Skip to content

Commit 0e9962d

Browse files
author
Shaw
committed
chore: update smoke route and audit checks
1 parent b397e96 commit 0e9962d

2 files changed

Lines changed: 17 additions & 17 deletions

File tree

packages/app/test/ui-smoke/apps-session-route-cases.ts

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -22,79 +22,79 @@ type DirectRouteCase =
2222
export const DIRECT_ROUTE_CASES: readonly DirectRouteCase[] = [
2323
{
2424
name: "lifeops app window",
25-
path: "/apps/lifeops",
25+
path: "/apps/lifeops?appWindow=1",
2626
selector: '[data-testid="lifeops-shell"]',
2727
timeoutMs: 90_000,
2828
},
2929
{
3030
name: "plugins app window",
31-
path: "/apps/plugins",
31+
path: "/apps/plugins?appWindow=1",
3232
readyChecks: [{ text: "Browser Workspace" }, { text: "AI Providers" }],
3333
timeoutMs: 90_000,
3434
},
3535
{
3636
name: "skills app window",
37-
path: "/apps/skills",
37+
path: "/apps/skills?appWindow=1",
3838
selector: '[data-testid="skills-shell"]',
3939
timeoutMs: 90_000,
4040
},
4141
{
4242
name: "fine tuning app window",
43-
path: "/apps/fine-tuning",
43+
path: "/apps/fine-tuning?appWindow=1",
4444
selector: '[data-testid="fine-tuning-view"]',
4545
timeoutMs: 90_000,
4646
},
4747
{
4848
name: "trajectories app window",
49-
path: "/apps/trajectories",
49+
path: "/apps/trajectories?appWindow=1",
5050
selector: '[data-testid="trajectories-view"]',
5151
timeoutMs: 90_000,
5252
},
5353
{
5454
name: "relationships app window",
55-
path: "/apps/relationships",
55+
path: "/apps/relationships?appWindow=1",
5656
selector: '[data-testid="relationships-view"]',
5757
timeoutMs: 90_000,
5858
},
5959
{
6060
name: "memories app window",
61-
path: "/apps/memories",
61+
path: "/apps/memories?appWindow=1",
6262
selector: '[data-testid="memory-viewer-view"]',
6363
timeoutMs: 90_000,
6464
},
6565
{
6666
name: "inventory app window",
67-
path: "/apps/inventory",
67+
path: "/apps/inventory?appWindow=1",
6868
selector: '[data-testid="wallet-shell"]',
6969
timeoutMs: 90_000,
7070
},
7171
{
7272
name: "runtime app window",
73-
path: "/apps/runtime",
73+
path: "/apps/runtime?appWindow=1",
7474
selector: '[data-testid="runtime-view"]',
7575
timeoutMs: 90_000,
7676
},
7777
{
7878
name: "database app window",
79-
path: "/apps/database",
79+
path: "/apps/database?appWindow=1",
8080
selector: '[data-testid="database-view"]',
8181
timeoutMs: 90_000,
8282
},
8383
{
8484
name: "elizamaker app window",
85-
path: "/apps/elizamaker",
85+
path: "/apps/elizamaker?appWindow=1",
8686
selector: '[data-testid="chat-composer-textarea"]',
8787
timeoutMs: 90_000,
8888
},
8989
{
9090
name: "logs app window",
91-
path: "/apps/logs",
91+
path: "/apps/logs?appWindow=1",
9292
selector: '[data-testid="logs-view"]',
9393
timeoutMs: 90_000,
9494
},
9595
{
9696
name: "tasks app window",
97-
path: "/apps/tasks",
97+
path: "/apps/tasks?appWindow=1",
9898
selector: '[data-testid="tasks-view"]',
9999
timeoutMs: 90_000,
100100
},

packages/scripts/audit-capability-router-live-ci.ts

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -203,31 +203,31 @@ export const checks: Check[] = [
203203
{
204204
name: "product connect persists redacted trust audit records",
205205
pattern:
206-
/(?=[\s\S]*ELIZA_CAPABILITY_ROUTER_TRUST_AUDIT)(?=[\s\S]*appendTrustAuditRecord)(?=[\s\S]*readTrustAuditRecords)(?=[\s\S]*redactEndpoint\(audit\.endpoint\))(?=[\s\S]*trustDecisions:\s*audit\.sync\.trustDecisions)/,
206+
/ELIZA_CAPABILITY_ROUTER_TRUST_AUDIT[\s\S]{0,500}appendTrustAuditRecord[\s\S]{0,300}readTrustAuditRecords[\s\S]*redactEndpoint\(audit\.endpoint\)[\s\S]{0,800}trustDecisions:\s*audit\.sync\.trustDecisions/,
207207
source: "remote-capability-routes",
208208
message:
209209
"product connect persistence must record redacted capability-router trust-audit records.",
210210
},
211211
{
212212
name: "remote adapter test covers redacted product trust audit records",
213213
pattern:
214-
/(?=[\s\S]*ELIZA_CAPABILITY_ROUTER_TRUST_AUDIT)(?=[\s\S]*provider:\s*"direct")(?=[\s\S]*allowedModuleIds:\s*\["remote-demo"\])(?=[\s\S]*trustDecisions:[\s\S]*trusted:\s*true)(?=[\s\S]*JSON\.stringify\(trustAudit\)\)\.not\.toContain\("product-token"\))/,
214+
/product-token[\s\S]{0,1200}allowedModuleIds:\s*\["remote-demo"\][\s\S]*ELIZA_CAPABILITY_ROUTER_TRUST_AUDIT[\s\S]{0,800}provider:\s*"direct"[\s\S]{0,500}allowedModuleIds:\s*\["remote-demo"\][\s\S]{0,500}trustDecisions:[\s\S]{0,500}trusted:\s*true[\s\S]{0,500}JSON\.stringify\(trustAudit\)\)\.not\.toContain\("product-token"\)/,
215215
source: "remote-plugin-adapter-test",
216216
message:
217217
"remote adapter tests must prove product connect persists trust audit records without bearer tokens.",
218218
},
219219
{
220220
name: "remote adapter test covers Cloud provision restart reopened view",
221221
pattern:
222-
/(?=[\s\S]*reopens a persisted Cloud-provisioned remote view after restart)(?=[\s\S]*connectCloudSandbox:[\s\S]*mockResolvedValue)(?=[\s\S]*cloud-product-token)(?=[\s\S]*bootstrapRemoteCapabilityPlugins\(restartRuntime\))(?=[\s\S]*getView\("cloud\.restart\.view"\))(?=[\s\S]*\/api\/capability-router\/assets\/cloud-product\/cloud-product-plugin\/assets\/cloud-view\.js)(?=[\s\S]*plugin\.asset\.get)(?=[\s\S]*Bearer cloud-product-token)/,
222+
/reopens a persisted Cloud-provisioned remote view after restart[\s\S]*connectCloudSandbox:\s*vi\.fn\(\)\.mockResolvedValue[\s\S]*cloud-product-token[\s\S]*bootstrapRemoteCapabilityPlugins\(restartRuntime\)[\s\S]*getView\("cloud\.restart\.view"\)[\s\S]*\/api\/capability-router\/assets\/cloud-product\/cloud-product-plugin\/assets\/cloud-view\.js[\s\S]*plugin\.asset\.get[\s\S]*Bearer cloud-product-token/,
223223
source: "remote-plugin-adapter-test",
224224
message:
225225
"remote adapter tests must prove Cloud provision persistence can restart, reopen the remote view, and fetch its bundle with the persisted token.",
226226
},
227227
{
228228
name: "remote adapter test covers signed provenance trust policy",
229229
pattern:
230-
/(?=[\s\S]*requireSignedProvenance:\s*true)(?=[\s\S]*allowedProvenanceIssuers:\s*\["eliza-cloud-build"\])(?=[\s\S]*provenanceIssuer:\s*"eliza-cloud-build")(?=[\s\S]*reason:\s*"missing-provenance")(?=[\s\S]*reason:\s*"provenance-issuer-not-allowed")(?=[\s\S]*requireVerifiedProvenance:\s*true)(?=[\s\S]*trustedProvenancePublicKeys)(?=[\s\S]*reason:\s*"invalid-provenance-signature")(?=[\s\S]*reason:\s*"missing-provenance-public-key")(?=[\s\S]*requireProvenanceDigestMatch:\s*true)(?=[\s\S]*reason:\s*"invalid-provenance-digest")/,
230+
/requireSignedProvenance:\s*true[\s\S]*allowedProvenanceIssuers:\s*\["eliza-cloud-build"\][\s\S]*provenanceIssuer:\s*"eliza-cloud-build"[\s\S]*reason:\s*"missing-provenance"[\s\S]*reason:\s*"provenance-issuer-not-allowed"[\s\S]*requireVerifiedProvenance:\s*true[\s\S]*trustedProvenancePublicKeys[\s\S]*reason:\s*"invalid-provenance-signature"[\s\S]*requireProvenanceDigestMatch:\s*true[\s\S]*reason:\s*"invalid-provenance-digest"[\s\S]*reason:\s*"missing-provenance-public-key"/,
231231
source: "remote-plugin-adapter-test",
232232
message:
233233
"remote adapter tests must prove trust policy can require signed provenance, allowlist provenance issuers, verify provenance signatures, and bind provenance digests to module contents.",

0 commit comments

Comments
 (0)