mirror of
https://github.com/openclaw/openclaw.git
synced 2026-03-14 11:30:41 +00:00
* test: preserve wrapper behavior for targeted runs * test: tighten targeted wrapper routing
744 lines
26 KiB
JavaScript
744 lines
26 KiB
JavaScript
import { spawn } from "node:child_process";
|
|
import fs from "node:fs";
|
|
import os from "node:os";
|
|
import path from "node:path";
|
|
|
|
// On Windows, `.cmd` launchers can fail with `spawn EINVAL` when invoked without a shell
|
|
// (especially under GitHub Actions + Git Bash). Use `shell: true` and let the shell resolve pnpm.
|
|
const pnpm = "pnpm";
|
|
|
|
const unitIsolatedFilesRaw = [
|
|
"src/plugins/loader.test.ts",
|
|
"src/plugins/tools.optional.test.ts",
|
|
"src/agents/session-tool-result-guard.tool-result-persist-hook.test.ts",
|
|
"src/security/fix.test.ts",
|
|
// Runtime source guard scans are sensitive to filesystem contention.
|
|
"src/security/temp-path-guard.test.ts",
|
|
"src/security/audit.test.ts",
|
|
"src/utils.test.ts",
|
|
"src/auto-reply/tool-meta.test.ts",
|
|
"src/auto-reply/envelope.test.ts",
|
|
"src/commands/auth-choice.test.ts",
|
|
// Process supervision + docker setup suites are stable but setup-heavy.
|
|
"src/process/supervisor/supervisor.test.ts",
|
|
"src/docker-setup.test.ts",
|
|
// Filesystem-heavy skills sync suite.
|
|
"src/agents/skills.build-workspace-skills-prompt.syncs-merged-skills-into-target-workspace.test.ts",
|
|
// Real git hook integration test; keep signal, move off unit-fast critical path.
|
|
"test/git-hooks-pre-commit.test.ts",
|
|
// Setup-heavy doctor command suites; keep them off the unit-fast critical path.
|
|
"src/commands/doctor.warns-state-directory-is-missing.test.ts",
|
|
"src/commands/doctor.warns-per-agent-sandbox-docker-browser-prune.test.ts",
|
|
"src/commands/doctor.runs-legacy-state-migrations-yes-mode-without.test.ts",
|
|
// Setup-heavy CLI update flow suite; move off unit-fast critical path.
|
|
"src/cli/update-cli.test.ts",
|
|
// Uses temp repos + module cache resets; keep it off vmForks to avoid ref-resolution flakes.
|
|
"src/infra/git-commit.test.ts",
|
|
// Expensive schema build/bootstrap checks; keep coverage but run in isolated lane.
|
|
"src/config/schema.test.ts",
|
|
"src/config/schema.tags.test.ts",
|
|
// CLI smoke/agent flows are stable but setup-heavy.
|
|
"src/cli/program.smoke.test.ts",
|
|
"src/commands/agent.test.ts",
|
|
"src/media/store.test.ts",
|
|
"src/media/store.header-ext.test.ts",
|
|
"src/web/media.test.ts",
|
|
"src/web/auto-reply.web-auto-reply.falls-back-text-media-send-fails.test.ts",
|
|
"src/browser/server.covers-additional-endpoint-branches.test.ts",
|
|
"src/browser/server.post-tabs-open-profile-unknown-returns-404.test.ts",
|
|
"src/browser/server.agent-contract-snapshot-endpoints.test.ts",
|
|
"src/browser/server.agent-contract-form-layout-act-commands.test.ts",
|
|
"src/browser/server.skips-default-maxchars-explicitly-set-zero.test.ts",
|
|
"src/browser/server.auth-token-gates-http.test.ts",
|
|
// Keep this high-variance heavy file off the unit-fast critical path.
|
|
"src/auto-reply/reply.block-streaming.test.ts",
|
|
// Archive extraction/fixture-heavy suite; keep off unit-fast critical path.
|
|
"src/hooks/install.test.ts",
|
|
// Download/extraction safety cases can spike under unit-fast contention.
|
|
"src/agents/skills-install.download.test.ts",
|
|
// Skills discovery/snapshot suites are filesystem-heavy and high-variance in vmForks lanes.
|
|
"src/agents/skills.test.ts",
|
|
"src/agents/skills.buildworkspaceskillsnapshot.test.ts",
|
|
"src/browser/extension-relay.test.ts",
|
|
"extensions/acpx/src/runtime.test.ts",
|
|
// Shell-heavy script harness can contend under vmForks startup bursts.
|
|
"test/scripts/ios-team-id.test.ts",
|
|
// Heavy runner/exec/archive suites are stable but contend on shared resources under vmForks.
|
|
"src/agents/pi-embedded-runner.test.ts",
|
|
"src/agents/bash-tools.test.ts",
|
|
"src/agents/openclaw-tools.subagents.sessions-spawn.lifecycle.test.ts",
|
|
"src/agents/bash-tools.exec.background-abort.test.ts",
|
|
"src/agents/subagent-announce.format.test.ts",
|
|
"src/infra/archive.test.ts",
|
|
"src/cli/daemon-cli.coverage.test.ts",
|
|
// Model normalization test imports config/model discovery stack; keep off unit-fast critical path.
|
|
"src/agents/models-config.normalizes-gemini-3-ids-preview-google-providers.test.ts",
|
|
// Auth profile rotation suite is retry-heavy and high-variance under vmForks contention.
|
|
"src/agents/pi-embedded-runner.run-embedded-pi-agent.auth-profile-rotation.test.ts",
|
|
// Heavy trigger command scenarios; keep off unit-fast critical path to reduce contention noise.
|
|
"src/auto-reply/reply.triggers.trigger-handling.filters-usage-summary-current-model-provider.test.ts",
|
|
"src/auto-reply/reply.triggers.trigger-handling.targets-active-session-native-stop.test.ts",
|
|
"src/auto-reply/reply.triggers.group-intro-prompts.test.ts",
|
|
"src/auto-reply/reply.triggers.trigger-handling.handles-inline-commands-strips-it-before-agent.test.ts",
|
|
"src/web/auto-reply.web-auto-reply.compresses-common-formats-jpeg-cap.test.ts",
|
|
// Setup-heavy bot bootstrap suite.
|
|
"src/telegram/bot.create-telegram-bot.test.ts",
|
|
// Medium-heavy bot behavior suite; move off unit-fast critical path.
|
|
"src/telegram/bot.test.ts",
|
|
// Slack slash registration tests are setup-heavy and can bottleneck unit-fast.
|
|
"src/slack/monitor/slash.test.ts",
|
|
// Uses process-level unhandledRejection listeners; keep it off vmForks to avoid cross-file leakage.
|
|
"src/imessage/monitor.shutdown.unhandled-rejection.test.ts",
|
|
// Mutates process.cwd() and mocks core module loaders; isolate from the shared fast lane.
|
|
"src/infra/git-commit.test.ts",
|
|
];
|
|
const unitIsolatedFiles = unitIsolatedFilesRaw.filter((file) => fs.existsSync(file));
|
|
|
|
const children = new Set();
|
|
const isCI = process.env.CI === "true" || process.env.GITHUB_ACTIONS === "true";
|
|
const isMacOS = process.platform === "darwin" || process.env.RUNNER_OS === "macOS";
|
|
const isWindows = process.platform === "win32" || process.env.RUNNER_OS === "Windows";
|
|
const isWindowsCi = isCI && isWindows;
|
|
const hostCpuCount = os.cpus().length;
|
|
const hostMemoryGiB = Math.floor(os.totalmem() / 1024 ** 3);
|
|
// Keep aggressive local defaults for high-memory workstations (Mac Studio class).
|
|
const highMemLocalHost = !isCI && hostMemoryGiB >= 96;
|
|
const lowMemLocalHost = !isCI && hostMemoryGiB < 64;
|
|
const nodeMajor = Number.parseInt(process.versions.node.split(".")[0] ?? "", 10);
|
|
// vmForks is a big win for transform/import heavy suites. Node 24 is stable again
|
|
// for the default unit-fast lane after moving the known flaky files to fork-only
|
|
// isolation, but Node 25+ still falls back to process forks until re-validated.
|
|
// Keep it opt-out via OPENCLAW_TEST_VM_FORKS=0, and let users force-enable with =1.
|
|
const supportsVmForks = Number.isFinite(nodeMajor) ? nodeMajor <= 24 : true;
|
|
const useVmForks =
|
|
process.env.OPENCLAW_TEST_VM_FORKS === "1" ||
|
|
(process.env.OPENCLAW_TEST_VM_FORKS !== "0" && !isWindows && supportsVmForks && !lowMemLocalHost);
|
|
const disableIsolation = process.env.OPENCLAW_TEST_NO_ISOLATE === "1";
|
|
const includeGatewaySuite = process.env.OPENCLAW_TEST_INCLUDE_GATEWAY === "1";
|
|
const includeExtensionsSuite = process.env.OPENCLAW_TEST_INCLUDE_EXTENSIONS === "1";
|
|
const rawTestProfile = process.env.OPENCLAW_TEST_PROFILE?.trim().toLowerCase();
|
|
const testProfile =
|
|
rawTestProfile === "low" ||
|
|
rawTestProfile === "max" ||
|
|
rawTestProfile === "normal" ||
|
|
rawTestProfile === "serial"
|
|
? rawTestProfile
|
|
: "normal";
|
|
// Even on low-memory hosts, keep the isolated lane split so files like
|
|
// git-commit.test.ts still get the worker/process isolation they require.
|
|
const shouldSplitUnitRuns = testProfile !== "serial";
|
|
const runs = [
|
|
...(shouldSplitUnitRuns
|
|
? [
|
|
{
|
|
name: "unit-fast",
|
|
args: [
|
|
"vitest",
|
|
"run",
|
|
"--config",
|
|
"vitest.unit.config.ts",
|
|
`--pool=${useVmForks ? "vmForks" : "forks"}`,
|
|
...(disableIsolation ? ["--isolate=false"] : []),
|
|
...unitIsolatedFiles.flatMap((file) => ["--exclude", file]),
|
|
],
|
|
},
|
|
{
|
|
name: "unit-isolated",
|
|
args: [
|
|
"vitest",
|
|
"run",
|
|
"--config",
|
|
"vitest.unit.config.ts",
|
|
"--pool=forks",
|
|
...unitIsolatedFiles,
|
|
],
|
|
},
|
|
]
|
|
: [
|
|
{
|
|
name: "unit",
|
|
args: [
|
|
"vitest",
|
|
"run",
|
|
"--config",
|
|
"vitest.unit.config.ts",
|
|
`--pool=${useVmForks ? "vmForks" : "forks"}`,
|
|
...(disableIsolation ? ["--isolate=false"] : []),
|
|
],
|
|
},
|
|
]),
|
|
...(includeExtensionsSuite
|
|
? [
|
|
{
|
|
name: "extensions",
|
|
args: [
|
|
"vitest",
|
|
"run",
|
|
"--config",
|
|
"vitest.extensions.config.ts",
|
|
...(useVmForks ? ["--pool=vmForks"] : []),
|
|
],
|
|
},
|
|
]
|
|
: []),
|
|
...(includeGatewaySuite
|
|
? [
|
|
{
|
|
name: "gateway",
|
|
args: [
|
|
"vitest",
|
|
"run",
|
|
"--config",
|
|
"vitest.gateway.config.ts",
|
|
// Gateway tests are sensitive to vmForks behavior (global state + env stubs).
|
|
// Keep them on process forks for determinism even when other suites use vmForks.
|
|
"--pool=forks",
|
|
],
|
|
},
|
|
]
|
|
: []),
|
|
];
|
|
const shardOverride = Number.parseInt(process.env.OPENCLAW_TEST_SHARDS ?? "", 10);
|
|
const configuredShardCount =
|
|
Number.isFinite(shardOverride) && shardOverride > 1 ? shardOverride : null;
|
|
const shardCount = configuredShardCount ?? (isWindowsCi ? 2 : 1);
|
|
const shardIndexOverride = (() => {
|
|
const parsed = Number.parseInt(process.env.OPENCLAW_TEST_SHARD_INDEX ?? "", 10);
|
|
return Number.isFinite(parsed) && parsed > 0 ? parsed : null;
|
|
})();
|
|
const OPTION_TAKES_VALUE = new Set([
|
|
"-t",
|
|
"-c",
|
|
"-r",
|
|
"--testNamePattern",
|
|
"--config",
|
|
"--root",
|
|
"--dir",
|
|
"--reporter",
|
|
"--outputFile",
|
|
"--pool",
|
|
"--execArgv",
|
|
"--vmMemoryLimit",
|
|
"--maxWorkers",
|
|
"--environment",
|
|
"--shard",
|
|
"--changed",
|
|
"--sequence",
|
|
"--inspect",
|
|
"--inspectBrk",
|
|
"--testTimeout",
|
|
"--hookTimeout",
|
|
"--bail",
|
|
"--retry",
|
|
"--diff",
|
|
"--exclude",
|
|
"--project",
|
|
"--slowTestThreshold",
|
|
"--teardownTimeout",
|
|
"--attachmentsDir",
|
|
"--mode",
|
|
"--api",
|
|
"--browser",
|
|
"--maxConcurrency",
|
|
"--mergeReports",
|
|
"--configLoader",
|
|
"--experimental",
|
|
]);
|
|
const SINGLE_RUN_ONLY_FLAGS = new Set(["--coverage", "--outputFile", "--mergeReports"]);
|
|
|
|
if (shardIndexOverride !== null && shardCount <= 1) {
|
|
console.error(
|
|
`[test-parallel] OPENCLAW_TEST_SHARD_INDEX=${String(
|
|
shardIndexOverride,
|
|
)} requires OPENCLAW_TEST_SHARDS>1.`,
|
|
);
|
|
process.exit(2);
|
|
}
|
|
|
|
if (shardIndexOverride !== null && shardIndexOverride > shardCount) {
|
|
console.error(
|
|
`[test-parallel] OPENCLAW_TEST_SHARD_INDEX=${String(
|
|
shardIndexOverride,
|
|
)} exceeds OPENCLAW_TEST_SHARDS=${String(shardCount)}.`,
|
|
);
|
|
process.exit(2);
|
|
}
|
|
const windowsCiArgs = isWindowsCi ? ["--dangerouslyIgnoreUnhandledErrors"] : [];
|
|
const silentArgs =
|
|
process.env.OPENCLAW_TEST_SHOW_PASSED_LOGS === "1" ? [] : ["--silent=passed-only"];
|
|
const rawPassthroughArgs = process.argv.slice(2);
|
|
const passthroughArgs =
|
|
rawPassthroughArgs[0] === "--" ? rawPassthroughArgs.slice(1) : rawPassthroughArgs;
|
|
const parsePassthroughArgs = (args) => {
|
|
const fileFilters = [];
|
|
const optionArgs = [];
|
|
let consumeNextAsOptionValue = false;
|
|
|
|
for (const arg of args) {
|
|
if (consumeNextAsOptionValue) {
|
|
optionArgs.push(arg);
|
|
consumeNextAsOptionValue = false;
|
|
continue;
|
|
}
|
|
if (arg === "--") {
|
|
optionArgs.push(arg);
|
|
continue;
|
|
}
|
|
if (arg.startsWith("-")) {
|
|
optionArgs.push(arg);
|
|
consumeNextAsOptionValue = !arg.includes("=") && OPTION_TAKES_VALUE.has(arg);
|
|
continue;
|
|
}
|
|
fileFilters.push(arg);
|
|
}
|
|
|
|
return { fileFilters, optionArgs };
|
|
};
|
|
const { fileFilters: passthroughFileFilters, optionArgs: passthroughOptionArgs } =
|
|
parsePassthroughArgs(passthroughArgs);
|
|
const passthroughRequiresSingleRun = passthroughOptionArgs.some((arg) => {
|
|
if (!arg.startsWith("-")) {
|
|
return false;
|
|
}
|
|
const [flag] = arg.split("=", 1);
|
|
return SINGLE_RUN_ONLY_FLAGS.has(flag);
|
|
});
|
|
const channelPrefixes = ["src/telegram/", "src/discord/", "src/web/", "src/browser/", "src/line/"];
|
|
const baseConfigPrefixes = ["src/agents/", "src/auto-reply/", "src/commands/", "test/", "ui/"];
|
|
const normalizeRepoPath = (value) => value.split(path.sep).join("/");
|
|
const walkTestFiles = (rootDir) => {
|
|
if (!fs.existsSync(rootDir)) {
|
|
return [];
|
|
}
|
|
const entries = fs.readdirSync(rootDir, { withFileTypes: true });
|
|
const files = [];
|
|
for (const entry of entries) {
|
|
const fullPath = path.join(rootDir, entry.name);
|
|
if (entry.isDirectory()) {
|
|
files.push(...walkTestFiles(fullPath));
|
|
continue;
|
|
}
|
|
if (!entry.isFile()) {
|
|
continue;
|
|
}
|
|
if (
|
|
fullPath.endsWith(".test.ts") ||
|
|
fullPath.endsWith(".live.test.ts") ||
|
|
fullPath.endsWith(".e2e.test.ts")
|
|
) {
|
|
files.push(normalizeRepoPath(fullPath));
|
|
}
|
|
}
|
|
return files;
|
|
};
|
|
const allKnownTestFiles = [
|
|
...new Set([
|
|
...walkTestFiles("src"),
|
|
...walkTestFiles("extensions"),
|
|
...walkTestFiles("test"),
|
|
...walkTestFiles(path.join("ui", "src", "ui")),
|
|
]),
|
|
];
|
|
const inferTarget = (fileFilter) => {
|
|
const isolated = unitIsolatedFiles.includes(fileFilter);
|
|
if (fileFilter.endsWith(".live.test.ts")) {
|
|
return { owner: "live", isolated };
|
|
}
|
|
if (fileFilter.endsWith(".e2e.test.ts")) {
|
|
return { owner: "e2e", isolated };
|
|
}
|
|
if (fileFilter.startsWith("extensions/")) {
|
|
return { owner: "extensions", isolated };
|
|
}
|
|
if (fileFilter.startsWith("src/gateway/")) {
|
|
return { owner: "gateway", isolated };
|
|
}
|
|
if (channelPrefixes.some((prefix) => fileFilter.startsWith(prefix))) {
|
|
return { owner: "channels", isolated };
|
|
}
|
|
if (baseConfigPrefixes.some((prefix) => fileFilter.startsWith(prefix))) {
|
|
return { owner: "base", isolated };
|
|
}
|
|
if (fileFilter.startsWith("src/")) {
|
|
return { owner: "unit", isolated };
|
|
}
|
|
return { owner: "base", isolated };
|
|
};
|
|
const resolveFilterMatches = (fileFilter) => {
|
|
const normalizedFilter = normalizeRepoPath(fileFilter);
|
|
if (fs.existsSync(fileFilter)) {
|
|
const stats = fs.statSync(fileFilter);
|
|
if (stats.isFile()) {
|
|
return [normalizedFilter];
|
|
}
|
|
if (stats.isDirectory()) {
|
|
const prefix = normalizedFilter.endsWith("/") ? normalizedFilter : `${normalizedFilter}/`;
|
|
return allKnownTestFiles.filter((file) => file.startsWith(prefix));
|
|
}
|
|
}
|
|
if (/[*?[\]{}]/.test(normalizedFilter)) {
|
|
return allKnownTestFiles.filter((file) => path.matchesGlob(file, normalizedFilter));
|
|
}
|
|
return allKnownTestFiles.filter((file) => file.includes(normalizedFilter));
|
|
};
|
|
const createTargetedEntry = (owner, isolated, filters) => {
|
|
const name = isolated ? `${owner}-isolated` : owner;
|
|
const forceForks = isolated;
|
|
if (owner === "unit") {
|
|
return {
|
|
name,
|
|
args: [
|
|
"vitest",
|
|
"run",
|
|
"--config",
|
|
"vitest.unit.config.ts",
|
|
`--pool=${forceForks ? "forks" : useVmForks ? "vmForks" : "forks"}`,
|
|
...(disableIsolation ? ["--isolate=false"] : []),
|
|
...filters,
|
|
],
|
|
};
|
|
}
|
|
if (owner === "extensions") {
|
|
return {
|
|
name,
|
|
args: [
|
|
"vitest",
|
|
"run",
|
|
"--config",
|
|
"vitest.extensions.config.ts",
|
|
...(forceForks ? ["--pool=forks"] : useVmForks ? ["--pool=vmForks"] : []),
|
|
...filters,
|
|
],
|
|
};
|
|
}
|
|
if (owner === "gateway") {
|
|
return {
|
|
name,
|
|
args: ["vitest", "run", "--config", "vitest.gateway.config.ts", "--pool=forks", ...filters],
|
|
};
|
|
}
|
|
if (owner === "channels") {
|
|
return {
|
|
name,
|
|
args: [
|
|
"vitest",
|
|
"run",
|
|
"--config",
|
|
"vitest.channels.config.ts",
|
|
...(forceForks ? ["--pool=forks"] : []),
|
|
...filters,
|
|
],
|
|
};
|
|
}
|
|
if (owner === "live") {
|
|
return {
|
|
name,
|
|
args: ["vitest", "run", "--config", "vitest.live.config.ts", ...filters],
|
|
};
|
|
}
|
|
if (owner === "e2e") {
|
|
return {
|
|
name,
|
|
args: ["vitest", "run", "--config", "vitest.e2e.config.ts", ...filters],
|
|
};
|
|
}
|
|
return {
|
|
name,
|
|
args: [
|
|
"vitest",
|
|
"run",
|
|
"--config",
|
|
"vitest.config.ts",
|
|
...(forceForks ? ["--pool=forks"] : []),
|
|
...filters,
|
|
],
|
|
};
|
|
};
|
|
const targetedEntries = (() => {
|
|
if (passthroughFileFilters.length === 0) {
|
|
return [];
|
|
}
|
|
const groups = passthroughFileFilters.reduce((acc, fileFilter) => {
|
|
const matchedFiles = resolveFilterMatches(fileFilter);
|
|
if (matchedFiles.length === 0) {
|
|
const target = inferTarget(normalizeRepoPath(fileFilter));
|
|
const key = `${target.owner}:${target.isolated ? "isolated" : "default"}`;
|
|
const files = acc.get(key) ?? [];
|
|
files.push(normalizeRepoPath(fileFilter));
|
|
acc.set(key, files);
|
|
return acc;
|
|
}
|
|
for (const matchedFile of matchedFiles) {
|
|
const target = inferTarget(matchedFile);
|
|
const key = `${target.owner}:${target.isolated ? "isolated" : "default"}`;
|
|
const files = acc.get(key) ?? [];
|
|
files.push(matchedFile);
|
|
acc.set(key, files);
|
|
}
|
|
return acc;
|
|
}, new Map());
|
|
return Array.from(groups, ([key, filters]) => {
|
|
const [owner, mode] = key.split(":");
|
|
return createTargetedEntry(owner, mode === "isolated", [...new Set(filters)]);
|
|
});
|
|
})();
|
|
const topLevelParallelEnabled = testProfile !== "low" && testProfile !== "serial";
|
|
const overrideWorkers = Number.parseInt(process.env.OPENCLAW_TEST_WORKERS ?? "", 10);
|
|
const resolvedOverride =
|
|
Number.isFinite(overrideWorkers) && overrideWorkers > 0 ? overrideWorkers : null;
|
|
const parallelGatewayEnabled =
|
|
process.env.OPENCLAW_TEST_PARALLEL_GATEWAY === "1" || (!isCI && highMemLocalHost);
|
|
// Keep gateway serial by default except when explicitly requested or on high-memory local hosts.
|
|
const keepGatewaySerial =
|
|
isWindowsCi ||
|
|
process.env.OPENCLAW_TEST_SERIAL_GATEWAY === "1" ||
|
|
testProfile === "serial" ||
|
|
!parallelGatewayEnabled;
|
|
const parallelRuns = keepGatewaySerial ? runs.filter((entry) => entry.name !== "gateway") : runs;
|
|
const serialRuns = keepGatewaySerial ? runs.filter((entry) => entry.name === "gateway") : [];
|
|
const baseLocalWorkers = Math.max(4, Math.min(16, hostCpuCount));
|
|
const loadAwareDisabledRaw = process.env.OPENCLAW_TEST_LOAD_AWARE?.trim().toLowerCase();
|
|
const loadAwareDisabled = loadAwareDisabledRaw === "0" || loadAwareDisabledRaw === "false";
|
|
const loadRatio =
|
|
!isCI && !loadAwareDisabled && process.platform !== "win32" && hostCpuCount > 0
|
|
? os.loadavg()[0] / hostCpuCount
|
|
: 0;
|
|
// Keep the fast-path unchanged on normal load; only throttle under extreme host pressure.
|
|
const extremeLoadScale = loadRatio >= 1.1 ? 0.75 : loadRatio >= 1 ? 0.85 : 1;
|
|
const localWorkers = Math.max(4, Math.min(16, Math.floor(baseLocalWorkers * extremeLoadScale)));
|
|
const defaultWorkerBudget =
|
|
testProfile === "low"
|
|
? {
|
|
unit: 2,
|
|
unitIsolated: 1,
|
|
extensions: 4,
|
|
gateway: 1,
|
|
}
|
|
: testProfile === "serial"
|
|
? {
|
|
unit: 1,
|
|
unitIsolated: 1,
|
|
extensions: 1,
|
|
gateway: 1,
|
|
}
|
|
: testProfile === "max"
|
|
? {
|
|
unit: localWorkers,
|
|
unitIsolated: Math.min(4, localWorkers),
|
|
extensions: Math.max(1, Math.min(6, Math.floor(localWorkers / 2))),
|
|
gateway: Math.max(1, Math.min(2, Math.floor(localWorkers / 4))),
|
|
}
|
|
: highMemLocalHost
|
|
? {
|
|
// High-memory local hosts can prioritize wall-clock speed.
|
|
unit: Math.max(4, Math.min(14, Math.floor((localWorkers * 7) / 8))),
|
|
unitIsolated: Math.max(1, Math.min(2, Math.floor(localWorkers / 6) || 1)),
|
|
extensions: Math.max(1, Math.min(4, Math.floor(localWorkers / 4))),
|
|
gateway: Math.max(2, Math.min(6, Math.floor(localWorkers / 2))),
|
|
}
|
|
: lowMemLocalHost
|
|
? {
|
|
// Sub-64 GiB local hosts are prone to OOM with large vmFork runs.
|
|
unit: 2,
|
|
unitIsolated: 1,
|
|
extensions: 4,
|
|
gateway: 1,
|
|
}
|
|
: {
|
|
// 64-95 GiB local hosts: conservative split with some parallel headroom.
|
|
unit: Math.max(2, Math.min(8, Math.floor(localWorkers / 2))),
|
|
unitIsolated: 1,
|
|
extensions: Math.max(1, Math.min(4, Math.floor(localWorkers / 4))),
|
|
gateway: 1,
|
|
};
|
|
|
|
// Keep worker counts predictable for local runs; trim macOS CI workers to avoid worker crashes/OOM.
|
|
// In CI on linux/windows, prefer Vitest defaults to avoid cross-test interference from lower worker counts.
|
|
const maxWorkersForRun = (name) => {
|
|
if (resolvedOverride) {
|
|
return resolvedOverride;
|
|
}
|
|
if (isCI && !isMacOS) {
|
|
return null;
|
|
}
|
|
if (isCI && isMacOS) {
|
|
return 1;
|
|
}
|
|
if (name === "unit-isolated" || name.endsWith("-isolated")) {
|
|
return defaultWorkerBudget.unitIsolated;
|
|
}
|
|
if (name === "extensions") {
|
|
return defaultWorkerBudget.extensions;
|
|
}
|
|
if (name === "gateway") {
|
|
return defaultWorkerBudget.gateway;
|
|
}
|
|
return defaultWorkerBudget.unit;
|
|
};
|
|
|
|
const WARNING_SUPPRESSION_FLAGS = [
|
|
"--disable-warning=ExperimentalWarning",
|
|
"--disable-warning=DEP0040",
|
|
"--disable-warning=DEP0060",
|
|
"--disable-warning=MaxListenersExceededWarning",
|
|
];
|
|
|
|
const DEFAULT_CI_MAX_OLD_SPACE_SIZE_MB = 4096;
|
|
const maxOldSpaceSizeMb = (() => {
|
|
// CI can hit Node heap limits (especially on large suites). Allow override, default to 4GB.
|
|
const raw = process.env.OPENCLAW_TEST_MAX_OLD_SPACE_SIZE_MB ?? "";
|
|
const parsed = Number.parseInt(raw, 10);
|
|
if (Number.isFinite(parsed) && parsed > 0) {
|
|
return parsed;
|
|
}
|
|
if (isCI && !isWindows) {
|
|
return DEFAULT_CI_MAX_OLD_SPACE_SIZE_MB;
|
|
}
|
|
return null;
|
|
})();
|
|
|
|
const runOnce = (entry, extraArgs = []) =>
|
|
new Promise((resolve) => {
|
|
const maxWorkers = maxWorkersForRun(entry.name);
|
|
// vmForks with a single worker has shown cross-file leakage in extension suites.
|
|
// Fall back to process forks when we intentionally clamp that lane to one worker.
|
|
const entryArgs =
|
|
entry.name === "extensions" && maxWorkers === 1 && entry.args.includes("--pool=vmForks")
|
|
? entry.args.map((arg) => (arg === "--pool=vmForks" ? "--pool=forks" : arg))
|
|
: entry.args;
|
|
const args = maxWorkers
|
|
? [
|
|
...entryArgs,
|
|
"--maxWorkers",
|
|
String(maxWorkers),
|
|
...silentArgs,
|
|
...windowsCiArgs,
|
|
...extraArgs,
|
|
]
|
|
: [...entryArgs, ...silentArgs, ...windowsCiArgs, ...extraArgs];
|
|
const nodeOptions = process.env.NODE_OPTIONS ?? "";
|
|
const nextNodeOptions = WARNING_SUPPRESSION_FLAGS.reduce(
|
|
(acc, flag) => (acc.includes(flag) ? acc : `${acc} ${flag}`.trim()),
|
|
nodeOptions,
|
|
);
|
|
const heapFlag =
|
|
maxOldSpaceSizeMb && !nextNodeOptions.includes("--max-old-space-size=")
|
|
? `--max-old-space-size=${maxOldSpaceSizeMb}`
|
|
: null;
|
|
const resolvedNodeOptions = heapFlag
|
|
? `${nextNodeOptions} ${heapFlag}`.trim()
|
|
: nextNodeOptions;
|
|
let child;
|
|
try {
|
|
child = spawn(pnpm, args, {
|
|
stdio: "inherit",
|
|
env: { ...process.env, VITEST_GROUP: entry.name, NODE_OPTIONS: resolvedNodeOptions },
|
|
shell: isWindows,
|
|
});
|
|
} catch (err) {
|
|
console.error(`[test-parallel] spawn failed: ${String(err)}`);
|
|
resolve(1);
|
|
return;
|
|
}
|
|
children.add(child);
|
|
child.on("error", (err) => {
|
|
console.error(`[test-parallel] child error: ${String(err)}`);
|
|
});
|
|
child.on("exit", (code, signal) => {
|
|
children.delete(child);
|
|
resolve(code ?? (signal ? 1 : 0));
|
|
});
|
|
});
|
|
|
|
const run = async (entry, extraArgs = []) => {
|
|
if (shardCount <= 1) {
|
|
return runOnce(entry, extraArgs);
|
|
}
|
|
if (shardIndexOverride !== null) {
|
|
return runOnce(entry, ["--shard", `${shardIndexOverride}/${shardCount}`, ...extraArgs]);
|
|
}
|
|
for (let shardIndex = 1; shardIndex <= shardCount; shardIndex += 1) {
|
|
// eslint-disable-next-line no-await-in-loop
|
|
const code = await runOnce(entry, ["--shard", `${shardIndex}/${shardCount}`, ...extraArgs]);
|
|
if (code !== 0) {
|
|
return code;
|
|
}
|
|
}
|
|
return 0;
|
|
};
|
|
|
|
const runEntries = async (entries, extraArgs = []) => {
|
|
if (topLevelParallelEnabled) {
|
|
const codes = await Promise.all(entries.map((entry) => run(entry, extraArgs)));
|
|
return codes.find((code) => code !== 0);
|
|
}
|
|
|
|
for (const entry of entries) {
|
|
// eslint-disable-next-line no-await-in-loop
|
|
const code = await run(entry, extraArgs);
|
|
if (code !== 0) {
|
|
return code;
|
|
}
|
|
}
|
|
|
|
return undefined;
|
|
};
|
|
|
|
const shutdown = (signal) => {
|
|
for (const child of children) {
|
|
child.kill(signal);
|
|
}
|
|
};
|
|
|
|
process.on("SIGINT", () => shutdown("SIGINT"));
|
|
process.on("SIGTERM", () => shutdown("SIGTERM"));
|
|
|
|
if (targetedEntries.length > 0) {
|
|
if (passthroughRequiresSingleRun && targetedEntries.length > 1) {
|
|
console.error(
|
|
"[test-parallel] The provided Vitest args require a single run, but the selected test filters span multiple wrapper configs. Run one target/config at a time.",
|
|
);
|
|
process.exit(2);
|
|
}
|
|
const targetedParallelRuns = keepGatewaySerial
|
|
? targetedEntries.filter((entry) => entry.name !== "gateway")
|
|
: targetedEntries;
|
|
const targetedSerialRuns = keepGatewaySerial
|
|
? targetedEntries.filter((entry) => entry.name === "gateway")
|
|
: [];
|
|
const failedTargetedParallel = await runEntries(targetedParallelRuns, passthroughOptionArgs);
|
|
if (failedTargetedParallel !== undefined) {
|
|
process.exit(failedTargetedParallel);
|
|
}
|
|
for (const entry of targetedSerialRuns) {
|
|
// eslint-disable-next-line no-await-in-loop
|
|
const code = await run(entry, passthroughOptionArgs);
|
|
if (code !== 0) {
|
|
process.exit(code);
|
|
}
|
|
}
|
|
process.exit(0);
|
|
}
|
|
|
|
if (passthroughRequiresSingleRun && passthroughOptionArgs.length > 0) {
|
|
console.error(
|
|
"[test-parallel] The provided Vitest args require a single run. Use the dedicated npm script for that workflow (for example `pnpm test:coverage`) or target a single test file/filter.",
|
|
);
|
|
process.exit(2);
|
|
}
|
|
|
|
const failedParallel = await runEntries(parallelRuns, passthroughOptionArgs);
|
|
if (failedParallel !== undefined) {
|
|
process.exit(failedParallel);
|
|
}
|
|
|
|
for (const entry of serialRuns) {
|
|
// eslint-disable-next-line no-await-in-loop
|
|
const code = await run(entry, passthroughOptionArgs);
|
|
if (code !== 0) {
|
|
process.exit(code);
|
|
}
|
|
}
|
|
|
|
process.exit(0);
|