mirror of
https://github.com/openclaw/openclaw.git
synced 2026-05-20 15:54:45 +00:00
* refactor: remove stale file-backed shims * fix: harden sqlite state ci boundaries * refactor: store matrix idb snapshots in sqlite * fix: satisfy rebased CI guardrails * refactor: store current conversation bindings in sqlite table * refactor: store tui last sessions in sqlite table * refactor: reset sqlite schema history * refactor: drop unshipped sqlite table migration * refactor: remove plugin index file rollback * refactor: drop unshipped sqlite sidecar migrations * refactor: remove runtime commitments kv migration * refactor: preserve kysely sync result types * refactor: drop unshipped sqlite schema migration table * test: keep session usage coverage sqlite-backed * refactor: keep sqlite migration doctor-only * refactor: isolate device legacy imports * refactor: isolate push voicewake legacy imports * refactor: isolate remaining runtime legacy imports * refactor: tighten sqlite migration guardrails * test: cover sqlite persisted enum parsing * refactor: isolate legacy update and tui imports * refactor: tighten sqlite state ownership * refactor: move legacy imports behind doctor * refactor: remove legacy session row lookup * refactor: canonicalize memory transcript locators * refactor: drop transcript path scope fallbacks * refactor: drop runtime legacy session delivery pruning * refactor: store tts prefs only in sqlite * refactor: remove cron store path runtime * refactor: use cron sqlite store keys * refactor: rename telegram message cache scope * refactor: read memory dreaming status from sqlite * refactor: rename cron status store key * refactor: stop remembering transcript file paths * test: use sqlite locators in agent fixtures * refactor: remove file-shaped commitments and cron store surfaces * refactor: keep compaction transcript handles out of session rows * refactor: derive transcript handles from session identity * refactor: derive runtime transcript handles * refactor: remove gateway session locator reads * refactor: remove transcript locator from session rows * refactor: store raw stream diagnostics in sqlite * refactor: remove file-shaped transcript rotation * refactor: hide legacy trajectory paths from runtime * refactor: remove runtime transcript file bridges * refactor: repair database-first rebase fallout * refactor: align tests with database-first state * refactor: remove transcript file handoffs * refactor: sync post-compaction memory by transcript scope * refactor: run codex app-server sessions by id * refactor: bind codex runtime state by session id * refactor: pass memory transcripts by sqlite scope * refactor: remove transcript locator cleanup leftovers * test: remove stale transcript file fixtures * refactor: remove transcript locator test helper * test: make cron sqlite keys explicit * test: remove cron runtime store paths * test: remove stale session file fixtures * test: use sqlite cron keys in diagnostics * refactor: remove runtime delivery queue backfill * test: drop fake export session file mocks * refactor: rename acp session read failure flag * refactor: rename acp row session key * refactor: remove session store test seams * refactor: move legacy session parser tests to doctor * refactor: reindex managed memory in place * refactor: drop stale session store wording * refactor: rename session row helpers * refactor: rename sqlite session entry modules * refactor: remove transcript locator leftovers * refactor: trim file-era audit wording * refactor: clean managed media through sqlite * fix: prefer explicit agent for exports * fix: use prepared agent for session resets * fix: canonicalize legacy codex binding import * test: rename state cleanup helper * docs: align backup docs with sqlite state * refactor: drop legacy Pi usage auth fallback * refactor: move legacy auth profile imports to doctor * refactor: keep Pi model discovery auth in memory * refactor: remove MSTeams legacy learning key fallback * refactor: store model catalog config in sqlite * refactor: use sqlite model catalog at runtime * refactor: remove model json compatibility aliases * refactor: store auth profiles in sqlite * refactor: seed copied auth profiles in sqlite * refactor: make auth profile runtime sqlite-addressed * refactor: migrate hermes secrets into sqlite auth store * refactor: move plugin install config migration to doctor * refactor: rename plugin index audit checks * test: drop auth file assumptions * test: remove legacy transcript file assertions * refactor: drop legacy cli session aliases * refactor: store skill uploads in sqlite * refactor: keep subagent attachments in sqlite vfs * refactor: drop subagent attachment cleanup state * refactor: move legacy session aliases to doctor * refactor: require node 24 for sqlite state runtime * refactor: move provider caches into sqlite state * fix: harden virtual agent filesystem * refactor: enforce database-first runtime state * refactor: rename compaction transcript rotation setting * test: clean sqlite refactor test types * refactor: consolidate sqlite runtime state * refactor: model session conversations in sqlite * refactor: stop deriving cron delivery from session keys * refactor: stop classifying sessions from key shape * refactor: hydrate announce targets from typed delivery * refactor: route heartbeat delivery from typed sqlite context * refactor: tighten typed sqlite session routing * refactor: remove session origin routing shadow * refactor: drop session origin shadow fixtures * perf: query sqlite vfs paths by prefix * refactor: use typed conversation metadata for sessions * refactor: prefer typed session routing metadata * refactor: require typed session routing metadata * refactor: resolve group tool policy from typed sessions * refactor: delete dead session thread info bridge * Show Codex subscription reset times in channel errors (#80456) * feat(plugin-sdk): consolidate session workflow APIs * fix(agents): allow read-only agent mount reads * [codex] refresh plugin regression fixtures * fix(agents): restore compaction gateway logs * test: tighten gateway startup assertions * Redact persisted secret-shaped payloads [AI] (#79006) * test: tighten device pair notify assertions * test: tighten hermes secret assertions * test: assert matrix client error shapes * test: assert config compat warnings * fix(heartbeat): remap cron-run exec events to session keys (#80214) * fix(codex): route btw through native side threads * fix(auth): accept friendly OpenAI order for Codex profiles * fix(codex): rotate auth profiles inside harness * fix: keep browser status page probe within timeout * test: assert agents add outputs * test: pin cron read status * fix(agents): avoid Pi resource discovery stalls Co-authored-by: dataCenter430 <titan032000@gmail.com> * fix: retire timed-out codex app-server clients * test: tighten qa lab runtime assertions * test: check security fix outputs * test: verify extension runtime messages * feat(wake): expose typed sessionKey on wake protocol + system event CLI * fix(gateway): await session_end during shutdown drain and track channel + compaction lifecycle paths (#57790) * test: guard talk consult call helper * fix(codex): scale context engine projection (#80761) * fix(codex): scale context engine projection * fix: document Codex context projection scaling * fix: document Codex context projection scaling * fix: document Codex context projection scaling * fix: document Codex context projection scaling * chore: align Codex projection changelog * chore: realign Codex projection changelog * fix: isolate Codex projection patch --------- Co-authored-by: Eva (agent) <eva+agent-78055@100yen.org> Co-authored-by: Josh Lehman <josh@martian.engineering> * refactor: move agent runtime state toward piless * refactor: remove cron session reaper * refactor: move session management to sqlite * refactor: finish database-first state migration * chore: refresh generated sqlite db types * refactor: remove stale file-backed shims * test: harden kysely type coverage # Conflicts: # .agents/skills/kysely-database-access/SKILL.md # src/infra/kysely-sync.types.test.ts # src/proxy-capture/store.sqlite.test.ts # src/state/openclaw-agent-db.test.ts # src/state/openclaw-state-db.test.ts * refactor: remove cron store path runtime * refactor: keep compaction transcript handles out of session rows * refactor: derive embedded transcripts from sqlite identity * refactor: remove embedded transcript locator handoff * refactor: remove runtime transcript file bridges * refactor: remove transcript file handoffs * refactor: remove MSTeams legacy learning key fallback * refactor: store model catalog config in sqlite * refactor: use sqlite model catalog at runtime # Conflicts: # docs/cli/secrets.md # docs/gateway/authentication.md # docs/gateway/secrets.md * fix: keep oauth sibling sync sqlite-local # Conflicts: # src/commands/onboard-auth.test.ts * refactor: remove task session store maintenance # Conflicts: # src/commands/tasks.ts * refactor: keep diagnostics in state sqlite * refactor: enforce database-first runtime state * refactor: consolidate sqlite runtime state * Show Codex subscription reset times in channel errors (#80456) * fix(codex): refresh subscription limit resets * fix(codex): format reset times for channels * Update CHANGELOG with latest changes and fixes Updated CHANGELOG with recent fixes and improvements. * fix(codex): keep command load failures on codex surface * fix(codex): format account rate limits as rows * fix(codex): summarize account limits as usage status * fix(codex): simplify account limit status * test: tighten subagent announce queue assertion * test: tighten session delete lifecycle assertions * test: tighten cron ops assertions * fix: track cron execution milestones * test: tighten hermes secret assertions * test: assert matrix sync store payloads * test: assert config compat warnings * fix(codex): align btw side thread semantics * fix(codex): honor codex fallback blocking * fix(agents): avoid Pi resource discovery stalls * test: tighten codex event assertions * test: tighten cron assertions * Fix Codex app-server OAuth harness auth * refactor: move agent runtime state toward piless * refactor: move device and push state to sqlite * refactor: move runtime json state imports to doctor * refactor: finish database-first state migration * chore: refresh generated sqlite db types * refactor: clarify cron sqlite store keys * refactor: remove stale file-backed shims * refactor: bind codex runtime state by session id * test: expect sqlite trajectory branch export * refactor: rename session row helpers * fix: keep legacy device identity import in doctor * refactor: enforce database-first runtime state * refactor: consolidate sqlite runtime state * build: align pi contract wrappers * chore: repair database-first rebase * refactor: remove session file test contracts * test: update gateway session expectations * refactor: stop routing from session compatibility shadows * refactor: stop persisting session route shadows * refactor: use typed delivery context in clients * refactor: stop echoing session route shadows * refactor: repair embedded runner rebase imports # Conflicts: # src/agents/pi-embedded-runner/run/attempt.tool-call-argument-repair.ts * refactor: align pi contract imports * refactor: satisfy kysely sync helper guard * refactor: remove file transcript bridge remnants * refactor: remove session locator compatibility * refactor: remove session file test contracts * refactor: keep rebase database-first clean * refactor: remove session file assumptions from e2e * docs: clarify database-first goal state * test: remove legacy store markers from sqlite runtime tests * refactor: remove legacy store assumptions from runtime seams * refactor: align sqlite runtime helper seams * test: update memory recall sqlite audit mock * refactor: align database-first runtime type seams * test: clarify doctor cron legacy store names * fix: preserve sqlite session route projections * test: fix copilot token cache test syntax * docs: update database-first proof status * test: align database-first test fixtures * docs: update database-first proof status * refactor: clean extension database-first drift * test: align agent session route proof * test: clarify doctor legacy path fixtures * chore: clean database-first changed checks * chore: repair database-first rebase markers * build: allow baileys git subdependency * chore: repair exp-vfs rebase drift * chore: finish exp-vfs rebase cleanup * chore: satisfy rebase lint drift * chore: fix qqbot rebase type seam * chore: fix rebase drift leftovers * fix: keep auth profile oauth secrets out of sqlite * fix: repair rebase drift tests * test: stabilize pairing request ordering * test: use source manifests in plugin contract checks * fix: restore gateway session metadata after rebase * fix: repair database-first rebase drift * fix: clean up database-first rebase fallout * test: stabilize line quick reply receipt time * fix: repair extension rebase drift * test: keep transcript redaction tests sqlite-backed * fix: carry injected transcript redaction through sqlite * chore: clean database branch rebase residue * fix: repair database branch CI drift * fix: repair database branch CI guard drift * fix: stabilize oauth tls preflight test * test: align database branch fast guards * test: repair build artifact boundary guards * chore: clean changelog rebase markers --------- Co-authored-by: pashpashpash <nik@vault77.ai> Co-authored-by: Eva <eva@100yen.org> Co-authored-by: stainlu <stainlu@newtype-ai.org> Co-authored-by: Jason Zhou <jason.zhou.design@gmail.com> Co-authored-by: Ruben Cuevas <hi@rubencu.com> Co-authored-by: Pavan Kumar Gondhi <pavangondhi@gmail.com> Co-authored-by: Shakker <shakkerdroid@gmail.com> Co-authored-by: Kaspre <36520309+Kaspre@users.noreply.github.com> Co-authored-by: dataCenter430 <titan032000@gmail.com> Co-authored-by: Kaspre <kaspre@gmail.com> Co-authored-by: pandadev66 <nova.full.stack@outlook.com> Co-authored-by: Eva <admin@100yen.org> Co-authored-by: Eva (agent) <eva+agent-78055@100yen.org> Co-authored-by: Josh Lehman <josh@martian.engineering> Co-authored-by: jeffjhunter <support@aipersonamethod.com>
456 lines
16 KiB
JavaScript
456 lines
16 KiB
JavaScript
import fs from "node:fs";
|
|
import path from "node:path";
|
|
import { DatabaseSync } from "node:sqlite";
|
|
import { readInstalledPluginRecords } from "../installed-plugin-index.mjs";
|
|
|
|
const command = process.argv[2];
|
|
const readJson = (file) => JSON.parse(fs.readFileSync(file, "utf8"));
|
|
const allowBetaCompatDiagnostics =
|
|
process.env.OPENCLAW_CODEX_NPM_PLUGIN_ALLOW_BETA_COMPAT_DIAGNOSTICS === "1";
|
|
|
|
function stateDir() {
|
|
return process.env.OPENCLAW_STATE_DIR || path.join(process.env.HOME, ".openclaw");
|
|
}
|
|
|
|
function stateDatabasePath() {
|
|
return path.join(stateDir(), "state", "openclaw.sqlite");
|
|
}
|
|
|
|
function agentDatabasePath(agentId = "main") {
|
|
return path.join(stateDir(), "agents", agentId, "agent", "openclaw-agent.sqlite");
|
|
}
|
|
|
|
function configPath() {
|
|
return process.env.OPENCLAW_CONFIG_PATH || path.join(stateDir(), "openclaw.json");
|
|
}
|
|
|
|
function withSqliteDatabase(dbPath, callback) {
|
|
if (!fs.existsSync(dbPath)) {
|
|
throw new Error(`missing SQLite database: ${dbPath}`);
|
|
}
|
|
const db = new DatabaseSync(dbPath, { readOnly: true });
|
|
try {
|
|
return callback(db);
|
|
} finally {
|
|
db.close();
|
|
}
|
|
}
|
|
|
|
function readAgentSessionEntryBySessionId(sessionId) {
|
|
return withSqliteDatabase(agentDatabasePath("main"), (db) => {
|
|
const rows = db.prepare("SELECT session_key, entry_json FROM session_entries").all();
|
|
for (const row of rows) {
|
|
const entry = JSON.parse(row.entry_json);
|
|
if (entry?.sessionId === sessionId) {
|
|
return { sessionKey: row.session_key, ...entry };
|
|
}
|
|
}
|
|
return undefined;
|
|
});
|
|
}
|
|
|
|
function countAgentTranscriptEvents(sessionId) {
|
|
return withSqliteDatabase(agentDatabasePath("main"), (db) => {
|
|
const row = db
|
|
.prepare("SELECT count(*) AS count FROM transcript_events WHERE session_id = ?")
|
|
.get(sessionId);
|
|
return Number(row?.count ?? 0);
|
|
});
|
|
}
|
|
|
|
function readPluginStateJson(pluginId, namespace, key) {
|
|
return withSqliteDatabase(stateDatabasePath(), (db) => {
|
|
const row = db
|
|
.prepare(
|
|
"SELECT value_json FROM plugin_state_entries WHERE plugin_id = ? AND namespace = ? AND entry_key = ?",
|
|
)
|
|
.get(pluginId, namespace, key);
|
|
return typeof row?.value_json === "string" ? JSON.parse(row.value_json) : undefined;
|
|
});
|
|
}
|
|
|
|
function realPathMaybe(filePath) {
|
|
try {
|
|
return fs.realpathSync(filePath);
|
|
} catch {
|
|
return path.resolve(filePath);
|
|
}
|
|
}
|
|
|
|
function assertPathInside(parentPath, childPath, label) {
|
|
const parent = realPathMaybe(parentPath);
|
|
const child = realPathMaybe(childPath);
|
|
const relative = path.relative(parent, child);
|
|
if (relative.startsWith("..") || path.isAbsolute(relative)) {
|
|
throw new Error(`${label} resolved outside ${parentPath}: ${child}`);
|
|
}
|
|
}
|
|
|
|
function configure() {
|
|
const modelRef = process.argv[3] || "codex/gpt-5.4";
|
|
const state = stateDir();
|
|
const cfgPath = configPath();
|
|
const cfg = fs.existsSync(cfgPath) ? readJson(cfgPath) : {};
|
|
cfg.plugins = {
|
|
...cfg.plugins,
|
|
enabled: true,
|
|
allow: Array.from(new Set([...(cfg.plugins?.allow || []), "codex"])).toSorted((left, right) =>
|
|
left.localeCompare(right),
|
|
),
|
|
entries: {
|
|
...cfg.plugins?.entries,
|
|
codex: {
|
|
...cfg.plugins?.entries?.codex,
|
|
enabled: true,
|
|
config: {
|
|
...cfg.plugins?.entries?.codex?.config,
|
|
discovery: { enabled: false },
|
|
appServer: {
|
|
...cfg.plugins?.entries?.codex?.config?.appServer,
|
|
mode: "yolo",
|
|
approvalPolicy: "never",
|
|
sandbox: "danger-full-access",
|
|
requestTimeoutMs: 420_000,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
};
|
|
cfg.agents = {
|
|
...cfg.agents,
|
|
defaults: {
|
|
...cfg.agents?.defaults,
|
|
model: { primary: modelRef, fallbacks: [] },
|
|
agentRuntime: { id: "codex" },
|
|
workspace: path.join(state, "workspace"),
|
|
skipBootstrap: true,
|
|
timeoutSeconds: 420,
|
|
},
|
|
};
|
|
fs.mkdirSync(path.dirname(cfgPath), { recursive: true });
|
|
fs.writeFileSync(cfgPath, `${JSON.stringify(cfg, null, 2)}\n`);
|
|
}
|
|
|
|
function readInstallRecord() {
|
|
const record = readInstalledPluginRecords().codex;
|
|
if (!record) {
|
|
throw new Error("missing codex install record");
|
|
}
|
|
return record;
|
|
}
|
|
|
|
function readInstallRecords() {
|
|
return readInstalledPluginRecords();
|
|
}
|
|
|
|
function assertPlugin() {
|
|
const spec = process.argv[3] || "npm:@openclaw/codex";
|
|
const list = readJson("/tmp/openclaw-codex-plugins-list.json");
|
|
const inspect = readJson("/tmp/openclaw-codex-plugin-inspect.json");
|
|
const plugin = (list.plugins || []).find((entry) => entry.id === "codex");
|
|
if (!plugin) {
|
|
throw new Error("codex plugin not found in plugins list --json output");
|
|
}
|
|
if (plugin.status !== "loaded" || plugin.enabled !== true) {
|
|
throw new Error(
|
|
`expected codex to be enabled+loaded, got enabled=${plugin.enabled} status=${plugin.status}`,
|
|
);
|
|
}
|
|
if (inspect.plugin?.id !== "codex" || inspect.plugin?.status !== "loaded") {
|
|
throw new Error(`unexpected inspect plugin state: ${JSON.stringify(inspect.plugin)}`);
|
|
}
|
|
if (
|
|
!Array.isArray(inspect.plugin?.providerIds) ||
|
|
!inspect.plugin.providerIds.includes("codex")
|
|
) {
|
|
throw new Error(`codex provider was not registered: ${JSON.stringify(inspect.plugin)}`);
|
|
}
|
|
const hasCodexHarness =
|
|
(Array.isArray(inspect.plugin?.agentHarnessIds) &&
|
|
inspect.plugin.agentHarnessIds.includes("codex")) ||
|
|
(Array.isArray(inspect.capabilities) &&
|
|
inspect.capabilities.some(
|
|
(entry) => entry?.kind === "agent-harness" && entry.ids?.includes("codex"),
|
|
));
|
|
if (!hasCodexHarness) {
|
|
throw new Error(`codex harness was not registered: ${JSON.stringify(inspect.plugin)}`);
|
|
}
|
|
const diagnostics = [...(list.diagnostics || []), ...(inspect.diagnostics || [])];
|
|
const errors = diagnostics
|
|
.filter((diag) => diag?.level === "error")
|
|
.map((diag) => String(diag.message || ""));
|
|
const unexpectedErrors = allowBetaCompatDiagnostics
|
|
? errors.filter(
|
|
(message) => message !== "only bundled plugins can claim reserved command ownership: codex",
|
|
)
|
|
: errors;
|
|
if (unexpectedErrors.length > 0) {
|
|
throw new Error(`unexpected plugin diagnostics errors: ${unexpectedErrors.join("; ")}`);
|
|
}
|
|
|
|
const record = readInstallRecord();
|
|
const expectedSpec = spec.replace(/^npm:/u, "");
|
|
if (record.source !== "npm") {
|
|
throw new Error(`expected codex npm install record, got source=${record.source}`);
|
|
}
|
|
if (record.spec !== expectedSpec) {
|
|
throw new Error(`expected codex npm spec ${expectedSpec}, got ${record.spec}`);
|
|
}
|
|
if (!record.resolvedVersion || !record.resolvedSpec) {
|
|
throw new Error(`missing codex npm resolution metadata: ${JSON.stringify(record)}`);
|
|
}
|
|
}
|
|
|
|
function managedNpmRoot() {
|
|
return path.join(stateDir(), "npm");
|
|
}
|
|
|
|
function codexInstallPath() {
|
|
const record = readInstallRecord();
|
|
if (typeof record.installPath !== "string" || record.installPath.length === 0) {
|
|
throw new Error(`missing codex installPath: ${JSON.stringify(record)}`);
|
|
}
|
|
return record.installPath.replace(/^~(?=$|\/)/u, process.env.HOME);
|
|
}
|
|
|
|
function findPackageJson(packageName) {
|
|
const parts = packageName.split("/");
|
|
const candidates =
|
|
packageName.startsWith("@") && parts.length === 2
|
|
? [
|
|
path.join(codexInstallPath(), "node_modules", parts[0], parts[1], "package.json"),
|
|
path.join(managedNpmRoot(), "node_modules", parts[0], parts[1], "package.json"),
|
|
]
|
|
: [
|
|
path.join(codexInstallPath(), "node_modules", packageName, "package.json"),
|
|
path.join(managedNpmRoot(), "node_modules", packageName, "package.json"),
|
|
];
|
|
return candidates.find((candidate) => fs.existsSync(candidate));
|
|
}
|
|
|
|
function assertNpmDeps() {
|
|
const npmRoot = managedNpmRoot();
|
|
const installPath = codexInstallPath();
|
|
const pluginPackageJson = path.join(installPath, "package.json");
|
|
if (!fs.existsSync(pluginPackageJson)) {
|
|
throw new Error(`missing npm-installed @openclaw/codex package.json: ${pluginPackageJson}`);
|
|
}
|
|
assertPathInside(npmRoot, installPath, "codex plugin install path");
|
|
assertPathInside(npmRoot, pluginPackageJson, "codex plugin package");
|
|
|
|
const pluginPackage = readJson(pluginPackageJson);
|
|
if (pluginPackage.name !== "@openclaw/codex") {
|
|
throw new Error(`unexpected codex package name: ${pluginPackage.name}`);
|
|
}
|
|
|
|
const openAiCodexPackageJson = findPackageJson("@openai/codex");
|
|
if (!openAiCodexPackageJson) {
|
|
throw new Error("missing @openai/codex dependency under .openclaw/npm");
|
|
}
|
|
assertPathInside(npmRoot, openAiCodexPackageJson, "@openai/codex dependency");
|
|
|
|
const bin = resolveCodexBin();
|
|
if (!fs.existsSync(bin)) {
|
|
throw new Error(`missing managed Codex binary: ${bin}`);
|
|
}
|
|
assertPathInside(npmRoot, bin, "managed Codex binary");
|
|
}
|
|
|
|
function resolveCodexBin() {
|
|
const commandName = process.platform === "win32" ? "codex.cmd" : "codex";
|
|
const candidates = [
|
|
path.join(codexInstallPath(), "node_modules", ".bin", commandName),
|
|
path.join(managedNpmRoot(), "node_modules", ".bin", commandName),
|
|
];
|
|
const candidate = candidates.find((entry) => fs.existsSync(entry));
|
|
if (candidate) {
|
|
return candidate;
|
|
}
|
|
const packageJson = findPackageJson("@openai/codex");
|
|
if (!packageJson) {
|
|
throw new Error("cannot resolve Codex binary without @openai/codex package");
|
|
}
|
|
const packageRoot = path.dirname(packageJson);
|
|
const pkg = readJson(packageJson);
|
|
const binPath =
|
|
typeof pkg.bin === "string"
|
|
? pkg.bin
|
|
: pkg.bin && typeof pkg.bin.codex === "string"
|
|
? pkg.bin.codex
|
|
: undefined;
|
|
if (!binPath) {
|
|
throw new Error(`@openai/codex package has no codex bin: ${packageJson}`);
|
|
}
|
|
return path.resolve(packageRoot, binPath);
|
|
}
|
|
|
|
function printCodexBin() {
|
|
assertNpmDeps();
|
|
process.stdout.write(`${resolveCodexBin()}\n`);
|
|
}
|
|
|
|
function assertPreflight() {
|
|
const marker = process.argv[3];
|
|
const output = fs.readFileSync("/tmp/openclaw-codex-preflight.log", "utf8");
|
|
if (!output.includes(marker)) {
|
|
throw new Error(`Codex CLI preflight did not contain ${marker}:\n${output}`);
|
|
}
|
|
}
|
|
|
|
function listFilesRecursive(root) {
|
|
if (!fs.existsSync(root)) {
|
|
return [];
|
|
}
|
|
const files = [];
|
|
const stack = [root];
|
|
while (stack.length > 0) {
|
|
const current = stack.pop();
|
|
const entries = fs.readdirSync(current, { withFileTypes: true });
|
|
for (const entry of entries) {
|
|
const fullPath = path.join(current, entry.name);
|
|
if (entry.isDirectory()) {
|
|
stack.push(fullPath);
|
|
} else if (entry.isFile()) {
|
|
files.push(fullPath);
|
|
}
|
|
}
|
|
}
|
|
return files;
|
|
}
|
|
|
|
function assertNativeCodexSessionEvidence(params) {
|
|
const roots = params.roots.filter((root) => fs.existsSync(root));
|
|
const files = roots.flatMap((root) =>
|
|
listFilesRecursive(root).filter((filePath) => filePath.endsWith(".jsonl")),
|
|
);
|
|
if (files.length === 0) {
|
|
throw new Error(
|
|
`missing native Codex session transcript files; checked ${params.roots.join(", ")}`,
|
|
);
|
|
}
|
|
const matchingFile = files.find((filePath) => {
|
|
const content = fs.readFileSync(filePath, "utf8");
|
|
return content.includes(params.marker) || content.includes(params.threadId);
|
|
});
|
|
if (!matchingFile) {
|
|
throw new Error(
|
|
`native Codex session transcripts did not contain ${params.marker} or ${params.threadId}; checked ${files.join(", ")}`,
|
|
);
|
|
}
|
|
assertPathInside(params.codexHome, matchingFile, "native Codex session transcript");
|
|
}
|
|
|
|
function assertAgentTurn() {
|
|
const marker = process.argv[3];
|
|
const sessionId = process.argv[4];
|
|
const modelRef = process.argv[5];
|
|
const stdout = fs.readFileSync("/tmp/openclaw-codex-agent.json", "utf8");
|
|
const stderr = fs.existsSync("/tmp/openclaw-codex-agent.err")
|
|
? fs.readFileSync("/tmp/openclaw-codex-agent.err", "utf8")
|
|
: "";
|
|
const response = JSON.parse(stdout);
|
|
const text = (response.payloads || []).map((payload) => payload?.text || "").join("\n");
|
|
if (!text.includes(marker)) {
|
|
throw new Error(
|
|
`OpenClaw agent reply did not contain ${marker}:\nstdout=${stdout}\nstderr=${stderr}`,
|
|
);
|
|
}
|
|
|
|
const entry = readAgentSessionEntryBySessionId(sessionId);
|
|
if (!entry) {
|
|
throw new Error(`missing SQLite session entry for ${sessionId}`);
|
|
}
|
|
if (entry.agentHarnessId !== "codex") {
|
|
throw new Error(`expected codex harness in session entry, got ${entry.agentHarnessId}`);
|
|
}
|
|
if (entry.modelOverride && entry.modelOverride !== modelRef) {
|
|
throw new Error(`unexpected session model override: ${entry.modelOverride}`);
|
|
}
|
|
const transcriptEvents = countAgentTranscriptEvents(sessionId);
|
|
if (transcriptEvents <= 0) {
|
|
throw new Error(`missing SQLite transcript events for ${sessionId}`);
|
|
}
|
|
|
|
const binding = readPluginStateJson("codex", "app-server-thread-bindings", sessionId);
|
|
if (binding.schemaVersion !== 1 || typeof binding.threadId !== "string") {
|
|
throw new Error(`invalid Codex app-server binding: ${JSON.stringify(binding)}`);
|
|
}
|
|
if (binding.model !== modelRef.split("/").slice(1).join("/")) {
|
|
throw new Error(`unexpected Codex binding model: ${binding.model}`);
|
|
}
|
|
if (binding.modelProvider && binding.modelProvider !== "codex") {
|
|
throw new Error(`unexpected Codex binding provider: ${binding.modelProvider}`);
|
|
}
|
|
|
|
const codexHome = path.join(stateDir(), "agents", "main", "agent", "codex-home");
|
|
const nativeHome = path.join(codexHome, "home");
|
|
if (!fs.existsSync(codexHome) || !fs.existsSync(nativeHome)) {
|
|
throw new Error(`missing isolated Codex home: ${codexHome}`);
|
|
}
|
|
const codexSessionRoot = path.join(codexHome, "sessions");
|
|
const nativeSessionRoot = path.join(nativeHome, ".codex", "sessions");
|
|
assertNativeCodexSessionEvidence({
|
|
codexHome,
|
|
marker,
|
|
roots: [codexSessionRoot, nativeSessionRoot],
|
|
threadId: binding.threadId,
|
|
});
|
|
}
|
|
|
|
function assertUninstalled() {
|
|
const records = readInstallRecords();
|
|
if (records.codex) {
|
|
throw new Error(
|
|
`codex install record still exists after uninstall: ${JSON.stringify(records.codex)}`,
|
|
);
|
|
}
|
|
const list = readJson("/tmp/openclaw-codex-plugins-list-after-uninstall.json");
|
|
const plugin = (list.plugins || []).find((entry) => entry.id === "codex");
|
|
if (plugin?.status === "loaded" || plugin?.enabled === true) {
|
|
throw new Error(`codex plugin still loaded/enabled after uninstall: ${JSON.stringify(plugin)}`);
|
|
}
|
|
const diagnostics = list.diagnostics || [];
|
|
const errors = diagnostics
|
|
.filter((diag) => diag?.level === "error")
|
|
.map((diag) => String(diag.message || ""));
|
|
if (errors.length > 0) {
|
|
throw new Error(`unexpected plugin diagnostics errors after uninstall: ${errors.join("; ")}`);
|
|
}
|
|
}
|
|
|
|
function assertAgentError() {
|
|
const status = Number(process.argv[3]);
|
|
if (!Number.isInteger(status) || status === 0) {
|
|
throw new Error(
|
|
`expected OpenClaw agent to fail after Codex uninstall, got status ${process.argv[3]}`,
|
|
);
|
|
}
|
|
const stdout = fs.existsSync("/tmp/openclaw-codex-agent-after-uninstall.json")
|
|
? fs.readFileSync("/tmp/openclaw-codex-agent-after-uninstall.json", "utf8")
|
|
: "";
|
|
const stderr = fs.existsSync("/tmp/openclaw-codex-agent-after-uninstall.err")
|
|
? fs.readFileSync("/tmp/openclaw-codex-agent-after-uninstall.err", "utf8")
|
|
: "";
|
|
const combined = `${stdout}\n${stderr}`;
|
|
if (!combined.includes('Requested agent harness "codex" is not registered')) {
|
|
throw new Error(`unexpected post-uninstall agent error:\nstdout=${stdout}\nstderr=${stderr}`);
|
|
}
|
|
}
|
|
|
|
const commands = {
|
|
configure,
|
|
"assert-plugin": assertPlugin,
|
|
"assert-npm-deps": assertNpmDeps,
|
|
"print-codex-bin": printCodexBin,
|
|
"assert-preflight": assertPreflight,
|
|
"assert-agent-turn": assertAgentTurn,
|
|
"assert-uninstalled": assertUninstalled,
|
|
"assert-agent-error": assertAgentError,
|
|
};
|
|
|
|
const fn = commands[command];
|
|
if (!fn) {
|
|
throw new Error(`unknown codex npm plugin live assertion command: ${command}`);
|
|
}
|
|
fn();
|