fix(secrets): allow allowInsecurePath for file providers#40486
fix(secrets): allow allowInsecurePath for file providers#40486AaronWander wants to merge 1 commit intoopenclaw:mainfrom
Conversation
Greptile SummaryThis PR fixes a Windows CI shard failure in
Confidence Score: 5/5
Last reviewed commit: 7d9a3c2 |
|
This looks like it fixes the current Windows CI failure ( In particular, threading Thanks for tackling this — seems worth merging to get main green again. |
Summary
src/secrets/runtime.test.tswithACL verification unavailable on Windowsfor temp-file secret providers, because file secret providers cannot opt out of strict path ACL verification.mainand causes unrelated PRs to fail and block merges.allowInsecurePath?: boolean(schema + types); the resolver passes it through to the secure-path audit; the secrets runtime tests enable it on Windows for temp-home secret files.allowInsecurePath: true.Change Type (select all)
Scope (select all touched areas)
Linked Issue/PR
SecretProviderResolutionError: ... ACL verification unavailable on Windows(examplemainrun: https://github.com/openclaw/openclaw/actions/runs/22834544630)src/cli/daemon-cli/lifecycle.test.ts, which is addressed separately in fix: format daemon lifecycle test #40450.User-visible / Behavior Changes
allowInsecurePath: trueto bypass path permission/ACL verification when the path is trusted (notably when Windows ACL verification is unavailable).Security Impact (required)
Repro + Verification
Environment
Steps
pnpm test(sharded).src/secrets/runtime.test.tsfailing withACL verification unavailable on Windows ... Set allowInsecurePath=true ....Expected
Actual
allowInsecurePath, so the secure-path audit fails when ACL verification is unavailable.Evidence
Human Verification (required)
What you personally verified (not just CI), and how:
Verified scenarios:
pnpm tsgopnpm exec vitest run src/secrets/runtime.test.tsWhat you did not verify:
Compatibility / Migration
Failure Recovery (if this breaks)
allowInsecurePathoption for file secret providers.Risks and Mitigations
Risk:
Mitigation:
allowInsecurePath: true) and defaults to strict behavior.