@mhingston5/conduit 1.1.1 → 1.1.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -149,7 +149,7 @@ describe('E2E: Stdio Upstream Integration', () => {
149
149
  const response = await sendRequest({
150
150
  jsonrpc: '2.0',
151
151
  id: '1',
152
- method: 'mcp.discoverTools',
152
+ method: 'mcp_discover_tools',
153
153
  params: {},
154
154
  auth: { bearerToken: ipcToken },
155
155
  });
@@ -169,7 +169,7 @@ describe('E2E: Stdio Upstream Integration', () => {
169
169
  const discoverResponse = await sendRequest({
170
170
  jsonrpc: '2.0',
171
171
  id: '1',
172
- method: 'mcp.discoverTools',
172
+ method: 'mcp_discover_tools',
173
173
  params: {},
174
174
  auth: { bearerToken: ipcToken },
175
175
  });
@@ -181,7 +181,7 @@ describe('E2E: Stdio Upstream Integration', () => {
181
181
  const callResponse = await sendRequest({
182
182
  jsonrpc: '2.0',
183
183
  id: '2',
184
- method: 'mcp.callTool',
184
+ method: 'mcp_call_tool',
185
185
  params: {
186
186
  name: echoTool.name,
187
187
  arguments: { message: 'Hello from E2E test!' },
@@ -32,17 +32,17 @@ describe('GatewayService', () => {
32
32
 
33
33
  const tools = await gateway.discoverTools(context);
34
34
  expect(tools.length).toBeGreaterThanOrEqual(3);
35
- expect(tools.find(t => t.name === 'mcp.executeTypeScript')).toBeDefined();
36
- expect(tools.find(t => t.name === 'mcp.executePython')).toBeDefined();
37
- expect(tools.find(t => t.name === 'mcp.executeIsolate')).toBeDefined();
35
+ expect(tools.find(t => t.name === 'mcp_execute_typescript')).toBeDefined();
36
+ expect(tools.find(t => t.name === 'mcp_execute_python')).toBeDefined();
37
+ expect(tools.find(t => t.name === 'mcp_execute_isolate')).toBeDefined();
38
38
  expect(tools.find(t => t.name === 'u1__t1')).toBeDefined();
39
39
  expect(tools.find(t => t.name === 'u2__t2')).toBeDefined();
40
40
  });
41
41
 
42
42
  it('should return schema for built-in tools', async () => {
43
- const schema = await gateway.getToolSchema('mcp.executeTypeScript', context);
43
+ const schema = await gateway.getToolSchema('mcp_execute_typescript', context);
44
44
  expect(schema).toBeDefined();
45
- expect(schema?.name).toBe('mcp.executeTypeScript');
45
+ expect(schema?.name).toBe('mcp_execute_typescript');
46
46
  expect(schema?.inputSchema.required).toContain('code');
47
47
  });
48
48
 
@@ -92,7 +92,7 @@ describe('V1 Hardening Tests', () => {
92
92
  const response = await sendRequest({
93
93
  jsonrpc: '2.0',
94
94
  id: 1,
95
- method: 'mcp.executeTypeScript',
95
+ method: 'mcp_execute_typescript',
96
96
  params: { code: 'console.log("hi")' },
97
97
  auth: { bearerToken: sessionToken }
98
98
  });
@@ -114,7 +114,7 @@ describe('V1 Hardening Tests', () => {
114
114
  const response = await sendRequest({
115
115
  jsonrpc: '2.0',
116
116
  id: 2,
117
- method: 'mcp.discoverTools',
117
+ method: 'mcp_discover_tools',
118
118
  params: {},
119
119
  auth: { bearerToken: sessionToken }
120
120
  });
@@ -127,7 +127,7 @@ describe('V1 Hardening Tests', () => {
127
127
  const response = await sendRequest({
128
128
  jsonrpc: '2.0',
129
129
  id: 3,
130
- method: 'mcp.executeTypeScript',
130
+ method: 'mcp_execute_typescript',
131
131
  params: { code: 'import * as os from "os"; console.log("hi")' },
132
132
  auth: { bearerToken: 'master-token' }
133
133
  });
@@ -84,7 +84,7 @@ describe('RequestController Routing', () => {
84
84
  const result = await controller.handleRequest({
85
85
  jsonrpc: '2.0',
86
86
  id: 1,
87
- method: 'mcp.executeTypeScript',
87
+ method: 'mcp_execute_typescript',
88
88
  params: {
89
89
  code: 'console.log("simple")',
90
90
  limits: {}
@@ -101,7 +101,7 @@ describe('RequestController Routing', () => {
101
101
  const result = await controller.handleRequest({
102
102
  jsonrpc: '2.0',
103
103
  id: 1,
104
- method: 'mcp.executeTypeScript',
104
+ method: 'mcp_execute_typescript',
105
105
  params: {
106
106
  code: 'import { foo } from "bar"; console.log(foo)',
107
107
  limits: {}
@@ -118,7 +118,7 @@ describe('RequestController Routing', () => {
118
118
  const result = await controller.handleRequest({
119
119
  jsonrpc: '2.0',
120
120
  id: 1,
121
- method: 'mcp.executeTypeScript',
121
+ method: 'mcp_execute_typescript',
122
122
  params: {
123
123
  code: 'export const foo = "bar"',
124
124
  limits: {}
@@ -134,7 +134,7 @@ describe('RequestController Routing', () => {
134
134
  const result = await controller.handleRequest({
135
135
  jsonrpc: '2.0',
136
136
  id: 1,
137
- method: 'mcp.executeTypeScript',
137
+ method: 'mcp_execute_typescript',
138
138
  params: {
139
139
  code: 'console.log(Deno.version)',
140
140
  limits: {}
@@ -145,4 +145,24 @@ describe('RequestController Routing', () => {
145
145
  expect(mockDenoExecutor.execute).toHaveBeenCalled();
146
146
  expect(mockIsolateExecutor.execute).not.toHaveBeenCalled();
147
147
  });
148
+
149
+ it('should route tools/call for built-in tools', async () => {
150
+ const result = await controller.handleRequest({
151
+ jsonrpc: '2.0',
152
+ id: 1,
153
+ method: 'tools/call',
154
+ params: {
155
+ name: 'mcp_execute_typescript',
156
+ arguments: {
157
+ code: 'console.log("via tools/call")',
158
+ limits: {}
159
+ }
160
+ },
161
+ auth: { bearerToken: 'master-token' }
162
+ }, mockContext);
163
+
164
+ expect(mockIsolateExecutor.execute).toHaveBeenCalled();
165
+ expect(result!.result.stdout).toBe('isolate');
166
+ });
167
+
148
168
  });
@@ -100,7 +100,7 @@ describe('SocketTransport', () => {
100
100
  });
101
101
  }
102
102
 
103
- it('should handle mcp.executeTypeScript request', async () => {
103
+ it('should handle mcp_execute_typescript request', async () => {
104
104
  transport = new SocketTransport(logger, requestController, concurrencyService);
105
105
  const address = await transport.listen({ port: 0 });
106
106
  const portMatch = address.match(/:(\d+)$/);
@@ -112,7 +112,7 @@ describe('SocketTransport', () => {
112
112
  const request = {
113
113
  jsonrpc: '2.0',
114
114
  id: 1,
115
- method: 'mcp.executeTypeScript',
115
+ method: 'mcp_execute_typescript',
116
116
  params: { code: 'console.log("hello E2E")' },
117
117
  auth: { bearerToken: testToken }
118
118
  };
@@ -153,7 +153,7 @@ describe('SocketTransport', () => {
153
153
  const request = {
154
154
  jsonrpc: '2.0',
155
155
  id: 12345,
156
- method: 'mcp.executeTypeScript',
156
+ method: 'mcp_execute_typescript',
157
157
  params: { code: 'console.log("hello")' },
158
158
  auth: { bearerToken: testToken }
159
159
  };
@@ -24,7 +24,7 @@ describe('E2E: Native Stdio Mode', () => {
24
24
  const request = {
25
25
  jsonrpc: '2.0',
26
26
  id: '1',
27
- method: 'mcp.discoverTools',
27
+ method: 'mcp_discover_tools',
28
28
  params: {},
29
29
  // Use a dummy token, security service might reject if auth is enabled but
30
30
  // the default config generates a random token.