* docs: thread-bound subagents plan * docs: add exact thread-bound subagent implementation touchpoints * Docs: prioritize auto thread-bound subagent flow * Docs: add ACP harness thread-binding extensions * Discord: add thread-bound session routing and auto-bind spawn flow * Subagents: add focus commands and ACP/session binding lifecycle hooks * Tests: cover thread bindings, focus commands, and ACP unbind hooks * Docs: add plugin-hook appendix for thread-bound subagents * Plugins: add subagent lifecycle hook events * Core: emit subagent lifecycle hooks and decouple Discord bindings * Discord: handle subagent bind lifecycle via plugin hooks * Subagents: unify completion finalizer and split registry modules * Add subagent lifecycle events module * Hooks: fix subagent ended context key * Discord: share thread bindings across ESM and Jiti * Subagents: add persistent sessions_spawn mode for thread-bound sessions * Subagents: clarify thread intro and persistent completion copy * test(subagents): stabilize sessions_spawn lifecycle cleanup assertions * Discord: add thread-bound session TTL with auto-unfocus * Subagents: fail session spawns when thread bind fails * Subagents: cover thread session failure cleanup paths * Session: add thread binding TTL config and /session ttl controls * Tests: align discord reaction expectations * Agent: persist sessionFile for keyed subagent sessions * Discord: normalize imports after conflict resolution * Sessions: centralize sessionFile resolve/persist helper * Discord: harden thread-bound subagent session routing * Rebase: resolve upstream/main conflicts * Subagents: move thread binding into hooks and split bindings modules * Docs: add channel-agnostic subagent routing hook plan * Agents: decouple subagent routing from Discord * Discord: refactor thread-bound subagent flows * Subagents: prevent duplicate end hooks and orphaned failed sessions * Refactor: split subagent command and provider phases * Subagents: honor hook delivery target overrides * Discord: add thread binding kill switches and refresh plan doc * Discord: fix thread bind channel resolution * Routing: centralize account id normalization * Discord: clean up thread bindings on startup failures * Discord: add startup cleanup regression tests * Docs: add long-term thread-bound subagent architecture * Docs: split session binding plan and dedupe thread-bound doc * Subagents: add channel-agnostic session binding routing * Subagents: stabilize announce completion routing tests * Subagents: cover multi-bound completion routing * Subagents: suppress lifecycle hooks on failed thread bind * tests: fix discord provider mock typing regressions * docs/protocol: sync slash command aliases and delete param models * fix: add changelog entry for Discord thread-bound subagents (#21805) (thanks @onutc) --------- Co-authored-by: Shadow <hi@shadowing.dev>
1093 lines
37 KiB
TypeScript
1093 lines
37 KiB
TypeScript
import fs from "node:fs/promises";
|
|
import os from "node:os";
|
|
import path from "node:path";
|
|
import { afterAll, beforeAll, beforeEach, describe, expect, test, vi } from "vitest";
|
|
import { WebSocket } from "ws";
|
|
import { DEFAULT_PROVIDER } from "../agents/defaults.js";
|
|
import { GATEWAY_CLIENT_IDS, GATEWAY_CLIENT_MODES } from "./protocol/client-info.js";
|
|
import { startGatewayServerHarness, type GatewayServerHarness } from "./server.e2e-ws-harness.js";
|
|
import { createToolSummaryPreviewTranscriptLines } from "./session-preview.test-helpers.js";
|
|
import {
|
|
connectOk,
|
|
embeddedRunMock,
|
|
installGatewayTestHooks,
|
|
piSdkMock,
|
|
rpcReq,
|
|
testState,
|
|
writeSessionStore,
|
|
} from "./test-helpers.js";
|
|
|
|
const sessionCleanupMocks = vi.hoisted(() => ({
|
|
clearSessionQueues: vi.fn(() => ({ followupCleared: 0, laneCleared: 0, keys: [] })),
|
|
stopSubagentsForRequester: vi.fn(() => ({ stopped: 0 })),
|
|
}));
|
|
|
|
const sessionHookMocks = vi.hoisted(() => ({
|
|
triggerInternalHook: vi.fn(async () => {}),
|
|
}));
|
|
|
|
const subagentLifecycleHookMocks = vi.hoisted(() => ({
|
|
runSubagentEnded: vi.fn(async () => {}),
|
|
}));
|
|
|
|
const subagentLifecycleHookState = vi.hoisted(() => ({
|
|
hasSubagentEndedHook: true,
|
|
}));
|
|
|
|
const threadBindingMocks = vi.hoisted(() => ({
|
|
unbindThreadBindingsBySessionKey: vi.fn((_params?: unknown) => []),
|
|
}));
|
|
|
|
vi.mock("../auto-reply/reply/queue.js", async () => {
|
|
const actual = await vi.importActual<typeof import("../auto-reply/reply/queue.js")>(
|
|
"../auto-reply/reply/queue.js",
|
|
);
|
|
return {
|
|
...actual,
|
|
clearSessionQueues: sessionCleanupMocks.clearSessionQueues,
|
|
};
|
|
});
|
|
|
|
vi.mock("../auto-reply/reply/abort.js", async () => {
|
|
const actual = await vi.importActual<typeof import("../auto-reply/reply/abort.js")>(
|
|
"../auto-reply/reply/abort.js",
|
|
);
|
|
return {
|
|
...actual,
|
|
stopSubagentsForRequester: sessionCleanupMocks.stopSubagentsForRequester,
|
|
};
|
|
});
|
|
|
|
vi.mock("../hooks/internal-hooks.js", async () => {
|
|
const actual = await vi.importActual<typeof import("../hooks/internal-hooks.js")>(
|
|
"../hooks/internal-hooks.js",
|
|
);
|
|
return {
|
|
...actual,
|
|
triggerInternalHook: sessionHookMocks.triggerInternalHook,
|
|
};
|
|
});
|
|
|
|
vi.mock("../plugins/hook-runner-global.js", async (importOriginal) => {
|
|
const actual = await importOriginal<typeof import("../plugins/hook-runner-global.js")>();
|
|
return {
|
|
...actual,
|
|
getGlobalHookRunner: vi.fn(() => ({
|
|
hasHooks: (hookName: string) =>
|
|
hookName === "subagent_ended" && subagentLifecycleHookState.hasSubagentEndedHook,
|
|
runSubagentEnded: subagentLifecycleHookMocks.runSubagentEnded,
|
|
})),
|
|
};
|
|
});
|
|
|
|
vi.mock("../discord/monitor/thread-bindings.js", async (importOriginal) => {
|
|
const actual = await importOriginal<typeof import("../discord/monitor/thread-bindings.js")>();
|
|
return {
|
|
...actual,
|
|
unbindThreadBindingsBySessionKey: (params: unknown) =>
|
|
threadBindingMocks.unbindThreadBindingsBySessionKey(params),
|
|
};
|
|
});
|
|
|
|
installGatewayTestHooks({ scope: "suite" });
|
|
|
|
let harness: GatewayServerHarness;
|
|
|
|
beforeAll(async () => {
|
|
harness = await startGatewayServerHarness();
|
|
});
|
|
|
|
afterAll(async () => {
|
|
await harness.close();
|
|
});
|
|
|
|
const openClient = async (opts?: Parameters<typeof connectOk>[1]) => await harness.openClient(opts);
|
|
|
|
async function createSessionStoreDir() {
|
|
const dir = await fs.mkdtemp(path.join(os.tmpdir(), "openclaw-sessions-"));
|
|
const storePath = path.join(dir, "sessions.json");
|
|
testState.sessionStorePath = storePath;
|
|
return { dir, storePath };
|
|
}
|
|
|
|
async function writeSingleLineSession(dir: string, sessionId: string, content: string) {
|
|
await fs.writeFile(
|
|
path.join(dir, `${sessionId}.jsonl`),
|
|
`${JSON.stringify({ role: "user", content })}\n`,
|
|
"utf-8",
|
|
);
|
|
}
|
|
|
|
async function seedActiveMainSession() {
|
|
const { dir, storePath } = await createSessionStoreDir();
|
|
await writeSingleLineSession(dir, "sess-main", "hello");
|
|
await writeSessionStore({
|
|
entries: {
|
|
main: { sessionId: "sess-main", updatedAt: Date.now() },
|
|
},
|
|
});
|
|
return { dir, storePath };
|
|
}
|
|
|
|
function expectActiveRunCleanup(
|
|
requesterSessionKey: string,
|
|
expectedQueueKeys: string[],
|
|
sessionId: string,
|
|
) {
|
|
expect(sessionCleanupMocks.stopSubagentsForRequester).toHaveBeenCalledWith({
|
|
cfg: expect.any(Object),
|
|
requesterSessionKey,
|
|
});
|
|
expect(sessionCleanupMocks.clearSessionQueues).toHaveBeenCalledTimes(1);
|
|
const clearedKeys = (
|
|
sessionCleanupMocks.clearSessionQueues.mock.calls as unknown as Array<[string[]]>
|
|
)[0]?.[0];
|
|
expect(clearedKeys).toEqual(expect.arrayContaining(expectedQueueKeys));
|
|
expect(embeddedRunMock.abortCalls).toEqual([sessionId]);
|
|
expect(embeddedRunMock.waitCalls).toEqual([sessionId]);
|
|
}
|
|
|
|
async function getMainPreviewEntry(ws: import("ws").WebSocket) {
|
|
const preview = await rpcReq<{
|
|
previews: Array<{
|
|
key: string;
|
|
status: string;
|
|
items: Array<{ role: string; text: string }>;
|
|
}>;
|
|
}>(ws, "sessions.preview", { keys: ["main"], limit: 3, maxChars: 120 });
|
|
expect(preview.ok).toBe(true);
|
|
const entry = preview.payload?.previews[0];
|
|
expect(entry?.key).toBe("main");
|
|
expect(entry?.status).toBe("ok");
|
|
return entry;
|
|
}
|
|
|
|
describe("gateway server sessions", () => {
|
|
beforeEach(() => {
|
|
sessionCleanupMocks.clearSessionQueues.mockClear();
|
|
sessionCleanupMocks.stopSubagentsForRequester.mockClear();
|
|
sessionHookMocks.triggerInternalHook.mockClear();
|
|
subagentLifecycleHookMocks.runSubagentEnded.mockClear();
|
|
subagentLifecycleHookState.hasSubagentEndedHook = true;
|
|
threadBindingMocks.unbindThreadBindingsBySessionKey.mockClear();
|
|
});
|
|
|
|
test("lists and patches session store via sessions.* RPC", async () => {
|
|
const { dir, storePath } = await createSessionStoreDir();
|
|
const now = Date.now();
|
|
const recent = now - 30_000;
|
|
const stale = now - 15 * 60_000;
|
|
|
|
await fs.writeFile(
|
|
path.join(dir, "sess-main.jsonl"),
|
|
`${Array.from({ length: 10 })
|
|
.map((_, idx) => JSON.stringify({ role: "user", content: `line ${idx}` }))
|
|
.join("\n")}\n`,
|
|
"utf-8",
|
|
);
|
|
await fs.writeFile(
|
|
path.join(dir, "sess-group.jsonl"),
|
|
`${JSON.stringify({ role: "user", content: "group line 0" })}\n`,
|
|
"utf-8",
|
|
);
|
|
|
|
await writeSessionStore({
|
|
entries: {
|
|
main: {
|
|
sessionId: "sess-main",
|
|
updatedAt: recent,
|
|
inputTokens: 10,
|
|
outputTokens: 20,
|
|
thinkingLevel: "low",
|
|
verboseLevel: "on",
|
|
lastChannel: "whatsapp",
|
|
lastTo: "+1555",
|
|
lastAccountId: "work",
|
|
},
|
|
"discord:group:dev": {
|
|
sessionId: "sess-group",
|
|
updatedAt: stale,
|
|
totalTokens: 50,
|
|
},
|
|
"agent:main:subagent:one": {
|
|
sessionId: "sess-subagent",
|
|
updatedAt: stale,
|
|
spawnedBy: "agent:main:main",
|
|
},
|
|
global: {
|
|
sessionId: "sess-global",
|
|
updatedAt: now - 10_000,
|
|
},
|
|
},
|
|
});
|
|
|
|
const { ws, hello } = await openClient();
|
|
expect((hello as { features?: { methods?: string[] } }).features?.methods).toEqual(
|
|
expect.arrayContaining([
|
|
"sessions.list",
|
|
"sessions.preview",
|
|
"sessions.patch",
|
|
"sessions.reset",
|
|
"sessions.delete",
|
|
"sessions.compact",
|
|
]),
|
|
);
|
|
|
|
const resolvedByKey = await rpcReq<{ ok: true; key: string }>(ws, "sessions.resolve", {
|
|
key: "main",
|
|
});
|
|
expect(resolvedByKey.ok).toBe(true);
|
|
expect(resolvedByKey.payload?.key).toBe("agent:main:main");
|
|
|
|
const resolvedBySessionId = await rpcReq<{ ok: true; key: string }>(ws, "sessions.resolve", {
|
|
sessionId: "sess-group",
|
|
});
|
|
expect(resolvedBySessionId.ok).toBe(true);
|
|
expect(resolvedBySessionId.payload?.key).toBe("agent:main:discord:group:dev");
|
|
|
|
const list1 = await rpcReq<{
|
|
path: string;
|
|
defaults?: { model?: string | null; modelProvider?: string | null };
|
|
sessions: Array<{
|
|
key: string;
|
|
totalTokens?: number;
|
|
totalTokensFresh?: boolean;
|
|
thinkingLevel?: string;
|
|
verboseLevel?: string;
|
|
lastAccountId?: string;
|
|
deliveryContext?: { channel?: string; to?: string; accountId?: string };
|
|
}>;
|
|
}>(ws, "sessions.list", { includeGlobal: false, includeUnknown: false });
|
|
|
|
expect(list1.ok).toBe(true);
|
|
expect(list1.payload?.path).toBe(storePath);
|
|
expect(list1.payload?.sessions.some((s) => s.key === "global")).toBe(false);
|
|
expect(list1.payload?.defaults?.modelProvider).toBe(DEFAULT_PROVIDER);
|
|
const main = list1.payload?.sessions.find((s) => s.key === "agent:main:main");
|
|
expect(main?.totalTokens).toBeUndefined();
|
|
expect(main?.totalTokensFresh).toBe(false);
|
|
expect(main?.thinkingLevel).toBe("low");
|
|
expect(main?.verboseLevel).toBe("on");
|
|
expect(main?.lastAccountId).toBe("work");
|
|
expect(main?.deliveryContext).toEqual({
|
|
channel: "whatsapp",
|
|
to: "+1555",
|
|
accountId: "work",
|
|
});
|
|
|
|
const active = await rpcReq<{
|
|
sessions: Array<{ key: string }>;
|
|
}>(ws, "sessions.list", {
|
|
includeGlobal: false,
|
|
includeUnknown: false,
|
|
activeMinutes: 5,
|
|
});
|
|
expect(active.ok).toBe(true);
|
|
expect(active.payload?.sessions.map((s) => s.key)).toEqual(["agent:main:main"]);
|
|
|
|
const limited = await rpcReq<{
|
|
sessions: Array<{ key: string }>;
|
|
}>(ws, "sessions.list", {
|
|
includeGlobal: true,
|
|
includeUnknown: false,
|
|
limit: 1,
|
|
});
|
|
expect(limited.ok).toBe(true);
|
|
expect(limited.payload?.sessions).toHaveLength(1);
|
|
expect(limited.payload?.sessions[0]?.key).toBe("global");
|
|
|
|
const patched = await rpcReq<{ ok: true; key: string }>(ws, "sessions.patch", {
|
|
key: "agent:main:main",
|
|
thinkingLevel: "medium",
|
|
verboseLevel: "off",
|
|
});
|
|
expect(patched.ok).toBe(true);
|
|
expect(patched.payload?.ok).toBe(true);
|
|
expect(patched.payload?.key).toBe("agent:main:main");
|
|
|
|
const sendPolicyPatched = await rpcReq<{
|
|
ok: true;
|
|
entry: { sendPolicy?: string };
|
|
}>(ws, "sessions.patch", { key: "agent:main:main", sendPolicy: "deny" });
|
|
expect(sendPolicyPatched.ok).toBe(true);
|
|
expect(sendPolicyPatched.payload?.entry.sendPolicy).toBe("deny");
|
|
|
|
const labelPatched = await rpcReq<{
|
|
ok: true;
|
|
entry: { label?: string };
|
|
}>(ws, "sessions.patch", {
|
|
key: "agent:main:subagent:one",
|
|
label: "Briefing",
|
|
});
|
|
expect(labelPatched.ok).toBe(true);
|
|
expect(labelPatched.payload?.entry.label).toBe("Briefing");
|
|
|
|
const labelPatchedDuplicate = await rpcReq(ws, "sessions.patch", {
|
|
key: "agent:main:discord:group:dev",
|
|
label: "Briefing",
|
|
});
|
|
expect(labelPatchedDuplicate.ok).toBe(false);
|
|
|
|
const list2 = await rpcReq<{
|
|
sessions: Array<{
|
|
key: string;
|
|
thinkingLevel?: string;
|
|
verboseLevel?: string;
|
|
sendPolicy?: string;
|
|
label?: string;
|
|
displayName?: string;
|
|
}>;
|
|
}>(ws, "sessions.list", {});
|
|
expect(list2.ok).toBe(true);
|
|
const main2 = list2.payload?.sessions.find((s) => s.key === "agent:main:main");
|
|
expect(main2?.thinkingLevel).toBe("medium");
|
|
expect(main2?.verboseLevel).toBe("off");
|
|
expect(main2?.sendPolicy).toBe("deny");
|
|
const subagent = list2.payload?.sessions.find((s) => s.key === "agent:main:subagent:one");
|
|
expect(subagent?.label).toBe("Briefing");
|
|
expect(subagent?.displayName).toBe("Briefing");
|
|
|
|
const clearedVerbose = await rpcReq<{ ok: true; key: string }>(ws, "sessions.patch", {
|
|
key: "agent:main:main",
|
|
verboseLevel: null,
|
|
});
|
|
expect(clearedVerbose.ok).toBe(true);
|
|
|
|
const list3 = await rpcReq<{
|
|
sessions: Array<{
|
|
key: string;
|
|
verboseLevel?: string;
|
|
}>;
|
|
}>(ws, "sessions.list", {});
|
|
expect(list3.ok).toBe(true);
|
|
const main3 = list3.payload?.sessions.find((s) => s.key === "agent:main:main");
|
|
expect(main3?.verboseLevel).toBeUndefined();
|
|
|
|
const listByLabel = await rpcReq<{
|
|
sessions: Array<{ key: string }>;
|
|
}>(ws, "sessions.list", {
|
|
includeGlobal: false,
|
|
includeUnknown: false,
|
|
label: "Briefing",
|
|
});
|
|
expect(listByLabel.ok).toBe(true);
|
|
expect(listByLabel.payload?.sessions.map((s) => s.key)).toEqual(["agent:main:subagent:one"]);
|
|
|
|
const resolvedByLabel = await rpcReq<{ ok: true; key: string }>(ws, "sessions.resolve", {
|
|
label: "Briefing",
|
|
agentId: "main",
|
|
});
|
|
expect(resolvedByLabel.ok).toBe(true);
|
|
expect(resolvedByLabel.payload?.key).toBe("agent:main:subagent:one");
|
|
|
|
const spawnedOnly = await rpcReq<{
|
|
sessions: Array<{ key: string }>;
|
|
}>(ws, "sessions.list", {
|
|
includeGlobal: true,
|
|
includeUnknown: true,
|
|
spawnedBy: "agent:main:main",
|
|
});
|
|
expect(spawnedOnly.ok).toBe(true);
|
|
expect(spawnedOnly.payload?.sessions.map((s) => s.key)).toEqual(["agent:main:subagent:one"]);
|
|
|
|
const spawnedPatched = await rpcReq<{
|
|
ok: true;
|
|
entry: { spawnedBy?: string };
|
|
}>(ws, "sessions.patch", {
|
|
key: "agent:main:subagent:two",
|
|
spawnedBy: "agent:main:main",
|
|
});
|
|
expect(spawnedPatched.ok).toBe(true);
|
|
expect(spawnedPatched.payload?.entry.spawnedBy).toBe("agent:main:main");
|
|
|
|
const spawnedPatchedInvalidKey = await rpcReq(ws, "sessions.patch", {
|
|
key: "agent:main:main",
|
|
spawnedBy: "agent:main:main",
|
|
});
|
|
expect(spawnedPatchedInvalidKey.ok).toBe(false);
|
|
|
|
piSdkMock.enabled = true;
|
|
piSdkMock.models = [{ id: "gpt-test-a", name: "A", provider: "openai" }];
|
|
const modelPatched = await rpcReq<{
|
|
ok: true;
|
|
entry: { modelOverride?: string; providerOverride?: string };
|
|
}>(ws, "sessions.patch", {
|
|
key: "agent:main:main",
|
|
model: "openai/gpt-test-a",
|
|
});
|
|
expect(modelPatched.ok).toBe(true);
|
|
expect(modelPatched.payload?.entry.modelOverride).toBe("gpt-test-a");
|
|
expect(modelPatched.payload?.entry.providerOverride).toBe("openai");
|
|
|
|
const compacted = await rpcReq<{ ok: true; compacted: boolean }>(ws, "sessions.compact", {
|
|
key: "agent:main:main",
|
|
maxLines: 3,
|
|
});
|
|
expect(compacted.ok).toBe(true);
|
|
expect(compacted.payload?.compacted).toBe(true);
|
|
const compactedLines = (await fs.readFile(path.join(dir, "sess-main.jsonl"), "utf-8"))
|
|
.split(/\r?\n/)
|
|
.filter((l) => l.trim().length > 0);
|
|
expect(compactedLines).toHaveLength(3);
|
|
const filesAfterCompact = await fs.readdir(dir);
|
|
expect(filesAfterCompact.some((f) => f.startsWith("sess-main.jsonl.bak."))).toBe(true);
|
|
|
|
const deleted = await rpcReq<{ ok: true; deleted: boolean }>(ws, "sessions.delete", {
|
|
key: "agent:main:discord:group:dev",
|
|
});
|
|
expect(deleted.ok).toBe(true);
|
|
expect(deleted.payload?.deleted).toBe(true);
|
|
const listAfterDelete = await rpcReq<{
|
|
sessions: Array<{ key: string }>;
|
|
}>(ws, "sessions.list", {});
|
|
expect(listAfterDelete.ok).toBe(true);
|
|
expect(
|
|
listAfterDelete.payload?.sessions.some((s) => s.key === "agent:main:discord:group:dev"),
|
|
).toBe(false);
|
|
const filesAfterDelete = await fs.readdir(dir);
|
|
expect(filesAfterDelete.some((f) => f.startsWith("sess-group.jsonl.deleted."))).toBe(true);
|
|
|
|
const reset = await rpcReq<{
|
|
ok: true;
|
|
key: string;
|
|
entry: { sessionId: string };
|
|
}>(ws, "sessions.reset", { key: "agent:main:main" });
|
|
expect(reset.ok).toBe(true);
|
|
expect(reset.payload?.key).toBe("agent:main:main");
|
|
expect(reset.payload?.entry.sessionId).not.toBe("sess-main");
|
|
const filesAfterReset = await fs.readdir(dir);
|
|
expect(filesAfterReset.some((f) => f.startsWith("sess-main.jsonl.reset."))).toBe(true);
|
|
|
|
const badThinking = await rpcReq(ws, "sessions.patch", {
|
|
key: "agent:main:main",
|
|
thinkingLevel: "banana",
|
|
});
|
|
expect(badThinking.ok).toBe(false);
|
|
expect((badThinking.error as { message?: unknown } | undefined)?.message ?? "").toMatch(
|
|
/invalid thinkinglevel/i,
|
|
);
|
|
|
|
ws.close();
|
|
});
|
|
|
|
test("sessions.preview returns transcript previews", async () => {
|
|
const dir = await fs.mkdtemp(path.join(os.tmpdir(), "openclaw-sessions-preview-"));
|
|
const storePath = path.join(dir, "sessions.json");
|
|
testState.sessionStorePath = storePath;
|
|
const sessionId = "sess-preview";
|
|
const transcriptPath = path.join(dir, `${sessionId}.jsonl`);
|
|
const lines = createToolSummaryPreviewTranscriptLines(sessionId);
|
|
await fs.writeFile(transcriptPath, lines.join("\n"), "utf-8");
|
|
|
|
await writeSessionStore({
|
|
entries: {
|
|
main: {
|
|
sessionId,
|
|
updatedAt: Date.now(),
|
|
},
|
|
},
|
|
});
|
|
|
|
const { ws } = await openClient();
|
|
const entry = await getMainPreviewEntry(ws);
|
|
expect(entry?.items.map((item) => item.role)).toEqual(["assistant", "tool", "assistant"]);
|
|
expect(entry?.items[1]?.text).toContain("call weather");
|
|
|
|
ws.close();
|
|
});
|
|
|
|
test("sessions.preview resolves legacy mixed-case main alias with custom mainKey", async () => {
|
|
const dir = await fs.mkdtemp(path.join(os.tmpdir(), "openclaw-sessions-preview-alias-"));
|
|
const storePath = path.join(dir, "sessions.json");
|
|
testState.sessionStorePath = storePath;
|
|
testState.agentsConfig = { list: [{ id: "ops", default: true }] };
|
|
testState.sessionConfig = { mainKey: "work" };
|
|
const sessionId = "sess-legacy-main";
|
|
const transcriptPath = path.join(dir, `${sessionId}.jsonl`);
|
|
const lines = [
|
|
JSON.stringify({ type: "session", version: 1, id: sessionId }),
|
|
JSON.stringify({ message: { role: "assistant", content: "Legacy alias transcript" } }),
|
|
];
|
|
await fs.writeFile(transcriptPath, lines.join("\n"), "utf-8");
|
|
await fs.writeFile(
|
|
storePath,
|
|
JSON.stringify(
|
|
{
|
|
"agent:ops:MAIN": {
|
|
sessionId,
|
|
updatedAt: Date.now(),
|
|
},
|
|
},
|
|
null,
|
|
2,
|
|
),
|
|
"utf-8",
|
|
);
|
|
|
|
const { ws } = await openClient();
|
|
const entry = await getMainPreviewEntry(ws);
|
|
expect(entry?.items[0]?.text).toContain("Legacy alias transcript");
|
|
|
|
ws.close();
|
|
});
|
|
|
|
test("sessions.resolve and mutators clean legacy main-alias ghost keys", async () => {
|
|
const dir = await fs.mkdtemp(path.join(os.tmpdir(), "openclaw-sessions-cleanup-alias-"));
|
|
const storePath = path.join(dir, "sessions.json");
|
|
testState.sessionStorePath = storePath;
|
|
testState.agentsConfig = { list: [{ id: "ops", default: true }] };
|
|
testState.sessionConfig = { mainKey: "work" };
|
|
const sessionId = "sess-alias-cleanup";
|
|
const transcriptPath = path.join(dir, `${sessionId}.jsonl`);
|
|
await fs.writeFile(
|
|
transcriptPath,
|
|
`${Array.from({ length: 8 })
|
|
.map((_, idx) => JSON.stringify({ role: "assistant", content: `line ${idx}` }))
|
|
.join("\n")}\n`,
|
|
"utf-8",
|
|
);
|
|
|
|
const writeRawStore = async (store: Record<string, unknown>) => {
|
|
await fs.writeFile(storePath, `${JSON.stringify(store, null, 2)}\n`, "utf-8");
|
|
};
|
|
const readStore = async () =>
|
|
JSON.parse(await fs.readFile(storePath, "utf-8")) as Record<string, Record<string, unknown>>;
|
|
|
|
await writeRawStore({
|
|
"agent:ops:MAIN": { sessionId, updatedAt: Date.now() - 2_000 },
|
|
"agent:ops:Main": { sessionId, updatedAt: Date.now() - 1_000 },
|
|
});
|
|
|
|
const { ws } = await openClient();
|
|
|
|
const resolved = await rpcReq<{ ok: true; key: string }>(ws, "sessions.resolve", {
|
|
key: "main",
|
|
});
|
|
expect(resolved.ok).toBe(true);
|
|
expect(resolved.payload?.key).toBe("agent:ops:work");
|
|
let store = await readStore();
|
|
expect(Object.keys(store).toSorted()).toEqual(["agent:ops:work"]);
|
|
|
|
await writeRawStore({
|
|
...store,
|
|
"agent:ops:MAIN": { ...store["agent:ops:work"] },
|
|
});
|
|
const patched = await rpcReq<{ ok: true; key: string }>(ws, "sessions.patch", {
|
|
key: "main",
|
|
thinkingLevel: "medium",
|
|
});
|
|
expect(patched.ok).toBe(true);
|
|
expect(patched.payload?.key).toBe("agent:ops:work");
|
|
store = await readStore();
|
|
expect(Object.keys(store).toSorted()).toEqual(["agent:ops:work"]);
|
|
expect(store["agent:ops:work"]?.thinkingLevel).toBe("medium");
|
|
|
|
await writeRawStore({
|
|
...store,
|
|
"agent:ops:MAIN": { ...store["agent:ops:work"] },
|
|
});
|
|
const compacted = await rpcReq<{ ok: true; compacted: boolean }>(ws, "sessions.compact", {
|
|
key: "main",
|
|
maxLines: 3,
|
|
});
|
|
expect(compacted.ok).toBe(true);
|
|
expect(compacted.payload?.compacted).toBe(true);
|
|
store = await readStore();
|
|
expect(Object.keys(store).toSorted()).toEqual(["agent:ops:work"]);
|
|
|
|
await writeRawStore({
|
|
...store,
|
|
"agent:ops:MAIN": { ...store["agent:ops:work"] },
|
|
});
|
|
const reset = await rpcReq<{ ok: true; key: string }>(ws, "sessions.reset", { key: "main" });
|
|
expect(reset.ok).toBe(true);
|
|
expect(reset.payload?.key).toBe("agent:ops:work");
|
|
store = await readStore();
|
|
expect(Object.keys(store).toSorted()).toEqual(["agent:ops:work"]);
|
|
|
|
ws.close();
|
|
});
|
|
|
|
test("sessions.delete rejects main and aborts active runs", async () => {
|
|
const { dir } = await createSessionStoreDir();
|
|
await writeSingleLineSession(dir, "sess-main", "hello");
|
|
await writeSingleLineSession(dir, "sess-active", "active");
|
|
|
|
await writeSessionStore({
|
|
entries: {
|
|
main: { sessionId: "sess-main", updatedAt: Date.now() },
|
|
"discord:group:dev": {
|
|
sessionId: "sess-active",
|
|
updatedAt: Date.now(),
|
|
},
|
|
},
|
|
});
|
|
|
|
embeddedRunMock.activeIds.add("sess-active");
|
|
embeddedRunMock.waitResults.set("sess-active", true);
|
|
|
|
const { ws } = await openClient();
|
|
|
|
const mainDelete = await rpcReq(ws, "sessions.delete", { key: "main" });
|
|
expect(mainDelete.ok).toBe(false);
|
|
|
|
const deleted = await rpcReq<{ ok: true; deleted: boolean }>(ws, "sessions.delete", {
|
|
key: "discord:group:dev",
|
|
});
|
|
expect(deleted.ok).toBe(true);
|
|
expect(deleted.payload?.deleted).toBe(true);
|
|
expectActiveRunCleanup(
|
|
"agent:main:discord:group:dev",
|
|
["discord:group:dev", "agent:main:discord:group:dev", "sess-active"],
|
|
"sess-active",
|
|
);
|
|
expect(subagentLifecycleHookMocks.runSubagentEnded).toHaveBeenCalledTimes(1);
|
|
expect(subagentLifecycleHookMocks.runSubagentEnded).toHaveBeenCalledWith(
|
|
{
|
|
targetSessionKey: "agent:main:discord:group:dev",
|
|
targetKind: "acp",
|
|
reason: "session-delete",
|
|
sendFarewell: true,
|
|
outcome: "deleted",
|
|
},
|
|
{
|
|
childSessionKey: "agent:main:discord:group:dev",
|
|
},
|
|
);
|
|
expect(threadBindingMocks.unbindThreadBindingsBySessionKey).toHaveBeenCalledTimes(1);
|
|
expect(threadBindingMocks.unbindThreadBindingsBySessionKey).toHaveBeenCalledWith({
|
|
targetSessionKey: "agent:main:discord:group:dev",
|
|
targetKind: "acp",
|
|
reason: "session-delete",
|
|
sendFarewell: true,
|
|
});
|
|
|
|
ws.close();
|
|
});
|
|
|
|
test("sessions.delete does not emit lifecycle events when nothing was deleted", async () => {
|
|
const { dir } = await createSessionStoreDir();
|
|
await writeSingleLineSession(dir, "sess-main", "hello");
|
|
await writeSessionStore({
|
|
entries: {
|
|
main: { sessionId: "sess-main", updatedAt: Date.now() },
|
|
},
|
|
});
|
|
|
|
const { ws } = await openClient();
|
|
const deleted = await rpcReq<{ ok: true; deleted: boolean }>(ws, "sessions.delete", {
|
|
key: "agent:main:subagent:missing",
|
|
});
|
|
|
|
expect(deleted.ok).toBe(true);
|
|
expect(deleted.payload?.deleted).toBe(false);
|
|
expect(subagentLifecycleHookMocks.runSubagentEnded).not.toHaveBeenCalled();
|
|
expect(threadBindingMocks.unbindThreadBindingsBySessionKey).not.toHaveBeenCalled();
|
|
|
|
ws.close();
|
|
});
|
|
|
|
test("sessions.delete emits subagent targetKind for subagent sessions", async () => {
|
|
const { dir } = await createSessionStoreDir();
|
|
await writeSingleLineSession(dir, "sess-subagent", "hello");
|
|
await writeSessionStore({
|
|
entries: {
|
|
"agent:main:subagent:worker": {
|
|
sessionId: "sess-subagent",
|
|
updatedAt: Date.now(),
|
|
},
|
|
},
|
|
});
|
|
|
|
const { ws } = await openClient();
|
|
const deleted = await rpcReq<{ ok: true; deleted: boolean }>(ws, "sessions.delete", {
|
|
key: "agent:main:subagent:worker",
|
|
});
|
|
expect(deleted.ok).toBe(true);
|
|
expect(deleted.payload?.deleted).toBe(true);
|
|
expect(subagentLifecycleHookMocks.runSubagentEnded).toHaveBeenCalledTimes(1);
|
|
const event = (subagentLifecycleHookMocks.runSubagentEnded.mock.calls as unknown[][])[0]?.[0] as
|
|
| { targetKind?: string; targetSessionKey?: string; reason?: string; outcome?: string }
|
|
| undefined;
|
|
expect(event).toMatchObject({
|
|
targetSessionKey: "agent:main:subagent:worker",
|
|
targetKind: "subagent",
|
|
reason: "session-delete",
|
|
outcome: "deleted",
|
|
});
|
|
expect(threadBindingMocks.unbindThreadBindingsBySessionKey).toHaveBeenCalledTimes(1);
|
|
expect(threadBindingMocks.unbindThreadBindingsBySessionKey).toHaveBeenCalledWith({
|
|
targetSessionKey: "agent:main:subagent:worker",
|
|
targetKind: "subagent",
|
|
reason: "session-delete",
|
|
sendFarewell: true,
|
|
});
|
|
|
|
ws.close();
|
|
});
|
|
|
|
test("sessions.delete can skip lifecycle hooks while still unbinding thread bindings", async () => {
|
|
const { dir } = await createSessionStoreDir();
|
|
await writeSingleLineSession(dir, "sess-subagent", "hello");
|
|
await writeSessionStore({
|
|
entries: {
|
|
"agent:main:subagent:worker": {
|
|
sessionId: "sess-subagent",
|
|
updatedAt: Date.now(),
|
|
},
|
|
},
|
|
});
|
|
|
|
const { ws } = await openClient();
|
|
const deleted = await rpcReq<{ ok: true; deleted: boolean }>(ws, "sessions.delete", {
|
|
key: "agent:main:subagent:worker",
|
|
emitLifecycleHooks: false,
|
|
});
|
|
expect(deleted.ok).toBe(true);
|
|
expect(deleted.payload?.deleted).toBe(true);
|
|
expect(subagentLifecycleHookMocks.runSubagentEnded).not.toHaveBeenCalled();
|
|
expect(threadBindingMocks.unbindThreadBindingsBySessionKey).toHaveBeenCalledTimes(1);
|
|
expect(threadBindingMocks.unbindThreadBindingsBySessionKey).toHaveBeenCalledWith({
|
|
targetSessionKey: "agent:main:subagent:worker",
|
|
targetKind: "subagent",
|
|
reason: "session-delete",
|
|
sendFarewell: true,
|
|
});
|
|
|
|
ws.close();
|
|
});
|
|
|
|
test("sessions.delete directly unbinds thread bindings when hooks are unavailable", async () => {
|
|
const { dir } = await createSessionStoreDir();
|
|
await writeSingleLineSession(dir, "sess-subagent", "hello");
|
|
await writeSessionStore({
|
|
entries: {
|
|
"agent:main:subagent:worker": {
|
|
sessionId: "sess-subagent",
|
|
updatedAt: Date.now(),
|
|
},
|
|
},
|
|
});
|
|
subagentLifecycleHookState.hasSubagentEndedHook = false;
|
|
|
|
const { ws } = await openClient();
|
|
const deleted = await rpcReq<{ ok: true; deleted: boolean }>(ws, "sessions.delete", {
|
|
key: "agent:main:subagent:worker",
|
|
});
|
|
expect(deleted.ok).toBe(true);
|
|
expect(subagentLifecycleHookMocks.runSubagentEnded).not.toHaveBeenCalled();
|
|
expect(threadBindingMocks.unbindThreadBindingsBySessionKey).toHaveBeenCalledTimes(1);
|
|
expect(threadBindingMocks.unbindThreadBindingsBySessionKey).toHaveBeenCalledWith({
|
|
targetSessionKey: "agent:main:subagent:worker",
|
|
targetKind: "subagent",
|
|
reason: "session-delete",
|
|
sendFarewell: true,
|
|
});
|
|
|
|
ws.close();
|
|
});
|
|
|
|
test("sessions.reset aborts active runs and clears queues", async () => {
|
|
await seedActiveMainSession();
|
|
|
|
embeddedRunMock.activeIds.add("sess-main");
|
|
embeddedRunMock.waitResults.set("sess-main", true);
|
|
|
|
const { ws } = await openClient();
|
|
|
|
const reset = await rpcReq<{ ok: true; key: string; entry: { sessionId: string } }>(
|
|
ws,
|
|
"sessions.reset",
|
|
{
|
|
key: "main",
|
|
},
|
|
);
|
|
expect(reset.ok).toBe(true);
|
|
expect(reset.payload?.key).toBe("agent:main:main");
|
|
expect(reset.payload?.entry.sessionId).not.toBe("sess-main");
|
|
expectActiveRunCleanup(
|
|
"agent:main:main",
|
|
["main", "agent:main:main", "sess-main"],
|
|
"sess-main",
|
|
);
|
|
expect(subagentLifecycleHookMocks.runSubagentEnded).toHaveBeenCalledTimes(1);
|
|
expect(subagentLifecycleHookMocks.runSubagentEnded).toHaveBeenCalledWith(
|
|
{
|
|
targetSessionKey: "agent:main:main",
|
|
targetKind: "acp",
|
|
reason: "session-reset",
|
|
sendFarewell: true,
|
|
outcome: "reset",
|
|
},
|
|
{
|
|
childSessionKey: "agent:main:main",
|
|
},
|
|
);
|
|
expect(threadBindingMocks.unbindThreadBindingsBySessionKey).toHaveBeenCalledTimes(1);
|
|
expect(threadBindingMocks.unbindThreadBindingsBySessionKey).toHaveBeenCalledWith({
|
|
targetSessionKey: "agent:main:main",
|
|
targetKind: "acp",
|
|
reason: "session-reset",
|
|
sendFarewell: true,
|
|
});
|
|
|
|
ws.close();
|
|
});
|
|
|
|
test("sessions.reset does not emit lifecycle events when key does not exist", async () => {
|
|
const { dir } = await createSessionStoreDir();
|
|
await writeSingleLineSession(dir, "sess-main", "hello");
|
|
await writeSessionStore({
|
|
entries: {
|
|
main: { sessionId: "sess-main", updatedAt: Date.now() },
|
|
},
|
|
});
|
|
|
|
const { ws } = await openClient();
|
|
const reset = await rpcReq<{ ok: true; key: string; entry: { sessionId: string } }>(
|
|
ws,
|
|
"sessions.reset",
|
|
{
|
|
key: "agent:main:subagent:missing",
|
|
},
|
|
);
|
|
|
|
expect(reset.ok).toBe(true);
|
|
expect(subagentLifecycleHookMocks.runSubagentEnded).not.toHaveBeenCalled();
|
|
expect(threadBindingMocks.unbindThreadBindingsBySessionKey).not.toHaveBeenCalled();
|
|
|
|
ws.close();
|
|
});
|
|
|
|
test("sessions.reset emits subagent targetKind for subagent sessions", async () => {
|
|
const { dir } = await createSessionStoreDir();
|
|
await writeSingleLineSession(dir, "sess-subagent", "hello");
|
|
await writeSessionStore({
|
|
entries: {
|
|
"agent:main:subagent:worker": {
|
|
sessionId: "sess-subagent",
|
|
updatedAt: Date.now(),
|
|
},
|
|
},
|
|
});
|
|
|
|
const { ws } = await openClient();
|
|
const reset = await rpcReq<{ ok: true; key: string; entry: { sessionId: string } }>(
|
|
ws,
|
|
"sessions.reset",
|
|
{
|
|
key: "agent:main:subagent:worker",
|
|
},
|
|
);
|
|
expect(reset.ok).toBe(true);
|
|
expect(reset.payload?.key).toBe("agent:main:subagent:worker");
|
|
expect(reset.payload?.entry.sessionId).not.toBe("sess-subagent");
|
|
expect(subagentLifecycleHookMocks.runSubagentEnded).toHaveBeenCalledTimes(1);
|
|
const event = (subagentLifecycleHookMocks.runSubagentEnded.mock.calls as unknown[][])[0]?.[0] as
|
|
| { targetKind?: string; targetSessionKey?: string; reason?: string; outcome?: string }
|
|
| undefined;
|
|
expect(event).toMatchObject({
|
|
targetSessionKey: "agent:main:subagent:worker",
|
|
targetKind: "subagent",
|
|
reason: "session-reset",
|
|
outcome: "reset",
|
|
});
|
|
expect(threadBindingMocks.unbindThreadBindingsBySessionKey).toHaveBeenCalledTimes(1);
|
|
expect(threadBindingMocks.unbindThreadBindingsBySessionKey).toHaveBeenCalledWith({
|
|
targetSessionKey: "agent:main:subagent:worker",
|
|
targetKind: "subagent",
|
|
reason: "session-reset",
|
|
sendFarewell: true,
|
|
});
|
|
|
|
ws.close();
|
|
});
|
|
|
|
test("sessions.reset directly unbinds thread bindings when hooks are unavailable", async () => {
|
|
const { dir } = await createSessionStoreDir();
|
|
await writeSingleLineSession(dir, "sess-main", "hello");
|
|
await writeSessionStore({
|
|
entries: {
|
|
main: {
|
|
sessionId: "sess-main",
|
|
updatedAt: Date.now(),
|
|
},
|
|
},
|
|
});
|
|
subagentLifecycleHookState.hasSubagentEndedHook = false;
|
|
|
|
const { ws } = await openClient();
|
|
const reset = await rpcReq<{ ok: true; key: string }>(ws, "sessions.reset", {
|
|
key: "main",
|
|
});
|
|
expect(reset.ok).toBe(true);
|
|
expect(subagentLifecycleHookMocks.runSubagentEnded).not.toHaveBeenCalled();
|
|
expect(threadBindingMocks.unbindThreadBindingsBySessionKey).toHaveBeenCalledTimes(1);
|
|
expect(threadBindingMocks.unbindThreadBindingsBySessionKey).toHaveBeenCalledWith({
|
|
targetSessionKey: "agent:main:main",
|
|
targetKind: "acp",
|
|
reason: "session-reset",
|
|
sendFarewell: true,
|
|
});
|
|
|
|
ws.close();
|
|
});
|
|
|
|
test("sessions.reset emits internal command hook with reason", async () => {
|
|
const { dir } = await createSessionStoreDir();
|
|
await writeSingleLineSession(dir, "sess-main", "hello");
|
|
|
|
await writeSessionStore({
|
|
entries: {
|
|
main: { sessionId: "sess-main", updatedAt: Date.now() },
|
|
},
|
|
});
|
|
|
|
const { ws } = await openClient();
|
|
const reset = await rpcReq<{ ok: true; key: string }>(ws, "sessions.reset", {
|
|
key: "main",
|
|
reason: "new",
|
|
});
|
|
expect(reset.ok).toBe(true);
|
|
expect(sessionHookMocks.triggerInternalHook).toHaveBeenCalledTimes(1);
|
|
const event = (
|
|
sessionHookMocks.triggerInternalHook.mock.calls as unknown as Array<[unknown]>
|
|
)[0]?.[0] as { context?: { previousSessionEntry?: unknown } } | undefined;
|
|
if (!event) {
|
|
throw new Error("expected session hook event");
|
|
}
|
|
expect(event).toMatchObject({
|
|
type: "command",
|
|
action: "new",
|
|
sessionKey: "agent:main:main",
|
|
context: {
|
|
commandSource: "gateway:sessions.reset",
|
|
},
|
|
});
|
|
expect(event.context?.previousSessionEntry).toMatchObject({ sessionId: "sess-main" });
|
|
ws.close();
|
|
});
|
|
|
|
test("sessions.reset returns unavailable when active run does not stop", async () => {
|
|
const { dir, storePath } = await seedActiveMainSession();
|
|
|
|
embeddedRunMock.activeIds.add("sess-main");
|
|
embeddedRunMock.waitResults.set("sess-main", false);
|
|
|
|
const { ws } = await openClient();
|
|
|
|
const reset = await rpcReq(ws, "sessions.reset", {
|
|
key: "main",
|
|
});
|
|
expect(reset.ok).toBe(false);
|
|
expect(reset.error?.code).toBe("UNAVAILABLE");
|
|
expect(reset.error?.message ?? "").toMatch(/still active/i);
|
|
expectActiveRunCleanup(
|
|
"agent:main:main",
|
|
["main", "agent:main:main", "sess-main"],
|
|
"sess-main",
|
|
);
|
|
|
|
const store = JSON.parse(await fs.readFile(storePath, "utf-8")) as Record<
|
|
string,
|
|
{ sessionId?: string }
|
|
>;
|
|
expect(store["agent:main:main"]?.sessionId).toBe("sess-main");
|
|
const filesAfterResetAttempt = await fs.readdir(dir);
|
|
expect(filesAfterResetAttempt.some((f) => f.startsWith("sess-main.jsonl.reset."))).toBe(false);
|
|
|
|
ws.close();
|
|
});
|
|
|
|
test("sessions.delete returns unavailable when active run does not stop", async () => {
|
|
const { dir, storePath } = await createSessionStoreDir();
|
|
await writeSingleLineSession(dir, "sess-active", "active");
|
|
|
|
await writeSessionStore({
|
|
entries: {
|
|
"discord:group:dev": {
|
|
sessionId: "sess-active",
|
|
updatedAt: Date.now(),
|
|
},
|
|
},
|
|
});
|
|
|
|
embeddedRunMock.activeIds.add("sess-active");
|
|
embeddedRunMock.waitResults.set("sess-active", false);
|
|
|
|
const { ws } = await openClient();
|
|
|
|
const deleted = await rpcReq(ws, "sessions.delete", {
|
|
key: "discord:group:dev",
|
|
});
|
|
expect(deleted.ok).toBe(false);
|
|
expect(deleted.error?.code).toBe("UNAVAILABLE");
|
|
expect(deleted.error?.message ?? "").toMatch(/still active/i);
|
|
expectActiveRunCleanup(
|
|
"agent:main:discord:group:dev",
|
|
["discord:group:dev", "agent:main:discord:group:dev", "sess-active"],
|
|
"sess-active",
|
|
);
|
|
|
|
const store = JSON.parse(await fs.readFile(storePath, "utf-8")) as Record<
|
|
string,
|
|
{ sessionId?: string }
|
|
>;
|
|
expect(store["agent:main:discord:group:dev"]?.sessionId).toBe("sess-active");
|
|
const filesAfterDeleteAttempt = await fs.readdir(dir);
|
|
expect(filesAfterDeleteAttempt.some((f) => f.startsWith("sess-active.jsonl.deleted."))).toBe(
|
|
false,
|
|
);
|
|
|
|
ws.close();
|
|
});
|
|
|
|
test("webchat clients cannot patch or delete sessions", async () => {
|
|
const dir = await fs.mkdtemp(path.join(os.tmpdir(), "openclaw-sessions-webchat-"));
|
|
const storePath = path.join(dir, "sessions.json");
|
|
testState.sessionStorePath = storePath;
|
|
|
|
await writeSessionStore({
|
|
entries: {
|
|
main: {
|
|
sessionId: "sess-main",
|
|
updatedAt: Date.now(),
|
|
},
|
|
"discord:group:dev": {
|
|
sessionId: "sess-group",
|
|
updatedAt: Date.now(),
|
|
},
|
|
},
|
|
});
|
|
|
|
const ws = new WebSocket(`ws://127.0.0.1:${harness.port}`, {
|
|
headers: { origin: `http://127.0.0.1:${harness.port}` },
|
|
});
|
|
await new Promise<void>((resolve) => ws.once("open", resolve));
|
|
await connectOk(ws, {
|
|
client: {
|
|
id: GATEWAY_CLIENT_IDS.WEBCHAT_UI,
|
|
version: "1.0.0",
|
|
platform: "test",
|
|
mode: GATEWAY_CLIENT_MODES.UI,
|
|
},
|
|
scopes: ["operator.admin"],
|
|
});
|
|
|
|
const patched = await rpcReq(ws, "sessions.patch", {
|
|
key: "agent:main:discord:group:dev",
|
|
label: "should-fail",
|
|
});
|
|
expect(patched.ok).toBe(false);
|
|
expect(patched.error?.message ?? "").toMatch(/webchat clients cannot patch sessions/i);
|
|
|
|
const deleted = await rpcReq(ws, "sessions.delete", {
|
|
key: "agent:main:discord:group:dev",
|
|
});
|
|
expect(deleted.ok).toBe(false);
|
|
expect(deleted.error?.message ?? "").toMatch(/webchat clients cannot delete sessions/i);
|
|
|
|
ws.close();
|
|
});
|
|
});
|