aboutsummaryrefslogtreecommitdiff
path: root/autogpts/autogpt/tests/integration/test_execute_code.py
diff options
context:
space:
mode:
Diffstat (limited to 'autogpts/autogpt/tests/integration/test_execute_code.py')
-rw-r--r--autogpts/autogpt/tests/integration/test_execute_code.py118
1 files changed, 118 insertions, 0 deletions
diff --git a/autogpts/autogpt/tests/integration/test_execute_code.py b/autogpts/autogpt/tests/integration/test_execute_code.py
new file mode 100644
index 000000000..1c980e025
--- /dev/null
+++ b/autogpts/autogpt/tests/integration/test_execute_code.py
@@ -0,0 +1,118 @@
+import random
+import string
+import tempfile
+from pathlib import Path
+
+import pytest
+
+import autogpt.commands.execute_code as sut # system under testing
+from autogpt.agents.agent import Agent
+from autogpt.agents.utils.exceptions import (
+ InvalidArgumentError,
+ OperationNotAllowedError,
+)
+
+
+@pytest.fixture
+def random_code(random_string) -> str:
+ return f"print('Hello {random_string}!')"
+
+
+@pytest.fixture
+def python_test_file(agent: Agent, random_code: str):
+ temp_file = tempfile.NamedTemporaryFile(dir=agent.workspace.root, suffix=".py")
+ temp_file.write(str.encode(random_code))
+ temp_file.flush()
+
+ yield Path(temp_file.name)
+ temp_file.close()
+
+
+@pytest.fixture
+def python_test_args_file(agent: Agent):
+ temp_file = tempfile.NamedTemporaryFile(dir=agent.workspace.root, suffix=".py")
+ temp_file.write(str.encode("import sys\nprint(sys.argv[1], sys.argv[2])"))
+ temp_file.flush()
+
+ yield Path(temp_file.name)
+ temp_file.close()
+
+
+@pytest.fixture
+def random_string():
+ return "".join(random.choice(string.ascii_lowercase) for _ in range(10))
+
+
+def test_execute_python_file(python_test_file: Path, random_string: str, agent: Agent):
+ result: str = sut.execute_python_file(python_test_file, agent=agent)
+ assert result.replace("\r", "") == f"Hello {random_string}!\n"
+
+
+def test_execute_python_file_args(
+ python_test_args_file: Path, random_string: str, agent: Agent
+):
+ random_args = [random_string] * 2
+ random_args_string = " ".join(random_args)
+ result = sut.execute_python_file(
+ python_test_args_file, args=random_args, agent=agent
+ )
+ assert result == f"{random_args_string}\n"
+
+
+def test_execute_python_code(random_code: str, random_string: str, agent: Agent):
+ result: str = sut.execute_python_code(random_code, agent=agent)
+ assert result.replace("\r", "") == f"Hello {random_string}!\n"
+
+
+def test_execute_python_file_invalid(agent: Agent):
+ with pytest.raises(InvalidArgumentError):
+ sut.execute_python_file(Path("not_python.txt"), agent)
+
+
+def test_execute_python_file_not_found(agent: Agent):
+ with pytest.raises(
+ FileNotFoundError,
+ match=r"python: can't open file '([a-zA-Z]:)?[/\\\-\w]*notexist.py': "
+ r"\[Errno 2\] No such file or directory",
+ ):
+ sut.execute_python_file(Path("notexist.py"), agent)
+
+
+def test_execute_shell(random_string: str, agent: Agent):
+ result = sut.execute_shell(f"echo 'Hello {random_string}!'", agent)
+ assert f"Hello {random_string}!" in result
+
+
+def test_execute_shell_local_commands_not_allowed(random_string: str, agent: Agent):
+ result = sut.execute_shell(f"echo 'Hello {random_string}!'", agent)
+ assert f"Hello {random_string}!" in result
+
+
+def test_execute_shell_denylist_should_deny(agent: Agent, random_string: str):
+ agent.legacy_config.shell_denylist = ["echo"]
+
+ with pytest.raises(OperationNotAllowedError, match="not allowed"):
+ sut.execute_shell(f"echo 'Hello {random_string}!'", agent)
+
+
+def test_execute_shell_denylist_should_allow(agent: Agent, random_string: str):
+ agent.legacy_config.shell_denylist = ["cat"]
+
+ result = sut.execute_shell(f"echo 'Hello {random_string}!'", agent)
+ assert "Hello" in result and random_string in result
+
+
+def test_execute_shell_allowlist_should_deny(agent: Agent, random_string: str):
+ agent.legacy_config.shell_command_control = sut.ALLOWLIST_CONTROL
+ agent.legacy_config.shell_allowlist = ["cat"]
+
+ with pytest.raises(OperationNotAllowedError, match="not allowed"):
+ sut.execute_shell(f"echo 'Hello {random_string}!'", agent)
+
+
+def test_execute_shell_allowlist_should_allow(agent: Agent, random_string: str):
+ agent.legacy_config.shell_command_control = sut.ALLOWLIST_CONTROL
+ agent.legacy_config.shell_allowlist = ["echo"]
+
+ result = sut.execute_shell(f"echo 'Hello {random_string}!'", agent)
+ assert "Hello" in result and random_string in result