Some checks failed
Block internal-flavored paths / Block forbidden paths (pull_request) Successful in 20s
CI / Detect changes (pull_request) Successful in 44s
Harness Replays / detect-changes (pull_request) Successful in 16s
E2E API Smoke Test / detect-changes (pull_request) Successful in 32s
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 14s
Handlers Postgres Integration / detect-changes (pull_request) Successful in 32s
gate-check-v3 / gate-check (pull_request) Failing after 15s
E2E Staging Canvas (Playwright) / detect-changes (pull_request) Successful in 38s
qa-review / approved (pull_request) Failing after 14s
security-review / approved (pull_request) Failing after 15s
sop-checklist-gate / gate (pull_request) Successful in 15s
sop-tier-check / tier-check (pull_request) Successful in 16s
Runtime PR-Built Compatibility / detect-changes (pull_request) Successful in 36s
sop-checklist / all-items-acked (pull_request) [info tier:low] auto-success for tier:low
lint-required-no-paths / lint-required-no-paths (pull_request) Successful in 1m15s
CI / Canvas (Next.js) (pull_request) Successful in 11s
CI / Shellcheck (E2E scripts) (pull_request) Successful in 6s
CI / Python Lint & Test (pull_request) Successful in 7s
Harness Replays / Harness Replays (pull_request) Successful in 7s
E2E Staging Canvas (Playwright) / Canvas tabs E2E (pull_request) Successful in 10s
Runtime PR-Built Compatibility / PR-built wheel + import smoke (pull_request) Successful in 8s
audit-force-merge / audit (pull_request) Successful in 24s
Handlers Postgres Integration / Handlers Postgres Integration (pull_request) Failing after 1m32s
E2E API Smoke Test / E2E API Smoke Test (pull_request) Successful in 2m8s
CI / Platform (Go) (pull_request) Failing after 5m3s
CI / Canvas Deploy Reminder (pull_request) Has been skipped
CI / all-required (pull_request) Successful in 7s
RFC #2829 PR-1/4: GET /workspaces/:id/delegations previously queried only activity_logs, returning [] for active/completed delegations while the agent's check_delegation_status showed them correctly. The new delegations table (migration 049) now holds durable state for active delegations. The handler now tries the ledger first (delegations table), falls back to activity_logs for pre-migration data, and returns [] only when both are empty. This closes the mismatch where: - GET /delegations → [] - check_delegation_status(task_id) → active/completed 6 new tests: TestListDelegations_LedgerRowsReturned TestListDelegations_LedgerEmptyFallsBackToActivityLogs TestListDelegations_BothEmptyReturnsEmptyArray TestListDelegations_LedgerQueryErrorFallsBackToActivityLogs TestListDelegations_LedgerCompletedIncludesResultPreview TestListDelegations_LedgerFailedIncludesErrorDetail Updated existing tests TestListDelegations_Empty and TestListDelegations_WithResults to use the ledger-first flow. Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
1689 lines
63 KiB
Go
1689 lines
63 KiB
Go
package handlers
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"encoding/json"
|
|
"fmt"
|
|
"net"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"sync"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/DATA-DOG/go-sqlmock"
|
|
"github.com/gin-gonic/gin"
|
|
)
|
|
|
|
// ---------- Delegate: missing target_id → 400 ----------
|
|
|
|
func TestDelegate_MissingTargetID(t *testing.T) {
|
|
setupTestDB(t)
|
|
setupTestRedis(t)
|
|
broadcaster := newTestBroadcaster()
|
|
wh := NewWorkspaceHandler(broadcaster, nil, "http://localhost:8080", t.TempDir())
|
|
dh := NewDelegationHandler(wh, broadcaster)
|
|
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
c.Params = gin.Params{{Key: "id", Value: "ws-source"}}
|
|
body := `{"task":"do something"}`
|
|
c.Request = httptest.NewRequest("POST", "/workspaces/ws-source/delegate", bytes.NewBufferString(body))
|
|
c.Request.Header.Set("Content-Type", "application/json")
|
|
|
|
dh.Delegate(c)
|
|
|
|
if w.Code != http.StatusBadRequest {
|
|
t.Errorf("expected 400, got %d: %s", w.Code, w.Body.String())
|
|
}
|
|
}
|
|
|
|
// ---------- Delegate: missing task → 400 ----------
|
|
|
|
func TestDelegate_MissingTask(t *testing.T) {
|
|
setupTestDB(t)
|
|
setupTestRedis(t)
|
|
broadcaster := newTestBroadcaster()
|
|
wh := NewWorkspaceHandler(broadcaster, nil, "http://localhost:8080", t.TempDir())
|
|
dh := NewDelegationHandler(wh, broadcaster)
|
|
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
c.Params = gin.Params{{Key: "id", Value: "ws-source"}}
|
|
body := `{"target_id":"aaaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee"}`
|
|
c.Request = httptest.NewRequest("POST", "/workspaces/ws-source/delegate", bytes.NewBufferString(body))
|
|
c.Request.Header.Set("Content-Type", "application/json")
|
|
|
|
dh.Delegate(c)
|
|
|
|
if w.Code != http.StatusBadRequest {
|
|
t.Errorf("expected 400, got %d: %s", w.Code, w.Body.String())
|
|
}
|
|
}
|
|
|
|
// ---------- Delegate: invalid UUID target_id → 400 ----------
|
|
|
|
func TestDelegate_InvalidUUIDTargetID(t *testing.T) {
|
|
setupTestDB(t)
|
|
setupTestRedis(t)
|
|
broadcaster := newTestBroadcaster()
|
|
wh := NewWorkspaceHandler(broadcaster, nil, "http://localhost:8080", t.TempDir())
|
|
dh := NewDelegationHandler(wh, broadcaster)
|
|
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
c.Params = gin.Params{{Key: "id", Value: "ws-source"}}
|
|
body := `{"target_id":"not-a-valid-uuid","task":"do something"}`
|
|
c.Request = httptest.NewRequest("POST", "/workspaces/ws-source/delegate", bytes.NewBufferString(body))
|
|
c.Request.Header.Set("Content-Type", "application/json")
|
|
|
|
dh.Delegate(c)
|
|
|
|
if w.Code != http.StatusBadRequest {
|
|
t.Errorf("expected 400, got %d: %s", w.Code, w.Body.String())
|
|
}
|
|
var resp map[string]interface{}
|
|
json.Unmarshal(w.Body.Bytes(), &resp)
|
|
if resp["error"] != "target_id must be a valid UUID" {
|
|
t.Errorf("expected UUID error message, got %v", resp["error"])
|
|
}
|
|
}
|
|
|
|
// ---------- Delegate: self-delegation → 400 ----------
|
|
|
|
func TestDelegate_SelfDelegation_Rejected(t *testing.T) {
|
|
setupTestDB(t)
|
|
setupTestRedis(t)
|
|
broadcaster := newTestBroadcaster()
|
|
wh := NewWorkspaceHandler(broadcaster, nil, "http://localhost:8080", t.TempDir())
|
|
dh := NewDelegationHandler(wh, broadcaster)
|
|
|
|
// Use the same UUID for both source and target to trigger the self-delegation guard.
|
|
selfID := "11111111-2222-3333-4444-555555555555"
|
|
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
c.Params = gin.Params{{Key: "id", Value: selfID}}
|
|
body := `{"target_id":"` + selfID + `","task":"do something"}`
|
|
c.Request = httptest.NewRequest("POST", "/workspaces/"+selfID+"/delegate", bytes.NewBufferString(body))
|
|
c.Request.Header.Set("Content-Type", "application/json")
|
|
|
|
dh.Delegate(c)
|
|
|
|
if w.Code != http.StatusBadRequest {
|
|
t.Errorf("expected 400, got %d: %s", w.Code, w.Body.String())
|
|
}
|
|
var resp map[string]interface{}
|
|
json.Unmarshal(w.Body.Bytes(), &resp)
|
|
if resp["error"] != "self-delegation not permitted" {
|
|
t.Errorf("expected 'self-delegation not permitted', got %v", resp["error"])
|
|
}
|
|
}
|
|
|
|
// ---------- Delegate: success → 202 with delegation_id ----------
|
|
|
|
func TestDelegate_Success(t *testing.T) {
|
|
mock := setupTestDB(t)
|
|
setupTestRedis(t)
|
|
broadcaster := newTestBroadcaster()
|
|
wh := NewWorkspaceHandler(broadcaster, nil, "http://localhost:8080", t.TempDir())
|
|
dh := NewDelegationHandler(wh, broadcaster)
|
|
|
|
targetID := "aaaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee"
|
|
|
|
// Expect INSERT into activity_logs for delegation tracking
|
|
// (6th arg is idempotency_key — nil here since the request omits it)
|
|
mock.ExpectExec("INSERT INTO activity_logs").
|
|
WithArgs("ws-source", "ws-source", targetID, "Delegating to "+targetID, sqlmock.AnyArg(), nil).
|
|
WillReturnResult(sqlmock.NewResult(0, 1))
|
|
|
|
// Expect RecordAndBroadcast INSERT into structure_events
|
|
mock.ExpectExec("INSERT INTO structure_events").
|
|
WillReturnResult(sqlmock.NewResult(0, 1))
|
|
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
c.Params = gin.Params{{Key: "id", Value: "ws-source"}}
|
|
body := fmt.Sprintf(`{"target_id":"%s","task":"write unit tests"}`, targetID)
|
|
c.Request = httptest.NewRequest("POST", "/workspaces/ws-source/delegate", bytes.NewBufferString(body))
|
|
c.Request.Header.Set("Content-Type", "application/json")
|
|
|
|
dh.Delegate(c)
|
|
|
|
if w.Code != http.StatusAccepted {
|
|
t.Errorf("expected 202, got %d: %s", w.Code, w.Body.String())
|
|
}
|
|
|
|
var resp map[string]interface{}
|
|
if err := json.Unmarshal(w.Body.Bytes(), &resp); err != nil {
|
|
t.Fatalf("failed to parse response: %v", err)
|
|
}
|
|
if resp["delegation_id"] == nil || resp["delegation_id"] == "" {
|
|
t.Error("expected non-empty delegation_id in response")
|
|
}
|
|
if resp["status"] != "delegated" {
|
|
t.Errorf("expected status 'delegated', got %v", resp["status"])
|
|
}
|
|
if resp["target_id"] != targetID {
|
|
t.Errorf("expected target_id %s, got %v", targetID, resp["target_id"])
|
|
}
|
|
// Should NOT have a warning when DB insert succeeds
|
|
if resp["warning"] != nil {
|
|
t.Errorf("expected no warning, got %v", resp["warning"])
|
|
}
|
|
|
|
// Wait for background goroutine to run (it will try DB queries that aren't mocked,
|
|
// but we don't want it to race with test cleanup)
|
|
time.Sleep(100 * time.Millisecond)
|
|
}
|
|
|
|
// ---------- Delegate: DB insert fails → still 202 with warning ----------
|
|
|
|
func TestDelegate_DBInsertFails_Still202WithWarning(t *testing.T) {
|
|
mock := setupTestDB(t)
|
|
setupTestRedis(t)
|
|
broadcaster := newTestBroadcaster()
|
|
wh := NewWorkspaceHandler(broadcaster, nil, "http://localhost:8080", t.TempDir())
|
|
dh := NewDelegationHandler(wh, broadcaster)
|
|
|
|
targetID := "aaaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee"
|
|
|
|
// DB insert fails (6th arg = idempotency_key, nil for this test)
|
|
mock.ExpectExec("INSERT INTO activity_logs").
|
|
WithArgs("ws-source", "ws-source", targetID, "Delegating to "+targetID, sqlmock.AnyArg(), nil).
|
|
WillReturnError(fmt.Errorf("database connection lost"))
|
|
|
|
// RecordAndBroadcast still fires
|
|
mock.ExpectExec("INSERT INTO structure_events").
|
|
WillReturnResult(sqlmock.NewResult(0, 1))
|
|
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
c.Params = gin.Params{{Key: "id", Value: "ws-source"}}
|
|
body := fmt.Sprintf(`{"target_id":"%s","task":"write unit tests"}`, targetID)
|
|
c.Request = httptest.NewRequest("POST", "/workspaces/ws-source/delegate", bytes.NewBufferString(body))
|
|
c.Request.Header.Set("Content-Type", "application/json")
|
|
|
|
dh.Delegate(c)
|
|
|
|
if w.Code != http.StatusAccepted {
|
|
t.Errorf("expected 202, got %d: %s", w.Code, w.Body.String())
|
|
}
|
|
|
|
var resp map[string]interface{}
|
|
json.Unmarshal(w.Body.Bytes(), &resp)
|
|
if resp["warning"] == nil {
|
|
t.Error("expected warning when DB insert fails")
|
|
}
|
|
if resp["delegation_id"] == nil || resp["delegation_id"] == "" {
|
|
t.Error("expected non-empty delegation_id even on DB failure")
|
|
}
|
|
|
|
// Wait for background goroutine
|
|
time.Sleep(100 * time.Millisecond)
|
|
}
|
|
|
|
// ---------- ListDelegations: empty results → 200 with [] ----------
|
|
|
|
func TestListDelegations_Empty(t *testing.T) {
|
|
mock := setupTestDB(t)
|
|
setupTestRedis(t)
|
|
broadcaster := newTestBroadcaster()
|
|
wh := NewWorkspaceHandler(broadcaster, nil, "http://localhost:8080", t.TempDir())
|
|
dh := NewDelegationHandler(wh, broadcaster)
|
|
|
|
// Ledger returns empty → falls back to activity_logs (also empty)
|
|
mock.ExpectQuery("SELECT d.delegation_id, d.caller_id, d.callee_id, d.task_preview").
|
|
WithArgs("ws-source").
|
|
WillReturnRows(sqlmock.NewRows([]string{
|
|
"delegation_id", "caller_id", "callee_id", "task_preview",
|
|
"status", "result_preview", "error_detail", "last_heartbeat",
|
|
"deadline", "created_at", "updated_at",
|
|
}))
|
|
mock.ExpectQuery("SELECT id, activity_type").
|
|
WithArgs("ws-source").
|
|
WillReturnRows(sqlmock.NewRows([]string{
|
|
"id", "activity_type", "source_id", "target_id",
|
|
"summary", "status", "error_detail", "response_body",
|
|
"delegation_id", "created_at",
|
|
}))
|
|
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
c.Params = gin.Params{{Key: "id", Value: "ws-source"}}
|
|
c.Request = httptest.NewRequest("GET", "/workspaces/ws-source/delegations", nil)
|
|
|
|
dh.ListDelegations(c)
|
|
|
|
if w.Code != http.StatusOK {
|
|
t.Errorf("expected 200, got %d: %s", w.Code, w.Body.String())
|
|
}
|
|
|
|
var resp []interface{}
|
|
if err := json.Unmarshal(w.Body.Bytes(), &resp); err != nil {
|
|
t.Fatalf("failed to parse response: %v", err)
|
|
}
|
|
if len(resp) != 0 {
|
|
t.Errorf("expected empty array, got %d entries", len(resp))
|
|
}
|
|
if err := mock.ExpectationsWereMet(); err != nil {
|
|
t.Errorf("unmet sqlmock expectations: %v", err)
|
|
}
|
|
}
|
|
|
|
// ---------- ListDelegations: with results (ledger only, no activity_logs fallback) ----------
|
|
|
|
func TestListDelegations_WithResults(t *testing.T) {
|
|
mock := setupTestDB(t)
|
|
setupTestRedis(t)
|
|
broadcaster := newTestBroadcaster()
|
|
wh := NewWorkspaceHandler(broadcaster, nil, "http://localhost:8080", t.TempDir())
|
|
dh := NewDelegationHandler(wh, broadcaster)
|
|
|
|
now := time.Now()
|
|
// Ledger query returns rows — no fallback to activity_logs
|
|
rows := sqlmock.NewRows([]string{
|
|
"delegation_id", "caller_id", "callee_id", "task_preview",
|
|
"status", "result_preview", "error_detail", "last_heartbeat",
|
|
"deadline", "created_at", "updated_at",
|
|
}).
|
|
AddRow("del-111", "ws-source", "ws-target",
|
|
"Delegating to ws-target", "pending", "", "",
|
|
&now, &now.Add(6*time.Hour), now, now).
|
|
AddRow("del-222", "ws-source", "ws-target",
|
|
"Delegation completed (hello world)", "completed", "hello world", "",
|
|
&now, &now.Add(6*time.Hour), now, now.Add(time.Minute))
|
|
|
|
mock.ExpectQuery("SELECT d.delegation_id, d.caller_id, d.callee_id, d.task_preview").
|
|
WithArgs("ws-source").
|
|
WillReturnRows(rows)
|
|
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
c.Params = gin.Params{{Key: "id", Value: "ws-source"}}
|
|
c.Request = httptest.NewRequest("GET", "/workspaces/ws-source/delegations", nil)
|
|
|
|
dh.ListDelegations(c)
|
|
|
|
if w.Code != http.StatusOK {
|
|
t.Errorf("expected 200, got %d: %s", w.Code, w.Body.String())
|
|
}
|
|
|
|
var resp []map[string]interface{}
|
|
if err := json.Unmarshal(w.Body.Bytes(), &resp); err != nil {
|
|
t.Fatalf("failed to parse response: %v", err)
|
|
}
|
|
if len(resp) != 2 {
|
|
t.Fatalf("expected 2 entries, got %d", len(resp))
|
|
}
|
|
|
|
// Check first entry (pending delegation)
|
|
if resp[0]["delegation_id"] != "del-111" {
|
|
t.Errorf("expected delegation_id 'del-111', got %v", resp[0]["delegation_id"])
|
|
}
|
|
if resp[0]["status"] != "pending" {
|
|
t.Errorf("expected status 'pending', got %v", resp[0]["status"])
|
|
}
|
|
if resp[0]["source_id"] != "ws-source" {
|
|
t.Errorf("expected source_id 'ws-source', got %v", resp[0]["source_id"])
|
|
}
|
|
if resp[0]["target_id"] != "ws-target" {
|
|
t.Errorf("expected target_id 'ws-target', got %v", resp[0]["target_id"])
|
|
}
|
|
if resp[0]["_ledger"] != true {
|
|
t.Errorf("expected _ledger=true marker, got %v", resp[0]["_ledger"])
|
|
}
|
|
|
|
// Check second entry (completed, has response_preview)
|
|
if resp[1]["delegation_id"] != "del-222" {
|
|
t.Errorf("expected delegation_id 'del-222', got %v", resp[1]["delegation_id"])
|
|
}
|
|
if resp[1]["status"] != "completed" {
|
|
t.Errorf("expected status 'completed', got %v", resp[1]["status"])
|
|
}
|
|
if resp[1]["response_preview"] != "hello world" {
|
|
t.Errorf("expected response_preview 'hello world', got %v", resp[1]["response_preview"])
|
|
}
|
|
|
|
if err := mock.ExpectationsWereMet(); err != nil {
|
|
t.Errorf("unmet sqlmock expectations: %v", err)
|
|
}
|
|
}
|
|
|
|
// ---------- #74: isTransientProxyError retry classification ----------
|
|
|
|
func TestIsTransientProxyError_RetriesOnRestartRaceStatuses(t *testing.T) {
|
|
cases := []struct {
|
|
name string
|
|
err *proxyA2AError
|
|
expect bool
|
|
}{
|
|
{"nil", nil, false},
|
|
// 503 with restarting:true — container was dead; restart triggered.
|
|
// Message was NOT delivered (dead container). Safe to retry (#74).
|
|
{"503 container restart triggered — retry",
|
|
&proxyA2AError{Status: http.StatusServiceUnavailable, Response: gin.H{"restarting": true}}, true},
|
|
// 503 with busy:true — agent is alive, mid-synthesis on the delivered
|
|
// message. Retrying would double-deliver (#689). Must NOT retry.
|
|
{"503 agent busy (double-delivery risk) — no retry",
|
|
&proxyA2AError{Status: http.StatusServiceUnavailable, Response: gin.H{"busy": true, "retry_after": 30}}, false},
|
|
// 503 with no qualifying flag — conservative: don't retry.
|
|
{"503 plain (no restarting flag) — no retry",
|
|
&proxyA2AError{Status: http.StatusServiceUnavailable}, false},
|
|
// 502 = connection refused = message not delivered → safe to retry.
|
|
{"502 bad gateway (connection refused) — retry",
|
|
&proxyA2AError{Status: http.StatusBadGateway}, true},
|
|
{"404 workspace not found",
|
|
&proxyA2AError{Status: http.StatusNotFound}, false},
|
|
{"403 access denied — static, don't retry",
|
|
&proxyA2AError{Status: http.StatusForbidden}, false},
|
|
{"400 bad request — static, don't retry",
|
|
&proxyA2AError{Status: http.StatusBadRequest}, false},
|
|
{"500 generic — conservative, don't retry",
|
|
&proxyA2AError{Status: http.StatusInternalServerError}, false},
|
|
}
|
|
for _, tc := range cases {
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
if got := isTransientProxyError(tc.err); got != tc.expect {
|
|
t.Errorf("isTransientProxyError(%+v) = %v, want %v", tc.err, got, tc.expect)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
// TestIsDeliveryConfirmedSuccess — regression guard for #159: the proxy can
|
|
// return a complete 2xx body and THEN raise a transport error (e.g. the TCP
|
|
// connection drops after the response is received but before close). In that
|
|
// case the agent did the work; marking the delegation "failed" causes the
|
|
// retry-storm + Restart-workspace cascade described in #159. The new helper
|
|
// distinguishes this from genuine failures.
|
|
func TestIsDeliveryConfirmedSuccess(t *testing.T) {
|
|
connErr := &proxyA2AError{Status: http.StatusOK, Response: gin.H{}}
|
|
cases := []struct {
|
|
name string
|
|
proxyErr *proxyA2AError
|
|
status int
|
|
body []byte
|
|
expect bool
|
|
}{
|
|
// The new branch: 2xx + body + transport error → recover as success.
|
|
{"200 + body + connreset (THE bug fix path)", connErr, http.StatusOK, []byte(`{"text":"ok"}`), true},
|
|
{"299 + body + connreset (boundary high)", connErr, 299, []byte(`{"text":"ok"}`), true},
|
|
{"200 + body + connreset (boundary low)", connErr, 200, []byte(`{"x":1}`), true},
|
|
// Negative cases: any one of the three preconditions failing → false.
|
|
{"nil proxyErr (no decision to make)", nil, http.StatusOK, []byte(`{"text":"ok"}`), false},
|
|
{"empty body (no work-result to recover)", connErr, http.StatusOK, []byte{}, false},
|
|
{"nil body (no work-result to recover)", connErr, http.StatusOK, nil, false},
|
|
{"4xx with body — agent signalled failure, do not promote", connErr, http.StatusBadRequest, []byte(`{"err":"bad"}`), false},
|
|
{"5xx with body — agent signalled failure, do not promote", connErr, http.StatusInternalServerError, []byte(`{"err":"crash"}`), false},
|
|
{"3xx with body — redirect, not a result", connErr, 301, []byte(`{"loc":"/x"}`), false},
|
|
{"199 status (under 200) — not a 2xx", connErr, 199, []byte(`{"x":1}`), false},
|
|
}
|
|
for _, tc := range cases {
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
if got := isDeliveryConfirmedSuccess(tc.proxyErr, tc.status, tc.body); got != tc.expect {
|
|
t.Errorf("isDeliveryConfirmedSuccess(%v, %d, %q) = %v, want %v",
|
|
tc.proxyErr, tc.status, string(tc.body), got, tc.expect)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestIsQueuedProxyResponse(t *testing.T) {
|
|
// Regression guard for the chat-leak bug: when the proxy returns
|
|
// 202 with a queued-shape body, executeDelegation must classify it
|
|
// as "queued" — not "completed". Mis-classifying it causes the
|
|
// queued JSON to land in activity_logs.summary, which the LLM then
|
|
// echoes verbatim into the agent chat as
|
|
// "Delegation completed: Delegation completed (workspace agent
|
|
// busy — request queued, will dispatch...)".
|
|
cases := []struct {
|
|
name string
|
|
body string
|
|
want bool
|
|
}{
|
|
{
|
|
name: "real proxy busy-enqueue body",
|
|
body: `{"queued":true,"queue_id":"d0993390-5f5a-4f5d-90a2-66639e53e3c9","queue_depth":1,"message":"workspace agent busy — request queued, will dispatch when capacity available"}`,
|
|
want: true,
|
|
},
|
|
{"queued false explicitly", `{"queued":false}`, false},
|
|
{"queued field absent (real A2A reply)", `{"jsonrpc":"2.0","id":"1","result":{"kind":"message","parts":[{"kind":"text","text":"hi"}]}}`, false},
|
|
{"non-bool queued value (defensive)", `{"queued":"true"}`, false},
|
|
{"malformed JSON", `not-json`, false},
|
|
{"empty body", ``, false},
|
|
}
|
|
for _, tc := range cases {
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
if got := isQueuedProxyResponse([]byte(tc.body)); got != tc.want {
|
|
t.Errorf("isQueuedProxyResponse(%q) = %v, want %v", tc.body, got, tc.want)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestDelegationRetryDelay_IsSaneWindow(t *testing.T) {
|
|
// Regression guard: the retry delay must be long enough for the
|
|
// reactive URL refresh in proxyA2ARequest to kick in (which involves
|
|
// a Docker IsRunning check + DB update + RestartByID call) but short
|
|
// enough that a transient failure doesn't block the 30-min outer
|
|
// timeout. 8s is the chosen balance.
|
|
if delegationRetryDelay < 2*time.Second || delegationRetryDelay > 30*time.Second {
|
|
t.Errorf("delegationRetryDelay = %v, expected [2s, 30s]", delegationRetryDelay)
|
|
}
|
|
}
|
|
|
|
// ---------- #64: Record + UpdateStatus endpoints ----------
|
|
|
|
func TestDelegationRecord_InsertsActivityLogRow(t *testing.T) {
|
|
mock := setupTestDB(t)
|
|
setupTestRedis(t)
|
|
broadcaster := newTestBroadcaster()
|
|
wh := NewWorkspaceHandler(broadcaster, nil, "http://localhost:8080", t.TempDir())
|
|
h := NewDelegationHandler(wh, broadcaster)
|
|
|
|
mock.ExpectExec("INSERT INTO activity_logs").
|
|
WithArgs(
|
|
"550e8400-e29b-41d4-a716-446655440000", // workspace_id
|
|
"550e8400-e29b-41d4-a716-446655440000", // source_id
|
|
"550e8400-e29b-41d4-a716-446655440001", // target_id
|
|
"Delegating to 550e8400-e29b-41d4-a716-446655440001", // summary
|
|
sqlmock.AnyArg(), // request_body (jsonb)
|
|
).
|
|
WillReturnResult(sqlmock.NewResult(0, 1))
|
|
// RecordAndBroadcast INSERT for DELEGATION_SENT
|
|
mock.ExpectExec("INSERT INTO structure_events").
|
|
WillReturnResult(sqlmock.NewResult(0, 1))
|
|
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
c.Params = gin.Params{{Key: "id", Value: "550e8400-e29b-41d4-a716-446655440000"}}
|
|
body := `{"target_id":"550e8400-e29b-41d4-a716-446655440001","task":"hello","delegation_id":"del-xyz"}`
|
|
c.Request = httptest.NewRequest("POST", "/delegations/record", bytes.NewBufferString(body))
|
|
c.Request.Header.Set("Content-Type", "application/json")
|
|
|
|
h.Record(c)
|
|
|
|
if w.Code != http.StatusAccepted {
|
|
t.Errorf("expected 202, got %d: %s", w.Code, w.Body.String())
|
|
}
|
|
var resp map[string]interface{}
|
|
json.Unmarshal(w.Body.Bytes(), &resp)
|
|
if resp["delegation_id"] != "del-xyz" {
|
|
t.Errorf("expected delegation_id=del-xyz, got %v", resp["delegation_id"])
|
|
}
|
|
if resp["status"] != "recorded" {
|
|
t.Errorf("expected status=recorded, got %v", resp["status"])
|
|
}
|
|
if err := mock.ExpectationsWereMet(); err != nil {
|
|
t.Errorf("unmet expectations: %v", err)
|
|
}
|
|
}
|
|
|
|
func TestDelegationRecord_RejectsInvalidUUID(t *testing.T) {
|
|
setupTestDB(t)
|
|
setupTestRedis(t)
|
|
broadcaster := newTestBroadcaster()
|
|
wh := NewWorkspaceHandler(broadcaster, nil, "http://localhost:8080", t.TempDir())
|
|
h := NewDelegationHandler(wh, broadcaster)
|
|
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
c.Params = gin.Params{{Key: "id", Value: "550e8400-e29b-41d4-a716-446655440000"}}
|
|
body := `{"target_id":"not-a-uuid","task":"x","delegation_id":"del-1"}`
|
|
c.Request = httptest.NewRequest("POST", "/delegations/record", bytes.NewBufferString(body))
|
|
c.Request.Header.Set("Content-Type", "application/json")
|
|
|
|
h.Record(c)
|
|
if w.Code != http.StatusBadRequest {
|
|
t.Errorf("expected 400 for invalid target UUID, got %d", w.Code)
|
|
}
|
|
}
|
|
|
|
func TestDelegationUpdateStatus_CompletedInsertsResultRow(t *testing.T) {
|
|
mock := setupTestDB(t)
|
|
setupTestRedis(t)
|
|
broadcaster := newTestBroadcaster()
|
|
wh := NewWorkspaceHandler(broadcaster, nil, "http://localhost:8080", t.TempDir())
|
|
h := NewDelegationHandler(wh, broadcaster)
|
|
|
|
// updateDelegationStatus UPDATE
|
|
mock.ExpectExec("UPDATE activity_logs").
|
|
WithArgs("completed", "", "550e8400-e29b-41d4-a716-446655440000", "del-xyz").
|
|
WillReturnResult(sqlmock.NewResult(0, 1))
|
|
// delegate_result INSERT
|
|
mock.ExpectExec("INSERT INTO activity_logs").
|
|
WillReturnResult(sqlmock.NewResult(0, 1))
|
|
// DELEGATION_COMPLETE broadcast
|
|
mock.ExpectExec("INSERT INTO structure_events").
|
|
WillReturnResult(sqlmock.NewResult(0, 1))
|
|
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
c.Params = gin.Params{
|
|
{Key: "id", Value: "550e8400-e29b-41d4-a716-446655440000"},
|
|
{Key: "delegation_id", Value: "del-xyz"},
|
|
}
|
|
body := `{"status":"completed","response_preview":"task finished ok"}`
|
|
c.Request = httptest.NewRequest("POST", "/delegations/del-xyz/update", bytes.NewBufferString(body))
|
|
c.Request.Header.Set("Content-Type", "application/json")
|
|
|
|
h.UpdateStatus(c)
|
|
|
|
if w.Code != http.StatusOK {
|
|
t.Errorf("expected 200, got %d: %s", w.Code, w.Body.String())
|
|
}
|
|
if err := mock.ExpectationsWereMet(); err != nil {
|
|
t.Errorf("unmet expectations: %v", err)
|
|
}
|
|
}
|
|
|
|
func TestDelegationUpdateStatus_RejectsUnknownStatus(t *testing.T) {
|
|
setupTestDB(t)
|
|
setupTestRedis(t)
|
|
broadcaster := newTestBroadcaster()
|
|
wh := NewWorkspaceHandler(broadcaster, nil, "http://localhost:8080", t.TempDir())
|
|
h := NewDelegationHandler(wh, broadcaster)
|
|
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
c.Params = gin.Params{
|
|
{Key: "id", Value: "550e8400-e29b-41d4-a716-446655440000"},
|
|
{Key: "delegation_id", Value: "del-xyz"},
|
|
}
|
|
body := `{"status":"in_progress"}`
|
|
c.Request = httptest.NewRequest("POST", "/delegations/del-xyz/update", bytes.NewBufferString(body))
|
|
c.Request.Header.Set("Content-Type", "application/json")
|
|
|
|
h.UpdateStatus(c)
|
|
if w.Code != http.StatusBadRequest {
|
|
t.Errorf("expected 400, got %d", w.Code)
|
|
}
|
|
}
|
|
|
|
func TestDelegationUpdateStatus_FailedBroadcastsFailureEvent(t *testing.T) {
|
|
mock := setupTestDB(t)
|
|
setupTestRedis(t)
|
|
broadcaster := newTestBroadcaster()
|
|
wh := NewWorkspaceHandler(broadcaster, nil, "http://localhost:8080", t.TempDir())
|
|
h := NewDelegationHandler(wh, broadcaster)
|
|
|
|
mock.ExpectExec("UPDATE activity_logs").
|
|
WithArgs("failed", "boom", "550e8400-e29b-41d4-a716-446655440000", "del-xyz").
|
|
WillReturnResult(sqlmock.NewResult(0, 1))
|
|
// DELEGATION_FAILED broadcast
|
|
mock.ExpectExec("INSERT INTO structure_events").
|
|
WillReturnResult(sqlmock.NewResult(0, 1))
|
|
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
c.Params = gin.Params{
|
|
{Key: "id", Value: "550e8400-e29b-41d4-a716-446655440000"},
|
|
{Key: "delegation_id", Value: "del-xyz"},
|
|
}
|
|
body := `{"status":"failed","error":"boom"}`
|
|
c.Request = httptest.NewRequest("POST", "/delegations/del-xyz/update", bytes.NewBufferString(body))
|
|
c.Request.Header.Set("Content-Type", "application/json")
|
|
|
|
h.UpdateStatus(c)
|
|
if w.Code != http.StatusOK {
|
|
t.Errorf("expected 200, got %d: %s", w.Code, w.Body.String())
|
|
}
|
|
if err := mock.ExpectationsWereMet(); err != nil {
|
|
t.Errorf("unmet expectations: %v", err)
|
|
}
|
|
}
|
|
|
|
// ---------- #124 — idempotency: replay returns existing delegation ----------
|
|
|
|
func TestDelegate_IdempotentReplayReturnsExistingDelegation(t *testing.T) {
|
|
mock := setupTestDB(t)
|
|
setupTestRedis(t)
|
|
broadcaster := newTestBroadcaster()
|
|
wh := NewWorkspaceHandler(broadcaster, nil, "http://localhost:8080", t.TempDir())
|
|
dh := NewDelegationHandler(wh, broadcaster)
|
|
|
|
targetID := "aaaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee"
|
|
existingID := "11111111-2222-3333-4444-555555555555"
|
|
|
|
// Lookup by (workspace_id, idempotency_key) — finds an in-flight row.
|
|
mock.ExpectQuery("SELECT request_body->>'delegation_id', status, target_id").
|
|
WithArgs("ws-source", "key-abc").
|
|
WillReturnRows(sqlmock.NewRows([]string{"delegation_id", "status", "target_id"}).
|
|
AddRow(existingID, "dispatched", targetID))
|
|
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
c.Params = gin.Params{{Key: "id", Value: "ws-source"}}
|
|
body := fmt.Sprintf(`{"target_id":"%s","task":"work","idempotency_key":"key-abc"}`, targetID)
|
|
c.Request = httptest.NewRequest("POST", "/workspaces/ws-source/delegate", bytes.NewBufferString(body))
|
|
c.Request.Header.Set("Content-Type", "application/json")
|
|
|
|
dh.Delegate(c)
|
|
|
|
if w.Code != http.StatusOK {
|
|
t.Fatalf("expected 200 (idempotent hit), got %d: %s", w.Code, w.Body.String())
|
|
}
|
|
var resp map[string]interface{}
|
|
json.Unmarshal(w.Body.Bytes(), &resp)
|
|
if resp["delegation_id"] != existingID {
|
|
t.Errorf("expected existing delegation_id %s, got %v", existingID, resp["delegation_id"])
|
|
}
|
|
if resp["idempotent_hit"] != true {
|
|
t.Errorf("expected idempotent_hit=true, got %v", resp["idempotent_hit"])
|
|
}
|
|
if err := mock.ExpectationsWereMet(); err != nil {
|
|
t.Errorf("unmet expectations: %v", err)
|
|
}
|
|
}
|
|
|
|
// ---------- #124 — idempotency: failed prior row is released, new insert wins ----------
|
|
|
|
func TestDelegate_IdempotentFailedRowIsReleasedAndReplaced(t *testing.T) {
|
|
mock := setupTestDB(t)
|
|
setupTestRedis(t)
|
|
broadcaster := newTestBroadcaster()
|
|
wh := NewWorkspaceHandler(broadcaster, nil, "http://localhost:8080", t.TempDir())
|
|
dh := NewDelegationHandler(wh, broadcaster)
|
|
|
|
targetID := "aaaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee"
|
|
|
|
// Lookup finds a failed prior attempt.
|
|
mock.ExpectQuery("SELECT request_body->>'delegation_id', status, target_id").
|
|
WithArgs("ws-source", "retry-key").
|
|
WillReturnRows(sqlmock.NewRows([]string{"delegation_id", "status", "target_id"}).
|
|
AddRow("old-failed-id", "failed", targetID))
|
|
// Failed row is deleted to release the unique slot.
|
|
mock.ExpectExec("DELETE FROM activity_logs").
|
|
WithArgs("ws-source", "retry-key").
|
|
WillReturnResult(sqlmock.NewResult(0, 1))
|
|
// Fresh insert with the same idempotency key.
|
|
mock.ExpectExec("INSERT INTO activity_logs").
|
|
WithArgs("ws-source", "ws-source", targetID, "Delegating to "+targetID, sqlmock.AnyArg(), "retry-key").
|
|
WillReturnResult(sqlmock.NewResult(0, 1))
|
|
mock.ExpectExec("INSERT INTO structure_events").
|
|
WillReturnResult(sqlmock.NewResult(0, 1))
|
|
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
c.Params = gin.Params{{Key: "id", Value: "ws-source"}}
|
|
body := fmt.Sprintf(`{"target_id":"%s","task":"retry","idempotency_key":"retry-key"}`, targetID)
|
|
c.Request = httptest.NewRequest("POST", "/workspaces/ws-source/delegate", bytes.NewBufferString(body))
|
|
c.Request.Header.Set("Content-Type", "application/json")
|
|
|
|
dh.Delegate(c)
|
|
|
|
if w.Code != http.StatusAccepted {
|
|
t.Fatalf("expected 202 (fresh delegation after failed retry), got %d: %s", w.Code, w.Body.String())
|
|
}
|
|
var resp map[string]interface{}
|
|
json.Unmarshal(w.Body.Bytes(), &resp)
|
|
if resp["idempotent_hit"] == true {
|
|
t.Error("expected fresh delegation, not idempotent_hit")
|
|
}
|
|
if resp["delegation_id"] == "" || resp["delegation_id"] == nil {
|
|
t.Error("expected non-empty delegation_id on retry")
|
|
}
|
|
time.Sleep(100 * time.Millisecond)
|
|
}
|
|
|
|
// ---------- #124 — idempotency: concurrent insert race resolves to existing ----------
|
|
|
|
func TestDelegate_IdempotentRaceUniqueViolationReturnsExisting(t *testing.T) {
|
|
mock := setupTestDB(t)
|
|
setupTestRedis(t)
|
|
broadcaster := newTestBroadcaster()
|
|
wh := NewWorkspaceHandler(broadcaster, nil, "http://localhost:8080", t.TempDir())
|
|
dh := NewDelegationHandler(wh, broadcaster)
|
|
|
|
targetID := "aaaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee"
|
|
winnerID := "99999999-8888-7777-6666-555555555555"
|
|
|
|
// Lookup finds nothing first.
|
|
mock.ExpectQuery("SELECT request_body->>'delegation_id', status, target_id").
|
|
WithArgs("ws-source", "race-key").
|
|
WillReturnError(fmt.Errorf("sql: no rows in result set"))
|
|
// Insert loses the race against a concurrent caller.
|
|
mock.ExpectExec("INSERT INTO activity_logs").
|
|
WithArgs("ws-source", "ws-source", targetID, "Delegating to "+targetID, sqlmock.AnyArg(), "race-key").
|
|
WillReturnError(fmt.Errorf("pq: duplicate key value violates unique constraint \"activity_logs_idempotency_uniq\""))
|
|
// Re-query returns the winner.
|
|
mock.ExpectQuery("SELECT request_body->>'delegation_id', status").
|
|
WithArgs("ws-source", "race-key").
|
|
WillReturnRows(sqlmock.NewRows([]string{"delegation_id", "status"}).
|
|
AddRow(winnerID, "pending"))
|
|
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
c.Params = gin.Params{{Key: "id", Value: "ws-source"}}
|
|
body := fmt.Sprintf(`{"target_id":"%s","task":"race","idempotency_key":"race-key"}`, targetID)
|
|
c.Request = httptest.NewRequest("POST", "/workspaces/ws-source/delegate", bytes.NewBufferString(body))
|
|
c.Request.Header.Set("Content-Type", "application/json")
|
|
|
|
dh.Delegate(c)
|
|
|
|
if w.Code != http.StatusOK {
|
|
t.Fatalf("expected 200 (race resolved to winner), got %d: %s", w.Code, w.Body.String())
|
|
}
|
|
var resp map[string]interface{}
|
|
json.Unmarshal(w.Body.Bytes(), &resp)
|
|
if resp["delegation_id"] != winnerID {
|
|
t.Errorf("expected winner delegation_id %s, got %v", winnerID, resp["delegation_id"])
|
|
}
|
|
if resp["idempotent_hit"] != true {
|
|
t.Errorf("expected idempotent_hit=true on race resolution, got %v", resp["idempotent_hit"])
|
|
}
|
|
}
|
|
|
|
// ==================== Direct unit tests for extracted helpers ====================
|
|
|
|
// --- bindDelegateRequest ---
|
|
|
|
func TestBindDelegateRequest_ValidJSON(t *testing.T) {
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
body := `{"target_id":"aaaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee","task":"hi"}`
|
|
c.Request = httptest.NewRequest("POST", "/x", bytes.NewBufferString(body))
|
|
c.Request.Header.Set("Content-Type", "application/json")
|
|
|
|
var out delegateRequest
|
|
if err := bindDelegateRequest(c, &out); err != nil {
|
|
t.Fatalf("unexpected error: %v", err)
|
|
}
|
|
if out.Task != "hi" {
|
|
t.Errorf("got task %q", out.Task)
|
|
}
|
|
}
|
|
|
|
func TestBindDelegateRequest_InvalidJSON(t *testing.T) {
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
c.Request = httptest.NewRequest("POST", "/x", bytes.NewBufferString("not json"))
|
|
c.Request.Header.Set("Content-Type", "application/json")
|
|
|
|
var out delegateRequest
|
|
if err := bindDelegateRequest(c, &out); err == nil {
|
|
t.Fatal("expected error")
|
|
}
|
|
if w.Code != http.StatusBadRequest {
|
|
t.Errorf("expected 400, got %d", w.Code)
|
|
}
|
|
}
|
|
|
|
func TestBindDelegateRequest_InvalidTargetUUID(t *testing.T) {
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
c.Request = httptest.NewRequest("POST", "/x", bytes.NewBufferString(`{"target_id":"not-uuid","task":"x"}`))
|
|
c.Request.Header.Set("Content-Type", "application/json")
|
|
|
|
var out delegateRequest
|
|
if err := bindDelegateRequest(c, &out); err == nil {
|
|
t.Fatal("expected error")
|
|
}
|
|
if w.Code != http.StatusBadRequest {
|
|
t.Errorf("expected 400, got %d", w.Code)
|
|
}
|
|
}
|
|
|
|
// --- lookupIdempotentDelegation ---
|
|
|
|
func TestLookupIdempotentDelegation_NoKey(t *testing.T) {
|
|
setupTestDB(t)
|
|
setupTestRedis(t)
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
|
|
if hit := lookupIdempotentDelegation(context.Background(), c, "ws-x", ""); hit {
|
|
t.Error("empty key should never hit")
|
|
}
|
|
}
|
|
|
|
func TestLookupIdempotentDelegation_NoMatch(t *testing.T) {
|
|
mock := setupTestDB(t)
|
|
setupTestRedis(t)
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
|
|
mock.ExpectQuery("SELECT request_body->>'delegation_id', status, target_id").
|
|
WithArgs("ws-x", "some-key").
|
|
WillReturnError(fmt.Errorf("sql: no rows"))
|
|
|
|
if hit := lookupIdempotentDelegation(context.Background(), c, "ws-x", "some-key"); hit {
|
|
t.Error("expected false when no row found")
|
|
}
|
|
}
|
|
|
|
func TestLookupIdempotentDelegation_FailedRowDeleted(t *testing.T) {
|
|
mock := setupTestDB(t)
|
|
setupTestRedis(t)
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
|
|
mock.ExpectQuery("SELECT request_body->>'delegation_id', status, target_id").
|
|
WithArgs("ws-x", "k").
|
|
WillReturnRows(sqlmock.NewRows([]string{"delegation_id", "status", "target_id"}).
|
|
AddRow("old", "failed", "ws-target"))
|
|
mock.ExpectExec("DELETE FROM activity_logs").
|
|
WithArgs("ws-x", "k").
|
|
WillReturnResult(sqlmock.NewResult(0, 1))
|
|
|
|
if hit := lookupIdempotentDelegation(context.Background(), c, "ws-x", "k"); hit {
|
|
t.Error("failed row should be released, returning false")
|
|
}
|
|
}
|
|
|
|
func TestLookupIdempotentDelegation_ExistingPending(t *testing.T) {
|
|
mock := setupTestDB(t)
|
|
setupTestRedis(t)
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
|
|
mock.ExpectQuery("SELECT request_body->>'delegation_id', status, target_id").
|
|
WithArgs("ws-x", "k").
|
|
WillReturnRows(sqlmock.NewRows([]string{"delegation_id", "status", "target_id"}).
|
|
AddRow("del-123", "pending", "ws-target"))
|
|
|
|
if hit := lookupIdempotentDelegation(context.Background(), c, "ws-x", "k"); !hit {
|
|
t.Fatal("expected hit=true")
|
|
}
|
|
if w.Code != http.StatusOK {
|
|
t.Errorf("expected 200, got %d", w.Code)
|
|
}
|
|
var resp map[string]interface{}
|
|
json.Unmarshal(w.Body.Bytes(), &resp)
|
|
if resp["delegation_id"] != "del-123" || resp["idempotent_hit"] != true {
|
|
t.Errorf("unexpected response: %v", resp)
|
|
}
|
|
}
|
|
|
|
// --- insertDelegationRow ---
|
|
|
|
func TestInsertDelegationRow_Success(t *testing.T) {
|
|
mock := setupTestDB(t)
|
|
setupTestRedis(t)
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
|
|
mock.ExpectExec("INSERT INTO activity_logs").
|
|
WillReturnResult(sqlmock.NewResult(0, 1))
|
|
|
|
out := insertDelegationRow(context.Background(), c,
|
|
"ws-src",
|
|
delegateRequest{TargetID: "aaaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee", Task: "hi"},
|
|
"del-1")
|
|
if out != insertOK {
|
|
t.Errorf("got %v, want insertOK", out)
|
|
}
|
|
}
|
|
|
|
func TestInsertDelegationRow_IdempotentConflict(t *testing.T) {
|
|
mock := setupTestDB(t)
|
|
setupTestRedis(t)
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
|
|
mock.ExpectExec("INSERT INTO activity_logs").
|
|
WillReturnError(fmt.Errorf("pq: duplicate key value violates unique constraint"))
|
|
mock.ExpectQuery("SELECT request_body->>'delegation_id', status").
|
|
WithArgs("ws-src", "k1").
|
|
WillReturnRows(sqlmock.NewRows([]string{"delegation_id", "status"}).
|
|
AddRow("winner-del", "pending"))
|
|
|
|
out := insertDelegationRow(context.Background(), c,
|
|
"ws-src",
|
|
delegateRequest{TargetID: "aaaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee", Task: "hi", IdempotencyKey: "k1"},
|
|
"loser-del")
|
|
if out != insertHandledByIdempotent {
|
|
t.Errorf("got %v, want insertHandledByIdempotent", out)
|
|
}
|
|
if w.Code != http.StatusOK {
|
|
t.Errorf("expected 200, got %d", w.Code)
|
|
}
|
|
}
|
|
|
|
func TestInsertDelegationRow_OtherDBError(t *testing.T) {
|
|
mock := setupTestDB(t)
|
|
setupTestRedis(t)
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
|
|
// Without IdempotencyKey, the follow-up SELECT is skipped — any insert
|
|
// error falls straight to insertTrackingUnavailable.
|
|
mock.ExpectExec("INSERT INTO activity_logs").
|
|
WillReturnError(fmt.Errorf("connection refused"))
|
|
|
|
out := insertDelegationRow(context.Background(), c,
|
|
"ws-src",
|
|
delegateRequest{TargetID: "aaaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee", Task: "hi"},
|
|
"del-x")
|
|
if out != insertTrackingUnavailable {
|
|
t.Errorf("got %v, want insertTrackingUnavailable", out)
|
|
}
|
|
}
|
|
|
|
// Verify the enum zero-value sentinel is defined and distinct from real outcomes.
|
|
func TestInsertDelegationOutcome_ZeroValueIsUnknown(t *testing.T) {
|
|
var zero insertDelegationOutcome
|
|
if zero != insertOutcomeUnknown {
|
|
t.Errorf("zero-value insertDelegationOutcome should equal insertOutcomeUnknown")
|
|
}
|
|
if insertOutcomeUnknown == insertOK {
|
|
t.Errorf("insertOutcomeUnknown must not collide with insertOK")
|
|
}
|
|
}
|
|
|
|
// ==================== executeDelegation — delivery-confirmed proxy error regression tests ====================
|
|
//
|
|
// These test the fix for issue #159: when proxyA2ARequest returns an error but we have a
|
|
// non-empty response body with a 2xx status code, executeDelegation must treat it as success.
|
|
// The error is a delivery/transport error (e.g., connection reset after response was received).
|
|
// Previously, executeDelegation marked these as "failed" even though the work was done,
|
|
// causing retry storms and "error" rendering in canvas despite the response being available.
|
|
//
|
|
// Test strategy: spin up a mock A2A agent server, set up the source/target DB rows, call
|
|
// executeDelegation directly, and verify the activity_logs status and delegation status.
|
|
|
|
const testDeliveryDelegationID = "del-159-test"
|
|
const testDeliverySourceID = "ws-source-159"
|
|
const testDeliveryTargetID = "ws-target-159"
|
|
|
|
// expectExecuteDelegationBase sets up sqlmock expectations for the DB queries that
|
|
// executeDelegation always makes, regardless of outcome.
|
|
func expectExecuteDelegationBase(mock sqlmock.Sqlmock) {
|
|
// updateDelegationStatus: dispatched
|
|
// Uses prefix match — sqlmock regexes match the full query string.
|
|
mock.ExpectExec("UPDATE activity_logs SET status").
|
|
WithArgs("dispatched", "", testDeliverySourceID, testDeliveryDelegationID).
|
|
WillReturnResult(sqlmock.NewResult(0, 1))
|
|
|
|
// CanCommunicate: getWorkspaceRef(source) + getWorkspaceRef(target).
|
|
// Both are root-level workspaces (parent_id=NULL) → root-level siblings → allowed.
|
|
mock.ExpectQuery("SELECT id, parent_id FROM workspaces WHERE id = ").
|
|
WithArgs(testDeliverySourceID).
|
|
WillReturnRows(sqlmock.NewRows([]string{"id", "parent_id"}).AddRow(testDeliverySourceID, nil))
|
|
mock.ExpectQuery("SELECT id, parent_id FROM workspaces WHERE id = ").
|
|
WithArgs(testDeliveryTargetID).
|
|
WillReturnRows(sqlmock.NewRows([]string{"id", "parent_id"}).AddRow(testDeliveryTargetID, nil))
|
|
|
|
// resolveAgentURL: test callers always set the URL in Redis (mr.Set ws:{id}:url),
|
|
// so resolveAgentURL gets a cache hit and never falls back to DB.
|
|
}
|
|
|
|
// expectExecuteDelegationSuccess sets up expectations for a completed delegation.
|
|
// Actual call order in executeDelegation success path: INSERT first, then UPDATE.
|
|
// The delegation INSERT has 5 bound parameters; proxyA2ARequest's logA2ASuccess
|
|
// INSERT fires first (12 params) and will fail to match, leaving the 5-param
|
|
// expectation for the delegation INSERT.
|
|
func expectExecuteDelegationSuccess(mock sqlmock.Sqlmock, respBody string) {
|
|
// INSERT activity_logs for delegation completion ('completed' is a SQL literal, not a param)
|
|
mock.ExpectExec("INSERT INTO activity_logs").
|
|
WithArgs(sqlmock.AnyArg(), sqlmock.AnyArg(), sqlmock.AnyArg(), sqlmock.AnyArg(), sqlmock.AnyArg()).
|
|
WillReturnResult(sqlmock.NewResult(0, 1))
|
|
|
|
// updateDelegationStatus: completed
|
|
mock.ExpectExec("UPDATE activity_logs SET status").
|
|
WithArgs("completed", "", testDeliverySourceID, testDeliveryDelegationID).
|
|
WillReturnResult(sqlmock.NewResult(0, 1))
|
|
}
|
|
|
|
// expectExecuteDelegationFailed sets up expectations for a failed delegation.
|
|
// Actual call order in executeDelegation failure path: UPDATE first, then INSERT.
|
|
func expectExecuteDelegationFailed(mock sqlmock.Sqlmock) {
|
|
// updateDelegationStatus: failed (fires before the INSERT in the failure path)
|
|
mock.ExpectExec("UPDATE activity_logs SET status").
|
|
WithArgs("failed", sqlmock.AnyArg(), testDeliverySourceID, testDeliveryDelegationID).
|
|
WillReturnResult(sqlmock.NewResult(0, 1))
|
|
|
|
// INSERT activity_logs for delegation failure ('failed' is a SQL literal, not a param)
|
|
mock.ExpectExec("INSERT INTO activity_logs").
|
|
WithArgs(sqlmock.AnyArg(), sqlmock.AnyArg(), sqlmock.AnyArg(), sqlmock.AnyArg(), sqlmock.AnyArg()).
|
|
WillReturnResult(sqlmock.NewResult(0, 1))
|
|
}
|
|
|
|
// TestExecuteDelegation_DeliveryConfirmedProxyError_TreatsAsSuccess is the primary regression
|
|
// test for issue #159. The scenario:
|
|
// - Attempt 1: server sends 200 OK headers + partial body, then closes connection.
|
|
// proxyA2ARequest: body read gets io.EOF (partial body read), returns (200, <partial>, BadGateway).
|
|
// isTransientProxyError(BadGateway) = TRUE → retry.
|
|
// - Attempt 2: server does the same thing (closes after partial body).
|
|
// proxyA2ARequest: same (200, <partial>, BadGateway).
|
|
// isTransientProxyError(BadGateway) = TRUE → retry AGAIN (but outer context will fire soon,
|
|
// or we get one more attempt). For the test we let it run.
|
|
// POST-FIX: the executeDelegation new condition sees status=200, body=<partial>, err!=nil
|
|
// and routes to handleSuccess immediately.
|
|
//
|
|
// The key pre/post-fix difference: pre-fix, executeDelegation received status=0 (hardcoded)
|
|
// even when the server sent 200, so the condition always failed. Post-fix, status=200 is
|
|
// preserved through the error return path (proxyA2ARequest now returns resp.StatusCode, respBody).
|
|
// In this test the retry ultimately succeeds (server eventually sends full body), but
|
|
// the critical assertion is that a 2xx partial-body delivery-confirmed response is never
|
|
// classified as "failed" — it always routes to success.
|
|
func TestExecuteDelegation_DeliveryConfirmedProxyError_TreatsAsSuccess(t *testing.T) {
|
|
mock := setupTestDB(t)
|
|
mr := setupTestRedis(t)
|
|
allowLoopbackForTest(t)
|
|
|
|
broadcaster := newTestBroadcaster()
|
|
wh := NewWorkspaceHandler(broadcaster, nil, "http://localhost:8080", t.TempDir())
|
|
dh := NewDelegationHandler(wh, broadcaster)
|
|
|
|
// Server that sends a 200 response with declared Content-Length but closes
|
|
// the connection before sending all bytes. Go's http.Client sees io.EOF on
|
|
// the body read. proxyA2ARequest captures the partial body + status=200 and
|
|
// returns (200, <partial>, error). executeDelegation's new condition sees
|
|
// status=200 + body > 0 + error != nil → routes to handleSuccess.
|
|
var wg sync.WaitGroup
|
|
wg.Add(1)
|
|
ln, err := net.Listen("tcp", "127.0.0.1:0")
|
|
if err != nil {
|
|
t.Fatalf("failed to listen: %v", err)
|
|
}
|
|
defer ln.Close()
|
|
go func() {
|
|
defer wg.Done()
|
|
conn, err := ln.Accept()
|
|
if err != nil {
|
|
return
|
|
}
|
|
defer conn.Close()
|
|
// Consume the HTTP request
|
|
buf := make([]byte, 2048)
|
|
conn.Read(buf)
|
|
// Send 200 OK with Content-Length: 100 but only 74 bytes of body
|
|
// (less than declared length → io.LimitReader returns io.EOF after reading all 74)
|
|
resp := "HTTP/1.1 200 OK\r\nContent-Type: application/json\r\nContent-Length: 100\r\n\r\n"
|
|
resp += `{"result":{"parts":[{"text":"work completed successfully"}]}}` // 74 bytes
|
|
conn.Write([]byte(resp))
|
|
// Close immediately — client gets io.EOF on body read
|
|
}()
|
|
|
|
agentURL := "http://" + ln.Addr().String()
|
|
mr.Set(fmt.Sprintf("ws:%s:url", testDeliveryTargetID), agentURL)
|
|
allowLoopbackForTest(t)
|
|
|
|
expectExecuteDelegationBase(mock)
|
|
expectExecuteDelegationSuccess(mock, `{"result":{"parts":[{"text":"work completed successfully"}]}}`)
|
|
|
|
// Execute synchronously (not as a goroutine) so we can check DB state immediately.
|
|
// The handler fires it as goroutine; we call it directly for deterministic testing.
|
|
a2aBody, _ := json.Marshal(map[string]interface{}{
|
|
"jsonrpc": "2.0",
|
|
"id": "1",
|
|
"method": "message/send",
|
|
"params": map[string]interface{}{
|
|
"message": map[string]interface{}{
|
|
"role": "user",
|
|
"parts": []map[string]string{{"type": "text", "text": "do work"}},
|
|
},
|
|
},
|
|
})
|
|
dh.executeDelegation(context.Background(), testDeliverySourceID, testDeliveryTargetID, testDeliveryDelegationID, a2aBody)
|
|
|
|
time.Sleep(100 * time.Millisecond) // let DB writes settle
|
|
|
|
if err := mock.ExpectationsWereMet(); err != nil {
|
|
t.Errorf("unmet sqlmock expectations: %v", err)
|
|
}
|
|
}
|
|
|
|
// TestExecuteDelegation_ProxyErrorNon2xx_RemainsFailed verifies that the pre-fix failure
|
|
// path is unchanged when proxyA2ARequest returns a delivery-confirmed error with a non-2xx
|
|
// status code (e.g., 500 Internal Server Error with partial body read before connection drop).
|
|
// The new condition requires status >= 200 && status < 300, so non-2xx always routes to failure.
|
|
func TestExecuteDelegation_ProxyErrorNon2xx_RemainsFailed(t *testing.T) {
|
|
mock := setupTestDB(t)
|
|
mr := setupTestRedis(t)
|
|
allowLoopbackForTest(t)
|
|
|
|
broadcaster := newTestBroadcaster()
|
|
wh := NewWorkspaceHandler(broadcaster, nil, "http://localhost:8080", t.TempDir())
|
|
dh := NewDelegationHandler(wh, broadcaster)
|
|
|
|
// Server returns 500 with declared Content-Length but closes connection early.
|
|
// proxyA2ARequest: reads 500 headers, partial body, then connection drop → body read error.
|
|
// Returns (500, <partial_body>, BadGateway).
|
|
// New condition: status=500 is NOT >= 200 && < 300 → routes to failure.
|
|
// isTransientProxyError(500) = false → no retry.
|
|
var wg sync.WaitGroup
|
|
wg.Add(1)
|
|
ln, err := net.Listen("tcp", "127.0.0.1:0")
|
|
if err != nil {
|
|
t.Fatalf("failed to listen: %v", err)
|
|
}
|
|
defer ln.Close()
|
|
go func() {
|
|
defer wg.Done()
|
|
conn, err := ln.Accept()
|
|
if err != nil {
|
|
return
|
|
}
|
|
defer conn.Close()
|
|
buf := make([]byte, 2048)
|
|
conn.Read(buf)
|
|
// 500 with Content-Length: 100 but only ~60 bytes of body
|
|
resp := "HTTP/1.1 500 Internal Server Error\r\nContent-Type: application/json\r\nContent-Length: 100\r\n\r\n"
|
|
resp += `{"error":"agent crashed"}` // ~24 bytes, less than declared
|
|
conn.Write([]byte(resp))
|
|
// Close immediately — client gets io.EOF on body read
|
|
}()
|
|
|
|
agentURL := "http://" + ln.Addr().String()
|
|
mr.Set(fmt.Sprintf("ws:%s:url", testDeliveryTargetID), agentURL)
|
|
allowLoopbackForTest(t)
|
|
|
|
expectExecuteDelegationBase(mock)
|
|
expectExecuteDelegationFailed(mock)
|
|
|
|
a2aBody, _ := json.Marshal(map[string]interface{}{
|
|
"jsonrpc": "2.0", "id": "1", "method": "message/send",
|
|
"params": map[string]interface{}{
|
|
"message": map[string]interface{}{
|
|
"role": "user",
|
|
"parts": []map[string]string{{"type": "text", "text": "do work"}},
|
|
},
|
|
},
|
|
})
|
|
dh.executeDelegation(context.Background(), testDeliverySourceID, testDeliveryTargetID, testDeliveryDelegationID, a2aBody)
|
|
|
|
time.Sleep(100 * time.Millisecond)
|
|
|
|
if err := mock.ExpectationsWereMet(); err != nil {
|
|
t.Errorf("unmet sqlmock expectations: %v", err)
|
|
}
|
|
}
|
|
|
|
// TestExecuteDelegation_ProxyErrorEmptyBody_RemainsFailed verifies that the pre-fix failure
|
|
// path is unchanged when proxyA2ARequest returns an error with a 2xx status but empty body.
|
|
// The new condition requires len(respBody) > 0, so empty body routes to failure.
|
|
func TestExecuteDelegation_ProxyErrorEmptyBody_RemainsFailed(t *testing.T) {
|
|
mock := setupTestDB(t)
|
|
mr := setupTestRedis(t)
|
|
allowLoopbackForTest(t)
|
|
|
|
broadcaster := newTestBroadcaster()
|
|
wh := NewWorkspaceHandler(broadcaster, nil, "http://localhost:8080", t.TempDir())
|
|
dh := NewDelegationHandler(wh, broadcaster)
|
|
|
|
// Server returns 502 Bad Gateway — proxyA2ARequest returns 502, body="" (empty), error != nil.
|
|
// New condition: proxyErr != nil && len(respBody) > 0 && status >= 200 && status < 300
|
|
// → len(respBody) == 0 → condition FALSE → falls through to failure.
|
|
// isTransientProxyError(502) is TRUE → retry → same result → failure.
|
|
agentServer := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
w.WriteHeader(http.StatusBadGateway)
|
|
// No body — connection closes normally
|
|
}))
|
|
defer agentServer.Close()
|
|
|
|
mr.Set(fmt.Sprintf("ws:%s:url", testDeliveryTargetID), agentServer.URL)
|
|
allowLoopbackForTest(t)
|
|
|
|
// executeDelegationBase: UPDATE dispatched + CanCommunicate SELECTs
|
|
expectExecuteDelegationBase(mock)
|
|
// The retry (isTransientProxyError && len(respBody)==0) fires after delegationRetryDelay,
|
|
// re-uses the Redis-cached URL — no extra DB calls before the failure path.
|
|
// Failure: UPDATE failed + INSERT (failed status is a SQL literal, 5 bound params)
|
|
expectExecuteDelegationFailed(mock)
|
|
|
|
a2aBody, _ := json.Marshal(map[string]interface{}{
|
|
"jsonrpc": "2.0", "id": "1", "method": "message/send",
|
|
"params": map[string]interface{}{
|
|
"message": map[string]interface{}{
|
|
"role": "user",
|
|
"parts": []map[string]string{{"type": "text", "text": "do work"}},
|
|
},
|
|
},
|
|
})
|
|
dh.executeDelegation(context.Background(), testDeliverySourceID, testDeliveryTargetID, testDeliveryDelegationID, a2aBody)
|
|
|
|
time.Sleep(100 * time.Millisecond)
|
|
|
|
if err := mock.ExpectationsWereMet(); err != nil {
|
|
t.Errorf("unmet sqlmock expectations: %v", err)
|
|
}
|
|
}
|
|
|
|
// TestExecuteDelegation_CleanProxyResponse_Unchanged verifies that a clean proxy response
|
|
// (no error, 200 with body) is unaffected by the new condition. This is the baseline:
|
|
// proxyErr == nil so the new condition never fires.
|
|
func TestExecuteDelegation_CleanProxyResponse_Unchanged(t *testing.T) {
|
|
mock := setupTestDB(t)
|
|
mr := setupTestRedis(t)
|
|
allowLoopbackForTest(t)
|
|
|
|
broadcaster := newTestBroadcaster()
|
|
wh := NewWorkspaceHandler(broadcaster, nil, "http://localhost:8080", t.TempDir())
|
|
dh := NewDelegationHandler(wh, broadcaster)
|
|
|
|
agentServer := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
w.WriteHeader(http.StatusOK)
|
|
w.Header().Set("Content-Type", "application/json")
|
|
w.Write([]byte(`{"result":{"parts":[{"text":"all good"}]}}`))
|
|
}))
|
|
defer agentServer.Close()
|
|
|
|
mr.Set(fmt.Sprintf("ws:%s:url", testDeliveryTargetID), agentServer.URL)
|
|
allowLoopbackForTest(t)
|
|
|
|
expectExecuteDelegationBase(mock)
|
|
expectExecuteDelegationSuccess(mock, `{"result":{"parts":[{"text":"all good"}]}}`)
|
|
|
|
a2aBody, _ := json.Marshal(map[string]interface{}{
|
|
"jsonrpc": "2.0", "id": "1", "method": "message/send",
|
|
"params": map[string]interface{}{
|
|
"message": map[string]interface{}{
|
|
"role": "user",
|
|
"parts": []map[string]string{{"type": "text", "text": "do work"}},
|
|
},
|
|
},
|
|
})
|
|
dh.executeDelegation(context.Background(), testDeliverySourceID, testDeliveryTargetID, testDeliveryDelegationID, a2aBody)
|
|
|
|
time.Sleep(100 * time.Millisecond)
|
|
|
|
if err := mock.ExpectationsWereMet(); err != nil {
|
|
t.Errorf("unmet sqlmock expectations: %v", err)
|
|
}
|
|
}
|
|
|
|
// ---------- extractResponseText ----------
|
|
|
|
func TestExtractResponseText_NonJSON(t *testing.T) {
|
|
got := extractResponseText([]byte("not json at all"))
|
|
if got != "not json at all" {
|
|
t.Errorf("non-JSON: got %q, want %q", got, "not json at all")
|
|
}
|
|
}
|
|
|
|
func TestExtractResponseText_ValidJSONNoResult(t *testing.T) {
|
|
got := extractResponseText([]byte(`{"id":"1","error":{"code":-32601,"message":"method not found"}}`))
|
|
if got != `{"id":"1","error":{"code":-32601,"message":"method not found"}}` {
|
|
t.Errorf("no result key: got %q, want raw body", got)
|
|
}
|
|
}
|
|
|
|
// TestExtractResponseText_* cases live in delegation_extract_response_text_test.go
|
|
// to keep pure-helper tests in their own file.
|
|
|
|
func TestExtractResponseText_PartsTextKind(t *testing.T) {
|
|
body := []byte(`{"result":{"parts":[{"kind":"text","text":"Hello from agent"}]}}`)
|
|
got := extractResponseText(body)
|
|
if got != "Hello from agent" {
|
|
t.Errorf("parts text: got %q, want %q", got, "Hello from agent")
|
|
}
|
|
}
|
|
|
|
func TestExtractResponseText_PartsNonTextKind(t *testing.T) {
|
|
// kind="image" is skipped; falls through to raw body since no artifacts
|
|
body := []byte(`{"result":{"parts":[{"kind":"image","text":"should not return"}]}}`)
|
|
got := extractResponseText(body)
|
|
if got != string(body) {
|
|
t.Errorf("parts non-text: got %q, want raw body", got)
|
|
}
|
|
}
|
|
|
|
func TestExtractResponseText_PartsMultipleWithTextFirst(t *testing.T) {
|
|
body := []byte(`{"result":{"parts":[{"kind":"text","text":"first"},{"kind":"text","text":"second"}]}}`)
|
|
got := extractResponseText(body)
|
|
// Returns first text part found
|
|
if got != "first" {
|
|
t.Errorf("parts first match: got %q, want %q", got, "first")
|
|
}
|
|
}
|
|
|
|
func TestExtractResponseText_ArtifactsTextKind(t *testing.T) {
|
|
body := []byte(`{"result":{"artifacts":[{"parts":[{"kind":"text","text":"artifact text here"}]}]}}`)
|
|
got := extractResponseText(body)
|
|
if got != "artifact text here" {
|
|
t.Errorf("artifacts text: got %q, want %q", got, "artifact text here")
|
|
}
|
|
}
|
|
|
|
func TestExtractResponseText_ArtifactsNonTextKind(t *testing.T) {
|
|
body := []byte(`{"result":{"artifacts":[{"parts":[{"kind":"image","text":"hidden"}]}]}}`)
|
|
got := extractResponseText(body)
|
|
if got != string(body) {
|
|
t.Errorf("artifacts non-text: got %q, want raw body", got)
|
|
}
|
|
}
|
|
|
|
func TestExtractResponseText_EmptyPartsAndArtifacts(t *testing.T) {
|
|
body := []byte(`{"result":{"parts":[],"artifacts":[]}}`)
|
|
got := extractResponseText(body)
|
|
if got != string(body) {
|
|
t.Errorf("empty parts/artifacts: got %q, want raw body", got)
|
|
}
|
|
}
|
|
|
|
func TestExtractResponseText_EmptyText(t *testing.T) {
|
|
body := []byte(`{"result":{"parts":[{"kind":"text","text":""}]}}`)
|
|
got := extractResponseText(body)
|
|
if got != "" {
|
|
t.Errorf("empty text: got %q, want %q", got, "")
|
|
}
|
|
|
|
// ---------- ListDelegations: ledger has rows → returns them (no activity_logs fallback) ----------
|
|
|
|
func TestListDelegations_LedgerRowsReturned(t *testing.T) {
|
|
mock := setupTestDB(t)
|
|
setupTestRedis(t)
|
|
broadcaster := newTestBroadcaster()
|
|
wh := NewWorkspaceHandler(broadcaster, nil, "http://localhost:8080", t.TempDir())
|
|
dh := NewDelegationHandler(wh, broadcaster)
|
|
|
|
now := time.Now()
|
|
// Ledger query returns rows
|
|
ledgerRows := sqlmock.NewRows([]string{
|
|
"delegation_id", "caller_id", "callee_id", "task_preview",
|
|
"status", "result_preview", "error_detail", "last_heartbeat",
|
|
"deadline", "created_at", "updated_at",
|
|
}).AddRow(
|
|
"del-ledger-001", "caller-uuid", "callee-uuid",
|
|
"Analyze the codebase for bugs", "in_progress", "", "",
|
|
&now, &now.Add(6*time.Hour), now, now,
|
|
)
|
|
mock.ExpectQuery("SELECT d.delegation_id, d.caller_id, d.callee_id, d.task_preview").
|
|
WithArgs("caller-uuid").
|
|
WillReturnRows(ledgerRows)
|
|
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
c.Params = gin.Params{{Key: "id", Value: "caller-uuid"}}
|
|
c.Request = httptest.NewRequest("GET", "/workspaces/caller-uuid/delegations", nil)
|
|
|
|
dh.ListDelegations(c)
|
|
|
|
if w.Code != http.StatusOK {
|
|
t.Errorf("expected 200, got %d: %s", w.Code, w.Body.String())
|
|
}
|
|
var resp []map[string]interface{}
|
|
if err := json.Unmarshal(w.Body.Bytes(), &resp); err != nil {
|
|
t.Fatalf("failed to parse response: %v", err)
|
|
}
|
|
if len(resp) != 1 {
|
|
t.Fatalf("expected 1 entry, got %d", len(resp))
|
|
}
|
|
if resp[0]["delegation_id"] != "del-ledger-001" {
|
|
t.Errorf("expected delegation_id 'del-ledger-001', got %v", resp[0]["delegation_id"])
|
|
}
|
|
if resp[0]["status"] != "in_progress" {
|
|
t.Errorf("expected status 'in_progress', got %v", resp[0]["status"])
|
|
}
|
|
if resp[0]["_ledger"] != true {
|
|
t.Errorf("expected _ledger=true marker, got %v", resp[0]["_ledger"])
|
|
}
|
|
if resp[0]["source_id"] != "caller-uuid" {
|
|
t.Errorf("expected source_id 'caller-uuid', got %v", resp[0]["source_id"])
|
|
}
|
|
if resp[0]["target_id"] != "callee-uuid" {
|
|
t.Errorf("expected target_id 'callee-uuid', got %v", resp[0]["target_id"])
|
|
}
|
|
if err := mock.ExpectationsWereMet(); err != nil {
|
|
t.Errorf("unmet sqlmock expectations: %v", err)
|
|
}
|
|
}
|
|
|
|
// ---------- ListDelegations: ledger empty → falls back to activity_logs ----------
|
|
|
|
func TestListDelegations_LedgerEmptyFallsBackToActivityLogs(t *testing.T) {
|
|
mock := setupTestDB(t)
|
|
setupTestRedis(t)
|
|
broadcaster := newTestBroadcaster()
|
|
wh := NewWorkspaceHandler(broadcaster, nil, "http://localhost:8080", t.TempDir())
|
|
dh := NewDelegationHandler(wh, broadcaster)
|
|
|
|
// Ledger returns empty → falls back to activity_logs
|
|
mock.ExpectQuery("SELECT d.delegation_id, d.caller_id, d.callee_id, d.task_preview").
|
|
WithArgs("ws-source").
|
|
WillReturnRows(sqlmock.NewRows([]string{
|
|
"delegation_id", "caller_id", "callee_id", "task_preview",
|
|
"status", "result_preview", "error_detail", "last_heartbeat",
|
|
"deadline", "created_at", "updated_at",
|
|
}))
|
|
|
|
now := time.Now()
|
|
activityRows := sqlmock.NewRows([]string{
|
|
"id", "activity_type", "source_id", "target_id",
|
|
"summary", "status", "error_detail", "response_body",
|
|
"delegation_id", "created_at",
|
|
}).AddRow(
|
|
"act-001", "delegation", "ws-source", "ws-target",
|
|
"Delegating to ws-target", "pending", "", "",
|
|
"del-old-001", now,
|
|
)
|
|
mock.ExpectQuery("SELECT id, activity_type").
|
|
WithArgs("ws-source").
|
|
WillReturnRows(activityRows)
|
|
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
c.Params = gin.Params{{Key: "id", Value: "ws-source"}}
|
|
c.Request = httptest.NewRequest("GET", "/workspaces/ws-source/delegations", nil)
|
|
|
|
dh.ListDelegations(c)
|
|
|
|
if w.Code != http.StatusOK {
|
|
t.Errorf("expected 200, got %d: %s", w.Code, w.Body.String())
|
|
}
|
|
var resp []map[string]interface{}
|
|
if err := json.Unmarshal(w.Body.Bytes(), &resp); err != nil {
|
|
t.Fatalf("failed to parse response: %v", err)
|
|
}
|
|
if len(resp) != 1 {
|
|
t.Fatalf("expected 1 entry from fallback, got %d", len(resp))
|
|
}
|
|
if resp[0]["delegation_id"] != "del-old-001" {
|
|
t.Errorf("expected delegation_id 'del-old-001' from activity_logs, got %v", resp[0]["delegation_id"])
|
|
}
|
|
if resp[0]["type"] != "delegation" {
|
|
t.Errorf("expected type 'delegation' from activity_logs, got %v", resp[0]["type"])
|
|
}
|
|
if err := mock.ExpectationsWereMet(); err != nil {
|
|
t.Errorf("unmet sqlmock expectations: %v", err)
|
|
}
|
|
}
|
|
|
|
// ---------- ListDelegations: both ledger and activity_logs empty → [] ----------
|
|
|
|
func TestListDelegations_BothEmptyReturnsEmptyArray(t *testing.T) {
|
|
mock := setupTestDB(t)
|
|
setupTestRedis(t)
|
|
broadcaster := newTestBroadcaster()
|
|
wh := NewWorkspaceHandler(broadcaster, nil, "http://localhost:8080", t.TempDir())
|
|
dh := NewDelegationHandler(wh, broadcaster)
|
|
|
|
// Ledger empty
|
|
mock.ExpectQuery("SELECT d.delegation_id, d.caller_id, d.callee_id, d.task_preview").
|
|
WithArgs("ws-source").
|
|
WillReturnRows(sqlmock.NewRows([]string{
|
|
"delegation_id", "caller_id", "callee_id", "task_preview",
|
|
"status", "result_preview", "error_detail", "last_heartbeat",
|
|
"deadline", "created_at", "updated_at",
|
|
}))
|
|
// activity_logs also empty
|
|
mock.ExpectQuery("SELECT id, activity_type").
|
|
WithArgs("ws-source").
|
|
WillReturnRows(sqlmock.NewRows([]string{
|
|
"id", "activity_type", "source_id", "target_id",
|
|
"summary", "status", "error_detail", "response_body",
|
|
"delegation_id", "created_at",
|
|
}))
|
|
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
c.Params = gin.Params{{Key: "id", Value: "ws-source"}}
|
|
c.Request = httptest.NewRequest("GET", "/workspaces/ws-source/delegations", nil)
|
|
|
|
dh.ListDelegations(c)
|
|
|
|
if w.Code != http.StatusOK {
|
|
t.Errorf("expected 200, got %d: %s", w.Code, w.Body.String())
|
|
}
|
|
var resp []interface{}
|
|
if err := json.Unmarshal(w.Body.Bytes(), &resp); err != nil {
|
|
t.Fatalf("failed to parse response: %v", err)
|
|
}
|
|
if len(resp) != 0 {
|
|
t.Errorf("expected empty array, got %d entries", len(resp))
|
|
}
|
|
if err := mock.ExpectationsWereMet(); err != nil {
|
|
t.Errorf("unmet sqlmock expectations: %v", err)
|
|
}
|
|
}
|
|
|
|
// ---------- ListDelegations: ledger query error → falls back to activity_logs ----------
|
|
|
|
func TestListDelegations_LedgerQueryErrorFallsBackToActivityLogs(t *testing.T) {
|
|
mock := setupTestDB(t)
|
|
setupTestRedis(t)
|
|
broadcaster := newTestBroadcaster()
|
|
wh := NewWorkspaceHandler(broadcaster, nil, "http://localhost:8080", t.TempDir())
|
|
dh := NewDelegationHandler(wh, broadcaster)
|
|
|
|
// Ledger query fails → fallback to activity_logs
|
|
mock.ExpectQuery("SELECT d.delegation_id, d.caller_id, d.callee_id, d.task_preview").
|
|
WithArgs("ws-source").
|
|
WillReturnError(fmt.Errorf("table does not exist"))
|
|
|
|
now := time.Now()
|
|
activityRows := sqlmock.NewRows([]string{
|
|
"id", "activity_type", "source_id", "target_id",
|
|
"summary", "status", "error_detail", "response_body",
|
|
"delegation_id", "created_at",
|
|
}).AddRow(
|
|
"act-002", "delegation", "ws-source", "ws-target",
|
|
"Some task", "completed", "", "result here",
|
|
"del-pre-318", now,
|
|
)
|
|
mock.ExpectQuery("SELECT id, activity_type").
|
|
WithArgs("ws-source").
|
|
WillReturnRows(activityRows)
|
|
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
c.Params = gin.Params{{Key: "id", Value: "ws-source"}}
|
|
c.Request = httptest.NewRequest("GET", "/workspaces/ws-source/delegations", nil)
|
|
|
|
dh.ListDelegations(c)
|
|
|
|
if w.Code != http.StatusOK {
|
|
t.Errorf("expected 200, got %d: %s", w.Code, w.Body.String())
|
|
}
|
|
var resp []map[string]interface{}
|
|
if err := json.Unmarshal(w.Body.Bytes(), &resp); err != nil {
|
|
t.Fatalf("failed to parse response: %v", err)
|
|
}
|
|
if len(resp) != 1 || resp[0]["delegation_id"] != "del-pre-318" {
|
|
t.Errorf("expected 1 activity_logs entry, got %v", resp)
|
|
}
|
|
if err := mock.ExpectationsWereMet(); err != nil {
|
|
t.Errorf("unmet sqlmock expectations: %v", err)
|
|
}
|
|
}
|
|
|
|
// ---------- ListDelegations: ledger completed delegation includes result_preview ----------
|
|
|
|
func TestListDelegations_LedgerCompletedIncludesResultPreview(t *testing.T) {
|
|
mock := setupTestDB(t)
|
|
setupTestRedis(t)
|
|
broadcaster := newTestBroadcaster()
|
|
wh := NewWorkspaceHandler(broadcaster, nil, "http://localhost:8080", t.TempDir())
|
|
dh := NewDelegationHandler(wh, broadcaster)
|
|
|
|
now := time.Now()
|
|
ledgerRows := sqlmock.NewRows([]string{
|
|
"delegation_id", "caller_id", "callee_id", "task_preview",
|
|
"status", "result_preview", "error_detail", "last_heartbeat",
|
|
"deadline", "created_at", "updated_at",
|
|
}).AddRow(
|
|
"del-complete-001", "caller-uuid", "callee-uuid",
|
|
"Run analysis", "completed", "Analysis complete: 42 issues found", "",
|
|
&now, &now.Add(6*time.Hour), now, now,
|
|
)
|
|
mock.ExpectQuery("SELECT d.delegation_id, d.caller_id, d.callee_id, d.task_preview").
|
|
WithArgs("caller-uuid").
|
|
WillReturnRows(ledgerRows)
|
|
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
c.Params = gin.Params{{Key: "id", Value: "caller-uuid"}}
|
|
c.Request = httptest.NewRequest("GET", "/workspaces/caller-uuid/delegations", nil)
|
|
|
|
dh.ListDelegations(c)
|
|
|
|
if w.Code != http.StatusOK {
|
|
t.Errorf("expected 200, got %d: %s", w.Code, w.Body.String())
|
|
}
|
|
var resp []map[string]interface{}
|
|
if err := json.Unmarshal(w.Body.Bytes(), &resp); err != nil {
|
|
t.Fatalf("failed to parse response: %v", err)
|
|
}
|
|
if len(resp) != 1 {
|
|
t.Fatalf("expected 1 entry, got %d", len(resp))
|
|
}
|
|
if resp[0]["status"] != "completed" {
|
|
t.Errorf("expected status 'completed', got %v", resp[0]["status"])
|
|
}
|
|
if resp[0]["response_preview"] != "Analysis complete: 42 issues found" {
|
|
t.Errorf("expected response_preview, got %v", resp[0]["response_preview"])
|
|
}
|
|
if resp[0]["error"] != nil {
|
|
t.Errorf("expected no error on completed, got %v", resp[0]["error"])
|
|
}
|
|
if err := mock.ExpectationsWereMet(); err != nil {
|
|
t.Errorf("unmet sqlmock expectations: %v", err)
|
|
}
|
|
}
|
|
|
|
// ---------- ListDelegations: ledger failed delegation includes error_detail ----------
|
|
|
|
func TestListDelegations_LedgerFailedIncludesErrorDetail(t *testing.T) {
|
|
mock := setupTestDB(t)
|
|
setupTestRedis(t)
|
|
broadcaster := newTestBroadcaster()
|
|
wh := NewWorkspaceHandler(broadcaster, nil, "http://localhost:8080", t.TempDir())
|
|
dh := NewDelegationHandler(wh, broadcaster)
|
|
|
|
now := time.Now()
|
|
ledgerRows := sqlmock.NewRows([]string{
|
|
"delegation_id", "caller_id", "callee_id", "task_preview",
|
|
"status", "result_preview", "error_detail", "last_heartbeat",
|
|
"deadline", "created_at", "updated_at",
|
|
}).AddRow(
|
|
"del-failed-001", "caller-uuid", "callee-uuid",
|
|
"Fetch data", "failed", "", "Callee workspace not reachable",
|
|
&now, &now.Add(6*time.Hour), now, now,
|
|
)
|
|
mock.ExpectQuery("SELECT d.delegation_id, d.caller_id, d.callee_id, d.task_preview").
|
|
WithArgs("caller-uuid").
|
|
WillReturnRows(ledgerRows)
|
|
|
|
w := httptest.NewRecorder()
|
|
c, _ := gin.CreateTestContext(w)
|
|
c.Params = gin.Params{{Key: "id", Value: "caller-uuid"}}
|
|
c.Request = httptest.NewRequest("GET", "/workspaces/caller-uuid/delegations", nil)
|
|
|
|
dh.ListDelegations(c)
|
|
|
|
if w.Code != http.StatusOK {
|
|
t.Errorf("expected 200, got %d: %s", w.Code, w.Body.String())
|
|
}
|
|
var resp []map[string]interface{}
|
|
if err := json.Unmarshal(w.Body.Bytes(), &resp); err != nil {
|
|
t.Fatalf("failed to parse response: %v", err)
|
|
}
|
|
if len(resp) != 1 {
|
|
t.Fatalf("expected 1 entry, got %d", len(resp))
|
|
}
|
|
if resp[0]["status"] != "failed" {
|
|
t.Errorf("expected status 'failed', got %v", resp[0]["status"])
|
|
}
|
|
if resp[0]["error"] != "Callee workspace not reachable" {
|
|
t.Errorf("expected error detail, got %v", resp[0]["error"])
|
|
}
|
|
if err := mock.ExpectationsWereMet(); err != nil {
|
|
t.Errorf("unmet sqlmock expectations: %v", err) (fix(delegations): ListDelegations falls back to delegations table before activity_logs)
|
|
}
|
|
}
|
|
(fix(delegations): ListDelegations falls back to delegations table before activity_logs)
|