// SPDX-License-Identifier: EUPL-1.2 package agentic import ( "context" "net/http" "net/http/httptest" "testing" core "dappco.re/go/core" "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" ) func TestIssue_HandleIssueRecordCreate_Good(t *testing.T) { server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { require.Equal(t, "/v1/issues", r.URL.Path) require.Equal(t, http.MethodPost, r.Method) bodyResult := core.ReadAll(r.Body) require.True(t, bodyResult.OK) var payload map[string]any parseResult := core.JSONUnmarshalString(bodyResult.Value.(string), &payload) require.True(t, parseResult.OK) require.Equal(t, "Fix auth", payload["title"]) require.Equal(t, "bug", payload["type"]) require.Equal(t, "codex", payload["assignee"]) _, _ = w.Write([]byte(`{"data":{"slug":"fix-auth","title":"Fix auth","type":"bug","status":"open","priority":"high","assignee":"codex","labels":["auth"]}}`)) })) defer server.Close() subsystem := testPrepWithPlatformServer(t, server, "secret-token") result := subsystem.handleIssueRecordCreate(context.Background(), core.NewOptions( core.Option{Key: "title", Value: "Fix auth"}, core.Option{Key: "type", Value: "bug"}, core.Option{Key: "priority", Value: "high"}, core.Option{Key: "assignee", Value: "codex"}, core.Option{Key: "labels", Value: "auth"}, )) require.True(t, result.OK) output, ok := result.Value.(IssueOutput) require.True(t, ok) assert.True(t, output.Success) assert.Equal(t, "fix-auth", output.Issue.Slug) assert.Equal(t, "open", output.Issue.Status) assert.Equal(t, "codex", output.Issue.Assignee) assert.Equal(t, []string{"auth"}, output.Issue.Labels) } func TestIssue_HandleIssueRecordGet_Bad(t *testing.T) { subsystem := testPrepWithPlatformServer(t, nil, "secret-token") result := subsystem.handleIssueRecordGet(context.Background(), core.NewOptions()) assert.False(t, result.OK) assert.EqualError(t, result.Value.(error), "issueGet: id or slug is required") } func TestIssue_HandleIssueRecordGet_Good_IDAlias(t *testing.T) { server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { require.Equal(t, "/v1/issues/42", r.URL.Path) _, _ = w.Write([]byte(`{"data":{"id":42,"slug":"fix-auth","title":"Fix auth","status":"open"}}`)) })) defer server.Close() subsystem := testPrepWithPlatformServer(t, server, "secret-token") result := subsystem.handleIssueRecordGet(context.Background(), core.NewOptions( core.Option{Key: "id", Value: "42"}, )) require.True(t, result.OK) output, ok := result.Value.(IssueOutput) require.True(t, ok) assert.Equal(t, 42, output.Issue.ID) assert.Equal(t, "fix-auth", output.Issue.Slug) } func TestIssue_HandleIssueRecordList_Good_Filters(t *testing.T) { server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { require.Equal(t, "/v1/issues", r.URL.Path) require.Equal(t, "open", r.URL.Query().Get("status")) require.Equal(t, "bug", r.URL.Query().Get("type")) require.Equal(t, "high", r.URL.Query().Get("priority")) require.Equal(t, "codex", r.URL.Query().Get("assignee")) require.Equal(t, []string{"auth", "backend"}, r.URL.Query()["labels"]) _, _ = w.Write([]byte(`{"data":{"issues":[{"id":7,"workspace_id":3,"sprint_id":5,"slug":"fix-auth","title":"Fix auth","labels":["auth","backend"]}],"total":1}}`)) })) defer server.Close() subsystem := testPrepWithPlatformServer(t, server, "secret-token") result := subsystem.handleIssueRecordList(context.Background(), core.NewOptions( core.Option{Key: "status", Value: "open"}, core.Option{Key: "type", Value: "bug"}, core.Option{Key: "priority", Value: "high"}, core.Option{Key: "assignee", Value: "codex"}, core.Option{Key: "labels", Value: []string{"auth", "backend"}}, )) require.True(t, result.OK) output, ok := result.Value.(IssueListOutput) require.True(t, ok) assert.Len(t, output.Issues, 1) assert.Equal(t, 1, output.Count) assert.Equal(t, []string{"auth", "backend"}, output.Issues[0].Labels) } func TestIssue_HandleIssueRecordList_Bad_ServerError(t *testing.T) { server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { require.Equal(t, "/v1/issues", r.URL.Path) w.WriteHeader(http.StatusInternalServerError) _, _ = w.Write([]byte(`{"error":"backend offline"}`)) })) defer server.Close() subsystem := testPrepWithPlatformServer(t, server, "secret-token") result := subsystem.handleIssueRecordList(context.Background(), core.NewOptions( core.Option{Key: "status", Value: "open"}, )) assert.False(t, result.OK) require.Error(t, result.Value.(error)) assert.Contains(t, result.Value.(error).Error(), "issue.list") } func TestIssue_HandleIssueRecordAssign_Good(t *testing.T) { server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { require.Equal(t, "/v1/issues/fix-auth", r.URL.Path) require.Equal(t, http.MethodPatch, r.Method) bodyResult := core.ReadAll(r.Body) require.True(t, bodyResult.OK) var payload map[string]any parseResult := core.JSONUnmarshalString(bodyResult.Value.(string), &payload) require.True(t, parseResult.OK) require.Equal(t, "codex", payload["assignee"]) _, _ = w.Write([]byte(`{"data":{"issue":{"slug":"fix-auth","title":"Fix auth","status":"assigned","assignee":"codex"}}}`)) })) defer server.Close() subsystem := testPrepWithPlatformServer(t, server, "secret-token") result := subsystem.handleIssueRecordAssign(context.Background(), core.NewOptions( core.Option{Key: "slug", Value: "fix-auth"}, core.Option{Key: "assignee", Value: "codex"}, )) require.True(t, result.OK) output, ok := result.Value.(IssueOutput) require.True(t, ok) assert.True(t, output.Success) assert.Equal(t, "codex", output.Issue.Assignee) assert.Equal(t, "assigned", output.Issue.Status) } func TestIssue_HandleIssueRecordAssign_Bad_MissingAssignee(t *testing.T) { subsystem := testPrepWithPlatformServer(t, nil, "secret-token") result := subsystem.handleIssueRecordAssign(context.Background(), core.NewOptions( core.Option{Key: "slug", Value: "fix-auth"}, )) assert.False(t, result.OK) assert.EqualError(t, result.Value.(error), "issueAssign: assignee is required") } func TestIssue_HandleIssueRecordAssign_Ugly_MissingIdentifier(t *testing.T) { subsystem := testPrepWithPlatformServer(t, nil, "secret-token") result := subsystem.handleIssueRecordAssign(context.Background(), core.NewOptions( core.Option{Key: "assignee", Value: "codex"}, )) assert.False(t, result.OK) assert.EqualError(t, result.Value.(error), "issueAssign: id or slug is required") } func TestIssue_HandleIssueRecordReport_Good(t *testing.T) { server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { require.Equal(t, "/v1/issues/fix-auth/comments", r.URL.Path) require.Equal(t, http.MethodPost, r.Method) bodyResult := core.ReadAll(r.Body) require.True(t, bodyResult.OK) var payload map[string]any parseResult := core.JSONUnmarshalString(bodyResult.Value.(string), &payload) require.True(t, parseResult.OK) assert.Equal(t, "QA failed: build output changed", payload["body"]) assert.Equal(t, "codex", payload["author"]) _, _ = w.Write([]byte(`{"data":{"comment":{"id":88,"issue_id":42,"author":"codex","body":"QA failed: build output changed","metadata":{"source":"qa"}}}}`)) })) defer server.Close() subsystem := testPrepWithPlatformServer(t, server, "secret-token") result := subsystem.handleIssueRecordReport(context.Background(), core.NewOptions( core.Option{Key: "slug", Value: "fix-auth"}, core.Option{Key: "report", Value: "QA failed: build output changed"}, core.Option{Key: "author", Value: "codex"}, core.Option{Key: "metadata", Value: map[string]any{"source": "qa"}}, )) require.True(t, result.OK) output, ok := result.Value.(IssueReportOutput) require.True(t, ok) assert.True(t, output.Success) assert.Equal(t, 88, output.Comment.ID) assert.Equal(t, "QA failed: build output changed", output.Comment.Body) assert.Equal(t, "codex", output.Comment.Author) assert.Equal(t, map[string]any{"source": "qa"}, output.Comment.Metadata) } func TestIssue_HandleIssueRecordReport_Bad_MissingReport(t *testing.T) { subsystem := testPrepWithPlatformServer(t, nil, "secret-token") result := subsystem.handleIssueRecordReport(context.Background(), core.NewOptions( core.Option{Key: "slug", Value: "fix-auth"}, )) assert.False(t, result.OK) assert.EqualError(t, result.Value.(error), "issueReport: report is required") } func TestIssue_HandleIssueRecordReport_Ugly_MissingIdentifier(t *testing.T) { subsystem := testPrepWithPlatformServer(t, nil, "secret-token") result := subsystem.handleIssueRecordReport(context.Background(), core.NewOptions( core.Option{Key: "report", Value: "QA failed: build output changed"}, )) assert.False(t, result.OK) assert.EqualError(t, result.Value.(error), "issueReport: issue_id, id, or slug is required") } func TestIssue_HandleIssueRecordList_Ugly_NestedEnvelope(t *testing.T) { server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { require.Equal(t, "/v1/issues", r.URL.Path) require.Equal(t, "open", r.URL.Query().Get("status")) _, _ = w.Write([]byte(`{"data":{"issues":[{"id":7,"workspace_id":3,"sprint_id":5,"slug":"fix-auth","title":"Fix auth","labels":["auth","backend"]}],"total":1}}`)) })) defer server.Close() subsystem := testPrepWithPlatformServer(t, server, "secret-token") result := subsystem.handleIssueRecordList(context.Background(), core.NewOptions( core.Option{Key: "status", Value: "open"}, )) require.True(t, result.OK) output, ok := result.Value.(IssueListOutput) require.True(t, ok) require.Len(t, output.Issues, 1) assert.Equal(t, 1, output.Count) assert.Equal(t, 3, output.Issues[0].WorkspaceID) assert.Equal(t, 5, output.Issues[0].SprintID) assert.Equal(t, []string{"auth", "backend"}, output.Issues[0].Labels) }