2026-02-22 14:33:25 +00:00
|
|
|
import { describe, it, expect, vi, beforeEach } from 'vitest';
|
|
|
|
|
import { createCreateCommand } from '../../src/commands/create.js';
|
|
|
|
|
import type { ApiClient } from '../../src/api-client.js';
|
|
|
|
|
|
|
|
|
|
function mockClient(): ApiClient {
|
|
|
|
|
return {
|
|
|
|
|
get: vi.fn(async () => []),
|
|
|
|
|
post: vi.fn(async () => ({ id: 'new-id', name: 'test' })),
|
|
|
|
|
put: vi.fn(async () => ({})),
|
|
|
|
|
delete: vi.fn(async () => {}),
|
|
|
|
|
} as unknown as ApiClient;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
describe('create command', () => {
|
|
|
|
|
let client: ReturnType<typeof mockClient>;
|
|
|
|
|
let output: string[];
|
|
|
|
|
const log = (...args: unknown[]) => output.push(args.map(String).join(' '));
|
|
|
|
|
|
|
|
|
|
beforeEach(() => {
|
|
|
|
|
client = mockClient();
|
|
|
|
|
output = [];
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
describe('create server', () => {
|
|
|
|
|
it('creates a server with minimal flags', async () => {
|
|
|
|
|
const cmd = createCreateCommand({ client, log });
|
|
|
|
|
await cmd.parseAsync(['server', 'my-server'], { from: 'user' });
|
|
|
|
|
expect(client.post).toHaveBeenCalledWith('/api/v1/servers', expect.objectContaining({
|
|
|
|
|
name: 'my-server',
|
|
|
|
|
transport: 'STDIO',
|
|
|
|
|
replicas: 1,
|
|
|
|
|
}));
|
|
|
|
|
expect(output.join('\n')).toContain("server 'test' created");
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('creates a server with all flags', async () => {
|
|
|
|
|
const cmd = createCreateCommand({ client, log });
|
|
|
|
|
await cmd.parseAsync([
|
|
|
|
|
'server', 'ha-mcp',
|
|
|
|
|
'-d', 'Home Assistant MCP',
|
|
|
|
|
'--docker-image', 'ghcr.io/ha-mcp:latest',
|
|
|
|
|
'--transport', 'STREAMABLE_HTTP',
|
|
|
|
|
'--external-url', 'http://localhost:8086/mcp',
|
|
|
|
|
'--container-port', '3000',
|
|
|
|
|
'--replicas', '2',
|
|
|
|
|
'--command', 'python',
|
|
|
|
|
'--command', '-c',
|
|
|
|
|
'--command', 'print("hello")',
|
feat: replace profiles with kubernetes-style secrets
Replace the confused Profile abstraction with a dedicated Secret resource
following Kubernetes conventions. Servers now have env entries with inline
values or secretRef references. Env vars are resolved and passed to
containers at startup (fixes existing gap).
- Add Secret CRUD (model, repo, service, routes, CLI commands)
- Server env: {name, value} or {name, valueFrom: {secretRef: {name, key}}}
- Add env-resolver utility shared by instance startup and config generation
- Remove all profile-related code (models, services, routes, CLI, tests)
- Update backup/restore for secrets instead of profiles
- describe secret masks values by default, --show-values to reveal
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-22 18:40:58 +00:00
|
|
|
'--env', 'API_KEY=secretRef:creds:API_KEY',
|
|
|
|
|
'--env', 'BASE_URL=http://localhost',
|
2026-02-22 14:33:25 +00:00
|
|
|
], { from: 'user' });
|
|
|
|
|
|
|
|
|
|
expect(client.post).toHaveBeenCalledWith('/api/v1/servers', {
|
|
|
|
|
name: 'ha-mcp',
|
|
|
|
|
description: 'Home Assistant MCP',
|
|
|
|
|
dockerImage: 'ghcr.io/ha-mcp:latest',
|
|
|
|
|
transport: 'STREAMABLE_HTTP',
|
|
|
|
|
externalUrl: 'http://localhost:8086/mcp',
|
|
|
|
|
containerPort: 3000,
|
|
|
|
|
replicas: 2,
|
|
|
|
|
command: ['python', '-c', 'print("hello")'],
|
feat: replace profiles with kubernetes-style secrets
Replace the confused Profile abstraction with a dedicated Secret resource
following Kubernetes conventions. Servers now have env entries with inline
values or secretRef references. Env vars are resolved and passed to
containers at startup (fixes existing gap).
- Add Secret CRUD (model, repo, service, routes, CLI commands)
- Server env: {name, value} or {name, valueFrom: {secretRef: {name, key}}}
- Add env-resolver utility shared by instance startup and config generation
- Remove all profile-related code (models, services, routes, CLI, tests)
- Update backup/restore for secrets instead of profiles
- describe secret masks values by default, --show-values to reveal
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-22 18:40:58 +00:00
|
|
|
env: [
|
|
|
|
|
{ name: 'API_KEY', valueFrom: { secretRef: { name: 'creds', key: 'API_KEY' } } },
|
|
|
|
|
{ name: 'BASE_URL', value: 'http://localhost' },
|
2026-02-22 14:33:25 +00:00
|
|
|
],
|
|
|
|
|
});
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('defaults transport to STDIO', async () => {
|
|
|
|
|
const cmd = createCreateCommand({ client, log });
|
|
|
|
|
await cmd.parseAsync(['server', 'test'], { from: 'user' });
|
|
|
|
|
expect(client.post).toHaveBeenCalledWith('/api/v1/servers', expect.objectContaining({
|
|
|
|
|
transport: 'STDIO',
|
|
|
|
|
}));
|
|
|
|
|
});
|
|
|
|
|
});
|
|
|
|
|
|
feat: replace profiles with kubernetes-style secrets
Replace the confused Profile abstraction with a dedicated Secret resource
following Kubernetes conventions. Servers now have env entries with inline
values or secretRef references. Env vars are resolved and passed to
containers at startup (fixes existing gap).
- Add Secret CRUD (model, repo, service, routes, CLI commands)
- Server env: {name, value} or {name, valueFrom: {secretRef: {name, key}}}
- Add env-resolver utility shared by instance startup and config generation
- Remove all profile-related code (models, services, routes, CLI, tests)
- Update backup/restore for secrets instead of profiles
- describe secret masks values by default, --show-values to reveal
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-22 18:40:58 +00:00
|
|
|
describe('create secret', () => {
|
|
|
|
|
it('creates a secret with --data flags', async () => {
|
2026-02-22 14:33:25 +00:00
|
|
|
const cmd = createCreateCommand({ client, log });
|
|
|
|
|
await cmd.parseAsync([
|
feat: replace profiles with kubernetes-style secrets
Replace the confused Profile abstraction with a dedicated Secret resource
following Kubernetes conventions. Servers now have env entries with inline
values or secretRef references. Env vars are resolved and passed to
containers at startup (fixes existing gap).
- Add Secret CRUD (model, repo, service, routes, CLI commands)
- Server env: {name, value} or {name, valueFrom: {secretRef: {name, key}}}
- Add env-resolver utility shared by instance startup and config generation
- Remove all profile-related code (models, services, routes, CLI, tests)
- Update backup/restore for secrets instead of profiles
- describe secret masks values by default, --show-values to reveal
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-22 18:40:58 +00:00
|
|
|
'secret', 'ha-creds',
|
|
|
|
|
'--data', 'TOKEN=abc123',
|
|
|
|
|
'--data', 'URL=https://ha.local',
|
2026-02-22 14:33:25 +00:00
|
|
|
], { from: 'user' });
|
feat: replace profiles with kubernetes-style secrets
Replace the confused Profile abstraction with a dedicated Secret resource
following Kubernetes conventions. Servers now have env entries with inline
values or secretRef references. Env vars are resolved and passed to
containers at startup (fixes existing gap).
- Add Secret CRUD (model, repo, service, routes, CLI commands)
- Server env: {name, value} or {name, valueFrom: {secretRef: {name, key}}}
- Add env-resolver utility shared by instance startup and config generation
- Remove all profile-related code (models, services, routes, CLI, tests)
- Update backup/restore for secrets instead of profiles
- describe secret masks values by default, --show-values to reveal
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-22 18:40:58 +00:00
|
|
|
expect(client.post).toHaveBeenCalledWith('/api/v1/secrets', {
|
|
|
|
|
name: 'ha-creds',
|
|
|
|
|
data: { TOKEN: 'abc123', URL: 'https://ha.local' },
|
|
|
|
|
});
|
|
|
|
|
expect(output.join('\n')).toContain("secret 'test' created");
|
2026-02-22 14:33:25 +00:00
|
|
|
});
|
|
|
|
|
|
feat: replace profiles with kubernetes-style secrets
Replace the confused Profile abstraction with a dedicated Secret resource
following Kubernetes conventions. Servers now have env entries with inline
values or secretRef references. Env vars are resolved and passed to
containers at startup (fixes existing gap).
- Add Secret CRUD (model, repo, service, routes, CLI commands)
- Server env: {name, value} or {name, valueFrom: {secretRef: {name, key}}}
- Add env-resolver utility shared by instance startup and config generation
- Remove all profile-related code (models, services, routes, CLI, tests)
- Update backup/restore for secrets instead of profiles
- describe secret masks values by default, --show-values to reveal
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-22 18:40:58 +00:00
|
|
|
it('creates a secret with empty data', async () => {
|
2026-02-22 14:33:25 +00:00
|
|
|
const cmd = createCreateCommand({ client, log });
|
feat: replace profiles with kubernetes-style secrets
Replace the confused Profile abstraction with a dedicated Secret resource
following Kubernetes conventions. Servers now have env entries with inline
values or secretRef references. Env vars are resolved and passed to
containers at startup (fixes existing gap).
- Add Secret CRUD (model, repo, service, routes, CLI commands)
- Server env: {name, value} or {name, valueFrom: {secretRef: {name, key}}}
- Add env-resolver utility shared by instance startup and config generation
- Remove all profile-related code (models, services, routes, CLI, tests)
- Update backup/restore for secrets instead of profiles
- describe secret masks values by default, --show-values to reveal
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-22 18:40:58 +00:00
|
|
|
await cmd.parseAsync(['secret', 'empty-secret'], { from: 'user' });
|
|
|
|
|
expect(client.post).toHaveBeenCalledWith('/api/v1/secrets', {
|
|
|
|
|
name: 'empty-secret',
|
|
|
|
|
data: {},
|
|
|
|
|
});
|
2026-02-22 14:33:25 +00:00
|
|
|
});
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
describe('create project', () => {
|
|
|
|
|
it('creates a project', async () => {
|
|
|
|
|
const cmd = createCreateCommand({ client, log });
|
|
|
|
|
await cmd.parseAsync(['project', 'my-project', '-d', 'A test project'], { from: 'user' });
|
|
|
|
|
expect(client.post).toHaveBeenCalledWith('/api/v1/projects', {
|
|
|
|
|
name: 'my-project',
|
|
|
|
|
description: 'A test project',
|
|
|
|
|
});
|
|
|
|
|
expect(output.join('\n')).toContain("project 'test' created");
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('creates a project with no description', async () => {
|
|
|
|
|
const cmd = createCreateCommand({ client, log });
|
|
|
|
|
await cmd.parseAsync(['project', 'minimal'], { from: 'user' });
|
|
|
|
|
expect(client.post).toHaveBeenCalledWith('/api/v1/projects', {
|
|
|
|
|
name: 'minimal',
|
|
|
|
|
description: '',
|
|
|
|
|
});
|
|
|
|
|
});
|
|
|
|
|
});
|
|
|
|
|
});
|