omx(team): merge worker-4

This commit is contained in:
bellman
2026-05-15 10:08:06 +09:00
4 changed files with 243 additions and 2 deletions

View File

@@ -669,6 +669,141 @@ fn config_section_json_emits_section_and_value() {
assert!(bad["section"].as_str().is_some());
}
#[test]
fn mcp_json_reports_required_optional_and_redacts_secret_values() {
let root = unique_temp_dir("mcp-required-optional");
let config_home = root.join("config-home");
let home = root.join("home");
fs::create_dir_all(root.join(".claw")).expect("workspace config should exist");
fs::create_dir_all(&config_home).expect("config home should exist");
fs::create_dir_all(&home).expect("home should exist");
fs::write(
root.join(".claw").join("settings.json"),
r#"{
"mcpServers": {
"required-stdio": {
"command": "python3",
"args": ["-c", "print('ready')"],
"env": {"TOKEN": "secret-token-value"},
"required": true
},
"optional-remote": {
"type": "http",
"url": "https://example.test/mcp",
"headers": {
"Authorization": "Bearer secret-header-value",
"X-Trace": "visible-key-only"
},
"required": false
}
}
}"#,
)
.expect("mcp config should write");
let envs = [
(
"CLAW_CONFIG_HOME",
config_home.to_str().expect("config home"),
),
("HOME", home.to_str().expect("home")),
];
let list = assert_json_command_with_env(&root, &["--output-format", "json", "mcp"], &envs);
assert_eq!(list["kind"], "mcp");
assert_eq!(list["action"], "list");
assert_eq!(list["status"], "ok");
assert_eq!(list["configured_servers"], 2);
let servers = list["servers"].as_array().expect("servers array");
let required = servers
.iter()
.find(|server| server["name"] == "required-stdio")
.expect("required stdio server should be listed");
let optional = servers
.iter()
.find(|server| server["name"] == "optional-remote")
.expect("optional remote server should be listed");
assert_eq!(required["required"], true);
assert_eq!(optional["required"], false);
assert_eq!(required["details"]["env_keys"][0], "TOKEN");
assert_eq!(optional["details"]["header_keys"][0], "Authorization");
assert_eq!(optional["details"]["header_keys"][1], "X-Trace");
let list_text = serde_json::to_string(&list).expect("mcp list json should serialize");
assert!(!list_text.contains("secret-token-value"));
assert!(!list_text.contains("secret-header-value"));
assert!(!list_text.contains("visible-key-only"));
let show = assert_json_command_with_env(
&root,
&["--output-format", "json", "mcp", "show", "optional-remote"],
&envs,
);
assert_eq!(show["action"], "show");
assert_eq!(show["status"], "ok");
assert_eq!(show["server"]["required"], false);
assert_eq!(show["server"]["details"]["header_keys"][0], "Authorization");
let show_text = serde_json::to_string(&show).expect("mcp show json should serialize");
assert!(!show_text.contains("secret-header-value"));
assert!(!show_text.contains("visible-key-only"));
}
#[test]
fn mcp_degraded_config_and_failed_usage_are_distinct_json_contracts() {
let root = unique_temp_dir("mcp-degraded-vs-failed");
let config_home = root.join("config-home");
let home = root.join("home");
fs::create_dir_all(&root).expect("workspace should exist");
fs::create_dir_all(&config_home).expect("config home should exist");
fs::create_dir_all(&home).expect("home should exist");
fs::write(
root.join(".claw.json"),
r#"{
"mcpServers": {
"missing-command": {
"args": ["arg-only-no-command"],
"required": true
}
}
}"#,
)
.expect("malformed mcp config should write");
let envs = [
(
"CLAW_CONFIG_HOME",
config_home.to_str().expect("config home"),
),
("HOME", home.to_str().expect("home")),
];
let degraded = assert_json_command_with_env(&root, &["--output-format", "json", "mcp"], &envs);
assert_eq!(degraded["kind"], "mcp");
assert_eq!(degraded["action"], "list");
assert_eq!(degraded["status"], "degraded");
assert!(degraded["config_load_error"]
.as_str()
.is_some_and(|error| error.contains("mcpServers.missing-command")));
assert_eq!(degraded["configured_servers"], 0);
assert!(degraded["servers"].as_array().expect("servers").is_empty());
let failed_output = run_claw(
&root,
&["--output-format", "json", "mcp", "list", "extra"],
&envs,
);
assert!(
!failed_output.status.success(),
"unsupported MCP action should exit non-zero"
);
let failed: Value =
serde_json::from_slice(&failed_output.stdout).expect("failed stdout should be json");
assert_eq!(failed["kind"], "mcp");
assert_eq!(failed["action"], "error");
assert_eq!(failed["ok"], false);
assert_eq!(failed["error_kind"], "unsupported_action");
assert!(failed.get("config_load_error").is_none());
}
fn assert_json_command(current_dir: &Path, args: &[&str]) -> Value {
assert_json_command_with_env(current_dir, args, &[])
}

View File

@@ -35,6 +35,11 @@ def load_command_snapshot() -> tuple[PortingModule, ...]:
PORTED_COMMANDS = load_command_snapshot()
COMMAND_ALIASES = {
'plugins': 'plugin',
'marketplace': 'plugin',
}
@lru_cache(maxsize=1)
def built_in_command_names() -> frozenset[str]:
@@ -50,7 +55,7 @@ def command_names() -> list[str]:
def get_command(name: str) -> PortingModule | None:
needle = name.lower()
needle = COMMAND_ALIASES.get(name.lower(), name.lower())
for module in PORTED_COMMANDS:
if module.name.lower() == needle:
return module

View File

@@ -2,7 +2,7 @@ from __future__ import annotations
from dataclasses import dataclass
from .commands import PORTED_COMMANDS
from .commands import PORTED_COMMANDS, get_command
from .context import PortContext, build_port_context, render_context
from .history import HistoryLog
from .models import PermissionDenial, PortingModule
@@ -88,6 +88,7 @@ class RuntimeSession:
class PortRuntime:
def route_prompt(self, prompt: str, limit: int = 5) -> list[RoutedMatch]:
explicit_command = self._explicit_command_match(prompt)
tokens = {token.lower() for token in prompt.replace('/', ' ').replace('-', ' ').split() if token}
by_kind = {
'command': self._collect_matches(tokens, PORTED_COMMANDS, 'command'),
@@ -95,6 +96,16 @@ class PortRuntime:
}
selected: list[RoutedMatch] = []
if explicit_command is not None:
selected.append(explicit_command)
by_kind['command'] = [
match
for match in by_kind['command']
if not (
match.name == explicit_command.name
and match.source_hint == explicit_command.source_hint
)
]
for kind in ('command', 'tool'):
if by_kind[kind]:
selected.append(by_kind[kind].pop(0))
@@ -106,6 +117,22 @@ class PortRuntime:
selected.extend(leftovers[: max(0, limit - len(selected))])
return selected[:limit]
@staticmethod
def _explicit_command_match(prompt: str) -> RoutedMatch | None:
first_token = prompt.strip().split(maxsplit=1)[0] if prompt.strip() else ''
command_name = first_token.removeprefix('/')
if not command_name:
return None
module = get_command(command_name)
if module is None:
return None
return RoutedMatch(
kind='command',
name=module.name,
source_hint=module.source_hint,
score=100,
)
def bootstrap_session(self, prompt: str, limit: int = 5) -> RuntimeSession:
context = build_port_context()
setup_report = run_setup(trusted=True)

View File

@@ -159,6 +159,80 @@ class PortingWorkspaceTests(unittest.TestCase):
self.assertIn('Command entries:', command_result.stdout)
self.assertIn('Tool entries:', tool_result.stdout)
def test_plugin_command_filter_excludes_plugin_sources(self) -> None:
from src.commands import get_commands
all_commands = get_commands()
filtered_commands = get_commands(include_plugin_commands=False)
self.assertGreater(len(all_commands), len(filtered_commands))
self.assertFalse(
any('plugin' in command.source_hint.lower() for command in filtered_commands)
)
def test_plugin_command_aliases_execute_as_local_commands(self) -> None:
for alias in ('plugin', 'plugins', 'marketplace'):
with self.subTest(alias=alias):
result = subprocess.run(
[sys.executable, '-m', 'src.main', 'exec-command', alias, f'{alias} list'],
check=True,
capture_output=True,
text=True,
)
self.assertIn("Mirrored command 'plugin'", result.stdout)
self.assertNotIn('Unknown mirrored command', result.stdout)
def test_route_plugin_slash_commands_match_commands(self) -> None:
prompts = ('/plugin list', '/plugins list', '/marketplace browse', '/reload-plugins')
for prompt in prompts:
with self.subTest(prompt=prompt):
result = subprocess.run(
[sys.executable, '-m', 'src.main', 'route', prompt, '--limit', '5'],
check=True,
capture_output=True,
text=True,
)
first_line = result.stdout.splitlines()[0]
self.assertTrue(first_line.startswith('command\t'), result.stdout)
self.assertRegex(first_line, r'\t(plugin|reload-plugins)\t')
def test_plugin_command_stream_emits_command_match(self) -> None:
from src.runtime import PortRuntime
for prompt in ('/plugin list', '/plugins list', '/marketplace browse', '/reload-plugins'):
with self.subTest(prompt=prompt):
session = PortRuntime().bootstrap_session(prompt, limit=5)
command_events = [
event for event in session.stream_events if event['type'] == 'command_match'
]
self.assertTrue(command_events, session.as_markdown())
self.assertNotIn('Matched commands: none', session.turn_result.output)
def test_turn_loop_plugin_commands_are_not_prompt_only(self) -> None:
for prompt in ('/plugin list', '/plugins list', '/marketplace browse', '/reload-plugins'):
with self.subTest(prompt=prompt):
result = subprocess.run(
[
sys.executable,
'-m',
'src.main',
'turn-loop',
prompt,
'--max-turns',
'1',
'--structured-output',
],
check=True,
capture_output=True,
text=True,
)
self.assertIn('"Matched commands:', result.stdout)
self.assertNotIn('Matched commands: none', result.stdout)
def test_load_session_cli_runs(self) -> None:
from src.runtime import PortRuntime