672 lines
23 KiB
TypeScript
672 lines
23 KiB
TypeScript
import type { IncomingMessage, ServerResponse } from "node:http";
|
|
import { describe, expect, test, vi } from "vitest";
|
|
import type { createSubsystemLogger } from "../logging/subsystem.js";
|
|
import type { ResolvedGatewayAuth } from "./auth.js";
|
|
import type { HooksConfigResolved } from "./hooks.js";
|
|
import { canonicalizePathVariant, isProtectedPluginRoutePath } from "./security-path.js";
|
|
import { createGatewayHttpServer, createHooksRequestHandler } from "./server-http.js";
|
|
import { withTempConfig } from "./test-temp-config.js";
|
|
|
|
type GatewayHttpServer = ReturnType<typeof createGatewayHttpServer>;
|
|
type GatewayServerOptions = Partial<Parameters<typeof createGatewayHttpServer>[0]>;
|
|
|
|
const AUTH_NONE: ResolvedGatewayAuth = {
|
|
mode: "none",
|
|
token: undefined,
|
|
password: undefined,
|
|
allowTailscale: false,
|
|
};
|
|
|
|
const AUTH_TOKEN: ResolvedGatewayAuth = {
|
|
mode: "token",
|
|
token: "test-token",
|
|
password: undefined,
|
|
allowTailscale: false,
|
|
};
|
|
|
|
function createRequest(params: {
|
|
path: string;
|
|
authorization?: string;
|
|
method?: string;
|
|
}): IncomingMessage {
|
|
const headers: Record<string, string> = {
|
|
host: "localhost:18789",
|
|
};
|
|
if (params.authorization) {
|
|
headers.authorization = params.authorization;
|
|
}
|
|
return {
|
|
method: params.method ?? "GET",
|
|
url: params.path,
|
|
headers,
|
|
socket: { remoteAddress: "127.0.0.1" },
|
|
} as IncomingMessage;
|
|
}
|
|
|
|
function createResponse(): {
|
|
res: ServerResponse;
|
|
setHeader: ReturnType<typeof vi.fn>;
|
|
end: ReturnType<typeof vi.fn>;
|
|
getBody: () => string;
|
|
} {
|
|
const setHeader = vi.fn();
|
|
let body = "";
|
|
const end = vi.fn((chunk?: unknown) => {
|
|
if (typeof chunk === "string") {
|
|
body = chunk;
|
|
return;
|
|
}
|
|
if (chunk == null) {
|
|
body = "";
|
|
return;
|
|
}
|
|
body = JSON.stringify(chunk);
|
|
});
|
|
const res = {
|
|
headersSent: false,
|
|
statusCode: 200,
|
|
setHeader,
|
|
end,
|
|
} as unknown as ServerResponse;
|
|
return {
|
|
res,
|
|
setHeader,
|
|
end,
|
|
getBody: () => body,
|
|
};
|
|
}
|
|
|
|
async function dispatchRequest(
|
|
server: GatewayHttpServer,
|
|
req: IncomingMessage,
|
|
res: ServerResponse,
|
|
): Promise<void> {
|
|
server.emit("request", req, res);
|
|
await new Promise((resolve) => setImmediate(resolve));
|
|
}
|
|
|
|
async function withGatewayTempConfig(prefix: string, run: () => Promise<void>): Promise<void> {
|
|
await withTempConfig({
|
|
cfg: { gateway: { trustedProxies: [] } },
|
|
prefix,
|
|
run,
|
|
});
|
|
}
|
|
|
|
function createTestGatewayServer(options: {
|
|
resolvedAuth: ResolvedGatewayAuth;
|
|
overrides?: GatewayServerOptions;
|
|
}): GatewayHttpServer {
|
|
return createGatewayHttpServer({
|
|
canvasHost: null,
|
|
clients: new Set(),
|
|
controlUiEnabled: false,
|
|
controlUiBasePath: "/__control__",
|
|
openAiChatCompletionsEnabled: false,
|
|
openResponsesEnabled: false,
|
|
handleHooksRequest: async () => false,
|
|
...options.overrides,
|
|
resolvedAuth: options.resolvedAuth,
|
|
});
|
|
}
|
|
|
|
async function withGatewayServer(params: {
|
|
prefix: string;
|
|
resolvedAuth: ResolvedGatewayAuth;
|
|
overrides?: GatewayServerOptions;
|
|
run: (server: GatewayHttpServer) => Promise<void>;
|
|
}): Promise<void> {
|
|
await withGatewayTempConfig(params.prefix, async () => {
|
|
const server = createTestGatewayServer({
|
|
resolvedAuth: params.resolvedAuth,
|
|
overrides: params.overrides,
|
|
});
|
|
await params.run(server);
|
|
});
|
|
}
|
|
|
|
async function sendRequest(
|
|
server: GatewayHttpServer,
|
|
params: {
|
|
path: string;
|
|
authorization?: string;
|
|
method?: string;
|
|
},
|
|
) {
|
|
const response = createResponse();
|
|
await dispatchRequest(server, createRequest(params), response.res);
|
|
return response;
|
|
}
|
|
|
|
function expectUnauthorizedResponse(
|
|
response: ReturnType<typeof createResponse>,
|
|
label?: string,
|
|
): void {
|
|
expect(response.res.statusCode, label).toBe(401);
|
|
expect(response.getBody(), label).toContain("Unauthorized");
|
|
}
|
|
|
|
function createHooksConfig(): HooksConfigResolved {
|
|
return {
|
|
basePath: "/hooks",
|
|
token: "hook-secret",
|
|
maxBodyBytes: 1024,
|
|
mappings: [],
|
|
agentPolicy: {
|
|
defaultAgentId: "main",
|
|
knownAgentIds: new Set(["main"]),
|
|
allowedAgentIds: undefined,
|
|
},
|
|
sessionPolicy: {
|
|
allowRequestSessionKey: false,
|
|
defaultSessionKey: undefined,
|
|
allowedSessionKeyPrefixes: undefined,
|
|
},
|
|
};
|
|
}
|
|
|
|
function canonicalizePluginPath(pathname: string): string {
|
|
return canonicalizePathVariant(pathname);
|
|
}
|
|
|
|
function createCanonicalizedChannelPluginHandler() {
|
|
return vi.fn(async (req: IncomingMessage, res: ServerResponse) => {
|
|
const pathname = new URL(req.url ?? "/", "http://localhost").pathname;
|
|
const canonicalPath = canonicalizePluginPath(pathname);
|
|
if (canonicalPath !== "/api/channels/nostr/default/profile") {
|
|
return false;
|
|
}
|
|
res.statusCode = 200;
|
|
res.setHeader("Content-Type", "application/json; charset=utf-8");
|
|
res.end(JSON.stringify({ ok: true, route: "channel-canonicalized" }));
|
|
return true;
|
|
});
|
|
}
|
|
|
|
function createHooksHandler(bindHost: string) {
|
|
return createHooksRequestHandler({
|
|
getHooksConfig: () => createHooksConfig(),
|
|
bindHost,
|
|
port: 18789,
|
|
logHooks: {
|
|
warn: vi.fn(),
|
|
debug: vi.fn(),
|
|
info: vi.fn(),
|
|
error: vi.fn(),
|
|
} as unknown as ReturnType<typeof createSubsystemLogger>,
|
|
dispatchWakeHook: () => {},
|
|
dispatchAgentHook: () => "run-1",
|
|
});
|
|
}
|
|
|
|
type RouteVariant = {
|
|
label: string;
|
|
path: string;
|
|
};
|
|
|
|
const CANONICAL_UNAUTH_VARIANTS: RouteVariant[] = [
|
|
{ label: "case-variant", path: "/API/channels/nostr/default/profile" },
|
|
{ label: "encoded-slash", path: "/api/channels%2Fnostr%2Fdefault%2Fprofile" },
|
|
{ label: "encoded-segment", path: "/api/%63hannels/nostr/default/profile" },
|
|
{ label: "dot-traversal-encoded-slash", path: "/api/foo/..%2fchannels/nostr/default/profile" },
|
|
{
|
|
label: "dot-traversal-encoded-dotdot-slash",
|
|
path: "/api/foo/%2e%2e%2fchannels/nostr/default/profile",
|
|
},
|
|
{
|
|
label: "dot-traversal-double-encoded",
|
|
path: "/api/foo/%252e%252e%252fchannels/nostr/default/profile",
|
|
},
|
|
{ label: "duplicate-slashes", path: "/api/channels//nostr/default/profile" },
|
|
{ label: "trailing-slash", path: "/api/channels/nostr/default/profile/" },
|
|
{ label: "malformed-short-percent", path: "/api/channels%2" },
|
|
{ label: "malformed-double-slash-short-percent", path: "/api//channels%2" },
|
|
];
|
|
|
|
const CANONICAL_AUTH_VARIANTS: RouteVariant[] = [
|
|
{ label: "auth-case-variant", path: "/API/channels/nostr/default/profile" },
|
|
{ label: "auth-encoded-segment", path: "/api/%63hannels/nostr/default/profile" },
|
|
{ label: "auth-duplicate-trailing-slash", path: "/api/channels//nostr/default/profile/" },
|
|
{
|
|
label: "auth-dot-traversal-encoded-slash",
|
|
path: "/api/foo/..%2fchannels/nostr/default/profile",
|
|
},
|
|
{
|
|
label: "auth-dot-traversal-double-encoded",
|
|
path: "/api/foo/%252e%252e%252fchannels/nostr/default/profile",
|
|
},
|
|
];
|
|
|
|
function buildChannelPathFuzzCorpus(): RouteVariant[] {
|
|
const variants = [
|
|
"/api/channels/nostr/default/profile",
|
|
"/API/channels/nostr/default/profile",
|
|
"/api/foo/..%2fchannels/nostr/default/profile",
|
|
"/api/foo/%2e%2e%2fchannels/nostr/default/profile",
|
|
"/api/foo/%252e%252e%252fchannels/nostr/default/profile",
|
|
"/api/channels//nostr/default/profile/",
|
|
"/api/channels%2Fnostr%2Fdefault%2Fprofile",
|
|
"/api/channels%252Fnostr%252Fdefault%252Fprofile",
|
|
"/api//channels/nostr/default/profile",
|
|
"/api/channels%2",
|
|
"/api/channels%zz",
|
|
"/api//channels%2",
|
|
"/api//channels%zz",
|
|
];
|
|
return variants.map((path) => ({ label: `fuzz:${path}`, path }));
|
|
}
|
|
|
|
async function expectUnauthorizedVariants(params: {
|
|
server: GatewayHttpServer;
|
|
variants: RouteVariant[];
|
|
}) {
|
|
for (const variant of params.variants) {
|
|
const response = await sendRequest(params.server, { path: variant.path });
|
|
expectUnauthorizedResponse(response, variant.label);
|
|
}
|
|
}
|
|
|
|
async function expectAuthorizedVariants(params: {
|
|
server: GatewayHttpServer;
|
|
variants: RouteVariant[];
|
|
authorization: string;
|
|
}) {
|
|
for (const variant of params.variants) {
|
|
const response = await sendRequest(params.server, {
|
|
path: variant.path,
|
|
authorization: params.authorization,
|
|
});
|
|
expect(response.res.statusCode, variant.label).toBe(200);
|
|
expect(response.getBody(), variant.label).toContain('"route":"channel-canonicalized"');
|
|
}
|
|
}
|
|
|
|
describe("gateway plugin HTTP auth boundary", () => {
|
|
test("applies default security headers and optional strict transport security", async () => {
|
|
await withGatewayTempConfig("openclaw-plugin-http-security-headers-test-", async () => {
|
|
const withoutHsts = createTestGatewayServer({ resolvedAuth: AUTH_NONE });
|
|
const withoutHstsResponse = await sendRequest(withoutHsts, { path: "/missing" });
|
|
expect(withoutHstsResponse.setHeader).toHaveBeenCalledWith(
|
|
"X-Content-Type-Options",
|
|
"nosniff",
|
|
);
|
|
expect(withoutHstsResponse.setHeader).toHaveBeenCalledWith("Referrer-Policy", "no-referrer");
|
|
expect(withoutHstsResponse.setHeader).not.toHaveBeenCalledWith(
|
|
"Strict-Transport-Security",
|
|
expect.any(String),
|
|
);
|
|
|
|
const withHsts = createTestGatewayServer({
|
|
resolvedAuth: AUTH_NONE,
|
|
overrides: {
|
|
strictTransportSecurityHeader: "max-age=31536000; includeSubDomains",
|
|
},
|
|
});
|
|
const withHstsResponse = await sendRequest(withHsts, { path: "/missing" });
|
|
expect(withHstsResponse.setHeader).toHaveBeenCalledWith(
|
|
"Strict-Transport-Security",
|
|
"max-age=31536000; includeSubDomains",
|
|
);
|
|
});
|
|
});
|
|
|
|
test("serves unauthenticated liveness/readiness probe routes when no other route handles them", async () => {
|
|
await withGatewayServer({
|
|
prefix: "openclaw-plugin-http-probes-test-",
|
|
resolvedAuth: AUTH_TOKEN,
|
|
run: async (server) => {
|
|
const probeCases = [
|
|
{ path: "/health", status: "live" },
|
|
{ path: "/healthz", status: "live" },
|
|
{ path: "/ready", status: "ready" },
|
|
{ path: "/readyz", status: "ready" },
|
|
] as const;
|
|
|
|
for (const probeCase of probeCases) {
|
|
const response = await sendRequest(server, { path: probeCase.path });
|
|
expect(response.res.statusCode, probeCase.path).toBe(200);
|
|
expect(response.getBody(), probeCase.path).toBe(
|
|
JSON.stringify({ ok: true, status: probeCase.status }),
|
|
);
|
|
}
|
|
},
|
|
});
|
|
});
|
|
|
|
test("does not shadow plugin routes mounted on probe paths", async () => {
|
|
const handlePluginRequest = vi.fn(async (req: IncomingMessage, res: ServerResponse) => {
|
|
const pathname = new URL(req.url ?? "/", "http://localhost").pathname;
|
|
if (pathname === "/healthz") {
|
|
res.statusCode = 200;
|
|
res.setHeader("Content-Type", "application/json; charset=utf-8");
|
|
res.end(JSON.stringify({ ok: true, route: "plugin-health" }));
|
|
return true;
|
|
}
|
|
return false;
|
|
});
|
|
|
|
await withGatewayServer({
|
|
prefix: "openclaw-plugin-http-probes-shadow-test-",
|
|
resolvedAuth: AUTH_NONE,
|
|
overrides: { handlePluginRequest },
|
|
run: async (server) => {
|
|
const response = await sendRequest(server, { path: "/healthz" });
|
|
expect(response.res.statusCode).toBe(200);
|
|
expect(response.getBody()).toBe(JSON.stringify({ ok: true, route: "plugin-health" }));
|
|
expect(handlePluginRequest).toHaveBeenCalledTimes(1);
|
|
},
|
|
});
|
|
});
|
|
|
|
test("rejects non-GET/HEAD methods on probe routes", async () => {
|
|
await withGatewayServer({
|
|
prefix: "openclaw-plugin-http-probes-method-test-",
|
|
resolvedAuth: AUTH_NONE,
|
|
run: async (server) => {
|
|
const postResponse = await sendRequest(server, { path: "/healthz", method: "POST" });
|
|
expect(postResponse.res.statusCode).toBe(405);
|
|
expect(postResponse.setHeader).toHaveBeenCalledWith("Allow", "GET, HEAD");
|
|
expect(postResponse.getBody()).toBe("Method Not Allowed");
|
|
|
|
const headResponse = await sendRequest(server, { path: "/readyz", method: "HEAD" });
|
|
expect(headResponse.res.statusCode).toBe(200);
|
|
expect(headResponse.getBody()).toBe("");
|
|
},
|
|
});
|
|
});
|
|
|
|
test("requires gateway auth for protected plugin route space and allows authenticated pass-through", async () => {
|
|
const handlePluginRequest = vi.fn(async (req: IncomingMessage, res: ServerResponse) => {
|
|
const pathname = new URL(req.url ?? "/", "http://localhost").pathname;
|
|
if (pathname === "/api/channels") {
|
|
res.statusCode = 200;
|
|
res.setHeader("Content-Type", "application/json; charset=utf-8");
|
|
res.end(JSON.stringify({ ok: true, route: "channel-root" }));
|
|
return true;
|
|
}
|
|
if (pathname === "/api/channels/nostr/default/profile") {
|
|
res.statusCode = 200;
|
|
res.setHeader("Content-Type", "application/json; charset=utf-8");
|
|
res.end(JSON.stringify({ ok: true, route: "channel" }));
|
|
return true;
|
|
}
|
|
if (pathname === "/plugin/public") {
|
|
res.statusCode = 200;
|
|
res.setHeader("Content-Type", "application/json; charset=utf-8");
|
|
res.end(JSON.stringify({ ok: true, route: "public" }));
|
|
return true;
|
|
}
|
|
return false;
|
|
});
|
|
|
|
await withGatewayServer({
|
|
prefix: "openclaw-plugin-http-auth-test-",
|
|
resolvedAuth: AUTH_TOKEN,
|
|
overrides: {
|
|
handlePluginRequest,
|
|
shouldEnforcePluginGatewayAuth: (requestPath) =>
|
|
isProtectedPluginRoutePath(requestPath) || requestPath === "/plugin/public",
|
|
},
|
|
run: async (server) => {
|
|
const unauthenticated = await sendRequest(server, {
|
|
path: "/api/channels/nostr/default/profile",
|
|
});
|
|
expectUnauthorizedResponse(unauthenticated);
|
|
expect(handlePluginRequest).not.toHaveBeenCalled();
|
|
|
|
const unauthenticatedRoot = await sendRequest(server, { path: "/api/channels" });
|
|
expectUnauthorizedResponse(unauthenticatedRoot);
|
|
expect(handlePluginRequest).not.toHaveBeenCalled();
|
|
|
|
const authenticated = await sendRequest(server, {
|
|
path: "/api/channels/nostr/default/profile",
|
|
authorization: "Bearer test-token",
|
|
});
|
|
expect(authenticated.res.statusCode).toBe(200);
|
|
expect(authenticated.getBody()).toContain('"route":"channel"');
|
|
|
|
const unauthenticatedPublic = await sendRequest(server, { path: "/plugin/public" });
|
|
expectUnauthorizedResponse(unauthenticatedPublic);
|
|
|
|
expect(handlePluginRequest).toHaveBeenCalledTimes(1);
|
|
},
|
|
});
|
|
});
|
|
|
|
test("keeps wildcard plugin handlers ungated when auth enforcement predicate excludes their paths", async () => {
|
|
const handlePluginRequest = vi.fn(async (req: IncomingMessage, res: ServerResponse) => {
|
|
const pathname = new URL(req.url ?? "/", "http://localhost").pathname;
|
|
if (pathname === "/plugin/routed") {
|
|
res.statusCode = 200;
|
|
res.setHeader("Content-Type", "application/json; charset=utf-8");
|
|
res.end(JSON.stringify({ ok: true, route: "routed" }));
|
|
return true;
|
|
}
|
|
if (pathname === "/googlechat") {
|
|
res.statusCode = 200;
|
|
res.setHeader("Content-Type", "application/json; charset=utf-8");
|
|
res.end(JSON.stringify({ ok: true, route: "wildcard-handler" }));
|
|
return true;
|
|
}
|
|
return false;
|
|
});
|
|
|
|
await withGatewayServer({
|
|
prefix: "openclaw-plugin-http-auth-wildcard-handler-test-",
|
|
resolvedAuth: AUTH_TOKEN,
|
|
overrides: {
|
|
handlePluginRequest,
|
|
shouldEnforcePluginGatewayAuth: (requestPath) =>
|
|
requestPath.startsWith("/api/channels") || requestPath === "/plugin/routed",
|
|
},
|
|
run: async (server) => {
|
|
const unauthenticatedRouted = await sendRequest(server, { path: "/plugin/routed" });
|
|
expectUnauthorizedResponse(unauthenticatedRouted);
|
|
|
|
const unauthenticatedWildcard = await sendRequest(server, { path: "/googlechat" });
|
|
expect(unauthenticatedWildcard.res.statusCode).toBe(200);
|
|
expect(unauthenticatedWildcard.getBody()).toContain('"route":"wildcard-handler"');
|
|
|
|
const authenticatedRouted = await sendRequest(server, {
|
|
path: "/plugin/routed",
|
|
authorization: "Bearer test-token",
|
|
});
|
|
expect(authenticatedRouted.res.statusCode).toBe(200);
|
|
expect(authenticatedRouted.getBody()).toContain('"route":"routed"');
|
|
},
|
|
});
|
|
});
|
|
|
|
test("uses /api/channels auth by default while keeping wildcard handlers ungated with no predicate", async () => {
|
|
const handlePluginRequest = vi.fn(async (req: IncomingMessage, res: ServerResponse) => {
|
|
const pathname = new URL(req.url ?? "/", "http://localhost").pathname;
|
|
if (pathname === "/api/channels/nostr/default/profile") {
|
|
res.statusCode = 200;
|
|
res.setHeader("Content-Type", "application/json; charset=utf-8");
|
|
res.end(JSON.stringify({ ok: true, route: "channel-default" }));
|
|
return true;
|
|
}
|
|
if (pathname === "/googlechat") {
|
|
res.statusCode = 200;
|
|
res.setHeader("Content-Type", "application/json; charset=utf-8");
|
|
res.end(JSON.stringify({ ok: true, route: "wildcard-default" }));
|
|
return true;
|
|
}
|
|
return false;
|
|
});
|
|
|
|
await withGatewayServer({
|
|
prefix: "openclaw-plugin-http-auth-wildcard-default-test-",
|
|
resolvedAuth: AUTH_TOKEN,
|
|
overrides: { handlePluginRequest },
|
|
run: async (server) => {
|
|
const unauthenticated = await sendRequest(server, { path: "/googlechat" });
|
|
expect(unauthenticated.res.statusCode).toBe(200);
|
|
expect(unauthenticated.getBody()).toContain('"route":"wildcard-default"');
|
|
|
|
const unauthenticatedChannel = await sendRequest(server, {
|
|
path: "/api/channels/nostr/default/profile",
|
|
});
|
|
expectUnauthorizedResponse(unauthenticatedChannel);
|
|
|
|
const authenticated = await sendRequest(server, {
|
|
path: "/googlechat",
|
|
authorization: "Bearer test-token",
|
|
});
|
|
expect(authenticated.res.statusCode).toBe(200);
|
|
expect(authenticated.getBody()).toContain('"route":"wildcard-default"');
|
|
|
|
const authenticatedChannel = await sendRequest(server, {
|
|
path: "/api/channels/nostr/default/profile",
|
|
authorization: "Bearer test-token",
|
|
});
|
|
expect(authenticatedChannel.res.statusCode).toBe(200);
|
|
expect(authenticatedChannel.getBody()).toContain('"route":"channel-default"');
|
|
},
|
|
});
|
|
});
|
|
|
|
test("serves plugin routes before control ui spa fallback", async () => {
|
|
const handlePluginRequest = vi.fn(async (req: IncomingMessage, res: ServerResponse) => {
|
|
const pathname = new URL(req.url ?? "/", "http://localhost").pathname;
|
|
if (pathname === "/plugins/diffs/view/demo-id/demo-token") {
|
|
res.statusCode = 200;
|
|
res.setHeader("Content-Type", "text/html; charset=utf-8");
|
|
res.end("<!doctype html><title>diff-view</title>");
|
|
return true;
|
|
}
|
|
return false;
|
|
});
|
|
|
|
await withGatewayServer({
|
|
prefix: "openclaw-plugin-http-control-ui-precedence-test-",
|
|
resolvedAuth: AUTH_NONE,
|
|
overrides: {
|
|
controlUiEnabled: true,
|
|
controlUiBasePath: "",
|
|
controlUiRoot: { kind: "missing" },
|
|
handlePluginRequest,
|
|
},
|
|
run: async (server) => {
|
|
const response = await sendRequest(server, {
|
|
path: "/plugins/diffs/view/demo-id/demo-token",
|
|
});
|
|
|
|
expect(response.res.statusCode).toBe(200);
|
|
expect(response.getBody()).toContain("diff-view");
|
|
expect(handlePluginRequest).toHaveBeenCalledTimes(1);
|
|
},
|
|
});
|
|
});
|
|
|
|
test("does not let plugin handlers shadow control ui routes", async () => {
|
|
const handlePluginRequest = vi.fn(async (req: IncomingMessage, res: ServerResponse) => {
|
|
const pathname = new URL(req.url ?? "/", "http://localhost").pathname;
|
|
if (pathname === "/chat") {
|
|
res.statusCode = 200;
|
|
res.setHeader("Content-Type", "text/plain; charset=utf-8");
|
|
res.end("plugin-shadow");
|
|
return true;
|
|
}
|
|
return false;
|
|
});
|
|
|
|
await withGatewayServer({
|
|
prefix: "openclaw-plugin-http-control-ui-shadow-test-",
|
|
resolvedAuth: AUTH_NONE,
|
|
overrides: {
|
|
controlUiEnabled: true,
|
|
controlUiBasePath: "",
|
|
controlUiRoot: { kind: "missing" },
|
|
handlePluginRequest,
|
|
},
|
|
run: async (server) => {
|
|
const response = await sendRequest(server, { path: "/chat" });
|
|
|
|
expect(response.res.statusCode).toBe(503);
|
|
expect(response.getBody()).toContain("Control UI assets not found");
|
|
expect(handlePluginRequest).not.toHaveBeenCalled();
|
|
},
|
|
});
|
|
});
|
|
|
|
test("requires gateway auth for canonicalized /api/channels variants", async () => {
|
|
const handlePluginRequest = createCanonicalizedChannelPluginHandler();
|
|
|
|
await withGatewayServer({
|
|
prefix: "openclaw-plugin-http-auth-canonicalized-test-",
|
|
resolvedAuth: AUTH_TOKEN,
|
|
overrides: {
|
|
handlePluginRequest,
|
|
shouldEnforcePluginGatewayAuth: isProtectedPluginRoutePath,
|
|
},
|
|
run: async (server) => {
|
|
await expectUnauthorizedVariants({ server, variants: CANONICAL_UNAUTH_VARIANTS });
|
|
expect(handlePluginRequest).not.toHaveBeenCalled();
|
|
|
|
await expectAuthorizedVariants({
|
|
server,
|
|
variants: CANONICAL_AUTH_VARIANTS,
|
|
authorization: "Bearer test-token",
|
|
});
|
|
expect(handlePluginRequest).toHaveBeenCalledTimes(CANONICAL_AUTH_VARIANTS.length);
|
|
},
|
|
});
|
|
});
|
|
|
|
test("rejects unauthenticated plugin-channel fuzz corpus variants", async () => {
|
|
const handlePluginRequest = createCanonicalizedChannelPluginHandler();
|
|
|
|
await withGatewayServer({
|
|
prefix: "openclaw-plugin-http-auth-fuzz-corpus-test-",
|
|
resolvedAuth: AUTH_TOKEN,
|
|
overrides: {
|
|
handlePluginRequest,
|
|
shouldEnforcePluginGatewayAuth: isProtectedPluginRoutePath,
|
|
},
|
|
run: async (server) => {
|
|
for (const variant of buildChannelPathFuzzCorpus()) {
|
|
const response = await sendRequest(server, { path: variant.path });
|
|
expect(response.res.statusCode, variant.label).not.toBe(200);
|
|
expect(response.getBody(), variant.label).not.toContain(
|
|
'"route":"channel-canonicalized"',
|
|
);
|
|
}
|
|
},
|
|
});
|
|
});
|
|
|
|
test.each(["0.0.0.0", "::"])(
|
|
"returns 404 (not 500) for non-hook routes with hooks enabled and bindHost=%s",
|
|
async (bindHost) => {
|
|
await withGatewayTempConfig("openclaw-plugin-http-hooks-bindhost-", async () => {
|
|
const handleHooksRequest = createHooksHandler(bindHost);
|
|
const server = createTestGatewayServer({
|
|
resolvedAuth: AUTH_NONE,
|
|
overrides: { handleHooksRequest },
|
|
});
|
|
|
|
const response = await sendRequest(server, { path: "/" });
|
|
|
|
expect(response.res.statusCode).toBe(404);
|
|
expect(response.getBody()).toBe("Not Found");
|
|
});
|
|
},
|
|
);
|
|
|
|
test("rejects query-token hooks requests with bindHost=::", async () => {
|
|
await withGatewayTempConfig("openclaw-plugin-http-hooks-query-token-", async () => {
|
|
const handleHooksRequest = createHooksHandler("::");
|
|
const server = createTestGatewayServer({
|
|
resolvedAuth: AUTH_NONE,
|
|
overrides: { handleHooksRequest },
|
|
});
|
|
|
|
const response = await sendRequest(server, { path: "/hooks/wake?token=bad" });
|
|
|
|
expect(response.res.statusCode).toBe(400);
|
|
expect(response.getBody()).toContain("Hook token must be provided");
|
|
});
|
|
});
|
|
});
|