mirror of
https://github.com/openclaw/openclaw.git
synced 2026-04-28 01:58:38 +00:00
Land #28960 by @Glucksberg (Tailscale origin auto-allowlist). Land #29394 by @synchronic1 (allowedOrigins upgrade migration). Land #29198 by @Mariana-Codebase (plugin HTTP auth guard + route precedence). Land #30910 by @liuxiaopai-ai (tailscale bind/config.patch guard). Co-authored-by: Glucksberg <markuscontasul@gmail.com> Co-authored-by: synchronic1 <synchronic1@users.noreply.github.com> Co-authored-by: Mariana Sinisterra <mariana.data@outlook.com> Co-authored-by: liuxiaopai-ai <73659136+liuxiaopai-ai@users.noreply.github.com>
217 lines
6.9 KiB
TypeScript
217 lines
6.9 KiB
TypeScript
import { describe, expect, it } from "vitest";
|
|
import { migrateLegacyConfig } from "./legacy-migrate.js";
|
|
|
|
describe("legacy migrate audio transcription", () => {
|
|
it("moves routing.transcribeAudio into tools.media.audio.models", () => {
|
|
const res = migrateLegacyConfig({
|
|
routing: {
|
|
transcribeAudio: {
|
|
command: ["whisper", "--model", "base"],
|
|
timeoutSeconds: 2,
|
|
},
|
|
},
|
|
});
|
|
|
|
expect(res.changes).toContain("Moved routing.transcribeAudio → tools.media.audio.models.");
|
|
expect(res.config?.tools?.media?.audio).toEqual({
|
|
enabled: true,
|
|
models: [
|
|
{
|
|
command: "whisper",
|
|
type: "cli",
|
|
args: ["--model", "base"],
|
|
timeoutSeconds: 2,
|
|
},
|
|
],
|
|
});
|
|
expect((res.config as { routing?: unknown } | null)?.routing).toBeUndefined();
|
|
});
|
|
|
|
it("keeps existing tools media model and drops legacy routing value", () => {
|
|
const res = migrateLegacyConfig({
|
|
routing: {
|
|
transcribeAudio: {
|
|
command: ["whisper", "--model", "tiny"],
|
|
},
|
|
},
|
|
tools: {
|
|
media: {
|
|
audio: {
|
|
models: [{ command: "existing", type: "cli" }],
|
|
},
|
|
},
|
|
},
|
|
});
|
|
|
|
expect(res.changes).toContain(
|
|
"Removed routing.transcribeAudio (tools.media.audio.models already set).",
|
|
);
|
|
expect(res.config?.tools?.media?.audio?.models).toEqual([{ command: "existing", type: "cli" }]);
|
|
expect((res.config as { routing?: unknown } | null)?.routing).toBeUndefined();
|
|
});
|
|
|
|
it("drops invalid audio.transcription payloads", () => {
|
|
const res = migrateLegacyConfig({
|
|
audio: {
|
|
transcription: {
|
|
command: [{}],
|
|
},
|
|
},
|
|
});
|
|
|
|
expect(res.changes).toContain("Removed audio.transcription (invalid or empty command).");
|
|
expect(res.config?.audio).toBeUndefined();
|
|
expect(res.config?.tools?.media?.audio).toBeUndefined();
|
|
});
|
|
});
|
|
|
|
describe("legacy migrate mention routing", () => {
|
|
it("moves routing.groupChat.requireMention into channel group defaults", () => {
|
|
const res = migrateLegacyConfig({
|
|
routing: {
|
|
groupChat: {
|
|
requireMention: true,
|
|
},
|
|
},
|
|
});
|
|
|
|
expect(res.changes).toContain(
|
|
'Moved routing.groupChat.requireMention → channels.telegram.groups."*".requireMention.',
|
|
);
|
|
expect(res.changes).toContain(
|
|
'Moved routing.groupChat.requireMention → channels.imessage.groups."*".requireMention.',
|
|
);
|
|
expect(res.config?.channels?.telegram?.groups?.["*"]?.requireMention).toBe(true);
|
|
expect(res.config?.channels?.imessage?.groups?.["*"]?.requireMention).toBe(true);
|
|
expect((res.config as { routing?: unknown } | null)?.routing).toBeUndefined();
|
|
});
|
|
|
|
it("moves channels.telegram.requireMention into groups.*.requireMention", () => {
|
|
const res = migrateLegacyConfig({
|
|
channels: {
|
|
telegram: {
|
|
requireMention: false,
|
|
},
|
|
},
|
|
});
|
|
|
|
expect(res.changes).toContain(
|
|
'Moved telegram.requireMention → channels.telegram.groups."*".requireMention.',
|
|
);
|
|
expect(res.config?.channels?.telegram?.groups?.["*"]?.requireMention).toBe(false);
|
|
expect(
|
|
(res.config?.channels?.telegram as { requireMention?: unknown } | undefined)?.requireMention,
|
|
).toBeUndefined();
|
|
});
|
|
});
|
|
|
|
describe("legacy migrate controlUi.allowedOrigins seed (issue #29385)", () => {
|
|
it("seeds allowedOrigins for bind=lan with no existing controlUi config", () => {
|
|
const res = migrateLegacyConfig({
|
|
gateway: {
|
|
bind: "lan",
|
|
auth: { mode: "token", token: "tok" },
|
|
},
|
|
});
|
|
expect(res.config?.gateway?.controlUi?.allowedOrigins).toEqual([
|
|
"http://localhost:18789",
|
|
"http://127.0.0.1:18789",
|
|
]);
|
|
expect(res.changes.some((c) => c.includes("gateway.controlUi.allowedOrigins"))).toBe(true);
|
|
expect(res.changes.some((c) => c.includes("bind=lan"))).toBe(true);
|
|
});
|
|
|
|
it("seeds allowedOrigins using configured port", () => {
|
|
const res = migrateLegacyConfig({
|
|
gateway: {
|
|
bind: "lan",
|
|
port: 9000,
|
|
auth: { mode: "token", token: "tok" },
|
|
},
|
|
});
|
|
expect(res.config?.gateway?.controlUi?.allowedOrigins).toEqual([
|
|
"http://localhost:9000",
|
|
"http://127.0.0.1:9000",
|
|
]);
|
|
});
|
|
|
|
it("seeds allowedOrigins including custom bind host for bind=custom", () => {
|
|
const res = migrateLegacyConfig({
|
|
gateway: {
|
|
bind: "custom",
|
|
customBindHost: "192.168.1.100",
|
|
auth: { mode: "token", token: "tok" },
|
|
},
|
|
});
|
|
expect(res.config?.gateway?.controlUi?.allowedOrigins).toContain("http://192.168.1.100:18789");
|
|
expect(res.config?.gateway?.controlUi?.allowedOrigins).toContain("http://localhost:18789");
|
|
});
|
|
|
|
it("does not overwrite existing allowedOrigins — returns null (no migration needed)", () => {
|
|
// When allowedOrigins already exists, the migration is a no-op.
|
|
// applyLegacyMigrations returns next=null when changes.length===0, so config is null.
|
|
const res = migrateLegacyConfig({
|
|
gateway: {
|
|
bind: "lan",
|
|
auth: { mode: "token", token: "tok" },
|
|
controlUi: { allowedOrigins: ["https://control.example.com"] },
|
|
},
|
|
});
|
|
expect(res.config).toBeNull();
|
|
expect(res.changes).toHaveLength(0);
|
|
});
|
|
|
|
it("does not migrate when dangerouslyAllowHostHeaderOriginFallback is set — returns null", () => {
|
|
const res = migrateLegacyConfig({
|
|
gateway: {
|
|
bind: "lan",
|
|
auth: { mode: "token", token: "tok" },
|
|
controlUi: { dangerouslyAllowHostHeaderOriginFallback: true },
|
|
},
|
|
});
|
|
expect(res.config).toBeNull();
|
|
expect(res.changes).toHaveLength(0);
|
|
});
|
|
|
|
it("seeds allowedOrigins when existing entries are blank strings", () => {
|
|
const res = migrateLegacyConfig({
|
|
gateway: {
|
|
bind: "lan",
|
|
auth: { mode: "token", token: "tok" },
|
|
controlUi: { allowedOrigins: ["", " "] },
|
|
},
|
|
});
|
|
expect(res.config?.gateway?.controlUi?.allowedOrigins).toEqual([
|
|
"http://localhost:18789",
|
|
"http://127.0.0.1:18789",
|
|
]);
|
|
expect(res.changes.some((c) => c.includes("gateway.controlUi.allowedOrigins"))).toBe(true);
|
|
});
|
|
|
|
it("does not migrate loopback bind — returns null", () => {
|
|
const res = migrateLegacyConfig({
|
|
gateway: {
|
|
bind: "loopback",
|
|
auth: { mode: "token", token: "tok" },
|
|
},
|
|
});
|
|
expect(res.config).toBeNull();
|
|
expect(res.changes).toHaveLength(0);
|
|
});
|
|
|
|
it("preserves existing controlUi fields when seeding allowedOrigins", () => {
|
|
const res = migrateLegacyConfig({
|
|
gateway: {
|
|
bind: "lan",
|
|
auth: { mode: "token", token: "tok" },
|
|
controlUi: { basePath: "/app" },
|
|
},
|
|
});
|
|
expect(res.config?.gateway?.controlUi?.basePath).toBe("/app");
|
|
expect(res.config?.gateway?.controlUi?.allowedOrigins).toEqual([
|
|
"http://localhost:18789",
|
|
"http://127.0.0.1:18789",
|
|
]);
|
|
});
|
|
});
|