mirror of
https://github.com/openclaw/openclaw.git
synced 2026-05-11 08:31:41 +00:00
Secrets: add inline allowlist review set (#38314)
* Secrets: add inline allowlist review set * Secrets: narrow detect-secrets file exclusions * Secrets: exclude Docker fingerprint false positive * Secrets: allowlist test and docs false positives * Secrets: refresh baseline after allowlist updates * Secrets: fix gateway chat fixture pragma * Secrets: format pre-commit config * Android: keep talk mode fixture JSON valid * Feishu: rely on client timeout injection * Secrets: allowlist provider auth test fixtures * Secrets: allowlist onboard search fixtures * Secrets: allowlist onboard mode fixture * Secrets: allowlist gateway auth mode fixture * Secrets: allowlist APNS wake test key * Secrets: allowlist gateway reload fixtures * Secrets: allowlist moonshot video fixture * Secrets: allowlist auto audio fixture * Secrets: allowlist tiny audio fixture * Secrets: allowlist embeddings fixtures * Secrets: allowlist resolve fixtures * Secrets: allowlist target registry pattern fixtures * Secrets: allowlist gateway chat env fixture * Secrets: refresh baseline after fixture allowlists * Secrets: reapply gateway chat env allowlist * Secrets: reapply gateway chat env allowlist * Secrets: stabilize gateway chat env allowlist * Secrets: allowlist runtime snapshot save fixture * Secrets: allowlist oauth profile fixtures * Secrets: allowlist compaction identifier fixture * Secrets: allowlist model auth fixture * Secrets: allowlist model status fixtures * Secrets: allowlist custom onboarding fixture * Secrets: allowlist mattermost token summary fixtures * Secrets: allowlist gateway auth suite fixtures * Secrets: allowlist channel summary fixture * Secrets: allowlist provider usage auth fixtures * Secrets: allowlist media proxy fixture * Secrets: allowlist secrets audit fixtures * Secrets: refresh baseline after final fixture allowlists * Feishu: prefer explicit client timeout * Feishu: test direct timeout precedence
This commit is contained in:
@@ -65,7 +65,7 @@ describe("resolveApiKeyForProfile config compatibility", () => {
|
||||
profileId,
|
||||
});
|
||||
expect(result).toEqual({
|
||||
apiKey: "tok-123",
|
||||
apiKey: "tok-123", // pragma: allowlist secret
|
||||
provider: "anthropic",
|
||||
email: undefined,
|
||||
});
|
||||
@@ -124,7 +124,7 @@ describe("resolveApiKeyForProfile config compatibility", () => {
|
||||
});
|
||||
// token ↔ oauth are bidirectionally compatible bearer-token auth paths.
|
||||
expect(result).toEqual({
|
||||
apiKey: "access-123",
|
||||
apiKey: "access-123", // pragma: allowlist secret
|
||||
provider: "anthropic",
|
||||
email: undefined,
|
||||
});
|
||||
@@ -145,7 +145,7 @@ describe("resolveApiKeyForProfile token expiry handling", () => {
|
||||
}),
|
||||
});
|
||||
expect(result).toEqual({
|
||||
apiKey: "tok-123",
|
||||
apiKey: "tok-123", // pragma: allowlist secret
|
||||
provider: "anthropic",
|
||||
email: undefined,
|
||||
});
|
||||
@@ -165,7 +165,7 @@ describe("resolveApiKeyForProfile token expiry handling", () => {
|
||||
}),
|
||||
});
|
||||
expect(result).toEqual({
|
||||
apiKey: "tok-123",
|
||||
apiKey: "tok-123", // pragma: allowlist secret
|
||||
provider: "anthropic",
|
||||
email: undefined,
|
||||
});
|
||||
@@ -231,7 +231,7 @@ describe("resolveApiKeyForProfile secret refs", () => {
|
||||
it("resolves api_key keyRef from env", async () => {
|
||||
const profileId = "openai:default";
|
||||
const previous = process.env.OPENAI_API_KEY;
|
||||
process.env.OPENAI_API_KEY = "sk-openai-ref";
|
||||
process.env.OPENAI_API_KEY = "sk-openai-ref"; // pragma: allowlist secret
|
||||
try {
|
||||
const result = await resolveApiKeyForProfile({
|
||||
cfg: cfgFor(profileId, "openai", "api_key"),
|
||||
@@ -248,7 +248,7 @@ describe("resolveApiKeyForProfile secret refs", () => {
|
||||
profileId,
|
||||
});
|
||||
expect(result).toEqual({
|
||||
apiKey: "sk-openai-ref",
|
||||
apiKey: "sk-openai-ref", // pragma: allowlist secret
|
||||
provider: "openai",
|
||||
email: undefined,
|
||||
});
|
||||
@@ -282,7 +282,7 @@ describe("resolveApiKeyForProfile secret refs", () => {
|
||||
profileId,
|
||||
});
|
||||
expect(result).toEqual({
|
||||
apiKey: "gh-ref-token",
|
||||
apiKey: "gh-ref-token", // pragma: allowlist secret
|
||||
provider: "github-copilot",
|
||||
email: undefined,
|
||||
});
|
||||
@@ -315,7 +315,7 @@ describe("resolveApiKeyForProfile secret refs", () => {
|
||||
profileId,
|
||||
});
|
||||
expect(result).toEqual({
|
||||
apiKey: "gh-ref-token",
|
||||
apiKey: "gh-ref-token", // pragma: allowlist secret
|
||||
provider: "github-copilot",
|
||||
email: undefined,
|
||||
});
|
||||
@@ -331,7 +331,7 @@ describe("resolveApiKeyForProfile secret refs", () => {
|
||||
it("resolves inline ${ENV} api_key values", async () => {
|
||||
const profileId = "openai:inline-env";
|
||||
const previous = process.env.OPENAI_API_KEY;
|
||||
process.env.OPENAI_API_KEY = "sk-openai-inline";
|
||||
process.env.OPENAI_API_KEY = "sk-openai-inline"; // pragma: allowlist secret
|
||||
try {
|
||||
const result = await resolveApiKeyForProfile({
|
||||
cfg: cfgFor(profileId, "openai", "api_key"),
|
||||
@@ -348,7 +348,7 @@ describe("resolveApiKeyForProfile secret refs", () => {
|
||||
profileId,
|
||||
});
|
||||
expect(result).toEqual({
|
||||
apiKey: "sk-openai-inline",
|
||||
apiKey: "sk-openai-inline", // pragma: allowlist secret
|
||||
provider: "openai",
|
||||
email: undefined,
|
||||
});
|
||||
@@ -381,7 +381,7 @@ describe("resolveApiKeyForProfile secret refs", () => {
|
||||
profileId,
|
||||
});
|
||||
expect(result).toEqual({
|
||||
apiKey: "gh-inline-token",
|
||||
apiKey: "gh-inline-token", // pragma: allowlist secret
|
||||
provider: "github-copilot",
|
||||
email: undefined,
|
||||
});
|
||||
|
||||
Reference in New Issue
Block a user