mirror of
https://github.com/moltbot/moltbot.git
synced 2026-05-13 15:47:28 +00:00
* refactor: remove stale file-backed shims * fix: harden sqlite state ci boundaries * refactor: store matrix idb snapshots in sqlite * fix: satisfy rebased CI guardrails * refactor: store current conversation bindings in sqlite table * refactor: store tui last sessions in sqlite table * refactor: reset sqlite schema history * refactor: drop unshipped sqlite table migration * refactor: remove plugin index file rollback * refactor: drop unshipped sqlite sidecar migrations * refactor: remove runtime commitments kv migration * refactor: preserve kysely sync result types * refactor: drop unshipped sqlite schema migration table * test: keep session usage coverage sqlite-backed * refactor: keep sqlite migration doctor-only * refactor: isolate device legacy imports * refactor: isolate push voicewake legacy imports * refactor: isolate remaining runtime legacy imports * refactor: tighten sqlite migration guardrails * test: cover sqlite persisted enum parsing * refactor: isolate legacy update and tui imports * refactor: tighten sqlite state ownership * refactor: move legacy imports behind doctor * refactor: remove legacy session row lookup * refactor: canonicalize memory transcript locators * refactor: drop transcript path scope fallbacks * refactor: drop runtime legacy session delivery pruning * refactor: store tts prefs only in sqlite * refactor: remove cron store path runtime * refactor: use cron sqlite store keys * refactor: rename telegram message cache scope * refactor: read memory dreaming status from sqlite * refactor: rename cron status store key * refactor: stop remembering transcript file paths * test: use sqlite locators in agent fixtures * refactor: remove file-shaped commitments and cron store surfaces * refactor: keep compaction transcript handles out of session rows * refactor: derive transcript handles from session identity * refactor: derive runtime transcript handles * refactor: remove gateway session locator reads * refactor: remove transcript locator from session rows * refactor: store raw stream diagnostics in sqlite * refactor: remove file-shaped transcript rotation * refactor: hide legacy trajectory paths from runtime * refactor: remove runtime transcript file bridges * refactor: repair database-first rebase fallout * refactor: align tests with database-first state * refactor: remove transcript file handoffs * refactor: sync post-compaction memory by transcript scope * refactor: run codex app-server sessions by id * refactor: bind codex runtime state by session id * refactor: pass memory transcripts by sqlite scope * refactor: remove transcript locator cleanup leftovers * test: remove stale transcript file fixtures * refactor: remove transcript locator test helper * test: make cron sqlite keys explicit * test: remove cron runtime store paths * test: remove stale session file fixtures * test: use sqlite cron keys in diagnostics * refactor: remove runtime delivery queue backfill * test: drop fake export session file mocks * refactor: rename acp session read failure flag * refactor: rename acp row session key * refactor: remove session store test seams * refactor: move legacy session parser tests to doctor * refactor: reindex managed memory in place * refactor: drop stale session store wording * refactor: rename session row helpers * refactor: rename sqlite session entry modules * refactor: remove transcript locator leftovers * refactor: trim file-era audit wording * refactor: clean managed media through sqlite * fix: prefer explicit agent for exports * fix: use prepared agent for session resets * fix: canonicalize legacy codex binding import * test: rename state cleanup helper * docs: align backup docs with sqlite state * refactor: drop legacy Pi usage auth fallback * refactor: move legacy auth profile imports to doctor * refactor: keep Pi model discovery auth in memory * refactor: remove MSTeams legacy learning key fallback * refactor: store model catalog config in sqlite * refactor: use sqlite model catalog at runtime * refactor: remove model json compatibility aliases * refactor: store auth profiles in sqlite * refactor: seed copied auth profiles in sqlite * refactor: make auth profile runtime sqlite-addressed * refactor: migrate hermes secrets into sqlite auth store * refactor: move plugin install config migration to doctor * refactor: rename plugin index audit checks * test: drop auth file assumptions * test: remove legacy transcript file assertions * refactor: drop legacy cli session aliases * refactor: store skill uploads in sqlite * refactor: keep subagent attachments in sqlite vfs * refactor: drop subagent attachment cleanup state * refactor: move legacy session aliases to doctor * refactor: require node 24 for sqlite state runtime * refactor: move provider caches into sqlite state * fix: harden virtual agent filesystem * refactor: enforce database-first runtime state * refactor: rename compaction transcript rotation setting * test: clean sqlite refactor test types * refactor: consolidate sqlite runtime state * refactor: model session conversations in sqlite * refactor: stop deriving cron delivery from session keys * refactor: stop classifying sessions from key shape * refactor: hydrate announce targets from typed delivery * refactor: route heartbeat delivery from typed sqlite context * refactor: tighten typed sqlite session routing * refactor: remove session origin routing shadow * refactor: drop session origin shadow fixtures * perf: query sqlite vfs paths by prefix * refactor: use typed conversation metadata for sessions * refactor: prefer typed session routing metadata * refactor: require typed session routing metadata * refactor: resolve group tool policy from typed sessions * refactor: delete dead session thread info bridge * Show Codex subscription reset times in channel errors (#80456) * feat(plugin-sdk): consolidate session workflow APIs * fix(agents): allow read-only agent mount reads * [codex] refresh plugin regression fixtures * fix(agents): restore compaction gateway logs * test: tighten gateway startup assertions * Redact persisted secret-shaped payloads [AI] (#79006) * test: tighten device pair notify assertions * test: tighten hermes secret assertions * test: assert matrix client error shapes * test: assert config compat warnings * fix(heartbeat): remap cron-run exec events to session keys (#80214) * fix(codex): route btw through native side threads * fix(auth): accept friendly OpenAI order for Codex profiles * fix(codex): rotate auth profiles inside harness * fix: keep browser status page probe within timeout * test: assert agents add outputs * test: pin cron read status * fix(agents): avoid Pi resource discovery stalls Co-authored-by: dataCenter430 <titan032000@gmail.com> * fix: retire timed-out codex app-server clients * test: tighten qa lab runtime assertions * test: check security fix outputs * test: verify extension runtime messages * feat(wake): expose typed sessionKey on wake protocol + system event CLI * fix(gateway): await session_end during shutdown drain and track channel + compaction lifecycle paths (#57790) * test: guard talk consult call helper * fix(codex): scale context engine projection (#80761) * fix(codex): scale context engine projection * fix: document Codex context projection scaling * fix: document Codex context projection scaling * fix: document Codex context projection scaling * fix: document Codex context projection scaling * chore: align Codex projection changelog * chore: realign Codex projection changelog * fix: isolate Codex projection patch --------- Co-authored-by: Eva (agent) <eva+agent-78055@100yen.org> Co-authored-by: Josh Lehman <josh@martian.engineering> * refactor: move agent runtime state toward piless * refactor: remove cron session reaper * refactor: move session management to sqlite * refactor: finish database-first state migration * chore: refresh generated sqlite db types * refactor: remove stale file-backed shims * test: harden kysely type coverage # Conflicts: # .agents/skills/kysely-database-access/SKILL.md # src/infra/kysely-sync.types.test.ts # src/proxy-capture/store.sqlite.test.ts # src/state/openclaw-agent-db.test.ts # src/state/openclaw-state-db.test.ts * refactor: remove cron store path runtime * refactor: keep compaction transcript handles out of session rows * refactor: derive embedded transcripts from sqlite identity * refactor: remove embedded transcript locator handoff * refactor: remove runtime transcript file bridges * refactor: remove transcript file handoffs * refactor: remove MSTeams legacy learning key fallback * refactor: store model catalog config in sqlite * refactor: use sqlite model catalog at runtime # Conflicts: # docs/cli/secrets.md # docs/gateway/authentication.md # docs/gateway/secrets.md * fix: keep oauth sibling sync sqlite-local # Conflicts: # src/commands/onboard-auth.test.ts * refactor: remove task session store maintenance # Conflicts: # src/commands/tasks.ts * refactor: keep diagnostics in state sqlite * refactor: enforce database-first runtime state * refactor: consolidate sqlite runtime state * Show Codex subscription reset times in channel errors (#80456) * fix(codex): refresh subscription limit resets * fix(codex): format reset times for channels * Update CHANGELOG with latest changes and fixes Updated CHANGELOG with recent fixes and improvements. * fix(codex): keep command load failures on codex surface * fix(codex): format account rate limits as rows * fix(codex): summarize account limits as usage status * fix(codex): simplify account limit status * test: tighten subagent announce queue assertion * test: tighten session delete lifecycle assertions * test: tighten cron ops assertions * fix: track cron execution milestones * test: tighten hermes secret assertions * test: assert matrix sync store payloads * test: assert config compat warnings * fix(codex): align btw side thread semantics * fix(codex): honor codex fallback blocking * fix(agents): avoid Pi resource discovery stalls * test: tighten codex event assertions * test: tighten cron assertions * Fix Codex app-server OAuth harness auth * refactor: move agent runtime state toward piless * refactor: move device and push state to sqlite * refactor: move runtime json state imports to doctor * refactor: finish database-first state migration * chore: refresh generated sqlite db types * refactor: clarify cron sqlite store keys * refactor: remove stale file-backed shims * refactor: bind codex runtime state by session id * test: expect sqlite trajectory branch export * refactor: rename session row helpers * fix: keep legacy device identity import in doctor * refactor: enforce database-first runtime state * refactor: consolidate sqlite runtime state * build: align pi contract wrappers * chore: repair database-first rebase * refactor: remove session file test contracts * test: update gateway session expectations * refactor: stop routing from session compatibility shadows * refactor: stop persisting session route shadows * refactor: use typed delivery context in clients * refactor: stop echoing session route shadows * refactor: repair embedded runner rebase imports # Conflicts: # src/agents/pi-embedded-runner/run/attempt.tool-call-argument-repair.ts * refactor: align pi contract imports * refactor: satisfy kysely sync helper guard * refactor: remove file transcript bridge remnants * refactor: remove session locator compatibility * refactor: remove session file test contracts * refactor: keep rebase database-first clean * refactor: remove session file assumptions from e2e * docs: clarify database-first goal state * test: remove legacy store markers from sqlite runtime tests * refactor: remove legacy store assumptions from runtime seams * refactor: align sqlite runtime helper seams * test: update memory recall sqlite audit mock * refactor: align database-first runtime type seams * test: clarify doctor cron legacy store names * fix: preserve sqlite session route projections * test: fix copilot token cache test syntax * docs: update database-first proof status * test: align database-first test fixtures * docs: update database-first proof status * refactor: clean extension database-first drift * test: align agent session route proof * test: clarify doctor legacy path fixtures * chore: clean database-first changed checks * chore: repair database-first rebase markers * build: allow baileys git subdependency * chore: repair exp-vfs rebase drift * chore: finish exp-vfs rebase cleanup * chore: satisfy rebase lint drift * chore: fix qqbot rebase type seam * chore: fix rebase drift leftovers * fix: keep auth profile oauth secrets out of sqlite * fix: repair rebase drift tests * test: stabilize pairing request ordering * test: use source manifests in plugin contract checks * fix: restore gateway session metadata after rebase * fix: repair database-first rebase drift * fix: clean up database-first rebase fallout * test: stabilize line quick reply receipt time * fix: repair extension rebase drift * test: keep transcript redaction tests sqlite-backed * fix: carry injected transcript redaction through sqlite * chore: clean database branch rebase residue * fix: repair database branch CI drift * fix: repair database branch CI guard drift * fix: stabilize oauth tls preflight test * test: align database branch fast guards * test: repair build artifact boundary guards * chore: clean changelog rebase markers --------- Co-authored-by: pashpashpash <nik@vault77.ai> Co-authored-by: Eva <eva@100yen.org> Co-authored-by: stainlu <stainlu@newtype-ai.org> Co-authored-by: Jason Zhou <jason.zhou.design@gmail.com> Co-authored-by: Ruben Cuevas <hi@rubencu.com> Co-authored-by: Pavan Kumar Gondhi <pavangondhi@gmail.com> Co-authored-by: Shakker <shakkerdroid@gmail.com> Co-authored-by: Kaspre <36520309+Kaspre@users.noreply.github.com> Co-authored-by: dataCenter430 <titan032000@gmail.com> Co-authored-by: Kaspre <kaspre@gmail.com> Co-authored-by: pandadev66 <nova.full.stack@outlook.com> Co-authored-by: Eva <admin@100yen.org> Co-authored-by: Eva (agent) <eva+agent-78055@100yen.org> Co-authored-by: Josh Lehman <josh@martian.engineering> Co-authored-by: jeffjhunter <support@aipersonamethod.com>
306 lines
10 KiB
TypeScript
306 lines
10 KiB
TypeScript
import fs from "node:fs";
|
|
import path from "node:path";
|
|
import { importFreshModule } from "openclaw/plugin-sdk/test-fixtures";
|
|
import { afterEach, describe, expect, it, vi } from "vitest";
|
|
import {
|
|
loadPersistedAuthProfileStore,
|
|
savePersistedAuthProfileSecretsStore,
|
|
} from "../src/agents/auth-profiles/persisted.js";
|
|
import { closeOpenClawStateDatabaseForTest } from "../src/state/openclaw-state-db.js";
|
|
import { cleanupTempDirs, makeTempDir } from "./helpers/temp-dir.js";
|
|
import { installTestEnv } from "./test-env.js";
|
|
|
|
const ORIGINAL_ENV = { ...process.env };
|
|
|
|
const tempDirs = new Set<string>();
|
|
const cleanupFns: Array<() => void> = [];
|
|
|
|
function restoreProcessEnv(): void {
|
|
for (const key of Object.keys(process.env)) {
|
|
if (!(key in ORIGINAL_ENV)) {
|
|
delete process.env[key];
|
|
}
|
|
}
|
|
for (const [key, value] of Object.entries(ORIGINAL_ENV)) {
|
|
if (value === undefined) {
|
|
delete process.env[key];
|
|
} else {
|
|
process.env[key] = value;
|
|
}
|
|
}
|
|
}
|
|
|
|
function writeFile(targetPath: string, content: string): void {
|
|
fs.mkdirSync(path.dirname(targetPath), { recursive: true });
|
|
fs.writeFileSync(targetPath, content, "utf8");
|
|
}
|
|
|
|
function createTempHome(): string {
|
|
return makeTempDir(tempDirs, "openclaw-test-env-real-home-");
|
|
}
|
|
|
|
function requireRecord(
|
|
value: Record<string, unknown> | undefined,
|
|
label: string,
|
|
): Record<string, unknown> {
|
|
if (!value) {
|
|
throw new Error(`expected copied ${label} config`);
|
|
}
|
|
return value;
|
|
}
|
|
|
|
function requireTelegramStreaming(
|
|
value:
|
|
| {
|
|
mode?: string;
|
|
chunkMode?: string;
|
|
block?: { enabled?: boolean };
|
|
preview?: { chunk?: { minChars?: number } };
|
|
}
|
|
| undefined,
|
|
) {
|
|
if (!value) {
|
|
throw new Error("expected copied telegram streaming config");
|
|
}
|
|
return value;
|
|
}
|
|
|
|
afterEach(() => {
|
|
closeOpenClawStateDatabaseForTest();
|
|
while (cleanupFns.length > 0) {
|
|
cleanupFns.pop()?.();
|
|
}
|
|
restoreProcessEnv();
|
|
cleanupTempDirs(tempDirs);
|
|
});
|
|
|
|
describe("installTestEnv", () => {
|
|
it("keeps live tests on a temp HOME while copying config and auth state", () => {
|
|
const realHome = createTempHome();
|
|
const priorIsolatedHome = createTempHome();
|
|
writeFile(path.join(realHome, ".profile"), "export TEST_PROFILE_ONLY=from-profile\n");
|
|
writeFile(
|
|
path.join(realHome, "custom-openclaw.json5"),
|
|
`{
|
|
// Preserve provider config, strip host-bound paths.
|
|
agents: {
|
|
defaults: {
|
|
workspace: "/Users/peter/Projects",
|
|
agentDir: "/Users/peter/.openclaw/agents/main/agent",
|
|
},
|
|
list: [
|
|
{
|
|
id: "dev",
|
|
workspace: "/Users/peter/dev-workspace",
|
|
agentDir: "/Users/peter/.openclaw/agents/dev/agent",
|
|
},
|
|
],
|
|
},
|
|
models: {
|
|
providers: {
|
|
custom: { baseUrl: "https://example.test/v1" },
|
|
},
|
|
},
|
|
channels: {
|
|
telegram: {
|
|
streaming: {
|
|
mode: "block",
|
|
chunkMode: "newline",
|
|
block: {
|
|
enabled: true,
|
|
},
|
|
preview: {
|
|
chunk: {
|
|
minChars: 120,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}`,
|
|
);
|
|
writeFile(path.join(realHome, ".openclaw", "credentials", "token.txt"), "secret\n");
|
|
writeFile(
|
|
path.join(realHome, ".openclaw", "external-plugins", "glueclaw", "openclaw.plugin.json"),
|
|
'{"id":"glueclaw"}\n',
|
|
);
|
|
const realStateDir = path.join(realHome, ".openclaw");
|
|
const realAgentDir = path.join(realStateDir, "agents", "main", "agent");
|
|
fs.mkdirSync(realAgentDir, { recursive: true });
|
|
savePersistedAuthProfileSecretsStore(
|
|
{
|
|
version: 1,
|
|
profiles: {
|
|
"openai:default": {
|
|
type: "api_key",
|
|
provider: "openai",
|
|
key: "sk-test",
|
|
},
|
|
},
|
|
},
|
|
realAgentDir,
|
|
{
|
|
env: {
|
|
...process.env,
|
|
HOME: realHome,
|
|
USERPROFILE: realHome,
|
|
OPENCLAW_STATE_DIR: realStateDir,
|
|
},
|
|
},
|
|
);
|
|
writeFile(path.join(realHome, ".claude", ".credentials.json"), '{"accessToken":"token"}\n');
|
|
writeFile(path.join(realHome, ".claude", "projects", "old-session.jsonl"), "session\n");
|
|
fs.mkdirSync(path.join(realHome, ".claude", "settings.local.json"), { recursive: true });
|
|
writeFile(path.join(realHome, ".codex", "auth.json"), '{"OPENAI_API_KEY":"token"}\n');
|
|
writeFile(path.join(realHome, ".codex", "config.toml"), 'model = "gpt-5.4"\n');
|
|
writeFile(
|
|
path.join(realHome, ".codex", "sessions", "2026", "02", "26", "rollout.jsonl"),
|
|
"session\n",
|
|
);
|
|
|
|
process.env.HOME = realHome;
|
|
process.env.USERPROFILE = realHome;
|
|
process.env.OPENCLAW_LIVE_TEST = "1";
|
|
process.env.OPENCLAW_LIVE_TEST_QUIET = "1";
|
|
process.env.OPENCLAW_CONFIG_PATH = "~/custom-openclaw.json5";
|
|
process.env.OPENCLAW_TEST_HOME = priorIsolatedHome;
|
|
process.env.OPENCLAW_STATE_DIR = path.join(priorIsolatedHome, ".openclaw");
|
|
|
|
const testEnv = installTestEnv();
|
|
cleanupFns.push(testEnv.cleanup);
|
|
|
|
expect(testEnv.tempHome).not.toBe(realHome);
|
|
expect(process.env.HOME).toBe(testEnv.tempHome);
|
|
expect(process.env.OPENCLAW_TEST_HOME).toBe(testEnv.tempHome);
|
|
expect(process.env.TEST_PROFILE_ONLY).toBe("from-profile");
|
|
|
|
const copiedConfigPath = path.join(testEnv.tempHome, ".openclaw", "openclaw.json");
|
|
const copiedConfig = JSON.parse(fs.readFileSync(copiedConfigPath, "utf8")) as {
|
|
agents?: {
|
|
defaults?: Record<string, unknown>;
|
|
list?: Array<Record<string, unknown>>;
|
|
};
|
|
models?: { providers?: Record<string, unknown> };
|
|
channels?: {
|
|
telegram?: {
|
|
streaming?: {
|
|
mode?: string;
|
|
chunkMode?: string;
|
|
block?: { enabled?: boolean };
|
|
preview?: { chunk?: { minChars?: number } };
|
|
};
|
|
};
|
|
};
|
|
};
|
|
const providers = copiedConfig.models?.providers;
|
|
requireRecord(providers, "model providers");
|
|
expect(providers.custom).toEqual({ baseUrl: "https://example.test/v1" });
|
|
|
|
const agentDefaults = requireRecord(copiedConfig.agents?.defaults, "agent defaults");
|
|
const agentConfig = requireRecord(copiedConfig.agents?.list?.[0], "agent");
|
|
expect(agentDefaults.workspace).toBeUndefined();
|
|
expect(agentDefaults.agentDir).toBeUndefined();
|
|
expect(agentConfig.workspace).toBeUndefined();
|
|
expect(agentConfig.agentDir).toBeUndefined();
|
|
|
|
const telegramStreaming = requireTelegramStreaming(copiedConfig.channels?.telegram?.streaming);
|
|
expect(telegramStreaming).toEqual({
|
|
mode: "block",
|
|
chunkMode: "newline",
|
|
block: { enabled: true },
|
|
preview: { chunk: { minChars: 120 } },
|
|
});
|
|
|
|
expect(
|
|
fs.existsSync(path.join(testEnv.tempHome, ".openclaw", "credentials", "token.txt")),
|
|
).toBe(true);
|
|
expect(
|
|
fs.existsSync(
|
|
path.join(
|
|
testEnv.tempHome,
|
|
".openclaw",
|
|
"external-plugins",
|
|
"glueclaw",
|
|
"openclaw.plugin.json",
|
|
),
|
|
),
|
|
).toBe(true);
|
|
const tempAgentDir = path.join(testEnv.tempHome, ".openclaw", "agents", "main", "agent");
|
|
expect(loadPersistedAuthProfileStore(tempAgentDir)?.profiles["openai:default"]).toEqual({
|
|
type: "api_key",
|
|
provider: "openai",
|
|
key: "sk-test",
|
|
});
|
|
expect(fs.existsSync(path.join(testEnv.tempHome, ".claude", ".credentials.json"))).toBe(true);
|
|
expect(fs.existsSync(path.join(testEnv.tempHome, ".claude", "projects"))).toBe(false);
|
|
expect(fs.existsSync(path.join(testEnv.tempHome, ".claude", "settings.local.json"))).toBe(
|
|
false,
|
|
);
|
|
expect(fs.existsSync(path.join(testEnv.tempHome, ".codex", "auth.json"))).toBe(true);
|
|
expect(fs.existsSync(path.join(testEnv.tempHome, ".codex", "config.toml"))).toBe(true);
|
|
expect(fs.existsSync(path.join(testEnv.tempHome, ".codex", "sessions"))).toBe(false);
|
|
});
|
|
|
|
it("allows explicit live runs against the real HOME", () => {
|
|
const realHome = createTempHome();
|
|
writeFile(path.join(realHome, ".profile"), "export TEST_PROFILE_ONLY=from-profile\n");
|
|
|
|
process.env.HOME = realHome;
|
|
process.env.USERPROFILE = realHome;
|
|
process.env.OPENCLAW_LIVE_TEST = "1";
|
|
process.env.OPENCLAW_LIVE_USE_REAL_HOME = "1";
|
|
process.env.OPENCLAW_LIVE_TEST_QUIET = "1";
|
|
|
|
const testEnv = installTestEnv();
|
|
|
|
expect(testEnv.tempHome).toBe(realHome);
|
|
expect(process.env.HOME).toBe(realHome);
|
|
expect(process.env.TEST_PROFILE_ONLY).toBe("from-profile");
|
|
});
|
|
|
|
it("does not load ~/.profile for normal isolated test runs", () => {
|
|
const realHome = createTempHome();
|
|
writeFile(path.join(realHome, ".profile"), "export TEST_PROFILE_ONLY=from-profile\n");
|
|
|
|
process.env.HOME = realHome;
|
|
process.env.USERPROFILE = realHome;
|
|
delete process.env.LIVE;
|
|
delete process.env.OPENCLAW_LIVE_TEST;
|
|
delete process.env.OPENCLAW_LIVE_GATEWAY;
|
|
delete process.env.OPENCLAW_LIVE_USE_REAL_HOME;
|
|
delete process.env.OPENCLAW_LIVE_TEST_QUIET;
|
|
|
|
const testEnv = installTestEnv();
|
|
cleanupFns.push(testEnv.cleanup);
|
|
|
|
expect(testEnv.tempHome).not.toBe(realHome);
|
|
expect(process.env.TEST_PROFILE_ONLY).toBeUndefined();
|
|
});
|
|
|
|
it("falls back to parsing ~/.profile when bash is unavailable", async () => {
|
|
const realHome = createTempHome();
|
|
writeFile(path.join(realHome, ".profile"), "export TEST_PROFILE_ONLY=from-profile\n");
|
|
|
|
process.env.HOME = realHome;
|
|
process.env.USERPROFILE = realHome;
|
|
process.env.OPENCLAW_LIVE_TEST = "1";
|
|
process.env.OPENCLAW_LIVE_USE_REAL_HOME = "1";
|
|
process.env.OPENCLAW_LIVE_TEST_QUIET = "1";
|
|
|
|
vi.doMock("node:child_process", () => ({
|
|
execFileSync: () => {
|
|
throw Object.assign(new Error("bash missing"), { code: "ENOENT" });
|
|
},
|
|
}));
|
|
|
|
const { installTestEnv: installFreshTestEnv } = await importFreshModule<
|
|
typeof import("./test-env.js")
|
|
>(import.meta.url, "./test-env.js?scope=profile-fallback");
|
|
|
|
const testEnv = installFreshTestEnv();
|
|
|
|
expect(testEnv.tempHome).toBe(realHome);
|
|
expect(process.env.TEST_PROFILE_ONLY).toBe("from-profile");
|
|
});
|
|
});
|