mirror of
https://github.com/openclaw/openclaw.git
synced 2026-05-19 20:14:45 +00:00
* refactor: remove stale file-backed shims * fix: harden sqlite state ci boundaries * refactor: store matrix idb snapshots in sqlite * fix: satisfy rebased CI guardrails * refactor: store current conversation bindings in sqlite table * refactor: store tui last sessions in sqlite table * refactor: reset sqlite schema history * refactor: drop unshipped sqlite table migration * refactor: remove plugin index file rollback * refactor: drop unshipped sqlite sidecar migrations * refactor: remove runtime commitments kv migration * refactor: preserve kysely sync result types * refactor: drop unshipped sqlite schema migration table * test: keep session usage coverage sqlite-backed * refactor: keep sqlite migration doctor-only * refactor: isolate device legacy imports * refactor: isolate push voicewake legacy imports * refactor: isolate remaining runtime legacy imports * refactor: tighten sqlite migration guardrails * test: cover sqlite persisted enum parsing * refactor: isolate legacy update and tui imports * refactor: tighten sqlite state ownership * refactor: move legacy imports behind doctor * refactor: remove legacy session row lookup * refactor: canonicalize memory transcript locators * refactor: drop transcript path scope fallbacks * refactor: drop runtime legacy session delivery pruning * refactor: store tts prefs only in sqlite * refactor: remove cron store path runtime * refactor: use cron sqlite store keys * refactor: rename telegram message cache scope * refactor: read memory dreaming status from sqlite * refactor: rename cron status store key * refactor: stop remembering transcript file paths * test: use sqlite locators in agent fixtures * refactor: remove file-shaped commitments and cron store surfaces * refactor: keep compaction transcript handles out of session rows * refactor: derive transcript handles from session identity * refactor: derive runtime transcript handles * refactor: remove gateway session locator reads * refactor: remove transcript locator from session rows * refactor: store raw stream diagnostics in sqlite * refactor: remove file-shaped transcript rotation * refactor: hide legacy trajectory paths from runtime * refactor: remove runtime transcript file bridges * refactor: repair database-first rebase fallout * refactor: align tests with database-first state * refactor: remove transcript file handoffs * refactor: sync post-compaction memory by transcript scope * refactor: run codex app-server sessions by id * refactor: bind codex runtime state by session id * refactor: pass memory transcripts by sqlite scope * refactor: remove transcript locator cleanup leftovers * test: remove stale transcript file fixtures * refactor: remove transcript locator test helper * test: make cron sqlite keys explicit * test: remove cron runtime store paths * test: remove stale session file fixtures * test: use sqlite cron keys in diagnostics * refactor: remove runtime delivery queue backfill * test: drop fake export session file mocks * refactor: rename acp session read failure flag * refactor: rename acp row session key * refactor: remove session store test seams * refactor: move legacy session parser tests to doctor * refactor: reindex managed memory in place * refactor: drop stale session store wording * refactor: rename session row helpers * refactor: rename sqlite session entry modules * refactor: remove transcript locator leftovers * refactor: trim file-era audit wording * refactor: clean managed media through sqlite * fix: prefer explicit agent for exports * fix: use prepared agent for session resets * fix: canonicalize legacy codex binding import * test: rename state cleanup helper * docs: align backup docs with sqlite state * refactor: drop legacy Pi usage auth fallback * refactor: move legacy auth profile imports to doctor * refactor: keep Pi model discovery auth in memory * refactor: remove MSTeams legacy learning key fallback * refactor: store model catalog config in sqlite * refactor: use sqlite model catalog at runtime * refactor: remove model json compatibility aliases * refactor: store auth profiles in sqlite * refactor: seed copied auth profiles in sqlite * refactor: make auth profile runtime sqlite-addressed * refactor: migrate hermes secrets into sqlite auth store * refactor: move plugin install config migration to doctor * refactor: rename plugin index audit checks * test: drop auth file assumptions * test: remove legacy transcript file assertions * refactor: drop legacy cli session aliases * refactor: store skill uploads in sqlite * refactor: keep subagent attachments in sqlite vfs * refactor: drop subagent attachment cleanup state * refactor: move legacy session aliases to doctor * refactor: require node 24 for sqlite state runtime * refactor: move provider caches into sqlite state * fix: harden virtual agent filesystem * refactor: enforce database-first runtime state * refactor: rename compaction transcript rotation setting * test: clean sqlite refactor test types * refactor: consolidate sqlite runtime state * refactor: model session conversations in sqlite * refactor: stop deriving cron delivery from session keys * refactor: stop classifying sessions from key shape * refactor: hydrate announce targets from typed delivery * refactor: route heartbeat delivery from typed sqlite context * refactor: tighten typed sqlite session routing * refactor: remove session origin routing shadow * refactor: drop session origin shadow fixtures * perf: query sqlite vfs paths by prefix * refactor: use typed conversation metadata for sessions * refactor: prefer typed session routing metadata * refactor: require typed session routing metadata * refactor: resolve group tool policy from typed sessions * refactor: delete dead session thread info bridge * Show Codex subscription reset times in channel errors (#80456) * feat(plugin-sdk): consolidate session workflow APIs * fix(agents): allow read-only agent mount reads * [codex] refresh plugin regression fixtures * fix(agents): restore compaction gateway logs * test: tighten gateway startup assertions * Redact persisted secret-shaped payloads [AI] (#79006) * test: tighten device pair notify assertions * test: tighten hermes secret assertions * test: assert matrix client error shapes * test: assert config compat warnings * fix(heartbeat): remap cron-run exec events to session keys (#80214) * fix(codex): route btw through native side threads * fix(auth): accept friendly OpenAI order for Codex profiles * fix(codex): rotate auth profiles inside harness * fix: keep browser status page probe within timeout * test: assert agents add outputs * test: pin cron read status * fix(agents): avoid Pi resource discovery stalls Co-authored-by: dataCenter430 <titan032000@gmail.com> * fix: retire timed-out codex app-server clients * test: tighten qa lab runtime assertions * test: check security fix outputs * test: verify extension runtime messages * feat(wake): expose typed sessionKey on wake protocol + system event CLI * fix(gateway): await session_end during shutdown drain and track channel + compaction lifecycle paths (#57790) * test: guard talk consult call helper * fix(codex): scale context engine projection (#80761) * fix(codex): scale context engine projection * fix: document Codex context projection scaling * fix: document Codex context projection scaling * fix: document Codex context projection scaling * fix: document Codex context projection scaling * chore: align Codex projection changelog * chore: realign Codex projection changelog * fix: isolate Codex projection patch --------- Co-authored-by: Eva (agent) <eva+agent-78055@100yen.org> Co-authored-by: Josh Lehman <josh@martian.engineering> * refactor: move agent runtime state toward piless * refactor: remove cron session reaper * refactor: move session management to sqlite * refactor: finish database-first state migration * chore: refresh generated sqlite db types * refactor: remove stale file-backed shims * test: harden kysely type coverage # Conflicts: # .agents/skills/kysely-database-access/SKILL.md # src/infra/kysely-sync.types.test.ts # src/proxy-capture/store.sqlite.test.ts # src/state/openclaw-agent-db.test.ts # src/state/openclaw-state-db.test.ts * refactor: remove cron store path runtime * refactor: keep compaction transcript handles out of session rows * refactor: derive embedded transcripts from sqlite identity * refactor: remove embedded transcript locator handoff * refactor: remove runtime transcript file bridges * refactor: remove transcript file handoffs * refactor: remove MSTeams legacy learning key fallback * refactor: store model catalog config in sqlite * refactor: use sqlite model catalog at runtime # Conflicts: # docs/cli/secrets.md # docs/gateway/authentication.md # docs/gateway/secrets.md * fix: keep oauth sibling sync sqlite-local # Conflicts: # src/commands/onboard-auth.test.ts * refactor: remove task session store maintenance # Conflicts: # src/commands/tasks.ts * refactor: keep diagnostics in state sqlite * refactor: enforce database-first runtime state * refactor: consolidate sqlite runtime state * Show Codex subscription reset times in channel errors (#80456) * fix(codex): refresh subscription limit resets * fix(codex): format reset times for channels * Update CHANGELOG with latest changes and fixes Updated CHANGELOG with recent fixes and improvements. * fix(codex): keep command load failures on codex surface * fix(codex): format account rate limits as rows * fix(codex): summarize account limits as usage status * fix(codex): simplify account limit status * test: tighten subagent announce queue assertion * test: tighten session delete lifecycle assertions * test: tighten cron ops assertions * fix: track cron execution milestones * test: tighten hermes secret assertions * test: assert matrix sync store payloads * test: assert config compat warnings * fix(codex): align btw side thread semantics * fix(codex): honor codex fallback blocking * fix(agents): avoid Pi resource discovery stalls * test: tighten codex event assertions * test: tighten cron assertions * Fix Codex app-server OAuth harness auth * refactor: move agent runtime state toward piless * refactor: move device and push state to sqlite * refactor: move runtime json state imports to doctor * refactor: finish database-first state migration * chore: refresh generated sqlite db types * refactor: clarify cron sqlite store keys * refactor: remove stale file-backed shims * refactor: bind codex runtime state by session id * test: expect sqlite trajectory branch export * refactor: rename session row helpers * fix: keep legacy device identity import in doctor * refactor: enforce database-first runtime state * refactor: consolidate sqlite runtime state * build: align pi contract wrappers * chore: repair database-first rebase * refactor: remove session file test contracts * test: update gateway session expectations * refactor: stop routing from session compatibility shadows * refactor: stop persisting session route shadows * refactor: use typed delivery context in clients * refactor: stop echoing session route shadows * refactor: repair embedded runner rebase imports # Conflicts: # src/agents/pi-embedded-runner/run/attempt.tool-call-argument-repair.ts * refactor: align pi contract imports * refactor: satisfy kysely sync helper guard * refactor: remove file transcript bridge remnants * refactor: remove session locator compatibility * refactor: remove session file test contracts * refactor: keep rebase database-first clean * refactor: remove session file assumptions from e2e * docs: clarify database-first goal state * test: remove legacy store markers from sqlite runtime tests * refactor: remove legacy store assumptions from runtime seams * refactor: align sqlite runtime helper seams * test: update memory recall sqlite audit mock * refactor: align database-first runtime type seams * test: clarify doctor cron legacy store names * fix: preserve sqlite session route projections * test: fix copilot token cache test syntax * docs: update database-first proof status * test: align database-first test fixtures * docs: update database-first proof status * refactor: clean extension database-first drift * test: align agent session route proof * test: clarify doctor legacy path fixtures * chore: clean database-first changed checks * chore: repair database-first rebase markers * build: allow baileys git subdependency * chore: repair exp-vfs rebase drift * chore: finish exp-vfs rebase cleanup * chore: satisfy rebase lint drift * chore: fix qqbot rebase type seam * chore: fix rebase drift leftovers * fix: keep auth profile oauth secrets out of sqlite * fix: repair rebase drift tests * test: stabilize pairing request ordering * test: use source manifests in plugin contract checks * fix: restore gateway session metadata after rebase * fix: repair database-first rebase drift * fix: clean up database-first rebase fallout * test: stabilize line quick reply receipt time * fix: repair extension rebase drift * test: keep transcript redaction tests sqlite-backed * fix: carry injected transcript redaction through sqlite * chore: clean database branch rebase residue * fix: repair database branch CI drift * fix: repair database branch CI guard drift * fix: stabilize oauth tls preflight test * test: align database branch fast guards * test: repair build artifact boundary guards * chore: clean changelog rebase markers --------- Co-authored-by: pashpashpash <nik@vault77.ai> Co-authored-by: Eva <eva@100yen.org> Co-authored-by: stainlu <stainlu@newtype-ai.org> Co-authored-by: Jason Zhou <jason.zhou.design@gmail.com> Co-authored-by: Ruben Cuevas <hi@rubencu.com> Co-authored-by: Pavan Kumar Gondhi <pavangondhi@gmail.com> Co-authored-by: Shakker <shakkerdroid@gmail.com> Co-authored-by: Kaspre <36520309+Kaspre@users.noreply.github.com> Co-authored-by: dataCenter430 <titan032000@gmail.com> Co-authored-by: Kaspre <kaspre@gmail.com> Co-authored-by: pandadev66 <nova.full.stack@outlook.com> Co-authored-by: Eva <admin@100yen.org> Co-authored-by: Eva (agent) <eva+agent-78055@100yen.org> Co-authored-by: Josh Lehman <josh@martian.engineering> Co-authored-by: jeffjhunter <support@aipersonamethod.com>
305 lines
9.8 KiB
JavaScript
305 lines
9.8 KiB
JavaScript
import fs from "node:fs";
|
|
import path from "node:path";
|
|
import { DatabaseSync } from "node:sqlite";
|
|
|
|
const command = process.argv[2];
|
|
const readJson = (file) => JSON.parse(fs.readFileSync(file, "utf8"));
|
|
const agentTurnTimeoutSeconds = Number.parseInt(
|
|
process.env.OPENCLAW_LIVE_PLUGIN_TOOL_TIMEOUT_SECONDS ?? "300",
|
|
10,
|
|
);
|
|
|
|
function requireEnv(name) {
|
|
const value = process.env[name];
|
|
if (!value) {
|
|
throw new Error(`missing ${name}`);
|
|
}
|
|
return value;
|
|
}
|
|
|
|
function stateDir() {
|
|
return process.env.OPENCLAW_STATE_DIR || path.join(process.env.HOME, ".openclaw");
|
|
}
|
|
|
|
function configPath() {
|
|
return process.env.OPENCLAW_CONFIG_PATH || path.join(stateDir(), "openclaw.json");
|
|
}
|
|
|
|
function agentDatabasePath(agentId = "main") {
|
|
return path.join(stateDir(), "agents", agentId, "agent", "openclaw-agent.sqlite");
|
|
}
|
|
|
|
function stateDatabasePath() {
|
|
return path.join(stateDir(), "state", "openclaw.sqlite");
|
|
}
|
|
|
|
function withSqliteDatabase(dbPath, callback) {
|
|
if (!fs.existsSync(dbPath)) {
|
|
throw new Error(`missing SQLite database: ${dbPath}`);
|
|
}
|
|
const db = new DatabaseSync(dbPath, { readOnly: true });
|
|
try {
|
|
return callback(db);
|
|
} finally {
|
|
db.close();
|
|
}
|
|
}
|
|
|
|
function readMainAgentTranscriptText() {
|
|
return withSqliteDatabase(agentDatabasePath("main"), (db) =>
|
|
db
|
|
.prepare("SELECT event_json FROM transcript_events ORDER BY session_id, seq")
|
|
.all()
|
|
.map((row) => String(row.event_json ?? ""))
|
|
.join("\n"),
|
|
);
|
|
}
|
|
|
|
function realPathMaybe(filePath) {
|
|
try {
|
|
return fs.realpathSync(filePath);
|
|
} catch {
|
|
return path.resolve(filePath);
|
|
}
|
|
}
|
|
|
|
function assertPathInside(parentPath, childPath, label) {
|
|
const parent = realPathMaybe(parentPath);
|
|
const child = realPathMaybe(childPath);
|
|
const relative = path.relative(parent, child);
|
|
if (relative.startsWith("..") || path.isAbsolute(relative)) {
|
|
throw new Error(`${label} resolved outside ${parentPath}: ${child}`);
|
|
}
|
|
}
|
|
|
|
function writeJson(file, value) {
|
|
fs.mkdirSync(path.dirname(file), { recursive: true });
|
|
fs.writeFileSync(file, `${JSON.stringify(value, null, 2)}\n`);
|
|
}
|
|
|
|
function installRecords() {
|
|
return withSqliteDatabase(stateDatabasePath(), (db) => {
|
|
const row = db
|
|
.prepare(
|
|
"SELECT install_records_json FROM installed_plugin_index WHERE index_key = 'current'",
|
|
)
|
|
.get();
|
|
if (!row?.install_records_json) {
|
|
return {};
|
|
}
|
|
return JSON.parse(String(row.install_records_json));
|
|
});
|
|
}
|
|
|
|
function pluginInstallPath() {
|
|
const pluginId = requireEnv("PLUGIN_ID");
|
|
const inspect = fs.existsSync("/tmp/openclaw-plugin-inspect.json")
|
|
? readJson("/tmp/openclaw-plugin-inspect.json")
|
|
: {};
|
|
const record = installRecords()[pluginId] || inspect.install;
|
|
if (!record) {
|
|
throw new Error(`missing ${pluginId} install record`);
|
|
}
|
|
if (record.source !== "npm" || record.artifactKind !== "npm-pack") {
|
|
throw new Error(`expected npm-pack install record: ${JSON.stringify(record)}`);
|
|
}
|
|
return String(record.installPath || "").replace(/^~(?=$|\/)/u, process.env.HOME);
|
|
}
|
|
|
|
function writeFixture() {
|
|
const dir = process.argv[3];
|
|
if (!dir) {
|
|
throw new Error("write-fixture requires output dir");
|
|
}
|
|
const pluginId = requireEnv("PLUGIN_ID");
|
|
const pluginName = requireEnv("PLUGIN_NAME");
|
|
const version = requireEnv("PLUGIN_VERSION");
|
|
const toolName = requireEnv("TOOL_NAME");
|
|
const seed = requireEnv("SEED");
|
|
writeJson(path.join(dir, "package.json"), {
|
|
name: pluginName,
|
|
version,
|
|
dependencies: { slugify: "^1.6.6" },
|
|
openclaw: { extensions: ["./index.js"] },
|
|
});
|
|
writeJson(path.join(dir, "openclaw.plugin.json"), {
|
|
id: pluginId,
|
|
name: "E2E Slug Tool",
|
|
description: "Docker E2E plugin tool fixture",
|
|
activation: { onStartup: true },
|
|
contracts: { tools: [toolName] },
|
|
configSchema: { type: "object", additionalProperties: false },
|
|
});
|
|
fs.writeFileSync(
|
|
path.join(dir, "index.js"),
|
|
`const slugify = require("slugify");\n` +
|
|
`const value = slugify(${JSON.stringify(seed)}, { lower: true, strict: true });\n` +
|
|
`module.exports = {\n` +
|
|
` id: ${JSON.stringify(pluginId)},\n` +
|
|
` name: "E2E Slug Tool",\n` +
|
|
` register(api) {\n` +
|
|
` api.registerTool({\n` +
|
|
` name: ${JSON.stringify(toolName)},\n` +
|
|
` description: "Return the hidden Docker E2E slug generated by the plugin dependency.",\n` +
|
|
` parameters: { type: "object", properties: {}, additionalProperties: false },\n` +
|
|
` async execute() {\n` +
|
|
` return { content: [{ type: "text", text: value }] };\n` +
|
|
` },\n` +
|
|
` });\n` +
|
|
` },\n` +
|
|
`};\n`,
|
|
);
|
|
}
|
|
|
|
function configure() {
|
|
const modelRef = requireEnv("MODEL_REF");
|
|
const pluginId = requireEnv("PLUGIN_ID");
|
|
const toolName = requireEnv("TOOL_NAME");
|
|
const cfgPath = configPath();
|
|
const cfg = fs.existsSync(cfgPath) ? readJson(cfgPath) : {};
|
|
const [providerId, modelId] = modelRef.split("/");
|
|
if (providerId !== "openai" || !modelId) {
|
|
throw new Error(`live plugin tool E2E expects an openai/* model, got ${modelRef}`);
|
|
}
|
|
cfg.plugins = {
|
|
...cfg.plugins,
|
|
enabled: true,
|
|
allow: Array.from(new Set([...(cfg.plugins?.allow || []), "openai", pluginId])).toSorted(
|
|
(left, right) => left.localeCompare(right),
|
|
),
|
|
entries: {
|
|
...cfg.plugins?.entries,
|
|
openai: { ...cfg.plugins?.entries?.openai, enabled: true },
|
|
[pluginId]: { ...cfg.plugins?.entries?.[pluginId], enabled: true },
|
|
},
|
|
};
|
|
cfg.tools = {
|
|
...cfg.tools,
|
|
allow: [toolName],
|
|
};
|
|
cfg.models = {
|
|
...cfg.models,
|
|
mode: "merge",
|
|
providers: {
|
|
...cfg.models?.providers,
|
|
openai: {
|
|
...cfg.models?.providers?.openai,
|
|
api: "openai-responses",
|
|
baseUrl: (process.env.OPENAI_BASE_URL || "https://api.openai.com/v1").trim(),
|
|
apiKey: { source: "env", provider: "default", id: "OPENAI_API_KEY" },
|
|
agentRuntime: { id: "pi" },
|
|
timeoutSeconds: agentTurnTimeoutSeconds,
|
|
models: [
|
|
{
|
|
id: modelId,
|
|
name: modelId,
|
|
api: "openai-responses",
|
|
reasoning: false,
|
|
input: ["text"],
|
|
cost: { input: 0, output: 0, cacheRead: 0, cacheWrite: 0 },
|
|
contextWindow: 128000,
|
|
contextTokens: 96000,
|
|
maxTokens: 512,
|
|
},
|
|
],
|
|
},
|
|
},
|
|
};
|
|
cfg.agents = {
|
|
...cfg.agents,
|
|
defaults: {
|
|
...cfg.agents?.defaults,
|
|
model: { primary: modelRef, fallbacks: [] },
|
|
models: {
|
|
...cfg.agents?.defaults?.models,
|
|
[modelRef]: {
|
|
...cfg.agents?.defaults?.models?.[modelRef],
|
|
agentRuntime: { id: "pi" },
|
|
params: { transport: "sse", openaiWsWarmup: false },
|
|
},
|
|
},
|
|
workspace: path.join(stateDir(), "workspace"),
|
|
skipBootstrap: true,
|
|
timeoutSeconds: agentTurnTimeoutSeconds,
|
|
},
|
|
};
|
|
writeJson(cfgPath, cfg);
|
|
}
|
|
|
|
function findDependencyPackageJson(packageName) {
|
|
const installPath = pluginInstallPath();
|
|
const npmRoot = path.join(stateDir(), "npm");
|
|
return [
|
|
path.join(installPath, "node_modules", packageName, "package.json"),
|
|
path.join(npmRoot, "node_modules", packageName, "package.json"),
|
|
].find((candidate) => fs.existsSync(candidate));
|
|
}
|
|
|
|
function assertInstalled() {
|
|
const pluginId = requireEnv("PLUGIN_ID");
|
|
const pluginName = requireEnv("PLUGIN_NAME");
|
|
const toolName = requireEnv("TOOL_NAME");
|
|
const npmRoot = path.join(stateDir(), "npm");
|
|
const installPath = pluginInstallPath();
|
|
assertPathInside(npmRoot, installPath, "fixture plugin install path");
|
|
const packageJson = path.join(installPath, "package.json");
|
|
if (!fs.existsSync(packageJson)) {
|
|
throw new Error(`missing fixture plugin package.json: ${packageJson}`);
|
|
}
|
|
const pkg = readJson(packageJson);
|
|
if (pkg.name !== pluginName) {
|
|
throw new Error(`unexpected fixture package name: ${pkg.name}`);
|
|
}
|
|
const slugifyPackageJson = findDependencyPackageJson("slugify");
|
|
if (!slugifyPackageJson) {
|
|
throw new Error("missing slugify dependency installed by npm-pack plugin install");
|
|
}
|
|
assertPathInside(npmRoot, slugifyPackageJson, "slugify dependency");
|
|
|
|
const list = readJson("/tmp/openclaw-plugins-list.json");
|
|
const plugin = (list.plugins || []).find((entry) => entry.id === pluginId);
|
|
if (!plugin || plugin.enabled !== true || plugin.status !== "loaded") {
|
|
throw new Error(`fixture plugin was not enabled+loaded: ${JSON.stringify(plugin)}`);
|
|
}
|
|
const inspect = readJson("/tmp/openclaw-plugin-inspect.json");
|
|
const toolNames = Array.isArray(inspect.tools)
|
|
? inspect.tools.flatMap((entry) => (Array.isArray(entry?.names) ? entry.names : []))
|
|
: [];
|
|
if (!toolNames.includes(toolName)) {
|
|
throw new Error(`fixture tool was not registered: ${JSON.stringify(inspect.tools)}`);
|
|
}
|
|
}
|
|
|
|
function assertAgentTurn() {
|
|
const expected = requireEnv("EXPECTED_SLUG");
|
|
const toolName = requireEnv("TOOL_NAME");
|
|
const stdout = fs.readFileSync("/tmp/openclaw-agent.json", "utf8");
|
|
const stderr = fs.existsSync("/tmp/openclaw-agent.err")
|
|
? fs.readFileSync("/tmp/openclaw-agent.err", "utf8")
|
|
: "";
|
|
const response = JSON.parse(stdout);
|
|
const text = (response.payloads || []).map((payload) => payload?.text || "").join("\n");
|
|
if (!text.includes(expected)) {
|
|
throw new Error(
|
|
`live agent reply did not contain tool slug ${expected}:\nstdout=${stdout}\nstderr=${stderr}`,
|
|
);
|
|
}
|
|
const transcript = readMainAgentTranscriptText();
|
|
if (!transcript.includes(toolName) || !transcript.includes(expected)) {
|
|
throw new Error(`SQLite session transcript did not show ${toolName} returning ${expected}`);
|
|
}
|
|
}
|
|
|
|
const commands = {
|
|
"write-fixture": writeFixture,
|
|
configure,
|
|
"assert-installed": assertInstalled,
|
|
"assert-agent-turn": assertAgentTurn,
|
|
};
|
|
|
|
const fn = commands[command];
|
|
if (!fn) {
|
|
throw new Error(`unknown live plugin tool assertion command: ${command}`);
|
|
}
|
|
fn();
|