mirror of
https://github.com/aljazceru/Auto-GPT.git
synced 2026-01-16 12:34:20 +01:00
* Remove references to (broken) vector memory * Move workspace setup to `WorkspaceMixin.attach_fs` hook * Move directives into `BaseAgentSettings`
118 lines
3.8 KiB
Python
118 lines
3.8 KiB
Python
import random
|
|
import string
|
|
import tempfile
|
|
from pathlib import Path
|
|
|
|
import pytest
|
|
|
|
import autogpt.commands.execute_code as sut # system under testing
|
|
from autogpt.agents.agent import Agent
|
|
from autogpt.agents.utils.exceptions import (
|
|
InvalidArgumentError,
|
|
OperationNotAllowedError,
|
|
)
|
|
|
|
|
|
@pytest.fixture
|
|
def random_code(random_string) -> str:
|
|
return f"print('Hello {random_string}!')"
|
|
|
|
|
|
@pytest.fixture
|
|
def python_test_file(agent: Agent, random_code: str):
|
|
temp_file = tempfile.NamedTemporaryFile(dir=agent.workspace.root, suffix=".py")
|
|
temp_file.write(str.encode(random_code))
|
|
temp_file.flush()
|
|
|
|
yield Path(temp_file.name)
|
|
temp_file.close()
|
|
|
|
|
|
@pytest.fixture
|
|
def python_test_args_file(agent: Agent):
|
|
temp_file = tempfile.NamedTemporaryFile(dir=agent.workspace.root, suffix=".py")
|
|
temp_file.write(str.encode("import sys\nprint(sys.argv[1], sys.argv[2])"))
|
|
temp_file.flush()
|
|
|
|
yield Path(temp_file.name)
|
|
temp_file.close()
|
|
|
|
|
|
@pytest.fixture
|
|
def random_string():
|
|
return "".join(random.choice(string.ascii_lowercase) for _ in range(10))
|
|
|
|
|
|
def test_execute_python_file(python_test_file: Path, random_string: str, agent: Agent):
|
|
result: str = sut.execute_python_file(python_test_file, agent=agent)
|
|
assert result.replace("\r", "") == f"Hello {random_string}!\n"
|
|
|
|
|
|
def test_execute_python_file_args(
|
|
python_test_args_file: Path, random_string: str, agent: Agent
|
|
):
|
|
random_args = [random_string] * 2
|
|
random_args_string = " ".join(random_args)
|
|
result = sut.execute_python_file(
|
|
python_test_args_file, args=random_args, agent=agent
|
|
)
|
|
assert result == f"{random_args_string}\n"
|
|
|
|
|
|
def test_execute_python_code(random_code: str, random_string: str, agent: Agent):
|
|
result: str = sut.execute_python_code(random_code, agent=agent)
|
|
assert result.replace("\r", "") == f"Hello {random_string}!\n"
|
|
|
|
|
|
def test_execute_python_file_invalid(agent: Agent):
|
|
with pytest.raises(InvalidArgumentError):
|
|
sut.execute_python_file("not_python", agent)
|
|
|
|
|
|
def test_execute_python_file_not_found(agent: Agent):
|
|
with pytest.raises(
|
|
FileNotFoundError,
|
|
match=r"python: can't open file '([a-zA-Z]:)?[/\\\-\w]*notexist.py': \[Errno 2\] No such file or directory",
|
|
):
|
|
sut.execute_python_file("notexist.py", agent)
|
|
|
|
|
|
def test_execute_shell(random_string: str, agent: Agent):
|
|
result = sut.execute_shell(f"echo 'Hello {random_string}!'", agent)
|
|
assert f"Hello {random_string}!" in result
|
|
|
|
|
|
def test_execute_shell_local_commands_not_allowed(random_string: str, agent: Agent):
|
|
result = sut.execute_shell(f"echo 'Hello {random_string}!'", agent)
|
|
assert f"Hello {random_string}!" in result
|
|
|
|
|
|
def test_execute_shell_denylist_should_deny(agent: Agent, random_string: str):
|
|
agent.legacy_config.shell_denylist = ["echo"]
|
|
|
|
with pytest.raises(OperationNotAllowedError, match="not allowed"):
|
|
sut.execute_shell(f"echo 'Hello {random_string}!'", agent)
|
|
|
|
|
|
def test_execute_shell_denylist_should_allow(agent: Agent, random_string: str):
|
|
agent.legacy_config.shell_denylist = ["cat"]
|
|
|
|
result = sut.execute_shell(f"echo 'Hello {random_string}!'", agent)
|
|
assert "Hello" in result and random_string in result
|
|
|
|
|
|
def test_execute_shell_allowlist_should_deny(agent: Agent, random_string: str):
|
|
agent.legacy_config.shell_command_control = sut.ALLOWLIST_CONTROL
|
|
agent.legacy_config.shell_allowlist = ["cat"]
|
|
|
|
with pytest.raises(OperationNotAllowedError, match="not allowed"):
|
|
sut.execute_shell(f"echo 'Hello {random_string}!'", agent)
|
|
|
|
|
|
def test_execute_shell_allowlist_should_allow(agent: Agent, random_string: str):
|
|
agent.legacy_config.shell_command_control = sut.ALLOWLIST_CONTROL
|
|
agent.legacy_config.shell_allowlist = ["echo"]
|
|
|
|
result = sut.execute_shell(f"echo 'Hello {random_string}!'", agent)
|
|
assert "Hello" in result and random_string in result
|