@wipcomputer/wip-ldm-os 0.4.84 → 0.4.85-alpha.10

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,80 @@
1
+ import { createHash } from "node:crypto";
2
+ import { readFileSync } from "node:fs";
3
+
4
+ const server = readFileSync("src/hosted-mcp/server.mjs", "utf8");
5
+
6
+ function assertContains(needle, label) {
7
+ if (!server.includes(needle)) {
8
+ throw new Error(`${label} missing expected text: ${needle}`);
9
+ }
10
+ }
11
+
12
+ function assertNotContains(needle, label) {
13
+ if (server.includes(needle)) {
14
+ throw new Error(`${label} still contains forbidden text: ${needle}`);
15
+ }
16
+ }
17
+
18
+ assertContains('const ACCOUNT_TENANT_PREFIX = "acct:";', "account tenant prefix");
19
+ assertContains('const LEGACY_API_KEY_TENANT_PREFIX = "key:";', "legacy key tenant prefix");
20
+ assertContains('function accountTenantIdForUserId(userId)', "account tenant helper");
21
+ assertContains('function identityForApiKey(key)', "api key identity helper");
22
+ assertContains('return identityForApiKey(key);', "http auth uses identity helper");
23
+ assertContains("const agentId = accountTenantIdForUserId(stored.userId);", "registration uses immutable account tenant");
24
+ assertContains("function sanitizeDisplayLabel(raw)", "display label sanitizer");
25
+ assertContains('replace(/[\\u0000-\\u001f\\u007f]/g, "").replace(/\\s+/g, " ").trim().slice(0, 64)', "display label sanitizer preserves label semantics");
26
+ assertContains("const displayLabel = sanitizeDisplayLabel(body?.displayName || body?.username);", "registration treats entered name as display label");
27
+ assertContains("displayLabel,", "registration challenge stores display label");
28
+ assertContains("await saveApiKey(apiKey, agentId, { handle: credentialLabel });", "registration stores handle separately");
29
+ assertContains("p.handle = identity.handle;", "pair stores display handle separately");
30
+ assertContains("handle: identity.handle,", "relay metadata returns display handle");
31
+ assertContains("codexDaemons.has(identity.agentId)", "daemon presence uses tenant id");
32
+ assertContains("codexDaemonPubkeys.get(identity.agentId)", "daemon pubkey uses tenant id");
33
+ assertContains("agentId: identity.agentId,", "relay tickets bind tenant id");
34
+ assertContains("handle: identity.handle,", "relay tickets preserve display handle");
35
+ assertContains("codexDaemons.set(identity.agentId, ws);", "daemon ws keyed by tenant id");
36
+ assertContains("const key = codexRelayKey(identity.agentId, threadId);", "web ws keyed by tenant id");
37
+ assertContains("const daemonWs = codexDaemons.get(identity.agentId);", "web sends to tenant daemon");
38
+ assertNotContains("const agentId = stored.username || (\"passkey-\"", "registration must not use chosen handle as tenant");
39
+ assertNotContains("const existingKey = Object.entries(API_KEYS).find(([k, v]) => v === agentId);", "oauth must not reuse chosen handle as tenant");
40
+ assertNotContains("function isUsernameTaken", "display labels must not be globally unique usernames");
41
+ assertNotContains("function sanitizeUsername", "display labels must not be modeled as usernames");
42
+ assertNotContains('json(res, 409, { error: "reserved_handle"', "display labels must not be blocked as reserved security handles");
43
+ assertNotContains('json(res, 409, { error: "handle_taken"', "duplicate display labels must be allowed");
44
+
45
+ function legacyTenantIdForApiKey(key) {
46
+ return "key:" + createHash("sha256").update(key).digest("base64url").slice(0, 32);
47
+ }
48
+
49
+ function accountTenantIdForUserId(userId) {
50
+ return "acct:" + userId;
51
+ }
52
+
53
+ const chosenHandle = "parker-smoke-test";
54
+ const sharedDisplayLabel = "Parker";
55
+ const accountA = accountTenantIdForUserId("user-a");
56
+ const accountB = accountTenantIdForUserId("user-b");
57
+ const threadId = "thread-019dfa";
58
+ if (accountA === accountB) {
59
+ throw new Error("different user ids collapsed to one account tenant");
60
+ }
61
+ if (`${sharedDisplayLabel}:${threadId}` === `${accountA}:${threadId}` || `${sharedDisplayLabel}:${threadId}` === `${accountB}:${threadId}`) {
62
+ throw new Error("display label was used as a relay route key");
63
+ }
64
+
65
+ const legacyA = legacyTenantIdForApiKey("ck-a");
66
+ const legacyB = legacyTenantIdForApiKey("ck-b");
67
+ if (legacyA === legacyB) {
68
+ throw new Error("legacy API-key tenants collided");
69
+ }
70
+
71
+ const webKeyA = `${accountA}:${threadId}`;
72
+ const webKeyB = `${accountB}:${threadId}`;
73
+ if (webKeyA === webKeyB) {
74
+ throw new Error("same display handle can still collide across account tenants");
75
+ }
76
+ if (`${chosenHandle}:${threadId}` === webKeyA || `${chosenHandle}:${threadId}` === webKeyB) {
77
+ throw new Error("model still keys relay routes by display handle");
78
+ }
79
+
80
+ console.log("crc agentId tenant boundary checks passed");
@@ -0,0 +1,80 @@
1
+ import { readFileSync } from "node:fs";
2
+
3
+ const server = readFileSync("src/hosted-mcp/server.mjs", "utf8");
4
+
5
+ function assertContains(needle, label) {
6
+ if (!server.includes(needle)) {
7
+ throw new Error(`${label} missing expected text: ${needle}`);
8
+ }
9
+ }
10
+
11
+ function assertBefore(first, second, label) {
12
+ const firstIndex = server.indexOf(first);
13
+ const secondIndex = server.indexOf(second);
14
+ if (firstIndex === -1 || secondIndex === -1 || firstIndex >= secondIndex) {
15
+ throw new Error(`${label} expected "${first}" before "${second}"`);
16
+ }
17
+ }
18
+
19
+ assertContains("CREATE TABLE IF NOT EXISTS codex_daemon_e2ee_keys", "persistent key table");
20
+ assertContains("async function loadCodexDaemonPubkeysFromDb()", "boot load helper");
21
+ assertContains("await loadCodexDaemonPubkeysFromDb();", "boot load call");
22
+ assertContains("async function persistCodexDaemonPubkey(agentId, pubkey, cryptoVersions)", "persist helper");
23
+ assertContains("function registerCodexDaemonPubkey(agentId, pubkey, cryptoVersions, source)", "registration helper");
24
+ assertContains("codexDaemonPubkeys.set(agentId, {", "registration updates in-memory bootstrap cache");
25
+ assertContains("return persistCodexDaemonPubkey(agentId, pubkey, normalizedVersions)", "registration persists after cache update");
26
+ assertContains("await registerCodexDaemonPubkey(identity.agentId, p.daemon_public_key, p.crypto_versions, \"pair-complete\");", "pair-complete persists key");
27
+ assertContains("if (envelope?.type === \"daemon.identity\") {", "daemon reconnect identity frame");
28
+ assertContains("envelope.daemon_public_key", "daemon identity carries public key");
29
+ assertContains("envelope.crypto_versions", "daemon identity carries crypto versions");
30
+ assertContains("\"daemon-reconnect\"", "daemon reconnect source marker");
31
+ assertContains("const daemonKey = codexDaemonPubkeys.get(identity.agentId) || null;", "bootstrap uses loaded or registered key");
32
+ assertBefore(
33
+ "await loadCodexDaemonPubkeysFromDb();",
34
+ "function handleCodexBootstrap(req, res, threadId)",
35
+ "persisted keys load before bootstrap handler",
36
+ );
37
+
38
+ const modelPubkeys = new Map();
39
+ const persistedRows = new Map();
40
+
41
+ function normalizeVersions(versions) {
42
+ const out = Array.isArray(versions)
43
+ ? versions.filter((v) => typeof v === "string" && v.length > 0 && v.length <= 32).slice(0, 8)
44
+ : [];
45
+ return out.length ? out : ["e2ee-v1"];
46
+ }
47
+
48
+ function modelRegister(agentId, pubkey, versions) {
49
+ const normalized = normalizeVersions(versions);
50
+ modelPubkeys.set(agentId, { pubkey, crypto_versions: normalized });
51
+ persistedRows.set(agentId, { pubkey, crypto_versions_json: JSON.stringify(normalized) });
52
+ }
53
+
54
+ function modelBootLoad() {
55
+ const restored = new Map();
56
+ for (const [agentId, row] of persistedRows) {
57
+ restored.set(agentId, {
58
+ pubkey: row.pubkey,
59
+ crypto_versions: normalizeVersions(JSON.parse(row.crypto_versions_json)),
60
+ });
61
+ }
62
+ return restored;
63
+ }
64
+
65
+ modelRegister("acct:user-a", "spki-key-a", ["e2ee-v1"]);
66
+ const afterRestart = modelBootLoad();
67
+ if (afterRestart.get("acct:user-a")?.pubkey !== "spki-key-a") {
68
+ throw new Error("boot load did not restore persisted daemon pubkey");
69
+ }
70
+
71
+ modelRegister("acct:user-a", "spki-key-b", []);
72
+ const afterReconnect = modelBootLoad();
73
+ if (afterReconnect.get("acct:user-a")?.pubkey !== "spki-key-b") {
74
+ throw new Error("daemon reconnect did not replace persisted daemon pubkey");
75
+ }
76
+ if (afterReconnect.get("acct:user-a")?.crypto_versions?.[0] !== "e2ee-v1") {
77
+ throw new Error("daemon reconnect did not default crypto version");
78
+ }
79
+
80
+ console.log("crc e2ee key persistence checks passed");
@@ -0,0 +1,122 @@
1
+ import { readFileSync } from "node:fs";
2
+
3
+ const server = readFileSync("src/hosted-mcp/server.mjs", "utf8");
4
+
5
+ function assertContains(needle, label) {
6
+ if (!server.includes(needle)) {
7
+ throw new Error(`${label} missing expected text: ${needle}`);
8
+ }
9
+ }
10
+
11
+ function assertBefore(first, second, label) {
12
+ const firstIndex = server.indexOf(first);
13
+ const secondIndex = firstIndex === -1 ? -1 : server.indexOf(second, firstIndex + first.length);
14
+ if (firstIndex === -1 || secondIndex === -1 || firstIndex >= secondIndex) {
15
+ throw new Error(`${label} expected "${first}" before "${second}"`);
16
+ }
17
+ }
18
+
19
+ assertContains("const codexWebClients = new Map(); // `${agentId}:${threadId}` -> Set<ws>", "thread-keyed web client sets");
20
+ assertContains("const codexE2eeSessionRoutes = new Map(); // `${agentId}:${e2eeSession}` -> { threadId, webKey, ws }", "e2ee session route map");
21
+ assertContains("function registerCodexE2eeSessionRoute(agentId, e2eeSession, threadId, ws)", "route registration helper");
22
+ assertContains("codexE2eeSessionRoutes.set(codexRelayKey(agentId, e2eeSession), { threadId, webKey, ws });", "route map stores e2ee session to thread");
23
+ assertContains("function addCodexWebClient(webKey, ws)", "web client set add helper");
24
+ assertContains("function removeCodexWebClient(webKey, ws)", "web client set remove helper");
25
+ assertContains("function openCodexWebClientsForKey(webKey)", "web client set read helper");
26
+ assertContains("function resolveCodexWebClientsForDaemonFrame(agentId, routeId)", "daemon route resolver");
27
+ assertContains("const routed = codexE2eeSessionRoutes.get(codexRelayKey(agentId, routeId));", "daemon route lookup uses e2ee session map");
28
+ assertContains("if (routed && routed.ws && routed.ws.readyState === routed.ws.OPEN) return [routed.ws];", "daemon route resolves to active owner socket");
29
+ assertContains("return openCodexWebClientsForKey(codexRelayKey(agentId, routeId));", "daemon route keeps direct thread fallback");
30
+ assertContains("const targets = resolveCodexWebClientsForDaemonFrame(identity.agentId, sessionId);", "daemon frames use route resolver");
31
+ assertContains("for (const target of targets) {", "daemon frames send to every resolved target");
32
+ assertContains("if (isCodexE2eeEnvelope(envelope) && envelope.session) {", "web e2ee messages are detected");
33
+ assertContains("registerCodexE2eeSessionRoute(identity.agentId, envelope.session, threadId, ws);", "web e2ee session is registered");
34
+ assertContains("const clientCount = addCodexWebClient(key, ws);", "new web connections are added without replacing existing clients");
35
+ assertContains("removeCodexWebClient(key, ws);", "close cleanup removes only the closing socket");
36
+ assertContains("removeCodexE2eeRoutesForWeb(identity.agentId, threadId, ws);", "close cleanup");
37
+ assertContains("if (route.webKey === webKey && (!ws || route.ws === ws)) {", "cleanup only removes routes owned by the closing socket");
38
+ assertBefore(
39
+ "registerCodexE2eeSessionRoute(identity.agentId, envelope.session, threadId, ws);",
40
+ "daemonWs.send(text);",
41
+ "web session route registered before forwarding to daemon",
42
+ );
43
+ if (server.includes("const previous = codexWebClients.get(key);")) {
44
+ throw new Error("web client replacement lookup is still present");
45
+ }
46
+ if (server.includes("codexWebClients.set(key, ws);")) {
47
+ throw new Error("web client singleton set is still present");
48
+ }
49
+
50
+ const OPEN = 1;
51
+ const agentId = "parker-smoke-test";
52
+ const threadId = "thread-123";
53
+ const e2eeSession = "e2ee-random-session-456";
54
+ if (e2eeSession === threadId) {
55
+ throw new Error("test setup must use a random E2EE session distinct from threadId");
56
+ }
57
+
58
+ const modelWebClients = new Map();
59
+ const modelRoutes = new Map();
60
+ const webSocketA = { readyState: OPEN, OPEN };
61
+ const webSocketB = { readyState: OPEN, OPEN };
62
+ const webSocketC = { readyState: OPEN, OPEN };
63
+ const webKey = `${agentId}:${threadId}`;
64
+
65
+ function modelAddWebClient(ws) {
66
+ let clients = modelWebClients.get(webKey);
67
+ if (!clients) {
68
+ clients = new Set();
69
+ modelWebClients.set(webKey, clients);
70
+ }
71
+ clients.add(ws);
72
+ }
73
+
74
+ function modelRegister(session, ws) {
75
+ modelRoutes.set(`${agentId}:${session}`, { webKey, ws });
76
+ }
77
+
78
+ function modelResolve(routeId) {
79
+ const route = modelRoutes.get(`${agentId}:${routeId}`);
80
+ if (route && route.ws.readyState === route.ws.OPEN) return [route.ws];
81
+ const clients = modelWebClients.get(`${agentId}:${routeId}`) || new Set();
82
+ return [...clients].filter((webWs) => webWs.readyState === webWs.OPEN);
83
+ }
84
+
85
+ function modelRemoveOwnedRoutes(ws) {
86
+ for (const [routeKey, route] of modelRoutes) {
87
+ if (route.webKey === webKey && route.ws === ws) modelRoutes.delete(routeKey);
88
+ }
89
+ }
90
+
91
+ function modelRemoveWebClient(ws) {
92
+ const clients = modelWebClients.get(webKey);
93
+ if (!clients) return;
94
+ clients.delete(ws);
95
+ if (clients.size === 0) modelWebClients.delete(webKey);
96
+ }
97
+
98
+ modelAddWebClient(webSocketA);
99
+ modelAddWebClient(webSocketB);
100
+ modelRegister(e2eeSession, webSocketA);
101
+ if (modelResolve(e2eeSession)[0] !== webSocketA) {
102
+ throw new Error("random E2EE session did not route to the owning thread web socket");
103
+ }
104
+ const threadTargets = modelResolve(threadId);
105
+ if (threadTargets.length !== 2 || !threadTargets.includes(webSocketA) || !threadTargets.includes(webSocketB)) {
106
+ throw new Error("direct thread fallback did not broadcast to every thread web socket");
107
+ }
108
+
109
+ modelRemoveOwnedRoutes(webSocketA);
110
+ modelRemoveWebClient(webSocketA);
111
+ modelAddWebClient(webSocketC);
112
+ modelRegister(e2eeSession, webSocketC);
113
+ modelRemoveOwnedRoutes(webSocketA);
114
+ if (modelResolve(e2eeSession)[0] !== webSocketC) {
115
+ throw new Error("old socket cleanup removed or stole the replacement E2EE route");
116
+ }
117
+ const remainingThreadTargets = modelResolve(threadId);
118
+ if (remainingThreadTargets.length !== 2 || !remainingThreadTargets.includes(webSocketB) || !remainingThreadTargets.includes(webSocketC)) {
119
+ throw new Error("closing one web socket removed another browser client");
120
+ }
121
+
122
+ console.log("crc e2ee session route checks passed");
@@ -0,0 +1,40 @@
1
+ import { readFileSync } from "node:fs";
2
+
3
+ const server = readFileSync("src/hosted-mcp/server.mjs", "utf8");
4
+ const loginFiles = [
5
+ "src/hosted-mcp/app/kaleidoscope-login.html",
6
+ "src/hosted-mcp/demo/login.html",
7
+ ];
8
+
9
+ function assertContains(source, needle, label) {
10
+ if (!source.includes(needle)) {
11
+ throw new Error(`${label} missing expected text: ${needle}`);
12
+ }
13
+ }
14
+
15
+ function assertBefore(source, first, second, label) {
16
+ const firstIndex = source.indexOf(first);
17
+ const secondIndex = source.indexOf(second);
18
+ if (firstIndex === -1 || secondIndex === -1 || firstIndex >= secondIndex) {
19
+ throw new Error(`${label} expected "${first}" before "${second}"`);
20
+ }
21
+ }
22
+
23
+ assertContains(server, "const PAIR_NEXT_REGEX = /^\\/pair\\/[ABCDEFGHJKLMNPQRSTUVWXYZ23456789]{6}$/;", "server pair regex");
24
+ assertContains(server, "const REMOTE_CONTROL_NEXT_REGEX = /^\\/codex-remote-control\\/", "server remote-control regex");
25
+ assertContains(server, "purpose, // \"pair\" | null", "server stores pair purpose");
26
+ assertContains(server, "next: next || null, // sanitized `/pair/<CODE>` or null", "server stores sanitized next");
27
+ assertContains(server, "json(res, 200, { status: \"approved\", agentId: entry.agentId });", "server strips desktop pair status");
28
+ assertContains(server, "json(res, 200, { ok: true, next: entry.next });", "server returns next to phone approve");
29
+
30
+ for (const file of loginFiles) {
31
+ const html = readFileSync(file, "utf8");
32
+ assertContains(html, "function isPairNextOnDesktop()", `${file} desktop pair helper`);
33
+ assertContains(html, "} else if (isPairNextOnDesktop()) {", `${file} auto-start desktop pair QR`);
34
+ assertContains(html, "startQrLogin('', 'signin');", `${file} pair QR uses sign-in mode`);
35
+ assertContains(html, "if (approveResponse && typeof approveResponse.next === 'string' && isWhitelistedNext(approveResponse.next))", `${file} consumes approve next`);
36
+ assertContains(html, "if (urlNext && PAIR_NEXT_REGEX.test(urlNext))", `${file} desktop pair approved branch`);
37
+ assertBefore(html, "if (isPairNextOnDesktop() && !qrSessionMode)", "if (needsCustomQR() && !qrSessionMode)", `${file} create button forces pair QR before normal QR fallback`);
38
+ }
39
+
40
+ console.log("crc pair login flow checks passed");
@@ -0,0 +1,73 @@
1
+ import { readFileSync } from "node:fs";
2
+
3
+ const server = readFileSync("src/hosted-mcp/server.mjs", "utf8");
4
+
5
+ function assertContains(needle, label) {
6
+ if (!server.includes(needle)) {
7
+ throw new Error(`${label} missing expected text: ${needle}`);
8
+ }
9
+ }
10
+
11
+ function assertNotContains(needle, label) {
12
+ if (server.includes(needle)) {
13
+ throw new Error(`${label} still contains forbidden text: ${needle}`);
14
+ }
15
+ }
16
+
17
+ assertContains("function generateCodexPairPollToken()", "pair poll token generator");
18
+ assertContains('return "ppt_" + randomBytes(32).toString("base64url");', "pair poll token entropy");
19
+ assertContains("function getBearerToken(req)", "bearer token helper");
20
+ assertContains("const pollToken = generateCodexPairPollToken();", "pair-init mints poll token");
21
+ assertContains("poll_token: pollToken,", "pair state stores poll token");
22
+ assertContains("poll_token_used: false,", "pair state tracks token consumption");
23
+ assertContains("pair_poll_token: pollToken,", "pair-init returns poll token to daemon");
24
+ assertContains('json(res, 401, { error: "pair_poll_token_expired" });', "expired token rejected");
25
+ assertContains('json(res, 401, { error: "invalid_pair_poll_token" });', "missing or wrong token rejected");
26
+ assertContains("if (!pollToken || pollToken !== p.poll_token || p.poll_token_used)", "pair-status validates token");
27
+ assertContains("p.poll_token_used = true;", "completed credential response consumes token");
28
+
29
+ function pairStatusModel(pair, bearer, now) {
30
+ if (now > pair.expires) return { code: 401, body: { error: "pair_poll_token_expired" } };
31
+ if (!bearer || bearer !== pair.poll_token || pair.poll_token_used) {
32
+ return { code: 401, body: { error: "invalid_pair_poll_token" } };
33
+ }
34
+ if (pair.status === "completed") {
35
+ pair.poll_token_used = true;
36
+ return { code: 200, body: { status: "completed", api_key: pair.apiKey, handle: pair.handle } };
37
+ }
38
+ return { code: 200, body: { status: pair.status } };
39
+ }
40
+
41
+ const pair = {
42
+ status: "pending",
43
+ expires: 10_000,
44
+ poll_token: "ppt_good",
45
+ poll_token_used: false,
46
+ apiKey: "ck_secret",
47
+ handle: "Parker",
48
+ };
49
+
50
+ if (pairStatusModel({ ...pair }, null, 1).code !== 401) {
51
+ throw new Error("missing poll token should fail");
52
+ }
53
+ if (pairStatusModel({ ...pair }, "ppt_wrong", 1).code !== 401) {
54
+ throw new Error("wrong poll token should fail");
55
+ }
56
+ if (pairStatusModel({ ...pair }, "ppt_good", 20_000).code !== 401) {
57
+ throw new Error("expired poll token should fail");
58
+ }
59
+ if (pairStatusModel({ ...pair }, "ppt_good", 1).body.status !== "pending") {
60
+ throw new Error("correct poll token should return pending before completion");
61
+ }
62
+
63
+ const completedPair = { ...pair, status: "completed" };
64
+ const completed = pairStatusModel(completedPair, "ppt_good", 1);
65
+ if (completed.code !== 200 || completed.body.api_key !== "ck_secret") {
66
+ throw new Error("correct poll token should return completed credential once");
67
+ }
68
+ const replay = pairStatusModel(completedPair, "ppt_good", 1);
69
+ if (replay.code !== 401) {
70
+ throw new Error("reused completed poll token should fail");
71
+ }
72
+
73
+ console.log("crc pair-status poll token checks passed");
@@ -0,0 +1,80 @@
1
+ #!/usr/bin/env node
2
+ import { mkdtempSync, mkdirSync, writeFileSync, readFileSync, existsSync, rmSync } from 'node:fs';
3
+ import { join } from 'node:path';
4
+ import { tmpdir } from 'node:os';
5
+
6
+ const tempHome = mkdtempSync(join(tmpdir(), 'ldm-hook-toolname-home-'));
7
+ const tempPkg = mkdtempSync(join(tmpdir(), 'ldm-npm-pack-'));
8
+
9
+ try {
10
+ process.env.HOME = tempHome;
11
+
12
+ mkdirSync(join(tempHome, '.claude'), { recursive: true });
13
+ writeFileSync(join(tempHome, '.claude', 'settings.json'), JSON.stringify({ hooks: {} }, null, 2) + '\n');
14
+ const staleExtDir = join(tempHome, '.ldm', 'extensions', 'wip-branch-guard');
15
+ mkdirSync(staleExtDir, { recursive: true });
16
+ writeFileSync(join(staleExtDir, 'guard.mjs'), 'console.log("stale guard");\n');
17
+ writeFileSync(join(staleExtDir, 'package.json'), JSON.stringify({
18
+ name: '@wipcomputer/wip-branch-guard',
19
+ version: '1.9.89',
20
+ }, null, 2) + '\n');
21
+ writeFileSync(join(tempHome, '.ldm', 'extensions', 'registry.json'), JSON.stringify({
22
+ _format: 'v2',
23
+ extensions: {
24
+ 'wip-branch-guard': {
25
+ version: '1.9.89',
26
+ ldmPath: staleExtDir,
27
+ paths: { ldm: staleExtDir },
28
+ interfaces: ['module', 'skill', 'claudeCodeHook'],
29
+ },
30
+ },
31
+ }, null, 2) + '\n');
32
+
33
+ const extractedPackageDir = join(tempPkg, 'package');
34
+ mkdirSync(extractedPackageDir, { recursive: true });
35
+ writeFileSync(join(extractedPackageDir, 'package.json'), JSON.stringify({
36
+ name: '@wipcomputer/wip-branch-guard',
37
+ version: '1.9.90',
38
+ type: 'module',
39
+ main: 'guard.mjs',
40
+ claudeCode: {
41
+ hooks: [
42
+ { event: 'PreToolUse', matcher: 'Write|Edit|Bash', command: 'node guard.mjs', timeout: 5 },
43
+ ],
44
+ },
45
+ }, null, 2) + '\n');
46
+ writeFileSync(join(extractedPackageDir, 'guard.mjs'), 'console.log("guard 1.9.90");\n');
47
+ writeFileSync(join(extractedPackageDir, 'SKILL.md'), '---\nname: wip-branch-guard\ndescription: "test skill"\n---\n');
48
+
49
+ const { installSingleTool } = await import('../lib/deploy.mjs');
50
+ const installed = installSingleTool(extractedPackageDir);
51
+ if (installed === 0) throw new Error('installer did not process the test package');
52
+
53
+ const expectedDir = join(tempHome, '.ldm', 'extensions', 'wip-branch-guard');
54
+ const wrongDir = join(tempHome, '.ldm', 'extensions', 'package');
55
+ if (!existsSync(join(expectedDir, 'guard.mjs'))) {
56
+ throw new Error('guard.mjs was not deployed under the package-derived tool name');
57
+ }
58
+ if (!existsSync(join(expectedDir, 'package.json'))) {
59
+ throw new Error('package.json was not deployed under the package-derived tool name');
60
+ }
61
+ if (existsSync(wrongDir)) {
62
+ throw new Error('hook deployment used basename(repoPath) instead of package-derived tool name');
63
+ }
64
+
65
+ const settings = JSON.parse(readFileSync(join(tempHome, '.claude', 'settings.json'), 'utf8'));
66
+ const command = settings.hooks?.PreToolUse?.[0]?.hooks?.[0]?.command || '';
67
+ if (!command.includes('/wip-branch-guard/guard.mjs')) {
68
+ throw new Error(`hook command points at the wrong extension path: ${command}`);
69
+ }
70
+
71
+ const deployedPkg = JSON.parse(readFileSync(join(expectedDir, 'package.json'), 'utf8'));
72
+ if (deployedPkg.version !== '1.9.90') {
73
+ throw new Error(`deployed package version mismatch: ${deployedPkg.version}`);
74
+ }
75
+
76
+ console.log('installer hook tool-name regression check passed');
77
+ } finally {
78
+ rmSync(tempHome, { recursive: true, force: true });
79
+ rmSync(tempPkg, { recursive: true, force: true });
80
+ }
@@ -0,0 +1,55 @@
1
+ #!/usr/bin/env node
2
+ import { existsSync, lstatSync, mkdirSync, mkdtempSync, readFileSync, rmSync, writeFileSync } from 'node:fs';
3
+ import { join } from 'node:path';
4
+ import { tmpdir } from 'node:os';
5
+
6
+ const home = mkdtempSync(join(tmpdir(), 'ldm-skill-dir-home-'));
7
+ const source = mkdtempSync(join(tmpdir(), 'ldm-skill-dir-source-'));
8
+
9
+ function assert(condition, message) {
10
+ if (!condition) throw new Error(message);
11
+ }
12
+
13
+ try {
14
+ process.env.HOME = home;
15
+
16
+ for (const dir of ['.claude', '.openclaw', '.codex', '.agents']) {
17
+ mkdirSync(join(home, dir), { recursive: true });
18
+ }
19
+
20
+ const skillDir = join(source, 'skills', 'wip-ai-chat-ui');
21
+ mkdirSync(join(skillDir, 'references'), { recursive: true });
22
+ mkdirSync(join(skillDir, 'agents'), { recursive: true });
23
+ writeFileSync(join(skillDir, 'SKILL.md'), '---\nname: wip-ai-chat-ui\ndescription: "test skill"\n---\n\n# Test Skill\n');
24
+ writeFileSync(join(skillDir, 'references', 'stack.md'), '# Stack\n');
25
+ writeFileSync(join(skillDir, 'agents', 'openai.yaml'), 'display_name: "WIP AI Chat UI"\n');
26
+
27
+ const { detectInterfacesJSON } = await import('../lib/detect.mjs');
28
+ const detected = detectInterfacesJSON(source);
29
+ assert(detected.interfaceCount === 1, 'skill directory repo should expose one interface');
30
+ assert(detected.interfaces.skill?.skills?.[0]?.name === 'wip-ai-chat-ui', 'skill directory name should be detected');
31
+
32
+ const { installFromPath } = await import('../lib/deploy.mjs');
33
+ const result = await installFromPath(source);
34
+ assert(result.interfaces === 1, 'skill directory install should process one interface');
35
+
36
+ for (const target of [
37
+ join(home, '.claude', 'skills', 'wip-ai-chat-ui'),
38
+ join(home, '.openclaw', 'skills', 'wip-ai-chat-ui'),
39
+ join(home, '.codex', 'skills', 'wip-ai-chat-ui'),
40
+ join(home, '.agents', 'skills', 'wip-ai-chat-ui'),
41
+ ]) {
42
+ assert(existsSync(join(target, 'SKILL.md')), `${target} should include SKILL.md`);
43
+ assert(existsSync(join(target, 'references', 'stack.md')), `${target} should include references`);
44
+ assert(existsSync(join(target, 'agents', 'openai.yaml')), `${target} should include agents metadata`);
45
+ assert(!lstatSync(target).isSymbolicLink(), `${target} should be a deployed directory, not a symlink`);
46
+ }
47
+
48
+ const codexSkill = readFileSync(join(home, '.codex', 'skills', 'wip-ai-chat-ui', 'SKILL.md'), 'utf8');
49
+ assert(codexSkill.includes('name: wip-ai-chat-ui'), 'Codex target should contain the expected skill');
50
+
51
+ console.log('installer skill directory regression passed');
52
+ } finally {
53
+ rmSync(home, { recursive: true, force: true });
54
+ rmSync(source, { recursive: true, force: true });
55
+ }
@@ -0,0 +1,100 @@
1
+ #!/usr/bin/env node
2
+ import { mkdirSync, mkdtempSync, rmSync, writeFileSync } from 'node:fs';
3
+ import { join } from 'node:path';
4
+ import { tmpdir } from 'node:os';
5
+
6
+ const home = mkdtempSync(join(tmpdir(), 'ldm-skill-dry-run-home-'));
7
+ const source = mkdtempSync(join(tmpdir(), 'ldm-skill-dry-run-source-'));
8
+
9
+ function assert(condition, message) {
10
+ if (!condition) throw new Error(message);
11
+ }
12
+
13
+ try {
14
+ process.env.HOME = home;
15
+
16
+ for (const dir of ['.claude', '.openclaw', '.codex', '.agents']) {
17
+ mkdirSync(join(home, dir), { recursive: true });
18
+ }
19
+
20
+ const workspace = join(home, 'workspace');
21
+ mkdirSync(workspace, { recursive: true });
22
+ mkdirSync(join(home, '.ldm'), { recursive: true });
23
+ writeFileSync(join(home, '.ldm', 'config.json'), JSON.stringify({
24
+ workspace,
25
+ harnesses: {
26
+ 'claude-code': {
27
+ detected: true,
28
+ home: join(home, '.claude'),
29
+ skills: join(home, '.claude', 'skills'),
30
+ },
31
+ openclaw: {
32
+ detected: true,
33
+ home: join(home, '.openclaw'),
34
+ skills: join(home, '.openclaw', 'skills'),
35
+ },
36
+ codex: {
37
+ detected: true,
38
+ home: join(home, '.codex'),
39
+ skills: join(home, '.codex', 'skills'),
40
+ },
41
+ 'wip-agents': {
42
+ detected: true,
43
+ home: join(home, '.agents'),
44
+ skills: join(home, '.agents', 'skills'),
45
+ },
46
+ },
47
+ }, null, 2));
48
+
49
+ mkdirSync(join(source, 'references'), { recursive: true });
50
+ mkdirSync(join(source, 'agents'), { recursive: true });
51
+ writeFileSync(join(source, 'package.json'), JSON.stringify({
52
+ name: '@wipcomputer/wip-ai-chat-ui',
53
+ version: '0.1.1',
54
+ }, null, 2));
55
+ writeFileSync(join(source, 'SKILL.md'), '---\nname: wip-ai-chat-ui\ndescription: "test skill"\n---\n\n# Test Skill\n');
56
+ writeFileSync(join(source, 'references', 'stack.md'), '# Stack\n');
57
+ writeFileSync(join(source, 'agents', 'openai.yaml'), 'display_name: "WIP AI Chat UI"\n');
58
+
59
+ const { setFlags, installFromPath } = await import('../lib/deploy.mjs');
60
+
61
+ const lines = [];
62
+ const originalLog = console.log;
63
+ console.log = (...args) => lines.push(args.join(' '));
64
+
65
+ try {
66
+ setFlags({ dryRun: true, jsonOutput: false });
67
+ const result = await installFromPath(source);
68
+ assert(result.interfaces === 1, 'dry run should process one skill interface');
69
+ } finally {
70
+ console.log = originalLog;
71
+ }
72
+
73
+ const output = lines.join('\n');
74
+
75
+ for (const expected of [
76
+ 'Would copy:',
77
+ '- SKILL.md',
78
+ '- references/',
79
+ '- agents/',
80
+ 'Permanent copy:',
81
+ join(home, '.ldm', 'extensions', 'wip-ai-chat-ui', 'SKILL.md'),
82
+ join(home, '.ldm', 'extensions', 'wip-ai-chat-ui', 'references/'),
83
+ 'Agent skill targets:',
84
+ `claude-code: ${join(home, '.claude', 'skills', 'wip-ai-chat-ui')}`,
85
+ join(home, '.claude', 'skills', 'wip-ai-chat-ui', 'SKILL.md'),
86
+ `openclaw: ${join(home, '.openclaw', 'skills', 'wip-ai-chat-ui')}`,
87
+ join(home, '.openclaw', 'skills', 'wip-ai-chat-ui', 'references/'),
88
+ `codex: ${join(home, '.codex', 'skills', 'wip-ai-chat-ui')}`,
89
+ `wip-agents: ${join(home, '.agents', 'skills', 'wip-ai-chat-ui')}`,
90
+ 'Workspace docs target:',
91
+ `${join(workspace, 'settings', 'docs', 'skills', 'wip-ai-chat-ui')} (references/ only)`,
92
+ ]) {
93
+ assert(output.includes(expected), `dry-run output should include ${expected}\n\n${output}`);
94
+ }
95
+
96
+ console.log('installer skill dry-run destinations regression passed');
97
+ } finally {
98
+ rmSync(home, { recursive: true, force: true });
99
+ rmSync(source, { recursive: true, force: true });
100
+ }