mirror of
http://192.168.0.88:13333/lywsvip/openclaw-zero-token.git
synced 2026-05-08 00:02:20 +08:00
Major upgrade from e26988a38 to upstream v2026.3.28 (f9b107928).
Key changes:
- Upstream src/, ui/, extensions/ (89 bundled extensions)
- Zero-token web providers preserved in src/zero-token/
- AskOnce plugin restored and registered as CLI command
- Added missing packages: @anthropic-ai/vertex-sdk, @modelcontextprotocol/sdk
- Fixed tsconfig rootDir, skipLibCheck for plugin-sdk DTS build
- Added askonce to bundled plugin metadata and package.json exports
- Fixed AskOnce CLI command registration (missing commands metadata)
- Restored AskOnce adapter imports (correct 5-level relative paths)
- Removed stale migration artifacts from root directory
52 lines
1.9 KiB
TypeScript
52 lines
1.9 KiB
TypeScript
import { describe, expect, it } from "vitest";
|
|
import type { OpenClawConfig } from "../config/config.js";
|
|
import { resolveSenderCommandAuthorization } from "./command-auth.js";
|
|
|
|
const baseCfg = {
|
|
commands: { useAccessGroups: true },
|
|
} as unknown as OpenClawConfig;
|
|
|
|
async function resolveAuthorization(params: {
|
|
senderId: string;
|
|
configuredAllowFrom?: string[];
|
|
configuredGroupAllowFrom?: string[];
|
|
}) {
|
|
return resolveSenderCommandAuthorization({
|
|
cfg: baseCfg,
|
|
rawBody: "/status",
|
|
isGroup: true,
|
|
dmPolicy: "pairing",
|
|
configuredAllowFrom: params.configuredAllowFrom ?? ["dm-owner"],
|
|
configuredGroupAllowFrom: params.configuredGroupAllowFrom ?? ["group-owner"],
|
|
senderId: params.senderId,
|
|
isSenderAllowed: (senderId, allowFrom) => allowFrom.includes(senderId),
|
|
readAllowFromStore: async () => ["paired-user"],
|
|
shouldComputeCommandAuthorized: () => true,
|
|
resolveCommandAuthorizedFromAuthorizers: ({ useAccessGroups, authorizers }) =>
|
|
useAccessGroups && authorizers.some((entry) => entry.configured && entry.allowed),
|
|
});
|
|
}
|
|
|
|
describe("plugin-sdk/command-auth", () => {
|
|
it.each([
|
|
{
|
|
name: "authorizes group commands from explicit group allowlist",
|
|
senderId: "group-owner",
|
|
expectedAuthorized: true,
|
|
expectedSenderAllowed: true,
|
|
},
|
|
{
|
|
name: "keeps pairing-store identities DM-only for group command auth",
|
|
senderId: "paired-user",
|
|
expectedAuthorized: false,
|
|
expectedSenderAllowed: false,
|
|
},
|
|
])("$name", async ({ senderId, expectedAuthorized, expectedSenderAllowed }) => {
|
|
const result = await resolveAuthorization({ senderId });
|
|
expect(result.commandAuthorized).toBe(expectedAuthorized);
|
|
expect(result.senderAllowedForCommands).toBe(expectedSenderAllowed);
|
|
expect(result.effectiveAllowFrom).toEqual(["dm-owner"]);
|
|
expect(result.effectiveGroupAllowFrom).toEqual(["group-owner"]);
|
|
});
|
|
});
|