|
|
|
|
@@ -1,4 +1,4 @@
|
|
|
|
|
import { describe, expect, test, vi } from "vitest";
|
|
|
|
|
import { afterAll, beforeAll, describe, expect, test, vi } from "vitest";
|
|
|
|
|
import { WebSocket } from "ws";
|
|
|
|
|
import { PROTOCOL_VERSION } from "./protocol/index.js";
|
|
|
|
|
import { getHandshakeTimeoutMs } from "./server-constants.js";
|
|
|
|
|
@@ -26,129 +26,226 @@ async function waitForWsClose(ws: WebSocket, timeoutMs: number): Promise<boolean
|
|
|
|
|
});
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
const openWs = async (port: number) => {
|
|
|
|
|
const ws = new WebSocket(`ws://127.0.0.1:${port}`);
|
|
|
|
|
await new Promise<void>((resolve) => ws.once("open", resolve));
|
|
|
|
|
return ws;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
describe("gateway server auth/connect", () => {
|
|
|
|
|
test("closes silent handshakes after timeout", { timeout: 60_000 }, async () => {
|
|
|
|
|
vi.useRealTimers();
|
|
|
|
|
const prevHandshakeTimeout = process.env.CLAWDBOT_TEST_HANDSHAKE_TIMEOUT_MS;
|
|
|
|
|
process.env.CLAWDBOT_TEST_HANDSHAKE_TIMEOUT_MS = "50";
|
|
|
|
|
try {
|
|
|
|
|
const { server, ws } = await startServerWithClient();
|
|
|
|
|
const handshakeTimeoutMs = getHandshakeTimeoutMs();
|
|
|
|
|
const closed = await waitForWsClose(ws, handshakeTimeoutMs + 250);
|
|
|
|
|
expect(closed).toBe(true);
|
|
|
|
|
describe("default auth", () => {
|
|
|
|
|
let server: Awaited<ReturnType<typeof startGatewayServer>>;
|
|
|
|
|
let port: number;
|
|
|
|
|
|
|
|
|
|
beforeAll(async () => {
|
|
|
|
|
port = await getFreePort();
|
|
|
|
|
server = await startGatewayServer(port);
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
afterAll(async () => {
|
|
|
|
|
await server.close();
|
|
|
|
|
} finally {
|
|
|
|
|
if (prevHandshakeTimeout === undefined) {
|
|
|
|
|
delete process.env.CLAWDBOT_TEST_HANDSHAKE_TIMEOUT_MS;
|
|
|
|
|
} else {
|
|
|
|
|
process.env.CLAWDBOT_TEST_HANDSHAKE_TIMEOUT_MS = prevHandshakeTimeout;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
});
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
test("connect (req) handshake returns hello-ok payload", async () => {
|
|
|
|
|
const { CONFIG_PATH_CLAWDBOT, STATE_DIR_CLAWDBOT } = await import("../config/config.js");
|
|
|
|
|
const port = await getFreePort();
|
|
|
|
|
const server = await startGatewayServer(port);
|
|
|
|
|
const ws = new WebSocket(`ws://127.0.0.1:${port}`);
|
|
|
|
|
await new Promise<void>((resolve) => ws.once("open", resolve));
|
|
|
|
|
|
|
|
|
|
const res = await connectReq(ws);
|
|
|
|
|
expect(res.ok).toBe(true);
|
|
|
|
|
const payload = res.payload as
|
|
|
|
|
| {
|
|
|
|
|
type?: unknown;
|
|
|
|
|
snapshot?: { configPath?: string; stateDir?: string };
|
|
|
|
|
test("closes silent handshakes after timeout", { timeout: 60_000 }, async () => {
|
|
|
|
|
vi.useRealTimers();
|
|
|
|
|
const prevHandshakeTimeout = process.env.CLAWDBOT_TEST_HANDSHAKE_TIMEOUT_MS;
|
|
|
|
|
process.env.CLAWDBOT_TEST_HANDSHAKE_TIMEOUT_MS = "50";
|
|
|
|
|
try {
|
|
|
|
|
const ws = await openWs(port);
|
|
|
|
|
const handshakeTimeoutMs = getHandshakeTimeoutMs();
|
|
|
|
|
const closed = await waitForWsClose(ws, handshakeTimeoutMs + 250);
|
|
|
|
|
expect(closed).toBe(true);
|
|
|
|
|
} finally {
|
|
|
|
|
if (prevHandshakeTimeout === undefined) {
|
|
|
|
|
delete process.env.CLAWDBOT_TEST_HANDSHAKE_TIMEOUT_MS;
|
|
|
|
|
} else {
|
|
|
|
|
process.env.CLAWDBOT_TEST_HANDSHAKE_TIMEOUT_MS = prevHandshakeTimeout;
|
|
|
|
|
}
|
|
|
|
|
| undefined;
|
|
|
|
|
expect(payload?.type).toBe("hello-ok");
|
|
|
|
|
expect(payload?.snapshot?.configPath).toBe(CONFIG_PATH_CLAWDBOT);
|
|
|
|
|
expect(payload?.snapshot?.stateDir).toBe(STATE_DIR_CLAWDBOT);
|
|
|
|
|
}
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
ws.close();
|
|
|
|
|
await server.close();
|
|
|
|
|
});
|
|
|
|
|
test("connect (req) handshake returns hello-ok payload", async () => {
|
|
|
|
|
const { CONFIG_PATH_CLAWDBOT, STATE_DIR_CLAWDBOT } = await import("../config/config.js");
|
|
|
|
|
const ws = await openWs(port);
|
|
|
|
|
|
|
|
|
|
test("sends connect challenge on open", async () => {
|
|
|
|
|
const port = await getFreePort();
|
|
|
|
|
const server = await startGatewayServer(port);
|
|
|
|
|
const ws = new WebSocket(`ws://127.0.0.1:${port}`);
|
|
|
|
|
const evtPromise = onceMessage<{ payload?: unknown }>(
|
|
|
|
|
ws,
|
|
|
|
|
(o) => o.type === "event" && o.event === "connect.challenge",
|
|
|
|
|
const res = await connectReq(ws);
|
|
|
|
|
expect(res.ok).toBe(true);
|
|
|
|
|
const payload = res.payload as
|
|
|
|
|
| {
|
|
|
|
|
type?: unknown;
|
|
|
|
|
snapshot?: { configPath?: string; stateDir?: string };
|
|
|
|
|
}
|
|
|
|
|
| undefined;
|
|
|
|
|
expect(payload?.type).toBe("hello-ok");
|
|
|
|
|
expect(payload?.snapshot?.configPath).toBe(CONFIG_PATH_CLAWDBOT);
|
|
|
|
|
expect(payload?.snapshot?.stateDir).toBe(STATE_DIR_CLAWDBOT);
|
|
|
|
|
|
|
|
|
|
ws.close();
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
test("sends connect challenge on open", async () => {
|
|
|
|
|
const ws = new WebSocket(`ws://127.0.0.1:${port}`);
|
|
|
|
|
const evtPromise = onceMessage<{ payload?: unknown }>(
|
|
|
|
|
ws,
|
|
|
|
|
(o) => o.type === "event" && o.event === "connect.challenge",
|
|
|
|
|
);
|
|
|
|
|
await new Promise<void>((resolve) => ws.once("open", resolve));
|
|
|
|
|
const evt = await evtPromise;
|
|
|
|
|
const nonce = (evt.payload as { nonce?: unknown } | undefined)?.nonce;
|
|
|
|
|
expect(typeof nonce).toBe("string");
|
|
|
|
|
ws.close();
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
test("rejects protocol mismatch", async () => {
|
|
|
|
|
const ws = await openWs(port);
|
|
|
|
|
try {
|
|
|
|
|
const res = await connectReq(ws, {
|
|
|
|
|
minProtocol: PROTOCOL_VERSION + 1,
|
|
|
|
|
maxProtocol: PROTOCOL_VERSION + 2,
|
|
|
|
|
});
|
|
|
|
|
expect(res.ok).toBe(false);
|
|
|
|
|
} catch {
|
|
|
|
|
// If the server closed before we saw the frame, that's acceptable.
|
|
|
|
|
}
|
|
|
|
|
ws.close();
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
test("rejects non-connect first request", async () => {
|
|
|
|
|
const ws = await openWs(port);
|
|
|
|
|
ws.send(JSON.stringify({ type: "req", id: "h1", method: "health" }));
|
|
|
|
|
const res = await onceMessage<{ ok: boolean; error?: unknown }>(
|
|
|
|
|
ws,
|
|
|
|
|
(o) => o.type === "res" && o.id === "h1",
|
|
|
|
|
);
|
|
|
|
|
expect(res.ok).toBe(false);
|
|
|
|
|
await new Promise<void>((resolve) => ws.once("close", () => resolve()));
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
test(
|
|
|
|
|
"invalid connect params surface in response and close reason",
|
|
|
|
|
{ timeout: 60_000 },
|
|
|
|
|
async () => {
|
|
|
|
|
const ws = await openWs(port);
|
|
|
|
|
const closeInfoPromise = new Promise<{ code: number; reason: string }>((resolve) => {
|
|
|
|
|
ws.once("close", (code, reason) => resolve({ code, reason: reason.toString() }));
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
ws.send(
|
|
|
|
|
JSON.stringify({
|
|
|
|
|
type: "req",
|
|
|
|
|
id: "h-bad",
|
|
|
|
|
method: "connect",
|
|
|
|
|
params: {
|
|
|
|
|
minProtocol: PROTOCOL_VERSION,
|
|
|
|
|
maxProtocol: PROTOCOL_VERSION,
|
|
|
|
|
client: {
|
|
|
|
|
id: "bad-client",
|
|
|
|
|
version: "dev",
|
|
|
|
|
platform: "web",
|
|
|
|
|
mode: "webchat",
|
|
|
|
|
},
|
|
|
|
|
device: {
|
|
|
|
|
id: 123,
|
|
|
|
|
publicKey: "bad",
|
|
|
|
|
signature: "bad",
|
|
|
|
|
signedAt: "bad",
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
}),
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
const res = await onceMessage<{
|
|
|
|
|
ok: boolean;
|
|
|
|
|
error?: { message?: string };
|
|
|
|
|
}>(
|
|
|
|
|
ws,
|
|
|
|
|
(o) => (o as { type?: string }).type === "res" && (o as { id?: string }).id === "h-bad",
|
|
|
|
|
);
|
|
|
|
|
expect(res.ok).toBe(false);
|
|
|
|
|
expect(String(res.error?.message ?? "")).toContain("invalid connect params");
|
|
|
|
|
|
|
|
|
|
const closeInfo = await closeInfoPromise;
|
|
|
|
|
expect(closeInfo.code).toBe(1008);
|
|
|
|
|
expect(closeInfo.reason).toContain("invalid connect params");
|
|
|
|
|
},
|
|
|
|
|
);
|
|
|
|
|
await new Promise<void>((resolve) => ws.once("open", resolve));
|
|
|
|
|
const evt = await evtPromise;
|
|
|
|
|
const nonce = (evt.payload as { nonce?: unknown } | undefined)?.nonce;
|
|
|
|
|
expect(typeof nonce).toBe("string");
|
|
|
|
|
ws.close();
|
|
|
|
|
await server.close();
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
test("rejects protocol mismatch", async () => {
|
|
|
|
|
const { server, ws } = await startServerWithClient();
|
|
|
|
|
try {
|
|
|
|
|
describe("password auth", () => {
|
|
|
|
|
let server: Awaited<ReturnType<typeof startGatewayServer>>;
|
|
|
|
|
let port: number;
|
|
|
|
|
|
|
|
|
|
beforeAll(async () => {
|
|
|
|
|
testState.gatewayAuth = { mode: "password", password: "secret" };
|
|
|
|
|
port = await getFreePort();
|
|
|
|
|
server = await startGatewayServer(port);
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
afterAll(async () => {
|
|
|
|
|
await server.close();
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
test("accepts password auth when configured", async () => {
|
|
|
|
|
const ws = await openWs(port);
|
|
|
|
|
const res = await connectReq(ws, { password: "secret" });
|
|
|
|
|
expect(res.ok).toBe(true);
|
|
|
|
|
ws.close();
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
test("rejects invalid password", async () => {
|
|
|
|
|
const ws = await openWs(port);
|
|
|
|
|
const res = await connectReq(ws, { password: "wrong" });
|
|
|
|
|
expect(res.ok).toBe(false);
|
|
|
|
|
expect(res.error?.message ?? "").toContain("unauthorized");
|
|
|
|
|
ws.close();
|
|
|
|
|
});
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
describe("token auth", () => {
|
|
|
|
|
let server: Awaited<ReturnType<typeof startGatewayServer>>;
|
|
|
|
|
let port: number;
|
|
|
|
|
let prevToken: string | undefined;
|
|
|
|
|
|
|
|
|
|
beforeAll(async () => {
|
|
|
|
|
prevToken = process.env.CLAWDBOT_GATEWAY_TOKEN;
|
|
|
|
|
process.env.CLAWDBOT_GATEWAY_TOKEN = "secret";
|
|
|
|
|
port = await getFreePort();
|
|
|
|
|
server = await startGatewayServer(port);
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
afterAll(async () => {
|
|
|
|
|
await server.close();
|
|
|
|
|
if (prevToken === undefined) {
|
|
|
|
|
delete process.env.CLAWDBOT_GATEWAY_TOKEN;
|
|
|
|
|
} else {
|
|
|
|
|
process.env.CLAWDBOT_GATEWAY_TOKEN = prevToken;
|
|
|
|
|
}
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
test("rejects invalid token", async () => {
|
|
|
|
|
const ws = await openWs(port);
|
|
|
|
|
const res = await connectReq(ws, { token: "wrong" });
|
|
|
|
|
expect(res.ok).toBe(false);
|
|
|
|
|
expect(res.error?.message ?? "").toContain("unauthorized");
|
|
|
|
|
ws.close();
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
test("rejects control ui without device identity by default", async () => {
|
|
|
|
|
const ws = await openWs(port);
|
|
|
|
|
const res = await connectReq(ws, {
|
|
|
|
|
minProtocol: PROTOCOL_VERSION + 1,
|
|
|
|
|
maxProtocol: PROTOCOL_VERSION + 2,
|
|
|
|
|
token: "secret",
|
|
|
|
|
device: null,
|
|
|
|
|
client: {
|
|
|
|
|
id: GATEWAY_CLIENT_NAMES.CONTROL_UI,
|
|
|
|
|
version: "1.0.0",
|
|
|
|
|
platform: "web",
|
|
|
|
|
mode: GATEWAY_CLIENT_MODES.WEBCHAT,
|
|
|
|
|
},
|
|
|
|
|
});
|
|
|
|
|
expect(res.ok).toBe(false);
|
|
|
|
|
} catch {
|
|
|
|
|
// If the server closed before we saw the frame, that's acceptable.
|
|
|
|
|
}
|
|
|
|
|
ws.close();
|
|
|
|
|
await server.close();
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
test("rejects invalid token", async () => {
|
|
|
|
|
const { server, ws, prevToken } = await startServerWithClient("secret");
|
|
|
|
|
const res = await connectReq(ws, { token: "wrong" });
|
|
|
|
|
expect(res.ok).toBe(false);
|
|
|
|
|
expect(res.error?.message ?? "").toContain("unauthorized");
|
|
|
|
|
ws.close();
|
|
|
|
|
await server.close();
|
|
|
|
|
if (prevToken === undefined) {
|
|
|
|
|
delete process.env.CLAWDBOT_GATEWAY_TOKEN;
|
|
|
|
|
} else {
|
|
|
|
|
process.env.CLAWDBOT_GATEWAY_TOKEN = prevToken;
|
|
|
|
|
}
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
test("accepts password auth when configured", async () => {
|
|
|
|
|
testState.gatewayAuth = { mode: "password", password: "secret" };
|
|
|
|
|
const port = await getFreePort();
|
|
|
|
|
const server = await startGatewayServer(port);
|
|
|
|
|
const ws = new WebSocket(`ws://127.0.0.1:${port}`);
|
|
|
|
|
await new Promise<void>((resolve) => ws.once("open", resolve));
|
|
|
|
|
|
|
|
|
|
const res = await connectReq(ws, { password: "secret" });
|
|
|
|
|
expect(res.ok).toBe(true);
|
|
|
|
|
|
|
|
|
|
ws.close();
|
|
|
|
|
await server.close();
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
test("rejects control ui without device identity by default", async () => {
|
|
|
|
|
const { server, ws, prevToken } = await startServerWithClient("secret");
|
|
|
|
|
const res = await connectReq(ws, {
|
|
|
|
|
token: "secret",
|
|
|
|
|
device: null,
|
|
|
|
|
client: {
|
|
|
|
|
id: GATEWAY_CLIENT_NAMES.CONTROL_UI,
|
|
|
|
|
version: "1.0.0",
|
|
|
|
|
platform: "web",
|
|
|
|
|
mode: GATEWAY_CLIENT_MODES.WEBCHAT,
|
|
|
|
|
},
|
|
|
|
|
expect(res.error?.message ?? "").toContain("secure context");
|
|
|
|
|
ws.close();
|
|
|
|
|
});
|
|
|
|
|
expect(res.ok).toBe(false);
|
|
|
|
|
expect(res.error?.message ?? "").toContain("secure context");
|
|
|
|
|
ws.close();
|
|
|
|
|
await server.close();
|
|
|
|
|
if (prevToken === undefined) {
|
|
|
|
|
delete process.env.CLAWDBOT_GATEWAY_TOKEN;
|
|
|
|
|
} else {
|
|
|
|
|
process.env.CLAWDBOT_GATEWAY_TOKEN = prevToken;
|
|
|
|
|
}
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
test("allows control ui without device identity when insecure auth is enabled", async () => {
|
|
|
|
|
@@ -327,81 +424,5 @@ describe("gateway server auth/connect", () => {
|
|
|
|
|
}
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
test("rejects invalid password", async () => {
|
|
|
|
|
testState.gatewayAuth = { mode: "password", password: "secret" };
|
|
|
|
|
const port = await getFreePort();
|
|
|
|
|
const server = await startGatewayServer(port);
|
|
|
|
|
const ws = new WebSocket(`ws://127.0.0.1:${port}`);
|
|
|
|
|
await new Promise<void>((resolve) => ws.once("open", resolve));
|
|
|
|
|
|
|
|
|
|
const res = await connectReq(ws, { password: "wrong" });
|
|
|
|
|
expect(res.ok).toBe(false);
|
|
|
|
|
expect(res.error?.message ?? "").toContain("unauthorized");
|
|
|
|
|
|
|
|
|
|
ws.close();
|
|
|
|
|
await server.close();
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
test("rejects non-connect first request", async () => {
|
|
|
|
|
const { server, ws } = await startServerWithClient();
|
|
|
|
|
ws.send(JSON.stringify({ type: "req", id: "h1", method: "health" }));
|
|
|
|
|
const res = await onceMessage<{ ok: boolean; error?: unknown }>(
|
|
|
|
|
ws,
|
|
|
|
|
(o) => o.type === "res" && o.id === "h1",
|
|
|
|
|
);
|
|
|
|
|
expect(res.ok).toBe(false);
|
|
|
|
|
await new Promise<void>((resolve) => ws.once("close", () => resolve()));
|
|
|
|
|
await server.close();
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
test(
|
|
|
|
|
"invalid connect params surface in response and close reason",
|
|
|
|
|
{ timeout: 60_000 },
|
|
|
|
|
async () => {
|
|
|
|
|
const { server, ws } = await startServerWithClient();
|
|
|
|
|
const closeInfoPromise = new Promise<{ code: number; reason: string }>((resolve) => {
|
|
|
|
|
ws.once("close", (code, reason) => resolve({ code, reason: reason.toString() }));
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
ws.send(
|
|
|
|
|
JSON.stringify({
|
|
|
|
|
type: "req",
|
|
|
|
|
id: "h-bad",
|
|
|
|
|
method: "connect",
|
|
|
|
|
params: {
|
|
|
|
|
minProtocol: PROTOCOL_VERSION,
|
|
|
|
|
maxProtocol: PROTOCOL_VERSION,
|
|
|
|
|
client: {
|
|
|
|
|
id: "bad-client",
|
|
|
|
|
version: "dev",
|
|
|
|
|
platform: "web",
|
|
|
|
|
mode: "webchat",
|
|
|
|
|
},
|
|
|
|
|
device: {
|
|
|
|
|
id: 123,
|
|
|
|
|
publicKey: "bad",
|
|
|
|
|
signature: "bad",
|
|
|
|
|
signedAt: "bad",
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
}),
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
const res = await onceMessage<{
|
|
|
|
|
ok: boolean;
|
|
|
|
|
error?: { message?: string };
|
|
|
|
|
}>(
|
|
|
|
|
ws,
|
|
|
|
|
(o) => (o as { type?: string }).type === "res" && (o as { id?: string }).id === "h-bad",
|
|
|
|
|
);
|
|
|
|
|
expect(res.ok).toBe(false);
|
|
|
|
|
expect(String(res.error?.message ?? "")).toContain("invalid connect params");
|
|
|
|
|
|
|
|
|
|
const closeInfo = await closeInfoPromise;
|
|
|
|
|
expect(closeInfo.code).toBe(1008);
|
|
|
|
|
expect(closeInfo.reason).toContain("invalid connect params");
|
|
|
|
|
|
|
|
|
|
await server.close();
|
|
|
|
|
},
|
|
|
|
|
);
|
|
|
|
|
// Remaining tests require isolated gateway state.
|
|
|
|
|
});
|
|
|
|
|
|