chore(lint): satisfy biome checks

This commit is contained in:
Peter Steinberger
2026-01-13 07:53:25 +00:00
parent 676b64e8a3
commit 3a90335b5a
5 changed files with 42 additions and 31 deletions

View File

@@ -20,6 +20,11 @@ const noopAsync = async () => {};
const noop = () => {};
const authProfilePathFor = (agentDir: string) =>
path.join(agentDir, "auth-profiles.json");
const requireAgentDir = () => {
const agentDir = process.env.CLAWDBOT_AGENT_DIR;
if (!agentDir) throw new Error("CLAWDBOT_AGENT_DIR not set");
return agentDir;
};
describe("applyAuthChoice", () => {
const previousStateDir = process.env.CLAWDBOT_STATE_DIR;
@@ -113,9 +118,7 @@ describe("applyAuthChoice", () => {
mode: "api_key",
});
const authProfilePath = authProfilePathFor(
process.env.CLAWDBOT_AGENT_DIR!,
);
const authProfilePath = authProfilePathFor(requireAgentDir());
const raw = await fs.readFile(authProfilePath, "utf8");
const parsed = JSON.parse(raw) as {
profiles?: Record<string, { key?: string }>;
@@ -168,9 +171,7 @@ describe("applyAuthChoice", () => {
mode: "api_key",
});
const authProfilePath = authProfilePathFor(
process.env.CLAWDBOT_AGENT_DIR!,
);
const authProfilePath = authProfilePathFor(requireAgentDir());
const raw = await fs.readFile(authProfilePath, "utf8");
const parsed = JSON.parse(raw) as {
profiles?: Record<string, { key?: string }>;
@@ -331,9 +332,7 @@ describe("applyAuthChoice", () => {
"openrouter/auto",
);
const authProfilePath = authProfilePathFor(
process.env.CLAWDBOT_AGENT_DIR!,
);
const authProfilePath = authProfilePathFor(requireAgentDir());
const raw = await fs.readFile(authProfilePath, "utf8");
const parsed = JSON.parse(raw) as {
profiles?: Record<string, { key?: string }>;
@@ -416,9 +415,7 @@ describe("applyAuthChoice", () => {
mode: "oauth",
});
const authProfilePath = authProfilePathFor(
process.env.CLAWDBOT_AGENT_DIR!,
);
const authProfilePath = authProfilePathFor(requireAgentDir());
const raw = await fs.readFile(authProfilePath, "utf8");
const parsed = JSON.parse(raw) as {
profiles?: Record<

View File

@@ -28,9 +28,7 @@ export function noteSourceInstallIssues(root: string | null) {
}
if (fs.existsSync(srcEntry) && !fs.existsSync(tsxBin)) {
warnings.push(
"- tsx binary is missing for source runs. Run: pnpm install",
);
warnings.push("- tsx binary is missing for source runs. Run: pnpm install");
}
if (warnings.length > 0) {

View File

@@ -29,10 +29,7 @@ export async function maybeRepairUiProtocolFreshness(
if (schemaStats && !uiStats) {
note(
[
"- Control UI assets are missing.",
"- Run: pnpm ui:build",
].join("\n"),
["- Control UI assets are missing.", "- Run: pnpm ui:build"].join("\n"),
"UI",
);

View File

@@ -16,14 +16,19 @@ import {
applySyntheticConfig,
applySyntheticProviderConfig,
OPENROUTER_DEFAULT_MODEL_REF,
setMinimaxApiKey,
SYNTHETIC_DEFAULT_MODEL_ID,
SYNTHETIC_DEFAULT_MODEL_REF,
setMinimaxApiKey,
writeOAuthCredentials,
} from "./onboard-auth.js";
const authProfilePathFor = (agentDir: string) =>
path.join(agentDir, "auth-profiles.json");
const requireAgentDir = () => {
const agentDir = process.env.CLAWDBOT_AGENT_DIR;
if (!agentDir) throw new Error("CLAWDBOT_AGENT_DIR not set");
return agentDir;
};
describe("writeOAuthCredentials", () => {
const previousStateDir = process.env.CLAWDBOT_STATE_DIR;
@@ -68,9 +73,7 @@ describe("writeOAuthCredentials", () => {
await writeOAuthCredentials("openai-codex", creds);
const authProfilePath = authProfilePathFor(
process.env.CLAWDBOT_AGENT_DIR!,
);
const authProfilePath = authProfilePathFor(requireAgentDir());
const raw = await fs.readFile(authProfilePath, "utf8");
const parsed = JSON.parse(raw) as {
profiles?: Record<string, OAuthCredentials & { type?: string }>;
@@ -83,7 +86,13 @@ describe("writeOAuthCredentials", () => {
await expect(
fs.readFile(
path.join(tempStateDir, "agents", "main", "agent", "auth-profiles.json"),
path.join(
tempStateDir,
"agents",
"main",
"agent",
"auth-profiles.json",
),
"utf8",
),
).rejects.toThrow();
@@ -119,19 +128,22 @@ describe("setMinimaxApiKey", () => {
});
it("writes to CLAWDBOT_AGENT_DIR when set", async () => {
tempStateDir = await fs.mkdtemp(path.join(os.tmpdir(), "clawdbot-minimax-"));
tempStateDir = await fs.mkdtemp(
path.join(os.tmpdir(), "clawdbot-minimax-"),
);
process.env.CLAWDBOT_STATE_DIR = tempStateDir;
process.env.CLAWDBOT_AGENT_DIR = path.join(tempStateDir, "custom-agent");
process.env.PI_CODING_AGENT_DIR = process.env.CLAWDBOT_AGENT_DIR;
await setMinimaxApiKey("sk-minimax-test");
const customAuthPath = authProfilePathFor(
process.env.CLAWDBOT_AGENT_DIR!,
);
const customAuthPath = authProfilePathFor(requireAgentDir());
const raw = await fs.readFile(customAuthPath, "utf8");
const parsed = JSON.parse(raw) as {
profiles?: Record<string, { type?: string; provider?: string; key?: string }>;
profiles?: Record<
string,
{ type?: string; provider?: string; key?: string }
>;
};
expect(parsed.profiles?.["minimax:default"]).toMatchObject({
type: "api_key",
@@ -141,7 +153,13 @@ describe("setMinimaxApiKey", () => {
await expect(
fs.readFile(
path.join(tempStateDir, "agents", "main", "agent", "auth-profiles.json"),
path.join(
tempStateDir,
"agents",
"main",
"agent",
"auth-profiles.json",
),
"utf8",
),
).rejects.toThrow();

View File

@@ -24,7 +24,8 @@ function ensureExperimentalWarningSuppressed(): void {
const nodeOptions = process.env.NODE_OPTIONS ?? "";
if (hasExperimentalWarningSuppressed(nodeOptions)) return;
process.env.CLAWDBOT_NODE_OPTIONS_READY = "1";
process.env.NODE_OPTIONS = `${nodeOptions} ${EXPERIMENTAL_WARNING_FLAG}`.trim();
process.env.NODE_OPTIONS =
`${nodeOptions} ${EXPERIMENTAL_WARNING_FLAG}`.trim();
const result = spawnSync(process.execPath, process.argv.slice(1), {
stdio: "inherit",
env: process.env,