Skip to content

Commit 08597e8

Browse files
committed
fix(ci): stabilize detect-secrets baseline
1 parent eb9e78d commit 08597e8

File tree

4 files changed

+14
-14
lines changed

4 files changed

+14
-14
lines changed

.secrets.baseline

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -203,7 +203,7 @@
203203
"filename": "apps/macos/Sources/OpenClawProtocol/GatewayModels.swift",
204204
"hashed_secret": "7990585255d25249fb1e6eac3d2bd6c37429b2cd",
205205
"is_verified": false,
206-
"line_number": 1745
206+
"line_number": 1749
207207
}
208208
],
209209
"apps/macos/Tests/OpenClawIPCTests/AnthropicAuthResolverTests.swift": [
@@ -264,7 +264,7 @@
264264
"filename": "apps/shared/OpenClawKit/Sources/OpenClawProtocol/GatewayModels.swift",
265265
"hashed_secret": "7990585255d25249fb1e6eac3d2bd6c37429b2cd",
266266
"is_verified": false,
267-
"line_number": 1745
267+
"line_number": 1749
268268
}
269269
],
270270
"docs/.i18n/zh-CN.tm.jsonl": [
@@ -11123,7 +11123,7 @@
1112311123
"filename": "extensions/nextcloud-talk/src/channel.ts",
1112411124
"hashed_secret": "71f8e7976e4cbc4561c9d62fb283e7f788202acb",
1112511125
"is_verified": false,
11126-
"line_number": 399
11126+
"line_number": 403
1112711127
}
1112811128
],
1112911129
"extensions/nostr/README.md": [
@@ -12410,28 +12410,28 @@
1241012410
"filename": "src/gateway/auth.test.ts",
1241112411
"hashed_secret": "db5543cd7440bbdc4c5aaf8aa363715c31dd5a27",
1241212412
"is_verified": false,
12413-
"line_number": 95
12413+
"line_number": 96
1241412414
},
1241512415
{
1241612416
"type": "Secret Keyword",
1241712417
"filename": "src/gateway/auth.test.ts",
1241812418
"hashed_secret": "d51f846285cbc6d1dd76677a0fd588c8df44e506",
1241912419
"is_verified": false,
12420-
"line_number": 112
12420+
"line_number": 113
1242112421
},
1242212422
{
1242312423
"type": "Secret Keyword",
1242412424
"filename": "src/gateway/auth.test.ts",
1242512425
"hashed_secret": "e5e9fa1ba31ecd1ae84f75caaa474f3a663f05f4",
1242612426
"is_verified": false,
12427-
"line_number": 254
12427+
"line_number": 255
1242812428
},
1242912429
{
1243012430
"type": "Secret Keyword",
1243112431
"filename": "src/gateway/auth.test.ts",
1243212432
"hashed_secret": "a4b48a81cdab1e1a5dd37907d6c85ca1c61ddc7c",
1243312433
"is_verified": false,
12434-
"line_number": 262
12434+
"line_number": 263
1243512435
}
1243612436
],
1243712437
"src/gateway/call.test.ts": [
@@ -12622,7 +12622,7 @@
1262212622
"filename": "src/infra/outbound/outbound.test.ts",
1262312623
"hashed_secret": "804ec071803318791b835cffd6e509c8d32239db",
1262412624
"is_verified": false,
12625-
"line_number": 850
12625+
"line_number": 896
1262612626
}
1262712627
],
1262812628
"src/infra/provider-usage.auth.normalizes-keys.test.ts": [
@@ -12916,7 +12916,7 @@
1291612916
"filename": "src/telegram/monitor.test.ts",
1291712917
"hashed_secret": "5934c4d4a4fa5d66ddb3d3fc0bba84996c17a5b7",
1291812918
"is_verified": false,
12919-
"line_number": 603
12919+
"line_number": 641
1292012920
}
1292112921
],
1292212922
"src/telegram/webhook.test.ts": [
@@ -13011,5 +13011,5 @@
1301113011
}
1301213012
]
1301313013
},
13014-
"generated_at": "2026-03-07T23:50:03Z"
13014+
"generated_at": "2026-03-08T01:23:32Z"
1301513015
}

src/daemon/systemd.test.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -601,7 +601,7 @@ describe("readSystemdServiceExecStart", () => {
601601
});
602602
expect(command?.environmentValueSources).toEqual({
603603
OPENCLAW_GATEWAY_TOKEN: "file",
604-
OPENCLAW_GATEWAY_PASSWORD: "file",
604+
OPENCLAW_GATEWAY_PASSWORD: "file", // pragma: allowlist secret
605605
});
606606
});
607607
});

src/gateway/connection-auth.test.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -404,15 +404,15 @@ describe("resolveGatewayConnectionAuth", () => {
404404
config,
405405
env,
406406
includeLegacyEnv: false,
407-
localPasswordPrecedence: "config-first",
407+
localPasswordPrecedence: "config-first", // pragma: allowlist secret
408408
}),
409409
).rejects.toThrow("gateway.auth.password");
410410
expect(() =>
411411
resolveGatewayConnectionAuthFromConfig({
412412
cfg: config,
413413
env,
414414
includeLegacyEnv: false,
415-
localPasswordPrecedence: "config-first",
415+
localPasswordPrecedence: "config-first", // pragma: allowlist secret
416416
}),
417417
).toThrow("gateway.auth.password");
418418
});

src/gateway/credentials.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -265,7 +265,7 @@ export function resolveGatewayCredentialsFromConfig(params: {
265265
}
266266
if (
267267
localPasswordRef &&
268-
localPasswordPrecedence === "config-first" &&
268+
localPasswordPrecedence === "config-first" && // pragma: allowlist secret
269269
!localPassword &&
270270
Boolean(envPassword) &&
271271
localPasswordCanWin

0 commit comments

Comments
 (0)