@stonerzju/opencode 1.2.17 → 1.2.18

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (261) hide show
  1. package/bin/opencode +29 -157
  2. package/package.json +29 -29
  3. package/src/acp/agent.ts +4 -4
  4. package/src/acp/session.ts +1 -1
  5. package/src/agent/agent.ts +3 -3
  6. package/src/bun/index.ts +2 -2
  7. package/src/cli/cmd/acp.ts +3 -3
  8. package/src/cli/cmd/debug/file.ts +1 -1
  9. package/src/cli/cmd/github.ts +2 -2
  10. package/src/cli/cmd/pr.ts +1 -1
  11. package/src/cli/cmd/tui/app.tsx +24 -24
  12. package/src/cli/cmd/tui/attach.ts +3 -3
  13. package/src/cli/cmd/tui/component/dialog-agent.tsx +3 -3
  14. package/src/cli/cmd/tui/component/dialog-command.tsx +3 -3
  15. package/src/cli/cmd/tui/component/dialog-mcp.tsx +5 -5
  16. package/src/cli/cmd/tui/component/dialog-model.tsx +4 -4
  17. package/src/cli/cmd/tui/component/dialog-provider.tsx +4 -4
  18. package/src/cli/cmd/tui/component/dialog-session-list.tsx +5 -5
  19. package/src/cli/cmd/tui/component/dialog-session-rename.tsx +3 -3
  20. package/src/cli/cmd/tui/component/dialog-skill.tsx +3 -3
  21. package/src/cli/cmd/tui/component/dialog-stash.tsx +3 -3
  22. package/src/cli/cmd/tui/component/dialog-status.tsx +2 -2
  23. package/src/cli/cmd/tui/component/dialog-tag.tsx +3 -3
  24. package/src/cli/cmd/tui/component/logo.tsx +2 -2
  25. package/src/cli/cmd/tui/component/prompt/autocomplete.tsx +6 -6
  26. package/src/cli/cmd/tui/component/prompt/frecency.tsx +2 -2
  27. package/src/cli/cmd/tui/component/prompt/history.tsx +2 -2
  28. package/src/cli/cmd/tui/component/prompt/index.tsx +14 -14
  29. package/src/cli/cmd/tui/component/prompt/stash.tsx +2 -2
  30. package/src/cli/cmd/tui/component/textarea-keybindings.ts +1 -1
  31. package/src/cli/cmd/tui/component/tips.tsx +1 -1
  32. package/src/cli/cmd/tui/context/directory.ts +1 -1
  33. package/src/cli/cmd/tui/context/exit.tsx +1 -1
  34. package/src/cli/cmd/tui/context/keybind.tsx +2 -2
  35. package/src/cli/cmd/tui/context/kv.tsx +2 -2
  36. package/src/cli/cmd/tui/context/local.tsx +6 -6
  37. package/src/cli/cmd/tui/context/sync.tsx +4 -4
  38. package/src/cli/cmd/tui/context/theme/opencode.json +245 -0
  39. package/src/cli/cmd/tui/context/theme.tsx +2 -2
  40. package/src/cli/cmd/tui/context/tui-config.tsx +1 -1
  41. package/src/cli/cmd/tui/event.ts +2 -2
  42. package/src/cli/cmd/tui/routes/home.tsx +6 -6
  43. package/src/cli/cmd/tui/routes/session/dialog-fork-from-timeline.tsx +6 -6
  44. package/src/cli/cmd/tui/routes/session/dialog-message.tsx +6 -6
  45. package/src/cli/cmd/tui/routes/session/dialog-subagent.tsx +2 -2
  46. package/src/cli/cmd/tui/routes/session/dialog-timeline.tsx +3 -3
  47. package/src/cli/cmd/tui/routes/session/header.tsx +5 -5
  48. package/src/cli/cmd/tui/routes/session/index.tsx +32 -32
  49. package/src/cli/cmd/tui/routes/session/permission.tsx +4 -4
  50. package/src/cli/cmd/tui/routes/session/sidebar.tsx +4 -4
  51. package/src/cli/cmd/tui/thread.ts +9 -9
  52. package/src/cli/cmd/tui/ui/dialog-confirm.tsx +1 -1
  53. package/src/cli/cmd/tui/ui/dialog-help.tsx +2 -2
  54. package/src/cli/cmd/tui/ui/dialog-select.tsx +5 -5
  55. package/src/cli/cmd/tui/ui/dialog.tsx +3 -3
  56. package/src/cli/cmd/tui/ui/toast.tsx +1 -1
  57. package/src/cli/cmd/tui/util/editor.ts +3 -3
  58. package/src/cli/cmd/tui/util/transcript.ts +1 -1
  59. package/src/cli/cmd/tui/worker.ts +10 -10
  60. package/src/cli/error.ts +1 -1
  61. package/src/cli/ui.ts +1 -1
  62. package/src/cli/upgrade.ts +4 -4
  63. package/src/command/index.ts +1 -1
  64. package/src/config/config.ts +10 -10
  65. package/src/config/markdown.ts +1 -1
  66. package/src/config/migrate-tui-config.ts +5 -5
  67. package/src/config/paths.ts +4 -4
  68. package/src/config/tui.ts +4 -4
  69. package/src/control/control.sql.ts +1 -1
  70. package/src/control/index.ts +1 -1
  71. package/src/control-plane/adaptors/worktree.ts +1 -1
  72. package/src/control-plane/session-proxy-middleware.ts +1 -1
  73. package/src/control-plane/workspace.sql.ts +1 -1
  74. package/src/control-plane/workspace.ts +7 -7
  75. package/src/file/index.ts +1 -1
  76. package/src/file/ripgrep.ts +2 -2
  77. package/src/file/watcher.ts +5 -5
  78. package/src/format/formatter.ts +1 -1
  79. package/src/ide/index.ts +3 -3
  80. package/src/index.ts +1 -1
  81. package/src/installation/index.ts +3 -3
  82. package/src/lsp/client.ts +3 -3
  83. package/src/lsp/index.ts +3 -3
  84. package/src/mcp/index.ts +4 -4
  85. package/src/permission/index.ts +2 -2
  86. package/src/permission/next.ts +10 -10
  87. package/src/plugin/codex.ts +1 -1
  88. package/src/plugin/copilot.ts +2 -2
  89. package/src/plugin/index.ts +1 -1
  90. package/src/project/bootstrap.ts +2 -2
  91. package/src/project/instance.ts +4 -4
  92. package/src/project/project.sql.ts +1 -1
  93. package/src/project/project.ts +5 -5
  94. package/src/project/state.ts +1 -1
  95. package/src/project/vcs.ts +4 -4
  96. package/src/provider/auth.ts +4 -4
  97. package/src/provider/error.ts +1 -1
  98. package/src/provider/models-snapshot.ts +2 -0
  99. package/src/provider/models.ts +1 -1
  100. package/src/provider/provider.ts +2 -2
  101. package/src/provider/transform.ts +2 -2
  102. package/src/pty/index.ts +5 -5
  103. package/src/question/index.ts +5 -5
  104. package/src/server/event.ts +1 -1
  105. package/src/server/mdns.ts +1 -1
  106. package/src/server/routes/global.ts +3 -3
  107. package/src/server/routes/permission.ts +1 -1
  108. package/src/server/routes/pty.ts +1 -1
  109. package/src/server/routes/session.ts +4 -4
  110. package/src/server/routes/tui.ts +1 -1
  111. package/src/server/server.ts +3 -3
  112. package/src/session/compaction.ts +7 -7
  113. package/src/session/index.ts +10 -10
  114. package/src/session/instruction.ts +1 -1
  115. package/src/session/llm.ts +11 -11
  116. package/src/session/message-v2.ts +10 -10
  117. package/src/session/message.ts +1 -1
  118. package/src/session/processor.ts +10 -10
  119. package/src/session/prompt.ts +8 -8
  120. package/src/session/retry.ts +2 -2
  121. package/src/session/revert.ts +1 -1
  122. package/src/session/session.sql.ts +3 -3
  123. package/src/session/status.ts +3 -3
  124. package/src/session/summary.ts +5 -5
  125. package/src/session/system.ts +1 -1
  126. package/src/session/todo.ts +2 -2
  127. package/src/share/share-next.ts +7 -7
  128. package/src/share/share.sql.ts +1 -1
  129. package/src/shell/shell.ts +3 -3
  130. package/src/skill/skill.ts +6 -6
  131. package/src/storage/db.ts +1 -1
  132. package/src/storage/storage.ts +1 -1
  133. package/src/tool/bash.ts +6 -6
  134. package/src/tool/edit.ts +1 -1
  135. package/src/tool/registry.ts +2 -2
  136. package/src/tool/skill.ts +1 -1
  137. package/src/tool/task.ts +3 -3
  138. package/src/util/array.ts +10 -0
  139. package/src/util/binary.ts +41 -0
  140. package/src/util/encode.ts +51 -0
  141. package/src/util/error.ts +54 -0
  142. package/src/util/identifier.ts +48 -0
  143. package/src/util/lazy.ts +4 -16
  144. package/src/util/path.ts +37 -0
  145. package/src/util/retry.ts +41 -0
  146. package/src/util/slug.ts +74 -0
  147. package/src/worktree/index.ts +3 -3
  148. package/AGENTS.md +0 -10
  149. package/BUN_SHELL_MIGRATION_PLAN.md +0 -136
  150. package/Dockerfile +0 -18
  151. package/README.md +0 -15
  152. package/bunfig.toml +0 -7
  153. package/drizzle.config.ts +0 -10
  154. package/script/build.ts +0 -224
  155. package/script/check-migrations.ts +0 -16
  156. package/script/postinstall.mjs +0 -131
  157. package/script/publish.ts +0 -181
  158. package/script/schema.ts +0 -63
  159. package/script/seed-e2e.ts +0 -50
  160. package/sst-env.d.ts +0 -10
  161. package/test/AGENTS.md +0 -81
  162. package/test/acp/agent-interface.test.ts +0 -51
  163. package/test/acp/event-subscription.test.ts +0 -683
  164. package/test/agent/agent.test.ts +0 -689
  165. package/test/bun.test.ts +0 -53
  166. package/test/cli/github-action.test.ts +0 -197
  167. package/test/cli/github-remote.test.ts +0 -80
  168. package/test/cli/import.test.ts +0 -38
  169. package/test/cli/plugin-auth-picker.test.ts +0 -120
  170. package/test/cli/tui/transcript.test.ts +0 -322
  171. package/test/config/agent-color.test.ts +0 -71
  172. package/test/config/config.test.ts +0 -1886
  173. package/test/config/fixtures/empty-frontmatter.md +0 -4
  174. package/test/config/fixtures/frontmatter.md +0 -28
  175. package/test/config/fixtures/markdown-header.md +0 -11
  176. package/test/config/fixtures/no-frontmatter.md +0 -1
  177. package/test/config/fixtures/weird-model-id.md +0 -13
  178. package/test/config/markdown.test.ts +0 -228
  179. package/test/config/tui.test.ts +0 -510
  180. package/test/control-plane/session-proxy-middleware.test.ts +0 -147
  181. package/test/control-plane/sse.test.ts +0 -56
  182. package/test/control-plane/workspace-server-sse.test.ts +0 -65
  183. package/test/control-plane/workspace-sync.test.ts +0 -97
  184. package/test/file/ignore.test.ts +0 -10
  185. package/test/file/index.test.ts +0 -394
  186. package/test/file/path-traversal.test.ts +0 -198
  187. package/test/file/ripgrep.test.ts +0 -39
  188. package/test/file/time.test.ts +0 -361
  189. package/test/fixture/db.ts +0 -11
  190. package/test/fixture/fixture.ts +0 -45
  191. package/test/fixture/lsp/fake-lsp-server.js +0 -77
  192. package/test/fixture/skills/agents-sdk/SKILL.md +0 -152
  193. package/test/fixture/skills/agents-sdk/references/callable.md +0 -92
  194. package/test/fixture/skills/cloudflare/SKILL.md +0 -211
  195. package/test/fixture/skills/index.json +0 -6
  196. package/test/ide/ide.test.ts +0 -82
  197. package/test/keybind.test.ts +0 -421
  198. package/test/lsp/client.test.ts +0 -95
  199. package/test/mcp/headers.test.ts +0 -153
  200. package/test/mcp/oauth-browser.test.ts +0 -249
  201. package/test/memory/abort-leak.test.ts +0 -136
  202. package/test/patch/patch.test.ts +0 -348
  203. package/test/permission/arity.test.ts +0 -33
  204. package/test/permission/next.test.ts +0 -689
  205. package/test/permission-task.test.ts +0 -319
  206. package/test/plugin/auth-override.test.ts +0 -44
  207. package/test/plugin/codex.test.ts +0 -123
  208. package/test/preload.ts +0 -80
  209. package/test/project/project.test.ts +0 -348
  210. package/test/project/worktree-remove.test.ts +0 -65
  211. package/test/provider/amazon-bedrock.test.ts +0 -446
  212. package/test/provider/copilot/convert-to-copilot-messages.test.ts +0 -523
  213. package/test/provider/copilot/copilot-chat-model.test.ts +0 -592
  214. package/test/provider/gitlab-duo.test.ts +0 -262
  215. package/test/provider/provider.test.ts +0 -2220
  216. package/test/provider/transform.test.ts +0 -2353
  217. package/test/pty/pty-output-isolation.test.ts +0 -140
  218. package/test/question/question.test.ts +0 -300
  219. package/test/scheduler.test.ts +0 -73
  220. package/test/server/global-session-list.test.ts +0 -89
  221. package/test/server/session-list.test.ts +0 -90
  222. package/test/server/session-select.test.ts +0 -78
  223. package/test/session/compaction.test.ts +0 -423
  224. package/test/session/instruction.test.ts +0 -170
  225. package/test/session/llm.test.ts +0 -667
  226. package/test/session/message-v2.test.ts +0 -924
  227. package/test/session/prompt.test.ts +0 -211
  228. package/test/session/retry.test.ts +0 -188
  229. package/test/session/revert-compact.test.ts +0 -285
  230. package/test/session/session.test.ts +0 -71
  231. package/test/session/structured-output-integration.test.ts +0 -233
  232. package/test/session/structured-output.test.ts +0 -385
  233. package/test/skill/discovery.test.ts +0 -110
  234. package/test/skill/skill.test.ts +0 -388
  235. package/test/snapshot/snapshot.test.ts +0 -1180
  236. package/test/storage/json-migration.test.ts +0 -846
  237. package/test/tool/__snapshots__/tool.test.ts.snap +0 -9
  238. package/test/tool/apply_patch.test.ts +0 -566
  239. package/test/tool/bash.test.ts +0 -402
  240. package/test/tool/edit.test.ts +0 -496
  241. package/test/tool/external-directory.test.ts +0 -127
  242. package/test/tool/fixtures/large-image.png +0 -0
  243. package/test/tool/fixtures/models-api.json +0 -38413
  244. package/test/tool/grep.test.ts +0 -110
  245. package/test/tool/question.test.ts +0 -107
  246. package/test/tool/read.test.ts +0 -504
  247. package/test/tool/registry.test.ts +0 -122
  248. package/test/tool/skill.test.ts +0 -112
  249. package/test/tool/truncation.test.ts +0 -160
  250. package/test/tool/webfetch.test.ts +0 -100
  251. package/test/tool/write.test.ts +0 -348
  252. package/test/util/filesystem.test.ts +0 -443
  253. package/test/util/format.test.ts +0 -59
  254. package/test/util/glob.test.ts +0 -164
  255. package/test/util/iife.test.ts +0 -36
  256. package/test/util/lazy.test.ts +0 -50
  257. package/test/util/lock.test.ts +0 -72
  258. package/test/util/process.test.ts +0 -59
  259. package/test/util/timeout.test.ts +0 -21
  260. package/test/util/wildcard.test.ts +0 -90
  261. package/tsconfig.json +0 -16
@@ -1,319 +0,0 @@
1
- import { describe, test, expect } from "bun:test"
2
- import { PermissionNext } from "../src/permission/next"
3
- import { Config } from "../src/config/config"
4
- import { Instance } from "../src/project/instance"
5
- import { tmpdir } from "./fixture/fixture"
6
-
7
- describe("PermissionNext.evaluate for permission.task", () => {
8
- const createRuleset = (rules: Record<string, "allow" | "deny" | "ask">): PermissionNext.Ruleset =>
9
- Object.entries(rules).map(([pattern, action]) => ({
10
- permission: "task",
11
- pattern,
12
- action,
13
- }))
14
-
15
- test("returns ask when no match (default)", () => {
16
- expect(PermissionNext.evaluate("task", "code-reviewer", []).action).toBe("ask")
17
- })
18
-
19
- test("returns deny for explicit deny", () => {
20
- const ruleset = createRuleset({ "code-reviewer": "deny" })
21
- expect(PermissionNext.evaluate("task", "code-reviewer", ruleset).action).toBe("deny")
22
- })
23
-
24
- test("returns allow for explicit allow", () => {
25
- const ruleset = createRuleset({ "code-reviewer": "allow" })
26
- expect(PermissionNext.evaluate("task", "code-reviewer", ruleset).action).toBe("allow")
27
- })
28
-
29
- test("returns ask for explicit ask", () => {
30
- const ruleset = createRuleset({ "code-reviewer": "ask" })
31
- expect(PermissionNext.evaluate("task", "code-reviewer", ruleset).action).toBe("ask")
32
- })
33
-
34
- test("matches wildcard patterns with deny", () => {
35
- const ruleset = createRuleset({ "orchestrator-*": "deny" })
36
- expect(PermissionNext.evaluate("task", "orchestrator-fast", ruleset).action).toBe("deny")
37
- expect(PermissionNext.evaluate("task", "orchestrator-slow", ruleset).action).toBe("deny")
38
- expect(PermissionNext.evaluate("task", "general", ruleset).action).toBe("ask")
39
- })
40
-
41
- test("matches wildcard patterns with allow", () => {
42
- const ruleset = createRuleset({ "orchestrator-*": "allow" })
43
- expect(PermissionNext.evaluate("task", "orchestrator-fast", ruleset).action).toBe("allow")
44
- expect(PermissionNext.evaluate("task", "orchestrator-slow", ruleset).action).toBe("allow")
45
- })
46
-
47
- test("matches wildcard patterns with ask", () => {
48
- const ruleset = createRuleset({ "orchestrator-*": "ask" })
49
- expect(PermissionNext.evaluate("task", "orchestrator-fast", ruleset).action).toBe("ask")
50
- const globalRuleset = createRuleset({ "*": "ask" })
51
- expect(PermissionNext.evaluate("task", "code-reviewer", globalRuleset).action).toBe("ask")
52
- })
53
-
54
- test("later rules take precedence (last match wins)", () => {
55
- const ruleset = createRuleset({
56
- "orchestrator-*": "deny",
57
- "orchestrator-fast": "allow",
58
- })
59
- expect(PermissionNext.evaluate("task", "orchestrator-fast", ruleset).action).toBe("allow")
60
- expect(PermissionNext.evaluate("task", "orchestrator-slow", ruleset).action).toBe("deny")
61
- })
62
-
63
- test("matches global wildcard", () => {
64
- expect(PermissionNext.evaluate("task", "any-agent", createRuleset({ "*": "allow" })).action).toBe("allow")
65
- expect(PermissionNext.evaluate("task", "any-agent", createRuleset({ "*": "deny" })).action).toBe("deny")
66
- expect(PermissionNext.evaluate("task", "any-agent", createRuleset({ "*": "ask" })).action).toBe("ask")
67
- })
68
- })
69
-
70
- describe("PermissionNext.disabled for task tool", () => {
71
- // Note: The `disabled` function checks if a TOOL should be completely removed from the tool list.
72
- // It only disables a tool when there's a rule with `pattern: "*"` and `action: "deny"`.
73
- // It does NOT evaluate complex subagent patterns - those are handled at runtime by `evaluate`.
74
- const createRuleset = (rules: Record<string, "allow" | "deny" | "ask">): PermissionNext.Ruleset =>
75
- Object.entries(rules).map(([pattern, action]) => ({
76
- permission: "task",
77
- pattern,
78
- action,
79
- }))
80
-
81
- test("task tool is disabled when global deny pattern exists (even with specific allows)", () => {
82
- // When "*": "deny" exists, the task tool is disabled because the disabled() function
83
- // only checks for wildcard deny patterns - it doesn't consider that specific subagents might be allowed
84
- const ruleset = createRuleset({
85
- "orchestrator-*": "allow",
86
- "*": "deny",
87
- })
88
- const disabled = PermissionNext.disabled(["task", "bash", "read"], ruleset)
89
- // The task tool IS disabled because there's a pattern: "*" with action: "deny"
90
- expect(disabled.has("task")).toBe(true)
91
- })
92
-
93
- test("task tool is disabled when global deny pattern exists (even with ask overrides)", () => {
94
- const ruleset = createRuleset({
95
- "orchestrator-*": "ask",
96
- "*": "deny",
97
- })
98
- const disabled = PermissionNext.disabled(["task"], ruleset)
99
- // The task tool IS disabled because there's a pattern: "*" with action: "deny"
100
- expect(disabled.has("task")).toBe(true)
101
- })
102
-
103
- test("task tool is disabled when global deny pattern exists", () => {
104
- const ruleset = createRuleset({ "*": "deny" })
105
- const disabled = PermissionNext.disabled(["task"], ruleset)
106
- expect(disabled.has("task")).toBe(true)
107
- })
108
-
109
- test("task tool is NOT disabled when only specific patterns are denied (no wildcard)", () => {
110
- // The disabled() function only disables tools when pattern: "*" && action: "deny"
111
- // Specific subagent denies don't disable the task tool - those are handled at runtime
112
- const ruleset = createRuleset({
113
- "orchestrator-*": "deny",
114
- general: "deny",
115
- })
116
- const disabled = PermissionNext.disabled(["task"], ruleset)
117
- // The task tool is NOT disabled because no rule has pattern: "*" with action: "deny"
118
- expect(disabled.has("task")).toBe(false)
119
- })
120
-
121
- test("task tool is enabled when no task rules exist (default ask)", () => {
122
- const disabled = PermissionNext.disabled(["task"], [])
123
- expect(disabled.has("task")).toBe(false)
124
- })
125
-
126
- test("task tool is NOT disabled when last wildcard pattern is allow", () => {
127
- // Last matching rule wins - if wildcard allow comes after wildcard deny, tool is enabled
128
- const ruleset = createRuleset({
129
- "*": "deny",
130
- "orchestrator-coder": "allow",
131
- })
132
- const disabled = PermissionNext.disabled(["task"], ruleset)
133
- // The disabled() function uses findLast and checks if the last matching rule
134
- // has pattern: "*" and action: "deny". In this case, the last rule matching
135
- // "task" permission has pattern "orchestrator-coder", not "*", so not disabled
136
- expect(disabled.has("task")).toBe(false)
137
- })
138
- })
139
-
140
- // Integration tests that load permissions from real config files
141
- describe("permission.task with real config files", () => {
142
- test("loads task permissions from opencode.json config", async () => {
143
- await using tmp = await tmpdir({
144
- git: true,
145
- config: {
146
- permission: {
147
- task: {
148
- "*": "allow",
149
- "code-reviewer": "deny",
150
- },
151
- },
152
- },
153
- })
154
- await Instance.provide({
155
- directory: tmp.path,
156
- fn: async () => {
157
- const config = await Config.get()
158
- const ruleset = PermissionNext.fromConfig(config.permission ?? {})
159
- // general and orchestrator-fast should be allowed, code-reviewer denied
160
- expect(PermissionNext.evaluate("task", "general", ruleset).action).toBe("allow")
161
- expect(PermissionNext.evaluate("task", "orchestrator-fast", ruleset).action).toBe("allow")
162
- expect(PermissionNext.evaluate("task", "code-reviewer", ruleset).action).toBe("deny")
163
- },
164
- })
165
- })
166
-
167
- test("loads task permissions with wildcard patterns from config", async () => {
168
- await using tmp = await tmpdir({
169
- git: true,
170
- config: {
171
- permission: {
172
- task: {
173
- "*": "ask",
174
- "orchestrator-*": "deny",
175
- },
176
- },
177
- },
178
- })
179
- await Instance.provide({
180
- directory: tmp.path,
181
- fn: async () => {
182
- const config = await Config.get()
183
- const ruleset = PermissionNext.fromConfig(config.permission ?? {})
184
- // general and code-reviewer should be ask, orchestrator-* denied
185
- expect(PermissionNext.evaluate("task", "general", ruleset).action).toBe("ask")
186
- expect(PermissionNext.evaluate("task", "code-reviewer", ruleset).action).toBe("ask")
187
- expect(PermissionNext.evaluate("task", "orchestrator-fast", ruleset).action).toBe("deny")
188
- },
189
- })
190
- })
191
-
192
- test("evaluate respects task permission from config", async () => {
193
- await using tmp = await tmpdir({
194
- git: true,
195
- config: {
196
- permission: {
197
- task: {
198
- general: "allow",
199
- "code-reviewer": "deny",
200
- },
201
- },
202
- },
203
- })
204
- await Instance.provide({
205
- directory: tmp.path,
206
- fn: async () => {
207
- const config = await Config.get()
208
- const ruleset = PermissionNext.fromConfig(config.permission ?? {})
209
- expect(PermissionNext.evaluate("task", "general", ruleset).action).toBe("allow")
210
- expect(PermissionNext.evaluate("task", "code-reviewer", ruleset).action).toBe("deny")
211
- // Unspecified agents default to "ask"
212
- expect(PermissionNext.evaluate("task", "unknown-agent", ruleset).action).toBe("ask")
213
- },
214
- })
215
- })
216
-
217
- test("mixed permission config with task and other tools", async () => {
218
- await using tmp = await tmpdir({
219
- git: true,
220
- config: {
221
- permission: {
222
- bash: "allow",
223
- edit: "ask",
224
- task: {
225
- "*": "deny",
226
- general: "allow",
227
- },
228
- },
229
- },
230
- })
231
- await Instance.provide({
232
- directory: tmp.path,
233
- fn: async () => {
234
- const config = await Config.get()
235
- const ruleset = PermissionNext.fromConfig(config.permission ?? {})
236
-
237
- // Verify task permissions
238
- expect(PermissionNext.evaluate("task", "general", ruleset).action).toBe("allow")
239
- expect(PermissionNext.evaluate("task", "code-reviewer", ruleset).action).toBe("deny")
240
-
241
- // Verify other tool permissions
242
- expect(PermissionNext.evaluate("bash", "*", ruleset).action).toBe("allow")
243
- expect(PermissionNext.evaluate("edit", "*", ruleset).action).toBe("ask")
244
-
245
- // Verify disabled tools
246
- const disabled = PermissionNext.disabled(["bash", "edit", "task"], ruleset)
247
- expect(disabled.has("bash")).toBe(false)
248
- expect(disabled.has("edit")).toBe(false)
249
- // task is NOT disabled because disabled() uses findLast, and the last rule
250
- // matching "task" permission is {pattern: "general", action: "allow"}, not pattern: "*"
251
- expect(disabled.has("task")).toBe(false)
252
- },
253
- })
254
- })
255
-
256
- test("task tool disabled when global deny comes last in config", async () => {
257
- await using tmp = await tmpdir({
258
- git: true,
259
- config: {
260
- permission: {
261
- task: {
262
- general: "allow",
263
- "code-reviewer": "allow",
264
- "*": "deny",
265
- },
266
- },
267
- },
268
- })
269
- await Instance.provide({
270
- directory: tmp.path,
271
- fn: async () => {
272
- const config = await Config.get()
273
- const ruleset = PermissionNext.fromConfig(config.permission ?? {})
274
-
275
- // Last matching rule wins - "*" deny is last, so all agents are denied
276
- expect(PermissionNext.evaluate("task", "general", ruleset).action).toBe("deny")
277
- expect(PermissionNext.evaluate("task", "code-reviewer", ruleset).action).toBe("deny")
278
- expect(PermissionNext.evaluate("task", "unknown", ruleset).action).toBe("deny")
279
-
280
- // Since "*": "deny" is the last rule, disabled() finds it with findLast
281
- // and sees pattern: "*" with action: "deny", so task is disabled
282
- const disabled = PermissionNext.disabled(["task"], ruleset)
283
- expect(disabled.has("task")).toBe(true)
284
- },
285
- })
286
- })
287
-
288
- test("task tool NOT disabled when specific allow comes last in config", async () => {
289
- await using tmp = await tmpdir({
290
- git: true,
291
- config: {
292
- permission: {
293
- task: {
294
- "*": "deny",
295
- general: "allow",
296
- },
297
- },
298
- },
299
- })
300
- await Instance.provide({
301
- directory: tmp.path,
302
- fn: async () => {
303
- const config = await Config.get()
304
- const ruleset = PermissionNext.fromConfig(config.permission ?? {})
305
-
306
- // Evaluate uses findLast - "general" allow comes after "*" deny
307
- expect(PermissionNext.evaluate("task", "general", ruleset).action).toBe("allow")
308
- // Other agents still denied by the earlier "*" deny
309
- expect(PermissionNext.evaluate("task", "code-reviewer", ruleset).action).toBe("deny")
310
-
311
- // disabled() uses findLast and checks if the last rule has pattern: "*" with action: "deny"
312
- // In this case, the last rule is {pattern: "general", action: "allow"}, not pattern: "*"
313
- // So the task tool is NOT disabled (even though most subagents are denied)
314
- const disabled = PermissionNext.disabled(["task"], ruleset)
315
- expect(disabled.has("task")).toBe(false)
316
- },
317
- })
318
- })
319
- })
@@ -1,44 +0,0 @@
1
- import { describe, expect, test } from "bun:test"
2
- import path from "path"
3
- import fs from "fs/promises"
4
- import { tmpdir } from "../fixture/fixture"
5
- import { Instance } from "../../src/project/instance"
6
- import { ProviderAuth } from "../../src/provider/auth"
7
-
8
- describe("plugin.auth-override", () => {
9
- test("user plugin overrides built-in github-copilot auth", async () => {
10
- await using tmp = await tmpdir({
11
- init: async (dir) => {
12
- const pluginDir = path.join(dir, ".opencode", "plugin")
13
- await fs.mkdir(pluginDir, { recursive: true })
14
-
15
- await Bun.write(
16
- path.join(pluginDir, "custom-copilot-auth.ts"),
17
- [
18
- "export default async () => ({",
19
- " auth: {",
20
- ' provider: "github-copilot",',
21
- " methods: [",
22
- ' { type: "api", label: "Test Override Auth" },',
23
- " ],",
24
- " loader: async () => ({ access: 'test-token' }),",
25
- " },",
26
- "})",
27
- "",
28
- ].join("\n"),
29
- )
30
- },
31
- })
32
-
33
- await Instance.provide({
34
- directory: tmp.path,
35
- fn: async () => {
36
- const methods = await ProviderAuth.methods()
37
- const copilot = methods["github-copilot"]
38
- expect(copilot).toBeDefined()
39
- expect(copilot.length).toBe(1)
40
- expect(copilot[0].label).toBe("Test Override Auth")
41
- },
42
- })
43
- }, 30000) // Increased timeout for plugin installation
44
- })
@@ -1,123 +0,0 @@
1
- import { describe, expect, test } from "bun:test"
2
- import {
3
- parseJwtClaims,
4
- extractAccountIdFromClaims,
5
- extractAccountId,
6
- type IdTokenClaims,
7
- } from "../../src/plugin/codex"
8
-
9
- function createTestJwt(payload: object): string {
10
- const header = Buffer.from(JSON.stringify({ alg: "none" })).toString("base64url")
11
- const body = Buffer.from(JSON.stringify(payload)).toString("base64url")
12
- return `${header}.${body}.sig`
13
- }
14
-
15
- describe("plugin.codex", () => {
16
- describe("parseJwtClaims", () => {
17
- test("parses valid JWT with claims", () => {
18
- const payload = { email: "test@example.com", chatgpt_account_id: "acc-123" }
19
- const jwt = createTestJwt(payload)
20
- const claims = parseJwtClaims(jwt)
21
- expect(claims).toEqual(payload)
22
- })
23
-
24
- test("returns undefined for JWT with less than 3 parts", () => {
25
- expect(parseJwtClaims("invalid")).toBeUndefined()
26
- expect(parseJwtClaims("only.two")).toBeUndefined()
27
- })
28
-
29
- test("returns undefined for invalid base64", () => {
30
- expect(parseJwtClaims("a.!!!invalid!!!.b")).toBeUndefined()
31
- })
32
-
33
- test("returns undefined for invalid JSON payload", () => {
34
- const header = Buffer.from("{}").toString("base64url")
35
- const invalidJson = Buffer.from("not json").toString("base64url")
36
- expect(parseJwtClaims(`${header}.${invalidJson}.sig`)).toBeUndefined()
37
- })
38
- })
39
-
40
- describe("extractAccountIdFromClaims", () => {
41
- test("extracts chatgpt_account_id from root", () => {
42
- const claims: IdTokenClaims = { chatgpt_account_id: "acc-root" }
43
- expect(extractAccountIdFromClaims(claims)).toBe("acc-root")
44
- })
45
-
46
- test("extracts chatgpt_account_id from nested https://api.openai.com/auth", () => {
47
- const claims: IdTokenClaims = {
48
- "https://api.openai.com/auth": { chatgpt_account_id: "acc-nested" },
49
- }
50
- expect(extractAccountIdFromClaims(claims)).toBe("acc-nested")
51
- })
52
-
53
- test("prefers root over nested", () => {
54
- const claims: IdTokenClaims = {
55
- chatgpt_account_id: "acc-root",
56
- "https://api.openai.com/auth": { chatgpt_account_id: "acc-nested" },
57
- }
58
- expect(extractAccountIdFromClaims(claims)).toBe("acc-root")
59
- })
60
-
61
- test("extracts from organizations array as fallback", () => {
62
- const claims: IdTokenClaims = {
63
- organizations: [{ id: "org-123" }, { id: "org-456" }],
64
- }
65
- expect(extractAccountIdFromClaims(claims)).toBe("org-123")
66
- })
67
-
68
- test("returns undefined when no accountId found", () => {
69
- const claims: IdTokenClaims = { email: "test@example.com" }
70
- expect(extractAccountIdFromClaims(claims)).toBeUndefined()
71
- })
72
- })
73
-
74
- describe("extractAccountId", () => {
75
- test("extracts from id_token first", () => {
76
- const idToken = createTestJwt({ chatgpt_account_id: "from-id-token" })
77
- const accessToken = createTestJwt({ chatgpt_account_id: "from-access-token" })
78
- expect(
79
- extractAccountId({
80
- id_token: idToken,
81
- access_token: accessToken,
82
- refresh_token: "rt",
83
- }),
84
- ).toBe("from-id-token")
85
- })
86
-
87
- test("falls back to access_token when id_token has no accountId", () => {
88
- const idToken = createTestJwt({ email: "test@example.com" })
89
- const accessToken = createTestJwt({
90
- "https://api.openai.com/auth": { chatgpt_account_id: "from-access" },
91
- })
92
- expect(
93
- extractAccountId({
94
- id_token: idToken,
95
- access_token: accessToken,
96
- refresh_token: "rt",
97
- }),
98
- ).toBe("from-access")
99
- })
100
-
101
- test("returns undefined when no tokens have accountId", () => {
102
- const token = createTestJwt({ email: "test@example.com" })
103
- expect(
104
- extractAccountId({
105
- id_token: token,
106
- access_token: token,
107
- refresh_token: "rt",
108
- }),
109
- ).toBeUndefined()
110
- })
111
-
112
- test("handles missing id_token", () => {
113
- const accessToken = createTestJwt({ chatgpt_account_id: "acc-123" })
114
- expect(
115
- extractAccountId({
116
- id_token: "",
117
- access_token: accessToken,
118
- refresh_token: "rt",
119
- }),
120
- ).toBe("acc-123")
121
- })
122
- })
123
- })
package/test/preload.ts DELETED
@@ -1,80 +0,0 @@
1
- // IMPORTANT: Set env vars BEFORE any imports from src/ directory
2
- // xdg-basedir reads env vars at import time, so we must set these first
3
- import os from "os"
4
- import path from "path"
5
- import fs from "fs/promises"
6
- import { afterAll } from "bun:test"
7
-
8
- // Set XDG env vars FIRST, before any src/ imports
9
- const dir = path.join(os.tmpdir(), "opencode-test-data-" + process.pid)
10
- await fs.mkdir(dir, { recursive: true })
11
- afterAll(async () => {
12
- const { Database } = await import("../src/storage/db")
13
- Database.close()
14
- const busy = (error: unknown) =>
15
- typeof error === "object" && error !== null && "code" in error && error.code === "EBUSY"
16
- const rm = async (left: number): Promise<void> => {
17
- Bun.gc(true)
18
- await Bun.sleep(100)
19
- return fs.rm(dir, { recursive: true, force: true }).catch((error) => {
20
- if (!busy(error)) throw error
21
- if (left <= 1) throw error
22
- return rm(left - 1)
23
- })
24
- }
25
-
26
- // Windows can keep SQLite WAL handles alive until GC finalizers run, so we
27
- // force GC and retry teardown to avoid flaky EBUSY in test cleanup.
28
- await rm(30)
29
- })
30
-
31
- process.env["XDG_DATA_HOME"] = path.join(dir, "share")
32
- process.env["XDG_CACHE_HOME"] = path.join(dir, "cache")
33
- process.env["XDG_CONFIG_HOME"] = path.join(dir, "config")
34
- process.env["XDG_STATE_HOME"] = path.join(dir, "state")
35
- process.env["OPENCODE_MODELS_PATH"] = path.join(import.meta.dir, "tool", "fixtures", "models-api.json")
36
-
37
- // Set test home directory to isolate tests from user's actual home directory
38
- // This prevents tests from picking up real user configs/skills from ~/.claude/skills
39
- const testHome = path.join(dir, "home")
40
- await fs.mkdir(testHome, { recursive: true })
41
- process.env["OPENCODE_TEST_HOME"] = testHome
42
-
43
- // Set test managed config directory to isolate tests from system managed settings
44
- const testManagedConfigDir = path.join(dir, "managed")
45
- process.env["OPENCODE_TEST_MANAGED_CONFIG_DIR"] = testManagedConfigDir
46
-
47
- // Write the cache version file to prevent global/index.ts from clearing the cache
48
- const cacheDir = path.join(dir, "cache", "opencode")
49
- await fs.mkdir(cacheDir, { recursive: true })
50
- await fs.writeFile(path.join(cacheDir, "version"), "14")
51
-
52
- // Clear provider env vars to ensure clean test state
53
- delete process.env["ANTHROPIC_API_KEY"]
54
- delete process.env["OPENAI_API_KEY"]
55
- delete process.env["GOOGLE_API_KEY"]
56
- delete process.env["GOOGLE_GENERATIVE_AI_API_KEY"]
57
- delete process.env["AZURE_OPENAI_API_KEY"]
58
- delete process.env["AWS_ACCESS_KEY_ID"]
59
- delete process.env["AWS_PROFILE"]
60
- delete process.env["AWS_REGION"]
61
- delete process.env["AWS_BEARER_TOKEN_BEDROCK"]
62
- delete process.env["OPENROUTER_API_KEY"]
63
- delete process.env["GROQ_API_KEY"]
64
- delete process.env["MISTRAL_API_KEY"]
65
- delete process.env["PERPLEXITY_API_KEY"]
66
- delete process.env["TOGETHER_API_KEY"]
67
- delete process.env["XAI_API_KEY"]
68
- delete process.env["DEEPSEEK_API_KEY"]
69
- delete process.env["FIREWORKS_API_KEY"]
70
- delete process.env["CEREBRAS_API_KEY"]
71
- delete process.env["SAMBANOVA_API_KEY"]
72
-
73
- // Now safe to import from src/
74
- const { Log } = await import("../src/util/log")
75
-
76
- Log.init({
77
- print: false,
78
- dev: true,
79
- level: "DEBUG",
80
- })