244 lines
8.1 KiB
TypeScript
244 lines
8.1 KiB
TypeScript
import { randomUUID } from "node:crypto";
|
|
import fs from "node:fs/promises";
|
|
import os from "node:os";
|
|
import path from "node:path";
|
|
import { beforeAll, describe, expect, it } from "vitest";
|
|
import { captureEnv } from "../test-utils/env.js";
|
|
import { startGatewayServer } from "./server.js";
|
|
import { extractPayloadText } from "./test-helpers.agent-results.js";
|
|
import {
|
|
connectDeviceAuthReq,
|
|
connectGatewayClient,
|
|
getFreeGatewayPort,
|
|
startGatewayWithClient,
|
|
} from "./test-helpers.e2e.js";
|
|
import { installOpenAiResponsesMock } from "./test-helpers.openai-mock.js";
|
|
import { buildOpenAiResponsesProviderConfig } from "./test-openai-responses-model.js";
|
|
|
|
let writeConfigFile: typeof import("../config/config.js").writeConfigFile;
|
|
let resolveConfigPath: typeof import("../config/config.js").resolveConfigPath;
|
|
const GATEWAY_E2E_TIMEOUT_MS = 30_000;
|
|
|
|
describe("gateway e2e", () => {
|
|
beforeAll(async () => {
|
|
({ writeConfigFile, resolveConfigPath } = await import("../config/config.js"));
|
|
});
|
|
|
|
it(
|
|
"runs a mock OpenAI tool call end-to-end via gateway agent loop",
|
|
{ timeout: GATEWAY_E2E_TIMEOUT_MS },
|
|
async () => {
|
|
const envSnapshot = captureEnv([
|
|
"HOME",
|
|
"OPENCLAW_CONFIG_PATH",
|
|
"OPENCLAW_GATEWAY_TOKEN",
|
|
"OPENCLAW_SKIP_CHANNELS",
|
|
"OPENCLAW_SKIP_GMAIL_WATCHER",
|
|
"OPENCLAW_SKIP_CRON",
|
|
"OPENCLAW_SKIP_CANVAS_HOST",
|
|
"OPENCLAW_SKIP_BROWSER_CONTROL_SERVER",
|
|
]);
|
|
|
|
const { baseUrl: openaiBaseUrl, restore } = installOpenAiResponsesMock();
|
|
|
|
const tempHome = await fs.mkdtemp(path.join(os.tmpdir(), "openclaw-gw-mock-home-"));
|
|
process.env.HOME = tempHome;
|
|
process.env.OPENCLAW_SKIP_CHANNELS = "1";
|
|
process.env.OPENCLAW_SKIP_GMAIL_WATCHER = "1";
|
|
process.env.OPENCLAW_SKIP_CRON = "1";
|
|
process.env.OPENCLAW_SKIP_CANVAS_HOST = "1";
|
|
process.env.OPENCLAW_SKIP_BROWSER_CONTROL_SERVER = "1";
|
|
|
|
const token = `test-${randomUUID()}`;
|
|
process.env.OPENCLAW_GATEWAY_TOKEN = token;
|
|
|
|
const workspaceDir = path.join(tempHome, "openclaw");
|
|
await fs.mkdir(workspaceDir, { recursive: true });
|
|
|
|
const nonceA = randomUUID();
|
|
const nonceB = randomUUID();
|
|
const toolProbePath = path.join(workspaceDir, `.openclaw-tool-probe.${nonceA}.txt`);
|
|
await fs.writeFile(toolProbePath, `nonceA=${nonceA}\nnonceB=${nonceB}\n`);
|
|
|
|
const configDir = path.join(tempHome, ".openclaw");
|
|
await fs.mkdir(configDir, { recursive: true });
|
|
const configPath = path.join(configDir, "openclaw.json");
|
|
|
|
const cfg = {
|
|
agents: { defaults: { workspace: workspaceDir } },
|
|
models: {
|
|
mode: "replace",
|
|
providers: {
|
|
openai: buildOpenAiResponsesProviderConfig(openaiBaseUrl),
|
|
},
|
|
},
|
|
gateway: { auth: { token } },
|
|
};
|
|
|
|
const { server, client } = await startGatewayWithClient({
|
|
cfg,
|
|
configPath,
|
|
token,
|
|
clientDisplayName: "vitest-mock-openai",
|
|
});
|
|
|
|
try {
|
|
const sessionKey = "agent:dev:mock-openai";
|
|
|
|
await client.request("sessions.patch", {
|
|
key: sessionKey,
|
|
model: "openai/gpt-5.2",
|
|
});
|
|
|
|
const runId = randomUUID();
|
|
const payload = await client.request<{
|
|
status?: unknown;
|
|
result?: unknown;
|
|
}>(
|
|
"agent",
|
|
{
|
|
sessionKey,
|
|
idempotencyKey: `idem-${runId}`,
|
|
message:
|
|
`Call the read tool on "${toolProbePath}". ` +
|
|
`Then reply with exactly: ${nonceA} ${nonceB}. No extra text.`,
|
|
deliver: false,
|
|
},
|
|
{ expectFinal: true },
|
|
);
|
|
|
|
expect(payload?.status).toBe("ok");
|
|
const text = extractPayloadText(payload?.result);
|
|
expect(text).toContain(nonceA);
|
|
expect(text).toContain(nonceB);
|
|
} finally {
|
|
client.stop();
|
|
await server.close({ reason: "mock openai test complete" });
|
|
await fs.rm(tempHome, { recursive: true, force: true });
|
|
restore();
|
|
envSnapshot.restore();
|
|
}
|
|
},
|
|
);
|
|
|
|
it(
|
|
"runs wizard over ws and writes auth token config",
|
|
{ timeout: GATEWAY_E2E_TIMEOUT_MS },
|
|
async () => {
|
|
const envSnapshot = captureEnv([
|
|
"HOME",
|
|
"OPENCLAW_STATE_DIR",
|
|
"OPENCLAW_CONFIG_PATH",
|
|
"OPENCLAW_GATEWAY_TOKEN",
|
|
"OPENCLAW_SKIP_CHANNELS",
|
|
"OPENCLAW_SKIP_GMAIL_WATCHER",
|
|
"OPENCLAW_SKIP_CRON",
|
|
"OPENCLAW_SKIP_CANVAS_HOST",
|
|
"OPENCLAW_SKIP_BROWSER_CONTROL_SERVER",
|
|
]);
|
|
|
|
process.env.OPENCLAW_SKIP_CHANNELS = "1";
|
|
process.env.OPENCLAW_SKIP_GMAIL_WATCHER = "1";
|
|
process.env.OPENCLAW_SKIP_CRON = "1";
|
|
process.env.OPENCLAW_SKIP_CANVAS_HOST = "1";
|
|
process.env.OPENCLAW_SKIP_BROWSER_CONTROL_SERVER = "1";
|
|
delete process.env.OPENCLAW_GATEWAY_TOKEN;
|
|
|
|
const tempHome = await fs.mkdtemp(path.join(os.tmpdir(), "openclaw-wizard-home-"));
|
|
process.env.HOME = tempHome;
|
|
delete process.env.OPENCLAW_STATE_DIR;
|
|
delete process.env.OPENCLAW_CONFIG_PATH;
|
|
|
|
const wizardToken = `wiz-${randomUUID()}`;
|
|
const port = await getFreeGatewayPort();
|
|
const server = await startGatewayServer(port, {
|
|
bind: "loopback",
|
|
auth: { mode: "token", token: wizardToken },
|
|
controlUiEnabled: false,
|
|
wizardRunner: async (_opts, _runtime, prompter) => {
|
|
await prompter.intro("Wizard E2E");
|
|
await prompter.note("write token");
|
|
const token = await prompter.text({ message: "token" });
|
|
await writeConfigFile({
|
|
gateway: { auth: { mode: "token", token: String(token) } },
|
|
});
|
|
await prompter.outro("ok");
|
|
},
|
|
});
|
|
|
|
const client = await connectGatewayClient({
|
|
url: `ws://127.0.0.1:${port}`,
|
|
token: wizardToken,
|
|
clientDisplayName: "vitest-wizard",
|
|
});
|
|
|
|
try {
|
|
const start = await client.request<{
|
|
sessionId?: string;
|
|
done: boolean;
|
|
status: "running" | "done" | "cancelled" | "error";
|
|
step?: {
|
|
id: string;
|
|
type: "note" | "select" | "text" | "confirm" | "multiselect" | "progress";
|
|
};
|
|
error?: string;
|
|
}>("wizard.start", { mode: "local" });
|
|
const sessionId = start.sessionId;
|
|
expect(typeof sessionId).toBe("string");
|
|
|
|
let next = start;
|
|
let didSendToken = false;
|
|
while (!next.done) {
|
|
const step = next.step;
|
|
if (!step) {
|
|
throw new Error("wizard missing step");
|
|
}
|
|
const value = step.type === "text" ? wizardToken : null;
|
|
if (step.type === "text") {
|
|
didSendToken = true;
|
|
}
|
|
next = await client.request("wizard.next", {
|
|
sessionId,
|
|
answer: { stepId: step.id, value },
|
|
});
|
|
}
|
|
|
|
expect(didSendToken).toBe(true);
|
|
expect(next.status).toBe("done");
|
|
|
|
const parsed = JSON.parse(await fs.readFile(resolveConfigPath(), "utf8"));
|
|
const token = (parsed as Record<string, unknown>)?.gateway as
|
|
| Record<string, unknown>
|
|
| undefined;
|
|
expect((token?.auth as { token?: string } | undefined)?.token).toBe(wizardToken);
|
|
} finally {
|
|
client.stop();
|
|
await server.close({ reason: "wizard e2e complete" });
|
|
}
|
|
|
|
const port2 = await getFreeGatewayPort();
|
|
const server2 = await startGatewayServer(port2, {
|
|
bind: "loopback",
|
|
controlUiEnabled: false,
|
|
});
|
|
try {
|
|
const resNoToken = await connectDeviceAuthReq({
|
|
url: `ws://127.0.0.1:${port2}`,
|
|
});
|
|
expect(resNoToken.ok).toBe(false);
|
|
expect(resNoToken.error?.message ?? "").toContain("unauthorized");
|
|
|
|
const resToken = await connectDeviceAuthReq({
|
|
url: `ws://127.0.0.1:${port2}`,
|
|
token: wizardToken,
|
|
});
|
|
expect(resToken.ok).toBe(true);
|
|
} finally {
|
|
await server2.close({ reason: "wizard auth verify" });
|
|
await fs.rm(tempHome, { recursive: true, force: true });
|
|
envSnapshot.restore();
|
|
}
|
|
},
|
|
);
|
|
});
|