test: 添加配置与设置系统单元测试 (测试计划 09)
为 SettingsSchema、PermissionsSchema、AllowedMcpServerEntrySchema 验证,MCP 类型守卫,设置常量函数,以及 validation 工具函数添加 62 个测试用例。 Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
This commit is contained in:
parent
3df4b95ff9
commit
183421361e
476
src/utils/settings/__tests__/config.test.ts
Normal file
476
src/utils/settings/__tests__/config.test.ts
Normal file
@ -0,0 +1,476 @@
|
|||||||
|
import { describe, expect, test } from "bun:test";
|
||||||
|
import {
|
||||||
|
SettingsSchema,
|
||||||
|
EnvironmentVariablesSchema,
|
||||||
|
PermissionsSchema,
|
||||||
|
AllowedMcpServerEntrySchema,
|
||||||
|
DeniedMcpServerEntrySchema,
|
||||||
|
isMcpServerNameEntry,
|
||||||
|
isMcpServerCommandEntry,
|
||||||
|
isMcpServerUrlEntry,
|
||||||
|
CUSTOMIZATION_SURFACES,
|
||||||
|
} from "../types";
|
||||||
|
import {
|
||||||
|
SETTING_SOURCES,
|
||||||
|
SOURCES,
|
||||||
|
CLAUDE_CODE_SETTINGS_SCHEMA_URL,
|
||||||
|
getSettingSourceName,
|
||||||
|
getSourceDisplayName,
|
||||||
|
getSettingSourceDisplayNameLowercase,
|
||||||
|
getSettingSourceDisplayNameCapitalized,
|
||||||
|
parseSettingSourcesFlag,
|
||||||
|
} from "../constants";
|
||||||
|
import {
|
||||||
|
formatZodError,
|
||||||
|
filterInvalidPermissionRules,
|
||||||
|
validateSettingsFileContent,
|
||||||
|
} from "../validation";
|
||||||
|
|
||||||
|
// ─── Settings Schema Validation ──────────────────────────────────────────
|
||||||
|
|
||||||
|
describe("SettingsSchema", () => {
|
||||||
|
test("accepts empty object", () => {
|
||||||
|
const result = SettingsSchema().safeParse({});
|
||||||
|
expect(result.success).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("accepts model string", () => {
|
||||||
|
const result = SettingsSchema().safeParse({ model: "sonnet" });
|
||||||
|
expect(result.success).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("accepts permissions block with allow rules", () => {
|
||||||
|
const result = SettingsSchema().safeParse({
|
||||||
|
permissions: { allow: ["Bash(npm install)"] },
|
||||||
|
});
|
||||||
|
expect(result.success).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("accepts permissions block with deny rules", () => {
|
||||||
|
const result = SettingsSchema().safeParse({
|
||||||
|
permissions: { deny: ["Bash(rm -rf *)"] },
|
||||||
|
});
|
||||||
|
expect(result.success).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("accepts env variables", () => {
|
||||||
|
const result = SettingsSchema().safeParse({
|
||||||
|
env: { FOO: "bar", DEBUG: "1" },
|
||||||
|
});
|
||||||
|
expect(result.success).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("accepts hooks configuration", () => {
|
||||||
|
const result = SettingsSchema().safeParse({
|
||||||
|
hooks: {
|
||||||
|
PreToolUse: [
|
||||||
|
{
|
||||||
|
matcher: "Bash",
|
||||||
|
hooks: [{ type: "command", command: "echo test" }],
|
||||||
|
},
|
||||||
|
],
|
||||||
|
},
|
||||||
|
});
|
||||||
|
expect(result.success).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("accepts attribution settings", () => {
|
||||||
|
const result = SettingsSchema().safeParse({
|
||||||
|
attribution: {
|
||||||
|
commit: "Generated by AI",
|
||||||
|
pr: "AI-generated PR",
|
||||||
|
},
|
||||||
|
});
|
||||||
|
expect(result.success).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("accepts worktree settings", () => {
|
||||||
|
const result = SettingsSchema().safeParse({
|
||||||
|
worktree: {
|
||||||
|
symlinkDirectories: ["node_modules", ".cache"],
|
||||||
|
sparsePaths: ["src/"],
|
||||||
|
},
|
||||||
|
});
|
||||||
|
expect(result.success).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("accepts $schema field", () => {
|
||||||
|
const result = SettingsSchema().safeParse({
|
||||||
|
$schema: CLAUDE_CODE_SETTINGS_SCHEMA_URL,
|
||||||
|
});
|
||||||
|
expect(result.success).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("passes through unknown keys (passthrough mode)", () => {
|
||||||
|
const result = SettingsSchema().safeParse({ unknownKey: "value" });
|
||||||
|
expect(result.success).toBe(true);
|
||||||
|
if (result.success) {
|
||||||
|
expect((result.data as any).unknownKey).toBe("value");
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
test("coerces env var numbers to strings", () => {
|
||||||
|
const result = EnvironmentVariablesSchema().safeParse({ PORT: 3000 });
|
||||||
|
expect(result.success).toBe(true);
|
||||||
|
if (result.success) {
|
||||||
|
expect(result.data.PORT).toBe("3000");
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
test("accepts boolean settings", () => {
|
||||||
|
const result = SettingsSchema().safeParse({
|
||||||
|
includeCoAuthoredBy: true,
|
||||||
|
respectGitignore: false,
|
||||||
|
disableAllHooks: true,
|
||||||
|
});
|
||||||
|
expect(result.success).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("accepts cleanupPeriodDays", () => {
|
||||||
|
const result = SettingsSchema().safeParse({ cleanupPeriodDays: 30 });
|
||||||
|
expect(result.success).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("rejects negative cleanupPeriodDays", () => {
|
||||||
|
const result = SettingsSchema().safeParse({ cleanupPeriodDays: -1 });
|
||||||
|
expect(result.success).toBe(false);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("accepts statusLine configuration", () => {
|
||||||
|
const result = SettingsSchema().safeParse({
|
||||||
|
statusLine: { type: "command", command: "echo status" },
|
||||||
|
});
|
||||||
|
expect(result.success).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("accepts sshConfigs", () => {
|
||||||
|
const result = SettingsSchema().safeParse({
|
||||||
|
sshConfigs: [
|
||||||
|
{
|
||||||
|
id: "dev-server",
|
||||||
|
name: "Development Server",
|
||||||
|
sshHost: "dev.example.com",
|
||||||
|
sshPort: 22,
|
||||||
|
},
|
||||||
|
],
|
||||||
|
});
|
||||||
|
expect(result.success).toBe(true);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
// ─── Permissions Schema ─────────────────────────────────────────────────
|
||||||
|
|
||||||
|
describe("PermissionsSchema", () => {
|
||||||
|
test("accepts defaultMode", () => {
|
||||||
|
const result = PermissionsSchema().safeParse({
|
||||||
|
defaultMode: "acceptEdits",
|
||||||
|
});
|
||||||
|
expect(result.success).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("accepts additionalDirectories", () => {
|
||||||
|
const result = PermissionsSchema().safeParse({
|
||||||
|
additionalDirectories: ["/tmp/extra"],
|
||||||
|
});
|
||||||
|
expect(result.success).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("accepts disableBypassPermissionsMode", () => {
|
||||||
|
const result = PermissionsSchema().safeParse({
|
||||||
|
disableBypassPermissionsMode: "disable",
|
||||||
|
});
|
||||||
|
expect(result.success).toBe(true);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
// ─── AllowedMcpServerEntrySchema ────────────────────────────────────────
|
||||||
|
|
||||||
|
describe("AllowedMcpServerEntrySchema", () => {
|
||||||
|
test("accepts serverName entry", () => {
|
||||||
|
const result = AllowedMcpServerEntrySchema().safeParse({
|
||||||
|
serverName: "my-server",
|
||||||
|
});
|
||||||
|
expect(result.success).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("accepts serverCommand entry", () => {
|
||||||
|
const result = AllowedMcpServerEntrySchema().safeParse({
|
||||||
|
serverCommand: ["npx", "mcp-server"],
|
||||||
|
});
|
||||||
|
expect(result.success).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("accepts serverUrl entry", () => {
|
||||||
|
const result = AllowedMcpServerEntrySchema().safeParse({
|
||||||
|
serverUrl: "https://*.example.com/*",
|
||||||
|
});
|
||||||
|
expect(result.success).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("rejects entry with no fields", () => {
|
||||||
|
const result = AllowedMcpServerEntrySchema().safeParse({});
|
||||||
|
expect(result.success).toBe(false);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("rejects entry with multiple fields", () => {
|
||||||
|
const result = AllowedMcpServerEntrySchema().safeParse({
|
||||||
|
serverName: "my-server",
|
||||||
|
serverUrl: "https://example.com",
|
||||||
|
});
|
||||||
|
expect(result.success).toBe(false);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("rejects invalid serverName characters", () => {
|
||||||
|
const result = AllowedMcpServerEntrySchema().safeParse({
|
||||||
|
serverName: "my server with spaces",
|
||||||
|
});
|
||||||
|
expect(result.success).toBe(false);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("rejects empty serverCommand array", () => {
|
||||||
|
const result = AllowedMcpServerEntrySchema().safeParse({
|
||||||
|
serverCommand: [],
|
||||||
|
});
|
||||||
|
expect(result.success).toBe(false);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
// ─── Type guards ─────────────────────────────────────────────────────────
|
||||||
|
|
||||||
|
describe("MCP server entry type guards", () => {
|
||||||
|
test("isMcpServerNameEntry identifies name entry", () => {
|
||||||
|
expect(isMcpServerNameEntry({ serverName: "test" })).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("isMcpServerNameEntry rejects non-name entry", () => {
|
||||||
|
expect(isMcpServerNameEntry({ serverUrl: "https://example.com" })).toBe(
|
||||||
|
false
|
||||||
|
);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("isMcpServerCommandEntry identifies command entry", () => {
|
||||||
|
expect(isMcpServerCommandEntry({ serverCommand: ["npx", "srv"] })).toBe(
|
||||||
|
true
|
||||||
|
);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("isMcpServerCommandEntry rejects non-command entry", () => {
|
||||||
|
expect(isMcpServerCommandEntry({ serverName: "test" })).toBe(false);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("isMcpServerUrlEntry identifies url entry", () => {
|
||||||
|
expect(
|
||||||
|
isMcpServerUrlEntry({ serverUrl: "https://example.com" })
|
||||||
|
).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("isMcpServerUrlEntry rejects non-url entry", () => {
|
||||||
|
expect(isMcpServerUrlEntry({ serverName: "test" })).toBe(false);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
// ─── Constants ──────────────────────────────────────────────────────────
|
||||||
|
|
||||||
|
describe("SETTING_SOURCES", () => {
|
||||||
|
test("contains all five sources in order", () => {
|
||||||
|
expect(SETTING_SOURCES).toEqual([
|
||||||
|
"userSettings",
|
||||||
|
"projectSettings",
|
||||||
|
"localSettings",
|
||||||
|
"flagSettings",
|
||||||
|
"policySettings",
|
||||||
|
]);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe("SOURCES (editable)", () => {
|
||||||
|
test("contains three editable sources", () => {
|
||||||
|
expect(SOURCES).toEqual([
|
||||||
|
"localSettings",
|
||||||
|
"projectSettings",
|
||||||
|
"userSettings",
|
||||||
|
]);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe("CUSTOMIZATION_SURFACES", () => {
|
||||||
|
test("contains expected surfaces", () => {
|
||||||
|
expect(CUSTOMIZATION_SURFACES).toEqual([
|
||||||
|
"skills",
|
||||||
|
"agents",
|
||||||
|
"hooks",
|
||||||
|
"mcp",
|
||||||
|
]);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe("getSettingSourceName", () => {
|
||||||
|
test("maps userSettings to user", () => {
|
||||||
|
expect(getSettingSourceName("userSettings")).toBe("user");
|
||||||
|
});
|
||||||
|
|
||||||
|
test("maps projectSettings to project", () => {
|
||||||
|
expect(getSettingSourceName("projectSettings")).toBe("project");
|
||||||
|
});
|
||||||
|
|
||||||
|
test("maps localSettings to project, gitignored", () => {
|
||||||
|
expect(getSettingSourceName("localSettings")).toBe("project, gitignored");
|
||||||
|
});
|
||||||
|
|
||||||
|
test("maps flagSettings to cli flag", () => {
|
||||||
|
expect(getSettingSourceName("flagSettings")).toBe("cli flag");
|
||||||
|
});
|
||||||
|
|
||||||
|
test("maps policySettings to managed", () => {
|
||||||
|
expect(getSettingSourceName("policySettings")).toBe("managed");
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe("getSourceDisplayName", () => {
|
||||||
|
test("maps userSettings to User", () => {
|
||||||
|
expect(getSourceDisplayName("userSettings")).toBe("User");
|
||||||
|
});
|
||||||
|
|
||||||
|
test("maps plugin to Plugin", () => {
|
||||||
|
expect(getSourceDisplayName("plugin")).toBe("Plugin");
|
||||||
|
});
|
||||||
|
|
||||||
|
test("maps built-in to Built-in", () => {
|
||||||
|
expect(getSourceDisplayName("built-in")).toBe("Built-in");
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe("getSettingSourceDisplayNameLowercase", () => {
|
||||||
|
test("maps policySettings correctly", () => {
|
||||||
|
expect(getSettingSourceDisplayNameLowercase("policySettings")).toBe(
|
||||||
|
"enterprise managed settings"
|
||||||
|
);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("maps cliArg correctly", () => {
|
||||||
|
expect(getSettingSourceDisplayNameLowercase("cliArg")).toBe("CLI argument");
|
||||||
|
});
|
||||||
|
|
||||||
|
test("maps session correctly", () => {
|
||||||
|
expect(getSettingSourceDisplayNameLowercase("session")).toBe(
|
||||||
|
"current session"
|
||||||
|
);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe("getSettingSourceDisplayNameCapitalized", () => {
|
||||||
|
test("maps userSettings correctly", () => {
|
||||||
|
expect(getSettingSourceDisplayNameCapitalized("userSettings")).toBe(
|
||||||
|
"User settings"
|
||||||
|
);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("maps command correctly", () => {
|
||||||
|
expect(getSettingSourceDisplayNameCapitalized("command")).toBe(
|
||||||
|
"Command configuration"
|
||||||
|
);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe("parseSettingSourcesFlag", () => {
|
||||||
|
test("parses comma-separated sources", () => {
|
||||||
|
expect(parseSettingSourcesFlag("user,project,local")).toEqual([
|
||||||
|
"userSettings",
|
||||||
|
"projectSettings",
|
||||||
|
"localSettings",
|
||||||
|
]);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("parses single source", () => {
|
||||||
|
expect(parseSettingSourcesFlag("user")).toEqual(["userSettings"]);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("returns empty array for empty string", () => {
|
||||||
|
expect(parseSettingSourcesFlag("")).toEqual([]);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("trims whitespace", () => {
|
||||||
|
expect(parseSettingSourcesFlag("user , project")).toEqual([
|
||||||
|
"userSettings",
|
||||||
|
"projectSettings",
|
||||||
|
]);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("throws for invalid source name", () => {
|
||||||
|
expect(() => parseSettingSourcesFlag("invalid")).toThrow(
|
||||||
|
"Invalid setting source"
|
||||||
|
);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
// ─── Validation ─────────────────────────────────────────────────────────
|
||||||
|
|
||||||
|
describe("filterInvalidPermissionRules", () => {
|
||||||
|
test("returns empty for non-object input", () => {
|
||||||
|
expect(filterInvalidPermissionRules(null, "test.json")).toEqual([]);
|
||||||
|
expect(filterInvalidPermissionRules("string", "test.json")).toEqual([]);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("returns empty when no permissions", () => {
|
||||||
|
expect(filterInvalidPermissionRules({}, "test.json")).toEqual([]);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("filters non-string rules and returns warnings", () => {
|
||||||
|
const data = { permissions: { allow: ["Bash", 123, "Read"] } };
|
||||||
|
const warnings = filterInvalidPermissionRules(data, "test.json");
|
||||||
|
expect(warnings.length).toBe(1);
|
||||||
|
expect(warnings[0]!.path).toBe("permissions.allow");
|
||||||
|
expect((data.permissions as any).allow).toEqual(["Bash", "Read"]);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("preserves valid rules", () => {
|
||||||
|
const data = {
|
||||||
|
permissions: { allow: ["Bash(npm install)", "Read", "Write"] },
|
||||||
|
};
|
||||||
|
const warnings = filterInvalidPermissionRules(data, "test.json");
|
||||||
|
expect(warnings).toEqual([]);
|
||||||
|
expect((data.permissions as any).allow).toEqual([
|
||||||
|
"Bash(npm install)",
|
||||||
|
"Read",
|
||||||
|
"Write",
|
||||||
|
]);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe("validateSettingsFileContent", () => {
|
||||||
|
test("accepts valid JSON settings", () => {
|
||||||
|
const result = validateSettingsFileContent('{"model": "sonnet"}');
|
||||||
|
expect(result.isValid).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("accepts empty object", () => {
|
||||||
|
const result = validateSettingsFileContent("{}");
|
||||||
|
expect(result.isValid).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("rejects invalid JSON", () => {
|
||||||
|
const result = validateSettingsFileContent("not json");
|
||||||
|
expect(result.isValid).toBe(false);
|
||||||
|
if (!result.isValid) {
|
||||||
|
expect(result.error).toContain("Invalid JSON");
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
test("rejects unknown keys in strict mode", () => {
|
||||||
|
const result = validateSettingsFileContent('{"unknownField": true}');
|
||||||
|
expect(result.isValid).toBe(false);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe("formatZodError", () => {
|
||||||
|
test("formats invalid type error", () => {
|
||||||
|
const result = SettingsSchema().safeParse({ model: 123 });
|
||||||
|
expect(result.success).toBe(false);
|
||||||
|
if (!result.success) {
|
||||||
|
const errors = formatZodError(result.error, "settings.json");
|
||||||
|
expect(errors.length).toBeGreaterThan(0);
|
||||||
|
expect(errors[0]!.file).toBe("settings.json");
|
||||||
|
expect(errors[0]!.path).toContain("model");
|
||||||
|
}
|
||||||
|
});
|
||||||
|
});
|
||||||
Loading…
x
Reference in New Issue
Block a user