai-key" }],
},
{
name: "prefers MINIMAX_CODE_PLAN_KEY over MINIMAX_API_KEY",
providers: ["minimax"] as const,
env: {
MINIMAX_CODE_PLAN_KEY: "code-plan-key",
MINIMAX_API_KEY: "api-key",
},
expected: [{ provider: "minimax", token: "code-plan-key" }],
},
])("$name", async ({ providers, env, expected }) => {
await expectResolvedAuthsFromSuiteHome({ providers: [...providers], env, expected });
});
it("strips embedded CR/LF from stored auth profiles (token + api_key)", async () => {
await expectResolvedAuthsFromSuiteHome({
providers: ["minimax", "xiaomi"],
setup: async (home) => {
await writeAuthProfiles(home, {
"minimax:default": { type: "token", provider: "minimax", token: "mini-\r\nmax" },
"xiaomi:default": { type: "api_key", provider: "xiaomi", key: "xiao-\r\nmi" },
});
},
expected: [
{ provider: "minimax", token: "mini-max" },
{ provider: "xiaomi", token: "xiao-mi" },
],
});
});
it("returns injected auth values unchanged", async () => {
const auths = await resolveProviderAuths({
providers: ["anthropic"],
auth: [{ provider: "anthropic", token: "token-1", accountId: "acc-1" }],
});
expect(auths).toEqual([{ provider: "anthropic", token: "token-1", accountId: "acc-1" }]);
});
it("falls back to legacy .pi auth file for zai keys even after os.homedir() is primed", async () => {
// Prime os.homedir() to simulate long-lived workers that may have touched it before HOME changes.
os.homedir();
await expectResolvedAuthsFromSuiteHome({
providers: ["zai"],
setup: async (home) => {
await writeLegacyPiAuth(
home,
`${JSON.stringify({ "z-ai": { access: "legacy-zai-key" } }, null, 2)}\n`,
);
},
expected: [{ provider: "zai", token: "legacy-zai-key" }],
});
});
it.each([
{
name: "extracts google oauth token from JSON payload in token profiles",
token: '{"token":"google-oauth-token"}',
expectedToken: "google-oauth-token",
},
{
name: "keeps raw google token when token payload is not JSON",
token: "plain-google-token",
expectedToken: "plain-google-token",
},
])("$name", async ({ token, expectedToken }) => {
await expectResolvedAuthsFromSuiteHome({
providers: ["google-gemini-cli"],
setup: async (home) => {
await writeAuthProfiles(home, {
"google-gemini-cli:default": {
type: "token",
provider: "google-gemini-cli",
token,
},
});
},
expected: [{ provider: "google-gemini-cli", token: expectedToken }],
});
});
it("uses config api keys when env and profiles are missing", async () => {
await expectResolvedAuthsFromSuiteHome({
providers: ["zai", "minimax", "xiaomi"],
setup: async (home) => {
const modelDef = {
id: "test-model",
name: "Test Model",
reasoning: false,
input: ["text"],
cost: { input: 0, output: 0, cacheRead: 0, cacheWrite: 0 },
contextWindow: 1024,
maxTokens: 256,
};
await writeConfig(home, {
models: {
providers: {
zai: {
baseUrl: "https://api.z.ai",
models: [modelDef],
apiKey: "cfg-zai-key", // pragma: allowlist secret
},
minimax: {
baseUrl: "https://api.minimaxi.com",
models: [modelDef],
apiKey: "cfg-minimax-key", // pragma: allowlist secret
},
xiaomi: {
baseUrl: "https://api.xiaomi.example",
models: [modelDef],
apiKey: "cfg-xiaomi-key", // pragma: allowlist secret
},
},
},
});
},
expected: [
{ provider: "zai", token: "cfg-zai-key" },
{ provider: "minimax", token: "cfg-minimax-key" },
{ provider: "xiaomi", token: "cfg-xiaomi-key" },
],
});
});
it("returns no auth when providers have no configured credentials", async () => {
await expectResolvedAuthsFromSuiteHome({
providers: ["zai", "minimax", "xiaomi"],
expected: [],
});
});
it("uses zai api_key auth profiles when env and config are missing", async () => {
await expectResolvedAuthsFromSuiteHome({
providers: ["zai"],
setup: async (home) => {
await writeAuthProfiles(home, {
"zai:default": { type: "api_key", provider: "zai", key: "profile-zai-key" },
});
},
expected: [{ provider: "zai", token: "profile-zai-key" }],
});
});
it("ignores invalid legacy z-ai auth files", async () => {
await expectResolvedAuthsFromSuiteHome({
providers: ["zai"],
setup: async (home) => {
await writeLegacyPiAuth(home, "{not-json");
},
expected: [],
});
});
it("discovers oauth provider from config but skips mismatched profile providers", async () => {
await withSuiteHome(async (home) => {
await writeConfig(home, {
auth: {
profiles: {
"anthropic:default": { provider: "anthropic", mode: "token" },
},
},
});
await writeAuthProfiles(home, {
"anthropic:default": {
type: "token",
provider: "zai",
token: "mismatched-provider-token",
},
});
const auths = await resolveProviderAuths({
providers: ["anthropic"],
});
expect(auths).toEqual([]);
}, {});
});
it("skips providers without oauth-compatible profiles", async () => {
await withSuiteHome(async () => {
const auths = await resolveProviderAuths({
providers: ["anthropic"],
});
expect(auths).toEqual([]);
}, {});
});
it("skips oauth profiles that resolve without an api key and uses later profiles", async () => {
await withSuiteHome(async (home) => {
await writeAuthProfiles(home, {
"anthropic:empty": {
type: "token",
provider: "anthropic",
token: "expired-token",
expires: Date.now() - 60_000,
},
"anthropic:valid": { type: "token", provider: "anthropic", token: "anthropic-token" },
});
await writeProfileOrder(home, "anthropic", ["anthropic:empty", "anthropic:valid"]);
const auths = await resolveProviderAuths({
providers: ["anthropic"],
});
expect(auths).toEqual([{ provider: "anthropic", token: "anthropic-token" }]);
}, {});
});
it("skips api_key entries in oauth token resolution order", async () => {
await withSuiteHome(async (home) => {
await writeAuthProfiles(home, {
"anthropic:api": { type: "api_key", provider: "anthropic", key: "api-key-1" },
"anthropic:token": { type: "token", provider: "anthropic", token: "token-1" },
});
await writeProfileOrder(home, "anthropic", ["anthropic:api", "anthropic:token"]);
const auths = await resolveProviderAuths({
providers: ["anthropic"],
});
expect(auths).toEqual([{ provider: "anthropic", token: "token-1" }]);
}, {});
});
it("ignores marker-backed config keys for provider usage auth resolution", async () => {
const auths = await resolveMinimaxAuthFromConfiguredKey(NON_ENV_SECRETREF_MARKER);
expect(auths).toEqual([]);
});
it("keeps all-caps plaintext config keys eligible for provider usage auth resolution", async () => {
const auths = await resolveMinimaxAuthFromConfiguredKey("ALLCAPS_SAMPLE");
expect(auths).toEqual([{ provider: "minimax", token: "ALLCAPS_SAMPLE" }]);
});
});