OmniRoute/tests/unit/management-password.test.ts
diegosouzapw 4ae488b25b feat(runtime): add hot-reloadable guardrails and model diagnostics
Introduce a runtime settings layer that hydrates persisted config at startup
and reapplies aliases, payload rules, cache behavior, CLI compatibility,
usage tuning, and related switches when settings change or SQLite updates.

Replace the legacy prompt injection middleware path with a guardrail
registry that supports prompt injection detection, PII masking, disabled
guardrail overrides, and post-call response handling across the chat
pipeline.

Add a metadata registry for model catalog and alias resolution so catalog
endpoints return enriched capabilities plus diagnostic headers and typed
alias errors instead of ad hoc responses.

Convert unsupported built-in web_search tools into an OmniRoute fallback
tool, execute them through builtin skills, and preserve Responses API
function call output with sanitized usage fields.

Centralize provider header fingerprints for GitHub, Cursor, Qwen, Qoder,
Kiro, and Antigravity, and migrate management passwords from env or
plaintext storage into persisted bcrypt hashes during startup and login.
2026-04-17 11:56:52 -03:00

77 lines
2.6 KiB
TypeScript

import test from "node:test";
import assert from "node:assert/strict";
import fs from "node:fs";
import os from "node:os";
import path from "node:path";
const TEST_DATA_DIR = fs.mkdtempSync(path.join(os.tmpdir(), "omniroute-management-password-"));
process.env.DATA_DIR = TEST_DATA_DIR;
const ORIGINAL_INITIAL_PASSWORD = process.env.INITIAL_PASSWORD;
const core = await import("../../src/lib/db/core.ts");
const settingsDb = await import("../../src/lib/db/settings.ts");
const managementPassword = await import("../../src/lib/auth/managementPassword.ts");
async function resetStorage() {
core.resetDbInstance();
fs.rmSync(TEST_DATA_DIR, { recursive: true, force: true });
fs.mkdirSync(TEST_DATA_DIR, { recursive: true });
delete process.env.INITIAL_PASSWORD;
}
test.beforeEach(async () => {
await resetStorage();
});
test.after(() => {
core.resetDbInstance();
fs.rmSync(TEST_DATA_DIR, { recursive: true, force: true });
if (ORIGINAL_INITIAL_PASSWORD === undefined) {
delete process.env.INITIAL_PASSWORD;
} else {
process.env.INITIAL_PASSWORD = ORIGINAL_INITIAL_PASSWORD;
}
});
test("ensurePersistentManagementPasswordHash migrates INITIAL_PASSWORD into a persisted bcrypt hash", async () => {
process.env.INITIAL_PASSWORD = "bootstrap-secret";
const result = await managementPassword.ensurePersistentManagementPasswordHash({
source: "test",
});
const settings = await settingsDb.getSettings();
assert.equal(result.migrated, true);
assert.equal(result.source, "env");
assert.equal(managementPassword.isBcryptHash(settings.password), true);
assert.notEqual(settings.password, "bootstrap-secret");
assert.equal(
await managementPassword.verifyManagementPassword("bootstrap-secret", settings.password),
true
);
assert.equal(settings.requireLogin, true);
assert.equal(settings.setupComplete, true);
});
test("ensurePersistentManagementPasswordHash migrates legacy plaintext settings passwords", async () => {
await settingsDb.updateSettings({
password: "legacy-password",
requireLogin: true,
setupComplete: true,
});
const result = await managementPassword.ensurePersistentManagementPasswordHash({
source: "test",
});
const settings = await settingsDb.getSettings();
assert.equal(result.migrated, true);
assert.equal(result.source, "stored_plaintext");
assert.equal(managementPassword.isBcryptHash(settings.password), true);
assert.notEqual(settings.password, "legacy-password");
assert.equal(
await managementPassword.verifyManagementPassword("legacy-password", settings.password),
true
);
});