mirror of
https://github.com/openclaw/openclaw.git
synced 2026-05-18 20:24:46 +00:00
* refactor: remove stale file-backed shims * fix: harden sqlite state ci boundaries * refactor: store matrix idb snapshots in sqlite * fix: satisfy rebased CI guardrails * refactor: store current conversation bindings in sqlite table * refactor: store tui last sessions in sqlite table * refactor: reset sqlite schema history * refactor: drop unshipped sqlite table migration * refactor: remove plugin index file rollback * refactor: drop unshipped sqlite sidecar migrations * refactor: remove runtime commitments kv migration * refactor: preserve kysely sync result types * refactor: drop unshipped sqlite schema migration table * test: keep session usage coverage sqlite-backed * refactor: keep sqlite migration doctor-only * refactor: isolate device legacy imports * refactor: isolate push voicewake legacy imports * refactor: isolate remaining runtime legacy imports * refactor: tighten sqlite migration guardrails * test: cover sqlite persisted enum parsing * refactor: isolate legacy update and tui imports * refactor: tighten sqlite state ownership * refactor: move legacy imports behind doctor * refactor: remove legacy session row lookup * refactor: canonicalize memory transcript locators * refactor: drop transcript path scope fallbacks * refactor: drop runtime legacy session delivery pruning * refactor: store tts prefs only in sqlite * refactor: remove cron store path runtime * refactor: use cron sqlite store keys * refactor: rename telegram message cache scope * refactor: read memory dreaming status from sqlite * refactor: rename cron status store key * refactor: stop remembering transcript file paths * test: use sqlite locators in agent fixtures * refactor: remove file-shaped commitments and cron store surfaces * refactor: keep compaction transcript handles out of session rows * refactor: derive transcript handles from session identity * refactor: derive runtime transcript handles * refactor: remove gateway session locator reads * refactor: remove transcript locator from session rows * refactor: store raw stream diagnostics in sqlite * refactor: remove file-shaped transcript rotation * refactor: hide legacy trajectory paths from runtime * refactor: remove runtime transcript file bridges * refactor: repair database-first rebase fallout * refactor: align tests with database-first state * refactor: remove transcript file handoffs * refactor: sync post-compaction memory by transcript scope * refactor: run codex app-server sessions by id * refactor: bind codex runtime state by session id * refactor: pass memory transcripts by sqlite scope * refactor: remove transcript locator cleanup leftovers * test: remove stale transcript file fixtures * refactor: remove transcript locator test helper * test: make cron sqlite keys explicit * test: remove cron runtime store paths * test: remove stale session file fixtures * test: use sqlite cron keys in diagnostics * refactor: remove runtime delivery queue backfill * test: drop fake export session file mocks * refactor: rename acp session read failure flag * refactor: rename acp row session key * refactor: remove session store test seams * refactor: move legacy session parser tests to doctor * refactor: reindex managed memory in place * refactor: drop stale session store wording * refactor: rename session row helpers * refactor: rename sqlite session entry modules * refactor: remove transcript locator leftovers * refactor: trim file-era audit wording * refactor: clean managed media through sqlite * fix: prefer explicit agent for exports * fix: use prepared agent for session resets * fix: canonicalize legacy codex binding import * test: rename state cleanup helper * docs: align backup docs with sqlite state * refactor: drop legacy Pi usage auth fallback * refactor: move legacy auth profile imports to doctor * refactor: keep Pi model discovery auth in memory * refactor: remove MSTeams legacy learning key fallback * refactor: store model catalog config in sqlite * refactor: use sqlite model catalog at runtime * refactor: remove model json compatibility aliases * refactor: store auth profiles in sqlite * refactor: seed copied auth profiles in sqlite * refactor: make auth profile runtime sqlite-addressed * refactor: migrate hermes secrets into sqlite auth store * refactor: move plugin install config migration to doctor * refactor: rename plugin index audit checks * test: drop auth file assumptions * test: remove legacy transcript file assertions * refactor: drop legacy cli session aliases * refactor: store skill uploads in sqlite * refactor: keep subagent attachments in sqlite vfs * refactor: drop subagent attachment cleanup state * refactor: move legacy session aliases to doctor * refactor: require node 24 for sqlite state runtime * refactor: move provider caches into sqlite state * fix: harden virtual agent filesystem * refactor: enforce database-first runtime state * refactor: rename compaction transcript rotation setting * test: clean sqlite refactor test types * refactor: consolidate sqlite runtime state * refactor: model session conversations in sqlite * refactor: stop deriving cron delivery from session keys * refactor: stop classifying sessions from key shape * refactor: hydrate announce targets from typed delivery * refactor: route heartbeat delivery from typed sqlite context * refactor: tighten typed sqlite session routing * refactor: remove session origin routing shadow * refactor: drop session origin shadow fixtures * perf: query sqlite vfs paths by prefix * refactor: use typed conversation metadata for sessions * refactor: prefer typed session routing metadata * refactor: require typed session routing metadata * refactor: resolve group tool policy from typed sessions * refactor: delete dead session thread info bridge * Show Codex subscription reset times in channel errors (#80456) * feat(plugin-sdk): consolidate session workflow APIs * fix(agents): allow read-only agent mount reads * [codex] refresh plugin regression fixtures * fix(agents): restore compaction gateway logs * test: tighten gateway startup assertions * Redact persisted secret-shaped payloads [AI] (#79006) * test: tighten device pair notify assertions * test: tighten hermes secret assertions * test: assert matrix client error shapes * test: assert config compat warnings * fix(heartbeat): remap cron-run exec events to session keys (#80214) * fix(codex): route btw through native side threads * fix(auth): accept friendly OpenAI order for Codex profiles * fix(codex): rotate auth profiles inside harness * fix: keep browser status page probe within timeout * test: assert agents add outputs * test: pin cron read status * fix(agents): avoid Pi resource discovery stalls Co-authored-by: dataCenter430 <titan032000@gmail.com> * fix: retire timed-out codex app-server clients * test: tighten qa lab runtime assertions * test: check security fix outputs * test: verify extension runtime messages * feat(wake): expose typed sessionKey on wake protocol + system event CLI * fix(gateway): await session_end during shutdown drain and track channel + compaction lifecycle paths (#57790) * test: guard talk consult call helper * fix(codex): scale context engine projection (#80761) * fix(codex): scale context engine projection * fix: document Codex context projection scaling * fix: document Codex context projection scaling * fix: document Codex context projection scaling * fix: document Codex context projection scaling * chore: align Codex projection changelog * chore: realign Codex projection changelog * fix: isolate Codex projection patch --------- Co-authored-by: Eva (agent) <eva+agent-78055@100yen.org> Co-authored-by: Josh Lehman <josh@martian.engineering> * refactor: move agent runtime state toward piless * refactor: remove cron session reaper * refactor: move session management to sqlite * refactor: finish database-first state migration * chore: refresh generated sqlite db types * refactor: remove stale file-backed shims * test: harden kysely type coverage # Conflicts: # .agents/skills/kysely-database-access/SKILL.md # src/infra/kysely-sync.types.test.ts # src/proxy-capture/store.sqlite.test.ts # src/state/openclaw-agent-db.test.ts # src/state/openclaw-state-db.test.ts * refactor: remove cron store path runtime * refactor: keep compaction transcript handles out of session rows * refactor: derive embedded transcripts from sqlite identity * refactor: remove embedded transcript locator handoff * refactor: remove runtime transcript file bridges * refactor: remove transcript file handoffs * refactor: remove MSTeams legacy learning key fallback * refactor: store model catalog config in sqlite * refactor: use sqlite model catalog at runtime # Conflicts: # docs/cli/secrets.md # docs/gateway/authentication.md # docs/gateway/secrets.md * fix: keep oauth sibling sync sqlite-local # Conflicts: # src/commands/onboard-auth.test.ts * refactor: remove task session store maintenance # Conflicts: # src/commands/tasks.ts * refactor: keep diagnostics in state sqlite * refactor: enforce database-first runtime state * refactor: consolidate sqlite runtime state * Show Codex subscription reset times in channel errors (#80456) * fix(codex): refresh subscription limit resets * fix(codex): format reset times for channels * Update CHANGELOG with latest changes and fixes Updated CHANGELOG with recent fixes and improvements. * fix(codex): keep command load failures on codex surface * fix(codex): format account rate limits as rows * fix(codex): summarize account limits as usage status * fix(codex): simplify account limit status * test: tighten subagent announce queue assertion * test: tighten session delete lifecycle assertions * test: tighten cron ops assertions * fix: track cron execution milestones * test: tighten hermes secret assertions * test: assert matrix sync store payloads * test: assert config compat warnings * fix(codex): align btw side thread semantics * fix(codex): honor codex fallback blocking * fix(agents): avoid Pi resource discovery stalls * test: tighten codex event assertions * test: tighten cron assertions * Fix Codex app-server OAuth harness auth * refactor: move agent runtime state toward piless * refactor: move device and push state to sqlite * refactor: move runtime json state imports to doctor * refactor: finish database-first state migration * chore: refresh generated sqlite db types * refactor: clarify cron sqlite store keys * refactor: remove stale file-backed shims * refactor: bind codex runtime state by session id * test: expect sqlite trajectory branch export * refactor: rename session row helpers * fix: keep legacy device identity import in doctor * refactor: enforce database-first runtime state * refactor: consolidate sqlite runtime state * build: align pi contract wrappers * chore: repair database-first rebase * refactor: remove session file test contracts * test: update gateway session expectations * refactor: stop routing from session compatibility shadows * refactor: stop persisting session route shadows * refactor: use typed delivery context in clients * refactor: stop echoing session route shadows * refactor: repair embedded runner rebase imports # Conflicts: # src/agents/pi-embedded-runner/run/attempt.tool-call-argument-repair.ts * refactor: align pi contract imports * refactor: satisfy kysely sync helper guard * refactor: remove file transcript bridge remnants * refactor: remove session locator compatibility * refactor: remove session file test contracts * refactor: keep rebase database-first clean * refactor: remove session file assumptions from e2e * docs: clarify database-first goal state * test: remove legacy store markers from sqlite runtime tests * refactor: remove legacy store assumptions from runtime seams * refactor: align sqlite runtime helper seams * test: update memory recall sqlite audit mock * refactor: align database-first runtime type seams * test: clarify doctor cron legacy store names * fix: preserve sqlite session route projections * test: fix copilot token cache test syntax * docs: update database-first proof status * test: align database-first test fixtures * docs: update database-first proof status * refactor: clean extension database-first drift * test: align agent session route proof * test: clarify doctor legacy path fixtures * chore: clean database-first changed checks * chore: repair database-first rebase markers * build: allow baileys git subdependency * chore: repair exp-vfs rebase drift * chore: finish exp-vfs rebase cleanup * chore: satisfy rebase lint drift * chore: fix qqbot rebase type seam * chore: fix rebase drift leftovers * fix: keep auth profile oauth secrets out of sqlite * fix: repair rebase drift tests * test: stabilize pairing request ordering * test: use source manifests in plugin contract checks * fix: restore gateway session metadata after rebase * fix: repair database-first rebase drift * fix: clean up database-first rebase fallout * test: stabilize line quick reply receipt time * fix: repair extension rebase drift * test: keep transcript redaction tests sqlite-backed * fix: carry injected transcript redaction through sqlite * chore: clean database branch rebase residue * fix: repair database branch CI drift * fix: repair database branch CI guard drift * fix: stabilize oauth tls preflight test * test: align database branch fast guards * test: repair build artifact boundary guards * chore: clean changelog rebase markers --------- Co-authored-by: pashpashpash <nik@vault77.ai> Co-authored-by: Eva <eva@100yen.org> Co-authored-by: stainlu <stainlu@newtype-ai.org> Co-authored-by: Jason Zhou <jason.zhou.design@gmail.com> Co-authored-by: Ruben Cuevas <hi@rubencu.com> Co-authored-by: Pavan Kumar Gondhi <pavangondhi@gmail.com> Co-authored-by: Shakker <shakkerdroid@gmail.com> Co-authored-by: Kaspre <36520309+Kaspre@users.noreply.github.com> Co-authored-by: dataCenter430 <titan032000@gmail.com> Co-authored-by: Kaspre <kaspre@gmail.com> Co-authored-by: pandadev66 <nova.full.stack@outlook.com> Co-authored-by: Eva <admin@100yen.org> Co-authored-by: Eva (agent) <eva+agent-78055@100yen.org> Co-authored-by: Josh Lehman <josh@martian.engineering> Co-authored-by: jeffjhunter <support@aipersonamethod.com>
621 lines
19 KiB
TypeScript
621 lines
19 KiB
TypeScript
import fs from "node:fs/promises";
|
|
import os from "node:os";
|
|
import path from "node:path";
|
|
import {
|
|
clearRuntimeAuthProfileStoreSnapshots,
|
|
ensureAuthProfileStore,
|
|
saveAuthProfileStore,
|
|
} from "openclaw/plugin-sdk/agent-runtime";
|
|
import type {
|
|
OpenClawConfig,
|
|
OpenClawPluginApi,
|
|
ProviderAuthResult,
|
|
ProviderCatalogResult,
|
|
UnifiedModelCatalogEntry,
|
|
} from "openclaw/plugin-sdk/plugin-entry";
|
|
import { createTestPluginApi } from "openclaw/plugin-sdk/plugin-test-api";
|
|
import { afterAll, afterEach, describe, expect, it, vi } from "vitest";
|
|
|
|
const mocks = vi.hoisted(() => ({
|
|
githubCopilotLoginCommand: vi.fn(),
|
|
resolveCopilotApiToken: vi.fn(),
|
|
}));
|
|
|
|
vi.mock("./register.runtime.js", () => ({
|
|
DEFAULT_COPILOT_API_BASE_URL: "https://api.githubcopilot.test",
|
|
resolveCopilotApiToken: mocks.resolveCopilotApiToken,
|
|
githubCopilotLoginCommand: mocks.githubCopilotLoginCommand,
|
|
fetchCopilotUsage: vi.fn(),
|
|
}));
|
|
|
|
import plugin from "./index.js";
|
|
|
|
const tempDirs: string[] = [];
|
|
type RegisteredMemoryEmbeddingProvider = Parameters<
|
|
OpenClawPluginApi["registerMemoryEmbeddingProvider"]
|
|
>[0];
|
|
type GithubCopilotTestProvider = {
|
|
auth: Array<{
|
|
run: (ctx: unknown) => Promise<ProviderAuthResult | null>;
|
|
runNonInteractive: (ctx: unknown) => Promise<OpenClawConfig | null>;
|
|
}>;
|
|
catalog: {
|
|
run: (ctx: unknown) => Promise<ProviderCatalogResult>;
|
|
};
|
|
};
|
|
type GithubCopilotTestModelCatalogProvider = {
|
|
liveCatalog: (ctx: unknown) => Promise<readonly UnifiedModelCatalogEntry[] | null | undefined>;
|
|
};
|
|
|
|
afterEach(async () => {
|
|
vi.clearAllMocks();
|
|
vi.unstubAllGlobals();
|
|
clearRuntimeAuthProfileStoreSnapshots();
|
|
await Promise.all(tempDirs.splice(0).map((dir) => fs.rm(dir, { recursive: true, force: true })));
|
|
});
|
|
|
|
afterAll(() => {
|
|
vi.doUnmock("./register.runtime.js");
|
|
vi.resetModules();
|
|
});
|
|
|
|
async function createAgentDir() {
|
|
const dir = await fs.mkdtemp(path.join(os.tmpdir(), "openclaw-github-copilot-test-"));
|
|
tempDirs.push(dir);
|
|
return dir;
|
|
}
|
|
|
|
function seedGithubCopilotTokenProfile(agentDir: string, token = "existing-token") {
|
|
saveAuthProfileStore(
|
|
{
|
|
version: 1,
|
|
profiles: {
|
|
"github-copilot:github": {
|
|
type: "token",
|
|
provider: "github-copilot",
|
|
token,
|
|
},
|
|
},
|
|
},
|
|
agentDir,
|
|
);
|
|
}
|
|
|
|
function _registerProvider() {
|
|
return registerProviderWithPluginConfig({});
|
|
}
|
|
|
|
function requireFirstMockArg<T>(
|
|
mock: { mock: { calls: Array<[T, ...unknown[]]> } },
|
|
label: string,
|
|
) {
|
|
const [call] = mock.mock.calls;
|
|
if (!call) {
|
|
throw new Error(`Expected ${label}`);
|
|
}
|
|
return call[0];
|
|
}
|
|
|
|
function registerProviderAndCatalogWithPluginConfig(pluginConfig: Record<string, unknown>) {
|
|
const registerProviderMock = vi.fn<OpenClawPluginApi["registerProvider"]>();
|
|
const registerModelCatalogProviderMock =
|
|
vi.fn<OpenClawPluginApi["registerModelCatalogProvider"]>();
|
|
|
|
plugin.register(
|
|
createTestPluginApi({
|
|
id: "github-copilot",
|
|
name: "GitHub Copilot",
|
|
source: "test",
|
|
config: {},
|
|
pluginConfig,
|
|
runtime: {} as never,
|
|
registerProvider: registerProviderMock,
|
|
registerModelCatalogProvider: registerModelCatalogProviderMock,
|
|
}),
|
|
);
|
|
|
|
expect(registerProviderMock).toHaveBeenCalledTimes(1);
|
|
expect(registerModelCatalogProviderMock).toHaveBeenCalledTimes(1);
|
|
return {
|
|
provider: requireFirstMockArg(
|
|
registerProviderMock,
|
|
"provider registration",
|
|
) as GithubCopilotTestProvider,
|
|
modelCatalogProvider: requireFirstMockArg(
|
|
registerModelCatalogProviderMock,
|
|
"model catalog provider registration",
|
|
) as GithubCopilotTestModelCatalogProvider,
|
|
};
|
|
}
|
|
|
|
function registerProviderWithPluginConfig(pluginConfig: Record<string, unknown>) {
|
|
return registerProviderAndCatalogWithPluginConfig(pluginConfig).provider;
|
|
}
|
|
|
|
describe("github-copilot plugin", () => {
|
|
it("registers embedding provider", () => {
|
|
const registerMemoryEmbeddingProviderMock =
|
|
vi.fn<OpenClawPluginApi["registerMemoryEmbeddingProvider"]>();
|
|
|
|
plugin.register(
|
|
createTestPluginApi({
|
|
id: "github-copilot",
|
|
name: "GitHub Copilot",
|
|
source: "test",
|
|
config: {},
|
|
pluginConfig: {},
|
|
runtime: {} as never,
|
|
registerProvider: vi.fn(),
|
|
registerMemoryEmbeddingProvider: registerMemoryEmbeddingProviderMock,
|
|
}),
|
|
);
|
|
|
|
expect(registerMemoryEmbeddingProviderMock).toHaveBeenCalledTimes(1);
|
|
const adapter = requireFirstMockArg<RegisteredMemoryEmbeddingProvider>(
|
|
registerMemoryEmbeddingProviderMock,
|
|
"memory embedding provider registration",
|
|
);
|
|
expect(adapter.id).toBe("github-copilot");
|
|
});
|
|
|
|
it("skips catalog discovery when plugin discovery is disabled", async () => {
|
|
const provider = registerProviderWithPluginConfig({ discovery: { enabled: false } });
|
|
|
|
const result = await provider.catalog.run({
|
|
config: {
|
|
plugins: {
|
|
entries: {
|
|
"github-copilot": {
|
|
config: {
|
|
discovery: { enabled: false },
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
agentDir: "/tmp/agent",
|
|
env: { GH_TOKEN: "gh_test_token" },
|
|
resolveProviderApiKey: () => ({ apiKey: "gh_test_token" }),
|
|
} as never);
|
|
|
|
expect(result).toBeNull();
|
|
expect(mocks.resolveCopilotApiToken).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it("uses live plugin config to re-enable discovery after startup disable", async () => {
|
|
mocks.resolveCopilotApiToken.mockResolvedValueOnce({
|
|
token: "copilot_api_token",
|
|
baseUrl: "https://api.githubcopilot.live",
|
|
});
|
|
const provider = registerProviderWithPluginConfig({ discovery: { enabled: false } });
|
|
|
|
const result = await provider.catalog.run({
|
|
config: {
|
|
plugins: {
|
|
entries: {
|
|
"github-copilot": {
|
|
config: {
|
|
discovery: { enabled: true },
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
agentDir: "/tmp/agent",
|
|
env: { GH_TOKEN: "gh_test_token" },
|
|
resolveProviderApiKey: () => ({ apiKey: "gh_test_token" }),
|
|
} as never);
|
|
|
|
expect(mocks.resolveCopilotApiToken).toHaveBeenCalledWith({
|
|
githubToken: "gh_test_token",
|
|
env: { GH_TOKEN: "gh_test_token" },
|
|
});
|
|
expect(result).toEqual({
|
|
provider: {
|
|
baseUrl: "https://api.githubcopilot.live",
|
|
models: [],
|
|
},
|
|
});
|
|
});
|
|
|
|
it("dual-publishes unified live catalog rows with existing discovery semantics", async () => {
|
|
mocks.resolveCopilotApiToken.mockResolvedValueOnce({
|
|
token: "copilot_api_token",
|
|
baseUrl: "https://api.githubcopilot.live",
|
|
});
|
|
const { modelCatalogProvider } = registerProviderAndCatalogWithPluginConfig({
|
|
discovery: { enabled: false },
|
|
});
|
|
|
|
const result = await modelCatalogProvider.liveCatalog({
|
|
config: {
|
|
plugins: {
|
|
entries: {
|
|
"github-copilot": {
|
|
config: {
|
|
discovery: { enabled: true },
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
agentDir: "/tmp/agent",
|
|
env: { GH_TOKEN: "gh_test_token" },
|
|
resolveProviderApiKey: () => ({ apiKey: "gh_test_token" }),
|
|
resolveProviderAuth: () => ({
|
|
apiKey: "gh_test_token",
|
|
mode: "token",
|
|
source: "env",
|
|
}),
|
|
} as never);
|
|
|
|
expect(mocks.resolveCopilotApiToken).toHaveBeenCalledWith({
|
|
githubToken: "gh_test_token",
|
|
env: { GH_TOKEN: "gh_test_token" },
|
|
});
|
|
expect(result).toEqual([]);
|
|
});
|
|
|
|
it("offers to reuse an existing token profile during interactive onboarding", async () => {
|
|
const provider = registerProviderWithPluginConfig({});
|
|
const method = provider.auth[0];
|
|
const agentDir = await createAgentDir();
|
|
seedGithubCopilotTokenProfile(agentDir);
|
|
const prompter = {
|
|
confirm: vi.fn(async () => false),
|
|
note: vi.fn(),
|
|
};
|
|
|
|
const result = await method.run({
|
|
config: {},
|
|
env: {},
|
|
agentDir,
|
|
workspaceDir: "/tmp/workspace",
|
|
prompter,
|
|
runtime: { log: vi.fn(), error: vi.fn(), exit: vi.fn() },
|
|
opts: {},
|
|
secretInputMode: "plaintext",
|
|
allowSecretRefPrompt: false,
|
|
isRemote: false,
|
|
openUrl: vi.fn(),
|
|
oauth: { createVpsAwareHandlers: vi.fn() },
|
|
} as never);
|
|
|
|
expect(prompter.confirm).toHaveBeenCalledWith({
|
|
message: "GitHub Copilot auth already exists. Re-run login?",
|
|
initialValue: false,
|
|
});
|
|
expect(mocks.githubCopilotLoginCommand).not.toHaveBeenCalled();
|
|
expect(result).toEqual({
|
|
profiles: [
|
|
{
|
|
profileId: "github-copilot:github",
|
|
credential: {
|
|
type: "token",
|
|
provider: "github-copilot",
|
|
token: "existing-token",
|
|
},
|
|
},
|
|
],
|
|
defaultModel: "github-copilot/claude-opus-4.7",
|
|
});
|
|
});
|
|
|
|
it("can refresh an existing token profile during interactive onboarding", async () => {
|
|
const provider = registerProviderWithPluginConfig({});
|
|
const method = provider.auth[0];
|
|
const agentDir = await createAgentDir();
|
|
seedGithubCopilotTokenProfile(agentDir);
|
|
const fetchMock = vi.fn(async (input: unknown) => {
|
|
const target =
|
|
typeof input === "string"
|
|
? input
|
|
: input instanceof URL
|
|
? input.toString()
|
|
: input instanceof Request
|
|
? input.url
|
|
: String(input);
|
|
if (target === "https://github.com/login/device/code") {
|
|
return new Response(
|
|
JSON.stringify({
|
|
device_code: "device-code-stub",
|
|
user_code: "ABCD-1234",
|
|
verification_uri: "https://github.com/login/device",
|
|
expires_in: 900,
|
|
interval: 0,
|
|
}),
|
|
{ status: 200, headers: { "Content-Type": "application/json" } },
|
|
);
|
|
}
|
|
if (target === "https://github.com/login/oauth/access_token") {
|
|
return new Response(
|
|
JSON.stringify({ access_token: "refreshed-token", token_type: "bearer" }),
|
|
{ status: 200, headers: { "Content-Type": "application/json" } },
|
|
);
|
|
}
|
|
throw new Error(`unexpected fetch in github-copilot refresh test: ${target}`);
|
|
});
|
|
vi.stubGlobal("fetch", fetchMock);
|
|
const prompter = {
|
|
confirm: vi.fn(async () => true),
|
|
note: vi.fn(),
|
|
};
|
|
const isTtyDescriptor = Object.getOwnPropertyDescriptor(process.stdin, "isTTY");
|
|
Object.defineProperty(process.stdin, "isTTY", {
|
|
configurable: true,
|
|
value: true,
|
|
});
|
|
|
|
try {
|
|
const result = await method.run({
|
|
config: {},
|
|
env: {},
|
|
agentDir,
|
|
workspaceDir: "/tmp/workspace",
|
|
prompter,
|
|
runtime: { log: vi.fn(), error: vi.fn(), exit: vi.fn() },
|
|
opts: {},
|
|
secretInputMode: "plaintext",
|
|
allowSecretRefPrompt: false,
|
|
isRemote: false,
|
|
openUrl: vi.fn(),
|
|
oauth: { createVpsAwareHandlers: vi.fn() },
|
|
} as never);
|
|
|
|
expect(prompter.confirm).toHaveBeenCalledWith({
|
|
message: "GitHub Copilot auth already exists. Re-run login?",
|
|
initialValue: false,
|
|
});
|
|
expect(mocks.githubCopilotLoginCommand).not.toHaveBeenCalled();
|
|
if (!result) {
|
|
throw new Error("Expected GitHub Copilot auth result");
|
|
}
|
|
expect(result.profiles[0]?.credential).toEqual({
|
|
type: "token",
|
|
provider: "github-copilot",
|
|
token: "refreshed-token",
|
|
});
|
|
} finally {
|
|
vi.unstubAllGlobals();
|
|
if (isTtyDescriptor) {
|
|
Object.defineProperty(process.stdin, "isTTY", isTtyDescriptor);
|
|
} else {
|
|
delete (process.stdin as { isTTY?: boolean }).isTTY;
|
|
}
|
|
}
|
|
});
|
|
|
|
it("stores GitHub Copilot token from non-interactive onboarding", async () => {
|
|
const provider = registerProviderWithPluginConfig({});
|
|
const method = provider.auth[0];
|
|
const agentDir = await createAgentDir();
|
|
const runtime = { error: vi.fn(), exit: vi.fn() };
|
|
|
|
const result = await method.runNonInteractive({
|
|
authChoice: "github-copilot",
|
|
config: {},
|
|
baseConfig: {},
|
|
opts: { githubCopilotToken: "ghu_test\r\n123" },
|
|
runtime,
|
|
agentDir,
|
|
resolveApiKey: vi.fn(async () => ({
|
|
key: "ghu_test123",
|
|
source: "flag" as const,
|
|
})),
|
|
toApiKeyCredential: vi.fn(),
|
|
});
|
|
|
|
expect(runtime.error).not.toHaveBeenCalled();
|
|
expect(result?.auth?.profiles?.["github-copilot:github"]).toEqual({
|
|
provider: "github-copilot",
|
|
mode: "token",
|
|
});
|
|
expect(result?.agents?.defaults?.model).toEqual({
|
|
primary: "github-copilot/claude-opus-4.7",
|
|
});
|
|
expect(result?.agents?.defaults?.models?.["github-copilot/claude-opus-4.7"]).toStrictEqual({});
|
|
|
|
const profile = ensureAuthProfileStore(agentDir).profiles["github-copilot:github"];
|
|
expect(profile).toEqual({
|
|
type: "token",
|
|
provider: "github-copilot",
|
|
token: "ghu_test123",
|
|
});
|
|
});
|
|
|
|
it("stores env-backed token refs for non-interactive onboarding ref mode", async () => {
|
|
const provider = registerProviderWithPluginConfig({});
|
|
const method = provider.auth[0];
|
|
const agentDir = await createAgentDir();
|
|
const runtime = { error: vi.fn(), exit: vi.fn() };
|
|
|
|
const result = await method.runNonInteractive({
|
|
authChoice: "github-copilot",
|
|
config: { agents: { defaults: { model: { fallbacks: ["openai/gpt-5.4"] } } } },
|
|
baseConfig: {},
|
|
opts: { secretInputMode: "ref" },
|
|
runtime,
|
|
agentDir,
|
|
resolveApiKey: vi.fn(async () => ({
|
|
key: "ghu_from_env",
|
|
source: "env" as const,
|
|
envVarName: "COPILOT_GITHUB_TOKEN",
|
|
})),
|
|
toApiKeyCredential: vi.fn(),
|
|
});
|
|
|
|
expect(runtime.error).not.toHaveBeenCalled();
|
|
expect(result?.agents?.defaults?.model).toEqual({
|
|
fallbacks: ["openai/gpt-5.4"],
|
|
primary: "github-copilot/claude-opus-4.7",
|
|
});
|
|
|
|
const profile = ensureAuthProfileStore(agentDir).profiles["github-copilot:github"];
|
|
expect(profile).toEqual({
|
|
type: "token",
|
|
provider: "github-copilot",
|
|
tokenRef: {
|
|
source: "env",
|
|
provider: "default",
|
|
id: "COPILOT_GITHUB_TOKEN",
|
|
},
|
|
});
|
|
});
|
|
|
|
it("falls back to GH_TOKEN during non-interactive onboarding", async () => {
|
|
const provider = registerProviderWithPluginConfig({});
|
|
const method = provider.auth[0];
|
|
const agentDir = await createAgentDir();
|
|
const runtime = { error: vi.fn(), exit: vi.fn() };
|
|
const resolveApiKey = vi.fn(async ({ envVar }: { envVar?: string }) =>
|
|
envVar === "GH_TOKEN"
|
|
? {
|
|
key: "ghu_from_gh_token",
|
|
source: "env" as const,
|
|
envVarName: "GH_TOKEN",
|
|
}
|
|
: null,
|
|
);
|
|
|
|
const result = await method.runNonInteractive({
|
|
authChoice: "github-copilot",
|
|
config: {},
|
|
baseConfig: {},
|
|
opts: {},
|
|
runtime,
|
|
agentDir,
|
|
resolveApiKey,
|
|
toApiKeyCredential: vi.fn(),
|
|
});
|
|
|
|
expect(runtime.error).not.toHaveBeenCalled();
|
|
expect(resolveApiKey).toHaveBeenCalledTimes(2);
|
|
expect(resolveApiKey.mock.calls.map(([params]) => params)).toEqual([
|
|
{
|
|
provider: "github-copilot",
|
|
flagName: "--github-copilot-token",
|
|
envVar: "COPILOT_GITHUB_TOKEN",
|
|
envVarName: "COPILOT_GITHUB_TOKEN",
|
|
allowProfile: false,
|
|
required: false,
|
|
},
|
|
{
|
|
provider: "github-copilot",
|
|
flagName: "--github-copilot-token",
|
|
envVar: "GH_TOKEN",
|
|
envVarName: "GH_TOKEN",
|
|
allowProfile: false,
|
|
required: false,
|
|
},
|
|
]);
|
|
expect(result?.auth?.profiles?.["github-copilot:github"]).toEqual({
|
|
provider: "github-copilot",
|
|
mode: "token",
|
|
});
|
|
|
|
const profile = ensureAuthProfileStore(agentDir).profiles["github-copilot:github"];
|
|
expect(profile).toEqual({
|
|
type: "token",
|
|
provider: "github-copilot",
|
|
token: "ghu_from_gh_token",
|
|
});
|
|
});
|
|
|
|
it("preserves an existing primary model during non-interactive onboarding", async () => {
|
|
const provider = registerProviderWithPluginConfig({});
|
|
const method = provider.auth[0];
|
|
const agentDir = await createAgentDir();
|
|
const runtime = { error: vi.fn(), exit: vi.fn() };
|
|
|
|
const result = await method.runNonInteractive({
|
|
authChoice: "github-copilot",
|
|
config: {
|
|
agents: {
|
|
defaults: {
|
|
model: {
|
|
primary: "github-copilot/gpt-5.4",
|
|
fallbacks: ["openai/gpt-5.4"],
|
|
},
|
|
models: {
|
|
"github-copilot/gpt-5.4": { label: "Existing" },
|
|
},
|
|
},
|
|
},
|
|
},
|
|
baseConfig: {},
|
|
opts: { githubCopilotToken: "ghu_test" },
|
|
runtime,
|
|
agentDir,
|
|
resolveApiKey: vi.fn(async () => ({
|
|
key: "ghu_test",
|
|
source: "flag" as const,
|
|
})),
|
|
toApiKeyCredential: vi.fn(),
|
|
});
|
|
|
|
expect(runtime.error).not.toHaveBeenCalled();
|
|
expect(result?.agents?.defaults?.model).toEqual({
|
|
primary: "github-copilot/gpt-5.4",
|
|
fallbacks: ["openai/gpt-5.4"],
|
|
});
|
|
expect(result?.agents?.defaults?.models).toEqual({
|
|
"github-copilot/gpt-5.4": { label: "Existing" },
|
|
});
|
|
});
|
|
|
|
it("reuses an existing token profile during non-interactive onboarding", async () => {
|
|
const provider = registerProviderWithPluginConfig({});
|
|
const method = provider.auth[0];
|
|
const agentDir = await createAgentDir();
|
|
const runtime = { error: vi.fn(), exit: vi.fn() };
|
|
seedGithubCopilotTokenProfile(agentDir);
|
|
|
|
const result = await method.runNonInteractive({
|
|
authChoice: "github-copilot",
|
|
config: {},
|
|
baseConfig: {},
|
|
opts: {},
|
|
runtime,
|
|
agentDir,
|
|
resolveApiKey: vi.fn(async () => null),
|
|
toApiKeyCredential: vi.fn(),
|
|
});
|
|
|
|
expect(runtime.error).not.toHaveBeenCalled();
|
|
expect(result?.auth?.profiles?.["github-copilot:github"]).toEqual({
|
|
provider: "github-copilot",
|
|
mode: "token",
|
|
});
|
|
});
|
|
|
|
it("does not emit a second missing-token error after ref-mode flag validation fails", async () => {
|
|
const provider = registerProviderWithPluginConfig({});
|
|
const method = provider.auth[0];
|
|
const agentDir = await createAgentDir();
|
|
const runtime = { error: vi.fn(), exit: vi.fn() };
|
|
|
|
const result = await method.runNonInteractive({
|
|
authChoice: "github-copilot",
|
|
config: {},
|
|
baseConfig: {},
|
|
opts: {
|
|
githubCopilotToken: "ghu_secret",
|
|
secretInputMode: "ref",
|
|
},
|
|
runtime,
|
|
agentDir,
|
|
resolveApiKey: vi.fn(async () => null),
|
|
toApiKeyCredential: vi.fn(),
|
|
});
|
|
|
|
expect(result).toBeNull();
|
|
expect(runtime.error).toHaveBeenCalledTimes(1);
|
|
expect(runtime.error).toHaveBeenCalledWith(
|
|
[
|
|
"--github-copilot-token cannot be used with --secret-input-mode ref unless COPILOT_GITHUB_TOKEN, GH_TOKEN, or GITHUB_TOKEN is set in env.",
|
|
"Set one of those env vars and omit --github-copilot-token, or use --secret-input-mode plaintext.",
|
|
].join("\n"),
|
|
);
|
|
});
|
|
});
|