diff options
Diffstat (limited to 'autogpts/autogpt/tests/integration/test_execute_code.py')
-rw-r--r-- | autogpts/autogpt/tests/integration/test_execute_code.py | 118 |
1 files changed, 118 insertions, 0 deletions
diff --git a/autogpts/autogpt/tests/integration/test_execute_code.py b/autogpts/autogpt/tests/integration/test_execute_code.py new file mode 100644 index 000000000..1c980e025 --- /dev/null +++ b/autogpts/autogpt/tests/integration/test_execute_code.py @@ -0,0 +1,118 @@ +import random +import string +import tempfile +from pathlib import Path + +import pytest + +import autogpt.commands.execute_code as sut # system under testing +from autogpt.agents.agent import Agent +from autogpt.agents.utils.exceptions import ( + InvalidArgumentError, + OperationNotAllowedError, +) + + +@pytest.fixture +def random_code(random_string) -> str: + return f"print('Hello {random_string}!')" + + +@pytest.fixture +def python_test_file(agent: Agent, random_code: str): + temp_file = tempfile.NamedTemporaryFile(dir=agent.workspace.root, suffix=".py") + temp_file.write(str.encode(random_code)) + temp_file.flush() + + yield Path(temp_file.name) + temp_file.close() + + +@pytest.fixture +def python_test_args_file(agent: Agent): + temp_file = tempfile.NamedTemporaryFile(dir=agent.workspace.root, suffix=".py") + temp_file.write(str.encode("import sys\nprint(sys.argv[1], sys.argv[2])")) + temp_file.flush() + + yield Path(temp_file.name) + temp_file.close() + + +@pytest.fixture +def random_string(): + return "".join(random.choice(string.ascii_lowercase) for _ in range(10)) + + +def test_execute_python_file(python_test_file: Path, random_string: str, agent: Agent): + result: str = sut.execute_python_file(python_test_file, agent=agent) + assert result.replace("\r", "") == f"Hello {random_string}!\n" + + +def test_execute_python_file_args( + python_test_args_file: Path, random_string: str, agent: Agent +): + random_args = [random_string] * 2 + random_args_string = " ".join(random_args) + result = sut.execute_python_file( + python_test_args_file, args=random_args, agent=agent + ) + assert result == f"{random_args_string}\n" + + +def test_execute_python_code(random_code: str, random_string: str, agent: Agent): + result: str = sut.execute_python_code(random_code, agent=agent) + assert result.replace("\r", "") == f"Hello {random_string}!\n" + + +def test_execute_python_file_invalid(agent: Agent): + with pytest.raises(InvalidArgumentError): + sut.execute_python_file(Path("not_python.txt"), agent) + + +def test_execute_python_file_not_found(agent: Agent): + with pytest.raises( + FileNotFoundError, + match=r"python: can't open file '([a-zA-Z]:)?[/\\\-\w]*notexist.py': " + r"\[Errno 2\] No such file or directory", + ): + sut.execute_python_file(Path("notexist.py"), agent) + + +def test_execute_shell(random_string: str, agent: Agent): + result = sut.execute_shell(f"echo 'Hello {random_string}!'", agent) + assert f"Hello {random_string}!" in result + + +def test_execute_shell_local_commands_not_allowed(random_string: str, agent: Agent): + result = sut.execute_shell(f"echo 'Hello {random_string}!'", agent) + assert f"Hello {random_string}!" in result + + +def test_execute_shell_denylist_should_deny(agent: Agent, random_string: str): + agent.legacy_config.shell_denylist = ["echo"] + + with pytest.raises(OperationNotAllowedError, match="not allowed"): + sut.execute_shell(f"echo 'Hello {random_string}!'", agent) + + +def test_execute_shell_denylist_should_allow(agent: Agent, random_string: str): + agent.legacy_config.shell_denylist = ["cat"] + + result = sut.execute_shell(f"echo 'Hello {random_string}!'", agent) + assert "Hello" in result and random_string in result + + +def test_execute_shell_allowlist_should_deny(agent: Agent, random_string: str): + agent.legacy_config.shell_command_control = sut.ALLOWLIST_CONTROL + agent.legacy_config.shell_allowlist = ["cat"] + + with pytest.raises(OperationNotAllowedError, match="not allowed"): + sut.execute_shell(f"echo 'Hello {random_string}!'", agent) + + +def test_execute_shell_allowlist_should_allow(agent: Agent, random_string: str): + agent.legacy_config.shell_command_control = sut.ALLOWLIST_CONTROL + agent.legacy_config.shell_allowlist = ["echo"] + + result = sut.execute_shell(f"echo 'Hello {random_string}!'", agent) + assert "Hello" in result and random_string in result |