Files
openclaw/scripts/e2e/lib/live-plugin-tool/assertions.mjs
Peter Steinberger f91de52f0d refactor: move runtime state to SQLite
* refactor: remove stale file-backed shims

* fix: harden sqlite state ci boundaries

* refactor: store matrix idb snapshots in sqlite

* fix: satisfy rebased CI guardrails

* refactor: store current conversation bindings in sqlite table

* refactor: store tui last sessions in sqlite table

* refactor: reset sqlite schema history

* refactor: drop unshipped sqlite table migration

* refactor: remove plugin index file rollback

* refactor: drop unshipped sqlite sidecar migrations

* refactor: remove runtime commitments kv migration

* refactor: preserve kysely sync result types

* refactor: drop unshipped sqlite schema migration table

* test: keep session usage coverage sqlite-backed

* refactor: keep sqlite migration doctor-only

* refactor: isolate device legacy imports

* refactor: isolate push voicewake legacy imports

* refactor: isolate remaining runtime legacy imports

* refactor: tighten sqlite migration guardrails

* test: cover sqlite persisted enum parsing

* refactor: isolate legacy update and tui imports

* refactor: tighten sqlite state ownership

* refactor: move legacy imports behind doctor

* refactor: remove legacy session row lookup

* refactor: canonicalize memory transcript locators

* refactor: drop transcript path scope fallbacks

* refactor: drop runtime legacy session delivery pruning

* refactor: store tts prefs only in sqlite

* refactor: remove cron store path runtime

* refactor: use cron sqlite store keys

* refactor: rename telegram message cache scope

* refactor: read memory dreaming status from sqlite

* refactor: rename cron status store key

* refactor: stop remembering transcript file paths

* test: use sqlite locators in agent fixtures

* refactor: remove file-shaped commitments and cron store surfaces

* refactor: keep compaction transcript handles out of session rows

* refactor: derive transcript handles from session identity

* refactor: derive runtime transcript handles

* refactor: remove gateway session locator reads

* refactor: remove transcript locator from session rows

* refactor: store raw stream diagnostics in sqlite

* refactor: remove file-shaped transcript rotation

* refactor: hide legacy trajectory paths from runtime

* refactor: remove runtime transcript file bridges

* refactor: repair database-first rebase fallout

* refactor: align tests with database-first state

* refactor: remove transcript file handoffs

* refactor: sync post-compaction memory by transcript scope

* refactor: run codex app-server sessions by id

* refactor: bind codex runtime state by session id

* refactor: pass memory transcripts by sqlite scope

* refactor: remove transcript locator cleanup leftovers

* test: remove stale transcript file fixtures

* refactor: remove transcript locator test helper

* test: make cron sqlite keys explicit

* test: remove cron runtime store paths

* test: remove stale session file fixtures

* test: use sqlite cron keys in diagnostics

* refactor: remove runtime delivery queue backfill

* test: drop fake export session file mocks

* refactor: rename acp session read failure flag

* refactor: rename acp row session key

* refactor: remove session store test seams

* refactor: move legacy session parser tests to doctor

* refactor: reindex managed memory in place

* refactor: drop stale session store wording

* refactor: rename session row helpers

* refactor: rename sqlite session entry modules

* refactor: remove transcript locator leftovers

* refactor: trim file-era audit wording

* refactor: clean managed media through sqlite

* fix: prefer explicit agent for exports

* fix: use prepared agent for session resets

* fix: canonicalize legacy codex binding import

* test: rename state cleanup helper

* docs: align backup docs with sqlite state

* refactor: drop legacy Pi usage auth fallback

* refactor: move legacy auth profile imports to doctor

* refactor: keep Pi model discovery auth in memory

* refactor: remove MSTeams legacy learning key fallback

* refactor: store model catalog config in sqlite

* refactor: use sqlite model catalog at runtime

* refactor: remove model json compatibility aliases

* refactor: store auth profiles in sqlite

* refactor: seed copied auth profiles in sqlite

* refactor: make auth profile runtime sqlite-addressed

* refactor: migrate hermes secrets into sqlite auth store

* refactor: move plugin install config migration to doctor

* refactor: rename plugin index audit checks

* test: drop auth file assumptions

* test: remove legacy transcript file assertions

* refactor: drop legacy cli session aliases

* refactor: store skill uploads in sqlite

* refactor: keep subagent attachments in sqlite vfs

* refactor: drop subagent attachment cleanup state

* refactor: move legacy session aliases to doctor

* refactor: require node 24 for sqlite state runtime

* refactor: move provider caches into sqlite state

* fix: harden virtual agent filesystem

* refactor: enforce database-first runtime state

* refactor: rename compaction transcript rotation setting

* test: clean sqlite refactor test types

* refactor: consolidate sqlite runtime state

* refactor: model session conversations in sqlite

* refactor: stop deriving cron delivery from session keys

* refactor: stop classifying sessions from key shape

* refactor: hydrate announce targets from typed delivery

* refactor: route heartbeat delivery from typed sqlite context

* refactor: tighten typed sqlite session routing

* refactor: remove session origin routing shadow

* refactor: drop session origin shadow fixtures

* perf: query sqlite vfs paths by prefix

* refactor: use typed conversation metadata for sessions

* refactor: prefer typed session routing metadata

* refactor: require typed session routing metadata

* refactor: resolve group tool policy from typed sessions

* refactor: delete dead session thread info bridge

* Show Codex subscription reset times in channel errors (#80456)

* feat(plugin-sdk): consolidate session workflow APIs

* fix(agents): allow read-only agent mount reads

* [codex] refresh plugin regression fixtures

* fix(agents): restore compaction gateway logs

* test: tighten gateway startup assertions

* Redact persisted secret-shaped payloads [AI] (#79006)

* test: tighten device pair notify assertions

* test: tighten hermes secret assertions

* test: assert matrix client error shapes

* test: assert config compat warnings

* fix(heartbeat): remap cron-run exec events to session keys (#80214)

* fix(codex): route btw through native side threads

* fix(auth): accept friendly OpenAI order for Codex profiles

* fix(codex): rotate auth profiles inside harness

* fix: keep browser status page probe within timeout

* test: assert agents add outputs

* test: pin cron read status

* fix(agents): avoid Pi resource discovery stalls

Co-authored-by: dataCenter430 <titan032000@gmail.com>

* fix: retire timed-out codex app-server clients

* test: tighten qa lab runtime assertions

* test: check security fix outputs

* test: verify extension runtime messages

* feat(wake): expose typed sessionKey on wake protocol + system event CLI

* fix(gateway): await session_end during shutdown drain and track channel + compaction lifecycle paths (#57790)

* test: guard talk consult call helper

* fix(codex): scale context engine projection (#80761)

* fix(codex): scale context engine projection

* fix: document Codex context projection scaling

* fix: document Codex context projection scaling

* fix: document Codex context projection scaling

* fix: document Codex context projection scaling

* chore: align Codex projection changelog

* chore: realign Codex projection changelog

* fix: isolate Codex projection patch

---------

Co-authored-by: Eva (agent) <eva+agent-78055@100yen.org>
Co-authored-by: Josh Lehman <josh@martian.engineering>

* refactor: move agent runtime state toward piless

* refactor: remove cron session reaper

* refactor: move session management to sqlite

* refactor: finish database-first state migration

* chore: refresh generated sqlite db types

* refactor: remove stale file-backed shims

* test: harden kysely type coverage

# Conflicts:
#	.agents/skills/kysely-database-access/SKILL.md
#	src/infra/kysely-sync.types.test.ts
#	src/proxy-capture/store.sqlite.test.ts
#	src/state/openclaw-agent-db.test.ts
#	src/state/openclaw-state-db.test.ts

* refactor: remove cron store path runtime

* refactor: keep compaction transcript handles out of session rows

* refactor: derive embedded transcripts from sqlite identity

* refactor: remove embedded transcript locator handoff

* refactor: remove runtime transcript file bridges

* refactor: remove transcript file handoffs

* refactor: remove MSTeams legacy learning key fallback

* refactor: store model catalog config in sqlite

* refactor: use sqlite model catalog at runtime

# Conflicts:
#	docs/cli/secrets.md
#	docs/gateway/authentication.md
#	docs/gateway/secrets.md

* fix: keep oauth sibling sync sqlite-local

# Conflicts:
#	src/commands/onboard-auth.test.ts

* refactor: remove task session store maintenance

# Conflicts:
#	src/commands/tasks.ts

* refactor: keep diagnostics in state sqlite

* refactor: enforce database-first runtime state

* refactor: consolidate sqlite runtime state

* Show Codex subscription reset times in channel errors (#80456)

* fix(codex): refresh subscription limit resets

* fix(codex): format reset times for channels

* Update CHANGELOG with latest changes and fixes

Updated CHANGELOG with recent fixes and improvements.

* fix(codex): keep command load failures on codex surface

* fix(codex): format account rate limits as rows

* fix(codex): summarize account limits as usage status

* fix(codex): simplify account limit status

* test: tighten subagent announce queue assertion

* test: tighten session delete lifecycle assertions

* test: tighten cron ops assertions

* fix: track cron execution milestones

* test: tighten hermes secret assertions

* test: assert matrix sync store payloads

* test: assert config compat warnings

* fix(codex): align btw side thread semantics

* fix(codex): honor codex fallback blocking

* fix(agents): avoid Pi resource discovery stalls

* test: tighten codex event assertions

* test: tighten cron assertions

* Fix Codex app-server OAuth harness auth

* refactor: move agent runtime state toward piless

* refactor: move device and push state to sqlite

* refactor: move runtime json state imports to doctor

* refactor: finish database-first state migration

* chore: refresh generated sqlite db types

* refactor: clarify cron sqlite store keys

* refactor: remove stale file-backed shims

* refactor: bind codex runtime state by session id

* test: expect sqlite trajectory branch export

* refactor: rename session row helpers

* fix: keep legacy device identity import in doctor

* refactor: enforce database-first runtime state

* refactor: consolidate sqlite runtime state

* build: align pi contract wrappers

* chore: repair database-first rebase

* refactor: remove session file test contracts

* test: update gateway session expectations

* refactor: stop routing from session compatibility shadows

* refactor: stop persisting session route shadows

* refactor: use typed delivery context in clients

* refactor: stop echoing session route shadows

* refactor: repair embedded runner rebase imports

# Conflicts:
#	src/agents/pi-embedded-runner/run/attempt.tool-call-argument-repair.ts

* refactor: align pi contract imports

* refactor: satisfy kysely sync helper guard

* refactor: remove file transcript bridge remnants

* refactor: remove session locator compatibility

* refactor: remove session file test contracts

* refactor: keep rebase database-first clean

* refactor: remove session file assumptions from e2e

* docs: clarify database-first goal state

* test: remove legacy store markers from sqlite runtime tests

* refactor: remove legacy store assumptions from runtime seams

* refactor: align sqlite runtime helper seams

* test: update memory recall sqlite audit mock

* refactor: align database-first runtime type seams

* test: clarify doctor cron legacy store names

* fix: preserve sqlite session route projections

* test: fix copilot token cache test syntax

* docs: update database-first proof status

* test: align database-first test fixtures

* docs: update database-first proof status

* refactor: clean extension database-first drift

* test: align agent session route proof

* test: clarify doctor legacy path fixtures

* chore: clean database-first changed checks

* chore: repair database-first rebase markers

* build: allow baileys git subdependency

* chore: repair exp-vfs rebase drift

* chore: finish exp-vfs rebase cleanup

* chore: satisfy rebase lint drift

* chore: fix qqbot rebase type seam

* chore: fix rebase drift leftovers

* fix: keep auth profile oauth secrets out of sqlite

* fix: repair rebase drift tests

* test: stabilize pairing request ordering

* test: use source manifests in plugin contract checks

* fix: restore gateway session metadata after rebase

* fix: repair database-first rebase drift

* fix: clean up database-first rebase fallout

* test: stabilize line quick reply receipt time

* fix: repair extension rebase drift

* test: keep transcript redaction tests sqlite-backed

* fix: carry injected transcript redaction through sqlite

* chore: clean database branch rebase residue

* fix: repair database branch CI drift

* fix: repair database branch CI guard drift

* fix: stabilize oauth tls preflight test

* test: align database branch fast guards

* test: repair build artifact boundary guards

* chore: clean changelog rebase markers

---------

Co-authored-by: pashpashpash <nik@vault77.ai>
Co-authored-by: Eva <eva@100yen.org>
Co-authored-by: stainlu <stainlu@newtype-ai.org>
Co-authored-by: Jason Zhou <jason.zhou.design@gmail.com>
Co-authored-by: Ruben Cuevas <hi@rubencu.com>
Co-authored-by: Pavan Kumar Gondhi <pavangondhi@gmail.com>
Co-authored-by: Shakker <shakkerdroid@gmail.com>
Co-authored-by: Kaspre <36520309+Kaspre@users.noreply.github.com>
Co-authored-by: dataCenter430 <titan032000@gmail.com>
Co-authored-by: Kaspre <kaspre@gmail.com>
Co-authored-by: pandadev66 <nova.full.stack@outlook.com>
Co-authored-by: Eva <admin@100yen.org>
Co-authored-by: Eva (agent) <eva+agent-78055@100yen.org>
Co-authored-by: Josh Lehman <josh@martian.engineering>
Co-authored-by: jeffjhunter <support@aipersonamethod.com>
2026-05-13 13:15:12 +01:00

305 lines
9.8 KiB
JavaScript

import fs from "node:fs";
import path from "node:path";
import { DatabaseSync } from "node:sqlite";
const command = process.argv[2];
const readJson = (file) => JSON.parse(fs.readFileSync(file, "utf8"));
const agentTurnTimeoutSeconds = Number.parseInt(
process.env.OPENCLAW_LIVE_PLUGIN_TOOL_TIMEOUT_SECONDS ?? "300",
10,
);
function requireEnv(name) {
const value = process.env[name];
if (!value) {
throw new Error(`missing ${name}`);
}
return value;
}
function stateDir() {
return process.env.OPENCLAW_STATE_DIR || path.join(process.env.HOME, ".openclaw");
}
function configPath() {
return process.env.OPENCLAW_CONFIG_PATH || path.join(stateDir(), "openclaw.json");
}
function agentDatabasePath(agentId = "main") {
return path.join(stateDir(), "agents", agentId, "agent", "openclaw-agent.sqlite");
}
function stateDatabasePath() {
return path.join(stateDir(), "state", "openclaw.sqlite");
}
function withSqliteDatabase(dbPath, callback) {
if (!fs.existsSync(dbPath)) {
throw new Error(`missing SQLite database: ${dbPath}`);
}
const db = new DatabaseSync(dbPath, { readOnly: true });
try {
return callback(db);
} finally {
db.close();
}
}
function readMainAgentTranscriptText() {
return withSqliteDatabase(agentDatabasePath("main"), (db) =>
db
.prepare("SELECT event_json FROM transcript_events ORDER BY session_id, seq")
.all()
.map((row) => String(row.event_json ?? ""))
.join("\n"),
);
}
function realPathMaybe(filePath) {
try {
return fs.realpathSync(filePath);
} catch {
return path.resolve(filePath);
}
}
function assertPathInside(parentPath, childPath, label) {
const parent = realPathMaybe(parentPath);
const child = realPathMaybe(childPath);
const relative = path.relative(parent, child);
if (relative.startsWith("..") || path.isAbsolute(relative)) {
throw new Error(`${label} resolved outside ${parentPath}: ${child}`);
}
}
function writeJson(file, value) {
fs.mkdirSync(path.dirname(file), { recursive: true });
fs.writeFileSync(file, `${JSON.stringify(value, null, 2)}\n`);
}
function installRecords() {
return withSqliteDatabase(stateDatabasePath(), (db) => {
const row = db
.prepare(
"SELECT install_records_json FROM installed_plugin_index WHERE index_key = 'current'",
)
.get();
if (!row?.install_records_json) {
return {};
}
return JSON.parse(String(row.install_records_json));
});
}
function pluginInstallPath() {
const pluginId = requireEnv("PLUGIN_ID");
const inspect = fs.existsSync("/tmp/openclaw-plugin-inspect.json")
? readJson("/tmp/openclaw-plugin-inspect.json")
: {};
const record = installRecords()[pluginId] || inspect.install;
if (!record) {
throw new Error(`missing ${pluginId} install record`);
}
if (record.source !== "npm" || record.artifactKind !== "npm-pack") {
throw new Error(`expected npm-pack install record: ${JSON.stringify(record)}`);
}
return String(record.installPath || "").replace(/^~(?=$|\/)/u, process.env.HOME);
}
function writeFixture() {
const dir = process.argv[3];
if (!dir) {
throw new Error("write-fixture requires output dir");
}
const pluginId = requireEnv("PLUGIN_ID");
const pluginName = requireEnv("PLUGIN_NAME");
const version = requireEnv("PLUGIN_VERSION");
const toolName = requireEnv("TOOL_NAME");
const seed = requireEnv("SEED");
writeJson(path.join(dir, "package.json"), {
name: pluginName,
version,
dependencies: { slugify: "^1.6.6" },
openclaw: { extensions: ["./index.js"] },
});
writeJson(path.join(dir, "openclaw.plugin.json"), {
id: pluginId,
name: "E2E Slug Tool",
description: "Docker E2E plugin tool fixture",
activation: { onStartup: true },
contracts: { tools: [toolName] },
configSchema: { type: "object", additionalProperties: false },
});
fs.writeFileSync(
path.join(dir, "index.js"),
`const slugify = require("slugify");\n` +
`const value = slugify(${JSON.stringify(seed)}, { lower: true, strict: true });\n` +
`module.exports = {\n` +
` id: ${JSON.stringify(pluginId)},\n` +
` name: "E2E Slug Tool",\n` +
` register(api) {\n` +
` api.registerTool({\n` +
` name: ${JSON.stringify(toolName)},\n` +
` description: "Return the hidden Docker E2E slug generated by the plugin dependency.",\n` +
` parameters: { type: "object", properties: {}, additionalProperties: false },\n` +
` async execute() {\n` +
` return { content: [{ type: "text", text: value }] };\n` +
` },\n` +
` });\n` +
` },\n` +
`};\n`,
);
}
function configure() {
const modelRef = requireEnv("MODEL_REF");
const pluginId = requireEnv("PLUGIN_ID");
const toolName = requireEnv("TOOL_NAME");
const cfgPath = configPath();
const cfg = fs.existsSync(cfgPath) ? readJson(cfgPath) : {};
const [providerId, modelId] = modelRef.split("/");
if (providerId !== "openai" || !modelId) {
throw new Error(`live plugin tool E2E expects an openai/* model, got ${modelRef}`);
}
cfg.plugins = {
...cfg.plugins,
enabled: true,
allow: Array.from(new Set([...(cfg.plugins?.allow || []), "openai", pluginId])).toSorted(
(left, right) => left.localeCompare(right),
),
entries: {
...cfg.plugins?.entries,
openai: { ...cfg.plugins?.entries?.openai, enabled: true },
[pluginId]: { ...cfg.plugins?.entries?.[pluginId], enabled: true },
},
};
cfg.tools = {
...cfg.tools,
allow: [toolName],
};
cfg.models = {
...cfg.models,
mode: "merge",
providers: {
...cfg.models?.providers,
openai: {
...cfg.models?.providers?.openai,
api: "openai-responses",
baseUrl: (process.env.OPENAI_BASE_URL || "https://api.openai.com/v1").trim(),
apiKey: { source: "env", provider: "default", id: "OPENAI_API_KEY" },
agentRuntime: { id: "pi" },
timeoutSeconds: agentTurnTimeoutSeconds,
models: [
{
id: modelId,
name: modelId,
api: "openai-responses",
reasoning: false,
input: ["text"],
cost: { input: 0, output: 0, cacheRead: 0, cacheWrite: 0 },
contextWindow: 128000,
contextTokens: 96000,
maxTokens: 512,
},
],
},
},
};
cfg.agents = {
...cfg.agents,
defaults: {
...cfg.agents?.defaults,
model: { primary: modelRef, fallbacks: [] },
models: {
...cfg.agents?.defaults?.models,
[modelRef]: {
...cfg.agents?.defaults?.models?.[modelRef],
agentRuntime: { id: "pi" },
params: { transport: "sse", openaiWsWarmup: false },
},
},
workspace: path.join(stateDir(), "workspace"),
skipBootstrap: true,
timeoutSeconds: agentTurnTimeoutSeconds,
},
};
writeJson(cfgPath, cfg);
}
function findDependencyPackageJson(packageName) {
const installPath = pluginInstallPath();
const npmRoot = path.join(stateDir(), "npm");
return [
path.join(installPath, "node_modules", packageName, "package.json"),
path.join(npmRoot, "node_modules", packageName, "package.json"),
].find((candidate) => fs.existsSync(candidate));
}
function assertInstalled() {
const pluginId = requireEnv("PLUGIN_ID");
const pluginName = requireEnv("PLUGIN_NAME");
const toolName = requireEnv("TOOL_NAME");
const npmRoot = path.join(stateDir(), "npm");
const installPath = pluginInstallPath();
assertPathInside(npmRoot, installPath, "fixture plugin install path");
const packageJson = path.join(installPath, "package.json");
if (!fs.existsSync(packageJson)) {
throw new Error(`missing fixture plugin package.json: ${packageJson}`);
}
const pkg = readJson(packageJson);
if (pkg.name !== pluginName) {
throw new Error(`unexpected fixture package name: ${pkg.name}`);
}
const slugifyPackageJson = findDependencyPackageJson("slugify");
if (!slugifyPackageJson) {
throw new Error("missing slugify dependency installed by npm-pack plugin install");
}
assertPathInside(npmRoot, slugifyPackageJson, "slugify dependency");
const list = readJson("/tmp/openclaw-plugins-list.json");
const plugin = (list.plugins || []).find((entry) => entry.id === pluginId);
if (!plugin || plugin.enabled !== true || plugin.status !== "loaded") {
throw new Error(`fixture plugin was not enabled+loaded: ${JSON.stringify(plugin)}`);
}
const inspect = readJson("/tmp/openclaw-plugin-inspect.json");
const toolNames = Array.isArray(inspect.tools)
? inspect.tools.flatMap((entry) => (Array.isArray(entry?.names) ? entry.names : []))
: [];
if (!toolNames.includes(toolName)) {
throw new Error(`fixture tool was not registered: ${JSON.stringify(inspect.tools)}`);
}
}
function assertAgentTurn() {
const expected = requireEnv("EXPECTED_SLUG");
const toolName = requireEnv("TOOL_NAME");
const stdout = fs.readFileSync("/tmp/openclaw-agent.json", "utf8");
const stderr = fs.existsSync("/tmp/openclaw-agent.err")
? fs.readFileSync("/tmp/openclaw-agent.err", "utf8")
: "";
const response = JSON.parse(stdout);
const text = (response.payloads || []).map((payload) => payload?.text || "").join("\n");
if (!text.includes(expected)) {
throw new Error(
`live agent reply did not contain tool slug ${expected}:\nstdout=${stdout}\nstderr=${stderr}`,
);
}
const transcript = readMainAgentTranscriptText();
if (!transcript.includes(toolName) || !transcript.includes(expected)) {
throw new Error(`SQLite session transcript did not show ${toolName} returning ${expected}`);
}
}
const commands = {
"write-fixture": writeFixture,
configure,
"assert-installed": assertInstalled,
"assert-agent-turn": assertAgentTurn,
};
const fn = commands[command];
if (!fn) {
throw new Error(`unknown live plugin tool assertion command: ${command}`);
}
fn();