-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathorigin_test.go
More file actions
121 lines (114 loc) · 2.93 KB
/
origin_test.go
File metadata and controls
121 lines (114 loc) · 2.93 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
package agentx_test
import (
"testing"
"github.com/sageox/agentx"
)
func TestDetectOrigin(t *testing.T) {
tests := []struct {
name string
envVars map[string]string
explicit agentx.SessionOrigin
want agentx.SessionOrigin
}{
{
name: "default is human",
want: agentx.OriginHuman,
},
{
name: "claude code task entry point means subagent",
envVars: map[string]string{"CLAUDE_CODE_ENTRY_POINT": "task"},
want: agentx.OriginSubagent,
},
{
name: "subagent env takes precedence over explicit agent",
envVars: map[string]string{"CLAUDE_CODE_ENTRY_POINT": "task"},
explicit: agentx.OriginAgent,
want: agentx.OriginSubagent,
},
{
name: "explicit agent origin",
explicit: agentx.OriginAgent,
want: agentx.OriginAgent,
},
{
name: "explicit human origin",
explicit: agentx.OriginHuman,
want: agentx.OriginHuman,
},
{
name: "CI=true means agent",
envVars: map[string]string{"CI": "true"},
want: agentx.OriginAgent,
},
{
name: "GITHUB_ACTIONS means agent",
envVars: map[string]string{"GITHUB_ACTIONS": "true"},
want: agentx.OriginAgent,
},
{
name: "GITLAB_CI means agent",
envVars: map[string]string{"GITLAB_CI": "true"},
want: agentx.OriginAgent,
},
{
name: "JENKINS_URL means agent",
envVars: map[string]string{"JENKINS_URL": "https://ci.example.com"},
want: agentx.OriginAgent,
},
{
name: "BUILDKITE means agent",
envVars: map[string]string{"BUILDKITE": "true"},
want: agentx.OriginAgent,
},
{
name: "explicit overrides CI detection",
envVars: map[string]string{"CI": "true"},
explicit: agentx.OriginHuman,
want: agentx.OriginHuman,
},
{
name: "non-matching entry point value is not subagent",
envVars: map[string]string{"CLAUDE_CODE_ENTRY_POINT": "cli"},
want: agentx.OriginHuman,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
env := agentx.NewMockEnvironment(tt.envVars)
got := agentx.DetectOrigin(env, tt.explicit)
if got != tt.want {
t.Errorf("DetectOrigin() = %q, want %q", got, tt.want)
}
})
}
}
func TestSessionOrigin_IsValid(t *testing.T) {
tests := []struct {
origin agentx.SessionOrigin
want bool
}{
{agentx.OriginHuman, true},
{agentx.OriginSubagent, true},
{agentx.OriginAgent, true},
{agentx.SessionOrigin("invalid"), false},
{agentx.SessionOrigin(""), false},
}
for _, tt := range tests {
t.Run(string(tt.origin), func(t *testing.T) {
if got := tt.origin.IsValid(); got != tt.want {
t.Errorf("SessionOrigin(%q).IsValid() = %v, want %v", tt.origin, got, tt.want)
}
})
}
}
func TestValidOrigins(t *testing.T) {
origins := agentx.ValidOrigins()
if len(origins) != 3 {
t.Fatalf("ValidOrigins() returned %d values, want 3", len(origins))
}
for _, o := range origins {
if !o.IsValid() {
t.Errorf("ValidOrigins() contains invalid origin %q", o)
}
}
}