agent/pkg/agentic/issue_test.go
Virgil 1832728b05 feat(agentic): add issue list filters
Co-Authored-By: Virgil <virgil@lethean.io>
2026-04-01 21:42:09 +00:00

254 lines
9.8 KiB
Go

// SPDX-License-Identifier: EUPL-1.2
package agentic
import (
"context"
"net/http"
"net/http/httptest"
"testing"
core "dappco.re/go/core"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
)
func TestIssue_HandleIssueRecordCreate_Good(t *testing.T) {
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
require.Equal(t, "/v1/issues", r.URL.Path)
require.Equal(t, http.MethodPost, r.Method)
bodyResult := core.ReadAll(r.Body)
require.True(t, bodyResult.OK)
var payload map[string]any
parseResult := core.JSONUnmarshalString(bodyResult.Value.(string), &payload)
require.True(t, parseResult.OK)
require.Equal(t, "Fix auth", payload["title"])
require.Equal(t, "bug", payload["type"])
require.Equal(t, "codex", payload["assignee"])
_, _ = w.Write([]byte(`{"data":{"slug":"fix-auth","title":"Fix auth","type":"bug","status":"open","priority":"high","assignee":"codex","labels":["auth"]}}`))
}))
defer server.Close()
subsystem := testPrepWithPlatformServer(t, server, "secret-token")
result := subsystem.handleIssueRecordCreate(context.Background(), core.NewOptions(
core.Option{Key: "title", Value: "Fix auth"},
core.Option{Key: "type", Value: "bug"},
core.Option{Key: "priority", Value: "high"},
core.Option{Key: "assignee", Value: "codex"},
core.Option{Key: "labels", Value: "auth"},
))
require.True(t, result.OK)
output, ok := result.Value.(IssueOutput)
require.True(t, ok)
assert.True(t, output.Success)
assert.Equal(t, "fix-auth", output.Issue.Slug)
assert.Equal(t, "open", output.Issue.Status)
assert.Equal(t, "codex", output.Issue.Assignee)
assert.Equal(t, []string{"auth"}, output.Issue.Labels)
}
func TestIssue_HandleIssueRecordGet_Bad(t *testing.T) {
subsystem := testPrepWithPlatformServer(t, nil, "secret-token")
result := subsystem.handleIssueRecordGet(context.Background(), core.NewOptions())
assert.False(t, result.OK)
assert.EqualError(t, result.Value.(error), "issueGet: id or slug is required")
}
func TestIssue_HandleIssueRecordGet_Good_IDAlias(t *testing.T) {
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
require.Equal(t, "/v1/issues/42", r.URL.Path)
_, _ = w.Write([]byte(`{"data":{"id":42,"slug":"fix-auth","title":"Fix auth","status":"open"}}`))
}))
defer server.Close()
subsystem := testPrepWithPlatformServer(t, server, "secret-token")
result := subsystem.handleIssueRecordGet(context.Background(), core.NewOptions(
core.Option{Key: "id", Value: "42"},
))
require.True(t, result.OK)
output, ok := result.Value.(IssueOutput)
require.True(t, ok)
assert.Equal(t, 42, output.Issue.ID)
assert.Equal(t, "fix-auth", output.Issue.Slug)
}
func TestIssue_HandleIssueRecordList_Good_Filters(t *testing.T) {
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
require.Equal(t, "/v1/issues", r.URL.Path)
require.Equal(t, "open", r.URL.Query().Get("status"))
require.Equal(t, "bug", r.URL.Query().Get("type"))
require.Equal(t, "high", r.URL.Query().Get("priority"))
require.Equal(t, "codex", r.URL.Query().Get("assignee"))
require.Equal(t, []string{"auth", "backend"}, r.URL.Query()["labels"])
_, _ = w.Write([]byte(`{"data":{"issues":[{"id":7,"workspace_id":3,"sprint_id":5,"slug":"fix-auth","title":"Fix auth","labels":["auth","backend"]}],"total":1}}`))
}))
defer server.Close()
subsystem := testPrepWithPlatformServer(t, server, "secret-token")
result := subsystem.handleIssueRecordList(context.Background(), core.NewOptions(
core.Option{Key: "status", Value: "open"},
core.Option{Key: "type", Value: "bug"},
core.Option{Key: "priority", Value: "high"},
core.Option{Key: "assignee", Value: "codex"},
core.Option{Key: "labels", Value: []string{"auth", "backend"}},
))
require.True(t, result.OK)
output, ok := result.Value.(IssueListOutput)
require.True(t, ok)
assert.Len(t, output.Issues, 1)
assert.Equal(t, 1, output.Count)
assert.Equal(t, []string{"auth", "backend"}, output.Issues[0].Labels)
}
func TestIssue_HandleIssueRecordList_Bad_ServerError(t *testing.T) {
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
require.Equal(t, "/v1/issues", r.URL.Path)
w.WriteHeader(http.StatusInternalServerError)
_, _ = w.Write([]byte(`{"error":"backend offline"}`))
}))
defer server.Close()
subsystem := testPrepWithPlatformServer(t, server, "secret-token")
result := subsystem.handleIssueRecordList(context.Background(), core.NewOptions(
core.Option{Key: "status", Value: "open"},
))
assert.False(t, result.OK)
require.Error(t, result.Value.(error))
assert.Contains(t, result.Value.(error).Error(), "issue.list")
}
func TestIssue_HandleIssueRecordAssign_Good(t *testing.T) {
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
require.Equal(t, "/v1/issues/fix-auth", r.URL.Path)
require.Equal(t, http.MethodPatch, r.Method)
bodyResult := core.ReadAll(r.Body)
require.True(t, bodyResult.OK)
var payload map[string]any
parseResult := core.JSONUnmarshalString(bodyResult.Value.(string), &payload)
require.True(t, parseResult.OK)
require.Equal(t, "codex", payload["assignee"])
_, _ = w.Write([]byte(`{"data":{"issue":{"slug":"fix-auth","title":"Fix auth","status":"assigned","assignee":"codex"}}}`))
}))
defer server.Close()
subsystem := testPrepWithPlatformServer(t, server, "secret-token")
result := subsystem.handleIssueRecordAssign(context.Background(), core.NewOptions(
core.Option{Key: "slug", Value: "fix-auth"},
core.Option{Key: "assignee", Value: "codex"},
))
require.True(t, result.OK)
output, ok := result.Value.(IssueOutput)
require.True(t, ok)
assert.True(t, output.Success)
assert.Equal(t, "codex", output.Issue.Assignee)
assert.Equal(t, "assigned", output.Issue.Status)
}
func TestIssue_HandleIssueRecordAssign_Bad_MissingAssignee(t *testing.T) {
subsystem := testPrepWithPlatformServer(t, nil, "secret-token")
result := subsystem.handleIssueRecordAssign(context.Background(), core.NewOptions(
core.Option{Key: "slug", Value: "fix-auth"},
))
assert.False(t, result.OK)
assert.EqualError(t, result.Value.(error), "issueAssign: assignee is required")
}
func TestIssue_HandleIssueRecordAssign_Ugly_MissingIdentifier(t *testing.T) {
subsystem := testPrepWithPlatformServer(t, nil, "secret-token")
result := subsystem.handleIssueRecordAssign(context.Background(), core.NewOptions(
core.Option{Key: "assignee", Value: "codex"},
))
assert.False(t, result.OK)
assert.EqualError(t, result.Value.(error), "issueAssign: id or slug is required")
}
func TestIssue_HandleIssueRecordReport_Good(t *testing.T) {
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
require.Equal(t, "/v1/issues/fix-auth/comments", r.URL.Path)
require.Equal(t, http.MethodPost, r.Method)
bodyResult := core.ReadAll(r.Body)
require.True(t, bodyResult.OK)
var payload map[string]any
parseResult := core.JSONUnmarshalString(bodyResult.Value.(string), &payload)
require.True(t, parseResult.OK)
assert.Equal(t, "QA failed: build output changed", payload["body"])
assert.Equal(t, "codex", payload["author"])
_, _ = w.Write([]byte(`{"data":{"comment":{"id":88,"issue_id":42,"author":"codex","body":"QA failed: build output changed","metadata":{"source":"qa"}}}}`))
}))
defer server.Close()
subsystem := testPrepWithPlatformServer(t, server, "secret-token")
result := subsystem.handleIssueRecordReport(context.Background(), core.NewOptions(
core.Option{Key: "slug", Value: "fix-auth"},
core.Option{Key: "report", Value: "QA failed: build output changed"},
core.Option{Key: "author", Value: "codex"},
core.Option{Key: "metadata", Value: map[string]any{"source": "qa"}},
))
require.True(t, result.OK)
output, ok := result.Value.(IssueReportOutput)
require.True(t, ok)
assert.True(t, output.Success)
assert.Equal(t, 88, output.Comment.ID)
assert.Equal(t, "QA failed: build output changed", output.Comment.Body)
assert.Equal(t, "codex", output.Comment.Author)
assert.Equal(t, map[string]any{"source": "qa"}, output.Comment.Metadata)
}
func TestIssue_HandleIssueRecordReport_Bad_MissingReport(t *testing.T) {
subsystem := testPrepWithPlatformServer(t, nil, "secret-token")
result := subsystem.handleIssueRecordReport(context.Background(), core.NewOptions(
core.Option{Key: "slug", Value: "fix-auth"},
))
assert.False(t, result.OK)
assert.EqualError(t, result.Value.(error), "issueReport: report is required")
}
func TestIssue_HandleIssueRecordReport_Ugly_MissingIdentifier(t *testing.T) {
subsystem := testPrepWithPlatformServer(t, nil, "secret-token")
result := subsystem.handleIssueRecordReport(context.Background(), core.NewOptions(
core.Option{Key: "report", Value: "QA failed: build output changed"},
))
assert.False(t, result.OK)
assert.EqualError(t, result.Value.(error), "issueReport: issue_id, id, or slug is required")
}
func TestIssue_HandleIssueRecordList_Ugly_NestedEnvelope(t *testing.T) {
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
require.Equal(t, "/v1/issues", r.URL.Path)
require.Equal(t, "open", r.URL.Query().Get("status"))
_, _ = w.Write([]byte(`{"data":{"issues":[{"id":7,"workspace_id":3,"sprint_id":5,"slug":"fix-auth","title":"Fix auth","labels":["auth","backend"]}],"total":1}}`))
}))
defer server.Close()
subsystem := testPrepWithPlatformServer(t, server, "secret-token")
result := subsystem.handleIssueRecordList(context.Background(), core.NewOptions(
core.Option{Key: "status", Value: "open"},
))
require.True(t, result.OK)
output, ok := result.Value.(IssueListOutput)
require.True(t, ok)
require.Len(t, output.Issues, 1)
assert.Equal(t, 1, output.Count)
assert.Equal(t, 3, output.Issues[0].WorkspaceID)
assert.Equal(t, 5, output.Issues[0].SprintID)
assert.Equal(t, []string{"auth", "backend"}, output.Issues[0].Labels)
}