393 lines
12 KiB
Go
393 lines
12 KiB
Go
// SPDX-License-Identifier: EUPL-1.2
|
|
|
|
package agentic
|
|
|
|
import (
|
|
"context"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"testing"
|
|
"time"
|
|
|
|
core "dappco.re/go/core"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func TestSync_HandleSyncPush_Good(t *testing.T) {
|
|
root := t.TempDir()
|
|
t.Setenv("CORE_WORKSPACE", root)
|
|
t.Setenv("CORE_AGENT_API_KEY", "secret-token")
|
|
|
|
workspaceDir := core.JoinPath(root, "workspace", "core", "go-io", "task-5")
|
|
fs.EnsureDir(workspaceDir)
|
|
writeStatusResult(workspaceDir, &WorkspaceStatus{
|
|
Status: "completed",
|
|
Agent: "codex",
|
|
Repo: "go-io",
|
|
Org: "core",
|
|
Task: "Fix tests",
|
|
Branch: "agent/fix-tests",
|
|
StartedAt: time.Now(),
|
|
UpdatedAt: time.Now(),
|
|
})
|
|
|
|
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
require.Equal(t, "/v1/agent/sync", r.URL.Path)
|
|
require.Equal(t, "Bearer secret-token", r.Header.Get("Authorization"))
|
|
bodyResult := core.ReadAll(r.Body)
|
|
require.True(t, bodyResult.OK)
|
|
|
|
var payload map[string]any
|
|
parseResult := core.JSONUnmarshalString(bodyResult.Value.(string), &payload)
|
|
require.True(t, parseResult.OK)
|
|
require.Equal(t, AgentName(), payload["agent_id"])
|
|
dispatches, ok := payload["dispatches"].([]any)
|
|
require.True(t, ok)
|
|
require.Len(t, dispatches, 1)
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
_, _ = w.Write([]byte(`{"data":{"synced":1}}`))
|
|
}))
|
|
defer server.Close()
|
|
|
|
subsystem := &PrepSubsystem{
|
|
ServiceRuntime: core.NewServiceRuntime(testCore, AgentOptions{}),
|
|
brainURL: server.URL,
|
|
}
|
|
output, err := subsystem.syncPush(context.Background(), "")
|
|
require.NoError(t, err)
|
|
assert.True(t, output.Success)
|
|
assert.Equal(t, 1, output.Count)
|
|
assert.False(t, readSyncStatusState().LastPushAt.IsZero())
|
|
}
|
|
|
|
func TestSync_HandleSyncPush_Good_UsesProvidedDispatches(t *testing.T) {
|
|
root := t.TempDir()
|
|
t.Setenv("CORE_WORKSPACE", root)
|
|
t.Setenv("CORE_AGENT_API_KEY", "secret-token")
|
|
|
|
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
require.Equal(t, "/v1/agent/sync", r.URL.Path)
|
|
|
|
bodyResult := core.ReadAll(r.Body)
|
|
require.True(t, bodyResult.OK)
|
|
|
|
var payload map[string]any
|
|
parseResult := core.JSONUnmarshalString(bodyResult.Value.(string), &payload)
|
|
require.True(t, parseResult.OK)
|
|
require.Equal(t, "charon", payload["agent_id"])
|
|
|
|
dispatches, ok := payload["dispatches"].([]any)
|
|
require.True(t, ok)
|
|
require.Len(t, dispatches, 1)
|
|
|
|
record, ok := dispatches[0].(map[string]any)
|
|
require.True(t, ok)
|
|
require.Equal(t, "external-1", record["workspace"])
|
|
require.Equal(t, "completed", record["status"])
|
|
|
|
_, _ = w.Write([]byte(`{"data":{"synced":1}}`))
|
|
}))
|
|
defer server.Close()
|
|
|
|
subsystem := &PrepSubsystem{
|
|
ServiceRuntime: core.NewServiceRuntime(testCore, AgentOptions{}),
|
|
brainURL: server.URL,
|
|
}
|
|
output, err := subsystem.syncPushInput(context.Background(), SyncPushInput{
|
|
AgentID: "charon",
|
|
Dispatches: []map[string]any{
|
|
{"workspace": "external-1", "status": "completed"},
|
|
},
|
|
})
|
|
require.NoError(t, err)
|
|
assert.True(t, output.Success)
|
|
assert.Equal(t, 1, output.Count)
|
|
assert.Empty(t, readSyncQueue())
|
|
}
|
|
|
|
func TestSync_HandleSyncPush_Bad(t *testing.T) {
|
|
root := t.TempDir()
|
|
t.Setenv("CORE_WORKSPACE", root)
|
|
t.Setenv("CORE_AGENT_API_KEY", "")
|
|
|
|
workspaceDir := core.JoinPath(root, "workspace", "core", "go-io", "task-5")
|
|
fs.EnsureDir(workspaceDir)
|
|
writeStatusResult(workspaceDir, &WorkspaceStatus{
|
|
Status: "completed",
|
|
Agent: "codex",
|
|
Repo: "go-io",
|
|
Org: "core",
|
|
Task: "Fix tests",
|
|
Branch: "agent/fix-tests",
|
|
StartedAt: time.Now(),
|
|
UpdatedAt: time.Now(),
|
|
})
|
|
|
|
subsystem := &PrepSubsystem{
|
|
ServiceRuntime: core.NewServiceRuntime(testCore, AgentOptions{}),
|
|
}
|
|
output, err := subsystem.syncPush(context.Background(), "")
|
|
require.NoError(t, err)
|
|
assert.True(t, output.Success)
|
|
assert.Equal(t, 0, output.Count)
|
|
assert.Empty(t, readSyncQueue())
|
|
}
|
|
|
|
func TestSync_HandleSyncPush_Bad_QueuesProvidedDispatchesWhenOffline(t *testing.T) {
|
|
root := t.TempDir()
|
|
t.Setenv("CORE_WORKSPACE", root)
|
|
t.Setenv("CORE_AGENT_API_KEY", "")
|
|
|
|
subsystem := &PrepSubsystem{
|
|
ServiceRuntime: core.NewServiceRuntime(testCore, AgentOptions{}),
|
|
}
|
|
output, err := subsystem.syncPushInput(context.Background(), SyncPushInput{
|
|
AgentID: "charon",
|
|
Dispatches: []map[string]any{
|
|
{"workspace": "external-1", "status": "completed"},
|
|
},
|
|
})
|
|
require.NoError(t, err)
|
|
assert.True(t, output.Success)
|
|
assert.Equal(t, 0, output.Count)
|
|
|
|
queued := readSyncQueue()
|
|
require.Len(t, queued, 1)
|
|
assert.Equal(t, "charon", queued[0].AgentID)
|
|
require.Len(t, queued[0].Dispatches, 1)
|
|
assert.Equal(t, "external-1", queued[0].Dispatches[0]["workspace"])
|
|
}
|
|
|
|
func TestSync_HandleSyncPush_Ugly(t *testing.T) {
|
|
root := t.TempDir()
|
|
t.Setenv("CORE_WORKSPACE", root)
|
|
t.Setenv("CORE_AGENT_API_KEY", "secret-token")
|
|
|
|
workspaceDir := core.JoinPath(root, "workspace", "core", "go-io", "task-5")
|
|
fs.EnsureDir(workspaceDir)
|
|
writeStatusResult(workspaceDir, &WorkspaceStatus{
|
|
Status: "completed",
|
|
Agent: "codex",
|
|
Repo: "go-io",
|
|
Org: "core",
|
|
Task: "Fix tests",
|
|
Branch: "agent/fix-tests",
|
|
StartedAt: time.Now(),
|
|
UpdatedAt: time.Now(),
|
|
})
|
|
|
|
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
require.Equal(t, "/v1/agent/sync", r.URL.Path)
|
|
w.WriteHeader(http.StatusServiceUnavailable)
|
|
_, _ = w.Write([]byte(`{"error":"unavailable"}`))
|
|
}))
|
|
defer server.Close()
|
|
|
|
subsystem := &PrepSubsystem{
|
|
ServiceRuntime: core.NewServiceRuntime(testCore, AgentOptions{}),
|
|
brainURL: server.URL,
|
|
}
|
|
output, err := subsystem.syncPush(context.Background(), "")
|
|
require.NoError(t, err)
|
|
assert.True(t, output.Success)
|
|
assert.Equal(t, 0, output.Count)
|
|
|
|
queued := readSyncQueue()
|
|
require.Len(t, queued, 1)
|
|
assert.Equal(t, AgentName(), queued[0].AgentID)
|
|
require.Len(t, queued[0].Dispatches, 1)
|
|
}
|
|
|
|
func TestSync_HandleSyncPull_Good(t *testing.T) {
|
|
root := t.TempDir()
|
|
t.Setenv("CORE_WORKSPACE", root)
|
|
t.Setenv("CORE_AGENT_API_KEY", "secret-token")
|
|
|
|
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
require.Equal(t, "/v1/agent/context", r.URL.Path)
|
|
w.Header().Set("Content-Type", "application/json")
|
|
_, _ = w.Write([]byte(`{"data":[{"id":"mem-1","content":"Known pattern"}]}`))
|
|
}))
|
|
defer server.Close()
|
|
|
|
subsystem := &PrepSubsystem{
|
|
ServiceRuntime: core.NewServiceRuntime(testCore, AgentOptions{}),
|
|
brainURL: server.URL,
|
|
}
|
|
output, err := subsystem.syncPull(context.Background(), "codex")
|
|
require.NoError(t, err)
|
|
assert.True(t, output.Success)
|
|
assert.Equal(t, 1, output.Count)
|
|
require.Len(t, output.Context, 1)
|
|
assert.Equal(t, "mem-1", output.Context[0]["id"])
|
|
|
|
cached := readSyncContext()
|
|
require.Len(t, cached, 1)
|
|
assert.Equal(t, "mem-1", cached[0]["id"])
|
|
assert.False(t, readSyncStatusState().LastPullAt.IsZero())
|
|
}
|
|
|
|
func TestSync_HandleSyncPull_Good_SinceQuery(t *testing.T) {
|
|
root := t.TempDir()
|
|
t.Setenv("CORE_WORKSPACE", root)
|
|
t.Setenv("CORE_AGENT_API_KEY", "secret-token")
|
|
|
|
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
require.Equal(t, "/v1/agent/context", r.URL.Path)
|
|
require.Equal(t, "codex", r.URL.Query().Get("agent_id"))
|
|
require.Equal(t, "2026-03-30T00:00:00Z", r.URL.Query().Get("since"))
|
|
_, _ = w.Write([]byte(`{"data":[{"id":"mem-2","content":"Recent pattern"}]}`))
|
|
}))
|
|
defer server.Close()
|
|
|
|
subsystem := &PrepSubsystem{
|
|
ServiceRuntime: core.NewServiceRuntime(testCore, AgentOptions{}),
|
|
brainURL: server.URL,
|
|
}
|
|
output, err := subsystem.syncPullInput(context.Background(), SyncPullInput{
|
|
AgentID: "codex",
|
|
Since: "2026-03-30T00:00:00Z",
|
|
})
|
|
require.NoError(t, err)
|
|
assert.True(t, output.Success)
|
|
assert.Equal(t, 1, output.Count)
|
|
require.Len(t, output.Context, 1)
|
|
assert.Equal(t, "mem-2", output.Context[0]["id"])
|
|
}
|
|
|
|
func TestSync_HandleSyncPush_Good_ReportMetadata(t *testing.T) {
|
|
root := t.TempDir()
|
|
t.Setenv("CORE_WORKSPACE", root)
|
|
t.Setenv("CORE_AGENT_API_KEY", "secret-token")
|
|
|
|
workspaceDir := core.JoinPath(root, "workspace", "core", "go-io", "task-5")
|
|
fs.EnsureDir(WorkspaceMetaDir(workspaceDir))
|
|
require.True(t, fs.Write(core.JoinPath(WorkspaceMetaDir(workspaceDir), "report.json"), `{"findings":[{"file":"main.go"}],"changes":{"files_changed":1}}`).OK)
|
|
writeStatusResult(workspaceDir, &WorkspaceStatus{
|
|
Status: "blocked",
|
|
Agent: "codex",
|
|
Repo: "go-io",
|
|
Org: "core",
|
|
Task: "Fix tests",
|
|
Branch: "agent/fix-tests",
|
|
Issue: 42,
|
|
Question: "Which API version?",
|
|
ProcessID: "proc-1",
|
|
Runs: 2,
|
|
StartedAt: time.Now(),
|
|
UpdatedAt: time.Now(),
|
|
})
|
|
|
|
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
bodyResult := core.ReadAll(r.Body)
|
|
require.True(t, bodyResult.OK)
|
|
|
|
var payload map[string]any
|
|
parseResult := core.JSONUnmarshalString(bodyResult.Value.(string), &payload)
|
|
require.True(t, parseResult.OK)
|
|
|
|
dispatches, ok := payload["dispatches"].([]any)
|
|
require.True(t, ok)
|
|
require.Len(t, dispatches, 1)
|
|
|
|
record, ok := dispatches[0].(map[string]any)
|
|
require.True(t, ok)
|
|
require.Equal(t, "Which API version?", record["question"])
|
|
require.Equal(t, float64(42), record["issue"])
|
|
require.Equal(t, float64(2), record["runs"])
|
|
require.Equal(t, "proc-1", record["process_id"])
|
|
require.NotNil(t, record["report"])
|
|
require.NotNil(t, record["findings"])
|
|
require.NotNil(t, record["changes"])
|
|
|
|
_, _ = w.Write([]byte(`{"data":{"synced":1}}`))
|
|
}))
|
|
defer server.Close()
|
|
|
|
subsystem := &PrepSubsystem{
|
|
ServiceRuntime: core.NewServiceRuntime(testCore, AgentOptions{}),
|
|
brainURL: server.URL,
|
|
}
|
|
output, err := subsystem.syncPush(context.Background(), "")
|
|
require.NoError(t, err)
|
|
assert.True(t, output.Success)
|
|
assert.Equal(t, 1, output.Count)
|
|
}
|
|
|
|
func TestSync_HandleSyncPull_Good_NestedEnvelope(t *testing.T) {
|
|
root := t.TempDir()
|
|
t.Setenv("CORE_WORKSPACE", root)
|
|
t.Setenv("CORE_AGENT_API_KEY", "secret-token")
|
|
|
|
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
_, _ = w.Write([]byte(`{"data":{"context":[{"id":"ctx-1","content":"Known pattern"}]}}`))
|
|
}))
|
|
defer server.Close()
|
|
|
|
subsystem := &PrepSubsystem{
|
|
ServiceRuntime: core.NewServiceRuntime(testCore, AgentOptions{}),
|
|
brainURL: server.URL,
|
|
}
|
|
output, err := subsystem.syncPull(context.Background(), "codex")
|
|
require.NoError(t, err)
|
|
assert.True(t, output.Success)
|
|
assert.Equal(t, 1, output.Count)
|
|
require.Len(t, output.Context, 1)
|
|
assert.Equal(t, "ctx-1", output.Context[0]["id"])
|
|
}
|
|
|
|
func TestSync_HandleSyncPull_Bad(t *testing.T) {
|
|
root := t.TempDir()
|
|
t.Setenv("CORE_WORKSPACE", root)
|
|
t.Setenv("CORE_AGENT_API_KEY", "secret-token")
|
|
writeSyncContext([]map[string]any{
|
|
{"id": "cached-1", "content": "Cached context"},
|
|
})
|
|
|
|
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
require.Equal(t, "/v1/agent/context", r.URL.Path)
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
_, _ = w.Write([]byte(`{"error":"boom"}`))
|
|
}))
|
|
defer server.Close()
|
|
|
|
subsystem := &PrepSubsystem{
|
|
ServiceRuntime: core.NewServiceRuntime(testCore, AgentOptions{}),
|
|
brainURL: server.URL,
|
|
}
|
|
output, err := subsystem.syncPull(context.Background(), "codex")
|
|
require.NoError(t, err)
|
|
assert.True(t, output.Success)
|
|
assert.Equal(t, 1, output.Count)
|
|
require.Len(t, output.Context, 1)
|
|
assert.Equal(t, "cached-1", output.Context[0]["id"])
|
|
}
|
|
|
|
func TestSync_HandleSyncPull_Ugly(t *testing.T) {
|
|
root := t.TempDir()
|
|
t.Setenv("CORE_WORKSPACE", root)
|
|
t.Setenv("CORE_AGENT_API_KEY", "secret-token")
|
|
writeSyncContext([]map[string]any{
|
|
{"id": "cached-2", "content": "Fallback context"},
|
|
})
|
|
|
|
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
require.Equal(t, "/v1/agent/context", r.URL.Path)
|
|
w.Header().Set("Content-Type", "application/json")
|
|
_, _ = w.Write([]byte(`{this is not json`))
|
|
}))
|
|
defer server.Close()
|
|
|
|
subsystem := &PrepSubsystem{
|
|
ServiceRuntime: core.NewServiceRuntime(testCore, AgentOptions{}),
|
|
brainURL: server.URL,
|
|
}
|
|
output, err := subsystem.syncPull(context.Background(), "codex")
|
|
require.NoError(t, err)
|
|
assert.True(t, output.Success)
|
|
assert.Equal(t, 1, output.Count)
|
|
require.Len(t, output.Context, 1)
|
|
assert.Equal(t, "cached-2", output.Context[0]["id"])
|
|
}
|