@a5c-ai/krate 5.0.1-staging.f672fe79b
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/Dockerfile +29 -0
- package/README.md +183 -0
- package/bin/krate-demo.mjs +23 -0
- package/bin/krate-server.mjs +14 -0
- package/dist/krate-controller-ui.json +2407 -0
- package/dist/krate-lifecycle.json +201 -0
- package/dist/krate-runtime-snapshot.json +2955 -0
- package/dist/krate-summary.json +687 -0
- package/docs/README.md +61 -0
- package/docs/agents/README.md +83 -0
- package/docs/agents/acceptance-test-matrix.md +193 -0
- package/docs/agents/agent-mux-adapter-contract.md +167 -0
- package/docs/agents/agent-mux-source-map.md +310 -0
- package/docs/agents/agent-run-memory-import-spec.md +256 -0
- package/docs/agents/agent-stack-management-spec.md +421 -0
- package/docs/agents/api-contract-spec.md +309 -0
- package/docs/agents/artifacts-writeback-spec.md +145 -0
- package/docs/agents/chart-packaging-spec.md +128 -0
- package/docs/agents/ci-orchestration-spec.md +140 -0
- package/docs/agents/context-assembly-spec.md +219 -0
- package/docs/agents/controller-reconciliation-spec.md +255 -0
- package/docs/agents/crd-schema-spec.md +315 -0
- package/docs/agents/decision-log-open-questions.md +169 -0
- package/docs/agents/developer-implementation-checklist.md +329 -0
- package/docs/agents/dispatching-design.md +262 -0
- package/docs/agents/glossary.md +66 -0
- package/docs/agents/implementation-blueprint.md +324 -0
- package/docs/agents/implementation-rollout-slices.md +251 -0
- package/docs/agents/memory-context-integration-spec.md +194 -0
- package/docs/agents/memory-ontology-schema-spec.md +253 -0
- package/docs/agents/memory-operations-runbook.md +121 -0
- package/docs/agents/mvp-vertical-slice-spec.md +146 -0
- package/docs/agents/observability-audit-spec.md +265 -0
- package/docs/agents/operator-runbook.md +174 -0
- package/docs/agents/org-memory-api-payload-examples.md +333 -0
- package/docs/agents/org-memory-controller-sequence-spec.md +181 -0
- package/docs/agents/org-memory-e2e-fixture-plan.md +161 -0
- package/docs/agents/org-memory-ui-implementation-map.md +114 -0
- package/docs/agents/org-memory-vertical-slice-spec.md +168 -0
- package/docs/agents/org-resource-model-delta-spec.md +111 -0
- package/docs/agents/org-route-resource-model-spec.md +183 -0
- package/docs/agents/org-scoping-namespace-spec.md +114 -0
- package/docs/agents/rbac-secrets-management-spec.md +406 -0
- package/docs/agents/repository-page-integration-spec.md +255 -0
- package/docs/agents/resource-contract-examples.md +808 -0
- package/docs/agents/resource-relationship-map.md +190 -0
- package/docs/agents/security-threat-model.md +188 -0
- package/docs/agents/shared-memory-company-brain-spec.md +358 -0
- package/docs/agents/storage-migration-spec.md +168 -0
- package/docs/agents/subagent-orchestration-spec.md +152 -0
- package/docs/agents/system-overview.md +88 -0
- package/docs/agents/tools-mcp-skills-spec.md +189 -0
- package/docs/agents/traceability-matrix.md +79 -0
- package/docs/agents/ui-flow-spec.md +211 -0
- package/docs/agents/ui-ux-system-spec.md +426 -0
- package/docs/agents/workspace-lifecycle-spec.md +166 -0
- package/docs/architecture-spec.md +78 -0
- package/docs/components/control-plane.md +78 -0
- package/docs/components/data-plane.md +69 -0
- package/docs/components/hooks-events.md +67 -0
- package/docs/components/identity-rbac-policy.md +73 -0
- package/docs/components/kubevela-oam.md +70 -0
- package/docs/components/operations-publishing.md +81 -0
- package/docs/components/runners-ci.md +66 -0
- package/docs/components/web-ui.md +94 -0
- package/docs/external/README.md +47 -0
- package/docs/external/bidirectional-sync-design.md +134 -0
- package/docs/external/cicd-interface.md +64 -0
- package/docs/external/external-backend-controllers.md +170 -0
- package/docs/external/external-backend-crds.md +234 -0
- package/docs/external/external-backend-ui-spec.md +151 -0
- package/docs/external/external-backend-ux-flows.md +115 -0
- package/docs/external/external-object-mapping.md +125 -0
- package/docs/external/git-forge-interface.md +68 -0
- package/docs/external/github-integration-design.md +151 -0
- package/docs/external/issue-tracking-interface.md +66 -0
- package/docs/external/provider-capability-manifests.md +204 -0
- package/docs/external/provider-catalog.md +139 -0
- package/docs/external/provider-rollout-testing.md +78 -0
- package/docs/external/research-results.md +48 -0
- package/docs/external/security-auth-permissions.md +81 -0
- package/docs/external/sync-state-machines.md +108 -0
- package/docs/external/unified-external-backend-model.md +107 -0
- package/docs/external/user-facing-changes.md +67 -0
- package/docs/gaps.md +161 -0
- package/docs/install.md +94 -0
- package/docs/krate-design.md +334 -0
- package/docs/local-minikube.md +55 -0
- package/docs/ontology/README.md +32 -0
- package/docs/ontology/bounded-contexts.md +29 -0
- package/docs/ontology/events-and-hooks.md +32 -0
- package/docs/ontology/oam-kubevela.md +32 -0
- package/docs/ontology/operations-and-release.md +25 -0
- package/docs/ontology/personas-and-actors.md +32 -0
- package/docs/ontology/policies-and-invariants.md +33 -0
- package/docs/ontology/problem-space.md +30 -0
- package/docs/ontology/resource-contracts.md +40 -0
- package/docs/ontology/resource-taxonomy.md +42 -0
- package/docs/ontology/runners-and-ci.md +29 -0
- package/docs/ontology/solution-space.md +24 -0
- package/docs/ontology/storage-and-data-boundaries.md +29 -0
- package/docs/ontology/validation-matrix.md +24 -0
- package/docs/ontology/web-ui-excellent-flows.md +32 -0
- package/docs/ontology/workflows.md +39 -0
- package/docs/ontology/world.md +35 -0
- package/docs/product-requirements.md +62 -0
- package/docs/roadmap-mvp.md +87 -0
- package/docs/system-requirements.md +90 -0
- package/docs/tests/README.md +53 -0
- package/docs/tests/agent-qa-plan.md +63 -0
- package/docs/tests/browser-ui-tests.md +62 -0
- package/docs/tests/ci-quality-gates.md +48 -0
- package/docs/tests/coverage-model.md +64 -0
- package/docs/tests/e2e-scenario-tests.md +53 -0
- package/docs/tests/fixtures-test-data.md +63 -0
- package/docs/tests/observability-reliability-tests.md +54 -0
- package/docs/tests/product-test-matrix.md +145 -0
- package/docs/tests/qa-adoption-roadmap.md +130 -0
- package/docs/tests/qa-automation-plan.md +101 -0
- package/docs/tests/security-compliance-tests.md +57 -0
- package/docs/tests/test-framework-tools.md +88 -0
- package/docs/tests/test-suite-layout.md +121 -0
- package/docs/tests/unit-integration-tests.md +48 -0
- package/docs/todo-kyverno +714 -0
- package/docs/user-stories.md +78 -0
- package/examples/minikube-demo.yaml +190 -0
- package/examples/oam-application.yaml +23 -0
- package/examples/policy-kyverno-pr-title.yaml +18 -0
- package/package.json +63 -0
- package/scripts/build.mjs +29 -0
- package/scripts/setup-minikube.mjs +65 -0
- package/scripts/smoke.mjs +37 -0
- package/scripts/validate-doc-coverage.mjs +152 -0
- package/scripts/validate-package.mjs +93 -0
- package/scripts/validate-ui.mjs +207 -0
- package/src/agent-approval-controller.js +123 -0
- package/src/agent-context-bundles.js +242 -0
- package/src/agent-dispatch-controller.js +86 -0
- package/src/agent-mux-client.js +280 -0
- package/src/agent-permission-review.js +162 -0
- package/src/agent-stack-controller.js +296 -0
- package/src/agent-trigger-controller.js +108 -0
- package/src/api-controller.js +206 -0
- package/src/argocd-gitops.js +43 -0
- package/src/auth.js +265 -0
- package/src/component-catalog.js +41 -0
- package/src/control-plane.js +136 -0
- package/src/controller-client.js +38 -0
- package/src/controller-ui.js +538 -0
- package/src/data-plane.js +178 -0
- package/src/gitea-backend.js +95 -0
- package/src/handoff.js +98 -0
- package/src/hooks-events.js +63 -0
- package/src/http-server.js +151 -0
- package/src/identity-policy.js +86 -0
- package/src/index.js +30 -0
- package/src/kubernetes-controller.js +812 -0
- package/src/kubernetes-resource-gateway.js +48 -0
- package/src/operations.js +112 -0
- package/src/resource-model.js +203 -0
- package/src/runners-ci.js +48 -0
- package/src/runtime.js +196 -0
- package/src/web-ui.js +40 -0
- package/tests/agent-approval-controller.test.js +173 -0
- package/tests/agent-context-bundles.test.js +278 -0
- package/tests/agent-dispatch-controller.test.js +176 -0
- package/tests/agent-mux-client.test.js +204 -0
- package/tests/agent-permission-review.test.js +209 -0
- package/tests/agent-resources.test.js +212 -0
- package/tests/agent-stack-controller.test.js +221 -0
- package/tests/agent-trigger-controller.test.js +211 -0
- package/tests/deployment.test.js +395 -0
- package/tests/e2e/lifecycle.test.js +117 -0
- package/tests/krate.test.js +727 -0
|
@@ -0,0 +1,204 @@
|
|
|
1
|
+
import assert from 'node:assert/strict';
|
|
2
|
+
import { describe, it } from 'node:test';
|
|
3
|
+
import { createAgentMuxClient, parseSseLines, AGENT_MUX_CLIENT_BOUNDARY } from '../src/agent-mux-client.js';
|
|
4
|
+
|
|
5
|
+
describe('AGENT_MUX_CLIENT_BOUNDARY', () => {
|
|
6
|
+
it('declares the expected role and scope', () => {
|
|
7
|
+
assert.equal(AGENT_MUX_CLIENT_BOUNDARY.role, 'agent-mux-client');
|
|
8
|
+
assert.ok(AGENT_MUX_CLIENT_BOUNDARY.scope.includes('HTTP/SSE'));
|
|
9
|
+
assert.ok(AGENT_MUX_CLIENT_BOUNDARY.owns.includes('gateway HTTP calls'));
|
|
10
|
+
assert.ok(AGENT_MUX_CLIENT_BOUNDARY.delegatesTo.includes('resource-model'));
|
|
11
|
+
});
|
|
12
|
+
});
|
|
13
|
+
|
|
14
|
+
describe('createAgentMuxClient — isAvailable', () => {
|
|
15
|
+
it('returns false when enabled is false', () => {
|
|
16
|
+
const client = createAgentMuxClient({ gateway: 'http://localhost:8080', enabled: false });
|
|
17
|
+
assert.equal(client.isAvailable(), false);
|
|
18
|
+
});
|
|
19
|
+
|
|
20
|
+
it('returns false when gateway is empty', () => {
|
|
21
|
+
const client = createAgentMuxClient({ gateway: '', enabled: true });
|
|
22
|
+
assert.equal(client.isAvailable(), false);
|
|
23
|
+
});
|
|
24
|
+
|
|
25
|
+
it('returns false when no options are provided', () => {
|
|
26
|
+
const client = createAgentMuxClient();
|
|
27
|
+
assert.equal(client.isAvailable(), false);
|
|
28
|
+
});
|
|
29
|
+
|
|
30
|
+
it('returns true when enabled is true and gateway is set', () => {
|
|
31
|
+
const client = createAgentMuxClient({ gateway: 'http://localhost:8080', enabled: true });
|
|
32
|
+
assert.equal(client.isAvailable(), true);
|
|
33
|
+
});
|
|
34
|
+
});
|
|
35
|
+
|
|
36
|
+
describe('createAgentMuxClient — queryCapabilities', () => {
|
|
37
|
+
it('returns null when client is unavailable', async () => {
|
|
38
|
+
const client = createAgentMuxClient({ enabled: false });
|
|
39
|
+
const result = await client.queryCapabilities('claude-code');
|
|
40
|
+
assert.equal(result, null);
|
|
41
|
+
});
|
|
42
|
+
});
|
|
43
|
+
|
|
44
|
+
describe('createAgentMuxClient — launchSession', () => {
|
|
45
|
+
it('returns null when client is unavailable', async () => {
|
|
46
|
+
const client = createAgentMuxClient({ enabled: false });
|
|
47
|
+
const result = await client.launchSession({
|
|
48
|
+
stack: { baseAgent: 'claude-code' },
|
|
49
|
+
contextBundle: {},
|
|
50
|
+
permissionSnapshot: {},
|
|
51
|
+
workspace: {}
|
|
52
|
+
});
|
|
53
|
+
assert.equal(result, null);
|
|
54
|
+
});
|
|
55
|
+
});
|
|
56
|
+
|
|
57
|
+
describe('parseSseLines', () => {
|
|
58
|
+
it('parses valid SSE data lines', () => {
|
|
59
|
+
const text = [
|
|
60
|
+
'data: {"role":"assistant","content":"hello"}',
|
|
61
|
+
'',
|
|
62
|
+
'data: {"role":"user","content":"world"}',
|
|
63
|
+
'',
|
|
64
|
+
].join('\n');
|
|
65
|
+
const events = parseSseLines(text);
|
|
66
|
+
assert.equal(events.length, 2);
|
|
67
|
+
assert.equal(events[0].role, 'assistant');
|
|
68
|
+
assert.equal(events[0].content, 'hello');
|
|
69
|
+
assert.equal(events[1].role, 'user');
|
|
70
|
+
assert.equal(events[1].content, 'world');
|
|
71
|
+
});
|
|
72
|
+
|
|
73
|
+
it('handles multiple data lines in a single block', () => {
|
|
74
|
+
const text = [
|
|
75
|
+
'data: {"seq":1}',
|
|
76
|
+
'data: {"seq":2}',
|
|
77
|
+
'',
|
|
78
|
+
].join('\n');
|
|
79
|
+
const events = parseSseLines(text);
|
|
80
|
+
assert.equal(events.length, 2);
|
|
81
|
+
assert.equal(events[0].seq, 1);
|
|
82
|
+
assert.equal(events[1].seq, 2);
|
|
83
|
+
});
|
|
84
|
+
|
|
85
|
+
it('skips malformed JSON gracefully', () => {
|
|
86
|
+
const text = [
|
|
87
|
+
'data: {"valid":true}',
|
|
88
|
+
'data: not-json',
|
|
89
|
+
'data: {"also":"valid"}',
|
|
90
|
+
'',
|
|
91
|
+
].join('\n');
|
|
92
|
+
const events = parseSseLines(text);
|
|
93
|
+
assert.equal(events.length, 2);
|
|
94
|
+
assert.equal(events[0].valid, true);
|
|
95
|
+
assert.equal(events[1].also, 'valid');
|
|
96
|
+
});
|
|
97
|
+
|
|
98
|
+
it('ignores non-data SSE lines', () => {
|
|
99
|
+
const text = [
|
|
100
|
+
'event: message',
|
|
101
|
+
'id: 42',
|
|
102
|
+
'data: {"role":"assistant","content":"test"}',
|
|
103
|
+
'retry: 3000',
|
|
104
|
+
'',
|
|
105
|
+
].join('\n');
|
|
106
|
+
const events = parseSseLines(text);
|
|
107
|
+
assert.equal(events.length, 1);
|
|
108
|
+
assert.equal(events[0].role, 'assistant');
|
|
109
|
+
});
|
|
110
|
+
|
|
111
|
+
it('returns empty array for empty text', () => {
|
|
112
|
+
assert.deepEqual(parseSseLines(''), []);
|
|
113
|
+
});
|
|
114
|
+
|
|
115
|
+
it('returns empty array for text with no data lines', () => {
|
|
116
|
+
assert.deepEqual(parseSseLines('event: ping\nid: 1\n\n'), []);
|
|
117
|
+
});
|
|
118
|
+
});
|
|
119
|
+
|
|
120
|
+
describe('createAgentMuxClient — reconcileTranscript', () => {
|
|
121
|
+
it('creates a valid AgentSessionTranscript resource from events', () => {
|
|
122
|
+
const client = createAgentMuxClient({ gateway: 'http://localhost:8080', enabled: true });
|
|
123
|
+
const events = [
|
|
124
|
+
{ role: 'user', content: 'Fix the bug', timestamp: '2026-01-01T00:00:00Z' },
|
|
125
|
+
{ role: 'assistant', content: 'Looking at the code...', timestamp: '2026-01-01T00:00:01Z', usage: { inputTokens: 100, outputTokens: 50 } },
|
|
126
|
+
{ role: 'assistant', content: 'Fixed it.', timestamp: '2026-01-01T00:00:02Z', usage: { inputTokens: 200, outputTokens: 80 } },
|
|
127
|
+
];
|
|
128
|
+
|
|
129
|
+
const transcript = client.reconcileTranscript('sess-123', events, { namespace: 'krate-org-acme', organizationRef: 'acme' });
|
|
130
|
+
|
|
131
|
+
assert.equal(transcript.kind, 'AgentSessionTranscript');
|
|
132
|
+
assert.equal(transcript.apiVersion, 'krate.a5c.ai/v1alpha1');
|
|
133
|
+
assert.equal(transcript.metadata.name, 'transcript-sess-123');
|
|
134
|
+
assert.equal(transcript.metadata.namespace, 'krate-org-acme');
|
|
135
|
+
assert.equal(transcript.spec.organizationRef, 'acme');
|
|
136
|
+
assert.equal(transcript.spec.sessionRef, 'sess-123');
|
|
137
|
+
assert.equal(transcript.spec.messages.length, 3);
|
|
138
|
+
assert.equal(transcript.spec.messages[0].role, 'user');
|
|
139
|
+
assert.equal(transcript.spec.messages[0].content, 'Fix the bug');
|
|
140
|
+
assert.equal(transcript.spec.messages[1].role, 'assistant');
|
|
141
|
+
assert.equal(transcript.spec.cost.inputTokens, 300);
|
|
142
|
+
assert.equal(transcript.spec.cost.outputTokens, 130);
|
|
143
|
+
assert.equal(transcript.spec.cost.totalTokens, 430);
|
|
144
|
+
assert.equal(transcript.status.phase, 'Reconciled');
|
|
145
|
+
});
|
|
146
|
+
|
|
147
|
+
it('handles empty events array', () => {
|
|
148
|
+
const client = createAgentMuxClient({ gateway: 'http://localhost:8080', enabled: true });
|
|
149
|
+
const transcript = client.reconcileTranscript('sess-empty', [], { namespace: 'default', organizationRef: 'default' });
|
|
150
|
+
|
|
151
|
+
assert.equal(transcript.kind, 'AgentSessionTranscript');
|
|
152
|
+
assert.equal(transcript.spec.sessionRef, 'sess-empty');
|
|
153
|
+
assert.equal(transcript.spec.messages.length, 0);
|
|
154
|
+
assert.equal(transcript.spec.cost.inputTokens, 0);
|
|
155
|
+
assert.equal(transcript.spec.cost.outputTokens, 0);
|
|
156
|
+
assert.equal(transcript.spec.cost.totalTokens, 0);
|
|
157
|
+
});
|
|
158
|
+
|
|
159
|
+
it('handles events with toolUse and toolResult', () => {
|
|
160
|
+
const client = createAgentMuxClient({ gateway: 'http://localhost:8080', enabled: true });
|
|
161
|
+
const events = [
|
|
162
|
+
{ role: 'assistant', content: 'Using tool...', toolUse: { name: 'read_file', input: { path: '/tmp/f' } }, timestamp: '2026-01-01T00:00:00Z' },
|
|
163
|
+
{ role: 'tool', content: 'file contents', toolResult: { output: 'ok' }, timestamp: '2026-01-01T00:00:01Z' },
|
|
164
|
+
];
|
|
165
|
+
const transcript = client.reconcileTranscript('sess-tools', events, { namespace: 'default', organizationRef: 'default' });
|
|
166
|
+
|
|
167
|
+
assert.equal(transcript.spec.messages.length, 2);
|
|
168
|
+
assert.deepEqual(transcript.spec.messages[0].toolUse, { name: 'read_file', input: { path: '/tmp/f' } });
|
|
169
|
+
assert.deepEqual(transcript.spec.messages[1].toolResult, { output: 'ok' });
|
|
170
|
+
});
|
|
171
|
+
|
|
172
|
+
it('handles events with non-string content', () => {
|
|
173
|
+
const client = createAgentMuxClient({ gateway: 'http://localhost:8080', enabled: true });
|
|
174
|
+
const events = [
|
|
175
|
+
{ role: 'assistant', content: { type: 'structured', data: [1, 2, 3] }, timestamp: '2026-01-01T00:00:00Z' },
|
|
176
|
+
];
|
|
177
|
+
const transcript = client.reconcileTranscript('sess-obj', events, { namespace: 'default', organizationRef: 'default' });
|
|
178
|
+
|
|
179
|
+
assert.equal(typeof transcript.spec.messages[0].content, 'string');
|
|
180
|
+
assert.ok(transcript.spec.messages[0].content.includes('"type":"structured"'));
|
|
181
|
+
});
|
|
182
|
+
|
|
183
|
+
it('skips null/non-object events gracefully', () => {
|
|
184
|
+
const client = createAgentMuxClient({ gateway: 'http://localhost:8080', enabled: true });
|
|
185
|
+
const events = [
|
|
186
|
+
null,
|
|
187
|
+
'not-an-object',
|
|
188
|
+
42,
|
|
189
|
+
{ role: 'user', content: 'valid', timestamp: '2026-01-01T00:00:00Z' },
|
|
190
|
+
];
|
|
191
|
+
const transcript = client.reconcileTranscript('sess-mixed', events, { namespace: 'default', organizationRef: 'default' });
|
|
192
|
+
|
|
193
|
+
assert.equal(transcript.spec.messages.length, 1);
|
|
194
|
+
assert.equal(transcript.spec.messages[0].role, 'user');
|
|
195
|
+
});
|
|
196
|
+
|
|
197
|
+
it('uses default namespace and organizationRef when not specified', () => {
|
|
198
|
+
const client = createAgentMuxClient({ gateway: 'http://localhost:8080', enabled: true });
|
|
199
|
+
const transcript = client.reconcileTranscript('sess-defaults', []);
|
|
200
|
+
|
|
201
|
+
assert.equal(transcript.metadata.namespace, 'default');
|
|
202
|
+
assert.equal(transcript.spec.organizationRef, 'default');
|
|
203
|
+
});
|
|
204
|
+
});
|
|
@@ -0,0 +1,209 @@
|
|
|
1
|
+
import { describe, it } from 'node:test';
|
|
2
|
+
import assert from 'node:assert/strict';
|
|
3
|
+
import { createPermissionReviewer } from '../src/agent-permission-review.js';
|
|
4
|
+
import { createResource } from '../src/resource-model.js';
|
|
5
|
+
|
|
6
|
+
function makeStack(name, overrides = {}) {
|
|
7
|
+
return createResource('AgentStack', { name }, {
|
|
8
|
+
organizationRef: 'default',
|
|
9
|
+
baseAgent: 'claude-code',
|
|
10
|
+
adapter: 'babysitter',
|
|
11
|
+
runtimeIdentity: { serviceAccountRef: overrides.serviceAccountRef || 'sa-agent' },
|
|
12
|
+
...(overrides.spec || {})
|
|
13
|
+
});
|
|
14
|
+
}
|
|
15
|
+
|
|
16
|
+
function makeServiceAccount(name) {
|
|
17
|
+
return createResource('AgentServiceAccount', { name }, {
|
|
18
|
+
organizationRef: 'default',
|
|
19
|
+
namespace: 'krate-agents',
|
|
20
|
+
serviceAccountName: name
|
|
21
|
+
});
|
|
22
|
+
}
|
|
23
|
+
|
|
24
|
+
function makeRoleBinding(name, subject) {
|
|
25
|
+
return createResource('AgentRoleBinding', { name }, {
|
|
26
|
+
organizationRef: 'default',
|
|
27
|
+
subject,
|
|
28
|
+
roleRef: 'agent-role',
|
|
29
|
+
scope: 'namespace'
|
|
30
|
+
});
|
|
31
|
+
}
|
|
32
|
+
|
|
33
|
+
function makeSecretGrant(name, subject, purpose, overrides = {}) {
|
|
34
|
+
return createResource('AgentSecretGrant', { name }, {
|
|
35
|
+
organizationRef: 'default',
|
|
36
|
+
subject,
|
|
37
|
+
secretRef: 'api-keys',
|
|
38
|
+
purpose,
|
|
39
|
+
...overrides
|
|
40
|
+
});
|
|
41
|
+
}
|
|
42
|
+
|
|
43
|
+
function makeMcpServer(name, overrides = {}) {
|
|
44
|
+
return createResource('AgentMcpServer', { name }, {
|
|
45
|
+
organizationRef: 'default',
|
|
46
|
+
transport: 'stdio',
|
|
47
|
+
scope: 'workspace',
|
|
48
|
+
...overrides
|
|
49
|
+
});
|
|
50
|
+
}
|
|
51
|
+
|
|
52
|
+
function makeModelProviderGrant(subject) {
|
|
53
|
+
return makeSecretGrant('sg-model', subject, 'model-provider');
|
|
54
|
+
}
|
|
55
|
+
|
|
56
|
+
const baseInput = {
|
|
57
|
+
repository: 'my-repo',
|
|
58
|
+
ref: 'refs/heads/main',
|
|
59
|
+
actor: 'user-1',
|
|
60
|
+
agentStack: 'test-stack',
|
|
61
|
+
triggerSource: 'manual',
|
|
62
|
+
taskKind: 'fix'
|
|
63
|
+
};
|
|
64
|
+
|
|
65
|
+
describe('agent permission review', () => {
|
|
66
|
+
it('fully granted stack returns allowed', () => {
|
|
67
|
+
const reviewer = createPermissionReviewer();
|
|
68
|
+
const resources = {
|
|
69
|
+
AgentStack: [makeStack('test-stack')],
|
|
70
|
+
AgentServiceAccount: [makeServiceAccount('sa-agent')],
|
|
71
|
+
AgentRoleBinding: [makeRoleBinding('rb-1', 'sa-agent')],
|
|
72
|
+
AgentSecretGrant: [makeModelProviderGrant('sa-agent')],
|
|
73
|
+
AgentConfigGrant: [],
|
|
74
|
+
AgentMcpServer: []
|
|
75
|
+
};
|
|
76
|
+
const result = reviewer.reviewPermissions({ ...baseInput, resources });
|
|
77
|
+
assert.equal(result.decision, 'allowed');
|
|
78
|
+
assert.ok(result.grants.length > 0, 'should have at least one grant');
|
|
79
|
+
assert.ok(result.grants.some((g) => g.kind === 'AgentServiceAccount' && g.status === 'bound'));
|
|
80
|
+
assert.ok(result.grants.some((g) => g.kind === 'AgentRoleBinding' && g.status === 'bound'));
|
|
81
|
+
assert.ok(typeof result.digest === 'string' && result.digest.length > 0);
|
|
82
|
+
});
|
|
83
|
+
|
|
84
|
+
it('missing service account returns denied with missing-runtime-identity reason', () => {
|
|
85
|
+
const reviewer = createPermissionReviewer();
|
|
86
|
+
const resources = {
|
|
87
|
+
AgentStack: [makeStack('test-stack', { serviceAccountRef: 'nonexistent-sa' })],
|
|
88
|
+
AgentServiceAccount: [],
|
|
89
|
+
AgentRoleBinding: [],
|
|
90
|
+
AgentSecretGrant: [],
|
|
91
|
+
AgentConfigGrant: [],
|
|
92
|
+
AgentMcpServer: []
|
|
93
|
+
};
|
|
94
|
+
const result = reviewer.reviewPermissions({ ...baseInput, resources });
|
|
95
|
+
assert.equal(result.decision, 'denied');
|
|
96
|
+
assert.ok(result.reasons.some((r) => r.severity === 'error' && r.message.includes('Missing AgentServiceAccount')));
|
|
97
|
+
});
|
|
98
|
+
|
|
99
|
+
it('missing secret grant returns denied with missingGrants information', () => {
|
|
100
|
+
const reviewer = createPermissionReviewer();
|
|
101
|
+
const mcpServer = makeMcpServer('mcp-github', { secretRef: 'github-token' });
|
|
102
|
+
const stack = makeStack('test-stack', {
|
|
103
|
+
spec: {
|
|
104
|
+
organizationRef: 'default',
|
|
105
|
+
baseAgent: 'claude-code',
|
|
106
|
+
adapter: 'babysitter',
|
|
107
|
+
runtimeIdentity: { serviceAccountRef: 'sa-agent' },
|
|
108
|
+
mcpServerRefs: ['mcp-github']
|
|
109
|
+
}
|
|
110
|
+
});
|
|
111
|
+
const resources = {
|
|
112
|
+
AgentStack: [stack],
|
|
113
|
+
AgentServiceAccount: [makeServiceAccount('sa-agent')],
|
|
114
|
+
AgentRoleBinding: [makeRoleBinding('rb-1', 'sa-agent')],
|
|
115
|
+
AgentSecretGrant: [],
|
|
116
|
+
AgentConfigGrant: [],
|
|
117
|
+
AgentMcpServer: [mcpServer]
|
|
118
|
+
};
|
|
119
|
+
const result = reviewer.reviewPermissions({ ...baseInput, resources });
|
|
120
|
+
assert.equal(result.decision, 'denied');
|
|
121
|
+
assert.ok(result.reasons.some((r) => r.severity === 'error' && r.message.includes('Missing AgentSecretGrant')));
|
|
122
|
+
});
|
|
123
|
+
|
|
124
|
+
it('grant requiring approval returns requires-approval', () => {
|
|
125
|
+
const reviewer = createPermissionReviewer();
|
|
126
|
+
const mcpServer = makeMcpServer('mcp-prod', { secretRef: 'prod-secret' });
|
|
127
|
+
const stack = makeStack('test-stack', {
|
|
128
|
+
spec: {
|
|
129
|
+
organizationRef: 'default',
|
|
130
|
+
baseAgent: 'claude-code',
|
|
131
|
+
adapter: 'babysitter',
|
|
132
|
+
runtimeIdentity: { serviceAccountRef: 'sa-agent' },
|
|
133
|
+
mcpServerRefs: ['mcp-prod']
|
|
134
|
+
}
|
|
135
|
+
});
|
|
136
|
+
const mcpGrant = makeSecretGrant('sg-prod', 'sa-agent', 'mcp-server:mcp-prod', {
|
|
137
|
+
requiredApproval: 'always'
|
|
138
|
+
});
|
|
139
|
+
const resources = {
|
|
140
|
+
AgentStack: [stack],
|
|
141
|
+
AgentServiceAccount: [makeServiceAccount('sa-agent')],
|
|
142
|
+
AgentRoleBinding: [makeRoleBinding('rb-1', 'sa-agent')],
|
|
143
|
+
AgentSecretGrant: [mcpGrant, makeModelProviderGrant('sa-agent')],
|
|
144
|
+
AgentConfigGrant: [],
|
|
145
|
+
AgentMcpServer: [mcpServer]
|
|
146
|
+
};
|
|
147
|
+
const result = reviewer.reviewPermissions({ ...baseInput, resources });
|
|
148
|
+
assert.equal(result.decision, 'requires-approval');
|
|
149
|
+
assert.ok(result.grants.some((g) => g.status === 'requires-approval' && g.requiredApproval === 'always'));
|
|
150
|
+
});
|
|
151
|
+
|
|
152
|
+
it('empty capabilities stack returns allowed', () => {
|
|
153
|
+
const reviewer = createPermissionReviewer();
|
|
154
|
+
const stack = makeStack('test-stack');
|
|
155
|
+
const resources = {
|
|
156
|
+
AgentStack: [stack],
|
|
157
|
+
AgentServiceAccount: [makeServiceAccount('sa-agent')],
|
|
158
|
+
AgentRoleBinding: [makeRoleBinding('rb-1', 'sa-agent')],
|
|
159
|
+
AgentSecretGrant: [makeModelProviderGrant('sa-agent')],
|
|
160
|
+
AgentConfigGrant: [],
|
|
161
|
+
AgentMcpServer: []
|
|
162
|
+
};
|
|
163
|
+
const result = reviewer.reviewPermissions({
|
|
164
|
+
...baseInput,
|
|
165
|
+
toolRefs: [],
|
|
166
|
+
skillRefs: [],
|
|
167
|
+
mcpServerRefs: [],
|
|
168
|
+
contextLabelRefs: [],
|
|
169
|
+
resources
|
|
170
|
+
});
|
|
171
|
+
assert.equal(result.decision, 'allowed');
|
|
172
|
+
});
|
|
173
|
+
|
|
174
|
+
it('same input produces deterministic digest', () => {
|
|
175
|
+
const reviewer = createPermissionReviewer();
|
|
176
|
+
const resources = {
|
|
177
|
+
AgentStack: [makeStack('test-stack')],
|
|
178
|
+
AgentServiceAccount: [makeServiceAccount('sa-agent')],
|
|
179
|
+
AgentRoleBinding: [makeRoleBinding('rb-1', 'sa-agent')],
|
|
180
|
+
AgentSecretGrant: [makeModelProviderGrant('sa-agent')],
|
|
181
|
+
AgentConfigGrant: [],
|
|
182
|
+
AgentMcpServer: []
|
|
183
|
+
};
|
|
184
|
+
const result1 = reviewer.reviewPermissions({ ...baseInput, resources });
|
|
185
|
+
const result2 = reviewer.reviewPermissions({ ...baseInput, resources });
|
|
186
|
+
assert.equal(result1.digest, result2.digest);
|
|
187
|
+
assert.ok(typeof result1.digest === 'string' && result1.digest.length === 64, 'digest should be a 64-char hex SHA-256');
|
|
188
|
+
});
|
|
189
|
+
|
|
190
|
+
it('createPermissionSnapshot returns frozen object with timestamp', () => {
|
|
191
|
+
const reviewer = createPermissionReviewer();
|
|
192
|
+
const resources = {
|
|
193
|
+
AgentStack: [makeStack('test-stack')],
|
|
194
|
+
AgentServiceAccount: [makeServiceAccount('sa-agent')],
|
|
195
|
+
AgentRoleBinding: [makeRoleBinding('rb-1', 'sa-agent')],
|
|
196
|
+
AgentSecretGrant: [makeModelProviderGrant('sa-agent')],
|
|
197
|
+
AgentConfigGrant: [],
|
|
198
|
+
AgentMcpServer: []
|
|
199
|
+
};
|
|
200
|
+
const review = reviewer.reviewPermissions({ ...baseInput, resources });
|
|
201
|
+
const snapshot = reviewer.createPermissionSnapshot(review);
|
|
202
|
+
assert.ok(Object.isFrozen(snapshot), 'snapshot should be frozen');
|
|
203
|
+
assert.ok(typeof snapshot.snapshotAt === 'string' && snapshot.snapshotAt.length > 0, 'snapshot should have a timestamp');
|
|
204
|
+
assert.equal(snapshot.frozen, true);
|
|
205
|
+
assert.equal(snapshot.digest, review.digest);
|
|
206
|
+
assert.equal(snapshot.decision, review.decision);
|
|
207
|
+
assert.throws(() => { snapshot.decision = 'denied'; }, TypeError);
|
|
208
|
+
});
|
|
209
|
+
});
|
|
@@ -0,0 +1,212 @@
|
|
|
1
|
+
import assert from 'node:assert/strict';
|
|
2
|
+
import { describe, it } from 'node:test';
|
|
3
|
+
import {
|
|
4
|
+
CONFIG_KINDS,
|
|
5
|
+
AGGREGATED_KINDS,
|
|
6
|
+
ALL_KINDS,
|
|
7
|
+
RESOURCE_DEFINITIONS,
|
|
8
|
+
createResource,
|
|
9
|
+
validateResource,
|
|
10
|
+
resourceSchemaForKind,
|
|
11
|
+
storageClassForKind,
|
|
12
|
+
listResourceDefinitions
|
|
13
|
+
} from '../src/resource-model.js';
|
|
14
|
+
|
|
15
|
+
const AGENT_CONFIG_KINDS = [
|
|
16
|
+
'AgentStack',
|
|
17
|
+
'AgentSubagent',
|
|
18
|
+
'AgentToolProfile',
|
|
19
|
+
'AgentMcpServer',
|
|
20
|
+
'AgentSkill',
|
|
21
|
+
'AgentTriggerRule',
|
|
22
|
+
'AgentContextLabel',
|
|
23
|
+
'AgentWorkspacePolicy',
|
|
24
|
+
'AgentServiceAccount',
|
|
25
|
+
'AgentRoleBinding',
|
|
26
|
+
'AgentSecretGrant',
|
|
27
|
+
'AgentConfigGrant',
|
|
28
|
+
'AgentAdapter',
|
|
29
|
+
'AgentTransportBinding',
|
|
30
|
+
'AgentProviderConfig',
|
|
31
|
+
'AgentProject',
|
|
32
|
+
'AgentGatewayConfig'
|
|
33
|
+
];
|
|
34
|
+
|
|
35
|
+
const AGENT_AGGREGATED_KINDS = [
|
|
36
|
+
'AgentDispatchRun',
|
|
37
|
+
'AgentDispatchAttempt',
|
|
38
|
+
'AgentSession',
|
|
39
|
+
'AgentContextBundle',
|
|
40
|
+
'AgentArtifact',
|
|
41
|
+
'AgentApproval',
|
|
42
|
+
'AgentWorkspace',
|
|
43
|
+
'AgentTriggerExecution',
|
|
44
|
+
'AgentCapabilityRequirement',
|
|
45
|
+
'WorkItemSessionLink',
|
|
46
|
+
'WorkItemWorkspaceLink',
|
|
47
|
+
'AgentSessionTranscript',
|
|
48
|
+
'AgentSessionAttachment',
|
|
49
|
+
'AgentWorkspaceRuntime'
|
|
50
|
+
];
|
|
51
|
+
|
|
52
|
+
const ALL_AGENT_KINDS = [...AGENT_CONFIG_KINDS, ...AGENT_AGGREGATED_KINDS];
|
|
53
|
+
|
|
54
|
+
/** Minimal valid spec for each agent kind, satisfying requiredSpec. */
|
|
55
|
+
function minimalSpecForKind(kind) {
|
|
56
|
+
const specs = {
|
|
57
|
+
AgentStack: { organizationRef: 'default', baseAgent: 'claude-code', adapter: 'babysitter', runtimeIdentity: 'sa-agent' },
|
|
58
|
+
AgentSubagent: { organizationRef: 'default', rolePrompt: 'Code reviewer', taskKinds: ['review'] },
|
|
59
|
+
AgentToolProfile: { organizationRef: 'default', filesystemPolicy: 'read-write', approvalPolicyByTool: { shell: 'auto' } },
|
|
60
|
+
AgentMcpServer: { organizationRef: 'default', transport: 'stdio', scope: 'workspace' },
|
|
61
|
+
AgentSkill: { organizationRef: 'default', format: 'markdown', sourceRef: 'skills/debug.md' },
|
|
62
|
+
AgentTriggerRule: { organizationRef: 'default', sources: ['ci-failure'], agentStack: 'default-stack', taskKind: 'fix' },
|
|
63
|
+
AgentContextLabel: { organizationRef: 'default', promptFragment: 'Always run tests before committing', allowedSources: ['admin'] },
|
|
64
|
+
AgentWorkspacePolicy: { organizationRef: 'default', mode: 'worktree', retentionPolicy: '7d' },
|
|
65
|
+
AgentServiceAccount: { organizationRef: 'default', namespace: 'krate-agents', serviceAccountName: 'agent-runner' },
|
|
66
|
+
AgentRoleBinding: { organizationRef: 'default', subject: 'agent-runner', roleRef: 'agent-role', scope: 'namespace' },
|
|
67
|
+
AgentSecretGrant: { organizationRef: 'default', subject: 'agent-runner', secretRef: 'api-keys', purpose: 'API access' },
|
|
68
|
+
AgentConfigGrant: { organizationRef: 'default', subject: 'agent-runner', configMapRef: 'agent-config', purpose: 'Configuration' },
|
|
69
|
+
AgentDispatchRun: { organizationRef: 'default', repository: 'app', sourceRefs: ['refs/heads/main'], agentStack: 'default-stack', taskKind: 'fix' },
|
|
70
|
+
AgentDispatchAttempt: { organizationRef: 'default', agentDispatchRun: 'run-1', attemptReason: 'initial', agentStackSnapshot: { baseAgent: 'claude-code' } },
|
|
71
|
+
AgentSession: { organizationRef: 'default', agentMuxSessionId: 'sess-123', dispatchRun: 'run-1' },
|
|
72
|
+
AgentContextBundle: { organizationRef: 'default', dispatchRun: 'run-1', digest: 'sha256:abc', sources: ['repo-context'] },
|
|
73
|
+
AgentArtifact: { organizationRef: 'default', dispatchRun: 'run-1', kind: 'patch', digest: 'sha256:def' },
|
|
74
|
+
AgentApproval: { organizationRef: 'default', dispatchRun: 'run-1', action: 'write-back', requestedBy: 'agent-runner' },
|
|
75
|
+
AgentWorkspace: { organizationRef: 'default', repository: 'app', workspacePath: '/workspaces/app-1', ownership: 'agent-runner' },
|
|
76
|
+
AgentTriggerExecution: { organizationRef: 'default', triggerRule: 'on-ci-fail', sourceEvent: 'pipeline-failed', decision: 'dispatch' },
|
|
77
|
+
AgentCapabilityRequirement: { organizationRef: 'default', ownerRef: 'stack-1', requiredRoles: ['shell', 'git'] },
|
|
78
|
+
WorkItemSessionLink: { organizationRef: 'default', workItemRef: 'issue-1', agentSession: 'sess-123' },
|
|
79
|
+
WorkItemWorkspaceLink: { organizationRef: 'default', workItemRef: 'issue-1', workspace: 'ws-1' },
|
|
80
|
+
AgentAdapter: { organizationRef: 'default', adapterType: 'claude-code', transport: 'stdio' },
|
|
81
|
+
AgentTransportBinding: { organizationRef: 'default', adapterRef: 'claude-code', endpoint: 'https://agent.example.test', protocol: 'https' },
|
|
82
|
+
AgentProviderConfig: { organizationRef: 'default', provider: 'anthropic', authType: 'api-key' },
|
|
83
|
+
AgentProject: { organizationRef: 'default', displayName: 'Platform' },
|
|
84
|
+
AgentGatewayConfig: { organizationRef: 'default', gatewayUrl: 'https://mux.example.test' },
|
|
85
|
+
AgentSessionTranscript: { organizationRef: 'default', sessionRef: 'sess-123', messages: [{ role: 'user', content: 'hello' }] },
|
|
86
|
+
AgentSessionAttachment: { organizationRef: 'default', sessionRef: 'sess-123', sourceType: 'upload', digest: 'sha256:abc' },
|
|
87
|
+
AgentWorkspaceRuntime: { organizationRef: 'default', workspaceRef: 'ws-1', status: 'running' }
|
|
88
|
+
};
|
|
89
|
+
return specs[kind];
|
|
90
|
+
}
|
|
91
|
+
|
|
92
|
+
describe('agent resource set membership', () => {
|
|
93
|
+
for (const kind of AGENT_CONFIG_KINDS) {
|
|
94
|
+
it(`${kind} is in CONFIG_KINDS`, () => {
|
|
95
|
+
assert.ok(CONFIG_KINDS.has(kind), `${kind} should be in CONFIG_KINDS`);
|
|
96
|
+
});
|
|
97
|
+
}
|
|
98
|
+
|
|
99
|
+
for (const kind of AGENT_AGGREGATED_KINDS) {
|
|
100
|
+
it(`${kind} is in AGGREGATED_KINDS`, () => {
|
|
101
|
+
assert.ok(AGGREGATED_KINDS.has(kind), `${kind} should be in AGGREGATED_KINDS`);
|
|
102
|
+
});
|
|
103
|
+
}
|
|
104
|
+
|
|
105
|
+
for (const kind of ALL_AGENT_KINDS) {
|
|
106
|
+
it(`${kind} is in ALL_KINDS`, () => {
|
|
107
|
+
assert.ok(ALL_KINDS.has(kind), `${kind} should be in ALL_KINDS`);
|
|
108
|
+
});
|
|
109
|
+
}
|
|
110
|
+
});
|
|
111
|
+
|
|
112
|
+
describe('RESOURCE_DEFINITIONS for agent kinds', () => {
|
|
113
|
+
for (const kind of ALL_AGENT_KINDS) {
|
|
114
|
+
it(`${kind} has valid definition with storage, context, plural, purpose, requiredSpec`, () => {
|
|
115
|
+
const def = RESOURCE_DEFINITIONS[kind];
|
|
116
|
+
assert.ok(def, `${kind} should exist in RESOURCE_DEFINITIONS`);
|
|
117
|
+
assert.ok(['etcd', 'postgres'].includes(def.storage), `${kind} storage should be etcd or postgres`);
|
|
118
|
+
assert.ok(typeof def.context === 'string' && def.context.length > 0, `${kind} context should be a non-empty string`);
|
|
119
|
+
assert.ok(typeof def.plural === 'string' && def.plural.length > 0, `${kind} plural should be a non-empty string`);
|
|
120
|
+
assert.ok(typeof def.purpose === 'string' && def.purpose.length > 0, `${kind} purpose should be a non-empty string`);
|
|
121
|
+
assert.ok(Array.isArray(def.requiredSpec) && def.requiredSpec.length > 0, `${kind} requiredSpec should be a non-empty array`);
|
|
122
|
+
});
|
|
123
|
+
}
|
|
124
|
+
});
|
|
125
|
+
|
|
126
|
+
describe('createResource for agent kinds', () => {
|
|
127
|
+
for (const kind of ALL_AGENT_KINDS) {
|
|
128
|
+
it(`creates a valid ${kind} resource`, () => {
|
|
129
|
+
const spec = minimalSpecForKind(kind);
|
|
130
|
+
const resource = createResource(kind, { name: `test-${kind.toLowerCase()}` }, spec);
|
|
131
|
+
assert.equal(resource.apiVersion, 'krate.a5c.ai/v1alpha1');
|
|
132
|
+
assert.equal(resource.kind, kind);
|
|
133
|
+
assert.equal(resource.metadata.name, `test-${kind.toLowerCase()}`);
|
|
134
|
+
assert.equal(resource.metadata.namespace, 'default');
|
|
135
|
+
assert.ok(resource.metadata.labels !== undefined);
|
|
136
|
+
assert.ok(resource.metadata.annotations !== undefined);
|
|
137
|
+
assert.ok(typeof resource.spec === 'object');
|
|
138
|
+
assert.ok(typeof resource.status === 'object');
|
|
139
|
+
});
|
|
140
|
+
}
|
|
141
|
+
});
|
|
142
|
+
|
|
143
|
+
describe('validateResource rejects missing required spec fields for agent kinds', () => {
|
|
144
|
+
for (const kind of ALL_AGENT_KINDS) {
|
|
145
|
+
it(`throws on empty spec for ${kind}`, () => {
|
|
146
|
+
const resource = {
|
|
147
|
+
apiVersion: 'krate.a5c.ai/v1alpha1',
|
|
148
|
+
kind,
|
|
149
|
+
metadata: { name: `invalid-${kind.toLowerCase()}` },
|
|
150
|
+
spec: {},
|
|
151
|
+
status: {}
|
|
152
|
+
};
|
|
153
|
+
const def = RESOURCE_DEFINITIONS[kind];
|
|
154
|
+
assert.throws(
|
|
155
|
+
() => validateResource(resource),
|
|
156
|
+
(err) => {
|
|
157
|
+
assert.ok(err.message.includes(`${kind} spec.${def.requiredSpec[0]} is required`));
|
|
158
|
+
return true;
|
|
159
|
+
}
|
|
160
|
+
);
|
|
161
|
+
});
|
|
162
|
+
}
|
|
163
|
+
});
|
|
164
|
+
|
|
165
|
+
describe('resourceSchemaForKind for agent kinds', () => {
|
|
166
|
+
for (const kind of ALL_AGENT_KINDS) {
|
|
167
|
+
it(`returns correct schema for ${kind}`, () => {
|
|
168
|
+
const schema = resourceSchemaForKind(kind);
|
|
169
|
+
assert.equal(schema.apiVersion, 'krate.a5c.ai/v1alpha1');
|
|
170
|
+
assert.equal(schema.kind, kind);
|
|
171
|
+
assert.ok(typeof schema.plural === 'string');
|
|
172
|
+
assert.ok(['etcd', 'postgres'].includes(schema.storage));
|
|
173
|
+
assert.ok(Array.isArray(schema.required.metadata));
|
|
174
|
+
assert.ok(schema.required.metadata.includes('name'));
|
|
175
|
+
assert.ok(Array.isArray(schema.required.spec));
|
|
176
|
+
assert.ok(schema.required.spec.length > 0);
|
|
177
|
+
assert.deepEqual(schema.status, ['storage', 'phase', 'conditions']);
|
|
178
|
+
});
|
|
179
|
+
}
|
|
180
|
+
});
|
|
181
|
+
|
|
182
|
+
describe('storageClassForKind for agent kinds', () => {
|
|
183
|
+
for (const kind of AGENT_CONFIG_KINDS) {
|
|
184
|
+
it(`${kind} returns etcd`, () => {
|
|
185
|
+
assert.equal(storageClassForKind(kind), 'etcd');
|
|
186
|
+
});
|
|
187
|
+
}
|
|
188
|
+
|
|
189
|
+
for (const kind of AGENT_AGGREGATED_KINDS) {
|
|
190
|
+
it(`${kind} returns postgres`, () => {
|
|
191
|
+
assert.equal(storageClassForKind(kind), 'postgres');
|
|
192
|
+
});
|
|
193
|
+
}
|
|
194
|
+
});
|
|
195
|
+
|
|
196
|
+
describe('kind set counts', () => {
|
|
197
|
+
it('CONFIG_KINDS has 37 members', () => {
|
|
198
|
+
assert.equal(CONFIG_KINDS.size, 37);
|
|
199
|
+
});
|
|
200
|
+
|
|
201
|
+
it('AGGREGATED_KINDS has 20 members', () => {
|
|
202
|
+
assert.equal(AGGREGATED_KINDS.size, 20);
|
|
203
|
+
});
|
|
204
|
+
|
|
205
|
+
it('ALL_KINDS has 57 members', () => {
|
|
206
|
+
assert.equal(ALL_KINDS.size, 57);
|
|
207
|
+
});
|
|
208
|
+
|
|
209
|
+
it('listResourceDefinitions returns 57 definitions', () => {
|
|
210
|
+
assert.equal(listResourceDefinitions().length, 57);
|
|
211
|
+
});
|
|
212
|
+
});
|