2026-01-30 22:02:40 +00:00
|
|
|
package log
|
|
|
|
|
|
|
|
|
|
import (
|
|
|
|
|
"bytes"
|
|
|
|
|
"strings"
|
|
|
|
|
"testing"
|
2026-02-05 10:26:32 +00:00
|
|
|
|
2026-02-16 13:53:54 +00:00
|
|
|
"forge.lthn.ai/core/go/pkg/io"
|
2026-01-30 22:02:40 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
|
|
func TestLogger_Levels(t *testing.T) {
|
|
|
|
|
tests := []struct {
|
|
|
|
|
name string
|
|
|
|
|
level Level
|
|
|
|
|
logFunc func(*Logger, string, ...any)
|
|
|
|
|
expected bool
|
|
|
|
|
}{
|
|
|
|
|
{"debug at debug", LevelDebug, (*Logger).Debug, true},
|
|
|
|
|
{"info at debug", LevelDebug, (*Logger).Info, true},
|
|
|
|
|
{"warn at debug", LevelDebug, (*Logger).Warn, true},
|
|
|
|
|
{"error at debug", LevelDebug, (*Logger).Error, true},
|
|
|
|
|
|
|
|
|
|
{"debug at info", LevelInfo, (*Logger).Debug, false},
|
|
|
|
|
{"info at info", LevelInfo, (*Logger).Info, true},
|
|
|
|
|
{"warn at info", LevelInfo, (*Logger).Warn, true},
|
|
|
|
|
{"error at info", LevelInfo, (*Logger).Error, true},
|
|
|
|
|
|
|
|
|
|
{"debug at warn", LevelWarn, (*Logger).Debug, false},
|
|
|
|
|
{"info at warn", LevelWarn, (*Logger).Info, false},
|
|
|
|
|
{"warn at warn", LevelWarn, (*Logger).Warn, true},
|
|
|
|
|
{"error at warn", LevelWarn, (*Logger).Error, true},
|
|
|
|
|
|
|
|
|
|
{"debug at error", LevelError, (*Logger).Debug, false},
|
|
|
|
|
{"info at error", LevelError, (*Logger).Info, false},
|
|
|
|
|
{"warn at error", LevelError, (*Logger).Warn, false},
|
|
|
|
|
{"error at error", LevelError, (*Logger).Error, true},
|
|
|
|
|
|
|
|
|
|
{"debug at quiet", LevelQuiet, (*Logger).Debug, false},
|
|
|
|
|
{"info at quiet", LevelQuiet, (*Logger).Info, false},
|
|
|
|
|
{"warn at quiet", LevelQuiet, (*Logger).Warn, false},
|
|
|
|
|
{"error at quiet", LevelQuiet, (*Logger).Error, false},
|
2026-02-05 10:26:48 +00:00
|
|
|
|
|
|
|
|
{"security at info", LevelInfo, (*Logger).Security, true},
|
|
|
|
|
{"security at error", LevelError, (*Logger).Security, true},
|
2026-01-30 22:02:40 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for _, tt := range tests {
|
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
|
var buf bytes.Buffer
|
|
|
|
|
l := New(Options{Level: tt.level, Output: &buf})
|
|
|
|
|
tt.logFunc(l, "test message")
|
|
|
|
|
|
|
|
|
|
hasOutput := buf.Len() > 0
|
|
|
|
|
if hasOutput != tt.expected {
|
|
|
|
|
t.Errorf("expected output=%v, got output=%v", tt.expected, hasOutput)
|
|
|
|
|
}
|
|
|
|
|
})
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func TestLogger_KeyValues(t *testing.T) {
|
|
|
|
|
var buf bytes.Buffer
|
|
|
|
|
l := New(Options{Level: LevelDebug, Output: &buf})
|
|
|
|
|
|
|
|
|
|
l.Info("test message", "key1", "value1", "key2", 42)
|
|
|
|
|
|
|
|
|
|
output := buf.String()
|
|
|
|
|
if !strings.Contains(output, "test message") {
|
|
|
|
|
t.Error("expected message in output")
|
|
|
|
|
}
|
|
|
|
|
if !strings.Contains(output, "key1=value1") {
|
|
|
|
|
t.Error("expected key1=value1 in output")
|
|
|
|
|
}
|
|
|
|
|
if !strings.Contains(output, "key2=42") {
|
|
|
|
|
t.Error("expected key2=42 in output")
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
feat: BugSETI app, WebSocket hub, browser automation, and MCP tools (#336)
* feat: add security logging and fix framework regressions
This commit implements comprehensive security event logging and resolves critical regressions in the core framework.
Security Logging:
- Enhanced `pkg/log` with a `Security` level and helper.
- Added `log.Username()` to consistently identify the executing user.
- Instrumented GitHub CLI auth, Agentic configuration, filesystem sandbox, MCP handlers, and MCP TCP transport with security logs.
- Added `SecurityStyle` to the CLI for consistent visual representation of security events.
UniFi Security (CodeQL):
- Refactored `pkg/unifi` to remove hardcoded `InsecureSkipVerify`, resolving a high-severity alert.
- Added a `--verify-tls` flag and configuration option to control TLS verification.
- Updated command handlers to support the new verification parameter.
Framework Fixes:
- Restored original signatures for `MustServiceFor`, `Config()`, and `Display()` in `pkg/framework/core`, which had been corrupted during a merge.
- Fixed `pkg/framework/framework.go` and `pkg/framework/core/runtime_pkg.go` to match the restored signatures.
- These fixes resolve project-wide compilation errors caused by the signature mismatches.
I encountered significant blockers due to a corrupted state of the `dev` branch after a merge, which introduced breaking changes in the core framework's DI system. I had to manually reconcile these signatures with the expected usage across the codebase to restore build stability.
* feat(mcp): add RAG tools (query, ingest, collections)
Add vector database tools to the MCP server for RAG operations:
- rag_query: Search for relevant documentation using semantic similarity
- rag_ingest: Ingest files or directories into the vector database
- rag_collections: List available collections
Uses existing internal/cmd/rag exports (QueryDocs, IngestDirectory, IngestFile)
and pkg/rag for Qdrant client access. Default collection is "hostuk-docs"
with topK=5 for queries.
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* feat(mcp): add metrics tools (record, query)
Add MCP tools for recording and querying AI/security metrics events.
The metrics_record tool writes events to daily JSONL files, and the
metrics_query tool provides aggregated statistics by type, repo, and agent.
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* feat: add 'core mcp serve' command
Add CLI command to start the MCP server for AI tool integration.
- Create internal/cmd/mcpcmd package with serve subcommand
- Support --workspace flag for directory restriction
- Handle SIGINT/SIGTERM for clean shutdown
- Register in full.go build variant
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* feat(ws): add WebSocket hub package for real-time streaming
Add pkg/ws package implementing a hub pattern for WebSocket connections:
- Hub manages client connections, broadcasts, and channel subscriptions
- Client struct represents connected WebSocket clients
- Message types: process_output, process_status, event, error, ping/pong
- Channel-based subscription system (subscribe/unsubscribe)
- SendProcessOutput and SendProcessStatus for process streaming integration
- Full test coverage including concurrency tests
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* feat(mcp): add process management and WebSocket MCP tools
Add MCP tools for process management:
- process_start: Start a new external process
- process_stop: Gracefully stop a running process
- process_kill: Force kill a process
- process_list: List all managed processes
- process_output: Get captured process output
- process_input: Send input to process stdin
Add MCP tools for WebSocket:
- ws_start: Start WebSocket server for real-time streaming
- ws_info: Get hub statistics (clients, channels)
Update Service struct with optional process.Service and ws.Hub fields,
new WithProcessService and WithWSHub options, getter methods, and
Shutdown method for cleanup.
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* feat(webview): add browser automation package via Chrome DevTools Protocol
Add pkg/webview package for browser automation:
- webview.go: Main interface with Connect, Navigate, Click, Type, QuerySelector, Screenshot, Evaluate
- cdp.go: Chrome DevTools Protocol WebSocket client implementation
- actions.go: DOM action types (Click, Type, Hover, Scroll, etc.) and ActionSequence builder
- console.go: Console message capture and filtering with ConsoleWatcher and ExceptionWatcher
- angular.go: Angular-specific helpers for router navigation, component access, and Zone.js stability
Add MCP tools for webview:
- webview_connect/disconnect: Connection management
- webview_navigate: Page navigation
- webview_click/type/query/wait: DOM interaction
- webview_console: Console output capture
- webview_eval: JavaScript execution
- webview_screenshot: Screenshot capture
Add documentation:
- docs/mcp/angular-testing.md: Guide for Angular application testing
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* docs: document new packages and BugSETI application
- Update CLAUDE.md with documentation for:
- pkg/ws (WebSocket hub for real-time streaming)
- pkg/webview (Browser automation via CDP)
- pkg/mcp (MCP server tools: process, ws, webview)
- BugSETI application overview
- Add comprehensive README for BugSETI with:
- Installation and configuration guide
- Usage workflow documentation
- Architecture overview
- Contributing guidelines
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* feat(bugseti): add BugSETI system tray app with auto-update
BugSETI - Distributed Bug Fixing like SETI@home but for code
Features:
- System tray app with Wails v3
- GitHub issue fetching with label filters
- Issue queue with priority management
- AI context seeding via seed-agent-developer skill
- Automated PR submission flow
- Stats tracking and leaderboard
- Cross-platform notifications
- Self-updating with stable/beta/nightly channels
Includes:
- cmd/bugseti: Main application with Angular frontend
- internal/bugseti: Core services (fetcher, queue, seeder, submit, config, stats, notify)
- internal/bugseti/updater: Auto-update system (checker, downloader, installer)
- .github/workflows/bugseti-release.yml: CI/CD for all platforms
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* fix: resolve import cycle and code duplication
- Remove pkg/log import from pkg/io/local to break import cycle
(pkg/log/rotation.go imports pkg/io, creating circular dependency)
- Use stderr logging for security events in sandbox escape detection
- Remove unused sync/atomic import from core.go
- Fix duplicate LogSecurity function declarations in cli/log.go
- Update workspace/service.go Crypt() call to match interface
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* fix: update tests for new function signatures and format code
- Update core_test.go: Config(), Display() now panic instead of returning error
- Update runtime_pkg_test.go: sr.Config() now panics instead of returning error
- Update MustServiceFor tests to use assert.Panics
- Format BugSETI, MCP tools, and webview packages with gofmt
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
---------
Co-authored-by: Snider <631881+Snider@users.noreply.github.com>
Co-authored-by: Claude <developers@lethean.io>
Co-authored-by: Claude Opus 4.5 <noreply@anthropic.com>
2026-02-05 17:22:05 +00:00
|
|
|
func TestLogger_ErrorContext(t *testing.T) {
|
|
|
|
|
var buf bytes.Buffer
|
|
|
|
|
l := New(Options{Output: &buf, Level: LevelInfo})
|
|
|
|
|
|
|
|
|
|
err := E("test.Op", "failed", NewError("root cause"))
|
|
|
|
|
err = Wrap(err, "outer.Op", "outer failed")
|
|
|
|
|
|
|
|
|
|
l.Error("something failed", "err", err)
|
|
|
|
|
|
|
|
|
|
got := buf.String()
|
|
|
|
|
if !strings.Contains(got, "op=outer.Op") {
|
|
|
|
|
t.Errorf("expected output to contain op=outer.Op, got %q", got)
|
|
|
|
|
}
|
|
|
|
|
if !strings.Contains(got, "stack=outer.Op -> test.Op") {
|
|
|
|
|
t.Errorf("expected output to contain stack=outer.Op -> test.Op, got %q", got)
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2026-01-30 22:02:40 +00:00
|
|
|
func TestLogger_SetLevel(t *testing.T) {
|
|
|
|
|
l := New(Options{Level: LevelInfo})
|
|
|
|
|
|
|
|
|
|
if l.Level() != LevelInfo {
|
|
|
|
|
t.Error("expected initial level to be Info")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
l.SetLevel(LevelDebug)
|
|
|
|
|
if l.Level() != LevelDebug {
|
|
|
|
|
t.Error("expected level to be Debug after SetLevel")
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func TestLevel_String(t *testing.T) {
|
|
|
|
|
tests := []struct {
|
|
|
|
|
level Level
|
|
|
|
|
expected string
|
|
|
|
|
}{
|
|
|
|
|
{LevelQuiet, "quiet"},
|
|
|
|
|
{LevelError, "error"},
|
|
|
|
|
{LevelWarn, "warn"},
|
|
|
|
|
{LevelInfo, "info"},
|
|
|
|
|
{LevelDebug, "debug"},
|
|
|
|
|
{Level(99), "unknown"},
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for _, tt := range tests {
|
|
|
|
|
t.Run(tt.expected, func(t *testing.T) {
|
|
|
|
|
if got := tt.level.String(); got != tt.expected {
|
|
|
|
|
t.Errorf("expected %q, got %q", tt.expected, got)
|
|
|
|
|
}
|
|
|
|
|
})
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2026-02-05 10:26:48 +00:00
|
|
|
func TestLogger_Security(t *testing.T) {
|
|
|
|
|
var buf bytes.Buffer
|
|
|
|
|
l := New(Options{Level: LevelError, Output: &buf})
|
|
|
|
|
|
|
|
|
|
l.Security("unauthorized access", "user", "admin")
|
|
|
|
|
|
|
|
|
|
output := buf.String()
|
|
|
|
|
if !strings.Contains(output, "[SEC]") {
|
|
|
|
|
t.Error("expected [SEC] prefix in security log")
|
|
|
|
|
}
|
|
|
|
|
if !strings.Contains(output, "unauthorized access") {
|
|
|
|
|
t.Error("expected message in security log")
|
|
|
|
|
}
|
|
|
|
|
if !strings.Contains(output, "user=admin") {
|
|
|
|
|
t.Error("expected context in security log")
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2026-01-30 22:02:40 +00:00
|
|
|
func TestDefault(t *testing.T) {
|
|
|
|
|
// Default logger should exist
|
|
|
|
|
if Default() == nil {
|
|
|
|
|
t.Error("expected default logger to exist")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Package-level functions should work
|
|
|
|
|
var buf bytes.Buffer
|
|
|
|
|
l := New(Options{Level: LevelDebug, Output: &buf})
|
|
|
|
|
SetDefault(l)
|
|
|
|
|
|
|
|
|
|
Info("test")
|
|
|
|
|
if buf.Len() == 0 {
|
|
|
|
|
t.Error("expected package-level Info to produce output")
|
|
|
|
|
}
|
|
|
|
|
}
|
2026-02-05 10:26:32 +00:00
|
|
|
|
|
|
|
|
func TestLogger_RotationIntegration(t *testing.T) {
|
|
|
|
|
m := io.NewMockMedium()
|
|
|
|
|
// Hack: override io.Local for testing
|
|
|
|
|
oldLocal := io.Local
|
|
|
|
|
io.Local = m
|
|
|
|
|
defer func() { io.Local = oldLocal }()
|
|
|
|
|
|
|
|
|
|
l := New(Options{
|
|
|
|
|
Level: LevelInfo,
|
|
|
|
|
Rotation: &RotationOptions{
|
|
|
|
|
Filename: "integration.log",
|
|
|
|
|
MaxSize: 1,
|
|
|
|
|
},
|
|
|
|
|
})
|
|
|
|
|
|
|
|
|
|
l.Info("integration test")
|
|
|
|
|
|
|
|
|
|
// RotatingWriter needs to be closed to ensure data is written to MockMedium
|
|
|
|
|
if rw, ok := l.output.(*RotatingWriter); ok {
|
|
|
|
|
rw.Close()
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
content, err := m.Read("integration.log")
|
|
|
|
|
if err != nil {
|
|
|
|
|
t.Fatalf("failed to read log: %v", err)
|
|
|
|
|
}
|
|
|
|
|
if !strings.Contains(content, "integration test") {
|
|
|
|
|
t.Errorf("expected content to contain log message, got %q", content)
|
|
|
|
|
}
|
|
|
|
|
}
|