c6f932988a
* MAESTRO: fix ChromaDB core issues — Python pinning, Windows paths, disable toggle, metadata sanitization, transport errors - Add --python version pinning to uvx args in both local and remote mode (fixes #1196, #1206, #1208) - Convert backslash paths to forward slashes for --data-dir on Windows (fixes #1199) - Add CLAUDE_MEM_CHROMA_ENABLED setting for SQLite-only fallback mode (fixes #707) - Sanitize metadata in addDocuments() to filter null/undefined/empty values (fixes #1183, #1188) - Wrap callTool() in try/catch for transport errors with auto-reconnect (fixes #1162) Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> * MAESTRO: fix data integrity — content-hash deduplication, project name collision, empty project guard, stuck isProcessing - Add SHA-256 content-hash deduplication to observations INSERT (store.ts, transactions.ts, SessionStore.ts) - Add content_hash column via migration 22 with backfill and index - Fix project name collision: getCurrentProjectName() now returns parent/basename - Guard against empty project string with cwd-derived fallback - Fix stuck isProcessing: hasAnyPendingWork() resets processing messages older than 5 minutes - Add 12 new tests covering all four fixes Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> * MAESTRO: fix hook lifecycle — stderr suppression, output isolation, conversation pollution prevention - Suppress process.stderr.write in hookCommand() to prevent Claude Code showing diagnostic output as error UI (#1181). Restores stderr in finally block for worker-continues case. - Convert console.error() to logger.warn()/error() in hook-command.ts and handlers/index.ts so all diagnostics route to log file instead of stderr. - Verified all 7 handlers return suppressOutput: true (prevents conversation pollution #598, #784). - Verified session-complete is a recognized event type (fixes #984). - Verified unknown event types return no-op handler with exit 0 (graceful degradation). - Added 10 new tests in tests/hook-lifecycle.test.ts covering event dispatch, adapter defaults, stderr suppression, and standard response constants. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> * MAESTRO: fix worker lifecycle — restart loop coordination, stale transport retry, ENOENT shutdown race - Add PID file mtime guard to prevent concurrent restart storms (#1145): isPidFileRecent() + touchPidFile() coordinate across sessions - Add transparent retry in ChromaMcpManager.callTool() on transport error — reconnects and retries once instead of failing (#1131) - Wrap getInstalledPluginVersion() with ENOENT/EBUSY handling (#1042) - Verified ChromaMcpManager.stop() already called on all shutdown paths Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> * MAESTRO: fix Windows platform support — uvx.cmd spawn, PowerShell $_ elimination, windowsHide, FTS5 fallback - Route uvx spawn through cmd.exe /c on Windows since MCP SDK lacks shell:true (#1190, #1192, #1199) - Replace all PowerShell Where-Object {$_} pipelines with WQL -Filter server-side filtering (#1024, #1062) - Add windowsHide: true to all exec/spawn calls missing it to prevent console popups (#1048) - Add FTS5 runtime probe with graceful fallback when unavailable on Windows (#791) - Guard FTS5 table creation in migrations, SessionSearch, and SessionStore with try/catch Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> * MAESTRO: fix skills/ distribution — build-time verification and regression tests (#1187) Add post-build verification in build-hooks.js that fails if critical distribution files (skills, hooks, plugin manifest) are missing. Add 10 regression tests covering skill file presence, YAML frontmatter, hooks.json integrity, and package.json files field. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> * MAESTRO: fix MigrationRunner schema initialization (#979) — version conflict between parallel migration systems Root cause: old DatabaseManager migrations 1-7 shared schema_versions table with MigrationRunner's 4-22, causing version number collisions (5=drop tables vs add column, 6=FTS5 vs prompt tracking, 7=discovery_tokens vs remove UNIQUE). initializeSchema() was gated behind maxApplied===0, so core tables were never created when old versions were present. Fixes: - initializeSchema() always creates core tables via CREATE TABLE IF NOT EXISTS - Migrations 5-7 check actual DB state (columns/constraints) not just version tracking - Crash-safe temp table rebuilds (DROP IF EXISTS _new before CREATE) - Added missing migration 21 (ON UPDATE CASCADE) to MigrationRunner - Added ON UPDATE CASCADE to FK definitions in initializeSchema() - All changes applied to both runner.ts and SessionStore.ts Tests: 13 new tests in migration-runner.test.ts covering fresh DB, idempotency, version conflicts, crash recovery, FK constraints, and data integrity. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> * MAESTRO: fix 21 test failures — stale mocks, outdated assertions, missing OpenClaw guards Server tests (12): Added missing workerPath and getAiStatus to ServerOptions mocks after interface expansion. ChromaSync tests (3): Updated to verify transport cleanup in ChromaMcpManager after architecture refactor. OpenClaw (2): Added memory_ tool skipping and response truncation to prevent recursive loops and oversized payloads. MarkdownFormatter (2): Updated assertions to match current output. SettingsDefaultsManager (1): Used correct default key for getBool test. Logger standards (1): Excluded CLI transcript command from background service check. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> * MAESTRO: fix Codex CLI compatibility (#744) — session_id fallbacks, unknown platform tolerance, undefined guard Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> * MAESTRO: fix Cursor IDE integration (#838, #1049) — adapter field fallbacks, tolerant session-init validation Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> * MAESTRO: fix /api/logs OOM (#1203) — tail-read replaces full-file readFileSync Replace readFileSync (loads entire file into memory) with readLastLines() that reads only from the end of the file in expanding chunks (64KB → 10MB cap). Prevents OOM on large log files while preserving the same API response shape. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> * MAESTRO: fix Settings CORS error (#1029) — explicit methods and allowedHeaders in CORS config Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> * MAESTRO: add session custom_title for agent attribution (#1213) — migration 23, endpoint + store support Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> * MAESTRO: prevent CLAUDE.md/AGENTS.md writes inside .git/ directories (#1165) Add .git path guard to all 4 write sites to prevent ref corruption when paths resolve inside .git internals. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> * MAESTRO: fix plugin disabled state not respected (#781) — early exit check in all hook entry points Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> * MAESTRO: fix UserPromptSubmit context re-injection on every turn (#1079) — contextInjected session flag Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> * MAESTRO: fix stale AbortController queue stall (#1099) — lastGeneratorActivity tracking + 30s timeout Three-layer fix: 1. Added lastGeneratorActivity timestamp to ActiveSession, updated by processAgentResponse (all agents), getMessageIterator (queue yields), and startGeneratorWithProvider (generator launch) 2. Added stale generator detection in ensureGeneratorRunning — if no activity for >30s, aborts stale controller, resets state, restarts 3. Added AbortSignal.timeout(30000) in deleteSession to prevent indefinite hang when awaiting a stuck generator promise Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> --------- Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com>
203 lines
6.8 KiB
TypeScript
203 lines
6.8 KiB
TypeScript
/**
|
|
* CORS Restriction Tests
|
|
*
|
|
* Verifies that CORS is properly restricted to localhost origins only,
|
|
* and that preflight responses include the correct methods and headers (#1029).
|
|
*/
|
|
|
|
import { describe, it, expect, beforeEach, afterEach } from 'bun:test';
|
|
import express from 'express';
|
|
import cors from 'cors';
|
|
import http from 'http';
|
|
|
|
// Test the CORS origin validation logic directly
|
|
function isAllowedOrigin(origin: string | undefined): boolean {
|
|
if (!origin) return true; // No origin = hooks, curl, CLI
|
|
if (origin.startsWith('http://localhost:')) return true;
|
|
if (origin.startsWith('http://127.0.0.1:')) return true;
|
|
return false;
|
|
}
|
|
|
|
/**
|
|
* Build the same CORS config used in production middleware.ts.
|
|
* Duplicated here to avoid module-mock interference from other test files.
|
|
*/
|
|
function buildProductionCorsMiddleware() {
|
|
return cors({
|
|
origin: (origin, callback) => {
|
|
if (!origin ||
|
|
origin.startsWith('http://localhost:') ||
|
|
origin.startsWith('http://127.0.0.1:')) {
|
|
callback(null, true);
|
|
} else {
|
|
callback(new Error('CORS not allowed'));
|
|
}
|
|
},
|
|
methods: ['GET', 'HEAD', 'POST', 'PUT', 'PATCH', 'DELETE'],
|
|
allowedHeaders: ['Content-Type', 'Authorization', 'X-Requested-With'],
|
|
credentials: false
|
|
});
|
|
}
|
|
|
|
describe('CORS Restriction', () => {
|
|
describe('allowed origins', () => {
|
|
it('allows requests without Origin header (hooks, curl, CLI)', () => {
|
|
expect(isAllowedOrigin(undefined)).toBe(true);
|
|
});
|
|
|
|
it('allows localhost with port', () => {
|
|
expect(isAllowedOrigin('http://localhost:37777')).toBe(true);
|
|
expect(isAllowedOrigin('http://localhost:3000')).toBe(true);
|
|
expect(isAllowedOrigin('http://localhost:8080')).toBe(true);
|
|
});
|
|
|
|
it('allows 127.0.0.1 with port', () => {
|
|
expect(isAllowedOrigin('http://127.0.0.1:37777')).toBe(true);
|
|
expect(isAllowedOrigin('http://127.0.0.1:3000')).toBe(true);
|
|
});
|
|
});
|
|
|
|
describe('blocked origins', () => {
|
|
it('blocks external domains', () => {
|
|
expect(isAllowedOrigin('http://evil.com')).toBe(false);
|
|
expect(isAllowedOrigin('https://attacker.io')).toBe(false);
|
|
expect(isAllowedOrigin('http://malicious-site.net:8080')).toBe(false);
|
|
});
|
|
|
|
it('blocks HTTPS localhost (not typically used for local dev)', () => {
|
|
// HTTPS localhost is unusual and could indicate a proxy attack
|
|
expect(isAllowedOrigin('https://localhost:37777')).toBe(false);
|
|
});
|
|
|
|
it('blocks localhost-like domains (subdomain attacks)', () => {
|
|
expect(isAllowedOrigin('http://localhost.evil.com')).toBe(false);
|
|
expect(isAllowedOrigin('http://localhost.attacker.io:8080')).toBe(false);
|
|
});
|
|
|
|
it('blocks file:// origins', () => {
|
|
expect(isAllowedOrigin('file://')).toBe(false);
|
|
});
|
|
|
|
it('blocks null origin', () => {
|
|
// null origin can come from sandboxed iframes
|
|
expect(isAllowedOrigin('null')).toBe(false);
|
|
});
|
|
});
|
|
|
|
describe('preflight CORS headers (#1029)', () => {
|
|
let app: express.Application;
|
|
let server: http.Server;
|
|
let testPort: number;
|
|
|
|
beforeEach(async () => {
|
|
app = express();
|
|
app.use(express.json());
|
|
app.use(buildProductionCorsMiddleware());
|
|
|
|
// Add a test endpoint that supports all methods
|
|
app.all('/api/settings', (_req, res) => {
|
|
res.json({ ok: true });
|
|
});
|
|
|
|
testPort = 41000 + Math.floor(Math.random() * 10000);
|
|
await new Promise<void>((resolve) => {
|
|
server = app.listen(testPort, '127.0.0.1', resolve);
|
|
});
|
|
});
|
|
|
|
afterEach(async () => {
|
|
if (server) {
|
|
await new Promise<void>((resolve, reject) => {
|
|
server.close(err => err ? reject(err) : resolve());
|
|
});
|
|
}
|
|
});
|
|
|
|
it('preflight response includes PUT in allowed methods', async () => {
|
|
const response = await fetch(`http://127.0.0.1:${testPort}/api/settings`, {
|
|
method: 'OPTIONS',
|
|
headers: {
|
|
'Origin': 'http://localhost:37777',
|
|
'Access-Control-Request-Method': 'PUT',
|
|
},
|
|
});
|
|
|
|
expect(response.status).toBe(204);
|
|
const allowedMethods = response.headers.get('access-control-allow-methods');
|
|
expect(allowedMethods).toContain('PUT');
|
|
});
|
|
|
|
it('preflight response includes PATCH in allowed methods', async () => {
|
|
const response = await fetch(`http://127.0.0.1:${testPort}/api/settings`, {
|
|
method: 'OPTIONS',
|
|
headers: {
|
|
'Origin': 'http://localhost:37777',
|
|
'Access-Control-Request-Method': 'PATCH',
|
|
},
|
|
});
|
|
|
|
expect(response.status).toBe(204);
|
|
const allowedMethods = response.headers.get('access-control-allow-methods');
|
|
expect(allowedMethods).toContain('PATCH');
|
|
});
|
|
|
|
it('preflight response includes DELETE in allowed methods', async () => {
|
|
const response = await fetch(`http://127.0.0.1:${testPort}/api/settings`, {
|
|
method: 'OPTIONS',
|
|
headers: {
|
|
'Origin': 'http://localhost:37777',
|
|
'Access-Control-Request-Method': 'DELETE',
|
|
},
|
|
});
|
|
|
|
expect(response.status).toBe(204);
|
|
const allowedMethods = response.headers.get('access-control-allow-methods');
|
|
expect(allowedMethods).toContain('DELETE');
|
|
});
|
|
|
|
it('preflight response includes Content-Type in allowed headers', async () => {
|
|
const response = await fetch(`http://127.0.0.1:${testPort}/api/settings`, {
|
|
method: 'OPTIONS',
|
|
headers: {
|
|
'Origin': 'http://localhost:37777',
|
|
'Access-Control-Request-Method': 'POST',
|
|
'Access-Control-Request-Headers': 'Content-Type',
|
|
},
|
|
});
|
|
|
|
expect(response.status).toBe(204);
|
|
const allowedHeaders = response.headers.get('access-control-allow-headers');
|
|
expect(allowedHeaders).toContain('Content-Type');
|
|
});
|
|
|
|
it('preflight from localhost includes allow-origin header', async () => {
|
|
const response = await fetch(`http://127.0.0.1:${testPort}/api/settings`, {
|
|
method: 'OPTIONS',
|
|
headers: {
|
|
'Origin': 'http://localhost:37777',
|
|
'Access-Control-Request-Method': 'POST',
|
|
'Access-Control-Request-Headers': 'Content-Type',
|
|
},
|
|
});
|
|
|
|
expect(response.status).toBe(204);
|
|
const origin = response.headers.get('access-control-allow-origin');
|
|
expect(origin).toBe('http://localhost:37777');
|
|
});
|
|
|
|
it('preflight from external origin omits allow-origin header', async () => {
|
|
const response = await fetch(`http://127.0.0.1:${testPort}/api/settings`, {
|
|
method: 'OPTIONS',
|
|
headers: {
|
|
'Origin': 'http://evil.com',
|
|
'Access-Control-Request-Method': 'POST',
|
|
},
|
|
});
|
|
|
|
// cors middleware rejects disallowed origins — browser enforces the block
|
|
const origin = response.headers.get('access-control-allow-origin');
|
|
expect(origin).toBeNull();
|
|
});
|
|
});
|
|
});
|