postgresai 0.14.0-dev.9 → 0.14.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (98) hide show
  1. package/README.md +161 -61
  2. package/bin/postgres-ai.ts +2821 -461
  3. package/bun.lock +258 -0
  4. package/bunfig.toml +20 -0
  5. package/dist/bin/postgres-ai.js +31667 -1575
  6. package/dist/sql/01.role.sql +16 -0
  7. package/dist/sql/02.extensions.sql +8 -0
  8. package/dist/sql/03.permissions.sql +77 -0
  9. package/dist/sql/04.optional_rds.sql +6 -0
  10. package/dist/sql/05.optional_self_managed.sql +8 -0
  11. package/dist/sql/06.helpers.sql +439 -0
  12. package/dist/sql/sql/01.role.sql +16 -0
  13. package/dist/sql/sql/02.extensions.sql +8 -0
  14. package/dist/sql/sql/03.permissions.sql +77 -0
  15. package/dist/sql/sql/04.optional_rds.sql +6 -0
  16. package/dist/sql/sql/05.optional_self_managed.sql +8 -0
  17. package/dist/sql/sql/06.helpers.sql +439 -0
  18. package/dist/sql/sql/uninit/01.helpers.sql +5 -0
  19. package/dist/sql/sql/uninit/02.permissions.sql +30 -0
  20. package/dist/sql/sql/uninit/03.role.sql +27 -0
  21. package/dist/sql/uninit/01.helpers.sql +5 -0
  22. package/dist/sql/uninit/02.permissions.sql +30 -0
  23. package/dist/sql/uninit/03.role.sql +27 -0
  24. package/lib/auth-server.ts +124 -106
  25. package/lib/checkup-api.ts +432 -0
  26. package/lib/checkup-dictionary.ts +114 -0
  27. package/lib/checkup-summary.ts +283 -0
  28. package/lib/checkup.ts +1512 -0
  29. package/lib/config.ts +6 -3
  30. package/lib/init.ts +669 -187
  31. package/lib/issues.ts +848 -193
  32. package/lib/mcp-server.ts +392 -92
  33. package/lib/metrics-loader.ts +127 -0
  34. package/lib/supabase.ts +837 -0
  35. package/lib/util.ts +61 -0
  36. package/package.json +24 -11
  37. package/packages/postgres-ai/README.md +26 -0
  38. package/packages/postgres-ai/bin/postgres-ai.js +27 -0
  39. package/packages/postgres-ai/package.json +27 -0
  40. package/scripts/embed-checkup-dictionary.ts +106 -0
  41. package/scripts/embed-metrics.ts +154 -0
  42. package/scripts/generate-release-notes.ts +433 -0
  43. package/sql/01.role.sql +16 -0
  44. package/sql/02.extensions.sql +8 -0
  45. package/sql/03.permissions.sql +77 -0
  46. package/sql/04.optional_rds.sql +6 -0
  47. package/sql/05.optional_self_managed.sql +8 -0
  48. package/sql/06.helpers.sql +439 -0
  49. package/sql/uninit/01.helpers.sql +5 -0
  50. package/sql/uninit/02.permissions.sql +30 -0
  51. package/sql/uninit/03.role.sql +27 -0
  52. package/test/auth.test.ts +258 -0
  53. package/test/checkup.integration.test.ts +348 -0
  54. package/test/checkup.test.ts +1797 -0
  55. package/test/config-consistency.test.ts +36 -0
  56. package/test/init.integration.test.ts +509 -0
  57. package/test/init.test.ts +1253 -0
  58. package/test/issues.cli.test.ts +538 -0
  59. package/test/issues.test.ts +456 -0
  60. package/test/mcp-server.test.ts +1527 -0
  61. package/test/schema-validation.test.ts +81 -0
  62. package/test/supabase.test.ts +709 -0
  63. package/test/test-utils.ts +128 -0
  64. package/tsconfig.json +12 -20
  65. package/dist/bin/postgres-ai.d.ts +0 -3
  66. package/dist/bin/postgres-ai.d.ts.map +0 -1
  67. package/dist/bin/postgres-ai.js.map +0 -1
  68. package/dist/lib/auth-server.d.ts +0 -31
  69. package/dist/lib/auth-server.d.ts.map +0 -1
  70. package/dist/lib/auth-server.js +0 -263
  71. package/dist/lib/auth-server.js.map +0 -1
  72. package/dist/lib/config.d.ts +0 -45
  73. package/dist/lib/config.d.ts.map +0 -1
  74. package/dist/lib/config.js +0 -181
  75. package/dist/lib/config.js.map +0 -1
  76. package/dist/lib/init.d.ts +0 -64
  77. package/dist/lib/init.d.ts.map +0 -1
  78. package/dist/lib/init.js +0 -403
  79. package/dist/lib/init.js.map +0 -1
  80. package/dist/lib/issues.d.ts +0 -75
  81. package/dist/lib/issues.d.ts.map +0 -1
  82. package/dist/lib/issues.js +0 -336
  83. package/dist/lib/issues.js.map +0 -1
  84. package/dist/lib/mcp-server.d.ts +0 -9
  85. package/dist/lib/mcp-server.d.ts.map +0 -1
  86. package/dist/lib/mcp-server.js +0 -168
  87. package/dist/lib/mcp-server.js.map +0 -1
  88. package/dist/lib/pkce.d.ts +0 -32
  89. package/dist/lib/pkce.d.ts.map +0 -1
  90. package/dist/lib/pkce.js +0 -101
  91. package/dist/lib/pkce.js.map +0 -1
  92. package/dist/lib/util.d.ts +0 -27
  93. package/dist/lib/util.d.ts.map +0 -1
  94. package/dist/lib/util.js +0 -46
  95. package/dist/lib/util.js.map +0 -1
  96. package/dist/package.json +0 -46
  97. package/test/init.integration.test.cjs +0 -269
  98. package/test/init.test.cjs +0 -90
@@ -0,0 +1,258 @@
1
+ import { describe, test, expect } from "bun:test";
2
+ import { resolve } from "path";
3
+
4
+ import * as util from "../lib/util";
5
+ import * as pkce from "../lib/pkce";
6
+ import * as authServer from "../lib/auth-server";
7
+
8
+ function runCli(args: string[], env: Record<string, string> = {}) {
9
+ const cliPath = resolve(import.meta.dir, "..", "bin", "postgres-ai.ts");
10
+ const bunBin = typeof process.execPath === "string" && process.execPath.length > 0 ? process.execPath : "bun";
11
+ const result = Bun.spawnSync([bunBin, cliPath, ...args], {
12
+ env: { ...process.env, ...env },
13
+ });
14
+ return {
15
+ status: result.exitCode,
16
+ stdout: new TextDecoder().decode(result.stdout),
17
+ stderr: new TextDecoder().decode(result.stderr),
18
+ };
19
+ }
20
+
21
+ describe("URL resolution", () => {
22
+ test("resolveBaseUrls returns correct production defaults", () => {
23
+ const result = util.resolveBaseUrls();
24
+ expect(result.apiBaseUrl).toBe("https://postgres.ai/api/general");
25
+ expect(result.uiBaseUrl).toBe("https://console.postgres.ai");
26
+ });
27
+
28
+ test("resolveBaseUrls strips trailing slashes", () => {
29
+ const result = util.resolveBaseUrls({
30
+ apiBaseUrl: "https://example.com/api/",
31
+ uiBaseUrl: "https://example.com/",
32
+ });
33
+ expect(result.apiBaseUrl).toBe("https://example.com/api");
34
+ expect(result.uiBaseUrl).toBe("https://example.com");
35
+ });
36
+
37
+ test("resolveBaseUrls respects environment variables", () => {
38
+ const originalApiUrl = process.env.PGAI_API_BASE_URL;
39
+ const originalUiUrl = process.env.PGAI_UI_BASE_URL;
40
+
41
+ try {
42
+ process.env.PGAI_API_BASE_URL = "https://custom-api.example.com/api/";
43
+ process.env.PGAI_UI_BASE_URL = "https://custom-ui.example.com/";
44
+
45
+ const result = util.resolveBaseUrls();
46
+ expect(result.apiBaseUrl).toBe("https://custom-api.example.com/api");
47
+ expect(result.uiBaseUrl).toBe("https://custom-ui.example.com");
48
+ } finally {
49
+ if (originalApiUrl === undefined) {
50
+ delete process.env.PGAI_API_BASE_URL;
51
+ } else {
52
+ process.env.PGAI_API_BASE_URL = originalApiUrl;
53
+ }
54
+ if (originalUiUrl === undefined) {
55
+ delete process.env.PGAI_UI_BASE_URL;
56
+ } else {
57
+ process.env.PGAI_UI_BASE_URL = originalUiUrl;
58
+ }
59
+ }
60
+ });
61
+
62
+ test("resolveBaseUrls prefers CLI options over env vars", () => {
63
+ const originalApiUrl = process.env.PGAI_API_BASE_URL;
64
+
65
+ try {
66
+ process.env.PGAI_API_BASE_URL = "https://env.example.com/api/";
67
+
68
+ const result = util.resolveBaseUrls({
69
+ apiBaseUrl: "https://cli-option.example.com/api/",
70
+ });
71
+ expect(result.apiBaseUrl).toBe("https://cli-option.example.com/api");
72
+ } finally {
73
+ if (originalApiUrl === undefined) {
74
+ delete process.env.PGAI_API_BASE_URL;
75
+ } else {
76
+ process.env.PGAI_API_BASE_URL = originalApiUrl;
77
+ }
78
+ }
79
+ });
80
+
81
+ test("resolveBaseUrls uses config baseUrl for API", () => {
82
+ const result = util.resolveBaseUrls({}, { baseUrl: "https://config.example.com/api/" });
83
+ expect(result.apiBaseUrl).toBe("https://config.example.com/api");
84
+ // UI should still use default since config doesn't have uiBaseUrl
85
+ expect(result.uiBaseUrl).toBe("https://console.postgres.ai");
86
+ });
87
+
88
+ test("normalizeBaseUrl throws on invalid URL", () => {
89
+ expect(() => util.normalizeBaseUrl("not-a-url")).toThrow(/Invalid base URL/);
90
+ });
91
+
92
+ test("normalizeBaseUrl accepts valid URLs", () => {
93
+ expect(util.normalizeBaseUrl("https://example.com")).toBe("https://example.com");
94
+ expect(util.normalizeBaseUrl("https://example.com/")).toBe("https://example.com");
95
+ expect(util.normalizeBaseUrl("https://example.com/api/")).toBe("https://example.com/api");
96
+ });
97
+ });
98
+
99
+ describe("PKCE module", () => {
100
+ test("generateCodeVerifier returns correct length string", () => {
101
+ const verifier = pkce.generateCodeVerifier();
102
+ expect(typeof verifier).toBe("string");
103
+ expect(verifier.length).toBeGreaterThanOrEqual(43);
104
+ expect(verifier.length).toBeLessThanOrEqual(128);
105
+ });
106
+
107
+ test("generateCodeChallenge returns base64url encoded SHA256", () => {
108
+ const verifier = pkce.generateCodeVerifier();
109
+ const challenge = pkce.generateCodeChallenge(verifier);
110
+ expect(typeof challenge).toBe("string");
111
+ expect(challenge.length).toBeGreaterThan(0);
112
+ // Base64url encoding should not contain + or / characters
113
+ expect(challenge).not.toMatch(/[+/]/);
114
+ });
115
+
116
+ test("generateState returns random string", () => {
117
+ const state1 = pkce.generateState();
118
+ const state2 = pkce.generateState();
119
+ expect(typeof state1).toBe("string");
120
+ expect(state1.length).toBeGreaterThan(0);
121
+ expect(state1).not.toBe(state2); // Should be random
122
+ });
123
+
124
+ test("generatePKCEParams returns all required parameters", () => {
125
+ const params = pkce.generatePKCEParams();
126
+ expect(params.codeVerifier).toBeTruthy();
127
+ expect(params.codeChallenge).toBeTruthy();
128
+ expect(params.codeChallengeMethod).toBe("S256");
129
+ expect(params.state).toBeTruthy();
130
+ });
131
+ });
132
+
133
+ describe("Auth callback server", () => {
134
+ test("createCallbackServer returns correct interface", () => {
135
+ const server = authServer.createCallbackServer(0, "test-state", 1000);
136
+ expect(server.server).toBeTruthy();
137
+ expect(server.server.stop).toBeInstanceOf(Function);
138
+ expect(server.promise).toBeInstanceOf(Promise);
139
+ expect(server.ready).toBeInstanceOf(Promise);
140
+ expect(server.getPort).toBeInstanceOf(Function);
141
+
142
+ // Clean up
143
+ server.server.stop();
144
+ });
145
+
146
+ test("createCallbackServer binds to a port", async () => {
147
+ const server = authServer.createCallbackServer(0, "test-state", 5000);
148
+ const port = await server.ready;
149
+ expect(typeof port).toBe("number");
150
+ expect(port).toBeGreaterThan(0);
151
+
152
+ // Clean up
153
+ server.server.stop();
154
+ });
155
+
156
+ test("createCallbackServer responds to callback requests", async () => {
157
+ const testState = "test-state-" + Math.random().toString(36).substring(7);
158
+ const server = authServer.createCallbackServer(0, testState, 5000);
159
+ const port = await server.ready;
160
+
161
+ // Simulate OAuth callback
162
+ const testCode = "test-auth-code";
163
+ const callbackUrl = `http://127.0.0.1:${port}/callback?code=${testCode}&state=${testState}`;
164
+
165
+ const fetchPromise = fetch(callbackUrl);
166
+ const result = await server.promise;
167
+
168
+ expect(result.code).toBe(testCode);
169
+ expect(result.state).toBe(testState);
170
+
171
+ // Check response
172
+ const response = await fetchPromise;
173
+ expect(response.status).toBe(200);
174
+ const text = await response.text();
175
+ expect(text).toMatch(/Authentication successful/);
176
+ });
177
+
178
+ test("createCallbackServer rejects on state mismatch", async () => {
179
+ const server = authServer.createCallbackServer(0, "expected-state", 5000);
180
+ const port = await server.ready;
181
+
182
+ const callbackUrl = `http://127.0.0.1:${port}/callback?code=test-code&state=wrong-state`;
183
+
184
+ const fetchPromise = fetch(callbackUrl);
185
+
186
+ await expect(server.promise).rejects.toThrow(/State mismatch/);
187
+
188
+ const response = await fetchPromise;
189
+ expect(response.status).toBe(400);
190
+ });
191
+
192
+ test("createCallbackServer handles OAuth errors", async () => {
193
+ const server = authServer.createCallbackServer(0, "test-state", 5000);
194
+ const port = await server.ready;
195
+
196
+ const callbackUrl = `http://127.0.0.1:${port}/callback?error=access_denied&error_description=User%20denied%20access`;
197
+
198
+ const fetchPromise = fetch(callbackUrl);
199
+
200
+ await expect(server.promise).rejects.toThrow(/OAuth error: access_denied/);
201
+
202
+ const response = await fetchPromise;
203
+ expect(response.status).toBe(400);
204
+ });
205
+
206
+ test("createCallbackServer times out", async () => {
207
+ const server = authServer.createCallbackServer(0, "test-state", 100); // 100ms timeout
208
+ await server.ready;
209
+
210
+ await expect(server.promise).rejects.toThrow(/timeout/i);
211
+ });
212
+ });
213
+
214
+ describe("CLI auth commands", () => {
215
+ test("cli: auth login --help shows all options", () => {
216
+ const r = runCli(["auth", "login", "--help"]);
217
+ expect(r.status).toBe(0);
218
+ expect(r.stdout).toMatch(/--set-key/);
219
+ expect(r.stdout).toMatch(/--debug/);
220
+ });
221
+
222
+ test("cli: auth show-key --help works", () => {
223
+ const r = runCli(["auth", "show-key", "--help"]);
224
+ expect(r.status).toBe(0);
225
+ expect(r.stdout).toMatch(/show.*key/i);
226
+ });
227
+
228
+ test("cli: auth remove-key --help works", () => {
229
+ const r = runCli(["auth", "remove-key", "--help"]);
230
+ expect(r.status).toBe(0);
231
+ expect(r.stdout).toMatch(/remove.*key/i);
232
+ });
233
+ });
234
+
235
+ describe("maskSecret utility", () => {
236
+ test("masks short secrets completely", () => {
237
+ expect(util.maskSecret("abc")).toBe("****");
238
+ expect(util.maskSecret("12345678")).toBe("****");
239
+ });
240
+
241
+ test("masks medium secrets with visible ends", () => {
242
+ const masked = util.maskSecret("1234567890123456");
243
+ // maskSecret shows first 4 chars, middle masked, last 4 chars for 16-char strings
244
+ expect(masked).toMatch(/^1234\*+3456$/);
245
+ });
246
+
247
+ test("masks long secrets appropriately", () => {
248
+ const secret = "abcdefghij1234567890klmnopqrstuvwxyz";
249
+ const masked = util.maskSecret(secret);
250
+ expect(masked.startsWith("abcdefghij12")).toBe(true);
251
+ expect(masked.endsWith("wxyz")).toBe(true);
252
+ expect(masked).toMatch(/\*+/);
253
+ });
254
+
255
+ test("handles empty string", () => {
256
+ expect(util.maskSecret("")).toBe("");
257
+ });
258
+ });
@@ -0,0 +1,348 @@
1
+ /**
2
+ * Integration tests for checkup command (express mode)
3
+ * Validates that CLI-generated reports match JSON schemas used by the Python reporter.
4
+ * This ensures compatibility between "express" and "full" (monitoring) modes.
5
+ */
6
+ import { describe, test, expect, afterAll, beforeAll } from "bun:test";
7
+ import * as fs from "fs";
8
+ import * as os from "os";
9
+ import * as path from "path";
10
+ import * as net from "net";
11
+ import { Client } from "pg";
12
+ import { resolve } from "path";
13
+ import { readFileSync } from "fs";
14
+ import Ajv2020 from "ajv/dist/2020";
15
+
16
+ import * as checkup from "../lib/checkup";
17
+
18
+ const ajv = new Ajv2020({ allErrors: true, strict: false });
19
+ const schemasDir = resolve(import.meta.dir, "../../reporter/schemas");
20
+
21
+ function findOnPath(cmd: string): string | null {
22
+ const result = Bun.spawnSync(["sh", "-c", `command -v ${cmd}`]);
23
+ if (result.exitCode === 0) {
24
+ return new TextDecoder().decode(result.stdout).trim();
25
+ }
26
+ return null;
27
+ }
28
+
29
+ function findPgBin(cmd: string): string | null {
30
+ const p = findOnPath(cmd);
31
+ if (p) return p;
32
+ const probe = Bun.spawnSync([
33
+ "sh",
34
+ "-c",
35
+ `ls -1 /usr/lib/postgresql/*/bin/${cmd} 2>/dev/null | head -n 1 || true`,
36
+ ]);
37
+ const out = new TextDecoder().decode(probe.stdout).trim();
38
+ if (out) return out;
39
+ return null;
40
+ }
41
+
42
+ function havePostgresBinaries(): boolean {
43
+ return !!(findPgBin("initdb") && findPgBin("postgres"));
44
+ }
45
+
46
+ function isRunningAsRoot(): boolean {
47
+ return process.getuid?.() === 0;
48
+ }
49
+
50
+ async function getFreePort(): Promise<number> {
51
+ return new Promise((resolve, reject) => {
52
+ const srv = net.createServer();
53
+ srv.listen(0, "127.0.0.1", () => {
54
+ const addr = srv.address() as net.AddressInfo;
55
+ srv.close((err) => {
56
+ if (err) return reject(err);
57
+ resolve(addr.port);
58
+ });
59
+ });
60
+ srv.on("error", reject);
61
+ });
62
+ }
63
+
64
+ async function waitFor<T>(
65
+ fn: () => Promise<T>,
66
+ { timeoutMs = 10000, intervalMs = 100 } = {}
67
+ ): Promise<T> {
68
+ const start = Date.now();
69
+ while (true) {
70
+ try {
71
+ return await fn();
72
+ } catch (e) {
73
+ if (Date.now() - start > timeoutMs) throw e;
74
+ await new Promise((r) => setTimeout(r, intervalMs));
75
+ }
76
+ }
77
+ }
78
+
79
+ interface TempPostgres {
80
+ port: number;
81
+ socketDir: string;
82
+ cleanup: () => Promise<void>;
83
+ connect: (database?: string) => Promise<Client>;
84
+ }
85
+
86
+ async function createTempPostgres(): Promise<TempPostgres> {
87
+ const tmpRoot = fs.mkdtempSync(path.join(os.tmpdir(), "postgresai-checkup-"));
88
+ const dataDir = path.join(tmpRoot, "data");
89
+ const socketDir = path.join(tmpRoot, "sock");
90
+ fs.mkdirSync(socketDir, { recursive: true });
91
+
92
+ const initdb = findPgBin("initdb");
93
+ const postgresBin = findPgBin("postgres");
94
+ if (!initdb || !postgresBin) {
95
+ throw new Error("PostgreSQL binaries not found");
96
+ }
97
+
98
+ const init = Bun.spawnSync([initdb, "-D", dataDir, "-U", "postgres", "-A", "trust"]);
99
+ if (init.exitCode !== 0) {
100
+ throw new Error(new TextDecoder().decode(init.stderr) || new TextDecoder().decode(init.stdout));
101
+ }
102
+
103
+ const hbaPath = path.join(dataDir, "pg_hba.conf");
104
+ fs.appendFileSync(hbaPath, "\nlocal all all trust\n", "utf8");
105
+
106
+ const port = await getFreePort();
107
+ const postgresProc = Bun.spawn(
108
+ [postgresBin, "-D", dataDir, "-k", socketDir, "-h", "127.0.0.1", "-p", String(port)],
109
+ { stdio: ["ignore", "pipe", "pipe"] }
110
+ );
111
+
112
+ const cleanup = async () => {
113
+ postgresProc.kill("SIGTERM");
114
+ try {
115
+ // 30s timeout to handle slower CI environments gracefully
116
+ await waitFor(
117
+ async () => {
118
+ if (postgresProc.exitCode === null) throw new Error("still running");
119
+ },
120
+ { timeoutMs: 30000, intervalMs: 100 }
121
+ );
122
+ } catch {
123
+ postgresProc.kill("SIGKILL");
124
+ }
125
+ fs.rmSync(tmpRoot, { recursive: true, force: true });
126
+ };
127
+
128
+ const connect = async (database = "postgres"): Promise<Client> => {
129
+ const c = new Client({ host: socketDir, port, user: "postgres", database });
130
+ await c.connect();
131
+ return c;
132
+ };
133
+
134
+ // Wait for Postgres to start (30s timeout for slower CI environments)
135
+ await waitFor(async () => {
136
+ const c = await connect();
137
+ await c.end();
138
+ }, { timeoutMs: 30000, intervalMs: 100 });
139
+
140
+ return { port, socketDir, cleanup, connect };
141
+ }
142
+
143
+ function validateAgainstSchema(report: any, checkId: string): void {
144
+ const schemaPath = resolve(schemasDir, `${checkId}.schema.json`);
145
+ if (!fs.existsSync(schemaPath)) {
146
+ throw new Error(`Schema not found: ${schemaPath}`);
147
+ }
148
+ const schema = JSON.parse(readFileSync(schemaPath, "utf8"));
149
+ const validate = ajv.compile(schema);
150
+ const valid = validate(report);
151
+ if (!valid) {
152
+ const errors = validate.errors?.map(e => `${e.instancePath}: ${e.message}`).join(", ");
153
+ throw new Error(`${checkId} schema validation failed: ${errors}`);
154
+ }
155
+ }
156
+
157
+ // Skip tests if PostgreSQL binaries are not available
158
+ const skipReason = !havePostgresBinaries()
159
+ ? "PostgreSQL binaries not available"
160
+ : isRunningAsRoot()
161
+ ? "Cannot run as root (PostgreSQL refuses)"
162
+ : null;
163
+
164
+ // In CI, warn if integration tests are being skipped (helps catch configuration issues)
165
+ const isCI = process.env.CI === "true" || process.env.GITLAB_CI === "true";
166
+ if (skipReason && isCI) {
167
+ console.warn(`[CI WARNING] Integration tests skipped: ${skipReason}`);
168
+ console.warn("This may indicate a CI configuration issue - PostgreSQL binaries should be available.");
169
+ }
170
+
171
+ describe.skipIf(!!skipReason)("checkup integration: express mode schema compatibility", () => {
172
+ let pg: TempPostgres;
173
+ let client: Client;
174
+
175
+ // 60s timeout for hooks - PostgreSQL startup can take 30s+ in slow CI
176
+ beforeAll(async () => {
177
+ // Create empty config directory for tests
178
+ const emptyConfigDir = "/tmp/postgresai-test-empty-config/postgresai";
179
+ fs.mkdirSync(emptyConfigDir, { recursive: true });
180
+ fs.writeFileSync(path.join(emptyConfigDir, "config.json"), "{}");
181
+
182
+ pg = await createTempPostgres();
183
+ client = await pg.connect();
184
+ }, { timeout: 60000 });
185
+
186
+ afterAll(async () => {
187
+ if (client) await client.end();
188
+ if (pg) await pg.cleanup();
189
+ }, { timeout: 60000 });
190
+
191
+ // Test all checks supported by express mode
192
+ const expressChecks = Object.keys(checkup.CHECK_INFO);
193
+
194
+ for (const checkId of expressChecks) {
195
+ test(`${checkId} report validates against shared schema`, async () => {
196
+ const generator = checkup.REPORT_GENERATORS[checkId];
197
+ expect(generator).toBeDefined();
198
+
199
+ const report = await generator(client, "test-node");
200
+
201
+ // Validate basic report structure (matching schema requirements)
202
+ expect(report).toHaveProperty("checkId", checkId);
203
+ expect(report).toHaveProperty("checkTitle");
204
+ expect(report).toHaveProperty("timestamptz");
205
+ expect(report).toHaveProperty("nodes");
206
+ expect(report).toHaveProperty("results");
207
+ expect(report.results).toHaveProperty("test-node");
208
+
209
+ // Validate against JSON schema (same schema used by Python reporter)
210
+ validateAgainstSchema(report, checkId);
211
+ });
212
+ }
213
+
214
+ test("generateAllReports produces valid reports for all checks", async () => {
215
+ const reports = await checkup.generateAllReports(client, "test-node");
216
+
217
+ expect(Object.keys(reports).length).toBe(expressChecks.length);
218
+
219
+ for (const [checkId, report] of Object.entries(reports)) {
220
+ validateAgainstSchema(report, checkId);
221
+ }
222
+ });
223
+
224
+ test("report structure matches Python reporter format", async () => {
225
+ // Generate A003 (settings) report and verify structure matches what Python produces
226
+ const report = await checkup.generateA003(client, "test-node");
227
+
228
+ // Check required fields match Python reporter output structure (per schema)
229
+ expect(report).toHaveProperty("checkId", "A003");
230
+ expect(report).toHaveProperty("checkTitle", "Postgres settings");
231
+ expect(report).toHaveProperty("timestamptz");
232
+ expect(report).toHaveProperty("nodes");
233
+ expect(report.nodes).toHaveProperty("primary");
234
+ expect(report.nodes).toHaveProperty("standbys");
235
+ expect(report).toHaveProperty("results");
236
+
237
+ // Results should have node-specific data
238
+ const nodeResult = report.results["test-node"];
239
+ expect(nodeResult).toHaveProperty("data");
240
+
241
+ // A003 should have settings as keyed object
242
+ expect(typeof nodeResult.data).toBe("object");
243
+
244
+ // Check postgres_version if present
245
+ if (nodeResult.postgres_version) {
246
+ expect(nodeResult.postgres_version).toHaveProperty("version");
247
+ expect(nodeResult.postgres_version).toHaveProperty("server_version_num");
248
+ expect(nodeResult.postgres_version).toHaveProperty("server_major_ver");
249
+ expect(nodeResult.postgres_version).toHaveProperty("server_minor_ver");
250
+ }
251
+ });
252
+
253
+ test("H001 (invalid indexes) has correct data structure", async () => {
254
+ const report = await checkup.generateH001(client, "test-node");
255
+ validateAgainstSchema(report, "H001");
256
+
257
+ const nodeResult = report.results["test-node"];
258
+ expect(nodeResult).toHaveProperty("data");
259
+ // data should be an object with indexes (may be empty on fresh DB)
260
+ expect(typeof nodeResult.data).toBe("object");
261
+ });
262
+
263
+ test("H001 returns index_definition with CREATE INDEX statement", async () => {
264
+ // Create a table and an index, then mark the index as invalid
265
+ await client.query(`
266
+ CREATE TABLE IF NOT EXISTS test_invalid_idx_table (id serial PRIMARY KEY, value text);
267
+ CREATE INDEX IF NOT EXISTS test_invalid_idx ON test_invalid_idx_table(value);
268
+ `);
269
+
270
+ // Mark the index as invalid (simulating a failed CONCURRENTLY build)
271
+ await client.query(`
272
+ UPDATE pg_index SET indisvalid = false
273
+ WHERE indexrelid = 'test_invalid_idx'::regclass;
274
+ `);
275
+
276
+ try {
277
+ const report = await checkup.generateH001(client, "test-node");
278
+ validateAgainstSchema(report, "H001");
279
+
280
+ const nodeResult = report.results["test-node"];
281
+ const dbName = Object.keys(nodeResult.data)[0];
282
+ expect(dbName).toBeTruthy();
283
+
284
+ const dbData = nodeResult.data[dbName] as any;
285
+ expect(dbData.invalid_indexes).toBeDefined();
286
+ expect(dbData.invalid_indexes.length).toBeGreaterThan(0);
287
+
288
+ // Find our test index
289
+ const testIndex = dbData.invalid_indexes.find(
290
+ (idx: any) => idx.index_name === "test_invalid_idx"
291
+ );
292
+ expect(testIndex).toBeDefined();
293
+
294
+ // Verify index_definition contains the actual CREATE INDEX statement
295
+ expect(testIndex.index_definition).toMatch(/^CREATE INDEX/);
296
+ expect(testIndex.index_definition).toContain("test_invalid_idx");
297
+ expect(testIndex.index_definition).toContain("test_invalid_idx_table");
298
+ } finally {
299
+ // Cleanup: restore the index and drop test objects
300
+ await client.query(`
301
+ UPDATE pg_index SET indisvalid = true
302
+ WHERE indexrelid = 'test_invalid_idx'::regclass;
303
+ DROP INDEX IF EXISTS test_invalid_idx;
304
+ DROP TABLE IF EXISTS test_invalid_idx_table;
305
+ `);
306
+ }
307
+ });
308
+
309
+ test("H002 (unused indexes) has correct data structure", async () => {
310
+ const report = await checkup.generateH002(client, "test-node");
311
+ validateAgainstSchema(report, "H002");
312
+
313
+ const nodeResult = report.results["test-node"];
314
+ expect(nodeResult).toHaveProperty("data");
315
+ expect(typeof nodeResult.data).toBe("object");
316
+ });
317
+
318
+ test("H004 (redundant indexes) has correct data structure", async () => {
319
+ const report = await checkup.generateH004(client, "test-node");
320
+ validateAgainstSchema(report, "H004");
321
+
322
+ const nodeResult = report.results["test-node"];
323
+ expect(nodeResult).toHaveProperty("data");
324
+ expect(typeof nodeResult.data).toBe("object");
325
+ });
326
+
327
+ test("CLI --markdown flag works without API key", async () => {
328
+ // Test that --markdown works even without an API key
329
+ const connString = `postgresql://postgres@${pg.socketDir}:${pg.port}/postgres`;
330
+ const cliPath = path.resolve(import.meta.dir, "..", "bin", "postgres-ai.ts");
331
+ const bunBin = typeof process.execPath === "string" && process.execPath.length > 0 ? process.execPath : "bun";
332
+
333
+ const result = Bun.spawnSync(
334
+ [bunBin, cliPath, "checkup", connString, "--check-id", "H002", "--markdown", "--no-upload"],
335
+ {
336
+ env: {
337
+ ...process.env,
338
+ XDG_CONFIG_HOME: "/tmp/postgresai-test-empty-config",
339
+ },
340
+ }
341
+ );
342
+
343
+ const stderr = new TextDecoder().decode(result.stderr);
344
+
345
+ // Should not complain about missing API key
346
+ expect(stderr).not.toMatch(/API key is required/i);
347
+ });
348
+ });