* refactor: introduce provider plugin registry * refactor: move provider CLI to plugins * docs: add provider plugin implementation notes * refactor: shift provider runtime logic into plugins * refactor: add plugin defaults and summaries * docs: update provider plugin notes * feat(commands): add /commands slash list * Auto-reply: tidy help message * Auto-reply: fix status command lint * Tests: align google shared expectations * Auto-reply: tidy help message * Auto-reply: fix status command lint * refactor: move provider routing into plugins * test: align agent routing expectations * docs: update provider plugin notes * refactor: route replies via provider plugins * docs: note route-reply plugin hooks * refactor: extend provider plugin contract * refactor: derive provider status from plugins * refactor: unify gateway provider control * refactor: use plugin metadata in auto-reply * fix: parenthesize cron target selection * refactor: derive gateway methods from plugins * refactor: generalize provider logout * refactor: route provider logout through plugins * refactor: move WhatsApp web login methods into plugin * refactor: generalize provider log prefixes * refactor: centralize default chat provider * refactor: derive provider lists from registry * refactor: move provider reload noops into plugins * refactor: resolve web login provider via alias * refactor: derive CLI provider options from plugins * refactor: derive prompt provider list from plugins * style: apply biome lint fixes * fix: resolve provider routing edge cases * docs: update provider plugin refactor notes * fix(gateway): harden agent provider routing * refactor: move provider routing into plugins * refactor: move provider CLI to plugins * refactor: derive provider lists from registry * fix: restore slash command parsing * refactor: align provider ids for schema * refactor: unify outbound target resolution * fix: keep outbound labels stable * feat: add msteams to cron surfaces * fix: clean up lint build issues * refactor: localize chat provider alias normalization * refactor: drive gateway provider lists from plugins * docs: update provider plugin notes * style: format message-provider * fix: avoid provider registry init cycles * style: sort message-provider imports * fix: relax provider alias map typing * refactor: move provider routing into plugins * refactor: add plugin pairing/config adapters * refactor: route pairing and provider removal via plugins * refactor: align auto-reply provider typing * test: stabilize telegram media mocks * docs: update provider plugin refactor notes * refactor: pluginize outbound targets * refactor: pluginize provider selection * refactor: generalize text chunk limits * docs: update provider plugin notes * refactor: generalize group session/config * fix: normalize provider id for room detection * fix: avoid provider init in system prompt * style: formatting cleanup * refactor: normalize agent delivery targets * test: update outbound delivery labels * chore: fix lint regressions * refactor: extend provider plugin adapters * refactor: move elevated/block streaming defaults to plugins * refactor: defer outbound send deps to plugins * docs: note plugin-driven streaming/elevated defaults * refactor: centralize webchat provider constant * refactor: add provider setup adapters * refactor: delegate provider add config to plugins * docs: document plugin-driven provider add * refactor: add plugin state/binding metadata * refactor: build agent provider status from plugins * docs: note plugin-driven agent bindings * refactor: centralize internal provider constant usage * fix: normalize WhatsApp targets for groups and E.164 (#631) (thanks @imfing) * refactor: centralize default chat provider * refactor: centralize WhatsApp target normalization * refactor: move provider routing into plugins * refactor: normalize agent delivery targets * chore: fix lint regressions * fix: normalize WhatsApp targets for groups and E.164 (#631) (thanks @imfing) * feat: expand provider plugin adapters * refactor: route auto-reply via provider plugins * fix: align WhatsApp target normalization * fix: normalize WhatsApp targets for groups and E.164 (#631) (thanks @imfing) * refactor: centralize WhatsApp target normalization * feat: add /config chat config updates * docs: add /config get alias * feat(commands): add /commands slash list * refactor: centralize default chat provider * style: apply biome lint fixes * chore: fix lint regressions * fix: clean up whatsapp allowlist typing * style: format config command helpers * refactor: pluginize tool threading context * refactor: normalize session announce targets * docs: note new plugin threading and announce hooks * refactor: pluginize message actions * docs: update provider plugin actions notes * fix: align provider action adapters * refactor: centralize webchat checks * style: format message provider helpers * refactor: move provider onboarding into adapters * docs: note onboarding provider adapters * feat: add msteams onboarding adapter * style: organize onboarding imports * fix: normalize msteams allowFrom types * feat: add plugin text chunk limits * refactor: use plugin chunk limit fallbacks * feat: add provider mention stripping hooks * style: organize provider plugin type imports * refactor: generalize health snapshots * refactor: update macOS health snapshot handling * docs: refresh health snapshot notes * style: format health snapshot updates * refactor: drive security warnings via plugins * docs: note provider security adapter * style: format provider security adapters * refactor: centralize provider account defaults * refactor: type gateway client identity constants * chore: regen gateway protocol swift * fix: degrade health on failed provider probe * refactor: centralize pairing approve hint * docs: add plugin CLI command references * refactor: route auth and tool sends through plugins * docs: expand provider plugin hooks * refactor: document provider docking touchpoints * refactor: normalize internal provider defaults * refactor: streamline outbound delivery wiring * refactor: make provider onboarding plugin-owned * refactor: support provider-owned agent tools * refactor: move telegram draft chunking into telegram module * refactor: infer provider tool sends via extractToolSend * fix: repair plugin onboarding imports * refactor: de-dup outbound target normalization * style: tidy plugin and agent imports * refactor: data-drive provider selection line * fix: satisfy lint after provider plugin rebase * test: deflake gateway-cli coverage * style: format gateway-cli coverage test * refactor(provider-plugins): simplify provider ids * test(pairing-cli): avoid provider-specific ternary * style(macos): swiftformat HealthStore * refactor(sandbox): derive provider tool denylist * fix(sandbox): avoid plugin init in defaults * refactor(provider-plugins): centralize provider aliases * style(test): satisfy biome * refactor(protocol): v3 providers.status maps * refactor(ui): adapt to protocol v3 * refactor(macos): adapt to protocol v3 * test: update providers.status v3 fixtures * refactor(gateway): map provider runtime snapshot * test(gateway): update reload runtime snapshot * refactor(whatsapp): normalize heartbeat provider id * docs(refactor): update provider plugin notes * style: satisfy biome after rebase * fix: describe sandboxed elevated in prompt * feat(gateway): add agent image attachments + live probe * refactor: derive CLI provider options from plugins * fix(gateway): harden agent provider routing * fix(gateway): harden agent provider routing * refactor: align provider ids for schema * fix(protocol): keep agent provider string * fix(gateway): harden agent provider routing * fix(protocol): keep agent provider string * refactor: normalize agent delivery targets * refactor: support provider-owned agent tools * refactor(config): provider-keyed elevated allowFrom * style: satisfy biome * fix(gateway): appease provider narrowing * style: satisfy biome * refactor(reply): move group intro hints into plugin * fix(reply): avoid plugin registry init cycle * refactor(providers): add lightweight provider dock * refactor(gateway): use typed client id in connect * refactor(providers): document docks and avoid init cycles * refactor(providers): make media limit helper generic * fix(providers): break plugin registry import cycles * style: satisfy biome * refactor(status-all): build providers table from plugins * refactor(gateway): delegate web login to provider plugin * refactor(provider): drop web alias * refactor(provider): lazy-load monitors * style: satisfy lint/format * style: format status-all providers table * style: swiftformat gateway discovery model * test: make reload plan plugin-driven * fix: avoid token stringification in status-all * refactor: make provider IDs explicit in status * feat: warn on signal/imessage provider runtime errors * test: cover gateway provider runtime warnings in status * fix: add runtime kind to provider status issues * test: cover health degradation on probe failure * fix: keep routeReply lightweight * style: organize routeReply imports * refactor(web): extract auth-store helpers * refactor(whatsapp): lazy login imports * refactor(outbound): route replies via plugin outbound * docs: update provider plugin notes * style: format provider status issues * fix: make sandbox scope warning wrap-safe * refactor: load outbound adapters from provider plugins * docs: update provider plugin outbound notes * style(macos): fix swiftformat lint * docs: changelog for provider plugins * fix(macos): satisfy swiftformat * fix(macos): open settings via menu action * style: format after rebase * fix(macos): open Settings via menu action --------- Co-authored-by: LK <luke@kyohere.com> Co-authored-by: Luke K (pr-0f3t) <2609441+lc0rp@users.noreply.github.com> Co-authored-by: Xin <xin@imfing.com>
485 lines
14 KiB
TypeScript
485 lines
14 KiB
TypeScript
import { beforeEach, describe, expect, it, vi } from "vitest";
|
|
|
|
import type { RuntimeEnv } from "../runtime.js";
|
|
|
|
const configMocks = vi.hoisted(() => ({
|
|
readConfigFileSnapshot: vi.fn(),
|
|
writeConfigFile: vi.fn().mockResolvedValue(undefined),
|
|
}));
|
|
|
|
const authMocks = vi.hoisted(() => ({
|
|
loadAuthProfileStore: vi.fn(),
|
|
}));
|
|
|
|
vi.mock("../config/config.js", async (importOriginal) => {
|
|
const actual = await importOriginal<typeof import("../config/config.js")>();
|
|
return {
|
|
...actual,
|
|
readConfigFileSnapshot: configMocks.readConfigFileSnapshot,
|
|
writeConfigFile: configMocks.writeConfigFile,
|
|
};
|
|
});
|
|
|
|
vi.mock("../agents/auth-profiles.js", async (importOriginal) => {
|
|
const actual =
|
|
await importOriginal<typeof import("../agents/auth-profiles.js")>();
|
|
return {
|
|
...actual,
|
|
loadAuthProfileStore: authMocks.loadAuthProfileStore,
|
|
};
|
|
});
|
|
|
|
import {
|
|
formatGatewayProvidersStatusLines,
|
|
providersAddCommand,
|
|
providersListCommand,
|
|
providersRemoveCommand,
|
|
} from "./providers.js";
|
|
|
|
const runtime: RuntimeEnv = {
|
|
log: vi.fn(),
|
|
error: vi.fn(),
|
|
exit: vi.fn(),
|
|
};
|
|
|
|
const baseSnapshot = {
|
|
path: "/tmp/clawdbot.json",
|
|
exists: true,
|
|
raw: "{}",
|
|
parsed: {},
|
|
valid: true,
|
|
config: {},
|
|
issues: [],
|
|
legacyIssues: [],
|
|
};
|
|
|
|
describe("providers command", () => {
|
|
beforeEach(() => {
|
|
configMocks.readConfigFileSnapshot.mockReset();
|
|
configMocks.writeConfigFile.mockClear();
|
|
authMocks.loadAuthProfileStore.mockReset();
|
|
runtime.log.mockClear();
|
|
runtime.error.mockClear();
|
|
runtime.exit.mockClear();
|
|
authMocks.loadAuthProfileStore.mockReturnValue({
|
|
version: 1,
|
|
profiles: {},
|
|
});
|
|
});
|
|
|
|
it("adds a non-default telegram account", async () => {
|
|
configMocks.readConfigFileSnapshot.mockResolvedValue({ ...baseSnapshot });
|
|
await providersAddCommand(
|
|
{ provider: "telegram", account: "alerts", token: "123:abc" },
|
|
runtime,
|
|
{ hasFlags: true },
|
|
);
|
|
|
|
expect(configMocks.writeConfigFile).toHaveBeenCalledTimes(1);
|
|
const next = configMocks.writeConfigFile.mock.calls[0]?.[0] as {
|
|
telegram?: {
|
|
enabled?: boolean;
|
|
accounts?: Record<string, { botToken?: string }>;
|
|
};
|
|
};
|
|
expect(next.telegram?.enabled).toBe(true);
|
|
expect(next.telegram?.accounts?.alerts?.botToken).toBe("123:abc");
|
|
});
|
|
|
|
it("adds a default slack account with tokens", async () => {
|
|
configMocks.readConfigFileSnapshot.mockResolvedValue({ ...baseSnapshot });
|
|
await providersAddCommand(
|
|
{
|
|
provider: "slack",
|
|
account: "default",
|
|
botToken: "xoxb-1",
|
|
appToken: "xapp-1",
|
|
},
|
|
runtime,
|
|
{ hasFlags: true },
|
|
);
|
|
|
|
expect(configMocks.writeConfigFile).toHaveBeenCalledTimes(1);
|
|
const next = configMocks.writeConfigFile.mock.calls[0]?.[0] as {
|
|
slack?: { enabled?: boolean; botToken?: string; appToken?: string };
|
|
};
|
|
expect(next.slack?.enabled).toBe(true);
|
|
expect(next.slack?.botToken).toBe("xoxb-1");
|
|
expect(next.slack?.appToken).toBe("xapp-1");
|
|
});
|
|
|
|
it("deletes a non-default discord account", async () => {
|
|
configMocks.readConfigFileSnapshot.mockResolvedValue({
|
|
...baseSnapshot,
|
|
config: {
|
|
discord: {
|
|
accounts: {
|
|
default: { token: "d0" },
|
|
work: { token: "d1" },
|
|
},
|
|
},
|
|
},
|
|
});
|
|
|
|
await providersRemoveCommand(
|
|
{ provider: "discord", account: "work", delete: true },
|
|
runtime,
|
|
{ hasFlags: true },
|
|
);
|
|
|
|
expect(configMocks.writeConfigFile).toHaveBeenCalledTimes(1);
|
|
const next = configMocks.writeConfigFile.mock.calls[0]?.[0] as {
|
|
discord?: { accounts?: Record<string, { token?: string }> };
|
|
};
|
|
expect(next.discord?.accounts?.work).toBeUndefined();
|
|
expect(next.discord?.accounts?.default?.token).toBe("d0");
|
|
});
|
|
|
|
it("adds a named WhatsApp account", async () => {
|
|
configMocks.readConfigFileSnapshot.mockResolvedValue({ ...baseSnapshot });
|
|
await providersAddCommand(
|
|
{ provider: "whatsapp", account: "family", name: "Family Phone" },
|
|
runtime,
|
|
{ hasFlags: true },
|
|
);
|
|
|
|
const next = configMocks.writeConfigFile.mock.calls[0]?.[0] as {
|
|
whatsapp?: { accounts?: Record<string, { name?: string }> };
|
|
};
|
|
expect(next.whatsapp?.accounts?.family?.name).toBe("Family Phone");
|
|
});
|
|
|
|
it("adds a second signal account with a distinct name", async () => {
|
|
configMocks.readConfigFileSnapshot.mockResolvedValue({
|
|
...baseSnapshot,
|
|
config: {
|
|
signal: {
|
|
accounts: {
|
|
default: { account: "+15555550111", name: "Primary" },
|
|
},
|
|
},
|
|
},
|
|
});
|
|
|
|
await providersAddCommand(
|
|
{
|
|
provider: "signal",
|
|
account: "lab",
|
|
name: "Lab",
|
|
signalNumber: "+15555550123",
|
|
},
|
|
runtime,
|
|
{ hasFlags: true },
|
|
);
|
|
|
|
const next = configMocks.writeConfigFile.mock.calls[0]?.[0] as {
|
|
signal?: {
|
|
accounts?: Record<string, { account?: string; name?: string }>;
|
|
};
|
|
};
|
|
expect(next.signal?.accounts?.lab?.account).toBe("+15555550123");
|
|
expect(next.signal?.accounts?.lab?.name).toBe("Lab");
|
|
expect(next.signal?.accounts?.default?.name).toBe("Primary");
|
|
});
|
|
|
|
it("disables a default provider account when remove has no delete flag", async () => {
|
|
configMocks.readConfigFileSnapshot.mockResolvedValue({
|
|
...baseSnapshot,
|
|
config: {
|
|
discord: { token: "d0", enabled: true },
|
|
},
|
|
});
|
|
|
|
const prompt = { confirm: vi.fn().mockResolvedValue(true) };
|
|
const prompterModule = await import("../wizard/clack-prompter.js");
|
|
const promptSpy = vi
|
|
.spyOn(prompterModule, "createClackPrompter")
|
|
.mockReturnValue(prompt as never);
|
|
|
|
await providersRemoveCommand(
|
|
{ provider: "discord", account: "default" },
|
|
runtime,
|
|
{ hasFlags: true },
|
|
);
|
|
|
|
const next = configMocks.writeConfigFile.mock.calls[0]?.[0] as {
|
|
discord?: { enabled?: boolean };
|
|
};
|
|
expect(next.discord?.enabled).toBe(false);
|
|
promptSpy.mockRestore();
|
|
});
|
|
|
|
it("includes external auth profiles in JSON output", async () => {
|
|
configMocks.readConfigFileSnapshot.mockResolvedValue({
|
|
...baseSnapshot,
|
|
config: {},
|
|
});
|
|
authMocks.loadAuthProfileStore.mockReturnValue({
|
|
version: 1,
|
|
profiles: {
|
|
"anthropic:claude-cli": {
|
|
type: "oauth",
|
|
provider: "anthropic",
|
|
access: "token",
|
|
refresh: "refresh",
|
|
expires: 0,
|
|
created: 0,
|
|
},
|
|
"openai-codex:codex-cli": {
|
|
type: "oauth",
|
|
provider: "openai",
|
|
access: "token",
|
|
refresh: "refresh",
|
|
expires: 0,
|
|
created: 0,
|
|
},
|
|
},
|
|
});
|
|
|
|
await providersListCommand({ json: true, usage: false }, runtime);
|
|
const payload = JSON.parse(
|
|
String(runtime.log.mock.calls[0]?.[0] ?? "{}"),
|
|
) as { auth?: Array<{ id: string }> };
|
|
const ids = payload.auth?.map((entry) => entry.id) ?? [];
|
|
expect(ids).toContain("anthropic:claude-cli");
|
|
expect(ids).toContain("openai-codex:codex-cli");
|
|
});
|
|
|
|
it("stores default account names in accounts when multiple accounts exist", async () => {
|
|
configMocks.readConfigFileSnapshot.mockResolvedValue({
|
|
...baseSnapshot,
|
|
config: {
|
|
telegram: {
|
|
name: "Legacy Name",
|
|
accounts: {
|
|
work: { botToken: "t0" },
|
|
},
|
|
},
|
|
},
|
|
});
|
|
|
|
await providersAddCommand(
|
|
{
|
|
provider: "telegram",
|
|
account: "default",
|
|
token: "123:abc",
|
|
name: "Primary Bot",
|
|
},
|
|
runtime,
|
|
{ hasFlags: true },
|
|
);
|
|
|
|
const next = configMocks.writeConfigFile.mock.calls[0]?.[0] as {
|
|
telegram?: {
|
|
name?: string;
|
|
accounts?: Record<string, { botToken?: string; name?: string }>;
|
|
};
|
|
};
|
|
expect(next.telegram?.name).toBeUndefined();
|
|
expect(next.telegram?.accounts?.default?.name).toBe("Primary Bot");
|
|
});
|
|
|
|
it("migrates base names when adding non-default accounts", async () => {
|
|
configMocks.readConfigFileSnapshot.mockResolvedValue({
|
|
...baseSnapshot,
|
|
config: {
|
|
discord: {
|
|
name: "Primary Bot",
|
|
token: "d0",
|
|
},
|
|
},
|
|
});
|
|
|
|
await providersAddCommand(
|
|
{ provider: "discord", account: "work", token: "d1" },
|
|
runtime,
|
|
{ hasFlags: true },
|
|
);
|
|
|
|
const next = configMocks.writeConfigFile.mock.calls[0]?.[0] as {
|
|
discord?: {
|
|
name?: string;
|
|
accounts?: Record<string, { name?: string; token?: string }>;
|
|
};
|
|
};
|
|
expect(next.discord?.name).toBeUndefined();
|
|
expect(next.discord?.accounts?.default?.name).toBe("Primary Bot");
|
|
expect(next.discord?.accounts?.work?.token).toBe("d1");
|
|
});
|
|
|
|
it("formats gateway provider status lines in registry order", () => {
|
|
const lines = formatGatewayProvidersStatusLines({
|
|
providerAccounts: {
|
|
telegram: [{ accountId: "default", configured: true }],
|
|
whatsapp: [{ accountId: "default", linked: true }],
|
|
},
|
|
});
|
|
|
|
const telegramIndex = lines.findIndex((line) =>
|
|
line.includes("Telegram default"),
|
|
);
|
|
const whatsappIndex = lines.findIndex((line) =>
|
|
line.includes("WhatsApp default"),
|
|
);
|
|
expect(telegramIndex).toBeGreaterThan(-1);
|
|
expect(whatsappIndex).toBeGreaterThan(-1);
|
|
expect(telegramIndex).toBeLessThan(whatsappIndex);
|
|
});
|
|
|
|
it("surfaces Discord privileged intent issues in providers status output", () => {
|
|
const lines = formatGatewayProvidersStatusLines({
|
|
providerAccounts: {
|
|
discord: [
|
|
{
|
|
accountId: "default",
|
|
enabled: true,
|
|
configured: true,
|
|
application: { intents: { messageContent: "disabled" } },
|
|
},
|
|
],
|
|
},
|
|
});
|
|
expect(lines.join("\n")).toMatch(/Warnings:/);
|
|
expect(lines.join("\n")).toMatch(/Message Content Intent is disabled/i);
|
|
expect(lines.join("\n")).toMatch(/Run: clawdbot doctor/);
|
|
});
|
|
|
|
it("surfaces Discord permission audit issues in providers status output", () => {
|
|
const lines = formatGatewayProvidersStatusLines({
|
|
providerAccounts: {
|
|
discord: [
|
|
{
|
|
accountId: "default",
|
|
enabled: true,
|
|
configured: true,
|
|
audit: {
|
|
unresolvedChannels: 1,
|
|
channels: [
|
|
{
|
|
channelId: "111",
|
|
ok: false,
|
|
missing: ["ViewChannel", "SendMessages"],
|
|
},
|
|
],
|
|
},
|
|
},
|
|
],
|
|
},
|
|
});
|
|
expect(lines.join("\n")).toMatch(/Warnings:/);
|
|
expect(lines.join("\n")).toMatch(/permission audit/i);
|
|
expect(lines.join("\n")).toMatch(/Channel 111/i);
|
|
});
|
|
|
|
it("surfaces Telegram privacy-mode hints when allowUnmentionedGroups is enabled", () => {
|
|
const lines = formatGatewayProvidersStatusLines({
|
|
providerAccounts: {
|
|
telegram: [
|
|
{
|
|
accountId: "default",
|
|
enabled: true,
|
|
configured: true,
|
|
allowUnmentionedGroups: true,
|
|
},
|
|
],
|
|
},
|
|
});
|
|
expect(lines.join("\n")).toMatch(/Warnings:/);
|
|
expect(lines.join("\n")).toMatch(/Telegram Bot API privacy mode/i);
|
|
});
|
|
|
|
it("surfaces Telegram group membership audit issues in providers status output", () => {
|
|
const lines = formatGatewayProvidersStatusLines({
|
|
providerAccounts: {
|
|
telegram: [
|
|
{
|
|
accountId: "default",
|
|
enabled: true,
|
|
configured: true,
|
|
audit: {
|
|
hasWildcardUnmentionedGroups: true,
|
|
unresolvedGroups: 1,
|
|
groups: [
|
|
{
|
|
chatId: "-1001",
|
|
ok: false,
|
|
status: "left",
|
|
error: "not in group",
|
|
},
|
|
],
|
|
},
|
|
},
|
|
],
|
|
},
|
|
});
|
|
expect(lines.join("\n")).toMatch(/Warnings:/);
|
|
expect(lines.join("\n")).toMatch(/membership probing is not possible/i);
|
|
expect(lines.join("\n")).toMatch(/Group -1001/i);
|
|
});
|
|
|
|
it("surfaces WhatsApp auth/runtime hints when unlinked or disconnected", () => {
|
|
const unlinked = formatGatewayProvidersStatusLines({
|
|
providerAccounts: {
|
|
whatsapp: [{ accountId: "default", enabled: true, linked: false }],
|
|
},
|
|
});
|
|
expect(unlinked.join("\n")).toMatch(/WhatsApp/i);
|
|
expect(unlinked.join("\n")).toMatch(/Not linked/i);
|
|
|
|
const disconnected = formatGatewayProvidersStatusLines({
|
|
providerAccounts: {
|
|
whatsapp: [
|
|
{
|
|
accountId: "default",
|
|
enabled: true,
|
|
linked: true,
|
|
running: true,
|
|
connected: false,
|
|
reconnectAttempts: 5,
|
|
lastError: "connection closed",
|
|
},
|
|
],
|
|
},
|
|
});
|
|
expect(disconnected.join("\n")).toMatch(/disconnected/i);
|
|
});
|
|
|
|
it("surfaces Signal runtime errors in providers status output", () => {
|
|
const lines = formatGatewayProvidersStatusLines({
|
|
providerAccounts: {
|
|
signal: [
|
|
{
|
|
accountId: "default",
|
|
enabled: true,
|
|
configured: true,
|
|
running: false,
|
|
lastError: "signal-cli unreachable",
|
|
},
|
|
],
|
|
},
|
|
});
|
|
expect(lines.join("\n")).toMatch(/Warnings:/);
|
|
expect(lines.join("\n")).toMatch(/signal/i);
|
|
expect(lines.join("\n")).toMatch(/Provider error/i);
|
|
});
|
|
|
|
it("surfaces iMessage runtime errors in providers status output", () => {
|
|
const lines = formatGatewayProvidersStatusLines({
|
|
providerAccounts: {
|
|
imessage: [
|
|
{
|
|
accountId: "default",
|
|
enabled: true,
|
|
configured: true,
|
|
running: false,
|
|
lastError: "imsg permission denied",
|
|
},
|
|
],
|
|
},
|
|
});
|
|
expect(lines.join("\n")).toMatch(/Warnings:/);
|
|
expect(lines.join("\n")).toMatch(/imessage/i);
|
|
expect(lines.join("\n")).toMatch(/Provider error/i);
|
|
});
|
|
});
|