|
| 1 | +import assert from "node:assert/strict"; |
| 2 | +import test from "node:test"; |
| 3 | + |
| 4 | +import { createClient } from "@libsql/client"; |
| 5 | + |
| 6 | +import { applyMigrations } from "../extensions/amnesia/lib/db.ts"; |
| 7 | +import { rawQuery, searchMessages } from "../extensions/amnesia/lib/queries.ts"; |
| 8 | + |
| 9 | +async function createTestDb() { |
| 10 | + const db = createClient({ url: "file::memory:" }); |
| 11 | + await applyMigrations(db); |
| 12 | + return db; |
| 13 | +} |
| 14 | + |
| 15 | +async function seedSearchFixtures(db: ReturnType<typeof createClient>): Promise<void> { |
| 16 | + await db.execute( |
| 17 | + `INSERT INTO projects (id, path, repo_name) VALUES (1, '/workspace/app-one', 'app-one'), (2, '/workspace/app-two', 'app-two')`, |
| 18 | + ); |
| 19 | + await db.execute({ |
| 20 | + sql: `INSERT INTO sessions (id, project_id, agent, started_at) VALUES (?, ?, ?, ?), (?, ?, ?, ?), (?, ?, ?, ?)`, |
| 21 | + args: [ |
| 22 | + "claude-new", |
| 23 | + 1, |
| 24 | + "claude", |
| 25 | + "2026-03-20T10:00:00.000Z", |
| 26 | + "pi-new", |
| 27 | + 1, |
| 28 | + "pi", |
| 29 | + "2026-03-20T10:00:00.000Z", |
| 30 | + "claude-old", |
| 31 | + 2, |
| 32 | + "claude", |
| 33 | + "2026-02-01T10:00:00.000Z", |
| 34 | + ], |
| 35 | + }); |
| 36 | + await db.execute({ |
| 37 | + sql: `INSERT INTO messages (id, session_id, role, content, timestamp, seq) VALUES (?, ?, ?, ?, ?, ?), (?, ?, ?, ?, ?, ?), (?, ?, ?, ?, ?, ?)`, |
| 38 | + args: [ |
| 39 | + "m1", |
| 40 | + "claude-new", |
| 41 | + "user", |
| 42 | + "auth bug in login flow", |
| 43 | + "2026-03-20T10:00:00.000Z", |
| 44 | + 0, |
| 45 | + "m2", |
| 46 | + "pi-new", |
| 47 | + "user", |
| 48 | + "auth bug in login flow", |
| 49 | + "2026-03-20T10:00:00.000Z", |
| 50 | + 0, |
| 51 | + "m3", |
| 52 | + "claude-old", |
| 53 | + "user", |
| 54 | + "auth bug in login flow", |
| 55 | + "2026-02-01T10:00:00.000Z", |
| 56 | + 0, |
| 57 | + ], |
| 58 | + }); |
| 59 | +} |
| 60 | + |
| 61 | +async function searchScopedMessages() { |
| 62 | + const db = await createTestDb(); |
| 63 | + await seedSearchFixtures(db); |
| 64 | + |
| 65 | + const rows = await searchMessages(db, { |
| 66 | + search: "auth bug", |
| 67 | + agent: "claude", |
| 68 | + project: "app-one", |
| 69 | + since: "2026-03-01T00:00:00.000Z", |
| 70 | + }); |
| 71 | + |
| 72 | + db.close(); |
| 73 | + return rows; |
| 74 | +} |
| 75 | + |
| 76 | +test("searchMessages applies agent, project, and since filters", async () => { |
| 77 | + const rows = await searchScopedMessages(); |
| 78 | + |
| 79 | + assert.equal(Array.isArray(rows), true); |
| 80 | + if (!Array.isArray(rows)) { |
| 81 | + throw new TypeError("Expected searchMessages to return rows"); |
| 82 | + } |
| 83 | + |
| 84 | + assert.equal(rows.length, 1); |
| 85 | + assert.equal(rows[0]?.session_id, "claude-new"); |
| 86 | +}); |
| 87 | + |
| 88 | +test("rawQuery only allows read-only SQL", async () => { |
| 89 | + const db = await createTestDb(); |
| 90 | + |
| 91 | + const blocked = await rawQuery(db, "DELETE FROM sessions"); |
| 92 | + assert.deepEqual(blocked, { |
| 93 | + error: "Only SELECT, WITH, and EXPLAIN queries are allowed.", |
| 94 | + }); |
| 95 | + |
| 96 | + const allowed = await rawQuery(db, "SELECT 1 as value"); |
| 97 | + assert.equal("rows" in allowed, true); |
| 98 | + |
| 99 | + db.close(); |
| 100 | +}); |
0 commit comments