* refactor: introduce provider plugin registry * refactor: move provider CLI to plugins * docs: add provider plugin implementation notes * refactor: shift provider runtime logic into plugins * refactor: add plugin defaults and summaries * docs: update provider plugin notes * feat(commands): add /commands slash list * Auto-reply: tidy help message * Auto-reply: fix status command lint * Tests: align google shared expectations * Auto-reply: tidy help message * Auto-reply: fix status command lint * refactor: move provider routing into plugins * test: align agent routing expectations * docs: update provider plugin notes * refactor: route replies via provider plugins * docs: note route-reply plugin hooks * refactor: extend provider plugin contract * refactor: derive provider status from plugins * refactor: unify gateway provider control * refactor: use plugin metadata in auto-reply * fix: parenthesize cron target selection * refactor: derive gateway methods from plugins * refactor: generalize provider logout * refactor: route provider logout through plugins * refactor: move WhatsApp web login methods into plugin * refactor: generalize provider log prefixes * refactor: centralize default chat provider * refactor: derive provider lists from registry * refactor: move provider reload noops into plugins * refactor: resolve web login provider via alias * refactor: derive CLI provider options from plugins * refactor: derive prompt provider list from plugins * style: apply biome lint fixes * fix: resolve provider routing edge cases * docs: update provider plugin refactor notes * fix(gateway): harden agent provider routing * refactor: move provider routing into plugins * refactor: move provider CLI to plugins * refactor: derive provider lists from registry * fix: restore slash command parsing * refactor: align provider ids for schema * refactor: unify outbound target resolution * fix: keep outbound labels stable * feat: add msteams to cron surfaces * fix: clean up lint build issues * refactor: localize chat provider alias normalization * refactor: drive gateway provider lists from plugins * docs: update provider plugin notes * style: format message-provider * fix: avoid provider registry init cycles * style: sort message-provider imports * fix: relax provider alias map typing * refactor: move provider routing into plugins * refactor: add plugin pairing/config adapters * refactor: route pairing and provider removal via plugins * refactor: align auto-reply provider typing * test: stabilize telegram media mocks * docs: update provider plugin refactor notes * refactor: pluginize outbound targets * refactor: pluginize provider selection * refactor: generalize text chunk limits * docs: update provider plugin notes * refactor: generalize group session/config * fix: normalize provider id for room detection * fix: avoid provider init in system prompt * style: formatting cleanup * refactor: normalize agent delivery targets * test: update outbound delivery labels * chore: fix lint regressions * refactor: extend provider plugin adapters * refactor: move elevated/block streaming defaults to plugins * refactor: defer outbound send deps to plugins * docs: note plugin-driven streaming/elevated defaults * refactor: centralize webchat provider constant * refactor: add provider setup adapters * refactor: delegate provider add config to plugins * docs: document plugin-driven provider add * refactor: add plugin state/binding metadata * refactor: build agent provider status from plugins * docs: note plugin-driven agent bindings * refactor: centralize internal provider constant usage * fix: normalize WhatsApp targets for groups and E.164 (#631) (thanks @imfing) * refactor: centralize default chat provider * refactor: centralize WhatsApp target normalization * refactor: move provider routing into plugins * refactor: normalize agent delivery targets * chore: fix lint regressions * fix: normalize WhatsApp targets for groups and E.164 (#631) (thanks @imfing) * feat: expand provider plugin adapters * refactor: route auto-reply via provider plugins * fix: align WhatsApp target normalization * fix: normalize WhatsApp targets for groups and E.164 (#631) (thanks @imfing) * refactor: centralize WhatsApp target normalization * feat: add /config chat config updates * docs: add /config get alias * feat(commands): add /commands slash list * refactor: centralize default chat provider * style: apply biome lint fixes * chore: fix lint regressions * fix: clean up whatsapp allowlist typing * style: format config command helpers * refactor: pluginize tool threading context * refactor: normalize session announce targets * docs: note new plugin threading and announce hooks * refactor: pluginize message actions * docs: update provider plugin actions notes * fix: align provider action adapters * refactor: centralize webchat checks * style: format message provider helpers * refactor: move provider onboarding into adapters * docs: note onboarding provider adapters * feat: add msteams onboarding adapter * style: organize onboarding imports * fix: normalize msteams allowFrom types * feat: add plugin text chunk limits * refactor: use plugin chunk limit fallbacks * feat: add provider mention stripping hooks * style: organize provider plugin type imports * refactor: generalize health snapshots * refactor: update macOS health snapshot handling * docs: refresh health snapshot notes * style: format health snapshot updates * refactor: drive security warnings via plugins * docs: note provider security adapter * style: format provider security adapters * refactor: centralize provider account defaults * refactor: type gateway client identity constants * chore: regen gateway protocol swift * fix: degrade health on failed provider probe * refactor: centralize pairing approve hint * docs: add plugin CLI command references * refactor: route auth and tool sends through plugins * docs: expand provider plugin hooks * refactor: document provider docking touchpoints * refactor: normalize internal provider defaults * refactor: streamline outbound delivery wiring * refactor: make provider onboarding plugin-owned * refactor: support provider-owned agent tools * refactor: move telegram draft chunking into telegram module * refactor: infer provider tool sends via extractToolSend * fix: repair plugin onboarding imports * refactor: de-dup outbound target normalization * style: tidy plugin and agent imports * refactor: data-drive provider selection line * fix: satisfy lint after provider plugin rebase * test: deflake gateway-cli coverage * style: format gateway-cli coverage test * refactor(provider-plugins): simplify provider ids * test(pairing-cli): avoid provider-specific ternary * style(macos): swiftformat HealthStore * refactor(sandbox): derive provider tool denylist * fix(sandbox): avoid plugin init in defaults * refactor(provider-plugins): centralize provider aliases * style(test): satisfy biome * refactor(protocol): v3 providers.status maps * refactor(ui): adapt to protocol v3 * refactor(macos): adapt to protocol v3 * test: update providers.status v3 fixtures * refactor(gateway): map provider runtime snapshot * test(gateway): update reload runtime snapshot * refactor(whatsapp): normalize heartbeat provider id * docs(refactor): update provider plugin notes * style: satisfy biome after rebase * fix: describe sandboxed elevated in prompt * feat(gateway): add agent image attachments + live probe * refactor: derive CLI provider options from plugins * fix(gateway): harden agent provider routing * fix(gateway): harden agent provider routing * refactor: align provider ids for schema * fix(protocol): keep agent provider string * fix(gateway): harden agent provider routing * fix(protocol): keep agent provider string * refactor: normalize agent delivery targets * refactor: support provider-owned agent tools * refactor(config): provider-keyed elevated allowFrom * style: satisfy biome * fix(gateway): appease provider narrowing * style: satisfy biome * refactor(reply): move group intro hints into plugin * fix(reply): avoid plugin registry init cycle * refactor(providers): add lightweight provider dock * refactor(gateway): use typed client id in connect * refactor(providers): document docks and avoid init cycles * refactor(providers): make media limit helper generic * fix(providers): break plugin registry import cycles * style: satisfy biome * refactor(status-all): build providers table from plugins * refactor(gateway): delegate web login to provider plugin * refactor(provider): drop web alias * refactor(provider): lazy-load monitors * style: satisfy lint/format * style: format status-all providers table * style: swiftformat gateway discovery model * test: make reload plan plugin-driven * fix: avoid token stringification in status-all * refactor: make provider IDs explicit in status * feat: warn on signal/imessage provider runtime errors * test: cover gateway provider runtime warnings in status * fix: add runtime kind to provider status issues * test: cover health degradation on probe failure * fix: keep routeReply lightweight * style: organize routeReply imports * refactor(web): extract auth-store helpers * refactor(whatsapp): lazy login imports * refactor(outbound): route replies via plugin outbound * docs: update provider plugin notes * style: format provider status issues * fix: make sandbox scope warning wrap-safe * refactor: load outbound adapters from provider plugins * docs: update provider plugin outbound notes * style(macos): fix swiftformat lint * docs: changelog for provider plugins * fix(macos): satisfy swiftformat * fix(macos): open settings via menu action * style: format after rebase * fix(macos): open Settings via menu action --------- Co-authored-by: LK <luke@kyohere.com> Co-authored-by: Luke K (pr-0f3t) <2609441+lc0rp@users.noreply.github.com> Co-authored-by: Xin <xin@imfing.com>
622 lines
19 KiB
TypeScript
622 lines
19 KiB
TypeScript
import fs from "node:fs/promises";
|
|
import { type AddressInfo, createServer } from "node:net";
|
|
import os from "node:os";
|
|
import path from "node:path";
|
|
import { afterEach, beforeEach, expect, vi } from "vitest";
|
|
import { WebSocket } from "ws";
|
|
import { resolveMainSessionKeyFromConfig } from "../config/sessions.js";
|
|
import { resetAgentRunContextForTest } from "../infra/agent-events.js";
|
|
import { drainSystemEvents, peekSystemEvents } from "../infra/system-events.js";
|
|
import { rawDataToString } from "../infra/ws.js";
|
|
import {
|
|
GATEWAY_CLIENT_MODES,
|
|
GATEWAY_CLIENT_NAMES,
|
|
} from "../utils/message-provider.js";
|
|
import { PROTOCOL_VERSION } from "./protocol/index.js";
|
|
import type { GatewayServerOptions } from "./server.js";
|
|
|
|
export type BridgeClientInfo = {
|
|
nodeId: string;
|
|
displayName?: string;
|
|
platform?: string;
|
|
version?: string;
|
|
remoteIp?: string;
|
|
deviceFamily?: string;
|
|
modelIdentifier?: string;
|
|
caps?: string[];
|
|
commands?: string[];
|
|
};
|
|
|
|
export type BridgeStartOpts = {
|
|
onAuthenticated?: (node: BridgeClientInfo) => Promise<void> | void;
|
|
onDisconnected?: (node: BridgeClientInfo) => Promise<void> | void;
|
|
onPairRequested?: (request: unknown) => Promise<void> | void;
|
|
onEvent?: (
|
|
nodeId: string,
|
|
evt: { event: string; payloadJSON?: string | null },
|
|
) => Promise<void> | void;
|
|
onRequest?: (
|
|
nodeId: string,
|
|
req: { id: string; method: string; paramsJSON?: string | null },
|
|
) => Promise<
|
|
| { ok: true; payloadJSON?: string | null }
|
|
| { ok: false; error: { code: string; message: string; details?: unknown } }
|
|
>;
|
|
};
|
|
|
|
const hoisted = vi.hoisted(() => ({
|
|
bridgeStartCalls: [] as BridgeStartOpts[],
|
|
bridgeInvoke: vi.fn(async () => ({
|
|
type: "invoke-res",
|
|
id: "1",
|
|
ok: true,
|
|
payloadJSON: JSON.stringify({ ok: true }),
|
|
error: null,
|
|
})),
|
|
bridgeListConnected: vi.fn(() => [] as BridgeClientInfo[]),
|
|
bridgeSendEvent: vi.fn(),
|
|
testTailnetIPv4: { value: undefined as string | undefined },
|
|
piSdkMock: {
|
|
enabled: false,
|
|
discoverCalls: 0,
|
|
models: [] as Array<{
|
|
id: string;
|
|
name?: string;
|
|
provider: string;
|
|
contextWindow?: number;
|
|
reasoning?: boolean;
|
|
}>,
|
|
},
|
|
cronIsolatedRun: vi.fn(async () => ({ status: "ok", summary: "ok" })),
|
|
agentCommand: vi.fn().mockResolvedValue(undefined),
|
|
testIsNixMode: { value: false },
|
|
sessionStoreSaveDelayMs: { value: 0 },
|
|
embeddedRunMock: {
|
|
activeIds: new Set<string>(),
|
|
abortCalls: [] as string[],
|
|
waitCalls: [] as string[],
|
|
waitResults: new Map<string, boolean>(),
|
|
},
|
|
}));
|
|
|
|
export const bridgeStartCalls = hoisted.bridgeStartCalls;
|
|
export const bridgeInvoke = hoisted.bridgeInvoke;
|
|
export const bridgeListConnected = hoisted.bridgeListConnected;
|
|
export const bridgeSendEvent = hoisted.bridgeSendEvent;
|
|
export const testTailnetIPv4 = hoisted.testTailnetIPv4;
|
|
export const piSdkMock = hoisted.piSdkMock;
|
|
export const cronIsolatedRun = hoisted.cronIsolatedRun;
|
|
export const agentCommand = hoisted.agentCommand;
|
|
|
|
export const testState = {
|
|
agentConfig: undefined as Record<string, unknown> | undefined,
|
|
agentsConfig: undefined as Record<string, unknown> | undefined,
|
|
bindingsConfig: undefined as Array<Record<string, unknown>> | undefined,
|
|
sessionStorePath: undefined as string | undefined,
|
|
sessionConfig: undefined as Record<string, unknown> | undefined,
|
|
allowFrom: undefined as string[] | undefined,
|
|
cronStorePath: undefined as string | undefined,
|
|
cronEnabled: false as boolean | undefined,
|
|
gatewayBind: undefined as "auto" | "lan" | "tailnet" | "loopback" | undefined,
|
|
gatewayAuth: undefined as Record<string, unknown> | undefined,
|
|
hooksConfig: undefined as Record<string, unknown> | undefined,
|
|
canvasHostPort: undefined as number | undefined,
|
|
legacyIssues: [] as Array<{ path: string; message: string }>,
|
|
legacyParsed: {} as Record<string, unknown>,
|
|
migrationConfig: null as Record<string, unknown> | null,
|
|
migrationChanges: [] as string[],
|
|
};
|
|
|
|
export const testIsNixMode = hoisted.testIsNixMode;
|
|
export const sessionStoreSaveDelayMs = hoisted.sessionStoreSaveDelayMs;
|
|
export const embeddedRunMock = hoisted.embeddedRunMock;
|
|
|
|
vi.mock("@mariozechner/pi-coding-agent", async () => {
|
|
const actual = await vi.importActual<
|
|
typeof import("@mariozechner/pi-coding-agent")
|
|
>("@mariozechner/pi-coding-agent");
|
|
|
|
return {
|
|
...actual,
|
|
discoverModels: () => {
|
|
if (!piSdkMock.enabled) return actual.discoverModels();
|
|
piSdkMock.discoverCalls += 1;
|
|
return piSdkMock.models;
|
|
},
|
|
};
|
|
});
|
|
|
|
vi.mock("../infra/bridge/server.js", () => ({
|
|
startNodeBridgeServer: vi.fn(async (opts: BridgeStartOpts) => {
|
|
bridgeStartCalls.push(opts);
|
|
return {
|
|
port: 18790,
|
|
close: async () => {},
|
|
listConnected: bridgeListConnected,
|
|
invoke: bridgeInvoke,
|
|
sendEvent: bridgeSendEvent,
|
|
};
|
|
}),
|
|
}));
|
|
|
|
vi.mock("../cron/isolated-agent.js", () => ({
|
|
runCronIsolatedAgentTurn: (...args: unknown[]) => cronIsolatedRun(...args),
|
|
}));
|
|
|
|
vi.mock("../infra/tailnet.js", () => ({
|
|
pickPrimaryTailnetIPv4: () => testTailnetIPv4.value,
|
|
pickPrimaryTailnetIPv6: () => undefined,
|
|
}));
|
|
|
|
vi.mock("../config/sessions.js", async () => {
|
|
const actual = await vi.importActual<typeof import("../config/sessions.js")>(
|
|
"../config/sessions.js",
|
|
);
|
|
return {
|
|
...actual,
|
|
saveSessionStore: vi.fn(async (storePath: string, store: unknown) => {
|
|
const delay = sessionStoreSaveDelayMs.value;
|
|
if (delay > 0) {
|
|
await new Promise((resolve) => setTimeout(resolve, delay));
|
|
}
|
|
return actual.saveSessionStore(storePath, store as never);
|
|
}),
|
|
};
|
|
});
|
|
|
|
vi.mock("../config/config.js", async () => {
|
|
const actual = await vi.importActual<typeof import("../config/config.js")>(
|
|
"../config/config.js",
|
|
);
|
|
const resolveConfigPath = () =>
|
|
path.join(os.homedir(), ".clawdbot", "clawdbot.json");
|
|
|
|
const readConfigFileSnapshot = async () => {
|
|
if (testState.legacyIssues.length > 0) {
|
|
return {
|
|
path: resolveConfigPath(),
|
|
exists: true,
|
|
raw: JSON.stringify(testState.legacyParsed ?? {}),
|
|
parsed: testState.legacyParsed ?? {},
|
|
valid: false,
|
|
config: {},
|
|
issues: testState.legacyIssues.map((issue) => ({
|
|
path: issue.path,
|
|
message: issue.message,
|
|
})),
|
|
legacyIssues: testState.legacyIssues,
|
|
};
|
|
}
|
|
const configPath = resolveConfigPath();
|
|
try {
|
|
await fs.access(configPath);
|
|
} catch {
|
|
return {
|
|
path: configPath,
|
|
exists: false,
|
|
raw: null,
|
|
parsed: {},
|
|
valid: true,
|
|
config: {},
|
|
issues: [],
|
|
legacyIssues: [],
|
|
};
|
|
}
|
|
try {
|
|
const raw = await fs.readFile(configPath, "utf-8");
|
|
const parsed = JSON.parse(raw) as Record<string, unknown>;
|
|
return {
|
|
path: configPath,
|
|
exists: true,
|
|
raw,
|
|
parsed,
|
|
valid: true,
|
|
config: parsed,
|
|
issues: [],
|
|
legacyIssues: [],
|
|
};
|
|
} catch (err) {
|
|
return {
|
|
path: configPath,
|
|
exists: true,
|
|
raw: null,
|
|
parsed: {},
|
|
valid: false,
|
|
config: {},
|
|
issues: [{ path: "", message: `read failed: ${String(err)}` }],
|
|
legacyIssues: [],
|
|
};
|
|
}
|
|
};
|
|
|
|
const writeConfigFile = vi.fn(async (cfg: Record<string, unknown>) => {
|
|
const configPath = resolveConfigPath();
|
|
await fs.mkdir(path.dirname(configPath), { recursive: true });
|
|
const raw = JSON.stringify(cfg, null, 2).trimEnd().concat("\n");
|
|
await fs.writeFile(configPath, raw, "utf-8");
|
|
});
|
|
|
|
return {
|
|
...actual,
|
|
CONFIG_PATH_CLAWDBOT: resolveConfigPath(),
|
|
STATE_DIR_CLAWDBOT: path.dirname(resolveConfigPath()),
|
|
get isNixMode() {
|
|
return testIsNixMode.value;
|
|
},
|
|
migrateLegacyConfig: (raw: unknown) => ({
|
|
config: testState.migrationConfig ?? (raw as Record<string, unknown>),
|
|
changes: testState.migrationChanges,
|
|
}),
|
|
loadConfig: () => ({
|
|
agents: (() => {
|
|
const defaults = {
|
|
model: "anthropic/claude-opus-4-5",
|
|
workspace: path.join(os.tmpdir(), "clawd-gateway-test"),
|
|
...testState.agentConfig,
|
|
};
|
|
if (testState.agentsConfig) {
|
|
return { ...testState.agentsConfig, defaults };
|
|
}
|
|
return { defaults };
|
|
})(),
|
|
bindings: testState.bindingsConfig,
|
|
whatsapp: {
|
|
allowFrom: testState.allowFrom,
|
|
},
|
|
session: {
|
|
mainKey: "main",
|
|
store: testState.sessionStorePath,
|
|
...testState.sessionConfig,
|
|
},
|
|
gateway: (() => {
|
|
const gateway: Record<string, unknown> = {};
|
|
if (testState.gatewayBind) gateway.bind = testState.gatewayBind;
|
|
if (testState.gatewayAuth) gateway.auth = testState.gatewayAuth;
|
|
return Object.keys(gateway).length > 0 ? gateway : undefined;
|
|
})(),
|
|
canvasHost: (() => {
|
|
const canvasHost: Record<string, unknown> = {};
|
|
if (typeof testState.canvasHostPort === "number")
|
|
canvasHost.port = testState.canvasHostPort;
|
|
return Object.keys(canvasHost).length > 0 ? canvasHost : undefined;
|
|
})(),
|
|
hooks: testState.hooksConfig,
|
|
cron: (() => {
|
|
const cron: Record<string, unknown> = {};
|
|
if (typeof testState.cronEnabled === "boolean")
|
|
cron.enabled = testState.cronEnabled;
|
|
if (typeof testState.cronStorePath === "string")
|
|
cron.store = testState.cronStorePath;
|
|
return Object.keys(cron).length > 0 ? cron : undefined;
|
|
})(),
|
|
}),
|
|
parseConfigJson5: (raw: string) => {
|
|
try {
|
|
return { ok: true, parsed: JSON.parse(raw) as unknown };
|
|
} catch (err) {
|
|
return { ok: false, error: String(err) };
|
|
}
|
|
},
|
|
validateConfigObject: (parsed: unknown) => ({
|
|
ok: true,
|
|
config: parsed as Record<string, unknown>,
|
|
issues: [],
|
|
}),
|
|
readConfigFileSnapshot,
|
|
writeConfigFile,
|
|
};
|
|
});
|
|
|
|
vi.mock("../agents/pi-embedded.js", async () => {
|
|
const actual = await vi.importActual<
|
|
typeof import("../agents/pi-embedded.js")
|
|
>("../agents/pi-embedded.js");
|
|
return {
|
|
...actual,
|
|
isEmbeddedPiRunActive: (sessionId: string) =>
|
|
embeddedRunMock.activeIds.has(sessionId),
|
|
abortEmbeddedPiRun: (sessionId: string) => {
|
|
embeddedRunMock.abortCalls.push(sessionId);
|
|
return embeddedRunMock.activeIds.has(sessionId);
|
|
},
|
|
waitForEmbeddedPiRunEnd: async (sessionId: string) => {
|
|
embeddedRunMock.waitCalls.push(sessionId);
|
|
return embeddedRunMock.waitResults.get(sessionId) ?? true;
|
|
},
|
|
};
|
|
});
|
|
|
|
vi.mock("../commands/health.js", () => ({
|
|
getHealthSnapshot: vi.fn().mockResolvedValue({ ok: true, stub: true }),
|
|
}));
|
|
vi.mock("../commands/status.js", () => ({
|
|
getStatusSummary: vi.fn().mockResolvedValue({ ok: true }),
|
|
}));
|
|
vi.mock("../web/outbound.js", () => ({
|
|
sendMessageWhatsApp: vi
|
|
.fn()
|
|
.mockResolvedValue({ messageId: "msg-1", toJid: "jid-1" }),
|
|
}));
|
|
vi.mock("../commands/agent.js", () => ({
|
|
agentCommand,
|
|
}));
|
|
|
|
process.env.CLAWDBOT_SKIP_PROVIDERS = "1";
|
|
|
|
let previousHome: string | undefined;
|
|
let tempHome: string | undefined;
|
|
|
|
export function installGatewayTestHooks() {
|
|
beforeEach(async () => {
|
|
previousHome = process.env.HOME;
|
|
tempHome = await fs.mkdtemp(
|
|
path.join(os.tmpdir(), "clawdbot-gateway-home-"),
|
|
);
|
|
process.env.HOME = tempHome;
|
|
sessionStoreSaveDelayMs.value = 0;
|
|
testTailnetIPv4.value = undefined;
|
|
testState.gatewayBind = undefined;
|
|
testState.gatewayAuth = undefined;
|
|
testState.hooksConfig = undefined;
|
|
testState.canvasHostPort = undefined;
|
|
testState.legacyIssues = [];
|
|
testState.legacyParsed = {};
|
|
testState.migrationConfig = null;
|
|
testState.migrationChanges = [];
|
|
testState.cronEnabled = false;
|
|
testState.cronStorePath = undefined;
|
|
testState.sessionConfig = undefined;
|
|
testState.sessionStorePath = undefined;
|
|
testState.agentConfig = undefined;
|
|
testState.agentsConfig = undefined;
|
|
testState.bindingsConfig = undefined;
|
|
testState.allowFrom = undefined;
|
|
testIsNixMode.value = false;
|
|
cronIsolatedRun.mockClear();
|
|
agentCommand.mockClear();
|
|
embeddedRunMock.activeIds.clear();
|
|
embeddedRunMock.abortCalls = [];
|
|
embeddedRunMock.waitCalls = [];
|
|
embeddedRunMock.waitResults.clear();
|
|
drainSystemEvents(resolveMainSessionKeyFromConfig());
|
|
resetAgentRunContextForTest();
|
|
const mod = await import("./server.js");
|
|
mod.__resetModelCatalogCacheForTest();
|
|
piSdkMock.enabled = false;
|
|
piSdkMock.discoverCalls = 0;
|
|
piSdkMock.models = [];
|
|
}, 60_000);
|
|
|
|
afterEach(async () => {
|
|
process.env.HOME = previousHome;
|
|
if (tempHome) {
|
|
await fs.rm(tempHome, {
|
|
recursive: true,
|
|
force: true,
|
|
maxRetries: 20,
|
|
retryDelay: 25,
|
|
});
|
|
tempHome = undefined;
|
|
}
|
|
});
|
|
}
|
|
|
|
let nextTestPortOffset = 0;
|
|
|
|
export async function getFreePort(): Promise<number> {
|
|
const workerIdRaw =
|
|
process.env.VITEST_WORKER_ID ?? process.env.VITEST_POOL_ID ?? "";
|
|
const workerId = Number.parseInt(workerIdRaw, 10);
|
|
const shard = Number.isFinite(workerId)
|
|
? Math.max(0, workerId)
|
|
: Math.abs(process.pid);
|
|
|
|
// Avoid flaky "get a free port then bind later" races by allocating from a
|
|
// deterministic per-worker port range. Still probe for EADDRINUSE to avoid
|
|
// collisions with external processes.
|
|
const rangeSize = 1000;
|
|
const shardCount = 30;
|
|
const base = 30_000 + (Math.abs(shard) % shardCount) * rangeSize; // <= 59_999
|
|
|
|
for (let attempt = 0; attempt < rangeSize; attempt++) {
|
|
const port = base + (nextTestPortOffset++ % rangeSize);
|
|
// eslint-disable-next-line no-await-in-loop
|
|
const ok = await new Promise<boolean>((resolve) => {
|
|
const server = createServer();
|
|
server.once("error", () => resolve(false));
|
|
server.listen(port, "127.0.0.1", () => {
|
|
server.close(() => resolve(true));
|
|
});
|
|
});
|
|
if (ok) return port;
|
|
}
|
|
|
|
// Fallback: let the OS pick a port.
|
|
return await new Promise((resolve, reject) => {
|
|
const server = createServer();
|
|
server.once("error", reject);
|
|
server.listen(0, "127.0.0.1", () => {
|
|
const port = (server.address() as AddressInfo).port;
|
|
server.close((err) => (err ? reject(err) : resolve(port)));
|
|
});
|
|
});
|
|
}
|
|
|
|
export async function occupyPort(): Promise<{
|
|
server: ReturnType<typeof createServer>;
|
|
port: number;
|
|
}> {
|
|
return await new Promise((resolve, reject) => {
|
|
const server = createServer();
|
|
server.once("error", reject);
|
|
server.listen(0, "127.0.0.1", () => {
|
|
const port = (server.address() as AddressInfo).port;
|
|
resolve({ server, port });
|
|
});
|
|
});
|
|
}
|
|
|
|
export function onceMessage<T = unknown>(
|
|
ws: WebSocket,
|
|
filter: (obj: unknown) => boolean,
|
|
timeoutMs = 3000,
|
|
): Promise<T> {
|
|
return new Promise<T>((resolve, reject) => {
|
|
const timer = setTimeout(() => reject(new Error("timeout")), timeoutMs);
|
|
const closeHandler = (code: number, reason: Buffer) => {
|
|
clearTimeout(timer);
|
|
ws.off("message", handler);
|
|
reject(new Error(`closed ${code}: ${reason.toString()}`));
|
|
};
|
|
const handler = (data: WebSocket.RawData) => {
|
|
const obj = JSON.parse(rawDataToString(data));
|
|
if (filter(obj)) {
|
|
clearTimeout(timer);
|
|
ws.off("message", handler);
|
|
ws.off("close", closeHandler);
|
|
resolve(obj as T);
|
|
}
|
|
};
|
|
ws.on("message", handler);
|
|
ws.once("close", closeHandler);
|
|
});
|
|
}
|
|
|
|
export async function startGatewayServer(
|
|
port: number,
|
|
opts?: GatewayServerOptions,
|
|
) {
|
|
const mod = await import("./server.js");
|
|
return await mod.startGatewayServer(port, opts);
|
|
}
|
|
|
|
export async function startServerWithClient(
|
|
token?: string,
|
|
opts?: GatewayServerOptions,
|
|
) {
|
|
let port = await getFreePort();
|
|
const prev = process.env.CLAWDBOT_GATEWAY_TOKEN;
|
|
if (token === undefined) {
|
|
delete process.env.CLAWDBOT_GATEWAY_TOKEN;
|
|
} else {
|
|
process.env.CLAWDBOT_GATEWAY_TOKEN = token;
|
|
}
|
|
|
|
let server: Awaited<ReturnType<typeof startGatewayServer>> | null = null;
|
|
for (let attempt = 0; attempt < 10; attempt++) {
|
|
try {
|
|
server = await startGatewayServer(port, opts);
|
|
break;
|
|
} catch (err) {
|
|
const code = (err as { cause?: { code?: string } }).cause?.code;
|
|
if (code !== "EADDRINUSE") throw err;
|
|
port = await getFreePort();
|
|
}
|
|
}
|
|
if (!server) {
|
|
throw new Error("failed to start gateway server after retries");
|
|
}
|
|
|
|
const ws = new WebSocket(`ws://127.0.0.1:${port}`);
|
|
await new Promise<void>((resolve) => ws.once("open", resolve));
|
|
return { server, ws, port, prevToken: prev };
|
|
}
|
|
|
|
type ConnectResponse = {
|
|
type: "res";
|
|
id: string;
|
|
ok: boolean;
|
|
payload?: unknown;
|
|
error?: { message?: string };
|
|
};
|
|
|
|
export async function connectReq(
|
|
ws: WebSocket,
|
|
opts?: {
|
|
token?: string;
|
|
password?: string;
|
|
minProtocol?: number;
|
|
maxProtocol?: number;
|
|
client?: {
|
|
id: string;
|
|
displayName?: string;
|
|
version: string;
|
|
platform: string;
|
|
mode: string;
|
|
instanceId?: string;
|
|
};
|
|
},
|
|
): Promise<ConnectResponse> {
|
|
const { randomUUID } = await import("node:crypto");
|
|
const id = randomUUID();
|
|
ws.send(
|
|
JSON.stringify({
|
|
type: "req",
|
|
id,
|
|
method: "connect",
|
|
params: {
|
|
minProtocol: opts?.minProtocol ?? PROTOCOL_VERSION,
|
|
maxProtocol: opts?.maxProtocol ?? PROTOCOL_VERSION,
|
|
client: opts?.client ?? {
|
|
id: GATEWAY_CLIENT_NAMES.TEST,
|
|
version: "1.0.0",
|
|
platform: "test",
|
|
mode: GATEWAY_CLIENT_MODES.TEST,
|
|
},
|
|
caps: [],
|
|
auth:
|
|
opts?.token || opts?.password
|
|
? {
|
|
token: opts?.token,
|
|
password: opts?.password,
|
|
}
|
|
: undefined,
|
|
},
|
|
}),
|
|
);
|
|
return await onceMessage<ConnectResponse>(
|
|
ws,
|
|
(o) => o.type === "res" && o.id === id,
|
|
);
|
|
}
|
|
|
|
export async function connectOk(
|
|
ws: WebSocket,
|
|
opts?: Parameters<typeof connectReq>[1],
|
|
) {
|
|
const res = await connectReq(ws, opts);
|
|
expect(res.ok).toBe(true);
|
|
expect((res.payload as { type?: unknown } | undefined)?.type).toBe(
|
|
"hello-ok",
|
|
);
|
|
return res.payload as { type: "hello-ok" };
|
|
}
|
|
|
|
export async function rpcReq<T = unknown>(
|
|
ws: WebSocket,
|
|
method: string,
|
|
params?: unknown,
|
|
) {
|
|
const { randomUUID } = await import("node:crypto");
|
|
const id = randomUUID();
|
|
ws.send(JSON.stringify({ type: "req", id, method, params }));
|
|
return await onceMessage<{
|
|
type: "res";
|
|
id: string;
|
|
ok: boolean;
|
|
payload?: T;
|
|
error?: { message?: string; code?: string };
|
|
}>(ws, (o) => o.type === "res" && o.id === id);
|
|
}
|
|
|
|
export async function waitForSystemEvent(timeoutMs = 2000) {
|
|
const sessionKey = resolveMainSessionKeyFromConfig();
|
|
const deadline = Date.now() + timeoutMs;
|
|
while (Date.now() < deadline) {
|
|
const events = peekSystemEvents(sessionKey);
|
|
if (events.length > 0) return events;
|
|
await new Promise((resolve) => setTimeout(resolve, 10));
|
|
}
|
|
throw new Error("timeout waiting for system event");
|
|
}
|