mirror of
https://github.com/openclaw/openclaw.git
synced 2026-05-20 10:04:45 +00:00
* refactor: remove stale file-backed shims * fix: harden sqlite state ci boundaries * refactor: store matrix idb snapshots in sqlite * fix: satisfy rebased CI guardrails * refactor: store current conversation bindings in sqlite table * refactor: store tui last sessions in sqlite table * refactor: reset sqlite schema history * refactor: drop unshipped sqlite table migration * refactor: remove plugin index file rollback * refactor: drop unshipped sqlite sidecar migrations * refactor: remove runtime commitments kv migration * refactor: preserve kysely sync result types * refactor: drop unshipped sqlite schema migration table * test: keep session usage coverage sqlite-backed * refactor: keep sqlite migration doctor-only * refactor: isolate device legacy imports * refactor: isolate push voicewake legacy imports * refactor: isolate remaining runtime legacy imports * refactor: tighten sqlite migration guardrails * test: cover sqlite persisted enum parsing * refactor: isolate legacy update and tui imports * refactor: tighten sqlite state ownership * refactor: move legacy imports behind doctor * refactor: remove legacy session row lookup * refactor: canonicalize memory transcript locators * refactor: drop transcript path scope fallbacks * refactor: drop runtime legacy session delivery pruning * refactor: store tts prefs only in sqlite * refactor: remove cron store path runtime * refactor: use cron sqlite store keys * refactor: rename telegram message cache scope * refactor: read memory dreaming status from sqlite * refactor: rename cron status store key * refactor: stop remembering transcript file paths * test: use sqlite locators in agent fixtures * refactor: remove file-shaped commitments and cron store surfaces * refactor: keep compaction transcript handles out of session rows * refactor: derive transcript handles from session identity * refactor: derive runtime transcript handles * refactor: remove gateway session locator reads * refactor: remove transcript locator from session rows * refactor: store raw stream diagnostics in sqlite * refactor: remove file-shaped transcript rotation * refactor: hide legacy trajectory paths from runtime * refactor: remove runtime transcript file bridges * refactor: repair database-first rebase fallout * refactor: align tests with database-first state * refactor: remove transcript file handoffs * refactor: sync post-compaction memory by transcript scope * refactor: run codex app-server sessions by id * refactor: bind codex runtime state by session id * refactor: pass memory transcripts by sqlite scope * refactor: remove transcript locator cleanup leftovers * test: remove stale transcript file fixtures * refactor: remove transcript locator test helper * test: make cron sqlite keys explicit * test: remove cron runtime store paths * test: remove stale session file fixtures * test: use sqlite cron keys in diagnostics * refactor: remove runtime delivery queue backfill * test: drop fake export session file mocks * refactor: rename acp session read failure flag * refactor: rename acp row session key * refactor: remove session store test seams * refactor: move legacy session parser tests to doctor * refactor: reindex managed memory in place * refactor: drop stale session store wording * refactor: rename session row helpers * refactor: rename sqlite session entry modules * refactor: remove transcript locator leftovers * refactor: trim file-era audit wording * refactor: clean managed media through sqlite * fix: prefer explicit agent for exports * fix: use prepared agent for session resets * fix: canonicalize legacy codex binding import * test: rename state cleanup helper * docs: align backup docs with sqlite state * refactor: drop legacy Pi usage auth fallback * refactor: move legacy auth profile imports to doctor * refactor: keep Pi model discovery auth in memory * refactor: remove MSTeams legacy learning key fallback * refactor: store model catalog config in sqlite * refactor: use sqlite model catalog at runtime * refactor: remove model json compatibility aliases * refactor: store auth profiles in sqlite * refactor: seed copied auth profiles in sqlite * refactor: make auth profile runtime sqlite-addressed * refactor: migrate hermes secrets into sqlite auth store * refactor: move plugin install config migration to doctor * refactor: rename plugin index audit checks * test: drop auth file assumptions * test: remove legacy transcript file assertions * refactor: drop legacy cli session aliases * refactor: store skill uploads in sqlite * refactor: keep subagent attachments in sqlite vfs * refactor: drop subagent attachment cleanup state * refactor: move legacy session aliases to doctor * refactor: require node 24 for sqlite state runtime * refactor: move provider caches into sqlite state * fix: harden virtual agent filesystem * refactor: enforce database-first runtime state * refactor: rename compaction transcript rotation setting * test: clean sqlite refactor test types * refactor: consolidate sqlite runtime state * refactor: model session conversations in sqlite * refactor: stop deriving cron delivery from session keys * refactor: stop classifying sessions from key shape * refactor: hydrate announce targets from typed delivery * refactor: route heartbeat delivery from typed sqlite context * refactor: tighten typed sqlite session routing * refactor: remove session origin routing shadow * refactor: drop session origin shadow fixtures * perf: query sqlite vfs paths by prefix * refactor: use typed conversation metadata for sessions * refactor: prefer typed session routing metadata * refactor: require typed session routing metadata * refactor: resolve group tool policy from typed sessions * refactor: delete dead session thread info bridge * Show Codex subscription reset times in channel errors (#80456) * feat(plugin-sdk): consolidate session workflow APIs * fix(agents): allow read-only agent mount reads * [codex] refresh plugin regression fixtures * fix(agents): restore compaction gateway logs * test: tighten gateway startup assertions * Redact persisted secret-shaped payloads [AI] (#79006) * test: tighten device pair notify assertions * test: tighten hermes secret assertions * test: assert matrix client error shapes * test: assert config compat warnings * fix(heartbeat): remap cron-run exec events to session keys (#80214) * fix(codex): route btw through native side threads * fix(auth): accept friendly OpenAI order for Codex profiles * fix(codex): rotate auth profiles inside harness * fix: keep browser status page probe within timeout * test: assert agents add outputs * test: pin cron read status * fix(agents): avoid Pi resource discovery stalls Co-authored-by: dataCenter430 <titan032000@gmail.com> * fix: retire timed-out codex app-server clients * test: tighten qa lab runtime assertions * test: check security fix outputs * test: verify extension runtime messages * feat(wake): expose typed sessionKey on wake protocol + system event CLI * fix(gateway): await session_end during shutdown drain and track channel + compaction lifecycle paths (#57790) * test: guard talk consult call helper * fix(codex): scale context engine projection (#80761) * fix(codex): scale context engine projection * fix: document Codex context projection scaling * fix: document Codex context projection scaling * fix: document Codex context projection scaling * fix: document Codex context projection scaling * chore: align Codex projection changelog * chore: realign Codex projection changelog * fix: isolate Codex projection patch --------- Co-authored-by: Eva (agent) <eva+agent-78055@100yen.org> Co-authored-by: Josh Lehman <josh@martian.engineering> * refactor: move agent runtime state toward piless * refactor: remove cron session reaper * refactor: move session management to sqlite * refactor: finish database-first state migration * chore: refresh generated sqlite db types * refactor: remove stale file-backed shims * test: harden kysely type coverage # Conflicts: # .agents/skills/kysely-database-access/SKILL.md # src/infra/kysely-sync.types.test.ts # src/proxy-capture/store.sqlite.test.ts # src/state/openclaw-agent-db.test.ts # src/state/openclaw-state-db.test.ts * refactor: remove cron store path runtime * refactor: keep compaction transcript handles out of session rows * refactor: derive embedded transcripts from sqlite identity * refactor: remove embedded transcript locator handoff * refactor: remove runtime transcript file bridges * refactor: remove transcript file handoffs * refactor: remove MSTeams legacy learning key fallback * refactor: store model catalog config in sqlite * refactor: use sqlite model catalog at runtime # Conflicts: # docs/cli/secrets.md # docs/gateway/authentication.md # docs/gateway/secrets.md * fix: keep oauth sibling sync sqlite-local # Conflicts: # src/commands/onboard-auth.test.ts * refactor: remove task session store maintenance # Conflicts: # src/commands/tasks.ts * refactor: keep diagnostics in state sqlite * refactor: enforce database-first runtime state * refactor: consolidate sqlite runtime state * Show Codex subscription reset times in channel errors (#80456) * fix(codex): refresh subscription limit resets * fix(codex): format reset times for channels * Update CHANGELOG with latest changes and fixes Updated CHANGELOG with recent fixes and improvements. * fix(codex): keep command load failures on codex surface * fix(codex): format account rate limits as rows * fix(codex): summarize account limits as usage status * fix(codex): simplify account limit status * test: tighten subagent announce queue assertion * test: tighten session delete lifecycle assertions * test: tighten cron ops assertions * fix: track cron execution milestones * test: tighten hermes secret assertions * test: assert matrix sync store payloads * test: assert config compat warnings * fix(codex): align btw side thread semantics * fix(codex): honor codex fallback blocking * fix(agents): avoid Pi resource discovery stalls * test: tighten codex event assertions * test: tighten cron assertions * Fix Codex app-server OAuth harness auth * refactor: move agent runtime state toward piless * refactor: move device and push state to sqlite * refactor: move runtime json state imports to doctor * refactor: finish database-first state migration * chore: refresh generated sqlite db types * refactor: clarify cron sqlite store keys * refactor: remove stale file-backed shims * refactor: bind codex runtime state by session id * test: expect sqlite trajectory branch export * refactor: rename session row helpers * fix: keep legacy device identity import in doctor * refactor: enforce database-first runtime state * refactor: consolidate sqlite runtime state * build: align pi contract wrappers * chore: repair database-first rebase * refactor: remove session file test contracts * test: update gateway session expectations * refactor: stop routing from session compatibility shadows * refactor: stop persisting session route shadows * refactor: use typed delivery context in clients * refactor: stop echoing session route shadows * refactor: repair embedded runner rebase imports # Conflicts: # src/agents/pi-embedded-runner/run/attempt.tool-call-argument-repair.ts * refactor: align pi contract imports * refactor: satisfy kysely sync helper guard * refactor: remove file transcript bridge remnants * refactor: remove session locator compatibility * refactor: remove session file test contracts * refactor: keep rebase database-first clean * refactor: remove session file assumptions from e2e * docs: clarify database-first goal state * test: remove legacy store markers from sqlite runtime tests * refactor: remove legacy store assumptions from runtime seams * refactor: align sqlite runtime helper seams * test: update memory recall sqlite audit mock * refactor: align database-first runtime type seams * test: clarify doctor cron legacy store names * fix: preserve sqlite session route projections * test: fix copilot token cache test syntax * docs: update database-first proof status * test: align database-first test fixtures * docs: update database-first proof status * refactor: clean extension database-first drift * test: align agent session route proof * test: clarify doctor legacy path fixtures * chore: clean database-first changed checks * chore: repair database-first rebase markers * build: allow baileys git subdependency * chore: repair exp-vfs rebase drift * chore: finish exp-vfs rebase cleanup * chore: satisfy rebase lint drift * chore: fix qqbot rebase type seam * chore: fix rebase drift leftovers * fix: keep auth profile oauth secrets out of sqlite * fix: repair rebase drift tests * test: stabilize pairing request ordering * test: use source manifests in plugin contract checks * fix: restore gateway session metadata after rebase * fix: repair database-first rebase drift * fix: clean up database-first rebase fallout * test: stabilize line quick reply receipt time * fix: repair extension rebase drift * test: keep transcript redaction tests sqlite-backed * fix: carry injected transcript redaction through sqlite * chore: clean database branch rebase residue * fix: repair database branch CI drift * fix: repair database branch CI guard drift * fix: stabilize oauth tls preflight test * test: align database branch fast guards * test: repair build artifact boundary guards * chore: clean changelog rebase markers --------- Co-authored-by: pashpashpash <nik@vault77.ai> Co-authored-by: Eva <eva@100yen.org> Co-authored-by: stainlu <stainlu@newtype-ai.org> Co-authored-by: Jason Zhou <jason.zhou.design@gmail.com> Co-authored-by: Ruben Cuevas <hi@rubencu.com> Co-authored-by: Pavan Kumar Gondhi <pavangondhi@gmail.com> Co-authored-by: Shakker <shakkerdroid@gmail.com> Co-authored-by: Kaspre <36520309+Kaspre@users.noreply.github.com> Co-authored-by: dataCenter430 <titan032000@gmail.com> Co-authored-by: Kaspre <kaspre@gmail.com> Co-authored-by: pandadev66 <nova.full.stack@outlook.com> Co-authored-by: Eva <admin@100yen.org> Co-authored-by: Eva (agent) <eva+agent-78055@100yen.org> Co-authored-by: Josh Lehman <josh@martian.engineering> Co-authored-by: jeffjhunter <support@aipersonamethod.com>
476 lines
18 KiB
JavaScript
476 lines
18 KiB
JavaScript
import fs from "node:fs";
|
|
import path from "node:path";
|
|
import { readInstalledPluginRecords } from "../installed-plugin-index.mjs";
|
|
|
|
const command = process.argv[2];
|
|
|
|
const readJson = (file) => JSON.parse(fs.readFileSync(file, "utf8"));
|
|
|
|
function expectFailure() {
|
|
const outputFile = process.argv[3];
|
|
const output = fs.readFileSync(outputFile, "utf8");
|
|
const source = process.env.KITCHEN_SINK_SOURCE;
|
|
const spec = process.env.KITCHEN_SINK_SPEC;
|
|
const displayedSpec = source === "npm" ? spec.replace(/^npm:/u, "") : spec;
|
|
const expected =
|
|
source === "clawhub"
|
|
? /Version not found on ClawHub|ClawHub .* failed \(404\)|version.*not found/iu
|
|
: /No matching version|ETARGET|notarget|npm (?:error|ERR!)/iu;
|
|
if (!output.includes(displayedSpec)) {
|
|
throw new Error(`expected failure output to mention ${displayedSpec}`);
|
|
}
|
|
if (!expected.test(output)) {
|
|
throw new Error(`unexpected ${source} beta failure output:\n${output}`);
|
|
}
|
|
}
|
|
|
|
function scanLogs() {
|
|
const roots = ["/tmp", path.join(process.env.HOME, ".openclaw")];
|
|
const files = [];
|
|
const visit = (entry) => {
|
|
if (!fs.existsSync(entry)) {
|
|
return;
|
|
}
|
|
const stat = fs.statSync(entry);
|
|
if (stat.isDirectory()) {
|
|
for (const child of fs.readdirSync(entry)) {
|
|
visit(path.join(entry, child));
|
|
}
|
|
return;
|
|
}
|
|
if (/\.(?:log|jsonl)$/u.test(entry) || /openclaw-kitchen-sink-/u.test(path.basename(entry))) {
|
|
if (entry.includes("/.npm/_logs/")) {
|
|
return;
|
|
}
|
|
files.push(entry);
|
|
}
|
|
};
|
|
for (const root of roots) {
|
|
visit(root);
|
|
}
|
|
|
|
const deny = [
|
|
/\buncaught exception\b/iu,
|
|
/\bunhandled rejection\b/iu,
|
|
/\bfatal\b/iu,
|
|
/\bpanic\b/iu,
|
|
/\blevel["']?\s*:\s*["']error["']/iu,
|
|
/\[(?:error|ERROR)\]/u,
|
|
];
|
|
const allow = [/0 errors?/iu, /expected no diagnostics errors?/iu, /diagnostics errors?:\s*$/iu];
|
|
const findings = [];
|
|
for (const file of files) {
|
|
const text = fs.readFileSync(file, "utf8");
|
|
const lines = text.split(/\r?\n/u);
|
|
lines.forEach((line, index) => {
|
|
if (allow.some((pattern) => pattern.test(line))) {
|
|
return;
|
|
}
|
|
if (deny.some((pattern) => pattern.test(line))) {
|
|
findings.push(`${file}:${index + 1}: ${line}`);
|
|
}
|
|
});
|
|
}
|
|
if (findings.length > 0) {
|
|
throw new Error(`unexpected error-like log lines:\n${findings.join("\n")}`);
|
|
}
|
|
console.log(`log scan passed (${files.length} file(s))`);
|
|
}
|
|
|
|
function readConfig() {
|
|
const configPath = path.join(process.env.HOME, ".openclaw", "openclaw.json");
|
|
return {
|
|
configPath,
|
|
exists: fs.existsSync(configPath),
|
|
config: fs.existsSync(configPath) ? readJson(configPath) : {},
|
|
};
|
|
}
|
|
|
|
function configureRuntime() {
|
|
const pluginId = process.env.KITCHEN_SINK_ID;
|
|
const { configPath, config } = readConfig();
|
|
config.plugins = config.plugins || {};
|
|
config.plugins.entries = config.plugins.entries || {};
|
|
config.plugins.entries[pluginId] = {
|
|
...config.plugins.entries[pluginId],
|
|
hooks: {
|
|
...config.plugins.entries[pluginId]?.hooks,
|
|
allowConversationAccess: true,
|
|
},
|
|
};
|
|
config.channels = {
|
|
...config.channels,
|
|
"kitchen-sink-channel": { enabled: true, token: "kitchen-sink-ci" },
|
|
};
|
|
fs.mkdirSync(path.dirname(configPath), { recursive: true });
|
|
fs.writeFileSync(configPath, `${JSON.stringify(config, null, 2)}\n`);
|
|
}
|
|
|
|
function removeChannelConfig() {
|
|
const { configPath, exists, config } = readConfig();
|
|
if (!exists) {
|
|
return;
|
|
}
|
|
delete config.channels?.["kitchen-sink-channel"];
|
|
fs.writeFileSync(configPath, `${JSON.stringify(config, null, 2)}\n`);
|
|
}
|
|
|
|
const expectIncludes = (listValue, expected, field) => {
|
|
if (!Array.isArray(listValue) || !listValue.includes(expected)) {
|
|
throw new Error(`${field} missing ${expected}: ${JSON.stringify(listValue)}`);
|
|
}
|
|
};
|
|
const expectIncludesAny = (listValue, expectedValues, field) => {
|
|
if (
|
|
!Array.isArray(listValue) ||
|
|
!expectedValues.some((expected) => listValue.includes(expected))
|
|
) {
|
|
throw new Error(
|
|
`${field} missing one of ${expectedValues.join(", ")}: ${JSON.stringify(listValue)}`,
|
|
);
|
|
}
|
|
};
|
|
const expectMissing = (listValue, expected, field) => {
|
|
if (Array.isArray(listValue) && listValue.includes(expected)) {
|
|
throw new Error(`${field} unexpectedly included ${expected}: ${JSON.stringify(listValue)}`);
|
|
}
|
|
};
|
|
|
|
const INVALID_PROBE_DIAGNOSTIC_SURFACE_MODES = new Set(["full", "conformance", "adversarial"]);
|
|
|
|
function assertExpectedDiagnostics(surfaceMode, errorMessages) {
|
|
const expectedErrorMessages = new Set([
|
|
"cli registration missing explicit commands metadata",
|
|
"only bundled plugins can register Codex app-server extension factories",
|
|
"only bundled plugins can register agent tool result middleware",
|
|
'compaction provider "kitchen-sink-compaction-provider" registration missing summarize',
|
|
"context engine registration missing id",
|
|
"control UI descriptor registration requires id, surface, label, and valid optional fields",
|
|
"http route registration missing or invalid auth: /kitchen-sink/http-route",
|
|
"node invoke policy registration missing commands",
|
|
"only bundled plugins can register trusted tool policies",
|
|
"plugin must own memory slot or declare contracts.memoryEmbeddingProviders for adapter: kitchen-sink-memory-embedding-provider",
|
|
"plugin must declare contracts.tools for: kitchen-sink-tool",
|
|
'channel "kitchen-sink-channel-probe" registration missing required config helpers',
|
|
'agent harness "kitchen-sink-agent-harness" registration missing required runtime methods',
|
|
"memory prompt supplement registration missing builder",
|
|
"session extension registration requires namespace and description",
|
|
"session scheduler job registration requires unique id, sessionKey, and kind",
|
|
"tool metadata registration missing toolName",
|
|
]);
|
|
const optionalErrorMessages = new Set([
|
|
"agent event subscription registration requires id and handle",
|
|
]);
|
|
const allowedErrorMessages = new Set([...expectedErrorMessages, ...optionalErrorMessages]);
|
|
if (!INVALID_PROBE_DIAGNOSTIC_SURFACE_MODES.has(surfaceMode)) {
|
|
if (errorMessages.size > 0) {
|
|
throw new Error(
|
|
`unexpected kitchen-sink diagnostic errors: ${[...errorMessages].join(", ")}`,
|
|
);
|
|
}
|
|
return;
|
|
}
|
|
for (const message of errorMessages) {
|
|
if (!allowedErrorMessages.has(message)) {
|
|
throw new Error(`unexpected kitchen-sink diagnostic error: ${message}`);
|
|
}
|
|
}
|
|
if (surfaceMode === "full" && process.env.KITCHEN_SINK_REQUIRE_ALL_DIAGNOSTICS === "1") {
|
|
for (const message of expectedErrorMessages) {
|
|
if (!errorMessages.has(message)) {
|
|
throw new Error(`missing expected kitchen-sink diagnostic error: ${message}`);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
function assertRealPathInside(parentPath, childPath, label) {
|
|
const parentRealPath = fs.realpathSync(parentPath);
|
|
const childRealPath = fs.realpathSync(childPath);
|
|
if (
|
|
childRealPath !== parentRealPath &&
|
|
!childRealPath.startsWith(`${parentRealPath}${path.sep}`)
|
|
) {
|
|
throw new Error(`${label} resolved outside ${parentPath}: ${childRealPath}`);
|
|
}
|
|
}
|
|
|
|
function assertClawHubExternalInstallContract(installPath) {
|
|
const openclawPeerPath = path.join(installPath, "node_modules", "openclaw");
|
|
if (!fs.existsSync(openclawPeerPath)) {
|
|
throw new Error(`missing kitchen-sink openclaw peer symlink: ${openclawPeerPath}`);
|
|
}
|
|
if (!fs.lstatSync(openclawPeerPath).isSymbolicLink()) {
|
|
throw new Error(`kitchen-sink openclaw peer is not a symlink: ${openclawPeerPath}`);
|
|
}
|
|
const hostRoot = fs.realpathSync(process.cwd());
|
|
const linkedHostRoot = fs.realpathSync(openclawPeerPath);
|
|
if (linkedHostRoot !== hostRoot) {
|
|
throw new Error(`expected kitchen-sink openclaw peer ${linkedHostRoot} to target ${hostRoot}`);
|
|
}
|
|
|
|
const dependencyPackagePath = path.join(installPath, "node_modules", "is-number", "package.json");
|
|
if (fs.existsSync(dependencyPackagePath)) {
|
|
assertRealPathInside(installPath, dependencyPackagePath, "kitchen-sink isolated dependency");
|
|
}
|
|
}
|
|
|
|
function assertClawHubArtifactMetadata(record) {
|
|
if (record.artifactKind === "legacy-zip") {
|
|
if (record.artifactFormat !== "zip") {
|
|
throw new Error(
|
|
`missing kitchen-sink legacy ZIP artifact metadata: ${JSON.stringify(record)}`,
|
|
);
|
|
}
|
|
return;
|
|
}
|
|
|
|
if (record.artifactKind !== "npm-pack" || record.artifactFormat !== "tgz") {
|
|
throw new Error(`missing kitchen-sink ClawHub artifact metadata: ${JSON.stringify(record)}`);
|
|
}
|
|
if (!record.clawpackSha256 || typeof record.clawpackSize !== "number") {
|
|
throw new Error(`missing kitchen-sink ClawPack metadata: ${JSON.stringify(record)}`);
|
|
}
|
|
if (!record.npmIntegrity || !record.npmShasum || !record.npmTarballName) {
|
|
throw new Error(`missing kitchen-sink npm artifact metadata: ${JSON.stringify(record)}`);
|
|
}
|
|
}
|
|
|
|
function inferInstallSource(spec) {
|
|
if (spec?.startsWith("npm:")) {
|
|
return "npm";
|
|
}
|
|
if (spec?.startsWith("clawhub:")) {
|
|
return "clawhub";
|
|
}
|
|
return null;
|
|
}
|
|
|
|
function assertCutoverPreinstalled() {
|
|
const pluginId = process.env.KITCHEN_SINK_ID;
|
|
const preinstallSpec = process.env.KITCHEN_SINK_PREINSTALL_SPEC;
|
|
const source = inferInstallSource(preinstallSpec);
|
|
if (!pluginId || !preinstallSpec || !source) {
|
|
throw new Error(`invalid kitchen-sink cutover preinstall spec: ${preinstallSpec}`);
|
|
}
|
|
|
|
const record = readInstalledPluginRecords()[pluginId];
|
|
if (!record) {
|
|
throw new Error(`missing kitchen-sink cutover preinstall record for ${pluginId}`);
|
|
}
|
|
if (record.source !== source) {
|
|
throw new Error(`expected kitchen-sink preinstall source=${source}, got ${record.source}`);
|
|
}
|
|
const expectedSpec = source === "npm" ? preinstallSpec.replace(/^npm:/u, "") : preinstallSpec;
|
|
if (record.spec !== expectedSpec) {
|
|
throw new Error(`expected kitchen-sink preinstall spec ${expectedSpec}, got ${record.spec}`);
|
|
}
|
|
}
|
|
|
|
function assertInstalled() {
|
|
const pluginId = process.env.KITCHEN_SINK_ID;
|
|
const spec = process.env.KITCHEN_SINK_SPEC;
|
|
const source = process.env.KITCHEN_SINK_SOURCE;
|
|
const surfaceMode = process.env.KITCHEN_SINK_SURFACE_MODE;
|
|
const label = process.env.KITCHEN_SINK_LABEL;
|
|
const list = readJson(`/tmp/kitchen-sink-${label}-plugins.json`);
|
|
const inspect = readJson(`/tmp/kitchen-sink-${label}-inspect.json`);
|
|
const allInspect = readJson(`/tmp/kitchen-sink-${label}-inspect-all.json`);
|
|
const plugin = (list.plugins || []).find((entry) => entry.id === pluginId);
|
|
if (!plugin) {
|
|
throw new Error(`kitchen-sink plugin not found after install: ${pluginId}`);
|
|
}
|
|
if (plugin.status !== "loaded") {
|
|
throw new Error(`unexpected kitchen-sink status after enable: ${plugin.status}`);
|
|
}
|
|
if (inspect.plugin?.id !== pluginId) {
|
|
throw new Error(`unexpected inspected kitchen-sink plugin id: ${inspect.plugin?.id}`);
|
|
}
|
|
if (inspect.plugin?.enabled !== true || inspect.plugin?.status !== "loaded") {
|
|
throw new Error(
|
|
`expected enabled loaded kitchen-sink plugin, got enabled=${inspect.plugin?.enabled} status=${inspect.plugin?.status}`,
|
|
);
|
|
}
|
|
|
|
if (surfaceMode !== "adversarial") {
|
|
expectIncludes(inspect.plugin?.channelIds, "kitchen-sink-channel", "channels");
|
|
expectIncludes(inspect.plugin?.providerIds, "kitchen-sink-provider", "providers");
|
|
}
|
|
|
|
const diagnostics = [
|
|
...(list.diagnostics || []),
|
|
...(inspect.diagnostics || []),
|
|
...(allInspect.diagnostics || []),
|
|
];
|
|
const errorMessages = new Set(
|
|
diagnostics.filter((diag) => diag?.level === "error").map((diag) => String(diag.message || "")),
|
|
);
|
|
|
|
if (surfaceMode === "full" || surfaceMode === "conformance") {
|
|
const toolNames = Array.isArray(inspect.tools)
|
|
? inspect.tools.flatMap((entry) => (Array.isArray(entry?.names) ? entry.names : []))
|
|
: [];
|
|
const pluginSurfaceIds = {
|
|
speechProviderIds: [
|
|
["kitchen-sink-speech", "kitchen-sink-speech-provider"],
|
|
"speech providers",
|
|
],
|
|
realtimeTranscriptionProviderIds: [
|
|
["kitchen-sink-realtime-transcription", "kitchen-sink-realtime-transcription-provider"],
|
|
"realtime transcription providers",
|
|
],
|
|
realtimeVoiceProviderIds: [
|
|
["kitchen-sink-realtime-voice", "kitchen-sink-realtime-voice-provider"],
|
|
"realtime voice providers",
|
|
],
|
|
mediaUnderstandingProviderIds: [
|
|
["kitchen-sink-media", "kitchen-sink-media-understanding-provider"],
|
|
"media understanding providers",
|
|
],
|
|
imageGenerationProviderIds: [
|
|
["kitchen-sink-image", "kitchen-sink-image-generation-provider"],
|
|
"image generation providers",
|
|
],
|
|
videoGenerationProviderIds: [
|
|
["kitchen-sink-video", "kitchen-sink-video-generation-provider"],
|
|
"video generation providers",
|
|
],
|
|
musicGenerationProviderIds: [
|
|
["kitchen-sink-music", "kitchen-sink-music-generation-provider"],
|
|
"music generation providers",
|
|
],
|
|
webFetchProviderIds: [
|
|
["kitchen-sink-fetch", "kitchen-sink-web-fetch-provider"],
|
|
"web fetch providers",
|
|
],
|
|
webSearchProviderIds: [
|
|
["kitchen-sink-search", "kitchen-sink-web-search-provider"],
|
|
"web search providers",
|
|
],
|
|
migrationProviderIds: [
|
|
["kitchen-sink-migration-providers", "kitchen-sink-migration-provider"],
|
|
"migration providers",
|
|
],
|
|
};
|
|
for (const [field, [ids, label]] of Object.entries(pluginSurfaceIds)) {
|
|
expectIncludesAny(inspect.plugin?.[field], ids, label);
|
|
}
|
|
expectMissing(inspect.plugin?.agentHarnessIds, "kitchen-sink-agent-harness", "agent harnesses");
|
|
expectIncludes(inspect.services, "kitchen-sink-service", "services");
|
|
if (surfaceMode === "full") {
|
|
expectIncludesAny(inspect.commands, ["kitchen", "kitchen-sink-command"], "commands");
|
|
expectIncludesAny(toolNames, ["kitchen_sink_text", "kitchen-sink-tool"], "tools");
|
|
} else {
|
|
expectIncludes(inspect.commands, "kitchen", "commands");
|
|
expectIncludes(toolNames, "kitchen_sink_text", "tools");
|
|
}
|
|
if (
|
|
(inspect.plugin?.hookCount || 0) < 30 ||
|
|
!Array.isArray(inspect.typedHooks) ||
|
|
inspect.typedHooks.length < 30
|
|
) {
|
|
throw new Error(
|
|
`expected kitchen-sink typed hooks to load, got hookCount=${inspect.plugin?.hookCount} typedHooks=${inspect.typedHooks?.length}`,
|
|
);
|
|
}
|
|
}
|
|
assertExpectedDiagnostics(surfaceMode, errorMessages);
|
|
|
|
const record = readInstalledPluginRecords()[pluginId];
|
|
if (!record) {
|
|
throw new Error(`missing kitchen-sink install record for ${pluginId}`);
|
|
}
|
|
if (record.source !== source) {
|
|
throw new Error(`expected kitchen-sink install source=${source}, got ${record.source}`);
|
|
}
|
|
if (source === "npm") {
|
|
const expectedSpec = spec.replace(/^npm:/u, "");
|
|
if (record.spec !== expectedSpec) {
|
|
throw new Error(`expected kitchen-sink npm spec ${expectedSpec}, got ${record.spec}`);
|
|
}
|
|
if (!record.resolvedVersion || !record.resolvedSpec) {
|
|
throw new Error(`missing npm resolution metadata: ${JSON.stringify(record)}`);
|
|
}
|
|
} else if (source === "clawhub") {
|
|
const value = spec.slice("clawhub:".length).trim();
|
|
const slashIndex = value.lastIndexOf("/");
|
|
const atIndex = value.lastIndexOf("@");
|
|
const packageName = atIndex > 0 && atIndex > slashIndex ? value.slice(0, atIndex) : value;
|
|
if (record.spec !== spec) {
|
|
throw new Error(`expected kitchen-sink ClawHub spec ${spec}, got ${record.spec}`);
|
|
}
|
|
if (record.clawhubPackage !== packageName) {
|
|
throw new Error(`expected ClawHub package ${packageName}, got ${record.clawhubPackage}`);
|
|
}
|
|
if (record.clawhubFamily !== "code-plugin" && record.clawhubFamily !== "bundle-plugin") {
|
|
throw new Error(`unexpected ClawHub family: ${record.clawhubFamily}`);
|
|
}
|
|
if (!record.version || !record.integrity || !record.resolvedAt) {
|
|
throw new Error(`missing ClawHub resolution metadata: ${JSON.stringify(record)}`);
|
|
}
|
|
assertClawHubArtifactMetadata(record);
|
|
}
|
|
if (typeof record.installPath !== "string" || record.installPath.length === 0) {
|
|
throw new Error("missing kitchen-sink install path");
|
|
}
|
|
const installPath = record.installPath.replace(/^~(?=$|\/)/u, process.env.HOME);
|
|
if (!fs.existsSync(installPath)) {
|
|
throw new Error(`kitchen-sink install path missing: ${record.installPath}`);
|
|
}
|
|
if (source === "clawhub" && record.artifactKind === "npm-pack") {
|
|
assertClawHubExternalInstallContract(installPath);
|
|
}
|
|
fs.writeFileSync(`/tmp/kitchen-sink-${label}-install-path.txt`, installPath, "utf8");
|
|
}
|
|
|
|
function assertRemoved() {
|
|
const pluginId = process.env.KITCHEN_SINK_ID;
|
|
const label = process.env.KITCHEN_SINK_LABEL;
|
|
const list = readJson(`/tmp/kitchen-sink-${label}-uninstalled.json`);
|
|
if ((list.plugins || []).some((entry) => entry.id === pluginId)) {
|
|
throw new Error(`kitchen-sink plugin still listed after uninstall: ${pluginId}`);
|
|
}
|
|
|
|
const records = readInstalledPluginRecords();
|
|
if (records[pluginId]) {
|
|
throw new Error(`kitchen-sink install record still present after uninstall: ${pluginId}`);
|
|
}
|
|
|
|
const { config } = readConfig();
|
|
if (config.plugins?.entries?.[pluginId]) {
|
|
throw new Error(`kitchen-sink config entry still present after uninstall: ${pluginId}`);
|
|
}
|
|
if ((config.plugins?.allow || []).includes(pluginId)) {
|
|
throw new Error(`kitchen-sink allowlist still contains ${pluginId}`);
|
|
}
|
|
if ((config.plugins?.deny || []).includes(pluginId)) {
|
|
throw new Error(`kitchen-sink denylist still contains ${pluginId}`);
|
|
}
|
|
if (config.channels?.["kitchen-sink-channel"]) {
|
|
throw new Error("kitchen-sink channel config still present after uninstall");
|
|
}
|
|
const installPathFile = `/tmp/kitchen-sink-${label}-install-path.txt`;
|
|
if (fs.existsSync(installPathFile)) {
|
|
const installPath = fs.readFileSync(installPathFile, "utf8").trim();
|
|
if (installPath && fs.existsSync(installPath)) {
|
|
throw new Error(`kitchen-sink managed install directory still exists: ${installPath}`);
|
|
}
|
|
}
|
|
}
|
|
|
|
const commands = {
|
|
"expect-failure": expectFailure,
|
|
"scan-logs": scanLogs,
|
|
"configure-runtime": configureRuntime,
|
|
"remove-channel-config": removeChannelConfig,
|
|
"assert-cutover-preinstalled": assertCutoverPreinstalled,
|
|
"assert-installed": assertInstalled,
|
|
"assert-removed": assertRemoved,
|
|
};
|
|
|
|
const fn = commands[command];
|
|
if (!fn) {
|
|
throw new Error(`unknown kitchen-sink assertion command: ${command}`);
|
|
}
|
|
fn();
|