// SPDX-License-Identifier: EUPL-1.2 package agentic import ( "context" "net/http" "net/http/httptest" "testing" "time" core "dappco.re/go/core" "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" ) func TestSync_HandleSyncPush_Good(t *testing.T) { root := t.TempDir() t.Setenv("CORE_WORKSPACE", root) t.Setenv("CORE_AGENT_API_KEY", "secret-token") workspaceDir := core.JoinPath(root, "workspace", "core", "go-io", "task-5") fs.EnsureDir(workspaceDir) writeStatusResult(workspaceDir, &WorkspaceStatus{ Status: "completed", Agent: "codex", Repo: "go-io", Org: "core", Task: "Fix tests", Branch: "agent/fix-tests", StartedAt: time.Now(), UpdatedAt: time.Now(), }) server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { require.Equal(t, "/v1/agent/sync", r.URL.Path) require.Equal(t, "Bearer secret-token", r.Header.Get("Authorization")) bodyResult := core.ReadAll(r.Body) require.True(t, bodyResult.OK) var payload map[string]any parseResult := core.JSONUnmarshalString(bodyResult.Value.(string), &payload) require.True(t, parseResult.OK) require.Equal(t, AgentName(), payload["agent_id"]) dispatches, ok := payload["dispatches"].([]any) require.True(t, ok) require.Len(t, dispatches, 1) w.Header().Set("Content-Type", "application/json") _, _ = w.Write([]byte(`{"data":{"synced":1}}`)) })) defer server.Close() subsystem := &PrepSubsystem{ ServiceRuntime: core.NewServiceRuntime(testCore, AgentOptions{}), brainURL: server.URL, } output, err := subsystem.syncPush(context.Background(), "") require.NoError(t, err) assert.True(t, output.Success) assert.Equal(t, 1, output.Count) assert.False(t, readSyncStatusState().LastPushAt.IsZero()) } func TestSync_HandleSyncPush_Good_UsesProvidedDispatches(t *testing.T) { root := t.TempDir() t.Setenv("CORE_WORKSPACE", root) t.Setenv("CORE_AGENT_API_KEY", "secret-token") server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { require.Equal(t, "/v1/agent/sync", r.URL.Path) bodyResult := core.ReadAll(r.Body) require.True(t, bodyResult.OK) var payload map[string]any parseResult := core.JSONUnmarshalString(bodyResult.Value.(string), &payload) require.True(t, parseResult.OK) require.Equal(t, "charon", payload["agent_id"]) dispatches, ok := payload["dispatches"].([]any) require.True(t, ok) require.Len(t, dispatches, 1) record, ok := dispatches[0].(map[string]any) require.True(t, ok) require.Equal(t, "external-1", record["workspace"]) require.Equal(t, "completed", record["status"]) _, _ = w.Write([]byte(`{"data":{"synced":1}}`)) })) defer server.Close() subsystem := &PrepSubsystem{ ServiceRuntime: core.NewServiceRuntime(testCore, AgentOptions{}), brainURL: server.URL, } output, err := subsystem.syncPushInput(context.Background(), SyncPushInput{ AgentID: "charon", Dispatches: []map[string]any{ {"workspace": "external-1", "status": "completed"}, }, }) require.NoError(t, err) assert.True(t, output.Success) assert.Equal(t, 1, output.Count) assert.Empty(t, readSyncQueue()) } func TestSync_HandleSyncPush_Bad(t *testing.T) { root := t.TempDir() t.Setenv("CORE_WORKSPACE", root) t.Setenv("CORE_AGENT_API_KEY", "") workspaceDir := core.JoinPath(root, "workspace", "core", "go-io", "task-5") fs.EnsureDir(workspaceDir) writeStatusResult(workspaceDir, &WorkspaceStatus{ Status: "completed", Agent: "codex", Repo: "go-io", Org: "core", Task: "Fix tests", Branch: "agent/fix-tests", StartedAt: time.Now(), UpdatedAt: time.Now(), }) subsystem := &PrepSubsystem{ ServiceRuntime: core.NewServiceRuntime(testCore, AgentOptions{}), } output, err := subsystem.syncPush(context.Background(), "") require.NoError(t, err) assert.True(t, output.Success) assert.Equal(t, 0, output.Count) assert.Empty(t, readSyncQueue()) } func TestSync_HandleSyncPush_Bad_QueuesProvidedDispatchesWhenOffline(t *testing.T) { root := t.TempDir() t.Setenv("CORE_WORKSPACE", root) t.Setenv("CORE_AGENT_API_KEY", "") subsystem := &PrepSubsystem{ ServiceRuntime: core.NewServiceRuntime(testCore, AgentOptions{}), } output, err := subsystem.syncPushInput(context.Background(), SyncPushInput{ AgentID: "charon", Dispatches: []map[string]any{ {"workspace": "external-1", "status": "completed"}, }, }) require.NoError(t, err) assert.True(t, output.Success) assert.Equal(t, 0, output.Count) queued := readSyncQueue() require.Len(t, queued, 1) assert.Equal(t, "charon", queued[0].AgentID) require.Len(t, queued[0].Dispatches, 1) assert.Equal(t, "external-1", queued[0].Dispatches[0]["workspace"]) } func TestSync_HandleSyncPush_Ugly(t *testing.T) { root := t.TempDir() t.Setenv("CORE_WORKSPACE", root) t.Setenv("CORE_AGENT_API_KEY", "secret-token") workspaceDir := core.JoinPath(root, "workspace", "core", "go-io", "task-5") fs.EnsureDir(workspaceDir) writeStatusResult(workspaceDir, &WorkspaceStatus{ Status: "completed", Agent: "codex", Repo: "go-io", Org: "core", Task: "Fix tests", Branch: "agent/fix-tests", StartedAt: time.Now(), UpdatedAt: time.Now(), }) server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { require.Equal(t, "/v1/agent/sync", r.URL.Path) w.WriteHeader(http.StatusServiceUnavailable) _, _ = w.Write([]byte(`{"error":"unavailable"}`)) })) defer server.Close() subsystem := &PrepSubsystem{ ServiceRuntime: core.NewServiceRuntime(testCore, AgentOptions{}), brainURL: server.URL, } output, err := subsystem.syncPush(context.Background(), "") require.NoError(t, err) assert.True(t, output.Success) assert.Equal(t, 0, output.Count) queued := readSyncQueue() require.Len(t, queued, 1) assert.Equal(t, AgentName(), queued[0].AgentID) require.Len(t, queued[0].Dispatches, 1) } func TestSync_HandleSyncPull_Good(t *testing.T) { root := t.TempDir() t.Setenv("CORE_WORKSPACE", root) t.Setenv("CORE_AGENT_API_KEY", "secret-token") server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { require.Equal(t, "/v1/agent/context", r.URL.Path) w.Header().Set("Content-Type", "application/json") _, _ = w.Write([]byte(`{"data":[{"id":"mem-1","content":"Known pattern"}]}`)) })) defer server.Close() subsystem := &PrepSubsystem{ ServiceRuntime: core.NewServiceRuntime(testCore, AgentOptions{}), brainURL: server.URL, } output, err := subsystem.syncPull(context.Background(), "codex") require.NoError(t, err) assert.True(t, output.Success) assert.Equal(t, 1, output.Count) require.Len(t, output.Context, 1) assert.Equal(t, "mem-1", output.Context[0]["id"]) cached := readSyncContext() require.Len(t, cached, 1) assert.Equal(t, "mem-1", cached[0]["id"]) assert.False(t, readSyncStatusState().LastPullAt.IsZero()) } func TestSync_HandleSyncPull_Good_SinceQuery(t *testing.T) { root := t.TempDir() t.Setenv("CORE_WORKSPACE", root) t.Setenv("CORE_AGENT_API_KEY", "secret-token") server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { require.Equal(t, "/v1/agent/context", r.URL.Path) require.Equal(t, "codex", r.URL.Query().Get("agent_id")) require.Equal(t, "2026-03-30T00:00:00Z", r.URL.Query().Get("since")) _, _ = w.Write([]byte(`{"data":[{"id":"mem-2","content":"Recent pattern"}]}`)) })) defer server.Close() subsystem := &PrepSubsystem{ ServiceRuntime: core.NewServiceRuntime(testCore, AgentOptions{}), brainURL: server.URL, } output, err := subsystem.syncPullInput(context.Background(), SyncPullInput{ AgentID: "codex", Since: "2026-03-30T00:00:00Z", }) require.NoError(t, err) assert.True(t, output.Success) assert.Equal(t, 1, output.Count) require.Len(t, output.Context, 1) assert.Equal(t, "mem-2", output.Context[0]["id"]) } func TestSync_HandleSyncPush_Good_ReportMetadata(t *testing.T) { root := t.TempDir() t.Setenv("CORE_WORKSPACE", root) t.Setenv("CORE_AGENT_API_KEY", "secret-token") workspaceDir := core.JoinPath(root, "workspace", "core", "go-io", "task-5") fs.EnsureDir(WorkspaceMetaDir(workspaceDir)) require.True(t, fs.Write(core.JoinPath(WorkspaceMetaDir(workspaceDir), "report.json"), `{"findings":[{"file":"main.go"}],"changes":{"files_changed":1}}`).OK) writeStatusResult(workspaceDir, &WorkspaceStatus{ Status: "blocked", Agent: "codex", Repo: "go-io", Org: "core", Task: "Fix tests", Branch: "agent/fix-tests", Issue: 42, Question: "Which API version?", ProcessID: "proc-1", Runs: 2, StartedAt: time.Now(), UpdatedAt: time.Now(), }) server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { bodyResult := core.ReadAll(r.Body) require.True(t, bodyResult.OK) var payload map[string]any parseResult := core.JSONUnmarshalString(bodyResult.Value.(string), &payload) require.True(t, parseResult.OK) dispatches, ok := payload["dispatches"].([]any) require.True(t, ok) require.Len(t, dispatches, 1) record, ok := dispatches[0].(map[string]any) require.True(t, ok) require.Equal(t, "Which API version?", record["question"]) require.Equal(t, float64(42), record["issue"]) require.Equal(t, float64(2), record["runs"]) require.Equal(t, "proc-1", record["process_id"]) require.NotNil(t, record["report"]) require.NotNil(t, record["findings"]) require.NotNil(t, record["changes"]) _, _ = w.Write([]byte(`{"data":{"synced":1}}`)) })) defer server.Close() subsystem := &PrepSubsystem{ ServiceRuntime: core.NewServiceRuntime(testCore, AgentOptions{}), brainURL: server.URL, } output, err := subsystem.syncPush(context.Background(), "") require.NoError(t, err) assert.True(t, output.Success) assert.Equal(t, 1, output.Count) } func TestSync_HandleSyncPull_Good_NestedEnvelope(t *testing.T) { root := t.TempDir() t.Setenv("CORE_WORKSPACE", root) t.Setenv("CORE_AGENT_API_KEY", "secret-token") server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { _, _ = w.Write([]byte(`{"data":{"context":[{"id":"ctx-1","content":"Known pattern"}]}}`)) })) defer server.Close() subsystem := &PrepSubsystem{ ServiceRuntime: core.NewServiceRuntime(testCore, AgentOptions{}), brainURL: server.URL, } output, err := subsystem.syncPull(context.Background(), "codex") require.NoError(t, err) assert.True(t, output.Success) assert.Equal(t, 1, output.Count) require.Len(t, output.Context, 1) assert.Equal(t, "ctx-1", output.Context[0]["id"]) } func TestSync_HandleSyncPull_Bad(t *testing.T) { root := t.TempDir() t.Setenv("CORE_WORKSPACE", root) t.Setenv("CORE_AGENT_API_KEY", "secret-token") writeSyncContext([]map[string]any{ {"id": "cached-1", "content": "Cached context"}, }) server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { require.Equal(t, "/v1/agent/context", r.URL.Path) w.WriteHeader(http.StatusInternalServerError) _, _ = w.Write([]byte(`{"error":"boom"}`)) })) defer server.Close() subsystem := &PrepSubsystem{ ServiceRuntime: core.NewServiceRuntime(testCore, AgentOptions{}), brainURL: server.URL, } output, err := subsystem.syncPull(context.Background(), "codex") require.NoError(t, err) assert.True(t, output.Success) assert.Equal(t, 1, output.Count) require.Len(t, output.Context, 1) assert.Equal(t, "cached-1", output.Context[0]["id"]) } func TestSync_HandleSyncPull_Ugly(t *testing.T) { root := t.TempDir() t.Setenv("CORE_WORKSPACE", root) t.Setenv("CORE_AGENT_API_KEY", "secret-token") writeSyncContext([]map[string]any{ {"id": "cached-2", "content": "Fallback context"}, }) server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { require.Equal(t, "/v1/agent/context", r.URL.Path) w.Header().Set("Content-Type", "application/json") _, _ = w.Write([]byte(`{this is not json`)) })) defer server.Close() subsystem := &PrepSubsystem{ ServiceRuntime: core.NewServiceRuntime(testCore, AgentOptions{}), brainURL: server.URL, } output, err := subsystem.syncPull(context.Background(), "codex") require.NoError(t, err) assert.True(t, output.Success) assert.Equal(t, 1, output.Count) require.Len(t, output.Context, 1) assert.Equal(t, "cached-2", output.Context[0]["id"]) }